Top
Systemwalker Desktop Keeper Installation Guide
FUJITSU Software

2.6.1 Single Installation

There are two methods for a single installation of a client (CT).

Wizard-style installation

Installation of wizard style is carried out in interactive mode. Refer to "2.6.1.1 Wizard-style Installation".

Silent installation

Automatic installation can be used for silent installation according to the prepared installation setting files. Refer to "2.6.1.2 Perform Silent Installation" for details.

2.6.1.1 Wizard-style Installation

Note

If a user whose user name contains fullwidth characters installs a client (CT), an error message may be displayed.

When installing a client (CT), use a user name that contains halfwidth characters only.

This section describes how to newly install a client (CT) of Systemwalker Desktop Keeper in wizard style.

Items to be confirmed before installation

Installation

The steps to install a client (CT) in wizard style are as follows. In addition, for operating environment, refer to "Operating Environment" in the User's Guide.

  1. Log in to Windows with the user that belongs to the Administrators group or the user that belongs to the Domain Admins group. When other applications are being used, close them.

  2. After the DVD-ROM of Systemwalker Desktop Keeper is inserted into the PC, the installer window will be displayed:

    Select CT (Client) Installation.
    If the installer is not started, start the "swsetup.exe" in the DVD-ROM drive.

  3. After the "Welcome to use Systemwalker Desktop Keeper Client installation" window is displayed, click the Next button.

  4. The "Select the installation target" window of CT (client) will be displayed. If the installation target displayed is not to be changed, click the Next button.

    If the installation target displayed is to be changed, click the Browse button of the folder expected to be changed, and click the Next button after the folder has been changed.

    Note

    Exclude compressed and encrypted targets

    When the installation target folder of the CT (client) and the installation target folder of the following log files are taken as compressed or encrypted targets, the running of program may be affected. Therefore, do not turn on the compression or encryption settings.

  5. The "Select the installation target" window of the log saving target to be set will be displayed. When the displayed saving target is not to be changed, click the Next button.

    When the displayed saving target is to be changed, click the Browse button of the folder expected to be changed, and click the Next button after the folder has been changed.

    Set folder under Windows system disk in the folder path for saving log files. (When the OS is installed to the C Drive, the C Drive will be the system disk.)

    Note

    Do not specify the drive with export prohibition

    Because logs may be lost, do not specify the drive with export prohibition in the saving target of the log file.

  6. Since the Enter the server information window is displayed, set the information of server to be connected and click the Next button.

    • IP Address of Connected (Master) Management Server: enter the IP address or server name of the (master) Management Server to be connected.
      When installing a client (CT) on the Management Server/Master Management Server, it is not required to specify IP Address of Connected (Master) Management Server. (127.0.0.1 (IPV4),::1(IPv6),127.0.0.1(IPv4/IPv6) is displayed in IP address, unable to enter).
      IPv4 and IPv6 addresses can be specified. However, do not specify a link-local address, otherwise behavior is not guaranteed.

      The IP address or server name must meet the following conditions:

      • The server name can contain up to 15 halfwidth alphanumeric characters, hyphens (-), and underscores (_).

      • The IPV4 IP address can contain up to 15 halfwidth numbers and periods (.).

      • The IP address (IPv6) can contain up to 39 halfwidth letters (A-F, a-f), numbers, and colons (:).

      • The server name and IP addresses cannot contain only numbers

    • IP Address of Backup Management Server: when the (Master) Management Server to be 127.0.0.1is abnormal, enter the IP address or computer name of the backup Management Server for inquiring user policy.

      IP address of a backup Management Server can be omitted. In addition, the function is effective when all the following conditions are satisfied: IPv4 and IPv6 addresses can be specified. However, do not specify a link-local address, otherwise behavior is not guaranteed.

      • The Management Server is in a 3-level structure.

      • Users are managed collectively

      • Action of the client (CT) is controlled through user policy.

      Selection points of the backup Management Server are as follows:

      • In case of the client (CT) connecting to the Master Management Server

        Specify any lower-level Management Server.

      • In case of the client (CT) connecting to the Management Server

        Specify the Master Management Server.

      The IP address or server name must meet the following conditions:

      • The server name can contain up to 15 characters

      • The IP address (IPv4) can contain up to 15 characters

      • The IP address (IPv6) can contain up to 39 characters

      • The IP address (IPv4) can contain halfwidth numbers (0-9) and halfwidth periods (.)

      • The IP address (IPv6) can contain halfwidth alphanumeric characters (A-F, a-f, 0-9) and halfwidth colons (:)

      • The server name can contain halfwidth alphanumeric characters (A-Z, a-z, 0-9), halfwidth hyphens (-), and underscores (_).

      • The server name and IP addresses cannot contain only numbers.

    • Used Port Number (for Receiving): Enter the port number (for receiving at CT side) used for communication that uses the proprietary communication method (V15.1.1 or earlier communication method) between the client (CT) and server service.
      Enter a value from 5001 to 60000.

    • Used Port Number (for Sending): Enter the port number used for communication that uses the proprietary communication method (V15.1.1 or earlier communication method) between the client (CT) and server service (for sending the client (CT) logs or receiving policies).
      Enter a value from 5001 to 60000.
      When entering the following items, ensure that they are not duplicated:

      • Used Port Number (for Sending)

      • Used Port Number (for Sending 2)

    • Used Port Number (for Sending 2): Enter the port number used for communication that uses the proprietary communication method (V15.1.1 or earlier communication method) between the client (CT) and server service (for registering the client (CT)).
      Enter a value from 5001 to 60000.
      When entering the following items, ensure that they are not duplicated:

      • Used Port number (for Sending)

      • Used Port Number (for Sending 2)

      Note

      If using the proprietary communication method (V15.1.1 or earlier communication method), it is necessary to be able to resolve the host name of the Management Server or Master Management on each machine. Otherwise, communication will not be possible between the Management Server or Master Management Server and the client (CT).
      If using the secure communication method, name resolution is not mandatory.

  7. The Set printing monitoring mode window is displayed. Select any option for printing monitoring mode and click the Next button.

    • Monitoring the printing of all printers set in this terminal (Recommended): Select when collecting a printing operation log at each client (CT). In this case, the printing operation log will be collected on each client (CT).

    • Monitoring the printing of local printer only:
      Select when the printing in the client (CT) under the same Master Management Server or Management Server as the printer server is performed through the printer server. The client (CT) should also be installed on the printer server as well. In this case, printing operation log cannot be collected through the client (CT) that is not the printer server. The printing operation log will be collected through the printer server.

    Note

    Notes for printing monitoring mode

    Unify in Master Management Server and Management Server

    Unify the above selection on the client (CT) of the Master Management Server or the Management Server. If it is not unified, the printing operation log may not be collected.

    Setting when Installing Printer Server on Non-Server OS

    If the non-server OS (Windows Server(R) 2008, Windows Server(R) 2012 or Windows Server(R) 2016) is taken as the printer server and set to Monitoring the Printing of All Printers Set in this Terminal (Recommended), no more than 10 clients can be connected to the printer server to print. At this time, set to Monitoring Printing of Local Printer Only.

    Point

    Register user ID on printer server

    When "Monitoring Printing of Local Printer Only" is selected on the printer server before installing the client (CT), it is required to register the User ID used in the client (CT) that performs printing on the printer server. If it is not registered, the user ID of the printing log will be output as follows.

    • In the client (CT) that performs printing, when user authority is set for only the user ID being used, the User ID of the log will be collected as Guest.

    • When it is required to log on the printer server as Administrator, the User ID of the log will be collected as Administrator.

  8. The Set E-mail Control Mode window will be displayed. Set the mode of E-mail attachment prohibited and click the Next button.

    • Port Number for E-mail Sending and Monitoring: When port monitoring mode is selected, enter the port number used for communication between client (CT) and SMTP server.
      Specify a value from 0 to 65535.
      The specified value cannot match the value of any of the settings below:

      • Used Port Number (for Receiving)

      • Used Port Number (for Sending)

      • Used Port Number (for Sending 2)

      • Port Number for E-mail Sending and Monitoring

      • Port Number for E-mail Attachment Prohibition

      • Port Number 2 for E-mail Attachment Prohibition

    • Port Monitoring Mode (Recommended): Select when using the prohibition function through the drive for E-mail file attachment prohibition. Normally, take this setting as default.
      When updating from a version before V13.0.0, select the E-mail file attachment prohibition under port monitoring mode before setting the same prohibition action as before V13.0.0.

      • Port Number for E-mail Attachment Prohibition: When port monitoring mode is selected, enter the port number used internally in the E-mail attachment prohibition processing.
        Specify a value from 5001 to 60000.
        The specified value cannot match the value of any of the settings below:
        - Used Port Number (for Receiving)
        - Used Port Number (for Sending)
        - Used Port Number (for Sending 2)
        - Port Number for E-mail Sending and Monitoring
        - Port Number for E-mail Attachment Prohibition
        - Port Number 2 for E-mail Attachment Prohibition

      • Port Number 2 for E-mail Attachment Prohibition: When port monitoring mode is selected, enter the port number used internally in the E-mail attachment prohibition processing.
        Specify a value from 5001 to 60000.
        The specified value cannot match the value of any of the settings below:
        - Used Port Number (for Receiving)
        - Used Port number (for Sending)
        - Used Port Number (for Sending 2)
        - Port Number for E-mail Sending and Monitoring
        - Port Number for E-mail Attachment Prohibition
        - Port Number 2 for E-mail Attachment Prohibition

    • V12.0L20 - V13.0.0 Compatible Mode: Select when using the prohibition function based on any mode before V13.0.0. In the version upgrade starting from the version before V13.0.0, it is only required to be specified when the same prohibition action is needed.

    Note

    Notes for setting E-mail attachment prohibition mode

    In Windows Vista(R), Windows(R) 7, Windows(R) 8 , Windows(R) 10 Windows Server(R) 2008, Windows Server(R) 2012 or Windows Server(R) 2016

    In Windows Vista(R), Windows(R) 7, Windows(R) 8, Windows(R) 10, Windows Server(R) 2008, Windows Server(R) 2012 or Windows Server(R) 2016, only port monitoring mode can be selected as the mode for E-mail file attachment prohibition.

    Confirm if Port is Not Used

    For port of E-mail attachment prohibition, specify the port not used in other processing or during communication.

  9. The "Creation Settings of File Exporting Utility Icon" window is displayed. Set whether to create the icon of file export utility and click the Next button.

    • Create in [Desktop]: Select when creating the file export utility icon.

    • Create in the [Send to] Menu: select when creating the file export utility icon in the Send to menu.

  10. When the "Enter the password" window is displayed, set the password for displaying the client status and modifying the utility, and click the Next button.

    The password set here is required when executing the uninstallation and maintenance commands of the client (CT). The conditions for contents to be entered are as follows:

    • Up to 32 bytes of single-byte alphanumeric characters as well as contents apart from the following symbols can be entered

    • The following symbols cannot be specified: & < > | \ " ~ ' ? : ^

    • Double-byte or single-byte space is not allowed.

    • Single-byte Kana are not allowed.

    Note

    Do not forget password

    This password is required when executing the uninstallation and maintenance commands of the client (CT). Pay attention to that if the password is forgotten, the uninstallation and maintenance commands will be unable to be executed.

    Verification when registering client (CT) devices

    When performing verification during client (CT) device registration, the password to be specified during installation must be the same as the client management password specified in the Terminal Operation Settings window of Management Console.

  11. The "The installation preparation is completed." window is displayed.

    When installation is started, click the Install button to start the installation.

    When it is expected to confirm or modify the setting, click the Return button to reset.

  12. After the processing has completed normally, the "Installation is completed." window will be displayed.

    It is necessary to restart the operating system to use the program. Select either of the following items and click the Finish button.

    • [Yes, restart the computer immediately.]

    • [No, restart the computer later.]

Note

During installation of the client (CT), only the background of the installer may be displayed continuously for several minutes.

It is normal for the installer processing to take time due to the device load or exclusive status, so do not forcibly terminate it. However, if a forced restart is performed, complete the installation by performing an overwrite installation.

2.6.1.2 Perform Silent Installation

Note

If a user whose user name contains fullwidth characters installs a client (CT), an error message may be displayed.

When installing a client (CT), use a user name that contains halfwidth characters only.

Create installation settings file

Create the installation settings file (InstConf.ini) to be used in a silent installation of the client (CT) using the Sever Setting Tool.

In addition, this procedure should be followed when performing silent installation if version upgrade is performed using the self version management function.

The creation procedure is as follows:

  1. Select Start > Systemwalker Desktop Keeper > Server > Sever settings tool or Apps > Systemwalker Desktop Keeper > Sever settings tool, and log on.

  2. Click the Create CT Silent Installation Files button.

    The following window will be displayed.

  3. Enter the following information and click the Start to output button.

    Setting Item

    Value

    Server IP address or server name(CT Management Server)

    IP address or server name of the Management Server or Master Management Server that you will connect to.

    • If a server name is specified:

      • Specify up to 15 halfwidth characters.

      • It can contain halfwidth alphanumeric characters (A-Z, a-z, 0-9) and halfwidth hyphens (-).

      • It cannot contain only numbers.

    • If an IPv4 address is specified:

      • Specify up to 15 halfwidth characters.

      • It can contain halfwidth numbers (0-9) and halfwidth periods (.).

      • A loopback address (127.0.0.1) cannot be specified.

    • If an IPv6 address is specified:

      • Specify up to 39 halfwidth characters.

      • It can contain halfwidth alphanumeric characters (A-F, a-f, 0-9) and halfwidth colons (:).

      • A loopback address (::1) cannot be specified.

    - Do not specify a link-local address, otherwise behavior is not guaranteed.

    Note: It is necessary to be able to resolve the host name of the Management Server or Master Management on each machine. Otherwise, communication will not be possible between the Management Server or Master Management Server and the client (CT).

    Server IP address or server name(backup Management Server)

    When the connected (Master) Management Server is abnormal, enter the IP address or server name of the backup Management Server for inquiring user policy.
    Under initial status, the same value as Server IP Address (CT Management Server) will be displayed. Modify if necessary.

    The function will be effective all the following conditions are satisfied.

    • The Management Server is in a 3-level structure

    • Users are managed collectively

    • The actions of the client (CT) are controlled by user policy

    If the conditions are not applicable, set the same value as Server IP Address (CT Management Server).

    If a server name is specified:

    • Specify up to 15 halfwidth characters.

    • It can contain halfwidth alphanumeric characters (A-Z, a-z, 0-9) and halfwidth hyphens (-).

    • It cannot contain only numbers cannot.

    If an IPv4 address is specified:

    • Specify up to 15 halfwidth characters can be entered.

    • It can contain halfwidth numbers (0-9) and halfwidth periods (.).

    • A loopback address (127.0.0.1) cannot be specified.

    If an IPv6 address is specified:

    • Specify up to 39 halfwidth characters.

    • It can contain halfwidth alphanumeric characters (A-F, a-f, 0-9) and halfwidth colons (:).

    • A loopback address (::1) cannot be specified.

    - Do not specify a link-local address, otherwise behavior is not guaranteed.

    Note: IPv6 addresses can be abbreviated using RFC 5952-compliant format.

    Note: It is necessary to be able to resolve the host name of the Management Server or Master Management on each machine. Otherwise, communication will not be possible between the Management Server or Master Management Server and the client (CT).

    Set port number

    Port number (for receiving)

    Enter the port number (for CT receiving) used for communication that uses the proprietary communication method (V15.1.1 or earlier communication method) between client (CT) and server service.
    Enter a value from 5001 to 60000.

    Port number (for sending)

    Enter the port number (for sending client (CT) logs or receiving policies) used for communication that uses the proprietary communication method (V15.1.1 or earlier communication method) between client (CT) and server service.
    Enter a value from 5001 to 60000.

    Port number (for sending 2)

    Enter the port number used (for registering the client (CT)) for communication that uses the proprietary communication method (V15.1.1 or earlier communication method) between client (CT) and server service.
    Enter a value from 5001 to 60000.

    Port number (for E-mail attachment prohibition)

    When E-mail Attachment Prohibited Function is selected as Port monitoring mode (Recommended), enter the port number used internally for E-mail attachment prohibition processing.

    When E-mail Attachment Prohibited Function is selected as V12.0L20 - V13.0.0 Compatible Mode, entering the port number is not required.
    Enter a value from 5001 to 60000.

    Port number (for E-mail attachment prohibition 2)

    When E-mail file attachment prohibition is selected as Port monitoring mode (Recommended), enter the port number used internally for E-mail attachment prohibition processing.

    When E-mail file attachment prohibition is selected as V12.0L20 - V13.0.0 Compatible Mode, entering the port number is not required.
    Enter a value from 5001 to 60000.

    Port number (for E-mail sending monitoring)

    Enter the port number for the E-mail sending monitoring.
    Enter a value from 0 to 65535.

    Password (first entry)

    Enter the password. Up to 32 bytes of single-byte alphanumeric characters as well as contents apart from the following symbols can be entered.
    The following symbols cannot be specified: & < > | \ " ~ ' ? : ^
    Multi-byte or single-byte space is not allowed.

    Note

    Do not forget password

    This password is required during the execution of uninstallation and maintenance commands of the client (CT). Be aware that if the password is forgotten, the uninstallation and maintenance commands will be unable to be executed.

    Verification when registering client (CT) devices

    When performing verification during client (CT) device registration, the password to be specified during installation must be the same as the client management password specified in the Terminal Operation Settings window of Management Console.

    Password (re-entry)

    In order to avoid incorrect registration, re-enter the password.

    Log output target folder

    Specify the folder under the Windows system disk as the folder to save the logs of the client (CT). When the OS is installed to the C Drive, the C Drive will become the system disk.

    The length of absolute path that can be specified is no more than 96 single-byte characters. However, the following symbols cannot be used as the folder name.
    The following symbols cannot be specified: \ / : * ? " < > |

    Environment variable can also be specified.
    Example: %ProgramFiles%

    Note

    • Because the log may be lost, do not specify the drive with the export prohibition in the saving target of log file.

    • Because program operation might be affected, do not perform compression or encryption setting in the saving target of log file.

    Reboot OS after specifying installation

    Specify to restart OS after installation.

    Display the reboot confirming window

    After installation has been implemented in the client (CT), the restart window will be displayed. This item is only effective when "Reboot by Force" is not selected. After "Reboot by Force" is selected, this button will be grayed out.

    When this item is selected, restart will be performed automatically after the installation has completed.
    Select either one from "Yes, restart the computer immediately.", or "No, restart the computer later".

    If no item is selected, nothing will be displayed after the installation has completed. Whether to restart will be determined according to the Restart by Force setting of the following items.

    Force to reboot (It is valid only when the reboot confirming window is not displayed)

    Select to restart by force after the installation of client (CT). The item is only effective when "Display Restart Confirmation Window" is not selected. If "Display Restart Confirmation Window" is selected, the button will be grayed out.

    When this item has been selected, restart will be executed automatically after the installation has completed. When file is opened, the content will not be saved but directly completed, pay attention to that content might be lost.

    If it is not selected, processing will be completed after the installation has completed. If "Display Restart Confirmation Window" is not selected, the restart confirmation window will not be displayed, and restart will not be executed automatically. Instead, user has to restart manually.

    Installation target of client

    Specify the path of the client (CT) installation folder.

    The absolute path length that can be specified is no more than 255 single-byte characters. However, the following symbols cannot be specified in the file name: \ / : * ? " < > |

    Environment variable can also be specified.
    For example: %ProgramFiles%

    Note

    Exclude the compressed and encrypted targets

    Because the operation of program might be affected, do not enable compression or encryption settings in the client installation target.

    Printing monitoring mode

    Specify the monitoring mode of printing.

    Monitor printing of all printers set in the terminal (recommended):

    Specify when the printing operation log is selected at each client (CT). In this case, the printing operation log will be collected in each client (CT).

    Monitor printing of local printer only:

    Printing operation in the client (CT) that is in the same Management Server/Master Management Server as the printer server will be selected through the printer server. The client (CT) should also be installed on the printer server. In this case, the printing operation log cannot be collected through the client (CT) that is not the one of printer server. The printing operation log will be collected through the printer server.

    Note

    • Unify the printing monitoring mode in the client (CT) under the Management Server/Master Management Server. If unification is not achieved, printing operation logs may not be collected

    • If the OS that is not of server type (Windows Server(R) 2008, Windows Server(R) 2012 or Windows Server(R) 2016) is used as the printer server, and the setting is Monitoring the Printing of All Printers Set in this Terminal (Recommended), the printer server cannot connect with more than 10 clients for printing. At this time, set to Monitoring the Printing of Local Printer Only.

    E-mail attachment prohibition

    Specify the E-mail attachment prohibited function.

    Port monitoring mode (recommended):

    Port monitoring mode based on drivers. This setting is specified as default.

    V12.0L20~V13.0.0 compatible mode

    It is the E-mail attachment prohibition mode in the previous version. When the version is updated, the setting should be performed when the prohibition is the same as the previous version.

    Apply policy immediately after logging on Windows

    Specify whether to apply user policy immediately after logon.

    User policy (under Windows Vista(R), Windows(R) 7, Windows(R) 8 , Windows(R) 10, Windows Server(R) 2008, Windows Server(R) 2012 or Windows Server(R) 2016 only)

    Apply user policy immediately after logon. (Initial value)

    It is always as CT policy (V12.0L20~V13.2.0 compatible format)

    Run with CT policy after logon.

    Set the creation of File Export Tool icon

    Specify whether to create icons of File Export Utility.

    Create on the [Desktop]

    Select when File Export Utility icons are created on desktop.

    Create in the [Send to] menu

    Select when File Export Utility icons are created in the Send to menu.

    Installation settings file

    Specify the saving target of silent installation setting file (InstConf.ini). The specification method is as follows:

    • Enter file name with absolute path. Enter the path of silent installation setting file with absolute path.

    • Select through the View button.
      The Save As window will be displayed. Select the folder to save silent installation setting file, and click the Save button after entering the file name.

    The absolute path length that can be specified is no more than 96 single-byte characters. The following symbols cannot be specified: \ / : * ? " < > |

Point

Register user ID on printer server

When "Monitoring the printing of local printer only" is selected and the client (CT) is installed on the printer server, it is also necessary to register the user ID used in the printing client (CT) on the printer server. If it is not registered, the user ID for printing logs will be output as follows:

  • When only setting user authority to the user ID being used in the printing client (CT), User ID of log will be collected as Guest.

  • When it is required to log in printer server and register as Administrator at the time of printing, User ID of log will be collected as Administrator.

Perform silent installation

Before installation, refer to "Port Number List" in Reference Manual to confirm the port number being used.

When silent installation of a client (CT) is performed on a PC that has a CT installed, installation by overwriting will be performed. In this case, modify the IP address, port number and log saving target directory. In addition, even if the password used in initial installation is specified to be modified, the password will not be changed.

  1. Logon to the PC as a user who belongs to the Administrators group of local computer or a user that belongs to the Domain Admins group of domain. When other applications are being used, close them.

  2. Insert the setup disk into the drive.
    Copy the silent installation settings file (InstConf.ini) for client (CT) created according to "Create installation settings file" to any drive or folder.

  3. Select Run or start the command prompt.

  4. Execute installation command (Setup.exe). The installation command is in the "win32\DTKClient" folder of setup disk.

    • Options are not case-sensitive.

    • If no option is specified, error message will be displayed and installation will be terminated.

    Specification Example

    Assume the following conditions.

    • Setup disk is inserted into D Drive.

    • The Setup.exe command is under D:\win32\DTKClient.

    • Installation settings file is in C:\Dtk.

      D:\win32\DTKClient\Setup.exe /Silent "C:\Dtk\InstConf.ini"

    Note

    When executing the command in Windows Vista(R), Windows(R) 7, Windows(R) 8 , Windows(R) 10, Windows Server(R) 2008, Windows Server(R) 2012, or Windows Server(R) 2016, execute this command in the command prompt run by the administrator.

    After the installation has completed, the CT silent installation file is generated and specified as "Display Dialog" and the window prompting restart of the operating system will be displayed.

    The window prompting restart of the operating system will be displayed.
    Then, select one of the following items and click the Finish button.
    [Yes, restart the computer immediately.]: select to restart immediately.
    [No, restart the computer later.]: select to restart later.