Power Tools v5.0 Features
Power Tools 5.0 is a set of 81 utilities designed to ease Domino administration. Each one of them is worth almost the price of the package itself.
Requires Lotus Notes v6 or later. Works with Lotus Notes v8+
This is a downloadable email product only. No media will be shipped.
Look what you can do with all these tools! Each one of them is almost worth the price of the whole package. Many of them can be enabled as scheduled agent to make sure your Domino environment is constantly monitored for you.
Access Control Tools
Compiles a list of all users who have access to one or more databases via explicit, wildcard or group ACL entries. ACL Auditor will return the access level, assigned roles and ACL flags (Can Create Documents, Can Delete Documents, etc.) for each person listed directly or indirectly in an ACL.
ACL Search & Replace
This utility can be used to make multiple ACL changes on selected databases on a server. It can perform one or more of the following actions: 1) Add a specified name to the ACL of all selected databases 2) Add a specified name to the ACL of all selected databases whenever a specified search name is found in the ACL 3) Change the access level of a specified name in all selected databases 4) Delete a specified name from the ACL of all selected databases 5) Replace a specified name in an ACL with another name in all selected databases.
ACLs At A Glance
ACLs At A Glance reports the ACL entries of all selected database. It can quickly give you a snapshot of the ACL setting of all databases on a server. For instance, you can easily view the default or Anonymous access level of all databases.
Administration Servers At A Glance
Reports the administration server for each selected database and whether or not the administration server can update reader and author name fields.
Check ACL User Types
Examines the user type setting (person, server, person group, server group, mixed group and unspecified) for each ACL entry and determines if it is correct or incorrect. Any incorrect user types found are reported and optionally corrected from the results view. (R5 and later versions of Power Tools only)
Find Missing ACL Entries
Find Missing ACL Entries will check the ACL of all selected databases for the specified ACL entries and report any databases that do NOT contain those ACL Entries. For example, you might want to find any databases that do not have an Anonymous entry or an Administrators entry.
Find Unlisted ACL Entries
Scans all ACL entries in all databases on the specified server and checks to see if they exist in the specified address book. Any person, server, or group that is found in the ACL, but not found in the address book is considered UNLISTED. This utility can be used to help clean up ACLs.
Agents At A Glance
Searches through all selected databases and lists all agents found in those databases. A document is created for each agent found listing the database server, database filename, agent name, agent owner, which server the agent runs on, if the agent is enabled, and the last time that the agent ran. This utility can come in handy if you want a snapshot of agents for general information, to locate agents that are making entries in the log, or to identify which agents are owned by a particular person (particularly handy if someone is leaving your organization and you want to locate all of their agents for security purposes.)
Check Servers For A Response
Checks all specified servers for a response and reports results with a mail memo. Once this document is set up it can be run on a periodic basis by a scheduled agent. For instance, you might want this to run hourly so that you will know quickly when there is a problem with one of the servers.
Check URL For A Response
Checks all specified URLs for a response and reports results with a mail memo. Once this document is set up it can be run on a periodic basis by a scheduled agent. For instance, you might want this to run hourly so that you will know quickly when there is a problem with one of the specified URLs.
Compact Local Databases
Compacts all or selected local databases. Options available with the compact server console command can also be used in this utility. The size before and after the compact is recorded in results documents created during processing.
Compare Two Documents
Compares two documents and reports any fields that do not contain the same values in both documents. After differences are found, individual field values can be copied from one document to the other.
Copy A Field To Multiple Documents
Copies a selected field from a source document to one or more destination documents.
Database Properties At A Glance
Searches through all selected databases and lists various database properties for each one. A document is created for each database found and placed in a view, giving you a snapshot of various database properties for all or selected databases.
Execute Server Console Commands
Executes one or more server console commands.
Find Attached User IDsSearches person documents for attached user IDs and reports, deletes, or detaches them.
Find Duplicate Documents
Searches a specified database and view for duplicate documents. Reports all duplicate documents found.
Find Duplicate Templates
Searches a server for databases with duplicate template names. If any are found, the template name, filename, and title are displayed.
Find Missing Design Elements
Searches the design elements of all selected databases and reports any databases that are missing the specified design element.
Find Orphan Documents
Searches the specified server and databases for orphan documents. Orphan documents are response documents with no parent. This can happen when a parent document is deleted without deleting the response document first.
Find Protected Design Elements
Searches the design elements of all selected databases and reports design elements that will not be updated when the design is refreshed or replaced from a template. Any design elements that have the "Do Not Allow Design Refresh/Replace To Modify" (R4) or "Prohibit Design Refresh Or Replace To Modify" (R5 and later) flag set will be reported
Find Unprotected Design Elements
Searches the design elements of all selected databases and reports design elements that will be updated when the design is refreshed or replaced from a template. Any design elements that do not have the "Do Not Allow Design Refresh/Replace To Modify" (R4) or "Prohibit Design Refresh Or Replace To Modify" (R5 and later) flag set will be reported. The primary purpose of this utility is to allow Notes/Domino administrators to easily find and protect folders that a user has added to their mail file. When a user has created a folder it is often created in an unprotected state and will be lost when a new mail file template is applied. This utility can be used to easily identify unprotected folders (or any other design element) and protect them before applying a new template.
Forms At A Glance
Searches through all selected databases and lists all forms found in those databases. A document is created for each form found listing various information.
Log Scanner can be used to search the log and report individual lines that contain word or phrases that you are interested in knowing about. For instance you could search for any lines containing the words Error or Warning and get a snapshot that you can glance at instead of digging through the log for the entries.
Monitor A Database
Checks the specified view or folder to see how many documents are in the view. If the specified threshold is met, a memo is sent to the specified user or group. You might want this to run this periodically (using the supplied scheduled agent) so someone will be notified when a specific mail file or mail in database has 10 memos in the inbox so they can respond.
Multi Database Full Text Search
Performs a full text search on all specified databases and returns matching documents. Databases do NOT have to be full text indexed for this utility to work, but this utility will be much faster if the databases to be searched are full text indexed.
Readers/Authors Search & Replace
Provides a way to quickly and easily manage reader names and author names fields in Notes documents. With this tool, you can add, delete, and replace names in readers and authors fields.
Reports values in specified fields in selected STATREP.NSF documents. This utility can calculate and report totals, averages, and minimum and maximum values for a specified STATREP field over a specified period of time. You will need to be familiar with various fields in the STATREP database to use this utility.
Searches a server for the specified template and all databases that inherit their design from that template.
Templates At A Glance
Searches through all selected databases and reports the template that the design is inherited from for each one. Functionality is provided to change the name of the template that the design is inherited from.
View Selection Formulas At A Glance (available in the ND6 or later version of Power Tools only)
Searches through all selected databases and lists all views found in those databases as well as the view's selection formula. Functionality is provided to easily change one or more selection formulas.
Views At A Glance
Searches through all selected databases and lists all views found in those databases. A document is created for each view found listing various information.
Create Custom Groups Containing All Notes Users
This utility can be used to create various types of groups from person documents in the name and address book. For example you can use this utility to create groups containing all users in each department, city, state, etc. Almost any field in a person document can be used to create groups. This utility reads all person documents from the database and view that you specify and creates groups for those users. This utility will create groups based on the comparison field that you specify. For example, if you specify a view sorted by department and specify a comparison field of "department", you can automate the creation of departmental groups. These groups can then be used in a recipients field for mailing, in an ACL, or in readers/authors fields.
Create Groups Containing All Notes Users
Creates group documents that contain all Lotus Notes users and places those groups into the specified address book. This routine reads all person documents in the address book, separates them by certifier, and creates one or more group documents (depending on the number of people in the address book). These groups can then be used in a recipients field for mailing, in an ACL, or in readers/authors fields.
Create Groups With A Formula
Creates group documents that match a specified formula. This routine reads all person documents in the address book. Any person documents that match the formula will be included in the group.
Create Mail Server Groups
Creates group documents that contain all Lotus Notes users with a specific mail / home server and places those groups into the specified address book. This routine reads all person documents in the address book, separates them by mail server, and creates one or more group documents (depending on the number of people in the address book). These groups can then be used in a recipients field for mailing, in an ACL, or in readers/authors fields. You might want to use this to notify all users of a specific server that it will be down for scheduled maintenance.
Find All Access Groups
Finds all access groups that a person is in. This utility will find all multi-purpose, deny access, and access control groups that a person is in. It will also show all of the groups that the user is indirectly listed in through the use of nested groups. In other words, if Bob Jones is in the group All Accounting Users and All Accounting Users is in a group called All Finance Users and All Finance Users is in a group called All ACME Users, all of these groups would be listed as groups that Bob has access through even though he is only entered directly in All Accounting Users.
Find All Members Of A Group
Lists all members of a specified group even if they have access through nested sub-groups.
Find Empty Groups
Scans groups searching for empty or near empty groups. This utility will report all groups that have n or fewer members.
Find Groups Not Listed In Any ACLs
Checks the ACLs of all databases on all specified servers and determines which groups are not listed in any ACLs. The main purpose of this utility is to help administrators determine if a group is being used or not. Please note, there are many places besides an ACL where a group might be used. Just because a group is not listed in any ACLs does NOT mean that the group is not used. For instance, a group might appear in a readers or authors field or could be used in any number of places in the design of a database.
Find Unlisted Group Members
Scans all members in all groups in the specified address book and checks to see if a matching person, group, or server document exists in the address book. Any person, server, or group that is listed in a group, but not found in the address book is considered unlisted. This utility can be used to help clean up groups.
Group Member Search & Replace
Group Member Search & Replace can be used to delete one or more users from all groups, replace one user name with another in all groups, or to add one or more users to all groups that a specified user is found in.
Sort Group Members
Sorts all members in all specified groups. Names can be sorted by first name or last name.
Check Mail File ACLs
Checks mail file ACLs to make sure that each mail file has an ACL entry matching the user's name as it appears in the person document. The user's new name may be missing if adminp doesn't complete all tasks during a name change.
Check Mail File Owners
Check Mail File Owner will the name of the mail file owner in the calendar profile to make sure that it contains the same name as the name in the user's person document. The mail file owner name can become incorrect, for example, if a user opens their mail file for the first time via the web or if an administrator is the first person to open the mail file.
Check Mail File Quotas
Checks all mail files on a server looking for mail files that are over a specified % of their size quota or with n bytes of their size quota (i.e. over 90% of their size quota or within 5MB of their maximum size). Creates a report of all mail files over the threshold and optionally sends the user a customizable warning memo. This utility can run automatically on a daily, weekly, or monthly schedule.
Check Out Of Office Agents
Checks out of office agents for common problems that will keep the agent from running. This utility will checks the mail file owner's ACL level, the server that the agent is set to run on and the agent owner's access to run restricted agents. Any mail files with detected problems are reported.
E-Mail Merge will let you perform an e-mail merge using a Notes database as a data source. You could, for instance, send a memo to all people in the name and address book using E-Mail Merge.
Searches databases for attachments by name. Use this utility to find known viruses or to find files that violate company policy.
Find Dead / Pending Mail
Checks the MAIL.BOX file on the specified server for dead or pending mail and reports results with a mail memo. Once this document is set up it can be run on a periodic basis by a scheduled agent. For instance, you might want this to run hourly so that you will know quickly when there is a problem with one of the servers.
Find Large Mail Files
Find Large Mail Files will search a server for mail files that are larger than the size you specify. In addition, Find Large Mail Files will optionally search for attachments in each large mail file that are larger than the size that you specify.
Find Missing Mail Files
Examines person documents in a specified address book and checks to see if the specified mail file for that person exists. Any mail files that do not exist are reported.
Find Old Mail Documents
Searches mail files for documents older than a specified date. This utility reports all mail files that contain old document and the number of old documents found.
Find Orphaned Mail Files
Find Orphaned Mail Files will search a server for mail files and then compare each file found to entries in the address book to see if there is a person document that specifies that mail file. In other words, if the mail file mail\bbenson.nsf is found on the server being processed, then the specified address book is searched for a person document that specifies mail\bbenson.nsf as the mail file. Mail files with no corresponding person document are considered orphaned.
Find Subject Lines
Searches mail files for specific text in the subject field.
Find Unlisted Forwarding Addresses
Searches person documents for mail forwarding addresses that don't have a matching person document in the public address book.
Find User Mail Documents
Searches mail files for documents containing matching text in the from, to, cc, bcc, subject, or body fields.
Mail Rules At A Glance
Collects all mail rules from selected mail files.
Reduce Mail File Access
Reduces a user's access to their own mail file. Starting with Lotus Notes R5, AdminP will handle delegation of a user's mail file, allowing the user's access to be dropped to Editor, thereby preventing users from deleting their own mail file. Reduce Mail File Access looks at each user's person document and mail file. It looks in the ACL of each mail file for all names found in the User Name field of the person document. The access level of any ACL entry that matches a name in the User Name field will be modified to match the new access level specified.
Scan SMTP Work Queues
Can be used to periodically check the inbound and outbound work queues for pending mail. It can optionally send a message when a specified number of pending messages are found in either work queue.
Change Database Replica ID
Changes the replica ID of a database to make or break replication with other databases.
Find All Replicas Of A Database
Find All Replicas Of A Database will search all specified servers for a matching replica of a database.
Find Duplicate Replica IDs
Searches a server for databases with duplicate replica ids. If any are found, the replica id, filename, and title are displayed.
Find Mail File Replicas
Finds and reports all replicas for all mail files on a selected server. You can use this utility to make sure that one or more replicas exist for all mail files.
Find Missing Replicas
This utility checks to see if databases that exist on one server have replicas that exist on one or more other servers. You can use this utility to make sure that all clustered servers contain all databases that they should or that hub and spoke servers contain the replicas that they should.
Find Replica Stubs
Finds and reports replica stubs (databases that have not been fully initialized). Replica stubs are databases that have not completed their initial replication. Once replica stubs are found, Power Tools can force replication or delete selected replica stubs.
Find Replicas Not In A Cluster
Finds replicas of a database that are not on a matching cluster server. For example, you may not want replicas of a user's mail file to exist on any server other than the user's mail server and the cluster/failover server(s). This tool will help you find and delete these databases.
Find Replication Or Save Conflicts
Searches the specified server and databases for replication or save conflict documents. Replication conflicts occur when changes are made to the same document on different servers. Save conflicts occur when one or more people are making changes to the same document at the same time. Notes stores conflict documents as a response to the document that it has conflicted with.
Hub / Spoke Replica Check
This utility checks to see if databases that exist on a hub server also exist on one or more spoke servers. You can specify whether you want this utility to report spoke servers that DO contain a replica or report spoke servers that do NOT contain a replica of each database found on the specified hub server. You can use this utility to identify databases that have too many replicas or specific spoke servers that don't have a replica database that they should have. You can even sort the results by the number of replicas reported to determine a database that is on a hub, but less than two spokes to identify and eliminate unnecessary replication and wasted disk space.
Replication Check can be used to find replica copies of databases with significantly different numbers of documents. A replica copy of a database with more documents than another may indicate databases that are not replicating correctly. Replication Check can check all databases on a number of servers for this condition. After problem databases are identified, they can be examined further by Power Tools to locate specific documents that exist in one replica, but not in another to help you determine what the actual replication problem is.
Replication Check 2
Replication Check 2 can be used to find documents that exist in one replica copy of a database, but not in the other. This utility will produce a list of document UNIDs that were found in one replica, but not in the other. This list can then be used to open each document so you can examine its properties. Replication History At A Glance - Scans the replication history log in each database and reports the server and database replicated with as well as the replication date / time and the replication direction. Replication Settings At A Glance - Reports various replication settings for all or selected databases. Replication Volume: Scans the replication events view of LOG.NSF and reports KB sent and received for each listed database. Also reports documents added, deleted and updated.
Buy it NowThis is a downloadable email product only. No media will be shipped.
|Power Tools 5.0 Single User License |
License key for 1 Administrator
|Power Tools Maintenance & Support 1 Year|
Upgrade to v5.0