Wednesday, October 07, WebBrix. Admin Guide

Size: px
Start display at page:

Download "Wednesday, October 07, WebBrix. Admin Guide"

Transcription

1 Wednesday, October 07, 2015 WebBrix Admin Guide

2

3 Contents 3 Table of Contents Foreword Part I Web Client Monitor/Command... 5 Events... 5 Status... 7 HID Edge and... Edge EVO 8 HID V1000 and... V1000 EVO 8 HID V2000 and... V2000 EVO 9 HID V HID V HID V HID Reader HID Input HID Output ASSA ABLOY... IP Lockset 13 Scheduled... Com m ands 14 Com m and... Door Groups 16 Visual Verification Alarms Define Alarm... s 17 User Instructions Threat Level Access... Control 22 Cards Card Sets Access Levels Door Groups Areas Contact Schedules Schedules Holiday Groups Holidays Video People CardHolder... Directory 39 System Users Reporting Reports Utilities Change User... Passw ord 45 Custom ize... Screen 46 SMTP Server... Setup 46

4 4 1 WebBrix Web Client To open the Web Client double click the desktop icon or navigate to Start > Program Files > WebBrix. The default username is Admin and the password is nothing (blank). It's recommended this be changed to something more secure during system configuration. The menu bar is divided into 6 main sections or tabs (See Figure 1). Figure 1 Each of these tabs contains sub topics. The main sections are: Monitor/ Command Access Control Video People Reporting Utilities In addition to the tabs and their sub tabs, there are also two links in the upper right hand corner, Home and Log Out (See Figure 2). Figure 2 The Status Bar at the bottom of the screen will contain any additional information. The WebBrix system is licensed for a certain amount of Clients. Once logged into WebBrix through a browser, a Client license is being used. If you fail to log out before shutting the browser down, the used Client license will remain in use until the IIS timeout period has expired. The default timeout period in IIS is 20 minutes.

5 Web Client 1.1 Monitor/Command The Monitor/Command tab contains the following menu items: Events Status Scheduled Commands Command Door Groups Visual Verification Events The Events screen will show live events or alarms. To toggle between events and alarms, click the "View Event History" or "View Active Alarms" tabs. Clicking the arrows on the bottom of the screen pauses display of new events and allows the navigation of past events. To return to Live mode, click the "View Event History" or "View Active Alarms" tab. To review the last 200, 500 or 1000 events, click the appropriate link at the bottom of the screen. This will open a new browser window. The events/alarms are sorted by Date/Time ascending. To change what column the events are sorted by, or to toggle between ascending and descending, click the column header. Doing this will place the window in pause mode. To return to Live mode, click either of the tabs or the "Resume Live Mode" link. Once back in Live mode, the default sorting of Date/Time ascending will be reapplied. Entries in the Name and Encoded ID columns show as links and will allow Event History Screen 5

6 6 WebBrix navigation to a card holder or card. This is useful when adding cards. The Active Alarms screen shows all active alarms. An alarm icon to the left of the Home icon or a red highlighted event (see Event History Screen) indicate there's an active alarm. Active Alarm Screen The alarms follow the same pausing, navigation and sorting rules that the events do. A red alarm indicates the alarm is an Unacknowledged alarm or new. A green alarm indicates the alarm has been Acknowledged. An alarm will stay in the grid as long as it has not been Acknowledged & Removed. Clicking on "Details" for any alarm will display that alarms detail page. This screen will contain details about the alarm including user comment history. There are 4 possible actions for every alarm: Unacknowledge - Only possible for previously Acknowledged alarms. Acknowledge - Only possible for Unacknowledged alarms. Acknowledge and Remove - Will remove the alarm from the active alarm list. Add Comment Only - Will only add the text in the comments section to the alarm. Alarm Details Click the arrows to navigate the user comments. Click Save and Return to save any changes and return to the Active Alarm Screen.

7 Web Client Status The Status screen will list all the hardware objects for the current partition (See Figure Status Screen). Status Screen This screen will update or refresh every 5 seconds (default) in order to update the hardware status. To change the refresh rate of the Status Screen, modify the registry value at HKLM\Software\AMT\Settings\HWStatusGridRefreshInterval. The text in the Status column indicates the current state of the hardware object. It's worth noting that unlike the rich client, the icons will NOT change to represent the hardware state. The command columns contain the most common commands for the hardware objects type. To access all of the available commands, click on the object name. On larger systems or systems with many hardware objects, use the search box, navigation arrows or rolodex tab to locate specific hardware objects. To configure the properties of hardware objects, click on the object name. Here is a list of all possible hardware types: HID Edge and Edge Evo HID V1000 and V1000 Evo HID V2000 and V2000 Evo HID V100 HID V200 HID V300 HID Reader (Door) HID Output HID Input ASSA ABLOY IP Lockset

8 8 WebBrix HID Edge and Edge EVO The Edge and Edge EVO configuration page will show you the state and recent activity of the controller. This page will also allow you to set the controllers name, the normal position for the AC Power Fail and Battery Fail inputs, modify the Time Zone or turn encryption on or off HID V1000 and V1000 EVO The V1000 and V1000 EVO configuration page will show you the state and recent activity of the controller. This page will also allow you to set the controllers name, modify the Time Zone or turn encryption on or off.

9 Web Client HID V2000 and V2000 EVO The V2000 and V2000 EVO configuration page will show you the state and recent activity of the controller. This page will also allow you to set the controllers name, the Door Behavior, the normal position for the Tamper, AC Power Fail and Battery Fail inputs, modify the Time Zone or turn encryption on or off. Every V2000 may be configured to function as a Card In Free Out (controls two independent doors) or as a Card In Card Out (controls one door with two readers) controller. The default configuration is Card In Free Out. When configured to act as a Card In Card Out controller the door switch and door strike are wired to the door 1 side of the V100. The door 2 strike relay and aux relay may still be used with manual commands or IO Linker rules. The REX inputs are still active on both sides of the V2000 and both control the door 1 strike relay.

10 10 WebBrix HID V100 The V100 configuration page will show you the state and recent activity of the controller. This page will also allow you to set the panels name and select the door behavior. Every V100 may be configured to function as a Card In Free Out (V100 controls two independent doors) or as a Card In Card Out (each V100 controls one door with two readers) controller. The default configuration is Card In Free Out. When configured to act as a Card In Card Out controller the door switch and door strike are wired to the door 1 side of the V100. The door 2 strike relay and aux relay may still be used with manual commands or IO Linker rules. The REX inputs are still active on both sides of the V100 and both control the door 1 strike relay HID V200 The V200 configuration page will show you the state and recent activity of the controller. This page will also allow you to set the controllers name. The V200 panel has 16 inputs and 2 outputs.

11 Web Client HID V300 The V300 configuration page will show you the state and recent activity of the controller. This page will also allow you to set the controllers name. The V300 panel has 12 outputs and 2 inputs.

12 12 WebBrix HID Reader The Reader Configuration screen is used to set the properties and behavior of the selected reader (See Figure Reader Configuration). Reader Configuration APB stands for Anti Passack REX stands for Request to Exit HID Input The HID Input configuration page will show you the state and recent activity of the input. This page will also allow you to set the input name, the Line Supervision, the Normal Position and the Debounce Time.

13 Web Client HID Output The HID Output configuration page will show you the state and recent activity of the input. This page will also allow you to set the output name ASSA ABLOY IP Lockset The Lockset configuration page will show you the state and recent activity of the lockset. This page is also used to set the behavior or properties of the lockset. Before any lockset can be functional in the WebBrix system, it must be accepted into the system. On the lockset configuration page, there is an "Accepted" checkbox. This will need to be checked and the configuration saved successfully before the lockset will be active in the system. A lockset cannot be "Accepted" successfully unless there is a COMM USER credential associated with the lockset. To accomplish this, create (or assign) a COMM USER credential and assign that credential an Access Level that has access to the lockset. This safe-guard is in place because the lockset can be set to ONLY communicate with the software when a COMM USER credential is presented to the reader. To ensure WebBrix has an initial communication path with the lockset, this rule must be enforced.

14 WebBrix Scheduled Commands The Scheduled Commands screen will show all created scheduled commands (See figure Scheduled Commands). An example of a scheduled command would be assigning your Front Door to be open during the "Business Hours" schedule.

15 Web Client 15 Scheduled Com m ands On larger systems or systems with many scheduled commands, use the search box, navigation arrows or rolodex tab to locate specific scheduled commands. To add a new scheduled command, click the New Scheduled Command link at the bottom of the page. This will open the New Scheduled Command screen (See figure New Scheduled Command). New Scheduled Com m and To create a new scheduled command, select the object to be commanded in the Name field, the command to be issued in the Command field and the schedule this command will follow in the Schedule field. Click Save & Return to save and return to the previous screen or Save & New to save and create another scheduled command.

16 WebBrix Command Door Groups The Command Door Groups page will allow you to command (Lock or Unlock) all the doors in a certain door group. Use caution when using this feature. This will command all the doors in the selected Door Group either Locked or Unlocked AND will not return those doors to their normal state until commanded to by the user or by a previously programmed schedule Visual Verification The Visual Verification page shows the photos that are associated with card events for a single Door Group. You can change the selected Door Group in the upper right corner and you can scroll through past events using the navigation buttons on the bottom of this page.

17 Web Client Alarms The Alarms tab (see figure Alarms) contains the following items: Alarm s Define Alarms User Instructions Threat Levels Define Alarms The Define Alarms page will give a list of all available hardware in the current partition. Click on a hardware object to open the alarm definition page. This page will allow you to configure any event as an alarm. (See Figure Alarm Definition)

18 18 WebBrix Alarm Definition You'll first want to select an event to define as an alarm. Drop down the Alarm Event listbox to see all available events. (See Figure Alarm Events) All events with an asterisk behind the event name is already configured as an alarm. Alarm Event

19 Web Client 19 Select an event you'd like to define as an alarm and then check the "Track as an Alarm" checkbox. In this example, we'll use the DoorHeldOpen event. Once you've checked the "Track as an Alarm" checbox, the remaining controls on this page will be enabled. The first two options you have are "Require User Comment" and "Track each occurrence as a separate Alarm" Checking the "Require User Comment" checkbox will require the user to first add a comment before Acknowledging the alarm. Checking the "Track each occurrence as a separate Alarm" checkbox will add a new row to the Alarm Grid every time this alarm occurs. Leaving this option unchecked will simply increment the "Count" column in the Alarm Grid. The next section of this page is User Instructions. You can assign a User Instruction to your alarm. This User Instruction will be visible when the user views the details of an alarm from the Alarm Grid. Highlight the User Instruction in the left column (Available User Instructions) and click the "Add-->" button to move it to the right column (Selected User Instructions). You may add multiple User Instructions per alarm. The final section of this page is Notifications. This section will allow you to define what is sent and who it's sent to. The first option in this section is "Include Alarm Information". Checking this option will send the name of the object and alarm. For example: Front Door - DoorHeldOpen The next option is "Message Text / Subject". The text you place in the field will show up in the subject line of the sent text or . The next option is who you want your message to go to. Similar to User Instruction, highlight the contact in the left column and move it to the right column using the "TO", "CC" or "BCC" buttons. To remove a contact from receiving alarm notifications, move the contact from the right column to the left column using the "Remove" button. These users are defined in the System Users section User Instructions The User Instruction page will show you all the defined User Instructions in the current partition. To add a new User Instruction, click on "New User Instruction". There are only two field on the User Instruction definition page. The first field is "Name" which is the name or title of your User Instruction. The second field is "Instruction Text" which is what the user will see when viewing the details of the alarm.

20 WebBrix Threat Level The Threat Levels feature was designed to allow the users of the system to work with local law enforcement or other appropriate people to plan for the types of situations they may need the system to help them respond to, and to determine the appropriate changes to the behavior of the system during an active threat. These include things like changes to card access privileges. For example, it may be desirable during the time that a threat is present that certain doors should be locked, for cards that would normally be granted access to be denied, and access privileges enabled on cards provided to first responders that have access only during an active threat. Given the potential importance of this feature, and the number of things it relies on to work correctly, the owners of the system must take great care to ensure the reliability and protection of the infrastructure that the system depends on. This includes network and server resources, network switches, power supplies, etc. Finally the system must be tested regularly to ensure it completely performs all intended behaviors and access rule changes. Summary of Owners Responsibilities To ensure the policies make sense for their situations. This should be done with the help of law enforcement or other professionals in this area. To ensure there is reliable and protected network, power, and all other infrastructure required to ensure the system works when needed. To ensure the system is regularly tested and completely performs the intended behaviors and access rule changes. There are three areas that can be commanded for any defined Threat Level: Restricted Card Access Doors Outputs The Threat Level page (See Figure Threat Levels) will show a list of Threat Levels in the current partition. From this screen you can "Activate" or "Clear" a Threat Level by clicking on the appropriate command link. The first 4 Threat Levels icons will appear in the application header (see figure Threat Levels). Clicking on these icons will active the associated Threat Level. To deactivate the Threat Level, go to the Threat Level page and click Clear.

21 Web Client 21 Threat Levels To define a new Threat Level, click the "New Threat Level" link. The New Threat Level page will allow you to name your Threat Level as well as give a brief description. You can select an icon that best represents your Threat Level and select which background color the application header (the top of the screen) will change to when your Threat Level is active. The Restricted Doors section will allow you to define which doors can be accessed by which credentials(cards or pins) when the Threat Level is active. This is done by selecting a Door Group and Access Level combination. Any credential that is assigned to the specified Access Level, will have access the the doors in the specified Door Group when the Threat Level is active. Every Threat Level can contain multiple Restricted Door entries. The Doors to Command section will allow you to define which doors will be affected by this Threat Level. You can command doors to either Lock or Unlock and each Threat Level can contain multiple Doors to Command entries. Doors not contained in the Restricted Doors or the Doors to Command sections of a Threat Level will retain their normal configuration, state and permissions when the Threat Level is active. The Outputs to Command section will allow you to define which outputs will be affected by this Threat Level. You can command doors to either Activate or Deactivate and each Threat Level can contain multiple Output to Command entries. Outputs not contained in the Outputs to Command section of a Threat Level will retain their normal configuration and state when the Threat Level is active.

22 22 WebBrix New Threat Level Only 1 Threat Level can be active at a time. 1.3 Access Control The Access Control tab (see figure Access Control) contains the following menu items: Access Control Cards Cardsets

23 Web Client 23 Access Levels Door Groups Areas Contact Schedules Schedules Holiday Groups Holidays When setting up a new WebBrix system, working through the menu items from right to left will make more sense. Create the Holidays, then Holiday Groups. Create the Schedules and Door Groups and then create Access Levels. Define Card Sets and then Cards Cards The Card screen will show all the cards in the system (See figure Cards). Cards On larger systems or systems with many cards, use the search box, navigation arrows or rolodex tab to locate a specific card. To modify an existing card, click the card number. To add a new card to the system, click the New Card link at the bottom of the Cards screen. This will open the New Card screen (See figure New Card). New Card To add a group of cards all at once, click the New Cards link at the bottom of the Cards screen. This

24 24 WebBrix will open the New Cards screen, which has the additional field of "Number of Cards" (see figure Bulk Cards) Bulk Cards Here is a list of card options: Card Number - The encoded ID of the actual card. Card Set - The card set this specific card will use. Active On - This is the date the card will be activated. The default is the current date and time. Expires - There are three possible values for this option: o Expires Never - The card will never expire. (default) o Expire On - Selecting this option will expose date and time fields. Specify a date and time in the future that this card will expire on. o Expire Now - The card will expire immediately. Credential Type - There are two possible values for this option: o Card Only/Card Plus PIN o Pin Only Number of Cards (New Cards only) - The number of cards to add, starting with the value in the Card Number field. PIN Code - The PIN associated with the card. Confirm PIN - Confirmation of the PIN code. Communication User - Used for AHG420 Locksets only. This credential will wake the onboard WiFi. Extended Access - This indicates that this card will use the Extended Access time. Passback Exempt - This card will be APB exempt. PIN Exempt - This card will be PIN exempt. Assigned To - The cardholder this card belongs to. Search cardholder by - This selects what field the search criteria will be applied to. for matches beginning with - On systems with a large cardholder population, use this field to find a specific cardholder. Access Levels - The Access Levels assigned to the card. You can also assign Temporary Access Levels to a card. To do so, highlight the Access Level in the left hand column and click the "Add Temporary" button. This will enable the "Active" and "Expire" fields below. (see figure Temporary Access Levels)

25 Web Client 25 Once you've set the Active and Expire dates of the Access Level, click done to Card Sets The Card Sets screen will show all the card sets that are available in the current partition (see figure Card Sets). Card Sets On larger systems or systems with many card sets, use the search box, navigation arrows or rolodex tab to locate a specific card set. To modify an existing card set, click the card set name. To add a new card set to the system, click the New Card Set link at the bottom of the Card Set screen. This will open the New Card Set screen (see figure New Card Set).

26 26 WebBrix New Card Set Card sets have three properties: Description - The name of the card set. Facility Code - The facility code of the card set. (optional) Card Type - The card format the card set will use. The available formats are: o 26 bit o 33 bit o 34 bit o 37 bit o Corp1000 o 37 bit with Facility Code Click Save & Return to save and return to the previous screen or Save & New to save and create another card set Access Levels The Access Levels screen will show all the Access Levels in the system (See figure Access Levels). Access Levels On larger systems or systems with many access levels, use the search box, navigation arrows or rolodex tab to locate a access level.

27 Web Client 27 To edit an existing access level, click the name of the access level. To create a new access level, click the New Access Level link at the bottom of the Access Levels screen. This will open the New Access Levels screen (See figure New Access Level). New Access Level Access levels have five properties: Name - The name of the access level. Description - The description of the access level. Deadbolt Override - Cards that are associated with an access level that has this option checked will override the deadbolt. Door Groups - The name of a specific door group. Schedules - The name of the schedule assigned to the selected door group. Access levels can contain multiple door group/schedule associations. For example, a access level named "All doors - 24x7" might contain two sets of door group/schedule associations (See figure Multiple Door Goups). Multiple Door Groups

28 28 WebBrix When adding a door group/schedule association, make sure to click the Add button before saving. If you fail to click the Add button, the access level will be created but will not contain a door group/schedule association. This is a common mistake and will give the appearance that the WebBrix system is not working properly. Click Save & Return to save and return to the previous screen or Save & New to save and create another access level Door Groups The Door Groups screen will show all the door groups in the current partition (See figure Door Groups). Door groups are a grouping of doors that will later be associated with a schedule to create access levels. Door Groups On larger systems or systems with many access levels, use the search box, navigation arrows or rolodex tab to locate a door group. To edit an existing door group, click the name of the door group. To create a new door group, click the New Door Group link at the bottom of the Door Groups screen. This will open the New Door Group screen (See figure New Door Group).

29 Web Client 29 New Door Group Door groups have four properties: Name - The name of the door group. o This is usually something descriptive such as "Exterior Doors" Description - A description of the door group. Doors Not Assigned to Door Group - All the doors that are NOT part of the door group. Door Assigned To Door Group - All the doors that are part of the door group. Click Save & Return to save and return to the previous screen or Save & New to save and create another door group Areas The Areas screen will show all the Areas in the current partitions (see figure APB Areas). Areas are the definition of entry and exit readers for an APB (anti-passback) area. APB Areas On larger systems or systems with many areas, use the search box, navigation arrows or rolodex

30 30 WebBrix tab to locate an area. To edit an existing area, click the name of the area. To create a new area, click the New Area link at the bottom of the APB Areas screen. This will open the New Area screen (See figure New Area). New Area New areas have four properties: Name - The name of the area. Description - The description of the area. (optional) Entry Readers - Readers defined as entry readers. Exit Readers - Readers defined as exit readers. To add or remove entry or exit readers, use the Add/Remove buttons. The entry and exit readers contained within an area must be physically wired to a single controller. An Edge reader CANNOT be part of an area. Click Save & Return to save and return to the previous screen or Save & New to save and create another area.

31 Web Client Contact Schedules The Contact Schedule screen will show all the contact schedules in the current partition (see figure Contact Schedules). Contact schedules are used by the standalone AHG420 locksets to control the built in Wi-Fi radio. Contact Schedules On larger systems or systems with many contact schedules, use the search box, navigation arrows or rolodex tab to locate a contact schedule. To edit an existing contact schedule, click the name of the contact schedule. To create a new contact schedule, click the New Contact Schedule link at the bottom of the Contact Schedule screen. This will open the New Contact Schedule (See figure New Contact Schedule). New Contact Schedule New contact schedules have three properties: Description - The name of the contact schedule. Schedule Type - The type of schedule the contact schedule will use. There are five possible options: o Comm User Only - The lockset does not automatically wake up on any schedule. Only a Communication User can wake the lock up in the field.

32 32 WebBrix o Day of Month - Select certain days of the month for the schedule to operate. Day(s) of Month - Select the dates that you wish the lock to activate each month. Time of Day - Select from 1 to 4 times per day that you wish the lockset to wake up. o Day of Week - Select certain days of the week for the schedule to operate. Day(s) of Week - Select the days that you wish the lock to activate each week. Time of Day - Select from 1 to 4 times per day that you wish the lockset to wake up. o Connection Always On - The lockset radio will never turn off. Recommended for use ONLY on hard powered locks, as this setting will greatly reduce battery life. o Simple('x' minutes off, 'y' seconds on scheduler) - The lockset radio will remain off for the sleep period. Sleep Period (minutes) - The number of minutes for the radio to remain off until connecting to the server again. Connection Timeout Time (seconds) - The maximum number of seconds to leave the radio running. We recommend a value of 30 seconds. Click Save & Return to save and return to the previous screen or Save & New to save and create another contact schedule Schedules The Schedules screen will show all the schedules available to the current partition (See figure Schedules). Schedules On larger systems or systems with many schedules, use the search box, navigation arrows or rolodex tab to locate a schedule. To edit an existing schedule, click the name of the schedule. To create a new schedule, click the New Schedule link at the bottom of the Schedules screen. This will open the New Schedule screen (See figure New Schedule).

33 Web Client 33 New Schedule Schedules have 5 properties: Name - The name of the schedule. Description - A description of the schedule (optional) Day/Start Time/Stop Time - The Day of the week and the associated Start and Stop times. It's common to have a schedule contain many Day/Start & Stop Time associations. For example, WebBrix comes with a default "Business Hours" schedule. This schedule contains five Day/Time associations (see figure Business Hours). Notice that the Start Times are at 8:00AM and the Stop Times are at 5:59PM. This is because Start Times start at the beginning of the minute (8:00:01AM) and Stop Times end at the end of the minute (5:59:59PM). Business Hours The Day field also contains Holiday Groups. This feature is used to assign specific time intervals to Holidays contained within a Holiday Group. For example, let's say there's a Holiday Group named "Half Day Holidays" that contains all the weekday Holidays the company will only works half days on. Add a Holiday Group/Start & Stop Time association (see figure Half Day Holiday).

34 34 WebBrix Half Day Holiday Holiday Group/Time associations will always trump Day/Time associations. In other words, if a holiday group contains a holiday that falls on a Wednesday and the normal Wednesday time interval is 8:00am to 5:59pm, but the holiday time interval is 8:00am to 11:59am, the holiday interval will be applied. It's also common to have multiple Start and Stop times for a single day. For example, a night crew might work from 7:00pm until 4:00am the following day (see figure Night Shift). Night Shift Finally, it's also common to create a "Never" time interval. This is typically used when creating a a Holiday Group/Time association. The correct Start Time and Stop Time for a NEVER schedule are 12:00am to 12:00am Holiday Groups The Holiday Groups screen will show all the Holiday Groups that are available in the current partition (see figure Holiday Groups). Holiday Groups are a group of similar holidays and are used when creating schedules.

35 Web Client 35 Holiday Groups On larger systems or systems with many holidays groups, use the search box, navigation arrows or rolodex tab to locate a holiday group. To edit an existing holiday group, click the name of the holiday group. To create a new holiday group, click the New Holiday Group link at the bottom of the Holiday Groups screen. This will open the New Holiday Group screen (See figure New Holiday Group). New Holiday Group There are four properties for a new holiday group: Name - The name of the holiday group. Description - The description of the holiday group. (optional) Holidays Not Assigned To Holiday Group - All holidays not assigned to the holiday group. Holidays Assigned To Holiday Group - Holidays assigned to the holiday group. To assign a holiday to the holiday group, highlight the holiday in the Holidays Not Assigned To Holiday Group box and click the Add button. This will place the selected holiday in the Holidays Assigned To Holiday Group box.

36 36 WebBrix Click Save & Return to save and return to the previous screen or Save & New to save and create another holiday group Holidays The Holidays screen will show all the holidays that are available in the current partition (see figure Holidays). Similar holidays will be grouped in Holiday Groups for use in creating schedules. Holidays On larger systems or systems with many holidays, use the search box, navigation arrows or rolodex tab to locate a holiday. To edit an existing holiday, click the name of the holiday. To create a new holiday, click the New Holiday link at the bottom of the Holidays screen. This will open the New Holiday screen (See figure New Holiday). New Holiday

37 Web Client 37 There are three properties for a new holiday: Name - The name of the holiday. Description - The description of the holiday. (optional) Date - The data of the holiday o To set the date either use the month/day/year dropdown boxes or the interactive calendar. Click Save & Return to save and return to the previous screen or Save & New to save and create another holiday. Holidays are set on a yearly basis. In other words, even though some holidays are on the same date every year, they still need to have year attribute modified to be active for the next year. 1.4 Video The Video Devices page will list all of the video related hardware in the current partition. This will include video servers and cameras. When looking at the Video Devices page, there's no visible way to differentiate between a camera and a video server. That said, it's recommended you name your devices in such a way that you'll be able to easily identify them. Clicking on the eye icon in "View Video" column will take you directly to that devices page. In the case of a video camera, you'll be taken to a page that shows a live video stream from just that camera. If you click the eye icon of a video server device, you'll be taken to that servers main configuration page. Clicking on the name of the device from the Video Devices page will allow you to configure the hardware as it relates to WebBrix. For example, clicking on a camera name will open the Video Device Association page. (see figure Video Device Association)

38 38 WebBrix Video Device Association This page will allow you to associate a camera with one or more harware object (reader, input or output). After associating a camera with a hardware object(s), whenever an event is produced by that object, WebBrix will link the video from that camera to that event. This will be represented in the Event Grid by a video clip icon just to the left of the Date/Time column. (see figure Video Icon) Video Icon Clicking on the video icon will open the associated camera page and will playback video from the date and time of the event. If you click on the name of a video server or the "New Video Device" link from the Video Devices page, you'll be taken to a page that will allow you to configure your video server properties. (see figure Video Server Properties) Video Server Properties

39 Web Client 39 Here you can name your server, select what type of video server it is (only when adding a new video server), specify the Host Name or IP Address of the server, set the TCP port for communication and enter the username and password of the video server. When all the fields have been completed, click "Add/Update Cameras" to bring all the cameras associated with that server/user into the WebBrix system. Click "Save & Return" to save your video server setting and return to the Video Devices page, where you should see the video server you added or configured along with any cameras that have been discovered. 1.5 People The People tab contains two sub menu items (see figure People). People CardHolder Directory - People that have credentials (cards, fobs or PIN numbers). System Users - People that will log into the software CardHolder Directory The Cardholder Directory screen will show all the available cardholders in the current partition (see CardHolders). WebBrix separates cards and cardholders. In this section only cardholders will be defined, not cards. Use the cards section of WebBrix to assign cards to cardholders. CardHolders On larger systems or systems with many cardholders, use the search box, navigation arrows or rolodex tab to locate a specific cardholder. To modify an existing cardholder, click the cardholder name.

40 40 WebBrix To add a new cardholder to the system, click the New CardHolder link at the bottom of the CardHolder screen. This will open the New CardHolder screen (See figure New CardHolder). New CardHolder There are many New CardHolder properties, but only two of them are required; Last Name and First. The "Synchronize from directory server" check box is related to the IDHolderDataImporter utility. When a cardholder is imported from an Active Directory server, this check box is checked. This indicates that this cardholder should sync with the matching user in Active Directory. In other words, if the matching user in Active Directory is removed, the related cardholder in WebBrix will also be removed. When manually creating a new cardholder using WebBrix, this check box will NOT be checked. Deleting a cardholder in WebBrix will not delete the matching user in the associated Active Directory. The "Show Additional Fields" link will expose a set of additional fields (see figure Additional Fields).

41 Web Client 41 Additional Fields To assign a picture to the cardholder, click the Browse button in the Photo section to locate the desired picture. Once a picture is selected, click the Use This Photo to complete the association. A picture with an aspect ratio of 2x3 will look the best. To save the current cardholder and create a new card, click the link under Assigned Cards section. Click Save & Return to save and return to the previous screen or Save & New to save and create another cardholder System Users The System Users page will show you all the users that have access to the current partition. (see figure Users) Users are defined as users of the software. Users Click on "New User" or the name of a user already in the system will open the User configuration page. (see figure User Configuration) The 3 required field on this page are "Username", "Passowrd" and "Confirm Password".

42 42 WebBrix User Configuration The " ", "Mobile #" and "Service Provider" fields are required if this user will be setup to receive /txt alarm notifications. See Define Alarms for more information regarding /txt notifications. The Roles section allows you to assign one or more roles to the user. Roles are defined in the Security section of the Rich Client. 1.6 Reporting The Reporting tab contains one menu item (see figure Reporting). The menu item is Reports Reporting

43 Web Client Reports The Reports page will show all the available reports for the current partition (see figure Reports). Reports On larger systems or systems with many reports, use the search box, navigation arrows or rolodex tab to locate a specific report. To run a default report, click the appropriate PDF or CSV arrow icon. This will start the generation of the report (see figure Generating Report). Generating Report As this screen indicates, you may continue to use WebBrix while this process is taking place and return to the reports screen to check the status of the report. Typically the report generation will take 5 to 15 seconds, but on larger systems or when running reports that contain large amounts of data, this may take longer. When generation is complete click the View Report link (see figure View Report).

44 44 WebBrix View Report Clicking the View Report link will open the PDF report in the default browser window (see figure PDF Report). PDF Report Use the reports section of the rich client to modify the columns, grouping/sorting and appearance of reports. To apply limitations to a report, click the report name (see figure Reports). This will show the report limitation screen (see figure Report Limitation). Report Lim itation Click the Add Limitation button to add filtering. You can apply multiple limitations to your selected report. Click the Run Report icon to run the report after all limitations have been applied.

45 Web Client Utilities The Utilities tab contains 3 menu items (see figure Utilities). Utilities Change User Password Customize Screen SMTP Server Setup Change User Password The Change User Password screen will allow the logged in user to change their password (see figure Change Password). Change Passw ord The Change Password screen has three fields: Old Password - The logged in users current password. New Password - The password the logged in user would like to use. Confirm New Password - The new password again for confirmation. Click the Confirm button to change the password.

46 WebBrix Customize Screen The Customize Screen page will allow you to change the partition logo (upper left hand corner of the page) and/or select a page style. Cusom ize Screen When selecting a logo file, make sure the dimensions do not exceed 40px (H) or 200px (W) SMTP Server Setup The SMTP Server Setup page will allow you to define your SMTP server which is required for or text message alarm notifications. The "From Display Name" field will be the sender of the or text. The " From Address" will be the reply address (if the recipient replies). The remaining fields define the SMTP server properties. The "Outgoing Mail Server" field will be the IP address or fully qualified network name of the SMTP server. The "Port" field indicates which TCP port communication will be on. If your SMTP server requires authentication, check the "Requires Authentication" checkbox and enter a Username and Password.

47 Web Client In order to send alarm notification, you must have a SMTP server defined. 47

Wednesday, October 07, WebBrix. Admin Guide

Wednesday, October 07, WebBrix. Admin Guide Wednesday, October 07, 2015 Admin Guide Contents 3 Table of Contents Foreword Part I 0 5 1 Release... Notes 5 2 Installing... 10 PC Requirem... ents 11 Netw ork Requirem... ents 11 User Perm... issions

More information

Secure Transfer Site (STS) User Manual

Secure Transfer Site (STS) User Manual Secure Transfer Site (STS) User Manual (Revised 3/1/12) Table of Contents Basic System Display Information... 3 Command Buttons with Text... 3 Data Entry Boxes Required / Enabled... 3 Connecting to the

More information

WinPak 2 & 2005 Quick Reference

WinPak 2 & 2005 Quick Reference WinPak 2 & 2005 Quick Reference Initializing a Panel (sending changes in the programming to the panels) From the menu bar select Operations Control Map Click the (+) to expand the tree and display the

More information

Welcome to the Investor Experience

Welcome to the Investor Experience Welcome to the Investor Experience Welcome to the Black Diamond Investor Experience, a platform that allows advisors to customize how they present information to their clients. This document provides important

More information

Configuring Cisco Access Policies

Configuring Cisco Access Policies CHAPTER 11 This chapter describes how to create the Cisco Access Policies assigned to badge holders that define which doors they can access, and the dates and times of that access. Once created, access

More information

Configuring Cisco Access Policies

Configuring Cisco Access Policies 11 CHAPTER This chapter describes how to create the Cisco Access Policies assigned to badge holders that define which doors they can access, and the dates and times of that access. Once created, access

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management Account Management Administrator User Guide July 2016 1 Copyright 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T

More information

EZ-ACC User Guide July

EZ-ACC User Guide July EZ-ACC User Guide July 2011 1 TABLE OF CONTENTS TECHNICIAN SETUP... 3 ADD/REMOVE CARDHOLDERS... 4 ADDING A NEW CARD:... 4 EDITING A CARDHOLDER:... 4 DELETING A CARDHOLDER:... 4 OVERRIDE DOORS... 5 LOCK/UNLOCK

More information

Monitoring Supervisor Guide. Access Control Manager Software Version

Monitoring Supervisor Guide. Access Control Manager Software Version Monitoring Supervisor Guide Access Control Manager Software Version 5.10.10 2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, ACCESS CONTROL MANAGER, ACM, ACM VERIFY AND TRUSTED

More information

Alarm and Event Monitoring Operator Manual. Access Control Manager Software Version

Alarm and Event Monitoring Operator Manual. Access Control Manager Software Version Alarm and Event Monitoring Operator Manual Access Control Manager Software Version 5.10.12 2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, ACCESS CONTROL MANAGER and ACM are

More information

Configuring Personnel and Badges

Configuring Personnel and Badges CHAPTER 10 This chapter describes how to create the personnel records and badges used to access doors in the Cisco Physical Access Control system. Note For instructions to synchronize Cisco PAM with personnel

More information

Midpoint Security,

Midpoint Security, User Manual Revision: 6, Date: October 4, 009 Midpoint Security, UAB, Kaunas, Lithuania www..emssa.net TABLE OF CONTENTS Copyright notice... Liability waiver... Introduction... 4 Overview... Settings tab...

More information

User s Guide. (Virtual Terminal Edition)

User s Guide. (Virtual Terminal Edition) User s Guide (Virtual Terminal Edition) Table of Contents Home Page... 4 Receivables Summary... 4 Past 30 Day Payment Summary... 4 Last 10 Customer Transactions... 4 View Payment Information... 4 Customers

More information

User Guide. BlackBerry Workspaces for Windows. Version 5.5

User Guide. BlackBerry Workspaces for Windows. Version 5.5 User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

Understanding Door Configuration

Understanding Door Configuration CHAPTER 5 This chapter describes the concepts used to configure doors and templates. A door configuration is a collection of devices, such as locks and readers, connected to a Cisco Physical Access Gateway

More information

Monitoring Operator Guide. Access Control Manager Software Version

Monitoring Operator Guide. Access Control Manager Software Version Monitoring Operator Guide Access Control Manager Software Version 5.12.0 2016-2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, ACCESS CONTROL MANAGER, ACM, and ACM VERIFY are

More information

S2 NetBox v4.8 Basic End-User Admin Training

S2 NetBox v4.8 Basic End-User Admin Training S2 NetBox v4.8 Basic End-User Admin Training 4/8/16 S2 Security 1 Table of Contents Introduction... 3 Log into your NetBox System... 3 Person Records... 5 Accessing Person Records... 5 Content of a Person

More information

User Guide. 3CX Enhanced Billing Codes. Version

User Guide. 3CX Enhanced Billing Codes. Version User Guide 3CX Enhanced Billing Codes Version 15.5.54 "Copyright VoIPTools, LLC 2011-2018" Information in this document is subject to change without notice. No part of this document may be reproduced or

More information

User Reference Guide

User Reference Guide LEARNING CENTRE http://lms.toyota.com.au User Reference Guide Page 1 Learning Centre User Overview Reference Guide Last Modified 23/07/10 2010 Toyota Institute Australia. All rights reserved. All brand

More information

Synergis Master Controller 2.2 Integration Guide for Axis Interface Modules

Synergis Master Controller 2.2 Integration Guide for Axis Interface Modules Synergis Master Controller 2.2 Integration Guide for Axis Interface Modules This guide supplements the Synergis Master Controller Configuration Guide and explains how to configure Axis interface modules

More information

User Guide. 3CX Enhanced Billing Codes. Version

User Guide. 3CX Enhanced Billing Codes. Version User Guide 3CX Enhanced Billing Codes Version 15.5.54 "Copyright VoIPTools, LLC 2011-2017" Information in this document is subject to change without notice. No part of this document may be reproduced or

More information

Managing WCS User Accounts

Managing WCS User Accounts CHAPTER 7 This chapter describes how to configure global e-mail parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-1 Viewing or Editing User Information,

More information

First Access OPERATOR GUIDE

First Access OPERATOR GUIDE First Access OPERATOR GUIDE June 2018 Cutting edge simplicity Table of Contents Introduction...4 PC Requirements...5 Step 1. Software Installation...5 Step 2. Host Server Definition...9 Step 3. Panel and

More information

USER MANUAL. Disclaimer

USER MANUAL. Disclaimer USER MANUAL Disclaimer The instructions in this document have been carefully checked for accuracy and are presumed to be reliable. Smart I Electronics Systems Pvt. Ltd. and its writers assume no responsibility

More information

IS2000. Administrative Operator s Guide

IS2000. Administrative Operator s Guide IS2000 Administrative Operator s Guide Table of Contents Logging Off... 7 Event Manager... 7 HARDWARE MANAGER... 8 Maneuvering the Hardware Tree... 8 Unlocking the Module... 8 Viewing the Hardware Tree...

More information

SmartLock Surf OPERATOR GUIDE

SmartLock Surf OPERATOR GUIDE SmartLock Surf OPERATOR GUIDE May 2015 Table of Contents Introduction... 5 Server PC Requirements... 7 Client PC Requirements... 7 Step 1. Software Installation... 8 Step 2. Firewall... 8 Step 3. Port

More information

U-FLASH Setup Guide U-FLASH.

U-FLASH Setup Guide U-FLASH. U-FLASH Setup Guide Thank you for purchasing the U-FLASH. This guide will assist you in the setup of the system. You can call for FREE technical support to get help anytime at 757-258-0910. Please note,

More information

TimeClock Plus Leave Requests

TimeClock Plus Leave Requests Purpose This document will walk users through adding Leave Requests for vacation as well as showing requests as well as the approval process for submitting leave. Users will be able to add leave requests,

More information

STONELOCK NETWORK USER MANUAL Version

STONELOCK NETWORK USER MANUAL Version STONELOCK NETWORK USER MANUAL Version 17.2.1 Table of Contents About StoneLock Pro...4 1.0 Overview 1.01...System Introduction...4 1.02...System Components...4 1.03...Installation...5-6 1.04...Uninstall...6

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

BRIVO ONAIR RELEASE NOTES

BRIVO ONAIR RELEASE NOTES BRIVO ONAIR RELEASE NOTES Brivo Onair 11.40.1 04/03/2019 This release of Brivo Onair addresses a minor bug fix. Corrected a browser incompatibility issue. Brivo Onair 11.40 03/26/2019 This release of Brivo

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Outlook: Web Access. Outlook: Web Access AIS Vienna

Outlook: Web Access. Outlook: Web Access AIS Vienna Outlook: Web Access AIS Vienna Table of Contents Introduction to OWA...1 Log On... 1 OWA Workspace... 2 Hiding/Displaying the Reading Pane... 3 Collapsing/Expanding the Outlook Bar... 4 Log Off... 5 Sending

More information

Nexus Lite (Web Interface)

Nexus Lite (Web Interface) Nexus Lite (Web Interface) QUICK START GUIDE Scope of Document This document gives a brief overview of operation of the Nexus Lite Controller s Web user interface. Document Conventions We use the following

More information

Microsoft Entourage 2008

Microsoft Entourage 2008 Microsoft Entourage 2008 Prepared by Computing Services at the Eastman School of Music May 2008 1 Table of Contents Appearance of Microsoft Entourage... 4 Email... 4 Reading New Email... 4 Sending a New

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Comodo Dome Antispam MSP Software Version 2.12 Comodo Comodo Dome Antispam MSP Software Version 2.12 User Guide Guide Version 2.12.111517 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

Page Topic 02 Log In to KidKare 02 Using the Navigation Menu 02 Change the Language

Page Topic 02 Log In to KidKare 02 Using the Navigation Menu 02 Change the Language Page Topic 02 Log In to KidKare 02 Using the Navigation Menu 02 Change the Language help.kidkare.com 03 Enroll a Child 03 Withdraw a Child 03 View Pending and Withdrawn Children 04 View Kids by Enrollment

More information

Managing WCS User Accounts

Managing WCS User Accounts 7 CHAPTER This chapter describes how to configure global email parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-2 Viewing or Editing User Information,

More information

Configuring Personnel and Badges

Configuring Personnel and Badges CHAPTER 8 This chapter describes how to create the personnel records and badges used to access doors in the Cisco Physical Access Control system. Note For instructions to synchronize Cisco PAM with personnel

More information

Keyless Entry 5. MANUALLY PROGRAMMING THE SNAP-ON LEVEL 5 GEN 4 LOCK Instruction Manual

Keyless Entry 5. MANUALLY PROGRAMMING THE SNAP-ON LEVEL 5 GEN 4 LOCK Instruction Manual Keyless Entry 5 MANUALLY PROGRAMMING THE SNAP-ON LEVEL 5 GEN 4 LOCK Instruction Manual TABLE OF CONTENTS Setting up the Snap-on Level 5 Gen4 Lock Manual Setting up the Snap-on Level 5 Gen4 Lock... 3 Basic

More information

GETTING STARTED. Installing the System 2000 Hardware. Configuring Your System 2000 Hardware. Troubleshooting. Configuring Your System 2000 Network

GETTING STARTED. Installing the System 2000 Hardware. Configuring Your System 2000 Hardware. Troubleshooting. Configuring Your System 2000 Network SYSTEM 2000 GETTING STARTED Installing the System 2000 Hardware Whether you are upgrade an existing System 2, or this is a brand new installation, there will be some hardware installation involved. We

More information

Administrator Quick Guide

Administrator Quick Guide 1 Administrator Quick Guide Login Screen The first page employees will see when visiting their training site is the login screen. This is where employees must enter their username and password to access

More information

Navigating in Windows 10

Navigating in Windows 10 Navigating in Windows 10 Desktop The Desktop contains shortcuts to Programs which can be customized. Start Button: The Start menu has been expanded in Windows 10 to include Tiles. Programs are listed in

More information

TCS Access Control System Cheat Sheet

TCS Access Control System Cheat Sheet TCS Access Control System Cheat Sheet Access Control Main Screen 1 Toolbar 2 Device View Toolbar No. Name Function 1 Login Logs in the ASServer. 2 Logout Logs out the ASServer. 3 Devices Defines controllers

More information

LUCITY SECURITY. This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2

LUCITY SECURITY. This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2 LUCITY SECURITY This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2 CONTENTS SECURITY... 1 Security Program... 2 Getting Started... 3 Setting up a Security Admin User...

More information

OUTLOOK WEB ACCESS UOW USER GUIDE INDEX

OUTLOOK WEB ACCESS UOW USER GUIDE INDEX OUTLOOK WEB ACCESS UOW USER GUIDE INDEX ACCESSING MAIL... 2 SETTING UP... 2 OPTIONS... 3 VIEWING... 4 ARRANGE MESSAGES... 4 CREATING/SENDING A NEW MESSAGE... 5 REPLYING TO MESSAGES... 5 FORWARDING MESSAGES...

More information

User Guide. 3CX On Call Manager Standard. Version

User Guide. 3CX On Call Manager Standard. Version User Guide 3CX On Call Manager Standard Version 14.0.40 "Copyright VoIPTools, LLC 2011-2016" Information in this document is subject to change without notice. No part of this document may be reproduced

More information

Amazon WorkMail. User Guide Version 1.0

Amazon WorkMail. User Guide Version 1.0 Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2017 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection

More information

Portals 14 What is a portal? 14 Hardware 15 RS232 to RS USB to RS TCP/IP to RS Add a Serial Portal 16 Add a Network portal 16

Portals 14 What is a portal? 14 Hardware 15 RS232 to RS USB to RS TCP/IP to RS Add a Serial Portal 16 Add a Network portal 16 PROS LITE User Manual Version 2.0.0 www.visual-plus.com Table of Contents Getting Started 5 Starting PROS Lite 5 Create a Portal 5 Adding a control panel 6 Adding a user 7 Upload users to a controller

More information

Vela Web User Guide Vela Systems, Inc. All rights reserved.

Vela Web User Guide Vela Systems, Inc. All rights reserved. The Vela Systems Web application is designed to enable the administration, management, and reporting of the Vela Field Management Suite, as well as give project teams the ability to collaborate on issues,

More information

Quick Tips & Tricks. Important You must use SEMICOLONS ( ie; ) to separate address when sending mail to multiple users

Quick Tips & Tricks. Important You must use SEMICOLONS ( ie; ) to separate  address when sending mail to multiple users Quick Tips & Tricks Important You must use SEMICOLONS ( ie; ) to separate email address when sending mail to multiple users Customize Mail View Click, View, and then highlight Current View Click, Customize

More information

Office 365: . Accessing and Logging In. Mail

Office 365:  . Accessing and Logging In. Mail Office 365: Email This class will introduce you to Office 365 and cover the email components found in Outlook on the Web. For more information about the Microsoft Outlook desktop client, register for a

More information

Application User Configuration

Application User Configuration CHAPTER 87 The following topics contain information on managing application user information: Settings, page 87-1 Adding an Administrator User to Cisco Unity or Cisco Unity Connection, page 87-6 Changing

More information

DocAve for Salesforce 2.1

DocAve for Salesforce 2.1 DocAve for Salesforce 2.1 This document is intended for anyone wishing to familiarize themselves with the user interface and basic functionality of AvePoint s DocAve for Salesforce tool. System Requirements

More information

RONA e-billing User Guide

RONA e-billing User Guide RONA e-billing Contractor Self-Service Portal User Guide RONA e-billing User Guide 2015-03-10 Table of Contents Welcome to RONA e-billing What is RONA e-billing?... i RONA e-billing system requirements...

More information

Comodo Antispam Gateway Software Version 2.11

Comodo Antispam Gateway Software Version 2.11 Comodo Antispam Gateway Software Version 2.11 User Guide Guide Version 2.11.041917 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

IdeaTab A1000L-F. User Guide V1.0. Please read the Important safety and handling information in the supplied manuals before use.

IdeaTab A1000L-F. User Guide V1.0. Please read the Important safety and handling information in the supplied manuals before use. IdeaTab A1000L - UserGuide IdeaTab A1000L-F User Guide V1.0 Please read the Important safety and handling information in the supplied manuals before use. file:///c /Users/xieqy1/Desktop/EN UG/index.html[2013/8/14

More information

SECTION 5 USING STUDENT

SECTION 5 USING STUDENT SECTION 5 USING STUDENT EMAIL 5. USING STUDENT EMAIL On enrolling at the University all students automatically have an email account created. Account creation depends on a student successfully enrolling

More information

4.2. LockView N. Instruction Man

4.2. LockView N. Instruction Man 4.2 Manual n io t c u r t s TC In LockView N ual Instruction Man Table of Contents LockView NTC 4.2 Operator s Manual LockView NTC Instruction Manual LockView NTC Instruction Manual Introduction... 4 Operation...

More information

Financial Center Administration Console USER GUIDE

Financial Center Administration Console USER GUIDE Financial Center Administration Console USER GUIDE For Client Use Only Effective April 2018 Table of contents Introduction 3 Communicating securely with Union Bank 3 Change Security Settings 4 Manage

More information

Secure Guard Central Management System

Secure Guard Central Management System Speco Technologies, Inc. Secure Guard Central Management System Usage Information Contents 1 Overview... 7 2 Installation... 7 2.1 System Requirements... 7 2.2 System Installation... 7 2.3 Command Line

More information

801 Avenida Acaso, Camarillo, Ca (805) Fax: (805)

801 Avenida Acaso, Camarillo, Ca (805) Fax: (805) 801 Avenida Acaso, Camarillo, Ca. 93012 (805) 494-0622 Fax: (805) 494-8861 www.sdcsecurity.com E-mail: service@sdcsecurity.com E70PS Series PC Managed Electronic Lockset E7 Software Installation & Operations

More information

MailNow! 6 New features introduction

MailNow! 6 New features introduction MailNow! 6 New features introduction InternetNow! www.internetnow.com.my 1 Out of 30 What is new in MailNow! 6 Table of Contents No Title Page No WebMail 4 1 Main Menu 4 1.1 Messenger 4 Messenger Notification

More information

Salto Offline Lock Integration Guide

Salto Offline Lock Integration Guide Salto Offline Lock Integration Guide August 2015 SATEON Salto Offline Lock Integration Guide Issue 1.0, released August 2015 Disclaimer Copyright 2015, Grosvenor Technology. All rights reserved. SATEON

More information

ACCESS CONTROL QUICK INSTALL GUIDE. tel: +44 (0) fax: +44 (0) web:

ACCESS CONTROL QUICK INSTALL GUIDE. tel: +44 (0) fax: +44 (0) web: ACCESS CONTROL QUICK INSTALL GUIDE tel: +44 (0)1457 874 999 fax: +44 (0)1457 829 201 email: sales@cop-eu.com web: www.cop-eu.com WIRING CONFIGURATION - ACS CONTROLLERS CONNECTIONS Dahua access controllers

More information

Level 5 NTC. MANUALLY PROGRAMMING THE SNAP-ON LEVEL 5 GEN 3 LOCK Instruction Manual

Level 5 NTC. MANUALLY PROGRAMMING THE SNAP-ON LEVEL 5 GEN 3 LOCK Instruction Manual Level 5 NTC MANUALLY PROGRAMMING THE SNAP-ON LEVEL 5 GEN 3 LOCK Instruction Manual TABLE OF CONTENTS Setting up the Snap-on Level 5 Gen3 Lock Manual Setting up the Snap-on Level 5 Gen3 Lock... 3 Basic

More information

A summary of the setup process is listed below with details for each step following.

A summary of the setup process is listed below with details for each step following. This is a guide for deploying Doors.NET software with ASSA ABLOY WiFi Sargent locksets. These locksets are fully intelligent and are of a offline nature. This means the locksets are NOT communicating with

More information

MY VOIC ON-LINE

MY VOIC ON-LINE Learning and Development Department of Human Resources and Employee Relations MY VOICEMAIL ON-LINE (CALL10) Microcomputer Training Centre Microcomputer Training Centre 2007 TABLE OF CONTENTS Welcome to

More information

ipad ereader User s Guide

ipad ereader User s Guide ipad ereader User s Guide MAY 2014 Table of Contents General information... 1 About Professional ebook... 1 About this Guide... 1 How does the Professional ebook System work?... 1 Where can I learn more

More information

IS2000. Administrative Operator s Guide. AOG-101 (07/2005) Software Version 7.45

IS2000. Administrative Operator s Guide.  AOG-101 (07/2005) Software Version 7.45 IS2000 Administrative Operator s Guide www.imron.com AOG-101 (07/2005) Software Version 7.45 Table of Contents INTRODUCTION...6 Overview...6 GENERAL INFORMATION...6 Logging On...7 Logging Off...9 Event

More information

Access Control Unit User s Guide

Access Control Unit User s Guide NetAXS Access Control Unit User s Guide The configurations described in this document have not been reviewed by Underwriters Laboratories Inc. June 2007 2007 Honeywell. All rights reserved. 800-00233,

More information

THE LOGIN PAGE... 3 THE HOME PAGE... 4 REPORTS... 15

THE LOGIN PAGE... 3 THE HOME PAGE... 4 REPORTS... 15 CheckTrack Web Reporting User guide 1 Contents THE LOGIN PAGE... 3 THE HOME PAGE... 4 REPORTS... 5 REPORT SCREEN FUNCTIONALITY... 5 CHECK DETAILS & CHECK IMAGE... 8 NEW CHECKS... 10 ALL ACTIVE CHECKS...

More information

Scheduling Reports Launch the Scheduling Tool... 1 Description... 1 Overview of Scheduling Components... 2

Scheduling Reports Launch the Scheduling Tool... 1 Description... 1 Overview of Scheduling Components... 2 PeopleSoft Data Dictionary EPM: Scheduling Reports Table of Contents Scheduling Reports... 1 2 Launch the Scheduling Tool... 1 Description... 1 Overview of Scheduling Components... 2 Distribution... 2

More information

Business Online Banking User Guide

Business Online Banking User Guide Business Online Banking User Guide Table of Contents Contents Overview... 2 Logging In... 2 Additional Login Information... 5 Home/Dashboard... 6 Top Line Tool Bar... 6 Bulletins... 7 Dashboard... 8 Accounts...

More information

SK-NET. Version 2. Installation and Operating Manual

SK-NET. Version 2. Installation and Operating Manual SK-NET Version 2 Installation and Operating Manual Version Note: This manual covers features available in SK-NET Version 2.40. A few features described in this manual are only available with SK-ACP and

More information

EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE

EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE Exchange 2003 Version Revised September 2005 TABLE OF CONTENTS WHAT S NEW IN OWA 2003?...2 General...2 Inbox and Message Composition...2 Tasks...2 INTRODUCTION

More information

SmartLock Pro Plus OPERATOR GUIDE

SmartLock Pro Plus OPERATOR GUIDE SmartLock Pro Plus OPERATOR GUIDE April 2014 Table of Contents Introduction... 5 PC Requirements... 6 Step 1. Software Installation... 6 Program Navigation... 7 Step 2. System Properties... 8 Serial Communication

More information

InTemp System User s Guide

InTemp System User s Guide InTemp System User s Guide Onset Computer Corporation 470 MacArthur Blvd. Bourne, MA 02532 www.onsetcomp.com Mailing Address: P.O. Box 3450 Pocasset, MA 02559-3450 Phone: 1-800-LOGGERS (1-800-564-4377)

More information

Outlook 2010 One. Wednesday, August 7, 9-11 am. Agenda:

Outlook 2010 One. Wednesday, August 7, 9-11 am. Agenda: Page 1 Outlook 2010 One Wednesday, August 7, 9-11 am Agenda: Outlook Search Options Working with Attachments Creating a Signature Marking a Message as Read Flag an item for Follow-Up Reply, Reply All &

More information

Startup Guide for Windows. Intralinks VIA Version 3.7M5

Startup Guide for Windows. Intralinks VIA Version 3.7M5 Intralinks VIA Version 3.7M5 Startup Guide for Windows Intralinks 24/7/365 support US: 212 543 7800 UK: +44 (0) 20 7623 8500 See the Intralinks login page for international numbers support@intralinks.com

More information

TEAM5 Operation Manual

TEAM5 Operation Manual Contents System Overview Version Feature Comparison Chart Install Recommendations User Edit Importing a User List Add a User Delete User(s) Edit Multiple Users ( Global Controls ) Sort / Filter User List

More information

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 Table of Contents... ii GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Start Using Toggle... 1 Personal... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle

More information

EMS WEB APP Configuration Guide

EMS WEB APP Configuration Guide EMS WEB APP Configuration Guide V44.1 Last Updated: August 14, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER 1: EMS Web App

More information

DSC POWERSERIES NEO INTEGRATION. This application note will explain how to setup the DSC PowerSeries NEO integration on a KT-400 or a KT-1-M

DSC POWERSERIES NEO INTEGRATION. This application note will explain how to setup the DSC PowerSeries NEO integration on a KT-400 or a KT-1-M DN NUMBER HERE DSC POWERSERIES NEO INTEGRATION This application note will explain how to setup the DSC PowerSeries NEO integration on a KT-400 or a KT-1-M Minimum Requirements: EntraPass Special, Corporate,

More information

Sage 300 Construction and Real Estate. MyCommunicator User Guide Version 13.2

Sage 300 Construction and Real Estate. MyCommunicator User Guide Version 13.2 Sage 300 Construction and Real Estate MyCommunicator User Guide Version 13.2 NOTICE This document and the Sage 300 MyCommunicator software may be used only in accordance with the accompanying Innovative

More information

IBM Notes Client V9.0.1 Reference Guide

IBM Notes Client V9.0.1 Reference Guide IBM Notes Client V9.0.1 Reference Guide Revised 05/20/2016 1 Accessing the IBM Notes Client IBM Notes Client V9.0.1 Reference Guide From your desktop, double-click the IBM Notes icon. Logging in to the

More information

How to Use: Outlook Web Access (OWA)

How to Use: Outlook Web Access (OWA) How to Use: Outlook Web Access (OWA) All About Me Day April 19. 2012 What is Outlook Web App 2010? The Outlook Web App allows you to access your College e-mail and calendar from any computer that has Internet

More information

USER MANUAL. Learn how to use the user-side features of GFI OneConnect.

USER MANUAL. Learn how to use the user-side features of GFI OneConnect. USER MANUAL Learn how to use the user-side features of GFI OneConnect. The information and content in this document is provided for informational purposes only and is provided "as is" with no warranties

More information

Altus Call Recording. Dashboard Admin User Guide. Document Version Maryland Way, Suite 300 Brentwood, TN Tel

Altus Call Recording. Dashboard Admin User Guide. Document Version Maryland Way, Suite 300 Brentwood, TN Tel Altus Call Recording Dashboard Admin User Guide Document Version 1.3 5121 Maryland Way, Suite 300 Brentwood, TN 37027 Tel +1 615.465.4001 WWW.ALTUSUC.COM Table of Contents About This Document... 5 1.1

More information

AKCess Pro Server Access Control User Manual

AKCess Pro Server Access Control User Manual www.akcp.com AKCess Pro Server Access Control User Manual Help Version updated till version 118 Copyright 2012, AKCess Pro Co., Ltd.. 1) Introduction A) What is the AKCess Pro Server / Access Control?

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

1. Launch and Log into Citrix and the CCURE 800 Application

1. Launch and Log into Citrix and the CCURE 800 Application The IS&T Campus Safety and Security Infrastructure Team (CSSI) provides a unified campus security infrastructure and environment, which brings together many systems under a single roof. CSSI uses the CCURE800

More information

Integrated Security and Access Control. User Manual

Integrated Security and Access Control. User Manual Integrated Security and Access Control User Manual Introduction Table of Contents Introduction About Inception 3 Site Details 4 System Notes 5 User Interfaces Connecting to the Web Interface 6 Elite /

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Parental Webcam. User Guide

Parental Webcam. User Guide Parental Webcam User Guide 1 Table of Contents 1 Opening an Account 3 1.1 The Unique Nursery Code 3 1.2 Your Details 4 2 Logging In 5 2.1 Forgotten / Changing your Password 5 3 Viewing a Camera 8 3.1 The

More information

Workspace Secure Container for Mobile Devices

Workspace Secure Container for Mobile Devices Workspace Secure Container for Mobile Devices Version 1.1 Last Updated: April 24, 2014 2014 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon

More information

Nintex Reporting 2008 Help

Nintex Reporting 2008 Help Nintex Reporting 2008 Help Last updated: Thursday, 24 December 2009 1 Using Nintex Reporting 2008 1.1 Chart Viewer Web Part 1.2 Importing and Exporting Reports 1.3 Import Nintex report page 1.4 Item Level

More information