                            LANauditor
                           Version 3.03
                                 
                     Horizons Technology, Inc.
                         3990 Ruffin Road
                       San Diego, CA  92123
                 Technical Support: (619) 292-8320
                                 
                         April 26, 1994


This README file is organized into the following sections:

   I.   Installation
   II.  Auditor Module
   III. Console Module
   IV.  Database Convert Utility
   V.   Miscellaneous Release Notes

____________________________________

I. Installation
____________________________________


A. Steps to be taken before installation.

            IMPORTANT!!!
 
   1. YOU MUST BE LOGGED INTO (NOT ATTACHED TO) THE NETWORK AS A 
      SUPERVISOR OR A USER WITH FULL SUPERVISORY RIGHTS TO THE 
      SERVER WHERE THE PROGRAM WILL BE INSTALLED!
 
   2. The Auditor module can only recognize valid DOS drive
      designators and paths.  It does not recognize file server
      volume identifiers or file services.
       
   3. For LANauditor version 2.11 and 2.12x users, you can 
      install this new version in the same location and retain all
      of your existing data.  For version 1.x and 2.0x, users you
      must install this version in a new location.
 
B. Installation steps.
 
            IMPORTANT!!!

   1. DO NOT COPY FILES FROM THE DISTRIBUTION DISKS TO THE
      INSTALLED LOCATION.  THE FILES ARE COMPRESSED AND CAN
      ONLY BE DECOMPRESSED AND PROPERLY INSTALLED USING THE
      INSTALL PROGRAM.

   2. WHEN INSERTING A REFERENCE TO THE AUDITOR MODULE IN
      A LOGIN SCRIPT OR PROFILE (FOR ANY OF THE SUPPORTED
      NETWORKS), YOU MUST MAKE CERTAIN THAT THE AUDITOR
      MODULE IS:

      *  IN THE DOS PATH OR HAS A SEARCH MAPPING TO
         ITS INSTALLED LOCATION (AND THIS MUST OCCUR
         IN THE LOGIN SCRIPT OR PROFILE PRIOR TO
         THE INVOCATION OF THE AUDITOR MODULE), OR

      *  MODIFY THE LOGIN SCRIPT OR PROFILE SO THAT
         ITS INVOCATION INCLUDES AN EXPLICIT DOS PATH.
         (FOR EXAMPLE Z:\PUBLIC\WAUDITOR.EXE)

   
C. Post-installation notes.

   1. All Networks

      a. Identification of networked workstations is based on the
         combination of network card identifier and the Machine ID
         field in the database.  The NIC ID field is automatically
         determined, while the Machine ID field is user defined.  
         For non-networked workstations, a DOS environment 
         variable, AMACH, must be present and set to a unique
         value (such as a property tag number or a name).  For
         example, type
               SET AMACH=12345
         or
               SET AMACH=Pat's computer
         from the DOS prompt before auditing the workstation.
         It is recommended that this DOS command be inserted into
         the AUTOEXEC.BAT of the workstation.  Refer to the User's
         Guide for details on this and other alternative methods
         of tagging non-network workstations.

   2. Novell NetWare

      a. The WAUDITOR.EXE file should be referenced in the
         system login script, in order to gather data from every 
         workstation as a login occurs, or in the personal login 
         scripts of users whose workstations you wish to audit.

      b. You may want to install the Auditor module in Z:\PUBLIC
         and have the Auditor data stored to another directory.
         If so, the following reference should be made in the 
         login script (presuming the Z:\PUBLIC has been made a 
         search mapping prior to this line)

               #WAUDITOR /OY:\SHARED\LADATA

         where all users MUST have read and write privileges to
         the directory Y:\SHARED\LADATA.  The users need only 
         read-only rights to the Auditor module files in 
         Z:\PUBLIC.

   3. Banyan VINES

      a. WAUDITOR.EXE is referenced in the login profile using a
         POSTLOGIN command. It should be referenced in the most
         common login profile, in order to gather data from every
         workstation as a login occurs, or in the personal login
         profile of users whose workstations you wish to audit.
         If you need to execute more than one program during 
         login, then you need to create a batch file.  POSTLOGIN
         would then call this batch file to run WAUDITOR and 
         other programs.
 
      b. The call for WAUDITOR must come after the set drive 
         command to gain access to WAUDITOR.EXE.  The users must 
         have Read and Execute privilege for the WAUDITOR.EXE 
         directory.  They need MODIFY privileges (Read, Write, and
         Execute) for the WAUDITOR output directory.

   4. Microsoft LAN Manager 

      a. WAUDITOR.EXE must be referenced in the login profile or a 
         common batch file.  For Enhanced workstations, this 
         reference should be in a common login script to collect
         audit data on all of the workstations, or in a user 
         login script for an individual user (for Basic 
         redirectors workstations, you will have to insert a 
         reference to the Auditor module in the AUTOEXEC.BAT 
         file).  As an example, the login script might appear as:

               AUDITOR /OY:\SHARED\LADATA

         where all users MUST have read and write privileges to
         the directory Y:\SHARED\LADATA.

      b. LANauditor can be installed on LAN Manager v1.3 and 
         higher (or equivalent) networks.  However, all changes
         to the network login scripts must be made as described 
         above.  In addition, path rights for installation
         directories will not be shown for these networks during 
         installation.

D. OS/2 installation.

   1. To audit OS/2 PC's you need to copy the file AUDITOS2.SYS 
      from the AUDITOR module directory to the local hard drive 
      of the OS/2 workstation.

   2. Modify the CONFIG.SYS to add two lines after the SET PATH 
      and SET LIBPATH.  Add the two lines as follows.  

            IOPL=YES
            DEVICE=C:\OS2\AUDITOS2.SYS

      You have to reboot for the changes to take place.

E. MAC installation.    

   1. Take the Mac Auditor diskette and copy the contents into
      the CONTROL PANEL folder.  

   2. Reboot the computer and you should be able to see the 
      LANauditor ICON appear during boot up process.  The
      Mac Auditor loads as an extension.

   3. The Mac Auditor is invoked by the combination of the APPLE
      key and an alphabet key.  This will run the audit and save
      the information to the specified location that is defined
      in the Mac Auditor console.

____________________________________

II. Auditor Module
____________________________________

A. Release notes.

   1. The Auditor module is compatible with the following
      network operating systems:

      *  Artisoft LANtastic 2.3
      *  AT&T StarLAN 3.2 & 4.x
      *  Banyan VINES 4.x & 5.x
      *  DEC Pathworks 4.x
      *  HP LAN Manager 2.x
      *  IBM LAN Server 1.3 +
      *  Microsoft LAN Manager 2.x
      *  Novell NetWare 2.1x, 3.x & 4.0
      *  Microsoft Windows for Workgroups 3.1
      *  3Com 3+Open 1.1

   2. The root of the drive pointed to by the DOS environment
      variable COMSPEC is considered the boot drive for purposes
      of collecting the AUTOEXEC.BAT and CONFIG.SYS files for
      DOS 3.x.  For DOS 4.x, 5.x & 6.x this information is pro-
      vided to the Auditor module by DOS.  If for any reason 
      this information is incorrect, the DOS environment variable
      ABOOT can be set to inform the Auditor module of the
      correct location.  The syntax is

            SET ABOOT=C:\

      where C:\ (or whatever is appropriate) represents
      the boot drive & directory.

   3. Some non-standard disk partitions (created by third-party
      disk format products) are reported as "Unknown" followed
      by a value.

   4. If the HIMEM.SYS driver is used for extended memory,
      the available amount of extended memory is reported as 0.

   5. To perform software audits during the logon process
      under Microsoft LAN Manager for Enhanced workstations, a
      minimum of 420 KB of available RAM is needed prior to
      executing NET LOGON.

   6. For instructions on completing server audits, please refer
      to the User's Guide supplement.

   7. The Auditor module will collect information on hidden files
      and directories when performing a software audit of a local
      workstation's hard disk.

   8. For diskless computers that boot off a file server,
      we recommend that the DOS environment variable ABOOT
      be set to indicate a valid boot location and that
      the APATH variable be set to "NO".  For example,
      you might set these variables in the AUTOEXEC.BAT
      file as follows.

            SET ABOOT=Y:\
            SET APATH=NO

B. Known limitations/problems.

   1. The Auditor Module will not pick up all Video Card Memory.
      On some cards it will only track 256K of memory.  It will 
      not recognized XGA type video cards.

   2. Some older model Compaq Deskpro computers (with BIOS
      dated between late 1986 and early 1987) running
      under NetWare may not correctly perform the network
      audit.  We recommend that these machines be audited
      manually using /A /XNET command line switches (/A to
      collect the Machine ID and /XNET to exclude the
      network information).  An alternative to using the
      /A switch is to include the DOS environment variable
      AMACH in the AUTOEXEC.BAT file.  AMACH is equivalent
      to the Machine id field & its purpose is to uniquely
      identify the machine in the LANauditor inventory
      database.

   3. For Novell NetWare 2.x, the /O command line switch
      is required in order for the audit data to be written
      to disk when invoking the Auditor module from a
      login script.

   
____________________________________

III. Console Module
____________________________________

A. Release notes.

            IMPORTANT!!!

   1. IT IS RECOMMENDED (THOUGH NOT REQUIRED) THAT THE FILES
      & BUFFERS PARAMETERS IN THE CONFIG.SYS FILE BE SET TO
      AT LEAST 40.  ALSO, FOR BEST PERFORMANCE IT IS HIGHLY
      RECOMMENDED THAT THE DOS OR WINDOWS SMARTDRV DISK
      CACHING UTILITY BE LOADED & THE CACHE SIZE SET TO 2 MB.

   2. Windows 3.x version must run in standard or enhanced mode,
      not real mode.  This module will run in 2 MB of memory,
      though better performance can be obtained with 3 MB or
      more of memory.

   3. The DOS SHARE program IS REQUIRED to be loaded to run
      the Console Database module on a local workstation drive.

   4. In the DOS version when using a mouse, the mouse cursor
      will at times change to the Greek letter sigma 
      representing an hourglass.  This is a signal that the 
      program is busy with an assigned task, and that no 
      further work can be done until the mouse cursor returns
      to its normal form.

B. Known limitations/problems.

   1. In the Windows version when running a concurrent
      application which forces itself to the front (such
      as the Clock program), this at times can interfere
      with the appearance of the main screen.  Keeping
      such applications outside the borders of the main
      LANauditor window will prevent any screen refreshing
      problems.

____________________________________

IV. Database Convert Utility (LACVT30.EXE Program)
____________________________________

If the convert program stops because of an error, there are 
some steps you can take to convert your database.  The format 
of the LACVT30 program is as follows:

   LACVT30 [opts] src dest 

where the three fields are,

   src    - The full path to where the LANauditor 2.1 database is 
            located. (i.e.  C:\LA21\DATA)

   dest   - The full path to where the LANauditor 3.0 database is
            located. (i.e.  C:\LA30\DATA)

   opts are as follows:

   -H     - Shows the format, "LACVT30 [opts] src dest" 

   -I str - Include only subsystems in 'str'.  This will convert 
            only the subsystems in the 'str' string.  The
            allowable subsystems are given below.
               M - Machines      E - Exceptions
               L - Logins        S - Software
               Q - Queries       D - Software dictionary
               A - Admin         C - Collection paths
               P - Preferences   B - Hw+Sw Labels 
            Examples:
               -I d   - Will only convert the software dictionary.
               -I ms  - Will only convert machine records and
                        their software.

   -X str - Exclude subsystems in 'str', this will skip any 
            subsystems in the 'str' string.  Examples:
               -X s   - Will not convert the software part 
                        of a machine record.
               -X qa  - Will not convert queries or admin records.

   -Q     - Quiet mode, will not write any output to the screen.

   -G     - Go mode, this will by-pass any errors and convert as 
            much of the 2.1 database as possible.

   -Rs    - This will remove all the files in the source directory
            if there were NO errors during the convert. Any
            skipped errors like the -G option will cause this
            option not to run.

   -Cx    - Character 'x' is inserted as the first character in
            the machine id for every converted machine record.  

____________________________________

V. Miscellaneous Release Notes
____________________________________

A. The Auditor default software auditing screen cannot be replaced
   with the AUDITOR.SCR file as described in the manual.

B. The users, who are being audited, no longer need CREATE rights.
   There will be an initial AUDITOR.DAT of size 122 bytes made in 
   the Auditor module directory. 
   
C. When operating in multi-user mode, if the database is 
   accessed by another console, you may be told that a "Record is
   Unavailable".  This is the characteristic multi-user busy
   message, indicating that for the moment the database is in
   use.

D. If problems are encountered during inventory update (e.g.,
   power failure, or aborted process), the following file naming
   conventions are used to retain information for recovery.

   During inventory update the AUDITOR.DAT is renamed to 
   HTILA-XX.XXX, where XX.XXX will be AA.AAA, AA.AAB, AA.AAC ...  
   depending if there are other HTILA-XX.XXX files in that 
   directory.  If the update is successful, the HTILA-XX.XXX file 
   is deleted, otherwise the HTILA-XX.XXX file is left for 
   trouble shooting.  If the user went over the license limits 
   he can expand LAW/LAD then recollect this file to get the 
   missed records.  

   NOTE 1 - If a user cancels the update, the AUDITOR.DAT file 
   will be left as HTILA-XX.XXX.  The user can then copy it back 
   to AUDITOR.DAT to run inventory update on it.
   
   NOTE 2 - Since we use the rename function now initial start up 
   is much faster, but the user MUST have rename and create rights
   in the AUDITOR.DAT directory.

E. Query temp files.

   The query portion of LANauditor uses five temporary files when 
   it runs.  The location of these file can be set by the user.  
   The way LAW\LAD decides is:

   1. Check the env. variable LAQRYPATH; if not set,
   2. Check LA.INI file for 'Qry Path='; if not set,
   3. Use the current directory.

   If the product was installed on a network drive, setting the 
   query path to a local drive should speed up the query and cut 
   down on the network traffic.


--- End of README.TXT File ---
