MobileVerify User Guide

Size: px
Start display at page:

Download "MobileVerify User Guide"

Transcription

1 MobileVerify User Guide PERPETUAL INNOVATION

2 Lenel OnGuard 2012 MobileVerify User Guide, product version 6.5 Item number DOC-1000, revision 2.003, December 2011 Copyright Lenel Systems International, Inc. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Lenel Systems International, Inc. Non-English versions of Lenel documents are offered as a service to our global audiences. We have attempted to provide an accurate translation of the text, but the official text is the English text, and any differences in the translation are not binding and have no legal effect. The software described in this document is furnished under a license agreement and may only be used in accordance with the terms of that agreement. Lenel and OnGuard are registered trademarks of Lenel Systems International, Inc. Microsoft, Windows, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Integral and FlashPoint are trademarks of Integral Technologies, Inc. Crystal Reports for Windows is a trademark of Crystal Computer Services, Inc. Oracle is a registered trademark of Oracle Corporation. Other product names mentioned in this User Guide may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Portions of this product were created using LEADTOOLS LEAD Technologies, Inc. ALL RIGHTS RESERVED. OnGuard includes ImageStream Graphic Filters. Copyright Inso Corporation. All rights reserved. ImageStream Graphic Filters and ImageStream are registered trademarks of Inso Corporation.

3 MobileVerify User Guide Table of Contents Introduction...7 Chapter 1: Mobile Enterprise Overview...9 MobileVerify Limitations... 9 Conventions Used in this Documentation MobileVerify Setup...11 Chapter 2: Setting Up a Mobile Computer...13 Scenario A: MobileVerify Client on a Wired System Scenario B: MobileVerify Client on a Wireless System Scenario C: Wireless Without Connection Replication for MobileVerify Systems Scheduling Replication MobileVerify Software Configuration...19 Chapter 3: License and Permissions...21 License for MobileVerify Set Permissions to Use MobileVerify Chapter 4: FormsDesigner Configuration...23 Configuration Sequence Configuration Procedures Add a Force Protection Setting Page (Optional) revision 2 3

4 Table of Contents Add a Cardholder Force Protection Setting Field Create a Recommendation Label Create Recommendation Buttons Create a Current Gate Setting Label Create a Current Settings Label Save the Page MobileVerify Operator Procedures...37 Chapter 5: Access Control Configuration...39 Configuration Sequence Configuration Procedures Populate the Force Protection Setting List Configure the System s Force Protection Setting Configure Gates Configure Workstations Assign Force Protection Settings to Cardholders Chapter 6: Verification and User Procedures...47 Verification Sequence Verification Process Without Override Permissions Diagram Verification Process With Override Permissions Diagram Search for a Badge ID Search Using a Keyboard Wedge Reader Change a Workstation s Gate Association revision 2

5 MobileVerify User Guide Chapter 7: Change System Settings...53 Change the Gate a Cardholder is Associated With Chapter 8: MobileVerify Reports...55 Determine Occupancy for an Area Glossary...57 Index...59 revision 2 5

6 Table of Contents 6 revision 2

7 Introduction

8

9 MobileVerify User Guide Chapter 1: Mobile Enterprise Overview Mobile Enterprise is a seamlessly integrated, robust solution that transports virtually all OnGuard client functions to a wearable, portable computer. The wearable computer connects to the network and to the OnGuard server via B wireless Ethernet online. It is also available as a standalone solution that can be synchronized with the OnGuard server on an operational basis. MobileVerify is a feature specifically designed for Mobile Enterprise solutions that uses portable computers running OnGuard to provide a way for security officers, guards, or sentries to make fast, intelligent decisions about whether to grant or deny a cardholder access to a specific area. The officer uses an optional scanner or reader to search the OnGuard database for access privileges, and is instantly presented with the system s recommendation for whether to grant or deny the cardholder access. MobileVerify is meant for use in areas where electronic access control is typically not applicable such as gates around the perimeter of a military base, entrances at a fenced in construction site, boarding sites on naval ships, or for other types of gated checkpoints. A mobile computer handles all of the client functions, and connects to the OnGuard server via b wireless Ethernet standards. The mobile computer is personal computer platform independent - it may consist of a tablet computer, laptop, desktop, wearable computer, or any computer with a Windows operating system. The computer must have Mobile Enterprise installed on it, and must have a wireless network card. The wireless network is designed, acquired and attenuated, providing connectivity between the Mobile Enterprise computer and the wireless access (connectivity) point on the secure side of the network. Without a network connection, Mobile Enterprise can be reconfigured to operate in a standalone mode. To put things very simply, Mobile Enterprise is the OnGuard Enterprise product combined with the MobileVerify feature and some type of mobile computer. For more information about Enterprise systems, refer to the Enterprise User Guide. This manual assumes that you already have a wireless network in place, have installed OnGuard, set up your database, and are ready to configure MobileVerify. MobileVerify Limitations The main limitations of the MobileVerify feature include: MobileVerify is only available for cardholders, not for visitors. MobileVerify is limited to a single recommendation based on a single cardholder drop-down value. This limitation is evident in situations where personnel are given a recommendation to enter an area, but then have no real way to give a different recommendation for leaving an area. An example of this would be sailors getting on a ship. MobileVerify could be used to validate sailors boarding a ship, but it could not be used to recommend who can leave the ship unless the recommendation is the same regardless of entering or leaving. revision 2 9

10 1: Mobile Enterprise Overview A security officer, guard, sentry, or other authorized user is required because a determination must be made whether to approve the system s grant or deny recommendation. Conventions Used in this Documentation Where a term is defined, the word is represented in italics. Field names, menus, and menu choices are shown in bold. Keyboard keys are represented in angle brackets. For example: <Tab>, <Ctrl>. Keyboard key combinations are written in two ways: <Ctrl> + <Z> means hold down the first key, then press the second. <Alt>, <C> means press the first key, then press the second. Window buttons on the screen are represented in square brackets. For example: [OK], [Cancel]. Throughout the documentation, flowcharts are used to illustrate processes. Each shape and line used has a distinct purpose: Shape or line Purpose Indicates the start or end of a process Indicates a process A dotted line indicates that whatever specified within that shape is optional Indicates that a decision is made Feedback is received 10 revision 2

11 MobileVerify Setup

12

13 MobileVerify User Guide Chapter 2: Setting Up a Mobile Computer This section provides a general overview of setting up any mobile computer for use with Mobile Enterprise. The mobile computer is personal computer platform independent - it may consist of a tablet computer, laptop, desktop, wearable computer, or any computer with a supported Windows operating system. A MobileVerify station can be set up three different ways: As a client on a standard system (scenario A) As a wireless client with a constant connection (scenario B) As a wireless client with a temporary connection (scenario C) These scenarios are depicted in the following diagram. If you can accept that when the connection is not available, the MobileVerify station does not work, then your setup is simple. If, however, you wish to be able to use the MobileVerify station even when the connection is not available, then you will need to set up a distributed ID database on the MobileVerify station. (For more information, refer to the Distributed ID Management Systems chapter in the Replication Administration User Guide.) Replication will then be used to keep the databases up to date with each other when they connect to the main revision 2 13

14 2: Setting Up a Mobile Computer database. Replication is the bi-directional transaction exchange of cardholder records and download of system information. Scenario A: MobileVerify Client on a Wired System In scenario A, the simplest of all MobileVerify setups, a standard OnGuard client is used with the MobileVerify feature. In this scenario, there is a single database which resides on the server, and the client is connected via ethernet to the server. To set this scenario up: 1. On the server computer: a. Install the OnGuard software, making sure to select Server when prompted. b. Configure the hardware key. For more information, refer to Configuring the Hardware Key in the Installation Guide. Important: If you are using a software license you do not need to use a hardware key or install the Sentinel drivers. c. Install the OnGuard license using License Administration.For more information, refer to Install Your OnGuard License in the Installation Guide. d. Create the database by running Database Setup. e. Configure your custom MobileVerify interface in FormsDesigner. For more information, refer to Chapter 4: FormsDesigner Configuration on page 23. f. Configure the access control options. For more information, refer to Chapter 5: Access Control Configuration on page On the mobile computer, install the OnGuard software. Make sure to select Client when prompted. Scenario B: MobileVerify Client on a Wireless System Scenario B is essentially the same as Scenario A, with one exceptions: the network is wireless. In addition, Scenario B does not have a locally connected database. In this configuration, a standard OnGuard client with a wireless ethernet network card is used with the MobileVerify feature. If you are concerned about losing connectivity to the server, then set up Scenario C. 14 revision 2

15 MobileVerify User Guide Scenario C: Wireless Without Connection In scenario C, a MobileVerify client is connected to the server via wireless ethernet. Since it is possible that the MobileVerify client may lose its connection to the server, the server is set up as a Distributed ID Master server, and the MobileVerify client is configured as a Mobile Badging station. This means that there is a database on both the server and on the MobileVerify client. The databases are kept synchronized periodically by running Replicator. Replicator is run as a service on the MobileVerify client, and the MobileVerify client is set up to replicate with the server on a predetermined schedule. If this configuration is used and the connection fails, then an error message displays telling you this. You must then log out of the DSN that points to the server, and log back into OnGuard using a DSN that points to the database that is on the MobileVerify client. This process is not automatic; you must do this manually. Once you have logged into the DSN that points to the MobileVerify client s database, you can then function without the server. However, the information in your database is only as current as when your last replication occurred. Also, since the Communication Server generally runs on the server and you do not have a connection to the Communication Server, the Open Door command cannot be used. In this case, the person who is responsible for physical security would become responsible for granting access based on the OnGuard system s recommendation. Once the connection is re-established, Replicator should be run manually and used to perform a full upload and download as soon as possible to get the two databases synchronized. To set this scenario up: 1. On the server computer: a. Install the OnGuard software, making sure to select Server when prompted. b. Configure the hardware key. For more information, refer to Configuring the Hardware Key in the Installation Guide. Important: If you are using a software license you do not need to use a hardware key or install the Sentinel drivers. c. Install the OnGuard license using License Administration. For more information, refer to Install Your OnGuard License in the Installation Guide. d. Create the database by running Database Setup. e. Configure your custom MobileVerify interface in FormsDesigner. For more information, refer to Chapter 4: FormsDesigner Configuration on page 23. f. Configure the access control options. For more information, refer to Chapter 5: Access Control Configuration on page 39. revision 2 15

16 2: Setting Up a Mobile Computer Note: If the system is an Enterprise system, gates cannot be configured on the Master server. Gates are treated as hardware, so they must be added at a Regional server or MobileVerify station. 2. On the MobileVerify computer: a. Install a network card if the system will be configured to connect to the network and to the OnGuard server via B or G ethernet. b. Install the OnGuard software. Make sure to select Server when prompted. c. Configure the hardware key. For more information, refer to Configuring the Hardware Key in the Installation Guide. Important: If you are using a software license you do not need to use a hardware key or install the Sentinel drivers. d. Install the OnGuard license using License Administration. For more information, refer to Install Your OnGuard License in the Installation Guide. e. Create the database by running Database Setup. f. Log into Replication Administration and configure the database to be a Distributed ID Mobile Station. (For more information, refer to the Distributed ID Management Systems chapter in the Replication Administration User Guide.) g. Run a Replicator session. Make sure to select the following options: Download cardholder records from the master server (by selecting the Download cardholders/assets check box and selecting download options) Download system tables from the master server (by selecting the Download system records check box) Enterprise users: If you configured gates, select the Upload cardholders/assets/hardware records check box. h. Configure Replicator to run as a service. i. Configure a replication schedule. Replication for MobileVerify Systems The Replicator application is responsible for replication. Replication is the process of sending transactions up to the parent server and getting transactions from the parent server. Replicator is run on each Regional server or Mobile Station. It is the Regional server or Mobile Station that initiates replication. MobileVerify can be set up two different ways: With a constant connection to the server via a wireless network card, or 16 revision 2

17 MobileVerify User Guide As a standalone solution that gets synchronized with the server on an operational basis. When MobileVerify is set up with a constant connection, Replicator is run as a service. When set up as a standalone solution, Replicator is run as an application and is started manually. For information on how to run a Replicator session or to schedule Replication refer to the Replicator User Guide or online help. For additional information about replication, refer to the Replication Administration User Guide or online help. Scheduling Replication Traditional Mobile stations are designed to run Replicator manually (not as a service or scheduled). This configuration works off Distributed ID Masters, Enterprise Masters, and Enterprise Regions as the parent to the mobile. Mobile Enterprise does offer the option of setting up a mobile station with scheduled Replication which requires it to run as a service. This type of configuration IS NOT supported from an Enterprise Master. This type of mobile revision 2 17

18 2: Setting Up a Mobile Computer needs to have either a Regional server or Distributed ID Master as the mobile s parent system. The following table illustrates the differences between the two systems: System type Manual replication? Scheduled replication? Supported parent server types Master Region Distributed ID Master Traditional Mobile stations X X X X Mobile Enterprise X X X X 18 revision 2

19 MobileVerify Software Configuration

20

21 MobileVerify User Guide Chapter 3: License and Permissions License for MobileVerify MobileVerify is a licensed feature. The MobileVerify license is count-based; you are licensed to have a certain number of workstations. The number of workstations you are licensed to use is displayed in the Maximum Number of Mobile Verify Workstations (SWG-1470) setting in the Mobile Enterprise section of the license, as shown. Set Permissions to Use MobileVerify 1. From the Administration menu in System Administration, select Users. 2. Click the System Permission Groups tab. 3. Click [Add]. 4. If segmentation is not enabled, skip this step. If segmentation is enabled the Segment Membership window will open. a. Select the segment that this permission group will be assigned to. b. Click [OK]. 5. In the Group Name field, type a unique, descriptive name for this permission group. 6. On all sub-tabs, select the checkbox(es) that correspond to the capabilities you wish to include in this permission group. The MobileVerify tab contains the mobile verification options. a. Select the MobileVerify checkbox to allow the user to configure MobileVerify. b. Select the MobileVerify Administration checkbox to allow the user to perform MobileVerify administrative functions. c. Select the Change system-wide [threat level] checkbox to allow the user to change the system-wide force protection setting. This is done on revision 2 21

22 3: License and Permissions the System Settings form in the MobileVerify folder. To display the MobileVerify folder, select Administration > MobileVerify. Note: By default, the name of this field is Change system-wide [threat level]. However, the portion in italics may change depending on your configurations in FormsDesigner. For more information, refer to Chapter 4: FormsDesigner Configuration on page 23. d. Select the Gate configurations checkbox to allow the user to change MobileVerify user gate configurations. This is done on the Gates form in the MobileVerify folder. e. Select the MobileVerify Workstation Options checkbox to allow the user to configure MobileVerify workstation options. f. Select the Change gate assigned to workstation checkbox to allow the user to change the gate assigned to a workstation. This is done on the Gate Configuration sub-tab in the Workstations folder. g. You can select either the Change [threat level] setting to anything checkbox or the Change [threat level] setting to higher than default only checkbox. Note: By default, the names of these fields are Change [threat level] setting to anything checkbox and Change [threat level] setting to higher than default only. However, the portion in italics may change depending on your configurations in FormsDesigner. For more information, refer to Chapter 4: FormsDesigner Configuration on page Click [OK]. Select the Change [threat level] setting to anything checkbox to allow the user to change a particular gate s force protection setting to anything he/she chooses. Select the Change [threat level] setting to higher than default only checkbox to allow the user to change a particular gate s force protection setting to a setting higher than the default only. 22 revision 2

23 MobileVerify User Guide Chapter 4: FormsDesigner Configuration If you are working with an existing database, make sure to make a backup and verify that it is good before making changes in FormsDesigner! Configuration Sequence Before you can use MobileVerify, you must use FormsDesigner to configure both the database and the user interface to meet your needs. You must: 1. Add a Force Protection Setting page (optional). The alternative is to incorporate the MobileVerify fields and buttons onto the Cardholder page. The Cardholder page or a new page are the only places the MobileVerify fields can be added. For more information, refer to Add a Force Protection Setting Page (Optional) on page Add a cardholder Force Protection Setting field. For more information, refer to Add a Cardholder Force Protection Setting Field on page Create a recommendation label that displays a recommendation based on a comparison of the cardholder s force protection setting to the current system s force protection setting. For more information, refer to Create a Recommendation Label on page Create recommendation buttons for the recommendation label. For more information, refer to Create Recommendation Buttons on page Create a current gate setting label. For more information, refer to Create a Current Gate Setting Label on page Create a current settings label. For more information, refer to Create a Current Settings Label on page Save the page. For more information, refer to Save the Page on page 34. After FormsDesigner has been configured, the access control system can be configured. For more information, refer to Chapter 5: Access Control Configuration on page 39. revision 2 23

24 4: FormsDesigner Configuration Configuration Procedures Add a Force Protection Setting Page (Optional) 1. Decide what you want your user interface to look like. You can either choose to add the MobileVerify fields and buttons to the Cardholder page, or you can create a new page and add them there. For simplicity, these instructions will assume that you are adding a new page. 2. Start and log into FormsDesigner, if you have not already. Choose to open the Cardholder form when prompted. For more information, please refer to the Introduction chapter in the FormsDesigner User Guide. 3. From the Insert menu, select Page. The Pages window is displayed. 4. Click [Add]. 5. In the Name field, type Force Protection Setting, or any other name you would like the tab to be called, and then click [OK]. a. The Force Protection Setting page appears in the list box of the Pages window. b. Click [Close]. 6. A tab with the page s name is added to the main window. By default, it is positioned between the Cardholder and Badge pages. Add a Cardholder Force Protection Setting Field 1. Click the Force Protection Setting tab. 2. The first step is to add a drop-down list. From the Insert menu, select Drop-down List. a. Click and drag on the Force Protection Setting page to create a box to contain the object. Don t worry too much about size or placement; you can change these attributes later. 24 revision 2

25 MobileVerify User Guide b. The corresponding Properties folder will be opened with the Drop-down Settings form displayed. 1) In the Object name field type Force Protection Setting or any other name you wish to use. 2) In the Field name field type FORCEPROTECTION or any other name you wish to use. The name cannot contain spaces or special characters. 3) Select the Required checkbox if a value must be selected for every cardholder entered. 4) Click [OK]. 3. The second step is to add a label for the drop-down list. From the Insert menu, select Label. a. Click and drag on the Force Protection Setting page to create the label. b. The corresponding Properties folder will be opened with the Label Settings form displayed. revision 2 25

26 4: FormsDesigner Configuration 1) In the Object name field type Force Protection Setting Label or any other name you wish to use. 2) In the Text field type Force protection setting: or any other name you wish to use. 3) In the Assigned field drop-down list, select Force Protection Setting. 4) Click [OK]. 4. Adjust the size and placement of the drop-down list and label to suit your needs. Your page should look something like this so far: Create a Recommendation Label The recommendation label is where the grant or deny recommendation is displayed to the user. There can only be one recommendation label. The recommendation label is associated with the cardholder Force protection setting field. The cardholder s force protection setting is compared to the current system force protection setting, and an access recommendation is displayed. The recommendation label can display one of two possible recommendations. The actual text displayed for each recommendation can be changed, but the defaults are Grant and Deny. A grant recommendation will be displayed if the system s force protection setting is alphabetically equal to or greater than the cardholder s force protection setting. A deny recommendation will be displayed if the system s force protection setting is greater than the cardholder s force protection setting. The background color of the recommendation can be changed depending on the recommendation. By default, the background is red for a deny recommendation and green for a grant recommendation. The font of the text that is displayed (i.e., Grant or Deny) can also be changed in the same manner as with any other FormsDesigner label. To create a recommendation label: 1. From the Insert menu, select MobileVerify > Recommendation Label. 26 revision 2

27 MobileVerify User Guide 2. Click and drag on the Force Protection Setting page to create the label. 3. The corresponding Properties folder will be opened with the MobileVerify Settings form displayed. a. In the Drop-down to use for recommendation drop-down list, select Force Protection Setting. Note: The current Force Protection Setting is set in the System wide [threat level setting] drop-down list on the System Settings form in the MobileVerify folder in System Administration or ID CredentialCenter. b. In the When drop-down is less than current Force Protection Setting section: 1) By default, the text that is displayed on the label when a cardholder s force protection setting is less than the system s current force protection setting is Deny. You may use the default or type your own value in the Display text field. 2) By default, the color of the button is red. You may use the default or click the [Color] button and select a new color. c. In the When drop-down is equal or greater than current Force Protection Setting section: 1) By default, the text that is displayed on the label when a cardholder s force protection setting is equal to or greater than the system s current force protection setting is Grant. You may use the default or type your own value in the Display text field. 2) By default, the color of the button is green. You may use the default or click the [Color] button and select a new color. d. Click the General Settings tab. In the Object name field type Force Protection Recommendation Label or any other name you wish to use. e. Click [OK]. revision 2 27

28 4: FormsDesigner Configuration 4. Adjust the size and placement of the recommendation label to suit your needs. Your page should look something like this so far: Create Recommendation Buttons Recommendation buttons allow a user to grant or deny access to an individual. Each recommendation button can be associated with a reader so that an open door operation can take place. When an individual is granted or denied access and the recommendation button has been associated with a reader, the location of the individual is updated. There are several settings in FormsDesigner that determine how a recommendation button behaves. If the Allow thisbutton to override recommendation checkbox on the MobileVerify Recommendation Button form in FormsDesigner is selected for a button, then the button cannot be used unless the action matches the recommendation (i.e., grant access using the Grant button). Instead, a message is displayed that indicates an invalid operation. If the Prompt user to confirm override checkbox on the MobileVerify Recommendation Button form in FormsDesigner is selected for a button, then a warning is displayed if the recommendation does not follow the button operation selected. This is to prevent mistakes from being made, as well as to confirm the user s request. The names and display text in the instructions that follow are recommendations; you can change them to suit your needs. Be sure to keep track of what names you change because they may be referenced in future procedures. Although this example uses two buttons, Grant Access and Deny Access, you are not limited to two buttons. To create a recommendation button: 1. First create a Grant Access button. From the Insert menu, select MobileVerify > Recommendation Button. a. Click and drag on the Force Protection Setting page to create the button. 28 revision 2

29 MobileVerify User Guide b. The corresponding Properties folder will be opened with the MobileVerify Recommendation Button form displayed. 1) In the Object Name field, type Grant Access or any other name you wish to use. 2) In the Recommendation associated with button drop-down list, select Equal or greater than system setting. 3) The Allow this button to override recommendation checkbox is selected by default. This means a user will be able to override the system and deny access to a cardholder who is granted access. If the checkbox is not selected this means, if a cardholder is granted access, a user cannot override the system and deny the cardholder access. The override will be indicated in the transaction log. 4) If you selected the Allow this button to override recommendation checkbox, select whether to prompt the user to confirm an override of an access grant recommendation. 5) In the Display text field, type Grant Access, or any other text that you would like on the button. 6) Select whether to notify the user when the Grant Access recommendation button is clicked. If the Notify user when button is clicked checkbox is selected, then the user will receive a confirmation message each time the Grant Access recommendation button is clicked. 7) Click [OK]. revision 2 29

30 4: FormsDesigner Configuration 2. Adjust the size and placement of the recommendation button to suit your needs. Your page should now look something like this: 3. Next create a Deny Access button. From the Insert menu, select MobileVerify > Recommendation Button. a. Click and drag on the Force Protection Setting page to create the label. b. The corresponding Properties folder will be opened with the MobileVerify Recommendation Button form displayed. 1) In the Object Name field, type Deny Access or any other name you wish to use. 2) In the Recommendation associated with button drop-down list, select Less than system setting. 3) The Allow this button to override recommendation checkbox is selected by default. This means a user will be able to override the system and deny access to a cardholder who is granted access. If the checkbox is not selected this means, if a cardholder is granted 30 revision 2

31 MobileVerify User Guide access, a user cannot override the system and deny the cardholder access. The override will be indicated in the transaction log. 4) If you selected the Allow this button to override recommendation checkbox, select whether to prompt the user to confirm an override of an access grant recommendation. 5) In the Display text field, type Deny Access, or any other text that you would like on the button. 6) Select whether to notify the user when the Deny Access recommendation button is clicked. If the Notify user when button is clicked checkbox is selected, then the user will receive a confirmation message each time the Deny Access recommendation button is clicked. 7) Click [OK]. 4. Adjust the size and placement of the recommendation button to suit your needs. Your page should now look something like this: Create a Current Gate Setting Label 1. From the Insert menu, select MobileVerify > Current Gate Label. 2. Click and drag on the Force Protection Setting page to create the label. revision 2 31

32 4: FormsDesigner Configuration 3. The corresponding Properties folder will be opened with the MobileVerify Settings form displayed. a. In the Object name field, type Current Gate Label or any other name you wish to use. b. In the Styles section, select how you want the gate information to display in the label. c. Click [OK]. 4. The second step is to add a label for the drop-down list. From the Insert menu, select Label. a. Click and drag on the Force Protection Setting page to create the label. b. The corresponding Properties folder will be opened with the Label Settings form displayed. 1) In the Object name field type Current Gate Setting Label or any other name you wish to use. 2) In the Text field type Current gate setting: or any other name you wish to use. 3) Click [OK]. 32 revision 2

33 MobileVerify User Guide 5. Adjust the size and placement of the drop-down list and label to suit your needs. Your page should look something like this so far: Create a Current Settings Label 1. From the Insert menu, select MobileVerify > Current Setting Label. 2. Click and drag on the Force Protection Setting page to create the label. 3. The corresponding Properties folder will be opened with the MobileVerify Settings form displayed. a. In the Object name field, type Current Setting Label or any other name you wish to use. b. In the Styles section, select how you want the gate information to display in the label. c. Click [OK]. 4. The second step is to add a label for the drop-down list. From the Insert menu, select Label. a. Click and drag on the Force Protection Setting page to create the label. revision 2 33

34 4: FormsDesigner Configuration b. The corresponding Properties folder will be opened with the Label Settings form displayed. 1) In the Object name field type Current Setting or any other name you wish to use. 2) In the Text field type Current system/gate/user setting(s): or any other name you wish to use. 3) Click [OK]. 5. Adjust the size and placement of the drop-down list and label to suit your needs. Your page should look something like this so far: Save the Page 1. From the Form menu, select Save. 34 revision 2

35 MobileVerify User Guide 2. The following message will be displayed. 3. Select one of the following options: Save and DESTROY any existing user-defined cardholder data. This choice saves the current layout definition but destroys all user-defined cardholder data. Selecting this choice displays the following message: If you then click [Yes], the following things will happen: You will be prompted to authorize the removal of each user-defined drop-down list field The forms in the folder, accessed by end-users, will use the new layout definition that you created on the editable forms The database tables, as defined by the layout, will be recreated As a result, the user defined fields of all records that existed prior to that moment will be DESTROYED. Save and PRESERVE any existing user-defined cardholder data. This choice saves both the current layout definition and the user-defined cardholder data. If you choose this option, a message will be displayed indicating the current number of cardholder records and the total length of time that may be required to save the layout and data. Click [Yes] to proceed. 4. The form is saved, and Form saved! is displayed in the status bar. 5. Now perform a full download to the Distributed ID/Mobile Station so that the Forms Designer changes take effect. revision 2 35

36 4: FormsDesigner Configuration 36 revision 2

37 MobileVerify Operator Procedures

38

39 MobileVerify User Guide Chapter 5: Access Control Configuration Configuration Sequence Populate the force protection setting list Configure the system s force protection setting Configure gates Configure workstations Before configuring the access control system for MobileVerify: Readers must be configured in System Administration. For more information please refer to the Readers Folder chapter in the System Administration User Guide. FormsDesigner must be configured. For more information, refer to Chapter 4: FormsDesigner Configuration on page 23. After FormsDesigner has been configured, use System Administration or ID CredentialCenter to: 1. Populate the Force Protection Setting list. For more information, refer to Populate the Force Protection Setting List on page Configure the system s current force protection setting. For more information, refer to Configure the System s Force Protection Setting on page Configure gates. For more information, refer to Configure Gates on page Configure workstations. For more information, refer to Configure Workstations on page Assign force protection settings to cardholders. For more information, refer to Assign Force Protection Settings to Cardholders on page 44. Assign force protection settings to cardholders Configuration Procedures Populate the Force Protection Setting List 1. In System Administration or ID CredentialCenter, select List Builder from the Administration menu. The List Builder folder is displayed. revision 2 39

40 5: Access Control Configuration 2. From the listing window on the left side of the Simple Lists form, select Force Protection Setting. 3. Click [Add]. 4. In the List Contents field, type 1) Normal or any name you would like this force protection setting to be called, and then click [OK]. Force protection setting lists are usually based on one of the following: The Force Protection Condition (FPCON) system. The FPCON levels are Normal, Alpha, Bravo, Charlie, and Delta. Delta is the highest force protection setting, and Normal is the lowest. The List Contents field is sorted in alphabetical order, so you should enter the FPCON levels as follows: 1) Normal 2) Alpha 3) Bravo 4) Charlie 5) Delta The Defense Readiness Condition (DEFCON) system. Defense Readiness Conditions are graduated to match situations of varying military severity (status of alert). DEFCON 1 is the highest readiness level and DEFCON 5 is the lowest. The List Contents field is sorted in alphabetical order, so you should enter the DEFCON levels as follows: 1) DEFCON 5 2) DEFCON 4 3) DEFCON 3 4) DEFCON 2 5) DEFCON 1 40 revision 2

41 MobileVerify User Guide 5. Repeat steps 3 and 4 to create additional force protection settings. When you have added all of your force protection settings, the Simple Lists form should look similar to the following: 6. Click [Close] to exit the List Builder folder. Configure the System s Force Protection Setting 1. In System Administration or ID CredentialCenter, select MobileVerify from the Administration menu. The MobileVerify folder opens. 2. Click [Modify]. 3. Select a force protection setting from the System wide [threat level] setting drop-down list. Notes: If your force protection settings are named 1) Normal, 2) Alpha, 3) Bravo, 4) Charlie, and 5) Delta, 5) Delta is the highest force protection setting, and 1) Normal is the lowest. If your force protection settings are named 1) DEFCON 5, 2) DEFCON 4, 3) DEFCON 3, 4) DEFCON 2 and 5) DEFCON 1, 1) DEFCON 5 is the lowest force protection setting and 5) DEFCON 1 is the highest. Force protection settings are defined in the List Builder folder. For more information, refer to Populate the Force Protection Setting List on page 39. By default, the name of this field is System wide [threat level] setting. However, the portion in italics may change depending on your configurations in FormsDesigner. For more information, refer to Chapter 4: FormsDesigner Configuration on page Click [OK]. revision 2 41

42 5: Access Control Configuration Configure Gates Note: For Enterprise systems, hardware cannot be added in the Master server database. Therefore, the gates must be configured in the MobileVerify station database. 1. In System Administration or ID CredentialCenter, select MobileVerify from the Administration menu. The MobileVerify folder opens. 2. Select the Gates tab. 3. Click [Add]. 4. In the Name field, type in the name of the gate. This name helps identify the gate, point, or area that is being protected. It is used in reports and the user transaction history as well as alarms in Alarm Monitoring. This is strictly a logical name and can be anything. For example: Parking lot A gate. 5. From the [threat level] setting drop-down list, select this gate s force protection setting. This setting will override the system setting level. This setting is needed so that a workstation can use a different system setting for other areas in the facility that may require a specific security level. Selecting this setting is optional; the default is to use the standard system setting. Notes: Force protection settings are configured in the List Builder folder. For more information, refer to Populate the Force Protection Setting List on page 39. When the <Use system setting> choice is selected, the system will use the setting selected in the System wide [threat level] field on the System Settings form in this folder. By default, the name of this field is [threat level] setting. However, the portion in italics may change depending on your configurations in FormsDesigner. For more information, refer to Chapter 4: FormsDesigner Configuration on page Select the Allow higher system setting to override checkbox if you want higher system wide force protection settings (configured on the System Settings form) to override the gate s force protection setting. 7. To configure the UI control for a grant (for example, when a guard receives a grant recommendation and selects the grant button, a specific door opens): a. Click [Add]. The Select UI Control/Reader window is displayed. 42 revision 2

43 MobileVerify User Guide b. From the UI control drop-down list, select Grant Access. Note: The drop-down list options depend on what you named your recommendation buttons in FormsDesigner. For more information, refer to Create Recommendation Buttons on page 28. c. From the Reader drop-down list, select the name of the reader that corresponds to this gate. This is optional - you do not have to associate a recommendation button with a reader. Doing so will cause an open door operation to occur on that reader when the button is depressed. If a reader has an area entering or area leaving associated with it, then the occupancy for each area will automatically be updated. d. Click [OK]. 8. To configure the UI control for a deny, repeat step 7. However, this time make sure to select Deny Access (or whatever your recommendation button is named), in the UI control drop-down list. 9. On the Gates form, click [OK]. Configure Workstations 1. In System Administration or ID CredentialCenter, select Workstations from the Administration menu. The Workstations folder opens. 2. Click [Add]. 3. In the Name field, do one of the following: Type the name of the existing or planned workstation that you wish to describe. Click [Browse] and select the name from the displayed list. Note: You are required to enter the workstation s NetBIOS name. (The NetBIOS name is specified when Windows networking is installed/configured.) 4. If you do not wish to configure an activity printer, skip this step. Otherwise, select the Activity Printer sub-tab. a. Select the Has device checkbox. b. Select the options that are appropriate for the device. 5. If you do not wish to configure a CCTV controller, skip this step. Otherwise, select the CCTV Controller sub-tab. a. Select the Has device checkbox. b. Select the options that are appropriate for the device. 6. If you do not wish to configure a video capture device, skip this step. Otherwise, select the Video Capture Device sub-tab. a. Select the Has device checkbox. b. Select the options that are appropriate for the device. 7. Configure gates: revision 2 43

44 5: Access Control Configuration a. Select the Gate Configuration sub-tab. b. From the Gate settings drop-down list, select the name of the gate that you want to be associated with this workstation. Note: Gates are configured on the Gates form in the MobileVerify folder. For more information, refer to Configure Gates on page Click [OK]. Assign Force Protection Settings to Cardholders Note: This procedure assumes that cardholder records have already been added to the database. For more information on adding cardholder records, please refer to the Cardholders Folder chapter in either the System Administration or ID CredentialCenter User Guide. 1. In System Administration or ID CredentialCenter, select Cardholders from the Administration menu. The Cardholders folder is displayed. 2. Select the Force Protection Setting tab. Notes: This step assumes that you created a Force Protection Setting page in FormsDesigner. For more information, refer to Add a Force Protection Setting Page (Optional) on page 24. If all the fields you set up in FormsDesigner are not visible on the Force Protection Setting page, verify that the permissions are set correctly. For more information, refer to Set Permissions to Use MobileVerify on page Locate the cardholder record that you want to assign a force protection setting to. To do this: a. Click [Search]. b. From the Person type drop-down list, select the type of record you want to search. Choices are: All - when selected, your search will locate both cardholder and visitor records. Cardholders - when selected, your search will only locate cardholder records. Visitors - when selected, your search will only locate visitor records. Note: The Person type drop-down list is subject to licensing restrictions. If this field is not displayed, move on to the next step. 44 revision 2

45 MobileVerify User Guide c. Specify your search criteria by typing full or partial entries in the enabled fields. d. Click [OK]. e. OnGuard retrieves and displays the first matching record. Use the,,,,, and buttons to navigate through the database. A dimmed button means that the associated operation is not possible (e.g., moving to the next record while the last record is being displayed). 4. Click [Modify]. 5. Select a force protection setting from the Force Protection Setting dropdown list. Notes: If your force protection settings are named 1) Normal, 2) Alpha, 3) Bravo, 4) Charlie, and 5) Delta, 5) Delta is the highest force protection setting, and 1) Normal is the lowest. If your force protection settings are named 1) DEFCON 5, 2) DEFCON 4, 3) DEFCON 3, 4) DEFCON 2, and 5) DEFCON 1, 1) DEFCON 5 is the lowest force protection setting and 5) DEFCON 1 is the highest. For more information, refer to Populate the Force Protection Setting List on page 39. The name of this field may be different depending on your configurations in FormsDesigner. For more information, refer to Chapter 4: FormsDesigner Configuration on page Click [OK]. 7. Repeat steps 3-5 for each cardholder that you want to assign a force protection setting to. revision 2 45

46 5: Access Control Configuration 46 revision 2

47 MobileVerify User Guide Chapter 6: Verification and User Procedures Verification Sequence Verification is the process of determining whether a person should be granted access. The cardholder presents their credential, and you search for the badge id. The cardholder s force protection setting is then compared to the current system force protection setting. If the cardholder s force protection setting is less than the current system force protection setting, then OnGuard returns an access grant recommendation. The guard can override that decision and decide to deny access if the Allow user to override Deny checkbox is selected. If the cardholder s force protection setting is higher than the current system force protection setting, then the person is not allowed access according to the OnGuard software. The guard can override that decision and grant the person access if the Allow user to override Grant checkbox is selected. However, it is logged and the person becomes the guard s responsibility. To determine whether a cardholder is allowed access: 1. Search for the cardholder s badge ID. For more information, refer to Search for a Badge ID on page The system will compare the cardholder s assigned force protection setting with the current system force protection setting to determine the access recommendation. 3. Deny or grant the cardholder access. If overriding an access recommendation, a confirmation may be needed depending on how the system is configured. 4. The transaction will then be logged to the database. The basic and advanced verification process diagrams that follow illustrate this process. revision 2 47

48 6: Verification and User Procedures Verification Process Without Override Permissions Diagram This diagram illustrates the verification process when the Allow user to override Deny and the Allow user to override Grant checkboxes on the Mobile Verify Settings form in FormsDesigner are NOT selected. Search for the badge ID Is the cardholder s force protection setting equal to or greater than the current system force protection setting? No Yes Access grant recommendation received Access deny recommendation received Cardholder granted access Cardholder denied access Door opens and area the cardholder is associated with is updated Transaction logged 48 revision 2

49 MobileVerify User Guide Verification Process With Override Permissions Diagram This diagram illustrates the verification process when the Allow user to override Deny checkbox and/or the Allow user to override Grant checkbox on the Mobile Verify Settings form in FormsDesigner are selected. Search for the badge ID Is the cardholder s force protection setting equal to or greater than the current system force protection setting? Yes Access grant recommendation received Access deny recommendation received If Access grant recommendation was received Does the guard have permission to override the access grant or deny recommendation? If Access deny recommendation was received Yes No No Does the guard grant access? No If overriding an access grant recommendation, a confirmation may be required Yes If overriding an access deny recommendation, a confirmation may be required Cardholder granted access Cardholder denied access Door opens and area the cardholder is associated with is updated Transaction(s) logged revision 2 49

50 6: Verification and User Procedures Search for a Badge ID You can search for a badge ID by either typing the badge number directly into the keyboard, by using a wedge reader, or by using a barcode scanner. Search Using a Keyboard OnGuard has the ability to search for a badge ID from the Cardholders folder by simply typing in the badge ID when in view mode. To do this: 1. If the Cardholders folder is not already open, open it by selecting Cardholders from the Administration menu. The Cardholders window must be the active window. 2. On either the main keyboard or on the numeric keypad, type the badge number you wish to search for. The following window will automatically open, and the number you type will appear in it: 3. Click [OK] or press <Enter>. a. If the badge ID exists in the system, the cardholder record associated with that badge number will automatically be opened. b. If the badge ID does not exist in the system, all fields in the Cardholders folder will be blank. Wedge Reader OnGuard also has the ability to search for a badge ID from the Cardholders folder by attaching a wedge reader to the keyboard, and then using the reader to scan badge IDs as direct keyboard input. Configure a Wedge Reader How the OnGuard system interprets the information it receives from a wedge reader can be configured by doing the following: 1. In System Administration, select Cardholders from the Administration menu. 2. Select Keyboard Wedge Settings from the Cardholder menu. 50 revision 2

51 MobileVerify User Guide 3. The Keyboard Wedge Settings window opens. a. Specify the Table and Field you wish to search on when keyboard input is detected. By default, the system searches on the ID field in the BADGE table. If for example you wanted to search based on social security number instead of badge ID, you would select the SSNO field in the EMP table. b. If CAC (Common Access Card) barcodes will be used, select the If length of input exceeds limit, assume CAC barcode checkbox and specify the limit. This allows military code 3of9 barcodes to be scanned and decoded into the cardholder s social security number. If you do not wish to use this feature, leave this checkbox deselected. c. Select whether to ignore non-numeric data. By default, the Ignore nonnumeric data checkbox is selected. This is important for scans that include dashes in the social security number. d. Specify the maximum length in the Max length field. A maximum length must be provided so that wedge scanners that do not automatically provide a line feed carriage return can be used as long as the length of the scan is always the same (i.e., social security number). e. Specify the start and end. In a string of numbers that contains a search criteria (typically social security number or badge ID), start and end are the first and last position, respectively, that contain the search criteria. f. Click [OK]. Search Using a Wedge Reader 1. Attach a wedge reader to the keyboard. 2. Use the wedge reader to scan the badge. revision 2 51

52 6: Verification and User Procedures 3. The following window will automatically open, and the number scanned will appear in the window: 4. Click [OK] or press <Enter>. a. If the badge ID exists in the system, the cardholder record associated with that badge number will automatically be opened. b. If the badge ID does not exist in the system, all fields in the Cardholders folder will be blank. Note: The system can be configured to search on any field, not just the Badge ID. For more information, refer to Configure a Wedge Reader on page 50. Change a Workstation s Gate Association Since MobileVerify is designed to work with mobile workstations, it is important to be able to easily change what gate a mobile workstation is associated with. For example, a mobile unit using MobileVerify to protect a car lane (lane A) may be asked to move to another lane (lane B), or may be asked to protect an entirely new area. 1. Select the Cardholder option from the Administration menu. 2. Select the MobileVerify option from the Cardholder menu. 3. In the Current gate drop-down listbox, select the gate that the workstation will be associated with. 4. Click [OK]. 52 revision 2

53 MobileVerify User Guide Chapter 7: Change System Settings Change the Gate a Cardholder is Associated With 1. In System Administration or ID CredentialCenter, display the Cardholders folder if it is not already. To do this, select Cardholders from the Administration menu. 2. Locate the cardholder whose gate association you wish to change. 3. From the Cardholder menu select MobileVerify. 4. The MobileVerify Options window opens. In the Current gate drop-down list, select the gate you wish to associate the cardholder with. 5. Click [OK]. revision 2 53

54 7: Change System Settings 54 revision 2

55 MobileVerify User Guide Chapter 8: MobileVerify Reports MobileVerify Reports OnGuard contains reporting functionality, which is available in the Reports folder in System Administration or ID CredentialCenter. The Reports folder is displayed by selecting Administration > Reports. For the types of MobileVerify reports that you can generate and a description of each, please refer to the following table. Report Name Description Report Type(s) MobileVerify User Transaction Log MobileVerify User Transaction Log, By Operation MobileVerify User Transaction Log, By User ID Global APB/Mobile Verify Occupancy, By Date Global APB/Mobile Verify Occupancy, By Name A chronological log of all transactions performed A chronological log of all transactions performed that is grouped by operation Chronological log of all transactions performed that is grouped by User ID Shows the last known area accessed by each cardholder, sorted by date and time Shows the last known area accessed by each cardholder, sorted by name User Transactions, Date/Time User Transactions, Date/Time User Transactions, Date/Time Anti-Passback, Cardholder, Date/ Time Anti-Passback, Cardholder, Date/ Time Note: For information on how to run a report, please refer to the Reports Folder chapter in the System Administration or ID CredentialCenter User Guide. Determine Occupancy for an Area A report can be generated that allows you to determine who is in an area (via MobileVerify). For example, if you are using MobileVerify at a gate to a weapons compound, the commanding officer of the base could immediately know who is currently in the weapons compound. revision 2 55

56 8: MobileVerify Reports 56 revision 2

57 MobileVerify User Guide Glossary Alarm Monitoring Barcode reader Defense Readiness Condition (DEFCON) Force Protection Condition (FPCON) FormsDesigner Hazardous location ID CredentialCenter License Administration Muster report An application that displays incoming alarms and events as they occur at the access control field hardware. An input device equipped with a stylus that scans a barcode. The device then converts the bar code into a number displayed on-screen. A uniform system of progressive alert postures. Defense Readiness Conditions are graduated to match situations of varying military severity (status of alert). DEFCON 1 is the highest readiness level and DEFCON 5 is the lowest. Security program designed to protect soldiers, civilian employees, family members, facilities, and equipment in all locations and situations, accomplished through planned and integrated application of combatting terrorism, physical security, operations security, personal protective services, and supported by intelligence, counterintelligence, and other security programs. The FPCON levels are Normal, Alpha, Bravo, Charlie, and Delta. Delta is the highest force protection setting, and Normal is the lowest. An application that enables you to customize the appearance and functionality of the forms in the Cardholders folder. A type of area configured in System Administration. An application that is used to add cardholder records to the database and manage cardholder information, including capturing photos/signatures, creating and printing ID badges, and defining access levels. A web application used to install new licenses, view installed licenses, and view the license server log. A report that lists all of the cardholders who are currently in a hazardous location. PC card A computer device packaged in a small card about the size of a credit card and conforming to the PCMCIA standard. PC card cover Port replicator Radio Frequency Identification (RFID) System Administration Wedge reader A cover that fits over the PC card slots on a mobile PC to keep dirt out. A device containing common PC ports, such as serial and parallel ports, that plugs into a notebook computer. The purpose of the device is to allow you to easily attach a portable computer to standard, non-portable devices such as a printer and monitor. For example, if you use a computer both at home and at work, you could set up both work areas with a port replicator. Then, you just plug in your notebook computer to the port replicator at either location and you're ready to work. A data collection technology similar to barcode identification that uses electronic tags to store identification data and a wireless transmitter gun to capture it. The tag, which is also known as an electronic label, transponder or code plate, gets its power from the gun. An application that is used to configure your access control and alarm monitoring environments, including all access control hardware devices, non-hardware system features, and user permissions. A barcode reader that connects to a PC. The wedge lets you scan a barcode and enters the data into the PC as if it were typed at the keyboard. revision 2 57

58 Glossary 58 revision 2

59 MobileVerify User Guide Index A Access control configuration Add cardholder Force Protection Setting field Force Protection Setting page Alarm Monitoring Assign force protection settings to cardholders.. 44 B Barcode reader Buttons Deny Access Grant Access C Change the gate a cardholder is associated with. 53 Configuration sequence access control FormsDesigner Configure gates Configure the system s force protection setting. 41 Conventions used in this documentation Create current gate setting label current settings label recommendation buttons recommendation label Current gate setting label Current settings label D Defense Readiness Condition (DEFCON) Deny Access button Determine occupancy for an area F Force Protection Condition (FPCON) Force Protection Setting add a cardholder Force Protection Setting field 24 add a Force Protection Setting page assign to cardholders configure the system s Force Protection Setting 41 populate the Force Protection Setting list FormsDesigner configuration definition G Gate configuration Gates change gate cardholder is associated with configure create a current gate setting label Grant Access button H Hazardous location I ID CredentialCenter K Keyboard using to locate a badge number L License Administration License for MobileVerify List Builder use to populate the force protection setting list 39 M MobileVerify configurations overview... 9 reports Muster report P PC card definition PC card cover Populate the Force Protection Setting list Port replicator Procedures add a cardholder Force Protection Setting field 24 add a Force Protection Setting page assign force protection settings to cardholders. 44 change the gate a cardholder is associated with 53 configure gates configure the system s force protection setting revision 2 59

60 Index 41 create a current gate setting label create a current settings label create a recommendation label create recommendation buttons determine occupancy for an area populate the Force Protection Setting list save the page search for a badge ID R Radio Frequency Identification (RFID) Replication MobileVerify systems scheduling S Save the page Search for a badge ID Set permissions to use MobileVerify Setting up the mobile PC System Administration V Verification sequence W Wedge reader... 50, revision 2

61 MobileVerify User Guide revision 2 61

62 Lenel Systems International, Inc Pittsford-Victor Road Pittsford, New York USA Tel Fax

Area Access Manager User Guide

Area Access Manager User Guide Area Access Manager User Guide PERPETUAL INNOVATION Lenel OnGuard 2012 Area Access Manager User Guide, product version 6.5 This guide is part 2 of a 2-document suite, item number DOC-800, revision 2.003,

More information

Visitor Management Host User Guide

Visitor Management Host User Guide Visitor Management Host User Guide PERPETUAL INNOVATION Lenel OnGuard 2010 Visitor Management Host User Guide, product version 6.4 This guide is item number DOC-802, revision 1.038, April 2010 Copyright

More information

Area Access Manager (Browser-based Client) User Guide

Area Access Manager (Browser-based Client) User Guide Area Access Manager (Browser-based Client) User Guide PERPETUAL INNOVATION Lenel OnGuard 2010 Area Access Manager (Browser-based Client) User Guide, product version 6.4 This guide is item number DOC-961,

More information

7.2. Visitor Management Host User Guide

7.2. Visitor Management Host User Guide 7.2 Visitor Management Host User Guide Lenel OnGuard 7.2 Visitor Management Host User Guide This guide is item number DOC-802, revision 6.005, October 2015 2015 United Technologies Corporation. All rights

More information

Visitor Management Host User Guide

Visitor Management Host User Guide Visitor Management Host User Guide Table of Contents CHAPTER 1 Introduction............................................. 5 Conventions Used in this Documentation.............................................5

More information

FormsDesigner User Guide

FormsDesigner User Guide FormsDesigner User Guide PERPETUAL INNOVATION Lenel OnGuard 2010 FormsDesigner User Guide, product version 6.4 This guide is item number DOC-202, revision 1.025, April 2010 Copyright 1995-2010 Lenel Systems

More information

Visitor Management User Guide

Visitor Management User Guide Visitor Management User Guide PERPETUAL INNOVATION Lenel OnGuard 2012 Visitor Management User Guide, product version 6.5 This guide is part 1 of a 2-document suite, item number DOC-800, revision 2.016,

More information

Area Access Manager User Guide

Area Access Manager User Guide Area Access Manager User Guide Area Access Manager User Guide Table of Contents Chapter 1: Introduction...9 Conventions Used in this Documentation... 9 Getting Started... 10 Licensing Requirements...

More information

Alarm Monitoring User Guide

Alarm Monitoring User Guide Alarm Monitoring User Guide ReadykeyPRO Unlimited, Version 6.5 Bosch ReadykeyPRO Unlimited Alarm Monitoring User Guide, product version 6.5 This guide is part 1 of a 2-document suite, item number DOC-201-01-2-026,

More information

ALARM MONITORING USER GUIDE

ALARM MONITORING USER GUIDE ONGUARD ET ALARM MONITORING USER GUIDE Lenel OnGuard ET Alarm Monitoring User Guide, product version 5.10.210 This guide is part 1 of a 2-document suite, Item number DOC-203, revision 63, September 2002

More information

VideoViewer (Browser-based Client)

VideoViewer (Browser-based Client) VideoViewer (Browser-based Client) PERPETUAL INNOVATION Lenel OnGuard 2012 VideoViewer (Browser-based Client), product version 6.5 This guide is item number DOC-960, revision 2.005, December 2011 Copyright

More information

BadgeDesigner User Guide

BadgeDesigner User Guide BadgeDesigner User Guide PERPETUAL INNOVATION Lenel OnGuard 2012 BadgeDesigner User Guide, product version 6.5 This guide is part 2 of a 2-document suite, item number DOC-300, revision 2.010, March 2012

More information

UL 1981 Compliance Option Setup and User Guide

UL 1981 Compliance Option Setup and User Guide 2013 UL 1981 Compliance Option Setup and User Guide PERPETUAL INNOVATION Lenel OnGuard 2013 UL 1981 Compliance Option Setup and User Guide, product version 6.6. This guide is part 1 of a 1-document suite,

More information

7.2. DESFire Card Template XML Specifications

7.2. DESFire Card Template XML Specifications 7.2 DESFire Card Template XML Specifications Lenel OnGuard 7.2 DESFire Card Template XML Specifications This guide is item number DOC-1101, revision 6.005, November 2015. 2015 United Technologies Corporation,

More information

Portions of this product were created using LEADTOOLS LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS LEAD Technologies, Inc. ALL RIGHTS RESERVED. Upgrade Guide Lenel OnGuard 2010 Upgrade Guide, product version 6.4. This guide is item number DOC-120, revision 1.053, May 2010 Copyright 1995-2010 Lenel Systems International, Inc. Information in this

More information

De La Salle University Information Technology Center. Microsoft Windows SharePoint Services and SharePoint Portal Server 2003

De La Salle University Information Technology Center. Microsoft Windows SharePoint Services and SharePoint Portal Server 2003 De La Salle University Information Technology Center Microsoft Windows SharePoint Services and SharePoint Portal Server 2003 WEB DESIGNER / ADMINISTRATOR User s Guide 2 Table Of Contents I. What is Microsoft

More information

Smart Access Control System Software. User Manual. Version 1.0

Smart Access Control System Software. User Manual. Version 1.0 Smart Access Control System Software User Manual Version 1.0 Copyright MaCaPS International Ltd. 2002 This manual was produced by MaCaPS International Ltd. MaCaPS International Ltd. http://www.macaps.com.hk

More information

TEKLYNX LABEL ARCHIVE

TEKLYNX LABEL ARCHIVE TEKLYNX LABEL ARCHIVE U S E R G U I D E LABEL ARCHIVE User Guide DOC-LAS2012-QSM-US-2007013 The information in this manual is not binding and may be modified without prior notice. Supply of the software

More information

C CURE 800/8000 REPORTS GUIDE. Version 9.1 REVISION A0

C CURE 800/8000 REPORTS GUIDE. Version 9.1 REVISION A0 C CURE 800/8000 Version 9.1 REPORTS GUIDE REVISION A0 Software House 70 Westview Street Lexington, MA 02421 http://www.swhouse.com Fax: 781-466-9550 Phone: 781-466-6660 C CURE 800/8000, apc, Software House,

More information

Sage Estimating (SQL) v17.11

Sage Estimating (SQL) v17.11 Sage Estimating (SQL) v17.11 Installation and Administration Guide July 2017 This is a publication of Sage Software, Inc. 2017 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos,

More information

Perceptive TransForm E-Forms Manager 8.x. Installation and Configuration Guide March 1, 2012

Perceptive TransForm E-Forms Manager 8.x. Installation and Configuration Guide March 1, 2012 Perceptive TransForm E-Forms Manager 8.x Installation and Configuration Guide March 1, 2012 Table of Contents 1 Introduction... 3 1.1 Intended Audience... 3 1.2 Related Resources and Documentation... 3

More information

Access Gateway Client User's Guide

Access Gateway Client User's Guide Sysgem Access Gateway Access Gateway Client User's Guide Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective holders. 2013-2015 Sysgem

More information

Firewall Enterprise epolicy Orchestrator

Firewall Enterprise epolicy Orchestrator Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Sage 300 Construction and Real Estate (formerly Sage Timberline Office)

Sage 300 Construction and Real Estate (formerly Sage Timberline Office) Sage 300 Construction and Real Estate (formerly Sage Timberline Office) Version 16.1 User's Guide This is a publication of Sage Software, Inc. 2017 The Sage Group plc or its licensors. All rights reserved.

More information

CSSN Scanshell.Net USER GUIDE

CSSN Scanshell.Net USER GUIDE CSSN Scanshell.Net USER GUIDE Version 1.0.3, 2005 This publication contains proprietary information of the Card Scanning Solutions Company, provided for customer use only. No other uses are authorized

More information

LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional

LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional Installation Guide for LiNC-NXG 33-10067-001 REV: C PCSC 3541 Challenger Street Torrance, CA 90503

More information

Sage Estimating (SQL) v17.13

Sage Estimating (SQL) v17.13 Sage Estimating (SQL) v17.13 Sage 100 Contractor (SQL) Integration Guide December 2017 This is a publication of Sage Software, Inc. 2017 The Sage Group plc or its licensors. All rights reserved. Sage,

More information

Learn how to login to Sitefinity and what possible errors you can get if you do not have proper permissions.

Learn how to login to Sitefinity and what possible errors you can get if you do not have proper permissions. USER GUIDE This guide is intended for users of all levels of expertise. The guide describes in detail Sitefinity user interface - from logging to completing a project. Use it to learn how to create pages

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services Evaluation Guide for Windows November 2017 (release 2017.2) Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

Copyright Jetro Platforms, Ltd. All rights reserved.

Copyright Jetro Platforms, Ltd. All rights reserved. Important Notice Copyright 2001 2009 Jetro Platforms, Ltd. All rights reserved. This document is furnished by Jetro Platforms for information purposes only to licensed users of the Jetro COCKPIT product.

More information

NVR 3 Workstation for Mac OS

NVR 3 Workstation for Mac OS NVR 3 Workstation for Mac OS User s Manual For Version 3.0.09 2015/01/27 About This Manual Target Audience This manual is intended for End Users who actually execute security tasks such as monitoring activities,

More information

Introduction to IBM Rational HATS For IBM System i (5250)

Introduction to IBM Rational HATS For IBM System i (5250) Introduction to IBM Rational HATS For IBM System i (5250) Introduction to IBM Rational HATS 1 Lab instructions This lab teaches you how to use IBM Rational HATS to create a Web application capable of transforming

More information

Code Check TM Software Requirements Specification

Code Check TM Software Requirements Specification Code Check TM Software Requirements Specification Author: Richard McKenna Debugging Enterprises TM Based on IEEE Std 830 TM -1998 (R2009) document format Copyright 2017 Debugging Enterprises No part of

More information

FileMaker, Inc. All Rights Reserved. Document Version 2.0 FileMaker, Inc Patrick Henry Drive Santa Clara, California FileMaker

FileMaker, Inc. All Rights Reserved. Document Version 2.0 FileMaker, Inc Patrick Henry Drive Santa Clara, California FileMaker User s Guide 2003-2004 FileMaker, Inc. All Rights Reserved. Document Version 2.0 FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc., registered

More information

EMC SourceOne Management Pack for Microsoft System Center Operations Manager

EMC SourceOne Management Pack for Microsoft System Center Operations Manager EMC SourceOne Management Pack for Microsoft System Center Operations Manager Version 7.2 Installation and User Guide 302-000-955 REV 01 Copyright 2005-2015. All rights reserved. Published in USA. Published

More information

child check-in quick start version 12

child check-in quick start version 12 child check-in quick start version 12 CHILD CHECK IN OVERVIEW Check In / Out Process The child check in system in Roll Call allows you to check students into their classes, record attendance and print

More information

Introduction. User Privileges. PEPFAR SharePoint: Poweruser Guide

Introduction. User Privileges. PEPFAR SharePoint: Poweruser Guide PEPFAR SharePoint: Poweruser Guide Introduction Welcome to your role as a Poweruser of a PEPFAR SharePoint site! This guide will give you an overview of your roles and responsibilities in maintaining the

More information

T E K L Y N X LABEL ARCHIVE

T E K L Y N X LABEL ARCHIVE T E K L Y N X LABEL ARCHIVE WEB GUIDE LABEL ARCHIVE Web Guide The information in this manual is not binding and may be modified without prior notice. Supply of the software described in this manual is

More information

FDM RMS User Guide. Basic Navigation & Use

FDM RMS User Guide. Basic Navigation & Use FDM RMS User Guide Basic Navigation & Use Revised: May 31, 2016 Contents Contents... 1 Administrator Contacts... 3 Introduction... 3 Overview... 3 1 Logging In... 4 1.1 Log in to Citrix... 4 1.1.1 Change

More information

Networking TSW. 1 Purpose of TSW Network

Networking TSW. 1 Purpose of TSW Network Networking TSW Networking PCs with the STRONGVON Administration Software on a LAN 1 Purpose of TSW Network You can network multiple computers on a local area network (LAN) to manage multiple parts of your

More information

Parallels Helm Initial Setup Guide REVISION 1.0

Parallels Helm Initial Setup Guide REVISION 1.0 Parallels Helm Parallels Helm 4.2.2 Initial Setup Guide REVISION 1.0 Legal and Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:

More information

Resolved Issues for OnGuard 7.1 and Updates

Resolved Issues for OnGuard 7.1 and Updates UTC Fire & Security Americas Corporation, Inc. 1212 Pittsford-Victor Road Pittsford, New York 14534 Tel 866.788.5095 Fax 585.248.9185 www.lenel.com Resolved Issues for OnGuard 7.1 and Updates Contents

More information

Creating Interactive PDF Forms

Creating Interactive PDF Forms Creating Interactive PDF Forms Using Adobe Acrobat X Pro for the Mac University Information Technology Services Training, Outreach, Learning Technologies and Video Production Copyright 2012 KSU Department

More information

PassagePoint. PassagePoint. User Manual. Version 4.5

PassagePoint. PassagePoint. User Manual. Version 4.5 PassagePoint User Manual Version 4.5 STOPware Inc. Copyright 2005 1 Disclaimer STOPware, inc. makes no representations or warranties with respect to the contents or use of this manual, and specifically

More information

Getting Started With the Cisco PAM Desktop Software

Getting Started With the Cisco PAM Desktop Software CHAPTER 3 Getting Started With the Cisco PAM Desktop Software This chapter describes how to install the Cisco PAM desktop client software, log on to Cisco PAM, and begin configuring access control features

More information

Microsoft Windows SharePoint Services

Microsoft Windows SharePoint Services Microsoft Windows SharePoint Services SITE ADMIN USER TRAINING 1 Introduction What is Microsoft Windows SharePoint Services? Windows SharePoint Services (referred to generically as SharePoint) is a tool

More information

PaperClip32. Revision 2.0

PaperClip32. Revision 2.0 PaperClip32 Quick Start Guide Revision 2.0 Copyright Information Copyright 2003, PaperClip Software, Inc. The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Software,

More information

Keyscan Aurora Software

Keyscan Aurora Software Keyscan Aurora Software Advanced Features Multi-Threaded Communication: The dawn of a new age for access control. Aurora's all new communication structure provides simultaneous communication to all IP

More information

S2 NetBox v4.8 Basic End-User Admin Training

S2 NetBox v4.8 Basic End-User Admin Training S2 NetBox v4.8 Basic End-User Admin Training 4/8/16 S2 Security 1 Table of Contents Introduction... 3 Log into your NetBox System... 3 Person Records... 5 Accessing Person Records... 5 Content of a Person

More information

Karlen Communications

Karlen Communications Karlen Communications Karen McCall, M.Ed. Using Style Sets in Word 2007 and 2010 Phone: 1-519-442-2856 E-mail: info@karlencommunications.com Web: karlencommunications.com This material copyright 2010 Karen

More information

EXCEL BASICS: MICROSOFT OFFICE 2007

EXCEL BASICS: MICROSOFT OFFICE 2007 EXCEL BASICS: MICROSOFT OFFICE 2007 GETTING STARTED PAGE 02 Prerequisites What You Will Learn USING MICROSOFT EXCEL PAGE 03 Opening Microsoft Excel Microsoft Excel Features Keyboard Review Pointer Shapes

More information

Salto Offline Lock Integration Guide

Salto Offline Lock Integration Guide Salto Offline Lock Integration Guide August 2015 SATEON Salto Offline Lock Integration Guide Issue 1.0, released August 2015 Disclaimer Copyright 2015, Grosvenor Technology. All rights reserved. SATEON

More information

EMC Documentum My Documentum Desktop (Windows)

EMC Documentum My Documentum Desktop (Windows) EMC Documentum My Documentum Desktop (Windows) Version 7.2 User Guide EMC Corporation Corporate Headquarters: Hopkinton, MA 017489103 15084351000 www.emc.com Legal Notice Copyright 2003 2015 EMC Corporation.

More information

Perceptive TransForm E-Forms Manager

Perceptive TransForm E-Forms Manager Perceptive TransForm E-Forms Manager Installation and Setup Guide Version: 8.x Date: February 2017 2016-2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International Inc., registered

More information

STUDY ASSISTANT. Adding a New Study & Submitting to the Review Board. Version 10.03

STUDY ASSISTANT. Adding a New Study & Submitting to the Review Board. Version 10.03 STUDY ASSISTANT Adding a New Study & Submitting to the Review Board Version 10.03 Contents Introduction... 3 Add a Study... 3 Selecting an Application... 3 1.0 General Information... 3 2.0 Add Department(s)...

More information

Equitrac Embedded for Sharp OSA. Setup Guide Equitrac Corporation

Equitrac Embedded for Sharp OSA. Setup Guide Equitrac Corporation Equitrac Embedded for Sharp OSA 1.4 Setup Guide 2012 Equitrac Corporation Equitrac Embedded for Sharp OSA Setup Guide Revision Date Revision List November 1, 2012 Updated for Equitrac Office/Express 4.2.5

More information

Enterprise 3.4 RC1. Managing Alfresco Content from within Microsoft Office

Enterprise 3.4 RC1. Managing Alfresco Content from within Microsoft Office Enterprise 3.4 RC1 Managing Alfresco Content from within Microsoft Office Contents Copyright... 3 Typographic conventions...4 Introduction... 5 System requirements and prerequisites...5 Get started...6

More information

College of Pharmacy Windows 10

College of Pharmacy Windows 10 College of Pharmacy Windows 10 Windows 10 is the version of Microsoft s flagship operating system that follows Windows 8; the OS was released in July 2015. Windows 10 is designed to address common criticisms

More information

Privileged Access Management Android Access Console 2.2.2

Privileged Access Management Android Access Console 2.2.2 Privileged Access Management Android Access Console 2.2.2 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown

More information

Backup App V7. Quick Start Guide for Windows

Backup App V7. Quick Start Guide for Windows Backup App V7 Quick Start Guide for Windows Revision History Date Descriptions Type of modification 30 Jun 2016 First Draft New 25 Nov 2016 Added Restore Options to Ch 8 Restoring Data; Combined Technical

More information

MICROS e7 Version 3.3 Maintenance Release 2 ReadMe First

MICROS e7 Version 3.3 Maintenance Release 2 ReadMe First MICROS e7 Version 3.3 Maintenance Release 2 ReadMe First General Information About This Document ReadMe First is an introduction to the new features, enhancements and revisions added in Version 3.3 Maintenance

More information

The Quick Access Toolbar can be either just below the Title Bar or, as in this case, just above the ruler.

The Quick Access Toolbar can be either just below the Title Bar or, as in this case, just above the ruler. Table of Contents Ribbon... 3 Customizing the Ribbon and Quick Access Toolbars... 3 File Tab... 5 Print and Print Preview... 7 Working in Protected Mode... 8 Accessibility Checker... 9 Compatibility Changes

More information

Schema Inspector Utility User's Guide VERSION Copyright 2015 Jade Software Corporation Limited. All rights reserved.

Schema Inspector Utility User's Guide VERSION Copyright 2015 Jade Software Corporation Limited. All rights reserved. VERSION 7.0.12 Copyright 2015 Jade Software Corporation Limited. All rights reserved. Jade Software Corporation Limited cannot accept any financial or other responsibilities that may be the result of your

More information

C CURE 9000 Version Personnel Configuration Guide REVISION L0

C CURE 9000 Version Personnel Configuration Guide REVISION L0 C CURE 9000 Version 2.10 Personnel Configuration Guide REVISION L0 6 Technology Park Drive Westford, MA 01886 http://www.swhouse.com Fax: 978-577-4392 Phone: 978-577-4000 C CURE and Software House are

More information

Online Backup Manager v7 Quick Start Guide for Synology NAS

Online Backup Manager v7 Quick Start Guide for Synology NAS Online Backup Manager v7 Quick Start Guide for Synology NAS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication

More information

Tzunami Deployer HPE Content Exporter Guide Supports migration of EMC HPE Content Manager into Microsoft SharePoint using Tzunami Deployer

Tzunami Deployer HPE Content Exporter Guide Supports migration of EMC HPE Content Manager into Microsoft SharePoint using Tzunami Deployer Tzunami Deployer HPE Content Exporter Guide Supports migration of EMC HPE Content Manager into Microsoft SharePoint using Tzunami Deployer Version 3.2 Table of Contents PREFACE... II INTENDED AUDIENCE...

More information

HOW TO USE THIS GUIDE...1. The Company... 1 Contacting Xpediter Technology LLC... 1 This Guide... 2

HOW TO USE THIS GUIDE...1. The Company... 1 Contacting Xpediter Technology LLC... 1 This Guide... 2 Table of Contents HOW TO USE THIS GUIDE...1 The Company... 1 Contacting Xpediter Technology LLC... 1 This Guide... 2 Audience... 2 Summary of Contents... 2 Typographical Conventions... 3 Definition of

More information

Interactive Powerpoint. Jessica Stenzel Hunter Singleton

Interactive Powerpoint. Jessica Stenzel Hunter Singleton Interactive Powerpoint Jessica Stenzel Hunter Singleton Table of Contents iii Table of Contents Table of Contents... iii Introduction... 1 Basics of Powerpoint... 3 How to Insert Shapes... 3 How to Insert

More information

IT Training Services. SharePoint 2013 Getting Started. Version: 2015/2016 V1

IT Training Services. SharePoint 2013 Getting Started. Version: 2015/2016 V1 IT Training Services SharePoint 2013 Getting Started Version: 2015/2016 V1 Table of Contents ACCESSING SHAREPOINT SITE 1 IT Intranet SharePoint Site... 1 Create a SubSite... 1 DOCUMENT LIBRARIES 2 Create

More information

Multi-NVR Manager. Quick Start Configuration Usage

Multi-NVR Manager. Quick Start Configuration Usage Multi-NVR Manager Quick Start Configuration Usage 2014. All rights are reserved. No portion of this document may be reproduced without permission. All trademarks and brand names mentioned in this publication

More information

HindSight 20/20 Administrator s Guide version 5.4.1

HindSight 20/20 Administrator s Guide version 5.4.1 HindSight 20/20 Administrator s Guide version 5.4.1 August 2007 Copyright c 2007 DriveCam, Inc. All rights reserved. TABLE OF CONTENTS SOFTWARE CONFIGURATION 1 LOGGING ON FOR THE FIRST TIME 1 ADDING A

More information

Visitor Keeper User Guide

Visitor Keeper User Guide Vivax Corporation Visitor Keeper User Guide Version 2.30.09 Copyright 2011-2012 Vivax Corporation ALL RIGHTS RESERVED July 2012 Table of Contents Visitor Keeper Installation... 1 Installing Visitor Keeper

More information

The Distributor s Content Management Guide for subzero-wolf.com

The Distributor s Content Management Guide for subzero-wolf.com The Distributor s Content Management Guide for subzero-wolf.com Dear Distributor Partner Portal users, Please use this guide help you find your way around and assist you in editing Showroom detail page

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

RedBeam Inventory Tracking User Manual

RedBeam Inventory Tracking User Manual RedBeam Inventory Tracking User Manual Contact us at www.redbeam.com. Page 1 Table of Contents Table of Contents... 2 Overview... 4 RedBeam Inventory Tracking... 4 PC Prerequisites... 4 Mobile Computer

More information

Membership Scanning Guide

Membership Scanning Guide Membership Scanning Guide 021312 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,

More information

PowerPoint 2016 Building a Presentation

PowerPoint 2016 Building a Presentation PowerPoint 2016 Building a Presentation What is PowerPoint? PowerPoint is presentation software that helps users quickly and efficiently create dynamic, professional-looking presentations through the use

More information

etakeoff Bridge Training Guide

etakeoff Bridge Training Guide etakeoff Bridge Training Guide I Overview Pages 2-7 1 Getting Started 2 How does Bridge Work 3 Terms 4 Setup II Main Window Pages 8-15 1 Home Tab 2 Resource, Assignment & Estimate Detail Panes III Managing

More information

Schema Inspector Utility User s Guide V E R S I O N Copyright 2016 Jade Software Corporation Limited. All rights reserved.

Schema Inspector Utility User s Guide V E R S I O N Copyright 2016 Jade Software Corporation Limited. All rights reserved. User s Guide V E R S I O N 2016.0.01 Copyright 2016 Jade Software Corporation Limited. All rights reserved. Jade Software Corporation Limited cannot accept any financial or other responsibilities that

More information

Wavelink Communicator User Guide

Wavelink Communicator User Guide Wavelink Communicator User Guide wlc ug 10 20090331 Revised 4/6/09 ii Copyright 2009 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale, Utah

More information

Access Online. Reporting. User Guide. Version 1.9 Cardholder

Access Online. Reporting. User Guide. Version 1.9 Cardholder Access Online Reporting User Guide Version 1.9 Cardholder Contents Introduction... 1 Basic Steps... 2 Select a Report to Run... 3 Set Report Parameters... 5 Set Criteria... 7 Account Code Validation Status...

More information

The guide for the Merrill Mobile catalog available for tablet-based devices. Version 3.0

The guide for the Merrill Mobile catalog available for tablet-based devices. Version 3.0 User Guide The guide for the catalog available for tablet-based devices. Version 3.0 Table of Contents General Information... 3 Setup: At a Glance...4 Current ipad and Tablet Users... 5 For ipad: Step

More information

EXCEL BASICS: MICROSOFT OFFICE 2010

EXCEL BASICS: MICROSOFT OFFICE 2010 EXCEL BASICS: MICROSOFT OFFICE 2010 GETTING STARTED PAGE 02 Prerequisites What You Will Learn USING MICROSOFT EXCEL PAGE 03 Opening Microsoft Excel Microsoft Excel Features Keyboard Review Pointer Shapes

More information

Installation Instructions New and Upgrade

Installation Instructions New and Upgrade Wolters Kluwer Financial Services Medici Commercial Lending Documentation System Version 2015.2 Installation Instructions New and Upgrade November 2015 Copyright 2015 Wolters Kluwer Financial Services,

More information

Xerox Versant 3100 Press Stock Library Manager

Xerox Versant 3100 Press Stock Library Manager Software Version 8.0[0-9][0-9] Help Version 3.0 March 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or other

More information

Sage 300 Construction and Real Estate (formerly Sage Timberline Office)

Sage 300 Construction and Real Estate (formerly Sage Timberline Office) Sage 300 Construction and Real Estate (formerly Sage Timberline Office) Version 17.1 User's Guide This is a publication of Sage Software, Inc. 2017 The Sage Group plc or its licensors. All rights reserved.

More information

Contents. Protus Messaging Services User Guide Web Fax Merge

Contents. Protus Messaging Services User Guide Web Fax Merge Contents Protus Messaging Services User Guide Getting Started... 1 Setting up an account... 1 Requirements... 1 Logging In... 1 Sending a New... 2 Who are you sending your fax to?... 2 Sample Merge List...

More information

EasiShare Desktop User Guide

EasiShare Desktop User Guide Copyright 2016 by Inspire-Tech Pte Ltd. All rights reserved. All trademarks or registered trademarks mentioned in this document are properties of their respective owners. No part of this document may be

More information

Backup App v7. Quick Start Guide for Windows

Backup App v7. Quick Start Guide for Windows Backup App v7 Quick Start Guide for Windows Revision History Date Descriptions Type of modification 30 Jun 2016 First Draft New 25 Nov 2016 Added Restore Options to Ch 8 Restore Data; Combined Technical

More information

SharePoint 2010 Tutorial

SharePoint 2010 Tutorial SharePoint 2010 Tutorial TABLE OF CONTENTS Introduction... 1 Basic Navigation... 2 Navigation Buttons & Bars... 3 Ribbon... 4 Library Ribbon... 6 Recycle Bin... 7 Permission Levels & Groups... 8 Create

More information

Access Control Database User Manual

Access Control Database User Manual Access Control Database User Manual P/N 270961 Rev 1.0 25OCT01 DEVELOPED BY COPYRIGHT NOTICE TRADEMARKS CREDITS Edwards Systems Technology 6411 Parkland Drive Sarasota, FL 34243 (941) 739-4300 Copyright

More information

StoneLock Gateway Installation Manual. v.1.7

StoneLock Gateway Installation Manual. v.1.7 StoneLock Gateway Installation Manual v.1.7 TABLE OF CONTENTS SECTION 1 INSTALLATION PREREQUISITS SECTION 1.1 SYSTEM REQUIREMENTS SECTION 1.2 PACS REQUIREMENTS SECTION 1.3 MIGRATION SECTION 2 STONELOCK

More information

Status Web Evaluator s Guide Software Pursuits, Inc.

Status Web Evaluator s Guide Software Pursuits, Inc. Status Web Evaluator s Guide 2018 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 2 Installing Microsoft IIS... 2 Verifying Microsoft IIS Features... 9 Installing the

More information

CellaVision Proficiency Software

CellaVision Proficiency Software CellaVision Proficiency USER S MANUAL 2.3 CellaVision Proficiency Preface CellaVision is a trademark of CellaVision AB. All other trademarks used in this document are property of their respective owners.

More information

Parallels Helm System Setup Wizard REVISION 1.0

Parallels Helm System Setup Wizard REVISION 1.0 Parallels Helm Parallels Helm 4.2.2 System Setup Wizard REVISION 1.0 Legal and Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:

More information

Top Producer for Palm Handhelds

Top Producer for Palm Handhelds Top Producer for Palm Handhelds Quick Setup Top Producer Systems Phone number: 1-800-830-8300 Email: support@topproducer.com www.topproducer.com Fax: 604.270.6365 Top Producer for Palm handhelds Quick

More information

Thin Clients, Wireless Computers, Macs and Mobile Devices

Thin Clients, Wireless Computers, Macs and Mobile Devices Thin Clients, Wireless Computers, Macs and Mobile Devices Sales: 800.456.4522 Support: 800.888.8075 2016 Compulink Business Systems, Inc. All rights reserved. Thin Clients, Wireless Computers, Macs and

More information

Translation Tools Guide Release 9.2

Translation Tools Guide Release 9.2 [1]JD Edwards EnterpriseOne Tools Translation Tools Guide Release 9.2 E53537-01 October 2015 Describes how to use the Translation Tools to translate EnterpriseOne software products from a source language

More information

Command Center Access Control Software

Command Center Access Control Software Command Center Access Control Software NextgenID BioAxs System Family: Member Enrollment Primer Mailing Address: NextgenID, Ltd. 10226 San Pedro Suite 100 San Antonio, TX 78216 USA Contacts: Phone: (210)

More information

1. Launch and Log into Citrix and the CCURE 800 Application

1. Launch and Log into Citrix and the CCURE 800 Application The IS&T Campus Safety and Security Infrastructure Team (CSSI) provides a unified campus security infrastructure and environment, which brings together many systems under a single roof. CSSI uses the CCURE800

More information