STONELOCK NETWORK USER MANUAL Version

Size: px
Start display at page:

Download "STONELOCK NETWORK USER MANUAL Version"

Transcription

1 STONELOCK NETWORK USER MANUAL Version

2 Table of Contents About StoneLock Pro Overview System Introduction System Components Installation Uninstall...6 Instructions for Use 1...System Startup System Settings Role Management Operator Management System Configuration Operation Log Database Management Device Settings Device Management Device Maintenance Data Synchronization Electronic Map Real-Time Records Management User Management Time Group Management Holiday Management Permission Management User Management Batch Modify User Group Management Data Management Verification Records Management Alarm Records Management

3 About StoneLock Pro Section 1: Overview StoneLock Pro Faceplate The StoneLock Network (SLN) software is a security management platform for managing StoneLock access controls and related systems across a network. Light Bar Functions include StoneLock hardware management, user management, privilege management, remote 1.0 Cameras (NIR Camera not visible) user enrollment, records checking and alarm controls. NIR Lights 1.01 SYSTEM INTRODUCTION LCD Display 10:36:23 07/17/2013 Wednesday The SLN software platform integrates StoneLock s advanced face recognition technology, the access control functions, along with keypad entries and/or ID cards in various authentication combination Light Sensor Keypad HID Card Reader StoneLock Pro Control Unit StoneLock Pro is an extremely fast and accurate IR facial recognition biometric unit for access control applications. It incorporates proprietary biometrics along with a keypad modes. The SLN software platform centralizes data management, allowing the unique advantages of face recognition to be quickly pushed across an entire facility, or even multiple facilities, each with multiple entrance locations. Events can be easily monitored, greatly improving the level of security control. The SLN platform, allows for control of all access control terminals, including StoneLock units, user information, user privilege management, records management, system alarm controls and other functions. and HID iclass SE Multi-Class Reader into a 3-point device. StoneLock Pro includes a faceplate unit and a control unit SYSTEM COMPONENTS StoneLock Network Software Platform StoneLock Pro Access Control Device (up to 64 units on one network) StoneLock Global is a provider of high quality biometric products for access control applications. 2

4 1.03 INSTALLATION Follow these steps to install the full security management platform software (SLN): 1) Double-click the installer to begin the installation. 2) On the Welcome interface, select [Next] to continue the installation (Figure ). 1.0 Fig ) At the License Agreement screen (Figure ), check the box I have read and agree to the above agreement, and then select [Next] to continue the installation. Fig ) At the Choose Install Location screen (Figure ), the system default installation directory is: C: \ Program Files \ SLN2.3 a. Select [Next] to continue the installation. b. If you need to modify the installation path, select the [Browse] button to select the installation folder. Fig

5 5) Installation Select [Install] to install the SLN software. The Installation Process: Database Initialization window will prompt you to initialize the database. 1.0 Within the Database Initialization you will need to establish a destination folder to house the database. i.e. C:\SLNdata Fig Initialize: Select the database type (SQL 2000, SQL 2005, SQL 2008, Access or Firebird), then enter the server address, user name, and password and then select [Initialize] to initialize the database. Note: If you have a previous version of the SLN installed, click on the OK button, as you will not need to initialize the database again. (Figure ) [Upgrade]: This function is specific to changing your database. This step will only need to be performed if you are changing from a previous database, i.e. SQL2000 to SQL2008. Fig ) Select [Exit], and then select [Finish] to complete the installation. (Figure ) 1.04 UNINSTALL Before uninstalling: a. Exit and close the SLN b. Go to the Start Menu / All Programs / StoneLock Network and select the [Uninstall] option. Fig

6 Section 2: Instructions for Use 1 SYSTEM STARTUP a) Double-click the desktop icon (Figure 1-1) to run the SLN. A prompt box of System Register will pop up in the initial startup. Fig 1-1 In the Registration dialog box (Figure 1-2), select [Register] to initiate a quick registration sequence, or select [Trial] button for a 30-day trial period. Fig 1-2 b) After successful registration, the system automatically connects with SQL SERVER database and loads the system resources. If the database connection fails, the message box failed to connect database will pop up (Figure 1-3). Fig 1-3 5

7 Click [Yes] to pop up the database initialization window parameters according to actual situation. (Figure 1-3), and then configure relevant Fig 1-3 Database Type: The system supports SQL Server 2000, 2005, 2008, MS Access, Firebird. Server: Fill the LAN server rooted by SLN (ie the database server) with actual IP address. User Name, Password: database type for SQL Server 2000, 2005, 2008; users fill out the SQL Server, the user name and password usually sa; for Access, the user name and password are empty; for the Firebird, the user Name Fill sysdba, password is masterkey. Fig 1-4 c) When the database connection is successful, the system login interface will appear (Figure 1-5). Fig 1-5 6

8 Enter the correct user name and password (the default super administrator user name: admin, password: to enter the main interface (Figure 1-6). The S-Admin can change the password after the initial login. Fig 1-6 d) Service Mode: In the main interface, click [Transit service configuration] icon (Figure 1-7); the pop-up transit server configuration window is shown in (Figure 1-8). Fig 1-7 Service Mode (Figure 2-8): Local mode: Only allow one SLN application to connect with a StoneLock Pro unit. Transit mode: Allow multiple SLN applications to connect with StoneLock Pro units when transit daemon is run. You must first modify the mode as transit mode and fill in the correct transit server IP. Fig 1-8 7

9 Transit Service IP: Enter the actual IP address of the server on which transit daemon is run (i.e. the transit server). The Transit IP is recommended to be consistent with database IP; that is, the transit server and database server are the same. Open background service transit: transit mode set, you must open the transit daemons. Open the Start Menu - All Programs - SLN ; run transit background services. Fig 1-9 In the Transit Service dialog box, (Figure 1-9), enter the correct user name and password to enter the background transit service main interface (Figure 1-10). Client List: Displays client information connected with background transit service. Online Device: Display StoneLockTM device information connected with background transit service. Offline Device: Display StoneLockTM device information disconnected from the background transit service. Device Load: Display load information of online StoneLock device. Fig

10 2 SYSTEM SETTINGS Click the [System Settings] menu, and it will appear in a menu bar (Figure 2-1). Fig ROLE MANAGEMENT See Interface (Figure 3-1) New Role Permissions: Select [New]; the system adds a new role. New: Click the [New] button to add a new role with a default name. Select desired Function Module and Details for the role. Choose a name for the Role. Note: Checking [Enabled] within the Function Module and/or within the Details section selects all permissions. Note: Once any permission within a role has been changed, the administrator roles must be reassigned to the Operator. SELECT [SAVE] FOR ANY CHANGES TO TAKE PLACE. Fig 3-1 9

11 4 OPERATOR MANAGEMENT See Interface (Figure 4-1) Add: Click the [Add] button to add a system operator. The name will default to i.e. Oper #. This Operator will default to the initial password of until it is changed by the super admin. Set the new Operator s user name, password, assign a role and area of privilege. Click [Save] button. Fig 4-1 Reset Password: Choose an Operator; click the [Reset password] button to reset the password back to default Remote Password: This password will be used for remote log-ins. This password can be reset at any time by the administrator logging in the system. Single Use: Checking this indicates that the remote password becomes invalid following a single use. This password can only be reset by the administrator. Advanced Settings: Select an operator; click the [Advanced Settings] button to set this operator s mobile- phone number, address and other details. (Figure 4-2) Note: Admin is the system s super Administrator. The Admin s privileges can not be deleted or modified. They can manage all SLN features as well as all StoneLock Pro units within the system. A non-admin operator can only manage the terminals within their assigned roles and area. Fig 4-2 Tip: Passwords may contain 0-16 characters (including letters, numbers, special characters and spaces), and are not case-sensitive. 10

12 5 SYSTEM CONFIGURATION See User Configuration interface (Figure 5-1) Card parameters: Choose appropriate card port as well as card type. Default Profile ID Number: By checking this box the SLN will automatically generate an ID number for the individual users profile. By not checking this box the Admin or Operator will need to assign an ID number to each user, i.e. employee ID number Fig 5-1 User Expiration: Users not verified for a long period (60 days by default) become expired. Expired users will be displayed in Pending Delete User nodes in the window User Management - User Profile Management (Figure 5-2) Configure the system information for: Days of alarm record keeping Days of verification record keeping Days of operation log keeping Days of His-Changed Photo keeping Expired time of each type of data can be configured, and the system default time is 60 days. Click the [Clear] button to clear this default number in the window System Settings - Database Management. Fig

13 See [System related] interface (Figure 5-3) Enable remote password authentication: By checking this option, this provides the system administrator for StoneLock access to the terminal for remote operation (i.e.: remote open, remote close, emergency locking, emergency unlocking, etc.). Time Calibration: Click on the [timing] button to sync the current time on all connected units. Hourly calibrating: Check and save this option when the SLN is running, the system will automatically calibrate the time on the attached StoneLock Pro units. Fig 5-3 Automatic Logout: By checking this option, you can set a time interval to automatically log the Admin/Operator out of the system when it is idle for a specified amount of time. See [Alarm related] Interface (Figure 5-4) Enable Voice Alarm: Check this option to will turn on voice prompts when events happen. Times: Choose the drop down menu to select number of times the alarm sounds when a corresponding event occurs. Note: If the number of alarm times is not selected, the alarm plays in an infinite loop. Note: Double-clicking color will enable the user to color code various alarm events for quick reference in the Real Time Record Management screen under Device Settings. Fig

14 6 OPERATION LOG See Interface (Figure 6-1) Click the drop down in the Operator field to select the Operator. Click the drop down in the Start Date to choose the start date. Click the drop down in the End Date to choose the end date. In the Operation field, type keyword(s) to search events (optional). Click the [Search] button; the system will search the selected operator s entire activity log. The log information includes: time of event, the operation, the operator, and the server name. Fig

15 7 DATABASE MANAGEMENT See Interface (Figure 7-1) 1) Data Cleanup Click the [Clear] button to delete any expired records based on the set number of days in the Data Related fields under System Configuration. Note: Expired data should be cleared periodically to maintain optimal data storage. 2) Database Backup Click the [Browse] button to specify the storage directory of the database backup files. Fig 7-1 Click the [Backup] button, database backup files labeled with current system time will be generated immediately and stored in the specified path. 3) Database Restore Click the [Browse] button to select a backup database file from specified directory. Click the [Restore] button to restore the database immediately. Note: Restore will overwrite the existing data with the data in the backup file chosen. 14

16 8 DEVICE SETTINGS Click the menu Device Settings, a menu bar will appear. (Figure 8-1) 9 DEVICE MANAGEMENT Fig 8-1 See Device Information tab (Figure 9-1) Creating a New Area: Select [New] in the Area Window. The new Area Window will appear (Figure 9-2) Use the Superior drop down menu to select to define where the new area will be created. Name the new area by typing in the Area Name Field. Fig 9-1 Click [OK], the new added area will be displayed in the area list. The system supports multilevel areas. Repeat the above steps to create sub-areas within each main area. Click [Edit] to edit area names and to move the area under other areas. The hierarchy can also be rearranged by dragging and dropping. Click [Delete] to delete any highlighted area. Click [Search] to find any unassigned devices that are connected to SLN. Fig

17 Fig 9-2 Setting up a new device within an area: Select an area and click the [New] button on the device window to add a device. In the Device Information tab you may: name the device confirm the device is in the correct area select operate mode Secondary identity verification (i.e. a card or code) IP address of the connected unit Choose Hold-Open Time for the controlled door Door Contact Over-Time Click the [Save] button Super Password: The Super Password can only be used to open the door in particular situations by the S-Admin. Check the validate Super Password option, the StoneLock Pro unit will validate the super password (or else invalidate). A Super Password can contain from 4-8 digits. Operation Modes: 1:1 mode: When this mode is set, users are required to present a card or input an employee number first at a StoneLock Pro unit, then accept face recognition authentication. 1:N mode: When this mode is set, users can use face only at a StoneLock Pro unit. Mixed mode: Caution: Mixed mode should only be established via the SLN. Don t say we didn t warn you! When Mixed mode is selected, the network administrator can allow select individual users to be authenticated with face only. All other users default to card plus face. (Refer to 2.18 to learn how to set a user to Mixed mode) Note: In Mixed mode, a maximum of 200 users can be registered with face-only on a single StoneLock Pro device. All others users must be card plus face in this same device. Card verification: Users directly swipe authorized IC \ ID card for authentication. 16

18 Auxiliary: Empty: Allows no assisted verification in specified operating mode. This will default the device to is face only. Card Verification: Allow cards verification in specified operating mode. ID Verification: Allow employee ID# verification in specified operating mode. Card Verification/ID Verification: Allows both cards verification and employee ID# verification in specified operating mode. Device IP: Device IP is set as the actual IP address of StoneLock device. It connects with its corresponding devices when SLN is successfully connected via network. 1 There is a bug in the setup, which allows a non-card-registered S-Admins to establish Mixed Mode and thereby fatally lock everyone out of all advanced functions (the only fix for this is to reset the unit with SLN software). Until we get this bug corrected we recommend only Mixed Mode from an SLN. Yes, it happened to us. Yes, StoneLock is very secure. Note: To identify the corresponding devices ID, a Super Admin must authenticate themselves at a terminal, go the Network, click OK, scroll down to IP settings, click OK and the IP address is shown. To change the IP address click OK and enter the number using the arrow keys will allow you to navigate from field to field, click OK, Esc, Esc. Device permissions: Configure the open permission for StoneLock device Allow: Unauthorized users are allowed to open the door after successfully being verified by the StoneLock access device. Refuse: Unauthorized users are not allowed to open the door after successfully being verified by the StoneLock Pro unit. 17

19 immediately send abducting alarm signal to SLN and display it onto Device Settings /Real- Time Record Management window when the user enter abducting password, making sure that SLN can receive distress calls the first time. Door Contact: When this option is selected, a StoneLock Pro unit will monitor the door contact state. When an error condition is detected (e.g.: illegal open or a door contact timeout), the system can immediately send alarm Information and display it onto Device Settings /Real-Time Record Management window. Fig 9-3 Hardware Arming: When this option is selected, the system will trigger an alarm when any abnormal treatment of a StoneLock Pro unit is detected (such as striking, shaking, or otherwise manhandling the unit). See Device Status tab (Figure 9-3) Display Real-time Record: When this option is selected, user verification records can be viewed on the window Device settings/ Real-Time Records Management verified by the StoneLock Pro unit. Save Failed Record: When this option is selected, failures recorded by a StoneLock Pro unit will be recorded in the database. Sub-Door Interlock: When this option is selected, the two sub-doors of the device will exert a linkage interlock function such that sub-door 2 cannot be opened while the door contact of sub-door 1 stays open, even with verification. Only when the door contact of two subdoors are in their closed state can the system open either one of them again. Remote loading of User: When this option is selected, a remote user can be verified via swipe card or the keypad entering of an employee ID at the StoneLock Pro unit, providing the user information has already established. User Synchronization: When this option is selected, user s information can be synchronously updated to SLN when SLN is run and this user has been registered or reregistered by a StoneLock Pro unit. Abducting alarm: When this option is selected, the system can Remote Confirm For door 1: When this option is selected, the StoneLock Pro unit in subdoor 1 sends an OPEN request remotely to the SLN after it has successfully verified an authorized user. The SLN will present a Remote Open Request window to display the door s real-time video and verification details. After the administrator s confirmation, the door finally opens. Remote Confirm For door 2: When this option is selected, the StoneLock Pro unit in subdoor 2 sends an OPEN request remotely to the SLN after it has successfully verified an authorized user. The SLN will present a Remote Open Request window to display the door s real-time video and verification details. After the administrator s confirmation, the door finally opens. 18

20 See Sub Door Information Tab page (Figure 9-4) Remote Open Door: You can open the selected sub-door of StoneLock Pro unit remotely. Remote Close Door: You can close the selected sub-door of StoneLock Pro unit remotely. Emergency Unlocking: When this option is selected, the selected Sub-Door of this device stays open until the administrator selects Normalization (same function as in Device Maintenance). Emergency Locking: When selected, the selected Sub-Door of this device stays closed until the administrator selects Normalization (same function as Device Maintenance). Recover normal: When selected, the door of this device reverts back to normal operation from emergency locking or emergency unlocking. This function is the same as Normalization in Device Maintenance DEVICE MAINTENANCE See Device Maintenance tab (Figure ) Fig 9-4 Upgrade: Click the [Browse] button to select the upgrade file path and then select the device expected to be updated in the device list, click the [Upgrade] button to upgrade the device. Reboot: reboot the specified StoneLock Pro unit remotely. Format: When selected, all the data in the specified device will be formatted to factory settings. Warning: All profiles in the device will be cleared. Emergency Unlocking: When selected, the door of this device stays open until the administrator chooses Normalization (same function as in Sub-Door Information tab). Emergency Locking: When selected, the door of this device stays closed until the administrator chooses Normalization (same function as in Sub-Door Information tab). Normalization: When selected, the door of this device reverts back to normal operation from emergency locking or emergency unlocking (same function as in Sub-Door Information tab). Fig

21 2.11 DATA SYNCHRONIZATION See Interface (Figure ) Automatic Synchronization: Check this option to configure the automatic sync cycle and time to automatically push and pull information to all networked StoneLock devices. Click [Save]. Fig Manual Synchronization: Choose the device from the Device list on the right, the content you want to synchronize, and then select [Synchronize]. The chosen device and its content will be made available within the SLN. Time group: This function allows synchronizing information for a designated time group for a specified StoneLock Pro unit. Holiday: Synchronizes holiday time for a specified StoneLock Pro unit. User Data: Synchronizes user data for a specified StoneLock Pro unit. Permissions: Synchronizes permissions for a specified StoneLock Pro unit. Verification Records: Downloads all verification records from the specified StoneLock Pro units to the SLN. Alarm Records: Downloads all alarm records from the specified StoneLock Pro unit to the SLN. Note: The system can only perform the data synchronization functions when the chosen StoneLock Pro units are online. 20

22 2.12 ELECTRONIC MAP See Interface (Figure ) Import a facility map/floor plan from a folder on your computer. These files must be saved as jpg or bmp files. This function enables you to easily mark where all of the StoneLock Pro units are on your map, as well as a quick reference of activity that has occurred at each device. Import Map: Right-click the mouse on the map interface and choose [Edit] from the pop-up menu. On the right, choose [Select map] to browse for a saved map. Click the open button, map appears on screen. (Figure ) Fig Mark Position: Once a map has been imported, left click on the [Mark Position] to add a unit, and then left click on the map to position the unit. Once placed, you can left click and drag the unit anywhere on the map. To add subsequent units, repeat the above steps. To name each unit, right click on a placed unit; choose Edit Device from the pop up menu, and click the drop down. Choose the specified device name. Click [OK]. Repeat this for each device within the map. Note: Only named devices will be visible after exiting the map editor. To delete each added device, right click on the placed device. Choose Delete Device from the pop up menu. Repeat this for each device within the map. Fig Exit Map Editor: Scroll down to the [Exit Map Editor] and click to leave edit mode. To view map in full screen: Right click and choose Full Screen from the pop-up menu 21

23 2.13 REAL-TIME RECORDS MANAGEMENT See Interface (Figure 2-30) Real-time Records Display: the window of Real-time record management displays verification details about the user immediately after they are successfully verified by a connected StoneLock Pro unit. Information provided includes; name, ID, department, event, device accessed, time, and a realtime photo of the event. This window contains the last 100 records. Fig Note: Real-Time records can only be displayed when you check Display Real-time Record from the Device Settings - Device Management - Device Status window. For detailed operations, see Device Manager. Click the [Filter Setting] button to pop up Filter Settings window (Figure 2-31). You can only filter real-time records on any device checked. Click [OK]. Fig

24 Click the [Subtitle Settings] button to open the dialog box shown in Figure User can specify the font and color of the window caption. Click the [Mute] button to mute the system s current event alarm. Remote Assistance: The system does not display Remote Assistance window by default, unless when StoneLock device sends a request to open the door remotely. Once the administrator confirms the request, the window will be hidden. Fig USER MANAGEMENT Click the [User Management] menu to pop up the menu bar as shown in Figure Fig

25 2.15 TIME GROUP MANAGEMENT See Time Group Management Interface (Figure ) New: Click the [New] button to create a new time group. Set its name, start and end dates and times. Choose time, day, month, year filters as desired. Click [Save] button. Take time group 1 in Figure for example, different detecting method bring different valid period of permission as follows: Note: All filters actions are driven from the chosen start date. Check Year: The valid period is valid 2011 to end of Check Month: The valid period is from start date in May to June in any year. Check Day: The valid period is from 16th to 27th in any month and year. Check Time: The valid period is 08:00:00-18:00:00 in any day. Fig Check Week: If Monday is checked, the valid period is Monday in any month and year. Simultaneous check year and month: The valid period is from May, 2011 to June, Simultaneous check year, month and day: The valid period is from May 16, 2011 to June 27, Simultaneous check month and day: The valid period is from May 16, to June 27 in any year. Simultaneous check year and day: The valid period is from 16th to 27th in every month from 2011 to

26 2.16 HOLIDAY MANAGEMENT See Holiday Management Interface (Figure ) New: Click the [New] button to add a new holiday, set its name, start and end time. Click [Save]. Note: All users cannot open the door on the holiday, unless the Access allowed on Holiday option is checked from the User Management Permission Management window. For detailed operation see 2.17 Permission Managment. Fig PERMISSION MANAGEMENT See Permission Management Interface (Figure ) New: Click the [New] button to add a new permission. Set its name. Select the unified device set time group to show established time groups. Choose the area, select the device, its output(s) and the time group(s). Click [Save]. To apply Permissions to all connected devices in a specified area, the user can check the Select all feature. To allow access on Holidays: Check the box Access allowed on Holiday for the Permission. Click [Save]. To delete a permission, click the [Delete] button. Fig

27 2.18 USER MANAGEMENT See User Management Interface (Figure ) [Add]: Click the [Add] button to add a new Department.. In the Edit Department menu, shown in Figure , under Superior drop down, select the location of the department. In Department field provide a name. Click [OK]. Fig To add a New user: Select the user s department; then click the [New User] button to add a new user. Enter Job ID, Name, Select gender from drop down, Card ID (optional), Import Photograph (optional) using the [Import] button, Select user type from the drop down, go the Regional to select areas from the drop down, and select the available permissions for the selected area (refer to 2.17 for Permissions). Select Expiry date and use drop down to establish the expiration date. Click [Save] button., Read card: When a valid reader connects with SLN, its information can be read into card ID by clicking [read card] button. After saving, this card is tied to the user s profile, allowing the user to verify their identity by swiping the card at StoneLock device. Loss Report: If a user loses a card, click on the [loss report] button to report the loss. The card will no longer allow access. Attempted use of the card at a StoneLock device will immediately srecord alarm information with the scene photo and will be displayed in the Device Settings/Real-time Record Management. Fig Download: Click this button to download all added or modified user information from connected/online devices to the SLN. Any user which has not been assigned to an area and a permission will appear in the unassigned user list and will not be synchronized with any StoneLock device. Synchronize: Click this button to synchronize the user information for all users that have been assigned to an area and permission profile. WARNING! Any users that have not been assigned during the previous step will be deleted from the StoneLock devices. User Type: Set user s type in the SLN. Common User is the default. It is denoted as user on the StoneLock device. 26

28 Super Administrator: Users set as super administrator can operate all settings on the StoneLock device. It is denoted as S-Admin on the StoneLock device. Registry Device: Click this button to open a dialogue box and choose the device you wish to use for Remote Enrollment. Select the device and click [OK]. Common Administrator: Users set as common administrator can perform new user enrollment of a user and query records. It is denoted as Admin on the StoneLock device. Remote Registry: Click this button to remotely register a user using the Registry device selected. You must select a Registry device as mentioned above to remotely enroll a user. Common User: Users Set as common user can only be verified at a StoneLock device. It is noted as User on the StoneLock device. Expiry Date: This function becomes active by checking the box and setting a date with the Drop down. Users are allowed to be verified at a StoneLock device until the date set on the expiry date field. If access is attempted after the expiration date, an alarm event with a scene photo will be sent to the SLN and displayed on the Device settings/real-time record management window. Blacklist: Check this option to put a user into the blacklist. The user will never be verified at a StoneLock device, if the blacklisted user attempts access, alarm information with a scene photo will be sent to the SLN and displayed on the window of Device settings/real-time record management. Unassigned users: Any new user that is enrolled or downloaded from a device will be defaulted as an unassigned user. To assign an unassigned user, select the unassigned new user on the left, enter Job/Employee ID, Name, Select gender from drop down, Card ID (optional), Import Photograph (optional) using the [Import] button, Select user type from the drop down, go the Regional to select areas from the drop down, and select the available permissions for the selected area (refer to for permissions). Select Expiry date and use drop down to establish the expiration date. Click [Save] button. Deleting user: Users that are on a device and have been pulled in via the [Synchronize] button will be placed in this category since they are unassigned. Mixed Mode: When this box is checked, this function enables a user to gain access at a StoneLock device using either a [Card + Face] or Face only. Note: There is a limit of up to 200 users that can be set to mixed mode in the SLN and the device must also be set to Mixed Mode (Refer to to learn more). 27

29 2.19 BATCH MODIFY USER See Interface (Figure ) Perform a search by first selecting a condition using the dropdown and typing a keyword search in the content box. The keyword must be an exact match and is case sensitive. The only condition that does not require keyword is the all users selection. Fig Choose the the user from the search list you want to modify, then click [Batch Modify] button to bring out the Batch Modify window (Figure 2-39). Use the dropdowns to modify its department, belongs area and permissions. You can also batch modify, expiry time, mixed mode or blacklist. Once your modifications are set, click [Batch Modify] for the changes to take effect within the SLN. You need to then use the [Synchronize] button in User management/user management to apply these changes. Fig

30 2.20 GROUP MANAGEMENT See Interface (Figure ) Fig New: Click the [New] button to open the Add Group window (Figure ). Configure its name, defined device(s); click [OK]. Fig Two sub user groups are added and displayed by default. Sub-users groups cannot be deleted, as show in (Figure ). Fig

31 Add User: Select a sub user group, click the [Add User] button to open the Select User window (Figure ). Perform a search by first selecting a condition using the dropdown and typing a keyword search in the content box. The keyword must be an exact match and is case sensitive. The only condition that does not require keyword is the all users selection. Choose up to SIX users by checking the box next to the user from the search list, then click [OK]. Fig To move a user up or down in a list, click on the user in the list and then click the [Upward] and [Downward] buttons respectively. To delete a user in a list, click on the user in the list and then click the [Delete] button. Click [Save] to save all modifications to the group. Fig Less No. of: Set the at least turnout in sub user group. Take the number in Figure for example; any two of users in the sub use group that appear will do. Orderly: If you check this option, users in sub user group must be verified orderly, otherwise combine verification is invalid. You can reorder it by clicking [up], [down] buttons. Note: Two sub user groups by default can be set in a combination, and each contain a maximum of six users. When checking recognizing orderly, the first group will be verified before the second one. Fig

32 2.21 DATA MANAGEMENT Click [Data Management] to open the menu bar (Figure ). Fig VERIFICATION RECORDS MANAGEMENT See Interface (Figure ) Click the [Search] button, the system by default will search the current day s verification records of all devices and users. The search can be expanded by setting the start and end dates/times of the search. You can filter the search by choosing the device, the department, name, id number, card number, type of verification and the event associated with that verification/denial.. Note: All records are downloaded automatically or can be manually downloaded by an administrator from a StoneLock device to the SLN. Refer to for Data Synchronization. Fig ALARM RECORDS MANAGEMENT See Interface (Figure ) Click the [Search] button, the system by default will search the current day s alarm records of all devices. The search can be expanded by setting the start and end dates/times of the search. You can filter the search by choosing the device, the alarm type, id number and card number. Note: All records are downloaded automatically or can be manually downloaded by an administrator from a StoneLock device to the SLN. (Refer to for Data Synchronization). Fig

33 Please contact StoneLock with any comments or questions regarding the material in this User Guide. Visit our website at:

34 StoneLock, Inc Rev

WinPak 2 & 2005 Quick Reference

WinPak 2 & 2005 Quick Reference WinPak 2 & 2005 Quick Reference Initializing a Panel (sending changes in the programming to the panels) From the menu bar select Operations Control Map Click the (+) to expand the tree and display the

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

USER MANUAL. Disclaimer

USER MANUAL. Disclaimer USER MANUAL Disclaimer The instructions in this document have been carefully checked for accuracy and are presumed to be reliable. Smart I Electronics Systems Pvt. Ltd. and its writers assume no responsibility

More information

ivms-4200 Access Control Client User Manual UD00895N

ivms-4200 Access Control Client User Manual UD00895N ivms-4200 Access Control Client User Manual UD00895N User Manual About this Manual This Manual is applicable to ivms-4200 Access Control Client. The Manual includes instructions for using and managing

More information

IMS Client Operation Guide Version V1.1 Date

IMS Client Operation Guide Version V1.1 Date Version V1.1 Date 2015-10-20 About This Document About This Document About This User Manual Please note the following points before using this user manual: This user manual is intended for persons who

More information

Access Control Software User Manual

Access Control Software User Manual Access Control Software User Manual Version: 2.4.3.1038 Date: November 2010 Table of Contents Table of Contents 1. Install and Uninstall Software...1 1.1 Install Software...1 1.2 Uninstall Software...4

More information

Access Control Software User Manual

Access Control Software User Manual Access Control Software User Manual Version: 2.4.4.1040 Date: Dec. 2011 Table of Contents Table of Contents 1. Install and Uninstall Software...1 1.1 Install Software...1 1.2 Uninstall Software...4 2.

More information

IS2000. Administrative Operator s Guide

IS2000. Administrative Operator s Guide IS2000 Administrative Operator s Guide Table of Contents Logging Off... 7 Event Manager... 7 HARDWARE MANAGER... 8 Maneuvering the Hardware Tree... 8 Unlocking the Module... 8 Viewing the Hardware Tree...

More information

D3000.Lite User s Guide

D3000.Lite User s Guide D3000.Lite User s Guide 2011 Datawatch Systems, Inc. Datawatch Systems is a registered trademark of Datawatch Systems, Inc. For Datawatch D3000.Lite Version 1.2 Manual release date: March 1, 2010 Datawatch

More information

OnGuard Integration User Guide. v

OnGuard Integration User Guide. v OnGuard Integration User Guide v. 17.01.30 Table of Contents Introduction 1- StoneLock Pro Hardware Configuration 2- Installation 2.1- Installing the SLMS and Service Applications 2.2- Configuring for

More information

Symmetry Integration User Guide. v

Symmetry Integration User Guide. v Symmetry Integration User Guide v. 17.02.01 Table of Contents Introduction 1. StoneLock Pro Hardware Configuration 2. Installation 2.1 Installing the SLMS and Service Applications 2.2 Configuring for AMAG

More information

HP ALM Overview. Exercise Outline. Administration and Customization Lab Guide

HP ALM Overview. Exercise Outline. Administration and Customization Lab Guide HP ALM 11.00 Administration and Customization Lab Guide Overview This Lab Guide contains the exercises for Administration and Customization of HP ALM 11 Essentials training. The labs are designed to enhance

More information

R A D I O N I C S. READYKEY K6100 Readykey for Windows. User Guide. Logging In. Logging Out. If an ID device has been issued:

R A D I O N I C S. READYKEY K6100 Readykey for Windows. User Guide. Logging In. Logging Out. If an ID device has been issued: R A D I O N I C S READYKEY K6100 Readykey for Windows User Guide Logging In If an ID device has been issued: 1. Use your ID device with the desktop administration or Central Network Controller (CNC) reader,

More information

VWR Protocole Builder Software User manual Summary

VWR Protocole Builder Software User manual Summary VWR Protocole Builder Software User manual Summary 1. Introduction... 2 1.1. What is VWR Protocole Builder Software?... 2 1.2. Passwords and User information... 2 1.3. Forgotten password... 2 2. Home screen...

More information

Smart Access Control System Software User Manual (Client Version)

Smart Access Control System Software User Manual (Client Version) Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

ACCESS CONTROL QUICK INSTALL GUIDE. tel: +44 (0) fax: +44 (0) web:

ACCESS CONTROL QUICK INSTALL GUIDE. tel: +44 (0) fax: +44 (0) web: ACCESS CONTROL QUICK INSTALL GUIDE tel: +44 (0)1457 874 999 fax: +44 (0)1457 829 201 email: sales@cop-eu.com web: www.cop-eu.com WIRING CONFIGURATION - ACS CONTROLLERS CONNECTIONS Dahua access controllers

More information

DCMS. User Manual. Version V1.0

DCMS. User Manual. Version V1.0 DCMS User Manual Version V1.0 About This Document About This Document About This User Manual Please note the following points before using this user manual: This user manual is intended for persons who

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

HikCentral Control Client. User Manual

HikCentral Control Client. User Manual HikCentral Control Client User Manual Legal Information User Manual 2018 Hangzhou Hikvision Digital Technology Co., Ltd. About this Manual This Manual is subject to domestic and international copyright

More information

Version: 1.1 Software Version: For Access 4.5.8/5.0.8 and above Version Date: July, 2011

Version: 1.1 Software Version: For Access 4.5.8/5.0.8 and above Version Date: July, 2011 User Manual Version: 1.1 Software Version: For Access 4.5.8/5.0.8 and above Version Date: July, 2011 About This Manual This document introduces the main function, the user interface and operations of the

More information

uface800 Time Clock User Manual uface800

uface800 Time Clock User Manual uface800 Innovative Time and Attendance Solutions uface800 Time Clock User Manual Version 3.6.3 uface800 Visit: MidexTimeAndAttendance.com Call: 1-888-544-7878 Email: info@midexsoftware.com /TimeAndAttendanceSoftware

More information

IS2000. Administrative Operator s Guide. AOG-101 (07/2005) Software Version 7.45

IS2000. Administrative Operator s Guide.  AOG-101 (07/2005) Software Version 7.45 IS2000 Administrative Operator s Guide www.imron.com AOG-101 (07/2005) Software Version 7.45 Table of Contents INTRODUCTION...6 Overview...6 GENERAL INFORMATION...6 Logging On...7 Logging Off...9 Event

More information

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Document ID: 13-603114 Release 2.2 July 2008 Issue No.1 2008 Avaya Inc. All Rights Reserved. Notice While reasonable

More information

IP Device Search and Configuration Tool Operation Manual

IP Device Search and Configuration Tool Operation Manual IP Device Search and Configuration Tool Operation Manual Note Copyright Statement This manual may not be reproduced in any form or by any means used to create any derivative such as translation, transformation,

More information

Smart Access Control System Software. User Manual. Version 1.0

Smart Access Control System Software. User Manual. Version 1.0 Smart Access Control System Software User Manual Version 1.0 Copyright MaCaPS International Ltd. 2002 This manual was produced by MaCaPS International Ltd. MaCaPS International Ltd. http://www.macaps.com.hk

More information

Midpoint Security,

Midpoint Security, User Manual Revision: 6, Date: October 4, 009 Midpoint Security, UAB, Kaunas, Lithuania www..emssa.net TABLE OF CONTENTS Copyright notice... Liability waiver... Introduction... 4 Overview... Settings tab...

More information

NVMS1000. User Manual

NVMS1000. User Manual NVMS1000 User Manual Contents 1 Software Introduction... 1 1.1 Summary... 1 1.2 Operation Environment... 1 1.3 Install and Uninstall... 2 1.3.1 Install the Software... 2 1.3.2 Uninstall the Software...

More information

Installation Guide. ZKAccess CLASSIC 3.5. www. zkaccess.com

Installation Guide. ZKAccess CLASSIC 3.5. www. zkaccess.com Installation Guide ZKAccess CLASSIC.5 www. zkaccess.com Contents Downloading... Installation & Adding an Area...4 Adding an Area...5 Adding a Device...6 To add a standalone device:... 6 To add an Access

More information

User Manual. Hotel Lock System. Software Version: Document Version: V2.0 Date: August, Contents

User Manual. Hotel Lock System. Software Version: Document Version: V2.0 Date: August, Contents Contents User Manual Hotel Lock System Software Version: 1.1.9.6 Document Version: V2.0 Date: August, 2014 All design and specification declared are subject to change without notice in advance. I Contents

More information

User Guide V6.1g / 48730B

User Guide V6.1g / 48730B READYKEY User Guide Readykey for Windows Software 17231 V6.1g / 48730B UL Listings Trademarks UL 294 - Access Control System Units Microsoft, Windows, Windows NT are either registered trademarks or trademarks

More information

USER MANUAL. Mac Version

USER MANUAL. Mac Version USER MANUAL Mac Version Contents 1 Software Introduction... 1 1.1 Summary... 1 1.2 Install and Uninstall... 1 1.2.1 Install the Software... 1 2 Login Software... 3 2.1 Login... 3 2.2 Control Panel Instruction...

More information

CME E-quotes Wireless Application for Android Welcome

CME E-quotes Wireless Application for Android Welcome CME E-quotes Wireless Application for Android Welcome This guide will familiarize you with the application, a powerful trading tool developed for your Android. Table of Contents What is this application?

More information

STONELOCK PRO USER MANUAL Version 2.0

STONELOCK PRO USER MANUAL Version 2.0 STONELOCK PRO USER MANUAL Version 2.0 Table of Contents 1.0 Introduction Pg. 1.01... Welcome to StoneLock Pro / Features...2 Section 4.0 Verification Records 6.0 Network Functions 7.0 System Settings (cont

More information

Quick Operation Guide of ivms-4200

Quick Operation Guide of ivms-4200 Quick Operation Guide of ivms-4200 V1.02 2012-02-22 Description ivms-4200 is a video management software using a distributed structure to manage all the connectable devices. It can manage the NVR, DVR,

More information

Grandstream Networks, Inc. IPVideoTalk Cloud Conferencing System IPVideoTalk Portal User Guide

Grandstream Networks, Inc. IPVideoTalk Cloud Conferencing System IPVideoTalk Portal User Guide Grandstream Networks, Inc. IPVideoTalk Cloud Conferencing System IPVideoTalk Portal User Guide IPVideoTalk Portal User Guide Index INTRODUCTION... 4 OVERVIEW... 5 SIGN UP... 5 SIGN IN... 6 DEFINITIONS...

More information

Manual Version: V1.01. Video Management Server Client Software User Manual

Manual Version: V1.01. Video Management Server Client Software User Manual Manual Version: V1.01 Video Management Server Client Software User Manual Thank you for purchasing our product. If there are any questions, or requests, please do not hesitate to contact the dealer. Notice

More information

Understanding Door Configuration

Understanding Door Configuration CHAPTER 5 This chapter describes the concepts used to configure doors and templates. A door configuration is a collection of devices, such as locks and readers, connected to a Cisco Physical Access Gateway

More information

CMS USER S MANUAL VER:

CMS USER S MANUAL VER: CMS USER S MANUAL VER: 1.0 2009-1-6 1 INDEX INDEX... 2 Preface... 3 1. Introduction... 4 2. Install and uninstall CMS... 4 2.1 System requirement... 4 2.2 Computer Hardware Requirements... 5 2.3 Process

More information

SKY l SYS DVR USER S MANUAL TABLE OF CONTENTS. Skydreamers Systems DVR Page 1

SKY l SYS DVR USER S MANUAL TABLE OF CONTENTS. Skydreamers Systems DVR Page 1 TABLE OF CONTENTS Main System Application (Control) SERVER Startup Screen 6 Login/Logout/Shutdown 7 Control Screen 7 Setup 7 System Power Management 8 Auto Switching Interval 8 E-map 8 TV-Out 8 On-screen

More information

Installing the PC-Kits SQL Database

Installing the PC-Kits SQL Database 1 Installing the PC-Kits SQL Database The Network edition of VHI PC-Kits uses a SQL database. Microsoft SQL is a database engine that allows multiple users to connect to the same database. This document

More information

Manual Version: V1.01. ISS Manager Video Management Software User Manual

Manual Version: V1.01. ISS Manager Video Management Software User Manual Manual Version: V1.01 ISS Manager Video Management Software User Manual Notice The information in this manual is subject to change without notice. Every effort has been made in the preparation of this

More information

NVMS User Manual. Version 2.1.0

NVMS User Manual. Version 2.1.0 NVMS-1000 User Manual Version 2.1.0 Contents 1 Software Introduction... 1 1.1 Summary... 1 1.2 Operation Environment... 1 1.3 Install and Uninstall... 2 1.3.1 Install the Software... 2 1.3.2 Uninstall

More information

Digital computer management software

Digital computer management software TCP/IP Digital computer management software 0000000000 0000000000 00000 000000000000000000000 000000000000000000000000000 000000000000000000000000000 000000000000000000000000000 Reading Information...

More information

W Box VMS BOX T E C H N O L O G I E S.

W Box VMS BOX T E C H N O L O G I E S. W Box VMS BOX T E C H N O L O G I E S www.wboxtech.eu Contents Contents... 1 Overview... 3 1.1 Description... 3 1.2 Running Environment... 3 1.3 Function Modules... 3 Live view... 6 2.1 User Registration

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

S2 NetBox v4.8 Basic End-User Admin Training

S2 NetBox v4.8 Basic End-User Admin Training S2 NetBox v4.8 Basic End-User Admin Training 4/8/16 S2 Security 1 Table of Contents Introduction... 3 Log into your NetBox System... 3 Person Records... 5 Accessing Person Records... 5 Content of a Person

More information

User Manual v

User Manual v DUSK-USB Encryption User Manual v. 16.9.5.0 Introduction... 3 What s New... 3 Operating Systems (OS)... 3 OS Change... 3 DeltaCrypt Upgrades... 3 Upward Compatibility... 3 Installation & Registration (if

More information

WebStation User Manual

WebStation User Manual DN1709-1107/ Version 5.00 Copyright 2011 Tyco International Ltd. and its respective companies. All Rights Reserved. All specifications were current as of publication date and are subject to change without

More information

Perceptive Nolij Web. Administrator Guide. Version: 6.8.x

Perceptive Nolij Web. Administrator Guide. Version: 6.8.x Perceptive Nolij Web Administrator Guide Version: 6.8.x Written by: Product Knowledge, R&D Date: June 2018 Copyright 2014-2018 Hyland Software, Inc. and its affiliates.. Table of Contents Introduction...

More information

NVMS User Manual

NVMS User Manual NVMS-1000 User Manual Contents 1 Software Introduction...1 1.1 Summary... 1 1.2 Operation Environment... 1 1.3 Install and Uninstall... 2 1.3.1 Install the Software... 2 1.3.2 Uninstall the Software...

More information

EntraPass WebStation. User Manual DN

EntraPass WebStation. User Manual DN EntraPass WebStation User Manual DN1709-1011 EntraPass WebStation User Manual Table of Contents General Information...1 Copyright Information...1 EntraPass WebStation Documentation...1 Related Documentation...1

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

APPENDIX B: INSTALLATION AND SETUP

APPENDIX B: INSTALLATION AND SETUP APPENDIX B: INSTALLATION AND SETUP Page A. Overview... B:1 How do I install and setup ICMS?... B:1 Do I need special security rights to install ICMS?... B:1 Installation Basics... B:1 How do I get a quick

More information

LockState RL 4000 User Guide

LockState RL 4000 User Guide LockState RL 4000 User Guide www.resortlock.com Table of Contents Section 1: General Overview 1. Foreword... 3 2. Important Information.. 3 3. Software Installation.. 4 Section 2: Initial Lock Setup Manual

More information

Welcome To Account Manager 2.0

Welcome To Account Manager 2.0 Account Manager 2.0 Manage Unlimited FileMaker Servers, Databases, Privileges, and Users Effortlessly! The ultimate tool for FileMaker Database Administrators. Welcome To Account Manager 2.0 What Is Account

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

1. Introduction Minimum system requirements Basic Concept Server mode

1. Introduction Minimum system requirements Basic Concept Server mode 1. Introduction TC Monitor is software for monitoring and control of Ethernet (TCW) and GSM/GPRS (TCG) controllers. The supported devices are TCW122B-CM, TCW181B-CM, TCW241, TCW220, TCW210-TH and TCG120.

More information

QSalesData User Guide

QSalesData User Guide QSalesData User Guide Updated: 11/10/11 Installing the QSalesData Software... 2 Licensing the QSalesData Product... 3 Build QSalesData fields in ACT Step 2 of Install Checklist... 4 Adding the QB Data

More information

HikCentral Control Client. User Manual

HikCentral Control Client. User Manual HikCentral Control Client User Manual Legal Information User Manual 2018 Hangzhou Hikvision Digital Technology Co., Ltd. About this Manual This Manual is subject to domestic and international copyright

More information

Edit contains commands for adding, deleting, and changing configurations. The functions listed are dependent on what is highlighted in the tree.

Edit contains commands for adding, deleting, and changing configurations. The functions listed are dependent on what is highlighted in the tree. 7 Menu Items 7.1 Edit Edit contains commands for adding, deleting, and changing configurations. The functions listed are dependent on what is highlighted in the tree. 7.1.1 Add Terminal Edit > Add Terminal

More information

Quick Start Guide (V1.03) UD.6L0201B1064A01

Quick Start Guide (V1.03) UD.6L0201B1064A01 ivms-4200 PCNVR Quick Start Guide (V1.03) UD.6L0201B1064A01 Thank you for purchasing our product. If there is any question or request, please do not hesitate to contact the dealer. This manual applies

More information

Table of Contents. Revu ipad. v3.6. Navigation. Document Manager. File Access. Markups. Signature Tool. Field Verification Measurements

Table of Contents. Revu ipad. v3.6. Navigation. Document Manager. File Access. Markups. Signature Tool. Field Verification Measurements Table of Contents Navigation Document Manager File Access Markups Signature Tool Field Verification Measurements Editing Properties Tool Sets & the Tool Chest Markups List Forms Studio Sessions Studio

More information

TCS Access Control System Cheat Sheet

TCS Access Control System Cheat Sheet TCS Access Control System Cheat Sheet Access Control Main Screen 1 Toolbar 2 Device View Toolbar No. Name Function 1 Login Logs in the ASServer. 2 Logout Logs out the ASServer. 3 Devices Defines controllers

More information

MagicInfo VideoWall Author

MagicInfo VideoWall Author MagicInfo VideoWall Author MagicInfo VideoWall Author User Guide MagicInfo VideoWall Author is a program designed to construct a VideoWall layout and create VideoWall content by adding various elements

More information

Vanguide Application Set Installation Guide. Overview. Introduction

Vanguide Application Set Installation Guide. Overview. Introduction Vanguide Application Set Installation Guide Overview Introduction This guide explains how to: Install the Vanguide Application Set. Remove the Vanguide Application Set. How to unlock software images. This

More information

NVMS User Manual

NVMS User Manual NVMS-1000 User Manual Contents 1 Software Introduction...1 1.1 Summary... 1 1.2 Operation Environment... 1 1.3 Install and Uninstall... 2 1.3.1 Install the Software... 2 1.3.2 Uninstall the Software...

More information

4.2. LockView N. Instruction Man

4.2. LockView N. Instruction Man 4.2 Manual n io t c u r t s TC In LockView N ual Instruction Man Table of Contents LockView NTC 4.2 Operator s Manual LockView NTC Instruction Manual LockView NTC Instruction Manual Introduction... 4 Operation...

More information

StoneLock Gateway Installation Manual. v.1.7

StoneLock Gateway Installation Manual. v.1.7 StoneLock Gateway Installation Manual v.1.7 TABLE OF CONTENTS SECTION 1 INSTALLATION PREREQUISITS SECTION 1.1 SYSTEM REQUIREMENTS SECTION 1.2 PACS REQUIREMENTS SECTION 1.3 MIGRATION SECTION 2 STONELOCK

More information

Print Station. Point-and-Click Printing WHITE PAPER

Print Station. Point-and-Click Printing WHITE PAPER Print Station Point-and-Click Printing WHITE PAPER Contents Overview 3 Printing with Print Station 4 Easy-to-use Browser Interface 4 Familiar Folder Navigation 5 Search Functionality 6 Informative Display

More information

Keycode Installation Guide. BCM Business Communications Manager

Keycode Installation Guide. BCM Business Communications Manager Keycode Installation Guide BCM Business Communications Manager Document Status: Standard Document Version: 02.00 Document Number: NN40010-301 Part Code: N0060625 Date: June 2006 Copyright 2006 Nortel Networks,

More information

User Manual. perfectionlearning.com/technical-support

User Manual. perfectionlearning.com/technical-support User Manual perfectionlearning.com/technical-support 1 User Manual Accessing Math X... 3 Login... 3 Forgotten Password... 3 Navigation Menu... 4 Logout... 4 Admin... 5 Creating Classes and Students...

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2008 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Configuring Cisco Access Policies

Configuring Cisco Access Policies CHAPTER 11 This chapter describes how to create the Cisco Access Policies assigned to badge holders that define which doors they can access, and the dates and times of that access. Once created, access

More information

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software Controlsoft Identity Access Management Software IA Server Software Installation Guide v8.0.229 2018 Controlsoft Ltd 9010-0050 Issue 6 Page 1 of 39 29/10/2018 Contents 1. Introduction... 3 1.1. PC Specifications...

More information

Restoring data from a backup

Restoring data from a backup Restoring data from a backup The following topics explain how to find a backup to restore and then perform a restore: Finding a backup to restore on page 98 Restoring to the original location on page 101

More information

NORDSON CORPORATION AMHERST, OHIO USA

NORDSON CORPORATION AMHERST, OHIO USA CanWorks Operator Interface Tracking PLUS for CanWorks Systems with SM-2 Spray Monitors User Guide Part 1018132A NORDSON CORPORATION AMHERST, OHIO USA 2002 Nordson Corporation. All rights reserved. CanWorks,

More information

ChromQuest 4.2 Chromatography Data System

ChromQuest 4.2 Chromatography Data System ChromQuest 4.2 Chromatography Data System Installation Guide CHROM-97200 Revision A April 2005 2006 Thermo Electron Corporation. All rights reserved. Surveyor is a registered trademark and ChromQuest is

More information

Sagem MEMS 7.3 Quick Installation Guide

Sagem MEMS 7.3 Quick Installation Guide Sagem MEMS 7.3 Quick Installation Guide This document is an installation supplement to the MorphoAccess Enrollment Management System (MEMS) Installation Guide and User Guide. To ensure the most effective

More information

ZKAccess3.5 Security System

ZKAccess3.5 Security System User Manual ZKAccess3.5 Security System Version: 3.5.3 Build0001 and above version Supports Pull SDK V2.2.0.205 and above version Supports Standalone SDK V6.2.5.31 and above version About this manual All

More information

User Guide. 3CX Audio Scheduler. Version

User Guide. 3CX Audio Scheduler. Version User Guide 3CX Audio Scheduler Version 15.5.21 "Copyright VoIPTools, LLC 2011-2018" Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted

More information

Portals 14 What is a portal? 14 Hardware 15 RS232 to RS USB to RS TCP/IP to RS Add a Serial Portal 16 Add a Network portal 16

Portals 14 What is a portal? 14 Hardware 15 RS232 to RS USB to RS TCP/IP to RS Add a Serial Portal 16 Add a Network portal 16 PROS LITE User Manual Version 2.0.0 www.visual-plus.com Table of Contents Getting Started 5 Starting PROS Lite 5 Create a Portal 5 Adding a control panel 6 Adding a user 7 Upload users to a controller

More information

HHH Instructional Computing Fall

HHH Instructional Computing Fall Quick Start Guide for School Web Lockers Teacher log-on is the same as for Infinite Campus Student log-on is the same initial log on to the network except no school year is required before their user name

More information

Sync User Guide. Powered by Axient Anchor

Sync User Guide. Powered by Axient Anchor Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7

More information

Video Capture Card Manual

Video Capture Card Manual Video Capture Card Manual 1. System Login System installation is completed, will generate desktop < DVR Surveillance System> icon, please double-click operation. Or choose Start -> All Programs -> DVR

More information

Car Park Control System Software User Manual

Car Park Control System Software User Manual Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

QST Mobile Application for Android

QST Mobile Application for Android QST Mobile Application for Android Welcome This guide will familiarize you with the application, a powerful trading tool developed for your Android. Table of Contents What is this application? Logging

More information

Starting ParTEST. Select Start, Programs ParTEST ParTEST Enter your User Name and password

Starting ParTEST. Select Start, Programs ParTEST ParTEST Enter your User Name and password Starting ParTEST User Login Select Start, Programs ParTEST ParTEST Enter your User Name and password If you still logged into ParTEST as the Administrator Select File, Logout. Enter your User name and

More information

HIP2P Network Video Camera Client Terminal User Manual

HIP2P Network Video Camera Client Terminal User Manual HIP2P Network Video Camera Client Terminal User Manual Document version:5.1 Page 1 of 34 } Preface Thank you for using our company's products. The network video camera client terminal is used to implement

More information

USER MANUAL. smartengine 30 RELEASE DATE: 15/06/2010

USER MANUAL. smartengine 30 RELEASE DATE: 15/06/2010 USER MANUAL smartengine 30 RELEASE DATE: 15/06/2010 Disclaimer The instructions in this document have been carefully checked for accuracy and are presumed to be reliable. Smart I Electronics Systems Pvt

More information

9.4 Authentication Server

9.4 Authentication Server 9 Useful Utilities 9.4 Authentication Server The Authentication Server is a password and account management system for multiple GV-VMS. Through the Authentication Server, the administrator can create the

More information

OneRoof CyberCafePro Client Installation, Setup and User Manual

OneRoof CyberCafePro Client Installation, Setup and User Manual OneRoof CyberCafePro Client Installation, Setup and User Manual Suggestion: View manual on computer at 200% to see screenshot details. Client Manual: Version 6.0.x March 15, 2010 Copyright 2010, OneRoof,

More information

Chapter 1. Configuring VPGO

Chapter 1. Configuring VPGO Chapter 1. Configuring VPGO The VPGO module is configured in the VISUAL PLANNING client. You can define as many VPGO templates as you need based on the three existing template types: Diary template Events

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

User s Manual of DVR ULTIMAX. Remote Client Software V wersja 2.40

User s Manual of DVR ULTIMAX. Remote Client Software V wersja 2.40 User s Manual of DVR ULTIMAX Remote Client Software V 4.0.1 ULTIMAX-304 ULTIMAX-308 ULTIMAX-316 ULTIMAX-504 ULTIMAX-508 ULTIMAX-516 ULTIMAX-704 ULTIMAX-708 ULTIMAX-716 wersja 2.40 Index 1 Software Install,

More information

ivms-5200 Mobile Surveillance Quick Start Guide UD06370B

ivms-5200 Mobile Surveillance Quick Start Guide UD06370B ivms-5200 Mobile Surveillance Quick Start Guide UD06370B Quick Start Guide COPYRIGHT 2017 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among

More information

2015 Optima Healthcare Solutions Page 2

2015 Optima Healthcare Solutions Page 2 Viewing Documents Logging into Rehab Optima 1. To log onto Rehab Optima, go to www.rehaboptima.com. To place an icon on your desktop for future use, right click in the light blue box and choose create

More information

Grandstream Networks, Inc.

Grandstream Networks, Inc. Grandstream Networks, Inc. IPVideoTalk Cloud Conferencing System Table of Contents INTRODUCTION... 4 OVERVIEW... 5 Sign Up... 5 Sign In... 6 Tool Bar... 7 Portal Notifications... 8 DEVICES... 9 Link GVC320x

More information

Secure Guard Central Management System

Secure Guard Central Management System Speco Technologies, Inc. Secure Guard Central Management System Usage Information Contents 1 Overview... 7 2 Installation... 7 2.1 System Requirements... 7 2.2 System Installation... 7 2.3 Command Line

More information

SmartLock Surf OPERATOR GUIDE

SmartLock Surf OPERATOR GUIDE SmartLock Surf OPERATOR GUIDE May 2015 Table of Contents Introduction... 5 Server PC Requirements... 7 Client PC Requirements... 7 Step 1. Software Installation... 8 Step 2. Firewall... 8 Step 3. Port

More information