Browse
 
Tools
Rss Categories

Installing Fraud Scanner

Reference Number: AA-02288 Views: 254 0 Rating/ Voters

This article describes the steps and requirements needed to successfully install the Fraud Scanner.

Run the Prerequisites

In order to correctly install Fraud Scanner and configure it, certain prerequisites are required, such as the installation of redistributable packages etc. The LumenVoxPrerequisites installer should be used to install any of these.

Copy the prerequisites installer to a temporary location on your server and then run it as shown below:



Select the "Confirm installation" checkbox, then click on the Install button to begin installing the prerequisites.

This will go through and check whether the required prerequisite packages are already installed on your system, and if not, it will install them. Progress will be shown as it goes through these, as shown below


Once the installation of all prerequisites is completed, please click on the "Restart" button to complete the installation process before continuing.


Check Before Continuing

Before you proceed with the installation of the Fraud Scanner itself, you should verify that you have some of the things necessary to complete the installation.

  • Installed and configured a Microsoft SQL Server Database with rights to deploy Database objects (we recommend the database be hosted on its own server or cluster and physically separated from the Fraud Scanner server)
  • Verify you have IIS Installed and configured correctly on your server that will be running Fraud Scanner
  • Ensure you have a valid SSL Certificate for the Fraud Scanner Portal. This could be a valid signed or self-signed certificate for the server or domain (as needed).
  • Verify you have installed and configured an Assure VB endpoint and that you know the location of this URL
  • Verify that you have sufficient rights on the server for the installation to complete

Once you have verified that you have all of these requirements, you can proceed with the installation of the Fraud Scanner


Fraud Scanner Installation

Copy the "LumenVox Fraud Scanner 7.X.XXX.msi"  installation file to a temporary location that is accessible to the server you wish to install it on (for example "C:\temp").

Double Click on the "LumenVox Fraud Scanner 7.X.XXX.msi" file to open it, or use the preferred method of open a command prompt window with Admin permissions. Most recent Windows versions offer a Power Users menu that you can access by pressing Windows+X or just right-clicking the Start button. On the Power Users menu, choose "Command Prompt (Admin)." as shown below

Once you have the Command Prompt window open, navigate to the temporary location where you placed the .msi file (for example "C:\temp") and then run the following to begin the installer:

msiexec /i <LumenVox Fraud Scanner 7.X.xxx>.msi

If you attempt to launch the installer without Administrative privileges, the installation will fail with a warning about this:


Whichever method you use to launch the installer, you should see the following Welcome dialog if you have the appropriate permission to continue.




Click on the "Next" button to move to move to the next page, allowing you to select the desired installation location for Fraud Scanner




Specify the desired location of the application, then after clicking "Next", you will be asked to provide the information about how to connect to the Database. The database connection can be via Windows or SQL Authentication.

If you require Windows Authentication, provide the database server (<database machine>\<MSSQL Instance Name>), database name (name of the database to use for Fraud Scanner), along with connection credentials that the Fraud Scanner application will use, then click on the "Test connection" button to verify successful connectivity and login capabilities.



Note: Encrypt Connection

When "Encrypt connection" is selected, Microsoft SQL Server uses SSL encryption for all data sent between the client and server, if the server has a certificate installed.

Note: Trust Server Certificate

When "Trust Server Certificate" is selected, SSL is used to encrypt the channel when bypassing walking the certificate chain to validate trust. If "Trust Server Certificate" is selected and "Encrypt connection" is disabled, the channel is not encrypted.

After you have entered the appropriate values and tested the database connection, you can continue with the "Next" button. Note that you may need to click on another field after entering the database password before the "Test Connection" button becomes enabled.



This page allows you to specify which Web site name and Port number (within your IIS configuration) should be used to host the Fraud Scanner Portal website application.

Click the "Next" button to continue, once you have selected the appropriate website name and port number settings.

The following page allows you to select the Assure endpoint that the Fraud Scanner will use. This is a URL that was assigned when LumenVox Assure was installed. This may be on the same machine, or may be on a remote machine, depending on your system architecture.




If Assure is installed on the same server as you are installing Fraud Scanner, you may be able to select the appropriate endpoint from the dropdown list shown. If Assure is installed on a different server, you will need to specify the full URL to that instance before continuing.

Note: Skip Assure Configuration

Note that there is an option to "Skip Assure configuration" at this stage, however this is an advanced option, and should only be selected if you know how to manually configure this later, after Fraud Scanner has been installed (under "VTAssure Settings" in the Fraud Scanner configuration section of the portal). We recommend specifying the actual Assure endpoint in this page, so that subsequent pages and the the Fraud Scanner installation can complete successfully.



Once this Assure EndPoint has been specified (or skipped), the installation can begin:


You can click on the "Install" button to begin the Fraud Scanner installation. This will take a minute or two to complete and once successful, it will display a summary screen, indicating the successful Fraud Scanner installation.


Installation Verification

You can verify whether the installation was completed successfully if you wish, by checking if the application folders were created at the selected Fraud Scanner installation location, as shown here:



App_Data is used to contain audio files for batches and Watchlists (see Using the Fraud Scanner article for details). The other folders are used internally by the application and should not be modified.


Uninstalling Fraud Scanner

The correct method of uninstalling Fraud Scanner from a server is to log into the server on which Fraud Scanner is installed with administrative permissions.

There are a number of ways to navigate to the "Add and Remove programs" option, depending on the version of Windows you are running, such as to select the "Programs and Features" option from administrative tools. (Control Panel | Programs | Programs and Features), or right-click the Start icon and select "Apps and Features".

Once you have arrived at the appropriate location to remove applications, select "LumenVox Fraud Scanner" and then click on the "Uninstall" option.

You will be asked for confirmation of whether you wish to proceed with the removal of the application. Select "Yes" only if you wish to proceed. 

This will install the Fraud Scanner application from the server. Any database objects will not be removed.

Files Left After Uninstallation:

Note that there are some files left on server after uninstallation. The Fraud Scanner application will not remove audio files that are located in the App_Data folder since these may have been imported from elsewhere.To avoid any loss of user data these files are left undeleted. You should review any remaining files to determine if these should be kept or not (mostly in the "App Data" folder of the selected installation path).