Command Center Access Control Software

Size: px
Start display at page:

Download "Command Center Access Control Software"

Transcription

1 Command Center Access Control Software System Administration and User Guide Version 2.0 Mailing Address: NextgenID, Ltd San Pedro, Suite 100 San Antonio, TX USA Contacts: Phone: (210) Fax: (210)

2 THIS PAGE LEFT BLANK INTENTIONALLY Copyright NextgenID Inc. 2

3 Minimum System Requirements...5 Recommended System Requirements...5 Obtaining Support...5 Chapter 1: Getting Started...6 Chapter 2: Command Center Installation...7 Overview...7 Placing Your Command Center in the NextgenID Workgroup...7 Installing Pre-requisite Software...9 Installing Microsoft Message Queuing (MSMQ)...11 Installing Microsoft.NET Framework...12 Installing Pre-requisite Hardware...13 Installing NextgenID Command Center Software...14 Configuring the Windows Time Synchronization Service...21 Chapter 3: Administration Module...22 Administration Band...22 Access Panel Activation...23 Access Panels...27 Editing the Panel Information...29 Assigning and Editing Open Access Privileges...32 Viewing the Host Information...34 Alarm Designation...36 Designate Alarms...38 Remove Alarms...40 Facilities...41 Add a New Facility...41 Edit a Facility (Change the name of the facility)...42 Deleting an Existing Facility...43 Organizational Security...43 Organizations...43 Setting up Organizational Security...45 Chapter 4: Enrollment...54 Enrollments Band...54 Groups...55 New Member Group Step 1 of 4 Add a New Group...56 Editing Groups...57 Editing the Group Information Tab...57 Edit Access Panels associated with a Group...59 Associate or Remove a Member from a Group...60 Remove a Member...62 Edit Access Privileges of a Group...63 Deleting a Group...64 Deleting an Existing Group...64 Members...66 Member Enrollment Settings...67 Member Enrollment: Gathering Member Information...68 Member Enrollment: Gathering Additional Data...69 Member Enrollment: Gathering Fingerprints...70 Member Enrollment: Enroll a Trusted Photograph...77 Copyright NextgenID Inc. 3

4 Member Enrollment: Gathering Iris Information...74 Member Enrollment: Assigning Group Memberships...78 Member Enrollment: Assign Individual Access Privileges...79 Edit Member...80 Editing an Existing Member...80 Delete Member...81 Deleting an Existing Member...81 Chapter 5: Monitoring...82 Monitoring...82 Searching for Logged Alarms...84 Searching for Logged Events...86 System Monitor...88 Chapter 6: Reporting...90 Reporting...90 Reports...91 Selecting Report Criteria and Executing the Report...92 Copyright NextgenID Inc. 4

5 This document guides an administrator through the process of installing the Command Center software along with the process of installing the necessary pre-requisites. Minimum System Requirements Processor: Memory: Hard Drive: USB: Pentium III 800 MHz 256 MB RAM 40 GB (2) Available Ports Recommended System Requirements Processor: Memory: Hard Drive: Pentium GHz 512 MB RAM 80 GB* * For systems using the No Tailgating IR add-on product, the storage space will be a calculated requirement based on the number of access panels in an environment, the amount of facility throughput and the length of time a site expects to keep video recordings of member activity online. Obtaining Support If at any time before, during or after the installation of your system you encounter any problems or have questions about the guidelines and instructions provided here, please contact your NextgenID support team. Phone: (210) support@nextgenid.com Copyright NextgenID Inc. 5

6 Chapter 1: Getting Started 1. Installation The first step in getting started with the NextgenID Biometric Access Control System is to make sure that all the necessary components have been installed. This breaks down into two parts: 1. The hardware or access panels should be installed and connected to the doors and entrances they are intended to secure. The details on accomplishing this are covered in the respective Installation & Operations Manual for the various models of panels, these are: i. BioAxs 9700 (Fingerprint Only) ii. BioAxs 9800-FR (Face Recognition) iii. BioAxs 9800-IR (Iris Recognition) 2. The second part involves the installation and setup of the Command Center Access Control Software (client and server). These steps are covered in detail in Chapter 2 of this guide. 2. Security Model Once the systems and software has been installed, some forethought should be given to the security model you wish to employ for controlling access to the software modules themselves. The default implementation will allow any computer user that can access the application to perform any of the activities (i.e. enroll users, grant access, monitor events and alarms, etc.) For a more rigid security model, an administrator may activate the Organizational Security features of the system. These features provide a deep integration with the Microsoft Windows Network Domain and Active Directory user and group security structures. For more detailed information on activating these features, refer to the Organization Security section of this guide in Chapter 3: Administration. 3. Activation Once a security model has been selected, the next step is for an administrator to activate the access panels that have been installed on your system. This process involves the discovery of an access panel and the setup of it s associated hardware components (i.e. readers, indicators, sensors, etc.). This is an ideal time to configure the operating behavior for your access panels at various threat levels. An administrator may enable the threat-scalable functionality and define custom threat levels from the System Settings tab on the Administration menu. Panel behavior is defined through the Access Panel dialog (also available from the Administration menu). For more details, refer to these topics in Chapter 3: Administration. 4. Enrollment and Access Privileges The final step involved in getting started with the system is to establish your privilege groups for members and begin enrolling individuals in the system. For details on performing these tasks, refer to Chapter 4: Enrollment. Copyright NextgenID Inc. 6

7 Chapter 2: Command Center Installation Overview The NextgenID Command Center Access Control System is a distributed client-server application. The following diagram illustrates the key software components that make up the system: Although the above diagram depicts the Command Center Client and the Command Center Server on separate nodes, the system may also be deployed with both of these components on the same computer. Placing Your Command Center in the NextgenID Workgroup (Optional) By default, the Door Commander Module (DCM) systems are pre-configured as members of a Microsoft Windows Networking Workgroup entitled NextgenID. If you are operating your command center in a non-windows domain or Active Directory environment, the simplest way to link up with the DCMs is to place the PC you are going to utilize as a member of this same workgroup. The steps for accomplishing this task are outlined below. If your Command Center server and client computers are in a Microsoft Windows Domain or Active Directory environment, you may alternatively add the DCM systems to a domain or sub-domain of your choosing. Please refer to the operating guides of your respective operating system for details on this task. NOTE: If you do not want to change your Windows networking environment, the DCM(s) systems must at a minimum be visible to the Command Center server and Command Center client PCs across the windows networking domain or workgroup. This can usually be validated by running the windows explorer on your machine and validating the DCM is listed. Typically the DCM(s) present on your network will be viewable in the location: My Network Places\Entire Netork\Microsoft Windows Network\NextgenID If there are no DCM(s) visible from your workstation, consult your System Administrator for assistance. Copyright NextgenID Inc. 7

8 Adding your Command Center computer to the NextgenID workgroup Windows 2000 Right click on my computer, select Properties from the pop-up menu, click on the Network Identification tab then click on the properties button. Select the workgroup radio button and then type in NextgenID. Click the [OK] button. Windows XP Click on the start menu, right click on my computer, click on properties. Click on the Computer Name tab and then click on the change button. Select the workgroup radio button, type in NextgenID and click the [OK] button. Copyright NextgenID Inc. 8

9 IMPORTANT Install Pre-requisite Software The NextgenID system requires that four external software components be installed on the Command Center system in order to function correctly. This section of the installation guide will assist you in the proper installation of these prerequisites. Note: You must have administrator or installation rights on your computer in order to install the NextgenID Command Center Software and Pre-Requisite support listed below. Installing Microsoft SQL Server 2000 Database Server NOTE: This step is only performed on your Command Center Server install. If you are setting up an additional Command Center Client as an enrollment or monitoring station you may skip this step. Installing the Desktop Edition (MSDE 2000A) The Desktop Edition of Microsoft SQL Server 2000 (MSDE2000A) is the default database server provided with your NextgenID system. The setup routine is included on the NextgenID CD-ROM. Follow these steps to install MSDE2000A onto your computer: 1. Note the drive letter of the CD Rom and insert the NextgenID BioAxs Installation Disk. The latest version of MSDE requires that user specified options for he setup.exe executable be entered on the command line. 2. Click the Windows Start Button. Click RUN the following dialog will appear 3. Enter the path to the MSDE Setup executable and command line options in the Open: text box. An example is given below. Be sure to use quotation marks where indicated. Note: You will be entering an administrator password to your MSDE Database. This password is case sensitive. You will be prompted later for this password when you install the NextgenID Command Center Server Software. Example 1 D:\SupportFiles\MSDE\setup.exe SAPWD= <your password here> SecurityMode=SQL Example 2 D:\SupportFiles\MSDE\setup.exe SAPWD= nextgenid SecurityMode=SQL Copyright NextgenID Inc. 9

10 3. Click OK, the MSDE setup application will start. When setup completes, restart your computer to start the SQL Server application service. Note: The Desktop Edition has a database limitation of 2GB. We recommend upgrading to the Standard Edition of SQL Server if you have any Access Panels that produce video/images along with alarm and event data. Events of this type consume more storage space than nonimaged events. Standard Edition The Standard Edition of Microsoft SQL Server 2000 is the recommended for implementations when Access Panels that produce video and/or images are present. If you licensed Standard Edition from NextgenID, the installation routine will be included on Microsoft labeled media, otherwise, consult with your IT staff to acquire this on your own. Copyright NextgenID Inc. 10

11 Installing Microsoft Message Queuing (MSMQ) NOTE: This step is only performed on your Command Center Server install. If you are setting up an additional Command Center Client as an enrollment or monitoring station you may skip over this step. The Microsoft Message Queuing software must be installed from your Windows operating system CD. Windows version 2.0 of MSMQ Windows XP - version 3.0 of MSMQ Once you have your OS disk, open the Control Panel from your respective Windows operating system and select Add or Remove Programs. When the dialog opens, choose the Add/Remove Windows Components from the left-side navigation bar. When the Windows Components Wizard dialog opens, scroll through the items in the Components listing and place a check-mark in the box for Message Queuing. Click the Details button and un-check the Subcomponent option Active Directory Integration then click OK Copyright NextgenID Inc. 11

12 Click next to complete installation of Message Queuing (MSMQ). Installing Microsoft.NET Framework NOTE: The Microsoft.NET Framework 1.1 is installable from the Windows Update site. If your computer has internet access, it is recommended that you update your computer using the Windows Update feature accessible from Internet Explorer. If you do not have internet access you may follow the procedure below to install the Microsoft.Net Framework version 1.1 The Microsoft.NET Framework 1.1 installer is provided on the same CD-ROM as the Command Center software. From the root directory of the CD-ROM, open the dotnetframework\1.1 folder and double-click dotnetfx.exe to install the framework. Once the framework install is complete, you must apply the.net Framework 1.1 Service Pack 1 which is also located off the root directory on the NextgenID CD-ROM in the dotnetframework\1.1\sp1 folder. Double-click the NDP1.1sp1-KB X86.exe file to install the service pack. You will need to reboot your computer after the service pack installation is complete. Copyright NextgenID Inc. 12

13 Installing Pre-requisite Hardware The Command Center system requires that two hardware components be installed on the computer in order to function properly. 1. Digital Persona Fingerprint Sensor Drivers and Software Do not connect your sensor to your computer until you have finished installing the Digital Persona Sensor Drivers and Software. Drivers must be installed via Digital Persona s setup program, In the root directory of the NextgenID CD-ROM Install the Digital Persona Platinum Integrator version Software Navigate to the \SupportFiles\DPSensor\Digital Persona Integrator v3.1.1 folder. Double-click on the setup.exe file to launch the driver installation. You must reboot your computer after installation of the software is complete. Install the Digital Persona Platinum Integrator version Driver Update Navigate to the \SupportFiles\DPSensor\Digital Persona Integrator v3.1.1 Patch folder. Double-click on the dp msi file to launch the update installation. You must reboot your computer after installation of the software is complete. Connect the fingerprint sensor device to an available USB port on the Command Center Client computer. After installing the fingerprint sensor into the USB port, Windows plug and play feature will automatically detect the new device and will install the appropriate drivers for it. Windows will notify you when the device is ready for use. 2. FingerMatch HASP Software Licensing Key Install this device on an available USB port on the Command Center computer. After installing the HASP key into the USB port, Windows plug and play feature will automatically detect the new device and will attempt to install the appropriate drivers for it. Cancel the Add New Hardware Wizard, as the driver installation will be completed by the Command Center software installation later on. Optional Enrollment Camera A version of the Command Center enrollment kit is available with a USB desktop camera that may be used for trusted enrollment photographs of members enrolled in the system. If you received one of these cameras, please refer to the manufacturer instructions for installing your respective model. Installing Microsoft Data Access Component 2.8 or above (MDAC). NOTE: Windows XP Professional users can omit this step as MDAC components are installed as part of the operating system. Microsoft Data Access Component 2.8 must be installed before loading the Command Center software. MDAC 2.8 can be found on the NextgenID CD-ROM in the \SupportFiles\MDAC_2_8 folder. Copyright NextgenID Inc. 13

14 Installing NextgenID Command Center Software The NextgenID Biometric Security System needs at least one computer to host the client and server operations of the system. The client service is the Command Center User Interface that security administrators will interact with. The server service holds the user database and interacts with the Door Commander Modules. A single computer can be both client and server, or you can break up the functions of two separate computers. While you can have multiple Command Center clients, there can only be one Command Center server in your environment. The following installation instructions assume that you will be installing both the client and server service on the same computer. If not already inserted, insert the CD-ROM containing the Command Center software into your computer s CD-ROM tray and browse to the root directory of the CD. Double-click the NextgenIDInstaller.exe file to launch the NextgenID Installer. In the Installation Options section, select the Command Center option and place a check mark in both the Client and Server check boxes. Then click the Begin Installation button. Copyright NextgenID Inc. 14

15 The installation will start by installing the client service first. When the Command Center Client Setup Wizard appears, simply click on the [Next >] button to begin installation. When prompted with the Command Center Client Configuration screen, accept the defaults if you are installing the Command Center Client and Server on the same computer. It enter the name of the Command Center Server in the Command Center Server Computer Name box. Click on the [Next>] button to continue. Copyright NextgenID Inc. 15

16 When prompted to Select Installation Folder, you may browse to a different Folder or accept the default. It is recommended that you choose the Everyone option for making the Command Center Client available to anyone who uses this computer. Click on [Next>] to continue. When prompted with the Confirm Installation screen, click the [Next >] button. The Installing Command Center Client screen will keep you updated on the progress as the installation is performed. Copyright NextgenID Inc. 16

17 Once you are prompted with the Installation Complete screen, click the [Close] button to continue with the server component. If you only chose the client component, click on [Close] then [Finish] to complete the installation. If you ve selected the server component of the Command Center system, the installer will automatically proceed with its installation next. The first item associated with the Command Center Server installation will be the NextgenID database created on your Microsoft SQL Server (Desktop or Standard) database. Once the database software creation has completed, the Setup Wizard for the Command Center Server will be presented. Click the [Next >] button to proceed. Copyright NextgenID Inc. 17

18 When prompted to supply the names of Standard and Priority Message Queues, it is strongly recommended that you accept the default values. Modifying these names will require you to modify the names of the queues used during Door Commander Activation. Click on [Next>] to continue. You may modify the installation folder or accept the default. Again it is recommended that you select the Everyone option to allow any who uses this computer to activate the Command Center Server. Click on [Next>] to continue. Copyright NextgenID Inc. 18

19 Once all the options have been select, click then [Next >] button to begin the actual installation of the server files. The next screen will keep you updated on the progress of the Command Center Server installation. Copyright NextgenID Inc. 19

20 When returned to the NextgenID Installer window with a status of Selected component(s) successfully installed, click the [Finish] button. Copyright NextgenID Inc. 20

21 Configuring the Windows Time Synchronization Service To ensure that events and alarms produced by the Access Panels within a system accurately reflect the correct date and time of occurrence, the NextgenID system employs a Network Time Protocol (NTP) Service. Through the use of this service, all Access Panels will synchronize their date and time settings based on that of the Command Center server. The time service was enabled during installation, the last step is to configure its settings to start Automatically whenever the computer is brought online. Windows 2000 Click Start -> Settings -> Control Panel. Double-click the Administrative Tools icon, and then double-click the Services icon. Windows XP Click on the start menu, click on Control Panel, double-click the Administrative Tools icon, and then double-click the Services icon. Scroll down the listing to the service entry named Windows Time. The value in the Startup Type column should read: Automatic. The Status should display: Started. If this is not the case, right-click the Windows Time service and select Properties. From the General tab, set the startup type to Automatic and click the [OK] button. Right-click on the Windows Time service and select Start from the pop-up menu. Copyright NextgenID Inc. 21

22 Chapter 3: Administration Module Administration Band The Administration Band of NextgenID Command Center consists of the following Sections: 1. Access Panels: Displays Panel, Host, Open Access, and Panel Configuration information. This information may be edited as necessary. 2. Alarm Designations: Provides the Administrator the option of designating or removing Alarms. 3. Facilities: Gives the Administrator the ability to organize and mange each Facility. 4. Organizations: Administrator's can establish Role Associations for their Members. This icon will only be present if Organizational Security is enabled. Copyright NextgenID Inc. 22

23 Access Panel Activation Access Panel Activation is accomplished by using a three-step wizard that assists you with the setup. To begin activation you will need to click the Access Panel icon located under the Administration Band. Once you see the access panel viewer, click on the new button. The New Door Commander Module/Access Panel Activation Wizard will appear. Follow step 1 thru 3 to activate your new Door Commander and Access Panel. 1. Step 1 of 3 Door Commander Module Activation. Select an available Door Commander from the list. Once you have selected the Door Commander, click on the [Activate This System] button. Copyright NextgenID Inc. 23

24 The Process meter will appear and a message will notify you that the system is polling for the new access panel. If the access panel is not discovered you will receive a failure message. If the activation is successful, the administrator will click on the Next button to continue to step 2. Copyright NextgenID Inc. 24

25 2. Step 2 of 3 Access Panel Activation. By default, the discovered access panel will be given the name of the Access Panel s fingerprint scanner s Globally Unique Identifier. During this step of the activation, you can rename the access panel to a user-friendly name if desired. You can also assign a building or facility to the access panel, and select whether the access panel is an interior or exterior type. Once you have made your selections click on the button to continue. The information displayed in the GUID field represents the unique serial number of the access panel that has been discovered. When activating multiple panels at once, you can use this value as a cross-reference to help identify where this panel was physically installed at your facility. Copyright NextgenID Inc. 25

26 3. Step 3 of 3 Door Commander Module Activation. Your new Door Commander and Access Panel have been activated. The door commander service will restart automatically on the Door Commander Module and you are on your way to more secure access to your facility. The panel should now be operational and is ready for privilege assignment. Copyright NextgenID Inc. 26

27 Access Panels Access Panels are the means of Access by Members of your organization. The Access Panels are viewable by clicking on the Access Panel Icon under the Administration band. The Access Panel Viewer displays an icon for each panel installed in your organization. When your system was originally set up an Access Panel was installed at that time. However, an Administrator has the option of viewing, editing or deleting the Access Panel as necessary. The Access Panel tabs are listed below: Panel Information Tab: The Panel Information tab allows the Administrator to view or edit information pertaining to the panel name and type. Additionally, the Administrator can associate a Building with the Access Panel. For auditing purposes, the Last Modified By and Last Modified On information displays as read only. Host Information Tab: Host Information tab contains details related to the connectivity of your Door Commander Module. The name of the Door Commander Module, IP address, standard queue, and priority queue names are listed. This data is viewable, but only the standard and priority queue names may be edited. Audit information displayed are read-only fields. The audit information displayed the last time the access panel was modified and the windows identity of the user who is responsible for the changes. The Panel 'Lock-down' state feature offers the unique ability to lock-down a specific access panel. If an open access period is set when the Lock-down in effect box is checked it will be overridden by the lock-down, allowing access to only member who have lock down privileges. Selected members may be configured to have lock-down privilege and will be granted access during a lock down period. For more information on configuring the lock-down override for a member, see the New Member Enrollment section. Open Access Tab: Gives the Administrator the ability to assign Open Access periods for a specific Access Panel. Open Access simply means that the member can enter the door without performing fingerprint or facial recognition during the periods specified. This is most useful for high access areas during work hours. Panel Configuration Tab: The Panel Configuration tab allows an administrator to change the credentials accepted by an Access Panel. This feature is useful, as it will allow an administrator to make entry to a facility more or less restrictive. However, note that changing the Access Panel configuration through this tab requires a manual restart of the Door Commander service on the Door Commander Module before the change will take affect. Copyright NextgenID Inc. 27

28 Tamper Lock Tab: If the access panel is tampered with the Tamper Lock tab will be dynamically displayed in the Access Panel area. Within the tab, the Administrator may choose to unlock the tamper restriction by clicking on the Remove Tamper Lock button. Once the tamper lock has been cleared the tab will be hidden. This feature is an added security mechanism that secures the door and will not allow entry until the tamper lock has been removed. Tamper locks are logged and displayed in the Alarms or Event log depending on how the event is configured. This occurrence indicates that the access panel has been physically tampered with (i.e. an attempt to remove the face plate or take the panel off of the wall). Copyright NextgenID Inc. 28

29 Editing the Panel Information During the usage of the NextgenID Command Center, it may become necessary to edit the Panel Information or assign a Building to the Access Panel. Detailed steps are provided below on how to edit the Panel Information. 1. Click on the Access Panels Icon under the Administration Band Access Panel icons display in the viewer. 2. Select an Access Panel and then click on the [Edit] button Access Panel dialog window opens. NOTE: You may also double-click the Access Panel icon, or right-click the Access Panel icon and choose Edit from the Context Menu. A. Panel Information Tab Opens by default a. Panel Name To edit the Access Panel Name simply click in the field and change the name. i. Building Buildings or sub-buildings can be associated with an access panel if desired. Only one building may be assigned to a specific access panel at one time. Once a building is assigned, there must always be a building assigned. However, you can assign a different building if you wish. If you choose to associate a different building with the access panel a dialog message will appear notifying you that an access panel is already associated with the panel. You will need to click the yes button before associating a new panel. Click on the [Select] button beside the Building field. Select the Copyright NextgenID Inc. 29

30 building that you wish to associate with the Access Panel. Click on the [OK] button. ii. iii. iv. Type Identifies if the Panel is an interior or exterior Panel. To edit the Type select the appropriate item from the list box. Organization GUID The GUID displays the configuration of the Access Panel and the Globally Unique Identifier of the Access Panel s fingerprint scanner. This is a read-only field. v. Panel 'Lock-down' State This feature allows the administrator the option of locking down specific panels. This feature will override the open access feature and will only allow members to enter who have lock-down override privileges. To activate the lock-down state, simply check the Lockdown in Effect box and click on the [OK] button. NOTE: This setting may also be applied via the System Monitor. vi. Audit Information This section is read-only and displays the Last Modified By and Last Modified On dates and time. Copyright NextgenID Inc. 30

31 3. Save the Edits to the Panel Information Tab Click on the [OK] button to save the edits 4. Updated and Saved The Access Panel Information is updated. The next time you visit the tab the Audit Information will display and reflect the time and user information of the last update. Copyright NextgenID Inc. 31

32 Assigning and Editing Open Access Privileges Open Access gives the organization the flexibility of specifying a specific time for a specific Access Panel that fingerprint or facial recognition will not be required. This option is for organizations that wish to have less rigid member verification at specific times. This type of access may be suitable for office hours or internal doors. The steps provided below demonstrate how to implement Open Access Privileges. 1. Click on the Access Panels Icon under the Administration Band 2. Select an Access Panel an then click on the [Edit] button Access Panel Icons display in the viewer. Access Panel Dialog opens A. Panel Information Tab Opens by default B. Open Access Tab Click on the Open Access tab to display open access information for the Access Panel. i. Assigning Access Periods Select a Start Access time (Day, Hour and Minute) and a Stop Access time (Day, Hour and Minute). Once the desired times have been selected click on the [Add] button. Access times are moved to the Existing Periods of Open Access box. Copyright NextgenID Inc. 32

33 ii. Edit or Remove Access Periods Select the Access time that you want to remove from the Existing Periods of Open Access box and then click on the [Remove] button. Add new access times as desired. 3. Save Access Periods To save initial access times or any edits, click on the [OK] button. Copyright NextgenID Inc. 33

34 Viewing the Host Information Host Information Tab 1. Click on the Access Panels Icon under the Administration Band Access Panel icons display in the viewer. 2. Select an Access Panel and then click on the [Edit] button Access Panel dialog window opens. A. Panel Information Tab Opens by default B. Host Information Tab Click on the Host Information tab to display the name of the Door Commander Module and its IP address. i. Computer Host Name Displays the name of the Door Commander Module. This is a Read- Only field. ii. IP Address Displays the IP address of the Door Commander Module. This is a Read-Only field. Copyright NextgenID Inc. 34

35 iii. iv. Standard Queue Name Although this field is updateable it is not suggested to update the Standard Queue Name. Priority Queue Name Although this field is updateable it is not suggested to update the Priority Queue Name. v. Audit Information This section is read-only and displays the Last Modified By and Last Modified On dates and time. 3. Save Edits to the Host Information Tab Click on the [OK] button to save the edits. Copyright NextgenID Inc. 35

36 Alarm Designation Overview of Alarm Designations: The result of an action performed by a member at the door is considered an Event. These Events may be designated as Alarms by anyone who has access to the Alarm Designation page. Once an Alarm has been designated, each time the Alarm is triggered, it will be logged in the Alarms Viewer and must be acknowledged by the administrator. Since Alarms are configurable, your organization can designate Alarms that match your organization's security procedures. This is a flexible and effective way of communicating user interaction with the door to the administrator. Definition of the Events: Access Denied - If the member s pin, facial or fingerprint image cannot be validated an Access Denied Event is triggered disallowing entry to the door. Access Denied Under Duress - This event is triggered when a member scans the duress finger and received an access denied. This may occur due to an expired access period. Access Granted - This event is triggered once the member has been granted access to enter the door. This occurs when the correct pin, facial or fingerprint is acknowledged. Access Granted Under Duress - Granted to member using a correctly enrolled duress finger. Access Granted With Guest - Grants access to a valid member with guests. Access Granted with Tailgating - Identifies a valid member with a tailgater. Access Panel Tampered With - This event identifies that the access panel has been tampered with in some way. Door Ajar - This event is triggered when the door has been opened longer than 10 seconds. Door Ajar With Passthru - If the door has been open for more than 10 seconds and entry continues this event is triggered. Door Opened - When the door is opened the Door Opened event is triggered. If the door is left open for period greater than 10 seconds the Door Ajar Event will be triggered. Door Opened With Passthru - Identifies that the door is open and that entry continues. Door Opened Request to Exit - Event is triggered once the Request to Exit button is pressed and the door is opened. Watched Member Alert - Allows the administrator to track a member that has been marked as a Watched Member. Visitor undefined. Copyright NextgenID Inc. 36

37 Default Configuration of Events and Alarms: Events and Alarms are originally designated using a default setting. The Events and Alarms may be configured per the organization's specification when necessary. The default setting are listed below: Designated As Events Access Granted Access Granted With Guests Access Denied Door Opened Door Opened With Passthru Door Opened Request To Exit Designated As Alarms Access Granted With Tailgating Door Ajar Door Ajar With Passthru Access Panel Tampered With Visitor Access Granted Under Duress Access Denied Under Duress Watched Member Alert Copyright NextgenID Inc. 37

38 Designate Alarms Alarms may be designated to assist the administrator with identifying security issues with the door. Designating Alarms is a simple process and is explained below: 1. Select the Event that you want to designate as an Alarm Click on the Event in the Designated As Events List 2. Click on the [>>] button Event is displayed in the Designated As Alarms List Copyright NextgenID Inc. 38

39 3. To Undo any Edits that you have made before clicking the [Save Designations] button, simply click on the [Undo Edits] button. Events return to their location prior to editing. 4. Click on the [Save Designation] button The Alarm is now active Once an Alarm has been designated, each time the Alarm is triggered it will be logged in the Alarms Viewer located under the Monitoring Band. Each Alarm needs to be acknowledged by the administrator. Copyright NextgenID Inc. 39

40 Remove Alarms Occasionally, it may be necessary to remove a designated Alarm. Alarms are never really deleted from the system. Instead, they are removed as an Alarm and designated as an Event. The previous Alarm information that was logged will now appear in the Event Viewer located under the Monitoring Band. Removing Alarms is a simple three-step process and is described below: 1. Select the Alarm in the Designated As Alarms list that you want to Remove Click on the Alarm in the Alarms List 2. Click on the [<<] button. Alarm is displayed in the Designated As Events List 3. Click on the [Save Designations] button The edits have been saved and the Alarm is now designated as an Event. Copyright NextgenID Inc. 40

41 Facilities Facilities gives the Administrator the ability to organize and mange each Facility or sub-facility through the NextgenID Command Center. Facilities and sub-facilities may be associated with a specific access panel. Once a facility is associated with an access panel, the only way of removing the association is to delete the facility. However, you can assign a different facility to the access panel if desired. Add a New Facility 1. Click on the [New] button on the Facilities Toolbar New Facility Wizard appears 2. Enter the Facility Name Select the [Finish] button at the bottom of the page to add the Facility. Copyright NextgenID Inc. 41

42 3. Facility Appears in the Viewer Add a Sub-Facility 1. Click on the Facility and then click on the [Explore] button from the Facilities Toolbar 2. Click on the [New] button on the Facilities Toolbar Gathering Facilities Information Dialog box appears. 3. Enter the Facility Name Select the [Finish] button at the bottom of the page to add the Facility. 4. Facility Viewer The new Facilities will appear in the Facilities Viewer. To navigate to a facility or subfacility you may use the [Explore] button or [Back] button. The selection list located above the Facilities viewer is another way of accessing the facilities. Edit a Facility (Change the name of the facility) These steps provide the ability to edit the Facility Name. 1. Identify the Facility to which you want to edit. Click on the Facility and click on the [Edit] button. 2. Facility Information dialog box appears Update Facility Name as desired. 3. Save the new Facility Name Click on the [OK] button. Facility name has been updated. Copyright NextgenID Inc. 42

43 Deleting an Existing Facility 1. Locate the Facility Click on the [Enrollments] button; click on the Facilities Icon; select the Facility from the Facilities Viewer that you wish to delete. 2. Delete the Facility Click on the [Delete] button on the Facilities Tool Bar. 3. Confirm the Delete Dialog box appears to confirm that you want to delete the Facility. Click on the [YES] button to confirm or the [NO] button to cancel the deletion. If the facility is deleted, it will be removed from any associated access panels as well. Organizational Security It is important to keep your facility secure, not only in the control of physical access to your facilities, but also in the management and control of physical access points and member credentials. The Organizational Security feature within the Command Center software can protect these resources from unauthorized access through the combination of Microsoft Windows based security integration and biometric user validation. The Organizational Security feature facilitates flexible security management of your access control system scaling from workgroup to enterprise class environments. In addition to providing resource level security, Organizational Security also allows you to segment your installation into individually manageable sub organizations, thus giving each sub group the ability to manage their assigned physical access control points and member resources without overlap. Organizations Within the confines of the NextgenID Command Center, an organization represents a grouping of access control resources that can be managed by a controlled group of users. These resources consist primarily of Access Panels, Members, and Member Groups. With the Organizational Security feature turned on, user interaction with the Command Center is determined by the current user s membership in one or more Organizational User Groups. Organizational User Groups correspond to access control lists (ACL) within an organization. By integrating with the Microsoft Windows Security Layer, each Organizational User Group is mapped to a specific MS Windows user or group account. An organization can have several Organizational User Groups associated with it, each providing a configurable level of access to its organization s resources. Copyright NextgenID Inc. 43

44 Organizational Hierarchy Command Center Organizations are represented as a 2-level hierarchy. The 1 st level contains the Root Organization. The Root Organization has control over all sub-organizations. Sub organizations can manage only those resources that have been created under their control. Each organization including the Root Organization is required to designate one of its Organizational User Groups as the Owner Group. The Owner group is granted full control over its organization s resources. This includes the ability to modify privileges for other Organizational User Groups within the organization. Copyright NextgenID Inc. 44

45 Setting up Organizational Security This section will walk you through enabling and using the Organizational Security feature of the Command Center software. The Organizational Security feature is ideally enabled before the activation of your access panels. By enabling Organizational Security features early on, you ensure access panels and members will be enrolled into their respective sub organization, allowing effective granular management of each sub-group. 1. Plan your Organizational Structure It is a good idea to plan the structure of your organizations before enabling Organizational Security. Follow the 2-level upside down tree model as seen above. 2. Setup Windows User and Group Accounts Users who will be granted Command Center access must have a valid Windows user account on the Windows domain that the Command Center is operating under. At a minimum, at least one person with an active Windows user account must be enrolled into the Command Center for membership in the Root Organization. Your Windows security policy should require users to login to the Command Center workstation(s) using their individual user name and password. If you do not have the ability to add/modify Windows User and Group accounts on your network, you must coordinate this effort with your Network Administrator. 3. Enroll Root Organization user(s) into the Command Center Enroll members who will be granted Root Organization user rights into the Command Center. For the purpose of enabling Organizational Security, you can ignore enrollment sections relating to Access Privileges and Group Assignment. If you would like to require biometric user validation at Command Center startup, be sure to enroll fingerprint biometrics for these users as well. At least one enrolled member must be available to enable Organizational Security. Note: Step by step instructions on Member Enrollment is covered later in this guide. 4. Enable Organizational Security Root Organization Login Click on the Administration menu; select System Settings. This will open the System Settings dialog. Copyright NextgenID Inc. 45

46 Click on the Organizational Security tab, then place a check mark in the box next to Organizational Security Enabled. Confirm that you would like to setup the DEFAULT (root) organization. confirmation the Setup Default Organization Wizard will open. After Copyright NextgenID Inc. 46

47 Naming Your Root Organization 1. Choose a name and an 8-character abbreviation for the root organization. Enter this data in the space provided. Click the Next button when done. Copyright NextgenID Inc. 47

48 System Settings The systems setting section of the Command Center allows you to change the behavior of the software. From the System Settings dialog window, you can enable/modify Threat Level Settings, Organizational Security, Enrollment Mode, and Member Settings. To access the System Settings, click on the Administration command from the menu bar, and then select System Settings. Copyright NextgenID Inc. 48

49 The five tabs in the System Settings window are: 1. Event Manager Service Settings This tab allows an administrator to configure the settings of the Event Manager Service, which controls the removal of out outdated events from the NextgenID database. From this tab the administrator can specify which events or images will be purged and how many days the events will be stored before they are purged from the system. 2. Threat Level Settings This tab allows an administrator to enable the threat scalable behavior of the Command Center system. Through this tab, an administrator creates their definitions for the threat levels they will employ on their system. To enable threat level security a minimum of two levels must be defined. A pre-defined list of templates is available for you by selecting the ---Apply a predefined template drop-down listing. Once Threat Level Settings are enabled, the Access Panel settings will expose a new option to configure panel specific behavior for each threat level. For more information on this topic, refer to the Access Panel section of this user guide. Copyright NextgenID Inc. 49

50 3. Organizational Security Organizational Security allows for the creation of sub-organizations so that security management can be de-centralized. This is especially helpful in large organizations where root administrators can delegate security management to departmental administrators who are then responsible for securing their own facilities. * IMPORTANT: Prior to activating Organizational Security, at least one member with an active Windows user account must be enrolled in the Command Center for membership in the Root Organization. Failure to do so will prevent you from accessing the Command Center system. Once organizational security is enabled, an administrator may select a desired authentication mode for controlling access to the Command Center software. Option 1: Windows Authentication Only This mode validates the identity of the current user logged into the computer against privileges assigned for one or more organizations within the Command Center system. Option 2: Windows Authentication + Fingerprint Biometric This mode (in addition to the Windows Authentication described in Option 1) will required a successful verification of the user s fingerprint to confirm their identity. This mode would prevent an unauthorized user from accessing the system from an unattended workstation or a compromised username and password combination. 4. Enrollment Mode The default mode for performing member enrollment is referred to as Standard. In this mode, all demographic information about the member is keyed in manually. The system has an alternate method of enrollment that has been designed specifically for use by customers within the Department of Defense (DoD). In this setting, referred to as Command Access Card, an optional 2D barcode scanner will facilitate the automtated collection of the information stored within the PDF417 barcode on the DoD s Common Access Card. Copyright NextgenID Inc. 50

51 IMPORTANT: Use of the Common Access Card mode requires the installation of an approved 2D Optical Barcode scanner. For details on purchasing this device, please contact NextgenID s technical support department. Additionally the user can choose to enroll using Extended Demographics which Copyright NextgenID Inc. 51

52 5. Member Settings Under the Member Settings tab, you can define whether or not a PIN is required during the member enrollment process. Some hardware configurations do not require PIN for entry to the access panel. To configure member PIN as a required field you just simply check the "PIN is a required field" box, if it is not currently checked. To make PIN not required just uncheck the box and click on the ok button. Copyright NextgenID Inc. 52

53 Biometric Override (Only applicable in a BioAxs 9800-IR Environment) Another setting available through this tab is the Biometric Override options. These settings are only applicable in a multi-modal environment where two or more biometrics are required to gain access to a secure facility. Some individuals enrolled in a system may encounter problems using a fingerprint or iris reliably. In this special case, an administrator may grant an override for the biometric that an individual experiences problems with. For example, if user John Doe routinely has difficulty being recognized with their fingerprint(s), an administrator may grant a Biometric Override for Mr. Doe. To accomplish this, the administrator would open the Systems Settings dialog (shown above). Right-click within the list box and select Add Member from the context menu. In the Add Biometric Override Member dialog box, enter portions of the member s first and/or last name and click the Search button. Select the desired member from the listing (shown above) and click the Add button. The member will be added to the biometric override listing with a default of None for the override. Finally the administrator will right-click the member in the listing and select the desired override from the context menu. The options are: - None - Fingerprint - Iris Once the desired override has been selected, close the System Settings dialog by clicking on the OK button. Copyright NextgenID Inc. 53

54 Chapter 4: Enrollment This section will discuss creating Security Groups and enrolling Members into the Command Center system. After members are enrolled, they will be able to access secured facilities for which they have been given rights. Users can have these rights assigned to them individually, or via rights assigned to a group in which they have membership. Although rights can be assigned individually, security management is easier if applied to a group and then making a user a member of that group. In a group membership scenario, if access rights change, an administrator only needs to change the rights for the group, and the change will affect all members of that group. If rights are assigned on a individual basis, an administrator will need to change the rights for every member who has access. When there are a large number of members with individual access rights, it would not be impossible for an administrator to miss changing the rights for some members, compromising the security of a facility. Enrollments Band The Enrollments Band of NextgenID Command Center consists of the following Sections: Groups The Groups section allows you to add and edit groups, assign access panels and privileges as well as adding members to the group. This section also allows you to give groups Holiday Lockdown Override privileges which allow the members of the group to maintain their ordinary access privileges during a Holiday Lockdown period. Members The member section is where you would add a new member, assign individual access privileges, assign group memberships and enroll fingerprints and iris, and take an enrollment photograph. Member Watch The administrator can add a member using the member watch feature. This feature will trigger an alarm (if designated) each time the enrolled members attempts to access the panel. To Do List Presents a list of items that require the attention of an administrator. Holidays The Holiday section allows the administrator to create and edit Holiday periods during which time panels can be locked down or removed from Open Access to secure access points during federal or company holidays. Copyright NextgenID Inc. 54

55 Groups Establishing Groups is key to maintaining Member Access privileges. Assigning Members to Groups is the most efficient way to manage access to a facility. Access times can be granted for the group allowing all members of the group to have the same access. If it is necessary to change the access times, only the group access has to be modified to apply changes to all Members of the Group. Groups also give the Administrator the flexibility of assigning a Group to multiple doors (Access Panels). Copyright NextgenID Inc. 55

56 New Member Group Step 1 of 4 Add a New Group Follow the steps listed below to add a new Group. 1. Click on the [New] button on the Groups Toolbar New Member Group Wizard appears 2. Enter the Group Name Group names must be unique. Duplicate groups are not allowed. 3. Select the [Finish] button at the bottom of the page to add the Group. The new Group Name appears in the Group viewer. 4. The new Group is displayed in the Groups Viewer. Icon and Name of the Group is present. Copyright NextgenID Inc. 56

57 Editing Groups Group Information, Access Panel Association, Member Association, and Access Privilege information related to Groups may be edited. Existing groups may be edited when necessary. There are four tabs of Group data that may be edited: 1. Information Tab Group Name is displayed and may be updated. 2. Members Tab In the Members tab you have the ability to search for a member, add a member or remove a member from the group. 3. Access Panels Tab This tab allows for adding or removing one or more Access Panels to the Group. 4. Privileges Tab The Privileges tab is where the authorized panel is selected and Access periods are added or deleted. Editing the Group Information Tab Once a group has been added you may find it necessary to edit the Group name. This may be accomplished in the Information Tab. Details on editing the group name are provided below. 1. Click on the Groups Icon under the Enrollments Band Groups Icons are displayed in the viewer. 2. Select a Group and then click on the [Edit] button Access Panel Dialog opens. 3. The Group Dialog appears and the Information Tab is opened by default 4. Group Name Field To edit the Group, simply click on the field and type the changes. 5. Save the new Group Name Click on the [OK] button to save the edits. Copyright NextgenID Inc. 57

58 6. Group Name is updated in the Groups Viewer Copyright NextgenID Inc. 58

59 Edit Access Panels associated with a Group This step gives the Administrator the option of adding or removing Access Panels from the Group. 1. In the Available Panels list select a Panel to add to the Group Click on the [Add>] button to add the Panel. The Panel name appears in the Authorized Access list. Repeat these steps to add additional Access Panels. 2. To remove Access Panel Select the Access Panel from the Authorized Access list and Click on the [< Remove] button. This will remove the Panel name from the Authorized Access list and place it in the Available Panels list. It is necessary to click the [Ok] button for the edits to be saved. Repeat these steps to remove additional Access Panels. 3. Save changes to the Access Panel Tab Click on the [OK] button. Access Panel(s) association edits are saved. Copyright NextgenID Inc. 59

60 Associate or Remove a Member from a Group Members may be added to a group two different ways. They may be added in the Members section under Enrollments or in the Members tab of the Group. We will discuss adding a Member using the Members tab in the Groups Section. In the Members tab the Administrator has the option of searching for the member, adding a member or removing a member from the group. Details on searching, adding and removing a member are given below. Search and Add a Member 1. Identify the Group to which you want to add the Member Click on the Group and click on the [Edit] button. 2. Group Dialog Box appears Click on the Members tab. 3. Perform a search for available Members using the first or last name fields Enter Member's last name or first name. Copyright NextgenID Inc. 60

61 4. Click on the [Search] button Members are displayed in the Available Members list. 5. Select the Member that you want to add to the Group Click on the Members name and then click the [>>] button. The Member's name is displayed in the Enrolled Members list. Multiple members can be added following the preceding steps. 6. Save Changes to Members Tab Click on the [OK] button. Member edits are saved. Copyright NextgenID Inc. 61

62 Remove a Member 1. Remove Member Select a Member in the Enrolled Members list and Click on the [<<] button. The Member's name is now displayed in the Available Members list. 2. Save Changes to Members Tab Click on the [OK] button. Member edits are saved. Copyright NextgenID Inc. 62

63 Edit Access Privileges of a Group Editing Group Privileges at the Access Panel level 1. Assigning an Access Panel Select the desired access panel from the Access Panel list. 2. Assigning Access Periods Select a Start Access (Day, Hour and Minute). Select a Stop Access (Day, Hour and Minute). Once the desired times have been selected click on the [Add] button. Access times are moved to the Existing Access Periods box. 3. Edit Access Periods Select the Access time that you want to remove and then click on the [Remove] button. Then select and add new access times as desired. 4. Remove Access Periods Click on the Access period that you want to remove and then click on the [Remove] button. 5. Save Access Periods Click on the [OK] button. Access Periods are saved. Copyright NextgenID Inc. 63

64 Deleting a Group It is possible to delete a group by using the delete button on the Groups toolbar. It is important to know, when a group is deleted, all members associated with that group will no longer have access. The Delete Member Group function performs a two-step delete to confirm the delete prior to removal. Once the group has been selected and the delete button is clicked a confirmation appears. The Administrator has the option of accepting the delete or canceling. If the Group deletion is cancelled the Groups Viewer will appear with the Group still present. However, if the deletion is accepted the Group will be deleted and the Groups Viewer will appear with the Group no longer present. Deleting an Existing Group 1. Locate the Group Click on the [Enrollments] band; Click on the Groups Icon; Select the Group from the Groups Viewer that you wish to delete and click on the [Delete] button. 2. Confirm the Delete Dialog box appears to confirm that you want to delete the Group. Click on the [Yes] button to confirm or the [No] button to cancel the deletion. Copyright NextgenID Inc. 64

65 3. View the Groups Viewer The Group is no longer present in the viewer. Copyright NextgenID Inc. 65

66 Members Member Enrollment allows the Administrator to record specific Member demographics and capture multiple fingerprints and/or iris for each Member. Additionally, the Member Enrollment process provides the ability to collect additional Member data, assigning group and individual access. These options are a quick and efficient way of compiling all the data necessary to completely enroll the Member. Completing all steps of Member Enrollment gives the Member the ability to have immediate access. The Member Access is dependent upon group access times and individual access times. The Members listing (shown above) allows an administrator to quickly navigate to the desired entry using the alphabetical filter option located on the right-hand side of the window. Copyright NextgenID Inc. 66

67 Member Enrollment Settings Various devices can be used with the Command Center to enroll new members. Administrators can tell the Command Center what devices are present by accessing the Client Settings dialog window. To get to this window, click on [File] from the menu bar, then select [Preferences], then [Client Settings]. Depending on the configuration you choose, the appropriate enrollment devices will be shipped with the system. There may be up to seven steps involved in enrolling a New Member: 1. Gathering Member Information 2. Gathering Additional Data (optional) 3. Gathering Fingerprints 4. Gathering a Trusted Enrollment Photograph (optional) 5. Gathering Iris (optional) 6. Assigning Group Membership (optional) 7. Assigning Individual Access Privileges (optional) Copyright NextgenID Inc. 67

68 Member Enrollment: Gathering Member Information 1. Enter the Member's Demographic Information First Name and Last Name are required fields. Depending on the System Settings of the Command Center, a PIN may or may not be required. PIN s must only be a numeral, and no duplicates are allowed in the system. 2. Select Member Settings Checking the "Member has Lockdown Override Privilege" box will allow this Member access during a Lockdown State. Checking the "Member's Privileges Will Expire On" box will allow the Administrator to set an expiration date. If this box is not checked the Member Account will never expire. If a Department of Defense (DoD) Common Access Card (CAC) is used for the enrollment, most of the member demographic information will be filled in automatically as most of this information is contained on the card. Select the [Next] button at the bottom of the page to continue to next step. Copyright NextgenID Inc. 68

69 Member Enrollment: Gathering Additional Data Gathering Additional Data Page is a customizable page that allows for collecting additional data about the Member. 1. Enter additional data as requested Type the text in the fields provided. Since this step is optional, you can simply click on the [Next] button to skip this step. Select the [Next] button at the bottom of the page to continue to next step. Copyright NextgenID Inc. 69

70 Member Enrollment: Gathering Fingerprints 1. Select the finger(s) you wish to enroll It is good practice to enroll two or three fingers for each Member. The Member enrolling will need to press his/her finger on the scanner ten times for each finger selected. Perform the process below to enroll Member fingerprints. 2. Select a Finger Once you have decided on the finger that you would like to enroll, click on the [Enroll] button in front of the finger name. This action will automatically take you to the fingerprint enrollment wizard. Copyright NextgenID Inc. 70

71 A. Step 1 of 2 - Fingerprint Enrollment You will be prompted to scan the finger that you selected a total of 5 times. Each time the finger is scanned, a feature count is gathered and the results displayed in the status box above the image windows. The higher the feature count, the quicker you will be located once you scan your finger on the sensor. So your goal is to get a high feature count. You may restart the enrollment at anytime by selecting the [Restart Enrollment] button. Should you find it necessary to change fingers, just click on the [Cancel] button and select a new finger. When you have scanned your finger with five acceptable prints, you will advance to step 2 of 2 of the fingerprint enrollment wizard. Copyright NextgenID Inc. 71

72 B. Step 2 of 2 - Fingerprint Enrollment This step is a quality measure that assures that the prints that were enrolled in step 1 are capable of matching the member currently being enrolled. If there are any problems you will be asked to restart the test. After the first scan, you may select to Restart the Enrollment. When you scan your finger the feature count will once again be displayed in the status box. Once the finger has been successfully scanned five times and you receive the green, Testing Completed Successfully message, click on the [Finish] button. You are then returned to Step 2 of 6, Gathering Fingerprints. At this point, at least one set of prints has been enrolled. If you desire, you may enroll a second finger or set the Duress indicator for an enrolled finger. Copyright NextgenID Inc. 72

73 Duress Indicator By setting up a duress indicator, an alarm will be sent to the Command Center whenever an enrolled member attempts access to an Access Panel with their duress finger. This would be used when someone forces a member to provide him/her access to a secured facility. An alarm will be sent to the Command Center so that the administrator can take the appropriate action to deal with the unauthorized entry. Select the [Next] button at the bottom of the page to continue to next step. Copyright NextgenID Inc. 73

74 Member Enrollment: Gathering Iris Information If your system is setup to use iris as a biometric signature, the iris information is captured in this step. Simply click on the [Enroll] button to begin the iris enrollment process. Copyright NextgenID Inc. 74

75 Select the eye(s) to enroll/re-enroll from the group box marked Eye Selection then click the [Start] button to begin the iris enrollment. When prompted, have the member center their eyes in the mirror, beginning roughly 18 inches from the unit, using the colored dot as a centering reference point and tell them to slowly move forward. An orange dot indicates that the user is either too close or too far from the unit, a green dot indicates that the member is in operating range. Once the member is in range the unit will begin capturing the iris enrollment(s). The member must hold still without moving toward or away from the unit during this process until the enrollment unit confirms the completion of the iris enrollment. The Iris Enrollment Wizard will prompt the enroller if the member has moved out of range at any point. The enroller can stop the enrollment process at any point by clicking the [Stop] button. Copyright NextgenID Inc. 75

76 Once the iris enrollment has been completed the wizard will display the images of the captured iris along with the IrisCode Quality of the enrollments. If the member has Poor-Normal quality enrollments consider re-enrolling them. If the iris enrollments are satisfactory click the [Ok] button to continue. Once the iris enrollment has been completed select the [Next] button at the bottom of the page to continue to next step. Copyright NextgenID Inc. 76

77 Member Enrollment: Enroll a Trusted Photograph If your system is setup for face recognition as a biometric signature, adding a photograph of the enrolling member will assist the administrator in his/her job. This photograph will be displayed along with any events or alarms generated on the system by this member. The first time an enrolled member accesses an Access Panel, his/her photo will be taken. It is up to the administrator to approve or reject the photo within the Command Center. Since the administrator may not know every person enrolling in the Command Center, the picture taken during the enrollment process will provide a reference for the administrator. To take the enrollment photograph at the Command Center: 1. Click on [Start Video] The enrolling member s picture will be displayed under Video Source. 2. Click on [Take Picture] If the administrator is satisfied with the picture displayed under Video Source, s/he may click on [Take Picture] to capture the image. 3. Trusted Enrollment Photograph After the administrator clicks on [Take Picture], the image is displayed under the Trusted Enrollment Photograph section. If for any reason, the administrator is not satisfied with the image, s/he can click on [Delete Photo] to delete the image and start again. Select the [Next] button at the bottom of the page to continue to next step. Copyright NextgenID Inc. 77

78 Member Enrollment: Assigning Group Memberships Group assignments are the most efficient way to manage the access to your facility. It allows the Administrator to assign the same access for an entire group of Members. If the access needs to change, only the group access has to be modified to apply the change to all Members of the group. 1. Select the appropriate group(s) that the Member will be enrolled Select a group located in the Available Groups list and use the [Add>] button to enroll the Member in that group. You may assign multiple groups as needed. To remove groups during enrollment use the [<Remove] button. This will remove the group from the Enrolled Groups list and place it in the Available Groups list. Select the [Next] button at the bottom of the page to continue to the next step. Copyright NextgenID Inc. 78

79 Member Enrollment: Assign Individual Access Privileges Assign Individual Access Privileges page enables the Member to be assigned to an Individual Group. Additionally, access panel(s), access times, and Guest Privileges can be assigned at this point. 1. Adding Individual Access Privileges Click on the Individual Access Privileges box. 2. Assigning an Access Panel Select the desired access panel from the Access Panel list. 3. Assigning Guest Privileges (For systems installed with Tailgating Countermeasures) Click on the Guest Privilege box. 4. Assigning Access Times Select a Start Time (Day, Hour and Minute) and a Stop Time (Day, Hour and Minute). Once the desired times have been selected click on the [Add] button. This step may be repeated to assign differing access time for the week. Once the selected access times have been added, select the [Finish] button at the bottom of the page to complete the Member Enrollment. The Member will become active within a few seconds of completing the enrollment process. Copyright NextgenID Inc. 79

80 Edit Member The Member information entered during enrollment can be accessed by clicking on the [Edit] button on the Members tool bar. Data can be edited and saved as desired. These steps consist of: Editing Member Information including Member Demographics and Member Settings Editing Additional Information Editing Group Membership Enrolling or removing fingers Editing Access Privileges Editing an Existing Member Navigate to the Edit Member link in the command center. 1. Select Enrollments in the left navigation window 2. Select Members in the left navigation window 3. Locate the Member by using any of the following methods: A. Perform a Search See Member Search for further details on using this option. B. Use the alphabetical listing (A-Z bar) Select a letter on the A-Z bar on the right side of the Member screen to display an alphabetically sorted list of Members by last name. C. Click on the Members Icon in the left frame The last 30 enrolled Member names will appear in the Members Viewer. 4. Highlight the Member you wish to edit by clicking on the Member's name. Click on the [Edit] button on the Members Tool Bar (or double click on the Member). A. Demographics Member Information Tab: This screen will allow you to modify the Member demographic information, whether or not member has override privileges, if there is an expiration date on the account, and proximity or magnetic card ID (if present). Additional Data Tab: This is a customizable area that allows you to store additional data. Enrollment Photograph Tab: An administrator can delete an old enrollment photograph and take an updated picture from this tab. B. Biometrics Fingerprint Enrollment Tab: This will allows you to enroll or remove fingerprints. Face Enrollment Tab: An administrator can approve or reject member pictures here for use with the face recognition biometric. Iris Enrollment Tab: This will allow you to enroll or remove iris information. C. Access Privileges Group Membership Tab: This will allow you to edit or assign Group Membership Access Privileges. Individual Access Tab: This will allow you to edit or assign Individual Access Privileges. Copyright NextgenID Inc. 80

81 Delete Member The Delete Member function performs a two-step delete to confirm the deletion prior to removal. When the delete button is pressed a confirmation will appear to verify that you want to delete the Member. Once the Member has been deleted it is not recoverable. All access times for the Member will expire. Navigate to the Members Section Select [Enrollments] button in the left navigation window Select Members Icon in the left navigation window Deleting an Existing Member The steps below detail how to delete a Member. Once a Member is deleted it is not recoverable. The Member's Access privileges will expire and entry will not be allowed. 1. Locate the Member Click on the [Enrollments] button; click on the Members Icon; using the A-Z bar, click on the first letter of the last name of the Member that you want to delete; select the member from the Members Viewer 2. Delete the Member Click on the [Delete] button in the Member Tool Bar. 3. Confirm the Delete Dialog box appears to confirm that you want to delete the member. Click on the [OK] button to confirm or the [Cancel] button to cancel. Member is removed from the viewer and all access privileges have expired. Copyright NextgenID Inc. 81

82 Chapter 5: Monitoring Monitoring The Monitoring Band of NextgenID Command Center consists of the following Sections: 1. Alarms Provides details about viewing and searching Alarms 2. Events Provides details about viewing and searching Events Copyright NextgenID Inc. 82

83 3. System Monitor Allows the System Administrator to monitor Alarm Activity, remotely grant access to an access panel, restart the access panel, and apply changes to the current operating threat level of the system for one or more panels. Copyright NextgenID Inc. 83

84 Searching for Logged Alarms Alarm Search allows the Administrator to search for a logged or Audited Alarms that occurred during a specific date/time range, on a specific Access Panel, Event Type (one or all), Member's last name or Member's first name. 1. Search for Logged Alarms Click on the [Search] button on the Alarms Toolbar. Search Criteria Dialog box opens. A. Date Range Select From (Month, Day, Year, Time) and To (Month, Day, Year, Time) times B. Access Panel Select the desired access panel from the Access Panel List. As default, all access panels are selected. You may click on the box beside the access panel to unselect a panel that you do not want included in the query. Additionally, you can right click in the access panel section and choose the Select All or Select None option. The Select None option is useful when you have several panels listed and only want to select one. You can click on the Select None option, which will deselect all access panels. Then you can click on the access panel that you want to include in the query. C. Event Type Copyright NextgenID Inc. 84

85 Select Event Type. The default setting is for all Alarm Events to be selected and listed in the box. The user has the option of using the selection box to choose "Show Alarm Events Only" or "Show All Events." The Show All Events will return results for every event configured including designated alarms and designated events. The Show All Alarms option will show only results of all designated alarms that are configured in the designated alarm section of the application. By conducting a right click in the Event Type list you have additional options: Select All - This option will select all event in the list and will be included in your query Select None - Selecting none will deselect all events in the list. At this point, you may individually select the events that you want included. This is particularly useful when you have several events listed and only want to view one specific event. Show All Events - This is just a different way of selecting all events. The same function can be executed by selecting the option from the Event Types list box. Show Alarm Events Only - Once again, this is a different way of selecting alarm events only. The same function can be executed by selecting the option from the Event Types list box. D. Member's Last Name Type Member's Last Name: This is a more specific search that will return only Alarms for Members with the last name provided (optional). You may use the wildcard * to conduct searches, however no partial name searches are allowed. For example, If you are searching for a last name of Member you may enter Member, Mem*, *emb* or M*. However, 'Mem' would not be allowed. Additionally, quotation marks are not considered a valid entry in the field. E. Member's First Name Type Member's First Name: This is a more specific search that will return only Alarms for Members with the first name provided (optional). The search criteria for this field follow the same rules as Last Name. F. Audited Alarms If you wish to search for Acknowledged Events or Un-Acknowledged Events you may select the appropriate radio button. Select the Both radio button to include Acknowledged and Un-Acknowledged Events. The Acknowledge selection will only return events that have been acknowledged either by the administrator as described in the View Alarms and Events section or events that were automatically acknowledged. G. Selecting the maximum number of events to return. In some cases you may want a limited amount of events returned. The Maximum number of events to return option allows you to enter a numeric value of events that you would like returned. The default value is H. Execute the query using the select search criteria Clicking on the [Search] button will execute the query and return the results in the Alarms Viewer. I. Cancel Search Should you decide to cancel the search you can click on the [Cancel] button. This option will return you to the Alarms Viewer. Copyright NextgenID Inc. 85

86 Searching for Logged Events Event Search allows you to search for a logged event that occurred during a specific date/time range, on a specific Access Panel, Event Type (one or all), Member's last name or Member's first name. 1. Search for Logged Events Click on the [Search] button on the Events Toolbar. Search Criteria Dialog box opens. 2. Date Range Select From (Month, Day, Year, Time) and To (Month, Day, Year, Time) times 3. Access Panel Select the desired access panel from the Access Panel List. As default all access panels are selected. You may click on the box beside the access panel to unselect a panel that you do not want included in the query. Additionally, you can right click in the access panel section and choose the Select All or Select None option. The Select None option is useful when you have several panels listed and only want to select one. You can click on the Select None option, which will deselect all access panels. Then you can click on the access panel that you want to include in the query. 4. Event Type Copyright NextgenID Inc. 86

87 Select Event Type. The default setting is to Show All Events to be selected and listed in the box. The user has the option of using the selection box to choose "Show Alarm Events Only" or "Show All Events." The Show All Events will return results for every event configured including designated alarms and designated events. The Show All Alarms option will show only results of all designated alarms that are configured in the designated alarm section of the application. By conducting a right click in the Event Type list you have additional options: Select All - This option will select all events in the list and will be included in your query. Select None - Selecting none will deselect all events in the list. At this point, you may individually select the events that you want included. This is particularly useful when you have several events listed and only want to view one specific event. Show All Events - This is just a different way of selecting all events. The same function can be executed by selecting the option from the Event Types list box. Show Alarm Events Only - Once again, this is a different way of selecting alarm events only. The same function can be executed by selecting the option from the Event Types list box. 1. Member's Last Name Type Member's Last Name: This is a more specific search that will return only Alarms for Members with the last name provided (optional). You may use the wildcard * to conduct searches, however no partial name searches are allowed. For example, If you are searching for a last name of Member you may enter Member, Mem*, *emb* or M*. However, 'Mem' would not be allowed. Additionally, quotation marks are not considered a valid entry in the field. 2. Member's First Name Type Member's First Name: This is a more specific search that will return only Alarms for Members with the first name provided (optional). The search criteria for this field follow the same rules as Last Name. 3. Audited Alarms If you wish to search for Acknowledged Events or Un-Acknowledged Events you may select the appropriate radio button. Select the Both radio button to include Acknowledged and Un-Acknowledged Events. The Acknowledge selection will only return events that have been acknowledged either by the administrator as described in the View Alarms and Events section or events that were automatically acknowledged. 4. Selecting the maximum number of events to return In some cases you may want a limited amount of events returned. The Maximum number of events to return option allows you to enter a numeric value of events that you would like returned. The default value is Execute the query using the select search criteria Clicking on the [Search] button will execute the query and return the results in the Events Viewer. 6. Cancel Search Should you decide to cancel the search you can click on the [Cancel] button. This option will return you to the Events Viewer. Copyright NextgenID Inc. 87

88 System Monitor The System Monitor applet allows the administrator a quick overview on the status of his/her access panels and any unacknowledged alarms that may be present on the system. Through the System Monitor, the administrator can acknowledge alarms, restart an access panel, open an access panel, lockdown and access panel, and modify the threat level of an access panel. 1. Acknowledge Alarms Any unacknowledged alarms in the Command Center system will be displayed at the bottom of the System Monitor screen. An administrator can acknowledge these alarms simply by double-clicking one of the alarms to open and review the alarm, and then clicking on the [Close] button. Once the alarm has been acknowledged, it will disappear from the System Monitor. 2. Restart Panel If it becomes necessary for an administrator to restart an Access Panel, s/he can do so from the System Monitor. This is handy should an administrator change the Panel Configuration of an Access Panel, and need a manual restart of the panel. To manually restart an Access Panel, simply highlight the panel under the Access Panel Navigation View, then click on the [Restart Panel] button. Copyright NextgenID Inc. 88

89 3. Open Panel There may be times when an Access Panel needs to be opened to allow access to a facility. Examples of this would include enrolled members not being able to scan their fingerprints successfully, or an authorized visitor who is not enrolled in the Command Center. An administrator can open the Access Panel by highlighting the panel, then clicking on the [Open Panel] button. This will disengage the magnetic lock or door strike so that someone may enter the facility. Once the door is shut, the lock will reengage. The lock will also re-engage automatically after 10 seconds should no one open the door. 4. Lockdown Panel / Remove Lockdown This option allows an administrator to remotely place an access panel in a Lockdown state or remove a panel from this state. The effects of this action are immediate and should be used with caution. If a panel is placed in a Lockdown state, any normally authorized member that attempts to gain access to the facility will be denied access unless their profile has been granted the Lockdown Override privilege (available from the Member Demographics tab in Member Enrollment). 5. Modify Threat Level If the Threat Level Scalability feature is enabled, an Administrator can modify threat levels for individual Access Panels through the System Monitor. To modify threat level, simply highlight the Access Panel affected, and click on the [Modify Threat Level] button to launch the Threat Level wizard. Copyright NextgenID Inc. 89

90 Chapter 6: Reporting Reporting The Reporting Band of NextgenID Command Center consists of two reports: Access Panel Activity- provides event id, event time stamp, and members name for a specific access panel. Member Activity - this report provides Event ID, Event time stamp, and Event details for a specific member. Copyright NextgenID Inc. 90

91 Reports Using the NextgenID Command Center Report function the Administrator can run detailed reports to assist with maintaining security and access to the facility. The Administrator has the option of criteria to select for the report: Date Range Access Panel Event Type Member Name Event Auditing Maximum Number of Events to Return Copyright NextgenID Inc. 91

Command Center Access Control Software

Command Center Access Control Software Command Center Access Control Software NextgenID BioAxs System Family: Member Enrollment Primer Mailing Address: NextgenID, Ltd. 10226 San Pedro Suite 100 San Antonio, TX 78216 USA Contacts: Phone: (210)

More information

InventoryControl Quick Start Guide

InventoryControl Quick Start Guide InventoryControl Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY PRODUCTS OR SERVICES ARE

More information

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date: Print Audit 6 Version: Date: 37 21-Apr-2015 23:07 Table of Contents Browse Documents:..................................................... 3 Database Documentation.................................................

More information

10ZiG Technology. Thin Desktop Quick Start Guide

10ZiG Technology. Thin Desktop Quick Start Guide 10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

Jonas Activity Management Technical Deployment Guide

Jonas Activity Management Technical Deployment Guide Jonas Activity Management Technical Deployment Guide [] Software for Life Jonas Activity Management Technical Deployment Guide, Jonas, Jonas Software, Software for Life, and Gary Jonas Computing are registered

More information

Copyright Autodesk, Inc.

Copyright Autodesk, Inc. Customer and Administration Building, Ditzingen, Germany - Design by Barkow Leibinger Architects Copyright 2003-2008 Autodesk, Inc. Table of Contents 1 Introduction... 3 What is Facility Manager?... 3

More information

Fleet Manager 2002 Professional Network Configuration Guide

Fleet Manager 2002 Professional Network Configuration Guide Handling a complex world. Fleet Manager 2002 Professional Network Configuration Guide Overview The VDO Fleet Manager Professional utilises an advanced three-tier client-server model and is designed to

More information

OmniPass 2.0 User's Guide. Version 1.2

OmniPass 2.0 User's Guide. Version 1.2 OmniPass 2.0 User's Guide Version 1.2 i Copyright Copyright 2002 Softex Incorporated. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated

More information

ThinkVantage Fingerprint Software

ThinkVantage Fingerprint Software ThinkVantage Fingerprint Software 12 2 1First Edition (February 2006) Copyright Lenovo 2006. Portions Copyright International Business Machines Corporation 2006. All rights reserved. U.S. GOVERNMENT

More information

Installation Manual. Fleet Maintenance Software. Version 6.4

Installation Manual. Fleet Maintenance Software. Version 6.4 Fleet Maintenance Software Installation Manual Version 6.4 6 Terri Lane, Suite 700 Burlington, NJ 08016 (609) 747-8800 Fax (609) 747-8801 Dossier@dossiersystemsinc.com www.dossiersystemsinc.com Copyright

More information

Quick Start Guide 0514US

Quick Start Guide 0514US Quick Start Guide Copyright Wasp Barcode Technologies 2014 No part of this publication may be reproduced or transmitted in any form or by any means without the written permission of Wasp Barcode Technologies.

More information

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Getting Started Guide This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Contents 2 Contents Introduction... 3 System Requirements... 4

More information

LepideAuditor for File Server. Installation and Configuration Guide

LepideAuditor for File Server. Installation and Configuration Guide LepideAuditor for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2008 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

Sophos Enterprise Console

Sophos Enterprise Console secure network quick startup guide Product Version: 5.5 Contents About this guide... 1 Limitations on the secure network...2 What do I install?...3 What are the key steps?... 4 Download the installers...5

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide February 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator

More information

MorphoManager User Manual. Table of Contents

MorphoManager User Manual. Table of Contents User Manual Table of Contents Introduction... 4 Support... 4 Overview... 5 What is a client?... 5 What is a server?... 5 What is a fingerprint enrollment device?... 5 What is a MorphoAccess?... 6 What

More information

Business ebanking Quick Reference Guide. Merchant Capture. bankwithunited.com

Business ebanking Quick Reference Guide. Merchant Capture. bankwithunited.com Business ebanking Quick Reference Guide Merchant Capture bankwithunited.com Table of Contents Getting Started System Requirements......................................1-1 Client PC Installation.......................................1-3

More information

Network Scanner Tool V3.3. User s Guide Version

Network Scanner Tool V3.3. User s Guide Version Network Scanner Tool V3.3 User s Guide Version 3.3.09 Copyright 2000-2012 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,

More information

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation Equitrac Embedded for Kyocera Mita 1.3 Setup Guide 2012 Equitrac Corporation 2012 Equitrac Corporation Equitrac Embedded for Kyocera Mita Setup Guide Document Revision History Revision Date Revision List

More information

This guide provides instructions in the installation and configuration of XrayVision DCV.

This guide provides instructions in the installation and configuration of XrayVision DCV. Apteryx Inc. 313 S. High St. Suite 200 Akron, OH 44308 330-376-0889 voice 330-376-0788 fax sales@apteryx.com www.apteryx.com XrayVision DICOM Capture View (DCV) Installation Guide Abstract Abstract Abstract

More information

ThinkVantage Fingerprint Software

ThinkVantage Fingerprint Software ThinkVantage Fingerprint Software 12 2 1First Edition (November 2005) Copyright Lenovo 2005. Portions Copyright International Business Machines Corporation 2005. All rights reserved. U.S. GOVERNMENT

More information

HR-Lite Database & Web Service Setup Guide

HR-Lite Database & Web Service Setup Guide HR-Lite Database & Web Service Setup Guide Version: 1.00 HR21 Limited All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical,

More information

Inmagic Content Server Workgroup Version 9.00 Installation Notes for New and Upgrade Installations

Inmagic Content Server Workgroup Version 9.00 Installation Notes for New and Upgrade Installations Inmagic Content Server Workgroup Version 9.00 Installation Notes for New and Upgrade Installations Revision 2 Thank you for purchasing Inmagic Content Server. This document is intended for the following

More information

LABEL ARCHIVE Administrator s Guide

LABEL ARCHIVE Administrator s Guide LABEL ARCHIVE Administrator s Guide DOC-LAS2015_25/05/2015 The information in this manual is not binding and may be modified without prior notice. Supply of the software described in this manual is subject

More information

Isograph Software Products

Isograph Software Products Isograph Software Products Installation and Licensing Guide Isograph Copyright 2018 Isograph Limited. All rights reserved. This document and the associated software contains proprietary information which

More information

Get Started. Document Management 9.7.1

Get Started. Document Management 9.7.1 Get Started Document Management 9.7.1 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accompanying Sage Timberline Office End User License Agreement.

More information

docalpha 5.0 Server Configuration Utility User Guide

docalpha 5.0 Server Configuration Utility User Guide docalpha 5.0 Server Configuration Utility User Guide Contents 1. docalpha Architecture Overview 3 1.1. docalpha Server Overview 3 2. Working with docalpha Server Configuration Utility 4 2.1. Starting docalpha

More information

User Manual. ARK for SharePoint-2007

User Manual. ARK for SharePoint-2007 User Manual ARK for SharePoint-2007 Table of Contents 1 About ARKSP (Admin Report Kit for SharePoint) 1 1.1 About ARKSP 1 1.2 Who can use ARKSP? 1 1.3 System Requirements 2 1.4 How to activate the software?

More information

LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional

LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional Installation Guide for LiNC-NXG 33-10067-001 REV: C PCSC 3541 Challenger Street Torrance, CA 90503

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Secure Single Sign On with FingerTec OFIS

Secure Single Sign On with FingerTec OFIS Secure Single Sign On with FingerTec OFIS User Guide CONTENTS 3 1 INTRODUCTION Welcome to OFIS Gateway 4-11 2 INSTALLATION & SETUP Registering Your OFIS Gateway Installing & Setting Up Your OFIS Gateway

More information

Table of Contents.

Table of Contents. Table of Contents http://www.advancedactuators.com 1. Items Included with the ThumbLock PCMU:... 2 2. IMPORTANT NOTE:... 2 3. Supported Operating Systems:... 2 Section 1 Installing the ThumbLock PCMU Software...

More information

Inmagic Content Server Standard Version 9.00 Installation Notes for New and Upgrade Installations

Inmagic Content Server Standard Version 9.00 Installation Notes for New and Upgrade Installations Inmagic Content Server Standard Version 9.00 Installation Notes for New and Upgrade Installations Revision 2 Thank you for purchasing Inmagic Content Server. This document is intended for the following

More information

Software Operations Manual

Software Operations Manual Software Operations Manual Version 5.0 System Requirements PC with 1GHz or higher, Intel Pentium Processor or compatible Microsoft Windows XP Professional or Vista Business Edition Microsoft.NET framework

More information

DocSTAR v3.3 Software Installation Guide Page 1

DocSTAR v3.3 Software Installation Guide Page 1 Software Installation Guide (v3.3) Revision 2 6/21/2004 Software Installation Guide (v3.3) Revision 2 6/21/2004 Table of Contents Section 1: Software Requirements & Package Contents... 2 Section 2: DocSTAR

More information

Operating Instructions

Operating Instructions Operating Instructions (For User Setup) Digital Colour Imaging Systems Model No. DP-C406 / C306 / C266 Table of Contents Installation Overview General Installation Overview...2 Installation Installing

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information

RedBeam Inventory Tracking User Manual

RedBeam Inventory Tracking User Manual RedBeam Inventory Tracking User Manual Contact us at www.redbeam.com. Page 1 Table of Contents Table of Contents... 2 Overview... 4 RedBeam Inventory Tracking... 4 PC Prerequisites... 4 Mobile Computer

More information

Integriti User Guide

Integriti User Guide Integriti User Guide Table of Contents InTEGRITI SOFTWARE 1 Software Applications 2 LOGIN Window 2 Integriti Servers SOFTWARE NAVIGATION 3 USER INTERFACE 3 Ribbon 4 Review Panel 4 Actions Panel 4 NAVIGATION

More information

Protect Your Investment In Asure ID. Thank You For Purchasing Asure ID Let s Get Started! Section 1 Installing Asure ID

Protect Your Investment In Asure ID. Thank You For Purchasing Asure ID Let s Get Started! Section 1 Installing Asure ID QuickStart Guide Protect Your Investment In Asure ID Save Valuable Time And Money With Asure ID Protect! Asure ID Protect is a comprehensive customer care program designed to ensure that you receive the

More information

AnySite. Australia. Install Guide. AnySite v9.1 Install Guide

AnySite. Australia. Install Guide. AnySite v9.1 Install Guide AnySite Australia Install Guide AnySite v9.1 Install Guide TABLE OF CONTENTS Chapter 1: Introduction... 4 Product Inventory Chapter 2: Before You Begin... 6 Permissions System Requirements Default Install

More information

CRA Wiz and Fair Lending Wiz. Installation Guide V6.9

CRA Wiz and Fair Lending Wiz. Installation Guide V6.9 CRA Wiz and Fair Lending Wiz Installation Guide V6.9 CRA Wiz and Fair Lending Wiz 6.9 Installation Instructions The following installation instructions provide procedures for a new installation of CRA

More information

Sophos Enterprise Console

Sophos Enterprise Console quick startup guide Product Version: 5.5 Contents About this guide... 1 What do I install?...2 What are the key steps?... 3 Download the Enterprise Console installer...4 If you have a Sophos license...

More information

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support... Quick Start Guide Table of Contents Overview... 4 Deployment... 4 System Requirements... 4 Installation... 6 Working with AD360... 8 Starting AD360... 8 Launching AD360 client... 9 Stopping AD360... 9

More information

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,

More information

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software Controlsoft Identity Access Management Software IA Server Software Installation Guide v8.0.229 2018 Controlsoft Ltd 9010-0050 Issue 6 Page 1 of 39 29/10/2018 Contents 1. Introduction... 3 1.1. PC Specifications...

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Smart Access Control System Software User Manual (Client Version)

Smart Access Control System Software User Manual (Client Version) Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

UNIVERSAL SOFTWARE. Universal Software. Data Sheet

UNIVERSAL SOFTWARE. Universal Software. Data Sheet Universal Software Data Sheet System Requirements: The minimum requirements for using the Software are: 1). Windows XP/Vista/7 2). A minimum of 512 MB RAM 3). 1 GB of hard disk space 4). Microsoft Office

More information

NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp

NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp Installation Guide This guide provides a short introduction to the installation and initial configuration of NTP Software

More information

Digital Video Surveillance Center Management Software

Digital Video Surveillance Center Management Software Digital Video Surveillance Center Management Software NVClient User Manual Revision: V3.2 Updated: 12-2011 Contents Chapter I General...- 3-1.1 INTRODUCTION... - 3-1.2 MAIN FUNCTIONS... - 3 - Chapter II

More information

ChromQuest 4.2 Chromatography Data System

ChromQuest 4.2 Chromatography Data System ChromQuest 4.2 Chromatography Data System Installation Guide CHROM-97200 Revision A April 2005 2006 Thermo Electron Corporation. All rights reserved. Surveyor is a registered trademark and ChromQuest is

More information

RWT Network System Installation Guide

RWT Network System Installation Guide RWT Network System Installation Guide Copyright 2003, Talking Fingers, Inc. Page 1 of 48 This document is Copyright 2003 by Talking Fingers, Inc. All rights are reserved. This document may not be copied

More information

KYOCERA Net Admin Installation Guide

KYOCERA Net Admin Installation Guide KYOCERA Net Admin Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for

More information

HORTICOPIA Professional

HORTICOPIA Professional HORTICOPIA Professional Networking User Guide Horticopia, Inc. www.horticopia.com October 2017 Table of Contents I. Quick Start 2 II. System Requirements 3 III. Installing HORTICOPIA Professional 4 1.

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

AVALANCHE SE QUICK START

AVALANCHE SE QUICK START AVALANCHE SE QUICK START Avalanche SE is a client management system designed to easily manage software and configuration updates to mobile devices. This document provides a brief overview of the core tasks

More information

Zodiac Max OPERATOR GUIDE

Zodiac Max OPERATOR GUIDE Zodiac Max OPERATOR GUIDE February 2015 Table of Contents INTRODUCTION... 5 PC Requirements... 6 USB Driver Installation... 7 ZODIAC SINGLE-STATION SOFTWARE... 8 Software Installation... 8 Communications

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

Installing the Cisco Unified MeetingPlace Web Server Software

Installing the Cisco Unified MeetingPlace Web Server Software Installing the Cisco Unified MeetingPlace Web Server Software Release 8.5 Revised: 2/19/13 : Install the Application Server (which includes the Software Media Server) : Install the Hardware Media Server

More information

STONELOCK NETWORK USER MANUAL Version

STONELOCK NETWORK USER MANUAL Version STONELOCK NETWORK USER MANUAL Version 17.2.1 Table of Contents About StoneLock Pro...4 1.0 Overview 1.01...System Introduction...4 1.02...System Components...4 1.03...Installation...5-6 1.04...Uninstall...6

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Quick Start Guide Version 5 DATA PROTECTION REMOTE ACCESS SECURE COMMUNICATION STRONG AUTHENTICATION ACCESS RECOVERY SINGLE SIGN-ON DigitalPersona Pro Enterprise DigitalPersona

More information

ControlPoint. Advanced Installation Guide. September 07,

ControlPoint. Advanced Installation Guide. September 07, ControlPoint Advanced Installation Guide September 07, 2017 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2017 All rights reserved. No part or section of the contents

More information

PROJECTORNET FOR ADMINISTRATORS

PROJECTORNET FOR ADMINISTRATORS PROJECTORNET FOR ADMINISTRATORS Overview This chapter explains the processes for installing and setting up the ProjectorNet server software. It also lists the information that you, the ProjectorNet Administrator,

More information

KnowledgeSync V6.0 Implementation Guide

KnowledgeSync V6.0 Implementation Guide KnowledgeSync V6.0 Implementation Guide Pre-Installllatiion Confiiguratiion Welcome to KnowledgeSync! Welcome KnowledgeSync Active Alerts, the industry s leading Business Activity Monitoring (BAM) technology.

More information

Fitness Manager V4 Install Guide

Fitness Manager V4 Install Guide Fitness Manager V4 Install Guide Table of Contents 1 Welcome to V4...3 License Agreement...4 Copyright...4 2. Minimum System Requirements...5 3. Navigating the Install...6 4. Installing V4 on the Server...7

More information

AIS Server Installation Guide

AIS Server Installation Guide AIS Server Installation Guide Table of Contents Overview of AIS Server... 1 System Requirements... 3 Installation Sequence... 4 Installing SQL Server 2005 Express Edition... 5 Configuring SQL Server 2005

More information

JUN / 04 VERSION 7.1 FOUNDATION PVI EWLUTME

JUN / 04 VERSION 7.1 FOUNDATION PVI EWLUTME JUN / 04 VERSION 7.1 FOUNDATION PVI EWLUTME www.smar.com Specifications and information are subject to change without notice. Up-to-date address information is available on our website. web: www.smar.com/contactus.asp

More information

User Manual. Active Directory Change Tracker

User Manual. Active Directory Change Tracker User Manual Active Directory Change Tracker Last Updated: March 2018 Copyright 2018 Vyapin Software Systems Private Ltd. All rights reserved. This document is being furnished by Vyapin Software Systems

More information

Silk Performance Manager Installation and Setup Help

Silk Performance Manager Installation and Setup Help Silk Performance Manager 18.5 Installation and Setup Help Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright 2004-2017 Micro Focus. All rights reserved.

More information

7. Run the TRAVERSE Data Migration Utility from TRAVERSE 10.2 into TRAVERSE 10.5.

7. Run the TRAVERSE Data Migration Utility from TRAVERSE 10.2 into TRAVERSE 10.5. Overview Use the TRAVERSE Data Migration Utility to convert and append OSAS 6.1x, 6.5x or 7.0x data to TRAVERSE data. Follow these steps to import OSAS 6.1x, 6.5x or 7.0x data into TRAVERSE: 1. Make sure

More information

Sophos Enterprise Console advanced startup guide

Sophos Enterprise Console advanced startup guide Sophos Enterprise Console advanced startup guide For distributed installations Product version: 5.3 Document date: April 2015 Contents 1 About this guide...4 2 Planning installation...5 2.1 Planning the

More information

Sagem MEMS 7.3 Quick Installation Guide

Sagem MEMS 7.3 Quick Installation Guide Sagem MEMS 7.3 Quick Installation Guide This document is an installation supplement to the MorphoAccess Enrollment Management System (MEMS) Installation Guide and User Guide. To ensure the most effective

More information

Embarcadero All-Access Server Installation Guide

Embarcadero All-Access Server Installation Guide Embarcadero All-Access Server 1.0.1 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

Last Updated: 14 February 2011 Version 6.5. Page 1

Last Updated: 14 February 2011 Version 6.5. Page 1 Last Updated: 14 February 2011 Version 6.5 Page 1 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the issues discussed

More information

Metasys Export Utility Installation Instructions Code No. LIT Software Release 9.0 Issued August 2017

Metasys Export Utility Installation Instructions Code No. LIT Software Release 9.0 Issued August 2017 Code No. LIT-12011527 Software Release 9.0 Issued August 2017 Refer to the QuickLIT website for the most up-to-date version of this document. Introduction...2 Summary of Changes...2 Metasys Help Files...2

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

HP Intelligent Management Center SOM Administrator Guide

HP Intelligent Management Center SOM Administrator Guide HP Intelligent Management Center SOM Administrator Guide Abstract This guide contains comprehensive conceptual information for network administrators and other personnel who administrate and operate the

More information

DesignPro Tools for Xerox Elixir Technologies Corporation. All rights reserved.

DesignPro Tools for Xerox Elixir Technologies Corporation. All rights reserved. Follow the Crop Marks DesignPro Tools for Xerox Getting Started Guide C 1998-2008 Elixir Technologies Corporation. All rights reserved. Elixir Technologies Corporation 721 East Main Street Ventura, CA

More information

I-CUBE FACE RECOGNITION SYSTEM USER GUIDE

I-CUBE FACE RECOGNITION SYSTEM USER GUIDE Barry T. Dudley Page 1 of 12 2004/04/04 I-CUBE FACE RECOGNITION SYSTEM USER GUIDE CONTENTS PAGE CONTENTS PAGE...1 SYSTEM REQUIREMENTS...2 DEMONSTRATION PROGRAM...4 INSTALLATION...5 NORMAL OPERATION...6

More information

Appendix A: Metasys Web Access (MWA) Server Installation Guidelines

Appendix A: Metasys Web Access (MWA) Server Installation Guidelines Technical Bulletin Issue Date February 26, 2003 Appendix A: Metasys Web Access (MWA) Server Installation Guidelines Appendix A: Metasys Web Access Server Installation Guidelines...2 Introduction... 2 Detailed

More information

Axxis Biometrics LLC. BioAxxis L113 Fingerprint Door Lock Programming Kit

Axxis Biometrics LLC. BioAxxis L113 Fingerprint Door Lock Programming Kit Axxis Biometrics LLC BioAxxis L113 Fingerprint Door Lock Programming Kit Revision 0.14 Dec 2005 Table of Contents 1. Introduction... 2 Product Overview... 2 Main Features... 2 Packing Lists... 3 2. Operation

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

1 - System Requirements

1 - System Requirements Structural Desktop - Single-Seat Workstation Professional Version 4.0 Installation Instructions Please read Section 4, Registering Your License, before registering your purchase of Structural Desktop.

More information

Version 4.1 June Xerox Device Agent (XDA) Lite User Guide

Version 4.1 June Xerox Device Agent (XDA) Lite User Guide Version 4.1 June 2013 Xerox Device Agent (XDA) Lite User Guide 2008-2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the US and/or other countries.

More information

IQSweb Installation Instructions Version 5.0

IQSweb Installation Instructions Version 5.0 IQSweb Installation Instructions Version 5.0 Contents Additional References... 3 IQSweb ROSS Connection... 3 IQSweb V5.0 Install/Upgrade Scenarios... 4 IQSweb Configuration Options... 5 A. Single Computer/Server

More information

Installation Guide Version May 2017

Installation Guide Version May 2017 Installation Guide Version 2017 5 May 2017 GeoCue Group, Inc 9668 Madison Blvd. Suite 202 Madison, AL 35758 1-256-461-8289 www.geocue.com NOTICES The material in GeoCue Group, Inc. documents is protected

More information

MapMarker Plus Desktop Installation Guide

MapMarker Plus Desktop Installation Guide MapMarker Plus 11.0 Desktop Installation Guide Information in this document is subject to change without notice and does not represent a commitment on the part of the vendor or its representatives. No

More information

Waters Empower 2 Service Pack G

Waters Empower 2 Service Pack G R E L E A S E N O T E S Waters Empower 2 Service Pack G Empower 2 Service Pack G enhances LDAP capabilities. These release notes also address the following information and instructions: System and software

More information

Full User Manual and Quick Start Guide

Full User Manual and Quick Start Guide Full User Manual and Quick Start Guide 2 W hile every precaution has been taken in the preparation of this manual, we assume no responsibility for errors or omissions. Neither, is any liability assumed

More information

docalpha Installation Guide

docalpha Installation Guide ARTSYL DOCALPHA INSTALLATION GUIDE 1. docalpha Architecture Overview... 2 1.1. docalpha Server Components... 4 1.2. docalpha Production Environment Stations Overview... 4 1.3. docalpha Setup & Administration

More information

Mailbox Manager Getting Started Guide. Licensing Installation Options System Requirements Installation Instructions

Mailbox Manager Getting Started Guide. Licensing Installation Options System Requirements Installation Instructions Mailbox Manager Getting Started Guide Licensing Installation Options System Requirements Installation Instructions Mailbox Manager Release 5.4 December 2006 Table of Contents Introduction... 1 Licenses...

More information

NTP Software File Auditor for Hitachi

NTP Software File Auditor for Hitachi NTP Software File Auditor for Hitachi Installation Guide Version 3.3 This guide details the method for the installation and initial configuration of NTP Software File Auditor for NAS, Hitachi Edition,

More information

Evaluation Kit Manual

Evaluation Kit Manual Xcalibur Global 1.2 Evaluation Kit Manual Management Software Written By: Chip PC Training Dep. December 2007 www.chippc.com 1 2 Contents 1 General 4 2 DVD Content 5 3 Installation Prerequisites 5 4 Xcalibur

More information

Scribe Insight Installation Guide. Version August 10, 2011

Scribe Insight Installation Guide. Version August 10, 2011 Scribe Insight Installation Guide Version 7.0.2 August 10, 2011 www.scribesoft.com Important Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form

More information

Centra Workbench (V3.12 onwards)

Centra Workbench (V3.12 onwards) Workbench Installation Guide Centra Workbench (V3.12 onwards) Create and Customize User Interfaces for Router Control snellgroup.com Introduction Description This guide describes the system requirements

More information