WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

Size: px
Start display at page:

Download "WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide"

Transcription

1 WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see the Vantage Ultimate online help. This can be accessed via Help Contents on the main menu of Vantage Ultimate. Please send all issues or queries to WebSpy Support This document is intended as a guide only. It aims to introduce the reader to issues that may be relevant to their organization, and to point out sources from which more detailed information may be obtained. It is NOT a substitute for professional legal advice.

2 Table of Contents Table of Contents... 1 Overview... 3 Components of the Web Module... 3 How It Works... 4 Workflow... 4 Setting up IIS... 5 Windows 7/Windows Vista... 5 Windows XP... 6 Windows Server Troubleshooting... 7 Windows Server Windows Server Installing the Web Module Configuring Administration Account & Authentication Registering your Vantage Web Module Installing Vantage Ultimate Create a connection between Vantage Ultimate and the Web Module Configuring your Organizational Structure Import from LDAP or LDIF Import from CSV CSV File Structure Manually Creating your Organization Adding Groups Adding People (Users) Assigning Passwords Assigning Permissions Web Module Synchronization Granting Access to Web Modules Publishing Reports Publishing Storages Page 1 of 28

3 Publishing Collated Reports Purging Data from the Web Module Automating using Scheduled Tasks Administrator Options Authentication Options Web Module Options Data Options Appendix A - Troubleshooting Why do I get an 'Installer was Interrupted' error when installing the WebSpy Vantage Web Module? When I browse to the Web Module, I get a server error, 404 error, or see plain HTML code I can't login as an administrator any more. I get 'The specified credentials were not accepted How do I reset the Web Module? When I launch the Web Module l get the error Unable to log entry and/or Unable to create path. Access denied Contact WebSpy WebSpy Support Page 2 of 28

4 Overview The WebSpy Vantage Web Module is an internal website (Intranet) that enables administrators to securely distribute reports and information throughout an organization. Administrators use WebSpy Vantage Ultimate to create reports and storages, and publish them to the Web Module for specific users to access. Employees are notified when new information is available and can login to the Web Module via a secure web interface and view the information that has been published for them. Components of the Web Module The Web Module Solution Consists of the following components: WebSpy Vantage Ultimate Vantage Ultimate includes the Web Module screen. This screen is used to connect to a WebSpy Vantage Web Module, publish reports and storages and assign permissions. Figure 1: WebSpy Vantage Ultimate Web Module Screen The WebSpy Vantage Web Module The WebSpy Vantage Web Module is an ASP.NET web application that can be installed on any Microsoft Windows workstation or server in your organization that has Microsoft Internet Information Services 6.0 or above installed. You can install and create more than one Web Module if necessary (for example, one for each country or branch). Figure 2: The WebSpy Vantage Web Module Login Screen Note: The Web Module does not support IIS Server clustering. Page 3 of 28

5 How It Works WebSpy Vantage Ultimate is used to import log files from devices on your network such as proxy servers, firewalls, and routers into an optimized internal database called a Storage. This storage is then used to publish reports and filtered storages to the Web Module. A major part to the Web Module Solution is the Organization screen that enables you to create users and organize them into multi- levelled groups representing your organizational structure. Users are mapped to information in your log files, enabling effective reporting on any organizational unit. Report on countries, cities, branches, offices, departments, teams, individuals, or the entire organization. Your organizational structure can be imported from any LDAP or LDIF compatible directory server or any CSV file. You have complete control over the attributes you import in order to create your organizational units. In addition to using this organizational structure for reporting, you can use it to assign permissions to users and groups that define what they can and cannot access within the Web Module. Vantage also stores a record of each user s address, which is used to automatically notify the relevant user when new information is available. Once you have imported log file data into a storage and created your organizational structure, you can synchronize your settings with your Web Modules, assign passwords and permissions, and publish reports and storages for your users. These reports and storages can be published with customized permissions to ensure users can only view reports that they are allowed to view. These users are notified by when there is new information available and they can log into the Web Module at any time to view the reports that have been published for them, and conduct ad- hoc drilldowns into the storages that have been published for them. Workflow To get started with the WebSpy Vantage Web Module solution, please follow this workflow: Page 4 of 28

6 1. Setup IIS 2. Install the Web Module 3. Configure an Authentication Mechanism and Administrator account(s) 4. Install WebSpy Vantage Ultimate 5. Create a connection between Vantage Ultimate and the Web Module. 6. Create your organizational structure and set permissions. 7. Synchronize your organizational structure with the Web Module and grant access permissions. 8. Publish Reports and Storages to the Web Module. Setting up IIS Microsoft IIS comes with most versions of Microsoft Windows but it is not installed by default. The following instructions will assist you with installing Microsoft IIS on your Windows operating system. Windows 7/Windows Vista To install Microsoft IIS: 1. Go to Control Panel Programs and Features and click Turn Windows Features on or off. 2. Expand Internet Information Services (IIS) and check the following options :- Under Web Management Tools : - IIS Management Console, IIS Management Scripts and Tools, IIS Management Service, Under Web Management Tools => IIS6 Management Compatibility IIS Metabase and IIS 6 configuration compatibility, Under World Wide Web Services => Application Development Services.NET Extensibility, ASP.NET, ISAPI Extensions, ISAPI Filters, Under World Wide Web Services => Common HTTP Features :- Default Document, HTTP Errors, HTTP Redirection, Static Content, Under World Wide Web Services => Health and Diagnostics :- HTTP Logging, Under World Wide Web Services => Performance Features :- Static Content Compression, Under World Wide Web Services => Security All options 3. Click OK to install. Page 5 of 28

7 Figure 3: IIS Configuration for Windows 7 (Left) and Windows Vista (Right) Windows XP To install Microsoft IIS on Windows XP: 1. Go to Control Panel Add or Remove Programs and click Add/Remove Windows Components 2. Check Internet Information Services (IIS) and click Next. Proceed through the wizard to install all the components for Microsoft IIS. Figure 4: IIS Configuration for Windows XP Page 6 of 28

8 Windows Server 2003 To install Microsoft IIS on Windows Server 2003: 1. On the Manage Your Server dialog, click Add or remove a role 2. On the Server Role Wizard, select Application Server (IIS, ASP.NET) and click Next. (If ASP.NET is not mentioned in the brackets, select Application Server (IIS). You will need to also complete the steps in the Troubleshooting section below) 3. Check ASP.NET and click Next and click Finish on the Summary Screen (If ASP.NET is not available n the list, click Next and proceed through the Wizard to install IIS, then complete the steps in the Troubleshooting section below). 4. Ensure all the correct components are installed by going to Control Panel Add or Remove Programs and clicking Add/Remove Windows Components. 5. Double- click Application Server and check the following components are installed: Figure 5: IIS Configuration in Windows Server 2003 Troubleshooting If you cannot see ASP.NET in the above dialog, please try the following: 1. Launch a command prompt by clicking Start Run, type cmd, and click OK. 2. Type the following command for your operating system to install ASP.NET 2.0, and press enter. If you installed the 32 bit version of the.net Framework, enter: %SYSTEMROOT%\Microsoft.NET\Framework\v \aspnet_regiis.exe -i If you installed the 64 bit version of the.net Framework, enter: %SYSTEMROOT%\Microsoft.NET\Framework64\v \aspnet_regiis.exe -i 3. Make sure that the status of ASP.NET version is set to Allowed in the Web service extension list in Internet Information Services Manager (Start Control Panel Administrative Tools Internet Information Services (IIS) Manager). See screenshot below. Page 7 of 28

9 Figure 6: Allowing ASP.NET in Web Service Extensions Windows Server 2008 To install Microsoft IIS on Windows Server 2008: 1. Select Start Menu All Programs Administrative Tools Server Manager. 2. In the Server Manager, select Roles. 3. Click Add Roles and click Next. 4. Check Application Server and Web Server (IIS). 5. The Add Roles wizard notifies you of any required dependencies. Click Add Required Role Services. Once the required services have been installed, click Next. 6. On the Role Services page, check ASP.NET under Application Development, and IIS 6 Metabase Compatibility under Management Tools IIS 6 Management Compatibility. 7. Proceed through the Wizard to complete the installation. Windows Server 2012 To install Microsoft IIS on Windows Server 2012: Page 8 of 28

10 1. From the Start Screen select Server Manager. 2. Select Manage Add Roles and Features. Page 9 of 28

11 3. Select Role- based or feature- based installation. 4. In Server Roles, select Application Server and Web Server (IIS). Click Add Features in any dialogs that request additional features be added. Page 10 of 28

12 5. In Features, select.net Framework 3.5 Features. 6. In Application Server Role Services, select Web Server (IIS) Support. Click Add Features in any dialogs that request additional features be added. 7. In Web Server Role (IIS) Role Services, expand Application Development and select.net Extensibility 3.5 and ASP.NET 3.5, and then under Management Tools select IIS 6 Management Compatibility. Page 11 of 28

13 8. Proceed through the Wizard to complete the installation. Installing the Web Module The WebSpy Vantage Web Module is an ASP.NET web application that runs on Microsoft Internet Information Services (IIS) 6.0 or above. Ensure your Web Server meets the following minimum requirements: Page 12 of 28

14 Microsoft Internet Information Services (IIS) 6.0 with ASP.NET OR IIS 7.0 with ASP.NET and IIS 6 Management Compatibility installed. Microsoft.NET Framework 2.0 Operating Systems o Windows Server 2003 (with Application Server role with ASP.NET enabled) o Windows XP (with IIS Windows Component) o Windows Vista (With IIS Windows Component with ASP.NET and IIS6 Management o Compatibility installed) Windows Server 2008 (with Application Server and Web Server roles, with ASP.NET and II6 Management Compatibility installed) 2 GHz CPU or faster 2GB RAM or more To Install the WebSpy Vantage Web Module: 1. Download the WebSpy Vantage Web Module from 2. Open the downloaded zip file and double- click run the WebSpy Vantage Web Module 2.2 Setup.exe file. 3. The WebSpy Vantage Web Module setup wizard will launch. 4. On the welcome screen click Next. 5. On the Installation Address page select the Site the Web Module is to be installed to and enter a Virtual Directory (for example, webmodule without the quotes). Click Next. 6. On the Data Location page enter the location you would like the Web Module to stored its data, these being for example Storages and Reports. Click Next. 7. On the Confirm Installation page click Next to begin the install. 8. Click Close to complete the wizard. The Web Module should now launch in your default browser (it may take up to one minute to launch for the first time). If not, select Start Programs WebSpy Vantage Web Module Vantage Web Module 2.2, or browse to where <servername> is the IP address or name of the machine you installed the WebSpy Vantage Web Module, and <virtualdirectory> is the Virtual Directory you specified in step 5 above. For example: or Note: Please ensure that your network is configured to allow access to the webmodule. If the web module does not launch correctly please see Appendix A - Troubleshooting on page 30 Configuring Administration Account & Authentication To start using the WebSpy Vantage Web Module, you must create an administrator account and configure the authentication mechanism you want to use. To do this: 1. Browse to the Web Module by opening an Internet browser and browsing to where <servername> is the IP address or name of the machine you installed the WebSpy Vantage Web Module, and <virtualdirectory> is the Virtual Directory you specified when installing the WebSpy Vantage Web Module. Page 13 of 28

15 2. When browsing to the Web Module for the first time you will be presented with the Configuration Wizard. 3. Click Next on the first page of the Configuration Wizard. 4. On the Authentication page you will have the option of selecting one of three authentication mechanisms. Vantage In- built You can create custom login names and automatically generate passwords for your users on the Organization screen in WebSpy Vantage. Select this option if you want use Vantage to create login names and passwords. Configuring Authentication using the Vantage In- built mechanism 1. Select Vantage In- built and click Next 2. For your administration account enter a Username and Password then click Next 3. On the Summary screen verify the Mechanism and Username are correct the click Finish 4. You can now log in with your administrator account. If you cannot log in, please see - Troubleshooting (I can't login as an administrator any more. I get 'The specified credentials were not accepted How do I reset the Web Module?) on page 31 IIS integrated You can configure IIS to use Windows Authentication. This allows users to be automatically logged in when they browse to the Web Module as long as they are logged into Windows with their Windows domain account. Configuring Authentication using the IIS integrated mechanism 1. Select IIS integrated and click Next 2. Enter the qualified usernames of those users you wish to have administrator access and click Next 3. On the Summary screen verify the Mechanism and Usernames are correct then click Finish 4. You will now be logged into the web module automatically using your windows authentication. If you cannot log in, ensure IIS is setup to use Windows Authentication. If you still cannot login please see - Troubleshooting (I can't login as an administrator any more. I get 'The specified credentials were not accepted How do I reset the Web Module?) on page 31 For users in your organization to login to the Web Module, the user s Windows login name must match their login name configured on the WebSpy Vantage Ultimate Organization screen. This can usually be imported from Active Directory. Client Certificate You can configure IIS to require client certificates for authentication. You can therefore setup the Web Module to use client certificates for its authentication. To do this, you need to configure which field within the client certificate represents the user's login name. Note: Refer to your web server s documentation for details on configuring IIS to request client certificates. Configuring Authentication using the Client Certificate mechanism 1. Select Client Certificate and click Next 2. On the configuration page there are three options. Page 14 of 28

16 Select field from list This option will only be enabled if IIS is already configured to request client certificates, and a client certificate has been passed to this page. Choose the field the represents your login name. Specify field name If IIS is not yet configured to request client certificates, or if a client certificate has not been passed to this web page, this option lets you manually enter the certificate field name you wish to use. Use X.509 extension This option requires you to enter the OID (object ID) of the X.509 extension to use. You can also check extract field from extension if the X.509 extension contains multiple fields. For example, the X.509 extension Subject Alternative Name has an OID of This extension can include the field DNS Name. To use the DNS name field as the login name, enter into the OID edit box and DNS Name into the Extract field from extension edit box. 3. Click Next to confirm your settings. 4. You will now be logged into the web module automatically using your client certificate. If you cannot log in, please see - Troubleshooting (I can't login as an administrator any more. I get 'The specified credentials were not accepted How do I reset the Web Module?) on page 31 When users browse to the web module, their client certificate will be passed and the specified field will be used to log them into the web module. The login name in their certificate must match their login configured on the WebSpy Vantage Organization screen. Registering your Vantage Web Module To be able to register your WebSpy Vantage Web Module your server must have an active Internet connection. Note: If you do not register WebSpy software, your trial will run out 30 days from the date you first use the program. To register your Web Module you must first request an unlock code: 1. Log in to the Web Module as the administrator. 2. Go to the Option Tab and click Registration or Click the registration link in the top bar. 3. Enter your details into the form, and then click Submit. Please ensure that your E- mail and serial number are correct (you obtain your serial number when you purchase Vantage Ultimate). Your unlock code will be ed to you within 36 hours from support@webspy.com. Once you have received an containing your Web Module unlock code, you can finish registering your Web Module. To use your unlock code and register your Web Module: 1. Go back to the Register Web Module screen. 2. Enter your Web Module unlock code by copying and pasting it from our support , and then click Submit. Page 15 of 28

17 Installing Vantage Ultimate WebSpy Vantage is a native Windows application that handles all the configuration and administration of importing log files and reporting on data. Vantage Ultimate also handles the configuration of Users and Groups, user permissions for the web module, and publishing reports and storages to the Web Module. Please ensure the machine running WebSpy Vantage Ultimate meets the following minimum requirements: Microsoft Windows 2000, XP, Server 2003 or Vista Microsoft.NET Framework GHz CPU or faster 1GB RAM or more For personalised requirements, please contact WebSpy Support (support@webspy.com). To Install WebSpy Vantage Ultimate: 1. Download Vantage Ultimate from 2. Open the downloaded zip file and double- click run the WebSpy Vantage Ultimate 2.2 Setup.exe file. 3. Proceed through the Installation Wizard. Create a connection between Vantage Ultimate and the Web Module Once you have installed Vantage Ultimate, installed the Web Module, and configured your administrator account and authentication mechanism you need to create a connection between Vantage and the Web Module so that settings can be synchronised, and reports and storages can be published. To do this: 1. Within Vantage Ultimate, click the Web Module tab 2. Click Add Web Module 3. Enter the URL for the web module (you do not need to specify For example mywebserver/myvirtualdirectory If you're using the Vantage In- built authentication: 1. Check Credentials. 2. Enter the username and password you created for the web module, domain is not needed 3. Click Ok. If you are using the IIS Integrated authentication: 1. Check Credentials. 2. Enter the username, password and domain you use for your windows network log on. 3. Click Ok. If you are using the Client Certificate authentication: 1. Check Provide Certificate. 2. Select your client certificate to connect to the Web Module with. 3. Click Ok. Page 16 of 28

18 A successful connection will see the server name appear under the Web Modules section with a status of Connected. Configuring your Organizational Structure Once a web module has been added to Vantage, you can add the users and groups that you want to report on and allow access to the web module. Note for Vantage 2.0 Users: WebSpy strongly recommends importing your organizational structure via the Organization tab. You are able to migrate this information to your Aliases afterwards. You can manually add users and groups on the Organization screen, or you can import these from any LDAP or LDIF compatible directory server or any CSV file. Import from LDAP or LDIF Using the Import Organization option you can add all users within your organization and sort them into the desired groups in the same process. To do this: 1. Within WebSpy Vantage Ultimate, click the Organization tab. 2. Click Import Organization 3. On the Directory server page, select your directory type and server and enter your username and password to authenticate with your domain controller, and then click Test. Click Next after you have successfully connected to your directory server. 4. On the Source page enter a Root Distinguished Name to search for users within (for example, dc=mydomain, dc=com ). The LDAP search query is defaulted to a query that returns users, however you can change this if necessary. Click Next. 5. On the User details page fill out the form with the attributes you intend to use for Display name, address, Login name and Manager. Click Next. Note: If you are using Integrated Windows Authentication, ensure the attribute used for Login Name matches the user s Windows login name If you are using Client Certificate authentication, ensure the attribute used matches the login value within the user s certificate. Use the Additional Attributes section to specify any extra information you need to import into the user to map them to the various ways they are identified in your log files. For example, if users are identified by a UserID in your log files, import the UserID attribute from your directory server into the Additional Attributes section. 6. On the Grouping page you can setup how your member groups are structured. For example it could be by Country, City, Department. Page 17 of 28

19 Figure 7: Grouping options in the Import from LDAP wizard To add a group: 1. Click the Add button. 2. Enter the name of the new group. 3. Enter name of the attribute in your directory server which best contains the group s information. 4. Select the source node at which the desired attribute is located in relation to your user nodes. 5. Click OK. 7. The option Convert Organization to Aliases after import, located at the bottom of the grouping page, will automatically create new aliases for each grouping level. You can then apply these aliases in your reports and filters. 8. Click OK to complete the wizard and begin the import. Once the import is complete your will see your Organization tree displayed. You can use the View drop- down list at the top of the Organization tree to display your groups, or your manager/subordinate hierarchy. Import from CSV Figure 8: The final imported Organization tree. Using the Import from CSV option you can add users within your organization and sort them into the desired groups in the same process. To do this: 1. Click Import from CSV. 2. Navigate to the csv file that contains your organizational structure. 3. Select how the information from your csv file should be merged with your existing organizational structure. 4. Click OK to complete the wizard and begin the import. Once the import is complete you will see you Organization tree displayed. You can use the 'View' drop- down list at the top of the Organization tree to display your groups, or your manager/subordinate hierarchy. CSV File Structure WebSpy support CSV file formats that: List your grouping structure Contain a unique identification for each individual Page 18 of 28

20 Link a unique manager identification to each individual The following sample is a supported WebSpy CSV file format. Manually Creating your Organization If you do not have access to a directory server or CSV file to automatically import your organizational structure, you can manually create your groups and users. Adding Groups The Configure Groups option allows you to manually create user groups. These groups should reflect your organization s structure, for example Country, City, and Department. To do this: 1. Click Configure Groups 2. To add a new organization group click Add 3. Enter the name of the new group and click OK 4. Use the Up and Down Arrows to rearrange your groups as required Note: Each additional group you add will be a nested group under the previous. Adding People (Users) The Add Person option allows you to add individual users to your organization tree. To do this: 1. Click Add Person 2. Enter the display name for the user in the first entry box 3. Enter their Login name and address Note: If you are using Integrated Windows Authentication, ensure the Login Name you specify matches the user s Windows login name If you are using Client Certificate authentication, ensure the Login Name you specify matches the login value within the user s certificate. 4. Add any additional ways the user can be identified in your log files in the Additional attributes section such as IP addresses, computer names, and authenticated usernames 5. The Hierarchy tab allows you to specify whether the user has either a manager or subordinates or both. Assigning Passwords Once your organization has been populated with users you can assign passwords to those users so that they can log in to the web module. Page 19 of 28

21 Note: This is only necessary if you are using the Vantage In- built Authentication mechanism. To do this: 1. Within WebSpy Vantage, click the Web Module tab 2. Click the Assign Passwords link 3. On the Select People page, click Add 4. You will be presented with your organization s structure. Browse the organization and select either the group or individual you wish to create passwords for. If you wish to assign a password to all people within the organization simply leave the Select People page blank. Click Next. 5. Password Style allows you to set the passwords length, along with how many capital letters, numbers, and symbols it contains. Once you have set your style, click Next. 6. The passwords for each user will then be generated and the details of this can be seen on the Generate page. This page will show you the user name, login name, and password for each user. From here you can also choose to regenerate the passwords by clicking the Regenerate button. If you wish to save these details you can do so by clicking Export to CSV. Click Next. Note: WebSpy does not store any reference to user s passwords. It is therefore recommended that you use the Export to CSV function to save a list of user s passwords for your own reference. If you do not do this and a user forgets their password, their password will need to be regenerated. 7. If you would like Vantage to automatically users their login details, check the Distribute passwords to users checkbox on the Distribute page and alter the subject and body as required. Click Options to specify your SMTP server details. 8. Click OK to complete the Assign Passwords wizard. Assigning Permissions You can specify what functions users or groups can have access to within the Web Module by selecting a user or group and clicking on the Permissions tab. By default, all users are denied access to all features. To assign permissions: 1. Within WebSpy Vantage, click the Web Module tab 2. Select the user or group you intend to assign/change permissions for 3. For each of the listed functions you can set the permission to either allow, deny or inherit. Inherit is the default setting of each group and user. Note: You will notice that by default, the very top level in your organization tree has the permission Inherit set on all features. This implicitly denies access to all features. You can allow access to a feature for all users by changing the feature to Allow at the top level. As long as all users have the permission Inherit for that feature, they will then have access to that feature. Web Module Synchronization Any changes made on the Web Module screen (password changes, permission changes etc) need to be uploaded to the server before they take effect. To do this: 1. Within WebSpy Vantage, click the Web Module tab Page 20 of 28

22 2. Ensure you are connected to a Web Module by selecting a web module and clicking Connect 3. Click Synchronize in the Web Module task pad 4. You will be presented with a synchronization completed dialog upon a successful update. Click OK. Page 21 of 28

23 Granting Access to Web Modules Before any users can access a Web Module, you need to grant access to the Web Module itself for all required users and/or groups. To do this: 1. Within WebSpy Vantage, click the Web Module tab 2. Ensure you are connected to a Web Module by selecting a web module and clicking Connect 3. Under the Permissions section click Add 4. Select the group or user you wish to grant access to. Click OK. 5. Select the new User or Group on the right hand side and ensure the Web Module Login permission is set to Allow. 6. Set any other permission for the user or group such as View Reports and Create Analysis. 7. Repeat the process until you have provided access to all required groups and users Publishing Reports The publishing reports process allows you to create reports for specific users and groups and make them accessible via the Report tab within the Web Module. To publish a report: 1. Within WebSpy Vantage, click the Web Module tab 2. Ensure you are connected to a Web Module by selecting a web module and clicking Connect 3. Click Publish Report in the Content task pad. The Publish Report to Web Module wizard will appear. 4. On the Template page select the report template you want to generate. Click Next. 5. On the Storages page select the storage you want to report on. Click Next. 6. On the Publish page enter the Report Name and select the Web Module you want to publish the report to. Enter a tag if you wish to make the report available for collation, then click Next. 7. Select how the reports should be separated on the Separation page. There are four options: Page 22 of 28

24 Single report This option will generate a single report. You must select a user or a group to attribute this report to. Attributing a report to a user or group does not restrict the content of the report in any way, i.e. it does not filter the report by the user or group. Attributing the report to a user or group in this situation is a way of identifying who the report is for. All reports published to the Web Module must be attributed to a user or a group so that you can apply the Attributed user or group permission on the permissions page. Report for each user This option will generate multiple reports, one for each user. The content of each report will be restricted to just that user s activity. Each report will be automatically attributed to the user that it contains. This enables you to apply the Attributed user or group permission on the permissions page to only allow users access to their own reports. Report for each group This option will generate multiple reports, one for each of your selected groups. For example, if you select Departments, and you have ten departments in your Organization tree, ten reports will be created. The content of each report will be restricted to just that group s activity. Each report will be automatically attributed to the group that it contains. This means that all users within that group will be able to access the report if you apply the Attributed user or group permission on the permissions page. Custom expression Generating reports for each user and each group relies on certain summaries being populated depending schema you are running reports on ('Username' for Web schemas, 'Source Address' and 'Destination Address' for network schemas, and 'Sender' and 'Recipient' for schemas). If you do not want to create separate reports for the items in these summaries, you can use the Custom Expression option to generate multiple reports for any given Summary. This is currently a beta feature (as of June 2009). If you would like assistance, please contact support@webspy.com. 8. Click Next 9. On the Permissions page, select the users or groups that you want to be able to access the report(s). This could be everybody who has access to the Web Module or specific users. When selecting report permissions, there are three options to choose from: Page 23 of 28

25 Attributed user or group This option will make the report(s) accessible to only the users or groups that the report is for (attributed to). Attribution is manually specified when using the Single option on the Publish page of this wizard, however attribution is automatically applied when using the For each user or For each group options. Specific users or groups This option ignores report attribution and simply makes the report(s) accessible to the users or groups you select. Managers This option makes the report(s) accessible to only the manager of the user or group that the report is for (attributed to). Attribution is manually specified when using the Single option on the Publish page of this wizard, however attribution is automatically applied when using the For each user or For each group options. The Restrict to within option allows you to specify how many managers up the hierarchy have access to the report. For example, Restrict to within 2 levels will make the report accessible to the attributed user s immediate manager, and their manager s manager. If the report is attributed to a group, it will make the report available to all mangers within that group, as well as their manager s. 10. On the Filters page add any filters you require the report to use. Click Next. 11. On the Notification page you are able to check the Notify via option. This will send an to each user that has permission to the report and permission to the Web Module that the report is published to. Alter the subject and body as desired. The % parameters will insert each user s respective details automatically. 12. Click OK to complete the publish report wizard. The Report Publishing process will then begin. Once complete, users with permission to view the report(s) will be able to log in to the Web Module and view the report on the Reports tab. Page 24 of 28

26 Note: You must provide users with the Read Reports permission on the Web Module screen for them to access the Reports tab within the Web Module. Publishing Storages The publishing storages process allows you to create storages for specific users and groups and make them accessible for analyzing via the Analysis tab in the Web Module. You can simply publish any of your existing storages to the Web Module for certain users to analyze, or you can take an existing storage and split it into many storages; one for each user or group. To publish storages: 1. Within WebSpy Vantage, click the Web Module tab 2. Ensure you are connected to a Web Module by selecting a web module and clicking Connect 3. Click Publish Storage in the Content task pad. The Publish Storage to Web Module wizard will appear. 4. On the Storages page select the storage you want to publish, then click Next. 5. On the Publish page enter the Storage Name and select the Web Module you are going to publish to, then click Next. 6. On the Separation page, select how the storage should be separated. There are three options: Single storage This option will simply take your existing storage and publish it onto the Web Module as is. You must select a user or a group to attribute this storage to. Attributing a storage to a user or group does not restrict the content of the storage in any way, i.e. the storage will contain data for other users, not just the user that the storage is attributed to. Attributing the storage to a user or group in this situation is a way of identifying who the storage is for. All storages published to the Web Module must be attributed to a user or a group so that you can apply the Attributed user or group permission on the permissions page. Storage for each user This option will generate multiple storages, one for each user. The content of each storage will be restricted to just that user s activity. Each storage will be automatically attributed to the user that it contains. This enables you to apply the Attributed user or group permission on the permissions page to only allow users access to their own storages. Storage for each group This option will generate multiple storages, one for each of your selected groups. For example, if you select Departments, and you have ten departments in your Organization tree, ten storages will be created. The content of each storage will be restricted to just that groups activity. Each storage will be automatically attributed to the group that it contains. This means that all users within that Page 25 of 28

27 group will be able to access the storage if you apply the Attributed user or group permission on the permissions page. 7. Click Next. 8. On the Permissions page, select the users or groups that you want to be able to access the storages(s). When selecting storage permissions, there are three options to choose from: Attributed user or group This option will make the storage(s) accessible to only the users or groups that the storage is for (attributed to). Attribution is manually specified when using the Single option on the Publish page of this wizard, however attribution is automatically applied when using the For each user or For each group options. Specific users or groups This option ignores storage attribution and simply makes the storage(s) accessible to the users or groups you select. Managers The option makes the storage(s) accessible to only the manager of the user or group that the storage is for (attributed to). Attribution is manually specified when using the Single option on the Publish page of this wizard, however attribution is automatically applied when using the For each user or For each group options. The Restrict to within option allows you to specify how many managers up the hierarchy have access to the storage. For example, Restrict to within 2 levels will make the storage accessible to the attributed user s immediate manager, and their manager s manager. If the storage is attributed to a group, it will make the report available to all mangers within that group, as well as their managers. 9. On the Filtering page, apply any filters you want and then click Next. 10. On the Notification page you are able to check the Notify via option. This will send an to each user that has permission to the storage and permission to the Web Module that the storage is published to. The users must have a valid address configured in the Organization tree for them to receive an . Alter the subject and body as desired. The % parameters will insert each user s respective details automatically. 11. Click OK to complete the publish storage wizard. The storage publishing process will then begin. Once complete, users with permission to analyse the storages(s) will be able to log in to the Web Module and analyse the storage on the Analysis tab. Note: You must provide users with the Create Analyses permission on the Web Module screen for them to access the Analysis tab within the Web Module. Publishing Collated Reports The publishing collated reports process allows you to collate reports for specific users and groups and make them accessible via the Report tab within the Web Module. Page 26 of 28

28 To publish a collated report: 1. Within WebSpy Vantage, click the Web Module tab 2. Ensure you are connected to a Web Module by selecting a web module and clicking Connect 3. Click Publish Collated Report in the Content task pad. The Publish Collated Report wizard will appear. 4. On the Report page select the reports to include in collation and click Next. 5. On the Date Range page select the range of dates you would like to include and click Next. 6. On the Publish page enter the Report Name and select the Web Module you want to publish the report to. You can also select who to attribute the report to. Click Next. 7. On the Permissions page, select the users or groups that you want to be able to access the report. This could be everybody who has access to the Web Module or specific users. When selecting report permissions, there are three options to choose from: Attributed user or group This option will make the report(s) accessible to only the users or groups that the report is for (attributed to). Attribution is manually specified when using the Single option on the Publish page of this wizard, however attribution is automatically applied when using the For each user or For each group options. Specific users or groups This option ignores report attribution and simply makes the report(s) accessible to the users or groups you select. Managers This option makes the report(s) accessible to only the manager of the user or group that the report is for (attributed to). Attribution is manually specified when using the Single option on the Publish page of this wizard, however attribution is automatically applied when using the For each user or For each group options. The Restrict to within option allows you to specify how many managers up the hierarchy have access to the report. For example, Restrict to within 2 levels will make the report accessible to the attributed user s immediate manager, and their manager s manager. If the report is attributed to a group, it will make the report available to all mangers within that group, as well as their manager s. 8. On the Notification page you are able to check the Notify via option. This will send an to each user that has permission to the report and permission to the Web Module that the report is published to. Alter the subject and body as desired. The % parameters will insert each user s respective details automatically. 9. Click OK to complete the publish collated report wizard. The Collated Report Publishing process will then begin. Once complete, users with permission to view the report(s) will be able to log in to the Web Module and view the collated report on the Reports tab. Note: You must provide users with the Read Reports permission on the Web Module screen for them to access the Reports tab within the Web Module. Page 27 of 28

29 Purging Data from the Web Module Over time, the number of reports, storages, and user s analyses (the result of analysing a storage) will become large. You can therefore delete reports, storages or analyses from your Web Module(s) that are older than a certain date. To do this: 1. Within WebSpy Vantage, click the Web Module tab 2. Ensure you are connected to a Web Module by selecting a web module and clicking Connect 3. Click Purge in the Web Module task pad. This launches the Purge Web Module Wizard. 4. On the Web Modules page select the Web Modules that you want to delete data from. Click Next. 5. On the Purge Range page, select the types of files you want to delete (Analyses, Reports or Storages) 6. Select the range of files you want to delete (All files, Files older than n Years/Months/Weeks/Days/Hours, or Files created before a certain date) 7. Click OK to proceed with deleting the files from the Web Module Automating using Scheduled Tasks You can schedule all the actions required to configure and publish information to the Web Module. These actions include: Importing your Organizational structure from LDAP Synchronizing your Organization information with the Web Module(s) Publishing Reports to the Web Module(s) Publishing Storages to the Web Module(s) Purging Data from the Web Module(s) To automate any of these actions, you need to create a task. To do this: 1. Within WebSpy Vantage, click the Tasks tab 2. Click New Task in the Tasks task pad. This launches the New Task wizard. 3. On the General page, enter a name for your task such as Daily reporting task 4. To keep informed on the status of the task each time it runs, check the Send task results by checkbox and enter your address. Click Next. 5. On the Schedule page, check the Run task using Windows Task Scheduler checkbox. This will create a job in Windows Scheduled Tasks. You can leave this unchecked if you want to create a task to perform a list of actions that you will run manually. 6. Select the Start time, and date recurrence for your task (only applicable if you have Run task using Windows Task Scheduler checked). Click Next. 7. Enter your Windows Login details on the Authentication page so that Vantage knows who to run the task as when you are logged off. Click OK. You will now see your new task listed on the Tasks screen. You can now add the actions you want to automate when the task runs. To do this 1. Select your task and click Add Action 2. Select the action you want to automate from the list. The following actions are relevant to the Web Module Solution, however you may also want to utilize some of the other standard actions such as Importing logs into a new storage. Page 28 of 28

30 Import Organization from LDAP Synchronize Web Module Publish Report to Web Module Publish Storage to Web Module Purge Data from Web Module 3. When you add an action, it gets added to the Actions list. Each action has either a Select... or Configure... sub- action. Double- click this sub- action to configure the action. Once you have added all the tasks and actions you desire, you can run the task manually to test its performance. Once you are happy with the task, you can leave it to run as scheduled. Administrator Options Logging into the Web Module with an administrator account provides access to the Options tab. The Options tab includes authentication, web module and data options. Authentication Options There are three main authentication options: Figure 6: Web Module Options tab Page 29 of 28

31 Authentication System Change your preferred authentication mechanism: Vantage In- built, IIS integrated or Client Certificate. Administrator Options Change username, change password or delegate administrators. IPKI Options Configure which field within the client certificate represents the user's login name: select field from list, specify certificate field name or use X.509 extension. Web Module Options There are five main Web Module options: Monitor User Tasks View user interaction with the web module. Includes button to stop all tasks. Upload Configuration Select how data is transmitted between Vantage and the Web Module: web service, data port or file share. Registration Register your Vantage Web Module. Maintenance Purge or erase data, reset initial configuration wizard, view application log or reload configuration. Report Logo Upload your organization s logo to use in reports. Data Options Manage Storages provides a list of available storages and their corresponding names, date ranges, attributed users and when they were added. Appendix A - Troubleshooting Why do I get an 'Installer was Interrupted' error when installing the WebSpy Vantage Web Module? Symptom: When launching the WebSpy Vantage Web Module installation, you are presented with the message "The installer was interrupted before WebSpy Vantage Web Module could be installed. You need to restart the installer to try again." Cause: This problem is usually caused by some necessary components of Microsoft IIS not being installed such as ASP.NET or IIS 6 Management Compatibility. Solution: To fix the problem, please follow the steps in Appendix A on page 30 for your Operating System. When I browse to the Web Module, I get a server error, 404 error, or see plain HTML code. Symptom: When you browse to the Web Module ( you get either get a server error, a page cannot be found error (404), or the web page may display un- rendered HTML code. Page 30 of 28

32 Cause: This problem is usually caused by the ASP.NET components not being registered with IIS. This can sometime occur if the.net 2.0 Framework was installed after IIS. Solution: Manually register the ASP.NET components with IIS. To do this: 1. Open a command window (Start Run, enter 'cmd' and press OK) 2. Type the following command depending on your operating system type: 32 bit: C:\Windows\Microsoft.NET\Framework\v \aspnet_regiis.exe i 64 bit: C:\Windows\Microsoft.NET\Framework64\v \aspnet_regiis.exe - i 3. Press Enter 4. Go to Start Control Panel Administrative Tools Internet Information Services (IIS) Manager. 5. Make sure that the status of ASP.NET version is set to Allowed in the Web service extension list. 6. Restart IIS by right- clicking on your server's name and select All Tasks Restart IIS. Select 'Restart Internet Services on server name' and click OK. 7. Then browse to the Web Module to see if the problem has been fixed. I can't login as an administrator any more. I get 'The specified credentials were not accepted How do I reset the Web Module? Symptom: When you try to log in to the Web Module with your Administrator Account, you get 'The specified credentials were not accepted.' Cause: This can be caused by changing your authentication mechanism and logging out before setting up a new administrator account that uses the new authentication mechanism. It may also be caused by forgetting your administrator username and password. Solution: You can reset the Web Module back to its original state so that you can re- configure your authentication mechanism and administrator account. To do this 1. Go to the data folder for the Web Module that you specified in the Installation wizard (defaults to c:\vantagewebdata) 2. Open the file 'Vantage Web Module.Settings' in a text editor such as Notepad 3. Look for the following line: <entry name="configured" type="system.boolean">true</entry> and change it to <entry name="configured" type="system.boolean">false</entry>. 4. Save the file. 5. Refresh the Web Module page and you should see the Configuration Wizard again. This will let you re- enter the authentication mechanism and admin account. When I launch the Web Module l get the error Unable to log entry and/or Unable to create path. Access denied. Symptom: When launching the Web Module (usually for the first time) you receive a server error such as similar to this: Server Error in /WebModule Application Page 31 of 28

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

Reference and Troubleshooting: FTP, IIS, and Firewall Information

Reference and Troubleshooting: FTP, IIS, and Firewall Information APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

Issue Tracking Anywhere Installation Guide

Issue Tracking Anywhere Installation Guide TM Issue Tracking Anywhere Installation Guide The leading developer of version control and issue tracking software Table of Contents Introduction...3 Installation Guide...3 Installation Prerequisites...3

More information

Migrating TimeForce To A New Server

Migrating TimeForce To A New Server Rev. 4/28/14 Migrating TimeForce To A New Server Table of Contents 1. Installation Prerequisites... 2 Required... 2 Recommended... 3 2. Update to a Migration Compatible Version... 3 Determine the Database

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

Web VTS Installation Guide. Copyright 2006-2010 SiiTech Inc. All rights reserved.

Web VTS Installation Guide. Copyright 2006-2010 SiiTech Inc. All rights reserved. Web VTS Installation Guide Copyright 2006-2010 SiiTech Inc. All rights reserved. Table of Contents Overview of Web VTS... 1 System Requirements... 2 Installation Sequence... 3 Installing Web VTS... 6 ii

More information

FTP, IIS, and Firewall Reference and Troubleshooting

FTP, IIS, and Firewall Reference and Troubleshooting FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the

More information

Access It! Universal Web Client Integration

Access It! Universal Web Client Integration Page 1 of 6 Last Updated: Friday, November 16, 2012 Access It! Universal Web Client Integration Overview This document outlines the steps needed to setup the Access It! Universal Web Client. The following

More information

SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit

SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit Note: SecureAware version 3.7 and above contains all files and setup configuration needed to use Microsoft IIS as a front end web server. Installing

More information

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.

More information

Server Installation Manual 4.4.1

Server Installation Manual 4.4.1 Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:

More information

PaperPort PSP Server 3 SERVER ADMINISTRATOR S GUIDE

PaperPort PSP Server 3 SERVER ADMINISTRATOR S GUIDE PaperPort PSP Server 3 SERVER ADMINISTRATOR S GUIDE 1. Third party licenses and notices 5 2. Welcome 6 3. Installation requirements 7 3.1. System requirements 7 3.2. Installing prerequisites 7 3.3. Pre-installation

More information

3M Command Center. Installation and Upgrade Guide

3M Command Center. Installation and Upgrade Guide 3M Command Center Installation and Upgrade Guide Copyright 3M, 2015. All rights reserved., 78-8129-3760-1d 3M is a trademark of 3M. Microsoft, Windows, Windows Server, Windows Vista and SQL Server are

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

AVG Business SSO Connecting to Active Directory

AVG Business SSO Connecting to Active Directory AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008

BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008 BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008 BUILDER 3.0 1 Table of Contents Chapter 1: Installation Overview... 3 Introduction... 3 Minimum Requirements...

More information

Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2

Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2 Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2 Table of Contents Table of Contents... 1 I. Introduction... 3 A. ASP.NET Website... 3 B. SQL Server Database... 3 C. Administrative

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide

Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Table of Contents TABLE OF CONTENTS... 3 1.0 INTRODUCTION... 1 1.1 HOW TO USE THIS GUIDE... 1 1.2 TOPIC SUMMARY...

More information

Sentinel Installation Guide

Sentinel Installation Guide Installation Guide All rights reserved. Neither this documentation nor any part of it may be reproduced, stored in a retrieval system, translated into another language, or transmitted in any form or by

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Installation Guide v3.0

Installation Guide v3.0 Installation Guide v3.0 Shepherd TimeClock 4465 W. Gandy Blvd. Suite 800 Tampa, FL 33611 Phone: 813-882-8292 Fax: 813-839-7829 http://www.shepherdtimeclock.com The information contained in this document

More information

SERVER ADMINISTRATOR S GUIDE

SERVER ADMINISTRATOR S GUIDE SERVER ADMINISTRATOR S GUIDE Nuance Communications, Inc. All rights reserved. Subject to change without prior notice. 1 System Requirements... 4 Installing Prerequisites... 5 Pre-Installation Device Configuration...

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

File Auditor for NAS, Net App Edition

File Auditor for NAS, Net App Edition File Auditor for NAS, Net App Edition Installation Guide Revision 1.2 - July 2015 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Preparing Your Server for an MDsuite Installation

Preparing Your Server for an MDsuite Installation Preparing Your Server for an MDsuite Installation Introduction This document is intended for those clients who have purchased the MDsuite Application Server software and will be scheduled for an MDsuite

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Backing up IMail Server using Altaro Backup FS

Backing up IMail Server using Altaro Backup FS Backing up IMail Server using Altaro Backup FS Purpose The purpose of this document is to provide guidelines and procedures for backing up IMail server system data and user data in case of a hardware or

More information

XIA Configuration Server

XIA Configuration Server XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Preparing Your Network for an MDsuite Installation

Preparing Your Network for an MDsuite Installation Preparing Your Network for an MDsuite Installation Professional Data Services 1632 East 23 rd Avenue Hutchinson, KS 67502 Toll-free: 800.875.0480 Fax: 858.486.5493 www.mdsuite.com Introduction This document

More information

4.0 SP1 (4.0.1.0) November 2014 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2

4.0 SP1 (4.0.1.0) November 2014 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2 4.0 SP1 (4.0.1.0) November 2014 702P03296 Installation Guide: Windows Server 2008 R2 2014 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, FreeFlow, and VIPP are trademarks of Xerox Corporation

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Easy Data Centralization with Webster. User Guide

Easy Data Centralization with Webster. User Guide Easy Data Centralization with Webster User Guide CONTENTS 3-4 1 Introducing Webster Webster - An Introduction 5-14 2 Installing & Configuring Webster Installing the System Configuring Webster 15-18 3 Managing

More information

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup. Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

File Share Navigator Online 1

File Share Navigator Online 1 File Share Navigator Online 1 User Guide Service Pack 3 Issued November 2015 Table of Contents What s New in this Guide... 4 About File Share Navigator Online... 5 Components of File Share Navigator Online...

More information

Local Caching Servers (LCS): User Manual

Local Caching Servers (LCS): User Manual Local Caching Servers (LCS): User Manual Table of Contents Local Caching Servers... 1 Supported Browsers... 1 Getting Help... 1 System Requirements... 2 Macintosh... 2 Windows... 2 Linux... 2 Downloading

More information

POLICY PATROL MFT. Manual

POLICY PATROL MFT. Manual POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated

More information

Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012

Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012 Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012 1996-2012 Internet Software Sciences Welcome to the Web+Center Installation and Configuration guide. This document

More information

Web Deployment on Windows 2012 Server. Updated: August 28, 2013

Web Deployment on Windows 2012 Server. Updated: August 28, 2013 Web Deployment on Windows 2012 Server Updated: August 28, 2013 Table of Contents Install IIS on Windows 2012... 3 Install Sage 300 ERP...16 Create Web Deployment User...17 Sage 300 ERP Services...22 Web

More information

Sitecore Ecommerce Enterprise Edition Installation Guide Installation guide for administrators and developers

Sitecore Ecommerce Enterprise Edition Installation Guide Installation guide for administrators and developers Installation guide for administrators and developers Table of Contents Chapter 1 Introduction... 2 1.1 Preparing to Install Sitecore Ecommerce Enterprise Edition... 2 1.2 Required Installation Components...

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

NTP Software File Auditor for NAS, EMC Edition

NTP Software File Auditor for NAS, EMC Edition NTP Software File Auditor for NAS, EMC Edition Installation Guide June 2012 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for NAS,

More information

escan SBS 2008 Installation Guide

escan SBS 2008 Installation Guide escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.

More information

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts This document will guide you through setting up your outgoing server (SMTP) Microsoft Outlook and Windows Live Mail. There is also a section below that guides you through the manual configuration of your

More information

Manual POLICY PATROL SECURE FILE TRANSFER

Manual POLICY PATROL SECURE FILE TRANSFER Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information

GUARD1 PLUS SE Administrator's Manual

GUARD1 PLUS SE Administrator's Manual GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS

More information

MobileStatus Server Installation and Configuration Guide

MobileStatus Server Installation and Configuration Guide MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,

More information

Installing, Uninstalling, and Upgrading Service Monitor

Installing, Uninstalling, and Upgrading Service Monitor CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page

More information

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

AIMS Installation and Licensing Guide

AIMS Installation and Licensing Guide AIMS Installation and Licensing Guide Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Toll Free: 800-609-8610 Direct: 925-217-5170 FAX: 925-217-0853 Email: support@avatier.com Limited Warranty

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

Remote Console Installation & Setup Guide. November 2009

Remote Console Installation & Setup Guide. November 2009 Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission

More information

Upgrade Guide BES12. Version 12.1

Upgrade Guide BES12. Version 12.1 Upgrade Guide BES12 Version 12.1 Published: 2015-02-25 SWD-20150413111718083 Contents Supported upgrade environments...4 Upgrading from BES12 version 12.0 to BES12 version 12.1...5 Preupgrade tasks...5

More information

Mobility Services Platform 3.1.1 Software Installation Guide

Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide 72E-100159-04 Revision D January 2008 2007 by Motorola, Inc. All rights reserved.

More information

1 Administration. Contents

1 Administration. Contents 1 Administration Contents Network Edition Overview...1-2 System requirements...1-3 PC specifications...1-3 Kodak Capture Pro Network Edition Client...1-4 Installation and configuration...1-4 Step 1: Site

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

Archive Attender Version 3.5

Archive Attender Version 3.5 Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Quick Start Guide 0514US

Quick Start Guide 0514US Quick Start Guide Copyright Wasp Barcode Technologies 2014 No part of this publication may be reproduced or transmitted in any form or by any means without the written permission of Wasp Barcode Technologies.

More information

Microsoft Dynamics GP 2010. SQL Server Reporting Services Guide

Microsoft Dynamics GP 2010. SQL Server Reporting Services Guide Microsoft Dynamics GP 2010 SQL Server Reporting Services Guide April 4, 2012 Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information

More information

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage. Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

RoboMail Mass Mail Software

RoboMail Mass Mail Software RoboMail Mass Mail Software RoboMail is a comprehensive mass mail software, which has a built-in e-mail server to send out e-mail without using ISP's server. You can prepare personalized e-mail easily.

More information

Releasing blocked email in Data Security

Releasing blocked email in Data Security Releasing blocked email in Data Security IN-TopicInfo:Topic 41101/ Updated: 02-May-2011 Applies To: Websense Data Security v7.1.x Websense Data Security v7.5.x Websense Data Security v7.6.x - v7.8x SMTP

More information

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

intertrax Suite resource MGR Web

intertrax Suite resource MGR Web intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;

More information

Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10

Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10 Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information