The following paragraph does not apply to any country where such provisions are inconsistent with local law: LEXMARK INTERNATIONAL,
INC., PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions; therefore, this statement may not apply to you.
This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these
changes will be incorporated in later editions. Improvements or changes in the products or the programs described may be made at any
time.
References in this publication to products, programs, or services do not imply that the manufacturer intends to make these available in all
countries in which it operates. Any reference to a product, program, or service is not intended to state or imply that only that product,
program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any existing intellectual
property right may be used instead. Evaluation and verification of operation in conjunction with other products, programs, or services,
except those expressly designated by the manufacturer, are the user’s responsibility.
For Lexmark technical support, visit support.lexmark.com.
For information on supplies and downloads, visit www.lexmark.com.
If you don't have access to the Internet, you can contact Lexmark by mail:
Lexmark International, Inc.
Bldg 004-2/CSC
740 New Circle Road NW
Lexington, KY 40550
USA
Lexmark, Lexmark with diamond design, and MarkVision are trademarks of Lexmark International, Inc., registered in the United States and/or
other countries.
All other trademarks are the property of their respective owners.
GOVERNMENT END USERS
The Software Program and any related documentation are "Commercial Items," as that term is defined in 48 C.F.R. 2.101, "Computer
Software" and "Commercial Computer Software Documentation," as such terms are used in 48 C.F.R. 12.212 or 48 C.F.R. 227.7202, as
applicable. Consistent with 48 C.F.R. 12.212 or 48 C.F.R. 227.7202-1 through 227.7207-4, as applicable, the Commercial Computer Software
and Commercial Software Documentation are licensed to the U.S. Government end users (a) only as Commerical Items and (b) with only
those rights as are granted to all other end users pursuant to the terms and conditions herein.
Licensing notices
All licensing notices associated with this product can be viewed from the root directory of the installation software CD.
Support statements...................................................................................................................................8
System requirements.......................................................................................................................................... 8
Migrating from MarkVision Professional to Markvision Enterprise........................................................10
Using Markvision.....................................................................................................................................12
Understanding the home screen.............................................................................................................13
Understanding ports and protocols........................................................................................................14
Creating a discovery profile ..............................................................................................................................17
Editing or deleting a discovery profile ..............................................................................................................18
Importing devices from a file .................................................................................................. .......................... 19
Setting the device life cycle state ..................................................................................................................... 20
Auditing a device ..............................................................................................................................................20
Using categories and keywords...............................................................................................................26
Adding, editing, or deleting categories ............................................................................................................. 27
Adding, editing, or deleting keywords .............................................................................................................. 27
Contents4
Assigning keywords to a device ........................................................................................................................27
Removing an assigned keyword from a device................................................................................................. 28
Creating a policy......................................................................................................................................29
Creating a new policy........................................................................................................................................29
Creating a policy from a device.........................................................................................................................29
Understanding the security policy...........................................................................................................30
Understanding settings for security policies..................................................................................................... 32
Creating a security policy.................................................................................................................................. 33
Changing the communication credentials of a restricted device ..................................................................... 38
Editing or deleting a policy......................................................................................................................39
Assigning a policy....................................................................................................................................39
Checking conformity with a policy..........................................................................................................39
Enforcing a policy....................................................................................................................................40
Removing a policy...................................................................................................................................40
Managing the Service Desk.........................................................................41
Working with policies..............................................................................................................................41
Checking device conformity with policies.........................................................................................................41
Working with a device.............................................................................................................................41
Checking the status of a device ........................................................................................................................ 41
Viewing a device remotely...................................................................................................... .......................... 42
Viewing the embedded Web page ...................................................................................................................42
Creating a destination.............................................................................................................................43
Editing or deleting a destination.............................................................................................................43
Creating an event.............................................................................................................. ......................44
Editing or deleting an event....................................................................................................................44
Assigning an event to a device................................................................................................. ...............44
Removing an event from a device...........................................................................................................45
User has forgotten the password............................................................................................................57
The application is unable to discover a network device.........................................................................57
Check the printer connections.......................................................................................................................... 57
Make sure the internal print server is properly installed and enabled ............................................................57
Make sure the device name in the application is the same as the one set in the print server ........................ 57
Make sure the print server is communicating on the network ........................................................................ 58
Device information is incorrect...............................................................................................................58
Glossary of Security Terms.........................................................................59
MarkvisionTM Enterprise (MVE) is a Web-enabled device management utility designed for IT professionals. MVE works
as a client/server application. The server discovers and communicates with devices on the network and provides
information about them to the client. The client displays device information and provides a user interface to manage
those devices. Each Markvision Server can manage thousands of devices at one time.
Built-in security provisions prevent unauthorized access to the application, and only authorized users can use the client
to access management options.
Markvision lets you monitor and manage your entire print fleet, which is composed of printers and print servers. In
Information Technology Infrastructure Library (ITIL), printers and print servers are also known as Configuration Items
(CIs). Within this document, CIs, printers, or print servers are sometimes called devices.
Getting started8
Getting started
Support statements
For a complete list of supported operating systems and Web browsers, see the Release Notes.
System requirements
RAM
•
Required: 1GB
• Recommended: 2GB+
Processor speed
•
Required: 1 physical 2GHz or higher (Hyper‑Threaded/Dual Core)
– The application supports only the 32-bit versions, and comes with a preconfigured Firebird database.
– The database server where MVE is installed must have only one network interface card (NIC).
Installing Markvision
With Markvision, you can use either Firebird or Microsoft SQL Server as the back-end database.
If you are using Microsoft SQL Server, then do the following before installing Markvision:
• Enable mixed mode authentication and Auto Run.
• Set the Network Libraries to use a static port and TCP/IP sockets.
• Create a user account that Markvision will use to create the database schema and any database connections.
Getting started9
• Create the following databases:
– FRAMEWORK
– MONITOR
– QUARTZ
Note: Make sure that the user account you created is either the owner of these databases or has the
appropriate privileges to create a schema and perform Data Manipulation Language (DML) operations.
1 Unzip the install files into a path that does not contain any spaces.
2 Launch setup.exe, and then follow the instructions on the computer screen.
Upgrading to the latest version of Markvision
Upgrading is designed to work only from the immediately preceding version.
1 Back up your database.
Notes:
• If you are using a Firebird database, then see “Backing up the Firebird database” on page 9 for more
information.
• If you are using MS SQL Server, then contact your MS SQL administrator.
2 Unzip the install files into a temporary location, and make sure the path does not contain any spaces.
3 Launch setup.exe, and then follow the instructions on the computer screen.
Backing up and restoring the Firebird database
Backing up the Firebird database
Note: If you are using MS SQL Server as your database, then contact your MS SQL administrator.
1 Stop the Markvision Enterprise service.
a Click , or click Start > Settings.
b Select Control Panel, and then if necessary, click System & Security.
c Double-click Administrative Tools.
d If necessary, double-click Component Services.
e Double-click Services.
f From the Services pane, select Markvision Enterprise, and then click Stop.
2 Locate the folder where Markvision Enterprise is installed, and then navigate to firebird\data.
For example, C:\Program Files\Lexmark\Markvision Enterprise\firebird\data
3 Copy the following databases to a safe repository.
• FRAMEWORK.FDB
• MONITOR.FDB
• QUARTZ.FDB
Getting started10
4 Restart the Markvision Enterprise service.
a Repeat steps 1a through 1e.
b From the Services pane, select Markvision Enterprise, and then click Restart.
Restoring the Firebird database
1 Make sure you have completed the backup process for the Firebird database.
2 Stop the Markvision Enterprise service.
For more information, see step 1 of “Backing up the Firebird database” on page 9.
3 Locate the folder where Markvision Enterprise is installed, and then navigate to firebird\data.
For example, C:\Program Files\Lexmark\Markvision Enterprise\firebird\data
4 Replace the following databases with the databases you saved when you were completing the backup process.
• FRAMEWORK.FDB
• MONITOR.FDB
• QUARTZ.FDB
5 Restart the Markvision Enterprise service.
For more information, see step 4 of “Backing up the Firebird database” on page 9.
Accessing Markvision
1 Open a Web browser, and then type http://MVE_SERVER:9788/mve/ in the URL field.
Note: Replace MVE_SERVER with the host name or IP address of the machine hosting Markvision.
2 In the User field, type admin.
3 In the Password field, type Administrator1, and then click Login.
Note: To change your password, click Change Password from the upper-right corner of the home screen.
If Markvision is idle for more than 30 minutes, then it automatically logs out. You will need to log in again to access
Markvision.
Migrating from MarkVision Professional to Markvision
Enterprise
Note: Markvision Enterprise (MVE) only supports migration of data from MarkVision Professional (MVP) v11.2.1.
Exporting data from MVP
Using the MVP Server Web page
1
Open a Web browser, and then type http://MVP_SERVER:9180/~MvServer in the URL field.
Note: Replace MVP_SERVER with the IP address or host name of the MVP Server.
2 From the MarkVision Server Web page, click Data Dir.
Getting started11
3 Enter your user name and password if prompted.
4 From the Download Data Directory page, click to download your MVP data as a zip file.
5 Save the zip file.
Using the file system
1
On the system running the MVP Server, navigate to the location where the MVP Server is installed.
2 Compress the Data folder into a zip file.
Importing data into MVE
1 Log in to Markvision Enterprise.
2 In the “Import data from MarkVision Professional” dialog, click Yes, and then click Browse.
Notes:
• If you click Yes, then the dialog does not appear the next time you log in to MVE.
• If you click No and you do not want to see the dialog again, then select Do not show this message again.
3 Navigate to the location where your zip file is stored, and then click Open.
4 From the “Data to Import” area, select the type of data that you want to import.
DataDetails
Users
Devices
• In MarkVision Professional, users are given privileges for individual functions.
• In Markvision Enterprise, users are assigned roles associated with different functions.
• All users imported from MVP are automatically assigned to all roles except ROLE_ADMIN.
• If an MVP user's password does not meet the MVE password criteria, then the string
Administrator1 is appended into the user's current password.
• MVE only imports basic device information from MVP, including model name, serial number, MAC
address, and IP address.
• If a printer already exists in MVE, then that printer is ignored during import.
• During import, MVE disregards printers connected to External Network Adapters (ENAs), since MVE
currently does not support ENAs.
• The imported devices are automatically set to the Managed (Normal) life cycle state.
• MVP manages printers and print servers. MVE only manages printers. Therefore, two entries in MVP
become a single entry in MVE.
Getting started12
DataDetails
Discovery
Profiles
• When MVP profiles are imported into the MVE system, only the following details are imported:
– SNMP Community Name
– Retries
– Timeout
– Exclude Address
– Include Address
• In MVP, each Include/Exclude entry contains an SNMP Read/Write Community Name set. A profile that
contains multiple Include/Exclude entries may also contain multiple unique Read/Write Community
Name sets. In MVE, the Read/Write Community Name set belongs to the profile itself. Each profile can
contain only one Read/Write Community Name set. Therefore, one discovery profile in MVP (containing
multiple unique Read/Write Community Name sets) is broken into multiple discovery profiles when
imported into MVE (each containing one Read/Write Community Name set). The number of profiles
in MVE is equal to the number of unique Read/Write Community Name sets in the original MVP profile.
• For Timeout, MVE converts the MVP Timeout to milliseconds by multiplying the MVP value (in seconds)
by 1000.
• The Automatically Manage option is set to False during import.
5 Click Import.
Using Markvision
The features and functions of Markvision are divided into four service areas. This provides greater ease of use by making
sure the view of the interface is populated with only the features and functions needed for the task at hand. Each
service area is accessible by way of a tab on the home screen and corresponds to a service life cycle stage in the
Information Technology Infrastructure Library (ITIL) version 3. The ITIL disciplin e is globally recognized for its compilation
of best practices for managing IT resources within an organization.
Use this tab To
AssetsLocate, identify, catalog, organize, and track the physical assets (printers and multifunction devices) that
comprise your print fleet. Here, you can gather and maintain information about the fleet models, capabilities,
installed options, and life cycle.
In ITIL, this fits into the Service Transition area.
If one of your responsibilities includes management of IT assets, then go to “Managing assets” on page 17.
PoliciesDefine and manage the software configuration of the print fleet. Here, you can assign a defined policy that
specifies the particular configuration settings for each model. You can monitor whether the print fleet
conforms with the policies, and enforce these policies when necessary.
In ITIL, this fits into the Service Transition area.
If one of your responsibilities includes administration and maintenance of configuration management tools,
then go to “Managing policies” on page 29.
Service
Desk
Directly interact with a single device in the print fleet. Here, you can remotely manage the device, check policy
conformance and enforce policies, and customize configuration settings through the device embedded Web
server.
In ITIL, this fits into the Service Operation area.
If one of your responsibilities includes management or administration of customer IT support service, then
go to “Managing the Service Desk” on page 41.
Getting started13
Use this tab To
Event
Manager
Create an automated event when a device sends an alert to the network. You can choose to send an e-mail
or perform other scripted actions to notify identified personnel.
In ITIL, this fits into the Service Operation area.
If one of your responsibilities includes problem management or incident handling, then go to “Managing
device events” on page 43.
Understanding the home screen
Markvision
1
5
4
2
3
Use this areaTo
1HeaderAccess the four service area tabs and perform other administrative tasks.
2Search ResultsView the full, paged list of devices matching the currently selected bookmark or
search.
3Task InformationView the status of the most recent activity.
4Search Results SummaryView a categorized summary of the currently selected bookmark or search.
5Bookmarks and Advanced
Search
Manage and select bookmarks, and refine search queries.
Getting started14
Understanding ports and protocols
Markvision uses different ports and protocols for the various types of network communication, as shown in the following
diagram.
Note: The ports are bidirectional and must be open or active for Markvision to function properly. Make sure all
device ports are set to either Secure and Unsecure or Enabled, depending on the device.
Server to device communication
These are the ports and protocols used during communication from the Markvision Server to network devices.
ProtocolMarkvision ServerDeviceUsed for
NPAP
Network Printer Alliance
Protocol
XMLNT
XML Network Transport (Object
Store)
LST
Lexmark Secure Transport
mDNS
Multicast Domain Name System
SNMP
Simple Network Management
Protocol
Ephemeral User Datagram
Protocol (UDP) port
Ephemeral UDP and
Transmission Control Protocol
UDP 9300Communication with Lexmark network
printers
UDP 6000
TCP 5000
Communication with Lexmark network
printers
(TCP) ports
UDP 6100
Ephemeral TCP port
(handshaking)
UDP 6100
TCP 6110
(handshaking)
Encrypted communication with Lexmark
network printers
Ephemeral UDP portUDP 5353Discovery of certain Lexmark network
printers and determining the security
capabilities of devices
Ephemeral UDP portUDP 161Discovery of and communication with
Lexmark and third-party network
printers
Getting started15
ProtocolMarkvision ServerDeviceUsed for
FTP
File Transfer Protocol
TFTP
Trivial File Transfer Protocol
HTTP
Hypertext Transfer Protocol
Raw Print PortEphemeral TCP portTCP 9100Generic file downloads
Ephemeral TCP portTCP 21Generic file downloads
Ephemeral UDP portUDP 69Firmware updates and generic file
downloads
Ephemeral TCP portTCP 80Generic file downloads
Device to server communication
This is the port and protocol used during communication from network devices to the Markvision Server.
ProtocolDeviceMarkvision ServerUsed for
NPAPUDP 9300UDP 9187Generating and receiving alerts
Server to database communication
These are the ports used during communication from the Markvision Server to databases.
Markvision ServerDatabaseUsed for
Ephemeral TCP port TCP 1433 (SQL Server)
This is the default port and can be configured by the
user.
Ephemeral TCP port TCP 3050Communication with a Firebird database
Communication with an SQL Server database
Client to server communication
This is the port and protocol used during communication from the flex/browser client to the Markvision Server.
ProtocolFlex/Browser ClientMarkvision Server
AMF
ActionScript Message Format
TCP portTCP 9788
Messaging and alerts
This is the port and protocol used during communication from the Markvision Server to a mail server.
ProtocolMarkvision ServerSMTP ServerUsed for
SMTP
Simple Mail Transfer
Protocol
Ephemeral TCP port TCP 25
This is the default port and can be
configured by the user.
Providing the e‑mail functionality
used to receive alerts from devices
Getting started16
Markvision server to LDAP server communication
These are the ports and protocols used during communication involving user groups and authentication functionality.
ProtocolMarkvision server LDAP serverUsed for
LDAP
Lightweight
Directory Access
Protocol
LDAPS
Secure Lightweight
Directory Access
Protocol
KerberosEphemeral UDP
Ephemeral TCP
port
Ephemeral TCP
port
port
TCP 389, or the port to which the LDAP server
has been configured to listen
Transport Layer Security (TLS), or the port to
which the LDAP server has been configured to
listen
This is for TLS‑encrypted connections.
UDP 88
This is the default Kerberos Authentication
Service port.
Authentication of Markvision
Enterprise users using an LDAP
server
Authentication of Markvision
Enterprise users using an LDAP
server through a secure channel
that uses TLS
Kerberos authentication
Managing assets17
Managing assets
Discovering devices
The application lets you search the network for devices. When devices are discovered, their identification information
is stored in the system. Use bookmarks or searches to display devices in the Search Results area.
Discovered devices are, by default, set to New and are not managed by the system. Before any action can be done on
a device, you need to set it to Managed. For more information, see “Managing devices” on page 20.
There are two ways of adding devices to the system:
• Using a discovery profile—Discover devices in the network using customized parameters.
• Importing devices from a file—Use a comma
Note: You can use only one of these two ways. Performing both procedures to add devices into the system results in
duplicate devices.
After adding a device into the system, perform an audit of the device immediately. Performing an audit provides
additional information about the device, which is required to successfully complete some tasks. For more information
about auditing a device, see “Auditing a device” on page 20.
‑
separated value (CSV) file to import devices.
Note: Note: This applies only to unrestricted devices. For restricted devices, first assign a security policy and then
enforce it on the restricted devices before performing an audit. Failure to do so results in an audit failure and sets
the state of the restricted devices to (Managed) Missing. For more information about restricted devices, see
“Understanding secured devices” on page 30.
Creating a discovery profile
1 If necessary, from the Assets tab, click Discovery Profiles to show the Discovery Profiles section.
2 Click , and then type the name of the new discovery profile.
3 From the Addresses tab, select Include or Exclude.
4 To import a list of items from a file to include or exclude, do the following:
a Click .
b Navigate to the folder where the file is saved.
c Select the file, and then click Open.
Note: The file can contain any of the patterns that can be entered in the text field above Address/Range. To view
examples of a valid pattern, mouse over the text field.
5 Beside , type the IP address, fully qualified DNS host name, subnets with wildcard characters, or address ranges
you want, and then click
.
Notes:
• You can type only one entry at a time. To view examples of a valid entry, mouse over the text field above
Address/Range.
• When typing address ranges, do not use wildcard characters.
• To delete an entry, select it, and then click .
Managing assets18
6 Click the SNMP tab, and then select Version 1,2c or Version 3.
Note: If you are not sure which version of the SNMP you are using, then contact your system support person.
7 If you selected Version 1,2c in step 6, then from the Community Names area, set the privacy profile.
If you selected Version 3, then from the Security area, set the security profile.
Note: If you are not sure how to configure your SNMP Version 3 security profile, then contact your system
support person.
8 Click the General tab, and then from the Performance area, do the following:
• In the Timeout field, specify the amount of time (in milliseconds) to wait for the devices to respond.
• In the Retries field, specify the number of retries before the system stops attempting to communicate with a
device.
9 Select whether to include secured devices in the discovery.
Notes:
• If you do not have a secured device, then do not select this option. Doing so incurs a performance penalty,
which results to a much longer time in discovering devices.
• When a device is secured, one or both of the following conditions apply: (a) communication ports are
disabled, and (b) authentication is required to obtain information from the device.
10 Select whether the discovery profile should automatically manage the discovered devices.
Note: If you select this option, then all discovered devices are automatically set to the Managed life cycle state.
11 Click Save > Close.
Notes:
• Clicking executes the discovery profile and does not save it.
• A new discovery profile gathers just enough information to reliably identify a device. To gather the complete
information from a device, set the device state to Managed, and then perform an audit of the device.
• To make sure that the device information is current, a discovery can be scheduled to occur on a regular
basis. For more information, see “Scheduling tasks” on page 54.
Editing or deleting a discovery profile
1 If necessary, from the Assets tab, click Discovery Profiles to show the Discovery Profiles section.
2 Select a profile, and then click to edit or to delete the discovery profile.
3 Follow the instructions on the computer screen.
Managing assets19
Importing devices from a file
Use a comma-separated values (CSV) file to import devices.
Note: In preparation for a deployment, Markvision lets you add devices into the system even before these are
available on the network.
1 From the Assets tab, click Import, and then click Browse.
2 Navigate to the folder where the CSV file is stored.
Note: Make sure that each line of the CSV file represents a single device.
3 Select the CSV file, and then click Open.
4 From the Possible Columns section, select the columns to match the values in your CSV file.
5 If you are using SNMP V3 protocol to communicate with the device, then you must select the following columns:
• SNMP V3 Read/Write User
• SNMP V3 Read/Write Password
• SNMP V3 Minimum Authentication Level
• SNMP V3 Authentication Hash
• SNMP V3 Privacy Algorithm
Note: In the CSV file that you selected in step 3, make sure the following parameters contain any one of the
values specified below them:
• Minimum Authentication Level
– NO_AUTHENTICATION_NO_PRIVACY
– AUTHENTICATION_NO_PRIVACY
– AUTHENTICATION_PRIVACY
• Authentication Hash
– MD5
– SHA1
• Privacy Algorithm
– DES
– AES_128
– AES_192
– AES_256
Note: If your CSV file does not contain the exact values specified, then MVE cannot discover the device.
6 Click Add to move the selected columns into the CSV File Columns section.
• If you want the system to ignore a column in your CSV file, then select Ignore. Do this for each column in your
CSV file that is not listed in the Possible Columns section.
• To change the order of the columns you selected to match your CSV file, select a column from the CSV File
Columns section, and then use the arrows to move the headings up or down.
7 Select whether the first row in your CSV file contains a header.
8 Select whether the imported devices should be automatically set to the Managed life cycle state.
9 Click OK.
Loading...
+ 42 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.