Self-Service Resources

Search Self Service Resources

In order to simplify your life and give you a centralized hub for HelpSystems product resources, we’re in the process of moving self-service content into our new HelpSystems Community portal.

If you’re looking for Automate, Skybot (recently rebranded as Automate Schedule), Intermapper, or Document Management (RJS) support resources in particular, you will now find everything you need in the new Community Knowledge Base. Thanks for your patience during this transition—we think you’ll really like your new community. Visit the portal >

1042 Self Service Pages Available

The below information is a comprehensive list of the servers and functions by user profile for each of the separate processes of Compliance Monitor 3. This information may be used to configure the server rules for the Powertech Network Security...

From the WUI, you can work with the requestor timeout, retriever timeout, and endpoint response timeout.

How To Guide
August 25th, 2016

Powertech provides several Sequel dashboards that allow you to display security information from the Powertech products. If you use both Sequel data access and analysis software and one or more Powertech security products, you can download these...

How To Guide
October 11th, 2014

This procedure is for a 'New' installation of CM3.X with no other application running under the PTWRKMGT SBS. Any other Powertech products currently running under the PTWRKMGT will be adversely impacted with this installation.

Install the...

When you want to monitor for the messages in QSYSOPR message queue with both Robot/Console and Powertech Interact, the problem is that the first product activated locks the QSYSOPR message queue so the other product does not work.

The...

How To Guide
August 18th, 2016

Reports may be run by User, Server or Location rules.

Each report shows the same general information, ordered according to the selected sort method (e.g. user, server).

To run a report, from the Main Menu choose option 80 ‘Reports...

Compliance Monitor can report on the changes or movement of a file in the IFS directory structure, just like it can track the changes or movements of files in the native library structure.

The first thing that you must verify is that the object auditing system values and the object and user profile are set to audit these changes.

How To Guide
August 25th, 2016
Step I – Installation of the Powertech Products

To successfully install any Powertech product in an HA (‘High Availability’) environment, the Powertech product must be installed on the HA system before the production system.

This is...

How To Guide
July 29th, 2016
Manage and Secure IBM i Commands Command Security monitors and secures selected commands on your Power Systems running IBM i. You identify which commands to monitor, specify the conditions under which the command should be secured, and define the...
How To Guide
August 1st, 2016
New Browser-Based User Interface Compliance Monitor 3 brings an easy-to-use, browser-based interface to compliance reporting. You can connect to the Consolidator system from your browser without having to install additional software on user PCs...

Compliance Monitor can compare system values from multiple systems in a side-by-side format.

To compare system values on multiple systems:

Select the Endpoints that are to be compared Select the "System Values Side-by-Side" report located...

Use these instructions to configure the Compliance Monitor Browser Interface (3.0 and greater) to send and receive information using the Secure Sockets Layer(SSL). SSL technology encrypts (encodes) the communication between Web browsers and...

Step I – Planning a Data Thread 3.x Move Data Thread 3.x Installation. For best results, before the move, Data Thread must already be installed on the ‘destination’ system so the user profile, SBSD (subsystem description), job...

Network Security ships with the IBM audit journal QAUDJRN and the message queue QSYSOPR already specified, since they are already known to exist on every system. Powertech permits you to choose different journals and message queues, and in some...

How To Guide
June 16th, 2016
Screen Capture

Authority Broker 4.0 brings powerful tools for monitoring and creating visual audit trails of user activity. Using the Screen Capture feature you can:

Capture screens as users step through menus and enter commands. Have...

Insert the desired profile as a user in the authorization list POWERABADM with * USE rights to add a new product administrator.

For more information, see...

Use this procedure when you want to change the email address Compliance Monitor uses when emailing reports to users. (The default email is no-reply@powertech.com ). Requirements

Compliance Monitor...

How To Guide
August 24th, 2016

Change tracking in Power Admin is found in the History menu of Central Administration. History is menu option 4 in the Central Administration Main Menu.

See...

Servers/Functions used when transferring files FROM/TO the IBM i & PC listed in Server order, not the order of how the process occurs. From System i to PC Server Function *NDB ADDLIBL *...

To setup Command Security to restrict access for the *ALLOBJ do the following: Create a condition named System_admins (refer to the Administrator’s Guide for details). WRKPTCS Option 2 - Work with Named Conditions F6 =Create Enter the name...

Use this procedure when you want to export or import report groups from one consolidator system to another; typically used with custom report groups.

Exporting Report Groups

Log in to the Web User Interface...