Top
Systemwalker Desktop Keeper V14g Installation Guide
Systemwalker

2.5.1 Single Installation

There are two methods for a single installation of a client (CT).

Wizard-style installation

Installation of wizard style is carried out in interactive mode. Please refer to “2.5.1.1 Wizard-style Installation”.

Silent installation

Automatic installation can be used for silent installation according to the prepared installation setting files. Please refer to “2.5.1.2 Execute Silent Installation ”.


2.5.1.1 Wizard-style Installation

This section describes how to newly install a client (CT) of Systemwalker Desktop Keeper in wizard style.

Items to be confirmed before installation

The steps to install a client (CT) in wizard style are as follows. In addition, for operating environment, please refer to “Systemwalker Desktop Keeper User’s Guide”.

  1. Log in to Windows with the user that belongs to the Administrators group or the user that belongs to the Domain Admins group. When other applications are being used, please close them.

  2. After the CD-ROM of Systemwalker Desktop Keeper is inserted into the PC, the following window will be displayed:

    Please select [CT (Client) Installation].

    If the above installer is not started, please start the “swsetup.exe” in the CD-ROM drive.

  3. After the “Welcome to use Systemwalker Desktop Keeper Client installation” window is displayed, please click the [Next] button.

  4. The “Select the installation target” window of CT (client) will be displayed.

    If the installation target displayed is not to be changed, click the [Next] button.

    If the installation target displayed is to be changed, please click the [Browse] button of the folder expected to be changed, and click the [Next] button after the folder has been changed.

    Note

    Please exclude compressed and encrypted targets

    When the installation target folder of the CT (client) and the installation target folder of the following log files are taken as compressed or encrypted targets, the running of program may be affected. Therefore, please do not turn on the compression or encryption settings.

  5. The “Select the installation target” window of the log saving target to be set will be displayed.

    When the displayed saving target is not to be changed, click the [Next] button.

    When the displayed saving target is to be changed, please click the [Browse] button of the folder expected to be changed, and click the [Next] button after the folder has been changed.

    Please set folder under Windows system disk in the folder path for saving log files. (When the OS is installed to the C Drive, the C Drive will be the system disk.)

    Note

    Please do not specify the drive with export prohibition

    Because logs may be lost, please do not specify the drive with export prohibition in the saving target of the log file.

  6. Since the “Enter the server information” window is displayed, set the information of server to be connected and click the [Next] button.

    • [IP Address of Connected (Master) Management Server]: enter the IP address of the (master) Management Server to be connected.
      When installing a client (CT) on the Master Management Server or a Management Server, it is not required to specify [IP Address of Connected (Master) Management Server]. (127.0.0.1 is displayed in IP address, unable to enter).

    • [IP Address of Backup Management Server]: when the (Master) Management Server to be 127.0.0.1is abnormal, enter the IP address of backup Management Server for inquiring user policy.

      IP address of a backup Management Server can be omitted. In addition, the function is effective when all the following conditions are satisfied:

      • The Management Server is in a 3-level structure.

      • Users are managed collectively

      • Action of client (CT) is controlled through user policy.

      Selection points of the backup Management Server are as follows:

      • In case of the client (CT) connecting to the Master Management Server

        Please specify any lower-level Management Server.

      • In case of the client (CT) connecting to the Management Server

        Please specify the Master Management Server.

    • [Used Port Number (for Receiving)]: enter the port number (for receiving at CT side) used for communication between the client (CT) and server service.

    • [Used Port Number (for Sending)]: enter the port number used for communication between the client (CT) and server service (for sending logs immediately at CT side).

    • [Used Port Number (for Sending 2)]: enter the port number used for communication between the client (CT) and server service (for sending logs collectively at CT side).

  7. The "Set printing monitoring mode" window is displayed. Please select any option for printing monitoring mode and click the [Next] button.

    • [Monitoring the printing of all printers set in this terminal (Recommanded)]: Select when collecting a printing operation log at each client (CT). In this case, the printing operation log will be collected on each client (CT).

    • [Monitoring the printing of local printer only]:
      Select when the printing in the client (CT) under the same Master Management Server or Management Server as the printer server is performed through the printer server. The client (CT) should also be installed on the printer server as well. In this case, printing operation log cannot be collected through the client (CT) that is not the printer server. The printing operation log will be collected through the printer server.

    Note

    Notes for printing monitoring mode

    [Please Unify in Master Management Server and Management Server]

    Please unify the above selection on the client (CT) of the Master Management Server or the Management Server. If it is not unified, the printing operation log may not be collected.

    [Setting when Installing Printer Server on Non-Server OS]

    If the non-server OS (Windows Server® 2003 or Windows Server® 2008) is taken as the printer server and set to [Monitoring the Printing of All Printers Set in this Terminal (Recommended)], no more than 10 clients can be connected to the printer server to print. At this time, please set to [Monitoring Printing of Local Printer Only].

    Point

    Register user ID on printer server

    When “Monitoring Printing of Local Printer Only” is selected on the printer server before installing the client (CT), it is required to register the User ID used in the client (CT) that performs printing on the printer server. If it is not registered, the user ID of the printing log will be output as follows.

    • In the client (CT) that performs printing, when user authority is set for only the user ID being used, the [User ID] of the log will be collected as [Guest].

    • When it is required to log on the printer server as Administrator, the [User ID] of the log will be collected as [Administrator].

  8. The “Set E-mail Control Mode” window will be displayed. Please set the mode of E-mail attachment prohibited and click the [Next] button.

    • [Port Number for E-mail Sending and Monitoring]: When port monitoring mode is selected, enter the port number used for communication between client (CT) and SMTP server.

    • [Port Monitoring Mode (Recommended)]: Select when using the prohibition function through the drive for E-mail file attachment prohibition. Normally, please take this setting as default.
      When updating from a version before V13.0.0, select the E-mail file attachment prohibition under port monitoring mode before setting the same prohibition action as before V13.0.0.

      • [Port Number for E-mail Attachment Prohibition]: When port monitoring mode is selected, enter the port number used internally in the E-mail attachment prohibition processing.

      • [Port Number 2 for E-mail Attachment Prohibition]: When port monitoring mode is selected, enter the port number used internally in the E-mail attachment prohibition processing.

    • [V12.0L20 - V13.0.0 Compatible Mode]: Select when using the prohibition function based on any mode before V13.0.0. In the version upgrade starting from the version before V13.0.0, it is only required to be specified when the same prohibition action is needed.

    Note

    Notes for setting E-mail attachment prohibition mode

    [In Windows Vista®, Windows Server 2008® or Windows® 7]

    In Windows Vista®, Windows Server 2008® or Windows® 7, only port monitoring mode can be selected as the mode for E-mail file attachment prohibition.

    [Please Confirm if Port is Not Used]

    For port of E-mail attachment prohibition, please specify the port not used in other processing or during communication.

  9. The “Creation Settings of File Exporting Utility Icon” window is displayed. Please set whether to create the icon of file export utility and click the [Next] button.

    • [Create in [Desktop]]: Select when creating the file export utility icon.

    • [Create in the [Send] Menu]: select when creating the file export utility icon in the [Send] menu.

  10. When the “Enter the password” window is displayed, please set the password for displaying the client status and modifying the utility, and click the [Next] button.

    In addition, the password set here is required when executing the uninstallation and maintenance commands of client (CT). The conditions for contents to be entered are as follows:

    • Up to 32 bytes of single-byte alphanumeric characters as well as contents apart from the following symbols can be entered

    • Symbols that cannot be entered are: “&”“<”“>”“|”“\”“"”“~”“'”“?”“:”“^”

    • Double-byte or single-byte space is not allowed.

    • Single-byte Kana are not allowed.

    Note

    Please do not forget password

    This password is required when executing the uninstallation and maintenance commands of the client (CT). Please pay attention to that if the password is forgotten, the uninstallation and maintenance commands will be unable to be executed.

  11. The “The installation preparation is completed.” window is displayed.

    When installation is started, please click the [Install] button to start the installation.

    When it is expected to confirm or modify the setting, please click the [Return] button to reset.

  12. After the processing has completed normally, the “Installation is completed.” window will be displayed.

    It is necessary to restart the system to use the program. Select either of the following items and click the [Finish] button.

    • [Yes, restart the computer immediately.]

    • [No, restart the computer later.]


2.5.1.2 Execute Silent Installation

Create installation settings file

Create the installation settings file (InstConf.ini) to be used in a silent installation of the client (CT) using the Sever Setting Tool.

In addition, this procedure should be followed when executing silent installation if version upgrade is performed using the self version management function.

The creation procedure is as follows:

  1. Select [All Programs] - [Systemwalker Desktop Keeper] - [Server] - [Sever Settings Tool] from the [Start] menu and log on.

  2. Click the [Create CT Silent Installation Files] button.

    →The following window will be displayed.

  3. Enter the following information and click the [Start to output] button.

    Setting Item

    Value

    [Server IP address (CT Management Server)]

    Enter the IP address of the connected (Master) Management Server.

    [Server IP address (backup Management Server)]

    When the connected (Master) Management Server is abnormal, enter the IP address of the backup Management Server for inquiring user policy.
    Under initial status, the same value as [Server IP Address (CT Management Server)] will be displayed. Please modify if necessary.

    The function will be effective all the following conditions are satisfied.

    • The Management Server is in a 3-level structure

    • Users are managed collectively

    • The actions of the client (CT) are controlled by user policy

    If the conditions are not applicable, please set the same value as [Server IP Address (CT Management Server)].

    [Set port number]

    [Port number (for receiving)]

    Enter the port number (for CT receiving) used for communication between client (CT) and server service.

    [Port number (for sending)]

    Enter the port number (for sending CT logs immediately) used for communication between client (CT) and server service.

    [Port number (for sending 2)]

    Enter the port number used (for sending CT logs collectively) for communication between client (CT) and server service.

    [Port number (for E-mail attachment prohibition)]

    When [E-mail Attachment Prohibited Function] is selected as [Port monitoring mode (Recommended)], enter the port number used internally for E-mail attachment prohibition processing.

    When [E-mail Attachment Prohibited Function] is selected as [V12.0L20 - V13.0.0 Compatible Mode], entering the port number is not required.

    [Port number (for E-mail attachment prohibition 2)]

    When [E-mail file attachment prohibition] is selected as [Port monitoring mode (Recommended)], enter the port number used internally for E-mail attachment prohibition processing.

    When [E-mail file attachment prohibition] is selected as [V12.0L20 - V13.0.0 Compatible Mode], entering the port number is not required.

    [Port number (for E-mail sending monitoring)]

    Enter the port number for the E-mail sending monitoring.

    [Password (first entry)]

    Enter the password. Up to 32 bytes of single-byte alphanumeric characters as well as contents apart from the following symbols can be entered.
    Symbols that cannot be entered are:“&” “<” “>” “|” “\” “"” “~” “'” “?” “:” “^”.
    Multi-byte or single-byte space is not allowed.

    Note

    Please do not forget password

    This password is required during the execution of uninstallation and maintenance commands of the client (CT). Please be aware that if the password is forgotten, the uninstallation and maintenance commands will be unable to be executed.

    [Password (re-entry)]

    In order to avoid incorrect registration, please re-enter the password.

    [Log output target folder]

    Please specify the folder under the Windows system disk as the folder to save the logs of the client (CT). When the OS is installed to the C Drive, the C Drive will become the system disk.

    The length of absolute path that can be specified is no more than 96 single-byte characters. However, the following symbols cannot be used as the folder name.
    Symbols that cannot be used: “\” “/” “:” “*” “?” “"” “<” “>” “|”

    Environment variable can also be specified.
    Example: %ProgramFiles%

    Note

    • Because the log may be lost, please do not specify the drive with the export prohibition in the saving target of log file.

    • Because program operation might be affected, please do not perform compression or encryption setting in the saving target of log file.

    [Reboot OS after specifying installation] (*)

    Specify to restart OS after installation.

    Display the reboot confirming window

    After installation has been implemented in the client (CT), the restart window will be displayed. This item is only effective when “Reboot by Force” is not selected. After “Reboot by Force” is selected, this button will be grayed out.

    When this item is selected, restart will be performed automatically after the installation has completed.
    Please select either one from “Yes, restart the computer immediately.”, or “No, restart the computer later”.

    If no item is selected, nothing will be displayed after the installation has completed. Whether to restart will be determined according to the [Restart by Force] setting of the following items.

    Force to reboot (It is valid only when the reboot confirming window is not displayed)

    Select to restart by force after the installation of client (CT). The item is only effective when “Display Restart Confirmation Window” is not selected. If “Display Restart Confirmation Window” is selected, the button will be grayed out.

    When this item has been selected, restart will be executed automatically after the installation has completed. When file is opened, the content will not be saved but directly completed, please pay attention to that content might be lost.

    If it is not selected, processing will be completed after the installation has completed. If “Display Restart Confirmation Window” is not selected, the restart confirmation window will not be displayed, and restart will not be executed automatically. Instead, user has to restart manually.

    [Installation target of client]

    Specify the path of the CT installation folder.

    The absolute path length that can be specified is no more than 96 single-byte characters. However, the following symbols cannot be used as file name.
    Symbols that cannot be used: “\” “/” “:” “*” “?” “"” “<” “>” “|”

    Environment variable can also be specified.
    For example) %ProgramFiles%

    Note

    Please exclude the compressed and encrypted targets

    Because the operation of program might be affected, please do not enable compression or encryption settings in the client installation target.

    [Printing monitoring mode] (*)

    Specify the monitoring mode of printing.

    Monitor printing of all printers set in the terminal (recommended):

    Specify when the printing operation log is selected at each client (CT). In this case, the printing operation log will be collected in each client (CT).

    Monitor printing of local printer only:

    Printing operation in the client (CT) that is in the same Master Management Server or Management Server as the printer server will be selected through the printer server. The client (CT) should also be installed on the printer server. In this case, the printing operation log cannot be collected through the client (CT) that is not the one of printer server. The printing operation log will be collected through the printer server.

    Note

    • Please unify the printing monitoring mode in the client (CT) under the Master Management Server or Management Server. If unification is not achieved, printing operation logs may not be collected

    • If the OS that is not of server type (Windows Server® 2003, Windows Server® 2008) is used as the printer server, and the setting is [Monitoring the Printing of All Printers Set in this Terminal (Recommended)], the printer server cannot connect with more than 10 clients for printing. At this time, please set to [ Monitoring the Printing of Local Printer Only].

    [E-mail attachment prohibition] (*)

    Specify the E-mail attachment prohibited function.

    Port monitoring mode (recommended):

    Port monitoring mode based on drivers. This setting is specified as default.

    V12.0L20~V13.0.0 compatible mode

    It is the E-mail attachment prohibition mode in the previous version. When the version is updated, the setting should be performed when the prohibition is the same as the previous version.

    [Apply policy immediately after logging on Windows]

    Specify whether to apply user policy immediately after logon.

    User policy (under Windows Vista®, Windows Server® 2008 and Windows® 7 only)

    Apply user policy immediately after logon. (Initial value)

    However, under Windows® XP and Windows Server® 2003, even [User Policy] is selected, it will run as [CT Policy].

    It is always as CT policy (V12.0L20~V13.2.0 compatible format)

    Run with CT policy after logon.

    [Set the creation of File Export Tool icon]

    Specify whether to create icons of File Export Utility.

    Create on the [Desktop]

    Select when File Export Utility icons are created on desktop.

    Create in the [Send] menu

    Select when File Export Utility icons are created in the [Send] menu.

    [Installation settings file]

    Specify the saving target of silent installation setting file (InstConf.ini). The specification method is as follows:

    • Enter file name with absolute path. Enter the path of silent installation setting file with absolute path.

    • Select through the [View] button.
      The [Save As] window will be displayed. Select the folder to save silent installation setting file, and click the [Save] button after entering the file name.

      The absolute path length that can be specified is no more than 255 single-byte characters. However, the following symbols are not allowed: “\” “/” “:” “*” “?” “"” “<” “>” “|”.

Point

Items become effective when self version management function is used to perform version upgrade

When the self version management function is used to perform the version upgrade, the above 3 items with (*) will be effective.

  • [Printing monitoring mode]

  • [E-mail attachment prohibition]

  • [Reboot OS after specifying installation]

Other items will be omitted even if they have been set.

Point

Register user ID on printer server

When “Monitoring the printing of local printer only” is selected and the client (CT) is installed on the printer server, it is also necessary to register the user ID used in the printing client (CT) on the printer server. If it is not registered, the user ID for printing logs will be output as follows:

  • When only setting user authority to the user ID being used in the printing client (CT), [User ID] of log will be collected as [Guest].

  • When it is required to log in printer server and register as Administrator at the time of printing, [User ID] of log will be collected as [Administrator].


Execute silent installation

Before installation, please refer to “Port Number List” in “Systemwalker Desktop Keeper Reference Manual” to confirm the port number being used.

When silent installation is performed in the client (CT) with CT installed, installation by overwriting will be performed. In this case, modify the IP address, port number and log saving target directory. In addition, even if the password used in initial installation is specified to be modified, the password will not be changed.

  1. Logon to the PC as a user who belongs to the Administrators group of local computer or a user that belongs to the Domain Admins group of domain. When other applications are being used, please close them.

  2. Insert the setup disk into the drive.
    Copy the silent installation settings file (InstConf.ini) for client (CT) created according to “Create installation settings file ” to any drive or folder.

  3. Select [Start]-[Run] or start the command prompt.

  4. Execute installation command (Setup.exe). The installation command is in the “win32\DTKClient” folder of setup disk.

    • Options are not case-sensitive.

    • If no option is specified, error message will be displayed and installation will be terminated.

    Specification Example

    Assume the following conditions.

    • Setup disk is inserted into D Drive.

    • The Setup.exe command is under D:\win32\DTKClient.

    • Installation settings file is in C:\Dtk.

      D:\win32\DTKClient\Setup.exe /Silent "C:\Dtk\InstConf.ini"

    Note

    About execution in Windows Vista®, Windows Server® 2008 or Windows® 7

    When executing the command in Windows Vista®, Windows Server 2008® or Windows® 7, please execute this command in the command prompt run by the administrator.

    → After the installation has completed, the CT silent installation file is generated and specified as “Display Dialog” and the window prompting restart will be displayed.

  5. After the window indicating restart is displayed, restart the client (CT).
    Then, please select one of the following items and click the [Finish] button.
    [Yes, restart the computer immediately.]: select to restart immediately.

  6. [No, restart the computer later.]: select to restart later.