Documentation Searchable NetSafe Administrator

NetSafe (Recommended Reports) 100-0001-00

 

1.0 Introduction

This document is used for the following Interbit Data products, NetSafe Administrator. This document lists some (Recommended Report) examples that are sent to NetSafe for the purpose of having the reports available during a downtime.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the different types of reports that are sent to NetSafe. This document also references how specific reports can be separated, processed, and delivered to specific workstations located throughout the hospital.

2.0 Overview

NetSafe:

  • Receives reports
  • Separates reports by patient
  • Converts reports to .PDF format
  • Encrypts reports
  • Distributes reports to workstations throughout the hospital

The reports will be available during down time. NetSafe receives most report types. The list below are the most common report types sent to NetSafe.

  • EMAR (Electronic Medication Administration Record)
  • MAR (Medication Administration Record)
  • LAB Summary Report
  • MPI (Master Patient Index)
  • Nursing Rounds Report
  • Physician Rounds Report
  • KARDEX
  • Patient Profile
  • Surgical Case List
  • Alpha Census
  • Location Census
  • Dietary Report

3.0 NetSafe Administrator, Batch Reports

Certain reports will print as a single file for an individual patient, while others will print as a batch-file, that contains multiple patients. The user will need to determine if these batch-reports are separated by patient or location.

  • If a report is separated by patient, each patient will have a separate report that could be delivered to the workstation that is in the unit housing the patient
  • If a report is separated by location, each location will have a separate file that only contains patients for that location. Those reports can then be delivered to the workstations that are mapped to those locations
  • Reports for the ICU location can be delivered to the workstation in the ICU. Reports for the 2West location can be delivered to the workstation in 2West

Note: In the example report below the location is different between the two reports.

“CLINIC A” vs “CLINIC B”. 

Screenshot 3-0 Batch Report

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

4.0 NetSafe Administrator, Separating Reports

Certain reports may not need to be separated. These reports are typically not separated for a couple of reasons. 

  • The first reason: It is not possible to separate the report by patient or location
  • An example of a report that cannot be separated by patient or location is the Alpha Census
  • The second reason: The report is better presented, as a whole document, without being broken out by patient or location
  • An example of this may be the LAB Summary, which is delivered to a downtime workstation in the LAB

5.0 Notes

  • Reports can only be separated at the end of a page.
  • NetSafe is unable to break a report in the middle of a page
  • NetSafe needs a standard criterion to separate reports like the patient’s name, patient’s account number, location, etc
  • NetSafe also uses anchor END OF REPORT as an example
  • NetSafe is unable to remove or add information to a report
  • The names of the reports mentioned in the first section of this document refers to commonly used Meditech reports
  • Similar reports may exist in other HCIS systems, their names may differ
  • The reports listed in the first section of this document are commonly used by many NetSafe customers
  • Customers are not limited to just this list of reports
  • NetSafe can process most documents that can be printed to the application

6.0 Considerations

Customer Sites can choose to separate or not separate a specific report.

  • Separated reports can be delivered to certain workstations
  • Not separated versions of the same report can be delivered to other workstations

An example of this is the MAR report

  • An MAR report that is separated by patient can be delivered to workstations out on the floors
  • A non-separated version of the MAR can be delivered to a workstation in the pharmacy

7.0 References

Section 6.0 “Report Templates” in 100-0201-00 NetSafe Administrator Manual.

 

NetSafe (E-mail Notification) 100-0002-00

 

1.0 Introduction

This document is used for the following Interbit Data products, NetSafe. This explains the topic of E-Mail Notification.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of setting up E-mail Notifications within NetSafe Administrator.

2.0 Overview

NetSafe is a business continuance solution. It is important that NetSafe can continuously process reports without interruption. This helps insure that if a downtime does occur, workstations throughout the hospital will have the most up-to-date information available for their staff.

One-way NetSafe’s up-time can be guaranteed, is by setting up E-mail Notifications. E-mail Notifications let the NetSafe administrators know if a report was not able to process through the application correctly.

3.0 NetSafe Administrator, System Settings        

To setup E-mail Notifications a connection to the hospital’s (SMTP) Simple Mail Transfer Protocol server needs to be configured. This is done under the System Settings menu, E-mail sub-menu.

Screenshot 3-0 NetSafe E-mail Notification Dialog

Table 3-0 Fields

Field Description
SMTP Server The name of the server from which E-mails are sent.
Server TCP port The port used for E-mail.
Set Default TCP Port Resets the Server TCP Port.
Connection Encryption Type Displays the encryption methodology.
User Names The name of the account used for sending E-mail.
Password The password of the account used for sending E-mail (should be greater than four characters).
Display Password The method for displaying the password on this menu; toggle between the stored alphanumeric characters and *.
Return Name The name that displays in the From: field of all E-mails sent by NetSafe.
Return Address The e-mail address of the account used to send E-mails from NetSafe. This address displays in the From: field of all E-mails sent by NetSafe.
Subject NetSafe does not use this field.
E-mail Body NetSafe does not use this field.

4.0 NetSafe Administrator, E-mail Notification

After setting up the SMTP settings, the next step is to enable different E-mail alerts. Enabling different E-mail alerts is done under the E-mail Notifications menu in the Settings list. The E-mail Notification Dialog is displayed.

This Dialog lists all the queues alert notifications that can be set up. This list of queues is a subset of the queues within NetSafe. The different alerts, that are available within NetSafe, represent different NetSafe queues. Queues correspond to different stages that a report is in while it is processing through NetSafe.

Screenshot 4-0 NetSafe E-mail Notification Dialog

Table 4-0 E-mail Notification Alerts

LPD Queue — Pending

Send alert for no new jobs in queue for:

An e-mail alert is created when the amount of time between the current time and the last time that the LPD agent processed a report exceeds the specified time frame. The subject for this e-mail reads:

LPD Queue: Send Alert for jobs that cannot be delivered that are older than n day, n hour, n minute.

Possible reasons the LPD agent has not processed a report within the specified time frame are that the HCIS has been disrupted, or the LPD agent has stopped responding.

The alert works by subtracting the time when the last report was processed from the current time.

LPD Queue — Pending

Send alert for jobs that cannot be delivered that are older than:

An e-mail alert is created informing the recipient that there is a downloaded report in LPD Queue — Pending that cannot be processed by the processing agent. The alert is generated when the report has been in the queue longer than the amount of time specified in the alert’s setup.

The subject for this e-mail reads:

LPD Queue: Send Alert for no new jobs in queue n day, n hour, n minute.

A possible reason that a report cannot be processed is that there is a problem with the distribution template that processed the report. For example, the template might be set up incorrectly and cannot locate the required text on the report.

The alert works by subtracting the submit time for the downloaded report from the current time.

Relay Queue — Completed

Send alert for no new jobs in queue for:

An e-mail alert is created that informs the recipient that a report has not been submitted to the Relay Queue — Completed when the amount of time between the current time and the last time a report was submitted to the queue exceeds the amount of time specified in the alerts setup.

The subject for this e-mail reads:

Relay Queue – Completed: Send Alert for no new jobs for n day, n hour, n minute.

Possible reasons the Relay Queue — Completed has not processed a report within the specified time frame are that communication between the Relay agent and the processes sending reports to Relay Queue — Pending has been disrupted, or the Relay agent has stopped responding.

The alert works by subtracting the time when the last report was submitted to the queue from the current time.

Relay Queue — Error

Send alert for jobs in queue older than:

An e-mail alert is created that informs the recipient that a report has been in Relay Queue — Error longer than the amount of time specified in the alert’s setup.

The subject for this e-mail reads:

Relay Queue – Error: Send Alert for entries older than n day, n hour, n minutes.

Possible reasons for entries to be in the Relay Queue — Pending include:

  • When a windows folder location is unavailable, and the alternate delivery folder is enabled, entries will be moved from the Relay Queue — Pending to this database
  • There was a problem processing the report where the report was deleted (this is a very rare occurrence). The alert works by subtracting the time when the last report was submitted to the queue from the current time

Relay Queue — Pending

Send alert for jobs that cannot be delivered for:

An e-mail alert is created that informs the recipient that there is a downloaded report in Relay Queue — Pending that has not been processed by the processing agent within the specified amount of time. The alert is generated when the report has been in the queue longer than the amount of time specified in the alert’s setup.

The subject for this e-mail reads:

Relay Queue – Pending: Send Alert for jobs that cannot be delivered for n day, n hour, n minute.

The alert works by subtracting the time that the report was submitted to the queue from the current time.

Relay Queue — Pending

Send alert when the CheckSum Hash values do not match for the delivered database.

An e-mail alert is created that informs the recipient that an encrypted database was delivered but the hash values of the source and destination file did not match. There have been cases in the past where zero-byte files have been delivered to a destination folder. This alert is designed to catch those occurrences and notify the corresponding email recipient about the issue.

If the hash values do not match, an entry is placed into a table that the alert agent monitors. Once an entry is found, the information is sent to the email recipient.

Note: Only the email frequency is used in this alert as the days, hours, and minutes have no effect on this email alert.

Unknown Location

An e-mail alert is created that informs the recipient that there is a report in Unknown Location. The alert is generated when the report has been in Unknown Location longer than the amount of time specified in the alert’s setup. The subject for this e-mail reads:

Unknown Handler: Send Alert for entries older than n day, n hour, n minute.

The reason that a report is in Unknown Location is that when a report is processed using a report distribution template, a location mnemonic or alias for the intended location could not be found in the Location Mnemonics.

The alert works by subtracting the time that the report was submitted to Unknown Location from the current time.

Table13

5.0 Typical alert times

Most hospitals will configure alerts, so they receive a notification soon after a problem arises; but not so frequently that they get inundated with alerts.

Example: If a report is expected to come in to the NetSafe LPD Queue every hour the initial alert may be set to one hour and fifteen-minutes.

There is a fifteen-minute window for the LPD issue to get addressed before an alert is triggered. The same facility may choose to set the delay to two-hours, so they are not getting inundated with alert reminders while they work on fixing the original LPD issue.

6.0 Notes

Not all E-mail alerts need to be enabled. Some alerts may be redundant if other alerts are enabled.

7.0 Considerations

The NetSafe server must be able to communicate to the hospitals SMTP server to send alerts.

8.0 Troubleshooting

Some common troubleshooting tips; if E-mail alerts are not working.

  1. Check to make sure the SMTP port is open.
  2. Check if authentication to the SMTP server is required. If it is, check to make sure the authentication is correct.
  3. Adjusting alert times to trigger a test.

9.0 References

Reference section 13.0 E-mail Notification” in 100-0253-00 NetSafe Administrator Manual.

 

NetSafe (Distribution Group Configuration) 100-0003-00

 

1.0 Introduction

This document is used for the following Interbit Data products, NetSafe. This explains the topic of Distribution Group Configuration.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of how Distribution Group Configuration works within NetSafe Administrator.

2.0 Overview

Distribution Groups are used in cases where a report needs to be sent to multiple locations. Here are two examples.

The ICU has multiple workstations that need to receive a copy of a report. An ICU Distribution Group would need to be setup. The ICU Distribution Group encompasses all the workstations within that unit, that should be receiving NetSafe reports.

The Alpha Census might need to be sent to multiple units. In this case, a Distribution Group would need to be setup, including the locations that the Alpha Census needs to be sent to.

3.0 NetSafe Administrator, Folder Location

Prior to setting up Distribution Groups the NetSafe folder location would need to be setup. The Folder Locations will compromise locations that are then added to Distribution Groups.

Reference section 4.6.1 “Windows Folder Locations” in 100-0201-00 NetSafe Administrators Manual.

4.0 NetSafe Administrator, Distribution Groups

Distribution Groups are built under the Location Mnemonic menu.

To create a Distribution Group:

  1. Navigate the cursor to the Location Mnemonic menu.
  2. Click on the Add button.

Screenshot 4-0 Distribution Groups

5.0 NetSafe Administrator, Distribution List

  1. Select Distribution List from the Location Delivery Type drop down.

Screenshot 5-0 Distribution List

6.0 NetSafe Administrator, Location Mnemonic

Location Mnemonic Main Settings Elements

Table 6-0 Location Mnemonic

Element

Description

Disable Location Mnemonic

Indicates whether the location mnemonic is enabled or disabled.

Location Delivery Type

Specifies the type of location mnemonic being defined.

Location Mnemonic

The unique name that identifies the location mnemonic within NetSafe.

Location Description

A short statement or explanation about the role of this location mnemonic.

Organization

The name of the organization/department to which the location mnemonic distributes the reports.

Creation Date

Displays the date and time that the location mnemonic was created.

Last Updated Date

Displays the date and time that the location mnemonic was last updated.

Last Updated By

Displays the name of the NetSafe Administrator account that was last used to update the location mnemonic.

6.1 NetSafe Administrator, Three Location Delivery types

Table 6-1 Three Location Delivery types

Location Delivery Type 1

Windows folder location

Location Delivery Type 2

Distribution List

Location Delivery Type 3

NULL Delivery

7.0 NetSafe Administrator, Distribution List

  1. Navigate the cursor to the Distribution List menu.
  2. Click the Add button to add Folder Locations to the Distribution List.

Note: These are the folder locations that the distribution list will forward reports to.

Screenshot 7-0 Folder Location

7.1 NetSafe Administrator, Unit Location

If this distribution list represents a unit location, for instance, ICU, ED, 2West, etc. Consisting of multiple PC workstations then the distribution list will need to have an alias assigned to it.

  1. Navigate the cursor to the Alias menu.
  2. Click the Add button and assign and enter the relevant information.

Note: A location could have multiple aliases.

Screenshot 7-1 Aliases

8.0 NetSafe Administrator, Distribution List Group

If the Distribution Group consists of a general group of PC workstations that need to receive all instances of a specific report. The Distribution Group will need to be assigned to a Report Template.

  1. Navigate the cursor to the Report Template menu.
  2. Select the template that you wish to send to the Distribution Group.
  3. Click the Edit button.

Screenshot 8-0 Distribution List

9.0 NetSafe Administrator, Report Location

Select the Report Location Destinations menu after navigating to the Add or Edit button.

  1. Click the (Copy All Reports to Default Locations Mnemonics) check box.
  2. Click on the “…” button next to the text field.
  3. Select the Distribution Group that should receive all copies of this report.

Screenshot 9-0 Distribution List

10.0 References

Reference section 4.6.1 “Windows Folder Locations” in 100-0201-00 NetSafe Administrators Manual.

 

NetSafe (Active Directory) 100-0004-00

 

1.0 Introduction

This document is used for the following Interbit Data products, NetSafe. This explains the topic of Active Directory.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of how to set up an Active Directory within NetSafe Administrator.

2.0 Overview

Default settings in NetSafe Client versions 1.0.6.5 and earlier require users to enter a password to log into the client.

As of version 1.1.1.n, NetSafe allows for the use of Active Directory accounts for logging into a NetSafe Client. The Active Directory settings allow you to specify, enable, and disable Active Directories and Security Groups.

Common Question: The Active Directory settings found under the System Settings menu are global. Workstation specific settings can be setup under the Location Mnemonic menu. The location specific settings will override the global settings. 

Note: If it is your intent to implement NetSafe Web Client, Active Directory must be enabled. NetSafe Web Client is only accessible by entering Active Directory login credentials.

Reference: 100-0200-00 NetSafe Administrator Manual 1.6.1.n

Note: To verify the version of NetSafe Administrator you are running:

  1. Navigate to the NetSafe Administrator Login window.
  2. Reference the version number highlighted.

Screenshot 1-0 Login NetSafe Administrator

3.0 NetSafe Administrator, Active Directory

1.0 Navigate to the System Settings, setting.

Note: This is accessed within NetSafe Administrator.

Screenshot 2-0 NetSafe Administrator, System Settings

3.1 NetSafe Administrator, Active Directory

1.0 Navigate to the Active Directory, setting.

Screenshot 3-0 NetSafe Administrator, Active Directory

4.0 NetSafe Administrator, Active Directory table

The following table lists and describes the Active Directory setting parameters.

Active Directory Setting parameters.

Table 4-0 Active Directory Table

Element

Description

Delivery Active Directory Enabled Client

Determines whether the Active Directory enabled NetSafe Client is delivered to the Location Mnemonic’s Windows folder location.

When selected, NetSafe downloads the latest version of the Active Directory enabled NetSafe Client along with the processed reports, if the latest version has not already been downloaded. Until the checkbox is selected, the traditional NetSafe Client login dialog box is used.

Domains; Disabled

Lists all the domains available on the network, but which have not been enabled for use when logging into a NetSafe Client.

> >

< <

Moves highlighted domain name(s) between the Domains’ Disabled and Enabled lists.

Domains; Enabled

Lists all domains that have been enabled for use when logging into a NetSafe Client.

Default Domain

The Active Directory domain that is automatically used when logging into NetSafe Client, if a domain name is not included in User Name.

If only one entry is included in the Domains’ Enabled list, that entry is automatically entered in this text entry box. If more than one entry is included in the Domains’ Enabled list, the first entry in the list is automatically entered in this text entry box. Change the entry by selecting another domain from the drop-down list.

Security Groups; Disabled

Lists all security groups that are included in the Domains’ Enabled list, but have not been enabled for use when logging into a NetSafe Client.

> >

< <

Moves highlighted security group(s) between the Security Groups’ Disabled and Enabled lists.

Security Groups; Enabled

Lists all security groups that have been enabled for use when logging into a NetSafe Client.

Setup AD

Sets up all Active Directories, moves Active Directories to the Domains’ Enabled list. The first time NetSafe starts, the Active Directory database is empty.

NetSafe Clients Relay Queue

When you select the Update NetSafe Client button, that pushes out AD encrypted DB into the relay queue pending.

Refresh

Gets the current Active Directory database on the server and displays the contents of the database.

4.1 NetSafe Administrator, Active Directory

To enable Active Directory integration:

1.0 Select the, Deliver Active Directory Enabled Client check box.

Screenshot 4-0 NetSafe Administrator, Deliver Active Directory Enabled Client

4.2 NetSafe Administrator, Domains

Domains that should be granted access to the NetSafe Client will need to be moved from the Disabled table to the Enabled table.

Screenshot 5-0 NetSafe Administrator, Domains

4.3 NetSafe Administrator, Active Directory

Move any security groups which should have access to log into the NetSafe Clients, over to the Enabled table. If the Security Group Enabled table is left blank, then all security groups have access to log into the NetSafe Clients.

Screenshot 6-0 NetSafe Administrator, Active Directory

4.4 NetSafe Administrator, Setup Active Directory

1.0 Select the, Setup AD icon, to obtain a list of available Domains.

Screenshot 7-0 NetSafe Administrator, Setup AD

Note: The application might go unresponsive, after pressing the button as the application loads all the data from the active directory in to the database.

4.5 NetSafe Administrator, Active Directory

1.0 Select the, Setup Credentials

Screenshot 8-0 NetSafe Administrator, Active Directory

4.6 NetSafe Administrator, Active Directory

1.0 Verify the, Ldap Credentials window pops up.

Screenshot 9-0 NetSafe Administrator, Active Directory

5.0 NetSafe Client, Login Domains

If there are multiple Domains, a Default Domain will need to be selected.

Users in the Default Domain will not need to enter a Domain when logging into the NetSafe Client. 

Users not being logged into the Default Domain will need to enter in a Domain name as part of their login.

Screenshot 10-0 NetSafe Client, Login

6.0 NetSafe Administrator, Active Directory Global vs. Location Specific Settings

The Active Directory settings found under the System Settings menu are global. 

Workstation specific settings can be setup under the Location Mnemonic menu. 

The location specific settings will override the global settings. 

An example of this is the pharmacy workstation. A hospital may wish to only grant access to users in the pharmacy security group, to log into the NetSafe Client at the pharmacy workstation.

To set up location specific Active Directory access:

1.0 Navigate to the Location Mnemonic menu.

2.0 Add a new location or select an existing location

3.0 Click the Edit button.

Screenshot 11-0 NetSafe Administrator, Active Directory

7.0 NetSafe Administrator, Settings up Active Directory for a specific location

Within the System Settings:

1.0 Navigate to the Active Directory menu.

2.0 Enable the “Use These Active Directory Settings” check box.

3.0 Choose which Domains should have access to the specific location being edited.

4.0 Move the chosen Domains to the Enabled table.

5.0 Choose which Security Groups should have access to the specific location being edited.

6.0 Move the chosen Security Groups to the Enabled table.

7.0 Save the settings.

Screenshot 12-0 NetSafe Administrator, Active Directory

8.0 NetSafe Administrator, Active Directory Settings (Setup and Use)

To log into a NetSafe Client, users are required to enter a user name and password. As of version 1.1.1.n, NetSafe allows the use of Active Directory accounts for logging into a NetSafe Client. The Active Directory settings allows you to specify, enable, and disable Active Directories and Security Groups.

Active Directory settings can be defined either globally, for all location mnemonics, or for an individual location mnemonic. This section describes the elements for specifying Active Directory settings for an individual location mnemonic. To specify the Active Directory settings for all location mnemonics,

Reference section 7.11 “Active Directory Settings” in 100-0201-00 NetSafe Administrator Manual.

Screenshot 13-0 NetSafe Administrator, Location Mnemonics, Active Directory Settings

The following table lists and describes the Active Directory settings. 

Table 2-0 NetSafe Administrator, Location Mnemonic Active Directory Settings Elements

Element

Description

Use These Active Directory Settings

Determines whether the Active Directory settings specified for this location mnemonic are used for logging into NetSafe Client.

When selected, NetSafe downloads these settings, along with processed reports. If the latest version of the NetSafe Client has not already been downloaded, that is downloaded along with the report.

Note: Active Directory settings for an individual location mnemonic are only downloaded if the Deliver Active Directory Enabled Client checkbox on the System Settings Active Directory dialog box is selected;

Reference section 7.11 “Active Directory Settings” in 100-0201-00 NetSafe Administrator Manual.

The Active Directory elements are inaccessible if the Use These Active Directory Settings checkbox is clear.

Domains; Disabled

Lists all the domains available when logging into a NetSafe Client on the network but have not been enabled for use.

> >

< <

Moves highlighted domain name(s) between the Domains’ Disabled and Enabled lists.

Domains; Enabled

Lists all the domains that have been enabled for use when logging into a NetSafe Client.

Note: If this list is empty, there are no entries in the Security Groups’ Disabled and Enabled lists.

Security Groups; Disabled

Lists all of the security groups that are included in the Domains’ Enabled list but have not been enabled for use when logging into a NetSafe Client.

> >

< <

Moves highlighted security group(s) between the Security Groups’ Disabled and Enabled lists.

Security Groups; Enabled

Lists all the security groups that have been enabled for use when logging into a NetSafe Client. Caution: Users not included in this list are unable to log into a NetSafe Client.

Save

Saves the specified Active Directory settings. NetSafe creates a job in Relay Queue — Pending that downloads the NetSafe Client login database. The amount of time it takes to download the new settings depends on the number of jobs in the queue.

9.0 NetSafe Administrator, Configuring Active Directory Settings

The Active Directory settings allow you to specify which users can log into a NetSafe Client.

To configure Active Directory settings, perform the following steps

Table 3-0 NetSafe Administrator, Configure Active Directory Settings

Step

Action

1.

Click Active Directory.

The features for specifying which users can log into NetSafe Clients display.

2.

Click Deliver Active Directory Enabled Client.

The Domains’ Disabled list populates.

3.

Highlight those domains that you want to enable for NetSafe Client login.

4.

Click > >

  • The highlighted domains are moved to the Enabled list
  • The security groups associated with the Domains’ Enabled list are added to the Security Groups’ Disabled list

5.

Determine whether the entry in the Default Domain text entry box is the domain you want used as the default when logging in to NetSafe Client:

  • If yes, go to Step 6
  • If not the first time, go to Step 7

6.

From the Default Domain drop-down list, select the domain you want used as the default when logging into NetSafe Client.

Note: It is recommended that the default domain be the domain containing the most Active Directory accounts that will be logging into NetSafe Client.

7.

Highlight those security groups that you want to enable for NetSafe Client login.

8.

Click > > 

The highlighted security groups are moved to the Enabled list.

9.

Determine whether this is the first time that Active Directory has been set up for this NetSafe installation.

  • If the first time, go to Step 10
  • If not the first time, go to Step 11

Note: If you are unsure whether Active Directory has been previously set up, go to Step 10.

10.

Click Setup AD.

  • The Active Directory database with all data, domains, and security groups is set up
  • The contents of the database are moved to the NetSafe Administrator
  • The fields on the Active Directory Settings dialog box are populated

11.

Click Update NetSafe Clients.

A job is sent to Relay Queue — Pending. This job will update all NetSafe Clients with the currently specified Active Directory information.

12.

Click Save System Settings.

Caution: Once Deliver Active Directory Enabled Client has been selected and saved using the Save System Settings button, it cannot be undone. From that point onward, the Active Directory enabled NetSafe Client is used for all NetSafe Clients.

10.0 Notes

Location specific Active Directory settings will take precedent over the Global System Settings Active Directory settings.

Users, that will be using the NetSafe Client will need to be added to Active Directory Security Groups. Security Groups that have been enabled within the NetSafe Administrator will allow those users to access the NetSafe Client.

11.0 NetSafe Administrator, Troubleshooting

If you have any problems with active directory login:

1.0 Select the, Update NetSafe Clients icon.

Screenshot 14-0 NetSafe Administrator, Update NetSafe Clients

 

NetSafe (Orders of Operation) 100-0006-00

 

1.0 Introduction

This document is used for the following Interbit Data products, NetSafe Administrator. This explains the topic of . This document details the flow of reports as reports are sent from a Healthcare Information System (HCIS) to the NetSafe Administrator software application. Then to the remote workstations in the hospital where the report resides in case of downtime.

The NetSafe Administrator software application receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the reports a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Orders of Operation within NetSafe Administrator.

2.0 Overview

This document is designed to be used for troubleshooting issues that may arise if a report becomes stuck in the process.

3.0 NetSafe Administrator, Orders of Operation

Diagram 3-0 Orders of Operation

Step1: Reports sent as spool jobs.

Step 2: Reports sent as .PRN files.

Step 4: Reports sent as encrypted .PDF files

Step 5: Client executable pushed to downtime PC’s.

Step 6: Reports sent as encrypted .PDF files via the browser.

Note: The steps 1-6 above are explained in more detail in the sections below.

4.0 NetSafe Administrator, HCIS

Diagram 4-0 HCIS Print

HCIS -> Virtual Printer/Remote Printer

HCIS reports may be sent to different types of printers, which then route the reports to NetSafe.

Example: Meditech Magic will utilize Remote Printers built in OPS to deliver reports to NetSafe.

Meditech C/S, 6.x and Expanse will utilize Windows virtual printers that could be built on a Meditech print server or a background job server to deliver the reports. Other HCIS’s will use Windows virtual printers, that may also be setup on a print server or defined elsewhere.

5.0 NetSafe Administrator, Virtual Printer Remote

Diagram 5-0 Virtual Printer Remote

                    

Virtual Printer/Remote Printer -> NetSafe Server -> LPD Queue – Pending

The Remote Printers and or Windows virtual printers will send reports over to the NetSafe server through the LPD port, which is port 515. 

Note: In addition to port 515, NetSafe can listen on other TCP ports.

6.0 NetSafe Administrator, LPD Queue Pending

Diagram 6-0 Queue Pending

LPD Queue – Pending  >LPD Queue Processed
                                         >LPD Queue Error

The report is received by the Interbit LPD Agent service, within the NetSafe
Administrator. The report appears under the LPD Queue Pending database. From the LPD Queue Pending database the report is taken by the Interbit Processing Agent service, and it is processed through a report template.

If the report runs into any errors while processing through the template. The report is moved in to the LPD Queue Error database.

If the report does not run into any errors while processing through the template, the report is moved to the LPD Queue – Processed database.

7.0 NetSafe Administrator, LPD Queue Processed

Diagram 7-0 Queue Processed

LPD Queue – Processed ->Relay Queue – Pending

                                          ->Unknown Location Logs

After the report has processed through a template successfully, it is sent to the Relay Queue – Pending database. The report is taken up by the Interbit Relay Agent service.

If the report is processed through the template successfully; but NetSafe cannot identify which location it should be sent to, the report is then moved to the Unknown Location Logs.

8.0 NetSafe Administrator, Relay Queue Pending

Diagram 8-0 Queue Pending

Relay Queue – Pending -> Relay Queue – Completed

                                          -> Relay Queue – Error

The Interbit Relay Agent service will attempt to deliver the report to its intended destination. 

If the report was delivered successfully to the destination workstation, then it is moved to the Relay Queue – Completed database.

If the report was not delivered successfully to the destination workstation, then it could remain in the Relay Queue – Pending database and try to send again after a 10-minute delay or it could be moved to the Relay Queue – Error database. 

A report that fails to be delivered may also be sent to an Alternate Delivery Folder. Which action is taken will depend on the Alternate Delivery Folder settings, found under System Settings -> Relay Agent.

Screenshot 8-0 Relay Agent

9.0 NetSafe Administrator, Relay Queue Completed

Diagram 9-0 Queue Pending

Relay Queue – Completed -> Downtime Workstation (Windows Folder)

Reports that are in the Relay Queue – Completed database have been delivered by the Interbit Relay Agent service to the destination workstation. 

These reports are sent over as PDF documents. The Reports are encrypted using 256- bit AES (advanced encryption standard). 

If a NetSafe Client is not present at the destination location, the Interbit Relay Agent service will send a copy of the client, to the folder as well. 

10.0 Downtime

Downtime Workstation (Windows Folder) -> NetSafe Client

Reports are now located on the downtime workstation. End users may interact with the reports by opening the NetSafe Client application, which allows them to decrypt the reports, view or print them.

11.0 Notes

E-mail alerts may be setup to monitor the flow of information through the different databases which are described above. E-mail alerts can then be sent if a report fails to progress through one of these steps. 

See NetSafe Guide E-mail Alert Notification

12.0 References

The NetSafe Administrator Manual 100-0200-00

The NetSafe Guide E-mail Alert Notification

 

NetSafe (Filename Templates) 100-0007-00

 

1.0 Overview

This document is used for the following Interbit Data products, NetSafe. This explains the topic of NetSafe Filename Templates.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of NetSafe Filename Templates.

2.0 Introduction

Once a report is identified and separated from a batch report, you need to give it a filename. Unseparated reports also need a filename. Using the features in the Filename Template Dialog, specify the filename assigned to a report.

The filename can be either:

  • A static text string
  • A name that is created from text captured from the report
  • A combination of both

Filenames are used in several places within NetSafe. Filenames can be used to:

  • Track reports within the NetSafe Administrator application, to see if a report has been processed or delivered

Filenames appear in E-mail alerts, letting administrators know which reports are having problems. Filenames are how end users interact with reports. The filenames display to the end users in the NetSafe Client and allow end users to more easily filter, organize and search for reports. 

Due to the importance of filenames within the NetSafe application the administrator must understand how filenames can be created and modified.

Screenshot 1-0 NetSafe Client Filenames

3.0 NetSafe Administrator, File Name

Each report will need to have a filename assigned to it. Reports are built within the Report Templates menu. Filenames are built within a template under the Filename Template menu.

Reference: NetSafe Administrator Manual 100-0201-00, section (6) Report Templates.

Screen shot 1-1 File Name Template Dialog

Table 1-0 Filename Template Element

Element

Description

Filename Template

The template for the file name to be assigned to the report.

In this text entry box, enter a combination of static text strings and variable text identifiers (%F and %D).

 4.0 NetSafe Administrator, Defining a Filename

The process of defining a filename for the report is a two-step process:

  1. Create the format for the filename, that is, its template.
  2. Formulate rules to locate the data on the report. The data will be entered in the variable fields within the filename template.

Filenames consist of free text and variable fields.

Free text: is any text that is entered manually and will remain static or unchanging within the filename.

A variable field: is text that can be extracted from within the report, and placed in to the filename. The variable field can change as it is dependent on the text in the report. Variable fields can help make filenames unique.

4.1 NetSafe Administrator, Examples of Filenames

Diagram 4-0 File Names

5.0 NetSafe Administrator, Filename Examples

Decide what the filename should look like:

  • Is the report for a specific patient?
  • Is the report for a specific location?
  • Or is the report only being delivered to specific workstations?

5.1 Filename Example 1:

An EMAR is usually separated by individual patients so a filename will contain information about the patients:

  • name
  • account number
  • unit number
  • location

EMAR

John Doe

Acct # 143435465368

ICU

5.2 Filename Example 2:

The alpha census is not for a specific patient. It is delivered to most unit locations and can have a generic filename with a variable field for a date.

Alpha Census

8/9/2018

 

NetSafe (Download the HP LaserJet 4 Device Driver) 100-0010-00

 

1.0 Introduction

 

This document is for the following Interbit Data products, NetSafe. This explains the topic of HP LaserJet 4 device drivers.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of HP LaserJet 4 device drivers.

2.0 Overview

This document is used to install the HP LaserJet 4 device driver.

3.0 Finding the device driver file

1.0 Navigate to the HP LaserJet 4 website. https://www.catalog.update.microsoft.com/Home.aspx

Screenshot 1-0 HP Laser Jet 4 Website

3.1 Microsoft catalog update website

1.0 Enter (HP LaserJet 4) into the box.

Screenshot 2-0 HP LaserJet 4 Installation

4.0 Download the device driver file

1.0 Navigate to the (Microsoft driver upload for HP LaserJet 4) device driver file.

2.0 Select the download icon.

Screenshot 3-0 Navigate to the (Microsoft driver upload for HP LaserJet 4)

5.0 Extract the device driver file

1.0 Select the downloaded device driver file.

Screenshot 4-0 Select the downloaded device driver file

5.1 Select the (Save icon)

1.0 Verify the Internet Explorer window pops up.

2.0 Select the (Save) icon.

Screenshot 5-0 Select the device driver file

5.2 device driver file

1.0 Verify the device driver file is downloaded.

Screenshot 6-0 Device Driver File Name

5.3 Creating a Temp folder

1.0 Navigate to (This PC).

2.0 Create a new folder called (Temp).

3.0 Select the (Save icon).

Screenshot 7-0 Creating a (Temp Folder)

5.4 Select the (View Downloads) icon

1.0 Select the (View Downloads) icon.

Screenshot 8-0 Select the (View Downloads) icon

5.5 Select the (Open Folders) icon

1.0 Select the (Open Folders) icon.

Screenshot 9-0 Select the (View Downloads) icon

5.6 Select the downloaded file

1.0 Select the downloaded file.

Screenshot 10-0 Select the downloaded file

Note: You cannot use windows to unzip the cab file. You must use a program like 7-ZIP.

5.7 Creating a (Temp folder)

1.0 Navigate to (This PC).

2.0 Create a new folder called (Temp).

3.0 Select the (Save icon).

Screenshot 11-0 Creating a (Temp Folder)

5.8 Select the (Open Folder icon)

1.0 After the file downloads file select the (Open Folder) icon.

Screenshot 12-0 Open Folder icon

5.9 Select the (Open Folder icon)

1.0 Verify the file is downloaded to the (Temp) folder.

Screenshot 13-0 Open Folder icon

6.0 Install the extracted device driver

1.0 Expanding the device driver in the Temp file.

Screenshot 14-0 Expanding the HP device driver

6.1 Expanding the HP device driver

1.0 Enter the following command from the C:temp> expand -R 4188_bacd1413e93b46362d9a2ca653c869f1c02f6f7.cab hpdriver -F*.

Screenshot 15-0 Expanding the HP device driver

6.2 Expanding the HP device driver

1.0 Verify the file is expanding in the C:temp folder.

Screenshot 16-0 Expanding the HP device driver

6.3 Expanding the HP device driver

1.0 Verify the file is expanded and the console is at the C:temp>.

Screenshot 17-0 Expanding the HP device driver

6.4 Expanding the HP device driver

1.0 Navigate to the (prnhp001) file.

2.0 Right click on the (prnhp001) file.

3.0 Select install.

Screenshot 18-0 Expanding the HP device driver

6.5 Expanding the HP device driver

1.0 Select yes to install the HP drivers.

Screenshot 19-0 Expanding the HP device driver

6.6 Expanding the HP device driver

1.0 Select the (OK icon).

2.0 The HP device driver installation is complete.

Screenshot 20-0 Expanding the HP device driver

7.0 Creating the printer

1.0 Navigate to the Control Panel to Add a Printer.

Screenshot 21-0 Control Panel

7.1 Add a Local or Network Printer

1.0 Select (Add a Local or Network Printer).

Screenshot 22-0 Adding a Local or Network Printer

7.2 Select the type of printer, TCP/IP

1.0 Select (Add a printer using a TCP/IP address or hostname).

2.0 Select the (Next icon).

Screenshot 23-0 Adding a printer using a TCP/IP address or hostname

7.3 Hostname or IP Address

1.0 Enter the Hostname or IP Address (local host).

2.0 Select the (Next) icon.

Screenshot 24-0 Hostname or IP Address (local host)

7.4 Detecting TCP/IP port

1.0 Select the (cancel) icon.

Screenshot 25-0 Adding a Printer

7.5 Setup the port settings

1.0 Select the Custom (Settings) icon.

Screenshot 26-0 Adding a Printer

7.6 Configure Standard TCP/IP port Monitor

1.0 Select the (OK) icon after you verify the Port Name and Printer Name.

Screenshot 27-0 Adding a Printer

7.7 Add a Printer

1.0 Select the (Custom) button.

2.0 Select the (Settings icon).

Screenshot 28-0 Adding a Printer

7.8 Select the device driver, HP LaserJet 4

1.0 Select (HP) Manufacturer.

2.0 Select (HP Laser Jet 4) Printer.

Screenshot 29-0 Adding a Printer

7.9 Save the Printer

1.0 Enter the name of the printer.

2.0 Select the (Next icon).

Screenshot 30-0 Adding a Printer

7.10 Printer Sharing

1.0 Select (Do not share this printer).

2.0 Select the (Next icon).

Screenshot 31-0 Adding a Printer

7.11 Add a Printer

1.0 Deselect the (Set as the default printer) check box.

2.0 Select the (Finish icon).

Screenshot 32-0 Adding a Printer

 

NetSafe (Software Revision History) 100-0022-00

 

1.0 Introduction

This document is for the following Interbit Data products, NetSafe. This explains the topic of NetSafe Products Software Version History.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of NetSafe Products Software Version History.

2.0 Overview

Each Version has an enhancement section and a bug fix section detailing the specific changes.

Version: 1.10.1.1 to Version 1.10.2.1

Component

Enhancements

Bug Fixes

Compile

Relay Agent

Logging writes to the trace log file.

None

All versions were recompiled.

None

All file deletions are written to the trace log.

None

SQLITE

Version: 3.31.0

 

SQLCYPHER

Version: 3.15.2

None

All file deletions have their corresponding function used; not the previously written function name.

None

None

Purge Agent

Logging writes to the trace log file.

None

None

None

All file deletions are written to the trace log.

None

None

None

All file deletions have their corresponding function used; not the previously written function name.

None

None

Administrator

Fixed an issue with the Location Mnemonic dialog lookup.

 

The issue that was fised; might incorrectly display the contents of the directory or not at all after pressing the Load Filter  icon.

Fixed an issue with the Location Mnemonic dialog lookup.

The issue that was fised; might incorrectly display the contents of the directory or not at all after pressing the Load Filter  icon.

None

None

None

Fixed an issue where the reports list view does not display the contents of the database.

The database, SavedSearches, had incomplete data within the table, ListViewColumnSettings.

The table is now correctly updated to include all columns in the list view.

None

Version: 1.9.2.1 to Version 1.10.1.1

Component

Enhancements

Bug Fixes

Compile

Administrator

Table Template no longer allows for distribution list locations to be selected.

None

All version were recompiled.

Administrator

Activity Queue display’s the text extraction method used.

None

None

Administrator

Report Templates display the text extraction method used.

None

None

Administrator

Unknown Location purge controls added.

None

None

Administrator

Lpd Queue Error purge controls added.

None

None

Administrator

Added new button to reset the active directory database.

None

SQLITE

Version: 3.31.0

 

SQLCYPHER

Version: 3.15.2

Administrator

Added the ability to transfer aliases from one location to another location.

 None

None

Processing Agent

The text extraction method used is now stored in the activity tables, Relay Queue and LPD Queue, and in the report distribution logs. The reason is to know which Text Extraction method was used at the time the report was processed.

None

None

Relay Agent

Enhanced error message; when delivering a file to the destination folder.

None

None

Purge Agent

Added the ability to purge unencrypted files delivered to a folder location.

The purge, will only delete the files that were delivered by NetSafe.

The relay agent will place each file delivered, into a database.

None

None

NetSafe Client

Implement new Application Timeout functionality, works with table templates.

None

None

All

None

Fixed a potential application crash when using complex version 3.

The buffer size may reach its capacity causing an issue when storing the Page Data. 

None

Processing Agent

None

Fixed an issue with conditional redirect and reprocess method.

The process (row-value) was not being reset properly.

None

Version: 1.9.1. to Version 1.9.2.1

Component

Enhancements

Bug Fixes

Compile

Administrator

Saving the system settings also allows setup the delivery of the database logins database.

None

All version were recompiled.

Administrator

The Client Login Backup tab indicates when a change has been made. The user must update the current login database’s at each location.

None

None

Administrator

None

MPIIMPORT can no longer be used as a Table Template name.

None

Relay Agent

None

A Table Template entry might not be correctly delivered.

The return value is incorrectly set.

 

This was fixed.

None

NetSafe Client

None

The report entries would not display correctly.

 

This was fixed.

None

None

None

None

SQLITE

Version: 3.31.0

 

SQLCYPHER

Version: 3.15.2

Version: 1.9.1.1 to Version 1.9.1.2

Component

Enhancements

Bug Fixes

Compile

Relay Agent

None

Table Template entries get stuck in the Relay Queue – Pending. While the database end is delivered, the entry is not moved to the Relay Queue – Completed. The return value indicating success is incorrect.

 

This is fixed.

All version were recompiled.

None

None

None

SQLITE Version: 3.31.0

 

SQLCYPHER Version: 3.15.2

Version: 1.8.1.1 to Version 1.9.1.1

Component

Enhancements

Bug Fixes

Compile

Administrator

Location Mnemonic can be set up to deliver a TIFF image to a destination folder.

 

The TIFF image allows for universal printing.

None

All version were recompiled.

Administrator

Report Group Name is specified in a template for the ability to view similar reports in the NetSafe Client.

 

The default report group name is the template name.

None

SQLITE Version: 3.31.0

 

SQLCYPHER Version: 3.15.2

Administrator

Saving a Location Mnemonic triggers the delivery of the active directory database for that Location Mnemonic.

None

None

NetSafe Client

When enabled, TIFF images for each Location Mnemonic allow for printing to any printer; (not just PCL printers).

None

None

NetSafe Client

Report Group Name list is displayed to the side of the application window in a list view.

 

The listing display allows for an easy selection of reports.

None

None

Relay Agent

None

If an error occurred during the delivery of a report to the destination location; the entry is still moved to the completed queue.

 

A code fixed allows the entry to stay in the pending queue and is retried at a later time.

None

Version: 1.7.2.1 to Version 1.8.1.1

Component

Enhancements

Bug Fixes

Examples

All

Added new trace log database used to store some new trace log settings.

None

All versions were compiled.

None

Added new trace log mechanism to indicate whether the trace log is enabled or not through the database.

None

SQLITE Version: 3.31.0

 

SQLCYPHER Version: 3.15.2

None

Added the ability to specify the size of the trace log created over time.

None

None

None

New code signing certificate used on executables.

 

None

None

Version 1.7.2.1 to Version 1.7.3.1

Component

Enhancements

Bug Fixes

Examples

Processing Agent

Added new command-line arguments to the conversion application for Red Titan EscapeE.

 

The commands are:

 

HISTORY 0

NEXTPAGE 0

ABORT ALL

ERASE OK

 

These commands prevent write operations in the RT.INI file.

 

The CPU timeout for the conversion application for Red Titan EscapeE has been reduced from (1) minute to (15) seconds.

 

The application checks the number of CPU cycles and will terminate the conversion if there is no CPU activity.  

 

CPU inactivity is an indication that a pop-up dialog has appeared and requires user interaction.

None

Relay Agent

Added new command-line arguments to the conversion application for Red Titan EscapeE.

 

The commands are:

 

HISTORY 0

NEXTPAGE 0

ABORT ALL

ERASE OK

 

These commands prevent write operations the RT.INI file.

The CPU timeout for the conversion application for Red Titan EscapeE has been reduced from (1) minute to (15) seconds.

 

The application checks the number of CPU cycles and will terminate the conversion if there is no CPU activity.  

 

CPU inactivity is an indication that a pop-up dialog has appeared that requires user interaction.

 

None

Version 1.7.1.1 to Version 1.7.2.1

Component

Enhancements

Bug Fixes

Compile

   

Changed the version number to reflect the changes to other clients and agents.

None

All versions were compiled.

Administrator

Re-enabled row-highlighting for list view for every other row.

Each even row now has a slight gray background.

 

The template dialog displays error messages when an inappropriate action is performed on the location specifier table.

 

Edit and Delete action display error dialogs when an item is not selected in the list view.

None

None

Admin Agent

The admin agent verifies that the version of the Administrator is the same version found on the server.

 

There was a potential for data loss if the wrong version was used to connect to the server.

None

None

Processing Agent

Import users into the Client Login Backup skip non-alpha characters.

When importing users into the Client Login Backup using the LPD routines and the checkbox, Delete table before new users import, is not enabled, the user list updated correctly.

 

Previously, the application would exit out, indicating that the user already existed in the system.

None

Relay Agent

None

When encrypting a file, an error event is created, indicating that the encrypted buffer contains more data.

 

The buffer required to encrypt the data did not include the block size as well, so the encrypted data could not be processed.

None

All

SQLITE Version:  3.28.0
SQLCYPHER  Version: 3.15.2

None

None

Version: 1.6.2.4 to Version 1.7.1.1

Component

Enhancements

Bug Fixes

Examples

All

Added new table, RelayAgentSettings to the database, SystemSettings.

Fixed some missing sqlite3_finalized from functions.

None

 

 

Administrator

Added new bitmap images to the connection dialog.

Fixed the issue where the location mnemonic was not being deleted from the distribution table correctly.

 

The location mnemonic from the other distribution lists.

None

Administrator

Added new connection into to status bar.

Fixed an issue where the description field does not display in the Relay Queue list view.

None

Administrator

Changed the color of the title bars to the new logo colors for 2019.

Fixed a problem where the application tries to find the version information for a blank entry.

None

Administrator

Updated the Location Mnemonic picker to use the same list columns as the main Location Mnemonic Dictionary.

Description field will now be set for each user in a distribution list.

 

This will display in the activity log.

None

Administrator

Allow the user to not show disabled recipients.

None

 

None

Relay Agent

Added a new function to clean up the work objects.

Memory leak in function, GetVersionInfo, fixed.

None

Relay Agent

The thread pool is destroyed when the application exits.

Thread pools introduced a memory leak associated with work objects that were created but never released.

Code was added to free these work objects.

None

Relay Agent

None

Fixed an incorrect thread pool creation state.

The fix now indicates correctly that the cleanup group was created.

None

Relay Agent

None

Fixed an issue checking the WriteEventLocationStatus value in the function, WriteMessageToEventLog.

None

Client Setup Utility

None

Fixed an issue with the Client Setup Utility when setting up all users.

It will do this for all delivery types not just the windows folder.

None

Version: 1.6.2.3 to Version 1.6.2.4

Component

Enhancements

Bug Fixes

Examples

Administrator

None

Fixed an issue with the icon not displaying properly.

None

Purge Agent

None

The purge agent will only purge locations that are enabled and set to windows folders.

None

NetSafe Client

None

The trace log will no longer display the password of the user that signed in to the AD client.

Case: 6374.

None

Version: 1.6.2.2 to Version 1.6.2.3

Component

Enhancements

Bug Fixes

Examples

Administrator

None

Fixed an issue with the Activity Log.

If there was no entries highlighted and the delete button was pressed, it closes the administrator indicating that there was a connection error.

None

 

Relay Agent

None

Fixed an issue with Windows Server 2016 where the Active Directory database is not delivered to a destination folder.

None

Version: 1.6.2.1 to Version 1.6.2.2

Component

Enhancements

Bug Fixes

Examples

Administrator

None

The controls under the Actions group box will no longer move when the dialog is resized.

None

 

Administrator

None

The FROM and TO date control on the Activity dialog were mixed up.

This was fixed.

None

Admin Agent

None

The following dialog will refresh the list view when the dialog is resized.

None

Location Mnemonic

None

None

None

Activity Logs

None

None

None

Alias Logs

None

None

None

User Activity Logs

None

None

None

Version: 1.6.1.2 to Version 1.6.2.1

Component

Enhancements

Bug Fixes

Examples

Administrator

The new default dialog size is for screen resolution of 1024×768, all dialogs were updated to accommodate the new size.

Fixed some bugs related to the E-mail notification tab.

None

Administrator

If a template is setup to use a report extraction method, it verifies that the settings were saved.

 

If not, there is now a warning message displayed to indicate the missing settings.

Renamed some dialogs to fit new naming conventions.

 

None

Adminitrator

Bolded some group box control fonts.

None

None

Relay Agent

An event will be written when a location is active or in-active.

Useful for application that monitor the event log.

None

None

Admin Agent

None

Fixed error forwarding entries from the Unknown Recipients table.

None

Version: 1.6.1.1 to Version 1.6.1.2

Component

Enhancements

Bug Fixes

Examples

Relay Agent

None

If a Location Mnemonic was disabled, any entries in the Relay Queue Pending are sent to the Disabled Recipients Database.

Due to a change in the code, the column, disable User was not being retrieved correctly.

This caused the entry to get delivered even though it was not supposed to.

Changes were made to fix this issue.

None

Version: 1.5.1.5 to Version 1.6.1.1

Component

Enhancements

Bug Fixes

Examples

All

Changed the type for a column in the table DeliveriedFiles. The column, IBEFileName, was an INTEGER value but was changed to a TEXT value.

None

None

All

Copyright updated to 2018.

None

None

Administrator

None

Fixed some dialog control issues.

None

Relay Agent

None

Fixed a handle leak.

A mutex was created in a thread that another thread was closing.

None

Relay Agent

None

Fixed an error that was generated because a mutex was being released that was not created. 

None

Version: 1.5.1.4 to Version 1.5.1.5

Component

Enhancements

Bug Fixes

Examples

Administrator

None

Minor update to the System Settings Dialog.

Made the buttons bigger for the version history.

None

Processing Agent

None

Fixed an issue involving large files the application tries to allocate a chunk of memory equal to the size of the file.

The function doing the allocation HeapAlloc fails returning NULL but the memory is allocated with no way to deallocate it.

To resolve this the flag HEAP_GENERATE_EXCEPTIONS and Structure Exception Handlers to get the correct behavior.

None

Processing Agent

None

Fixed an issue involving large files and Table Templates where sending the Sqlite command to vacuum the database causes memory to be allocated but never to release.

This did not cause a problem until the next large file was processed. If the following event log entry is found this version will fix the issue.

-<Eventxmlns=”http://schemas.microsoft.com/win/2004/08/events/event”>    

– <System>        

<Provider Name=”Interbit Processing Agent” />         

<EventID Qualifiers=”0″>200</EventID>         

<Level>2</Level>         

<Task>0</Task>         

<Keywords>0x80000000000000</Keywords>         

<TimeCreated SystemTime=”2017-11-02T16:56:58.000000000Z” />              

<EventRecordID>1772</EventRecordID>             

<Channel>Application</Channel>         

<Computer>TEST-WIN2008R2.interbit.local</Computer>        

<Security />            

</System>        

– <EventData>        

<Data>[File: ….#includesSource CodeInterbitData Handy Code.cpp Function: IntializeMemoryMappedFile Line: 4756] Could not map view of file e:Program Files (x86)Interbit DataNetSafeTempFI_MPI4934661494178.prn ERROR < 8 >: Not enough storage is available to process this command.</Data>            

</EventData>        

</Event>

None

Version: 1.5.1.1 to Version 1.5.1.2

Component

Enhancements

Bug Fixes

Examples

All

Changes made to how the file number for the archive files is retrieved. 

None

None

Administrator

None

Fixed an issue where the wrong information was displaying the in-dialog row details dialog for the LPD Queue – Processed.

This caused some new columns in this release.

None

Admin Agent

None

The file size and IP Address are now set when resubmitting a report from the LPD Queue – Warning or Processed.

None

Processesing Agent

None

Fixed an issue resubmitting reports from the LPD Queue – Warning or Processed.

The file sometimes is deleted before being entered in the LPD Queue – Pending.

None

LPD Agent

None

Fixed an issue downloading reports where the TEMP folder purge might try to delete a file before it is entered into the LPD Queue – Pending database.

None

Alert Agent

 

Fixed an issue with the Report Template Notification where an E-mail was sent based on the E-mail Notification Frequency and not the actual timeout if the notification was enabled.

The wrong FileTime was being used.

 

Version: 1.4.1.1 to Version 1.5.1.1

Component

Enhancements

Bug Fixes

Examples

All

Table Template imports must follow the standards for CSV files. See RFC 4180.

Complex Version 4 Text Extraction removes the character, @, from the outputted text file if the PCL file was simple.

This was fixed. 

None

Administrator

The size of the font used was increased for the setting dialogs list view.

This will make it easier to view.

None

None

Administrator

Table Template setting Separator string was changed to Separator character.

Hex values are now allowed for this character.

None

None

Processing Agent

Trace Logs have been implemented for some routines.

More changes in the future.

The thread that handled the Table Template import might have been called repeatedly.

This was fixed, returning some CPU cycles back to the server.

None

Processing Agent

Some Event Message entries will contain more diagnostic information.

More changes in the future.

Fixed a problem where the function, ShouldImportTableTemplate returns an incorrect response causing a loop to occur. 

None

Processing Agent

The process for import Table Templates was changed.

The application now imports the CSV file into a temporary database and copy the database to each location mnemonic’s server database.

None

None

Processing Agent

This is faster than previous implementations.

None

None

Processing Agent

Using Red Titan EscapeE will now follow the setting in the System Settings for the instance timeout.

None

None

Relay Agent

Trace Logs have been implemented for some routines.

More changes in the future.

Fixed an issue where unencrypted files are not delivered to a destination folder.

None

Relay Agent

Some Event Message entries will contain more diagnostic information.

More changes in the future.

Fixed an issue where the processing row bit flag did not reset.

None

Relay Agent

The process for the delivery of Table Templates to each Location Mnemonic has changed.

A simplification of the code was implemented to ensure faster delivery of each database.

In addition the processing of the database will now happen in the ID_RA folder in the TEMP folder.

None

None

Relay Agent

Processing Reports or Table Templates will now use the Table Index number for the folder created in the ID_RA folder. Easier to read.

None

None

Purge Agent

Some Event Message entries will contain more diagnostic information.

More changes in the future.

None

None

Purge Agent

The new trace logs created by the application will be purged.

This will be based on the higher value for either the LPD Queue – Processed or Relay Agent – Completed.

None

None

Admin Agent

None

For very large files resubmitting from the LPD Queue that might be problematic.

A conflict may occur between the TEMP folder purge and copying the file to the TEMP folder.

This was fixed.

None

Version: 1.3.3.2 to Version 1.4.1.1

Component

Enhancements

Bug Fixes

Examples

None

Thread Pools,

The Relay Agent was changed from (creating and destroying threads) to (deliver reports to the destination folder) to (using a pool of threads that will have jobs assigned to do the work).

This will have the effect of speeding up the delivery of the reports to the destination folder.

Fixed a bug with the insert statement for DatabaseDeliveryAlert,

The strftime was surrounded by quotes which caused a problem.

 

None

None

The Relay Agent code was updated and changed to simplify some coding structures.

Most debug messages include details about the issue include the place in the code where the problem occurred.

A memory leak in the Distribution List code was fixed. 

 

None

None

SQLCIPER updated to 3.15.2

Fixed a problem with the password manager where the selected entries are unselected.

ZOHO case 5273.

None

None

SQLITE updated to 3.18.0

The purge agent will no longer require that the archive file exists for the entry to be deleted.

None

None

Icons added to dialog buttons in the Administrator.

NULL delivery method was not processing the file correctly.

This was fixed.

None

None

Additional columns in the LPD Queue allow for more information regarding the time the file was received and processed.

None

None

None

The processing agent will now track the number of attempts that the report is separated.

If the number of attempts exceeds the maximum, the report will be moved to the Error queue allowing other reports to be processed.

Batch files were updated to new implementation.

 

 

None

The LPD Queue – Warning and Relay Queue – Error can now be setup to automatically purge.

None

None

None

The processing agent will verify that the file is available before processing and if it is not it will retrieve the file from the archive folder.

None

None

None

Works with the latest PDF converter from RED TITAN or Lincoln.

None

None

Version: 1.3.3.1 to Version 1.3.3.2

Component

Enhancements

Bug Fixes

Examples

None

None

The field definition files were not being shown in the dialog Report Separation Settings – Method 2, when the button, …, was selected.

This was fixed as it was missing the correct file type was not set correctly.

None

Version: 1.3.2.2 to Version 1.3.3.1

Component

Enhancements

Bug Fixes

Examples

None

The NetSafe Client was updated to use the TEMP folder under the APPDATA folder for decrypting databases.

Fixed an issue where the decrypted database might not be finalized causing the file to become locked.

When this state was reached, the file may not be deleted.

This was fixed.

None

Version: 1.3.2.1 to Version 1.3.2.2

Component

Enhancements

Bug Fixes

Examples

None

None

The latest DLL for OpenSSL, libeay32.dll, requires the visual studio redistributable DLL for 2012, msvcr120.dll.

Added code to deliver the DLL to the destination folder along with the other files needed for the client.

None

Version: 1.3.1.1 to Version 1.3.2.1

Component

Enhancements

Bug Fixes

Examples

None

None

Due to the change in the interface, when adding or editing a Client Backup Login user the program gets into an infinite loop.

This was fixed.  

None

None

None

The dialog for the Application Log view will now display in the correct location, top left.

None

None

None

The dialog for the Application Log view will now display in the correct location, top left.

None

Version: 1.2.1.9 to Version 1.3.1.1

Component

Enhancements

Bug Fixes

Examples

None

The UI was updated to remove the tabs from the interface. Now a left sided menu shows the items to be viewed.

Memory fixes for the Alert Agent. Potential for the agent to utilize CPU cycles when the LPD Queue – Warning or Relay Queue – Errors queue contained a lot of entries.

None

None

Some of the dialogs have been updated to utilize the space better.

None

None

None

The placement of the dialogs will now always be the top left corner of the main window.

None

None

None

Added the ability to use Template Recipient Groups.

None

None

None

Added the ability to specify an INI file when using report separation method two.

This will allow the files to have more options specified when splitting the files.

None

None

None

AES encryption will now be used when encrypting files using IBE encryption.

NOTE, this will be a big change to the way sites currently decrypt their files.

None

None

None

Ability to view the file either as a PDF, PRN or TEXT file without having to find the archive file associated with it.

This will save time.

None

None

None

Encryption of the files will be faster.

None

None

None

TEMP folder will now be purged when there are no longer any files to be processed.

None

None

Version: 1.2.1.8 to Version 1.2.1.9

Component

Enhancements

Bug Fixes

Examples

None

None

ZOHO BUG 3851 – Sometimes the domain id used to setup the security group in the table, Groups, in the Active Directory database is incorrect.

The application relied on the INSERT statement for the DOMAIN to get the correct domain ID, this is incorrect.

The application will now use the domain name to get the domain ID from the DOMAIN table.

None

None

None

Changed the function, InsertADGroupSettingsIntoGroupsTable, to use “INSERT OR REPLACE” instead of “INSERT OR IGNORE”.

None

None

None

Tracing functions were added to the solution and application.

Currently, the tracing only works for the Active Directory code. 

None

Version: 1.2.1.7 to Version 1.2.1.8

Component

Enhancements

Bug Fixes

Compile

None

None

None

All version were recompiled.

Client Setup Utility

None

The debug version of the application was release to production by mistake.

This release fixes that issue. 

None

Version: 1.2.1.5 to Version 1.2.1.7

Component

Enhancements

Bug Fixes

Compile

None

None

None

All version were recompiled.

Alert Agent

None

When retrieving client logs, the SQL statement was using the wrong column name in the query.

DisabledUser should have been DisableUser.

This shows up in the event log as the following message. 

None

Sqlite Get Table

None

Can not retrieve values from statement

Path:

E:DevVS2013VS2010NetSafeDBRecipients.db SELECT Username, WindowsFolder FROM RecipientList WHERE DisabledUser = 0;

Sqlite Error Message <1> [no such column: DisabledUser]

ERROR < 2 >:

The system cannot find the file specified.

None

Administrator

Added the ability to view all the columns in the Distribution Report page using the buton on the dialog or the right click option.

 

This is a simple way to show all the columns on the dialog.

None

Administrator

 None

The version information dialog did not display the version number in the correct column for the LPD Agent.

This was fixed.

None

Administrator

None

The version information dialog under the system settings,there where two LPD Agent numbers listed.  One was removed.

None

Version: 1.2.1.4 to Version 1.2.1.5

Component

Enhancements

Bug Fixes

Compile

None

None

None

All version were recompiled.

None

None

The alert agent was calling the wrong function when the CheckSum alert was enabled.

This was corrected.

None

Version: 1.2.1.3 to Version 1.2.1.4

Component

Enhancements

Bug Fixes

Compile

None

None

None

All version were recompiled.

None

None

The NetSafe Client incorrectly display’s the Network Sign-On message when the workstation was no longer connected to the network.

 Now when the network connection is not available the NetSafe Client will correctly display Client Backup Login.

None

Version: 1.2.1.2 to Version 1.2.1.3

Component

Enhancements

Bug Fixes

Compile

None

None

None

All version were recompiled.

None

Some UI tweaks placing the dialogs into the tab interface.

None

None

None

The purge agent will now purge old files from the data folder at each Location for each Location Mnemonic.

These are files that are orphaned and do not have a database entry associated with them.

None

None

None

Changed how picking the Location Mnemonic from the Location Mnemonic List works.

A message box will appear if the user does not select an entry rather than selecting 0.

None

None

None

Updated to SQLCIPHER 3.8.8.3   

None

None

Version: 1.2.1.1 to Version 1.2.1.2

Component

Enhancements

Bug Fixes

Compile

None

None

None

All version were recompiled.

None

Searching ability to both the System Settings and Location Mnemonics Active Directory settings. When searching, the matching entries are moved to the top of the list view. 

None

None

None

Sorting of distribution list columns was enabled.

None

None

None

The encryption connection between the admin agent and administrator will now use the highest possible encryption.    

None

None

None

None

The purge agent will no longer try to purge Location Mnemonic’s that have been disabled.

None

Version: 1.1.3.2 to Version 1.2.1.1

Component

Enhancements

Bug Fixes

Compile

None

None

None

All version were recompiled.

None

Updated the UI.

Can now resize the main dialog control.

None

None

None

Added the ability to alert users when there is an issue delivering files to a location.

The file that is delivered does not have the same checksum as the file that is delivered.

This can be enabled if required.

None

None

Version: 1.1.3.1 to Version 1.1.3.2

Component

Enhancements

Bug Fixes

Compile

Relay Agent

None

Conversion method was not being retrieved from the database correctly. 

This was fixed.

None

Version: 1.1.1.2 to Version 1.1.3.1

Component

Enhancements

Bug Fixes

Compile

All Agents

Added the ability to select the conversion application to be used by each location mnemonic.

This allows location mnemonic to use either the Lincoln PDF Converter or Red Titan EscapeE to convert files.

When Red Titan is installed; it will be the default method.

A crash may occur if the number of columns in a table was higher than the number of columns that are checked.

 

The function will now only check the number of columns specified.

None

Alert Agent

Request to change the relay queue – pending alert message, the entries currently in the database are now found at the top.

None

None

Processing Agent, Relay Agent

 

Fixed a problem where files are deleted before they are delivered. This causes the entry to be moved into Relay Queue – error without reason. This was caused by the routine that cleans the relay queue folder.

There is now a Mutex that will make sure no files are deleted while the files are being delivered.

None

 

 

 

Fixed a problem where the folder does not exist in the relay queue folder. This was caused by the relay queue purge since a folder might be deleted before a file is delivered.

None

None

Database

 

Database: Recipients.Db, Table: RecipientList, Column Added: ConversionMethodType 

Mone

None

Version: 1.0.8.7 to Version 1.1.1.2

Component

Enhancements

Bug Fixes

Compile

Active Directory Integration 

 

The ability to deliver a NetSafe Client that can utilize Active Directory for authentication. 

Administrators can indicate whether or not this new NetSafe Client should be delivered to folder shares. 

Administrators can choose to allow access based on a Domain and Security Group within that Domain. 

None

None

None

Domains and Security Groups can be sorted. 

None

None

None

Access can setup on a global level through the System Setting or on a local level by each Location Mnemonic 

Administrator functions for updating all folders at once.

The new client requires that additional data be stored in an encrypted database that must be delivered to each folder share. 

None

None

None

Location Mnemonic Dialog Redesign. 

Reorganized the elements for defining a location mnemonic for easier access to all elements, and to be consistent with other NetSafe Administrator dialogs. 

The ability to specify whether the Location Mnemonic delivers the reports to a folder share or whether it is a Distribution List. 

As noted in Active Directory, the ability to specify which Domains and Security Groups should be used at the Location Mnemonic. 

New check box column indicates whether the Location Mnemonic is enabled or not.   

None

None

None

Report Extraction/Conversion. 

A new utility, EscapeE, can be utilized for  Utilized through Template specifying Report Extraction Method 2. 

Handling PDF and TIFF files natively. 

Handling Non-printer resident fonts. Useful for Report Separation. 

Text Extraction Versions: 

None

None

None

Complex [Version ]4. 

None

None

None

OCR (Optical Character Recognition). Note: Printed Fonts only. 

None

None

None

E-mail Alerts. 

Additional information has been added to body of e-mail message for enhanced routing capability. 

Sorting alerts in list view. 

New: Relay Queue -Error alert. 

None

None

None

Updated SQLITE from version 3.7.2. to version 3.7.14.1 

None

None

None

Administrator -Connection Dialog now displays Interbit Data logo. 

None

None

None

Performance 

Alternate Delivery Folder. 

None

None

None

Added the ability to specify an alternate delivery folder that can be used when a location’s folder share is unavailable. 

None

None

None

If enabled, the entry in the Relay Queue – Pending database is moved to the Relay Queue – Error database. 

None

None

None

Allows reports to stay up to date so reports do not backup in the Relay Queue -Pending and cause performance problems. 

None

None

None

Saving Folder Share State 

When delivering a report to a folder share, the relay agent will not contact the workstation to determine if the folder share is active but rather use stored data about the state of the workstation. 

This allows for a quicker delivery of reports. 

The database will be updated when a timeout is reached for each Location. 

None

None

None

Application Log can now be setup to purge automatically based on number of days. 

None

None

None

Ability to use CTRL+A to select all entries in the: 

Activity dialog. 

Application Logs dialog. 

Report distribution dialog. 

Client Login Backup dialog Bug Fixes:

None

None

None

Made minor UI changes to some dialogs, moved controls, added some new tool tips. 

None

None

None

Modified Text Extraction [Complex 3] to correctly handle “Enter HP-GL/2 mode”. <ESC>%B is the same as <ESC>%0B. 

None

None

Version: 1.0.7.1 to Version 1.0.8.1

Component

Enhancements

Bug Fixes

Compile

None

Table Template feature added to the NetSafe Administrator and the NetSafe Client. Table Templates enable the importation of delimited files (such as MPIs) into NetSafe databases for simplified storage and retrieval.

That information is then delivered to NetSafe Clients in a spreadsheet like format. Printing to a Table Template is done like any other printer, but the report format is very specific.  Table

Templates are set up by:

  • Supplying a delimiter character o Delimiting the fields in a report created in the HCIS
  • Sending the report to NetSafe 

When a valid delimited text file is printed to a Table Template, the data is imported into the specified Template Table within the database.

Then, a copy of the data is generated and sent to each user specified in the Table Template’s list of Location Mnemonics, along with the NetSafe client. 

None

None

None

A new setting was added to the Relay Agent’s Systems Settings menu to enable the setting of a parameter value that determines how many threads the Relay Agent starts.  

None

None

Version: 1.0.6.2 to Version 1.0.7.1

Component

Enhancements

Bug Fixes

Compile

None

Redesigned the System Settings tab. 

The layout of this tab now matches the tab of the same name in the NetDelivery application. 

None

None

None

Made the following changes to the Report Distribution Wizard’s Template Information dialog box:  

Added, to the list of text extraction methods, Text Extraction – Complex [Version 3]. 

Changed the implementation of this feature from radio buttons to a drop-down list.  

Changed the way the PCL text extraction is chosen.  Select Extraction Type is now a combo box rather than a set of radio buttons.

Added the Reprocess Method function. 

This new function allows templates that use conditional redirect to send reports back into the LPD Queue – Pending to be reprocessed using the new template name. 

None

None

None

Added Socket Agent to the Settings list on the System Settings tab.  Selecting this entry displays the configuration menu for this agent. 

None

None

Version: 1.0.6.0 to Version 1.0.6.2

Component

Enhancements

Bug Fixes

Compile

None

Updated SQLITE from version 3.6.23.1 to version 3.7.2.    

None

None

Version: 1.0.5.0 to Version 1.0.5.7

Component

Enhancements

Bug Fixes

Compile

None

Updated SQLITE from version 3.6.18 to version 3.6.23.1.  

None

None

None

Added the capability for the columns to resize automatically for the Application Logs. 

None

None

None

Added the ability for a site to specify that more than one thread be processed by the Relay Queue – Pending. 

This change provides faster speed when the Relay Agent processes reports and eliminates the problem of a long conversion process holding up the rest of the reports in the queue. 

Although the maximum setting is 16, most servers use no more than the number of processors that are listed in the device manager.  

None

None

None

None

Resolved a problem with Copy Settings for distribution templates.  

None

None

None

Changed spacing, grammar, and spelling in GUI for consistency with NetDelivery Administrator GUI, to improve readability.  

None

Version: 1.0.4.0 to Version 1.0.4.2

Component

Enhancements

Bug Fixes

Compile

None

Updated SQLITE from version 3.6.18 to version 3.6.22.  

None

None

None

Resolved a bug that prevented the Show All feature from working in Alias and Location Mnemonics dialog boxes.  

None

None

None

Resolved a bug that prevented Exclusive and Inclusive from displaying when a new template was being created.

None

None

None

Users can now send un-encrypted PDF’s to a LOCAL folder share.  Sending the file to a network share is prohibited.  

None

None

Version: 1.0.3.0 to Version 1.0.3.6

Component

Enhancements

Bug Fixes

Compile

None

Updated SQLITE from version 3.6.10 to version 3.6.18.  

None

None

None

Added a (Select All) function to some dialogs.  

None

None

None

Modified the layout of the Log In dialog box.  

None

None

None

Added a function to store the IP Address and Password per user.  

None

None

None

Added an automatic searching feature when characters are entered into a search box.

None

None

None

Made list views load more quickly. 

None

None

None

Enhanced the Distribution Wizard so that template names are easier to modify and display in their entirety in drop-down lists.   

None

None

None

None

Fixed a bug so that entries deleted from Relay Queue – Error and Unknown Recipient Queue are properly deleted from the database. 

None

Version: 1.0.2.0 to Version 1.0.2.4

Component

Enhancements

Bug Fixes

Compile

None

Updated SQLITE from version 3.6.4 to version 3.6.10.  

None

 

None

None

Added the ability to send alerts to pagers. 

Users can now receive a short message on a pager indicating that an error occurred while attempting to deliver a report.  

None

None

None

Added a Show All Entries function to the Activity tab.  When selected, all entries display in a single pane, through which the user can scroll.  

None

None

Version: 1.0.1.3 to Version 1.0.1.13

Component

Enhancements

Bug Fixes

Compile

None

Updated SQLITE from version 3.6.2 to version 3.6.4. 

None

None

None

Modified the Template Information dialog by adding radio buttons that enable the user to select one of several text extraction methods used in the Processing agent.  

None

None

None

None

Resolved a bug so that items removed from various queues are now completely removed from the database. 

None

 

NetSafe (Administrator Installation) 100-0029-00

1.0 Overview

This document is used for the following Interbit Data products, NetSafe. This explains the topic of Installing the NetSafe Administrator software application.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Installing the NetSafe Administrator software application.

2.0 Introduction

The NetSafe Administration software application file (NetSafe Setup 0.0.0.0.exe) will need to be installed on the server at the customer site. Once the file is downloaded to the server at the customer site, the installation process can begin. The installation of NetSafe Administrator software application takes about five minutes.

3.0 Installation Preparation

1.0 Locate the executable installation file on the server.

Screenshot 1-0 Preparation

4.0 Installation Initialization

1.0 Double click on the NetSafe Icon.

Screenshot 1-1 Initialization

5.0 User Account Control

1.0 Depending on the group policy settings, this dialog may appear.

2.0 Select YES on the User Account Control dialog box as indicated below.

Screenshot 1-2 Control

6.0 Security Software

Depending on the configuration of the server, there may or may not be security software installed. In this case BitDefender was installed on the workstation and indicated that permission needed to be given before the installation could proceed. The button ALLOW was selected, allowing the installation to continue. 

Screenshot 1-3 Allow

7.0 Prerequisite Setup

The prerequisites need to be installed to allow NetSafe to function properly.

1.0 Click the NEXT button to continue the installation.

Screenshot 1-4 Prerequisite Setup

8.0 Third Party Software: PDF converters

This dialog allows for the installation of PDF conversion software. The choices are LincPDF_nokey or Red Titan-Escape. New installations choose Red Titan-Escape. After the installation of this software, additional steps are required to register the software to be used in a production environment. 

Screenshot 1-5 PDF converters

8.1 Third Party Software: PDF converters LincPDF

1.0 Select LincPDF_nokey only.

Screenshot 1-6 PDF converters LincPDF

8.2 Third Party Software: PDF converters

1.0 Select NEXT.

Screenshot 1-7 PDF converters

8.3 Third Party Software: PDF converters – LincPDF

Let the software install. There is a green progress bar displayed on the screen.

1.0 Select NEXT

Screenshot 1-8 PDF converters-LincPDF

8.4 Third Party Software: PDF converters – LincPDF Licensing

1.0 Select the (I accept the terms in the license agreement) check box.

2.0 Select NEXT.

Screenshot 1-9 PDF converters-LincPDF Licensing

8.5 Third Party Software: PDF converters – LincPDF User Information

You can get the following information from your system administrator.

1.0 Enter your USERNAME.

2.0 Enter your ORGANIZATION.

3.0 Select NEXT.

Screenshot 1-10 PDF converters-LincPDF User Information

8.6 Third Party Software: PDF converters – LincPDF Complete Installation

1.0 Select COMPLETE.

2.0 Select NEXT.

Screenshot 1-11 PDF converters – LincPDF Complete Installation

8.7 Third Party Software: PDF converters – LincPDF Installation

1.0 Select INSTALL.

Screenshot 1-12 PDF converters – LincPDF Installation

8.8 Third Party Software: PDF converters – LincPDF Installation Finish

1.0 Select FINISH.

Screenshot 1-13 PDF converters – LincPDF Installation Finish

9.0 NetSafe Administrator Installation

1.0 Select the (I agree to the License terms and conditions) check box.

Screenshot 1-14 Installation

9.1 NetSafe Administrator Installation

The default directory for the NetSafe Administrator software application is C:_installNetSafe-Setup-0.0.0.0.exe. As shown in the image below. A different destination directory for the NetSafe Administrator software application can be chosen.

1.0 Select INSTALL.

Screenshot 1-15 Installation

9.2 NetSafe Administrator Installation – Visual Studio Redistributables

1.0 Select the (I have read and accepted the license terms) check box.

Screenshot 1-16 Visual Studio Redistributables

9.3 NetSafe Administrator Installation – Visual Studio Redistributables

1.0 Select INSTALL.

Screenshot 1-17 Visual Studio Redistributables

9.4 NetSafe Administrator Installation – Visual Studio Redistributables

1.0 Select FINISH.

Screenshot 1-18 Visual Studio Redistributables

9.5 NetSafe Administrator Installation – Visual Studio Redistributable

1.0 Select the (I agree to the licensing terms and conditions) check box.

2.0 Select FINISH.

Screenshot 1-19 Visual Studio Redistributables

  • NetSafe Administrator Installation – Visual Studio Redistributables

1.0 Select CLOSE.

Screenshot 1-20 Visual Studio Redistributables

10.0  NetSafe Administrator Installation

1.0 Select FINISH.

Screenshot 1-21 Installation

11.0  NetSafe Administrator Installation

1.0 Close this window.

Screenshot 1-22 Installation

12.0  NetSafe Administrator Installation

1.0 Navigate to the new NetSafe Icon.

2.0 Double Click the NetSafe Icon.

Screenshot 1-23 Installation

13.0 Logging in

After double clicking on the new NetSafe Icon in the previous step, the NetSafe Administrator Login window will appear.

You will need to get the required information from your system Administrator to login to the NetSafe Administrator login window.

1.0 Enter the name of the SERVER.

2.0 Enter your USERNAME.

3.0 Enter your PASSWORD.

4.0 Once the information is entered in to the three locations select CONNECT.

Screenshot 1-24 Logging in to NetSafe Administrator application

14.0 NetSafe Administrator Installation

After selecting CONNECT in the previous step the NetSafe Administrator window will appear. You are ready to start using the NetSafe Administrator application.

Screenshot 1-25 Installation

The installation of the NetSafe Administrator software application is complete.

15.0 Virus Software

Most sites have Virus Protection but do not have a consumer application that allows applications.  It is indicated to sites that the NetSafe folder be excluded from all scanning.

The folder is continually creating and deleting files and might interfere with the application.

 

NetSafe (Printer Setup within MEDITECH Magic) 100-0038-00

 

1.0 Introduction

This document is for the following Interbit Data products, NetSafe CyberCrisis Vault. This document explains the topic of Printer Setup within MEDITECH Magic.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Printer Setup within MEDITECH Magic.

2.0 Overview

This guide provides the basic procedures for setting up a virtual printer within MEDITECH Magic that is used to distribute reports (print jobs) to NetSafe.

To set up a printer in MEDITECH Magic you need to enter data into various data fields on several MEDITECH menus.

The following sections provide step-by-step procedures for entering these data. These procedures, which must be performed in the order in which they are presented, assume the following, that the user is:

  • Familiar with MEDITECH Magic
  • Is logged into the MEDITECH OPS
  • Understands basic Information Technology (IT) concepts and procedures

When performing these procedures, it is recommended that you use the following naming convention:

  • NS<Module Mnemonic><n>

Where:

<Module Mnemonic> is the MEDITECH module for which the printer is being configured, LAB, ITS, etc.

<n> is a sequential number, if multiple printers are being set up for that

MEDITECH module

For example, NSLAB1, NSLAB2.

Caution: There is a 15-character limit to the names of printers.

  • A similar naming convention is recommended for the names of the spoolers:

SNS<Module Mnemonic><n>

For example: SNSITS1, SNSITS2.

Caution: There is a 10-character limit to the names of the spoolers.

Note: The menu numbers used in the following procedures are for the default, standard Magic menus. The numbers may be different if you are using a custom menu.

3.0 Assigning a Host Name

The first element in setting up a virtual printer is to create a remote host for the printer and assign the name to it. To create a remote host, perform the following steps. 

Table 3-0 Assigning a Host Name

Step

Action

1.

Access the following Magic operating system menu:

10. Manage Open Systems.

The Manage Open Systems menu displays.

2.

Determine whether or not if this is the first time that a printer is being defined for NetSafe within MEDITECH:

  • If yes, access the following:

15. Manage IP Addresses – Remote Hosts.

The Enter/Edit/Delete Remote Host IP Address dialog box displays.

  • If no, go directly to Step 3.

3.

Press the right Ctrl key on your keyboard.

The Enter Remote Host IP Address dialog box displays.

4.

Assign a name for the remote host by entering a name into the Host? text entry box, for example enter the following:

NetSafe1

5.

Enter, into the IP Address? text entry box, the IP address for the host.

Caution: The IP address must be the same IP address of the server that is running the NetSafe application.

6.

Press the F12 key on your keyboard.

The information is saved and the Enter/Edit/Delete Remote Host IP Address dialog box closes.

4.0 Identifying the Remote Printer

The second element in setting up a virtual printer is to associate the name specified in Step 4. in the “Assigning a Host Name” procedure to the remote printer to which the reports are sent. To assign a name to the remote printer perform the following steps.

Table 4-0 Identifying the Remote Printer

Step

Action

1.

Access the following Magic operating system menu:

Manage Open Systems

The Manage Open Systems menu displays.

2.

Access the following:

Enter/Edit Remote Printers

The Enter/Edit/ Remote Printers dialog box displays.

3.

Enter, into the Printer? text entry box, the name for the printer, for example:

NSLAB1

4.

Enter, into the Description? text entry box, the description for the printer, for example:

NetSafe printer for LAB reports

5.

Enter, into the Model? text entry box, the following name for the model of the printer:

HPLASERIIII

Caution: NetSafe expects to receive reports from a HP LaserJet 4. If you want to use a different model, contact Interbit Data’s Customer Support.

6.

Enter, into the TCP Port? text entry box, the number of the port being monitored by NetSafe.

Note: By default, NetSafe monitors port 515 for reports and other documents to process. Thus, enter 515 in this field.

7.

Leave the Nagle? text entry box empty.

8.

Enter, into the Remote host? text entry box, the name for the remote host, that is the NetSafe server name.

Caution: This name must match the name entered in “Assigning a Host Name”, Step 4.

9.

Enter, into the Remote name? text entry box a name for the LPD Queue.

Caution: The Remote name must be the name of the NetSafe report distribution template that will process the reports.

The dialog box should look as shown below: 

10.

Press the F12 key on your keyboard.

The information is saved and the Enter/Edit Remote Printers dialog box closes.

Caution: The virtual printer must be set up before the spool group is created. If you set up the spool group first, using the same name as the virtual printer, MEDITECH will let you do this, but no reports will be sent to the virtual printer, and an error message is not displayed.

 

NetSafe (PowerShell Installing Printers Utility) 100-0040-00 

 

1.0 Introduction

This document is for the following Interbit Data products, NetSafe. This explains the topic of Add PowerShell.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Add PowerShell.

2.0 Overview

This document explains the topic of installing printers in conjunction with Interbit Data software application products using PowerShell as a tool.

PowerShell commands let you manage computers from the command line. PowerShell providers let you access data stores, such as the registry and certificate store, as easily as you access the file system. PowerShell includes a rich expression parser and a fully developed scripting language.

3.0 Install the Printers

1.0 Select the check box next to the Printers.csv file.

Note: The folders in the image below are posted under the (ZIP Files tab) on the Knowledge Base.

Screenshot 1-0 Printer.csv file

3.1 The printer list is stored in the .csv file

1.0 Navigate to the Printers.csv file.

2.0 Right click on the mouse and select edit.

Note: The cvs file is an example. The user must modify it to whatever settings are required.

Screenshot 2-0 Printer list stored in the Printers.csv file

3.2 Printer list stored in the Printers.csv file

1.0 View the Printer list.

Note: HP LaserJet 4 device driver should already be installed on the server.

Note: Printer Name and IP Address is just an example. This information must be related to the NetSafe Servers being configured at the customer site.

Screenshot 3-0 Viewing the Printer list stored in the Printers.csv file

4.0 PowerShell

1.0 Start a PowerShell command prompt as an administrator.

Screenshot 4-0 Start a Power Shell Command prompt

4.1 PowerShell

1.0 Select the (Yes) icon.

Screenshot 5-0 Windows PowerShell

4.2 PowerShell

1.0 PowerShell is displayed and ready.

Screenshot 6-0 PowerShell

4.3 PowerShell

Table 1-0 PowerShell

PS C:WINDOWSsystem32>

cd

PS C:>

cd .InstallPrinters

PS C:InstallPrinters>

 

1.0 Navigate to the directory where the application is.

Screenshot 7-0 PowerShell

5.0 StartInstall.ps1 script

1.0 Run the script StartInstall.ps.1.

PS C:InstallPrinters>

.StartInstall.ps1

Screenshot 8-0 Run the script StartInstall.ps.1

6.0 Printer and Ports

1.0 The Printer and Ports are now installed.

Screenshot 9-0 Printer and Ports

7.0 Removing the Test Printers

1.0 If you want to delete the test printers run the Remove script.

2.0 C:intsallPrinters> ./RemoveinterbitInstalledPrinters.ps1.

PS C:InstallPrinters>

./RemoveinterbitInstalledPrinters.ps1

Screenshot 10-0 Removing the Test Printers

 

NetSafe (Location Mnemonic Overview) 100-0042-00

 

1.0 Introduction

This document is for the following Interbit Data products, NetSafe. This explains the topic of Location Mnemonics and guides users through the setup of a new location.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. Remote workstations are defined in the Location Mnemonics dictionary.

2.0 Overview

This document covers the following topics.

  • Windows Folder Location Mnemonics
  • Distribution Lists

3.0 NetSafe Administrator (Login)

1.0 Click on the NetSafe icon on your desktop.

Screenshot 0-0 NetSafe Administrator desktop icon

2.0 Login to the NetSafe Administrator.

Note: If this icon does not display on your desktop, NetSafe can be accessed from the Windows Start menu.

The authentication process begins, and the NetSafe Administrator login dialog box is displayed.

Screenshot 1-0 NetSafe Administrator (Login)

4.0 NetSafe Administrator (Location Mnemonics)

The Location Mnemonics feature is a collection of mnemonics each describing in its simplest form, where the data should be delivered to (the destination folder of the data). The reports are the most common type of data that a mnemonic will process, Table Template databases are another form of data that the mnemonic can handle.

1.0 Navigate to the Location Mnemonics Setting.

Screenshot 4-0 Location Mnemonics (Location Mnemonics Settings)

4.1 Location Mnemonics (Delivery)

The Delivery drop-down list contains the three different types of location mnemonics reports that can be sent.

Location Mnemonics

Description

Windows Folder Location

This location mnemonic type instructs NetSafe to distribute the report to a specific Windows folder location.

Distribution List

This location mnemonic type instructs NetSafe to distribute the report to Windows Folder location mnemonics.

NULL Delivery

This location mnemonic type instructs NetSafe to delete the data.

Note: One Distribution List location mnemonic cannot distribute reports to other Distribution List location mnemonics.

1.0 Navigate to the Location Mnemonics Delivery drop-down menu.

2.0 Select the Windows Folder Location option.

Screenshot 4-1 Location Mnemonics (Delivery)

4.2 Location Mnemonic (Add)

When you select the Add icon the Location Mnemonic Settings dialog box displays. This dialog box has a menu along its left side, a list of settings that can be configured. To the right of this list are the parameters that can be defined for the selected setting displayed.

1.0 Select the Add icon.

Screenshot 4-2 Location Mnemonics (Add)

4.3 Location Mnemonics (Settings Dialog) box

The Location Mnemonic Settings Dialog box.

The settings parameters:

Main

Folder

Alias

Distribution List

Active Directory

These settings enable the user to define and modify the properties of a location mnemonic that distributes a report to a Windows folder.

Screenshot 4-3 Location Mnemonics (Settings Dialog) box

4.4 Location Mnemonic (Settings Dialog) box

1.0 Navigate to the Main option.

Screenshot 4-4 Location Mnemonic (Settings Dialog) box

4.5 Location Mnemonic (Settings Dialog) box

The Location Mnemonics entry box is for the user to add the unique name that identifies the location mnemonic within NetSafe.

  • Navigate to the location mnemonics entry box
  • Enter some content into the Location Mnemonics entry box

Screenshot 4-5 Location Mnemonic (Settings Dialog) box

4.6 Location Mnemonics (Settings Dialog) box

The Location Description entry box is for the user to add a short statement or explanation about the role of this location mnemonic.

  • Enter some content into the Location Description entry box

Screenshot 4-6 Location Mnemonics (Settings Dialog) box

4.7 Location Mnemonics (Settings Dialog) box

The Organization entry box is for the user to add the name of the organization/department, the location mnemonics distributes the reports to.

1.0 Enter some content into the Organization entry box.

Screenshot 4-7 Location Mnemonics (Settings Dialog) box

4.8 Location Mnemonics (Settings Dialog) box

The Creation Date entry box displays the date and time the location mnemonic was created. This entry is automatically generated by NetSafe when the settings are saved.

1.0 Enter some content into the Creation Date entry box.

Screenshot 4-8 Location Mnemonics (Settings Dialog) box

4.9 Location Mnemonics (Settings Dialog) box

The Last Updated Date entry box displays the date and time the location mnemonic was last updated. This entry is automatically generated by NetSafe when the settings are saved.

1.0 Add content into the Last Updated Date entry box.

Screenshot 4-9 Location Mnemonics (Settings Dialog) box

4.10 Location Mnemonics (Settings Dialog) box

The Last Updated By entry box displays the name of the NetSafe Administrator account that was last used to update the location mnemonic. This entry is automatically generated by NetSafe when the settings are saved.

1.0 Add content into the Last Updated by entry box.

Screenshot 4-10 Location Mnemonics (Settings Dialog) box

5.0 Location Mnemonics (Settings Dialog) box

Selecting Windows Folder requires the user to specify parameters telling NetSafe how reports sent to the location mnemonic are to be processed.

1.0 Navigate to the Folder option.

Screenshot 5-0 Location Mnemonics (Settings Dialog) box

5.1 Location Mnemonics (Settings Dialog) box

The Certificate Password entry box is used by NetSafe when encrypting the report prior to distributing it.

1.0 Add content into the Certificate Password entry box.

Screenshot 5-1 Location Mnemonics (Settings Dialog) box

5.2 Location Mnemonics (Settings Dialog) box

The Folder Location entry box identifies the destination folder for reports processed by the location mnemonic.

1.0 Enter some content into the Folder Location entry box.

Screenshot 5-2 Location Mnemonics (Settings Dialog) box

5.3 Location Mnemonics (Settings Dialog) box

Deliver only the unencrypted report check box indicates that only an unencrypted report should be sent to the destination location.

1.0 Select the Deliver only the unencrypted report check box.

Screenshot 5-3 Location Mnemonics (Settings Dialog) box

5.4 Location Mnemonics (Settings Dialog) box

The Remove Unique Identifier from File Name check box indicates whether the unique identifier appended to the end of the report’s filename is removed.

1.0 Select the Remove Unique Identifier from File Name check box.

Screenshot 5-4 Location Mnemonics (Settings Dialog) box

5.5 Location Mnemonics (Settings Dialog) box

The Deliver MPI Database Backup check box indicates whether a copy of the Master Patient Index (MPI) database is sent to the destination location

1.0 Select the Deliver MPI Database Backup check box.

Screenshot 5-5 Location Mnemonics (Settings Dialog) box

5.6 Location Mnemonics (Settings Dialog) box

The Table Templates Data is Read Only check box indicates whether the data for the entry selected in the NetSafe Client user interface is read-only, or the user can make changes to the text and copy the text.  

1.0 Select the Table Templates Data is Read Only check box.

Screenshot 5-6 Location Mnemonics (Settings Dialog) box

5.7 Location Mnemonics (Settings Dialog) box

The Static Files Older Than area specifies the age, in days/hours/minutes, that a report remains in the destination location before it is purged from that folder. The default is 30 days.

1.0 Using the up and down arrows to select the Static Files Older Than appropriate numbers.

Screenshot 5-7 Location Mnemonics (Settings Dialog) box

5.8 Location Mnemonics (Settings Dialog) box

The Application Timeout area specifies the amount of time, in minutes, that the NetSafe Client maintains a connection when there is no activity.

1.0 Add content to the Application Timeout Minutes entry box.

Screenshot 5-8 Location Mnemonics (Settings Dialog) box

6.0 Location Mnemonics (Settings Dialog) box

For both the Windows Folder and the Distribution List delivery types you can add and delete aliases associated with that location mnemonic.

An alias is another way of referencing the location mnemonic. The list of aliases is used by the Distribution Wizard to help determine what report is to be delivered to what location mnemonic. The Distribution Wizard is a module within NetSafe that enables NetSafe to search a report for specific text strings, such as a person’s name, and then to match that text string to an alias, to determine the correct location mnemonic to use.

1.0 Navigate to the (Alias) option.

Screenshot 6-0 Location Mnemonics (Settings Dialog) box

7.0 Location Mnemonics (Settings Dialog) box 

If you select Distribution List as the location mnemonics delivery type you must specify other location mnemonics reports that are to be sent when they are processed by the Distribution List location mnemonic. Although you can define and save a Distribution List location mnemonic that does not have distribution locations included, it is not useful until you have specified at least one Windows Folder location mnemonic report that is sent.

1.0 Navigate to the (Distribution List) option.

Screenshot 7-0 Location Mnemonics (Settings Dialog) box

8.0 Location Mnemonics Settings (Settings Dialog) box

To login to the NetSafe Client users are required to enter a user name and password. As of version 1.1.1.n, NetSafe allows for the use of Active Directory accounts for logging into a NetSafe Client. The Active Directory settings allow you to specify, enable, and disable Active Directories and Security Groups.

Active Directory settings can be defined either globally, for all location mnemonics, or for an individual location mnemonic. This section describes the elements for specifying Active Directory settings for an individual location mnemonic. To specify the Active Directory settings for all location mnemonics,

1.0 Navigate to the (Active Directory) option.

Screenshot 8-0 Location Mnemonics (Settings Dialog) box

 

 

NetSafe (Table Templates Overview) 100-0043-00

 

1.0 Introduction

This document is for the following Interbit Data products, NetSafe Administrator. This explains the topic of Table Templates.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of NetSafe Table Templates.

2.0 Overview

When patient reports are distributed to a NetSafe Client, the display of the data about the report is determined by a predefined data structure. This data structure defines a table for both displaying the data, and the order in which those data are displayed.

This document will explain how to define a Table Template within the NetSafe administrator, and how to use Table Templates in a NetSafe Client. 

  1. Define a printer the reports are to be sent.
  2. Define a Table Template within NetSafe Administrator.
  3. Associate Location Mnemonics to a specific Table Template.
  4. View Table Templates in NetSafe Client.

3.0 Define a printer the reports are to be sent

When reports are distributed to a NetSafe Client the display of the data is determined by a pre-defined data structure. This data structure identifies the data to be displayed, and the order in which data is displayed. 

If the pre-defined data structure does not meet the requirements of your organization, NetSafe Administrator provides you with the functionality to import a user defined data structure by creating a Table Template. 

Note: Creating a Table Template enables you to display in the NetSafe Client the desired data. 

3.1 Data Structure

The first step in implementing a Table Template is to create a report in your HCIS that contains the data structure and the data that you want to display.  This report must be a delimited text file that specifies the data types (columns), and the order in which the data is displayed.

Screenshot 1-0 Report (Defining Data Structure)

3.2 Data Structure (Header Row)

The data structure of the report is defined by the header row, the first row in the report.  The header row identifies the data to be displayed and the order in which they are displayed. 

Screenshot 2-0 Report (Header Row)

3.3 Data Structure (Bar Character)

Each field in the data structure must be identified by a delimiter. In this case a bar character. NetSafe recognizes whatever data structure format you define.     

Screenshot 3-0 Report (Bar Character)

3.4 Data Structure (Report Header)

All data fields in the report’s header must be included in each entry. There are 15 data fields in the header. Several of the entries, are null fields. These must be accounted for by leaving them empty.

Screenshot 4-0 Report (Header)

3.5 Data Structures (Spaces)

The spaces seen in this file are intended to make the report easier to read. They are not required in the report sent to NetSafe.

Screenshot 5-0 Report (Spaces)

4.0 Define a Table Template within NetSafe Administrator (Creating a Virtual LPD Printer)

After the report has been created, you need to specify how to import the report into NetSafe. This is done by creating a virtual LPD printer the report is sent by your HCIS, and from which NetSafe receives the report. Depending on which HCIS your organization uses, you may need to define the LPD printer from within the HCIS or define a Windows printer. 

Screenshot 6-0 Printers and Faxes (Creating a Virtual LPD Printer)

4.2 LPD Queue Name assigned to the Printer

No matter which method you use for creating the printer, the important thing to remember is the LPD Queue Name assigned to the printer. This is the name used when creating the Table Template within NetSafe. NetSafe determines which Table Template to use based on the LPD queue name from which the report is received.

Note: Previously created a Windows printer that uses the LPD Queue Name of TestTemplate3.

Screenshot 7-0 Printers and Faxes (LPD Queue Name assigned to the Printer)

4.3 Printers and Faxes (General) tab

  • Select Printer Properties
  • Select the General tab

2.0 Verify the name of the printer TestTemplate3.

Screenshot 8-0 General tab (TestTemplate3)

4.4 Printers and Faxes (Ports) tab

  • Select the Ports tab
  • Verify the select the Test Standard TCP/IP Port TestTemplate3 check box is checked

Screenshot 9-0 Ports tab (TestTemplate3)

4.5 Printers and Faxes (Ports) tab

  • Select the Configure Port icon

Screenshot 10-0 (Configure Ports) icon

4.6 Configure Standard TCP/IP Port Monitor (Port Settings)

  • Navigate to the Port Settings tab
  • Verify TestTemplate3 is the Port Name
  • Verify TestTemplate3 is in the Printer Name or IP Address entry box

Screenshot 11-0 (Port Settings) tab

4.7 Configure Standard TCP/IP Port Monitor (Port Settings)

1.0 Verify the name TestTemplate3 is in the Queue Name entry box.

Screenshot 12-0 (Queue Name) entry box.

5.0 NetSafe Administrator login

After the report has been created in your HCIS, and the LPD printer defined, you are ready to specify the Table Template in the NetSafe Administrator, and to associate at least one location mnemonic with that template.

Screenshot 13-0 Login

5.1 Table Template tab

  1. From the NetSafe Administrator menu, click the Table Template tab.

Screenshot 14-0 NetSafe Administrator (Table Template) tab

5.2 Table Template

  1. Select the (Add) icon.

Screenshot 15-0 NetSafe Administrator (Table Template) tab

5.3 Table Template Settings (Table Template)

In the Table Templates Setting dialog box, enter the name of the template in the Template Name text entry box. What is entered in the box is important. The text string must match exactly the LPD queue name from which the reports are received. This is the LPD queue name that is mentioned earlier in this document. If this name does not match the LPD queue name, the reports will not be received by NetSafe.

Screenshot 16-0 Table Template Settings (Table Template) entry box

5.4 Table Template Setting (Template Name)

  1. Enter the name for the Table Template.
  2. You must enter text into this field.
  3. This can be any text string, but it is recommended that you enter a name that helps you identify the purpose of the table template.

Screenshot 17-0 Table Template Setting (Template name) entry box

5.5 Table Template Setting (Template Name)

  1. Enter the name of the template.
  2. This name must match the LPD Queue name exactly.

Screenshot 18-0 Table Template Setting (Template Name) entry box

5.6 Table Template Setting (Table Name)

  1. Enter the Table Name.

Screenshot 19-0 Table Template Setting (Table Name) entry box

5.7 Table Template Setting (Database name)

  1. Enter into the (Database Name text entry box) the name of the database the reports are sent.
  2. This can be a new database name, or one used and specified in another Table Template.

Screenshot 20-0 Table Template Setting (Database name) entry box

5.8 Table Template Setting (Description)

  1. Entering text in the Description text entry box is optional but recommended.

Screenshot 21-0 Table Template Setting (Description) entry box

5.9 Table Template Setting (Separator String)

  1. Enter in the Separator String text entry box the delimiter used in the imported report.
  2. The default is the bar character.

Screenshot 22-0 Table Template Setting (Separator String) entry box

5.10 Table Template Setting (Enable check box)

  1. Verify the Enabled check box is selected.
  2. If this check box is clear, the Table Template will not process reports.

Screenshot 23-0 Table Template Setting (Enable) check box

5.11 Table Template Setting (Delete Table Before Insertion)

  1. If the Delete Table Before Insertion check box is selected the data previously imported into the table template is deleted and the new data is imported.

Screenshot 24-0 Table Template Setting (Delete Table Before Insertion) check box

5.12 Table Template Setting (Save) icon

  1. Click Save and the Table Template is created and added to the list of Table Templates.
  2. You can create as many Table Templates as needed.

Screenshot 25-0 Table Template Settings (Save) icon

6.0 Associate Location Mnemonics to a specific Table Template

  1. After the Table Template is defined you must associate at least one location mnemonic with that template.

Screenshot 26-0 Table Template (Associate Location Mnemonics to a specific)

6.1 Table Template

  1. Highlight a table Template, click Add next to the Table Templates Location Mnemonics list to associate a Location Mnemonic to that highlighted Table Template.
  2. Select the desired Location Mnemonic.
  3. Select Add.

Note: If you click Add All, all the Location Mnemonics will be associated with that Table Template.

Screenshot 27-0 Table Template (Add) icon

6.2 Select Location Mnemonics

  1. Once a Table Templates is created and a Location Mnemonic associated with it, it is ready to receive reports.

Note: To see the reports, log in to the NetSafe Client for that Location Mnemonic. 

Screenshot 28-0 Select Location Mnemonics

6.3 Associate a Location Mnemonics

You can associate a Location Mnemonic to more than one Table Template. If you do not associate at least one location mnemonic with a Table Template, reports will not be properly processed by NetSafe.

Screenshot 29-0 Associate a Location Mnemonics

6.4 Table Template (Add all) icon

When a report is sent to and processed by a Table Template, the report is distributed to all the Location Mnemonics associated with that Table Template.

Screenshot 30-0 Add all icon

7.0 NetSafe Client Login (Select Certificate)

When logging in to the NetSafe Client, select from the Select Certificate and Select Database drop-down lists the entries for the Location Mnemonic that uses Table Templates, and then enter the appropriate password.

When the NetSafe Client opens all the reports received by that Client for the entry selected from the Select Database drop-down list displays. This may take some time to complete, depending on the size of the report that was sent to NetSafe.

Note: Notice the data structure displayed here is the one specified in the report file sent to NetSafe; the one which I showed you at the beginning of the tutorial. 

Screenshot 31-0 NetSafe Client Login (Select Certificate)

7.1 NetSafe Client Login (Select Database)

  1. Login to the NetSafe Client Login (Select Database).

Screenshot 32-0 NetSafe Client Login (Select Database)

7.2 NetSafe Client Login (Enter Password)

  1. Enter the Password.
  2. Select the (Open) icon.

Screenshot 33-0 NetSafe Client Login (Enter Password)

7.3 Location Mnemonics (Table Templates)

If the Location Mnemonic is associated to more than one Table Template, you can select a different Table Template from the Table Template drop-down list. The NetSafe Client displays all the reports received by that Client for the selected Table Template. Notice how the data structure changes to reflect the newly selected Table Template. 

  1. Select TestTemplate4.

Screenshot 34-0 NetSafe Client (TestTemplate3)

7.4 Location Mnemonics (Table Templates)

The (Select Table) drop down list. If the Location Mnemonic is associated with one more than one Table Template. The NetSafe Client displays all the reports received by that Client for the selected Table Template.

  1. Select TestTemplate4.

Screenshot 35-0 NetSafe (TestTemplate 4)

7.5 Location Mnemonics (Table Templates)     

  1. The data structure here is the same one used in 3.2 in this document.

Screenshot 36-0 NetSafe (Data structure)

 

NetSafe (Template Recipient Group) 100-0044-00

 

1.0 Introduction

This document is for the following Interbit Data products, NetSafe. This explains the topic of Template Recipient Group.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Template Recipient Group.

2.0 Overview

In NetSafe Administrator the Template Recipient Group setting, is used to provide the user with a faster way to apply Include/Exclude list to multiple templates.

3.0 NetSafe (Template Recipient Groups)

1.0 Navigate to the (Template Recipient Group) setting.

Screenshot 1-0 NetSafe (Template Recipient Groups)

3.1 NetSafe (Template Recipient Groups)

1.0 Select the (Template Recipient Group) setting.

Screenshot 1-1 NetSafe (Template Recipient Groups)

3.2 NetSafe (Template Recipient Groups) Template Recipient Group

The settings for Template Recipient Groups are highlighted.

Screenshot 1-2 NetSafe (Template Recipient Groups)  Template Recipient Group

3.3 NetSafe (Template Recipient Groups) Template Recipient Group, Add

1.0 Select the (Add) icon to add a new group.

Screenshot 1-3 NetSafe (Template Recipient Groups) Template Recipient Group, Add

3.4 NetSafe (Template Recipient Groups) Template Recipient Group Settings, Window

1.0 Verify the (Template Recipient Group Settings) window pops up.

Screenshot 1-4 NetSafe (Template Recipient Groups) Template Recipient Group Settings, Window

3.5 NetSafe (Template Recipient Groups) Template Recipient Group Settings, Delete

1.0 Enable or Disable the group by selecting the check box.

Screenshot 1-5 NetSafe (Template Recipient Groups) Template Recipient Group Settings, Delete

3.6 NetSafe (Template Recipient Groups) Template Recipient Group Settings, Delete

If you are populating your Template Recipient Groups by import. This setting will delete the old data and create a new group with a new name. This gives it a clean slate to work with.

1.0 Select the (Delete Group List on Import) check box.

Screenshot 1-6 NetSafe (Template Recipient Groups) Template Recipient Group Settings, Delete

3.7 NetSafe (Template Recipient Groups) Template Recipient Group Settings, Create

1.0 Name your group then select the (Create) icon.

Screenshot 1-7 NetSafe (Template Recipient Groups) Template Recipient Group Settings, Create

3.8 NetSafe (Template Recipient Groups) Recipients

Once your group is created, highlight the Group.

1.0 Navigate to the Recipients area.

Screenshot 1-8 NetSafe (Template Recipient Groups) Recipients

3.9 NetSafe (Template Recipient Groups) Add

1.0 Select the (Add) icon.

Screenshot 1-9 NetSafe (Template Recipient Groups) Add

3.10 NetSafe (Template Recipient Groups) Select Location Mnemonics, Save

You can select one recipient location at a time to add to you Template Recipient Group. Repeat the process to add to your Template Recipient Groups.

1.0 Verify the (Select Location Mnemonics) window pops up.

Screenshot 1-10 NetSafe Template Recipient Groups (Select Location Mnemonics) Save

4.0 NetSafe (Report Template)

1.0 Navigate to the Report Templates.

Screenshot 1-11 NetSafe (Report Template)

4.1 NetSafe (Report Template)

1.0 Select the Template you want  to work with.

Screenshot 1-12 NetSafe (Report Template)

4.2 NetSafe (Report Template)

You can include or exclude by group.

1.0 Select the (Add) icon.

Screenshot 1-13 NetSafe (Report Template)

4.3 NetSafe (Report Template)

1.0 Verify the (Select Template Recipient Group) pop up window appears.

2.0 Select the (Select) icon.

Screenshot 1-14 NetSafe (Report Template)

4.4 NetSafe (Report Template)

Template Level Permission area.

Screenshot 1-15 NetSafe (Report Template)

5.0 NetSafe (Report Template)

You have to add locations one at a time to the Included Excluded list. This process is time consuming when you populate the list for multiple templates. This is when the Template Recipient Groups become useful.

Screenshot 1-16 NetSafe (Report Template)

5.1 NetSafe (Report Template)

The Template Recipient Groups contains a list of locations. Template Recipient Groups you only have to add locations to a list once. 

Screenshot 1-17 NetSafe (Report Template)

5.2 NetSafe (Report Template)

You can quickly populate multiple templates with specific Template Recipient Groups.

Screenshot 1-18 NetSafe (Report Template)

 

NetSafe (Data Capture Concepts) 100-0082-00

 

1.0 Introduction

This document is for the following Interbit Data products, NetSafe. This explains the topic of Data Capture Concepts.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Data Capture Concepts.

2.0 Overview

NetSafe Routes Reports by capturing Data and performing actions based on that Data. The Data Capture concepts are identified.

  • Identify text to be captured
  • Identify Static Starting Point (First Book End)- When to start capturing information.
  • Identify Static Ending Point (Second Book End)- When to stop capturing information.
  • Book Ends – Static text on the report that never changes. Header information that can be keyed off.

3.0 NetSafe (First Book End)

The First Book End is Location:

Screenshot 1-0 NetSafe (First Book End)

4.0 NetSafe (Second End Book)

The Second Book End is RM:

Screenshot 1-1 NetSafe (Second Book End)

5.0 NetSafe (Book End the Data)

Everything in the middle is captured data.

Screenshot 1-2 NetSafe (Book End the Data)

6.0 NetSafe (Captured Data)

Clinic A is the captured data.

Screenshot 1-3 NetSafe (Captured Data)

7.0 NetSafe (Ending Book End)

The Ending Book End has some flexibility. The static text doesn’t always have to be a text string.

Screenshot 1-4 NetSafe (Ending Book End)

8.0 NetSafe (Example Stop Strings)

The Stop string can be set to end at the hex code that represents the Space character or End of Line character string. If the data trying to be captured is a fixed five characters long NetSafe can stop capturing information after five characters.

  • 0x20 hex code for “Space”
  • 0x0DOA hex code for “End Of Line”
  • Stop after moving “X” characters

9.0 NetSafe (Basic Data Capturing)

Positioning the curser to the starting point and then setting the stopping point. On some reports it is very straight forward but on other reports it can be more complex.

Screenshot 1-5 NetSafe (Basic Data Capture)

 

NetSafe (E-mail Alert Notification) 100-0083-00

 

1.0 Introduction

This document is for the following Interbit Data products, NetSafe. This document explains the topic of Email Alert Notification.

NetSafe receives reports from an HCIS. The application then processes the reports through a set of rules (Templates) which separate the report, determines how to route the report, and give the report a filename. NetSafe then proceeds to send the report to remote workstations in the hospital. 

Throughout the usual NetSafe workflow reports may fail to arrive, fail to deliver, or get held up within the application. When this happens, NetSafe sends alerts via Email Alert Notification informing administrators that a report failed to process properly. The NetSafe administrators reviews the Email Alert Notification and takes proper action to resolve the root-cause of the failure.

2.0 Overview

NetSafe sends alerts via Email Notification so that NetSafe administrators are informed when a document fails to process through NetSafe application properly.  Documents process through NetSafe in the following order.

Order of Operations within NetSafe.

  • LPD Agent – Receives reports from an HCIS
  • Processing Agent – Processes the reports through a Template
  • Relay Agent – Delivers reports to workstations throughout hospital
  • Alert Agent – Monitors the other agents for failure

Each Agent acts as a check point keeping tabs on which reports were received and processed, and the time this occurred. An Alert Agent consults with the other Agents to see if there was a failure.

3.0 NetSafe (Email Notification) Alert Notification

1.0 Navigate to the Alert Notification area.

Note: Notice the variety of Alerts that can be enabled at different check points within NetSafe.

Reference section 3.8 of this document 100-0083-00 for more detail on the Alerts.

Screenshot 1-0 NetSafe (Email Notification) Alert Notification

3.1 NetSafe (Setting an Alert)

In screenshots 1-1, 1-2 below there is an example of Setting an Alert for the Relay Queue Pending database, which is responsible for delivering reports to a remote workstation.

1.0 Highlight the Relay Queue Pending.

Screenshot 1-1 NetSafe (Setting an Alert)

2.0 Select the (Edit) icon.

3.0 Verify the (Edit Alert Notification) window pops up.

Screenshot 1-2 NetSafe (Setting an Alert)

3.2 NetSafe (Edit Alert Notification) 

To enable this Alert (Relay Queue Pending).

1.0 Select the (Enable) check box.

Screenshot 1-3 NetSafe (Setting an Alert)

3.3 NetSafe (Edit Alert Notification) 

The Option (Enable Event Log Notification) will write a message to the windows event log if this alert is triggered.

1.0 Select the (Enable Event Log Notification) check box.

Screenshot 1-4 NetSafe (Email Alert Notification)

3.4 NetSafe (Edit Alert Notification)

The Edit Alert Notification window, indicates how long a report must be stuck in the Relay Queue Pending before it triggers the Alert Notification.

Example:

If a report cannot be delivered from the NetSafe server to a workstation, after one hour an Alert Notification is emailed.

Screenshot 1-5 NetSafe Administrator (Edit Alert Notification)

3.5 NetSafe (Email Notification Frequency)

Email Notification Frequency specifies how often an Email Notification will be sent out after the first initial Notification.

In this example thirty minutes after an Email Notification goes out another Email Notification will go out.

The frequency of the Email Notification will continue until an administrator addresses the issue.

1.0 Select the Save icon to save your settings.

Screenshot 1-6 NetSafe (Email Notification Frequency)

3.6 NetSafe (Receiving the Email Notification)

Who receives the Email Alert Notifications is defined here in the Email Recipients table.

1.0 Select the Add icon.

Screenshot 1-7 NetSafe (Receiving the Email Alert Notification)

3.7 NetSafe (Alert Notification Recipient)

1.0 Verify the Alert Notification Recipient window pops up.

2.0 Enter in the email address first and last name of the recipient.

Screenshot 1-8 NetSafe (Alert Notification Recipient)

3.8 Email Alert Notification Types table

The queues that display in the E-mail Alert Notifications list are listed and described in the following table. Also described are the types of notification alerts that can be configured. 

Table1-0 E-mail Notification Alerts

Queue

Description

LPD Queue — Pending

Send alert for no new jobs in queue for:

An e-mail alert is created when the amount of time between the current time and the last time that the LPD agent processed a report exceeds the specified time frame. The subject for this e-mail reads:

LPD Queue: Send Alert for jobs that cannot be delivered that are older than n day, n hour, n minute

Possible reasons the LPD agent has not processed a report within the specified time frame are that the HCIS has been disrupted, or the LPD agent has stopped responding.

The alert works by subtracting the time when the last report was processed from the current time.

LPD Queue — Pending

Send alert for jobs that cannot be delivered that are older than:

An e-mail alert is created informing the recipient that there is a downloaded report in LPD Queue — Pending that cannot be processed by the processing agent. The alert is generated when the report has been in the queue longer than the amount of time specified in the alert’s setup. The subject for this e-mail reads:

LPD Queue: Send Alert for no new jobs in queue n day, n hour, n minute.

A possible reason that a report cannot be processed is that there is a problem with the distribution template that processed the report. For example, the template might be set up incorrectly and cannot locate the required text on the report.

The alert works by subtracting the submit time for the downloaded report from the current time.

Relay Queue — Completed

Send alert for no new jobs in queue for

An e-mail alert is created that informs the recipient that a report has not been submitted to the Relay Queue — Completed when the amount of time between the current time and the last time a report was submitted to the queue exceeds the amount of time specified in the alerts setup. The subject for this e-mail reads:

Relay Queue – Completed: Send Alert for no new jobs for n day, n hour, n minute

Possible reasons the Relay Queue — Completed has not processed a report within the specified time frame are that communication between the Relay agent and the processes sending reports to Relay Queue — Pending has been disrupted, or the Relay agent has stopped responding.

The alert works by subtracting the time when the last report was submitted to the queue from the current time.

Relay Queue — Error

Send alert for jobs in queue older than:

An e-mail alert is created that informs the recipient that a report has been in Relay Queue — Error longer than the amount of time specified in the alert’s setup. The subject for this e-mail reads:

Relay Queue – Error: Send Alert for entries older than n day, n hour, n minutes.

Possible reasons for entries to be in the Relay Queue — Pending include:

  • When a windows folder location is unavailable, and the alternate delivery folder is enabled, entries will be moved from the Relay Queue — Pending to this database
  • There was a problem processing the report where the report was deleted (this is a very rare occurrence). The alert works by subtracting the time when the last report was submitted to the queue from the current time

Relay Queue — Pending

Send alert for jobs that cannot be delivered for

An e-mail alert is created that informs the recipient that there is a downloaded report in Relay Queue — Pending that has not been processed by the processing agent within the specified amount of time. The alert is generated when the report has been in the queue longer than the amount of time specified in the alert’s setup. The subject for this e-mail reads:

Relay Queue – Pending: Send Alert for jobs that cannot be delivered for n day, n hour, n minute.

The alert works by subtracting the time that the report was submitted to the queue from the current time.

Relay Queue — Pending

Send alert when the CheckSum Hash values do not match for the delivered database.

An e-mail alert is created that informs the recipient that an encrypted database was delivered but the hash values of the source and destination file did not match. There have been cases in the past where zero-byte files have been delivered to a destination folder. This alert is designed to catch those occurrences and notify the corresponding email recipient about the issue.

If the hash values do not match, an entry is placed into a table that the alert agent monitors. Once an entry is found, the information is sent to the email recipient.

Note: Only the email frequency is used in this alert as the days, hours, and minutes have no effect on this email alert.

Unknown Location

An e-mail alert is created that informs the recipient that there is a report in Unknown Location. The alert is generated when the report has been in Unknown Location longer than the amount of time specified in the alert’s setup. The subject for this e-mail reads:

Unknown Handler: Send Alert for entries older than n day, n hour, n minute

The reason that a report is in Unknown Location is that when a report is processed using a report distribution template, a location mnemonic or alias for the intended location could not be found in the Location Mnemonics.

The alert works by subtracting the time that the report was submitted to Unknown Location from the current time.

Table13

The Alert Notifications area also provides the following information for each e-mail alert notification:

  • Whether alert notification is enabled
  • An internally generated notification number used by Interbit Data Customer Support to troubleshoot the system
  • The notification description, including:
  • The name of the queue that is being monitored
  • The message that is included in the e-mail message when an alert is sent about that queue
  • The number of days/hours/minutes that define the time frame for the sending of an e-mail alert notification
  • The number of days/hours/minutes that define the time frame for generating an alert

 

NetSafe (Agent Overview) 100-0085-00

 

1.0 Introduction

This document is for the following Interbit Data products, NetSafe. This explains the topic of Agents Overview.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This explains the topic of Agents Overview.

2.0 Overview

This document describes the topic of Agents Overview within NetSafe.

  • LPD Agent
  • Processing Agent
  • Relay Agent

3.0 LPD Agent

  • Listens on Port 515 for report
  • Puts Reports into LPD Pending
  • Handles inbound traffic

4.0 Processing Agent

  • Processes Reports in LPD Pending
  • Logs to the Distribution Reports
  • Hands off to Relay Pending
  • Handles inbound traffic

5.0 Relay Agent

  • Controls Outbound Delivery
  • Needs Permissions to Client Locations
  • Relay Completed
  • Outbound traffic

6.0 Process Flow

This is the order of operations within NetSafe.

Screenshot 1-0 Process Flow

7.0 Inbound Traffic

The LPD Agent and the Processing Agent handle inbound traffic.

Screenshot 1-1 Inbound Traffic

8.0 Outbound Traffic

The Relay Agent handles the outbound traffic.

Screenshot 1-2 Outbound Traffic

9.0 LPD Agent

The LPD Agent listens on port 515 for reports. When a report comes in it takes the report and puts it into LPD Pending.

Screenshot 1-3 Outbound Traffic

10.0 Processing Agent

The Processing Agent takes the report from LPD Pending and applies the template rules to the report separating and finding the location of the report.

Screenshot 1-4 Processing Agent

11.0 Processing Agent

The Processing Agent logs its findings to the distribution reports and hands its finding to Relay Pending. The entry then goes into LPD Processed showing it has completed its tasks.

Screenshot 1-5 Processing Agent

12.0 Relay Agent

The Relay Agent now knows where the report is supposed to go delivery the report to the client location.

Once the delivery is successful it drops the entry into Relay Completed and then goes back to Relay Pending to work on the next task.

Screenshot 1-6 Relay Agent

13.0 Process Flow

This is the order of operations within NetSafe. If there are any issues check with the Agents to see where the issue is.

Screenshot 1-7 Process Flow

 

NetSafe (Basic Report Template Understanding) 100-0086-00

 

1.0  Introduction

This document is for the following Interbit Data products, NetSafe. This explains the topic of Basic Report Template Understanding.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Basic Report Template Understanding.

2.0 Overview

The prerequisite reading for this document is 100-0082-00 NetSafe Data Capture Concept.

This document explains the topic of Basic Report Template Understanding.

3.0 NetSafe (Report Templates)

This is where Report Templates are created. The Report Templates tell NetSafe where to go on the report to find out where to send the report and how to create the filename of the processed report.

1.0 Navigate to the (Report Templates) settings.

Screenshot 1-0 NetSafe (Report Templates)

3.1 NetSafe (Report Templates)

To build a new template.

  1. Select the (Report Templates) settings.
  2. Select the (Add) icon.

Screenshot 1-1 NetSafe (Report Templates)

3.2 NetSafe (Template Settings) Template Information, Template Details

  1. Verify the (Template Settings) window pops up.
  2. Select the (Template Information) setting.

Screenshot 1-2 NetSafe (Template Settings) Template Information, Template Details

3.3 NetSafe (Template Settings) Template Information, Template Details

The template name needs to match the report that is coming over from the HCIS. A quick description of what this template is for. The entry date will show when this template was created. Last edit will show the last time the (Save) icon was selected.

  1. Navigate to the (Template Details) area
  2. Enter the name into the (Template Name) entry box
  3. Enter the description into the (Description) entry box

Screenshot 1-3 NetSafe (Template Settings) Template Information, Template Details

3.4 NetSafe (Template Settings) Template Information, Report Location Selection

If the report needs to be separated out the advanced options are selected.

  1. Navigate to the (Report Location Selection)

Screenshot 1-4 NetSafe (Template Settings) Template Information, Report Location Selection

3.5 NetSafe (Template Settings) Template Information Template Level Permissions

If the report needs to be separated out the advanced options are selected.

  1. Navigate to the (Template Level Permissions) area.

Screenshot 1-5 NetSafe (Template Settings) Template Information, Template Level Permissions

3.6 NetSafe (Template Settings) Report Location Destinations, Destination Location

This is where data fields are defined that capture data off the report. This captured data will be used to determine where the reports go.

  1. Navigate to the (Destination Locations) area.

Screenshot 1-6 NetSafe (Template Settings) Report Location Destinations, Destination Location

3.7 NetSafe (Template Settings) Report Location Destinations, Destination Location

To build a rule.

  1. Select the (Add) icon.

Screenshot 1-7 NetSafe (Template Settings) Report Location Destinations, Destination Location

3.8 NetSafe (Location Field Settings) Description

A description of the data filed is for.

  1. Navigate to the (Description) entry box.

Screenshot 1-8 NetSafe (Location Field Settings) Description

3.9 NetSafe (Location Field Settings) Description

Example report.

  1. Enter the information into the (Description) entry box.

Screenshot 1-9 NetSafe (Location Field Settings) Description

3.10 NetSafe (Location Field Settings) Description

Example Report is in green. Keying off the Location text string in red. The description will be (Location).

  1. Enter (Location) into the description entry box.

Screenshot 1-10 NetSafe (Location Field Settings) Description

3.11 NetSafe (Location Field Settings) Location Specifier Table, Add

This is where the first book-end is defined. (Location) in red.

  1. Select the (Add) icon.

Screenshot 1-11 NetSafe (Location Field Settings) Location Specifier Table, Add

3.12 NetSafe (Location Field Settings) Location Specifier Edit

The first book-end (Location).

  1. Add (Location) into the (Text Identifier) entry box.

Screenshot 1-12 NetSafe (Location Field Settings) Location Specifier Edit

3.13 NetSafe (Location Field Settings) Location Specifier Edit, Count

The first instance of (Location) in the forward direction. Starting at the top of the report NetSafe will read the text from top to bottom and left to right.

Screenshot 1-13 NetSafe (Location Field Settings) Location Specifier Edit. Count

3.14 NetSafe (Location Field Settings) Location Specifier Edit, Count

NetSafe will read all the text until it finds the text string location. Only looking for the first instance of (Location) it will stop at the (location) in the header.

Screenshot 1-14 NetSafe (Location Field Settings) Location Specifier Edit, Count

3.15 NetSafe (Location Field Settings) Location Specifier Edit, Save

  1. Select the (Save) icon.

Screenshot 1-15 NetSafe (Location Field Settings) Location Specifier Edit, Save

3.16 NetSafe (Location Field Settings) Location Specifier Table

Now the curser is at the beginning of the text string (Location). It is right before the (L) so that is the starting capture point. From here it will start capturing information until we tell NetSafe to stop.

Screenshot 1-16 NetSafe (Location Field Settings) Location Specifier Table

3.17 NetSafe (Location Field Settings)

We do not want the field (Location) to be captured. The curser needs to be moved to the end of the word (Location).

Screenshot 1-17 NetSafe (Location Field Settings)

3.18 NetSafe (Location Field Settings) Field Properties

This is where the off-set count comes in. The ability to manually count out how many characters we need to move.

Screenshot 1-18 NetSafe (Location Field Settings)

3.19 NetSafe (Location Field Settings) Field Properties

Or you can select the (…) Ulises icon to automatically count out how many characters the cursor needs to move to be at the end of the colon at the end of (Location) . Now the curser is set at the end of the colon in (Location) from there it will start capturing information until it is told to stop.

Screenshot 1-19 NetSafe (Location Field Settings) Field Properties

3.20 NetSafe (Location Field Settings) Field Length

The stop stream is set to (RM).

Screenshot 1-20 NetSafe (Location Field Settings) Field Properties

3.21 NetSafe (Location Field Settings) Field Length

We can enter the stop stream here.

Screenshot 1-21 NetSafe (Location Field Settings) Field Properties

3.22 NetSafe (Location Field Settings) Location Specifier Table, REVIEW

We told NetSafe to go find (Location).

Screenshot 1-22 NetSafe (Location Field Settings) Field Properties

3.23 NetSafe (Location Field Settings) Field Properties, REVIEW

  1. Move the starting capture point to the end of the colon.

Screenshot 1-23 NetSafe (Location Field Settings) Field Properties

3.24 NetSafe (Location Field Settings) Field Length, REVIEW

  1. Start capturing information until NetSafe finds the text string (RM).

Screenshot 1-24 NetSafe (Location Field Settings) Field Properties

3.25 NetSafe (Location Field Settings) Captured Data, REVIEW

Every time NetSafe finds the string it puts the curser at the beginning of the field. The curser stops before the R in (RM) leaving the captured data of (Clinic A).

Screenshot 1-25 NetSafe (Location Field Settings) Field Properties

3.26 NetSafe (Location Field Settings) Save

  1. Select the (Save) icon.

Screenshot 1-26 NetSafe (Location Field Settings) Field Properties

3.27 NetSafe (Template Settings) Report Location Destinations, Destination Locations

There is one location search rule built in the destination locations area.

Screenshot 1-27 NetSafe (Template Settings) Report Location Destination Locations

3.28 NetSafe (Template Settings) Report Location Destination Locations, Add

To identify a second location to send a report to. Select the Add icon and build the second rule.

  1. Select the (Add) icon.

Screenshot 1-28 NetSafe (Template Settings) Report Location Destination Locations

3.29 NetSafe (Template Settings) Report Location Destinations, Default Location Mnemonic

Regardless of any rule always send a copy of the report to a specific location mnemonic or distribution list.

Screenshot 1-29 NetSafe (Location Field Settings) Field Properties

3.30 NetSafe (Template Settings) Filename Template

  1. Navigate to the (File Name Template) setting.

Screenshot 1-30 NetSafe (Template Settings) Filename Template

3.31 NetSafe (Template Settings) Filename Template, Filename Template

The filename created here will show up in NetSafe Client and NetSafe Administrator. The information placed into the filename template section is how the filename will be produced. In this example I want my filename to always start with the name of the report.  

Screenshot 1-31 NetSafe (Template Settings) Filename Template

3.32 NetSafe (Template Settings) Filename Template

To pull out the patient name and the (MRN) number from the report and add it to the filename. To do that use the %F option in the filename. The %F will create data fields that will allow the building of rules to pull the information off the report.

Screenshot 1-32 NetSafe (Template Settings) Filename Template

3.33 NetSafe (Template Settings) Filename Template

To add a date stamp to the filename use %D option.

Screenshot 1-33 NetSafe (Template Settings) Filename Template

3.34 NetSafe (Template Settings) Filename Template

Selecting the (Create) icon will generate the amount of data fields I have in relation to the amount of %F I have in the filename.

Screenshot 1-34 NetSafe (Template Settings) Filename Template

3.35 NetSafe (Template Settings) Filename Template

  1. Selecting the (Edit) icon

Screenshot 1-35 NetSafe (Template Settings) Filename Template

3.36 NetSafe (Template Settings) Filename Template, Report File Name Properties

This field is for the patient field.

Screenshot 1-36 NetSafe (Template Settings) Filename Template

3.37 NetSafe (Template Settings) Filename Template, Report File Name Properties

Build a search rule.

  1. Capture the patient name
  2. The starting point to capture the patient name is the text string (Patient)
  3. Select the (…) Ulises icon to move the curser to the end of the colon

Screenshot 1-37 NetSafe (Template Settings) Filename Template

3.38 NetSafe (Template Settings) Filename Template, Report File Name Properties

  1. Enter the soft string of (MRN).

Screenshot 1-38 NetSafe (Template Settings) Filename Template

3.39 NetSafe (Template Settings) Filename Template, Report File Name Properties

  1. Select the (Save) icon.

Screenshot 1-39 NetSafe (Template Settings) Filename Template

3.40 NetSafe (Template Settings) Filename Template, Report File Name Properties

  1. Navigate to field 2.
  2. Select the (Edit) icon.

Screenshot 1-40 NetSafe (Template Settings) Filename Template

3.41 NetSafe (Template Settings) Filename Template, Report File Name Properties

  1. Plug in the information to identify the field MRN number.

Screenshot 1-41 NetSafe (Template Settings) Filename Template

3.42 NetSafe (Template Settings) Filename Template, Report File Name Properties

  1. The stop string is the MRN 5-character number.

Screenshot 1-42 NetSafe (Template Settings) Filename Template

3.43 NetSafe (Template Settings) Filename Template, Report File Name Properties

  1. Stop capturing data after 5-characters.

Screenshot 1-43 NetSafe (Template Settings) Filename Template

3.44 NetSafe (Template Settings) Filename Template, Report File Name Properties

  1. Select the (Save) icon to save this rule.

Screenshot 1-44 NetSafe (Template Settings) Filename Template

3.45 NetSafe (Template Settings) Filename Template, Report File Name Properties

  1. Select (Save) to save entire changes made to this template.

Screenshot 1-45 NetSafe (Template Settings) Filename Template

3.46 NetSafe (Template Settings) Filename Template, Report File Name Properties

To verify if the Rules where built correctly, the first report through to NetSafe for this template will determine if it was set up correctly. Or you can resubmit an existing report.

Screenshot 1-46 NetSafe (Template Settings) Filename Template

3.47 NetSafe (Template Settings) Report Logs

  1. Select the drop-down on Template Name. Choose the template that was created.
  2. Select (Load Filter).

The report processed is shown:

  • NetSafe was able to identify the Location Mnemonics
  • NetSafe was able to generate the File Name
  • NetSafe was able to generate the MRN number off the report

Screenshot 1-47 NetSafe (Template Settings) Report Logs

 

NetSafe (Understanding Include Exclude List) 100-0088-00

 

1.0 Introduction

This document is for the following Interbit Data products, NetSafe. This explains the topic of Include or Exclude permissions.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Include or Exclude permissions.

2.0 Overview

This document explains how NetSafe can limit who gets the report using the Included or Excluded permissions.

3.0 NetSafe (Report Routing)

NetSafe can limit who gets the report using the Included or Excluded permissions.

  • Report routing in NetSafe going to multiple locations

Screenshot 1-0 NetSafe (Multiple Locations)

  • You don’t want the report to go to certain locations

Screenshot 1-1 NetSafe (Certain Locations)

3.1 NetSafe Administrator (Report Templates) Edit

  1. Select a Template Name.
  2. Select an (Edit) icon.

Screenshot 1-2 NetSafe (Report Templates)

3.2 NetSafe (Template Level Permission)

(TEMPLATE INFORMATION)

  1. Navigate to the (Template Level Permission) area.

Screenshot 1-3 NetSafe (Template Level Permission)

3.3 NetSafe (Setting: Template Information) By Recipient

(By Recipient) is used to exclude different locations from receiving this report.

  1. Select the (By Recipient) icon.

Screenshot 1-4 NetSafe (By Recipient)

3.4 NetSafe (Add)

You can add in the locations you want to exclude from receiving this report.

  1. Select the (Add) icon.

Screenshot 1-5 NetSafe (Add)

3.5 NetSafe (Select Location Mnemonic)

  1. Select a location to be excluded.
  2. Select the (Save) icon.

Screenshot 1-6 NetSafe (Select Location Mnemonic)

3.6 NetSafe (Select Location Mnemonic)

  1. Verify the (Select Location Mnemonic) window pops up.

Screenshot 1-7 NetSafe (Select Location Mnemonic)

3.7 NetSafe (Template Level Permission) By Group

  1. Select the (By Group) icon.

Screenshot 1-8 NetSafe (Template Level Permission) By Group

3.8 NetSafe (Template Level Permission) List Type

  1. Select the (List Type) drop-down.

Screenshot 1-9 NetSafe (Template Level Permission) List Type

3.9 NetSafe (Template Level Permission) By Group

You can add the locations you want to include to receive reports.

  1. Select the (By Group) drop-down to (Include).

Screenshot 1-10 NetSafe (Template Level Permission) By Group Include

3.10 NetSafe (Settings: Report Location Destinations)

(REPORT LOCATION DESTINATIONS)

  1. Navigate to the (Report Location Destination) settings.

Screenshot 1-11 NetSafe (Settings: Report Location Destinations)

3.11 NetSafe (Settings: Report Location Destinations)

It is possible to have more than one destination Location rule defined.

Screenshot 1-12 NetSafe (Settings: Report Location Destinations)

3.12 NetSafe (Settings: Report Location Destinations)

The number of rules built here tells you how many locations NetSafe will send the report to.

Screenshot 1-13 NetSafe (Settings: Report Location Destinations)

3.13 NetSafe (Settings: Report Location Destinations)

Each destination location rule has its own Excluded Included permissions.

Screenshot 1-14 NetSafe (Settings: Report Location Destinations)

3.14 NetSafe (Settings: Report Location Destinations)

  1. Select the (Edit) icon.

Screenshot 1-15 NetSafe (Settings: Report Location Destinations)

3.15 NetSafe (Location Field Settings)

  1. Navigate to the (Location Level Permission) area.

Screenshot 1-16 NetSafe (Location Field Settings) Location Level Permission

3.16 NetSafe (Flow Chart)

NetSafe Flow chart.

Screenshot 1-17 NetSafe Flow chart

3.17 NetSafe (Flow Chart)

NetSafe determines which location receives the reports, the location level permissions are then applied. The template level permissions are applied to all locations that have received the reports.

Screenshot 1-18 NetSafe

3.18 NetSafe (Location Field Settings)

If a default location was specified in the template none of the exclude include rules will apply to it.

Screenshot 1-19 NetSafe

NetSafe (New Virtual Printer Build) 100-0092-00

 

1.0 Introduction

This document is for the following Interbit Data products, NetSafe. This explains the topic of Virtual Printer Build.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of NetSafe Virtual Printer Build.

2.0 Overview

This document explains how to build a Virtual Printer from scratch. This Virtual Printer will be one way of getting reports into NetSafe.

3.0 PC Printers and Scanners

  1. Navigate to the (Print and Scanners) settings on your computer.

Screenshot 1-0 PC Add Printer

3.1 PC Add Printer

  1. Select the (Add a Printer or Scanner) Plus icon.
  • Windows will automatically scan your network for printers

Screenshot 1-1 PC Add Printer or Server

3.2 PC Add Printer

  • Windows will list the printers on your network

Screenshot 1-2 PC Add Printer

3.3 PC Add Printer

  1. Select the (Printer I want is not listed) option.

Screenshot 1-3 PC Add Printer

3.4 PC Add Printer Wizard

  1. Select the (Add a printer using TCP/IP address or hostname) icon button.
  2. Select the (Next) icon.

Screenshot 1-4 PC Add Printer (Wizard)

3.5 PC Add Printer (Host name or IP Address)

  1. Enter the (Hostname or IP Address) into entry box.
  • The (Host Name or IP Address) is the NetSafe server

Screenshot 1-5 PC Add Printer (Host Name or IP Address)

3.6 PC Add Printer (Port Name)

Note: Windows will automatically fill in the (Port Name).

Screenshot 1-6 PC Add Printer (Port Name)

3.7 PC Add Printer (Port Name)

Note: Use the Standardized Name for use as (Port/Queue/Printer Name).

Screenshot 1-7 PC Add Printer (Port Name)

3.8 PC Add Printer (Port Name)

  1. Navigate to the (Port Name) entry box.

Note: Use the Standardized Name for use as (Port/Queue/Printer Name).

Screenshot 1-8 PC Add Printer (Port Name)

3.9 PC Add Printer (Port Name)

  1. Enter the (Port Name) into the entry box.

Note: Use NS for NetSafe and EMAR to show report type.

Screenshot 1-9 PC Add Printer (Port Name)

3.10 PC Add Printer

  1. Select the (Next) icon.

Screenshot 1-10 PC Add Printer (Next)

3.11 PC Add Printer (Custom)

  1. Select the (Custom) icon button for additional port information.

Screenshot 1-11 PC Add Printer (Custom)

3.12 PC Add Printer (Settings)

  1. Select the (Settings) icon.

Screenshot 1-12 PC Add Printer (Settings)

3.13 PC Add Printer (Configure Standard TCP/IP Port Monitor)

  • The (Configure Standard TCP/IP Port Monitor) window
  • Windows automatically picks the (Raw) icon button

Screenshot 1-13 PC Add Printer (Configure Standard TCP/IP Port Monitor)

3.14 PC Add Printer (Configure Standard TCP/IP Port Monitor)

  1. Navigate to the protocol area.

Screenshot 1-14 PC Add Printer (Configure Standard TCP/IP Port Monitor)

3.15 PC Add Printer (Configure Standard TCP/IP Port Monitor)

  1. Select the (LPR) icon button.

Screenshot 1-15 PC Add Printer (Configure Standard TCP/IP Port Monitor)

3.16 PC Add Printer (Configure Standard TCP/IP Port Monitor)

  1. The (LPR) icon button is selected.

Screenshot 1-16 PC Add Printer (Configure Standard TCP/IP Port Monitor)

3.17 PC Add Printer (Configure Standard TCP/IP Port Monitor)

  1. Navigate to the (LPR Settings) area.

Screenshot 1-17 PC Add Printer (Configure Standard TCP/IP Port Monitor)

3.18 PC Add Printer (Configure Standard TCP/IP Port Monitor)

  1. Enter the Queue name into the entry box.

Note: Use the Standardized Name for use as Port/Queue/Printer Name.

Screenshot 1-18 PC Add Printer (Configure Standard TCP/IP Port Monitor)

3.19 PC Add Printer (Configure Standard TCP/IP Port Monitor)

  1. Select the (LPR Byte Counting Enabled) check box.

Screenshot 1-19 PC Add Printer (Configure Standard TCP/IP Port Monitor)

3.20 PC Add Printer (Configure Standard TCP/IP Port Monitor)

  1. Select the (OK) icon.

Screenshot 1-120 PC Add Printer (Configure Standard TCP/IP Port Monitor)

3.21 PC Add Printer

  1. Select the (Next) icon.

Screenshot 1-21 PC Add Printer (Next)

3.22 PC Add Printer (HP LaserJet 4) device driver

  1. Select the (HP LaserJet 4) device driver.
  • The list of drivers available on this PC

Screenshot 1-22 PC Add Printer (Device Driver)

3.23 PC Add Printer (HP LaserJet 4) device driver

  1. If the (HP LaserJet 4) device driver cannot be found.
  2. Navigate to the next step 3.24.

Note: If the HP LaserJet 4 cannot be found.

Screenshot 1-23 PC Add Printer (Device Driver)

3.24 PC Add Printer (HP LaserJet 4) device driver

  1. Reference the (HP LaserJet 4 64-bit device driver for existing Printers) video.

Note: Please watch our other video to download and install the device driver.

Screenshot 1-24 PC Add Printer (Device Driver)

3.25 PC Add Printer (HP LaserJet 4) device driver

  1. Select the (Next) icon.

Screenshot 1-25 PC Add Printer (Device Driver)

3.26 PC Add Printer (Device Driver)

  1. Select the (Use the drive that is currently installed (recommended)) icon button.
  2. Select the (Next) icon.

Screenshot 1-26 PC Add Printer (Device Driver)

3.27 PC Add Printer (Printer Name)

  1. Enter the name of the Printer into the (Printer name) entry box.

Note: Use the Standardized Name for use as Port/Queue/Printer Name.

Screenshot 1-27 PC Add Printer (Printer Name)

3.28 PC Add Printer (Printer Name)

  1. Select the (Next) icon.

Screenshot 1-28 PC Add Printer (Printer Name)

3.29 PC Add Printer (Share)

  1. Select the (Next) icon.

Note: You may need to share the printer so your HCIS can find and use the printer

Screenshot 1-29 PC Add Printer (Share)

3.30 PC Add Printer (Print a Test Page)

  1. Select the (Print a Test Page) icon.
  2. Verify a (Test Page) printed properly.

Screenshot 1-30 PC Add Printer (Print a Text Page)

 

NetSafe (Advanced Table Templates) 100-0096-00

 

1.0 Introduction

This document is used for the following Interbit Data products, NetSafe. This explains the topic of Advanced Table Templates.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Advanced Table Templates.

2.0 Overview

Advanced functionality with Table Templates.

3.0 NetSafe Client

Covered in the Basic Table Templates document. How to create a basic Table Template and what it looks like inside the NetSafe Client.

From the NetSafe Client, what happens when there are multiple delimited files that are sent to the NetSafe Client.

Screenshot 1-0 NetSafe Client

4.0 NetSafe Administrator, Table Templates

The Table Templates Setting

Screenshot 1-1 NetSafe Administrator, Table Templates

4.1 NetSafe Administrator, Table Templates

For this example, there are two Table Templates have been created. (Food) and (Drink).

Screenshot 1-2 NetSafe Administrator, Table Templates

4.2 NetSafe Administrator, Table Templates (Template Name)

Template Name (Food) tells NetSafe what to do with that file when a file comes in with a matching queue name (Food).

Screenshot 1-3 NetSafe Administrator, Table Templates (Template Name)

4.3 NetSafe Administrator, Table Templates (Table Name)

Table Name is set to (Food).

Screenshot 1-4 NetSafe Administrator, Table Templates (Table Name)

4.4 NetSafe Administrator, Table Templates (Database Name)

The Database Name is set to (Food).

Screenshot 1-5 NetSafe Administrator, Table Templates (Database Name)

4.5 NetSafe Administrator, Table Templates (Table Name, Database Name)

The (Table Name) and the (Database Name)

Screenshot 1-6 NetSafe Administrator, Table Templates (Table Name) (Database Name)

4.6 NetSafe Administrator, Table Templates (Description)

The description is set to (Food) list.

Screenshot 1-7 NetSafe Administrator, Table Templates (Description

4.7 NetSafe Administrator, Table Templates

From this screen you can see the Table Template for (Food).

Screenshot 1-8 NetSafe Administrator, Table Templates

4.8 NetSafe Administrator, Table Templates

The Table Template will be sending the delimited file to this NetSafe Client location (ThanhPC3).

Screenshot 1-9 NetSafe Administrator, Table Templates

4.9 NetSafe Administrator, Table Templates

The next Table Template is set to (Drinks) is set up similar.

Screenshot 1-10 NetSafe Administrator, Table Templates

4.10 NetSafe Administrator, Table Templates

Template Name is set to (Drinks).

Screenshot 1-11 NetSafe Administrator, Table Templates

4.11 NetSafe Administrator, Table Templates

Table Name is set to (Drinks).

Screenshot 1-12 NetSafe Administrator, Table Templates

4.12 NetSafe Administrator, Table Templates

Database Name is set to (Drinks).

Screenshot 1-13 NetSafe Administrator, Table Templates

4.13 NetSafe Administrator, Table Templates

The description is set to (Drinks) list.

Screenshot 1-14 NetSafe Administrator, Table Template

4.14 NetSafe Administrator, Table Templates

From this screen you can see the Table Template for (Drinks). The Table Template for will be sending the delimited file to this NetSafe Client location (ThanhPC3).

Screenshot 1-15 NetSafe Administrator, Table Template

5.0 NetSafe Client

NetSafe Client Login

Screenshot 1-16 NetSafe Client

5.1 NetSafe Client

  1. Select the drop-down menu for the (Database) to access the delimited files.

Screenshot 1-17 NetSafe Client

5.2 NetSafe Client

  1. Select the Table Templates file for (Food) from the drop-down menu.

Screenshot 1-18 NetSafe Client

5.3 NetSafe Client

  1. Enter the password.

Screenshot 1-19 NetSafe Client

5.4 NetSafe Client

This is the delimited file for (Food) in NetSafe Client. You now have access to this food list.

Screenshot 1-20 NetSafe Client

5.5 NetSafe Client

  1. Select the Table Templates file for (Drinks) from the drop-down menu.

Screenshot 1-21 NetSafe Client

5.6 NetSafe Client

  1. Enter the password.

Screenshot 1-22 NetSafe Client

5.7 NetSafe Client

This is the delimited file for (Drinks) in NetSafe Client. You now have access to this food list.

Screenshot 1-23 NetSafe Client

5.8 NetSafe Client

To consolidate the information so you do not have to login twice.

Table Name and Database Name options.

Screenshot 1-24 NetSafe Client

5.9 NetSafe Client

(Table Name) and (Database Name).

Think of these two as a (Room) in a house, (Table) in a room.

Screenshot 1-25 NetSafe Client

5.10 NetSafe Client

What we have set up in this example is a (Food Room) with a table of (Food). A (Drinks) room with a table of (Drinks).

In order to access (Food) or (Drinks) you must leave one room and go to the other.

Screenshot 1-26 NetSafe Client

5.11 NetSafe Client

To be able to have (Food) and (Drinks) at the same time without leaving the room. Build a room called (Kitchen) and have a table for (Food) and a table for (Drinks).

Screenshot 1-27 NetSafe Client

6.0 NetSafe Administrator, Table Template

NetSafe Administrator

To build two new Table Templates Select the (Add) icon.

Screenshot 1-28 NetSafe Administrator, Table Template

6.1 NetSafe Administrator, Table Template (Table Template Settings)

Navigate to the (Database Name).

Screenshot 1-29 NetSafe Administrator, Table Template (Table Template Settings)

6.2 NetSafe Administrator, Table Template (Table Template Settings)

This Table Template is for (Drinks)

  1. Add the Database Name (Kitchen).
  2. Add the Table Name (Food).
  3. Add Table Template Name is (Food_Kitchen).
  4. Add Description (Food List in Kitchen).
  5. Select the (Save) icon.

Screenshot 1-30 NetSafe Administrator, Table Template (Table Template Settings)

6.3 NetSafe Administrator, Table Template

The new Table Template Name (Food_Kitchen) is highlighted.

Screenshot 1-31 NetSafe Administrator, Table Template

6.4 NetSafe Administrator, Table Template

To build another Table Template. Select the (Add) icon.

Screenshot 1-32 NetSafe Administrator, Table Template

6.5 NetSafe Administrator, Table Template (Table Template Settings)

This Table Template is for (Drinks)

  1. Add the Database Name (Kitchen).
  2. Add the Table Name (Drinks).
  3. Add Table Template Name is (Drinks _Kitchen).
  4. Add Description (Drinks List in Kitchen).
  5. Select the (Save) icon.

Screenshot 1-33 NetSafe Administrator, Table Template (Table Template Settings)

6.6 NetSafe Administrator, Table Template

The are two new Table Template Names (Drinks_Kitchen) and (Food_Kitchen) are highlighted.

Screenshot 1-34 NetSafe Administrator, Table Template

6.7 NetSafe Administrator, Table Template

  1. Highlight (Food_Kitchen).
  2. Select the Add icon.

Screenshot 1-35 NetSafe Administrator, Table Template

6.8 NetSafe Administrator, Table Template (Select Location Mnemonic)

  1. Highlight the (ThanhPC3). This tells NetSafe where to send the (Food) list.
  2. Select the (Save) icon.

Screenshot 1-36 NetSafe Administrator, Table Template (Select Location Mnemonic)

6.9 NetSafe Administrator, Table Template

  1. Highlight (Drinks_Kitchen).
  2. Select the Add icon.

Screenshot 1-37 NetSafe Administrator, Table Template

NetSafe Administrator, Table Template (Select Location Mnemonic)

  1. Highlight the (ThanhPC3). This tells NetSafe where to send the (Drinks) list.
  2. Select the (Save) icon.

Screenshot 1-38 NetSafe Administrator, Table Template (Select Location Mnemonic)

6.11 NetSafe Administrator, Table Template

When a file comes into (Drinks_Kitchen) NetSafe creates a (table) of (drinks), places the table into the room (kitchen), of the house below.

Screenshot 1-39 NetSafe Administrator, Table Template

  • NetSafe Administrator, Table Template

When a file comes into (Food_Kitchen) NetSafe creates a (table) of (drinks), places the table into the room (kitchen), of the house below.

Screenshot 1-40 NetSafe Administrator, Table Template

7.0 NetSafe Client

  1. Login to the NetSafe Client to view what this looks like.

Screenshot 1-41 NetSafe Client

7.1 NetSafe Client

  1. Select the drop-down menu for the Select Database.
  2. Select the Table Template called (Kitchen).

Screenshot 1-42 NetSafe Client

7.2 NetSafe Client

  1. Enter Password to Login.
  2. Select the (Open) icon.

Screenshot 1-43 NetSafe Client

7.3 NetSafe Client

1.0 Select Table: Drinks

This shows, what is currently in the (Drinks) table.

Screenshot 1-44 NetSafe Client

7.4 NetSafe Client

  1. Select the (drop-down) menu.

Note: this enables you to look at two different Table Templates without having to login to the NetSafe Client multiple times.

Screenshot 1-45 NetSafe Client

7.5 NetSafe Client

  1. Select Name: Food

This shows us what is currently in the (Food) table.

Screenshot 1-46 NetSafe Client

7.6 NetSafe Client

You can consolidate the Master Patient Index and other admissions related delaminated files into an Admissions Database. Or the Blood Bank file and other Lab related delaminated files into a Lab Database. For quick secure access inside NetSafe Client.

Screenshot 1-47 NetSafe Client

 

NetSafe (Configuring a Windows Printer Epic) 100-0100-00

 

1.0 Overview

This document is used for the following Interbit Data products, NetSafe. This explains the topic of Configuring a Windows Printer Epic.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Configuring a Windows Printer Epic.

2.0 Introduction

Most Healthcare Information Systems (HCIS) do not include integrated print drivers.  It is necessary to set up and link a Windows printer for your HCIS to communicate with NetSafe. This document explains the process for configuring a Windows printer. If you are a new NetSafe customer, or an existing customer moving from a HCIS that has its own printing routines (for example, MEDITECH Magic) to one that does not, you need to perform the following procedures:

  • Configuring a Windows printer
  • Adding the printer to the HCIS
  • Setting up HCIS reports to print to the printer

3.0 Configuring a Windows Printer

By default, NetSafe monitors port 515, which is the port used by the Line Printer Daemon (LPD). Therefore, you need to configure a printer in your Windows environment that uses LPD protocol and port 515.

For each report type generated by your HCIS, you need to configure a separate virtual printer to be used by that report type. All these printers must use the LPD protocol and port 515, but each one needs to have a unique LPD queue name.

To configure a Windows printer that sends reports and documents to port 515 using the LPD protocol from which NetSafe will receive reports, perform the following steps:

Note: The images in this guide show Windows 10 menus and dialog boxes. Depending on your Windows operating system, the menus and dialog boxes may have a different look. The features and functionality, however, are the same as described here.

Table 1-0 Configuring a Windows Printer

Step

Action

1.

Click Start > Control Panel > Devices and Printers.

The Devices and Printers window opens.

2.

Click Add a Printer.

The Add Printer Wizard displays. 

3.

Select The Printer That I Want Isn’t Listed.

The Local or Network Printer dialog box displays.

4.

Select Add a Printer Using a TCP/IP Address or Hostname.

Click Next.

5.

The Add Printer box displays.

6.

Select Device Type as TCP/IP Device.

7.

Enter, into the Hostname or IP Address text entry box, the IP address of the NetSafe server.

8.

Enter, into the Port Name text entry box, a name for the port. This can be any name, but it is recommended that the name of the printer be entered.

9.

Click Next.

The Additional Port Information Required dialog box displays (this box may take several seconds to display). 

10.

Select Custom.

The Settings button becomes accessible.

11.

Click Settings.

The Configure Standard TCP/IP Port Monitor dialog box displays.

(The Port Name and Printer Name or IP Address fields contain the text entered in Step 7 and Step 8). 

12.

Select LPR.

Note: The Port Number box contains 9100. When the new printer is saved, 515 is automatically entered, which is the default port number for LPR protocol.

WARNING: Do not select RAW and then enter 515 into the Port Number box. This information will be accepted, but NetSafe will not receive any reports.

13.

Enter, into the Queue Name text entry box, the name of the report distribution template that is to be receiving reports.

Note: This is the name that must be entered when identifying an LPD Queue Name during the configuration of a report distribution template in NetSafe.

14.

Select LPR Byte Counting Enabled.

15.

Click OK.

The Configure Standard TCP/IP Port Monitor dialog box closes.

16.

Click Next.

The Additional Port Information Required dialog box closes and the Install the Printer Driver dialog box displays.

17.

Select HP LaserJet 4 from the Printers list. 

Note: If the HP LaserJet 4 driver is not available, click Windows Update.

Note: If you want to use a different model, contact Interbit Data Customer Support.

18.

Click Next.

The Install Printer Software dialog box closes, and the Use Existing Driver dialog box displays.

19.

Is the Use Existing Driver dialog box displayed?

  • If yes, select Use the Driver That Is Currently Installed (Recommended)

20.

Click Next.

The Name Your Printer dialog box displays.

21.

Enter, into the Printer name text entry box, a name for the printer.

This is the name that displays on the list of printers when printing a document.

22.

Click Next.

The Name Your Printer dialog box closes, and the Printer Sharing dialog box displays.

23.

Determine if the printer is to be shared:

  • If no, select Do Not Share This Printer

If yes, select Share Name, and enter the shared printer name.

24.

Click Next.

  • The Printer Sharing dialog box closes, and the Print Test Page dialog box displays

25.

Determine if you want to print a test page:

  • If yes, Click the Print a Test Page button
  • If no, click the Finish button.

The Print Test Page dialog box closes.

 

NetSafe (Configuring a Windows Printer Generic) 100-0101-00

 

1.0 Overview

This document is used for the following Interbit Data products, NetSafe. This explains the topic of Configuring a Windows Printer Generic.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Configuring a Windows Printer Generic.

2.0 Introduction

Most Healthcare Information Systems (HCIS) do not include integrated print drivers.  It is necessary to set up and link a Windows printer for your HCIS to communicate with NetSafe. This document explains the process for configuring a Windows printer. If you are a new NetSafe customer, or an existing customer moving from a HCIS that has its own printing routines (for example, MEDITECH Magic) to one that does not, you need to perform the following procedures:

  • Configuring a Windows printer
  • Adding the printer to the HCIS
  • Setting up HCIS reports to print to the printer

3.0 Configuring a Windows Printer

By default, NetSafe monitors port 515, which is the port used by the Line Printer Daemon (LPD). Therefore, you need to configure a printer in your Windows environment that uses LPD protocol and port 515.

For each report type generated by your HCIS, you need to configure a separate virtual printer to be used by that report type. All these printers must use the LPD protocol and port 515, but each one needs to have a unique LPD queue name.

To configure a Windows printer that sends reports and documents to port 515 using the LPD protocol from which NetSafe will receive reports, perform the following steps:

Note: The images in this guide show Windows 10 menus and dialog boxes. Depending on your Windows operating system, the menus and dialog boxes may have a different look. The features and functionality, however, are the same as described here.

Table 1-0 Configuring a Windows Printer

Step

Action

1.

Click Start > Control Panel > Devices and Printers.

The Devices and Printers window opens.

2.

Click Add a Printer.

The Add Printer Wizard displays. 

3.

Select The Printer That I Want Isn’t Listed.

The Local or Network Printer dialog box displays.

4.

Select Add a Printer Using a TCP/IP Address or Hostname.

Click Next.

5.

The Add Printer box displays.

6.

Select Device Type as TCP/IP Device.

7.

Enter, into the Hostname or IP Address text entry box, the IP address of the NetSafe server.

8.

Enter, into the Port Name text entry box, a name for the port. This can be any name, but it is recommended that the name of the printer be entered.

9.

Click Next.

The Additional Port Information Required dialog box displays (this box may take several seconds to display). 

10.

Select Custom.

The Settings button becomes accessible.

11.

Click Settings.

The Configure Standard TCP/IP Port Monitor dialog box displays.

(The Port Name and Printer Name or IP Address fields contain the text entered in Step 7 and Step 8). 

12.

Select LPR.

Note: The Port Number box contains 9100. When the new printer is saved, 515 is automatically entered, which is the default port number for LPR protocol.

WARNING: Do not select RAW and then enter 515 into the Port Number box. This information will be accepted, but NetSafe will not receive any reports.

13.

Enter, into the Queue Name text entry box, the name of the report distribution template that is to be receiving reports.

Note: This is the name that must be entered when identifying an LPD Queue Name during the configuration of a report distribution template in NetSafe.

14.

Select LPR Byte Counting Enabled.

15.

Click OK.

The Configure Standard TCP/IP Port Monitor dialog box closes.

16.

Click Next.

The Additional Port Information Required dialog box closes and the Install the Printer Driver dialog box displays.

17.

Select HP LaserJet 4 from the Printers list. 

Note: If the HP LaserJet 4 driver is not available, click Windows Update.

Note: If you want to use a different model, contact Interbit Data Customer Support.

18.

Click Next.

The Install Printer Software dialog box closes, and the Use Existing Driver dialog box displays.

19.

Is the Use Existing Driver dialog box displayed?

  • If yes, select Use the Driver That Is Currently Installed (Recommended)

20.

Click Next.

The Name Your Printer dialog box displays.

21.

Enter, into the Printer name text entry box, a name for the printer.

This is the name that displays on the list of printers when printing a document.

22.

Click Next.

The Name Your Printer dialog box closes, and the Printer Sharing dialog box displays.

23.

Determine if the printer is to be shared:

  • If no, select (Do Not Share This Printer)
  • If yes, select (Share Name), and enter the shared printer name

24.

Click Next.

  • The Printer Sharing dialog box closes, and the Print Test Page dialog box displays

25.

Determine if you want to print a test page:

  • If yes, Click the Print a Test Page button
  • If no, click the Finish button

The Print Test Page dialog box closes.

 

NetSafe (Configuring a Windows Printer Meditech) 100-0102-00

 

1.0 Introduction

This document is used for the following Interbit Data products, NetSafe. This document explains the topic of Configuring a Windows Printer Meditech.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Configuring a Windows Printer Meditech.

2.0 Overview

Most Healthcare Information Systems (HCIS), for example MEDITECH C/S, 6.0 and Expanse, do not include the printer routines, it is necessary to set up and link a Windows printer for your HCIS to communicate with NetSafe. This document explains the process for setting up reports to be sent from your HCIS to NetSafe, then to their final destination. If you are a new NetSafe customer, or an existing customer moving from a HCIS that has its own printing routines (for example, MEDITECH Magic) to one that does not, you need to perform the following procedures:

  • Configuring a Windows Printer
  • Building a Printer in MEDITECH UNV Printer Dictionary
  • Adding a Printer to MEDITECH UNV All Printer List
  • Setting Up MEDITECH Reports to Print to the Printer

3.0 Configuring a Windows Printer

By default, NetSafe monitors port 515, which is the port used by the Line Printer Daemon (LPD). Therefore, you need to configure a printer in your Windows environment that uses LPD protocol and port 515.

For each report type generated by your HCIS, you need to configure a separate virtual printer to be used by that report type. All these printers must use the LPD protocol and port 515, but each one needs to have a unique LPD queue name.

To configure a Windows printer that sends reports and documents to port 515 using the LPD protocol from which NetSafe will receive reports, perform the following steps:

Note: The images in this guide show Windows 10 menus and dialog boxes. Depending on your Windows operating system, the menus and dialog boxes may have a different look. The features and functionality, however, are the same as described here.

Table 1-0 Configuring a Windows Printer

Step

Action

1.

Click Start > Control Panel > Devices and Printers.

The Devices and Printers window opens.

2.

Click Add a Printer.

The Add Printer Wizard displays. 

3.

Select The Printer That I Want Isn’t Listed.

The Local or Network Printer dialog box displays.

4.

Select Add a Printer Using a TCP/IP Address or Hostname.

Click Next.

5.

The Add Printer box displays.

6.

Select Device Type as TCP/IP Device.

7.

Enter, into the Hostname or IP Address text entry box, the IP address of the NetSafe server.

8.

Enter, into the Port Name text entry box, a name for the port. This can be any name, but it is recommended that the name of the printer be entered.

9.

Click Next.

The Additional Port Information Required dialog box displays (this box may take several seconds to display). 

10.

Select Custom.

The Settings button becomes accessible.

11.

Click Settings.

The Configure Standard TCP/IP Port Monitor dialog box displays.

(The Port Name and Printer Name or IP Address fields contain the text entered in Step 7 and Step 8). 

12.

Select LPR.

Note: The Port Number box contains 9100. When the new printer is saved, 515 is automatically entered, which is the default port number for LPR protocol.

WARNING: Do not select RAW and then enter 515 into the Port Number box. This information will be accepted, but NetSafe will not receive any reports.

13.

Enter, into the Queue Name text entry box, the name of the report distribution template that is to be receiving reports.

Note: This is the name that must be entered when identifying an LPD Queue Name during the configuration of a report distribution template in NetSafe.

14.

Select LPR Byte Counting Enabled.

15.

Click OK.

The Configure Standard TCP/IP Port Monitor dialog box closes.

16.

Click Next.

The Additional Port Information Required dialog box closes and the Install the Printer Driver dialog box displays.

17.

Select HP LaserJet 4 from the Printers list. 

Note: If the HP LaserJet 4 driver is not available, click Windows Update.

Note: If you want to use a different model, contact Interbit Data Customer Support.

18.

Click Next.

The Install Printer Software dialog box closes, and the Use Existing Driver dialog box displays.

19.

Is the Use Existing Driver dialog box displayed?

  • If yes, select Use the Driver That Is Currently Installed (Recommended)

20.

Click Next.

The Name Your Printer dialog box displays.

21.

Enter, into the Printer name text entry box, a name for the printer.

This is the name that displays on the list of printers when printing a document.

22.

Click Next.

The Name Your Printer dialog box closes, and the Printer Sharing dialog box displays.

23.

Determine if the printer is to be shared:

  • If no, select (Do Not Share This Printer)
  • If yes, select (Share Name), and enter the shared printer name

24.

Click Next.

  • The Printer Sharing dialog box closes, and the Print Test Page dialog box displays

25.

Determine if you want to print a test page:

  • If yes, Click the Print a Test Page button
  • If no, click the Finish button.

The Print Test Page dialog box closes.

3.1 Building a Printer MEDITECH UNV Printer Dictionary

If your HCIS is MEDITECH C/S, 6.0 or Expanse after the Windows printer has been configured, that printer needs to be created in the MEDITECH C/S, 6.0 and Expanse UNV Printer Dictionary. To build the printer in the MEDITECH UNV Printer Dictionary, perform the following steps.

Table 1-1 Printer Dictionary

Step

Action

1.

In MEDITECH C/S-6.0 access the Enter/Edit dialog box.

The Enter/Edit dialog box displays.

2.

Enter into the Mnemonic text entry box the name of the Windows printer. The mnemonic must match the printer name that was created on the MEDITECH print server.

Reference section 3.0 “Configuring a Windows Printer”. Step 25.

Caution: This name must be 10 characters or less. MEDITECH C/S, 6.0 and Expanse does not accept printer names that are longer than 10 characters.

3.

Enter Y in to the Active text entry box.

4.

Enter a description of the printer into the Description text entry box.

5.

Click Save.

MEDITECH is now linked to the Windows printer.

3.2 Adding a Printer to MEDITECH UNV All Printer List

Table 1-2 Adding a Printer to MEDITECH UNV All Printer List

Step

Action

1.

In MEDITECH C/S, 6.0 or Expanse access the Enter/Edit All Printers List dialog box. 

MEDITECH C/S, 6.0 and Expanse searches for any new printers and displays an alert dialog box when the new printer is found.

2.

Click Close.

The Enter/Edit All Printers List dialog box displays.

3.

Scan the list of printers to confirm that the new printer has been added to the Printer List.

4.

Click Save.

The new printer is now visible in all MEDITECH C/S, 6.0 and Expanse modules, in both the TEST and LIVE environments.

Note: The blank fields on the Enter/Edit dialog box (Step 1 of Building a Printer in MEDITECH UNV Printer Dictionary”) are populated with information contained on he Enter/Edit All Printers List dialog box.

3.3 Setting up MEDITECH Reports to Print to the Printer

After you have added the printer to the All Printers List, go into your MEDITECH C/S, 6.0 and Expanse module and schedule reports to print to the new printer.

 

NetSafe (Basic Table Templates) 100-0103-00

 

1.0 Introduction

This document is used for the following Interbit Data products, NetSafe. This explains the topic of Basic Table Templates.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Basic Table Template.

2.0 Overview

Basic Introduction to Table Templates.

Table Templates can take any delimited file and send it to NetSafe Client. 

3.0 Delimited File

This is a Delimited File.

Screenshot 1-0 Delimited File

4.0 NetSafe Client

This is a delimited file in NetSafe Client. NetSafe can take any delimited file and turn it into a searchable database that is accessible from any NetSafe Client that is designated

Screenshot 1-1 NetSafe Client, Delimited File

5.0 NetSafe Administrator, Table Template

Setting up an example:

  1. Select the (Table Templates) setting.

Screenshot 1-2 NetSafe Administrator, Table Template

5.1 NetSafe Administrator, Table Template

Build a Table Template.

  1. Select the (Add) icon to bring up the (Table Template Settings) window.

Screenshot 1-3 NetSafe Administrator, Table Template

5.2 NetSafe Administrator, Table Template Settings (Enabled)

To (Enable) or (Disable) the Table Template select or deselect the check box.

Screenshot 1-4 NetSafe Administrator, Table Templates Settings (Enabled)

5.3 NetSafe Administrator, Table Template Settings (Delete Table Before Insertion)

The (Delete Table Before Insertion) check box, tells NetSafe to purge the current Table Template of all data and import the data into an empty Table Template or to add data to the current Table Template.

Screenshot 1-5

NetSafe Administrator, Table Template Settings (Delete Table Before Insertion)

5.4 NetSafe Administrator, Table Template Settings (Template Name)

  1. Enter the (Template Name)

Note: The Template Name needs to match the (Printer or the Queue Name) of the delimited file. (MPI) is used in this example only.

Screenshot 1-6 NetSafe Administrator, Table Template Settings (Template Name)

5.5 NetSafe Administrator, Table Template Settings (Table Name and Database Name)

  1. Enter (Table Name and Database Name)

Note: These two entries control advanced functionality for the Table Templates. (MPI) is used in this example only.

Reference: 100-0096-00 Guide (NetSafe Advanced Table Templates) for advanced functionality information.

Screenshot 1-7

NetSafe Administrator, Table Template Settings (Table Name and Database Name)

5.6 NetSafe Administrator, Table Template Settings (Description)

  1. Enter the (Description) of what this Table Template is used for.

Screenshot 1-8 NetSafe Administrator, Table Template Settings (Description)

5.7 NetSafe Administrator, Table Template Settings (Separator Character)

  1. Enter the (Separator Character)

Note: the delimited file in this example uses the (pipe) | character. The delimited file is shown at the bottom of the screenshot.

Screenshot 1-9 NetSafe Administrator, Table Template Settings (Separator Character)

5.8 NetSafe Administrator, Table Template Settings

  1. Select the (Save) icon.

Screenshot 1-10 NetSafe Administrator, Table Template Settings

5.9 NetSafe Administrator, Table Template (Location Mnemonics)

The Table Template for (MPI) is now built.

The next step is to tell NetSafe where the (MPI) is going. (Table Template Location Mnemonics) area.

Screenshot 1-11 NetSafe Administrator, Table Template (Location Mnemonics)

5.10 NetSafe Administrator, Table Template (Location Mnemonics)

  1. Highlight the (MPI) file.
  2. Select the (Add) icon.

Screenshot 1-12 NetSafe Administrator, Table Template (Location Mnemonics)

5.11 NetSafe Administrator, Table Template (Select Location Mnemonic)

  1. Highlight one of the (Location Mnemonics).
  2. Select the (Save) icon.

Note: This shows all the Location Mnemonics built in NetSafe.

Screenshot 1-13 NetSafe Administrator, Table Template (Select Location Mnemonic)

5.12 NetSafe Administrator, Table Template 

This screenshot shows the (MPI) Table Template will go to the Location Mnemonic.

Screenshot 1-14 NetSafe Administrator, Table Template

5.13 NetSafe Administrator, Table Template (Add)

  1. Select the (Add) icon.

Note: You can send the (MPI) file to multiple Location Mnemonics by repeating the steps.

Screenshot 1-15 NetSafe Administrator, Table Template (Add)

5.14 NetSafe Administrator, Table Template (Select Location Mnemonic)

  1. Highlight the (Save) icon.

Screenshot 1-16 NetSafe Administrator, Table Template (Select Location Mnemonic)

5.15 NetSafe Administrator, Table Template (Location Mnemonics)

  1. Select the (Add All) icon.

Screenshot 1-17 NetSafe Administrator, Table Template (Location Mnemonics)

5.16 NetSafe Administrator, Table Template (Location Mnemonics)

Note: The (Add All) icon will add all the Location Mnemonics to this list.

Screenshot 1-18 NetSafe Administrator, Table Template (Location Mnemonics)

5.17 NetSafe Administrator, Table Template (Location Mnemonics)

To remove a Location Mnemonics.

Screenshot 1-19 NetSafe Administrator, Table Template (Location Mnemonics)

5.18 NetSafe Administrator, Table Template (Location Mnemonics)

  1. Select the (Delete) icon.

Screenshot 1-20 NetSafe Administrator, Table Template (Location Mnemonics)

5.19 NetSafe Administrator, Table Template (Location Mnemonics)

  1. Select the (Yes) icon in the (Confirm Deletion) window.

Screenshot 1-21 NetSafe Administrator, Table Template

5.20 NetSafe Administrator, Table Template (Location Mnemonics)

We can push a pipe delimited MPI file to this MPI Table Template. The MPI file will be populated on the two highlighted client locations.

Screenshot 1-22 NetSafe Administrator, Table Template (Location Mnemonics)

6.0 NetSafe Client

NetSafe Client Log on screen. If you are using active directory logon the logon screen will look different. The following steps will work with both variations.

  1. Select the (Select Database) drop-down.

Screenshot 1-23 NetSafe Administrator

6.1 NetSafe Client

  1. Select the (ThanhPC_[TableTemplate]_MPI.ibe) from the drop-down menu.

Screenshot 1-24 NetSafe Client

6.2 NetSafe Client

  1. Enter the (Password).
  2. Select the (Open) icon.

Screenshot 1-25 NetSafe Client

6.3 NetSafe Client

NetSafe Client showing the MPI index information. This version of NetSafe comes with advanced searching functionality. If you want to search on any of the highlighted columns.

  1. Navigate to the (Search) area.

Screenshot 1-26 NetSafe Client

6.4 NetSafe Client

  1. Select the (Search) drop-down menu.

Note: Selecting (All) shows all the columns that can be searched on.

Screenshot 1-27 NetSafe Client

6.5 NetSafe Client

  1. Select the (Contains) drop-down menu.

Note: Selecting (Contains) will enable you to specify what kind of search you want to do on each column.

Screenshot 1-28 NetSafe Client

6.6 NetSafe Client

  1. Enter a patient’s name

Screenshot 1-29 NetSafe Client

6.7 NetSafe Client

  1. Entering a patient’s name.
  2. Select the (Display Results) icon.

Screenshot 1-30 NetSafe Administrator, Table Template

 

NetSafe (Location Mnemonics Overview) P1 100-0104-00

 

1.0 Introduction

This document is used for the following Interbit Data products,  NetSafe. This explains the topic of Location Mnemonic Overview P1.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Basic Table Template.

2.0 Overview

Location Mnemonics P1 concepts

  • Windows Folder Location Mnemonic
  • Distribution List Location Mnemonic
  • Alias – work as a bridge, to Location Mnemonics

3.0 NetSafe Administrator (Windows Folder, Location Mnemonic)

NetSafe identifies where the downtime reports are to be stored and accessed. Encrypted reports can be sent to shared network folders, unencrypted reports can be sent to the NetSafe server.

In NetSafe these destination folders are referred to as,

  • Windows Folder Location Mnemonic
  • Location Mnemonic is a shared folder on a Client Workstation on your network
  • The Location Mnemonic is the name of the Client PC

Screenshot 1-0 NetSafe Administrator

3.1 NetSafe Administrator (Distribution List, Location Mnemonic)

The second Location Mnemonic.

  • Distribution List Location Mnemonic
  • Group of Client Workstations

As an example, if you want a dietary report sent to three computers on the third floor you would direct the dietary report to the third-floor dietary distribution list.

Screenshot 1-1 NetSafe Administrator

4.0 NetSafe Administrator (Alias)

The location listed on a report is not always the same as the Location Mnemonic in NetSafe.

Screenshot 1-2 NetSafe Administrator

4.1 NetSafe Administrator (Alias)

Within your organization a Location may be known by several different names. The name on the report can be a physical location, a department, or the name of a person. To bridge this connection, we use the function called Alias.  

Screenshot 1-3 NetSafe Administrator

4.2 NetSafe Administrator (Alias)

The Alias function enables you to associate any number of alternative names to a unique folder Location Mnemonic or a Distribution List Location Mnemonic.

Screenshot 1-4 NetSafe Administrator

4.3 NetSafe Administrator (Alias)

The Alias is a user-friendly name of the Location Mnemonic. When NetSafe grabs a name off a report NetSafe checks the Alias table. The Alias tells NetSafe which Location Mnemonic the report is to be sent to.

Screenshot 1-5 NetSafe Administrator

 

NetSafe (Location Mnemonic Overview) P2 100-0105-00

 

1.0 Introduction

This document is used for the following Interbit Data products, NetSafe Administrator. This document explains the topic of Location Mnemonics P2.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Location Mnemonic Overview P2.

2.0 Overview

Location Mnemonic Settings P2

3.0 NetSafe Administrator, Location Mnemonic

  1. Select to the (Location Mnemonic Settings).

Screenshot 1-0 NetSafe Administrator, Location Mnemonic Settings

4.0 NetSafe Administrator, Location Mnemonic

  • Highlighted are examples of (Location Mnemonics) built on the test machine

Screenshot 1-1 NetSafe Administrator, Location Mnemonic Settings

5.0 NetSafe Administrator, Location Mnemonic (Delivery)

The (Deliver)y) column is highlighted in red. The (Delivery) column shows which Location Mnemonics are a (Windows Folder Location) or a (Distribution List).

Note: A layout of where the reports are going is recommended. As you build the Location Mnemonics you will know if you need to add an (Alias) to a (Windows Folder) or a (Distribution List) Location Mnemonic.

Screenshot 1-2 NetSafe Administrator, Location Mnemonic Settings

6.0 NetSafe Administrator, Location Mnemonic (Add)

  1. Select the (Add) icon.

Note: For this example, the IT Team added a new workstation into the Nursery Department. New Nursery reports must be directed to the new workstation. The new workstation needs to be built inside of NetSafe as a (Windows Folder) Location Mnemonic).

Screenshot 1-3 NetSafe Administrator, Location Mnemonic Settings (Add)

7.0 NetSafe Administrator, Location Mnemonic Settings (Main)

The (Location Mnemonic Settings) window, Main Settings.

  • This is an example of a new location. Leave the check box unselected.

Note: If this location is already built and you do not want reports to go here select the (Disable Location Mnemonic) check box.

Screenshot 1-4 NetSafe Administrator, Location Mnemonic Settings (Main)

7.1 NetSafe Administrator, Location Mnemonic Settings (Main)

The (Location Delivery Type) drop-down menu.

Screenshot 1-5 NetSafe Administrator, Location Mnemonic Settings (Main)

7.2 NetSafe Administrator, Location Mnemonic Settings (Main)

This is where you can specify the Location Mnemonic Type.

  • Windows Folder
  • Distribution List
  • Null Delivery- any report going to this Location Mnemonic will be deleted

Screenshot 1-6 NetSafe Administrator, Location Mnemonic Settings (Main)

7.3 NetSafe Administrator, Location Mnemonic Settings (Main)

  1. Enter the name (TESTLOC) for the (Location Mnemonic).

Note: The name of the client workstation is used for the Location Mnemonic name.

Screenshot 1-7 NetSafe Administrator, Location Mnemonic Settings (Main)

7.4 NetSafe Administrator, Location Mnemonic Settings (Main)

  1. Add a (Location Description) and an (Organization).

Note: The (Organization) field is helpful if your Organization is home to multiple hospitals. You can use this field to indicate which hospital the Location Mnemonic is located in.

Screenshot 1-8 NetSafe Administrator, Location Mnemonic Settings (Main)

7.5 NetSafe Administrator, Location Mnemonic Settings (Main)

These three fields will be populated by NetSafe. Once the (Save) icon is selected. Anytime the (Save) icon is selected in the future the last updated date and by field will be updated with who made the change and when.

Screenshot 1-9 NetSafe Administrator, Location Mnemonic Settings (Main)

8.0 NetSafe Administrator, Location Mnemonic Settings (Folder)

  1. Navigate to the (Folder) setting.

Note: The Folder Settings is only Enabled when the (Location Delivery Type) is set to (Windows Folder)

Screenshot 1-10 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.1 NetSafe Administrator, Location Mnemonic Settings (Folder)

  1. Select the (Folder) setting.

Note: The Folder setting is only enabled when the (Location Delivery Type) is set to (Windows Folder).

Screenshot 1-11 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.2 NetSafe Administrator, Location Mnemonic Settings (Folder)

The (Certificate Password) entry box:

  • If you are using the default NetSafe Client logon method. The (Certificate Password) you put into this field is the same password the end users will use to login to NetSafe Client
  • If you are using (Active Directory) logon the (Certificate Password) field is also needed but will not be used by end users
  • For security purposes the password needs to be complex

Screenshot 1-12 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.3 NetSafe Administrator, Location Mnemonic Settings (Folder)

  • Selecting the (Ulysses) icon will reveal the password.

Screenshot 1-13 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.4 NetSafe Administrator, Location Mnemonic Settings (Folder)

  • The password is revealed
  • Selecting the Ulysses icon again will hide the password

Screenshot 1-14 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.5 NetSafe Administrator, Location Mnemonic Settings (Folder)

The (Folder Location) entry box contains the network path to the shared folder on the new client workstation.

Example: TEST.LOCNetSafeClient

Screenshot 1-15 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.6 NetSafe Administrator, Location Mnemonic Settings (Folder)

You can also use the IP Address of the client workstation instead of the name.

Screenshot 1-16 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.7 NetSafe Administrator, Location Mnemonic Settings (Folder)

  1. Select the (Ulysses) icon.

Screenshot 1-17 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.8 NetSafe Administrator, Location Mnemonic Settings (Folder)

The Browse for Folder window appears. This shows you all available folders that are available to the server.

Screenshot 1-18 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.9 NetSafe Administrator, Location Mnemonic Settings (Folder)

If the shared folder is on the network or exists as a mapped drive, you can select it this way.

Screenshot 1-19 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.10 NetSafe Administrator, Location Mnemonic Settings (Folder)

Conversion method type.

Screenshot 1-20 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.11 NetSafe Administrator, Location Mnemonic Settings (Folder)

Depending on your setup you may have one or both options:

  • Lincoln PDF Converter
  • Red Titan EscapeE PDF Converter

Note: In this example Red Titan is not installed and not seen in the drop-down menu. If Red Titan was installed it would be seen in the drop-down menu.

Screenshot 1-21 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.12 NetSafe Administrator, Location Mnemonic Settings (Folder)

If the folder location specified is on the NetSafe server, the (Deliver File Unencrypted (Local Folders Only) can be selected.

Screenshot 1-22 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.13 NetSafe Administrator, Location Mnemonic Settings (Folder)

If the (Deliver File Unencrypted (Local Folders Only) option is selected. The file can be delivered in unencrypted in the PDF Format or a Text Format.

  • PDF
  • TEXT

Screenshot 1-23 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.14 NetSafe Administrator, Location Mnemonic Settings (Folder)

  1. Select the (Text) option.

Screenshot 1-24 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.15 NetSafe Administrator, Location Mnemonic Settings (Folder)

Choosing the (Text/) option will enable the settings highlighted.

These options are only associated with the (Deliver File Unencrypted) option selected. Delivering the file unencrypted to any client workstation will not work. 

Note: These options can only be configured with Interbit Data Technical Support for assistance.

Screenshot 1-25 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.16 NetSafe Administrator, Location Mnemonic Settings (Folder)

  1. Deselect the, Deliver File Unencrypted (Local Folders Only) check box.

Screenshot 1-26 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.17 NetSafe Administrator, Location Mnemonic Settings (Folder)

The highlighted option will be covered next.

Screenshot 1-27 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.18 NetSafe Administrator, Location Mnemonic Settings (Folder)

Reports sent from NetSafe to the NetSafe Client have a unique identifier attached to them. This prevents the reports from being overwritten. If you only want to keep the latest reports not the ones from an hour ago leave this check box enabled.

  1. Select the (Remove Unique Identifier from Filename).

Screenshot 1-28 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.19 NetSafe Administrator, Location Mnemonic Settings (Folder)

(Deliver Tiff Image (Universal Print Option) is enabled by default:

  • This only works with the Red Titan converter
  • This option sends an additional Tiff Image variation of the report to the NetSafe Client
  • If the report needs to be printed from the NetSafe Client, the Tiff Image variation is then used. Allowing you to print to any printer instead of being limited to PCL compatible printers

Screenshot 1-29 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.20 NetSafe Administrator, Location Mnemonic Settings (Folder)

If this Location Mnemonic is also set up to receive reports in the Table Templates. You can make that data read only by enabling the (Table Template Data is Read Only) check box.

  1. Select the (Table Templates Data is Read Only).

Screenshot 1-30 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.21 NetSafe Administrator, Location Mnemonic Settings (Folder)

If you are sending the MPI into NetSafe without using Table Templates. Select this if you want the Location Mnemonics to receive the MPI.

  1. Select the (Deliver MPI Database Backup) check box. 

Screenshot 1-31 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.22 NetSafe Administrator, Location Mnemonic Settings (Folder)

Purge File Settings. You can set how long a report stays on the NetSafe Client before it gets purged from the NetSafe Client.

Screenshot 1-32 NetSafe Administrator, Location Mnemonic Settings (Folder)

8.23 NetSafe Administrator, Location Mnemonic Settings (Folder)

If the end user has the NetSafe Client open and ten minutes go by without any activity the NetSafe Client will automatically close itself along with any open reports.

Note: The lowest this setting can be is ten minutes.

Screenshot 1-33 NetSafe Administrator, Location Mnemonic Settings (Folder)

9.0 NetSafe Administrator, Location Mnemonic Settings (Alias)

Alias is the bridge that connects the location name on any report to where the report is to be delivered.

  1. Select the (Alias) setting.

Screenshot 1-34 NetSafe Administrator, Location Mnemonic Settings (Alias)

9.1 NetSafe Administrator, Location Mnemonic Settings (Alias)

  1. Select the (Add) icon.

Screenshot 1-35 NetSafe Administrator, Location Mnemonic Settings (Alias)

9.2 NetSafe Administrator, Location Mnemonic Settings (Alias)

The Add Alias window pops up.

  1. Enter an (Alias)

Screenshot 1-36 NetSafe Administrator, Location Mnemonic Settings (Alias)

9.4 NetSafe Administrator, Location Mnemonic Settings (Alias)

  1. Enter (NSY) into the entry box.
  2. Select the (Add) icon.

Note: NSY for Nursery is used in this example only.

Screenshot 1-37 NetSafe Administrator, Location Mnemonic Settings (Alias)

9.5 NetSafe Administrator, Location Mnemonic Settings (Alias)

This Location Mnemonic now contains an Alias called (NSY). Everytine NetSafe pulls off (NSY) in a report it will be directed to this Location Mnemonic that we are building. More Aliases can be added as needed.

Screenshot 1-38 NetSafe Administrator, Location Mnemonic Settings (Alias)

10.0 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

  1. Select the (Distribution List) setting.

Screenshot 1-39 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

10.1 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

We are not building a Distribution List Location Mnemonic these settings cannot be accessed.

Screenshot 1-40 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

11.0 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

Active Directory logon default settings are carried over from the master active directory settings located in NetSafe administrator’s system settings. 

Note: If you are not using Active Directory logon with NetSafe these settings will not apply to you.

Screenshot 1-41 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

11.1 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

By selecting the (Use The Active Directory Settings) check box, you can control what security groups have access to this Location Mnemonic.

Screenshot 1-42 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

11.2 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

To enable specific Domain.

Screenshot 1-43 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

11.3 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

Move the Domain from the (Disabled) list to the (Enabled) list.

Screenshot 1-44 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

11.4 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

To enable specific Security Groups.

Screenshot 1-45 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

11.5 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

Move the Security Groups from the (Disabled) list to the (Enabled) list.

Screenshot 1-46 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

11.6 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

  1. Select the (Save) icon.

Screenshot 1-47 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

 

NetSafe (Location Mnemonic Overview) P3 100-0106-00

 

1.0 Introduction

This document is used for the following Interbit Data products, NetSafe. This explains the topic of Location Mnemonic P3.

NetSafe receives reports from the HCIS, then process the reports through a set of rules. Templates separate the reports, determine how to route, and give the report a filename. The reports are then sent to remote workstations in the hospital.

NetSafe is a business continuance solution, comprised of two software applications, NetSafe Administrator and NetSafe Client. This document explains the topic of Location Mnemonic Overview P3.

2.0 Overview

Location Mnemonic P3 

3.0 NetSafe Administrator, Location Mnemonic

  1. Navigate to the (Location Mnemonic) Setting.

Screenshot 1-0 NetSafe Administrator, Location Mnemonic

3.1 NetSafe Administrator, Location Mnemonic

Highlighted are all the Location Mnemonics on the test machine.

Screenshot 1-1 NetSafe Administrator, Location Mnemonic

3.2 NetSafe Administrator, Location Mnemonic

For example; highlighted in red is a group of computer-workstations on the test network that you want to use as NetSafe downtime computer-workstations. Each computer-workstation is going to receive the same reports.

Highlighted in red, three computer-workstations on the third floor have three (Location Mnemonics).

The next step in this example; is to build a (Distribution List) that contains those three (Location Mnemonics). When we direct reports to the (Distribution List) all the computer-workstations that are in that list will receive a copy of that report.

Screenshot 1-2 NetSafe Administrator, Location Mnemonic

3.3 NetSafe Administrator, Location Mnemonic (Add)

  1. Select the (Add) icon.

Screenshot 1-3 NetSafe Administrator, Location Mnemonic (Add)

4.0 NetSafe Administrator, Location Mnemonic Settings (Main)

  1. Navigate to the (Location Delivery Type) drop-down menu.

Screenshot 1-4 NetSafe Administrator, Location Mnemonic (Main)

4.1 NetSafe Administrator, Location Mnemonic Settings (Main)

  1. Select the (Location Delivery Type) drop-down arrow to see the options.

Screenshot 1-5 NetSafe Administrator, Location Mnemonic (Main)

4.2 NetSafe Administrator, Location Mnemonic Settings (Main)

  1. Select the (Distribution List) from the (Location Delivery Type) drop-down menu.

Screenshot 1-6 NetSafe Administrator, Location Mnemonic (Main)

4.3 NetSafe Administrator, Location Mnemonic Settings (Main)

  1. Enter a name in the (Location Mnemonic) entry-box.
  2. Enter a name in the (Location Description) entry-box.
  3. Enter a name in the (Organization) entry-box.

Note: Use a naming convention to make it easier to understand the purpose of this (Location Mnemonic).

Screenshot 1-7 NetSafe Administrator, Location Mnemonic Settings (Main)

5.0 NetSafe Administrator, Location Mnemonic Settings (Folder)

  1. Navigate to the (Folder) setting.

Screenshot 1-8 NetSafe Administrator, Location Mnemonic Settings (Folder)

5.1 NetSafe Administrator, Location Mnemonic Settings (Folder)

  1. The (Folder) setting is inaccessible.

Note: The (Folder) setting is only accessible when the (Location Delivery Type is set to (Windows Folder).

Screenshot 1-9 NetSafe Administrator, Location Mnemonic Settings (Folder)

5.2 NetSafe Administrator, Location Mnemonic Settings (Folder)

This is what the inaccessible (Folder) settings looks like.

Screenshot 1-10 NetSafe Administrator, Location Mnemonic Settings (Folder)

6.0 NetSafe Administrator, Location Mnemonic Settings (Alias)

  1. Select the (Alias) setting.

Note: Alias is the bridge that connects the (Location Name) on any report to where the report is to be delivered.

Screenshot 1-11 NetSafe Administrator, Location Mnemonic Settings (Alias)

6.1 NetSafe Administrator, Location Mnemonic Settings (Alias)

  1. Select the (Add) icon.

Screenshot 1-12 NetSafe Administrator, Location Mnemonic Settings (Alias)

6.2 NetSafe Administrator, Location Mnemonic Settings (Alias)

The (Add Alias) window pops up.

Screenshot 1-13 NetSafe Administrator, Location Mnemonic Settings (Alias)

6.3 NetSafe Administrator, Location Mnemonic Settings (Alias)

  1. Enter the (Alias) name.
  2. Select the (Add) icon.

Note: In this example only the (Alias Name) is 3S.

Screenshot 1-14 NetSafe Administrator, Location Mnemonic Settings (Alias)

6.4 NetSafe Administrator, Location Mnemonic Settings (Alias)

This (Distribution List) contains an (Alias) for 3S. Every time NetSafe pull off 3S on any report the report will be directed to this (Distribution List).

On some reports the (Location) will show up as 3S and on other reports it will show up as 3 South. So, you need to repeat the steps to add in that variation as well.

Screenshot 1-15 NetSafe Administrator, Location Mnemonic Settings (Alias)

7.0 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

This is the third floor (Distribution List) so I want to have the 3N location reports go here as well, the 3N reports can possibly be spelled out as 3North. Need to add in all these variations as (Aliases).

  1. Select the (Distribution List) setting.

Screenshot 1-16 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

7.1 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

This is where NetSafe is told where the reports must be direct to.

Screenshot 1-17 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

7.2 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

  1. Select the (Add) icon.

Screenshot 1-18 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

7.3 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

The (Select Location Mnemonics) window pops up.

Screenshot 1-19 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

7.4 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

If NetSafe has a lot of (Location Mnemonics) the search filter can be used to narrow the list.

Screenshot 1-20 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

7.5 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

This is a (Distribution List) for all third-floor locations. The 3South location is highlighted. The Add it by selecting the (Save) icon.

  1. Highlight the 3North location.
  2. Select the (Save) icon. 

Screenshot 1-21 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

7.6 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

When you are on the (Select Location Mnemonic) window you can only choose and add one (Location Mnemonic) at a time.

Screenshot 1-22 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

7.7 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

  1. Select the (Add) icon.

Screenshot 1-23 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

7.8 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

There is no multiple select option available.

Screenshot 1-24 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

7.9 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

  1. You can add a (Distribution List Mnemonic) to another (Distribution List Location Mnemonic).

Note: You must be extremely careful not to create an infinite loop.

Screenshot 1-25 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

7.10 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

  1. Repeat the process to add the 3North location and the 3NUSUP location as well.

Screenshot 1-26 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

7.11 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

All the Location Mnemonics have been added to this (Distribution List).

Screenshot 1-27 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

7.12 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

All the Location Mnemonics have been added to this (Distribution List).

Screenshot 1-28 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

8.0 NetSafe Administrator, Location Mnemonic Settings (Alias)

  1. Select the (Alias) setting.

Screenshot 1-29 NetSafe Administrator, Location Mnemonic Settings (Alias)

8.1 NetSafe Administrator, Location Mnemonic Settings (Alias)

NetSafe now knows that is receives any of the highlighted reports on the (Alias) list that a copy of the report will be sent to each of these locations.

Screenshot 1-30 NetSafe Administrator, Location Mnemonic Settings (Alias)

8.2 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

  1. Select the (Distribution List) setting.

Screenshot 1-31 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

9.0 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

NetSafe now knows that is receives any of the highlighted reports on the (Alias) list that a copy of the report will be sent to each of these locations.

Screenshot 1-32 NetSafe Administrator, Location Mnemonic Settings (Distribution List)

10.0 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

The (Active Directory) setting do not apply to a (Distribution List). These settings are inaccessible.

Screenshot 1-33 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

10.1 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

The (Active Directory) setting do not apply to a (Distribution List). These settings are inaccessible.

Screenshot 1-34 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

10.2 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

The (Active Directory) setting do not apply to a (Distribution List). These settings are inaccessible.

Screenshot 1-35 NetSafe Administrator, Location Mnemonic Settings (Active Directory)

11.0 NetSafe Administrator, Location Mnemonic

Building a NetSafe (Distribution List) (Location Mnemonic) for the third floor.

Screenshot 1-36 NetSafe Administrator, Location Mnemonic

 

NetSafe (Administration Introduction 1.12.n.n ) 100-0201-00

 

1.0  Introduction

This document is used for the following Interbit Data products, NetSafe. This explains the topic of Installing the NetSafe Administrator.

Network and system downtime, whether unplanned or scheduled, creates a potential risk of reduced patient care. When the electronic patient information is unavailable due to network or system outages, your organization’s ability to care for the patients is compromised. Being able to continually retrieve and review patient information and reports is critical, whether the host system is available or unreachable for any reason. NetSafe is a software application from Interbit Data that allows for decentralized backup of patient information. Unlike a centralized approach, with NetSafe you can capture reports generated by your HCIS, automatically extract data elements from the reports, and store the reports at locations throughout your network at regular intervals.

NetSafe’s features and functionality ensure that the most recent patient data is captured. If your network or system becomes unavailable, those individuals who need immediate access to timely information can search the locally stored reports for patient information, and view or print it as needed.

This chapter includes the following topics:

  • NetSafe Overview
  • Accessing NetSafe Administrator
  • NetSafe Administrator User Interface
  • NetSafe Client
  • NetSafe Web Client

1.1 Overview

NetSafe enables you to automatically capture and preserve patient information generated from your HCIS at regular intervals and to store it on local PCs as a backup strategy in the event of a network or system outage. You can access this information, which is stored as PDF files, for lookup, review, and/or printing. This eliminates the need for continuous printing of patient reports, substantially reduces paper usage, and saves hours of work generating the reports locally. Having up-to-date patient information whenever you need it ensures that you can deliver quality patient care even when your systems or networks are unavailable.

NetSafe is a standalone application that runs on the following Microsoft Windows Operating Systems.

1.2 Supported Microsoft Windows Operating Systems

Table 1-0 Supported Microsoft Windows Operating Systems

Server

Client

Windows Server 2019

Windows 10.0

Windows Server 2016

Windows 8.1

Windows Server 2012 R2

Windows 8

Windows Server 2012

 

Legacy Support *

 

Windows Server 2008 R2

Windows 7

Windows Server 2008

 

Note: Either a 32-bit or 64-bit version is supported.

Note: *  End of life operating systems. Future releases are not guaranteed to be compatible.

Once installed and configured, NetSafe enables you to define rule sets that are formulated based on the needs and requirements of your organization. These rule sets capture different types of reports and documents, and automatically direct them to a hard drive on a PC or to a printer.

The functionality available in NetSafe includes the ability to:

  • Define and capture an unlimited number of reports
  • Formulate rules that are used to scan reports to identify locations for delivery
  • Automatically deliver reports to the appropriate devices
  • Store data at an unlimited number of locations throughout your network
  • Encrypt and/or zip data to maintain confidentiality and preserve space
  • Search data with a simple GUI client to retrieve report information
  • Create an audit trail using comprehensive logging
  • Store logs of all reports on the central server

The functionality and usability of NetSafe is only limited by the hardware configuration at your site, such as processor speed, network capacity, and available disk space. For example, when NetSafe downloads new files, it does a complete replacement of all stored files. Thus, if you have a very large file that is downloaded frequently, the time it takes your system to process such a file could negatively impact throughput time. To avoid such bottlenecks, you should evaluate your hardware status and determine if an upgrade would be beneficial. In addition, purchasing additional PDF converters will help balance the workload if many files are to be processed on a regular basis.

In effect, NetSafe enables you to configure a backup storage mechanism for all your most important electronic medical records (EMRs), ensuring uninterrupted patient care. For example, immediate access is required always for patient’s medical administration records (MAR), but the system in the pharmacy that contains this information is down. Using NetSafe, you can identify a secondary device to receive copies of MARs. That information is then either stored on a server at your local site for later on-line retrieval, transferred to another electronic media, or printed. Thus, always you have local access to this critical information. The frequency at which this information is received by NetSafe and updated at the local site is defined by you to meet the needs of your organization.

The capabilities of NetSafe are not limited to MARs. All your EMRs can be processed by NetSafe to ensure that up-to-the-minute and accurate patient information is available at the point where care is provided. In addition, NetSafe can process your electronically stored business records (for example, payroll information), aiding in business continuity, by providing a backup for this information.

NetSafe works by monitoring port 515 (LPD default port) on its local system for files sent to it by your HCIS system. Within your HCIS, all you need to do is configure printers that send files to that port on the machine that NetSafe monitors. When NetSafe receives a file, it processes it as specified, either storing it on a local disk, or printing out a hard copy, or both. To accomplish this task, NetSafe uses report distribution templates. Report distribution templates are formulated using the features of the Distribution Wizard. Distribution report templates determine where the report should be stored on the network.

If there is network downtime, client computers access the reports processed by NetSafe by using the NetSafe Client. From the NetSafe Client you can view and print all the available reports, as needed.

Hospitals have either one or two PC’s per unit area that are used as downtime PC’s. In addition to the unit area, most hospitals also have dedicated PC’s in the different departments that also receive the department reports. 

For example, the pharmacy receives a copy of the MAR/eMAR, the laboratory receives a copy of the LAB Summary report and admissions receives a copy of the MPI.

1.3 Accessing NetSafe Administrator

The NetSafe Administrator user interface (UI) displays when the NetSafeAdministrator.exe program starts. To access the NetSafe Administrator UI, you must log into the program on the computer on which it is installed. Before logging in, you need to know the following:

  • The IP address or Domain Name System (DNS) of the computer on which the InterbitAdminAgent.exe program is installed
  • Username
  • Password

To log into NetSafe Administrator, perform the following steps.

Table 1-3 Accessing NetSafe Administrator

Step

Action

1.

Click on the NetSafe icon ( ) on your desktop.

Note: If this icon does not display on your desktop, NetSafe can be accessed from the Windows Start menu, the default location is:

%ProgramFile(x86)%Interbit DataNetSafeNetSafeAdministrator.exe

The authentication process begins, and the NetSafe Administrator log-in dialog box displays.

2.

In the Server text entry box, enter the IP address or DNS of the computer on which the InterbitAdminAgent.exe is installed.

Note: The loop back address, 127.0.0.1, can be used in the text entry box Server: if the service, InterbitAdminAgent.exe, is running on the same server. Otherwise, the IP address or DNS name must be used.

3.

Enter a username in the Username text entry box.

4.

Click Connect.

The NetSafe application starts up.

If you click Connect and NetSafeAdministrator.exe fails to establish a connection to InterbitAdminAgent.exe, an error message displays with information about the cause of the failure.

5.

Click Connect.

The NetSafe application starts up.

If you click Connect and NetSafeAdministrator.exe fails to establish a connection to InterbitAdminAgent.exe, an error message displays with information about the cause of the failure.

Note: A default administrator username (NetSafe) and a default password are provided with your application. Once setup is complete, you should change the password (this should be longer than four characters) for NetSafe or delete the username completely. Contact Interbit Data for the default password.

1.4 NetSafe Administrator User Interface

After NetSafe completes the authentication process, and the login to NetSafeAdministrator.exe is successful, a connection to the InterbitAdminAgent.exe is established, and the main NetSafe Administrator window displays.

Screenshot 1-0 Administration Window

On the left side of the window is the Settings list. This list enables you to manage NetSafe, including adding and editing distribution locations, defining report distribution templates, monitoring system activity and logs, and defining system settings.

Screenshot 1-1 NetSafe Administrator Main Settings

The following table lists and describes the settings available in the NetSafe application.

Table 1-4 NetSafe Application settings

Dialog

Description

Activity Logs

Monitors the different queues that are used to process and distribute reports and displays the current status of each report.

Unknown Location Logs

Records when a report was not sent to a location because the name extracted from the report did not match either a location mnemonic or an alias. From this dialog an administrator can:

  • Forward the failed report to another location mnemonic
  • Delete the report

Location Mnemonic

Add, edit or delete a distribution location by specifying a location mnemonic.

Alias

Add, edit or delete location aliases, which allow a report distribution template to deliver reports to locations known by multiple alternate names or keywords.

Report Templates

Add, edit, and delete report distribution templates. These templates indicate to NetSafe:

  • How to separate individual reports from a batch report
  • The location to which each report is distributed
  • How each report is named

Template Recipient Groups

Create a list of location mnemonics that can be referenced in the report templates for use within the exclusion lists.

Report Logs

Enables you to direct reports received by NetSafe to a particular location mnemonic(s) by locating and capturing specific text strings within the report.

Table Templates

Add, edit, or delete table templates used to import CSV files into tables that can be accessed later through the client.

Password Manager

Change the password assigned to the encryption certificate that is associated with a report processed by NetSafe.

Client Login Backup

Add, edit or delete login accounts that can be used to log into a NetSafe Client when connectivity between the NetSafe Client and the Active Directory server is lost.

Administrators

Enables the Administrator to create and modify other NetSafe administrator accounts.

E-Mail Notification

Automatically send to defined recipients e-mail alert notification whenever an issue with the delivery of a report is encountered.

User Activity Logs

Records changes that are made to the NetSafe setup by an administrator. The information recorded includes:

  • Creating, updating, or deleting location mnemonics
  • Creating, updating, or deleting distribution report templates
  • Modifying system settings
  • Viewing a report

NetSafe generates a log of these activities, which indicates the type of change made, when the change was made, and which administrator account made the change.

System Settings

Enables the Administrator to set system parameters that pertain to the following:

  • E-mail
  • Purge Agent
  • LPD Agent
  • Socket Agent
  • Relay Agent
  • Client Agent
  • Processing Agent
  • Licenses
  • Miscellaneous
  • Active Directory

Using the items on the NetSafe Administrator Settings list you can create location mnemonics. Location mnemonics specify where a report is delivered. Also, from this list, you can use the Report Distribution Wizard to configure report distribution templates. These templates are used to determine the location mnemonic to which the reports are sent. Additionally, the Distribution Wizard enables you to specify whether individual reports should be separated out of a batch report and sent to unique locations.

NetSafe also provides you with the ability to view which reports have been downloaded, are currently being processed, are waiting to be distributed, and which reports have been distributed. In addition, you can ascertain whether the Distribution Wizard found a location on a report but could not determine to which location mnemonic it should be sent. There are also logs that record data each time a NetSafe administrator reviews a report, deletes a report, forwards a report, or adds or edits a location mnemonic.

 This manual describes the functionality accessible from the NetSafe Administrator main menu for an account that has all privileges. It includes the following functionality:

  • Adding, editing, or deleting NetSafe administrator accounts

Reference section 12.0 “Administrators”

  • Configuring NetSafe’s system settings

Reference section 15.0 “System Settings”

  • Specifying one or more NetSafe Client backup login accounts

Reference section 11.0 “Client Login Backup”

  • Identifying a distribution location by adding or editing or deleting a location mnemonic as necessary

Reference section 4.0 “Location Mnemonics”

  • Adding, editing, or deleting location aliases, which allow the distribution wizard to deliver reports to locations by different keywords

Reference section 5.0 “Aliases”

  • Monitoring activity queues that allow NetSafe administrators to view which reports have been downloaded, which reports are have been processed, which reports are waiting to be delivered and which reports have been delivered,

Reference section 2.0 “Activity Logs”

  • Monitoring a record of reports that could not be delivered to a location mnemonic because either the location mnemonic could not be determined or that the location alias could not be determined,

Reference section 3.0 “Unknown Location Logs”

  • Monitoring the application log to determine which NetSafe administrator viewed reports, as well as which administrator added, edited or deleted report distribution template and location mnemonic settings;

Reference section 2.0 “Activity Logs”

  • Setting up e-mail alert notifications

Reference section 13.0 “E-Mail Notifications”

  • Adding, editing, or deleting report distribution templates, which are used to separate out and determine to which location a report should be sent

Reference section 6.0 “Report Templates”

  • Viewing a log of reports that were processed by a report distribution template; Reference section 8.0 “Report Logs”
  • Changing encryption certificate password

Reference section 10.0 “Password Manager”

1.5 NetSafe Client

The NetSafe Client is a utility from Interbit Data that resides on a local machine that enables you to access reports distributed to that location by NetSafe. The NetSafe Client is used to access the following:

  • Encrypted patient reports (for example MARs) that have been stored in the shared network folder location
  • Patient information stored by a master patient index (MPI) database backup
  • Other customized reports that have been processed by a NetSafe Table Template

When user’s login into NetSafe Client, they are asked to provide several pieces of information to help ensure the security and confidentiality of the stored information. The information that a NetSafe Client user must provide is determined by the NetSafe Administrator when setting the parameters for processing reports received from the HCIS. These parameters include:

  • This type of NetSafe Login dialog box that displays
  • The type of login account to be used, Active Directory or Client Backup Login
  • The name of the encryption certificate to be used for accessing reports
  • The name of the login database to be used for accessing reports

After these parameters have been set, the person in your organization responsible for NetSafe needs to communicate this information to those individuals accessing NetSafe Client.

When an individual successfully logs into NetSafe Client, a dialog box displays listing all the reports stored in the database at the time the NetSafe Client starts. This is a snapshot of the contents of the database. If additional reports are downloaded while NetSafe Client is running, those reports are not added to the list of reports currently displayed. To view any additional reports, the NetSafe Client must be stopped and restarted.

The same situation is true for the MPI database backup. If a newer database is delivered to the folder location after the NetSafe Client is started, the NetSafe Client must be stopped and restarted before viewing the newer database.

The NetSafe Client must run from the same folder where the downloaded files are stored. Each time NetSafe downloads reports to the local PC, it checks the version information for both the Client and the certificate password. If NetSafe detects that the most recent version of NetSafe Client is not installed locally, it pushes the new client out to the local PC before downloading the most recent reports.

Similarly, NetSafe checks to make sure that the password used to encrypt the report exists in the CF folder at the local PC. If the certificate does not exist in the CF folder, the Relay Agent delivers the certificate stored on the server to the CF folder. If the password is changed by the administrator (using the functions on the Password dialog), the certificate on both the server and local PC are updated with the new password.

When logging into NetSafe Client, one of two dialog boxes display:

Screenshot 1-2 Login

Active Directory enabled NetSafe Client login dialog box:

Screenshot 1-3 Login

The login dialog box that displays is determined by whether Active Directory has been enabled by the NetSafe Administrator; see Active Directory Settings in Chapter 15, System Settings.

Note: Either a 32-bit or 64-bit version is supported.

For those individuals accessing reports using NetSafe Client, you should make available to them the NetSafe Client User’s Guide, which is available on Interbit Data’s Web site, in the Knowledge Base.

1.6 NetSafe Web Client

The NetSafe Web Client is a utility from Interbit Data that provides access to patient records uploaded to the cloud, enabling users of tablets, smart phones and other mobile devices to access critical data wirelessly if power, as well as systems and wired networks, experience an outage. As with the NetSafe Client, when immediate access to up-to-date information is needed, using NetSafe Web Client you can search for stored individual reports, or groups of reports, view their content, and/or print hard copy.

The procedures for configuring NetSafe to distribute reports to the NetSafe Client and the NetSafe Web Client are the same. Specifically, when you define a location mnemonic, you need to specify whether processed reports are sent to a folder on a local PC (for NetSafe Client access), or to a location in the cloud (for NetSafe Web Client access). When user’s login into NetSafe Web Client, they are asked to provide several pieces of information to help ensure the security and confidentiality of the stored information. The information that a NetSafe Web Client user must provide is determined by the NetSafe Administrator when setting the parameters for processing reports received from the HCIS. These parameters include:

  • The type of login account to be used, Active Directory or Client Backup Login
  • The name of the encryption certificate to be used for accessing reports
  • The name of the login database to be used for accessing reports

After these parameters have been set, the person in your organization responsible for NetSafe needs to communicate this information to those individuals accessing NetSafe Web Client.

When an individual successfully logs into NetSafe Web Client, a dialog box displays listing all the reports stored in the database at the time the NetSafe Web Client starts. This is a snapshot of the contents of the database. If additional reports are downloaded while NetSafe Web Client is running, those reports are not added to the list of reports currently displayed. To view any additional reports, the NetSafe Web Client must be stopped and restarted.

The same situation is true for the MPI database backup. If a newer database is delivered to the folder location after the NetSafe Web Client is started, to view the newer database, the NetSafe Web Client must be stopped and restarted.

Each time NetSafe uploads reports to the cloud, it checks the version information for both the Client and the certificate password. If NetSafe detects that the most recent version of NetSafe Web Client is not installed, it pushes the new client out before downloading the most recent reports.

NetSafe also checks to make sure that the password used to encrypt the report exists in the CF folder. If the certificate does not exist in the CF folder, the Relay Agent delivers the certificate stored on the server to the CF folder. If the password is changed by the administrator (using the functions on the Password dialog), the certificate on both the server and in the cloud are updated with the new password.

CAUTION: Because access to the NetSafe Web Client is controlled by Active Directory login accounts, Active Directory must be enabled on NetSafe’s System Settings dialog.

Reference section 15.11 “Active Directory Settings”.

When logging into NetSafe Web Client, the user sees the following dialog box display:

Screenshot 1-4 NetSafe Web Client

If connectivity to the Active Directory server has been lost, the same login dialog box displays, but the following alert displays:

Active Directory is currently unavailable. Please use backup credentials to log in to the application

Contact your IT administrator if you need assistance. Current security context is not associated with an Active Directory domain or forest. For information about setting up NetSafe Web Client, refer to Installing a NetSafe Web Client.

For those individuals accessing reports using NetSafe Web Client, you should make available to them the NetSafe Web Client User’s Guide, which is available on Interbit Data’s Web site, in the Knowledge Base.

1.7 System Requirements

For optimal results in setting up and maintaining the NetSafe server, Interbit Data recommends the following minimum system requirements (physical or virtual).

1.8 Minimum Client Hardware Requirements

Table 1-1 Minimum Client Hardware Requirements

System

Minimum Hardware Requirements

Processor

Dual-Core Processor

Memory

(4) Gigabytes of Random-Access-Memory

Storage

(2) Gigabytes of storage (Non-OS Data Drive)

Software

PDF viewer (e.g., Adobe Reader, Foxit Reader)

Resolution

1366 x 768

     

1.9 Minimum Server Hardware Requirements

Table 1-2 Minimum Server Hardware Requirements

System

Recommended Hardware Requirements

Processor

Quad-Core Processor

Memory

(4) Gigabytes of Random-Access-Memory

Storage

(120) Gigabytes (Data Drive)

Software

PDF viewer (e.g., Adobe Reader)

Resolution

1366 x 768

1.10 Recommended Server Hardware Requirements

Table 1-2 Recommended Server Hardware Requirements

System

Recommended Hardware Requirements

Processor

Octo-Core Processor

Memory

(8) Gigabytes of Random-Access-Memory

Storage

(240) Gigabytes (Data Drive)

Software

PDF viewer (e.g., Adobe Reader)

Resolution

1366 x 768


2.0 Activity Logs

The Activity Logs dialog enables you to view where in the delivery process a report is located at any given time. You can use this dialog to monitor the status of a report, and to help troubleshoot the system.

When a report is received by NetSafe, it passes through a series of processing agents that determine the intended destination for the report. As the report passes through these processes, its status is recorded in a set of queues. From the Activity Logs dialog, you can view the contents of these queues, determine the status of a report, and decide what action to take, if any.

This chapter describes the Activity Logs dialog, and the different queues that can be viewed; it includes the following topics:

  • Delivery Process
  • Activity Menu
  • Activity Queue Purging
  • Comma-Separated Values File
  • Procedures for Viewing & Managing Activity Logs

2.1 Delivery Process

Each report that is downloaded to NetSafe follows a set process through a series of agents and queues. After a report is received by NetSafe it is placed in the LPD Queue — Pending. When a location mnemonic is found, entries are made in LPD Queue — Processed and Relay Queue — Pending. After the report is delivered, an entry for that report is made in Relay Queue — Completed. Additional queues handle errors and deletions. These queues are listed and described in the following table.

Table 2-0 NetSafe Process Queues

Queue

Description

Relay Queue — Completed

Reports that have been delivered to the respective delivery location.

Relay Queue — Pending

Reports that are waiting to be delivered to the respective delivery location.

Relay Queue — Error

Reports that had an error occur during the delivery process.

Relay Queue — Deleted

Reports that have been deleted from Relay Queue – Pending.

LPD Queue — Pending

Reports that are waiting to be processed prior to a determination being made as to whether the report should be processed through a report distribution template or sent directly to a location mnemonic.

LPD Queue — Error

Reports that had an error occur during the delivery process.

LPD Queue — Processed

 Reports that have been delivered to the respective delivery location.

2.2 Activity Menu

On the main NetSafe Administrator menu, click the Activity Logs item in the Settings list to access the processing queues.

Screenshot 2-0 NetSafe Activity Logs

The Activity Logs dialog is divided into the following major sections:

  • Functions that enable you to display the various database queues and to search for entries in those queues
  • Listings that display the entries in the selected queue and properties associated with each entry
  • Functions for viewing and manipulating entries

2.3 Database Selection and Search Functions

The selection and search section provides functionality for selecting the queue to be displayed, and for searching the selected queue to locate an individual entry or a group of entries. The search features, as well as the properties listed, change depending on the queue selected for viewing. The following table lists and describes the elements in this section of the Activity Logs dialog.

Table 2-1 NetSafe Activity Logs, Database Selection and Search Features

Element

Description

Choose Database to View

From this drop-down list box, select the queue to be displayed.

The search options and the information displayed in the listing section change depending on the queue selected.

Load Today’s

Clicking this button displays the current day’s entries for the selected queue; only the entries that have been made on the current date and up to the current time display.

  • The From Date and To Date fields change to the current date
  • The From Time field changes to 00:00:00
  • The To Time field changes to the current time
  • Any entries made in the Location Mnemonic (LPD Queue Name) and Filename text entry boxes are removed

Show All

Clicking this button displays all the entries in the selected queue.

Note: Pressing this button may make the application unresponsive while the entries are loaded. Please give the application time to complete this transaction.

Location Mnemonic

Enter a character string in this text entry box that matches the initial characters in the location mnemonic for which you are looking. The system does a partial lookup, starting at the left character and ending at the right character, looking for location mnemonic(s) that match the characters as entered. Only those location mnemonics that match the entered characters display. For example, if you enter INTE, only location mnemonics that begin with INTE display. The search is not case-sensitive.

Displays for the Relay queues.

LPD Queue Name

Enter a character string in this text entry box that matches the initial characters in the name of the LPD print queue for which you are looking. The system does a partial lookup, starting at the left character and ending at the right character, looking for print queue(s) that match the characters as entered. Only those names that match the entered characters display. For example, if you enter OFFIC only names that begin with OFFIC display. The search is not case-sensitive. Displays for all LPD queues.

Filename

Enter a character string in this text entry box that matches the initial characters in the file name for which you are looking. The system does a partial lookup, starting at the left character and ending at the right character, looking for file names that match the characters as entered. Only those location mnemonics or LPD queues that have a file name property that matches the characters display. For example, if you enter radi, only location mnemonics or LPD queues that have a file name associated with them that begin with radi display. The search is not case-sensitive.

From Date

Enter the date from which you want to start viewing the queue’s entries. Click the down arrow to display the date chooser or enter a date in the text field. The date entered is the starting date used to display the entries after clicking Load Filter.

To Date

Determines the date to which you want to view the queue’s entries. Press the down arrow to display the date chooser or enter a date in the text field. The date entered is the ending date used to display the entries after clicking Load Filter.

Clearing the check box disables To Date and tells the program to search up until the current date.

From Time

Determines the time from which you want to start viewing the queue’s entries. Highlight the hour/minute/second and click the scroll arrows to select a time or enter a time in the text field. The time entered is the starting time used to display the entries after clicking Load Filter.

Clearing the check box disables From Time and tells the program to search, starting from midnight of the date entered in From Date.

To Time

Determines the time to which you want to view the queue’s entries. Highlight the hour/minute/second and click the scroll arrows to select a time or enter a time in the text field. The time entered is the ending time used to display the entries, after clicking Load Filter.

Clearing the check box disables To Time and tells the program to end the search with the current time.

Submit Date and Time

Searches for reports that were submitted to the selected queue within the specified date and time parameters.

Select this option button and then click Load Filter to display the entries.

Delivery Date and Time

Searches for reports that were delivered to the selected queue within the specified date and time parameters.

Select this radio button and then click Load Filter to display the entries.

Displays for the Relay queues, only.

Ascending Order

Reorders the list of entries based on either their location mnemonic or LPD queue name, depending on the database being viewed. Reports with the earliest submit time appear first.

Select this option button and then click Load Filter to reorder the list of entries.

Descending Order

Reorders the list of entries based on either their location mnemonic or LPD queue name, depending on the database being viewed.

Select this radio button and then click Load Filter to reorder the list of entries.

Load Filter

Redisplays the list of entries based on the specified:

  • Location mnemonic
  • File name
  • The date and time parameters
  • The parameters selected in the Sort Row by Location Mnemonic/LPD Queue Name area

As soon as a queue is selected, the complete contents of that queue display in the table beneath the selection and search section, one row for each entry. Each entry in this table is identified by a unique index number and a variety of properties associated with that entry. Using the search parameters and clicking Load Filter, you can change the content of the list. In addition, each column has an arrow button enabling you to display the contents of the list based on the ascending or descending order of that property.

The columns that display change depending on the queue selected for viewing. The following table lists the properties that display for each set of queues.

Table 2-2 NetSafe Activity Dialog, Entry Properties

Queues

Properties

Relay Queues

  • Index
  • Location Mnemonic
  • Description
  • Submit Date
  • Submit Time
  • Delivery Date
  • Delivery Time
  • Deleted Date (Relay Queue — Deleted, only)
  • Deleted Time (Relay Queue — Deleted, only)
  • Deleted By (Relay Queue — Deleted, only)
  • Filename
  • Reason for Failure (Relay Queue — Error, only)

LPD Queues

  • Index
  • LPD Queue Name
  • File Name
  • IP Address
  • Submit Date
  • Submit Time

The following table describes the properties that display in the listing of the queues.

Table 2-3 Activity Menu, Listed Properties

Property

Description

Index

A unique identifier assigned to each entry in the database. NetSafe uses this number to track the report as it progresses through the queues. The number changes when the report moves from one set of related queues to another. For example, the index number assigned to a report in the LPD queues changes when it moves to the Relay queues. This is because several queues feed into the Relay queues, and a new number is assigned to avoid having duplicate index numbers.

Location Mnemonic

The location mnemonic of the destination for the report.

LPD Queue Name

The name of the print queue on the target printer.

IP Address

The IP address of the printer to which the report is to be delivered.

Submit Date

The date on which the report was submitted to the queue.

Submit Time

The time at which the report was submitted to the queue.

Delivery Date

The date on which the report was delivered.

Delivery Time

The time at which the report was delivered.

Deleted Date

The date on which the report was deleted from Relay Queue — Pending.

Deleted Time

The time at which the report was deleted from Relay Queue — Pending.

Filename

The file name of the report.

2.4 Activity Queue Management Functions

Below the queue listing is a set of buttons enabling you to view and manipulate the entries in the displayed queue. The buttons that display change depending on the queue selected for viewing. The following table lists and describes these buttons.

Table 2-4 NetSafe Activity Dialog, Viewing and Manipulation Functions

Element

Description

Total Entries Found

Displays the total number of entries in the selected queue. This number changes depending on the specified search criteria.

<< 

Moves backward, page-by-page, through the list of entries until the first entry displays. Clicking this button when Show All Entries is selected returns the display to the page-by-page format.

>> 

Moves forward, page-by-page, through the list of entries until the last entry displays. Clicking this button when Show All Entries Found is selected returns the display to the page-by-page format.

Show All

Shows all entries on a single page. A scroll bar displays to the right. Click <<, >>, Load All, or Load Filter to redisplay the list of entries in a page-by-page format.

Forward

Sends the selected report to another location mnemonic. Clicking this button displays the Select Location Mnemonic dialog box.

Resubmit

Sends the selected report to the originally intended location mnemonic.

View

Displays the report for the selected entry in PDF format. Although you can select multiple entries, only the selected report closest to the top of the stack displays.

Delete

Deletes the selected entry from the queue.

Details

Displays, in a property sheet, the properties associated with the selected entry.

2.5 Activity Queue Purging

Over a period, several of the activity queues can collect a large number of entries. Under normal conditions, reports should pass through Relay Queue — Pending and LPD Queue — Pending rather quickly (approximately five minutes, but this rate depends on the conditions at your site). Thus, these two queues usually do not grow very large.

However, the size of Relay Queue — Completed and LPD Queue — Processed can grow quite large. NetSafe has a purge agent that can be configured to run at specified intervals and remove from these queues all reports that are older than 90 days. You should periodically monitor the size of these queues and adjust the purge frequency and/or age of the reports stored in one or more of these queues. To change the purge parameters,

Reference section 15.3 “Purge Agent Settings”.

2.6 Comma-Separated Values File

There may be occasions when you want to extract the data in one or more of the queues to view it outside of NetSafe, or for printing. This task can be accomplished by saving the content of the queue to a comma-separated value (CSV) file.

A CSV file stores the data structure of the queue digitally. Each line in the CSV file corresponds to a row in the queue. Within a line, fields are separated by commas, each field belonging to one column. Once generated, the CSV file can be used to copy the data between NetSafe and another application, such as Excel, for printing and viewing in an easily readable format.

From NetSafe you can create a CSV file for either the entire queue, or one or more entries in the queue. To create a CSV file, display the queue that you want to copy, highlight any entry in the queue, and right click the mouse. A pop-up menu displays.

Screenshot 2-1 Pop-up Menu with Comma-Separated Value File Option

From the pop-up menu, select:

  • Export Items to CSV to export all the entries in the queue
  • Export Selected Item to CSV File to export only the selected item(s)

Save the exported entries to the desired location on your system, from where you can import them into the target application.

2.7 Procedures for Viewing and Managing Activity Logs

The Activity Logs dialog enables you to view where in the delivery process a report is located at any given time. You can use the available features to monitor the status of a report, and to help troubleshoot the system. When a report is received by NetSafe, it passes through a series of processing agents that determine the intended location mnemonic for the report. As the report passes through these processes, its status is recorded in a set of queues. From the Activity Logs dialog, you can view the contents of these queues, determine the status of a report, and decide what action to take, if any.

The procedures described here include the following:

  • Locating an Entry in an Activity Queue
  • Resubmitting a Report
  • Forwarding a Report
  • Deleting a Report
  • Viewing a Report
  • Viewing an Entry’s Details

These procedures assume that you have logged in to NetSafe Administrator using an account that has the appropriate permissions. For information about logging in to NetSafe Administrator.

Reference section 1.2 “Accessing NetSafe Administrator”.

If the account that you are using does not have the necessary permissions to view and manage activity queues, see the person in your organization responsible for NetSafe.

2.8 Locating an Entry in an Activity Queue

For a variety of reasons, you may not be able to locate an entry in the displayed list; for example:

  • The report is being handled by another process, thus the entry you want to view is in a queue other than the one displayed
  • Not enough time has elapsed since the report was submitted to a process
  • NetSafe automatically populates the list of entries for each queue when a new entry is submitted to a queue. For a variety of reasons (for example, network traffic, server configuration) a short delay may occur before the entry displays in the list
  • An error in processing may have occurred and the report may be stored in one of the error queues

To locate an entry in an activity queue, perform the following steps.

Table 2-5 Activity Queue

Step

Action

1.

Click Activity Logs from the Settings list. The Activity Logs dialog displays.

2.

Select the queue that you want to view from the Choose Database to View drop-down list.

The entries for that queue display.

3.

Locate the target entry:

  • If you can easily locate the target entry in the list of entries, go to Step 4
  • If you cannot easily locate the target entry in the list of entries, go to Step 5

4.

Scroll through the list of entries until you locate the target entry. (Click << and >> to scroll backward and forward through the list of entries.) Go to Step 6.

5.

In the Location Mnemonic/LPD Queue Name and/or Filename text entry box, enter the first few characters identifying the target entry. The list of entries changes to show only those entries with character(s) matching the character(s) entered in the text entry boxes.

Note: By entering characters in both fields, you can further refine your search.

6.

Determine whether you want to filter the list of entries based on the date and time they were submitted to the queue:

  • If yes, go to Step 7
  • If no, go to Step 8

7.

Do one or more of the following:

  • Enter a starting date in the From Date combo box
  • Select the To Date check box and enter an ending date in the To Date combo box
  • Select the From Time check box and enter a starting time in the From Time combo box
  • Select the To Time check box and enter an ending time in the To Time combo box

8.

Do one or more of the following:

  • Select Submit Date and Time, if you want the entries ordered on the date and time they were submitted to the queue
  • Select Delivery Date and Time, if you want the entries ordered on the date and time they were delivered
  • Select Ascending Order, if you want entries ordered from oldest to most recent date and time
  • Select Descending Order, if you want entries ordered on the most recent date and time to the oldest date and time

9.

Click Load Filter.

The list of entries changes.

2.9 Resubmitting a Report

Sometimes it may be necessary to distribute a duplicate copy of a report. To resend a report to the same location mnemonic, perform the following steps.

Table 2-6 Resubmitting a Report

Step

Action

1.

Click Activity Logs from the Settings list.

The Activity Logs dialog displays.

2.

Select the queue from which you want to resubmit the report from the Choose Database to View drop-down list.

Note: Reports cannot be resubmitted from either Relay Queue — Pending or LPD Queue — Pending.

The entries for the selected queue display.

3.

Locate the target entry:

  • If you can easily locate the target entry in the list of entries, go to Step 4
  • If you cannot easily locate the target entry in the list of entries, refer to section 2.8 “Locating an Entry in an Activity Queue”

·         Go to Step 5.

4.

Scroll through the list of entries until you locate the target entry. (Click << and >> to scroll backward and forward through the list of entries.)

5.

Highlight the target entry.

Note: To resubmit more than one report at the same time, press and hold the CTRL key while selecting additional reports.

6.

Click Resubmit

A confirmation dialog box displays.

7.

Click Yes.

The report(s) is resubmitted to LPD Queue — Pending and is processed again.

2.10 Forwarding a Report

Sometimes recipients request that a report they received should also be sent to one or more other destinations. To forward a report to another location mnemonic, perform the following steps.

Table 2-7 Forwarding a Report

Step

Action

1.

Click Activity Logs from the Settings list.

The Activity Logs dialog displays.

2.

Select either Relay Queue — Completed or Relay Queue — Deleted from the Choose Database to View drop-down list.

The entries for the selected queue display.

3.

Locate the target entry:

  • If you can easily locate the target entry in the list of entries, go to Step 4
  • If you cannot easily locate the target entry in the list of entries, refer to section 2.8 “Locating an Entry in an Activity Queue”
  • Go to Step 5

4.

Scroll through the list of entries until you locate the target entry. (Click << and >> to scroll backward and forward through the list of entries.)

5.

Highlight the target entry.

Note: To forward more than one report at the same time, press and hold the CTRL key while selecting additional reports.

6.

Click Forward. The Select Recipient dialog displays.

7.

Highlight the recipient to whom the report is to be forwarded.

8.

Click OK.

The Select Recipient dialog closes and a confirmation dialog box displays.

9.

Click Yes. The report(s) is resubmitted to Relay Queue — Pending.

2.11 Deleting a Report

Occasionally, a report may remain in a queue an excessive amount of time. If one of these reports is in Relay Queue — Pending, that report is by-passed, and other reports are sent to Relay Queue — Processing. If the report is in LDP Queue — Pending, other reports may not be processed. To delete a report from a queue, perform the following steps.

Table 2-8 Deleting a Report

Step

Action

1.

Click Activity Logs from the Settings list. The Activity Logs dialog displays.

2.

Select either Relay Queue — Pending, Relay Queue — Error, Relay Queue — Deleted, or LPD Queue — Pending from the Choose Database to View drop-down list. The entries for selected queue display.

3.

Locate the target entry:

  • If you can easily locate the target entry in the list of entries, go to Step 4
  • If you cannot easily locate the target entry in the list of entries, refer to section 2.8 “Locating an Entry in an Activity Queue”
  • Go to Step 5

4.

Scroll through the list of entries until you locate the target entry. (Click << and >> to scroll backward and forward through the list of entries.)

5.

Highlight the target entry.

Note: To delete more than one report at the same time, press and hold the CTRL key while selecting additional reports.

6.

Click Delete. A confirmation dialog box displays.

7.

Click Yes. The report is deleted from the queue.

2.12 Viewing a Report

Situations may arise where it is necessary to verify the contents of a report, such as to troubleshoot a stuck report or to verify its content. To view a report in an Activity queue, perform the following steps.

Table 2-9 Viewing a Report

Step

Action

1.

Click Activity Logs from the Settings list. The Activity Logs dialog displays.

2.

Select the queue that you want to view from the Choose Database to View drop-down list. The entries for the selected queue display.

3.

Locate the target entry:

  • If you can easily locate the target entry in the list of entries, go to Step 4
  • If you cannot easily locate the target entry in the list of entries, refer to section 2.8 “Locating an Entry in an Activity Queue”
  • Go to Step 5

4.

Scroll through the list of entries until you locate the target entry. (Click << and >> to scroll backward and forward through the list of entries.)

5.

Highlight the target entry.

6.

Click View. The contents of the report, in PDF format, display in another window.

2.13 Viewing an Entry’s Details

NetSafe provides the capability to view the properties of an entry on a single property sheet. To view the properties of a single entry, perform the following steps.

Table 2-10 Entry Details

Step

Action

1.

Click Activity Logs from the Settings list.

The Activity Logs dialog displays.

2.

Select the queue that you want to view from the Choose Database to View drop-down list. The entries for the selected queue display.

3.

Locate the target entry:

  • If you can easily locate the target entry in the list of entries, go to Step 4
  • If you cannot easily locate the target entry in the list of entries, refer to section 2.8 “Locating an Entry in an Activity Queue”
  • Go to Step 5

4.

Scroll through the list of entries until you locate the target entry. (Click << and >> to scroll backward and forward through the list of entries.)

5.

Highlight the target entry.

6.

Click Details. A property sheet for the selected entry displays.

3.0 Unknown Location Logs

The Unknown Location Logs dialog enables you to view and manipulate reports for which a location could not be identified in the Location Mnemonics. This chapter describes the Unknown Location Logs dialog, and the type of information recorded, including the following topics:

  • Overview of Unknown Location Logs
  • Unknown Location Logs
  • Procedures for Viewing & Managing Unknown Location Logs

3.1 Overview of Unknown Location Logs

When a report is processed by a report distribution template, and a location mnemonic or alias for the intended location is not found in the Location Dictionary, an entry is made in the Unknown Location queue. This entry identifies the report for which a location mnemonic could not be found. You can use the Unknown Location Logs dialog to search for, view, delete, and forward to another location mnemonic reports for which a location mnemonic could not be found.

Reference section 6.0 “Report Templates”.

3.2 Unknown Location Logs

On the main NetSafe Administrator menu, click Unknown Location in the Logs Settings list to access the list of reports for which a location mnemonic could not be found.

Screenshot 3-0 Unknown Location Logs

3.3 Unknown Location Logs Search and Display Functions

The Unknown Location Logs dialog is divided into the following major sections:

  • Functions that enable you to search and display the entries
  • A listing of the entries and properties associated with each entry
  • Functions for viewing and manipulating entries

The search and display section provide functionality for displaying the list of reports and searching for individual reports. The following table lists and describes the elements in this section of the Unknown Location Logs dialog.

Table 3-0   Unknown Location Logs Dialog, Search and Display Functions 

Element

Description

Search Filter

Use this area to refine your search. Select a parameter on which to search from one or more of the three drop-down lists, and then enter a character string in the corresponding text entry box. The parameters on which you can search are:

  • Location Mnemonic — The location mnemonic to which the report was sent, but which was not found in the Location Dictionary

Enter a character string in this text entry box that matches characters in the location mnemonic. The system does a partial lookup, starting at the left character and ending at the right character, looking for location mnemonic(s) that match the characters as entered. Only those location mnemonics that match the characters in the sequence entered display. For example, if you enter INTE, only location mnemonics that have INTE in that order display. The entry is not case-sensitive.

  • Filename — The file name of the report

Enter a character string in this text entry box that matches the initial characters in the name of file for which you are looking. The system does a partial lookup, starting at the left character and ending at the right character, looking for file names that match the characters as entered. Only those location mnemonics or LPD queues that have a file name property that matches the characters display. For example, if you enter radi, only location mnemonics or LPD queue that have a file name associated with them that begin with radi display. The search is not case-sensitive.

  • Distribution Template Name — The name of the report distribution template used for distributing the report

Reference section 6.0 “Report Templates”.

  • Distribution Template Description — The description of the report distribution template used for distributing the report

Reference section 6.0 “Report Templates”.

  • Job # — Used for troubleshooting by Interbit Data Customer Support
  • Report # — Used for troubleshooting by Interbit Data Customer Support

From Date

Enter the date from which you want to start viewing entries. Click the down arrow to display the date chooser or enter a date in the text field.

The date entered is the starting date used to display the entries after clicking Load Filter.

To Date

Determines the date to which you want to view entries. Press the down arrow to display the date chooser or enter a date in the text field. The date entered is the ending date used to display entries after clicking Load Filter.

Clearing the check box disables To Date and tells the program to search up until the current date.

From Time

Determines the time from which you want to start viewing entries. Highlight the hour/minute/second and click the scroll arrows to select a time or enter a time in the text field. The time entered is the starting time used to display the entries after clicking Load Filter.

Clearing the check box disables From Time and tells the program to search starting from midnight of the date entered in From Date.

To Time

Determines the time to which you want to view log entries. Highlight the hour/minute/second and click the scroll arrows to select a time or enter a time in the text field. The time entered is the ending time used to display the entries, after clicking Load Filter.

Clearing the check box disables To Time and tells the program to end the search with the current time.

Ascending Order

Reorders the list of entries based on the entries in the Date and Time columns, from earliest to latest.

Select this option button and then click Load Filter to reorder the list of entries.

Descending Order

Reorders the list of entries based on the entries in the Date and Time columns, from latest to earliest.

Select this option button and then click Load Filter to reorder the list of entries.

Load All

Clicking this button displays the all the entries.

  • The From Date and To Date fields change to the current date
  • The From Time field changes to 00:00:00
  • The To Time field changes to the current time
  • Any entries made in the Search Filter area are removed

Load Filter

Redisplays the list of entries based on the specified:

  • Search Filter parameters
  • The date and time parameters
  • The order selected in the Sort Row by area

3.4 List of Entries

When you click on the Unknown Location Logs dialog, the list of entries for the current day display, one row for each entry. Each entry in this table is identified by a set of properties associated with that entry. Using the search and display parameters and clicking Load Filter, you can change the content of the list. In addition, each column has an arrow button enabling you to display the contents of the list based on the ascending or descending order of that property.

The following table describes the properties that display in the listing of entries.

Table 3-1 Unknown Location Logs Dialog, Listed Properties

Property

Description

Date

The date on which the report was processed.

Time

The time at which the report was processed.

Job #

A NetSafe-generated number that is used by Interbit Data Customer Support for troubleshooting.

Report #

A NetSafe-generated number that is used by Interbit Data Customer Support for troubleshooting.

Location Mnemonic

The location mnemonic to which the report was to be sent, but which was not found in the Location Dictionary.

Distribution Template Name

The name of the report distribution template used for distributing the report.

Distribution Template Description

The description of the report distribution template used for distributing the report.

Filename

The file name of the report.

3.5 Viewing Application Log Entries

Below the listing of actions is a set of buttons that enable you to view and manipulate the entries. The following table lists and describes these buttons.

Table 3-2 Application Log Entries

Element

Description

Total Entries Found

Displays the total number of entries displayed. This number changes depending on the specified display criteria.

<< 

Moves backward, page-by-page, through the list of entries until the first entry displays.

>> 

Moves forward, page-by-page, through the list of entries until the last entry displays.

Show All

Shows all entries on a single page. A scroll bar displays to the right. Click <<, >>, Load All, or Load Filter to redisplay the list of entries in a page-by-page format.

Forward

Sends the selected report to another recipient. Clicking this button displays the NetSafe Location Dictionary.

View

Displays the report for the selected entry, in PDF format.

Delete

Deletes the report for the selected entry.

3.6 Procedures for Viewing and Managing Unknown Location Logs

When NetSafe is unable to identify the destination for a report, the report cannot be delivered. When that happens, NetSafe moves the report to the Unknown Location queue. From the Unknown Location Logs dialog, you can view the list of reports for which a destination could not be found, and decide what action to take, if any. The procedures described here include the following:

  • Locating an Entry in Unknown Location Logs
  • Forwarding a Report
  • Viewing a Report
  • Deleting a Report

These procedures assume that you have logged in to NetSafe Administrator using an account that has the appropriate permissions; that is, you can access the Unknown Location Logs dialog.

For information about logging in to NetSafe Administrator,

Reference section 1.2 “Accessing NetSafe Administrator”.

If the account that you are using does not have the necessary permissions to view and manage unknown location information, see the person in your organization responsible for NetSafe.

3.7 Locating an Entry in Unknown Location Logs

Table 3-3 Unknown Location Logs

Step

Action

1.

Click the Unknown Location Logs item in the Settings list. The Unknown Location Logs dialog displays with the Search Filter fields populated with the following properties:

  • Location Mnemonic
  • Job #
  • File Name

2.

Locate the target entry:

  • If you can easily locate the target entry in the list of entries, go to Step 10
  • If you cannot easily locate the target entry in the list of entries, go to Step 3

3.

Determine whether you want to filter the search using different properties:

  • If yes, go to Step 4
  • If no, go to Step 6

4.

From one or more of the drop-down lists, select the property on which you want to search.

5.

In the Search Filter text entry boxes, enter the first few characters identifying the target entry. The list of entries changes to show only those entries containing character(s) that match the character(s) entered in the text entry boxes.

Note: By entering characters in all three fields, you can refine your search.

6.

Determine whether you want to filter the list of entries based on a date and time:

  • If yes, go to Step 7
  • If no, go to Step 8

7.

Do one or more of the following:

  • Enter a starting date in the From Date combo box
  • Select the To Date check box and enter an ending date in the To Date combo box
  • Select the From Time check box and enter a starting time in the From Time combo box
  • Select the To Time check box and enter an ending time in the To Time combo box

8.

Do one of the following:

  • Select Ascending Order
  • Select Descending Order

9.

Click Load Filter.

The list of entries changes to reflect the specified search criteria. Note: If you want to redisplay all the entries in the Unknown Location, click Load All.

10.

Scroll through the list of entries until you locate the target entry. (Click << and >> to scroll backward and forward through the list of entries.)

3.8 Forwarding a Report

After viewing the properties of a report in the Unknown Location Logs dialog, you may be able to determine to whom the report should be sent.

To forward a report to another location mnemonic, perform the following steps.

Table 3-4 Forwarding a Report

Step

Action

1.

Click Unknown Location Logs in the Settings list. The Unknown Location Logs dialog displays.

2.

Locate the target entry:

  • If you can easily locate the target entry in the list of entries, go to Step 3
  • If you cannot easily locate the target entry in the list of entries
  • go to section 3.7 “Locating an Entry in Unknown Location Logs”
  • Then return to Step 4

3.

Scroll through the list of entries until you locate the target entry. (Click << and >> to scroll backward and forward through the list of entries.)

4.

Highlight the target entry.

Note: To forward more than one fax at the same time, press and hold the CTRL key while selecting additional faxes.

5.

Click Forward.

The Select Location dialog displays.

6.

Highlight the location mnemonic to which the report is to be forwarded.

7.

Click OK.

The Select Location dialog closes and a confirmation dialog box displays.

8.

Click Yes. The report(s) is resubmitted.

3.9 Viewing a Report

Situations may arise where it is necessary to verify the contents of a report, such as to determine to whom the report was intended.

To view a report, perform the following steps.

Table 3-5 Viewing a Report

Step

Action

1.

Click Unknown Location Logs in the Settings list. The Unknown Location Logs dialog displays.

2.

Locate the target entry:

  • If you can easily locate the target entry in the list of entries, go to Step 3
  • If you cannot easily locate the target entry in the list of entries, go to section 3.7 “Locating an Entry in Unknown Location Logs”
  • Then return to Step 4

3.

Scroll through the list of entries until you locate the target entry. (Click << and >> to scroll backward and forward through the list of entries.)

4.

Highlight the target entry.

5.

Click View.

The contents of the report, in PDF format, display in another window.

3.10 Deleting a Report

To delete a report from the Unknown Location Logs dialog, perform the following steps.

Table 3-6 Deleting a Report

Step

Action

1.

Click Unknown Location Logs in the Settings list.

The Unknown Location Logs dialog displays.

2.

Locate the target entry:

  • If you can easily locate the target entry in the list of entries, go to Step 3
  • If you cannot easily locate the target entry in the list of entries, go to section 3.7 “Locating an Entry in Unknown Location Logs”
  • Then return to Step 4

3.

Scroll through the list of entries until you locate the target entry. (Click << and >> to scroll backward and forward through the list of entries.)

4.

Highlight the entry that you want to delete.

Note: To delete more than one report at the same time, press and hold the CTRL key while selecting additional reports. 5

5.

Click Delete.

A confirmation dialog box displays.

Caution: The report is permanently deleted and cannot be recovered.

6.

Click Yes.

The report(s) is deleted from the queue.

4.0 Location Mnemonics

The Location Mnemonics feature is a collection of mnemonics each describing in its simplest form, where the data should be delivered to (the destination folder of the data). While reports are the most common type of data that a mnemonic will process, Table Template databases are another form of data that the mnemonic can handle.

This chapter explains the functionality within NetSafe Administrator that enables you to define Location Mnemonics. This chapter includes the following topics:

  • How Location Mnemonics Work
  • Location Mnemonics Main Menu
  • Location Mnemonic Settings Dialog Box
  • Importing a MPI

4.1 How Location Mnemonics Work

Location mnemonics are used by NetSafe to:

  • Distribute encrypted reports to a shared network folder location
  • Distribute non-encrypted reports to a local folder location
  • Distribute the data to a distribution list containing multiple Location Mnemonics that will receive a copy of the data
  • Distribute encrypted databases to a shared network folder location, referred to as a Table Template. However, an older form of this encrypted database exists as an MPI Database Backup
  • NULL Delivery, the data will be deleted

The data can be sent to the Location Mnemonic through the following manners:

  • If the LPD Queue name used to send the data matches the Location Mnemonic
  • Configuring a Report Template to send the data directly to the Location Mnemonic, or indirectly by matching the Location Mnemonic or alias in the data file
  • Configuring a Table Template to send the data to the Location Mnemonic

When a report is downloaded from your HCIS,

LPD Queue name. How reports are processed is determined in the following sequence:

  1. Whether the LPD queue name is MISPROVDICT.

If yes, the report is processed as a MIS Provider Dictionary.

  1. Whether the LPD queue name is MPIIMPORT.

If yes, the report is processed as a Master Patient Index.

  1. Whether the LPD queue name matches a Table Template name.

If yes, the report is sent to the specified Table Template to be processed.

  1. Whether the LPD queue name matches a location mnemonic.

If yes, the report is sent directly to the specified location mnemonic to be processed

  1. Whether the LPD queue name matches a report distribution template name.

If yes, the report is sent to the report distribution template to be processed.

  1. If no matches are found the report is not processed, and it is sent to Unknown Location.

After NetSafe determines how to handle a report, it is processed by InterbitRelayAgent.exe, which applies the parameters specified for the location mnemonic to:

  • Determine whether the location mnemonic is a distribution location mnemonic

If yes, the report is sent to the specified Windows Folder location mnemonic.

  • Determine whether the location mnemonic is a Distribution List location mnemonic

If yes, the report is sent to one or more specified Windows Folder location mnemonic.

  • Determine the file name assigned to the report when it is distributed to the destination location
  • Route the report to the intended location using a list of alternate location names (that is, location aliases) to determine the correct location
  • Assign an encryption certificate to the report, which is used to un-encrypt the file when it is viewed at the destination location
  • Check to ensure that the current version of NetSafe Client is installed on the local PC

If the NetSafe Client is not present or the version is not the current version, the current version of the NetSafe Client is automatically installed

  • Check to ensure that the encryption certificate file needed to un-encrypt the file is stored on the local PC

If an encryption certificate is not present or up to date, the current certificate is automatically installed.

  • Place the report in the intended shared network folder

Files sent to a shared network folder location are encrypted by NetSafe using a certificate that is created for each location mnemonic. Each shared network folder location has a certificate file that contains all the passwords for location mnemonics that send reports to that folder location.

Multiple location mnemonics can be created that send reports to a single folder location.

4.2 Location Mnemonics Main Menu

If you need to add, delete, or edit an entry in NetSafe’s Location Mnemonic, click the Location Mnemonic item in the Settings list, to display the features that enable you to accomplish these tasks. If you cannot see the Location Mnemonic dialog within the NetSafe Administrator main menu, your account may not have permission to access this functionality. See the person in your organization responsible for NetSafe.

Screenshot 4-0 Location Mnemonic Dialog

The Location Mnemonic dialog is divided into the following major areas:

  • Search and display, enabling you to locate entries
  • Location listings, containing functionality that enables you to view, add, edit, and delete location mnemonics

Each location mnemonic included in the Location list is identified using the following properties, if it was entered into the database:

  • Enabled — Indicates if the location mnemonic is enabled (blue shaded circle) or disabled (blue outlined circle)

Reference section 4.4.1 “Location Mnemonic Main Settings”.

  • Location Mnemonic — The unique name assigned to the location mnemonic
  • Description — A description of the purpose or use of the location mnemonic
  • Organization — The name of the organization or group to which the reports are distributed by the location mnemonic
  • Delivery — The delivery method utilized by the location mnemonic:
  • Windows folder location
  • Distribution list
  • NULL Delivery

4.3 Location Search Parameters

The Search Filter section provides functionality for searching NetSafe’s database to locate location mnemonics or a group of location mnemonics. The following table lists and describes the elements in the Search Filter section of the Location Mnemonic dialog.

Table 4-0 Location Mnemonic Dialog, Search Filter

Element

Description

Location Mnemonic

Enter a character string in this text entry box that matches the initial characters in the location mnemonic for which you are looking. The system does a partial lookup, starting at the left character and ending at the right character, looking for location mnemonics that match the characters as entered. Only those mnemonics that match the characters display. For example, if you enter INTE, only location mnemonics that begin with INTE display. The search is not case-sensitive.

Note: Beginning with NetSafe Version 1.0.8.n, underscores are no longer allowed in newly defined Location Mnemonics. Existing Location Mnemonics that contain underscores continue to be accepted, and do not need to be replaced unless a problem is encountered.

Organization

Enter a character string in this text entry box that matches the initial characters in the organization associated with the location mnemonic for which you are looking. The system does a partial lookup, starting at the left character and ending at the right character, looking for organization(s) that match the characters as entered. Only those locations whose organization match the characters display. For example, if you enter radi, only locations whose organization begin with radi display. The search is not case-sensitive.

Delivery

Select in this drop-down list the delivery type that matches the delivery type of the location mnemonic for which you are looking. Only those location mnemonics whose delivery type match the selected format display.

The default setting is ALL, which displays all delivery types.

Ascending Order

Reorders the list of location mnemonics based on the entries in the Location Mnemonic column; location mnemonics beginning with numbers appear first, followed by location mnemonics alphabetically, A-Z.

Select this option button and then click Reset or Load Search Filter to reorder the list of location mnemonics.

Descending Order

Reorders the list of location mnemonics based on the entries in the Location Mnemonic column; location mnemonics starting alphabetically display first, Z-A, followed by those that begin with numbers, largest to smallest.

Select this option button and then click Reset or Load Search Filter to reorder the list of location mnemonics.

Reset Filter

Clears the Location Mnemonic and Organization text entry boxes

  • Resets the Delivery text entry box to ALL
  • Turns off Show All Locations
  • Redisplays all location mnemonics based on the order selected in the List Row by area

Load Filter

Redisplays the list of location mnemonics based on:

  • The entries in the Location Mnemonic, Organization, and Delivery text entry boxes
  • The order selected in the List Row by area

Show All Locations

Shows all location mnemonics on a single page. A scroll bar displays to the right. Click Reset to redisplay the list of location mnemonics in a page-by-page format.

You can refine your search by making entries in multiple boxes. For example, if you enter radi in the Organization text entry box and INTE in the Location Mnemonic text entry box, only locations whose mnemonic begins with INTE and who belong to the radi organization display.

4.4 Location Management Functions

The following table lists and describes the elements in the Location Mnemonic dialog that enable you to manage the list of location mnemonics. 

Table 4-1   Location Mnemonic, Location Management Features

Element

Description

Total Entries Found

Displays the total number of entries in the location database that currently match the search criteria.

<< 

Moves backward, page-by-page, through the list of location mnemonics until the first entry displays. Clicking this button when Show All Locations is selected returns the display to the page-by-page format.

>> 

Moves forward, page-by-page, through the list of location mnemonics until the last entry displays. Clicking this button when Show All Locations is selected returns the display to the page-by-page format.

Add

Provides a set of dialog boxes that enable you to add a location mnemonic to the Location Mnemonic.

Reference section 4.4 “Location Mnemonic Settings Dialog Box” for a description of these dialog boxes.

Edit

Provides a set of dialog boxes that enable you to edit the properties of the entry highlighted in the list of location mnemonics.

Reference section 4.4 “Location Mnemonic Settings Dialog Box” for a description of this dialog box.

Note: Only one location mnemonic may be selected at one time to be edited.

Delete

Deletes the entry highlighted in the list of location mnemonics.

Note: Once a location mnemonic has been deleted there is no way to retrieve the information for that particular location mnemonic. You are prompted to confirm the deletion before the deletion is completed. Only one location mnemonic may be selected at one time to be deleted.

4.5 Location Mnemonic Settings Dialog Box

When you click Add, the Location Mnemonic Settings dialog box displays. This menu has along its left side a list of settings that can be configured. To the right of this list are the parameters that can be defined for the selected setting displayed.

The settings for which parameters can be set include:

  • Main
  • Folder
  • Alias
  • Distribution List
  • Active Directory

These settings enable you to define and modify the properties of a location mnemonic that distributes a report to a Windows folder. The following sections explain the settings and the parameters associated with each entry in the Settings list.

4.5.1 Location Mnemonic Main Settings

When adding or editing a location mnemonic, the Location Mnemonic Settings dialog box opens with the Main settings displayed.

Screenshot 4-1 NetSafe Location Mnemonics Main Settings

The following table lists and describes the Main settings.

Table 4-2 Location Mnemonic Main Settings Elements 

Element

Description

Disable Location Mnemonic

Indicates whether the location mnemonic is enabled or disabled. When this checkbox is clear:

  • All the other elements for defining the location mnemonic are accessible
  • NetSafe uses this location mnemonic to process reports

When this check box is selected:

  • All the other elements for defining the location mnemonic are inaccessible
  • NetSafe does not use this location mnemonic to process reports. That is, any new entries in the Relay Queue — Pending for this location mnemonic are not processed

Disabled location mnemonics can be deleted from NetSafe using a feature on the System Settings dialog.

Reference section 16.1 “System Settings Menu”

Location Delivery Type

Specifies the type of location mnemonic being defined. A drop-down list that contains the types of location mnemonics to which reports can be sent:

  • Windows Folder Location – This location mnemonic type instructs NetSafe to distribute the report to a specific Windows folder location
  • Distribution List – This location mnemonic type instructs NetSafe to distribute the report to Windows Folder location mnemonics
  • NULL Delivery – This location mnemonic type instructs NetSafe to delete the data.

Note: One Distribution List location mnemonic cannot distribute reports to other Distribution List location mnemonics.

Location Mnemonic

The unique name that identifies the location mnemonic within NetSafe.

The location mnemonic must be unique and cannot duplicate the name of another location mnemonic, report distribution template, or table template. The location mnemonic name is not case-sensitive, thus NurseA and nursea are the same mnemonic to NetSafe.

A location mnemonic can contain any combination of alphanumeric characters.

Careful consideration should be given to the name entered. The name that you enter is the name of the encryption certificate and database that displays when logging into NetSafe Client. Thus, location mnemonic names should be clear and unambiguous so that end users can easily recognize them. This is particularly true if multiple location mnemonics are distributing reports to the same Windows folder on a NetSafe Client.

If you are editing an existing location mnemonic’s information, this field cannot be modified. If you want to change the name of a location mnemonic, you must delete the existing location mnemonic and add a new location mnemonic.

Note: The mnemonic should only consist of upper and lower-case letters, numbers and periods. Example: Floor.4. West.

Location Description

A short statement or explanation about the role of this location mnemonic.

Organization

The name of the organization/department to which the location mnemonic distributes the reports.

Creation Date

Displays the date and time that the location mnemonic was created.

This entry is automatically generated by NetSafe when the settings are saved.

Last Updated Date

Displays the date and time that the location mnemonic was last updated.

This entry is automatically generated by NetSafe when the settings are saved.

Last Updated By

Displays the name of the NetSafe Administrator account that was last used to update the location mnemonic.

This entry is automatically generated by NetSafe when the settings are saved.

If Windows Folder is the selected Location Delivery Type, processed reports are sent directly to the specified folder location.

If Distribution List is the specified Location Delivery Type, processed reports are sent to one or more other location mnemonics. Selecting this Location Delivery Type enables you to configure a location mnemonic as a distribution node to other location mnemonics. You should select this Location Delivery Type if you want to ensure that a single report received from an HCIS is always distributed to all locations that need to have access to the report. For example, you can configure a report distribution template

Reference section 6.0 “Report Templates”, to identify patients. When NetSafe receives a MAR, the report distribution template:

  1. Scans the MAR for patient names.
  2. Separates the individual report for each patient.
  3. Distributes the report to the location mnemonic identified for that patient.
  4. That location mnemonic, which identifies a Windows folder location, distributes the report to all individuals and/or organizations that should receive a copy of that patient’s MAR.

If NULL Delivery is the specified Location Delivery Type, processed reports are deleted and are not sent to any destination folder or distribution list.

4.5.2 Folder Settings

When you select Windows Folder as the location type, you need to specify parameters telling NetSafe how reports sent to the location mnemonic are to be processed.

Screenshot 4-2 NetSafe Location Mnemonics Folder Settings

If the selected Location Delivery Type is either Distribution List or NULL Delivery, the Folder settings are inaccessible.

These settings enable you to define and modify the properties of a location mnemonic that distributes a report to a Windows folder. The following table lists and describes the Folder settings.

Table 4-3 Location Mnemonic Folder Settings Elements 

Element

Description

Certificate Password

A password to be used by NetSafe when encrypting the report prior to distributing it.

When a report is distributed to the specified location for the first time, NetSafe checks to see if an encryption certificate is installed with the location’s NetSafe Client. If one is not found, the certificate associated with that location mnemonic is downloaded along with the report. The certificate used when distributing the report must be available on the destination location for NetSafe Client to decrypt and display the report.

Note: If Active Directory is being used to log into NetSafe Clients, it is recommended that the password entered be as strong as possible. Because with Active Directory log in this certificate password is used to secure reports, and not one used for logging in to NetSafe Client, users do not need to remember this password. A strong, complicated password enhances security, as well as patient confidentiality.

Once saved, the password cannot be changed using the Certificate Password function on this dialog box. For information about changing a password.

Reference section 10.0 “Password Manager”

. . .

Toggles the display of the password among the stored alphanumeric characters and graphic symbols, on this menu only.

Folder Location

Identifies the destination folder for reports processed by the location mnemonic.

The folder path can be one of the following.

  • A fully qualified Uniform Naming Convention (UNC) path

For example: \<computername><sharedfolder><resource>

  • A path to a destination folder on the server

Note: No mapped drives are allowed as a folder location, because the mapped drive is tied to the user account not the system account.

If the Folder Location is to be accessed by NetSafe Web Client, make sure that NetSafe Web Client has been installed at your site. Refer to the NetSafe Web Client Installation Guide

. . .

Displays the Browse for Folder dialog box. Use this dialog box to select the destination folder, if the reports are to be accessed by a NetSafe Client.

The dollar ($) sign allows access to hidden folder shares that are not accessible when browsing network folders with Windows Explorer.

Note: The dialog displays the drives and folders accessible by the local machine, not those found on the server. However, if the administrator is used on the server this note does not apply and the correct drives and folders will display.

Deliver File Unencrypted (Local Folders Only)

Indicates that only an unencrypted report should be sent to the destination location.

NetSafe generates a PDF formatted file and distributes that file to the destination location.

Caution: Unencrypted PDF files can only be sent to a local folder, not to a network share.

Type:

Only enabled when the checkbox Deliver File Unencrypted is checked.

Use this combo box to indicate the type of file that should be delivered to the destination folder (either PDF or TEXT).

Text Extraction Settings: Type:

Only enabled when the checkbox Deliver File Unencrypted is checked and combo box Type is set to TEXT.

Indicates the text extraction method to use.

  • Text Extraction – None: The data in the file will not be processed by a text extraction function
  • Text Extraction – Simple: Useful for MEDITECH Magic reports. Removes basic PCL commands from the report and extracts the text as it comes into the file
  • Text Extraction – Complex [Version 1]: Used for MEDITECH C/S or 6.0 reports. Removes more complex PCL commands from the report and extracts the text as it comes into the file
  • Text Extraction – Complex [Version 2]: Used for MEDITECH C/S or 6.0 reports. Removes more complex PCL commands from the report and extracts the text as it comes into the file. Faster than Version 1
  • Text Extraction – Complex [Version 3]: Used as the Default. Used for any type of PCL reports. The extracted text will conform to the layout in the PDF as best as possible
  • Text Extraction – Complex [Version 4]: Used for any type of PCL report. If the EscapeE application is set up for conversion, this option will extract the text in a layout that conforms to the layout in the PDF. Used in conjunction with a field definition file, selected text from a report can be output as well

Text Extraction Settings: Enable OCR

Only enabled when the checkbox Deliver File Unencrypted is checked and combo box Type is set to TEXT and Text Extraction Settings Type is set to Text Extraction – Complex [Version 4].

Indicates that a field definition file is set up to extract the text using OCR capabilities found in the EscapeE application.

Text Extraction Settings: Standard

Only enabled when the checkbox Deliver File Unencrypted is checked, combo box Type is set to TEXT, Text Extraction Settings Type is set to Text Extraction – Complex [Version 4], and Enable OCR is enabled.

Indicates that a standard field definition file should be used to extract the text from the report using OCR capabilities found in the EscapeE application.

Note: The OCR database must be set up for this to work correctly.

Text Extraction Settings: Page Orientation

Only enabled when the checkbox Deliver File Unencrypted is checked, combo box Type is set to TEXT, Text Extraction Settings Type is set to Text Extraction – Complex [Version 4], and Enable OCR is enabled.

Indicates the page orientation to use when extracting the text from the report.

  • Portrait – The text is extracted that is found within the margins of an 8.5 by 11 page
  • Landscape – The text is extracted that is found within the margins of an 11 by 8.5 page

Note: The OCR database must be set up for this to work correctly.

Text Extraction Settings: Custom:

Only enabled when the checkbox Deliver File Unencrypted is checked, combo box Type is set to TEXT, Text Extraction Settings Type is set to Text Extraction – Complex [Version 4], and Enable OCR is enabled.

Indicates that a custom field definition file should be used to extract the text from the report.

Note: The OCR database must be set up for this to work correctly.

Text Extraction Settings: …

Only enabled when the checkbox Deliver File Unencrypted is checked, combo box Type is set to TEXT, Text Extraction Settings Type is set to Text Extraction – Complex [Version 4], Enable OCR is enabled, and the radio button Custom is enabled.

A dialog will display showing all the field definition files found on the server in the working folder AppSettingsFieldDefinitions

Note: The OCR database must be set up for this to work correctly.

Remove Unique Identifier from Filename

Indicates whether the unique identifier appended to the end of the report’s filename is removed.

The unique identifier is appended when a report is handled by a Report Template. This is in the form, (Base Filename)_(Hex Value of the Archive File)_(Separated Report Number)_(Recipient Number)_(Sub-Recipient Number).

Caution: If the unique identifier is removed, and a report with the same filename as the report being sent exists in the destination location, the existing report is deleted. Make sure that this is the intended result.

When selected, the unique identifier is removed.

Deliver MPI Database Backup

Indicates whether a copy of the Master Patient Index (MPI) database is sent to the destination location.

Sending a report that uses the LPD queue name mpiimport, indicates to NetSafe that the report contains MPI information that must be stored in case of an emergency; see “Importing a MPI”.

When selected, the report is marked as an MPI report.

Table Template Data is Read Only

Indicates whether the data for the entry selected in the NetSafe Client user interface is read-only, or the user can make changes to the text and copy the text.

When selected, the report is read-only.

Purge Files Older than

Specifies the age, in days/hours/minutes, that a report remains in the destination location before it is purged from that folder. The default is 30 days.

Note: It recommended that you evaluate the needs and resources of your organization and reset this time to meet your requirements.

WARNING: Files are not purged when the checkbox Deliver File Unencrypted is enabled.

Application Timeout

Specifies the amount of time, in minutes, that the NetSafe Client maintains a connection when there is no activity.

At the end of the specified time, the NetSafe Client terminates the connection. The default is 10 minutes.

Caution: Although Distribution List location mnemonics are useful, their improper use can affect system performance, especially with long lists of location mnemonics. Careful consideration should be made when distributing many reports daily, or when distributing reports that are large.

4.5.3 Alias Settings

For both the Windows Folder and the Distribution List delivery types, you can add and delete aliases associated with that location mnemonic.

An alias is another way of referencing the location mnemonic. The list of aliases is used by the Distribution Wizard to help determine which report should be delivered to which location mnemonic. The Distribution Wizard is a module within NetSafe that enables NetSafe to search a report for specific text strings, such as a person’s name, and then to match that text string to an alias, to determine the correct location mnemonic to use.

Reference section 6.0 “Report Templates”.

Screenshot 4-3 NetSafe Location Mnemonics Alias Settings

Aliases must be unique within NetSafe. Thus, if you attempt to add an alias name, and that alias name already exists, a message box displays informing you that the alias name is in use and identifies with which location mnemonic it is associated.

Entries in the Location Alias Name list for an individual location mnemonic are also included in a master list of aliases that can be accessed and modified from the Alias dialog. Changes made to a Location Alias Name list display in a master alias list. Additionally, any changes made to the master list of aliases using the features on the Alias dialog are displayed on the Location Alias Name list for the affected location mnemonic.

Reference section 5.0 “Aliases”.

The following table lists and describes the elements for specifying an alias.

Table 4-4 Location Mnemonic Alias Settings Elements

Element

Description

Add

Displays the Add Alias dialog box. Use this dialog box to identify the location mnemonic to which the alias is associated and the alias name itself.

Delete

Deletes the highlighted alias.

4.5.4 Distribution List Settings

If you select Distribution List as the location mnemonics delivery type, you should specify other location mnemonics to which reports are to be sent when they are processed by the Distribution List location mnemonic. Although you can define and save a Distribution List location mnemonic that does not have distribution locations included, it is not useful until you have specified at least one Windows Folder location mnemonic to which reports are sent.

Screenshot 4-4 NetSafe Location Mnemonics Distribution List Settings

If the selected Location Delivery Type is Windows Folder, the Distribution List settings are inaccessible. The following table lists and describes the elements for specifying a Distribution List.

Table 4-5 Location Mnemonic Distribution List Settings Elements

Element

Description

Add

Displays the Select Location Mnemonic dialog box. Use this dialog box to select a previously defined location mnemonic to which reports processed by this location mnemonic are sent. You can select either a Windows Folder location mnemonic or another Distribution List location mnemonic.

Caution: Until a Windows Folder location mnemonic is included in the list, reports sent to this location mnemonic will not be processed and distributed.

Delete

Deletes the highlighted location mnemonic.

4.5.5 Active Directory Settings

To log into a NetSafe Client, users are required to enter a user name and password. As of version 1.1.1.n, NetSafe allows for the use of Active Directory accounts for logging into a NetSafe Client. The Active Directory settings allow you to specify, enable, and disable Active Directories and Security Groups.

Active Directory settings can be defined either globally, for all location mnemonics, or for an individual location mnemonic. This section describes the elements for specifying Active Directory settings for an individual location mnemonic. To specify the Active Directory settings for all location mnemonics,

Reference section 4.4.5 “Active Directory Settings”.

Screenshot 4-5 NetSafe Location Mnemonics Active Directory Settings

The following table lists and describes the Active Directory settings. 

Table 4-6   Location Mnemonic Active Directory Settings Elements

Element

Description

Use These Active Directory Settings

Determines whether the Active Directory settings specified for this location mnemonic are used for logging into NetSafe Client.

When selected, NetSafe downloads these settings, along with processed reports. If the latest version of the NetSafe Client has not already been downloaded, that is downloaded along with the report.

Note: Active Directory settings for an individual location mnemonic are only downloaded if the Deliver Active Directory Enabled Client checkbox on the System Settings Active Directory dialog box is selected.

Reference section 4.4.5. “Active Directory Settings”

The Active Directory elements are inaccessible if the Use These Active Directory Settings checkbox is clear.

Domains; Disabled

Lists all the domains available when logging into a NetSafe Client on the network but have not been enabled for use.

> >

< <

Moves highlighted domain name(s) between the Domains’ Disabled and Enabled lists.

Domains; Enabled

Lists all the domains that have been enabled for use when logging into a NetSafe Client.

Note: If this list is empty, there are no entries in the Security Groups’ Disabled and Enabled lists.

Security Groups; Disabled

Lists all the security groups that are included in the Domains’ Enabled list but have not been enabled for use when logging into a NetSafe Client.

> >

< <

Moves highlighted security group(s) between the Security Groups’ Disabled and Enabled lists.

Security Groups; Enabled

Lists all the security groups that have been enabled for use when logging into a NetSafe Client. Caution: Users not included in this list are unable to log into a NetSafe Client.

Save

Saves the specified Active Directory settings. NetSafe creates a job in Relay Queue — Pending that downloads the NetSafe Client login database. The amount of time it takes to download the new settings depends on the number of jobs in the queue.

4.6 Importing an MPI

The number of patients served by an organization can vary widely. In many large organizations, the number can be in the thousands. NetSafe provides you with the functionality to download a copy of the main Master Patient Index (MPI) database from your HCIS, thus enabling you to access this critical information if your connection to the main MPI database is lost.

Importing the MPI is done by:

  1. Creating a report in your HCIS.
  2. Forwarding that report to a predetermined LDP print queue.
  3. Processing the report in NetSafe.
  4. Distributing the report to the PC specified by the location mnemonic.

4.6.1 Data Structure Formats

A data structure format defines the type of data to be collected, and the sequence in which that data is collected. This data structure format is defined in the MPI report by a header, the first line in the report.

There are two methods for defining the data structure format:

  • Sending reports to NetSafe to be processed by NetSafe’s Table Templates function
  • Sending data from your main MPI database to NetSafe using NetSafe’s MPIIMPORT function

The preferred method for importing this data is to use table templates. Table Templates provide greater flexibility in defining the data structure

Reference section 9.0 “Table Templates”.

For information on using MPIIMPORT, refer to the following sections.

Defining MPIIMPORT Data Structure

The following is the data structure format that must be used when sending data from your main MPI database to NetSafe:

MRN|Lastname|Firstname|Middlename|Address|Address2|City|State|zip|Phone|SSN|DOB|Sex|LASTIPDischargeDate|LastOPServiceDate| LastOPLocation

This format is recognized by NetSafe when re-creating the MPI database on the target PC and ensures that all the relevant information is transmitted. When transmitting the actual data, each patient is entered in the report one patient per line. It is not necessary that all the data fields be filled, but all data fields listed in the report’s header must be included in the definition for each patient. That is, since there are 16 data fields in the header, and one of the fields for a recipient is null, that field must be accounted for by leaving it empty. For example, the following shows the header line of a MPI report sent to NetSafe, and a line of patient data, with some of the fields empty.

4.6.2 Processing Recipient Reports

After the MPI report is created, it must be sent to the LPD printer with the queue name of: MPIIMPORT.

You can either manually send the report to this queue or set up a process within your HCIS to send a newly created MPI report automatically to the MPIIMPORT queue.

To manually send the MPI report to the MPIIMPORT queue, perform the steps in the following table.

Note: LPD may not be installed by default on the server. Verify that the printer is installed before performing the following procedure.

Table 4-7 Processing Recipient Reports

Step

Action

1.

Select Run from the Windows start menu.

2.

Enter cmd in the Open field.

3.

Click OK.

A command window opens.

4.

Enter the following in the command window:

 lpr -S <servername> -P MPIIMPORT <filename>.prn

Where <servername> is the name of the print server, and <filename> is the location and name of the MPI report file. For example:

 lpr -S 127.0.0.1 -P MPIIMPORT recipients.prn

The MPIIMPORT queue is where NetSafe looks for reports that are to be processed. NetSafe’s processing agent reads the report and creates a MPI database on the specified PC, normally the registration machine.

4.7 Procedures for Managing Location Mnemonics

When a report is received by NetSafe, it needs to know the location of the Windows folder to which the report should be distributed. The features on the Location Mnemonic dialog enable you to add, edit, and delete location mnemonics.

Location mnemonics are used by NetSafe in one of the following manners, to:

  • Distribute encrypted reports to a shared network folder location
  • Distribute non-encrypted reports to a local folder location
  • Distribute reports to one or more Windows folder location mnemonics
  • Delete the report from the system

The following procedures explain how to configure and manage location mnemonics in NetSafe, including:

  • Configuring a Windows Folder Location Mnemonic
  • Configuring a Distribution List Location Mnemonic
  • Modifying the List of Aliases
  • Specifying Active Directory Settings

These procedures assume that you have logged in to NetSafe Administrator using an account that has the appropriate permissions. For information about logging in to NetSafe Administrator.

Reference section 1.2 “Accessing NetSafe Administrator”.

If the account that you are using does not have the necessary permissions to configure and manage location mnemonics, see the person in your organization responsible for NetSafe.

Note: These procedures assume that you are adding a new location mnemonic. The same dialog boxes display if you want to edit an existing location mnemonic.

4.7.1 Configuring a Windows Folder Location Mnemonic

Table 4-8 Configuring a Windows Folder Location Mnemonic

Step

Action

1.

Click Location Mnemonic in the Settings list.

The Location Mnemonic Settings dialog displays.

2.

Click Add.

The Main Settings dialog box displays.

3.

Determine whether you want to disable the location mnemonic, that is make it unavailable to NetSafe:

  • If yes, select Disable Location Mnemonic, then go to Step 4
  • If no, go directly to Step 4

4.

From the Location Delivery Type drop-down list, select Windows Folder.

5.

In the Location Mnemonic text entry box, enter the unique name for the location mnemonic.

Note: Beginning with NetSafe Version 1.0.8.n, underscores are no longer allowed in newly defined Location Mnemonics. Existing Location Mnemonics that contain underscores continue to be accepted, and do not need to be replaced unless a problem is encountered.

Note: Only alphanumeric characters, numbers and the period character are acceptable mnemonic characters in the latest version of NetSafe.

6.

In the Location Description text entry box, enter a brief description or explanation of the location mnemonic.

7.

In the Organization text entry box, enter the name of the organization that has access to reports processed by this location mnemonic.

8.

Click Folder item in the Settings list. The Folder Settings dialog box displays.

9.

In the Certificate Password text entry box, enter the password to be used to decrypt the reports for the location.

Caution: The minimum number of characters for the password is four, though it is recommended that the password and complexity matches the requirements of your site.

10.

Determine whether you want the alphanumeric characters for the password to display in this dialog box:

  • If yes, select . . . , then go to Step 11

Note: Making the password’s character visible on this dialog box does not make the characters visible on the NetSafe Client login window.

  • If no, go directly to Step 11

11.

In the Folder Location text entry box, enter the Windows folder to which reports processed by this location mnemonic are distributed.

Note: If you are planning on delivering an unencrypted report, a local folder location must be used. Network folder locations are not permitted.

12.

Determine whether you want to deliver unencrypted reports to this location:

  • If yes, select Deliver File Unencrypted: (Local Folder Only), then go to Step 19
  • If no, go directly to Step 19

13.

Determine the type of unencrypted report that you would like to deliver using the drop-down menu, Type:

  • If PDF, then go to Step 19
  • If TEXT, then go to Step 14

14.

Determine how the text should be extracted from the report using the settings, Text Extraction Settings with the drop-down menu, Type:

  • If Text Extraction – None, then go to Step 19
  • If Text Extraction – Simple, then go to Step 19
  • If Text Extraction – Complex [Version 1], then go to Step 19
  • If Text Extraction – Complex [Version 2], then go to Step 19
  • If Text Extraction – Complex [Version 3], then go to Step 19
  • If Text Extraction – Complex [Version 4], then go to Step 15

15.

Determine if OCR or a Field Definition file should be used to extract the text from the report.

  • If Yes, enable the checkbox Enable OCR, then go to Step 16
  • If No, then go to Step 19

16.

Determine if the Field Definition file should be standard or custom.

  • If Standard, select the radio button, then go to Step 19
  • If Custom, select the radio button, then go to Step 17

17.

Determine the standard field definition file that you would like to use to extract the text from the report. Use the drop-down, Page Orientation, to select either Portrait or Landscape.

  • If Portrait, select the item in the drop-down and go to Step 19
  • If Landscape, select the item in the drop-down and go to Step 19

18.

Select the custom field definition file the application should use when extracting the text from the report using the button, …, or typing the name of the file in the text entry box.

If using the button, …, the dialog Field Definition File Selection dialog will appear and display field definition files that can be used by the system. Select the one that is appropriate and press the button Select on the bottom right hand corner. The selection will be entered in the text entry box.

Go to Step 19.

19.

Determine whether you want to remove the unique numeric identifier appended to the report’s filename by NetSafe, when the report is distributed:

  • If yes, select Remove Unique Identifier from Filename, then go to Step 20
  • If no, go directly to Step 20

20.

Determine whether you want to also deliver to the destination location a copy of the MPI database backup:

  • If yes, select Deliver MPI Database Backup, then go to Step 21
  • If no, go directly to Step 21

21.

Determine whether the data for the entry selected in the NetSafe Client user interface is read only:

  • If yes, select Table Templates Data is Read Only, then go to Step 22
  • If no, go directly to Step 22

22.

Determine whether you want to change the frequency at which files are purged from NetSafe’s Archive folder:

  • If yes, enter the desired purge frequency in the Day(s), Hour(s), and/or Minute(s) text entry box(es), then go to Step 23
  • If no, go directly to Step 23

23.

Determine whether you want to change the length of time an inactive connection stays open:

  • If yes, enter the desired time in the Application Timeout text entry box, then go to Step 24
  • If no, go directly to Step 24

24.

Determine whether you want to modify the list of aliases associated with the location mnemonic:

  • If yes, go to “Modifying the List of Aliases”
  • If no, go directly to Step 25

25.

Determine whether you want to specify Active Directory Settings for this location mnemonic:

  • If yes, go to 4.6.4  “Specifying Active Directory Settings”
  • If no, go directly to Step 26

26.

Click Save Settings.

The Location Mnemonic Setting – Windows Location Folder dialog box closes and the new location mnemonic is added to the list of location mnemonics.

4.7.2 Configuring a Distribution List Location Mnemonic

To add a location mnemonic to NetSafe whose destination is one or more other location mnemonics, perform the following steps.

Note: The location mnemonics included in a Distribution List must have been previously defined using the Location Mnemonic – Windows Folder Location option. Although you can define and save a Distribution List location mnemonic that does not have distribution locations included, it is not useful until you have defined Windows Folder location mnemonics and added them to the location mnemonic.

Table 4-9 Configuring a Distribution List Location Mnemonic

Step

Action

1.

Click the Location Mnemonic item in the Settings list.

The Location Mnemonic dialog displays.

2.

Click Add.

The Location Mnemonic Settings dialog box displays.

3.

From the Location Delivery Type drop-down list, select Distribution List.

4.

From the Settings list, select Distribution List.

The Distribution List dialog box displays.

5.

Determine whether you want to disable the location mnemonic, that is make it unavailable to NetSafe:

  • If yes, select Disable Location Mnemonic, then go to Step 7
  • If no, go directly to Step 7

6.

Click Add.

The Select Location Mnemonic dialog box displays.

7.

In the Location Mnemonic text entry box, enter the unique name for the location mnemonic.

Note: Beginning with NetSafe Version 1.0.8.n, underscores are no longer allowed in newly defined Location Mnemonics. Existing Location Mnemonics that contain underscores continue to be accepted, and do not need to be replaced unless a problem is encountered.

Note: Only alphanumeric characters, numbers and the period character are acceptable mnemonic characters in the latest version of NetSafe.

8.

In the Location Description text entry box, enter a brief description or explanation of the location mnemonic.

9.

In the Organization text entry box, enter the name of the organization that has access to reports processed by this location mnemonic.

10.

From the Settings list, select Distribution List. The Distribution List dialog displays.

11.

Click the Add button.

The Select Location Mnemonic dialog box displays.

12.

Highlight the location mnemonic that you want to add to the distribution list.

Note: Only Windows Folder location mnemonics can be added to the distribution list.

13.

Click OK.

The Select Location Mnemonic dialog box closes, and the highlighted location mnemonic is added to the distribution list.

14.

Determine whether you want to add another location mnemonic to the distribution list:

  • If yes, go to Step 11
  • If no, go to Step 15

15.

Determine whether you want to modify the list of aliases associated with the location mnemonic:

  • If yes, go to 4.6.3 “Modifying the List of Aliases”
  • If no, go to Step 16

16.

Click Save Settings.

The Location Mnemonic Setting – Windows Location Folder dialog box closes, and the new location mnemonic is added to the list of location mnemonics.

4.7.3 Modifying the List of Aliases

This content is being developed

4.7.4 Specifying Active Directory Settings

This content is being developed

5.0 Aliases

Location mnemonics are destinations within a medical practice or hospital where reports processed by NetSafe can be viewed. A location mnemonic can be a physical location, such as a nurses’ station, an organization, a department, or an individual. As a result, location mnemonics can be referred to in many ways, such as different name order, absence or presence of titles, a nick name, or abbreviations. This chapter explains the functionality within NetSafe Administrator that enables you to identify location mnemonics by a variety of alternate names; it includes the following topics:

  • Location Mnemonic Aliases Overview
  • Alias Settings
  • Procedures for Managing Aliases

5.1 Location Mnemonic Aliases Overview

The number of locations in an organization to which a report could be sent can vary widely. In many large organizations, the number can be in the hundreds. To accurately identify locations within NetSafe, each location is assigned a unique mnemonic. The name for a location mnemonic could be a physical location or a department name or the name of a person. As a result, within your organization, a location may be known by several different names. NetSafe’s alias function enables you to associate any number of alternative names to a unique location mnemonic. The Alias dialog on the NetSafe Administrator main menu displays a complete list of aliases and the location mnemonic to which they are associated. From this dialog you can add, edit, and delete aliases for any location mnemonic.

NetSafe uses aliases to determine a location mnemonic in conjunction with the features of the Distribution Wizard. When creating a report distribution template, you have the option to include the list of aliases or just the list of location mnemonics to determine to where the report should be sent

Reference section 6.4 “Template Information Settings” Templates”.

Aliases can be associated with an individual location mnemonic at the time the location mnemonic is added to the system, as well as after the location mnemonic is created, by accessing the Location Mnemonic dialog. Changes in the Location Alias List for an individual location mnemonic are also included in the master list of aliases accessed and modified from the Alias main dialog. Additionally, any changes made to the master list of aliases using the features on the Alias dialog are displayed on the Location Alias List for the affected location mnemonic.

Reference section 4.4.3 “Alias Settings”.

Aliases must be unique within NetSafe. Thus, if you attempt to add an alias name, and that alias name already exists, a message box displays informing you that the alias name is in use, and with which location mnemonic it is associated.

5.2 Aliases Settings

To view the complete list of aliases, and to add, edit, and delete aliases, click on Alias in the Settings list.

Screenshot 5-0 NetSafe Alias Dialog

The Alias dialog is divided into the following sections:

  • Search and display functions, containing functionality that enables you to locate an alias
  • Alias listings, containing a list of all aliases for all location mnemonics, and the functions that enable you to view, add, edit, and delete aliases

The Search Filter section provides functionality for searching NetSafe’s database using location mnemonics and alias. The following table lists and describes the elements in the Search Filter section of the Alias dialog.

Table 5-0 NetSafe Alias Dialog, Search Filter Elements

Step

Action

Location Mnemonic

Enter a character string that matches the initial characters in the location mnemonic for which you are looking. The system does a partial lookup, starting at the left character and ending at the right character, looking for location mnemonic(s) that match the characters as entered. Those mnemonics that match the characters display. For example, if you enter INTE, only location mnemonics that begin with INTE display. The search is not case-sensitive.

Alias

Enter a character string that matches the characters in the alias for which you are looking. The system does a lookup, looking for aliases that have that character string anywhere in the alias. Those aliases that contain the characters in the specified order display.

For example, if you enter ri, aliases Patrick, Patrick9 and Richard display. If you enter ri9, nothing displays, although there is at least one alias that has a 9 in it, because the characters entered are not concurrent. The search is not case-sensitive.

Ascending Order

Reorders the list of location mnemonics based on the entries in the Location Mnemonic column; location mnemonics beginning with numbers appear first, followed by location mnemonics alphabetically, A-Z.

Select this option button and then click Load Search Filter or Reset Search Filter to reorder the list of location mnemonics.

Descending Order

Reorders the list of location mnemonics based on the entries in the Location Mnemonic column; location mnemonics starting alphabetically display first, Z-A, followed by those that begin with numbers.

Select this option button and then click Reset Search Filter or Load Search Filter to reorder the list of location mnemonics.

Show All

Shows all location mnemonics on a single page. A scroll bar displays to the right. Click Reset Search Filter to redisplay the list of location mnemonics in a page-by-page format.

Note: Depending on the number of entries in the database, the dialog might become unresponsive while it is loading the list.

Load Filter

Redisplays the list of locations based on:

  • The entries in the Location Mnemonic and the Alias text entry boxes
  • The order selected in the List Row by area

Reset Filter

Clears the Location Mnemonic and Alias text entry boxes, redisplays all location mnemonics based on the order selected in the List Row by area

The elements for managing location mnemonic aliases display below the Search Filter elements. This section contains the list of all the location mnemonics and the alias(es) to which they are associated. It contains both the alias(es) that were added using the features on this dialog, as well as any aliases that were configured using the features on the Location Mnemonic dialog.

Note: If you configured an alias using the features on the Location Mnemonic dialog and it does not display in this list, click either the Show All, Load Search, or Reset Search Filter button to refresh the list of location mnemonics.

Table 5-1 Location Mnemonic Alias Management Elements

Element

Description

Total Entries Found

Displays the total number of aliases in the list of aliases. When characters are entered in the Location Mnemonic text entry box and/or the Alias text entry box, the number displayed in this field is the number of location mnemonics that match the search criteria.

<< 

Moves backward, page-by-page, through the list of aliases until the first entry displays. Clicking this button after Show All Entries is selected returns the display to the page-by-page format.

>> 

Moves forward, page-by-page, through the list of aliases until the last entry displays. Clicking this button after Show All Entries is selected returns the display to the page-by-page format.

Add

Adds an alias. Clicking the Add button displays the Select Location Mnemonic dialog box that contains all location mnemonics in NetSafe. This box enables you to select the location mnemonic to which the alias is to be associated. Use this button to add an alias to a location mnemonic.

Edit

Changes the selected alias. Clicking the Edit button displays the Edit Alias dialog box. Use this dialog box if you want to change the alias. If you remove the alias from the Alias Name text entry box and save the change, the alias is removed from the list of aliases, but the location mnemonic remains in the list without an alias assigned to it.

Delete

Deletes the highlighted alias. Clicking the Delete button displays a confirmation dialog box. Deleting the alias removes both the alias and the location mnemonic from the list.

Find Duplicates

Runs a background process that scans the alias database and identifies duplicate aliases.

View Duplicates

Displays the Duplicate Aliases dialog box, which lists duplicate aliases that were found when Find Duplicates was run. Use the elements on the dialog box, which are the same as those on the Aliases menu, to edit or delete duplicate aliases.

5.3 Procedures for Managing Aliases

The number of locations in an organization to which a report could be sent can vary widely. To accurately identify locations within NetSafe, each location is assigned a unique mnemonic. NetSafe’s alias function enables you to associate any number of alternative names to a unique location mnemonic.

The following procedures explain how to manage aliases in NetSafe, including:

  • Adding an Alias
  • Editing an Alias
  • Deleting an Alias

These procedures assume that you have logged in to NetSafe Administrator using an account that has the appropriate permissions. For information about logging in to NetSafe Administrator,

Reference section 1.2 “Accessing NetSafe Administrator”.

If the account that you are using does not have the necessary permissions to create and manage aliases, see the person in your organization responsible for NetSafe.

5.3.1 Adding an Alias

Table 5-2 Adding Aliases

Step

Action

1.

Click Alias in the Settings list on the main dialog.

The Alias dialog displays, showing a complete list of aliases and the mnemonics to which, they are associated.

2.

Click Add.

The Select Location Mnemonic dialog box displays.

3.

Locate the location mnemonic for which an alias is to be created:

  • If you can easily locate the location mnemonic and/or alias in the list of location mnemonics, go to Step 4
  • If you cannot easily locate the location mnemonic and/or alias in the list of location mnemonics, go to Step 5

4.

Scroll through the list of location mnemonics until you locate the target location mnemonic. (Click << and >> to scroll backward and forward through the list of location mnemonics.) Go to Step 6.

5.

In the Location Mnemonic text entry box and/or the Description text entry box, enter the first few characters identifying the target location mnemonic. The list of location mnemonics changes to show only those location mnemonics with initial character(s) matching exactly the character(s) entered.

Note: By entering characters in both the Location Mnemonic text entry box and the Description text entry box, you can further refine your search.

6.

Highlight the target location mnemonic.

7.

Click OK.

The Add Alias dialog box displays.

8.

Enter an alias for this location mnemonic in the Alias Name text entry box.

9.

Click Add.

Note: An alias must be unique in NetSafe. If you enter an alias that is already in NetSafe, you are prompted to enter a unique alias.

The new alias for the location mnemonic displays in the list of location mnemonics.

  • If you want to add another alias, go to Step 2

You can also add an alias associated with an individual location mnemonic using the Add function on the Location Mnemonics dialog.

Reference section 4.6.3 “Modifying the List of Aliases”.

Changes made to the list of aliases using one method are recorded in both lists of aliases.

5.3.2 Editing an Alias

To edit an alias in the Alias list, perform the following steps.

Table 5-3 Editing an Alias

Step

Action

1.

Click Alias in the Settings list on the main dialog.

The Aliases menu displays, showing a complete list of aliases and the location mnemonic to which, they are associated.

2.

Locate the location mnemonic associated with the alias that you want to edit:

  • If you can easily locate the location mnemonic or alias, go to Step 3
  • If you cannot easily locate the location mnemonic or alias, go to Step 4

3.

Scroll through the list of location mnemonics until you locate the target location mnemonic.

(Click << and >> to scroll backward and forward through the list of location mnemonics.)

Go to Step 5.

4.

In the Location Mnemonic text entry box and/or the Alias text entry box, enter the first few characters identifying the target location mnemonic.

The list of location mnemonics changes to show only those location mnemonics with character(s) matching the character(s) entered in the Location Mnemonic text entry box and/or the Alias text entry box.

  • Location mnemonics whose initial character(s) exactly match the character(s) entered in the Location Mnemonic text entry box display
  • Aliases containing characters in the sequence in which they are entered in the Alias text entry box display

Note: By entering characters in both the Location Mnemonic text entry box and the Alias text entry box, you can further refine your search.

5.

Highlight the target location mnemonic.

6.

Click Edit.

The Edit Alias dialog box displays.

7.

In the Alias Name text entry box, enter the changes that you want to make.

Note: If you remove the alias from the Alias Name text entry box and save the change, the alias is removed from the list of aliases, but the location mnemonic remains in the list without an alias assigned to it.

8.

Click Change.

Note: An alias must be unique in NetSafe. If you enter an alias that is already in NetSafe, you are prompted to enter a unique alias.

The new alias for the location mnemonic displays in the list of location mnemonics. If you want to edit another alias, go to Step 2.

You can also edit an alias associated with an individual location mnemonic using the Add function on the Location Mnemonics dialog.

Reference section 4.6.3 “Modifying the List of Aliases”

Changes made to the list of aliases using one method are recorded in both lists of aliases.

5.3.3 Deleting an Alias

To delete an alias in the Alias list, perform the following steps.

Table 5-4 Deleting an Alias

Step

Action

1.

Click Alias in the Settings list on the main dialog.

The Aliases menu displays, showing a complete list of aliases and the mnemonics to which, they are associated.

2.

Locate the location with the alias that you want to delete:

  • If you can easily locate the location mnemonic or alias in the list of locations, go to Step 3
  • If you cannot easily locate the location mnemonic or alias in the list of locations, go to Step 4

3.

Scroll through the list of location mnemonics until you locate the target location mnemonic.

(Click << and >> to scroll backward and forward through the list of location mnemonics.)

4.

In the Location Mnemonic text entry box and/or the Alias text entry box, enter the first few characters identifying the target location mnemonic.

The list of location mnemonics changes to show only those location mnemonics with character(s) matching the character(s) entered in the Location Mnemonic text entry box and/or the Alias text entry box.

  • Location mnemonics whose initial character(s) exactly match the character(s) entered in the Location Mnemonic text entry box display
  • Aliases containing characters in the sequence in which they are entered in the Alias text entry box display

Note: By entering characters in both the Location Mnemonic text entry box and the Name text entry box, you can further refine your search.

5.

Highlight the target location mnemonic.

Note: To delete more than one alias that displays on the current page, press and hold the CTRL key while selecting additional aliases.

6.

Click Delete.

The Confirm dialog box displays.

7.

Click Yes.

The alias(es) for the location mnemonic(s) are deleted from the list of location mnemonics.

If you want to delete another alias, go to Step 2.

6.0 Report Templates

The Report Templates dialog enables you to direct reports received by NetSafe to a location mnemonic by locating and capturing specific text strings within the report. Using the features accessed from the Report Templates dialog, you create and edit rule-based report distribution templates. These templates are then used by NetSafe to identify location mnemonics and distribute reports. This chapter explains the features of the Report Templates, and describes the Report Templates dialog and associated dialog boxes, including the following topics:

  • Report Templates Overview
  • Report Templates Dialog
  • Template Settings Dialog
  • Procedures for Managing Report Templates

6.1 Report Templates Overview

With Report Templates you create report distribution templates. When NetSafe receives a report, it first passes the report through one or more report distribution templates. These templates tell NetSafe how to identify an individual report, and to which location mnemonic to distribute that report. The number of report distribution templates that can be created is unlimited. The Report Templates functionality is accessed from the following tabs on the NetSafe Administrator main menu:

Report Templates — Provides the functionality for adding, editing, and deleting report distribution templates.

Report Logs — Displays a list of reports that have been sent to location mnemonics using a report distribution template.

Each report distribution template distributes reports to one or more location mnemonics. The location mnemonic to which a report is sent is determined using the rules that have been defined within that report distribution template. The report distribution template can also:

  • Separate an individual report when it is included in a batch report
  • Direct the report, using a location field on the report, to another report distribution template that forwards the report to a specified location mnemonic
  • Identify a destination using NetSafe’s alias table
  • Specify alternate destinations for reports, as well as restrict delivery of reports to a limited list of locations

The rules that define these capabilities are formulated from data extracted from the reports. Using the features within the Report Templates dialog and dialog boxes, you identify fields and/or text strings in the reports, and then use that information to create report distribution templates that satisfy the requirements of your organization.

6.1.1 How Rules Work

The best way to know how the report templates rules work is to think of them as a set of instructions leading NetSafe to specific locations on a report. The rules that you formulate tell NetSafe in which direction to move its pointer, forward or backward, a specific number of times (specified in the Count fields), searching for a landmark (characters entered in the Text String fields) on the report. Once found, you can zero in more precisely on a desired location within the text string by indicating minute movements of the pointer (specified in the Offset fields) forward or backward. After the desired text string is identified, NetSafe captures and uses it to determine the intended destination for the report. Because of the flexibility of this search mechanism, you can define an unlimited number of searches, sending NetSafe to multiple locations on a report, until the exact text string for which you are looking is found. When NetSafe captures a text string, it uses it in one of the following ways:

  • The text string is stored and compared against another text string found on the report. An example of this is to determine where in a batch report an individual report should be separated
  • The text string is stored and compared against another text string found externally to the report. An example of this is to determine the distribution location of a report by comparing the text string against entries in NetSafe’s alias database
  • The text string is used as part of another text string. An example of this is to insert the text string into the filename of the report in place of a variable marker.

The strength of the report template is that you can use rules in a multitude of combinations to manipulate reports to meet the specific requirements of your organization.

6.1.2 LPD Queues

NetSafe determines which report template to use based on the name of the line printer daemon (LDP) queue from which the report was received.

Prior to setting up a report template you need to determine the name(s) of the LPD queues for your virtual printers. This is because each report template acts as a storage area for the virtual printer that distributes a copy of the report to the appropriate location mnemonic. Thus, the name of the report template must match the LPD queue name that is routing the report to NetSafe.

Each report distribution template name must match the name of an LPD queue uniquely, on a one-to-one basis. If you are planning on creating more report distribution templates than there are LPD queues, you need to configure additional LPD queues.

Caution: When defining an LPD queue name, spaces should not be used in the name. For example, name the queue “Lab_Report,” not “LAB Report.”

Once all the LPD queue names are defined, you can create new report templates by using the features available on the Report Templates dialog.

6.2 Report Templates Dialog

When you click the Report Templates dialog, the report template main menu displays. This menu lists all the report templates that have been created, one template per line, and provides buttons that enable you to add, edit, and delete report templates.

Screenshot 6-0 NetSafe Report Templates

The following table lists and describes the elements on the Report Template’s main menu.

Table 6-0 Report Templates, Main Menu

Element

Description

Template Name

Locates a report distribution template by its name.

Enter a character string into this text entry box that matches characters in the template’s name. The system does a partial lookup, starting at the left character and ending at the right character, looking for template names that begin with and match the characters as entered. Only those names that begin with and match the characters in the sequence entered display.

For example, if you enter LAB, only report distribution templates whose characters begin with LAB, in that order, display. The entry is not case-sensitive.

Load All

Displays all the templates. Any entries made in the Template Name text entry box are removed.

List of Templates

A list of defined report distribution templates, one template per line. Each template is identified by the following properties:

  • Template Name — The name assigned to the template, one template per line

This name is assigned when the template is added or edited. The name can contain any combination of alphanumeric characters and spaces. It is recommended that the name identify the function of the template, but the name must be unique.

  • Template Description — A description of the template’s purpose

This description is created when the template is added or edited. It can contain any combination of alphanumeric characters and spaces and should be short but descriptive.

Total Entries Found

Displays the total number of templates displayed.

This number changes depending on the matches found after entering text in the Search Template Name text entry box.

Add

Displays the Template Properties menu.

Use the tabs and fields on the Template Properties menu to define a new report distribution template.

Edit

Displays the Template Properties menu, which contains the property settings for the highlighted report distribution template.

Use the tabs and fields on this menu to modify the report distribution template’s properties.

Delete

Deletes the highlighted report distribution template.

Copy

Creates a copy of the highlighted report distribution template.

Use this button to create a new report with the same properties as those defined for the original report.

6.3 Template Settings Dialog

When you click the Add or Edit button on the Report Templates dialog, the Template Settings dialog displays. This menu contains a set of tabs that enable you to define and modify the properties for individual report distribution templates. The following sections provide information about each of the tabs on the Templates Properties menu.

6.4 Template Information Settings

Each report template acts like a virtual printer that distributes a copy of the report to the appropriate location mnemonic. The location mnemonic to which the report is sent is determined by the properties specified on this dialog.

Screenshot 6-1 Temple information settings

The Template Information dialog is separated into five sections, Template Details, Report Extraction Selection, Conditional Report Redirect, Text Extraction Settings, and Template Level Permission.

  • Template Details [1] — Information regarding the name, description and date
  • Report Extraction Selection [2] — Used to indicate if the report should be separated and how the report should be separated
  • Conditional Report Redirect [3] — Sometimes it is useful to use some text from the report to determine which report template should be used to process the report.
  • Text Extraction Settings [4] — Settings that are used to determine how the text from the report should be extracted. This extracted text will be used for conditional redirect, determining destination locations, and naming of the report
  • Template Level Permission [5] — These settings determine, on a global level, which locations or groups of locations can receive a copy of the report. This is only a filter and does not mean that the locations on the list will receive a copy of the report

Table 6-1 Template Information Settings

Element

Description

Template Information [1]

 

Template Name

The name of the report template.

The name must match the name of an LPD queue name configured on your system. The name can contain any combination of alphanumeric characters. The name must be unique. If a name matches a currently saved report distribution template, a warning displays indicating that another report template has been found with the same name.

Description

A description of the report template.

The description can contain any combination of alphanumeric characters and spaces.

Entry Date

Displays the date, time, and administrator account that first created the report. This information is generated by NetSafe when the report template is saved.

Last Edit

Displays the date, time, and administrator account that made the most recent change to the report distribution template. This information is generated by NetSafe when the change is saved.

Report Extraction Selection [2]

 

Report Extraction

Specifies the method for processing and separating reports.

Select from the drop-down list the method for NetSafe to use to process reports.

Reference section 6.5 “Report Extraction Methods”.

When Method 1 or Method 2 is selected, the Settings button becomes accessible.

Settings

Displays the Report Separator Settings dialog box.

The content of this dialog box varies depending on the Report Extract Selection method selected:

Method 1 — Use the elements on this dialog box to define the parameters within the initial batch report that indicate the boundaries of individual reports.

Reference section 6.7 “Report Separator Rules”.

Method 2 — Use the elements on this dialog box to select a field definition file to be used by NetSafe when processing files. The separation of the report will be handled by the report conversion utility. Contact support for more information regarding this method of separation.

Conditional Report Redirect [3]

 

 

Determines whether the report is redirected to an alternative report template for processing. Using text on the report, a mapping table can be set up to select which report template should be used to process the report. When selected:

  • The Location and Rules buttons become accessible
  • The Reprocess Method check box becomes accessible
  • The Text Extraction Settings section becomes inaccessible
  • The Templates Are list becomes inaccessible
  • The features on the Location Fields dialog become inaccessible
  • The features on the Filename Template dialog become inaccessible Location

Location

Displays the Location Specifier Table dialog box.

Use this dialog box to define the parameters for determining the identity of the alternate report template.

Reference section 6.9 “Conditional Report Redirect”.

Rules

Displays the Conditional Redirect Table dialog box.

Use this dialog box to associate a text string within a report template for determining how to redirect a report

Reference section 6.9 “Conditional Report Redirect”.

Reprocess Method

Determines whether the separated report is sent to LPD Queue — Pending for reprocessing by another report distribution template.

If this checkbox is clear, changes made to the report’s settings each time it is processed by a rule are retained and become the base from which subsequent changes are made when the next rule is evaluated. After all the rules have been evaluated, the report is distributed.

If this checkbox is selected, and the destination for the report has not been determined, the report is resubmitted to LPD Queue — Pending for additional processing by another report distribution template. A new entry is made in LPD Queue — Processed. This resubmission process continues until the intended report template is identified.

Text Extraction Settings [4]

 

Type

Select one of the following options for extracting PCL code from reports before searching for text strings specified in the Location Fields, Variable Fields, and File Name dialog boxes.

Simple — This method ignores all position commands; use for when reports are created by MEDITECH Magic.

Complex text extraction versions keep text in their correct sequence by retaining positional commands and adding carriage returns and line feeds where needed. Versions of the Complex text extraction method that have been released include:

  • Complex [Version 1]
  • Complex [Version 2]
  • Complex [Version 3]
  • Complex [Version 4]

Note: Complex [Version 4] only displays if a valid path has been entered in the Report Conversion Path text entry box on the System Settings dialog.

Reference section 15.12 “Report Extraction Methods”.

When Complex [Version 4] is selected, the OCR check box becomes accessible.

Select:

Complex [Version 1], [Version 2], [Version 3] or [Version 4] for reports generated by MEDITECH C/S or 6.0, (Complex [Version 4] is recommended)

Complex [Version 4] for all non-MEDITECH generated reports (Method 2 from the Report Extraction drop-down list must also be selected)

If existing Report Templates using an older version are processing reports correctly, there is no need to specify a different extraction method.

Enable OCR

Specifies whether the NetSafe optical character recognition functionality should be used when processing reports. When this check box is selected, the elements in the Choose Field Definition become inaccessible.

Standard

Specifies that NetSafe’s standard field definition file is used to process files when OCR is selected.

When selected, the Page Orientation text entry box becomes accessible.

Page Orientation

Specifies the orientation (portrait or landscape) of the formatted file.

Reference section 6.5 “Report Extraction Methods”.

Caution: The orientation of the report selected must match the orientation of the report received by NetSafe for the report to process properly.

Custom

Specifies that a customized field definition file is used to process files.

When selected, the Custom text entry box becomes accessible. In this text entry box, enter the name of the file to be used to process files

Reference section 15.12 “Report Extraction Methods”.

. . .

Displays the Field Definition File Selection dialog box. Use this dialog box to select and/or define file(s) to be used to process files

Reference section 15.12 “Report Extraction Methods”.

Template Level Permission [5]

 

List Type

Select one of the following options from the drop-down list:

Excluded — A copy of the report will be sent to the Location Mnemonic only if that Location Mnemonic does NOT exist in the recipient list or exists in the group(s) specified. Otherwise, if the Location Mnemonic is found in either list, by group or recipient, the report will be deleted.

Included — A copy of the report will be sent to the Location Mnemonic only if that Location Mnemonic exists in the recipient list or exists in the group(s) specified. Otherwise, if the Location Mnemonic is NOT found in either list, by group or recipient, the report will be deleted.

Note: The default Location Mnemonic is not filtered using these lists. A copy of the report will be sent to the default Location Mnemonic regardless of these settings.

By Group

Used to indicate that the application should search through the group or groups listed to determine if the report should be sent or deleted. The group names are set up in the Template Recipient Groups Dialog.

Add

Displays the Select Template Recipient Group dialog box. Use this dialog box to identify the group that should be added to the group list.

Note: Only one group can be added at a time.

Delete

Deletes the highlighted group from the group list.

Note: Only one group can be deleted at a time.

By Recipient

Used to indicate that the application should search through the Location Mnemonics listed to determine if the report should be sent or deleted.

The Location Mnemonics can be added or deleted using the Add, Add All, or Delete buttons.

Add

Displays the Select Location Mnemonic dialog box.

Use this dialog box to identify location mnemonics to be added to the list of location mnemonics.

Note: Only one location mnemonic can be added at a time.

Delete

Deletes the highlighted location mnemonic(s) from the list of location mnemonics.

Note: Only one location mnemonic can be deleted at a time.

Copy List

Displays the Copy Settings dialog box.

Use this dialog box to select a previously created list of location mnemonics from another report distribution template. The selected list of location mnemonics is imported into the report distribution template being created or modified.

     

6.5 Report Extraction Methods

NetSafe software versions 1.0.8.n and earlier only accept and process report files that are based on the printer control language (PCL), and that use printer resident fonts. This is because the text is sent within the file to be rendered in the font by the printer which allows the application to extract the text. Beginning with software version 1.1.1.n, NetSafe can accept and process:

  • Multiple file types, including PDF and TIFF
  • Reports that use non-resident fonts or in some cases optical character recognition (OCR)
  • Separate individual reports from batch reports using one of several report extraction methods, specified by your organization

If you want to use NetSafe’s traditional report extraction method to process PCL formatted files, select Method 1 from the Report Extraction Selection drop-down list. However, if you want NetSafe to process files that are not PCL files, or that contain content not handled properly by Method 1 (for example, reports that use non-resident fonts), select Method 2 from the Report Extraction Selection drop-down list.

The following table lists and describes the available report extraction methods. 

Table 6-2 Available Report Extraction Methods

Method

Description

None

Individual reports are not separated from a batch report.

When this option is selected, individual reports are not separated from batch reports. The Setting button becomes inaccessible.

Note: Any rules specified on the Location Fields, Variable Fields and File Name dialog boxes are ignored.

Method 1

Individual reports are separated from a batch report using the rules specified on the Location Fields, Variable Fields, and File Name dialog boxes. This method should be used when the PCL file is simple and in which key words within the file can be easily identified for indicating where the report ends and stops. When this method is selected, the Setting button becomes accessible, and rules for separating reports can be specified.

Method 2

Individual reports are separated from a batch report using the report conversion utility, in conjunction with a field definition file and/or INI file.

This method should be used when the file matches one of the following instances:

The PCL file contains non-resident printer fonts. The application can set up character recognition databases that can be used to identify each character for a specific font (although this is different from optical character recognition).

  • The file type is either PDF, TIFF, or PCL
  • The file requires the use of optical character recognition (OCR)

When this method is selected, the Setting button becomes accessible, and rules for separating reports can be specified.

Note: This method displays only if a valid path has been entered into the Report Conversion Path text entry box on the System Settings dialog

Reference section 16.12 “Report Extraction Methods”.

6.6 Optical Character Recognition

If Method 2 is the specified Report Extraction Selection, and Complex [Version 4] is the selected Text Extraction Setting, the OCR check box becomes accessible. If the report contains fonts that cannot be easily identified or read, selecting OCR allows for the text to be extracted from the report.

Caution: Depending on the clarity of the file, reports that have text within an area that contains background shading may not be easily readable by NetSafe. It is recommended that only reports that have a white background be used.

When the OCR check box is selected, the Choose Field Definition elements become accessible. When processing these reports, NetSafe needs to know whether the OCR-generated reports are to be processed using NetSafe’s standard report extraction definition file, or a customized report extraction definition file. The following table describes the parameters for processing files generated by an OCR.

Table 6-3 Report Extraction Definition File Types

Parameter

Description

Standard

Specifies that NetSafe’s default OCR report extraction function is used.

When this radio button is selected, the Page Orientation text entry box becomes accessible. Select from the drop-down list the orientation of the imported file (Portrait or Landscape). Any text that matches the fonts setup in the OCR database will be extracted from each report page and placed into the output text file.

Caution: Care should be taken when using this option as it uses considerable system resources. This could have a negative impact on the throughput of the application.

Custom

Use this option to indicate to the application that a specific field definition file should be used to extract the text from the report.

When this radio button is selected, the associated text entry box becomes accessible. In this text entry box, enter the name of the file that contains the field definition file that will be used to extract the text. This file can be either a file that is already stored on the system, or one created at the time the Report Template was defined.

To specify a file that is already stored on the system, click the ellipsis button (. . .) to display the Field Definition File Selection dialog box, and then select a file from the list of files.

To configure and specify a new file, click the ellipsis button (. . .) to display the Field Definition File Selection dialog box, then click Create New Field Definition File to configure a new file.

Note: This option does not always have to be used exclusively for OCR. The field definition file can be set up to extract only the text that is needed to process the report. In addition, the text extracted might be ordered in a user-friendly order or format.

Caution: Care should be taken when using this option, as it uses considerable system resources. This could have a negative impact on the throughput of the application.

Screenshot 6-2 Field Definition File Selection Dialog Box

When you click Create New Field Definition File, a blank EscapeE field definition menu displays. Click Fields from the menu bar and the Field dialog box displays.

 

Screenshot 6-3 EscapeE Field Dialog Box

Using this menu, you identify the text fields that NetSafe uses when separating reports. For information about defining a field, refer to EscapeE Help by clicking Help on the menu bar.

Caution: When saving a new field definition file, be sure to use the .ee file extension. If .ee is not used, NetSafe does not recognize the file and it is not included on the Field Definition File Selection dialog box.

6.7 Report Separator Rules

When a report is received from a HCIS, it may be an individual report, or it may be multiple reports strung together into a batch report. If the latter is the case, rules must be formulated if you need to identify where one individual report ends and another begins.

With NetSafe’s Distribution Wizard, the set of rules used to separate the larger batch report into individual reports is formulated by identifying a set of markers within the report and telling NetSafe what action to take when a marker is found. These markers must appear consistently in all the individual reports. In general, a set of rules tells NetSafe to do the following:

  1. Start at the top of the report and begin searching in a specified direction for a specified marker. (Normally, the search is in the forward direction, particularly, if this is the first marker.)
  2. Find the marker.
  3. Determine how many instances of the specified marker must be found (the Count):
  • If the Count is set to 1, move onto Rule 2
  • If it is the nth instance of the marker for which you are looking, continue searching until the specified instance of the marker is found, then continue the search using Rule 2
  1. Move forward or backwards looking for the second, and any subsequent markers.
  2. When there are no more rules to process, the end of the individual report has been found.
  3. Separate the individual report from the batch report.
  4. Determine the location mnemonic(s) to receive the report and distribute the report.
  5. Return to Rule 1 and resume searching the batch report.
  6. Continue this process until the marker specified in either Rule 1 or Rule 2 cannot be found.

Note: Whenever NetSafe finds a marker, its pointer is positioned before the first character of the marker, not after the last character. It is important to be aware of this fact when deciding where to end an individual report, or when specifying an Offset Count.

NetSafe provides great flexibility in defining rules, enabling you to separate individual reports based on the needs and conventions of your organization. To better provide you with an understanding of how rules can be formulated, examine the following simple examples. These examples, which show one way that a batch report can be separated into individual reports, uses the sample batch report shown in Screenshot 6-4.

Note: NetSafe receives reports formatted for printing (files with a .prn extension). Since these files contain PCL commands interspersed among the actual text, the files are not easily readable for the average human. Thus, a PDF-formatted file is provided in Screenshot.

Screenshot 6-4 Sample Batch Report

Screenshot 6-5 shows an example of one set of rules that can be used to separate the individual reports.

 

Screenshot 6-5 Report Separator Rules, Example 1

In the above example, two rules are specified:

Rule 1 tells NetSafe to search forward, looking for the first instance of the text string **END OF REPORT**.

Rule 2 tells NetSafe to continue moving forward, searching for the first instance of 0x0c. (0x0c is ASCII code telling the printer to move onto a new page (form feed). It cannot be seen in Screenshot 6-4, but it is in the .prn file.)

Once these two rules are satisfied, NetSafe stops searching, separates the individual report, and continues to process the batch report using the two rules until all the markers are found. An independent report is created each time an instance of 0x0c is found.

Caution: Searching for markers is case-sensitive; ** END OF REPORT** is not the same as ** End of Report **. If the case in the search string does not match the marker’s case in the report, a match is not found.

A variation of this example could be to specify “2” in the Count property for Rule 2. In this variation, NetSafe skips over the first occurrence of 0x0c and creates an independent report when it finds the second occurrence of 0x0c. If this were the case, then each independent report would be a batch report containing two reports.

The above example contains one minor issue. Because NetSafe’s pointer is positioned before 0x0c, when the individual report is separated a form feed is included at the start of the next individual report, causing a blank page to print at the beginning of the report. This situation can be rectified, however, by specifying an offset property; Screenshot 6-5 shows an example.

Screenshot 6-6 Report Separator Rules, Example 2

 

By specifying this offset count, NetSafe is told to move its pointer one character forward. Thus, the pointer is positioned after the form feed, and the next report does not include it.

Note: Although 0x0c may appear to be four characters, as far as ASCII code is concerned, it’s considered one character.

The Report Separator Settings dialog box contains several other properties to help locate the marker text in the batch report and separate individual reports. All the elements on the Report Separator Settings dialog box are listed and described in the following table.

Table 6-4 Report Properties, Report Separator Settings Dialog

Element

Description

Variable Field Identifier

Determines whether NetSafe uses variable text strings to identify the contents of individual reports before separating them.

Reference section 6.8 “Variable Field Identifier” for an explanation of Variable Identifiers.

Settings

Displays the Variable Field Identifier dialog box.

Location Specifier Table

Lists all the rules specified for determining where in the batch report to separate individual reports, one rule per line.

Add

Displays the Report Separator Field dialog box. Use this dialog box to:

  • Specify the marker to be searched
  • The number of times the marker must be found before stopping the search
  • The direction for the search

Edit

Displays the Report Separator Field dialog box for the highlighted rule. Use this dialog box to:

  • Modify the marker to be searched
  • Change the number of times the marker must be found before stopping the search
  • Change the direction for the search

Delete

Deletes the highlighted rule.

Offset Count

The number of characters skipped before separating the individual report.

. .

Inserts in the Offset Count text entry box the number of characters in the text string of the last specified rule.

For example, in Screenshot 6-6 the number 1 will be inserted (remember, 0x0c is considered one character in ASCII). If RUN DATE: was the text string in the last rule, 9 would be inserted into the Offset Count text entry box (eight characters and space in the words RUN DATE, and one character for: ).

Offset Direction

The direction NetSafe moves its pointer when skipping over the number of characters specified in the Offset Count text entry box.

Location Specifier Table Points to Top of Report

Determines whether NetSafe evaluates the set of rules once and moves its pointer to the position identified by the last rule, but not to separate a report at this point.

This feature is useful if there is not a consistent marker at the end of the individual reports and you want to use a marker at the top of a report to identify where to separate the report. This feature tells NetSafe that the last rule is pointing to the top of a report.

Copy PCL Header to All Reports

Determines whether a header at the start of the batch report displays on each individual report. For example, there are a set of PCL commands at the top of a batch report that provide formatting instructions that you want included in each of the separated reports.

Selecting this check box makes the PCL Stop String and Additional PCL Commands text entry boxes accessible.

PCL Stop String

Specifies the last characters (the end point) for the PCL header information to be captured.

For example, enter the last few unique characters of PCL formatting commands that you want to include in each of the separated reports.

Additional PCL Commands

Specifies additional PCL commands to be placed after the header information (that is, after the PCL Stop String).

For example, if you want a horizontal bar to display beneath the header information, enter the PCL commands to accomplish that.

6.8 Variable Field Identifier

 The Variable Field Identifier is an ancillary method for identifying where to separate individual reports from a batch report. This method supplements the rules specified on the Report Separator Settings dialog box and provides you with the ability to use a variable text string, such as a medical record number (MRN), as a marker. If the Variable Field Identifier check box is selected on the Report Separator Settings dialog box, NetSafe executes the rules specified in the Variable Field Identifier dialog box before executing the rules specified in the Report Separator Settings dialog box.

  1. Variable Field Identifier rules work by.
  2. Locating a defined start marker.
  3. Locating a defined end marker.
  4. Storing the text found between the start and end markers.
  5. Locating the next occurrence of the defined start marker.
  6. Locating the next occurrence of the defined end marker.
  7. Comparing the text found between the second set of start and end markers with the stored text.
  • If the text strings are the same, NetSafe continues the search pattern
  • If the text strings are different, NetSafe stops this search process and reverts to the rules defined on the Report Separator Settings dialog box

Again, an example might make this process clearer. The following examples use the following assumptions and the same batch report as for the previous examples Screenshot 6-4:

  • The batch report contains several reports for the same patient
  • The various reports for an individual patient appear in the batch report sequentially
  • A doctor wants all the reports for a single patient separated into one batch

The entries in Screenshot 6-7 are one example of rules that satisfy these requirements.

Screenshot 6-7 Variable Field Identifier Rules, Example 1

In the above example, two rules are specified:

Rule 1 tells NetSafe to search forward, looking for the first instance of the text string MRN.

Rule 2 (which is specified by selecting Ends at Specified String: and entering a string of characters in the text entry box) tells NetSafe to continue moving forward, searching for the first instance of the text string Location: .

Using these two rules, NetSafe scans the report and:

  1. Looks for the first occurrence of the start marker, MRN: 
  2. Looks for the first occurrence of the end marker, Location: 
  3. Extracts and stores the text between the two markers; which in this example are:
  • The text that is the medical record number of the patient, MR887
  • The carriage return character, ASCII 0x0

      4. Looks for the next instance of the start and end markers.

     5. Extracts and stores the text between that set of markers.

     6. Compares the two extracted text strings; if the text strings are identical, continues looking for markers until one of the following conditions is met:

  • No additional marker is found
  • The text strings do not match

When the search for pairs of markers ends, NetSafe positions its pointer at the beginning of the last text string for which there was a match (in this example, just preceding the instance of Location:). NetSafe then reverts to the rules specified in the Report Separator Settings dialog box Screenshot 6-5 to determine where to separate the reports for that individual patient. After separating the report, NetSafe repeats this whole process until no more start and end markers are found in the batch report. The following graphic illustrates this process.

Flowchart 6-0 Variable Field Identifier Flowchart 

As on the Report Specifier Settings dialog box, on the Variable Field Identifier dialog box you can specify properties to move the NetSafe’s pointer to the location where the report should be separated. All the elements on the Variable Field Identifier dialog box are listed and described in the following table.

Table 6-5 Distribution Wizard, Report Properties, Variable Field Identifier Dialog Box

Element

Description

Location Specifier Table

Lists all the rules specified for determining pairs of markers, one rule per line.

Add

Displays the Report Separator Field dialog box. Use this dialog box to:

  • Specify the marker to be searched
  • The number of times the marker must be found before stopping the search
  • The direction for the search

Edit

Displays the Report Separator Field dialog box for the highlighted rule. Use this dialog box to:

  • Modify the marker to be searched
  • Change the number of times the marker must be found before stopping the search
  • Change the direction for the search

Delete

Deletes the highlighted rule.

Offset Count

The number of characters skipped before separating the individual report.

. .

In the Offset Count text entry box, inserts the number of characters in the text string of the last specified rule.

For example, in Screenshot 6-7 the number 9 is inserted.

Offset Direction

The direction NetSafe moves its pointer when skipping over the number of characters specified in Offset Count text entry box.

Fixed Character Count

Causes NetSafe to use only a specified number of characters for comparison.

For example, you know that the medical record number always contains nine characters (the field identifier, MRN:, and the actual number). Thus, you do not need to compare any additional characters. If you enter 9 in this text entry box, NetSafe only compares the first nine characters.

Field Ends at Specified String

Causes NetSafe to use for comparison only those characters that precede the specified text string.

For example, using Screenshot 6-7, the medical records number has a variable length, and you do not want to include the carriage return character (ASCII 0x0d) that follows this number. If you enter 0x0d into this text entry box, NetSafe uses only the characters up to the start of the carriage return in the comparison.

6.9 Conditional Report Redirect

Once a report has been identified by NetSafe, the intended location mnemonic needs to be determined; that is, where to distribute the report needs to be ascertained. In some organizations the intended location mnemonic may always be at the same location. If this is the case, then using a list of location mnemonics specified on the Report Location Destinations Dialog may be your best option.

If, on the other hand, a report needs to be sent to two or more delivery locations, using the Conditional Report Redirect functions may be a better option. For example, on Mondays, Wednesdays, and Fridays Dr. Foster is located at Clinic A, and on Tuesdays and Thursdays that doctor is located at Clinic B. In such situations, you can use the Conditional Report Redirect feature on the Template Information dialog to redirect reports to another report distribution template based on a location specified by text in the report.

A report distribution template can be set up to use either Location Fields or Conditional Report Redirect, but not both. If you select Conditional Report Redirect on the Template Information dialog, the following functions become inaccessible:

  • The Templates Are list on the Template Information dialog
  • The elements on the Location Fields dialog
  • The elements on the Filename Template dialog

If there are data specified in these areas, NetSafe ignores this information when processing reports.

Note: When Conditional Report Redirect is selected, that report distribution template’s only purpose is to redirect reports to another report distribution template.

As with separating individual reports from a batch report, the Conditional Report Redirect feature uses a set of rules to locate specified markers on the report and then uses the text between those markers to identify the report’s destination. These markers must appear consistently in all the individual reports. The Conditional Report Redirect feature works by:

  1. Locating a defined start marker.
  2. Locating a defined end marker.
  3. Storing the text found between the start and end markers.
  4. Comparing the stored text against a list of text strings that are associated with individual report distribution templates.
  5. Redirecting the report based on one of the following conditions:
  • If the stored text string matches a text string on the list, the report is redirected to the report distribution template associated with that text string
  • If the stored text string does not match a text string on the list, the report is redirected to the default report distribution template

To better provide you with an understanding of how Conditional Report Redirect rules can be formulated, examine the following example. Using the same batch report as for the previous examples Flowchart 6-4, the following figures show a set of rules for Conditional Report Redirect.

Screenshot 6-8 Conditional Report Redirect Location Rules, Example 1

Screenshot 6-9 Conditional Report Redirect Location Rules, Example 2

In Screenshot 6-9, rules to locate the clinic are formulated by specifying start and end markers that bracket a text string:

The start marker is specified by:

  • Formulating a rule (Rule 1) that tells NetSafe to search forward looking for the first instance of the text string Location:
  • Specifying an offset count that moves the pointer past the name of the field (Location:)

The end marker is specified by:

  • Selecting Field Ends at Specified String
  • Entering in the text entry box, RM:

The end marker could also have been specified by selecting Fixed Character Count and by entering a number into the text entry box, if the text that you want to capture is of a fixed length.

Note: When a marker is found, NetSafe positions its pointer at the beginning of the text string, not at the end, so when counting an offset, this is the position from which to begin the count.

In Screenshot 6-9, two text strings are associated with two previously created report distribution templates, and a default report distribution template is identified.

  • Clinic A is associated with the Demo 1 report distribution template
  • Clinic B is associated with the Demo 2 report distribution template
  • The default report distribution template is Demo Default Using the start and end parameters, NetSafe scans the report and:
  1. Looks for the first occurrence of the start marker, Location: .
  2. Moves its pointer forward nine characters (this is now the start point for the text capture).
  3. Looks for the first occurrence of the end marker, RM: .
  4. Extracts and stores the text between the start and end markers.
  5. NetSafe compares the captured text string with the first Text String entry in the Conditional Redirect Table dialog box.
  6. If the two text strings match, NetSafe redirects the report to the specified report distribution template.
  7. If the two text strings do not match, NetSafe compares the captured text string with the second Text String entry in the Conditional Redirect Table dialog box.
  8. If the two text strings match, NetSafe redirects the report to the specified report distribution template.
  9. If the two text strings do not match, NetSafe redirects the report to the default report distribution template.

Although the above example shows a relatively simple process, the Conditional Report Redirect feature is very extensible. The feature can be used to refine the report distribution process to meet the unique needs of your organization. For example, if the text string for which you are looking is embedded within another text string, you can specify additional rules to focus in on the desired text string. Alternatively, a report can be sent through multiple report distribution templates, filtering reports using different variables to identify critical reports, or to distribute reports to different destinations based on a variety of different content.

All the elements on the Location Specifier Table dialog box are listed and described in the following table.

Table 6-6   Report Properties, Location Specifier Table Dialog Box

Element

Description

Description

A description of the location.

The description can contain any combination of alphanumeric characters and spaces.

Copy Settings

Displays the Copy Settings dialog box.

Use this dialog box to select a previously created list of settings from another report distribution template. The selected list of settings is imported into the report distribution template being created or modified.

Location Specifier Table

Lists all the rules specified for determining the start point for capturing a text string, one rule per line.

Add

Displays the Location Specifier Edit dialog box. Use this dialog box to:

  • Specify the marker to be searched
  • The number of times the marker must be found before stopping the search
  • The direction for the search

Edit

Displays the Location Specifier Edit dialog box for the highlighted rule. Use this dialog box to:

  • Modify the marker to be searched
  • Change the number of times the marker must be found before stopping the search
  • Change the direction for the search

Delete

Deletes the highlighted rule.

Offset Count

The number of characters skipped to position the pointer at the start of the text capture.

. .

In the Offset Count text entry box, inserts the number of characters in the text string of the last specified rule.

For example, in Screenshot 6-8 the number 9 is automatically inserted.

Offset Direction

The direction NetSafe moves its pointer when skipping over the number of characters specified in the Offset Count text entry box.

Fixed Character Count

Causes NetSafe to use only a specified number of characters for comparison.

For example, using Screenshot 6-8, you know that the first eight characters in the Location: field are always unique. Thus, you do not need to compare any additional characters. If you enter 8 in this text entry box, NetSafe only compares the first eight characters.

Field Ends at the Specified String

Causes NetSafe to position the end marker at the start of the specified text string.

For example, using Screenshot 6-8, you know that the text in the Location: field has a variable length. Entering RM: in this text entry box positions the end pointer at the start of that text string.

All the elements on the Conditional Redirect Table dialog box are listed and described in the following table. 

Table 6-7   Report Properties, Conditional Redirect Table Dialog Box

Element

Description

Lists all the text strings and their associated report distribution templates.

Add

Displays the Conditional Redirect Rules Table dialog box. Use this dialog box to specify:

  • The text string against which the captured text is to be compared
  • The name of the report distribution template associated with the text string

Edit

Displays the Conditional Redirect Rule Setting dialog box. Use this dialog box to change:

  • The text string against which the captured text is to be compared
  • The name of the report distribution template associated with the text string

Delete

Deletes the highlighted text string/report distribution template.

Default Report Distribution Template

The name of the default report description template.

. . .

Displays the Select Report Handler dialog box. From this list, select the default report distribution template.

6.10 The Reprocess Method

An additional element of the Conditional Report Redirect feature is the ability to resubmit a separated report to LPD Queue — Pending for processing (Reprocess Method) by another report distribution template. Selecting this option provides the following capabilities:

Each separated report can be processed by individual report distribution templates because the individual reports are separated from the batch report at each report distribution template juncture. If Reprocess Method is not selected, the batch report is separated only once before identifying which report distribution template is used.

Better tracking through the processing agents because the File Number and Table Index number can be used to identify which report distribution template was selected.

If Conditional Report Redirect check box is selected and the Reprocess Method checkbox is clear, NetSafe processes the report as follows:

  1. The target text is located using the rules specified on the Location Settings dialog box.
  2. The target text is compared to the text strings specified in the Conditional Redirect Table dialog box.
  3. When a match is found the report is forwarded to the report distribution template associated with that text string.
  4. Changes made to any settings specified by the report distribution template are made.
  5. The report, with any changed settings, continues to be processed until another match is found, and the report is forwarded to the associated report distribution template.
  6. This process continues until the original batch report has been processed by all the rules.

If the Conditional Report Redirect check box is selected and the Reprocess Method checkbox is also selected, NetSafe processes the report as follows:

  1. The target text is located using the rules specified on the Location Settings dialog box.
  2. The target text is compared to the text strings specified in the Conditional Redirect Table dialog box.
  3. When a match is found, the report is forwarded to the report distribution template associated with that text string.
  • If the recipient is identified, the report is sent to that recipient mnemonic for distribution
  • If the recipient is not identified, the separated report is resubmitted to LPD Queue — Pending; any changes made to the report’s settings are not retained

     4.The report is processed until another match is found, and the report is forwarded to the associated report distribution template.

     5.This process continues until the report has been processed by all the rules, and the intended recipient identified.

6.11 Report Location Destinations Dialog

The location mnemonic to which the report is sent is determined by the properties specified on the Report Location Destinations dialog. The features accessed from this dialog enable you to:

  • Identify a default location mnemonic to which a copy of the report is always sent
  • Formulate rules that locate the intended recipient on the report

Screenshot 6-10 Report Properties, Report Location Destinations Dialog

The following table lists and describes all the features on the Location Fields dialog.

Table 6-8 Report Properties, Report Location Destinations Dialog 

Element

Description

Copy All Reports to Default Location Mnemonic

Determines whether to always distribute a copy of reports processed by this report distribution template to the location mnemonic listed in the text entry box.

The location mnemonic and its description (if one is specified) display in the text entry box.

When this check box is selected, the . . . button is accessible.

. . .

Displays the Select Location Mnemonic dialog box.

Select the default location mnemonic from this list.

Recipients

Displays the list of recipient rule sets that identify the text strings in a report. These text strings are used by NetSafe to determine to which location mnemonic or additional report distribution template the report is sent.

Add

Displays the Recipient Field Settings dialog box.

Use the fields on this menu to specify the rules for locating text on a report.

Edit

Displays the Recipient Field Settings dialog box. Use the fields on this menu to specify the rules for locating text on a report.

Delete

Deletes the highlighted recipient rule set.

6.12 Locate Text on a Report

When NetSafe processes a report using a report distribution template, it needs to determine where to distribute the report. It does this by using rules formulated on the Location Field Settings dialog box. These rules enable NetSafe to locate text on the report that identifies where to send the report(s).

Screenshot 6-11 Location Field Settings Dialog Box

The Location Field Settings dialog box is separated into the following sections:

  • Description — The name of the recipient location specifier
  • Location Specifier Table — Rules for locating the target text
  • Field Properties — Properties for modifying the target text
  • Location Level Permission — Location Mnemonics that do (Included) or do not (Excluded) receive the report the information that is entered each one of these sections provides NetSafe with the information it needs to locate the text. For example, in Screenshot 6-11, rules to locate the text are formulated by specifying start and end markers that bracket a text string
  • The start marker is specified by: – Formulating a rule (Rule 1) that tells NetSafe to search forward looking for the first instance of the text string Physician: – Specifying an offset that moves the pointer past the name of the field (Physician:)
  • The end marker is specified by: – Selecting Field Ends at the Specified String – Entering in that text entry box, 0x0d (ASCII carriage return)

The end marker could also have been specified by selecting Fixed Character Count and by entering a number into that text entry box, if the text that you want to capture is of a fixed length.

Note: When a marker is found, NetSafe positions its pointer at the beginning of the text string, not at the end, so when counting an offset, this is the position from which to begin the count. Using the start and end parameters, NetSafe scans the report and:

  1. Looks for the first occurrence of the start marker, Physician: .
  2. Moves its pointer forward ten characters (this is now the start point for the text capture).
  3. Looks for the first occurrence of the end marker, 0x0d.
  4. Extracts and stores the text between the start and end markers.
  5. Compares the captured text string with entries in its Location Dictionary.

The above example is a very simple, straightforward search for an identifier. Depending on your organization’s needs and the structure of your reports, the search for text strings can be as extensive as required. For example, the search can contain multiple rules to locate several different text strings, moving the pointer forward and backward as necessary. By default, NetSafe considers the captured text to be an alias. Thus, when NetSafe scans its Location Dictionary, it looks into the alias database for an alias that matches the captured text. It then uses the location mnemonic associated with the alias. If an alias is not found, NetSafe then scans the location dictionary.

Once captured, there are several features on the Recipient Field Settings dialog box that enable you to define how NetSafe interprets the captured text string. If the text string:

  • Is a location mnemonic, and not an alias, there is a check box to specify this condition
  • Contains multiple text strings, there is a text entry box to specify how to separate the text strings All of the elements on the Location Field Settings dialog box are listed and described in the following table

Table 6-9 Location Field Settings Dialog Box

Element

Description

Description

The name assigned to the recipient search rules.

Copy Settings

Copies the settings specified on the Location Field Settings dialog box of another report distribution template.

Location Specifier Table

Lists all the rules specified for determining the start marker, one rule per line.

Location Specifier Table: Add

Displays the Text Identifier Properties dialog box. Use this dialog box to:

  • Specify the marker to be searched
  • The number of times the marker must be found before stopping the search
  • The direction for the search

Location Specifier Table: Edit

Displays the Text Identifier Properties dialog box for the highlighted rule. Use this dialog box to:

  • Modify the marker to be searched
  • Change the number of times the marker must be found before stopping the search
  • Change the direction for the search

Location Specifier Table: Delete

Deletes the highlighted rule.

Offset

The number of characters skipped before separating the individual report.

. .

In the Offset Count text entry box, inserts the number of characters in the text string of the last specified rule.

For example, in Screenshot 6-11 the number 10 is inserted.

Offset Direction

The direction NetSafe moves its pointer when skipping over the number of characters specified in the Offset Count text entry box.

Field Length

Select one of these radio buttons to specify how to determine the end of the text string to be captured:

Fixed Character Count — NetSafe only captures the specified number of characters. For example, you know that the physician’s name always contains seven characters, select this radio button and enter 7 in the text entry box.

Field Ends at the Specified String — NetSafe captures all the characters between the start marker and the beginning of the specified text string.

For example, using Screenshot 6-4, the physician’s name is of variable length, and you know that the field always ends with a carriage return. If you enter 0x0d in this text entry box, NetSafe uses only the characters up to the carriage return when making the comparison.

Strip Leading Characters

Determines whether NetSafe removes the specified characters from the front of the text found.

In the text entry box, enter the characters to be removed. For example, specify any PCL commands or extraneous punctuation that may be included in the captured text string so NetSafe captures the appropriate text.

6.13 Filename Template Dialog

Once a report is identified and separated from a batch report, you need to give it a filename. Using the features on the Filename Template dialog, you specify the filename assigned to the report. The filename can be either a static text string, or a name that is created from text captured from the report, or a combination of both.

Screenshot 6-12 Report Properties, File Name Template Dialog 

The Filename Template dialog is divided into the following sections:

  • File Name Template — The name assigned to the report, a combination of static text strings and variable text (identified by %F and %D)
  • Data Fields — The definition of the variable text strings specified in the Filename Template

The following table lists and describes all the features on the Filename Template dialog.

Table 6-10 Report Properties, Filename Template dialog

Element

Description

File Name Template

The template for the file name to be assigned to the report.

In this text entry box, enter a combination of static text strings and variable text identifiers (%F and %D).

Data Fields

The list of variable data fields specified in the Filename Template text entry box.

Once the Create button is clicked, an entry is placed in the list for each instance of the %F variable identifier in the Filename Template text entry box, one entry per line, in the following format:

Fieldn –

where n is a number starting at 1.

Create

Populates the Data Field list with the %F variable identifiers specified in the Filename Template text entry box, one entry per line.

For example, using Screenshot 6-12, the two %F variable markers are listed as:

Field1

Field2

Edit

Displays the Report File Name Properties dialog box for the highlighted entry in the Data Fields list:

If the entry in the Data Fields list is new, the Report File Name Properties dialog box is empty.

If the entry in the Data Fields list has already been defined, the Report File Name Properties dialog box displays the previous settings.

The process of defining a filename for the report is a two-step process:

  1. Create the format for the filename, that is, its template.
  2. Formulate rules to locate the data on the report that are to be entered in the variable fields included in the filename template.

The following, simple example uses the sample report in Screenshot 6-4 and the entries in Screenshot 6-12. In Screenshot 6-12 the report’s filename template consists of the following:

  • A variable text string that is found on the report (the entry in the Data Fields list identifies this text string as “Report Type”)
  • A static text string, “_Report”
  • A variable text string that is found on the report represented by %F (the entry in the Data Fields list identifies this text string as “MRN”) • A static text string, “_”
  • A variable (%D) that indicates that the current date be included in the filename

Note: The variable %F represents text captured from the report as it is processed by NetSafe. The variable %D represents the current date, which is included automatically in the filename when the report is processed by NetSafe.

When Create is clicked, two data fields display in the Data Fields list, representing the two %F variables. Screenshot 6-13 and Screenshot 6-14 show the Report File Name Properties dialog boxes for the entries in the Data Fields list.

Screenshot 6-13 Report Properties, Report File Name Properties Dialog Box, Example 1

Screenshot 6-14 Report Properties, Report File Name Properties Dialog Box, Example 2

The information that is entered in each of these dialog boxes provides NetSafe with the information it needs to locate the text that replaces the variable marker when generating the report’s filename. In Screenshot 6-14, the text for the variable is located as follows:

The start marker is specified by:

  • Formulating a rule (Rule 1) that tells NetSafe to search forward looking for the first instance of the text string Location:
  • Specifying an offset that moves the pointer past the name of the field (Location:)

The end marker is specified by:

  • Selecting Fixed Character Count
  • Entering 3 in that text entry box

The end marker could also have been specified by selecting Field Ends at a Specified String, and by entering text in that text entry box, but in this report type it’s known that the text string is always three characters.

In Screenshot 6-14, the variable is located as follows:

The start marker is specified by:

  • Formulating a rule (Rule 1) that tells NetSafe to search forward looking for the first instance of the text string MRN:
  • Specifying an offset that moves the pointer past the name of the field (MRN:)

The end marker is specified by:

  • Selecting Field Ends at a Specified String
  • Entering 0x0d in that text entry box

Note: When a marker is found, NetSafe positions its pointer at the beginning of the text string, not at the end, so when counting an offset, this is the position from which to begin the count.

Using the start and end parameters for these two rules, NetSafe scans the report and:

  1. Looks for the first occurrence of the start marker, Location: .
  2. Moves its pointer forward 9 characters (this is now the start point for the text capture).
  3. Captures the next three characters.
  4. Replaces the first %F in the filename template with the captured text string.
  5. Moves its pointer to the top of the report.
  6. Looks for the first occurrence of the start marker, MRN: .
  7. Moves its pointer forward 4 characters (this is now the start point for the text capture).
  8. Captures all the text up to the first carriage return (0x0d).
  9. Replaces the second %F in the filename template with the captured text string.

Having resolved the two text variables in the filename template, NetSafe assigns a name to the file and saves it. The filename is determined by the filename template. Based on the filename template in Screenshot 6-12, the filename of the report for this example is:

LAB_Report_MR887_2010-01-01

After having generated the filename, NetSafe appends to the filename a unique, numeric suffix. NetSafe appends this number automatically to avoid duplicate filenames. The number appended to the filename is generated using a number generator within NetSafe. When delivering a report, this unique number can be removed using a feature accessible from the Location Dictionary dialog.

Reference section 4.4 “Location Mnemonic Settings Dialog Box”.

All the elements on the Report File Name Properties dialog box are listed and described in the following table. 

Table 6-11 Report Properties, Report File Name Properties

Element

Description

Field Description

The name assigned to the search rules for the variable. This is the name that displays in the Data Fields list on the Filename Template dialog.

Copy Settings

Copies the Location Specifier Table settings specified on the Recipient Field Settings dialog box of the selected report distribution template.

Location Specifier Table

Lists all the rules specified for determining the start marker, one rule per line.

Add

Displays the Text Identifier Properties dialog box. Use this dialog box to:

  • Specify the marker to be searched
  • The number of times the marker must be found before stopping the search
  • The direction for the search 

Edit

Displays the Text Identifier Properties dialog box for the highlighted rule. Use this dialog box to:

  • Modify the marker to be searched
  • Change the number of times the marker must be found before stopping the search
  • Change the direction for the search

Delete

Deletes the highlighted rule.

Field Properties

  • Offset Count — The number of characters skipped before separating the individual report
  • . . — In the Offset Count text entry box, inserts the number of characters in the text string of the last specified rule

For example, in Screenshot 6-14 the number 4 is inserted.

  • Offset Direction — The direction NetSafe moves its pointer when skipping over the number of characters specified in the Offset Count text entry box

Field Length

Select one of these radio buttons to specify how to determine the end of the text string to be captured:

  • Fixed Character Count — NetSafe only captures the specified number of characters. For example, if you know that the physician’s name always begins with seven unique characters, select this radio button and enter 7 in the text entry box
  • Field Ends at Specified String — NetSafe captures all the characters between the start marker and the beginning of the text string specified in this text entry box

For example: Using Screenshot 6-4, the medical record number is of variable length, and you know that the field always ends with a carriage return. If you enter 0x0d in this text entry box, NetSafe uses only the characters up to the carriage return in the comparison.

6.14 Procedures for Managing Report Templates

NetSafe enables you to direct reports generated by your HCIS to the intended location mnemonic based on sets of rules. Using the features accessed from the Report Templates dialog, you formulate and edit rule-based report distribution templates. These templates are then used by NetSafe to identify location mnemonics and distribute reports. The following procedures explain how to create and manage report distribution templates, including:

  • Overview of Creating a Report Template
  • LPD Queue Names
  • Specifying a Report Template
  • Specifying Recipients
  • Specifying a Filename Template

These procedures assume you have logged in to NetSafe Administrator using an account that has the appropriate permissions and can access the Report Templates dialog. For information about logging in to NetSafe Administrator,

Reference section 1.2 “Accessing NetSafe Administrator”.

If the account that you are using does not have the necessary permissions to create and manage report distribution templates, see the person in your organization responsible for NetSafe.

6.15 Overview of Creating a Report Template

To accommodate the unique requirements of various organizations, the Report Templates feature is designed as a set of functions enabling you to create report distribution templates that meet your requirements for processing and distributing reports. These functions are accessed from tabs on the Report Templates dialog.

Before you begin to create a report distribution template, you should become familiar with the functions. Then you should evaluate your requirements and determine which of the available functions you need to access, and which procedures you need to complete to accomplish your goal.

Defining a report distribution template is not accomplished by following one procedure, but rather is a process of deciding which of several procedures you need to complete to create the report distribution template that meets your requirements.

When creating a report distribution template, you do not need to be concerned about completing all the procedures in one session to have a functioning template. For example, you can first complete the procedures for creating a simple report distribution template, and then modify it later to include other features, such as to add or delete location mnemonics for reports.

Note: The procedures included for creating and editing report distribution templates are procedures for accomplishing specific tasks. The steps included in each procedure are valid whether you are adding a new report distribution template or editing an existing one. Thus, although each procedure assumes that you are adding a new report distribution template, similar steps should be followed if you are editing an existing template.

6.16 LPD Queue Names

NetSafe determines which report distribution template to use based on the name of the line printer daemon (LDP) queue from which the report was received. Thus, prior to setting up a report distribution template you need to determine from which virtual LPD printer reports are received, and the LPD queue names of each printer. This is because each report distribution template acts as a storage area from where a copy of the report is redistributed to the appropriate location mnemonic. Thus, the name of the report distribution template must match the LPD queue name that is routing the report to NetSafe.

Each report distribution template name must uniquely match the name of an LPD queue, on a one-to-one basis. If you are creating more report distribution templates than there are LPD queues, you must configure additional LPD queues. Once all the LPD queue names are defined, you can create new report distribution templates by using the features available on the Report Templates dialog.

Caution: When defining an LPD queue name, do not use spaces in the name. For example, name the queue “Lab_Report,” not “LAB Report”.

6.17 Specifying a Report Template

No matter which procedures you intend to follow when defining a report distribution template, all report distribution templates must be uniquely identified within NetSafe. This is done by accessing the Template Information dialog.

To create and identify a report distribution template, and to define its basic parameters, perform the following steps.

Table 6-12 Specifying a Report Template

Step

Action

1.

Click the Report Templates item in the Settings list.

The Report Templates dialog displays.

2.

Click Add.

The Template Settings dialog box opens with the Template Information dialog displayed.

3.

In the Template Name text entry box, enter a unique name for the new report distribution template.

Caution: The name of the report must match an existing LPD queue name.

Reference section 6.16 “LPD Queue Names”.

4.

In the Description text entry box, enter a description for the report distribution template.

5.

From the Report Extraction Selection drop-down list, select the method to be used for extracting individual reports from a batch report:

  • If None is selected, go to Step 8
  • If Method 1 is selected, the Settings button becomes accessible. Go to Step 6
  • If Method 2 is selected, the Settings button becomes accessible. Go to Step 6

Note: Method 2 only displays if a valid path has been entered in the Report Conversion Path text entry box on the System Settings dialog.

Reference section 16.12 “Report Extraction Methods”.

6.

Determine whether you want to access any of the additional functions for identifying location mnemonics.

  • If yes, go to Step 7
  • If no, go to Step 8

7.

If you want to:

  • Separate individual reports from a batch report, go to 6.18 “Separating Individual Reports”
  • Use the report distribution template to redirect the report to another report distribution template, go to 6.20 “Specifying Conditional Report Redirect Rules”
  • Create an included/excluded list, go to 6.22 “Populating A Recipient Excluded/Included List”

8.

Select one of the following options to identify the desired text extraction method: • Simple

  • Complex [Version 1], go to Step 19
  • Complex [Version 2], go to Step 19
  • Complex [Version 3], go to Step 19
  • Complex [Version 4] The OCR check box becomes accessible. Go to Step 9

Caution: Complex Version 1-3 should be selected if the report contains printer resident fonts. If the report contains downloaded fonts, NetSafe is unable to determine where a report starts and ends. So, using this would not generate any separated reports.

Note: Complex [Version 4] only displays if a valid path has been entered in the Report Conversion Path text entry box on the System Settings dialog.

Reference section 6.5 “Report Extraction Methods”.

9.

Determine whether the file being processed contains soft fonts.

  • If yes, go to Step 10
  • If no, go to Step 19

10.

Click Enable OCR.

The elements in the Choose Field Definition section become accessible.

11.

Determine whether to use NetSafe’s default OCR report extraction function:

  • If yes, select the Standard radio button, then go to Step 12
  • If no, select the Custom radio button, then go to Step 13

12.

From the Page Orientation drop-down list, enter the orientation of the report being processed.

  • Go to Step 19

13.

Click . . .

The Field Definition File Selection dialog box displays.

14.

Specify the file name of the file containing the customized field definition function.

If the file is an existing file, highlight the file name in the list of files, then go to Step 18.

If you need to create a new file, click Create New Field Definition. The EscapeE field definition menu displays.

15.

On the menu bar, click Fields.

The Field dialog box displays. Use this dialog box to specify the desired field.

Note: For information about defining a field, refer to EscapeE Help, by clicking Help on the menu bar.

16

Determine whether you need to create another field definition file:

  • If yes, go to Step 14
  • If no, go to Step 17

17.

Highlight the file name in the list of files.

18

Click Select.

The Field Definition File Selection dialog box closes, and the highlighted file is entered in the Custom text entry box.

19.

Click Save.

The Distribution Template Settings menu closes, and the new report distribution template displays in the list of templates on the Report Templates dialog.

6.18 Separating Individual Reports

If the report received from your HCIS is a batch report, you may want to separate individual reports for distribution. To separate individual reports, you need to identify where one individual report ends and another begins. This task is accomplished by defining a set of rules that NetSafe uses to separate the larger batch report into individual reports. The rules are formulated by identifying markers within the report and telling NetSafe what action to take when a marker is found.

6.18.1 Formulating Report Separation Rules

To formulate the rules for separating an individual report from a batch report, perform one of the following procedures.

This procedure assumes that you have selected Method 1 from the Report Extraction Selection drop-down list on the Template Settings dialog

Table 6-13 Formulating Report Separation Rules

Step

Action

1.

Click Settings.

The Report Separator Settings dialog box displays.

2.

Click Add.

The Report Separator Field dialog box displays.

3.

In the Text Identifier text entry box, enter the text string for Rule 1.

4.

In the Count text entry box, enter the number of times that NetSafe must find the text string specified in Step 3 before the search operation stops.

5.

From the Direction drop-down list, select the direction that NetSafe searches for the text string specified in Step 3.

6.

Click OK.

The Report Separator Field dialog box closes and Rule 1 displays in the Location Specifier Table.

7.

Click Add.

The Report Separator Field dialog box displays.

8.

In the Text Identifier text entry box, enter the text string for the next rule.

9.

In the Count text entry box, enter the number of times that NetSafe must find the text string specified in Step 8 before the search operation stops.

10.

From the Direction drop-down list, select the direction that NetSafe searches for the text string specified in Step 8.

11.

Click OK.

The Report Separator Field dialog box closes and Rule 2 displays in the Location Specifier Table.

12.

Determine whether you need to formulate additional rules:

  • If yes, go to Step 7
  • If no, go to Step 13

Note: You can formulate as many rules as needed to locate the desired text string. The last two rules determine the start and end points for the text string to be captured.

13.

Determine the number of characters to move the pointer, then do the following:

a.In the Offset Count text entry box, enter the number of characters that the pointer moves (enter 0 if you do not want the pointer to move).

b.From the Offset Direction drop-down list, select the direction that the pointer moves. NetSafe uses the specified position as the start point for the text capture.

14.

Determine whether you want NetSafe to evaluate the set of rules once and move its pointer to the position identified by the last rule, but not to separate a report at this point.

  • If yes, go to Step 15
  • If no, go to Step 16

15.

Select Location Specifier Table Points to Top of Report.

16.

Determine whether you want a header at the start of the batch report to display on each individual report:

  • If yes, go to Step 17
  • If no, go to Step 20

17.

Select Copy PCL Header to All Reports.

The PCL Stop String and Additional PCL Commands text entry boxes become accessible.

18.

In the PCL Stop String text entry box, enter the text string that marks the end of the header information that you want to display on all reports.

19.

Determine whether you want additional PCL commands to be included in the report’s header:

  • If yes, in the Additional PCL Commands text entry box, enter the additional PCL command(s).
  • If no, go to Step 20

20.

Determine whether you want NetSafe to use variable text strings to assist in locating where to separate individual reports:

  • If yes, go to 6.19 “Formulating Variable Field Identifier Rules”
  • If no, go to Step 2

21.

Click OK.

The Report Separator Settings dialog box closes.

22.

Return to Step 6 in 6.17 “Specifying a Report Template”.

The following procedure assumes that you have selected Method 2 from the Report Extraction Selection drop-down list on the Distribution Template Settings dialog.

Table 6-14 Formulating Report Separation Rules

Step

Action

1.

Click Settings.

The Report Separator Settings dialog box displays.

2.

Click . . ..

The Field Definition File Selection dialog box displays.

3.

From the list of field definition files, highlight the file to be used for processing reports.

Note: If there are no entries in the Field Definition File Selection dialog box, that means that either no field definition files have been created, they do not have the correct file identifier (.ee), or they are not stored in the correct folder. See the person in your organization responsible for NetSafe or contact Interbit Data Customer Support.

4.

Click Select.

The Field Definition File Selection dialog box closes.

5.

Click Save.

The Report Separator Settings dialog box closes.

6.19 Formulating Variable Field Identifier Rules

The Variable Field Identifier is an ancillary method for identifying where to separate individual reports from a batch report. This method supplements the rules specified on the Report Separator Settings dialog box and provides you with the ability to use a variable text string as a marker. Note: NetSafe executes rules specified in the Variable Field Identifier dialog box before executing rules specified in the Report Separator Settings dialog box. To formulate the rules for locating variable text strings before separating an individual report from a batch report, perform the following steps:

Note: This procedure assumes that you have selected Separate Individual Reports on the Template Information dialog, clicked Settings, and that the Report Separator Settings dialog box is displayed.

Table 6-15 Separate Individual Reports

Step

Action

1.

Select Variable Field Identifier.

The Settings button becomes accessible.

2.

Click Settings.

The Variable Field Identifier dialog box displays.

3.

Click Add.

The Report Separator Field dialog box displays.

4.

In the Text Identifier text entry box, enter the text string for Rule 1. This is the text string for which NetSafe searches to locate the start point for the text capture.

5.

In the Count text entry box, enter the number of times that NetSafe must find the text string specified in Step 4 before the search operation stops.

6.

From the Direction drop-down list, select the direction that NetSafe searches for the text string specified in Step 4.

7.

Click OK.

The Report Separator Field dialog box closes and Rule 1 displays in the Location Specifier Table.

8.

Determine whether you need to formulate additional rules:

  • If yes, go to Step 3
  • If no, go to Step 9

Note: You can formulate as many rules as needed to locate the desired text string. The last rule determines the start point for the text string to be captured.

9.

Determine the number of characters to move the pointer, then do the following:

a.In the Offset Count text entry box, enter the number of characters that the pointer moves (enter 0 if you do not want the pointer to move).

b.From the Offset Direction drop-down list, select the direction that the pointer moves. The pointer uses this position as the start point for the text capture.

10.

Determine the method by which NetSafe determines the end point for the captured text, then do one of the following:

Select Fixed Character Count; in the Fixed Character Count text entry box, enter the number of characters that the pointer moves.

Select Field Ends at Specified String; in the Field Ends at Specified String text entry box, enter the text that marks the end point of the text to be captured.

The pointer uses this position as the end point for the text capture.

11.

Click OK.

The Variable Field Identifier dialog box closes, and the Report Separator dialog box displays.

12.

Click OK.

The Report Separator Settings dialog box closes.

13.

Return to Step 6 in “Specifying a Report Template”.

6.20 Specifying Conditional Report Redirect Rules

Once a report has been identified by NetSafe, the location mnemonic for the report needs to be ascertained. In some organizations the intended location mnemonic may always be the same. In some organizations, however, it may be necessary to identify two or more location mnemonics, depending on the conditions at your organization. In such situations, the Conditional Report Redirect feature enables you to formulate rules for capturing text. This text is used by NetSafe to redirect the report to another report distribution template that identifies the location mnemonic for that report. Two types of rules must be formulated for NetSafe to know where to direct the report:

  • Rules locating the text that identifies where the report should be sent
  • Rules to identify the report distribution template used for distributing the report

Locating Text for Conditional Report Redirect To formulate rules for locating variable text strings that identify where the report should be sent, perform the following steps:

Table 6-16 Locating Text for Conditional Report Redirect

Step

Action

1.

Select Conditional Report Redirect.

  • The Location and Rules buttons become accessible
  • The Template Are list becomes inaccessible
  • The features on the Location Fields dialog become inaccessible
  • The features on the Filename Template dialog become inaccessible

2.

Click Location.

The Location Specifier Table dialog box displays.

3.

In the Description text entry box, enter a description.

4.

Determine whether you want to use the Location Specifier settings from another report distribution template:

  • If yes, go to Step 5
  • If no, go to Step 8

5.

Click Copy Settings.

The Copy Settings dialog box displays.

6.

Select the report distribution template from which you want to copy the settings.

7.

Click OK.

The Copy Settings dialog box closes, and the Location Specifier Table contains the rules from the selected report distribution template. 8

8.

Determine whether you want to add a rule to the Location Specifier Table:

  • If yes, click Add

The Location Specifier Edit dialog box displays, go to Step 9.

  • If no, go to Step 13

9.

In the Text Identifier text entry box, enter the text string for the rule. This is the text string for which NetSafe searches to locate the start point for the text capture.

10.

In the Count text entry box, enter the number of times that NetSafe must find the text string specified in Step 9 before the search operation stops.

11.

From the Direction drop-down list, select the direction that NetSafe searches for the text string specified in Step 9.

12.

Click OK.

The Location Specifier Edit dialog box closes and the rule displays in the Location Specifier Table.

Go to Step 8.

Note: You can formulate as many rules as needed to locate the desired text string. The last rule determines the start point for the text string to be captured.

13.

Determine the number of characters to move the pointer, then do the following:

1. In the Offset Count text entry box, enter the number of characters that the pointer moves (enter 0 if you do not want the pointer to move).

2. From the Offset Direction drop-down list, select the direction that the pointer moves.

The pointer uses this position as the start point for the text capture.

14.

Determine the method by which NetSafe determines the end point for the captured text, then do one of the following:

Select Field Has a Fixed Character Count; in the Field Has a Fixed Character Count text entry box, enter the number of characters that the pointer moves.

Select Field Ends at the Specified String; in the Field Ends at the Specified String text entry box, enter the text that marks the end point of the text to be captured.

The pointer uses this position as the end point for the text capture.

15.

Click OK.

The Location Specifier Table dialog box closes. NetSafe will capture and store the text string between the start and end markers when it processes a report.

16.

Go to 6.21 “Identifying a Report Distribution Template for Conditional Report Redirect”.

6.21 Identifying a Report Distribution Template for Conditional Report Redirect

To formulate the rules for identifying a report distribution template used for redirecting a report, perform the following steps:

Note: This procedure assumes that you have selected Conditional Report Redirect on the Template Information dialog, and that you have specified location rules on the Location Specifier Table dialog box

Reference table 6-16 ” “Locating Text for Conditional Redirect”

Table 6-17 Identifying a Report Distribution Template for Conditional Report Redirect

Step

Action

1.

Click Rules.

The Conditional Redirect Table dialog box displays.

2.

Click Add.

The Conditional Redirect Table dialog box displays.

3.

In the Text Identifier text entry box, enter the text string that matches a text string captured using the rules specified on the Location Specifier Table dialog box.

Reference table 6-16 ” “Locating Text for Conditional Redirect”

4.

In the Template Name text entry box, enter the name of the report distribution template to be used if the two text strings match.

5.

Click OK.

The Conditional Redirect Table dialog box closes, and the text string and its associated report distribution template display in the list on the Conditional Redirect Table dialog box.

6.

Click Add.

The Conditional Redirect Table dialog box displays.

Note: A minimum of two rules should be entered. If only one rule is entered, using Conditional Redirect to determine the report’s destination is not necessary.

7.

In the Text Identifier text entry box, enter a different text string that must match a text string captured using rules specified on the Location Settings dialog box.

Reference table 6-16 ” “Locating Text for Conditional Redirect”

8.

In the Template Name text entry box, enter the name of the report distribution template to be used if the two text strings match.

9.

Click OK.

The Conditional Redirect Table dialog box closes, and the text string and its associated report distribution template display in the list on the Conditional Redirect Table dialog box.

10.

Determine whether you need to identify additional text strings and associated report distribution templates:

  • If yes, go to Step 6
  • If no, go to Step 11

11.

In the Default Report Distribution Template text entry box, enter the name of the report distribution template to be used if no matches are found.

12.

Click OK.

The Conditional Redirect Table dialog box closes.

13.

Click OK.

The Conditional Redirect Table dialog box closes.

14.

Determine whether you want the report to be processed each time it is evaluated by a different report distribution template.

Reference section 6.10 “The Reprocess Method” for an explanation of this feature):

  • If yes, select Reprocess Method, then go to Step 15
  • If no, go directly to Step 15

15.

Click Save.

The Template Information menu closes, and the new report distribution template displays in the list of templates on the Report Templates dialog.

6.22 Populating A Recipient Excluded/Included List

NetSafe sends reports to location mnemonics whose identities are determined by the rules formulated on the report distribution template. You can, however, modify the list of location mnemonics to which reports are sent. You can either ensure that reports processed by a report distribution template are always delivered to specific location mnemonics, or that reports are never delivered to specified location mnemonics.

To formulate the rules for identifying specific location mnemonics, perform the following steps. 

Table 6-18 Populating A Recipient Excluded/Included List

Step

Action

1.

Determine whether you want to use the Recipient List from another report distribution template:

  • If yes, go to Step 2
  • If no, go to Step 5

2.

Click Copy List.

The Copy Settings dialog box displays.

3.

Select from the list the report distribution template from which you want to copy the settings.

4.

Click OK.

The Copy Settings dialog box closes, and the selected list of location mnemonics is imported into the Recipient list on the Template Information dialog.

5.

Determine whether you want to add a location mnemonic to the Recipient list.

  • If yes, click Add. The Select Location Mnemonic dialog box displays. Go to Step 6
  • If no, go to Step 8

6.

Select the location mnemonic that you want to add to the Recipient list.

7.

Click OK.

The Select Location Mnemonic dialog box closes, and the location mnemonic is added to the Recipient list. Go to Step 5.

8.

Determine whether you want to delete a recipient from the Recipient list.

  • If yes, go to Step 9
  • If no, go to Step 11

9.

Highlight the location mnemonic that you want to delete from the list.

10.

Click Delete.

The highlighted location mnemonic is deleted from the Recipient list.

11.

Determine the type of list.

If you want every location mnemonic in the list to receive reports processed by this report distribution template, select Inclusive from the List Type drop-down list.

If you want every location mnemonic in the list to not receive reports processed by this report distribution template, select Excluded from the List Type drop-down list.

12.

Return to the procedure that sent you to this procedure:

  • Step 6 in 6.17 “Specifying a Report Template”
  • Step 23 in 6.23 “Specifying Recipients”

6.23 Specifying Recipients

The location mnemonic to which the report is sent is determined by properties specified on the Location Fields dialog. Use the features on this dialog to specify location mnemonics that should process the report.

Note: If Conditional Report Redirect is selected, the location mnemonics specified on this dialog do not receive reports processed by the report distribution template. Use the Conditional Report Redirect function if reports have multiple distribution locations.

Reference section 6.20 “Specifying Conditional Report Redirect Rules”.

To formulate the rules for identifying specific location mnemonics that should be sent the reports processed by the report distribution template, perform the following steps.

This procedure assumes that the Template Properties dialog box is displayed.

Table 6-19 Specifying Recipients

Step

Action

1.

Click the Location Fields dialog.

The Location Fields dialog box displays.

Note: If Conditional Report Redirect is selected, the features are accessible.

2.

Determine whether you want all reports processed by the report distribution template to be distributed to a specific location mnemonic:

  • If yes, go to Step 3
  • If no, go to Step 4

3.

Do the following:

1. Select the Copy All Reports to Default Recipient check box.

2. In the Copy All Reports to Default Recipient text entry box, enter a location mnemonic to receive all reports.

4.

Determine whether you want to add one or more location mnemonics to the Recipients list:

  • If yes, go to Step 5
  • If no, go to Step 24

5.

Click Add.

The Recipient Field Settings dialog box displays.

6.

In the Recipient Description text entry box, enter a description of the recipient(s).

7.

Determine whether you want to use settings from another report distribution template:

  • If yes, go to Step 8
  • If no, go to Step 11

8.

Click Copy Settings.

The Copy Settings dialog box displays.

9.

From the list of report distribution templates, select the template from which you want to copy the settings.

10.

Click OK.

The Copy Settings dialog box closes, and the Location Specifier contains the rules and settings from the selected report distribution template.

Caution: Only one collection of settings can be imported. Importing settings deletes all previous rules and settings. If you want to augment an imported list, you must import the list first, then add individual rules. 11

11.

Determine whether you want to add a rule to the Location Specifier Table:

  • If yes, click Add. The Text Identifier Properties dialog box displays, then go to Step 12
  • If no, go directly to Step 16

12.

In the Text Identifier text entry box, enter the text string for the rule.

13.

In the Count text entry box, enter the number of times that NetSafe must find the text string specified in Step 12 before the search operation stops.

14.

From the Direction drop-down list, select the direction that NetSafe searches for the text string specified in Step 12.

15.

Click OK.

The Text Identifier Properties dialog box closes, and the rule displays in the Location Specifier Table.

Go to Step 11.

Note: You can formulate as many rules as needed to locate the desired text string. The last rule determines the start point for the text string to be captured.

16.

Determine the number of characters to move the pointer, then do the following:

1. In the Offset Count text entry box, enter the number of characters that the pointer moves (enter 0 if you do not want the pointer to move).

2. From the Offset Direction drop-down list, select the direction that the pointer moves.

The pointer uses this position as the start point for the text capture.

17.

Determine the method by which NetSafe determines the end point for the captured text, then do one of the following:

Select Field Has a Fixed Character Count. In the Field Has a Fixed Character Count text entry box, enter the number of characters that the pointer moves.

Select Field Ends at the Specified String. In the Field Ends at the Specified String text entry box, enter the text that marks the end point of the text to be captured.

The pointer uses this position as the end point for the text capture.

18.

Determine whether you want to remove any leading or trailing characters from the captured text string:

  • If yes, go to Step 19
  • If no, go to Step 20. 19

19.

Do one or both of the following:

  • In the Strip Leading Characters text entry box, enter a text string that you want removed from the beginning of the captured text string
  • In the Strip Trailing Characters text entry box, enter a text string that you want removed from the end of the captured text string

20.

Determine whether the captured text string is a location mnemonic:

  • If yes, select the Field is Location Mnemonic check box, then go to Step 21
  • If no, go directly to Step 21

21.

Determine whether the captured text string contains more than one text string:

  • If yes, select the Field Contains Multiple Recipients. In the Separator text entry box, enter the character that separates the recipients, then go to Step 22
  • If no, go directly to Step 22

22.

Determine whether you want to create an included/excluded list:

  • If yes, go to 6.22 “Populating A Recipient Excluded/Included List”
  • If no, go directly to Step 23

23.

Click OK.

The Recipient Field Settings dialog box closes.

24.

Click Save.

The Table Properties dialog box closes

6.24 Specifying a Filename Template

Use the features on the Filename Template dialog to specify the filename assigned to the report by NetSafe. The filename can be either a static text string, a name that is created from text captured from the report, or a combination of both. To specify a template to be used for assigning a filename to the report, perform the following steps:

Note: This procedure assumes that the Template Properties dialog box is displayed. 

Table 6-20. Specify a template to be used for assigning a filename to the report

Step

Action

1.

Click the Filename Template dialog.

The Filename Template dialog box displays.

Note: If Conditional Report Redirect is selected, the features on this dialog box are inaccessible.

2.

In the Filename Template text entry box, enter a template text string to be used by NetSafe when assigning a filename to the report.

3.

Click Create.

A list of variables displays in the Data Fields box, one entry for each %F variable in the Filename Template text entry box.

4.

Highlight a variable in the Data Fields box.

5.

Click Edit.

The Report File Name Properties dialog box displays.

6.

In the Field Description text entry box, enter a description.

7.

Determine whether you want to use settings from another report distribution template:

  • If yes, go to Step 8
  • If no, go to Step 11

8.

Click Copy Settings.

The Copy Settings dialog box displays.

9.

From the list of report distribution templates, select the template from which you want to copy the settings.

10.

Click OK.

The Copy Settings dialog box closes, and the Location Specifier Table contains the rules and settings from the selected report distribution template.

Caution: Only one collection of settings can be imported. Importing settings deletes all previous rules and settings. If you want to augment an imported list of rules, you must import the list first, then add individual rules.

11.

Determine whether you want to add a rule to the Location Specifier Table:

  • If yes, click Add. The Text Identifier Properties dialog box displays, go to Step 12
  • If no, go to Step 16

12.

In the Text Identifier text entry box, enter the text string for the rule.

13.

In the Count text entry box, enter the number of times that NetSafe must find the text string specified in Step 12 before the search operation stops.

14.

From the Direction drop-down list, select the direction that NetSafe searches for the text string specified in Step 12.

15.

Click OK.

The Text Identifier Properties dialog box closes, and the rule displays in the Location Specifier Table.

Go to Step 11.

Note: You can formulate as many rules as needed to locate the desired text string. The last rule determines the start point for the text string to be captured.

16.

Determine the number of characters to move the pointer, then do the following:

1. In the Offset Count text entry box, enter the number of characters that the pointer moves (enter 0 if you do not want the pointer to move).

2. From the Offset Direction drop-down list, select the direction that the pointer moves.

The pointer uses this position as the start point for the text capture.

17.

Determine the method by which NetSafe determines the end point for the captured text, then do one of the following:

Select Field Has a Fixed Character Count. In the Field Has a Fixed Character Count text entry box, enter the number of characters that the pointer moves.

Select Field Ends at the Specified String. In the Field Ends at the Specified String text entry box, enter the text that marks the end point of the text to be captured.

The pointer uses this position as the end point for the text capture.

18.

Click OK.

The Report File Name Properties dialog box closes.

19.

Click Save.

The Filename Template dialog closes.

Note: After having generated the filename, NetSafe appends to the filename a unique, numeric suffix. NetSafe appends this number automatically in order to avoid duplicate filenames. The number appended to the filename is generated using a number generator within NetSafe.

7.0 Template Recipient Groups

Template Recipient Groups provide a centralized method for determining whether a Location Mnemonic receives a copy of a report that was processed through a Report Template. The administrator assigns a name to a group of Location Mnemonics to maintain the list in one location in the application.

  • Template Recipient Groups Overview
  • Template Recipient Groups

7.1 Template Recipient Groups Overview

Template Recipient Groups are utilized by Report Templates for determining if a report should be sent to a particular Location Mnemonic. Depending on how the Report Template is configured, the list can act as a filter to either exclude the Location Mnemonics on the list or include only the Location Mnemonics on the list. Note that this list is not a distribution list and does indicate that the Location Mnemonics on the list should receive a copy of the report.

The dialog is used to create and maintain the list of Location Mnemonics that are associated with each group name. Utilize the functionality on the dialog to create and maintain the list of Location Mnemonics assigned to each group.

7.2 Template Recipient Groups

Screenshot 7-0 Template Recipient Groups

The Template Recipient Groups dialog is divided into the following sections:

Template Recipient Group, containing a list of the group names that are currently set up. In addition, there is a text box that can be used to search for a specific group name in the list.

Recipients, containing a list of the Location Mnemonics that are currently assigned to the highlighted group name. In addition, there is a text box that can be used to search for a specific Location Mnemonic.

Table 7-0 Template Recipient Group

Element

Description

Add

Displays the Template Recipient Group Settings dialog that can be used to create a new group name.

Edit

Displays the Template Recipient Group Settings dialog with the highlighted item in the Template Group Settings list set up within the dialog. Changes can be made to the settings to update the saved settings.

Delete

The currently highlighted entry will be deleted from the application. In addition, the corresponding Location Mnemonics will be removed from the group name as well.

Copy

Use this to create a copy of the currently selected group name’s Location Mnemonic list.

Note: This functionality does not copy the settings, just the list of Location Mnemonics. Use the Edit button to update the setting of the newly created entry.

Table 7-1 Recipients

Element

Description

Add

Displays the Select Location Mnemonic dialog that can be used to add a Location Mnemonic to the highlighted group name. Repeat this process to add additional Location Mnemonics to the group name.

Note: Only one Location Mnemonic can be added at a time.

Delete

Deletes the highlighted Location Mnemonic entries in the Recipient list.

WARNING: There is no confirmation dialog before deleting an entry.

Note: More than one entry can be deleted at one time. Press and hold the CTRL key and select each entry that should be deleted before pressing the Delete button.

8.0 Reports Logs

The Report Logs enables you to direct reports received by NetSafe to a particular location mnemonic by locating and capturing specific text strings within the report. The Report Logs dialog enables you to view the list of reports that were processed using a report template. This chapter explains the features of the Report Logs dialog and associated dialog boxes, it includes the following topics:

  • Report Logs Dialog
  • Report Search and Display Functions
  • List of Entries
  • Manipulating Report Log Entries
  • Procedures for Viewing & Managing Reports Processed by a Template

For information about the Distribution Wizard.

Reference section 6.0 “Report Templates”.

8.1 Report Logs Dialog

The Report Logs dialog displays reports that have been sent to location mnemonics using a report template. Each report processed using a report template appears as an entry on this dialog. If a report template processed a report and identified two location mnemonics on that report, two entries display on this dialog, one entry for each location mnemonic. When storing the information about reports processed using a report template, NetSafe writes the information to a comma-separated value (CSV) file, not to a database. 

On the main NetSafe Administrator dialog, use the Settings list to select the Report Logs to access the list of reports that have been processed by a report template.

Screenshot 8-0 Report Logs

The Report Logs dialog is divided into the following major sections:

  • Functions that enable you to search for and display the entries
  • A listing of the entries and properties associated with each entry
  • Functions for viewing and manipulating entries

8.2 Report Search and Display Functions

The search and display section provides functionality for displaying the list of reports and searching for individual reports. The following table lists and describes the elements in this section of the Report Logs dialog.

Table 8-0 Report Logs Menu, Search and Display Functions

Element

Description

Template Name

The report distribution template that processed reports.

Select from the drop-down list the report distribution template that processed the reports that you want to view.

Note: Type the first few characters of the template name that you are searching for then select the drop-down button. This will highlight the first entry that matches the entered text.

Year

The year in which the report was processed. Select the year from the drop-down list.

Note: The default year is the current year when the administrator logged onto the NetSafe Administrator.

Month

The month in which the report was processed. Select the month from the drop-down list.

Note: The default month is the current month when the administrator logged onto the NetSafe Administrator.

Mnemonic

The location mnemonic entered here is used to filter out entries that do not match the entered location mnemonic in the CSV file.

Select a location mnemonic using one of the following methods:

Enter a character string in this text entry box that matches exactly and completely the characters in the location mnemonic (NetSafe does not do a partial lookup). Only those location mnemonics that match the characters in the sequence entered display.

Click the ellipsis button, “…”, to select a location mnemonic from the Select Location Mnemonic dialog box.

Displays the Select Location Mnemonic dialog box. From this dialog box, select the desired location mnemonic.

File Name Filter

The filename of the report that was processed. Enter a character string in this text entry box that matches exactly and completely the characters in the report’s filename. (NetSafe does not do a partial lookup). Only those filenames that match the characters, in the sequence entered, display.

Load

Redisplays the list of entries based on the specified search criteria. Note: The entries in the list are not updated until this button is pressed.

8.3 List of Entries

When you click on the Report Logs item, the list of entries for the selected report template display, one row for each entry. Each entry in this table is identified by a set of properties associated with that entry. By using the search and display parameters and clicking Load, you can change the content of the list. In addition, each column has an arrow button enabling you to display the contents of the list based on the ascending or descending order of that particular property.

Note: For ease of reading, not all the available properties display when the Distribution Reports dialog initially displays. To display additional columns, position your mouse cursor on the boundary that separates columns. If the cursor changes to a double-bar between two arrows, an additional column can be displayed. Press the left mouse button and move the cursor to the right until an additional column displays. In addition, the button Show All Columns can be used to display all the columns. Each column will be formatted to fit the width of the longest text string in each column.

The following table describes the properties that display in the list of entries. 

Table 8-1 List of Entries  

Property

Description

Submit Time

The time at which the report entry was submitted to the CSV file.

Job #

The archive file number that the original report used. All reports processed from this original base report will have this number in common.

Report #

The number of the separated report from the original report.

Note: If the report had 3 separate reports in the original report, this number would represent the corresponding separated report such as 1, the first report, 2, the second, and 3, the third report.

Rec #

A number that indicates the destination location settings used on the Report Template’s dialog, Report Location Destinations.

  • 0 would indicate the default Location Mnemonic

Any number higher than 0 would indicate the Destination Location setting used to find the Location Mnemonic starting from the top of the list.

Description

Indicates from which of the Report Template’s Location Fields the location mnemonic was retrieved.

Reference section 6.11 “Report Location Destinations Dialog”.

Status

Indicates the delivery type used or if the report was deleted for some reason.

Error

The error code, if there was a problem distributing the report.

Location Mnemonic

 

Recipient

The description used for the Location Mnemonic.

Location Map

Displays the name of the final (last) report distribution template used, if the report came from a conditional redirect template.

Reference section 6.9 “Conditional Report Redirect”.

File Name

The filename of the report.

Note: This filename does not include the unique identifier, just the base filename.

8.4 Manipulating Report Log Entries

Below the listing of reports processed by the report templates is a set of buttons that enable you to view and manipulate the entries. The following table lists and describes these buttons.

Table 8-2 Manipulating Report Log Entries  

Element

Description

Total Entries Found

Displays the total number of entries displayed. This number changes depending on the specified display criteria.

Exclude ‘DELETED’ Status

Determines whether reports that have a status of Deleted are removed from the list of entries, when the Load button is clicked.

Note: Reports are deleted by NetSafe when certain events occur, for example the location mnemonic is unknown.

Forward

Displays the Select Location Mnemonic dialog box.

Use this dialog to select the location mnemonic to which a copy of the report is sent. When the OK button is pressed, the report is placed in Relay Queue – Pending.

Details

Displays all the information for the highlighted entry in a dialog box for easier reading. Not all the information that is stored for an entry displays in the list of reports. Clicking this button displays a dialog box containing all the information for the highlighted entry.

View

The archive file associated with the entry will be converted to a PDF file and displayed in the default application that handles PDF viewer.

Note: The application used to display the PDF is separate from the NetSafe Administrator application.

8.5 Procedures for Viewing & Managing Reports Processed by a Template

Included with the Report Template is a feature that enables you to view the list of reports that were processed using a Report Template, as well as their status. This feature is accessed from the Report Logs dialog.

Each report processed using a report template appears as an entry on this dialog. If a report template processed a report and identified two location mnemonics on that report, two entries display on this dialog, one entry for each location mnemonic. You can use the available features to view the status of a report, and to decide what action, if any, to take. The following procedures include:

  • Locating a Report
  • Forwarding a Report
  • Viewing an Entry’s Details
  • Viewing a Report

These procedures assume that you have logged in to NetSafe Administrator using an account that has the appropriate permissions and can access the Report Logs dialog. For information about logging in to NetSafe Administrator.

Reference section 1.2 “Accessing NetSafe Administrator”.

If the account that you are using does not have the necessary permissions to create and manage report templates, see the person in your organization responsible for NetSafe.

8.5.1 Locating a Report

For a variety of reasons, you may not be able to locate an entry in the displayed list. To locate an entry, perform the following steps.

Table 8-3 Locating a entry

Step

Action

1.

Click the Report Logs item in the Settings list on the main NetSafe Administrator dialog.

The Report Logs dialog displays.

2.

Select the report template that processed the reports that you want to view from the Template Name drop-down list.

3.

Select the year in which the report was processed from the Year drop-down list.

4.

Select the month in which the report was processed from the Month drop-down list.

5.

In the Mnemonic text entry box, enter the location mnemonic to which the report was distributed.

6.

In the Filename Filter text entry box, enter the filename of the report that was distributed.

Caution: The character string must match exactly and completely the characters in the report’s filename. NetSafe does not do a partial lookup. Only those filenames that match the characters, in the sequence entered, display.

7.

Determine whether you want to exclude from the list all reports that have a status of DELETED:

  • If yes, go to Step 8
  • If no, go to Step 9

8.

Select the Exclude ‘DELETED’ Status check box.

9.

Click Load. A list of entries that matches the search criteria display.

8.5.2 Forwarding a Report

Sometimes recipients request that a report they received should also be sent to one or more other locations. To forward a report to another location mnemonic, perform the following steps.

Table 8-4 Forwarding a Report

Step

Action

1.

Click the Report Logs item in the Settings list on the main NetSafe Administrator dialog.

The Report Logs dialog displays.

2.

Display the reports that were processed by the target report template, refer to 8.5.1 “Locating a Report”.

3.

Scroll through the list of entries until you locate the target entry.

4.

Highlight the target entry. Note: To forward more than one report at the same time, press and hold the CTRL key while selecting additional reports.

5.

Click Forward. The Select Location Mnemonic dialog displays.

6.

Highlight the location mnemonic to which the report is to be forwarded.

7.

Click OK.

The Select Recipient dialog closes and a confirmation dialog box displays.

8.

Click Yes. The report(s) is resubmitted to Relay Queue — Pending.

8.5.3 Viewing an Entry’s Details

The Distribution Wizard provides the capability to view the properties of an entry on a single property sheet. To view the properties of a single entry, perform the following steps. 

Table 8-5 Viewing an Entries Details

Step

Action

1

Click the Report Logs item in the Settings list on the main NetSafe Administrator dialog. The Report Logs dialog displays.

2

Display the reports that were processed by the target report template, refer to 8.5.1 “Locating a Report”.

3

Scroll through the list of entries until you locate the target entry.

4

Highlight the target entry.

5

Click Details. A property sheet for the selected entry displays.

8.5.4 Viewing a Report

Situations may arise where it is necessary to verify the contents of a report, such as to troubleshoot a stuck report, or to verify its content. To view a report processed by a report distribution template, perform the following steps.

Table 8-6 Viewing a Report

Step

Action

1.

Click the Report Logs item in the Settings list on the main NetSafe Administrator dialog. The Report Logs dialog displays.

2.

Display the reports that were processed by the target report template, refer to 8.5.1 “Locating a Report”.

3.

Scroll through the list of entries until you locate the target entry.

4.

Highlight the target entry.

5.

Click View. The contents of the report, in PDF format, displays in another application window using the default application associated with PDF files.

9.0 Table Templates

When patient reports are distributed to a NetSafe Client, the display of the data about the report is determined by a predefined data structure. This data structure defines a table for both displaying the data, and the order in which those data are displayed. If the predefined data structure does not meet the requirements of your organization, the NetSafe Administrator provides you with the functionality to:

  • Import one or more data structures (such as the MPI)
  • Specify a Table Template to display that data structure
  • Identify which Windows folder location mnemonics receive reports processed by a Table Template

Specifying a Table Template enables you to display the desired data in the NetSafe Client, and the order in which that data is displayed. This chapter explains the functionality within NetSafe Administrator that enables you to define Table Templates. It includes the following topics:

  • How Table Templates Work
  • Data Structure for a Table Template
  • Defining a Table Template
  • Procedures for Configuring Table Templates

9.1 How Table Templates Work

When a patient report is received by NetSafe, it needs to know the location to which it should be distributed. This information is provided by a location mnemonic.

Reference section 4.0 “Location Mnemonics”.

When that report is received by a NetSafe Client, the information about each report is entered into a table that lists the reports for the specific location mnemonic that received the report. A default data structure is used by NetSafe to display that information.

If this default structure does not meet the requirements of your organization, you can specify a different structure by defining one or more Table Templates. Table Templates enable you to import delimited files (such as the MPI) into databases for simplified storage and retrieval. Table Templates are used to specify the columns (data types) that display, and the order in which they display. You associate Table Templates with one or more Windows folder location mnemonics so that a user or group of users can view the data in a structure that best meets their needs.

To implement a Table Template, you need to complete the following tasks:

  1. Create in your HCIS a delimited text file that specifies the data types (columns) to display, and the order in which to display them.
  2. Create a virtual LPD printer from which NetSafe receives the delimited text file. NetSafe determines which Table Template to use based on the LPD queue name from which the report was received. Prior to setting up a Table Template, you need to determine the LPD queue name of each virtual printer from which NetSafe receives delimited text files. Each Table Template name must uniquely match the LPD queue name, on a one-to-one basis. If you create more Table Templates than there are LPD queues, you must configure additional LPD queues.
  3. Define within NetSafe Administrator a Table Template with a template name that matches the LPD queue name from which reports are received.
  4. Associate one or more Windows folder location mnemonics with each Table Template.

As soon as a report is downloaded to NetSafe, the InterbitProcessingAgent.exe determines how to process it based on the LPD Queue name.

  1. If the LPD queue name is MISPROVDICT, the report is processed as a MIS Provider Dictionary.
  2. If the LPD queue name is not MISPROVDICT, the LPD queue name is compared to the LPD queue name used for processing a Master Patient Index. If the LPD queue name is MPIIMPORT, the report is processed as a Master Patient Index.
  3. If the LPD queue name does not match a MPIIMPORT, the LPD queue name is compared to Table Template names. If the LPD queue name matches a Table Template name, the report is sent to the Table Template to be processed.
  4. If the LPD queue name does not match a Table Template name, the LPD queue name is compared to the location mnemonic. If the LPD queue name matches a location mnemonic, the report is sent directly to the specified location.
  5. If the LPD queue name does not match a location mnemonic, the LPD queue name is compared to report distribution template names. If the LPD queue name matches a report distribution template name, the report is sent to the report distribution template to be processed.
  6. If no matches are found, the report is not processed, and it is sent to Unknown Location.

9.2 Data Structure for a Table Template

The structure of the data within the file should follow the RFC for CSV files. One can find this information at the following link, https://tools.ietf.org/html/rfc4180.

The data structure format is specified by beginning the file with a header line (first line). The header identifies the data to be displayed and the order in which it is displayed. For example, if you want to display a postal code or a healthcare number, the header line might look something like this:

MRN|Lastname|Firstname|Middlename|Address|City|Province |POCode|Phone|HealthNumber|DOB|Sex|LASTIPDischargeDate |LastOPServiceDate|LastOPLocation

Each column is delimited by a specific character. NetSafe assumes that the delimiting character is a vertical bar (|), but you can use a different character. Subsequent lines contain the data elements, with each data element identified by the delimiter character. Each entry is listed in the file on a single line. It is not necessary that all the data fields be filled, but all data fields listed in the header must be included in the definition for each entry. That is, if there are six data fields in the header, and one of the fields is null, that field must be accounted for by leaving it empty. For example, the following shows the header line, and a line of data, with one of the fields (Middlename) null.

MRN|Lastname|Firstname|Middlename|Address|City|POCode|Province 00555|Kahlo|Frida||235 Central St.|Sudbury|P3A 1E2|Ontario|

Note: NetSafe can process data structure formats that have PCL code included in them, as well as plain text files with no PCL code.

After the delimited text file is created, it must be sent to the LPD printer with the queue name that matches a Table Template name. When the file is received by NetSafe, if a Table Template name has been specified that matches the LPD queue name sending the report, NetSafe recognizes the data structure, and ensures that all the relevant information is displayed.

You can either manually send the report to this queue or set up a process within your HCIS to automatically send a newly created delimited text file.

To manually send the file to the queue, perform the steps in the following table.

Note: Verify that the LPD is installed on the server before performing the following procedure; it may not have been installed by default.

Table 9-0 Manually send files to the queue

Step

Action

1.

Select Run from the Windows Start menu.

2.

Enter cmd into the Open field.

3.

Click OK. A command window opens.

4.

Enter the following into the command window:

lpr -S <servername> -P <LPD queue name> <filename>.prn

Where <servername> is the name of the print server, and <filename> is the location and name of the delimited text file. For example: lpr -S 127.0.0.1 -P Template_1 recipients.prn

9.3 Defining a Table Template

For the delimited text file to be recognized and processed by NetSafe, you need to define within the NetSafe Administrator a Table Template, and then associate at least one location mnemonic with that template. If you do not associate at least one location mnemonic with a Table Template, the default data structure is used. The process for defining a Table Template is as follows:

1.Define a Table Template by specifying the:

  • LPD queue name from which delimited text files are received
  • Name of the Table Template
  • Name of the database file used to store the data 2 Associate the Table Template with one or more location mnemonics

Clicking the Table Template item in the Settings list on the main NetSafe Administrator menu displays the elements for defining a Table Template.

Screenshot 9-0 NetSafe Table Template Dialog

At the top of the Table Template dialog is the Table Templates text entry box. Use this box when looking for a Table Template. Enter a character string into the text entry box that matches the initial characters in the Table Template’s name for which you are looking. The system does a partial lookup, starting at the left character and ending at the right character, looking for Table Template names that match the characters as entered. Only those Table Template names that match the characters entered display. The search is not case-sensitive. Click Show All to display all the Table Templates.

The rest of the Table Templates dialog is divided into the following sections:

Table Temples — The elements for defining and listing Table Templates. Each Table Template in this list is identified by a set of properties. These properties are listed and described in Table 9-1.

Table Temple Location Mnemonics— The elements for associating location mnemonic(s) with the defined Table Templates. The content of this list changes depending on which Table Template is selected in the Table Templates list.

Each location mnemonic in the list of locations is also defined by a set of properties. These properties are listed and described in Table 9-2.

Note: For ease of reading, not all the available properties display when the Table Templates dialog initially displays. To display additional columns, position your mouse cursor on the boundary that separates columns. If the cursor changes to a double-bar between two arrows, an additional column can be displayed. Press the left mouse button and move the cursor to the right until an additional column displays.

Table 9-1 Table Template Properties

Property

Description

Enabled

Indicates whether the Table Template is enabled.

Template Name

The unique name assigned to the template. This name matches the LPD queue name to which the report is sent by the HCIS.

Table Name

The name assigned to the table when it was first defined.

Database Name

The name assigned to the database file when it was first defined. This is where the data used by the Table Template is stored on the local PC.

Description

A brief description of the contents/purpose of the Table Template (optional).

Separator String

The text character used to delineate the columns in each row of data. The default is the vertical bar (|).

Table9-2 Table Template Location Mnemonics Properties

Property

Description

Location Mnemonic

The unique name assigned to the location mnemonic.

Description

A short description of the purpose or use of the location mnemonic.

Folder Location

The full path name to the folder where received reports are stored on the local PC.

To identify a new table temple, click the Add button to display the Table Template Settings dialog box.

Screenshot 9-1 Table Template Settings Dialog Box

The following table lists and describes the elements in the Table Template Settings dialog box. 

Table 9-3 Table Template Settings Dialog Box Elements

Element

Description

Enabled

Indicates whether the Table Template is enabled.

  • If selected, the Table Template is used to process reports
  • If clear, the Table Template is not used to process reports. NetSafe processes the report as if no Table Template was defined

Delete Table Before Insertion

Indicates whether an older version of the delimited text file is deleted when a new version is downloaded.

  • If selected, an older version of the delimited text file is deleted when a new version is downloaded
  • If clear, the existing data structure format is maintained. If new data types are added to the data structure of the newly received delimited text file they are appended to the existing list of data types

Caution: If the older version of the delimited text file is to be retained, the data types in the new version must match exactly the data types in the old version. Any new data types must be appended to the list of data types. NetSafe neither compares the content of the two files nor edits the data types to match.

Template Name

The name for the Table Template. This name must match exactly the LPD queue name from which the delimited text file is received. NetSafe determines which table temple to use based on the name of the LPD queue from which the report was received.

Prior to defining a Table Template, you need to determine the name(s) of the LPD queues. Each template name must match the name of an LPD queue uniquely, on a one-to-one basis. If you are planning on creating more Table Templates than there are LPD queues, you need to configure additional LPD queues.

Table Name

A character string that identifies the Table Template.

This can be any character string, no spaces allowed. It is recommended that the name indicate the purpose of the Table Template.

 Note: Once the Table Template is saved, Table Name cannot be changed.

Database Name

A character string that identifies the database file that stores the content of the table.

This can be any character string, no spaces allowed. It is recommended that the name indicate the purpose of the Table Template.

Note: Once the Table Template is saved, Database Name cannot be changed.

Description

A character string that describes the purpose of the Table Template (optional).

Separator String

The character that is used in the delimited text file to separate the columns. The default is the vertical bar (|).

Enter only one character. If more than one character is entered, only the first character is recognized.

Creation Date

The date and time that the Table Template was created.

This information is automatically generated when the Table Template is saved.

Last Edit Date

The date and time that the Table Template was last edited.

This information is automatically generated when the Table Template is saved.

After a Table Template is defined, you need to associate one or more location mnemonics with that Table Template. To do so, highlight the Table Template to which you want to associate a location mnemonic, and do one of the following:

  1. Click the Table Template Location Mnemonics’ Add button and select a location mnemonic from the list in the Select Location Mnemonic dialog box.
  2. Click the Table Template Location Mnemonics’ Add All button. All the Windows folder location mnemonics populate the Template Location Mnemonics list.

The properties that are listed in the Table Template Location Mnemonics list are those properties of the location mnemonic assigned when it was created. They cannot be changed from the Table Template dialog. To associate more than one Windows folder location mnemonic with the Table Template, but not all the Windows folder location mnemonics, click the Add button again. Only those Windows folder location mnemonics associated with the Table Template highlighted in the list of Table Templates displays in the Table Template Location Mnemonic list. Thus, the content of this list changes when a different Table Template is highlighted, and you can associate different Windows folder location mnemonics with different Table Templates.

9.4 Procedures for Configuring Table Template

To receive and process a delimited text file to use with a Table Template, a table temple must be defined, and one or more Windows folder location mnemonics need to be associated with the Table Template. This task is the responsibility of a NetSafe administrator using an account that has access to the Table Templates dialog on the NetSafe Administrator main menu. The procedures described here include the following:

  • Defining a Table Template
  • Associating a Location Mnemonic with a Table Template

These procedures assume that you have:

  • Logged in to NetSafe Administrator using an account that has the appropriate permissions, that is, you can access the Table Templates dialog
  • You have clicked the Table Templates item in the Settings list, and the Table Templates menu is displayed

For information about logging into NetSafe Administrator, see “Accessing NetSafe Administrator” in Chapter 1, “Introduction to NetSafe”. If the account that you are using does not have the necessary permissions to define Table Templates, see the person in your organization responsible for NetSafe.

9.5 Defining a table Template

To define a Table Template, perform the following steps. 

Table 9-4 Define a Table Template

Step

Action

1.

Click the Add button next to the Table Templates list.

The Table Template Settings dialog box displays.

2.

Determine whether you want the Table Template to be enabled as soon as it is saved.

  • If yes, select Enabled, then go to Step 3
  • If no, go directly to Step 3

3.

Determine whether an older version of the delimited text file is deleted when a new version is downloaded.

  • If yes, select Delete Table Before Insertion, then go to Step 4
  • If no, go directly to Step 4

4.

In the Template Name text entry box, enter the name for the template.

This name must match exactly a LPD queue name from which NetSafe receives the delimited text file.

5.

In the Table Name text entry box, enter the name for the table. Note: This name cannot be changed after the Table Template is saved.

6.

In the Database Name text entry box, enter the name for the database file that stores the data.

Note: This name cannot be changed after the Table Template is saved.

7.

Determine whether you want to enter a description for the template table.

  • If yes, enter a description in the Description text entry box, then go to Step 8
  • If no, go directly to Step 8

8.

Determine whether you want to use the default separator string.

  • If yes, enter a different character in the Separator String text entry box, then go to Step 9
  • If no, go directly to Step 9

9.

Click Save.

  • Entries are automatically made in the Creation Date and Last Edit Date boxes
  • The Table Template Settings dialog box closes
  • A new entry is made into the Table Templates list

10.

Determine whether you want to define another Table Template.

  • If yes, go to Step 1
  • If no, you have completed this procedure

9.6 Associating a Location Mnemonic with a Table Template

Table templates are associated with one or more Windows folder location mnemonics so that a user or group of users can view the data in the structure that best meets their needs. Before a Table Template can process a file, it must have at least one Windows folder location mnemonic associated with it.

To associate a Windows folder location mnemonic with a Table Template, perform the following steps.

Table 9-5 Associate a Windows Folder Location Mnemonic with a Table Template

Step

Action

1

Highlight the Table Template to which you want to associate a location mnemonic.

2

Click the Add button next to the Table Template Location Mnemonics list. The Select Location Mnemonic dialog box displays.

3

Highlight one Windows folder location mnemonic.

4

Click OK.

  • The Select Location Mnemonic dialog box closes
  • A new entry is made into the Table Template Location Mnemonics list.

5

Determine whether you want to associate another Windows folder location mnemonic to the same Table Template.

  • If yes, go to Step 2
  • If no, go to Step 6

6

Determine whether you want to associate a Windows folder location mnemonic to another Table Template.

  • If yes, go to Step 1
  • If no, you have completed this procedure

10.0 Password Manager

When you create a Windows folder location mnemonic, you are required to specify a certificate password. This password is used on the NetSafe Client to decrypt and access files that are distributed by that location mnemonic. This chapter describes the features for managing certificate passwords within NetSafe Administrator, including the following topics:

  • Password Overview
  • Password Manager Dialog
  • Procedure for Changing Passwords

10.1 Password Overview

When a location mnemonic is created, you need to specify a password for it. This password is used by NetSafe when encrypting the reports processed by NetSafe prior to distributing them to the specified location on a NetSafe Client. When a report is distributed to the specified location for the first time, NetSafe checks to see if an encryption certificate is installed with the NetSafe Client. If one is not found, the certificate associated with that location mnemonic is downloaded along with the report. The certificate generated when processing and distributing the report must be available at the destination location for NetSafe Client to decrypt and display the report. When users log into NetSafe Client using their Active Directory account, only those reports encrypted using that encryption certificate are decrypted and displayed. Once a location mnemonic is created and saved, the password cannot be changed using the elements on the Location Mnemonic Settings dialog box. At some point in time it may become necessary to change the password for a particular location mnemonic. Saved passwords can only be changed using the features on the Password Manager dialog.

10.2 Password Manager Dialog

To view the complete list of Windows Folder location mnemonics, and to change the password associated with one or more of those location mnemonics, click on the Password Manager item in the Settings list.

Screenshot 10-0 NetSafe Password Manager Dialog

The Password Manager dialog is divided into the following sections:

  • Search and display functions, containing functionality that enables you to locate a location mnemonic
  • Location mnemonic listings, containing a list of all Windows folder location mnemonics, and the functions that enable you to change the password associated with the location mnemonics

Each location mnemonic in this list of locations is identified using the following information, if it was entered into the system:

  • Location Mnemonic — The unique name assigned to the location destination
  • Description — A short description of the purpose or use of the location mnemonic
  • Organization— The name of the organization/group that receives reports distributed by the location mnemonic
  • Updated — Whether the password change was successful; if yes, a blue shaded circle displays, if no, a blue outlined circle displays (this field clears when you exit the Password Manager dialog)
  • Error Message — If the password change was unsuccessful, the reason for the failure displays (this field clears when you exit the Password Manager dialog)

The following table lists and describes the elements on the Password Manager dialog. 

Table10-0 NetSafe Password Manager Dialog Elements

Element

Description

Location Mnemonic

Enter a character string that matches the initial characters in the location mnemonic for which you are looking. The system does a partial lookup, starting at the left character and ending at the right character, looking for location mnemonic(s) that match the characters as entered. Those mnemonics that match the characters display. For example, if you enter INTE, only locations that begin with INTE display. The search is not case-sensitive.

Organization

Enter a character string that matches the characters in the organization for which you are looking. The system does a lookup, looking for organizations that have that character string that begins the organization. Those organizations that contain the characters in the specified order display.

For example, if you enter mat, organizations MaternityEast and MaternityWest display. If you enter East, nothing displays, although there is at least one alias that has a East in it, because the characters entered do not begin the name of the organization. The search is not case-sensitive.

Ascending Order

Reorders the list based on the entries in the Location Mnemonic column; location mnemonics beginning with numbers appear first, followed by location mnemonics alphabetically, A-Z.

Descending

Order

Reorders the list based on the entries in the Location Mnemonic column; location mnemonics starting alphabetically display first, Z-A, followed by those that begin with numbers.

Reset Filter

Clears the Location Mnemonic and Organization text entry boxes, and redisplays all location mnemonics based on the order selected in the List Row by area

Load Filter

Redisplays the list of location mnemonics based on:

  • The entries in the Location Mnemonic and the Organization text entry boxes
  • The order selected in the List Row by area

Total Entries Found

Displays the total number of location mnemonics in the list of location mnemonics. When characters are entered into the Location Mnemonic text entry box and/or the Organization text entry box, the number displayed in this field is the number of recipients that match the search criteria.

Update Highlighted Location Mnemonic’s Password

Displays the Change Location Certificate Password dialog box. Use this dialog box to change the password for the highlighted location mnemonic(s).

Note: To change more than one password, press and hold the CTRL key while selecting additional location mnemonics. All highlighted location mnemonics are assigned the new password.

It is recommended that the password entered be as strong as possible. Because this is a password used to secure the reports, and not one used for logging in to NetSafe Client, users do not need to remember this password. A strong, complicated password enhances security, as well as patient confidentiality.

When the password for a location mnemonic is changed, NetSafe stores the creation time and date for the new encryption certificate. The next time that NetSafe processes and distributes reports for the location mnemonic that has the new password, the stored date stamp is compared to the date stamp on the NetSafe Client’s encryption certificate. If the dates on the encryption certificates do not match, NetSafe replaces the older encryption certificate with the new encryption certificate.

Once an older encryption certificate has been replaced, only reports received either with the encryption certificate or after can be accessed on that NetSafe Client. Because the older encryption certificate that secured older reports is now gone, older reports can no longer be accessed.

10.3 Procedure for Changing Passwords

The following procedure describes how to change a password if it has become compromised, an employee has left the organization, or for any other reason:

  • Changing a Password

This procedure assumes that you have logged in to NetSafe Administrator using an account that has the appropriate permissions. For information about logging in to NetSafe Administrator.

Reference section 1.2 “Accessing NetSafe Administrator”.

If the account that you are using does not have the necessary permissions to change passwords, see the person in your organization responsible for NetSafe.

10.3.1 Changing a Password

To change a certificate password for a Windows folder location mnemonic, perform the following steps.

Table 10-1 Changing a certificate password

St.ep

Action

1.

Click the Password Manager item in the Settings list. The Password Manager dialog displays showing a complete list of location mnemonics

2.

Locate the location mnemonic associated with the password that you want to change:

  • If you can easily locate the location mnemonic, go to Step 3
  • If you cannot easily locate the location mnemonic, go to Step 4

3.

Scroll through the list of location mnemonics until you locate the target location mnemonic. Go to Step 5.

4.

In the Location Mnemonic text entry box and/or the Organization text entry box, enter the first few characters identifying the target location mnemonic. The list of location mnemonics changes to show only:

  • Location mnemonics whose initial character(s) exactly match the character(s) entered in the Location Mnemonic field display
  • Organizations whose initial character(s) exactly match the character(s) entered in the Organization field display

Note: By entering characters in both the Location Mnemonic field and the Organization field, you can further refine your search.

5.

Highlight the target location mnemonic.

Note: To change more than one password at a time, press and hold the CTRL key while selecting additional location mnemonics.

6.

Click Update Highlighted Location Mnemonic’s Password. The Change Location Certificate Password dialog box displays.

7.

In the New Password and the Confirm New Password text entry boxes, enter the new password.

8.

Click Change.

The Change Location Certificate Password dialog box closes, and each:

  • Location Mnemonic certificate password is changed
  • Location Mnemonic certificate password file is copied to its destination location
  • Location Mnemonic password is updated in the database Depending on the number of passwords being changed, the process could take a little time to complet

11.0 Client Login Backup

To log in to a NetSafe Client, users are required to enter a user name and password. Normally, this is their Active Directory user name and password. However, there may be occasions when connectivity between the Active Directory server and the NetSafe Client is lost. In this situation, users can use a backup login user name and password if one has been configured.

The Client Login Backup dialog enables you to specify one or more backup login user names and passwords for use when connectivity between the Active Directory server and the NetSafe Client is lost. This chapter includes the following topics:

  • Client Login Backup Settings
  • Client Login Backup Import Report
  • Procedures for Specifying Client Login Backup Accounts

11.1 Client Login Backup Settings

When you click the Client Login Backup item in the Settings list, the Client Login Backup dialog settings displays. The settings on the dialog are divided into the following sections:

  • Import Settings
  • The list of Client Login Backup accounts

Screenshot 11-0 Client Login Backup

The following table lists and describes the Client Login Backup elements. 

Table11-0 Client Login Backup Elements

Element

Description

Delete table before new users import

Determines whether the existing Client Login Backup database is deleted before the user names and passwords from the report are imported.

  • If clear, the existing table is not deleted; the user names and passwords are appended to the Client Login Backup database
  • If selected, the existing table is deleted

Do not store downloaded user list in archive folder

Determines whether the downloaded report containing the user data is stored in the archive folder.

  • If selected, the report is not stored in the archive folder
  • If clear, the report is stored in the archive folder

WARNING: The report most likely would contain passwords that are not encrypted or encoded.

Note: The recommended setting is to not store the report in the archive folder. Set it only to clear for troubleshooting purposes.

Update Import Settings

Saves the settings specified for Delete table before new users import and Do not store downloaded user list in archive folder. Subsequent downloads of the Client Login Backup table use these settings.

Add

Displays the Login User dialog box. Use this dialog box to specify the user name and password for a client backup login account. Login names must be unique. Duplicate login user names are not allowed.

Note: When the user login is saved, the password is encrypted. Thus, the text string that displays in the Client Login Backup list is a string of asterisks, and the number of characters may be different from those entered on the Login User dialog box.

Edit

Displays the Login User dialog box for the highlighted login user name.

Note: The Password Type is specified as Encrypted. When the ellipsis button (…) is clicked, the text string that displays is an alphanumeric representation of the encrypted password. It will not match the text string that was entered when the login account was created.

Delete

Deletes the highlighted login user name.

Update NetSafe Clients

For each enabled Location Mnemonic, an entry is added to the Relay Queue — Pending that delivers an encrypted database to the local PC. This database contains all the Active Directory and Client Login Backup settings.

Caution: If a location mnemonic has been deleted from the location mnemonic dictionary, but the NetSafe Client still exists on the target local PC, that NetSafe Client is not updated. Only those location mnemonics saved in the location mnemonic dictionary, and are enabled, are updated.

Note: Once changes are made to the list, this button should be pressed to update all currently enabled locations.

After the Client Login Backup accounts have been created, the person in your organization responsible for NetSafe needs to communicate this information to those individuals accessing NetSafe Client.

11.2 Client Login Backup

A report can be set up to automatically populate the list of users in the Client Login Backup. The LPD Queue name userloginsimport should be used to indicate to the system that the report contains data that can be imported into the Client Login Backup database. The first line of the file to be imported must contain column header information: username|password.

Example file:

username|password

obstectrics|pass1234

maternity|pass5678

emergency|passABCD

Reference section 4.5 “Importing an MPI”.

11.3 Procedures for Specifying Client Login Backup Accounts

These procedures are only required if the Active Directory NetSafe Client is enabled in the System Setting.

To log into a NetSafe Client, a user is required to enter their username and password found in Active Directory. This is done through communication between an Active Directory domain controller and the client location.

However, there may be occasions when connectivity between the Active Directory domain controller and the NetSafe Client is lost. In this situation, users will need to specify a username and password that is found within the Client Login Backup database to gain access to the client.

The following procedures explain how to specify Client Login Backup accounts for use on NetSafe Clients when connectivity to the Active Directory server is lost:

The procedures described here include the following:

  • Specifying Update Settings
  • Specifying a Client Login Backup Account
  • Edit a Client Login Backup Account

These procedures assume that you have logged into NetSafe Administrator using an account that has the appropriate permissions; that is, you can access the Client Login Backup dialog.

For information about logging in to NetSafe Administrator.

Reference section 1.2 “Accessing NetSafe Administrator”.

If the account that you are using does not have the necessary permissions to specify Client Login Backup accounts, see the person in your organization responsible for NetSafe.

11.3.1 Specifying Update Settings

When new Client Login Backup accounts are downloaded to the NetSafe Clients, there are settings that need to be specified and applied for each download.

To specify update settings, perform the following steps.

Table 11-1 Specifying Update Settings

Step

Action

1.

Click the Client Login Backup item in the Settings list.

The Client Login Backup dialog displays.

2.

Determine whether the current entries in the Client Login Backup table should be deleted before a new table is stored in the system:

  • If yes, select Delete table before new users import, then go to Step 3
  • If no, clear Delete table before new users import, then go to Step 3

3.

Determine whether the report containing the username and password data should be stored in the system’s archive folder:

  • If yes, clear Do not store downloaded user list in archive folder, then go to Step 4
  • If no, select Do not store downloaded user list in archive folder, then go to Step 4

4.

Click Update Import Settings.

Subsequent imports of the Client Login Backup table use the specified settings.

11.3.2 Specifying a Client Login Backup Account

To configure Client Login Backup accounts, perform the following steps. 

Table 11-2 Configure Client Login Backup accounts

Step

Action

1.

Click the Client Login Backup item in the Settings list on the main dialog.

The Client Login Backup dialog displays.

2.

Click the Add button.

The Client Login Backup User dialog box displays.

3.

In the Username text entry box, enter the user name to be used for logging in to NetSafe Client.

Note: This field cannot be blank.

4.

In the Password text entry box, enter the password to be used for logging in to NetSafe Client.

Note: This field cannot be blank.

5.

Click Save.

The specified Client Login Backup account is added to the list of accounts.

6.

Determine whether you want to specify another Client Login Backup account:

  • If yes, go to Step 2
  • If no, go to Step 7

7.

Click Update NetSafe Clients.

A dialog indicating that a background job has been started to update each of the NetSafe Client locations appears. Click OK to continue. Depending on the number of reports in the queue Relay Queue — Pending, this process might take some time to complete.

11.3.3 Edit a Client Login Backup Account

To edit a Client Login Backup account, perform the following steps.

Table 11-3 Edit a Client Login Backup Account

Step

Action

1.

Click the Client Login Backup item in the Settings list on the main dialog.

The Client Login Backup dialog displays.

2.

Highlight an entry in the list view to edit.

3.

Click the Edit button.

The Client Login Backup User dialog box displays.

4.

In the Username text entry box, enter the user name to be used for logging into NetSafe Client.

The username can be changed and the highlight entry in the list view will be updated with the new username.

Note: This field cannot be blank.

5.

In the Password text entry box, enter the password to be used for logging into NetSafe Client.

Please be sure to highlight the original password and delete the entry before entering a new password.

Note: This field cannot be blank. The Password Type is specified as Plain Text when adding a new account. When the account login is saved, the password is encrypted. Thus, the text string that displays in the Client Login Backup list is a string of asterisks, and the number of characters may be different from those entered on the Login User dialog box. When you edit an account, the Password Type is specified as Encrypted, and the text string is different from what was entered when the account was initially created.

6.

Click Save.

The selected Client Login Backup account is updated to reflect the changes made in the dialog.

7.

Determine whether you want to edit another Client Login Backup account:

  • If yes, go to Step 2
  • If no, go to Step 7

8.

Click Update NetSafe Clients.

A dialog indicating that a background job has been started to update each of the NetSafe Client locations appears. Click OK to continue. Depending on the number of reports in the queue Relay Queue — Pending, this process might take some time to complete.

After these parameters have been set, the person in your organization responsible for NetSafe needs to communicate this information to those individuals accessing NetSafe Client.

12.0 Administrators

NetSafe Administrators are the users who have authority to manage NetSafe using administrator accounts. The primary functions available for administrator accounts include the ability to:

  • Define location mnemonics, including adding, editing, and deleting location
  • mnemonics from NetSafe
  • Configure and manage system resources and settings
  • Monitor system activity
  • Configure report distribution templates, including creating, editing, and deleting templates

This chapter defines the specific functions available for creating and managing administrator accounts, including the following topics:

  • Administrator Capabilities
  • Administrator Main Menu
  • Admin Settings Dialog Box
  • Procedures for Managing Administrator Accounts

12.1 Administrator Capabilities

A default administrator account (username, NetSafe) and default password are provided with your application. You use this account to perform the initial set up of NetSafe. This user account is granted all privileges within NetSafe, including the ability to:

  • Add, edit, and delete location mnemonics
  • Modify system settings
  • Create additional Administrator accounts
  • Manage aliases, which are used to identify locations that may be identified by names other than a location mnemonic
  • Add, edit, and delete report distribution templates

 Monitor the following:

  • Changes to location mnemonics
  • Changes to report distribution templates
  • Which administrator accounts are being used to view which reports
  • Which administrator accounts are being used to change system settings

View queues that show the location of the report in the distribution process; these queues are as follows:

  • LPD Queues — Completed, Pending, Error, and Processed
  • Relay Queues — Pending, Deleted, and Error

View any reports for which a location could not be identified; these reports can be forwarded to another location or deleted

Note: Once setup has been completed, it is recommended that you either change the password for the default NetSafe administrator account or delete the username completely. The password should be longer than four characters. Contact Interbit Data for the default password.

12.2 Administrator Main Menu

The Administrator dialog is used to create, edit, and delete additional administrator accounts. This section describes the Administrator dialog and the functions accessible from it. If you cannot see the Administrator dialog within your NetSafe administrator account, your account may not have permission to access this functionality. See the person in your organization responsible for NetSafe.

On the NetSafe Administrator main menu, click the Administrators option in the Settings list to access the Administrator menu.

Screenshot 12-0 Administrators Dialog

The Administrators dialog is divided into two major areas, which include functionality that enables you to:

  • Search for and display previously created administrator accounts
  • View, add, edit, and delete administrator accounts

12.3 Search Filter Functions

The Search Filter section provides functionality for searching NetSafe’s database to locate individual administrator accounts. The following table lists and describes the elements in the Search Filter section of the Administrators menu.

Table 12-0 Administrators Menu, Search Filter

Element

Description

Username

In this text entry box, enter a character string that matches the initial characters in the account’s username for which you are looking. The system does a partial lookup, starting at the left character and ending at the right character, looking for user names that match the characters as entered. Only those user names that match the characters display. For example, if you enter NetS, only user names that begin with nets display. The search is not case-sensitive.

Full Name

In this text entry box, enter a character string that matches the initial characters in the full name of the account for which you are looking. The system does a partial lookup, starting at the left character and ending at the right character, looking for full names that match the characters as entered. Only those full names that match the characters display. For example, if you enter rich, only full names that begin with rich display. The search is not case-sensitive.

Load Filter

Redisplays the list of administrator accounts based on the entries in the Username and the Full Name text entry boxes.

Reset

Removes any characters in the Username and Full Name text entry boxes and redisplays all administrator accounts.

You can refine your search by making entries in both the Username text entry box and the Full Name text entry box; only accounts that match the entries in both text entry boxes display.

12.4 Account Management Functions

The following table lists and describes the elements in the Administrators menu that enable you to manage administrator accounts.

Table 12-1 Administrators Menu, Account Management

Element

Description

Total Entries Found

Displays the total number of administrator accounts.

<< 

Moves backward, page-by-page, through the list of accounts until the first entry displays.

>> 

Moves forward, page-by-page, through the list of accounts until the last entry displays.

Add

Provides a dialog box that enables you to add an administrator account.

Reference section 12.5 “Administrator Settings Dialog Box” for a description of this dialog box.

Edit

Provides a dialog box that enables you to edit the properties of the highlighted administrator account. See “Admin Settings Dialog Box” for a description of this dialog box.

Delete

Deletes the highlighted administrator account.

Note: Once an account has been deleted there is no way to retrieve the information for that particular account. You are prompted to confirm the deletion before the deletion is completed. Only one account may be selected at a time to be deleted.

12.5 Administrator Settings Dialog Box

When you click the Add button or the Edit button, the Admin Settings dialog box displays.

Screenshot 12-1 Admin Settings Dialog Box

This dialog box is used to create or modify an administrator account. Although it is required that data be entered in only two fields (Username and Password), you should enter as much information as necessary to make the account effective and useful.

The following table provides information about each of the elements on the Admin Settings dialog box. 

Table12-2 Admin Settings Dialog Box

Element

Description

Username

A unique name that identifies an administrator account. This is the name that the administrator must enter in the Username field of the NetSafe Administrator log-in dialog box.

Reference section 1.2 “Accessing NetSafe Administrator”.

The user name must be at least four characters long. The username is not case-sensitive, thus JDoe and jdoe are the same username to NetSafe. The username can contain any combination of alphanumeric characters and spaces.

An entry in this field is required.

NT User

Displays a list of all users on the current domain. If the computer is not part of the domain, the list includes only those users who are configured on the computer.

Highlighting a name in the list box and then clicking the OK button enters the selected name in the Username text entry box.

Use this feature in conjunction with the Use Windows Logon for Authentication.

Full Name

The full name of the administrator. This field is optional.

Domain

Displays the domain to which the entry in Username is associated if the user name was entered using NT User.

Password

A password that verifies the administrator account when logging in.

The password is case-sensitive, thus reports and Reports are two different passwords. The password can contain any combination of alphanumeric characters.

This is the password entered in the Password field of the NetSafe Administrator log-in dialog box.

Reference section 1.2 “Accessing NetSafe Administrator”.

An entry in this field is required.

Use Windows Logon for Authentication

Requires that the password supplied by the NetSafe administrator matches their current windows network password if this box is checked.

Select Tabs

Indicates which tabs display on the NetSafe Administrator main menu when the administrator logs in.

For example, if an administrator should only be able to view the activity logs, then only the Activity box should be checked. This list of tabs includes all the features and functionality available for NetSafe.

Caution: If you create an account that has the Administrators check box selected, that account can create other administrator accounts, as well as modify and delete all other administrator accounts. Careful consideration should be given when creating an account with this capability.

View Report Images

Determines whether the administrator can view the image (text) of the report, or just the listing of the reports. If checked, the administrator can view the report’s content on those tabs where this feature is available.

Admin File Prefix

Determines which type of reports the administrator can view. For example, if the administrator should view only reports whose file names start with LAB, then LAB should be entered in this text entry box. Then, if the administrator has the ability to view the activity log, only reports that begin with LAB display. You can enter only one type of report in this text entry box; thus, the administrator can view only one type of report or all reports, if the text entry box is empty.

Save

Saves all changes and closes the Admin Settings dialog box. The new administrator account is created and displays in the list of accounts.

Cancel

Cancels any changes and closes the Admin Settings dialog box.

12.6 Procedures for Managing Administrator Accounts

NetSafe Administrators are the users who have authority to manage NetSafe. The following procedures explain how to create and manage administrator accounts in NetSafe, including:

  • Adding an Administrator Account
  • Editing an Administrator Account
  • Deleting an Administrator Account

These procedures assume that you have logged in to NetSafe Administrator using an account that has the appropriate permissions. For information about logging in to NetSafe Administrator.

Reference section 1.2 “Accessing NetSafe Administrator”.

If the account that you are using does not have the necessary permissions to create and manage administrator accounts, see the person in your organization responsible for NetSafe.

12.7 Adding an Administrator Account

To add an administrator account to NetSafe, perform the following steps.

Table 12-3 Adding an Administrator account

Step

Action

1.

lick the Administrators item.

The Administrators dialog displays showing a complete list of administrator accounts.

2.

Click Add.

The Admin Settings dialog box displays.

3.

In the Username text entry box, enter a username of at least four characters in length (the user name is not case-sensitive). The username can contain any combination of alphanumeric characters and spaces

An entry in this field is required.

4.

Determine whether you want the administrator account user name to be an existing user on the current domain.

  • If yes, go to Step 5
  • If no, go to Step 8

5.

Click NT User.

The Select User dialog box displays.

6.

Click Refresh.

The list of NT users re-populates.

7.

Highlight the desired user name and click OK.

  • The Select User Dialog box closes
  • The selected name displays in the Username text entry box
  • The domain to which the entry in the Username text entry box is associated displays in the Domain box.

8.

In the Full Name text entry box, enter the full name of the person to whom this account is assigned.

An entry in this field is optional.

9.

In the Password text entry box, enter a password. The password should be greater than four characters.

The password is case sensitive, thus reports and Reports are two different passwords. The password can contain any combination of alphanumeric characters and spaces.

An entry in this field is required.

10.

Determine whether the password supplied by the NetSafe administrator must match the current windows network password:

  • If yes, go to Step 11

Note: If the entry in the Username text entry box is an NT user, go to Step 11.

  • If no, go to Step 12

11.

Select Use Windows Logon for Authentication.

12.

From the list of tabs, select the tabs to which you want this administrator account to have access.

Caution: If you create an account that has the Administrators dialog selected, that account can create other administrator accounts, as well as modify and delete all other administrator accounts. Careful consideration should be given when creating an account with this capability

13.

Determine whether you want the administrator to view report images.

  • If yes, select View Report Images
  • If no, go to Step 14

14.

Determine whether you want the administrator to view only a particular type of report.

  • If yes, in the Admin File Prefix text entry box, enter the characters that appear at the beginning of the report’s name
  • If no, go to Step 15

15.

Click Save.

The Admin Settings dialog box closes, and the new administrator account is added to the list of accounts.

12.8 Editing an Administrator Account

To edit an administrator account, perform the following steps.

Table 12-4 Editing an Administrator Account

Step

Action

1.

Click the Administrators item.

The Administrators dialog displays showing a complete list of administrator accounts.

2.

Locate the account that you want to edit:

  • If you can easily locate the account in the list of accounts, go to Step 3
  • If you cannot easily locate the account, go to Step 4

3.

Scroll through the list of accounts until you locate the target account. (Click << and >> to scroll backward and forward through the list of accounts.) Go to Step 5.

4.

In the Username text entry box and/or the Full Name text entry box, enter the first few characters identifying the target account.

The list of accounts changes to show only those accounts with character(s) matching the character(s) entered in the Username text entry box and/or the Full Name text entry box.

  • User names whose initial character(s) exactly match the character(s) entered in the Username text entry box display
  • Full names whose initial character(s) exactly match the character(s) entered in the Full Name text entry box display

Note: By entering characters in both the Username text entry box and the Full Name text entry box, you can further refine your search.

5.

Highlight the target administrator account.

6.

Click Edit.

 The Admin Settings dialog box displays, with the Username text entry box inaccessible.

Note: You cannot change a username. If you want to modify the username, you must delete that administrator account and recreate it with the new user name.

7.

Determine whether you want to change the full name of the person to whom this account is assigned (an entry in this field is optional):

  • If yes, enter the full name in the Full Name text entry box
  • If no, go to Step 8

8.

Determine whether you want to change the password for the account (an entry in this field is required):

  • If yes, enter a new password in the Password field. The password should be greater than four characters

The password is case-sensitive, thus reports and Reports are two different passwords. The password can contain any combination of alphanumeric characters.

  • If no, go to Step 9

9.

Determine whether you want to change the tabs to which the account has access:

  • If yes, from the list of tabs, select the tabs to which you want this administrator account to have access

Caution: If this account has the Administrators dialog selected, the account can create other administrator accounts, as well as modify and delete all other administrator accounts. Careful consideration should be given when selecting this dialog.

  • If no, go to Step 10

10.

Determine whether you want to change the ability of the administrator to view reports:

  • If yes, select or clear View Report Images
  • If no, go to Step 11

11.

Click Save.

The Admin Settings dialog box closes, and the administrator account’s options change.

12.9 Deleting an Administrator Account

To delete an account from the list of administrator accounts, perform the following steps.

Table 12-5 Deleting an Administrator Account

Step

Action

1.

Click the Administrators item.

The Administrators dialog displays showing a complete list of administrator accounts.

2.

Locate the administrator account that you want to delete:

  • If you can easily locate the account in the list of accounts, go to Step 3
  • If you cannot easily locate the account, go to Step 4

3.

Scroll through the list of administrator accounts until you locate the target account.

(Click << and >> to scroll backward and forward through the list of accounts.) Go to Step 5.

4.

In the Username text entry box and/or the Name text entry box, enter the first few characters identifying the target administrator account.

The list of administrator accounts changes to show only those accounts with character(s) matching the character(s) entered in the Username text entry box and/or the Full Name text entry box:

  • User names whose initial character(s) exactly match the character(s) entered in the Username text entry box display
  • Full names whose initial character(s) exactly match the character(s) entered in the Full Name text entry box display

Note: By entering characters in both the Username text entry box and the Full Name text entry box, you can further refine your search.

5.

Highlight the target administrator account.

6.

Click Delete.

The Confirm dialog box displays.

7.

Click Yes.

The administrator account is deleted from the list of accounts. If you want to delete another administrator, go to Step 2.

13.0 E-Mail Notifications

If an issue occurs when NetSafe attempts to distribute a report, it should be addressed as soon as possible. E-mail alert notification is one of the tools within NetSafe for monitoring the status of reports. The E-mail Notification dialog contains features that enable you to configure e-mail alert notifications that are sent to specified e-mail addresses when there is an issue delivering a report.

E-mail alert notifications can be configured so that one or more NetSafe Administrators receive e-mail alert notifications when NetSafe encounters a problem processing a report.

This chapter describes the E-Mail Notifications dialog and describes the conditions under which an e-mail alert notification is sent, and to whom it is sent. It includes the following topics:

  • How E-Mail Alert Notification Works
  • E-Mail Notification Dialog
  • Alert Notification Template
  • Template Wizard Alert Notification
  • E-Mail Notification Recipients Settings
  • Procedures for Setting Up E-Mail Alert Notification

13.1 How E-Mail Alert Notification Works

E-mail alert notifications work by monitoring a certain set of NetSafe storage and processing queues and sending out e-mail notifications to specified e-mail addresses whenever certain, defined parameters are exceeded. The parameters used to indicate a potential problem include the following

  • The length of time that a report, or group of reports, reside in a queue
  • The length of time that passes since a report was last submitted to a queue for each alert, a length of time must be specified when enabling the alert. When enabled, the alert
  1. Records the time when the action being monitored occurred.
  2. Subtracts that time from the current time.
  3. Compares the resulting difference to the length of time indicated in the e-mail alert notification set-up.
  4. If the time difference is longer than the time specified, an alert is generated, and an e-mail notification is sent.

For example, if the Relay Queue — Pending is being monitored, and a report is submitted to that queue that cannot be processed, the alert subtracts the time that the report was submitted to the queue from the current time. The difference is then compared to the time indicated in the e-mail alert set-up; if the difference is longer than the time specified, an e-mail notification is sent. All the alerts function in essentially the same way; that is, the report has resided in the queue longer than specified.

13.2 E-Mail Notification Dialog

When you click the E-mail Notification item in the Settings list, the E-mail Notification dialog displays. This dialog lists all the queues for which alert notifications can be set up. This list of queues is a subset of the queues within NetSafe. For detailed information about all NetSafe’s queues.

Reference section 2.0 “Activity Logs”.

Screenshot 13-0 NetSafe E-mail Notification Dialog

The queues that display in the Alert Notifications list are listed and described in the following table. Also described are the types of notification alerts that can be configured. 

Table13-0 E-mail Notification Alerts

Queue

Description

LPD Queue — Pending

Send alert for no new jobs in queue for

An e-mail alert is created when the amount of time between the current time and the last time that the LPD agent processed a report exceeds the specified time frame. The subject for this e-mail reads:

LPD Queue: Send Alert for jobs that cannot be delivered that are older than n day, n hour, n minute

Possible reasons the LPD agent has not processed a report within the specified time frame are that the HCIS has been disrupted, or the LPD agent has stopped responding.

The alert works by subtracting the time when the last report was processed from the current time.

LPD Queue — Pending

Send alert for jobs that cannot be delivered that are older than

An e-mail alert is created informing the recipient that there is a downloaded report in LPD Queue — Pending that cannot be processed by the processing agent. The alert is generated when the report has been in the queue longer than the amount of time specified in the alerts setup. The subject for this e-mail reads:

LPD Queue: Send Alert for no new jobs in queue n day, n hour, n minute

A possible reason that a report cannot be processed is that there is a problem with the distribution template that processed the report. For example, the template might be set up incorrectly and cannot locate the required text on the report.

The alert works by subtracting the submit time for the downloaded report from the current time.

Relay Queue — Completed

Send alert for no new jobs in queue for

An e-mail alert is created that informs the recipient that a report has not been submitted to the Relay Queue — Completed when the amount of time between the current time and the last time a report was submitted to the queue exceeds the amount of time specified in the alerts setup. The subject for this e-mail reads:

Relay Queue – Completed: Send Alert for no new jobs for n day, n hour, n minute

Possible reasons the Relay Queue — Completed has not processed a report within the specified time frame are that communication between the Relay agent and the processes sending reports to Relay Queue — Pending has been disrupted, or the Relay agent has stopped responding.

The alert works by subtracting the time when the last report was submitted to the queue from the current time.

Relay Queue — Error

Send alert for jobs in queue older than

An e-mail alert is created that informs the recipient that a report has been in Relay Queue — Error longer than the amount of time specified in the alert’s setup. The subject for this e-mail reads:

Relay Queue – Error: Send Alert for entries older than n day, n hour, n minutes

Possible reasons for entries to be in the Relay Queue — Pending include:

  • When a windows folder location is unavailable, and the alternate delivery folder is enabled, entries will be moved from the Relay Queue — Pending to this database
  • There was a problem processing the report where the report was deleted (this is a very rare occurrence). The alert works by subtracting the time when the last report was submitted to the queue from the current timE

Relay Queue — Pending

Send alert for jobs that cannot be delivered for

An e-mail alert is created that informs the recipient that there is a downloaded report in Relay Queue — Pending that has not been processed by the processing agent within the specified amount of time. The alert is generated when the report has been in the queue longer than the amount of time specified in the alerts setup. The subject for this e-mail reads:

Relay Queue – Pending: Send Alert for jobs that cannot be delivered for n day, n hour, n minute

The alert works by subtracting the time that the report was submitted to the queue from the current time.

Relay Queue — Pending

Send alert when the CheckSum Hash values do not match for the delivered database.

An e-mail alert is created that informs the recipient that an encrypted database was delivered but the hash values of the source and destination file did not match. There have been cases in the past where zero-byte files have been delivered to a destination folder. This alert is designed to catch those occurrences and notify the corresponding email recipient about the issue.

If the hash values do not match, an entry is placed into a table that the alert agent monitors. Once an entry is found, the information is sent to the email recipient.

Note: Only the email frequency is used in this alert as the days, hours, and minutes have no effect on this email alert.

Unknown Location

An e-mail alert is created that informs the recipient that there is a report in Unknown Location. The alert is generated when the report has been in Unknown Location longer than the amount of time specified in the alerts setup. The subject for this e-mail reads:

Unknown Handler: Send Alert for entries older than n day, n hour, n minute

The reason that a report is in Unknown Location is that when a report is processed using a report distribution template, a location mnemonic or alias for the intended location could not be found in the Location Mnemonics.

The alert works by subtracting the time that the report was submitted to Unknown Location from the current time.

Table13

The Alert Notifications area also provides the following information for each e-mail alert notification:

  • Whether alert notification is enabled
  • An internally generated notification number used by Interbit Data Customer Support to troubleshoot the system.
  • The notification description, including:
  • The name of the queue that is being monitored
  • The message that is included in the e-mail message when an alert is sent about that queue
  • The number of days/hours/minutes that define the time frame for the sending of an e-mail alert notification
  • The number of days/hours/minutes that define the time frame for generating an alert

13.3 Alert Notification Template

The first column in the list of Alert Notification displays the status of the alert. If the alert is enabled, a blue-filled circle with a check mark displays. If the alert is disabled a white circle with blue outlines and an x displays. The Edit Alert Notification button, located below the list, enables you to set the parameters for each of the alerts. When you click this button, the Edit Alert Notification dialog box displays.

Screenshot 13-1 NetSafe Edit Alert Notification Dialog Box

The basic layout and contents of this dialog box is the same for all queues. The following table lists and describes the elements on this dialog box. 

Table 13-1 Template Alert Notification Dialog Box

Element

Description

Enabled

Determines whether an e-mail alert for the queue is enabled.

Notification Description

Displays the message that is included in the e-mail notification sent to the recipient.

Days/Hours/ Minutes

The time frame that is used to determine when an event triggers an alert. When the event being monitored exceeds the specified time frame, the alert is sent.

Note: Consideration should be given when setting this time frame. For example, for an error or failed queue, you may want to set a short time frame so that potential problems can be addressed quickly. For a completed queue, you may want to specify a longer time frame, particularly if the number of reports handled by that process is not large or frequent.

E-mail Notification Frequency

 

Days/Hours/ Minutes

The frequency at which an e-mail notification is sent.

At the specified interval, NetSafe scans the database and if it finds an alert has been posted since the last e-mail notification was sent, a new e-mail is sent. If there are multiple alerts in the database, an e-mail notification is sent for the oldest alert.

If Days/Hours/Minutes are all set to 0, an e-mail is sent each time the specified event generates an alert.

Note: Consideration should be given when setting this frequency. For example, for an error or failed queue, you may want to set a short frequency so that potential problems can be addressed quickly. For a completed queue, you may want to specify a longer frequency, particularly if the number of reports handled by that process is not large or frequent.

Caution: Although e-mail alerts are generated whenever the event threshold is met, e-mail notifications containing these alerts are not sent to the recipient until the time frequency for sending the e-mail notifications has been reached. The frequency for sending e-mail notifications for each type of alert is specified in the Edit Alert Notification dialog box for each alert type. Consider carefully how frequently you want e-mail notifications sent for each type of alert.

13.4 Template Wizard Alert Notification

You can also configure alerts based on the report distribution templates that are defined. This capability is useful because it enables you to configure alerts based on the category, or source, of the report. For example, assume the following conditions exist: • Radiology reports are processed every five hours • Laboratory reports are processed every three hours • E-mail alert notifications for Relay Queue — Pending is set to generate an alert for reports that are older than four hours

Under these conditions e-mail alerts will always be generated for radiology reports in Relay Queue — Pending, although there may not be a problem. Using the template alert notification features you can properly configure alerts to handle these kinds of situations. (For information about creating report distribution templates,

Reference section 6.0 “Report Templates”.

Clicking the Add Template Notification button, or the Edit Template Notification button, displays the Template Alert Notification dialog box, which enables you to add or edit e-mail alerts based on predefined report distribution templates. You can only use this feature if you have created at least one report distribution template.

Use this dialog box for identifying the distribution report template.

Screenshot 13-2 Template Wizard Alert Notification

13.5 E-Mail Notification Recipients Settings

The E-mail Recipients setting enables you to add, edit, and delete individual e-mail addresses to which the e-mail alert notifications are sent. Alerts can be sent to any e-mail address. Entries in this list should be restricted to those individuals who have responsibility for the monitoring and trouble resolution of NetSafe. When adding an e-mail recipient, you can also enable the short message feature. This feature sends an abbreviated text message to your organization’s e-mail server, which can then be processed and distributed to the intended recipient. Note: All entries in the list are sent an e-mail for all alerts that are enabled. There is no way to specify which e-mail recipient should receive which alerts. The frequency and number of e-mails sent depends on the e-mail frequency set for each alert.

Screenshot Figure13-3 Alert Notification Recipient Dialog

Table 13-2 Alert Notification Recipient Element table

Element

Description

Enabled

Indicates whether the recipient can receive email alerts.

Short Message Enabled

Indicates whether the email message should be brief (only indicates the name of the alert leaving out the other information). Useful for paging or displaying on a smart device.

E-mail Address

The email address related to the recipient. Should be in the form local-part@domain.

First Name

The first name of the recipient receiving the email alert.

Last Name

The last name of the recipient receiving the email alert.

13.6 Procedures for Setting up E-Mail Alert Notifications

The e-mail alert notification feature is used for informing individuals, usually the NetSafe Administrator, that one of the NetSafe agents has encountered a problem delivering reports. Before recipients can receive alert notifications, you need to configure the various types of alerts, and identify the individuals who will receive the e-mail notifications. The E-mail Notification dialog contains features that enable you to configure e-mail notifications and identify the e-mail addresses that are to receive the notifications. The procedures described here include the following:

  • Configuring E-Mail Alerts for Processing Queues
  • Configuring E-Mail Alerts for Distribution Report Templates
  • Configuring E-Mail Alert Notification Recipients

These procedures assume that you have logged in to NetSafe Administrator using an account that has the appropriate permissions; that is, you can access the E-mail Notification dialog. For information about logging in to NetSafe Administrator,

Reference section 1.2 “Introduction to NetSafe”.

If the account that you are using does not have the necessary permissions to create and manage e-mail alert notifications, see the person in your organization responsible for NetSafe.

13.7 Configuring E-Mail Alerts for Processing Queues

Alerts can be configured for several of NetSafe’s processing queues. To configure e-mail alerts for NetSafe’s process queues, perform the following steps.

Table 13-3 Configuring E-Mail Alerts for Processing Queues

Step

Action

1.

Click the E-mail Notification item in the Settings list.

The E-mail Notification dialog displays.

2.

Highlight the queue for which you want to set up an alert.

3.

Click Edit.

The Edit Alert Notification dialog box displays.

4.

Select or clear the Enabled check box, depending on whether you want to generate an e-mail alert for the selected queue.

5.

In the Days/Hours/Minutes text entry boxes, enter the amount of time you want to elapse before an alert is generated.

6.

In the E-mail Notification Frequency Days/Hours/Minutes text entry boxes, enter the frequency at which you want e-mail alert notifications sent.

Caution: Consideration should be given when setting this frequency. For example, for an Error or Failed queue, you may want to set a short frequency so that potential problems can be addressed quickly. For a Completed queue, you may want to specify a longer frequency, particularly if the number of reports handled by that process is not large or frequent.

7.

Click Save.

The Edit Alert Notification dialog box closes, and the new settings are saved.

13.8 Configuring E-Mail Alerts for Distribution Report Templates

You can configure alerts based on distribution report templates. This capability is useful for configuring alerts based on the category, or source, of the report. For configuring distribution report template procedures.

Reference section 6.14 “Procedures for Managing Report Template”.

To configure e-mail alerts for distribution report templates, perform the following steps. 

Table 13-4 Configure E-Mail Alerts for Distribution Report Templates

Step

Action

1.

Click the E-mail Notification item in the Settings list.

The E-mail Notification dialog displays.

2.

Determine whether you want to:

  • Add a new alert, go to Step 8
  • Edit an existing alert, go to Step 6
  • Delete an existing alert, go to Step 3

3.

Highlight the notification(s) that you want to delete.

4.

Click Delete under the group, Report Template Notification.

The confirmation dialog box displays.

5.

Click Yes.

The highlighted alert is deleted from the list of notifications. Go to Step 2.

6.

Highlight the notifications that you want to edit.

7.

Click Edit under the group, Report Template Notification.

The Edit Alert Notification dialog box displays. Go to Step 9.

8.

Click Add under the group, Report Template Notification.

The Edit Alert Notification dialog box displays.

9.

Select or clear the Enabled check box, depending on whether you want to generate an e-mail alert.

10.

From the Template Name drop-down list, select the distribution report template for which you want to set up an e-mail alert notification.

11.

In the Days/Hours/Minutes text entry boxes, enter the amount of time you want to elapse before an alert is generated.

12.

In the E-mail Notification Frequency Days/Hours/Minutes text entry boxes, enter the frequency at which you want e-mail alert notifications sent.

Caution: Consider the frequency. For an Error or Failed queue, a short frequency may be best so that potential problems are addressed quickly. For a Completed queue, you may want to specify a longer frequency, particularly if the number of reports handled by that process is not large.

13.

Click Save.

The Edit Alert Notification dialog box closes, and the new settings are saved.

13.9 Configuring E-Mail Alert Notification Recipients

NetSafe e-mail alert notifications are only sent to those recipients that you identify. Notifications can be sent to any valid e-mail address. Recipients of alert notification e-mails should, however, be restricted to those individuals who have responsibility for the monitoring and trouble resolution of NetSafe.

To configure recipients of e-mail alert notifications, perform the following steps.

Table 13-5 Configure Receipts of E-Mail Alert Notifications

Step

Action

1.

Click the E-mail Notification item in the Settings list.

The E-mail Notification dialog displays.

2.

Determine whether you want to

  • Add a new e-mail recipient, go to Step 5
  • ·Edit an existing e-mail recipient, go to Step 3
  • ·Delete an existing e-mail recipient, go to Step 10

3.

Highlight the recipient that you want to edit.

4.

Click Edit under the group, E-mail Recipients.

The Alert Notification Recipient dialog box displays.

Got to Step 6.

5.

Click Add under the group, E-mail Recipients.

The Alert Notification Recipient dialog box displays.

6.

Do one or both of the following:

  • Select or clear the Enabled check box, depending on whether you want an e-mail alert notification sent to this recipient
  • Select or clear the Short Message Enabled check box, depending on whether you want a short-message alert notification sent to this recipient

7.

In the E-mail Address text entry box, enter the e-mail address of the recipient.

8.

In the First Name text entry box, enter the first name of the recipient.

9.

In the Last Name text entry box, enter the last name of the recipient.

Go to Step 12.

10.

Highlight the recipient that you want to delete.

Note: To delete more than one recipient, press and hold the CTRL key while selecting additional recipients.

11.

Click Delete under the group, E-mail Recipients.

A confirmation dialog box displays.

12.

Click Save.

The Alert Notification Recipient dialog box closes and the change is made to the list of e-mail recipients.

14.0 User Activity Logs

The User Activity Logs dialog enables you to view what type of administration action was performed and which administrator account performed that action. This chapter describes the User Activity Logs dialog, and the type of information recorded; it includes the following topics:

  • User Activity Logs Information
  • User Activity Logs Dialog
  • NetSafe Client Logs
  • Procedures for Viewing & Managing User Activity Logs

14.1 User Activity Logs Information

NetSafe stores basic information that records some administrative actions taken using a NetSafe Administrator account. The type of information recorded includes the following:

  • Information on the creation, update, and deletion of location mnemonics
  • Information on the creation, update, and deletion of aliases (only for Aliases dialog)
  • Information on the creation, update, and deletion of report distribution templates
  • Changes made to processing queues
  • Which administrator account was used to take one of the recorded actions
  • When a report was viewed
  • Which administrator account viewed a report

A summary entry is provided for each recorded action, identified by the dialog selected to perform that action. The syntax used for the summary varies for different types of actions, but generally conforms to the following format:

dialog Used: [database action performed] some text of what was changed [which item was changed]

The summary entry provides information based on the dialog selected to perform that action. For example, if you used the Location Mnemonic dialog to add an alias to a location mnemonic, the summary entry is similar to the following:

  • Location Mnemonic: [NurseA] was updated

If you used the Aliases dialog to add an alias to a location mnemonic, the summary entry is like the following:

Alias added: |Alias|[John Doe, R. N.] for Location Mnemonic: [NurseA]

14.2 User Activity Logs Dialog

On the main NetSafe Administrator menu, click the User Activity Logs item in the Settings list to access the record of administrator actions.

Screenshot 14-0 NetSafe User Activity Logs

The User Activity Logs dialog is divided into the following major sections:

  • Functions that enable you to search for and display the log entries
  • A listing of the log entries and properties associated with each entry
  • Functions for viewing entries

14.2.1 Database Selection and Display Functions

The selection and display section provides functionality for displaying the log entries. The following table lists and describes the elements in this section of the User Activity Logs dialog.

Table 14-1 User Activity Logs Dialog, Selection and Display Features

Element

Description

Username

Enter a character string into this text entry box that matches characters in the user name for an administrator account. The system does a partial lookup, starting at the left character and ending at the right character, looking for user name(s) that match the characters as entered. Only those user names that match the characters in the sequence entered display. For example, if you enter INTE, only user names that have INTE in that order display. The entry is not case sensitive.

Full Name

Enter a character string into this text entry box that matches characters in the full name of an administrator account. The system does a partial lookup, starting at the left character and ending at the right character, looking for full name(s) that match the characters as entered. Only those full names that match the characters in the sequence entered display. For example, if you enter ric, only administrator accounts whose full name begin with ric display. The entry is not case sensitive.

From Date

Enter the date from which you want to start viewing log entries. Click the down arrow to display the date chooser, or enter a date in the text field. The date entered is the starting date used to display the entries after clicking Load Filter.

To Date

Determines the date to which you want to view log entries. Press the down arrow to display the date chooser, or enter a date in the text field. The date entered is the ending date used to display entries after clicking Load Filter. Clearing the check box disables To Date, and tells the program to search up until the current date.

From Time

Determines the time from which you want to start viewing log entries. Highlight the hour/minute/second and click the scroll arrows to select a time, or enter a time in the text field. The time entered is the starting time used to display the entries after clicking Load Filter. Clearing the check box disables From Time and tells the program to search, starting from midnight of the date entered in From Date.

To Time

Determines the time to which you want to view log entries. Highlight the hour/minute/second and click the scroll arrows to select a time, or enter a time in the text field. The time entered is the ending time used to display the entries, after clicking Load Filter. Clearing the check box disables To Time and tells the program to end the search with the current time. Ascending

Ascending Order

Reorders the list of entries based on the entries in the Log Index column.

Select this option button and then click Load Filter to reorder the list of locations.

Descending Order

Reorders the list of entries based on the entries in the Log Index column.

Select this option button and then click Load Filter to reorder the list of locations.

Load Today’s

Reorders the list of entries based on the entries in the Log Index column. Select this option button and then click Load Filter to reorder the list of locations.

Load Filter

Displays the current day’s entries; only the entries that have been made on the current date and up to the current time display.

  • The From Date and To Date fields change to the current date.
  • The From Time field changes to 00:00:00
  • The To Time field changes to the current time
  • Any entries made in the Username and Full Name fields are removed.

 

Redisplays the list of entries based on the specified:

  • Username • Full name
  • The date and time parameters
  • The parameters selected in the Sort Row by area

14.2.2 List of Log Entries

When you click on the User Activity Logs dialog, the list of log entries for the current day display, one row for each entry. Each entry in this table is identified by a unique index number and a variety of properties associated with that entry. You can change the content of the list by using the display parameters and clicking Load Filter. In addition, each column has an arrow button enabling you to display the contents of the list based on the ascending or descending order of that particular property.

The following table describes the properties that display in the listing of administrator actions.

Table14-2   User Activity Logs Dialog, Listed Properties 

Property

Description

Log Index

A unique identifier assigned to each entry in the database. NetSafe uses this number to track the entry.

Date

The date on which the action was taken.

Time

The time at which the action was taken.

Username

The user name of the administrator account that took the action.

Full Name

The full name associated with the administrator account that took the action.

Summary

A summary of what action was taken.

14.2.3 User Activity Logs Management Functions

Below the listing of actions is a set of buttons that enable you to view the entries. The following table lists and describes these buttons.

Table14-3 User Activity Logs Dialog, Viewing and Manipulation Functions

Element

Description

Total Entries Found

Displays the total number of log entries. This number changes depending on the specified display criteria.

<< 

Moves backward, page-by-page, through the list of entries until the first entry displays.

>> 

Moves forward, page-by-page, through the list of entries until the last entry displays.

View Entry

Displays, in a property sheet, the properties associated with the highlighted entry.

14.3 NetSafe Client Logs

In addition to logs that record actions by NetSafe administrators, logs are generated for each NetSafe Client installation. These logs are not normally accessible by the average NetSafe Client user, but can be accessed by a NetSafe administrator when troubleshooting the system.

The NetSafe Client log files are stored in the same folder on the local PC along with all the other files needed to run NetSafe Client. By default, the log files are stored in the following directory:

C:NetSafeClientTestDBXtra

Although you can see the list of these files in this directory, if the Show hidden files and folders radio button is selected for that Windows folder, their content can only be displayed in the User Activity Logs dialog.

For the content of these log files to display on the User Activity Logs dialog, the NetSafe purge agent must be running.

Reference section 15.3 “Purge Agent Settings”.

Each time that the purge agent runs, the log files from all the NetSafe Client installations are loaded into the User Activity Logs dialog. When you access the User Activity Logs dialog, these entries are included in the list of logs. Screenshot 14-1 shows a User Activity Logs dialog that includes entries from NetSafe Client logs.

Screenshot 14-1 NetSafe User Activity Logs Dialog with NetSafe Client Logs

Note: Log files for the current day are not processed by the purge agent, so the logs for the previous day are the most recent NetSafe Client logs displayed.

The entries for the NetSafe Client logs are interspersed among the logs for NetSafe, thus the properties for both types of logs are the same. Three of these properties, however, provide slightly different data for NetSafe Client log entries. The following table lists and describes the type of data for NetSafe Client log entries in these properties. 

Table 14-4   User Activity Logs Dialog, Listed Properties for NetSafe Client Logs

Property

Description

Username

The user name of the account that logged on to the local PC on which the NetSafe Client is running.

This is the Windows login account name, not a NetSafe Client (location mnemonic) account.

Full Name

The location mnemonic that accessed NetSafe Client and took the action described.

Summary

A summary of what action was taken on the NetSafe Client by the location mnemonic.

14.4 Procedures for viewing and managing User Activity Logs

Whenever an administrator takes an action, NetSafe records that information. The User Activity Log dialog enables you to view what type of administration action was performed and which administrator account performed that action. The procedures described here include the following:

  • Locating a Log Entry

These procedures assume that you have logged in to NetSafe Administrator using an account that has the appropriate permissions; that is, you can access the User Activity Logs dialog.

For information about logging in to NetSafe Administrator

Reference section 1.2 “Accessing NetSafe Administrator”

If the account that you are using does not have the necessary permissions to view and manage user activity logs, see the person in your organization responsible for NetSafe.

14.5 Locating a Log Entry

To locate an entry in the User Activity Log dialog, perform the following steps.

Table 14-5 Locate an entry in the User Activity Log Dialog

Step

Action

1.

Click the User Activity Logs item in the Settings list.

The User Activity Logs dialog displays. 2

2.

Locate the target entry:

  • If you can easily locate the target entry in the list of entries, go to Step 8
  • If you cannot easily locate the entry in the list of entries, go to Step 3

3.

In the Username and/or Full Name text entry box(es), enter the first few characters identifying an administrator account.

The list of entries changes to show only those user names and/or full names containing character(s) matching the character(s) entered.

Note: By entering characters in both fields, you can refine your search.

4.

Determine whether you want to filter the list of entries based on a date and time:

  • If yes, go to Step 5
  • If no, go to Step 6

5.

Do one or more of the following:

  • Enter a starting date in the From Date combo box
  • Select the To Date check box and enter an ending date in the To Date combo box
  • Select the From Time check box and enter a starting time in the From Time combo box
  • Select the To Time check box and enter an ending time in the To Time combo box

6.

Determine the order in which you want to view the list of entries based on the ascending order or descending order of their Log Index, then do one of the following:

  • Select Ascending Order
  • ·Select Descending Order

7.

Click Load Filter.

The list of entries changes to reflect the specified search criteria.

Note: If you want to display all the entries for the current date, click Load Today’s. 8

8.

Scroll through the list of entries until you locate the target entry. (Click << and >> to scroll backward and forward through the list of entries.)

9.

Determine whether you want to view details about the entry.

  • If yes, go to Step 10
  • If no, go to Step 12

10.

Highlight the target entry.

11.

Click View.

The User Activity Log Entry box displays for that entry.

12.

You are done with this procedure.

15.0 System Settings

When configuring NetSafe for the first time, it is necessary to define certain parameters so that the application receives and distributes reports as desired. In addition, after initial installation you may need to reconfigure certain parameters to accommodate new hardware, software, or changes in the requirements of your organization.

Configuring NetSafe to receive and distribute reports as desired is the responsibility of an administrator, using a NetSafe administrator account that has access to the System Settings dialog on the NetSafe Administrator main menu. If the System Settings dialog does not display on the NetSafe Administrator main menu, the account may not have access to this functionality; see the person in your organization responsible for NetSafe. This chapter describes the System Settings menu, and the parameters available from that menu, it includes the following topics:

  • System Settings Menu
  • E-Mail Settings
  • Purge Agent Settings
  • LPD Agent Settings
  • Socket Agent Settings
  • Relay Agent Settings
  • Client Agent Settings
  • Processing Agent Settings
  • Licenses Settings
  • Miscellaneous Settings
  • Active Directory Settings
  • Procedures for Configuring System Settings.

15.1 System Settings Menu

When you click the System Settings item, the System Settings menu displays. This menu has along its left side a list of agents whose settings can be configured. To the right of this list the parameters that can be defined for the highlighted agent display. This list of parameters changes depending on which agent is selected. By default, the setting that was last selected displays when you click the System Settings dialog. If no setting was previously selected, the E-mail setting displays. The agents included in the Settings list are as follows:

  • E-mail
  • Purge Agent
  • LPD Agent
  • Socket Agent
  • Relay Agent
  • Client Agent
  • Processing Agent
  • Licenses
  • Miscellaneous
  • Active Director

Along the bottom of the System Settings menu are several elements that display regardless of which setting is highlighted. These elements are listed and described in the following table.

Table 15-0 System Settings Menu 

Element

Description

Delete Disabled Location

Displays the Disabled Locations dialog box, which enables you to search for and delete locations that have been marked as disabled;

Reference section 4.4.2 “Folder Settings”.

Note: After deleting a disabled location mnemonic, to remove the entry from the list of location mnemonics you may need to click either the Reset, Load Search Filter, or Show All Locations to redisplay the list without the deleted location mnemonic.

Display Version Information

Displays a list of all installed agents and executables, and their version numbers.

Save System Settings

Saves the changes made to the system settings.

The following sections explain the settings and the parameters associated with each entry in the Settings list.

15.2 E-Mail Settings

The E-mail settings define the information required by NetSafe so that notifications can be e-mailed to recipients. If e-mail settings are not configured properly, recipients do not receive notifications sent to them.

Screenshot 15-0 System Settings, E-mail Settings Dialog

The following table lists and describes the e-mail setting parameters. 

Table 15-1 System Settings Dialog, E-Mail Parameters 

Element

Description

SMTP Server

The name of the server from which e-mails are sent. This can be either an IP address in IP4 format, or a server name in the following format:

 <mailserver>.<domain>.com

Server TCP Port

The port used for e-mail. The default port used for e-mail varies depending on whether an encryption is selected in the Connection Encryption Type field:

  • If None is selected, the default port is 25
  • If TLS (transport layer security) is selected, the default port is 587

If the SMTP server is configured to use another port, you can enter that port number explicitly.

Set Default TCP Port

Resets the Server TCP Port as follows:

  • 25 — Connection Encryption Type is set to None
  • 587 — Connection Encryption Type is set to TLS

Connection Encryption Type

Displays the encryption methodology:

  • None — No encryption is used
  • TLS — Use encryption when distributing reports by means of e-mail

User Name

The name of the account used for sending e-mail.

Password

The password of the account used for sending e-mail (should be greater than four characters).

Display Password

The method for displaying the password on this menu; toggle between the stored alphanumeric characters and *.

Return Name

The name that displays in the From: field of all e-mails sent by NetSafe.

Return Address

The e-mail address of the account used to send e-mails from NetSafe. This address displays in the From: field of all e-mails sent by NetSafe.

Subject

Text that displays in the Subject: field of all e-mails sent by NetSafe.

E-mail Body

Text that displays in the body of e-mails sent by NetSafe informing recipients that a report has been sent.

15.3 Purge Agent Settings

The Purge Agent settings specify when activity queues are purged, and all reports stored in them are deleted. By default, the purge agent is run once every 24 hours, but you can specify the purge agent to run more frequently. You can also set the optimal age at which reports stored in a queue are deleted. The settings for both parameters are determined by the conditions at your site.

WARNING: After installation of NetSafe you should monitor the size of your activity queues, and then adjust the frequency and age at which reports are deleted. Queues whose purge properties have not been appropriately set can accumulate a large number of reports and, eventually, use up the available disk space, and negatively impact searching performance.

For description of the activity queues, section 2.0 “Activity Logs”.

Screenshot 15-1 System Settings, Purge Agent Dialog

The following table lists and describes the Purge Agent setting parameters. 

Table15-2 System Settings Dialog, Purge Agent Parameters

Element

Description

Add Run Time

Adds a new time for all purge agents to run. The Add New Time dialog box displays enabling you to specify a time, in 24-hour time.

Delete Run Time

Deletes the highlighted purge times.

Note: To delete more than one purge time, press and hold the CTRL key while selecting additional times.

Purge: LPD Queue — Processed

 

Purge Files Older Than — Days

Determines whether all reports are purged from LPD Queue — Processed.

Specifies the number of days that a report can remain stored in the LPD Queue — Processed before it is purged.

Purge: LPD Queue — Warning

 

Purge Files Older Than — Days

Determines whether all reports are purged from LPD Queue — Warning.

Specifies the number of days that a report can remain stored in the LPD Queue — Warning before it is purged.

Purge: Relay Queue — Completed

 

Purge Files Older Than – Days

Determines whether all reports are purged from Relay Queue — Completed.

Specifies the number of days that a report can remain stored in the Relay Queue — Completed before it is purged.

Purge: Relay Queue — Error

 

Purge Files Older Than — Days

Determines whether all reports are purged from Relay Queue — Error.

Specifies the number of days that a report can remain stored in the Relay Queue — Error before it is purged.

Purge: Relay Queue — Deleted

 

Purge Files Older Than — Days

Determines whether all reports are purged from Relay Queue — Deleted.

Specifies the number of days that a report can remain stored in the Relay Queue — Deleted before it is purged.

Purge: Application Log

 

Purge Files Older Than — Days

Determines whether log entries are purged from the Application Log database.

Specifies the number of days that a log entry remains stored in the Application Log database before it is purged.

15.4 LPD Agent Settings

The LPD Agent settings specify whether to generate a trace log for reports sent to the line printer daemon (LPD) printer. You can also specify the minimum byte size for files sent to the LPD printer queue

Screenshot 15-2 System Settings, LPD Agent Parameters

The following table lists and describes the LPD Agent setting parameters. 

Table15-3 System Settings Dialog, LPD Agent Parameters

Element

Description

LPD Trace Log

Determines whether to generate a log file of the commands that are received and sent when a report is downloaded from a LPD printer. The log files are stored in the following NetSafe directory:

 C:Program Files(x86)Interbit DataNetSafeTrace Log

A log file is created for each report downloaded, using the date and time as its filename.

Caution: Log files can become quite large. Use this feature only when troubleshooting a problem downloading reports into the LPD queue. Turn off logging and delete the log files when they are no longer needed.

Minimum Byte Count for Downloaded Reports

Specifies the minimum byte size for reports to be downloaded to an LPD printer (maximum byte size is 1024). Adjust this number if you need to control the size of reports being sent to the LPD printer or want to prevent the download of reports that you know are too small to contain useful information.

 15.5 Socket Agent Settings

The Socket Agent settings allow you to specify multiple ports to monitor for incoming print jobs.

Screenshot 15-3 System Settings, Socket Agent Parameters

The following table lists and describes the Socket Agent setting parameters.

Table 15-4 System Settings Dialog, Socket Agent Parameters

Element

Description

Add

Enables adding a new port to monitor.

The Socket Settings dialog box enables you to define the parameters for the new port.

Edit

Enables the editing of the parameters of a port currently being monitored.

The Socket Settings dialog box displays, which enables you to redefine the parameters for the port.

Delete

Deletes the highlighted port.

To the right of these buttons is the list of the ports being monitored, and the parameters assigned to the ports.

When you click either the Add or Edit button on the Socket Agent menu, the Socket Settings dialog box displays. The following table lists and describes the Socket Settings dialog box.

Table 15-5 Socket Settings Dialog Box

Element

Description

Enabled

Determines whether the port is enabled.

Enable Logging

Determines whether a trace log for reports is generated when the port is enabled.

The log files are stored in the following NetSafe directory:

C:Program Files(x86)Interbit DataNetSafeSocket Log

A log file is created for each attempt, using the date and time as its filename.

Note: These log files can become quite large. Use this feature only when troubleshooting a problem. Turn off logging and delete the log files when they are no longer needed.

Listening Port

Specifies the port that is to be monitored.

Socket Timeout (Milliseconds)

Specifies the number of milliseconds that the port stays open after a connection is made.

Destination Queue Name

Identifies the destination queue. This name is selected by doing one of the following:

  • Entering the name of the destination queue
  • Clicking Select Template, and selecting from the Select Template Name drop-down list the name of the report distribution template that contains the name of the destination queue
  • Clicking Select Location and selecting from the Select Location Mnemonic dialog box the location mnemonic that contains the name of the destination queue

Save

Saves the socket settings, closes the Socket Settings dialog box, and displays the changes in the list of sockets.

15.6 Relay Agent Settings

The Relay Agent settings allow you to specify how the Relay Agent processes reports in Relay Queue — Pending.

Screenshot 15-4 System Settings, Relay Agent Parameter

The following table lists and describes the Relay Agent setting parameters.

Table 15-6 Relay Agent Settings Dialog Box

Element

Description

Relay Agent Thread Count

Specifies a parameter value that determines how many threads the relay agent starts.

Reference section 15.7 “Relay Agent Thread Count”.

Enabled

Determines whether the functionality to send reports to an alternate destination folder is enabled.

When enabled:

  • The report is delivered to the alternate delivery folder specified in the Alternate Delivery Folder text entry box, if the folder location specified for the location mnemonic is unavailable
  • The entry in the Relay Queue — Pending database is moved to the Relay Queue — Error database

Alternate Delivery Folder

Specifies the alternate folder to which reports are sent when the folder location specified for a location mnemonic is unavailable, for any reason.

Individual Folder Locations

Determines whether sub-folders are created in the Alternate Delivery Folder for each unavailable location mnemonic that receives reports.

If clear, all reports that are sent to an unavailable location mnemonic are stored together in the Alternate Delivery Folder.

If selected, sub-folders are created in the Alternate Delivery Folder for each unavailable location mnemonic that receives reports, and reports sent to that location mnemonic are stored in that sub-folder. The name of the sub-folder is the name of the location mnemonic.

Note: If the alternate delivery folder is not specified, the report is deleted, and the entry in Relay Queue — Pending database is moved to the Relay Queue — Error database.

15.7 Relay Agent Thread Count

Normally, the relay agent processes entries in Relay Queue — Pending one at a time, in the order they were received. This setting increases the thread count to enable the relay agent to deliver reports to more than one location mnemonic at any moment in time, up to the number specified in this text box. Consider adjusting the thread count if you need to increase NetSafe’s processing time.

If more than one thread is specified, NetSafe spawns an additional thread (up to the maximum number specified) when it determines that all existing threads are processing reports.

Entries for each location mnemonic are still delivered in the order they were received. Older files do not overwrite newer files.

Caution: A good rule of thumb is to set the thread count to the number of processor cores currently allocated to the operating system. If too many threads are spawned, and all of them are processing reports concurrently, your system’s processing may be negatively impacted. Therefore, it is recommended that the Relay Agent Thread Count parameter not exceed 5.

If Report Extraction Selection is set to Method 2.

Reference section 15.12 “Report Extraction Methods”. 

The Relay Agent Thread Count parameter should not exceed 4. Setting this to greater than 4 may cause application errors with the report extraction application.

15.8 Client Agent Settings

The Client Agent settings allow you to specify whether to generate a log file of all download attempts from NetSafe Client installations.

Screenshot 15-5 System Settings, Client Agent Parameters

The following table lists and describes the Client Agent setting parameters.

Table 15-7 System Settings Dialog, Client Agent Parameters

Element

Description

Log NetSafe Client Attempts

Determines whether to generate an entry in the application event log noting the connection attempt.

The log files are stored, by default, in the NetSafe directory:

C:Program Files(x86)Interbit DataNetSafeClient Log

A log file is created for each attempt, using the date and time as its filename.

Note: These log files can become quite large. Use this feature only when troubleshooting a problem. Turn off logging and delete the log files when they are no longer needed.

15.9 Processing Agent Settings

There are no Processing Agent parameters to specify for this version of NetSafe.

15.10 Licensing Settings

There are no Licenses parameters to specify for this version of NetSafe.

15.11 Miscellaneous Settings

The Miscellaneous parameters allow you to specify parameters for various settings

15.12 Report Extraction Methods

For NetSafe software versions1.0.8.n and earlier, the extraction of reports from batch reports is accomplished only for .prn formatted files. Beginning with software version 1.1.1.n, NetSafe can accept and process multiple file types (for example, PDF, TIFF, TXT), and then separate individual reports from batch reports using a report extraction method specified by your organization.

To specify this report extraction method, a path to the functionality needs to be entered in the Report Conversion Path from the Miscellaneous settings dialog.

Screenshot 15-6 System Settings, Miscellaneous Parameters

The following table lists and describes the Miscellaneous setting parameters. 

Table15-8   Miscellaneous Settings Dialog Box

Element

Description

Report Conversion Path

Specifies the path to the folder where the report conversion utility is stored on the server. The only viable option currently is the EscapeE application from Red Titan.

The default location for this application is:

%ProgramFiles(x86)%RedtitanSoftwareESCAPEE.E XE

Note: If the path entered is incorrect, NetSafe informs you that the path to the executable does not exist.

Report Conversion Instance Timeout

The timeout specified in milliseconds indicates the time between each subsequent call to the report conversion application. The default value is 200, indicating that 5 conversion applications can be run every second.

Note: This value can affect the performance of the system: setting it to low can cause errors with the report conversion; to high and the system might not be able to keep up with the volume of reports.

15.13 Active Directory Settings

The authentication model used by NetSafe Client versions 1.0.6.5 and earlier, require that users enter in the certificate password to log onto the client. As of version 1.1.1.n, NetSafe allows for the use of Active Directory accounts for logging into a NetSafe Client. The Active Directory settings allow you to specify, enable, and disable Active Directories and Security Groups.

Note: If it is your intent to implement NetSafe Web Client, Active Directory must be enabled. NetSafe Web Client is only accessible by entering Active Directory login credentials.

Screenshot 15-7 System Settings Dialog, Active Directory Parameters

The following table lists and describes the Active Directory setting parameters.

Table 15-9 Active Directory Setting Parameters

Element

Description

Delivery Active Directory Enabled Client.

Determines whether the Active Directory enabled NetSafe Client is delivered to the Location Mnemonic’s Windows folder location.

When selected, NetSafe downloads the latest version of the Active Directory enabled NetSafe Client along with the processed reports, if the latest version has not already been downloaded. Until the checkbox is selected, the traditional NetSafe Client login dialog box is used.

Note: Once this option has been selected and saved using the Save System Settings button, it cannot be undone. From that point onward, the Active Directory enabled NetSafe Client is used for all NetSafe Clients.

Domains; Disabled

Lists all the domains available on the network, but which have not been enabled for use when logging into a NetSafe Client.

> >

< <

Moves highlighted domain name(s) between the Domains’ Disabled and Enabled lists.

Domains; Enabled

Lists all the domains that have been enabled for use when logging into a NetSafe Client.

Note: If this list is empty, there are no entries in the Security Groups’ Disabled and Enabled lists.

Default Domain

The Active Directory domain that is automatically used when logging into NetSafe Client, if a domain name is not included in User Name.

If only one entry is included in the Domains’ Enabled list, that entry is automatically entered in this text entry box. If more than one entry is included in the Domains’ Enabled list, the first entry in the list is automatically entered in this text entry box. Change the entry by selecting another domain from the drop-down list.

Note: It is recommended that the default domain be the domain containing the most Active Directory accounts that will be logging into NetSafe Client. Users not included in the default domain must log into NetSafe Client using the domain/user name format. All NetSafe Client installations use the same default domain.

Security Groups; Disabled

Lists all the security groups that are included in the Domains’ Enabled list but have not been enabled for use when logging into a NetSafe Client.

> >

< <

Moves highlighted security group(s) between the Security Groups’ Disabled and Enabled lists.

Security Groups; Enabled

Lists all the security groups that have been enabled for use when logging into a NetSafe Client.

Caution: Although users not included in this list are unable to log into a NetSafe Client, if no security groups are listed then all users included in the enabled domains can log in to NetSafe Client and NetSafe Web Client.

Setup AD

Sets up all Active Directories, moves Active Directories to the Domains’ Enabled list.

The first time NetSafe starts, the Active Directory database is empty. Clicking Setup AD causes the NetSafe Admin Agent to:

  • Set up the Active Directory database with all data, domains and security groups
  • Move the contents of the database to the NetSafe Administrator
  • Populate the fields on the Active Directory Settings dialog box

Subsequent clicking of Setup AD causes the NetSafe Admin Agent to update the Active Directory database with missing domains and/or security groups that have been added after the initial Active Directory setup. For example, when a new security group is added to a domain, but it was not set up in the Active Directory database on the server. Only the new security group will be added to the database and that information is sent to the NetSafe Administrator.

Note: This process may take some time to complete, because the admin agent has to query Active Directory and update the database before sending the database to the NetSafe Administrator.

Update NetSafe Clients

For each enabled Location Mnemonic, an entry is added to the Relay Queue — Pending that delivers an encrypted database to the local PC. This database contains all the Active Directory and Client Login Backup settings.

Caution: If a location mnemonic has been deleted from the location mnemonic dictionary, but the NetSafe Client still exists on the target local PC, that NetSafe Client is not updated. Only those location mnemonics saved in the location mnemonic dictionary and are enabled are updated.

Refresh

Gets the current Active Directory database on the server and displays the contents of the database.

Note: This is useful because when one change in one NetSafe Administrator session is made and saved, you can refresh the settings in another session of the NetSafe Administrator and see the same information.

Caution: The Active Directory settings are not saved until the Save System Setting button is clicked. If you exit the System Settings without clicking Save System Settings, any changes made are lost and will not be included the next time the Active Directory information is downloaded to NetSafe Clients.

15.14 Procedure for Configuring System Settings

When installing or maintaining NetSafe, it is necessary to define certain parameters so that the application receives and distributes reports as desired. This task is the responsibility of a NetSafe administrator, using an account that has access to the System Settings dialog on the NetSafe Administrator main menu. The procedures described here include the following:

  • Disabling and Deleting Locations
  • Configuring E-Mail Settings
  • Configuring Purge Agent Settings
  • Configuring LPD Agent Settings
  • Configuring Socket Agent Settings
  • Configuring Relay Agent Settings
  • Configuring Miscellaneous Settings
  • Configuring Active Directory Settings

These procedures assume that you have:

  • Logged in to NetSafe Administrator using an account that has the appropriate permissions; that is, you can access the System Settings dialog
  • You have clicked the System Settings item and the System Settings menu is displayed. For information about logging in to NetSafe Administrator

Reference section 1.2 “Accessing NetSafe Administrator”

If the account that you are using does not have the necessary permissions to set system settings, see the person in your organization responsible for NetSafe.

15.15 Disabling and Deleting Locations

For a variety of reasons, you may want to disable a Location Mnemonic, that is, prevent a location from receiving reports. When you do this, the location’s information remains in the database, but reports are not delivered to the location.

15.16 Disabling Locations

To disable locations in NetSafe’s Location Mnemonics, perform the following steps.

Table 15-10 Disable a Location

Step

Action

1.

Click the Location Mnemonics dialog.

The Location Mnemonics menu displays.

2.

Locate the location whose information you want to modify:

  • If you can easily locate the location’s mnemonic and/or name in the list of locations, go to Step 3
  • If you cannot easily locate the mnemonic and/or name in the list of locations, go to Step 4

3.

Scroll through the list of locations until you locate the location that you want to disable.

(Click << and >> to scroll backward and forward through the list of locations.) Go to Step 5

4.

In the Location Mnemonic text entry box and/or the Name text entry box, enter the first few characters of the name identifying the location that you want to disable.

The list of locations changes to show only those names whose characters match the characters entered in the Location Mnemonic text entry box and/or the Name text entry box.

Note: By entering characters in both the Location Mnemonic text entry box and the Name text entry box, you can further refine your search.

5.

Highlight the target location.

6.

Click Edit.

The Location Mnemonic Settings displays.

7.

Select Disable Location Mnemonic.

8.

Click Save.

The location information is saved to the database, and that location does not receive reports.

9.

To disable another location, go to Step 2

15.17 Deleting Disabling Locations

At some point you may want to remove disabled locations from the database.

To delete disabled locations from NetSafe’s Location Mnemonics database, perform the following steps.

Table 15-11 Delete Disabled Locations

Step

Action

1.

Click the System Settings item.

The System Settings menu displays.

2.

Click Delete Disabled Locations.

The Disabled Locations dialog box displays.

3.

Locate the disabled location that you want to delete:

  • If you can easily locate the location’s mnemonic and/or name in the list of locations, go to Step 4
  • If you cannot easily locate the mnemonic and/or name in the list of locations, go to Step 5

4.

Scroll through the list of locations until you locate the location that you want to delete.

Go to Step 6.

5.

In the Location Mnemonic text entry box and/or the Full Name text entry box, enter the first few characters of the name identifying the location that you want to delete.

The list of locations changes to show only those names whose characters match the characters entered in the Location Mnemonic text entry box and/or the Full Name text entry box.

Note: By entering characters in both the Location Mnemonic text entry box and the Full Name text entry box, you can further refine your search.

6.

Highlight the target location.

Note: To delete more than one disabled location at the same time, press and hold the CTRL key while selecting additional locations.

7.

Click Delete.

A confirmation dialog box displays.

8.

Click Yes.

The location is deleted from the Disabled Locations dialog box, and NetSafe’s Location Mnemonics.

9.

Determine whether you want to delete another location.

  • If yes, go to Step 3
  • If no, go to Step 10

10.

Click Close.

The Disabled Users dialog box closes.

11.

Click the Location Mnemonic dialog.

The Location Mnemonic dialog main menu displays with the deleted locations in the list of locations.

12.

Click Reset.

The deleted locations are removed from the list of locations.

15.18 Configuring E-Mail Settings

If you have specified that certain recipients are sent an alert e-mail notification when an issue arises with NetSafe, you need to specify some configuration information needed by the Interbit Alert agent for sending e-mail notifications to each recipient.

Reference section 2.0 “Activity Logs”.

To configure e-mail settings that are used by NetSafe, perform the following steps.

Table 15-12 Configure E-Mail Settings

Step

Action

1.

Click E-mail.

The parameters for configuring e-mail displays.

2.

In the SMTP Server text entry box, enter the name of the server on your network from which the e-mails will be sent. This can be either an IP address in IP4 format, or a server name in the following format:

<mailserver>.<domain>.com.

3.

Determine whether encryption is to be used for e-mails:

  • If yes, select TLS from the Connection Encryption Type drop-down list
  • If no, select None from the Connection Encryption Type drop-down list

4.

In the Server TCP Port text entry box, enter the number of the port used for e-mail. Do one of the following:

If you want to use the default port for the selected Connection Encryption Type method, click Set Default TCP Port.

For None, the default port is 25; for TLS, the default port is 587)

  • If the SMTP server is configured to use a port other than the default port, enter that number in the Set Default TCP Port text entry box 5

5.

In the User Name text entry box, enter the name or e-mail address of the account used to send e-mails from NetSafe.

6.

In the Password text entry box, enter a password, longer than four characters, for the account used for sending e-mail.

7.

Click the Display Password button to toggle the display of the password (on this menu only) between alphanumeric characters and a string of asterisks ( * ).

8.

In the Return Name text entry box, enter the name of the user that displays in the From: field of all e-mails sent by NetSafe.

9.

In the Return Address text entry box, enter the e-mail address of the user to whom return e-mails are sent by NetSafe. NetSafe uses this field in the same manner as if you clicked Reply to Sender in an e-mail that you received.

10.

In the Subject text entry box, enter a text string that displays in the Subject: field of all e-mails of sent by NetSafe.

11.

In the E-mail Body text entry box, enter text that displays in the body of all e-mails of sent by