Network Based Security Made Easy

Size: px
Start display at page:

Download "Network Based Security Made Easy"

Transcription

1 Network Based Security Made Easy Installation & User s Guide Technical Support: (651) ; Fax: ,

2 Table of Contents Copyright 2009 Access Specialties International, LLC... 1 Software License Agreement... 1 Technical Support... 1 Chapter 1 Welcome to FOCAL POINT... 2 Controlling Access... 2 Card Readers and Transactions... 2 Monitoring Activity... 2 Commands... 3 Chapter 2 FOCAL POINT Requirements... 3 Minimum PC Requirements for SQL Server Host... 3 Minimum PC Requirements for Workstations... 3 Technical Experience... 4 Chapter 3 System Components... 5 ASIDataServer... 5 Workstation... 5 SQL Server... 5 SQL Server Versions... 5 Installing SQL Server... 5 Scheduling Automatic Database Backups in SQL Server 2005 (Not possible in Express Version)... 6 Automatic Database Backups In SQL Server 2005 Express Chapter 4 Install FOCAL POINT Installation Options Stand-alone Networked Create & Access the File DSN Chapter 5 Upgrade An Existing FOCAL POINT System Upgrade the Server Software Upgrade the Database Upgrade the Workstation Software Chapter 6 Start Using FOCAL POINT (Main Interface) Log In To FOCAL POINT Interacting with FOCAL POINT Module Icons Module Tool Bar Menus File...Error! Bookmark not defined. View Help...Error! Bookmark not defined. ii

3 Chapter 7 Time Zones Add Time Zones Edit Time Zones Delete Time Zones Chapter 8 Access Point Center Zones Access Points Communication Protocols TCP/IP Access Point Overview Areas Define Access Points Add an Access Point Access Point Information Connection Notes Advanced Settings Define Areas Chapter 9 Hardware Information Chapter 10 Access Groups Access Group Definitions Add Access Group Definitions Group Access Assignments Elevator Assignments...Error! Bookmark not defined. Chapter 11 Holidays Add Holiday Groups Add Holidays Chapter 12 Cardholders Define Custom Fields Create Custom Fields Add Cardholders Badges Access Assignments Add Additional Badges...Error! Bookmark not defined. Add Cardholder Images Where Allowed Chapter 13 Alarms Define Alarm Types Define Alarm Instructions Define Alarms Alarm Source Alarm Info Time Zones Alarm Routing iii

4 Chapter 14 Alarm Monitor Menus Icons...Error! Bookmark not defined. Monitor View Chapter 15 Command Center Available Commands Commands to an Access Point Define Scheduled Commands Command Info Time Graph Define Future Commands Command Info Conditional Response Command Command Info Conditions Time Zone Notes Alarm Response Commands Command Info Notes Time Graph Chapter 16 Issue A Command Add/Issue a New Command Chapter 17 Operators Default Admin Operator Add an Operator / Set Password Policies Menus Icons...Error! Bookmark not defined. Operator Information Copy Permissions Operator Permissions Zones Add A Profile Chapter 18 Transaction Monitor Transaction Tab Menus...Error! Bookmark not defined. Transaction Color Code Display Card Info Columns Show Transactions by Panel or Zone...Error! Bookmark not defined. System Status Tab Connections System Status Current Status Refresh Values iv

5 Chapter 19 Reports Create a New Report...Error! Bookmark not defined. Step 1...Error! Bookmark not defined. Select Report Type and Subtype (if applicable)...error! Bookmark not defined. Select Fields...Error! Bookmark not defined. Define the Display Order of the Report Fields...Error! Bookmark not defined. Select the sort order...error! Bookmark not defined. Set Date Range...Error! Bookmark not defined. Additional Criteria...Error! Bookmark not defined. Save Report...Error! Bookmark not defined. Run Report...Error! Bookmark not defined. Export Report...Error! Bookmark not defined. Run A Saved Report...Error! Bookmark not defined. Create A New Query...Error! Bookmark not defined. Execute A Saved Query...Error! Bookmark not defined. Operator Activity Report...Error! Bookmark not defined. Chapter 20 Standalone Reports...Error! Bookmark not defined. Chapter 21 Event Manager...Error! Bookmark not defined. Index v

6 COPYRIGHT 2009 ACCESS SPECIALTIES INTERNATIONAL, LLC All Rights Reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying or recording, without the express written permission of Access Specialties, Inc. Information in this document is subject to change without notice and does not represent a commitment on the part of Access Specialties, Inc. Unless otherwise noted, all names of companies, persons, products, and addresses contained herein are part of a completely fictitious scenario or scenarios and are designed solely to document the use of an Access Specialties product. Windows is a trademark of Microsoft Corporation. SOFTWARE LICENSE AGREEMENT The software described in this document is furnished under a License Agreement. This is a legal agreement between you and Access Specialties, Inc. Opening the CD package indicates that you accept these terms: Access Specialties, Inc. grants to you the right to use one copy of the enclosed software on a single computer or to a network server. If additional workstation licenses are purchased, you have the right to install the software on as many computers as is validated by the system registration. The software is owned by Access Specialties or its suppliers and is protected by the United States copyright laws and international treaty provisions. You may not rent or lease the software. You may not reverse engineer, de-compile, disassemble, or create derivative works from the software. If you do not agree to the terms of this Agreement, promptly return the unopened software package and all accompanying items, to the place of purchase for a full refund. TECHNICAL SUPPORT For technical assistance or further information, call the Tech Support Hot Line at (651) , (651) , or (651) Support is available Monday through Friday, 8:00 AM to 5:00 PM, CST. A 24-hour fax line is also available by dialing (651) Written correspondence may be directed to Access Specialties, Inc., Inver Grove Trail, Inver Grove Heights, MN Installation guides are also available at 1

7 Chapter 1 WELCOME TO FOCAL POINT FOCAL POINT is an inclusive 32-bit Windows based access control software package that is integrated to operate with a Microsoft SQL Server database. Colorful screen graphics, easy-to-use interface, and powerful flexibility make FOCAL POINT essential for managing your facility. When combined with the power of the HID Edge IP based controller, you have state of the art access control at the door and Network Based Security made easy. CONTROLLING ACCESS Access is controlled throughout your facility by information stored in a SQL database that FOCAL POINT queries for controlling access, and monitoring transactions and alarms. Information stored includes cardholders and access points, as well as Access Groups and Time Zones. Access Groups are created by combining one or more Access Points with the defined Time Zones. Cardholders can have up to 8 assigned Access Groups. This allows each cardholder to have unique access privileges. Zones partition the system allowing access points to be separated into separate zones controlling what information is sent to each access point and what information each system operator can view. CARD READERS AND TRANSACTIONS FOCAL POINT supports a variety of card technologies, such as proximity, magnetic stripe, barium ferrite, bar code, smart card, biometrics and keypad entry. An Edge controller has either an integrated proximity reader, or is wired to an external Wiegand reader. When a card is presented at a reader, the data is sent from the reader to the Edge controller. The controller holds key information regarding badge access. The controller then opens the contact if the door should be unlocked. The complete transaction is documented and stored for real time display, as well as reports. MONITORING ACTIVITY Monitoring activity is accomplished via sensing devices. The sensing devices have both an alarm, and non-alarm condition. It should be noted that any monitored condition might be defined as an alarm condition. The Edge reports activity at monitor points only when an alarm condition occurs on the controller, and when the alarm condition resets. Otherwise, no transaction is reported. 2

8 COMMANDS The commands available through FOCAL POINT help a facility run more efficiently. Doors may be manually commanded to lock or unlock by a system operator. Doors and areas can also be set to open or close at specific times. Chapter 2 FOCAL POINT REQUIREMENTS FOCAL POINT offers a wide range of configuration options when creating the security system. The hardware requirements will vary depending on the Security Administrator s choice of whether to install the application on the same computer as Microsoft SQL Server, or another computer. Below are the minimum recommendations necessary for installing FOCAL POINT. MINIMUM PC REQUIREMENTS FOR SQL SERVER HOST - Processor: Pentium IV (2.8 GHz or higher) - Display: VGA or higher-resolution monitor (Super VGA recommended) - Operating System: Windows 2000, Windows XP, Windows 2003 Server - Memory: 2048 Megabytes (MB) of RAM - Hard Drive: 40+ GB (depending on estimated size of database) - Disk Drive: CD-ROM Drive - Mouse: Microsoft Mouse or compatible pointing device - Additional space needed for setup files: - FOCAL POINT: ~ 20 MB - SQL 2005 or 2005 Express ~ 100 MB - Screen Resolution: 1024 x 768 and greater - Browser: Microsoft Internet Explorer 5.0 or later -.NET Framework version Windows Installer 3.1 or higher - Networking: Windows 2000, Windows XP, Windows 2003 Server built-in network - Additional network software is not required unless you are using Banyan VINES or AppleTalk ADSP. Novell NetWare client support is provided by NWLink - Supported Clients: Windows NT Workstation, Windows 2000, Windows XP, Apple Macintosh (Requires client software from a third party vendor), and OS/2 (Requires client software from a third party vendor). MINIMUM PC REQUIREMENTS FOR WORKSTATIONS - Processor: Pentium IV (1 GHz or higher) - Display: VGA or higher-resolution monitor (Super VGA recommended) - Operating System: WindowsNT, Windows 2000, Windows XP, Windows 2003 Server - Memory: 256 megabytes (MB) of RAM - Hard Drive: 40+ GB - Disk Drive: CD-ROM Drive 3

9 -.NET Framework version Windows Installer 3.1 or higher - Mouse: Microsoft Mouse or compatible pointing device - Screen Resolution: 1024 x 768 and greater - Browser: Microsoft Internet Explorer 5.0 or later - Networking: Windows 2000, Windows XP, Windows 2003 Server built-in network - Additional network software is not required unless you are using Banyan VINES or AppleTalk ADSP. Novell NetWare client support is provided by NWLink - Supported Clients: Windows NT Workstation, Windows 2000, Windows XP, Apple Macintosh (Requires client software from a third party vendor), and OS/2 (Requires client software from a third party vendor). TECHNICAL EXPERIENCE There are two different levels of technical experience needed for the installation and operation of the FOCAL POINT security software. Personnel installing the Microsoft SQL Sever software should be familiar with Microsoft SQL Server. The day-to-day operators using FOCAL POINT should have a general level of comfort with the standard Windows environment. Access Specialties offers courses for all types of users and installers covering Microsoft Operating Systems, SQL Server, FOCAL POINT, and Access Specialties hardware. Please see our website for more information. 4

10 Chapter 3 SYSTEM COMPONENTS FOCAL POINT consists of two main components that have been designed to allow for a number of different installation options. Below is an overview of the purpose of each. ASIDATASERVER The ASIDataServer component performs all of the run-time communications between FOCAL POINT and the Focal Point SQL Database. A File DSN establishes the communications link between ASIDataServer and the SQL Database. Contact Access Specialties for specific DSN information. It also controls FOCAL POINT s communications with the security system s hardware. WORKSTATION Workstation is the interface for defining the security system, issuing commands, and viewing real time transactions and alarms. SQL SERVER SQL SERVER VERSIONS FOCAL POINT is compatible with either the Express or full version of SQL Server SQL Server 2005 Express is free and is available on each FOCAL POINT installation CD. Note that SQL Server 2005 Express does not include the SQLAgent scheduling service, which is required to perform automated SQL database backups through Management Studio. There is also an Express version of Management Studio, which is used to configure and modify SQL Server 2005 Express configuration and its databases. There is a 4 GB database limit with the Express version. Once the database grows to approximately 4 GB FOCAL POINT will stop working. Please consult Microsoft for licensing information and options for SQL Server. INSTALLING SQL SERVER A copy of SQL Server 2005 Express is included on the install CD. Installing the ASIDataServer component on a workstation that does not have SQL installed, will cause SQL Server 2005 Express to be installed automatically on that workstation. Installing a full version of Microsoft SQL Server is outside the scope of this help file. Please consult the Microsoft SQL Server Introduction Manual that came with your purchase of SQL Server. During installation select: 5

11 Setup Type Typical Service Settings Use Local System Account for Mixed Mode Authentication SCHEDULING AUTOMATIC DATABASE BACKUPS IN SQL SERVER 2005 (NOT POSSIBLE IN EXPRESS VERSION) 1) Open Management Studio 2) Connect to a Database Engine 3) Explore down the tree to the Management Node 6

12 4) If the SQL Server Agent service is not started, right click on it, and select Start. Click on the Yes button on the confirmation message, to start the SQL Agent service. 7

13 5) Expand the Management node 6) Right-click on Maintenance Plans, select Maintenance Plan Wizard 7) If you receive a message stating that Agent XPs are not enabled - Left-click on the New Query button - Copy and paste the following text into the query window: sp_configure 'show advanced options', 1; GO RECONFIGURE; GO sp_configure 'Agent XPs', 1; GO RECONFIGURE GO 8

14 - Execute this query 9

15 8) Click Next to continue 10

16 9) Enter a name for the job, as well as the appropriate credentials. 10) Click Next 11

17 11) Select Backup Database (Full), click Next 12) Click Next on the next screen. 12

18 13) Select the database to backup, by clicking on the arrow next to the Databases field. This will display a list that contains the defined database. Place a check in the box next to the name of the database you want to back up. 13

19 14) Click OK to close this screen. 15) Click Next 14

20 16) Click Change to set the options for the job scheduling. 15

21 17) Give it a name, and configure the remaining information according to the schedule the backup should be performed on. 18) Click OK 19) Click Next 16

22 20) Click Next 17

23 21) Click Finish 18

24 22) Click Close Backup job has been created, and saved. It will execute as defined by the schedule. AUTOMATIC DATABASE BACKUPS IN SQL SERVER 2005 EXPRESS Although it is not possible to directly schedule database backups using this version of SQL 2005, it is possible to create a job that runs using the built-in Windows scheduler. On the computer which runs SQL 2005 Express: 1) Open Management Studio Express 19

25 2) Provide required login information, and click Connect 3) Navigate to required database. 4) Right-click on the database name, select Tasks, then Back Up 20

26 5) Click on the Script button 6) Click Cancel 7) A new query window should be visible, which contains the statements to perform the database backup. 8) Click on the File, then Save Query As. 9) Save the file to an easy to find location, and meaningful name 21

27 10) Click Save 11) Close Management Studio Express 12) Open Control Panel, Double-click on the Scheduled Tasks button 13) Double-click on the Add Scheduled Task icon, to start the wizard to create a new scheduled task 14) Click Next 22

28 15) Click on the Browse button. 16) Select the query file which was created earlier, select Open 23

29 17) Select the schedule option, click Next 18) Depending upon the selected schedule frequency, the information which needs to be specified, will be slightly different. In this case, Weekly was selected. 19) Set the appropriate time, days, etc 20) Click Next 24

30 21) Supply a user and password that has sufficient rights to connect to SQL, as well as creating the backup file on the disk, and click Next 22) Click Finish to complete the process. The new scheduled job will display in the list. 25

31 26

32 Chapter 4 INSTALL FOCAL POINT INSTALLATION OPTIONS The Security Administrator can install the components of FOCAL POINT as either a stand-alone security system or as part of a networked security system. STAND-ALONE All FOCAL POINT components and the SQL Database are installed on one computer. A stand-alone security system can be implemented to meet the needs of users that want to localize their security system to one computer because of a smaller facility size or lack of network connections. NETWORKED Implementing a networked security system is just as easy to accomplish as implementing a stand-alone security system and gives the user a high degree of flexibility in controlling access to key parts of the security system. For Networked Security Systems, it is necessary to install the ASIDataServer component before installing Focal Point on client workstations. ASIDataServer is only installed on the server machine. Selecting the complete installation, or individually selecting ASIDataServer through the custom installation will accomplish this. For each type of installation you will be given the option of installing shortcuts for Focal Point on the desktop or directly on the Start menu. You will also be 27

33 [SETUP Screens/explanation go here] [Not certain if we ll need this. Right now, Focal Point is using a connection string which is defined in the.config file] CREATE & ACCESS THE FILE DSN The File DSN is set up on the computer running ASIDataServer.exe. It establishes the link between ASIDataServer and the SQL database. This link must be established before Focal Point can interact with the database. 1) Open the Control Panel A) Windows XP click on Start / Control Panel B) Windows 2000 click on Start / Settings / Control Panel 2) Open Administrative Tools 3) Open Data Sources (ODBC) 4) Select the File DSN tab 5) IF a DSN does exist select Configure and go to step 7 6) IF a DSN for FOCAL POINT does not already exist complete the following steps: A) Select Add 28

34 B) Select Native client from the bottom of the list C) Select Next D) Type FocalPoint E) Select Next F) Select Finish 7) Select the Microsoft SQL Server with which you would like to connect. If the Focal Point database resides on the workstation you are using, select or type (local) 8) Select with SQL Server Authentication using a login ID and password entered by the user 9) Contact Access Specialties for the specific Login ID and Password 10) Change the default database to the name of the ASI database installed on the SQL server 11) Select Next 12) Select Finish 13) Select Test Data Source 29

35 [No defined process for doing this, as of yet] Chapter 5 UPGRADE AN EXISTING FOCAL POINT SYSTEM Upgrading an FOCAL POINT system can be completed in minutes in just 3 easy steps. Before starting the upgrade, find the following information: 1) Computer name or IP Address of the Server: 2) Name of the SQL Database: i. Check the File DSN OR ii. Start FOCAL POINT and select View / Check DB / Currently Connected Database 3) Name and location of all other machines running FOCAL POINT workstations or Panel Manager: View the Readme.txt from the cd to see PC requirements or view Server and Workstation Requirements from this manual. See Chapter 2. UPGRADE THE SERVER SOFTWARE First make sure that FOCAL POINT is closed on all workstations and on the Server. Check the processes tab in Task Manager and make sure that ASIDataServer.exe is not running. If it is, end the process. Next insert the latest FOCAL POINT CD. If the CD does not automatically run, or if you are installing from a folder, double click on the AutoRun.exe. Select Complete Install to install ASI Server, ASI Launch (workstation) and Panel Manager. Select Custom Install to install individual components. At least ASI Server must be installed on your Server PC (see Chapter 4). Select the workstation and user on which to install FOCAL POINT. Ensure that the user has Administrator permissions. To use a domain account select the computer name or IP address of that Server. Enter the password and click OK. Select Yes to remove previous FOCAL POINT installs. 30

36 Continue through the installation process, choosing which options best suit your needs. Do NOT try to run FOCAL POINT until the Database has been upgraded. UPGRADE THE DATABASE Insert the installation cd on the machine running SQL or copy the folder to that machine. If you do not need to install the software on the computer or if you already have, stop the auto-run. Explore to the CD drive or open the software folder. Open the Upgrade folder. Double click on DatabaseUpgrade.exe. From the drop down menu select the SQL Database name. Select Yes if you are using SQL MSDE. Select No if you are using a full version of SQL Server. Click on Upgrade Database. The upgrade utility will add the necessary components needed to run with the latest version of FOCAL POINT. Custom installs of the software can be completed while the database is being upgraded. Do NOT try to start any FOCAL POINT component until the Upgrade is complete. UPGRADE THE WORKSTATION SOFTWARE Perform custom installs (see Chapter 4) for each component needed on each workstation. During the installation you will be prompted to enter the IP address or Computer Name of the computer running ASI Server. If this is entered incorrectly you will get an error connecting, error 70. Should this occur, reinstall the workstation pointing at the correct computer. 31

37 Chapter 6 START USING FOCAL POINT (MAIN INTERFACE) LOG IN TO FOCAL POINT Launch FOCAL POINT by clicking on Start/Programs/ASI/Focal Point or by double-clicking on available shortcuts. Contact Access Specialties for the User Name and Password if this is an initial installation. The following two screens will display, before the main logon window: MAIN LOGIN SCREEN Enter a valid login and password, or select an operator name from the drop-down list. If an operator is selected, a valid password will still have to be provided to complete the login process. 32

38 Click the OK button to enter Focal Point INTERACTING WITH FOCAL POINT FOCAL POINT allows each operator to have tailored permissions within FOCAL POINT. FOCAL POINT s modular design makes it easy to grant administrative rights to an operator or restrict an operator to view only privileges in any one of the modules. If an operator does not have any permissions within a module the icon button for that module will not appear on the screen. MODULE ICONS FOCAL POINT uses icons to organize each module of the software. Access Groups and Access Assignments are defined in this module. Access Assignments determine when a badge can be used at certain readers. All alarms are defined in this area. Assign priority levels; and identify conditions causing the alarm at a specific device or area. Alarm instructions are also created and assigned here. The Cardholders module holds information about people, badges and access permissions. It is also where badge layouts are created and printed. 33

39 All Immediate, Scheduled, Future, Conditional Response and Alarm Response Commands can be created and issued in the Command Center. Issue Command allows operators to quickly send commands to devices or areas such as locking or unlocking doors. Access Point Manager displays Zones, Areas, and Access Points All Holiday Groups and definitions are created in the Holiday Definition module. Defined holidays can prevent badges from being granted access, and cause commands not to be issued on defined holidays. Unique user names, passwords and permissions are assigned in the Operators module. Other security features, such as password rules, and login policies are also set here. The Reports Module allows the user to easily create custom reports, save these reports for future use, edit saved reports or create SQL scripts that query the database for virtually any report needed Time Zone intervals are defined in this module. This section also displays graphs for visual confirmation of when a Time Zone is active. The Transaction Monitor shows transactions live as they are happening throughout the day. MODULE TOOL BAR Only the modules that an operator has permissions to, will be enabled. The remaining modules will be visible, and greyed out. MENUS VIEW 34

40 Show Names: If checked, the descriptions will appear under the icons in the main window. Unchecked, the descriptions will be hidden. About About Focal Point Workstation: Displays version and license information for this install of Focal Point. Chapter 7 TIME ZONES TIME Time Zones are the corner stone of the FOCAL POINT database. Time zones are user-definable periods that control when an event will occur or not occur. For example, a Time Zone that is defined from 8:00 am 5:00pm, Monday through Friday can be used to allow certain cardholders to gain access to certain card readers during those times, or to unlock main doors during that time. Each Time Zone can be used for more than one function. For example, a 24/7 Time Zone (one that is in effect all the time) can be used for alarms, granting access through doors and scheduled commands Be aware that if a Time Zone is deleted, it will also delete any dependant information such as alarms, and access assignments that are using the Time Zone that was deleted. Time Zone names are viewed throughout the application, so use descriptive terms such as 8am-5pm, Mon-Fri. The Description and Notes sections are very important references explaining the Time Zone, or what the Time Zone may be used for. Time zones contain zero or more intervals, during which time the time zone is considered to be active. The times during which the Time Zone is active, are displayed in green in the graphic underneath the defined interval descriptions ZONE INTERVALS Time zone intervals are entered, updated and deleted individually for each Time Zone definition, using this set of controls on the Time Zone definition form. 35

41 You must be either adding or editing an existing Time Zone to change the interval definitions for a Time Zone. ADD A NEW INTERVAL Select a Time Zone to edit, or click on Add to create a new time Zone definition. Using the left-hand set of controls, select a starting day of the week for this interval. Select or type the starting hour and minute, as well as AM/PM. Select the Ending day of the week for this interval. 36

42 Select or type the ending hour and minute, as well as AM/PM. Click the Add button next to the list of defined intervals. The new interval will then appear in the list: This interval starts 6:00 AM, and ends PM Note that the graphical representation of the Time Zone will change to reflect the currently defined intervals. Changes will not take affect until the Time Zone is actually saved. UPDATE AN EXISTING INTERVAL Select a Time Zone to edit Select the interval to be changed from the list of defined intervals in the list below 37

43 The start and stop information for that interval, will be loaded into the controls above this list of intervals Make the desired changes to either the start or stop information for that interval, then click the Update button. Here, the start and end time of the interval for Wednesday, was set to start an hour later, and end an hour later. The changes to the interval will be displayed in the list, as well as the graphical control below the interval, however will not actually take affect until the Time Zone is actually saved. 38

44 DELETE AN EXISTING INTERVAL Select a Time Zone to edit Select the interval to be deleted from the list of defined intervals in the list below The start and stop information for that interval, will be loaded into the controls above this list of intervals Click the Delete button. The interval will be removed from the list, and the graphical display will be updated to show the interval has been removed Here, the interval that started on Saturday, and ended on Sunday, was removed from the list. 39

45 Note that none of these changes will take effect, until the Save button is clicked. This will send the new Time Zone definition information to all of the access points that are defined in the system. ADD TIME ZONES To add a new Time Zone, click on the Time Zones module. Then click on the Add button.. Enter the information to define this new time zone, including Name, and defining intervals when the time zone is active. Note that only five intervals can be defined for a specific day of the week within each Time Zone. A name must be specified for each Time Zone, and must be unique throughout the System. EDIT TIME ZONES To edit an existing Time Zone, click on the Time Zones module. Then click on the desired Time Zone in the list, then the Edit button. Make desired changes to the existing Time Zone, then click on Save. Changes will be sent to the controllers immediately upon the save operation. 40

46 DELETE TIME ZONES To delete an existing Time Zone, click on the Time Zones module. Then click on the desired Time Zone in the list, then the Delete button. A confirmation message will be displayed: You must select the Yes button to actually delete the Time Zone. Deleting Time Zones is not recommended unless you have a thorough understanding of the relationship between that Time Zone and the rest of the database. When a Time Zone is deleted, all associated events, alarms, commands, and Access Groups will also be deleted. To delete a Time Zone, highlight the name in the list, and click on the Delete button. A confirmation will appear. Click Yes to remove the Time Zone from the database. 41

47 Chapter 8 ACCESS POINT CENTER The Access Pont Center is where the hardware is defined. This includes Zones, access points and areas. This is also where the TCP/IP communication parameters are defined for each controller. Multiple zones can be used to segment the access control database and hardware at larger installations. [Access point List] ZONES Zones are used to partition the database. Grouping access points into different zones will help the system run more efficiently by distributing the appropriate cardholder information to the correct controllers. Zones can also be used to restrict which operators can view access points, access groups, alarms, commands, and cardholders who have been assigned access in that zone. Each access point must be assigned to one and only one zone. There is no limit to the number of zones that can be created in the Focal Point database. Careful consideration of how zones are used can increase the effectiveness and efficiency of the access control system. If multiple sites are being controlled from one server, giving each site its own zone can help the system operate more efficiently. Deleting a zone will also delete the hardware associated in that zone as well as any software definitions such as access groups, alarms, commands and areas that reference that zone. ACCESS POINTS Access Points are defined in each zone. Each Access Point has memory that holds a portion of the Focal Point database. When communication is lost between the computer running ASIDataServer and the Access Points, the Access Point s memory allows operation as normal until the communication is restored. Any changes made through the software will not take place until the communication link has been restored. Any transactions that have been stored in the Access Point s memory while it was not communicating with the host PC, will also be received at that time. COMMUNICATION PROTOCOLS TCP/IP TCP/IP is used with an Edge controller. The controller s TCP/IP connection is configured using the built-in web interface through Internet Explorer. Some of this same information is displayed for reference in Focal Point. 42

48 ACCESS POINT OVERVIEW All access points can be configured to unlock a door for as long as needed. An unlock command will last forever unless power is lost or a new command is issued. Both the go and shunt times have a maximum value of 1,620 seconds, or 27 minutes. The unlock time is how long the door will be unlocked when a valid access has been granted, a Grant Access command executed, or the Request To Exit has been activated. The shunt time is used to determine how long the door can remain open beyond the unlock time, before a door held open message is displayed in the Transaction Monitor. The access point can be configured to require Card Only, Card Plus Pin, or Pin Only mode at any time. PIN entry requires a reader that allows PIN entry. This information is used in conjunction with the Access Mode defined for each cardholder, to determine whether or not enough information has been provided to validate their specific access request. AREAS Grouping Access Points into an area allows simple control of all these devices with one command. Areas can include Access Points across multiple zones. Areas can also be used when defining Alarms, and some commands. For example, if 5 external lobby doors need to open at 8am and lock at 5pm, create an area and include these 5 devices. One command can be created to unlock and lock all 5 of these devices creating a more efficient environment. DEFINE ACCESS POINTS [ACCESS POINT SCREENS] ADD AN ACCESS POINT Open Access Point Center Click on the Add button Enter the required information. ACCESS POINT INFORMATION Enter the Location, MAC address, unlock and shunt times. The location should be very descriptive as it is viewed throughout the rest of the application when selecting devices. It is also viewed in Transaction Monitor. The Panel Enabled box enables the panel. To disable the panel, uncheck this box. 43

49 CONNECTION Configure the options for DHCP or an IP address are given. SETTINGS The Time Difference box allows ASIDataServer to process transactions from controllers in different time zones. For example, ASIDataServer could be running from a computer in Minnesota, which is in the Central time zone. The controller could be located in New York, which is in the Eastern time zone. The time difference would then be +1. If the controller were located in California, which is in the Pacific time zone, the time difference would be 2. The Re-Allocate Panel button is a simple way to re-load the panel with the database definitions. Re-allocation can take up to an hour or more depending on database. Click on Cancel return to the settings tab. NOTES Click on the Notes tab. Use the notes section to write important information about the exact location of the panel, or any other information that may be useful to someone else who is not as familiar with the system layout. Save the Access Point. ADVANCED SETTINGS Advanced Settings allow configuration of advanced settings. Normally, only required for PIN reader definition. DEFINE AREAS Areas are maintained using the Area Listings tab. To add a new Area, open the Access Point Center and click on the Area Listings tab. Click on the Add button, then enter the Area Name and Description. Click on the Save button to save the area definition. Select an area and then click on Edit Area. Double click on an Access Point to add it to the area. The Access Points in the area will move to the box on the bottom. Save the area when finished. To delete an area, open the Access Point Center and click on the Area Listings. Click on the area you wish to remove, then click the Delete button. Note that deleting an existing area, will also remove any commands or alarms that area is referenced by. 44

50 Chapter 9 HARDWARE INFORMATION Chapter 10 ACCESS GROUPS Access Points and Time Zones are uniquely combined into Access Groups, which are assigned to badges. 8 access groups per zone may be assigned to each badge. When an access group has been added to the badge, that badge will work at the Access Points specified in the group during the specified time zone. For example, access group 1 may contain all the exterior doors of a building during a defined time zone of Monday through Friday, 8am to 5pm. Each badge that has been assigned access group 1 will open the exterior doors during that time frame. Access groups cannot span zones, so Access Points in a particular access group must all be in the same zone. ACCESS GROUP DEFINITIONS Group definitions are where Access Groups are named. ADD ACCESS GROUP DEFINITIONS Select Access Groups from the Main Interface. Click on Access Group Listings tab. Click Add button. Access group names should be very descriptive as they are viewed when assigning them to badges. Descriptions can be used to further specify groups. 45

51 Access groups can be edited or deleted at any time. Once an Access Group has been deleted, cardholders who were part of that access group will no longer have any access to the access points that group had allowed. In this example, there are four Access Groups defined in the zone ASI Sales Office Since Access Groups do not span Zones, click on the drop down arrow to select another zone. Define Groups for each Zone. 46

52 GROUP ACCESS ASSIGNMENTS Select Access Groups from the Main Interface. Click on the Group Access Assignments tab. Columns indicate the Access Group while rows indicate the devices in that Access Group. Access Groups are defined by zone. The first zone that is defined will be loaded by default. If the Access Groups are defined in a different zone, this zone must be selected before any changes can be made. Double click in each grid square to add appropriate Time Zones for each Access Point in each Access Group. To exclude an Access Point from an Access Group leave the corresponding grid square blank. In this example Access Group 1, 3, and 4 contain all the doors during Time Zone 2 (24/7), Access Group 6 contains all the doors during Time Zone 1 (normal work hours) Selecting a cell that contains a number referring to a Time Zone, will display the graphical representation of the time zone below the assignment grid. 47

53 The Green area indicates the time period during which a Cardholder with that Access Group will be granted access. Here, the Time Zone is active from 8:00 am to 5:00 pm, Monday Friday. Clicking on the Lookup button at the top of the screen, will allow you to select a specific group or access point to locate in the current Zone in the grid. Selecting a group name, or Access Point Name, and clicking the OK button will change the information which is selected (highlighted), based upon the selection made, without having to physically scan the list to find it. Since Access Groups do not span Zones, click on the drop down arrow at the top to select another Zone. Create Access Groups for each Zone. 48

54 Chapter 11 HOLIDAYS Holidays are defined in Holiday Groups. These groups provide exceptions to Time Zone rules for badge access, scheduled commands, and conditional response commands. Each Holiday must start at 12:00am and end on 11:59pm on the same date. Recurring Holidays occur on the same date every year. Holiday Groups can be assigned to badges to grant cardholders access on holidays within a certain group. If a badge is not given access to a specific Holiday Group, that badge will not be granted access on the holidays within that group. ADD HOLIDAY GROUPS From the Main Interface click on the Holidays module. Click on the Holiday Group Listings tab. Select Add or hit F5. Enter the name of the Holiday Group. The description is optional. Click Save. Add as many Holiday Groups as necessary. 49

55 ADD HOLIDAYS From the Main Interface click on the Holidays module. Select Holiday Definition tab. Select Add or hit F5. Enter the name of the Holiday. The description is optional. Enter the date of the Holiday. If this holiday happens on the same day every year, such as July 4 th, select recurring holiday. Assign this Holiday to one or more Holiday Groups by checking the box for the appropriate Holiday Groups. Any badges not assigned to one of these Holiday Groups will not gain access during the holidays defined within the Holiday Group. 50

56 Chapter 12 CARDHOLDERS Cardholder Data includes First Name, Last Name, MI (Middle Initial), Photo and Custom Fields. Badge Data includes Encoded, Embossed, Pin #, Activation and Expiration Dates, Active or Inactive flag. A Cardholder is a person who is issued one or more access cards. Each Cardholder has specific information associated with it such as Encoded Number, PIN, Embossed Number, Activation and Expiration Dates, Photo and an unlimited number of user-definable Custom Fields. Cardholder photos are stored as.jpg files in folders. DEFINE CUSTOM FIELDS Either click on Add to create a new cardholder, or select one and click Edit Click in the Custom Fields tab 51

57 Click on the Add Custom Field button to create extra data fields (ex. Address, Phone Number, Social Security Number) called Custom Fields. The number of Custom Fields is unlimited. Lookups create drop down lists, which are customized for each Custom Field. Creating the necessary Custom Fields before entering Cardholder data will save time because each cardholder won t have to be edited to insert key Custom Field data. CREATE CUSTOM FIELDS Select Add New Field. Enter the name of the Custom Field (ex, Department). To add a lookup highlight the custom field name on the left side of the screen and select Add Lookup For Selected Field. One at a time, enter the Lookups as shown in the example below. Lookups are optional. 52

58 Continue adding Custom Fields and Lookups as needed. When lookups are used the only data that can be entered into that field is one of the lookup entries. Custom fields and lookups can be edited or deleted by selecting the corresponding buttons. Deleting lookups will not delete any related data. However, deleting a custom field will delete all related information. Care should be exercised so that important data is not lost. Click Done to return to the Cardholders screen. The custom field names and lookups (drop down menus) will now appear. ADD CARDHOLDERS To add new Cardholders or edit existing Cardholders, click on the Cardholders module. Enter Cardholder data. At a minimum, either a first name or last name is required. 53

59 Enter Badge data. The encoded number is the unique number on the access card or key fob. The encoded number must be unique but is not required. This allows Cardholder information to be kept even for those who do not have badges. If the encoded number is not used, Access Groups cannot be assigned. The Embossed number is user definable, optional, and can be used as a badge number. The Pin # can be used with devices that have pin pads and is optional. Pin numbers are usually 4 or 5 digits depending on the device type being used. Select Access Mode for this cardholder. If not specified, is Card Only. This means only a card is required for validating access at any door. Note that the other modes (Card + PIN, Card or PIN, PIN only) require the use of a PIN reader. This is used in addition to the access mode that is configured in the Access Point definition, to verify that the cardholder can get access to a specific door. Changing the Access Mode from Card only to an Access Mode other than Card + Pin, will require that the entire cardholder database be regenerated, and sent to each of the access points that cardholder has access to. In a similar fashion, changing from any access mode other than Card + Pin, to Card Only, will require the cardholder database to be regenerated, and sent to all the access points the cardholder has access to. Enter custom field data as appropriate per cardholder. Drop down menus appear from the defined lookups. Text can be directly typed into any field that does not contain lookups. BADGES Activation Date and Expiration Date show the period during which that badge will be active. The default activation date is the date of entry. The default for expiration date is 10 years from the date of entry. The Activation date must be later than 1/1/1990. A badge can be deactivated via the Active check box without changing the expiration date. When the Active box is not checked, the badge is inactive. A text box for corresponding notes will appear just below the check box. Additional detailed notes should be placed in the Badge Notes section. ACCESS ASSIGNMENTS To assign access to this badge click on the Access Groups tab. 54

60 ACCESS GROUPS The Access Groups that have been defined in the Access Groups module will appear on the left side of the Access Groups tab. Select the desired zone from the drop down menu. Double click on the desired Access Group name or highlight the Access Group name and click on the arrow button to put it on the right side. The badge will then have access to the Access Points within the assigned Access Group during the Time Zones defined in the Access Groups module. Up to 8 Access Groups from each zone can be assigned to one badge. HOLIDAYS When Holidays are used, the badges that have assigned Holiday Groups will be granted access as usual during the holidays within the assigned group. Badges that do not have Holiday Groups assigned will not be granted access during defined Holidays. Holiday Groups displayed on the right side are the groups that are assigned to that badge. Select Holiday Groups and use the arrows to move them from side to side to grant or remove access. Each badge can have a maximum of 8 assigned Holiday Groups. 55

61 GENERAL NOTES Notes allow operators to record specific information about individual badges. CARDHOLDER IMAGE CARDHOLDERS CAN HAVE AN IMAGE ASSOCIATED WITH THEM, WHICH WILL DISPLAY IN TRANSACTION MONITOR OR ALARM MONITOR WHEN A CARD TRANSACTION IS RECEIVED FOR THEIR BADGE. Click on the Add Photo button to associate a new image with this badge. Click on the Delete Photo button to associate a new image with this badge. WHERE ALLOWED Information on where a specific Badge is allowed access, is visible on the Where Allowed tab. Note that the actual Access Group Assignment information can not be changed here. This is display-only information. 56

62 Chapter 13 ALARMS Alarms can be generated from a single event that occurs on an Access Point or from a card swipe. Multiple alarm conditions can also be used to trigger each alarm. Alarms are based on Access Points or areas, combined with Time Zones and pre-defined alarm conditions. Deleting Access Points or areas that are used in Alarms will also delete those associated alarms. Alarm types are first used to distinguish one alarm from another. Types of alarms may include Fire, Security, Smoke or Intrusion. At a minimum, one Alarm Type must be defined before an alarm can be defined. Alarm Instructions are then defined. For each defined alarm up to 3 unique alarm instructions can be selected. An alarm instruction may include information about emergency phone numbers for the dispatchers to call or specific instructions about what to do in the even of a break-in. Each alarm can be routed to all operators or specific operator(s) only. DEFINE ALARM TYPES From the main interface click on the Alarms module. Click on the Alarm Types Listing tab Select Add or hit F5 to add a new Alarm Type. Enter a name for the alarm type and click Save. 57

63 DEFINE ALARM INSTRUCTIONS From the Main Interface click on the Alarms module. Select the Alarm Instructions Listing tab. Click on Add or hit F5. Enter a name for the instruction so that it can be easily called up when defining alarms. Enter specific instructions in the text box. One instruction can be used in multiple alarms. Text instructions can include up to 500 characters. Click OK to save this alarm instruction. Up to 255 alarm instructions can be saved. An Alarm Instruction cannot be deleted if it is used in an alarm. DEFINE ALARMS From the Main Interface click on the Alarms module again. Select Alarm Definitions Listing tab. Click on Add or hit F5. 58

64 ALARM SOURCE First define the source of the alarm. From the drop down menu select a single access point or an area. The area must already be defined in Access Point Center. ALARM INFO 59

65 PRIORITY AND TYPE Setting the priority level determines the order in which the alarm will be displayed in the Alarm Monitor. The Type of Alarm is selected from the previously defined types. Note that use of Alarm Response Commands requires the Priority and Type of the Command to match the Priority and Type of the Alarm. REQUIREMENTS FOR CLEARING THIS ALARM The Device must return to non-alarm condition checkbox works in conjunction with alarms that come from monitor points. For example, if a Door Held Open alarm is defined, and this box is checked, the alarm cannot be cleared until the Door Closed transaction comes through. The Operator Must Enter Comments check box forces the operator to enter comments regarding the alarm before it can be cleared from the Alarm Monitor. TIME ZONE Select the Time Zone to be used. Alarm transactions will only occur when this Time Zone is active. To verify the Time Zone, click on the Time Zone tab. The corresponding graph will appear. The green area is the active time. INSTRUCTIONS TO OPERATOR Up to 3 defined alarm instructions can be selected per alarm. From the drop down menu select the instructions that were defined in the Alarm Instructions area. The alarm instructions will appear in the Alarm Monitor in the order that they are displayed. TIME ZONES This displays the Time Zone that is selected on the Alarm Info tab. 60

66 ALARM ROUTING Each alarm can be routed to All Operators or Selected Operators by using the radio buttons. The list of operators is displayed on the left side. Highlight the desired operators and double click or use the arrow buttons to put them on the right side of the screen. The operators on the right side of the screen are the only operators that will see that alarm when Selected Operators is used. 61

67 Notes General notes for this alarm can be saved here. Note that there is a limit of 200 characters on this information. 62

68 Chapter 14 ALARM MONITOR The Alarm Monitor is a separate interface that shows currently active alarms in its own screen. The Alarm Monitor shows alarm transactions only. These alarm transactions are also displayed in red text in the Transaction Monitor. The alarm monitor cannot be closed. However, an operator s permissions can be changed to not include the Alarm Monitor. To do this, remove the operator s permissions for Acknowledge, Clear Active Alarms, Silence, and View Active Alarms under the Alarms tree as shown below. Using Zones also restricts an operator s ability to only view alarms originating in Zones which they have permission to view. To Enable or Disable alarms, press F12. When the alarms are disabled, new alarms will not appear in Alarm Monitor for that operator until alarms are enabled again. MENUS Clear Alarm Clears the selected alarm Clear All Alarms Clears all of the alarms in the grid Save Column Widths Saves the grid column widths BUTTONS Acknowledge Alarm Acknowledges the currently selected alarm Acknowledge All Alarms Acknowledges all alarms displayed. Enter Comment Allows entry of a comment prior to acknowledging an alarm 63

69 View Comments Displays the comments associated with an alarm View Instructions Displays the instructions associated with an alarm Silence Alarms Stops the audible beep Ignore Displayed Alarms (1) When checked (enabled) the alarm monitor screen will not pop up over the screen the user is in until a new alarm transaction comes in. (2) When not checked the screen will pop up every few seconds to remind the Operator that there are alarms that need attention. Display Card info with Alarms Displays the card information associated with selected alarm. MONITOR VIEW The Alarm Monitor grid gives details on the alarms. When multiple instances of the same alarm come in, the alarm count increases. A new alarm row is not generated. 64

70 Priority Priority of alarm as defined in the alarm definition. Higher priority alarms display at the top of the list. Access Point Access Point Description Name Cardholder name, if the alarm was generated from a badge, and the Encoded The encoded number if the alarm was generated from a badge Description Description of the alarm Time Time the alarm occurred Date Date the alarm occurred Count Number of times alarm has occurred 65

71 Chapter 15 COMMAND CENTER There are several types of commands that can be issued directly to devices or areas. These commands can be used to lock or unlock doors and grant access, among others. These commands can be set to happen on a time schedule, at one point in the future, immediately, based on an event, or based on an alarm. From the Main Interface click on the Command Center Icon. Scheduled commands are used to control an area (as defined in the Device Center), individual readers or output points on a time-scheduled basis. Scheduled commands are tied to Time Zones. Future Commands are single occurrence commands. An exact date and time is used with a specific command to control a device or area. Conditional Response Commands are used to control an area (as defined in the Access Pint Center), individual readers or output points based on events occurring. Alarm Response Commands are used to control an area (as defined in the Device Center), individual readers or output points based on alarms occurring. Issue a Command allows the Operator to send immediate commands to a specific access point or area. Issued commands can be saved for quick recall. Issue Command can also be seen directly from the Main Interface. 66

72 Commands are partitioned by Zones as defined in the Access Point Center. Scheduled Commands, Future Commands, and Alarm Response commands can be defined for Areas, which can also span Zones. Conditional Response Commands cannot span Zones. AVAILABLE COMMANDS COMMANDS TO AN ACCESS POINT Grant Access Lock Door Unlock Door DEFINE SCHEDULED COMMANDS From the Main Interface click on the Command Center module. Select the Scheduled Commands Listing tab. Click on Add or hit F5 to define a new scheduled command. COMMAND INFO ACCESS POINT OR AREA TO COMMAND Commands can be issued to a single access point or to an Area. COMMANDS Select from the drop down menus what should happen when the Time Zone is active (on) and inactive (off). 67

73 WHEN Select the Time Zone for the Scheduled Command to use. The command will only occur when that Time Zone is active. Deleting associated Time Zones will delete the Scheduled Command. HOLIDAY EXCEPTIONS If the Holiday Exception is selected the command will not be issued during Holidays assigned to that Holiday Group. In this example, the door to Room 330 will be unlocked using the Time Zone Monday through Friday from 8am to 5pm. On the Holidays in the Contractors Holiday Group, the command will not be issued and the door will remain locked. TIME GRAPH Time Graph shows a visual graph of Time Zone selected on the Command Info tab. Click Save to save and return to the Scheduled Commands screen. All scheduled commands will be listed. DEFINE FUTURE COMMANDS From the Main Interface click on the Command Center module. Click on the Future Commands Listing tab. Click on Add or hit F5 to define a new future command. COMMAND INFO Select single Access Point or Area. Select the command to be executed. Select the exact date and time the command should occur. This is a one-time command. 68

74 Click save. The time and date used will be the system time on the computer running ASIDataServer. All future commands will be listed. CONDITIONAL RESPONSE COMMAND From the Main Interface click on the Command Center module. Click on the Conditional Response Commands Listing tab. Click on Add or hit F5 to define a new conditional response command. COMMAND INFO TRIGGER DEVICE AND EVENT Select the Zone and Access Point to be used as the condition. RESPONSE COMMAND Select the specific access point to be controlled. Select which command should occur when the condition (as defined on the Conditions tab) occurs. CONDITIONS 69

75 CONDITIONS The displayed conditions are dependant on the device selected and whether or not an Input Point is used as the Source of Condition on the Command Info tab. WHEN Select the Time Zone for the Conditional Response Command to use. The command will only occur when that Time Zone is active. Deleting associated Time Zones will delete the Conditional Response Command. HOLIDAY EXCEPTIONS If the Holiday Exception is selected the command will not be issued during Holidays assigned to that Holiday Group. TIME ZONE Time Graph shows a visual graph of the Time Zone selected on the Command Info tab. NOTES Notes allow the Operator to enter comments to be stored with the command. Click Save to save and return to the Conditional Response Commands screen. All conditional response commands will be listed. 70

76 ALARM RESPONSE COMMANDS From the Main Interface click on the Command Center module. Click on the Alarm Response Commands Listing tab. Click on Add or hit F5 to define a new alarm response command. COMMAND INFO ACCESS POINT OR AREA TO COMMAND Select the Access Point or Area radio button. Next, select the Zone and Access Point to command. COMMANDS Select the command to be issued when the alarm occurs, and the command to be issued when the alarm is cleared.. ALARM CONDITIONS Select the same Alarm Type to be used to activate this command. Select the same Priority and Time Zone as the Alarm Definition. All Alarm Types that correspond to this Alarm Response command must be using the same Priority and Time Zone. NOTES Notes allow the Operator to enter comments to be stored with the Command. TIME GRAPH Time Graph shows a visual graph of the Time Zone selected on the Command Info tab. 71

77 Click Save to save and return to the Alarm Response Commands screen. All alarm response commands will be listed. 72

78 Chapter 16 ISSUE A COMMAND Issue a Command allows the Operator to send immediate commands to devices or areas. Issued commands can be saved for quick recall. Issued Commands can also be seen from the Command Center. ADD/ISSUE A NEW COMMAND From the Main Interface click on the Issue a Command module. Click on Add or hit F5 to define a new command. 73

79 Select the Access Point or Area radio button. Select the Zone and Access Point to command. The Lookup feature can help find the correct Access Point. Next select the command to issue. Click Save to save this command for future use. Click Issue Command to issue it immediately. Once a command has been saved, highlight it in the Issue Command screen and hit F11 to send the command quickly. Click Save to save and return to the Issue a Command screen. All issued commands will be listed. 74

80 Chapter 17 OPERATORS Anyone who needs to log into the Focal Point application can be an Operator. Operators are not associated with Cardholders. Operators must have a unique User Name and Password. Deleting an Operator prevents reports being run on that Operator at a future date. Suspending an operator s permissions will make it impossible for that operator to login. Do not change the user name for the System Administrator account (admin). Each Operator can have unique permissions controlling what they can see and do within the application. To perform some duties Operators must have certain permission combinations in various modules. For example, an operator must have permission to view Cardholders in order to get into the Cardholder module. When a check is present next to a given module function, the operator will have permission to perform that function. Double click on a specific function to grant or remove permissions individually. DEFAULT ADMIN OPERATOR User Name admin Password asi The admin operator has most permissions and the Default Zone. The other permission, Restricted by Zone, is also in Cardholders. When this is enabled, the operator will only be able to see the cardholders who have badge permissions in the specified zones on the right. Profiles can also be saved. A profile consists of a name and specific permissions. When adding new operators the permissions from a Profile can be copied. This is a very efficient way to add new operators who have similar permissions. Once the basic profile permissions have been copied, the operator s permissions can be further tailored. ADD AN OPERATOR / SET PASSWORD POLICIES From the Main Interface click on the Operators module. Click on Add or hit F5 to add a new operator. 75

81 MENUS Operators save or clear operator settings View expand or collapse permissions tree POLICIES TAB 76

82 PASSWORDS ARE CASE-SENSITIVE Check this box to force the exact match of upper and lower case letters in the entered password for the operator. Operator must enter the password in the exact same case to log on. FORCE PASSWORD EXPIRATION Check this box to force password to expire after the set number of days. Operator would have to enter a new password when the number of days expires. LIMIT LOGON ATTEMPTS Check this box to enforce a limit on the number of times an operator can fail subsequent login attempts. PERMISSIONS TAB 77

83 OPERATOR INFORMATION Check the radio button for Operator. Enter the rest of the information specific to each operator. First Name Last Name MI User Name Required and must be unique Password Required Confirm password retype the password for confirmation Suspend this account deactivates the operator, preventing login COPY PERMISSIONS When defining a new operator or editing an existing operator, permissions can be copied from another operator or profile. Select the operator or profile to copy and click on the Copy Permissions button. OPERATOR PERMISSIONS Check the box next to the permission(s) you wish to grant the operator, for each module. 78

84 COMMON PERMISSIONS: VIEW Operator can look at the information in this module, but is not allowed to change anything. Minimum required to have access to a specific module. EDIT Operator can perform Add, Edit and Delete of information in this Module ADDITIONAL PERMISSIONS CARDHOLDERS RESTRICTED BY ZONE Operator will only be able to see cardholders which are included in Zones the operator is allowed access to. COMMAND CENTER ISSUE COMMAND Operator will not be able to actually send (issue) and defined Issue Commands to devices, unless this permisson is checked. ALARMS 79

85 ACKNOWLEDGE Operator will not be able to acknowledge an alarm, unless this permission is checked. EDIT Operator will not be able to Add, Edit or Delete existing alarm definitions, unless this permission is checked. SILENCE Operator will not be able to check the Silence Alarm option in Alarm Monitor, unless this permission is checked. VIEW ACTIVE ALARM Operator will not be able to see incoming alarm transactions, unless this permission is checked. CLEAR ACTIVE ALARM Operator will not be able to clear any existing alarms, unless this permission is checked. ZONES Select the zones in which the operator has permissions. Zone partitioning affects which cardholders and devices an operator has permission to view. Operators will only be able to view Access Points that are in the specified zone(s). If the Restrict by Zone permission is selected the operator will only be able to see the Cardholders who have access assignments in the specified zone(s). 80

86 ADD A PROFILE The only difference between a Profile and an Operator is that the Profile needs only a profile name. All other menu options, icons, and permissions are the same. A Profile cannot be used as a login. 81

87 Chapter 18 TRANSACTION MONITOR The Transaction Monitor displays real time what is going on within the software and at the Access Points. It shows card reads, alarms, operators logging on and off, updates to cardholders and badges, and commands. TRANSACTION TAB CLEAR BUFFER This button removes undisplayed transactions from a temporary table in the SQL database. CLEAR PENDING This button removes any unsent commands which are going to an access point, from a temporary table in the SQL database. FILTERS Allows the Operator to determine which transactions will show up in transaction monitor Show Cardholder Transactions Show System Transactions Show Operator Actions 82

88 TRANSACTION COLOR CODE Blue Operator Transaction Bright Red Alarm Black System and/or Cardholder DISPLAY CARD INFO Check the Display Card Info with transactions box to show cardholder images and certain cardholder and badge data with associated transactions. COLUMNS Access Point Gives the name of the Access Point on which the transaction occurred. A 0 appears when a transaction is not associated with a panel, such as operator transactions. Name Gives the name of the operator if it is an operator transaction. If the transaction occurred from an Access Point it will say Access Point. Encoded Shows encoded numbers for cardholder transactions. It is also a descriptive reference for other uses. Description Shows the event that occurred. Time Time transaction occurred corresponding to the system time on the computer running ASIDataServer. Date Date transaction occurred corresponding to the system time on the computer running ASIDataServer. SYSTEM STATUS TAB The system status tab shows a summary of information in the database. 83

89 CONNECTIONS Clicking on the Connections radio button gives a listing of the current Access Points. The Zone and Panel names are shown with the status. SYSTEM STATUS System status gives an overview of the Access Points and Cardholders that are defined in the system. The Use Date check box allows the operator to select a Date Range to use. The operator can then see transaction details during that time frame including Number of Access Granted, Number of Access Denied, Number of Alarms, Total Transactions, Buffered Transactions, and Pending Records. 84

Smart Access Control System Software. User Manual. Version 1.0

Smart Access Control System Software. User Manual. Version 1.0 Smart Access Control System Software User Manual Version 1.0 Copyright MaCaPS International Ltd. 2002 This manual was produced by MaCaPS International Ltd. MaCaPS International Ltd. http://www.macaps.com.hk

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

Smart Access Control System Software User Manual (Client Version)

Smart Access Control System Software User Manual (Client Version) Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved.

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved. Lasso CDP Client Guide August 2005, Version 1.6.8 Lasso CDP Client Guide Page 1 of 32 Copyright Copyright 2005 Lasso Logic, LLC. All Rights Reserved. No part of this publication may be reproduced, stored

More information

Read Naturally SE Software Guide. Version 2.0

Read Naturally SE Software Guide. Version 2.0 Read Naturally SE Software Guide Version 2.0 Under the terms of the Read Naturally Software Edition License Agreement, you have permission to use only the levels you purchased with the number of users

More information

Getting Started With the Cisco PAM Desktop Software

Getting Started With the Cisco PAM Desktop Software CHAPTER 3 Getting Started With the Cisco PAM Desktop Software This chapter describes how to install the Cisco PAM desktop client software, log on to Cisco PAM, and begin configuring access control features

More information

S2 NetBox v4.8 Basic End-User Admin Training

S2 NetBox v4.8 Basic End-User Admin Training S2 NetBox v4.8 Basic End-User Admin Training 4/8/16 S2 Security 1 Table of Contents Introduction... 3 Log into your NetBox System... 3 Person Records... 5 Accessing Person Records... 5 Content of a Person

More information

IS2000. Administrative Operator s Guide

IS2000. Administrative Operator s Guide IS2000 Administrative Operator s Guide Table of Contents Logging Off... 7 Event Manager... 7 HARDWARE MANAGER... 8 Maneuvering the Hardware Tree... 8 Unlocking the Module... 8 Viewing the Hardware Tree...

More information

Business Insights Dashboard

Business Insights Dashboard Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks

More information

IS2000. Administrative Operator s Guide. AOG-101 (07/2005) Software Version 7.45

IS2000. Administrative Operator s Guide.  AOG-101 (07/2005) Software Version 7.45 IS2000 Administrative Operator s Guide www.imron.com AOG-101 (07/2005) Software Version 7.45 Table of Contents INTRODUCTION...6 Overview...6 GENERAL INFORMATION...6 Logging On...7 Logging Off...9 Event

More information

USER MANUAL. Disclaimer

USER MANUAL. Disclaimer USER MANUAL Disclaimer The instructions in this document have been carefully checked for accuracy and are presumed to be reliable. Smart I Electronics Systems Pvt. Ltd. and its writers assume no responsibility

More information

LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional

LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional Installation Guide for LiNC-NXG 33-10067-001 REV: C PCSC 3541 Challenger Street Torrance, CA 90503

More information

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation Equitrac Embedded for Kyocera Mita 1.3 Setup Guide 2012 Equitrac Corporation 2012 Equitrac Corporation Equitrac Embedded for Kyocera Mita Setup Guide Document Revision History Revision Date Revision List

More information

Car Park Control System Software User Manual

Car Park Control System Software User Manual Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

DesignPro Tools for Xerox Elixir Technologies Corporation. All rights reserved.

DesignPro Tools for Xerox Elixir Technologies Corporation. All rights reserved. Follow the Crop Marks DesignPro Tools for Xerox Getting Started Guide C 1998-2008 Elixir Technologies Corporation. All rights reserved. Elixir Technologies Corporation 721 East Main Street Ventura, CA

More information

Embedded for Xerox EPA-EIP Setup Guide

Embedded for Xerox EPA-EIP Setup Guide Embedded for Xerox EPA-EIP Setup Guide 2016 XRX-EPA-EIP-20160315 Equitrac Embedded for Xerox EPA-EIP Setup Guide Document History Date Description of Revision Changes March 15, 2016 Updated for Equitrac

More information

Logging and Report Generator Program LRG. MS-Windows NT4.0, 2000 and XP Pro Version 7.0

Logging and Report Generator Program LRG. MS-Windows NT4.0, 2000 and XP Pro Version 7.0 Program LRG MS-Windows NT4.0, 2000 and XP Pro Version 7.0 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Compass RTU Guide. Version 3.x

Compass RTU Guide. Version 3.x Compass RTU Guide Version 3.x Compass RTU Guide Ver 3.x OSSI W228 N727 Westmound Dr Waukesha WI 53186 USA TEL: 262-522-1870 FAX: 262-522-1872 Ossi-usa.com Intelli-Site Security Management Software Compass

More information

Windows Download & Installation

Windows Download & Installation BrokerMetrics / AgentMetrics Instructions for a New Installation Windows Download & Installation... 1 Macintosh Download & Installation... 6 Troubleshooting... 10 How to verify your installation... 11

More information

MapMarker Plus Desktop Installation Guide

MapMarker Plus Desktop Installation Guide MapMarker Plus 11.0 Desktop Installation Guide Information in this document is subject to change without notice and does not represent a commitment on the part of the vendor or its representatives. No

More information

Administrator s Guide

Administrator s Guide Administrator s Guide 1995 2011 Open Systems Holdings Corp. All rights reserved. No part of this manual may be reproduced by any means without the written permission of Open Systems, Inc. OPEN SYSTEMS

More information

RedBeam Inventory Tracking User Manual

RedBeam Inventory Tracking User Manual RedBeam Inventory Tracking User Manual Contact us at www.redbeam.com. Page 1 Table of Contents Table of Contents... 2 Overview... 4 RedBeam Inventory Tracking... 4 PC Prerequisites... 4 Mobile Computer

More information

ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL

ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL 01/2004 Centaur is a registered trademark of Position Technology INC. Pro-Report, Tracker, FrontGuard and FrontView are trademarks of Position Technology Inc.

More information

Report Viewer Version 8.1 Getting Started Guide

Report Viewer Version 8.1 Getting Started Guide Report Viewer Version 8.1 Getting Started Guide Entire Contents Copyright 1988-2017, CyberMetrics Corporation All Rights Reserved Worldwide. GTLRV8.1-11292017 U.S. GOVERNMENT RESTRICTED RIGHTS This software

More information

HR-Lite Database & Web Service Setup Guide

HR-Lite Database & Web Service Setup Guide HR-Lite Database & Web Service Setup Guide Version: 1.00 HR21 Limited All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical,

More information

LockView 5 / 5Pro CompX Database & Network Configuration & Installation Manual

LockView 5 / 5Pro CompX Database & Network Configuration & Installation Manual LockView 5 / 5Pro CompX Database & Network Configuration & Installation Manual TABLE OF CONTENTS CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements...

More information

ipac Access Controller

ipac Access Controller STANLEY MANUFACTURED ACCESS CONTROL ipac Access Controller QUICK START GUIDE QUICK USER GUIDE Contents Standalone Interface...3 ipac at a Glance...3 Button and Functions...4 Screen Display...4 Information

More information

MapMarker Plus Developer Installation Guide

MapMarker Plus Developer Installation Guide MapMarker Plus 11.1 Developer Installation Guide Information in this document is subject to change without notice and does not represent a commitment on the part of the vendor or its representatives. No

More information

WinPak 2 & 2005 Quick Reference

WinPak 2 & 2005 Quick Reference WinPak 2 & 2005 Quick Reference Initializing a Panel (sending changes in the programming to the panels) From the menu bar select Operations Control Map Click the (+) to expand the tree and display the

More information

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software Controlsoft Identity Access Management Software IA Server Software Installation Guide v8.0.229 2018 Controlsoft Ltd 9010-0050 Issue 6 Page 1 of 39 29/10/2018 Contents 1. Introduction... 3 1.1. PC Specifications...

More information

Configuring Cisco Access Policies

Configuring Cisco Access Policies CHAPTER 11 This chapter describes how to create the Cisco Access Policies assigned to badge holders that define which doors they can access, and the dates and times of that access. Once created, access

More information

Access Control Database User Manual

Access Control Database User Manual Access Control Database User Manual P/N 270961 Rev 1.0 25OCT01 DEVELOPED BY COPYRIGHT NOTICE TRADEMARKS CREDITS Edwards Systems Technology 6411 Parkland Drive Sarasota, FL 34243 (941) 739-4300 Copyright

More information

Computer Paging Software

Computer Paging Software Page-Link Pro USA Version Computer Paging Software Installation and Operating Manual For Standalone and Networking 03/25/98 Issue 3 Information in this document is subject to change without notice. Companies,

More information

Installation Guide CONTROL MICROSYSTEMS

Installation Guide CONTROL MICROSYSTEMS Installation Guide CONTROL MICROSYSTEMS 48 Steacie Drive n Kanata, Ontario Canada K2K 2A9 Telephone: 613-591-1943 n Facsimile: 613-591-1022 Technical Support: 888-226-6876 (888-2CONTROL) ClearSCADA Getting

More information

USER MANUAL. > analyze. reduce. recover

USER MANUAL. > analyze. reduce. recover USER MANUAL > analyze > reduce > recover Table of Contents COPY AUDIT... 1 OVERVIEW... 1 IMPORTANT NOTES FOR PRINT AUDIT 4 CUSTOMERS... 1 COMMUNICATOR TECHNICAL NOTES... 2 COPY AUDIT SOFTWARE... 2 INSTALLING

More information

First Access OPERATOR GUIDE

First Access OPERATOR GUIDE First Access OPERATOR GUIDE June 2018 Cutting edge simplicity Table of Contents Introduction...4 PC Requirements...5 Step 1. Software Installation...5 Step 2. Host Server Definition...9 Step 3. Panel and

More information

Pension System/Windows. Installation Guide

Pension System/Windows. Installation Guide Pension System/Windows Installation Guide Updated for Microsoft SQL Server 2014 & MS SQL Express 2014 DATAIR Employee Benefit Systems, Inc. 735 N. Cass Ave. Westmont, IL 60559-1100 V: (630) 325-2600 F:

More information

Alien Handheld RTU Guide Version 3.9

Alien Handheld RTU Guide Version 3.9 Alien Handheld RTU Guide Version 3.9 OSSI W228 N727 Westmound Dr Waukesha WI 53186 USA TEL: 262-522-1870 FAX: 262-522-1872 Ossi-usa.com Intelli-Site Security Management Software Alien Handheld RTU Guide

More information

EasyLobby SVM 10.0 / CardAccess 3000 Configuration Guide

EasyLobby SVM 10.0 / CardAccess 3000 Configuration Guide EasyLobby SVM 10.0 / CardAccess 3000 Configuration Guide DATE: 15 JULY 2013 DOCUMENT PERTAINS TO : EASYLOBBY SVM 10.0 / CARDACCESS 3000 CONFIGURATION GUIDE REVISION: REV A Continental 2013 EasyLobby /

More information

Zodiac iclass OPERATOR GUIDE

Zodiac iclass OPERATOR GUIDE Zodiac iclass OPERATOR GUIDE June 2008 Page 2 of 19 Table of Contents Introduction... 4 PC Requirements... 4 Installing the USB Fingerprint Scanner (Hamster)... 5 Installing the USB Smartcard Programmer...

More information

Veritas Desktop and Laptop Option Mac Getting Started Guide

Veritas Desktop and Laptop Option Mac Getting Started Guide Veritas Desktop and Laptop Option 9.3.1 Mac Getting Started Guide 20-Nov-18 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Installation Guide. New Installation of Version 3.5x-3.6x

Installation Guide. New Installation of Version 3.5x-3.6x Installation Guide New Installation of Version 3.5x-3.6x FOOD-TRAK Version 3.5x-3.6x Copyright 2009 by System Concepts, Inc. All rights reserved. This manual, as well as the software described in it, is

More information

Sage 300 Construction and Real Estate. MyAssistant Installation Guide Version 18.1

Sage 300 Construction and Real Estate. MyAssistant Installation Guide Version 18.1 Sage 300 Construction and Real Estate MyAssistant Installation Guide Version 18.1 NOTICE This document and the Sage 300 Construction and Real Estate MyAssistant software may be used only in accordance

More information

Integrated Access Control Alarm Management System

Integrated Access Control Alarm Management System Integrated Access Control Alarm Management System Installation Guide PUBLICATION INFORMATION Full Release 1 Protégé System Management Suite Installation Guide PREFACE Copyright Notice Copyright 2004-2007

More information

Equitrac Integrated for Océ

Equitrac Integrated for Océ Equitrac Integrated for Océ 1.2 Setup Guide 2014 Equitrac Integrated for Océ Setup Guide Document History Revision Date Revision List November 2, 2012 Updated for Equitrac Office/Express version 4.2.5

More information

Configuring Cisco Access Policies

Configuring Cisco Access Policies 11 CHAPTER This chapter describes how to create the Cisco Access Policies assigned to badge holders that define which doors they can access, and the dates and times of that access. Once created, access

More information

Avigilon Control Center Server User Guide

Avigilon Control Center Server User Guide Avigilon Control Center Server User Guide Version 4.12 PDF-SERVER-E-Rev1 Copyright 2012 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,

More information

has been retired This version of the software Sage 300 Construction and Real Estate ( formerly Sage Timberline Office)

has been retired This version of the software Sage 300 Construction and Real Estate ( formerly Sage Timberline Office) Sage 300 Construction and Real Estate ( formerly Sage Timberline Office) MyAssistant Installation Guide Version 15.1 This version of the software has been retired NOTICE This document and the Sage 300

More information

Multi-NVR Manager. Quick Start Configuration Usage

Multi-NVR Manager. Quick Start Configuration Usage Multi-NVR Manager Quick Start Configuration Usage 2014. All rights are reserved. No portion of this document may be reproduced without permission. All trademarks and brand names mentioned in this publication

More information

Relativity Designer Installation Guide

Relativity Designer Installation Guide Liant Software Corporation Relativity Designer Installation Guide Version 5 Copyright 1994-2003 by Liant Software Corporation. All rights reserved. Printed in U.S.A. No part of this publication may be

More information

SEMS SOFTWARE SUITE INSTALLATION WHERE TO DOWNLOAD THE INSTALLERS

SEMS SOFTWARE SUITE INSTALLATION WHERE TO DOWNLOAD THE INSTALLERS SEMS SOFTWARE SUITE INSTALLATION WHERE TO DOWNLOAD THE INSTALLERS 1 SEMS SOFTWARE SUITE INSTALLATION INFORMATION Getting Started FTP Link The installation files can be downloaded from our FTP site. The

More information

KYOCERA Net Admin Installation Guide

KYOCERA Net Admin Installation Guide KYOCERA Net Admin Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for

More information

Table of Contents TRIMS Grounds Management Software Installation Guide

Table of Contents TRIMS Grounds Management Software Installation Guide Table of Contents TRIMS Grounds Management Software Installation Guide Software License Agreement... 1 Limited Warranty... 2 Starting the Installation... 2 Select Installation Type... 3 Stand Alone Desktop

More information

FirePoint 8. Setup & Quick Tour

FirePoint 8. Setup & Quick Tour FirePoint 8 Setup & Quick Tour Records Management System Copyright (C), 2006 End2End, Inc. End2End, Inc. 6366 Commerce Blvd #330 Rohnert Park, CA 94928 PLEASE READ THIS LICENSE AND DISCLAIMER OF WARRANTY

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Installing and Configuring Worldox/Web Mobile

Installing and Configuring Worldox/Web Mobile Installing and Configuring Worldox/Web Mobile SETUP GUIDE v 1.1 Revised 6/16/2009 REVISION HISTORY Version Date Author Description 1.0 10/20/2008 Michael Devito Revised and expanded original draft document.

More information

Midpoint Security,

Midpoint Security, User Manual Revision: 6, Date: October 4, 009 Midpoint Security, UAB, Kaunas, Lithuania www..emssa.net TABLE OF CONTENTS Copyright notice... Liability waiver... Introduction... 4 Overview... Settings tab...

More information

Pension System/Windows. Installation Guide

Pension System/Windows. Installation Guide Pension System/Windows Installation Guide Updated for Microsoft SQL Server 2008 R2 & MS SQL Express DATAIR Employee Benefit Systems, Inc. 735 N. Cass Ave. Westmont, IL 60559-1100 V: (630) 325-2600 F: (630)

More information

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2012 Equitrac Corporation Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List November 1, 2012

More information

Millennium Expert/Enterprise Installation Guide Version Table of Contents

Millennium Expert/Enterprise Installation Guide Version Table of Contents Millennium Expert/Enterprise Installation Guide Version 5.0.3599 Table of Contents Section Page Installing Microsoft SQL Server 2 Installing Millennium Server software 9 Installing Millennium Databases

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services Evaluation Guide for Windows November 2017 (release 2017.2) Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

TCS Access Control System Cheat Sheet

TCS Access Control System Cheat Sheet TCS Access Control System Cheat Sheet Access Control Main Screen 1 Toolbar 2 Device View Toolbar No. Name Function 1 Login Logs in the ASServer. 2 Logout Logs out the ASServer. 3 Devices Defines controllers

More information

TimeClock Plus Web Edition 3.0

TimeClock Plus Web Edition 3.0 TimeClock Plus Web Edition 3.0 Web Edition 3.0 Quick Reference WELCOME TO TIMECLOCK PLUS WEB EDITION 3.0 To access the bookmarks go to View > Navigation Panels > Bookmarks. The Quick Reference Guide was

More information

STONELOCK NETWORK USER MANUAL Version

STONELOCK NETWORK USER MANUAL Version STONELOCK NETWORK USER MANUAL Version 17.2.1 Table of Contents About StoneLock Pro...4 1.0 Overview 1.01...System Introduction...4 1.02...System Components...4 1.03...Installation...5-6 1.04...Uninstall...6

More information

Contents. User's Guide

Contents. User's Guide Contents i User's Guide ii Contents No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without prior written permission from

More information

Summary of Server Installation

Summary of Server Installation Summary of Server Installation In the following exercises, these are the steps that you will perform to install Offline V2 on a server: Exercise 1 Step 1. Step 2. Step 3. Verify Hardware Requirements Before

More information

Fitness Manager V4 Install Guide

Fitness Manager V4 Install Guide Fitness Manager V4 Install Guide Table of Contents 1 Welcome to V4...3 License Agreement...4 Copyright...4 2. Minimum System Requirements...5 3. Navigating the Install...6 4. Installing V4 on the Server...7

More information

Equitrac Embedded for Sharp OSA. Setup Guide Equitrac Corporation

Equitrac Embedded for Sharp OSA. Setup Guide Equitrac Corporation Equitrac Embedded for Sharp OSA 1.4 Setup Guide 2012 Equitrac Corporation Equitrac Embedded for Sharp OSA Setup Guide Revision Date Revision List November 1, 2012 Updated for Equitrac Office/Express 4.2.5

More information

User Guide. 3CX Recording Manager Standard. Version

User Guide. 3CX Recording Manager Standard. Version User Guide 3CX Recording Manager Standard Version 15.5.109 "Copyright VoIPTools, LLC 2011-2018" Information in this document is subject to change without notice. No part of this document may be reproduced

More information

EventMaster PLUS! Version 4 Installation and Upgrade Guide. Enterprise Deployment Microsoft SQL Server

EventMaster PLUS! Version 4 Installation and Upgrade Guide. Enterprise Deployment Microsoft SQL Server EventMaster PLUS! Version 4 Installation and Upgrade Guide Deployment Microsoft SQL Server EventMaster4 PLUS! EventMaster4 PLUS! EventMaster4 PLUS! EventMaster4 PLUS! Please send any comments regarding

More information

Equitrac Integrated for Konica Minolta

Equitrac Integrated for Konica Minolta Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2014 Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List August 9, 2013 Updated for Equitrac

More information

PAL Installation Instructions

PAL Installation Instructions PAL Installation Instructions ADMINISTRATOR (NETWORK) INSTALLS These instructions are for PCs that are connected by a network, for the purpose of sharing PAL data and notes. PAL can be installed using

More information

Pulse SCADA/HMI. Pulse Smart Login 1.1

Pulse SCADA/HMI. Pulse Smart Login 1.1 Pulse SCADA/HMI Pulse Smart Login 1.1 September 2014 Copyright The information in this document is subject to change without prior notice and does not represent a commitment on the part of AFCON Control

More information

User Guide. 3CX Audio Scheduler. Version

User Guide. 3CX Audio Scheduler. Version User Guide 3CX Audio Scheduler Version 15.5.21 "Copyright VoIPTools, LLC 2011-2018" Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted

More information

Media Archive Server for Small Teams

Media Archive Server for Small Teams Media Archive Server for Small Teams Installation Guide Daminion Server 0.9.X beta This 5-minute guide will help you set up and configure your Daminion Server Software correctly. Please take the time to

More information

1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted)

1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted) 1. ECI Hosted Clients........................................................................................... 2 1.1 Installing Release 6.3 for the First Time (ECI Hosted)...........................................................

More information

Integrated for Océ Setup Guide

Integrated for Océ Setup Guide Integrated for Océ Setup Guide Version 1.2 2016 OCE-20160914 Equitrac Integrated for Océ Setup Guide Document History Revision Date September 14, 2016 Revision List New supported devices/card reader web

More information

KYOCERA Net Viewer 5.3 User Guide

KYOCERA Net Viewer 5.3 User Guide KYOCERA Net Viewer. User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services License Management Administrator s Guide December 2018 (release 18.11) Centrify Corporation Legal Notice This document and the software described in this document are furnished

More information

User Guide. Portable Calibration Module

User Guide. Portable Calibration Module Portable Calibration Module User Guide CyberMetrics Corporation 1523 W. Whispering Wind Drive Suite 100 Phoenix, Arizona 85085 USA Toll-free: 1-800-777-7020 (USA) Phone: (480) 922-7300 Fax: (480) 922-7400

More information

Configuring Personnel and Badges

Configuring Personnel and Badges CHAPTER 10 This chapter describes how to create the personnel records and badges used to access doors in the Cisco Physical Access Control system. Note For instructions to synchronize Cisco PAM with personnel

More information

KYOCERA Net Viewer User Guide

KYOCERA Net Viewer User Guide KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Centra Workbench (V3.12 onwards)

Centra Workbench (V3.12 onwards) Workbench Installation Guide Centra Workbench (V3.12 onwards) Create and Customize User Interfaces for Router Control snellgroup.com Introduction Description This guide describes the system requirements

More information

Document Manager. Balance Point Technologies, Inc. Document Manager. User Guide. Certified MAX Integrator

Document Manager. Balance Point Technologies, Inc.  Document Manager. User Guide.  Certified MAX Integrator Balance Point Technologies, Inc. www.maxtoolkit.com Document Manager User Guide 1 P a g e Copyright Manual copyright 2017 Balance Point Technologies, Inc. All Rights reserved. Your right to copy this documentation

More information

Top Producer for Palm Handhelds

Top Producer for Palm Handhelds Top Producer for Palm Handhelds Quick Setup Top Producer Systems Phone number: 1-800-830-8300 Email: support@topproducer.com www.topproducer.com Fax: 604.270.6365 Top Producer for Palm handhelds Quick

More information

SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide

SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5 System Administrator s Guide January 2015 PREPARATION, REVIEW AND AUTHORISATION Revision # Date Prepared by Reviewed by Approved for Issue by 1 21-Jan-2015

More information

PigCHAMP Knowledge Software. Enterprise Edition Installation Guide

PigCHAMP Knowledge Software. Enterprise Edition Installation Guide PigCHAMP Knowledge Software Enterprise Edition Installation Guide PIGCHAMP, LLC Enterprise Edition Installation Guide JUNE 2016 EDITION PigCHAMP Knowledge Software 1531 Airport Rd Suite 101 Ames, IA 50010

More information

ChromQuest 4.2 Chromatography Data System

ChromQuest 4.2 Chromatography Data System ChromQuest 4.2 Chromatography Data System Installation Guide CHROM-97200 Revision A April 2005 2006 Thermo Electron Corporation. All rights reserved. Surveyor is a registered trademark and ChromQuest is

More information

User Guide. Portable Calibration Module

User Guide. Portable Calibration Module Portable Calibration Module User Guide CyberMetrics Corporation 1523 W. Whispering Wind Drive Suite 100 Phoenix, Arizona 85085 USA Toll-free: 1-800-777-7020 (USA) Phone: (480) 922-7300 Fax: (480) 922-7400

More information

Mac OS 8 Installation Instructions for Sonnet Presto and Presto Plus Processor Upgrade Cards

Mac OS 8 Installation Instructions for Sonnet Presto and Presto Plus Processor Upgrade Cards Mac OS 8 Installation Instructions for Sonnet Presto and Presto Plus Processor Upgrade Cards What You Need: Sonnet Presto or Presto Plus processor upgrade card. Sonnet Presto 8 Enabler Boot diskette. Macintosh

More information

FileMaker. Mobile 7. User s Guide. For Windows, Mac, Palm OS, and Pocket PC. Companion for Palm OS and Pocket PC

FileMaker. Mobile 7. User s Guide. For Windows, Mac, Palm OS, and Pocket PC. Companion for Palm OS and Pocket PC For Windows, Mac, Palm OS, and Pocket PC FileMaker Mobile 7 Companion for Palm OS and Pocket PC User s Guide 2000-2004 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa

More information

SmartLock Surf OPERATOR GUIDE

SmartLock Surf OPERATOR GUIDE SmartLock Surf OPERATOR GUIDE May 2015 Table of Contents Introduction... 5 Server PC Requirements... 7 Client PC Requirements... 7 Step 1. Software Installation... 8 Step 2. Firewall... 8 Step 3. Port

More information

EA/Studio Installation Guide

EA/Studio Installation Guide EA/Studio 1.5.2 Installation Guide Copyright 1994-2008 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A. All rights reserved.

More information

CentreWare DP User Guide

CentreWare DP User Guide CentreWare DP User Guide "Your Autopilot to Productive Printer Management" Version 4.0. CENTREWARE DP USER GUIDE 998, 999 by Xerox Corporation. All rights reserved. Copyright protection claimed includes

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2008 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide 2013 DataNet Quality Systems. All rights reserved. Printed in U.S.A. WinSPC and QualTrend are registered trademarks of DataNet Quality Systems. All other trademarks

More information

KMnet Viewer. User Guide

KMnet Viewer. User Guide KMnet Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be

More information

Avigilon Control Center Server User Guide

Avigilon Control Center Server User Guide Avigilon Control Center Server User Guide Version 5.0 PDF-SERVER5-A-Rev1 Copyright 2013 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,

More information

10ZiG Technology. Thin Desktop Quick Start Guide

10ZiG Technology. Thin Desktop Quick Start Guide 10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:

More information