User Guide

You are here:
Before you begin using System Frontier, make sure that you have completed the post installation tasks.


This document will familiarize you with the structure, functions and usage of System Frontier.

Why System Frontier?

System Frontier provides organizations with an easy way to manage server, workstation, user and network device access remotely and securely. It gives you more security by reducing the need for users to have administrative rights. This results in a simplified mode of operation that will make your life easier.

The Basics

System Frontier has four navigational sections:

Manage – Under the Manage menu, you can work with computers or groups of computers in Containers. The beauty of role-based privileged access really shines here. Your defined delineation of access restricts or enables permission to manage computers or Containers of computers.

Tools – Tools are an expansion of the built-in functionality found in the Manage section. Tool creation and usage facilitates almost any computer action that you are normally able to run, with the benefits of role-based Permissions and central location of tools.

Reports – The Reports section lets you monitor and review user actions. Having knowledge of who has access and what they are doing is important in today’s world.

Settings – Within the Settings menu are the various components of System Frontier that can be configured to match your organizational needs.

Understanding the System Frontier Layout

The System Frontier application has 3 basic sections:

  1. The Search Bar
    This is a global search box located in the top right of the interface. You can search by name, IP address, description, make or model.
  2. The Menu Panel
    The menu panel is on the left side of the interface. Use this to select your view for the main window.
  3. The Main Window
    The main window covers the remaining area of the interface. This area displays the selected view or data results.


Manage > Home

This is the dashboard view which shows you basic information about your environment including the last 10 searches you’ve submitted. The “Top 5 Computer Activity” chart shows the nodes that have had the most management actions taken against them in the last 7 days.

There is a global search box located in the top right of the interface. You can search by name, IP address, description, make or model.

The System Frontier Dashboard

Manage > Containers

Containers provide a way to logically group and categorize nodes for easier management and organization. They can be populated dynamically, by using a SQL “where clause” syntax or by adding members manually. Some Containers are created by default after installation.

Permissions can be assigned to a Container so that it applies to all of its members, which makes administration easier. This is also the preferred method of assigning permissions within System Frontier.

Manage > Computers

The Manage > Computers structure has Add and Import menu items that allow you to add nodes to the System Frontier database. Once the node is in the System Frontier database, it will be available to be added to a Container.

The Add Computer page under Manage > Computers
The Import Computers page under Manage > Computers

Managing a Computer

To manage a computer, click on a specific computer name from within a Container or from search results.


Tools > All tools

Custom Tools extend the capabilities of System Frontier by providing a way to run scripts on servers, workstations, users and network devices while using a multi-threading job engine.

When you select the Tools menu, the All tools page appears. From this page you can open, edit or disable a Custom Tool.

The Custom Tools page under Tools > All tools

Tools > Create tool

To create a Custom Tool, click on the Create tool link.

Tools > All tools (Read-only)

All tools (Read-only) will display a view only listing of all Custom Tools, except tools that are disabled or in these categories: Preprocessor, Library, Example, SFSA. This view is helpful to show others the tools that are available to which they may request access.

Tools > My Jobs

When you run a Custom Tool, the output is saved into the System Frontier database. My Jobs gives you the ability to go back and look at the results. To review the output from previous jobs, go to Tools > My Jobs.

The My Jobs page

Clicking on a JobID in the Job List will show the Job Detail page, which displays the previous results obtained from running the Custom Tool.

The Job Detail page


Reports > Compliance

You can view the permissions that a user has by selecting the Compliance page under Reports.

Compliance reporting

Reports > Audit History

All actions taken within System Frontier are logged and displayed on the Audit History page.

The Audit History Report page

Reports > ROI Dashboard

The ROI Dashboard lets you see the savings brought by using System Frontier.

ROI Dashboard

Reports > ROI Dashboard By Tool

The ROI Dashboard By Tool report shows the same information found in the ROI Dashboard report above, but specifies the information by Custom Tool.

Reports > Job Engine Workload

The Job Engine Workload allows you to view the job distribution between management servers.

Below you can see how the job engine distributed the workload for a Custom Tool called “BIOS Check” that ran against a list of 215 computers in one execution. One management server ran the tool on 122 computers, while a second management server ran the tool on 93 computers, thus distributing the workload:

Job Engine Workload


Settings > About

On the About page you can see version and license information.

Settings > Site

At the Site page, you can view:

  • License Status information (including the license count and expiration date)
  • Culture information
  • .NET version (at least version 4.8 of the .NET framework is required.)
  • Web server name and IP address

On the same page you can also configure or modify:

  • Lookup Data (Custom Tools categories, environments, and computer status)
  • Event Log Max Events
  • Event Log Max History
The Site Settings page

Settings > Users

System Frontier users can be managed on this page. You are able to add new users or change existing ones.

The User Accounts page

Settings > Roles & Permissions

Permission to view data and perform actions is granted through the use of Roles. When a Role is created:

  • Members are added. This is the “Who” of the Role. In most cases, the members will be Active Directory users and groups.
  • Permissions are added. This is the “What” of the Role. Permissions define what the users are able to do.
  • Scopes are added. This is the “Where” of the Role. Meaning, on which computers will the users be able to access through System Frontier.
The Roles page

Settings > Credentials

The Credentials added on the Credentials page can be used for Containers and Custom Tools in those cases where you need to specify different Credentials.

The Credential Manager page

Settings > Management Servers

Administer the management servers on the Management Servers page. Determine the port, set the trust status, name a certificate to use, or disable or enable a management server. Synchronization between management servers can be done here as well.

The Management Servers page

Settings > Domain Configuration

Set the domains to be used with System Frontier on the Domain Configuration Page. You can add multiple domains, including trusted and untrusted domains.

The Domain Configuration page

Settings > Reports

Configure who can run and view reports on the Report Settings page under Settings > Reports:

The Report Settings page

On the Report Settings page you will see the reports that can have access configured. Click on the report and the Report Permissions page will come up:

The Report Permissions page

Assign the roles you wish to have access to the report and click the Save button.

Settings > Custom Fields

Custom Fields are used to track information that is not already in System Frontier by default. Creating a Custom Field for computers to collect data about those objects would be a valid use. Custom Fields may also capture user input to be used in Custom Tools.

The Customs Fields page

Settings > ROI Report Settings

To configure ROI settings go to the ROI Report Settings page under Settings. You can set the blended hourly rate, edit or delete action mappings, filter the mappings, set the number to show per page, as well as sort by column.

The ROI Report Settings page

Settings > My Settings

The My Settings page will let you configure the number of rows to display per page by default for each page or view that has a table of results. Simply set the number and click Apply.

The My Settings page

Settings > Menu Customization

You can add new menu items or edit existing ones that you’ve created on the Menu Customization page. This will let you add links to other applications or pages. You might add a link to a ticketing system or reference documentation, such as Microsoft product end-of-life pages, manufacturer warranty websites, GitHub pages, and so on.

The Menu Customization page


Many organizations need to leverage a custom logo that matches in-house branding. This can be accomplished by simply placing a PNG file in the root of your web install folder with the following specifications:

  • Filename must be called CustomLogo.png.
  • Dimensions must be 391 pixels by 31 pixels.
  • Optionally, to match the header background, use #192637 or RGB (25,38,55) as the background color.

Getting the Most Out of System Frontier

As you consider the features of System Frontier, think about the many ways that you can use them to ease your administrative burden. System Frontier can save you time, save you money, and greatly improve your work experience.

Please contact us if you have any questions or need any other assistance. We’d be glad to help.

For more information, see these topics:

Was this article helpful?
Dislike 0