Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
KNOWLEDGE-MANAGEMENT SYSTEMS FOR LAW FIRMS
Document Type and Number:
WIPO Patent Application WO/2004/061619
Kind Code:
A2
Abstract:
The present inventors devised unique systems, methods, interfaces, and software for managing and leveraging knowledge in law firms and potentially other enterprises. For example, one system provides a single user interface (220) for researching case law for online legal research (210) service and identifying and accessing law-firm documents.

Inventors:
RHOADS FORREST (US)
LIGGETT TRACE (US)
Application Number:
PCT/US2003/041708
Publication Date:
July 22, 2004
Filing Date:
December 30, 2003
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
THOMSON CORP (US)
RHOADS FORREST (US)
LIGGETT TRACE (US)
International Classes:
G06Q10/00; (IPC1-7): G06F/
Foreign References:
US20030144969A12003-07-31
US20040095378A12004-05-20
US20040193943A12004-09-30
US5815392A1998-09-29
US5497317A1996-03-05
Other References:
DAGOSTINI BUENO ET AL.: 'Jurisconsulto: retrieval in jurisprudential text bases using juridical terminology' INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND LAW 1999, pages 147 - 155, XP002957236
See also references of EP 1586055A2
Attorney, Agent or Firm:
Steffey, Charles E. (Lundberg Woessner & Kluth, P.A., P.O. Box 293, Minneapolis MN, US)
Download PDF:
Claims:
Claims
1. A computer system comprising: means for receiving a query from agents of a law firm; means, responsive to the received query, for searching at least first and second physical or logical databases for content related to the query, with the first database including workproduct documents of the law firm and the second database including nonworkproduct documents of the law firm.
2. The system of claim 1, wherein the first and second databases are separated by a firewall.
3. The system of claim 1: wherein the work product documents include briefs, client correspondence, advisory opinions, or legal memoranda; and wherein the nonworkproduct documents include case opinions, court documents, law review articles, statutory materials, and legislative histories.
4. The system of claim 1, wherein the means for receiving a query includes a graphical user interface for displaying a taxonomy of selectable legal topics, with selection of one or more of the legal topics indicative of a query being received.
5. The system of claim 1: wherein the query includes an identification of a legal case; and wherein the system further comprises means for displaying at least a portion of the. documents found by the means for searching, with each displayed portion associated with an indicator of whether the document is a workproduct document and with a depthoftreatment indicator indicating a degree of treatment of the legal case within the document.
6. The system of claim 5, wherein each displayed portion associated with an indicator that indicates the document is a workproduct document is further associated with information identifying an author of the document, an office location of the author, and an identification of documents within a document management system for the law firm.
7. The system of claim 1, wherein the query includes an identification of a legal case; and wherein the system further comprises means for displaying at least a portion of each document found by the means for searching, with each displayed portion associated with: a selectively displayable table of authorities listing documents cited within the document; a selectively displayable listing of other documents citing the document; a selectively displayable listing of workproduct documents Citing the document.
8. The system of claim 7, wherein each listed document is associated with a depthoftreatment indicator indicating a quantitative and/or qualitative degree to which the listed document treats the legal case and one or more of the listed work product documents are associated with a feedback indicator selectable to view one or more user comments on the one or more listed workproduct documents.
9. The system of claim 7, wherein each portion of the documents found by the means for searching includes a selection device for invoking display of text of the document, with text including one or more selectable citations to other corresponding documents and with each citation associated with an indicator of current reliability of its corresponding document as a legal authority.
10. A method comprising providing an interface for an online legal research service, wherein the interface enables an authorized law firm user to view search results including both internal lawfirm content and content of the online legal research service, wherein the search results are based on a single query submitted or initiated through the interface by the user.
11. A method comprising providing. an interface for an online legal research service, wherein the interface enables an authored law firm user to view search results including both internal lawfirm content and content of the online legal research service, wherein the search results are based on a single query submitted through the interface by the user.
12. 12: A machinereadable medium comprising one or more instructions for providing an interface for an online legal research service, wherein the interface enables an authorized law firm user to view search results including both internal lawfirm content and content of the online legal research service, wherein the search results are based on a single query submitted through the interface by the user.
13. A browsercompatible user interface (specification) for an online legal research service, wherein the user interface specification defines a user interface that enables a user at a law firm workstation within the law firm firewall to access internal law firm work product documents and external case law documents by initiating or submitting a single query via the interface.
Description:
Knowledge-Management Systems for Law Firms Copyright Notice and Permission One or more portions of this patent document contain material subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyrights whatsoever. The following notice applies to this document: Copyright C 2002, Thomson Legal & Regulatory, Inc.

Related Applications This application claims priority to U. S. Provisional Patent Application 60/437,169, which was filed on December 30,2002 and to U. S. Provisional Patent Application 60/480,476, which was filed on June 19,2003. Both of these applications are incorporated herein by reference.

Technical Field Various embodiments of the present invention concern information retrieval systems and knowledge-management systems, particularly such systems in a legal- research or law-firm context.

Background The American legal system, as well as some other legal systems around the world, rely heavily on written judicial opinions, the written pronouncements of judges, to articulate or interpret the laws governing resolution of disputes. As a consequence, judges and lawyers within our legal system are continually researching an ever expanding body of past opinions, or case law, for the ones most relevant to resolution or prevention of new disputes. Found-cases are studied for relevance and are ultimately cited and discussed in documents, called work product, which, for example, advocate court action, counsel clients on likely court

actions, or educate clients and lawyers on the state of the law in particular jurisdictions.

Over time, law firms, particularly large one with scores of lawyers and hundreds of clients, amass large collections of work product. In attempting to manage and leverage the value of these collections, many law firms in the last decade or so have sought to use knowledge-managements systems.

Most, if not all, of these systems have been built around document- management systems (DMSs) that assist in storing, indexing, and searching law- firm documents. The indexing and searching capability of these systems allows lawyers to reuse some of their work product, and thus have in some instances enhanced the efficiency of lawyers in developing new work product.

However, the present inventors have recognized that centering a law firm's knowledge management on document-management systems presents at least two problems. First, the document collections in these systems are generally undisciplined in the sense that they include multiple versions of the same document, non-legal documents, and so forth. Thus, searches in the DMS collections often turn up marginally relevant documents or draft documents that frustrate efforts to quickly identify the high-quality finished documents most likely to have reusable content. Second, even when apparently reusable documents are found, it is necessary for lawyers or other highly trained personnel to assess not only whether their legal arguments are of high quality, but also whether their supporting case law has been overruled, weakened, or otherwise affected by newer case law or other legal developments. (Even with online legal research services, such as the Westlaw online service, that allow one to check the validity of case law on a case-by-case basis, ) this assessment is generally time consuming and thus offsets the efficiency gains of reusing work product.

Accordingly, the present inventors have identified a need for better systems, tools, and methods of managing and leveraging the accumulated knowledge within law-firm document collections.

Summary To address this and/or other needs, the present inventors have devised unique systems, methods, interfaces, and software for managing and leveraging knowledge in law firms and potentially other enterprises. For example, one system provides a single user interface for researching case law for online legal research service and identifying and accessing law-firm documents. The interface allows a user, such as an attorney, to initiate or submit a legal research query and view search results that identify not only relevant external documents from the online legal research service, but also relevant internal documents, such as briefs, client letters, and legal memoranda, from the law firm's own document collection.

Moreover, in this exemplary system, the external and internal documents are displayed with validity indicators, such as color-coded icons, that indicate whether cases they cite are still valid law, enabling the attorney to more readily assess the strength or weakness of each identified document.

Notably, the exemplary embodiment provides a seamless integration of the internal and external documents, yet the internal documents never leave the security of the law firm firewalls.

Brief Description of Drawings Figure 1 is a block diagram of an exemplary information system 100 corresponding to one or more embodiments of the present invention.

Figure 2 is a flow chart corresponding to one or more exemplary methods of operating an information system and associated components that embody the present invention.

Detailed Description of Exemplary Embodiments The following description, which incorporates the figures and the appended claims, describes and/or illustrates one or more exemplary embodiments of one or more inventions. These embodiments, offered not to limit but only to exemplify

and teach the invention (s), are shown and described in sufficient detail to enable those skilled in the art to make and use the invention (s). Thus, where appropriate to avoid obscuring the one or more inventions, the description may omit certain information known to those of skill in the relevant art.

Exemplary Information System Figure 1 depicts an exemplary information retrieval and knowledge management system 100 that incorporates one or more teachings of the present invention. System 100 includes a commercial online legal-data (or research) provider 110, a law-firm information-management system 120, and a client access device 130.

Specifically, commercial online legal data (or research) provider 110 includes main databases 112, reference identification database 114, and server 116.

In the exemplary embodiment, main databases 112 contain a wide variety of legal documents, including for example, case law (judicial opinions), legislation, and journal articles. Reference identification database 114 includes a list of document identifiers and corresponding citations, with each document identifier and citation corresponding to a document within main databases 112. Databases 112 are coupled to server 116.

Server 116, representative of one or more servers, includes a processing unit 1161, and a memory 1162. Memory 1161, which can take the form of an electronic, magnetic, or optical computer- (or machine-) readable medium, includes one or more one or more search engines, and other modules and software, such as browser-compatible user-interface elements (UIEs) for receiving and fulfilling queries from clients.

In the exemplary embodiment, server 116 serves active or dynamic content in the form of hypertext markup language (HTML), extensible markup language (XML), or more generally a markup-language, documents or pages. To this end, the exemplary server supports the following web services or protocols: TCP/IP, SOAP (HTTP, HTML, XML), and UDDI. Additionally, the UIEs of server 116 include one or more Java scripts, applets, or other related software and data structures for serving data in association with desired interactive control or user-

interface features, objects, modules, or elements. (In some embodiments, the HTML pages include URL or other embedded instructions that include one or more portions of queries submitted from an access device, such as access device 130. ) These features work in conjunction with client processor and software platforms to define one or more portions of a browser-based graphical user interface for legal research. Server 116 is coupled or couplable, for example, via an Internet Protocol (IP) network, to law-firm information-management system 120.

Law-firm information-management system 120 includes a document- management subsystem 122, and a knowledge-management subsystem 124.

Document-management subsystem (DMS) 122 includes a DMS database server 1221 and a DMS database 1222. DMS database 1222 includes internal firm work- product documents, such as briefs, legal memorandum, opinions, letters, and multiple versions of same in multiple stages of completion. It may also include non-legal materials. The contents of the DMS database are generally associated with metadata profiles indicating authors, creation dates, update dates, client numbers, security settings, access restrictions and so forth.

Knowledge management subsystem (KMS) 124 includes a KMS server 1242 and a KMS database (or document repository) 1244. KMS server 1242, which may present one or more servers depending on loading and performance issues, includes a full-text index module, an engines-and-applications module, an HTML library module, a metadata database module, a citation index module, and a usage-and-tracking module, all of which are not shown as separate items in Figure 1.

In the exemplary embodiment, full-text-indexer module is used to facilitate general retrieval of documents from KMS database by indexing documents and/or providing index data. Engines-and-applications module includes the following engines and applications: citation-identification engine, full-text search engine, KeyCite Flags engine (see appendix for further details); scheduler application for handling migrating documents from DMS database, DMS integration components, and system administration tools.

HTML library module stores HTML version of each document contained in the research repository, including KeyCite flags and tags. Metadata database module 1242D stores descriptive information and attributes of documents contained in the KMS database, includes information from the DMS database.

Citation index module indexes the citations relationships between documents to maintain flags and tags on citations. And, usage-tracking database stores and maintains a historical log of all search and retrieval activity containing detail information by document name, author, area of law, and user ID.

KMS database stores a selected set of high-quality internal work-product f-i documents. In the exemplary embodiment, these documents are copies of documents selected from DMS database 1222. When copied into KMS database 1244, one or more portion of the metadata profile data is also incorporated into KMS database.

Law-firm information-management system 120 and online legal-research provider 110 are both communicatively coupled or coupable, via a local-area network (such a corporate intranet) or wide-area network (such as the Internet) to access device 130.

Access device 130, which is generally representative of one or more access devices within a business organization, such as a law firm, takes the exemplary form of a workstation. In addition to a keyboard 131 (lower left hand corner), a mouse (graphical pointer) 132, and a display 133, access device 130 includes a processing unit 134, a memory module 135, and a browser-compatible legal- research interface 136.

More particularly, processing unit 134 includes at least one processing circuit. Memory module 135, which takes the form of one or more electronic, magnetic, optical machine-readable mediums, includes operating system 1351, a browser application 1352, and a word processor application 1353.

Operating system 1351, which cooperates with processing unit 134 and takes the exemplary form of the Microsoft Windows operating system, includes a set of user-interface objects, modules, or elements, accessible via application programs such as browser application 1352. Browser application 1352 takes

exemplary form of a Microsoft Internet ExplorerTM or Netscape Navigator browser, cooperates with operating system 1321 and externally provided data, coded instructions (collectively UIEs) from servers such as (external legal- research) server 116 and internal KMS server 1242, to define and render, on display 133, browser-compatible legal-research interface 136.

Legal-research interface 136 includes a query portion 1361, an external re- results portion 1362, an external document display portion 1363, an internal- results portion 1364, and an internal document display portion 1365. In the exemplary embodiment, portions 1361-1365 are not necessarily displayed or accessed simultaneously. For example, the interface can include tabs and full- screen-display options that enable the user to focus the display on particular portion of the data or interface portions. One embodiment provides one folder tab to invoke display of a combined listing of internal and external results with corresponding indicators to distinguish internal results from external ones and the other to invoke display of internal results only.

Query portion 1361 includes a label portion L and one or more associated interactive user-interface (UI) elements (objects, features, or widgets), E and EE (referred to hereinafter as label portion 1361L, and elements 1361E and 1361EE.) Label portion 1361L is defined to display a query-indicator label, such as"Search Based on this New Citation,""KeyCite this Citation, or"Search these Databases," to indicate to a user that some form of query input is expected within this portion of the interface. UI element 1361E accepts input from a user. In the exemplary embodiment, this UI element takes the form of a text box or menu, with the menu enabling the use to select a target for the query, such as the KMS database. As a default, the exemplary embodiment will run the query against the KMS database in combination with any other database set that is selected. (Some embodiments provide a set of UI elements that enable the user to select from a number of predefined category-or subject-matter-specific queries. The queries are defined, for example, by expert legal researches in the specific legal areas. A hierarchical organization or outline of the queries facilitates user selection of the appropriate

query by the user. The user may also view the details of the predefined queries and modify as desired prior to submission.) UI element 1361EE allows a user to initiate submission and execution of a query defined via user-interface elementl361E. The exemplary embodiment provides this feature in the form of a"go"button, which upon actuation results in transmission of the defined query (or relevant portion of it) to not only main database 112 (server 116), but also to KMS database XYX for fulfillment.. (In some embodiments, the query is submitted only to KMS database XYX.) External-results portion 1362 is defined to display search results obtained or received from online legal-research provider 110, or more precisely its main database 112. In the exemplary embodiment, external-results portion 1362 includes one or more document identifiers or descriptors 1362D which are displayable in association with corresponding user-interface element L1.

Descriptor 1362D provides information regarding a corresponding external-results document within database 112. In the exemplary embodiment, this information includes a title T1, metadata M1, and a case validity flag F1. UI element Ll, for example a hyperlink, provides an option which can be invoked for example, by clicking, to retrieve and display the document (s) associated with descriptor 1362D, as indicated by document display 1363.

Document display 1363, which in some embodiments is presented in a spit- screen along a listing of the internal and/or external results, displays at least a portion of the external document associated with UI element L1. The document includes text (denoted by the broken lines) and legal citations CA and CB, which are respectively associated with case-validity flags FA and FB and hyperlinks LA and LB. Selection of hyperlinks LA and LB all a user retrieve the documents corresponding to the citations from online legal-research provider 110.

Internal-results portion 1364 is defined to display results of querying internal firm database, KMS database 1244. In the exemplary embodiment, internal-results portion 1364 includes one or more sets of document-specific UI elements, such as UI element set 1364D, one or more of which are displayable in association with a corresponding UI element L2. Each UI-element provides data

or access to data about the contents of an associated internal-results documents, such as a document title T2, metadata M2, case-law validity flag F2, and law-firm rating R2.

More precisely, metadata M2 includes one or more portion of the metadata associated with the original DMS copy of the identified document. (The exemplary embodiment populates KMS database with copies of documents selected from DMS database. ) In the exemplary embodiment, this includes author, client, document ID, dates of creation and revision, etc. Case-law validity flag F2 provides an indication of the validity of case law cited within the corresponding firm document. Law-firm rating RI provides an indication of the utility and/or quality of the document as determined by previous law-firm users of the document.

UI element L2, similar to UI element L1, provides a user option to retrieve and display the internal document (s) associated with descriptor 1364D. Exercising this option results in a display document display 1365.

Document display 1365, which in some embodiments is presented in a spit- screen along a listing of the internal and/or external results, displays at least a portion of the internal document associated with UI element L2. The document includes text (denoted by the broken lines) and legal citations CA and CX, which are respectively associated with case-validity flags FA and FB and hyperlinks LA and LX. In addition to providing a visual indication of case-law validity, the case- validity flags can be selected in some embodiments to cause retrieval and/or display of further information regarding the nature of the flags. Hyperlinks LA and LX all a user retrieve the documents corresponding to the citations from online legal-research provider 110. In addition to the text and citations, document display 1365 provides a firm-name label FN to clearly identify the document as an internal law firm document, a title label T2 for indicating the title of the corresponding internal document, and a load-copy UI element LC for enabling user to initiate loading of a copy of the corresponding internal document directly into a word processor application of access device 130 for use in generating a new work product document. Moreover, document display portion 1365 also includes a ratings UI-element R1 which enables a user to see the current law-firm-user rating

of the document as well as to rate the current document. Figure X shows an exemplary set of UI elements for achieving this rating.

Exemplary Method of Operation Figure 2 shows a flow chart 200 of one or more exemplary methods of operating an information-management system, such as system 100. Flow chart 200 includes blocks 210-280, which are arranged and described in a serial execution sequence in the exemplary embodiment. However, other embodiments execute two or more blocks in parallel using multiple processors or processor-like devices or a single processor organized as two or more virtual machines or sub processors.

Other embodiments also alter the process sequence or provide different functional partitions to achieve analogous results. Moreover, still other embodiments implement the blocks as two or more interconnected hardware modules with related control and data signals communicated between and through the modules.

Thus, the exemplary process flow applies to software, hardware, and firmware implementations.

At block 210, the exemplary method begins with a law-firm user, such as an attorney or paralegal, initiating a search session with online legal-research system 110. In the exemplary embodiment, this entails the user at access device 130 logging onto a law-firm network using security measures, such as an assigned username and password. After login, the user then launches and directs the Internet browser within access device 130 to connect to the online legal research system. In some embodiments, the user enters a separate username and password to initiate the search session, and in others the previous network login suffices.

Execution continues at block 220.

Block 220 entails displaying or otherwise loading and presenting one or more portions of legal-research user interface 156. In the exemplary embodiment, this entails server 116 of online legal-research system 110 sending an HTML document (or webpage) that includes scripts, applets, and associated data for causing access device 130 to display query portion 1361 of user interface 136. For users at law firms that have a knowledge management system, such as

management system 100, which is provided or authorized by the online legal research system, the associated data includes at least one firm-name label to use in labeling specific portion of the user interface as well as the name of KMS server 1242, which is configured and/or authorized to access KMS database 1244.

Execution continues at block 230.

Block 230 entails the user defining and submitting a query. In the exemplary embodiment, this entails the user defining a query using query portion 1361 of interface 136. Query portion includes features, such as a text box or pull- down menus that enable the user to define a citation, natural-language, or terms- and-connectors query. The interface also presents the user an option to specify the scope of the search or query as including one or more databases within online legal research system and/or at least one internal law firm database. Options related to identifying the internal law firm databases are labeled based on the firm-name label provided by the online legal research system. After defining the query, the user submits it to system by actuating a UI element, such as a"go"button, using an input device, such as a mouse or keyboard. The query is then communicated over the Internet to server 116 and KMS server 1242.

Block 240 entails searching databases at one or both of the online legal search system and the law-firm information management system based on the submitted query. In the exemplary embodiment, online legal-search system 110, or more precisely, server 116 executes or causes execution of the query against the requested databases, and returns results the search (external results) to access device 130 in the form of HTML documents with associated control features and data. If the query was defined to include law-firm databases, an applet, script or other device is returned along with the external results of access device 130 to trigger or cause access device to call KMS server 1242 to execute the query against an internal law-firm database, such as KMS database 1244. Some embodiments may call the KMS server concurrently with submission of a query identifying an internal law-firm database. In any case, KMS server executes the search against the KMS databases and serves results in the form of a mark-up

language document, such as HTML, to access device 130. Execution of the exemplary method continues at block 250.

Block 250 entails presenting the search results. In the exemplary embodiment, this presentation entails presenting the internal results and the external results via the browser interface in association with one or more sets of UI elements (or interactive control features), as shown in Figure 1.

Block 260 entails displaying an internal law-firm document from internal results set. In the exemplary embodiment, this entails the user selecting a UI element, such a link, associated with one of the listed internal documents and the KMS server retrieving the document from the KMS database and serving it to the access device. Notably, the KMS server automatically updates the document to the current state of the law-that is, current validity flags are inserted next to all of the authorities in the document. The KMS server requests these from the online legal-research provider-in real time-an inserts them prior to serving up the pages to the access device. Another feature of this interface allows the use to click on an UI element and move the mouse cursor to each place in the document that contained terms from the search, for example, a citation in the case of a citation search.

Block 270 entails loading the displayed internal document into a word- processing application program. In the exemplary embodiment, this entails the user selecting a"load copy"icon LC on the internal-document display portion 1365 of interface 136. In response, user interface 136, which includes an appropriate application program interface, launches or otherwise communicates with the word-processing application to load the document from interface 136 into the word-processing application for user modification. In response, tracking system data within KMS server 1242 is also updated to reflect usage of this internal document. (The exemplary system generally tracks everytime a user clicks on something, specifically creating a usage-record indicating-the date, time, user, client-mater, type of transaction.)

Block 280 saves the modified copy of the internal document in the DMS database as a new work product document. In the exemplary embodiment, this entails the user also providing metadata profile data for the new document.

Exemplary Method of Building the Research Repository In the exemplary system of Figure 1, knowledge-management subsystem 120 includes KMS database 1244, which serves as a research repository of documents selected from DMS database 1224. KMS server 1242 includes software (that is, coded instructions) for automatically migrating or mirroring select documents from firm's DMS or network file system to the KMS database 1242.

In the exemplary embodiment, this migration process initially entails retrieving one or more documents from DMS database, for example, using administrator defined queries and executing those queries on a scheduled basis or event-driven basis. Next, the exemplary method entails converting the retrieved documents into a markup language, such as HTML, subsequently indexing the converted documents based on citations and text. The next series of operations include storing citation relationships, storing the HTML documents with tagged citations, and storing document profile data all in a relevant portion of the KMS server.

APPENDIX The following appendix includes a detailed user guide and an administrative guide of an exemplary knowledge management-system and related software and components that corresponding to one or more embodiments of the present invention. j i 4 E W . : r/a. p _ 'Ei. L'< tu | | | | | l | | X | | | r e _-___ iSm S li ! ; ii _ l _b 'R1 p"i : I__ v i i 1 _ i3 _ 3 ___ r , ri e li nr§tii ii . i ri i r t ' i : : . : i ijiiiiiiY ? i iii uiu : ry : , : i. iiiiiii ? ii i ? i ? IAI :"'>u. . il il : il 1i3 e3M aas v i ! j ii3 iu> ; NU urJae i°u6ii Issi i, ns . : : nn : : m.. - iii ia I ; iii I Yis"ails a'., ? I i : laa ai a, i'i,'ii ia. i ile. _ ; j Contents Welcome to West km 1 West km Features System Requirements West km and Westlaw Usage Retrieving Your Organization's Documents Using KeyCite 3 Retrieving Citing Documents from a Displayed Westlaw Document Retrieving Citing Documents from a Westlaw Citations List 5 Searching for Your Organization's Documents 6 Searching Only Your Organization's Documents Searching Westlaw and Your Organization's Documents Searching for Documents with KeySearch 10 Using Westlaw Search Browsing Your Organization's Retrieved Documents 18 Viewing a Document Choosing a Page View 20 Opening a Document 21 Using Knowledge Management Features 22 Building a Citations List Using KeyCite 23 Searching Documents 24 Searching for a Document with KeySearch 25 Detailing a Specific Document 28 Understanding KeyCite Information 29 KeyCite Status Flags 29 Depth of Treatment Stars 31 Generating KeyCite Information for Your Document 32 Adding Citation Links and KeyCite Status Updating KeyCite Status Hiding and Showing Citation Links and KeyCite Status Flags 36 Deleting Citation Links and KeyCite Status Flags 36 Linking to Documents on Westlaw 37 Accessing KeyCite Information on Westlaw 38 Welcome to West km Welcome to West km (West knowledge management), a legal research product from West that integrates KeyCite and full-text search technology with your organization's internal documents, such as briefs and memoranda.

West km Features West km allows you to easily find and reuse your organization's best work via westlaw. com and generate KeyCite information for your own word-processing documents. With West km, you can t build a citations list of your organization's documents. search your organization's internal documents using Westlaw# search methods, including Terms and Connectors, Natural Language, and the KeySearch hierarchy of legal topics.

# search your organization's internal document and Westlaw documents simultaneously, using those same Westlaw search methods.

# generate KeyCite information for your word-processing document, so you can quickly and easily evaluate the validity of sources that you are citing in your document. update KeyCite information in your word-processing document, so you can take advantage of the currentness and accuracy of KeyCite in your own document and quickly identify the citations whose KeyCite status has changed. link from your word-processing document directly to documents and KeyCite information on Westlaw.

This guide assumes you have some familiarity with basic searching in westlaw. com; for more information, see Using westlaw. com. This guide includes basic information about KeyCite; for detailed information, see Using KeyCite in westlaw. com.

System Requirements Your administrator will index the appropriate documents at your organization so they can be identified with West km. To make use of all West km features once this indexing process is complete, you must have the following: The Windows XP, 2000,98, or 95 operating system Microsoft Word 2002,2000, or 97 word-processing software (for the feature that allows you to generate KeyCite information for your word-processing document) Microsoft Internet Explorer 5. x with JavaScript enabled a the ability to sign on to your organization's network o A Westlaw password Depending on your organization's West km setup, a West km username and password may also be required. If so, your administrator will provide this information, and you will be prompted for it when accessing West km content from your Web browser or word-processor.

West km and Westlaw Usage With West km, the westlaw. com interface allows you to easily access your organization's internal document and Westlaw documents simultaneously.

When you access only your organization's content in westlaw. com, Westlaw usage charges do not apply. Regardless of your pricing method-hourly or transactional- all Westlaw usage charges, including connect and communication charges, are suspended when you do any one of the following activities in westlaw. com: N access one of your organization's documents in the right frame (see page 18) access the Search page for searching only your organization's documents and conduct a search on only your organization's documents (see page 6) browse the KeySearch hierarchy for your organization (see page 10) click More Information on a results tab and access the West km pages (see page 22) Westlaw usage charges are activated again when you access content related to Westlaw.

2 Welcome to West km Retrieving Your Organization's Documents Using KeyCite Once your administrator has indexed your organization's documents to be used with West km, you can easily find your organization's documents that cite Westlaw documents. In westlaw. com, your organization's West km icon indicates that one or more of your organization's internal documents cite a particular Westlaw document.

Retrieving Citing Documents from a Displayed Westlaw Document When you are viewing cases, statutes, or administrative materials in westlaw. com, your organization's West km icon is displayed in the document header when the document is cited in your organization's documents. To access your organization's documents that cite the Westlaw document, click your organization's West km icon (Figure 1). I p ! 1t. Click your organization°s West km icon to access yourorganization's t mi Hoolinv. EnvironmdentelPowerLtd. + E west t ;. y., y 3tew D. C. 1976. citing documents. Ut Kc fiittdry ke ti*dno ) toto aMluas3 Newcit3tton£p,. (Q ; : . J. ppC (5) P'sbrouJtactionrequestingetherrescissionofsetdemeDtagreemeat and enforcement of onginal contract to sed option wartanted to include sttip-miDiDg iDnnt All Op60ns ii rights 3s wYeD as asnerai ngl ts to ceri3in coai i3nd and moneyjudgnent, or J edorceinent ofsewement agrecment and money judgment, and defendants moved standard Ulst'I Enbitared tilt, d to dismiss, The Supe6or Court ofthe District of Columbia, Dewitt S. Hyde, l., Ed granted summary judgment for defendants, and plamtiS appealed. The Couft of 36o A. 2d qg3 AppeaLs, Kem, J., held that legal statute oflinutations was applicable to rescission D (j count, that rescission count, which sought to set aside original contract for Julo61yy6si ; : , ib. aa. e : a7 &audulentmisrepresentation, wasbartedbythree-yearstatuteofltatioDS, since -- alleged misrepresentafion that option purchased by defendant from plaiDtiffs did not include strip-minip tights under PennsylvaDia law should have beeo ascertained in the exercise of due diliEgence before padies settled previous suitreLating to such opdon contract, and dia claim seeking royalfies that allegedly had accrued within three-year penod pnor to commencement of action was not barred by statute of r..-p Figure 1: An organization's West km icon in a Westlaw document header Your organization's citing documents are listed on your organization's Citing Refs subtab, e. g. , Stevens Citing Refs (Figure 2). Westlaw sources that cite the document are listed on the KC Citing Refs subtab.

Depending on your organization's settings, your organization's citing documents are listed one of two ways: (1) in reverse chronological order, based on the date the document was last modified, or (2) by their depth of treatment (see page 32), and then reverse chronological order. To restrict the list of your organization's citing documents, such as to an office location, select an item from the Viewing docs from drop-down list. View a list of your organization's citing KIVS Mom Refssubtab. * f^t-tiffn t s' t,, D. dd. d luly 6, 1976. (Appreu. 6 paqu) Refssubtab. Itattic ; 7' P& bro action se e organization's Citing D, C. mforcarlent of osinal contratt to sell optioa waranted to inelude ship-mmmg rights n wenuminemrigbbto certain coal land and moneyjudgmera, or 'pt¢pjt. AJI Lacationa.. ° of setdemeot ageemeat and money judgaent, and defmdants moved ; y ; to dismiss. TLe Supedor Court of ihe Dishict of Columbis, Dewitt S. Hyde J , gaated sugy judgment for defmdanb, md ph ti appeakd The Coutt of Appeals, Kmn, J., held dw legal statute offimaafiom applicable to rescission .", (Showt counk dw osdstion cotnit which sought to set aside original contract for fiwdulent i. misrepresentation, wasbartedbythree-yearstatuteoflitatioas. siacealleged mimwsentefion that option purchased by dcfmdarit from plain6 didnotinchide s*-min grighbun (terpemvk a law should have be= mc"tained in the -4pi4*tP ; *+iFii ;. ersercue of dtse diEgencebeforepfffties setUedpreviofu snitrebiangto ffechoption _ W°"P jRst - coatrac and dat claim se ro a, 4IG4t4 ts4$i. -k rJdDB ya>dcsthatallegedlyhadaccsvedwithree yew yeapesiodpsiortocommencementofactioawasaotbamdbystaDrteof Ong, .. .. ped m part aad remandeel m part i < iritW'z'4.., 3Sg West Ileadnotes t West Headnotes .-r. , w4.. F,... iQG ! L'afat#llusazYY -H. y 'ir. T3piH4r :.'"-. ', O=-7 L 2. ; t. OCnIe Figure 2: An organization's Citing Refs subtab 4 Retrieving Your Organization's Documents Using KeyCite Retrieving Citing Documents-from a Westlaw Citations List West km is also integrated with the other Information Tabs and research tools in westlaw. com. When you are viewing a list of documents on the Cite List, KC History, or TOA tab, or viewing a list of documents from a KeyCite Notes result, your organization's West km icon is displayed next to a document citation when that Westlaw document is cited in your organization's documents.

To access your organization's documents that cite the Westlaw document, click your organization's West km icon next to the document citation (Figure 3). Click your click tour km icon to access km icon to access'. f # i °d _I ll I S' Mnm = 196 F. R. D. 275 : j' (G#, ' [, , a O echwartz v. Dana Corp./Parish olv. rHOMSwr w organization's West H w 'j"t E. D. P 700 citing documents. . 4, cwæ ! S ipiBA g. . p p ' r Fmployee sought eLus catification oflus suit against employer, affeging that ..,. employa conducted improper survei0aace of employees in the wodcplace m violation ofpenns*aas W=tap Act The Dktrict Courk Van Antwelpm 1.. held ffid individual issues would predominate over common issues because each class bu would have to prove habrity and damages, and thus, class , a-w , ceztificationreqvirementswerenotmet -.. Motioa devied. ,'tPS, I2 ; FY 2 ? S'. WestHeadnotes avl ; P. UxYanNaxa f Sd, l3 ; : [IlKevc, te Notes -,-170A Federal CigiProcedc (-17,) AI [Parfies u.. 170AE (D) llnGeneral 12las In G=ffal 1J, tzls ldtt Locate Figure 3: An organization's West km icon on an Information Tab Your organization's citing documents are listed on your organization's Citing Refs subtab, and the Westlaw document is displayed in the right frame.

Retrieving Your Organization's Documents Using KeyCite Searching for Your Organization's Documents With West km, you can search your organization's internal documents using the westlaw. com interface and Westlaw search methods. You also have the option to simultaneously search your organization's internal documents and publicly available information on Westlaw. In this way, you can seamlessly access both internal and external sources in your research.

Searching Only Your Organization's Documents To search only your organization's documents, complete the following steps: 1. Click your organization's Documents link (e. g. , Stevens Documents) at the tabbed Westlaw page (Figure 4) in westlaw. com. i ni i Click your Documents link to Documents linkto ; '"_ 1 Ft'"1 t ; itcr t# ; '"° s"'"n I sat. ss. a. t ; nora # : searchOnl OUr' "StaadardEdidon-WelcometoWasdew" Y Y fa (tttttttts daf0. ltttt 6 at t vnt ; k Wesdaw --.-y'C lrsbtiQhts : Fair Housing Ast does not impose mcadous Gabhty on 9x. organization's p. _,, corporate owners or officers--see VJLB-SCT Judicial caadidate's action nmolved = documents. r attdSFtinf A''bar association's &ee speech rights--see VILB Arbarafion agreement b Oyer and employee ww Mmory and thus uacafomeablc--see WTEE-LB "' Chatges for allDw &Bradsneet databases aad selected BNA databasea wgt change on Fez. 1. 2003. See SUBSCRIBER for details. Read about the BNA price changes at http :/hvmv. westQroup. coaJeustomerservieelbnalW- 107928-FmaLpdf. . ; i.. '. £ .. wesdaw haog on the Wahl Le= to find documents. search databases use Xeyc. ft pr-mt and save research. and use resources outside your subscription plan , www. wastoup. eomfevebtra 'Recent Databasas ; w f - Favorite Databasas : - Price changes for accessing cases through hnks from headnotes databases and the ! itecfive Feb. 15, 2003. Access SLTBSCRIBER for details. tavnns Ctacumenfs DATA13ASE ANNOUNCEAMTS (For more infomation. enter 14EW from VMt'<Me' ; t). m Birectorf-'.-theDirectoty.) Find'a Databas. Wlzgitd PROFIEFR-ALL , ProfilesofAttorneys, JudgesandExpertWitnesses catt'ing Started Tips Figure 4: An organization's Documents link at the tabbed Westlaw page 2. At the Search page (Figure 5), click either Terms and Connectors or Natural Language as necessary, depending on the search method you'd like to use. See "Using Westlaw Search Methods"on page 14 for more information.

3. Type either your Terms and Connectors query or your Natural Language description in the text box.

6 4. Click Search. Type a Terms and Type a Terms and Connectors query or a Natural Language description in the text box and CiICf Datahase : stevens Documents Cnanne Databasets7 Search. Terens end Connectors I tJahiral t. annuane ^inaucence pollcy^/n eovecnge peciod/n effect !/p damege iejur ., < I 4 RacenlSeerchBB _ _ _ _' ; w Double-click on a selection to add an item to your search 4ozcto. tSPX ;, AND 8 ; OR apace phtase inaemeaentence/s inaemepemgreph/p Figure 5: The Search page when searching your organization's documents Retrieved documents are listed on the Cite List tab, with the first document in the result displayed in the right frame (Figure 6). When searching your organ»- organization°s e o Cn TebflpfGniittents e r More _ documents, retrieved.......... C (Gtt. f&t IasuranceCoverageforDefecHeeConsUructlon su documents are listed.' ? DocNoa3256 s. >, w... on the Cite List tab. Author : Ronald L. izichman 1/18/2000 q$tdbh 9tgueeSsbaCttmen_ ts The first document in INSURANCE COVERAGE FOR DEFECTTVE CONSMUCTION the result is displayed + ; in the right frame. "r) "'n : RonatdL Rrmaa , ° ,--.-Mnm oanan rt > : Copynght t 2000 Arnericr n Brrr AssosusSon : Ronald L Richman', ^ ; Author Tnsurance cover for defective construction is never more real than to a contractor- : Author. RonaIdL. Riahman ,. . age with inited or nonmiitent resources who, all= the completion of a work of : improvement, is faced with defading aa action by a third pady for property damqe jj tu . r g5q.. : arisn, g out of conatmctioa defect daims. ConGonted with the rcaiEy of beiag unable,. to shoulderthe defense costs or a potentialjudgmmg shotdd the claimproccedto tria the only ocome. other dm bmaptey protection, the contractor Ekely wM '' ; 6ave is to seek coverage under its commerciat general tiabitity (CGL) poGcy of insurance for the construction defect c -attti ir 9 , S ,. a$-, 'f'etvn% 6' iN aoc I...

Figure 6: An organization's retrieved documents To restrict the list of your organization's documents in the search result, such as to an office location, select an item from the Viewing docs from drop-down list.

Searching for Your Organization's Documents Searching Westlaw and Your Organization's Documents To simultaneously search your organization's internal documents and Westlaw documents, or to search only Westlaw documents, complete the following steps: 1. At the tabbed Westlaw page in westlaw. com, type up to 10 database identifiers, separated by commas or semicolons, in the Search these databases text box and click GO.

2. At the Westlaw database Search page (Figure 7), click Terms and Connectors, Natural Language, or Search by Title as necessary, depending on the search method you'd like to use. See"Using Westlaw Search Methods"on page 14 for more information.

3. Depending on your selected search method, type a Terms and Connectors query, a Natural Language description, or party name (s).

4. If you want to search only Westlaw documents, clear the check box for your organization's documents (e. g. , Include Stevens Documents in search) at the Westlaw database Search page. Otherwise, both external and internal documents will be searched.

5. Click Search. Both Westlaw and . ax documents are documents are . , . i L . . MD.. searched when your organization s.-. :, :.. <.,. .,. :... : ..,.. _ a,..,."... .,.. : ... ; :,,... R.. check box is Database Minnesota Cases e 8 : Stevens Documents =101 SlEt checK box) s tipfurance policrw coverooe period/a tiThesaunus rsecr !/p desz inju To search only Westlaw documents, yourorganiaation's Ra°se°a, BS-----,--- check box. IT Include Stevens Dacuments in search Double-click on a selection to add an item to your search. anders ; JE, Fields Dates AtiD & : 1 Cout Co i _ OR space gj Wcrds-phreses WP iMcstrecent30deys 7 i phrase Synopsis SY insamesentence/s" Digest DI''"Mostracent90days " insomepcregreph {p, r'j SynopsisNgest i ? Y. DI_rj Yeertodete""ili More Ways to Search : rusrom Dinact KevSearch Figure 7: The Westlaw database Search page Retrieved Westlaw documents are listed on the Westlaw Results subtab, with the first Westlaw document in the result displayed in the right frame (Figure 8).

8 Searching for Your Organization's Documents r Find Westlaw sources on t°1'nlceme, j Ftnd, i Knvclte', (', bl, relxor -J Te6tboFoatents (ice_ More J the Westlaw Results p In re Implant Ins. CoveragB Litigation E 2002 WL 3110970 subtab. S, pt 24, 2002. (Appm,. 31 pag, r) s. oL x. zoox. (ApPro.. 31 paq. r) Edit searchrml ,. detabase s). hxlh. cS. iotr'DOC (s) : . : JE'' '- , .-N. W. 2d___ Or4 the Westlaw ch6on is currm* avaflable. s, i 9tandalUst. 1' 116s_tii. t ( t Btis i golh'aqñ'dritdijit i, i :- s.. E. xcess Eabilhy rilsurers brorot acison ag3rnst riumred uumufactur « cf saiicone District COtut, R=tY CO=TY, U Mchl Monahm, I., entacdjudgmed , r ; enerrtly rn favrZr of rnsured Appeab were tL Tce corzt of Apperrb4 Toussrilt 5,' C. J., ;..-.. C. d., lield that (1) the injmies higgemrg covaage occvrced arovad the time of ttu . Sep2q, 2po2 . implaotafiou and s&erwuds, not shortty before the overt dimeue symptoma were - - ; obsmed : (2) pro rata allocatioa by iascers'ttitte oa the risk wu reqv'rced ; ( period for allocafin damages among insurers ended whea patients fued their lawnits or ched, not wh= occurrence policies expired-, (4) some excess . 'F.. labrM'y poticies required piyment of defeose costs in addiaion to policy Emits ; (5) v j deductible oES5, 000 p « occauence or event appSiedon ap « ctaimbasi3 ; (e OFL*EY covmlge for expected wti intended iqs appred to li F',,, rt s :"£ ^r > ; : <t c4,. , .''If84C LOCttte ;.. : :, Figure 8 : The Westlaw Results subtab To access a list of your organization's documents that were retrieved by the same search, click your organization's Results subtab, e. g. , Stevens Results (Figure 9). The first document in the result is displayed in the right frame. Click your ttr « ctr !' Clickyour organization's 7t < Ptw ('*i'; Results subtab to D No : 13256 view a list of Author : RonaldL. Rich retrieved documents'°F s/se/zooo atr''tiaMel9s. Qrlr, anent atyour _'INSURANCE COVERAGE FOR EFECiTVECONSiRUCITON organization. Ronald L. Richan Copyright 0 2000 American Bu Aociafion ; Ronald L. Rich Mzre Tnfo'oh las=ce coverage for defective construction is never more real dm to a contractor with limited or none : ds reso=es who, after the complefion ofa work of imp--mmt is faced with defmding an acfioa by a third party for property dnage Jan togoov"gout ofcoatruceon defect clairas. Con&onted with the mably ofbeing unable ta to shoulder the defense costs or a potential judgment should the daim proceed to recomse, other dm bankn : ptcy protccfion, the contractor hktly WM A14WrKWMMor, 4 have is to seek coverage =& its commercial general habiuy (CGL) policy of Apr s6r ippB. .- uuiranee for the construction defect daims. ' : Numerous areides focus prananily on the exdusions that operate as a bar to . msurance coverage for defective construction daims. Howevec, Htis paperwrti explore what types of construction defects constitute property damage, uader what <, c'rccumstances negGgent perfomance constitutes an occuRence as defmed under the : i _ : CGI. poticy. and how covrts are applying ihe coacept of continuous injury bigger of =-coveraee to conswction defect cases. i L t¢ ; DrtC tß Figure 9: An organization's Results subtab Note: While your organization's documents are being searched, your organization's Results subtab displays the searching icon Q and is unavailable.

The subtab remains unavailable if no results are found.

To restrict the list of your organization's documents in the search result, such as to an office location, select a value from the Viewing docs from drop-down list.

Searching for Your Organization's Documents Note: When you access the Find or Custom Digest service, you search only Westlaw documents; specific documents at your organization are not retrieved when using the Find and Custom Digest services.

Searching for Documents with KeySearch KeySearch is a research tool that helps you easily and precisely retrieve documents on Westlaw that are relevant to your topic. For each legal topic in the KeySearch hierarchy, Westlaw identifies the West key numbers and terms most relevant to the topic and creates a query for you.

With West km, the power of KeySearch is expanded to help you easily and precisely retrieve relevant documents at your organization, as well as on Westlaw. The following combination of document categorization and retrieval techniques ensures that KeySearch retrieves comprehensive, reliable, and relevant documents at your organization: u Automatic Classification : State-of-the-art classification tools can automatically index and assign your organization's documents to KeySearch topics.

Manual Classification : Your administrator manually assigns documents to KeySearch topics. In addition, your administrator can customize the existing KeySearch hierarchy of topics for your organization's specific needs.

Full-Text Queries: Queries crafted by West attorney-editors and your administrator (and editable by you) leverage full-text searching to retrieve documents on KeySearch topics.

To retrieve documents at your organization using KeySearch, 1. Click KeySearch on the westlaw. com toolbar. The KeySearch page is displayed (Figure 10).

10 Searching for Your Organization's Documents . con :- Click KeySearch on the westlaw. com X A N r, . selecting from a hierarchy of selecting from a hierarchy of legal ,.. wello-6 to r Ffld, thrS dtlGtlhi9ht b4r CitBt'. Ia WmsdawFGQhtiQhts : Farc Hous'g Act does nok impose vicadmus lability on corporate om or o dicial candidate's action invol g r nv-Pfl nt 0"'inployerzlnd empjoyl | ~ westta Wnsftajtt price changes at http :/j ic=entview. Steve= CwtomEwdKeygemh. View Visdam KevSearr r.... _. _ _ tClttk, tlifs CItBtbttt-°'i i.. changt oa Feb. 1, 200"'' r :'''."^r^..., r . m,.. :. ^ :'1..., : ; W""'. | pnceC ? 3lgesatOtip : oitvb S,, C nrrentview : Stevens ZnstoralzedKeySerrciL ViewWesbawRe75erXrch ' : 107928FmaLpdf. Ari'.'. ; . >,, s L,,. | ? vndingtoplètv'3^duninistriltivelow i3>1ea1th 0 i EHhaushmn, Omen Membnns. Pnman HosW tals, htantal Health, Nursinn Homes. Llktl tta'G99 ; g ; p and sa. ,.-v -' wwwwestonp co Tteyljs (9 tta (tphAiibf. y) i unsdiction Recent changes for =cc ! 'ustom-Nest effecti Federal Aid, Pest Asvlum Deportation and -' : ", Clstom Digest, effecti 'y _ Federal Aid, Pest Asvlum. Damortation and goan the, st o. tOPIC, 5'iAd Control, Pastdes Veteiiiiatiaris Peinoval Naturalization. Evhaust. n 5te ens acuments "sGbtnprCS £pr the5p tntYma DATABASE ANNE 0 Ag ASia Documents C3 :. dm Dirtcto low Domestic Relations Gambling and rasinas Treaties y ot Ruin 0 Altem. tive I) isp 3 t'0 eankruolcy, Insurance. Secudtias Law Aad Fanth, Lnability Coverame, M-tmr t8'StjilIfY ttllxtkt i V. hlclps ins.. me Q-ta. firift. fNitiy Si i' n Antitnist and Trade Reaulation Cl Intnllecttjal Pmporty Cnme, Horizontal Restraints, Price , Fjy, g sernces Patents, Trademarks . At Entmrtalnmmnt mnd 9nnrts t.. nw O Intmmntinnml Lnw Aae=ts. Torts Eiona, gP. Sovereian, Treaties Figure 10 : The KeySearch link in westlaw. com and the KeySearch page By default, KeySearch in westlaw. com retrieves both Westlaw and your organization's documents. If your administrator has customized the KeySearch hierarchy for your organization, you can access the standard hierarchy (for retrieving Westlaw documents only) by clicking View Westlaw KeySearch at the top of the KeySearch page.

2. Browse the list of KeySearch topics and subtopics by clicking the Browse icons El or hypertext links in the right frame.

Links in regular text (not italics) represent standard topics and subtopics.

They can retrieve both Westlaw and your organization's documents.

Links in italic text represent topics and subtopics that your administrator has created. They retrieve only your organization's documents.

If displayed, counts after each topic show the number of documents at your organization that have been assigned to that topic via automatic classification.

To scan the available KeySearch topics and subtopics for specific terms, type the terms in the text box in the left frame and click GO.

3. When you see a topic or subtopic related to your issue, select it by clicking the Search all of... link at the top of the page or by selecting a topic link prefaced by a search icon (Figure 11).

Searching for Your Organization's Documents Select a KeySearch topic by clicking the .. Watcomr Fln (KeYCits. -O I Te6le ofCndfents.- Ka 5 ;, More : Search all of... link or a topic link prefaced ee5ert'CtmentHew : StevensCustom6edKeySeasdh. ViewWesdawKevSeuch by the search icon JD. dt f, t', w > s ; 9h-iri ^"$ ifCGilBBipYAE7ytt7j5 (Ci'......., ,... _. __,.,,. __,.. _"_"_...... _ _, Searrh all of Discharge, selmta tople below. tQl tSSCd9Cttt. rient6 . .'COnstrur, jjye discharoe ppuhlin aulvcv t<.. @5 wL'; SRainstatemr1nt aiyd saLfnpifnr thazn'.. iermt., y t,' frGt,,'FP. GD int9D . 3latlon PHostile Wprk Envoronn ? ent KeySrcTopt ; K bu} 9t j"'-.,.. ! aa, x. a ; : ; S Figure 11 : KeySearch topics and subtopics 4. Select the sources from which you want to retrieve documents (Figure 12). When you select a standard KeySearch topic, you can retrieve Westlaw documents, your organization's documents, or both.

If desired, type additional search terms In the Add search terms text box. Select the sources M s t Qw c for^ +++HZ internal and Choose a source : internatand chooseasource : external-from Fi InCude Westlaw documents in search which you want to rit cases with West Headnotes retrieve documents. tr Connectlcut, State, : ru , Cases without West Headnotes Dj Minnesota Statej r All Federal Cases r Encyclopedias and Treatises : Americ JurisPmdence 2d e Journals & Law Reviews (JLR) ! re Include Stevens Documents in search Add search terms (optional) : sj <h~ ! ........... ........ i View/Edit Full Query Figure 12 : The KeySearch page for selecting document sources Note: If you select a KeySearch topic created by your administrator that does not have an associated query, your KeySearch results are displayed without prompting you to select a source.

5. If you want to view or edit the query for the selected KeySearch topic, click View/ Edit Full Query. Note the following when editing the query (Figure 13) : 12 Searching for Your Organization's Documents If you opted to retrieve both external and internal documents in the previous step, two query boxes are displayed-the first query is used to search Westlaw documents, the second to search your organization's documents.

You can edit either or both queries (see page 14 for more information about formulating queries).

By default, KeySearch uses automatic and manual classification and full-text queries to retrieve documents. If you do not want documents retrieved via automatic classification, clear the Include documents automatically classified to this topic as conceptual matches check box. Source : Westlaw documents Edit the query to Add search terms (optional) : search Westlaw ; i_ : Y % « search Westlaw ! 1) (TO {iGENT lPPOnMlZNT A8SISTINT. ? 4 documents in the FIRnaG axRazrrxT !)) iootGCNT rPPOnrrecerr ssrurt CLLRR DEPtIIT ELPLOT ! F1CDL1T INSTRDCTOR OFFI LR first text box. PROFLS90R RLEOV1L STIIT TEACBtR TLNURE. TO (232A) ! P ^PBBLIC POLICY"/P DI9CH1RG ! FIALD FIRING t J show/Hide Key Number information about this query Edit the query to search your organization's Source : Stevens Documents Add search terms (optional) : documents In the (EMPLOYEE EMPLOftR EMPLOYMENT LABOR/P UNLAVFUL ! second text box. WRONGFUL !/5 DISC81RG ! FIRE FIRED FIRING TERKINIT !/P PUBLIC POLICY) P, include Stevens documents automatically classified to this topic -- as conceptual matchas Figure 13: Viewing and editing a KeySearch query 6. Click a Search button. Retrieved Westlaw documents are listed on the Westlaw Results subtab, with the first Westlaw document in the result displayed in the right frame.

7. To access a list of your organization's retrieved documents, click your organization's Results subtab, e. g. , Stevens Results. The first document in the result is displayed in the right frame (Figure 14). Click your orgånization's X >St'' ; V ; Ci R « cLsuits subtab to s 1/4/neo ;. A=tbor : Thotucrqvei. (wr, ar. ç) 8* Y WidbedU tj'9h ~_ ,,,' Ho2Ne : r33 °' aCCBSSyour DataSUasseeurctDD __, Vv.,-r/a/=3AWme : Tnoro, , arwma. cro. ... ,,., t_-. =_ organization's . IrtHi mt V.-. documents in a snDcn. access your left organization's 'IQ Ata., dif" <e i. Mol6tjte~tFialeibe To S, Buo=n - ; Hir ; d f nn. ot ti this DOe. NO : a3333 gAuwor : Tbx : vrsivea i StbjectBonoweiEwF ! oytes30dNe ;, dig=tB nodwCosctct4bw FACTS Moce. tnhtaak2n Hy : llorov Pivua, 7. D. _. FACTS Juicìunt DOS. Nvrrr3iS-.. HooaFndeMetalWorksCasnng (BomFae, acompanywtuchleasaonawonkersforrodo. vulobs, AutMr. JetFHariq :. Aethr. S-P-, L . h b. lh ., k, d for bdy. Up d. ''"'',--S. . do-) & R-*, bLddg. dd. Uy. d. UElt, f,, tw, qwpl&. R,, w,, Idhkt, ,, t a, falnSt3Et39m. °ddnnaLY. . it : os. t2 .. a da aqaiDSt Bona Fidr's'auurer, are, mnq tbat (1) Bou Fds should be hdd tiabfe foW be vepyq ro acs of iu md C2) B, m Fi& h,, Id be held Ubl b=,, d thd d d gU ; k b. u,, y. . :'TartnAp,"e) DP<1 g ,..

Figure 14: An organization's Results subtab with a KeySearch result Searching for Your Organization's Documents If a combination of KeySearch categorization and retrieval techniques resulted in documents, the most statistically relevant document matches are displayed to you first, with the documents that were manually assigned at the top of the list.

Documents are then listed in order of relevance.

To access additional documents retrieved via automatic classification, click Additional Conceptual Matches; documents are listed in order of relevance. To access additional documents retrieved via the full-text query, click Additional Key Word Matches; documents are listed in reverse chronological order.

To restrict the list of your organization's documents in the search result, such as to an office location, select a value from the Viewing docs from drop-down list.

To edit the KeySearch query, click Edit Search.

Using Westlaw Search Methods With West km, you can use Westlaw search methods, including Terms and Connectors, Natural Language, and the Search by Title template, to search both Westlaw documents and your organization's internal documents.

Note: Because of data differences between Westlaw content and your organization's internal documents, field restrictions in your query and concepts you have specified to be included or excluded in retrieved Westlaw documents won't be used to search your organization's documents. For example, the Westlaw title restriction TI (domtar) will be translated to the term domtar in the search on your internal documents.

Searching with Terms and Connectors With Terms and Connectors searching, you type a query consisting of key terms from your issue and connectors specifying the relationship between those terms to retrieve relevant documents (Figure 15). This method is usually most effective when you know details about a specific document that you want to retrieve or when you want to retrieve all documents that meet specific criteria. Database : Minnesota Cases 0 & Stevens Documents Change Databasefs)) Databasa Notices Terms and Connectors I Natural Language I Search by Title ^insurance policytt/s coverage period Is Thesaurus effect !/p damage injur-* -" ! Recent Searchas ) Recent Searches Figure 15: A Terms and Connectors query By default, your organization's retrieved documents are listed in reverse chronological order, based on the date the document was last modified.

14 Searching for Your Organization's Documents Using Connectors Use connectors to specify the relationships that must exist between the terms in your retrieved documents.

Type: To retrieve documents that contain: For example: & (and) Both search terms narcotic & warrant a space (or) Either search term or both terms car automobile /p Search terms in the same paragraph hearsay/p utterance /s Search terms in the same sentence design/s defect +s The first term preceding the second within palsgraf +s island the same sentence /n Search terms within n terms of each other personal/3 jurisdiction (where n is a number 1-255) +n The first search term preceding the second 20 +5 1080 by n terms (where n is a number 1-255) ""Search terms appearing in the same order as"attractive nuisance" in the quotation marks Type: To exclude documents that contain: For example : % (but not) Search terms following the percent symbol laminectomy % to (413) Using Special Characters Type the universal character (*) to represent one variable character. Type the root expander ( !) to retrieve words with variant endings. For example, Type: To retrieve: gr*w grew grow contribut ! contributed, contributor contributing contribution contributory Note: Plurals and possessive forms are automatically retrieved without a root expander.

Searching for Your Organization's Documents Searching for Compound Words and Abbreviations If your search term is a compound word, use its hyphenated form to retrieve all variations. If your search term is an abbreviation, enter it with periods and without spaces to retrieve all variations. For example, Type: To retrieve : whistle-blow whistleblow whistle-blow whistle blow h. i. v. H. L V.

H. I. V.

HIV HIV Searching with Natural Language With natural language searching, you type a description of your issue in plain English to retrieve relevant documents (Figure 16). This method is usually most effective when you are researching a complex legal issue. æXw X Database : Minnesota cases iu & Stevens Documents Chanoe Oatabase (s) | Database Notices Database : Minnesota cases & Stevens Documents Chanae Database (s1 I Database Notices Terms and Connectors j Nature) Language J Search by Title musc damage be demonstrated that it occured while Thesaurus cm insurance policy is in effect|'i E control Concepts s a ~ n RecentSearches Figure 16: A Natural Language description By default, your organization's retrieved documents are listed in order of relevance.

16 Searching for Your Organization's Documents Searching by Title Using the Search by Title template, you type one more party names to search for a document by its title (Figure 17). This method is a convenient way to retrieve documents pertaining to a specific case. Database : Minnesota Cases 0 & Stevens Documents Change Database (s) | Database Notices Terms and Connectors ì Naturai Language | Searrh by Title Party name : doler. Additional party name (optional) : nitu-em Figure 17: The Search by Title template By default, your organization's retrieved documents are listed in reverse chronological order, based on the date the document was last modified.

Note: When searching only your organization's documents, the Search by Title template is not available. When searching both Westlaw content and your organization's documents, party names will be translated to general terms in the search on your organization's documents.

Searching for Your Organization's Documents Browsing Your Organization's Retrieved Documents Your organization's retrieved documents appear in the westlaw. com interface and include highlighted search terms, hypertext links to other sources, and citation information.

Viewing a Document To view one of the documents listed on your organization's Citing Refs subtab, click its reference number (Figure 18). To view one of the documents listed on the Cite List tab or your organization's Results subtab, click its number or title.

If a Security Warning dialog box is displayed, click Yes. This installs an ActiveX control that allows you to load and edit copies of your organization's documents from westlaw. com.

If your administrator has given you the necessary access rights to the document, a copy of the document is displayed in the right frame. Click a document's reference number or title to display it. More N r's : Thomas v. Tracy, Plaintiffs motiond i : H,.',., ; ,... ...,, y. homas v. Tracy, PlaintiHs motlon. doc . "".",, n 1'Plaintiffs brougM action'. < , Ilfllw Authob/I oa Kay enfbmetned ofori&a rights n well u mineral s', inlay , <ioctfo ; IAJI Locations wl to dismiss.'party is entitled to dgment m a matter oflaw Doohn The Supmo and the movuq granted summary iudv Fnviro=ntal Power Ltd bem the burden ofpmving dat there uc no material facts at issue. c M ; T=r v. cAtiagDocumgnts Appeals, K-. I., held PA American Moton Gm Corp., 0 392 A2d 1005, 1006 (D ( 1972) All facts mud uthar : Heat6erlCDy-_'be viewed ia Ihe IeJa most &vorable to the opposing partyr. C Id. Sursunary judgment ; ' mlsrepresentatio 'ypay2ooR r is especially inappropriate in premises liability vases in wltich the « are disputed Facts rights M&''11"with regard to the defendants negligence. 0 Id. at lOfY7 Ajury mut decide whether Shoa9' ! b¢pIa'FI6AdiRtBiIAt0. .'' rt8hts un-- . a de&ndant'had control over the premises or the abn7ity to employ adequate 0-0 measures for [the plaintiffs] proteckon from foreseeable dangers... [=d] had contct, and that claim properly and fficiently dischaged its duty in that respect.'Vlmds v. Safeway ., : ytarpaiodpriorto co Stores, Inc., C 107A2d 118. 121 (D. C. t354'), SeamanBodyCorporationv. g t#WitAttt] Qtt. * hroitanons.,-),., Indurtsiai Comniurion, t204 Wss. 157. 235NW 133 U93U. Th : jlXyin mcha 'C. Jahn r . Armedinpartandre' :. ; caseshouldbeinstructedtiutthedefendantdtdindeedhaveadutytota ke reasonable cue to discover foreseeable dangers and to protect those on its g'IAabtiBP.'h"da lSIdIltti'8'-". prem>ses-mduding thc plainhff-&om potential harards by issumg an adequate wang P Was Me opofitan Ana Transit Authority Johnson, VIS STAT. 1101. 11 (2Cdr.) I-_ A defendant's duty to protect a person Grom mjury on the difendant's property u no' N-,.,,,,, N, N, _ :, 8 Tsrm a 5 570# Figure 18: An organization's Citing Refs subtab and a displayed citing document 18 If you retrieved the document using KeyCite, references to the cited Westlaw document are highlighted, with the first occurrence automatically displayed. If you retrieved the document by searching, then search terms are highlighted.

Each citation in the document is a hypertext link to the cited document in westlaw. com. For each citation that has available KeyCite information, a KeyCite status flag is displayed next to the citation (see"Understanding KeyCite Information"on page 30).

You can browse your organization's documents as you do Westlaw documents: Term arrows take you to the next or previous term in your result. (In a KeySearch result, Term arrows function only for documents retrieved via the full-text query.) Document (Doc) arrows take you to the next or previous document in your search result.

Browsing Your Organization's Retrieved Documents Choosing a Page View You can choose how your West km information is displayed-in split-page view or in full-page view.

In split-page view, all information relating to a displayed document is available on the same page. The text of the document is displayed in the right frame, and related information-such as the list of your organization's citing documents on the Citing Refs subtab-is displayed in the left frame.

In full-page view, the text of the document or the related information is displayed across the entire page. <BR> <BR> <BR> <BR> <BR> <BR> <BR> <BR> <BR> <P> Click the Full-Page View icon on the Information Tab or in the document<BR> @ frame to display the information or the document in full-page view (Figure 19).

@ Click the Split-Page View icon in the page's upper-right corner to return to split-page view. i II information in full-page view. t 4<Z tE.. ; DiCi"76 r) :. pltty :' CigvbYF : tEttttP C t Uoolln v. En 36ro d 93e1 Powar Ltd. ..... Mg p ? Pisa DDis ibroXL M eD6orceD eDt OtOliç _ we= TRt r . t k. i 'Plamfiff9 _ vttfdtxYt= ; enforc : mentofongm-'. . (. . ; -'_ . rc , More 0 Doi) lln v. Environmental Power Ud. 360 led 4 ''sh. i°tt ariroal. to disness. 1lie Sup s , 8ranted summaryiD w'r ! ., i.. rights u wen M= 3'd'l,.,', Dmad. lhatreacissioo ICCOitingRafr I StevensCItIngReEt 'P, murepresmlatio4w coiud, that resdstion KC CiHnp., R, F Stevem Citing Re& *. mii,, ibt, CitingDuments Momlnfonnation S tb jsXtoP**MEdX Ss e3en ise oEdue di3_e (Showing 8 documents) year period pri0f to c Affirmed in part and r Affumediapadandr 1 Shonk v. Ripple. Defendants Briefin Opposition to PlaintiJ£s Motionfor Summary Judgment. docy/1/2oo Author : Pat Bauga "must Fively v. Meinke 61712002 Author : T. John *Mentioned aThomas v. Tracy, Plaintiffs motiond 6/112002 Author : Heather Kay 4Ren Reneematter-initialresearch. docg) 9/aooaAuthor : T. John 5 Gary Irwin-Retirement Estate Litigation. doc 5/6/2002 Author. CarolSue k Pritchard v. Perry, PLAINTIFF ? MOTION IN OPPOSITION TO DEFENDANTS'MOTIONS FOR. SUMMARY JUDGMENT. doc, 5/i/soo2 Author : Doug Allen , 2 Stadnykv. Marcum, PLAINTIFFSMEMORANDUM.... docq/8/aooaAuthor : G. Mason 8 Jacob v. Trevor, Ine. PlaintifPs Motion for Summary Judgement. doc 4/2oo2 Author : T John Figure 19 : West km information in split-page and full-page views 20 Browsing Your Organization's Retrieved Documents Opening a Document If you want to work with one of your organization's documents, you can open a copy of the document.

While you are viewing the document, click the Load Copy icon at the top of the document (Figure 20). A copy of the document is displayed in its original format, for example, Microsoft Word. =pou Id [e c.., 1. : , a 1, I ;. Kd tt Mata : op n a copy z of the document. , , x . >..'"5,,, A ;, I t ; ; I = = ; x"-" F SN h ap t, DSF'. t'wrJ I , ! y rg e. ;, y t t t . : ; _ mdthemovin8PM3is i-t4FIL"tc,.', t1' t', s.. : £ilu ! y : iT t', .. Y, "I _. _ a k"At-gEg^-""Mom o t e docum nt. ,) w Env'rorul Power D 7 7e :. bean the buedea of pro-, .., .,"'., 'G,"''",". a..."..,.". '' "" SummaryjudMpropnowhenthMoogenimeMofmenil 'FTt, RW', v, WYa (tltYsl2 :, Ameoican Motorc Gea Sropr ate oP when there is no geioe issue of mataal fact md the moving party u mtided to : Auttdbr'i3 [oIShdi'fGt',. beviewediathe6g t o u matter oflaw Dooti v. FnvconmeatalPowerLtd., 360 A2d 493, 496 (D. C. 1976). The mo beu t rJWtosROa ;,. N (D. 6) vusPatty n, : ; sespe iallpieapprop bw ofprovingtbatiherearcno matetialfacts atissoe. Id ; Tumerv. AmaicmMotonGeaCorp., 392A2d1005, 'wah rgard to tL d&° 1006. C. 197. Alt 6cts murt be viowed in tiu most favorable to the o ; x. : a defendaot'had control oPP SPty. Id Summuy judtu ;-measures for [tbe p.. ee Prop ! n Premises 6ability cases in which there are disputed facts with regard to the defeadant's aeghgenee IcL at 1007. Ajwy must decide whether a defeadmt'lud eontrol over the premises or tfu abty to employ adeqaate ;" : ; Stores. Iac., t07 Aa measorer for [the ps] protection &om foreseeable daugera... [md] had properly and sufficieaNy diachuged ib duty m... ''"Iadustrial Commissio0. t respecc'Vi, mds v. Safeway Stores Inc., 107 A2d 118, 121 (D. C. 1954) ; SeamanBody Corporation v. Thdujtnal i Cocmnstion. 204Wii. 157, 235 N. W. 433 (1931). The jury m such a case should be mstructed that the defendant didindeed to disco have a dtdy to take reasonable care to discover foreseeable dangers and to protect those on its premues--indading the : ypremises-includiagthe plaintiff-frompotential arardsbyissuingmadequatewatt. IdSeealsoWashagtonMetropoEttmAreaTrmsitAuthority °, . w-. cLL See also v. Johmon, 699A. 2d4O4 (l). C. 199 Seealso. AT. § 101. 11 7) WIS ST (2002). . 44","". 2'.,.,,'C ty to pr defendmt £ ildd to aght a pathwy on hs prerru. When a low-rtruw wire or dask object on the ^^rornd obstructi a p ace ^': defeadmt faited to lght a pathway oa ib premises. NLm a low-stnag w'ae or dark object on the gound obstnscts a place A defmdads duty to pr creatiag m adequate waming s by mstag a tigbt 'Ibis pointis eluidated by cases firom other jmisdictions that have considered tbe'usue ofliabitityvader ficts etosely analogous ; to those at issue here. For eamnple, ia Blaustein v. Levitt, 264 N. Y. S. 2d 318 (App. Div.), appeal denied, 266 NY. 5. 2d r 1025 (1965). a tenant sued his landlord for Wtuies sustained when the tenant fea in the aparW sat bvaldiug's padtg loc The r ; l pbinhlE after poking his car oa a dark, rainy vght, attempted to moss the parking lot by walking across m'uland'situakd in A hotybetween the parks area md his bwldnlq. Placed m the centet of tbe uland wu a youoR tree Eom w6ich a wm wa . r, 77= f Figure 20 : The Load Copy icon in an organization's document in westlaw. com and a copy of the document From here, you can edit or save the document as you normally would. If the document is displayed in Microsoft Word, you can also add KeyCite information to the document (see"Generating KeyCite Information for Your Document"on page 33).

Browsing Your Organization's Retrieved Documents Using Knowledge Management Features You can access more information about your organization's documents beyond what is listed on your organization's subtabs by accessing the West km pages. From these pages, you can also build a citations list of your organization's West km documents search all your organization's West km documents use KeySearch to access your organization's West km documents by legal topic i view, load, or e-mail a document To access the West km pages, click More Information on your organization's Citings Refs subtab or Results subtab (Figure 21). The Documents tab is displayed, providing information on each document at your organization that was listed in your result in westlaw. com. _ fizz , _ Click More Infonnation on your organization's subtab in westlaw. com ..-. __ _ _ : :. , ."_.. to view more information about the C X2d 493. listed documents. hot _ ß 4-2 inti-iftbroutBiorlreq s t t-Dwldvd JuIY 6. 197i. (ApPrcx. i AaqnsJ ; twlxat7Ari ;,'1A'w' : ,.. _ , : 18765 6rAilt aCIlOff rE ' enfomemeqt of orl eo E : _ ,, ! ! l4df1 I Y :, t i *, sF ssavats cmn 1,' ; n ar a> .,. ... Keyat R Its Citi#$Dot#Moitti Appeals. Kern. J., held that 8raatedsuDqDarpjudgmeat . Wm",. cppe. Dme"a. ra ar : mrsooaxzoxus LYItiigrktlpxtlal ; ltt APPata IZnD. 7.. 6e1d puc nwnben aw. mnmwrmn a. w : ** (5kiot#dqpiqjylstx couDt. t6st rescisaioa co' ; '""''"°"'t °°' ro misrepresmtatioa. wasb Tl, Ss (, . : mN iQ. vruwtrw :, r ; aorn kd'tlaDa'iaiseMS. Mt _, : , *.-..- . -tifcf'- r ; misrepreswtatioat6atoptio , luthpr"W" . mme7e T. wwrem annamxasosrni--*p amn : m u. y to PUfn6ft ffo6r, f6r-mffcise ofd ddigmea b } *'Z, ^e Afiediepastandrenz2n tjS P7tz ; ; 4 w tS * ; ; ^ a >. wtt. Ç,.-S.,. d 0 ° M°s 4w 02 to s2 ~~' ^ *' R H « tne hy : w g S r S1s, S i E, ;, W,,,,,. o n : ytu period por to comm _ IClvalyr. Meder, S ( ? raooaAuthor- : ypoas. _ iWp<ras ywar. imv ; xTS.,'ti « a wittour : aarrri . T. ao6n . ; ""'"''stanDnAwrpnrtrA u. D-* ..,. _ jed in part and reman g. a,, , aa..,. 5. w Y,. -oArta. wrs WtronSFat. r,, i'CtM, etl5oued. '' : 6 sswurr, LOanatree ', FuQ. . 4nFCdC), 1'IanIWAi p1728 Stedtytv. Menam. 0. ANfFFS OAHaanABP20039DRM1..... _ *. , rlT9hAa : dACflxegAA2, ft11t1AT r. enaeMnuAex ; HoatLerlay .. 472r-. uca, . Tn. hn., aw, nin l. Jwn uJrmorm, uanora. :. * y "i'I'rug tANt, that clain see arasmma _ Figure 21: An organization's Citing Refs subtab and more information about the citing documents By default, citing documents are listed by their depth of treatment, documents in a search result are listed in reverse chronological order (based on the date the document was last modified), and documents in a KeySearch result are listed using 22 a combination of relevance and reverse chronological order. To change the sort order, click a column heading to sort by that category.

To return to westlaw. com, click your browser's Back button. If your Westlaw session has timed out since you first accessed the West km page, you will be prompted to sign on to westlaw. com.

Building a Citations List Using KeyCite Using KeyCite, you can build a citations list of your organization's documents from the Documents tab on the West km pages. Citing references on this page exclude Westlaw documents.

To retrieve a list of your organization's documents that cite a particular docment, click KeyCite on the West km toolbar, type the document's citation in the New citation text box, and click GO (Figure 22). . i of your organization's of your organization's documents, type a ' i . y,, citation in the New citation text box and llllse click GO. ;, aft , 0 Ab,,, sgt, r, 3Ugt : ? a : I--. . - Alatraot ; - Fuii cwr : r N'afNrs'I LantisgE Figure 22: A list of an organization's citing documents Your organization's citing documents are listed on the Documents tab by their depth of treatment.

Using Knowledge Management Features Searching Documents You can search all your organization's West km documents from the Documents tab on the West km pages. Searches from this page exclude Westlaw documents.

To search your organization's West km documents, click Search on the West km toolbar, type one or more search terms in the Search for Firm Documents text boxes, and click GO (Figure 23). If you type multiple search terms, all terms must be found. x Doc. number : To retrieve documents with a specified document number in your organization's document management system (DMS), type the document number.

Title : To retrieve documents in your organization's DMS whose title begins with specified text, type the text. (If your DMS is DOCS Open/DOCS Fusion, the Document Name field is searched; If your DMS is iManage, the Description field is searched.) Abstract: To retrieve documents in your organization's DMS that contain specified text anywhere in the abstract of the DMS profile, type the text. (If your DMS is DOCS Open/DOCS Fusion, the Description field is searched; If your DMS is iManage, the Comment field is searched.) Full text: To retrieve documents containing specific terms anywhere in the text, either (1) type a Westlaw Terms and Connectors query, or (2) type a Natural Language description and select the Natural Language check box.

The West km documents at your organization that match your search terms are listed on the Documents tab in reverse chronological order. i . _ To search all your organization's West ; 0 organization's West your search terms under Search for Firm Documents and CIiCIf 'i-" 't '""'° ? ' mr nsom, r,, Documents and click .'titla m .. = :... _ _ _ alyolCxJFaNmiFW JAacyJroa SIy200275B10AM j Authnrt n. . _ pbstract 'A5Yx2a rx. 9ebweimnta H nnp2A&AtPU D. g AAI* Natural Language C Figure 23: An organization's documents that match specific search terms 24 Using Knowledge Management Features Searching for a Document with KeySearch Using KeySearch, you can retrieve a list of your organization's West km documents that are relevant to a particular legal topic. When accessed on the West km pages, KeySearch excludes Westlaw documents.

To retrieve documents at your organization using KeySearch, 1. On the Documents tab in the West km pages, click KeySearch on the West km toolbar. The KeySearch page is displayed (Figure 24). ! ! : Click KeySearch on your organization's yourorgani ation's ç'''r", iS"X z §, :'s,"N documentsby, ttiN Ozlreratvier. StewnsOiuitorohediDySe wWertiiwRe zrch selecting from a hierarchy of legal Q Administrative Law 0 Ha, lth Exhaustion Open meetings Primary Hospitals. Mental Health Nursina Jurisdictian uratttcxhaus ° M-'HK ;' ; aASth-iOtifts B)) mmhrt) thm . "^s"""""r"n. % Federal Aid. Pest Asvlum. Deoortation and ' Central -cptrol Partn : iwles, Veterinanans Removal, Naturalization. Exhaustion . C) lndluenous Pe. plas DomeStic Pslations Gambling and ;, ;, O A1J nsia Documepj£ # ; 1 Indlaenous Pepoles C) Aftemative t) is caslnos, Treades a iit Kag#lltn' t ld uto Resolution (ADR) D Insurance : t) Mt9&% tt' ! J CaBnos. Treahes SSS ?" 'tenMtt. Rutn ReMMbn fADRB Insuranca Bankmptc Insurance Secunties Law Bad Faith Liability Coverag Motor =t Vehicles insurenrw Qttotes t. ritYCkE, ttlsi. ? CI 'btl. r t '° ; GI Antltmst and Trodo RF_nulatlnn G7 Intnllectual Prol7-KV, rimes, Honzontal Restramts, Pnce computers and Online. Seices Patents Trademarks Figure 24: The KeySearch page in the West km pages 2. Browse the list of KeySearch topics and subtopics by clicking the Browse icons Et or hypertext links in the right frame.

If displayed, counts after each topic show the number of documents at your organization that have been assigned to that topic via automatic classification.

To scan the available KeySearch topics and subtopics for specific terms, type the terms in the text box in the left frame and click GO.

3. When you see a topic or subtopic related to your issue, select it by clicking the Search all of... link at the top of the page or by selecting a topic link prefaced by a search icon P (Figure 25).

Using Knowledge Management Features . Select a KeySearch topicbyclickingthe., : rl- :, Searz hallo i linkor : 5 E i rA Select a KeySearch Stevens, Smythe &] ones topic by clicking the Search all of... linkor t9wsatuoabtaya...., __ _ _ _ _,. _.,,,... I ; >iiaXihiitiitiSiWvE, ì (SearchallrifDischarqe, o ;) selectatopicbelow. CYlatAdbgcrw'6eta >y ; pCnnstwctive Aischarce pPUhlic Policv I in ito Search all ofdischarge, o ltatopicbelow. S 5 , 2 4 s i i '. . j ppiscrimmatian e li' PHostile Work Envi) vnrnent ( : t$x8-SwI¢ : Sfstem tlw tha i Zer4lit «-ai6JiS, ui 0 ;,'< v tet$d o, si&Y, dEj*.,., ;' W ISQUSaarch 1'.' Figure 25: KeySearch topics and subtopics 4. If desired, type additional search terms in the Add search terms text box (Figure 26). Type additional _ t _ search termsto refine the KeySearch quern. 5-. h T- (, pUA : L adaxarcnTerms (e : , <g. S vkwEditisrwj s Vtew/EdtFd) Query Figure 26: The KeySearch page for adding search terms Note: If you select a KeySearch topic created by your administrator that does not have an associated query, your KeySearch results are displayed without prompting you to add search terms.

5. If you want to view or edit the query for the selected KeySearch topic, click View/ Edit Full Query.

6. Click Search.

If a combination of KeySearch categorization and retrieval techniques results in documents, the most statistically relevant document matches are displayed to you first, with the documents that were manually assigned at the top of. the list.

Documents are then listed in order of relevance.

26 Using Knowledge Management Features View your retrieved Documents tab in the ; Documents tab in the j k X,", i~Lilf. z, WR*rEs | ct, L~k-, vMjwds View your retrieved kM'Doc t, eut, Stevens, Smythe & Jones documents on the tab in the West km pages. minim m j W$4 wrov 3bfH-4, III jw iQISt4 SAM ".. .-'.''-,.'-', Op (MsiHontaDeendanfsWoUon OPW-U. b. D, (., dW . n ,., tor s., ry. wa. st. myt. ; Figure 27: A KeySearch result in the West km pages To access additional documents retrieved via automatic classification, click Additional Conceptual Matches; documents are listed in order of relevance. To access additional documents retrieved via the full-text query, click Additional Key Word Matches; documents are listed in reverse chronological order.

Using Knowledge Management Features Detailing a Specific Document To access details about a particular document in a result list on the West km pages, click the document icon g next to its listing (Figure 28). Click a document icon to access document details and tasks. , 1. > _., ^ t42M- ru*ar « any' ? f ttasi : 'Q, rmn srorev. . omema w J anamx eao : AM _ ** rIc 9Ln OppoaCmt awtin 9mw . PMS inkM " ! *r wm 1 s. . wv. eo t ykb : (-r . nnu, wwyr. w t. >am rur !. ra'lroziacars vi'*", : E looppt. Ir. El- jazz A."''mk _ __ yyee 1 4I 1R tk ' ., 1G03 OrYMW PHmM61 YN*lufat+. *k9*&1 . .. r, nar. n.. a. a j'-k'Yilt ; t : Tm-sm, w w. a. - ; : p y ; lmouMdoe r l Datc 6/Ij2'31541PE1. r :',. 1'afTS'4v THmt itG' g ; l5t. aia"tu : % tY (><aAd4htarv T (dFY- pp*ypy-'SmoYypmtkapMYObMNna*BMQdtikfdidd.. . AMtract f*dapr. Aippa$YKat, Nk4Ndpnlnt, *ramYtatmf s : t IMY '.' TflldFl. ^TtecY. frtetiba : IS4ldM^'.' KeySeardn Tapk>C t tC Figure 28: A list of an organization's documents and details about a specific document You can perform the following tasks from the detailed document display: a To view the document, click View Document. a To open a copy of the document in its original format (e. g. , Microsoft Word), click Load Document. a To e-mail the document, click Email Document. An e-mail template is displayed with the document automatically attached. x To perform a search on your organization's West km documents, click New search.

For documents stored in a document management system, the Document Context section lists the documents created around the same time as the detailed document for the same matter. The three documents created before and after the detailed document are listed. To view details about a listed document, click its title.

28 Using Knowledge Management Features Understanding KeyCite Information KeyCite is the citation research service from West that allows you to quickly determine whether cases, statutes, or administrative materials are good law and find other sources that cite them. In West km, the power of KeyCite is integrated with your organization's internal documents.

KeyCite Status Flags West km adds a KeyCite status flag next to each citation in your document that has available KeyCite information (Figure 29). These flags allow you to easily evaluate the validity of a case, a statute, or an administrative decision. t In cases and administrative decisions, a red flag warns that the case or administrative decision is no longer good law for at least one of the points it contains. In statutes, a red flag indicates that a statute has been amended or repealed by a session law or that it has been declared unconstitutional or preempted.

In cases and administrative decisions, a yellow flag warns that the case or administrative decision has some negative history but hasn't been reversed or overruled. In statutes, a yellow flag indicates that pending legislation affecting a statute is available (statutes merely referenced, i. e. , mentioned, in pending legislation are marked with a green C) or that the statute was limited on constitutional grounds or preemption grounds or its validity was otherwise called into doubt.

H A blue H indicates that the case or administrative decision has some history.

A green C indicates that the case or administrative decision has citing references but no direct or negative indirect history. A green C indicates that the statute has citing references.

KC In West km, a red KC indicates that a citation could not be verified. Click this icon to display one of the following: (1) a list of documents on Westlaw that are potential matches for this citation, or (2) a Find template to assist you with the citation format. i Click a KeyCite status. w^*a ; fla to view a' _ flag to view a citation's KeyCite citation's Ke Cite' author : Heatherl4ay. information. 6/l/2002 i3w citation ! _- Summary Ndgment >s aPProPriate odE whrn there is no genuine issue of matesial Fact''" ans té moving party is enticed to judpnent as a matter of law. Dooloi v. Ea*omnental Po Lti, 0 Th. moing paV t bearstheburdeaofprovutgttuttluretrenomekrinLfictsat'unse. C, ;'ttsmerv American Motors Gm Corp., 0 392 A. 2d 1005. 1006 D. C 1972). AB&cts must be viewed in the E& most favorable to the opposiag paM. a u SUMMMY judgm- is especially iapp. pi 1111 which there m disputed facts , with regard to the defeadant's negligenc C. u 1007. A jury must decide whetber (. : :. ; a defendant'6ad coatrol over the premise : or t6e ab73y to employ adequate s.. mearXisres forlthe pllPs] probstionfromforeseeabi'ei darßers... [ardl had mfficimfly discharged its duty in ffie respect'Vmds V. Safeway property and P, 04 1575 N. 433 (19311 Th. my i. mh a cme should be i I d. ed have a duty to take 1 ;-'. ressovable care to discova foreseeable dangen and to protectthose onita r : fl-g "ut ; i » <o,-A-. 1 tu99 A 2d 404 iD C. 1997)., -, 'PId See also WulmgtoaMyoQotitanArea'tteos°rtAuthosGyv Johmoa, i is no U A defend=fs duty to protect a peraon from iojury oa the defendam's proputy ra no W . M.

Figure 29: KeyCite status flags in an organization's document 30 Understanding KeyCite Information Depth of Treatment Stars KeyCite depth of treatment stars indicate the extent to which a citing document discusses a cited case. When viewing a list of your organization's citing documents with West km, these stars indicate the extent to which each document discusses the displayed Westlaw document (Figure 30).

Following is a description of the depth of treatment stars that West km applies to your organization's documents. The number of citing references in the descriptions below are West km defaults; your administrator may have customized these numbers for your organization.

Symbol Definition Description Examined Your organization's document cites the displayed Westlaw document 10 or more times.

Discussed Your organization's document cites the displayed Westlaw document 6-9 times.

Cited Your organization's document cites the displayed Westlaw document 2-5 times.

* Mentioned Your organization's document cites the displayed Westlaw document 1 time. I t I treatment starts determine the èxtent = = determine the extent -----"DnoUn v. EnvfranmmtBTpoMerLtd/aMTw. . MT'S ! to which a document 'a^- *r' at your organization discusses the KCCitineRefs StevensCitIngReLt displayed Westlaw document. Vm° docs Eom : AI Lacations dr. CitingDocuments More IdomaEon (Showing 8 documents) I.. **Cited ; Shonkv. Ripple. Defendant' BriefinOpposition to amtic Motion forS ary Judgment. docy/11oo Author : Pat Bauga 1 Kivelyv. Meinke 6/7/2002 Author : ? John', *Mentioned gThomasv. Tracy, Plainti) 6motion. doc6/i/zoozAumor : ea erKay ri Reneamatter-initialresearch. docs/g/zoo Author : T. John 5 Gary Irwin-RBtiremant Estate Litigation. doc 5/6/2002 Author : Carol Sue Pritchard v. Perry, PLAINTIFFO MOTION IN OPPOSITION TO DEFENDAN'N MOTIONS FORSMARY JUDC ; MENTD 5/i/o002Author : DougAllea 2 Stadnyk v. Marcum, PLAINTIFFS MEMORANDUM.... doc 4/6/2002 Author : G. Mason Jambv. Trevor Inc. PlaintitPsMotionforSummar Jud ement. doc z zoozAuthor : T. John Figure 30: KeyCite depth of treatment stars for an organization's citing documents Understanding KeyCite Information Generating KeyCite Information for Your Document When you are working with a document in Microsoft Word, you can do the following with West km: a Create links from each citation to cases, statutes, and administrative materials on Westlaw.

Add KeyCite status flags to each citation, so you can quickly and easily evaluate the validity of the source.

Update the KeyCite status flags to take advantage of the currentness and accuracy of KeyCite in your own document and quickly identify the citations whose KeyCite status has changed.

Link from your word-processing document directly to documents and KeyCite information on Westlaw.

I Adding Citation Links and KeyCite Status Flags West km will find the citations in your document, create links to the sources on Westlaw, and add KeyCite status flags.

To add citation links and KeyCite status flags to your document, complete the following steps: 1. While your document is displayed in Microsoft Word, click Insert Flags on the toolbar (Figure 31).

32 Click Insert Flags to add citation links and Du to your document. ARGUMENT Sutamacy judgment is approptiate whrn there is no genume asue of makdal fact md the moving party is entiNed to judgmentas amatteroflaw. Dootinv. EnvironmentalPowerLtd., 360A2d493, 496 (D. C. 1976). The moving party bears'"' the burden of proving that there are no material facts at issue. Id ; Tumer v. American Motors Gea Corp., 392 A2d 1005, 1006 (D. C. 1978). All facts must be viewed in the light most favorable to the opposing pariy. Id Summuy judgment is especially inappropriatein premisestiabth'y cases in which there are disputedfactswith regard to the defendant's negtigence. Id. at 1007. A jury must decide whether a defendant'had control over the premises or the ability to employ adequate measures for [the ptamtifE's] protection from foreseeable dangers... [and] had proper and sumdently discharged its duty m that respect."Viands v. Safeway Stores, Inc., 107 2dll8. 121 (D. C. 1954) ; Seaman Body Coporatioa v. lndushial Commission, 204 Wis. 157. 235 N. W. 433 ( ! 931). The j) ty in such a case should be instructed that the defendant did indeed have a duty to talce rcasonable carc to discover foreseeable da% us and to protect those on its premises-includiag ihe plamtiff-frompoteatialhazardsbyissuiqgmadeqoatowamiog. IdSeealsoWasldnSgtoaMetropolitmAreaTrmsitAuthority ; - v. Johnson. 699A2d404 (D. C. 1997). See also WIS. STAT. § 101. 11 (2002). A defendants duty to protect a person from injury on the defendant's property is no betber lus4xted tban in cases m wbich the' !' defendant faaed to light a pathway on its premises. When a low-shung wire or dark object on the gound obstructs a place where people could reasonably be anticipated to walk, the defendant has a duty to wam The most apparent method for creatotg m adequate wamiag is by msplg a &ght This point is etocidated by cues from other jmisdictioas tbu bave eoaaidercd tbe issue of tiab7hy under facts closely analogous to those at issue here. For example, in Baustein v. Levitt, 264 N. Y. 5. 2d 318 (App. Div.), appeal denied. 266 N. Y. S. 2d ~' 1025 (1965), a tenant sued his landlord for injuries sustained when the tenant M in the apartment building's parkinglot. The plaint aBer parking his car on a duk, raiay tvgirt, ampted to aoss the parking lot by walking across m'island'situated m t ; t the lot between the parking jo., _-e fr. which,. wire. W_ c, ,-= y, Figure 31 : A word-processing document in Microsoft Word 2. If you are prompted, enter the Matter ID for the matter to which the document pertains.

Note: This Matter ID is saved with the document as part of its custom properties. To access the Matter ID in order to delete or modify it, click the Word File menu, click Properties, and then click the Custom tab.

While West km is running, a dialog box is displayed showing how many citations were found in your document.

When West km is finished running, a hypertext link to Westlaw is created for each citation in your document. a a KeyCite status flag is added next to each citation in your document that has available KeyCite information (Figure 32).

Generating KeyCite Information for Your Document View the KeyCite t status flags in your document to verify J D ci, # i ' I3a - t). 6. '' t. : EJ I-. BC, tt.. () toox. _- : _> xaas ; ; the status of your the status of your ARGUMENT judgaent as a matta of law. Doolia v. Fnvironmmtat Power Ltd, C 360 A2d 493. 496 tD. C. 1976). 11e moving party bears the burdrn of proving dnat tbtte arc no matecial facts at issue. C Id. ; Tumtt v. Ameican Motors Gea Cop., C 392 A 2d 1005. 1006 (D C. 1978), p116cts must be viewed in the h3bt most favorable to the opposing party. C Id Summary.' judgment is especiaSy inappropriate in premises liability cases in which there are disputed facts with regard to the defendant's neg6gence. C Id at 1007. A jury must decide whether a defendant'had control over the premises or the abtJityto employ' adequate measures for [the plaiatiff s] protectioa Eom f eable daagers... [and] bad property aad sul8ciendy discbarged its daty in tbat respect'ands v. Safeway Stores, Ine. C 07 A°d 118 121. C 1954) Seaman Body Coporationv. Tadust'ul Comraissio r 0. 1 Wis. 157 335 N. Vl. 43. 931. T'ne jury in sach a case thould be iashucted that tlte defendant did indeed have a duty to take reasonable care to discover foreseeable dangers and to protect those on its premises-indudirtg the ptaiotiff-firom potential Lazards by issuing an adequate wamiqg. Id. See dso'WnEngton Metropolitan AreaTransit Authorityv. Johnson, P699 A2d 404 (D. C. 1997). Se-also KCWis. STAT, b 101. 11 (2002 ;. ^, A defendant's duty to protect a pasoa from injury on tbe defendanf : property ia no better Wstrated than in caset m which the defendant failed to light a pathway on its premises. When a tow-strung wire or dark object on the ground obstructs a place where people could reasonably be anticipated to walk, the def mdant hu a duty to wam.'ILe most apparevtmethodfor creating an adequate warning is by installag a light Thit poiot u eluadated by cases 6nm other judsdictione that bave conxidered the isaae ofliabi&ty undc fncts dosdy analogous : :' to those at isme here. For example, in Blaustem v. Levitt. H 264 N. Y. S. 2d 318 (App. Div.), appeal denied, IM266 N. Y S 2d 1025 ( ! 965), a tenant sued his landlord for injunes sustained when the tenant feU in the apartment building's paiidng lot The pwntff. affm parking his cu on a dark. rainy night, attempted to cross the pairing lot by walking ilcross wrn'isbnd situated in the lot between the parking area and his building Placed in the center of the island was a young tree from which jazzy ==L . -'. ' Figure 32 : Citation links and KeyCite status flags added to a word- , processing document Note: In Microsoft Word, KeyCite status flags will not display if you have set picture placeholders to display for graphics in your document. Open the Tools menu, click Options, click the View tab, and clear the Picture placeholders check box to turn off this option.

34 Generating KeyCite Information for Your Document Updating KeyCite Status Flags You can update the KeyCite status flags in your document so changes in status are easy to identify.

To update the KeyCite status flags in your document, click Update Flags on the toolbar (Figure 33). The KeyCite status flag is updated for every citation in your document that West km had previously converted to a hypertext link. Citations whose KeyCite status has changed are highlighted. w !- a e e aW ia T, t re>aw tt Click Update Flags to update the KeyCite p : cx ti I tt 'j : H II#j r. j-', CI td'' . tl tl ) t' [x iatns ; j. update flags in you ...... i. 0 6-01 document. Summary judgnmt u aPProPeinte whm thete is no gemr : ne ism ofmaerw fact and the moviag puty is mtiHed to judgment as a matter oflaw. DooEn v. Environmeotal Power Ltd., 0 360 A. 2d 493. 496 (D. C 1976) The moving party bears the burden of proving that there are no matesial facts at iasue. C Id Tuma v. American Motors Gen. Corp., e 392. : A. 2d 1005. IOOti (D, C 1978) All facts must be viewed in the tight most favorable to the opporiag parLy. e Id Sy judgment u especially inappropriate in prmuses liab7ity cues in wlich thae are disputed facts with regard to the de&ndaat's negmce. C Id at 1007. A jury must decide whether a defmdant'had coNrol over the premises or the ably to employ adequate =s for (the plaffs] gmtection from foreseeable dangm... [=dl had property and sufficl-n discharged its dlty ia thrt respect Vrands v. Safeway Stozes. Inc.. O 107 A2d 118,. 121 (D. C. 1954) : Seaman Body Corporation v. Indushial Commission. r20 w. 157. 235N. W 433 (1931). The jur/yia such a case shodd be msuckd thatthe defendant did indeed hate a duty to take reasonable care to discover fbreseeabtc danger : and to protect those on its premises-includiag the pliiatora potential hd warning. IcL See also Wobingm MetropoEtan Area Transit Authonty ?. Johnson. - See also KC7] S ? rAT 5101. 11002). A defendants duty to protect a pmon &om injucy on the defendant's property is no better iltustrated than in cues in which the defendant fa7ed to tight a pathway on its premises. When a low-strung wire or dark object on the ground obstructs a place where people could reasonably be anticipated to walk, the defendant has a duty to warn. The most apparent method for creating an adequate warning is by instaNmg a ! ight. This point is ehmidated by cues Eom othajvisdictions that have considered the iseae of fiabdy umder ficts dosety aaalogous to those at issue here. For example, in Btaustem v. Levitt, H 264 N. YS2d 318 (App. Dn), appeat d"ied, 1, C266 r N. Y. S2dl025fl965). a tenant sued his landlord for injunes sustained when the tenant Ml in the apartment building's parking- lot The plais after parking his car on a dark, rainy night, attempted to cross the parking Jot by wascing auoss'isd, aGUated in the Iot betwem the parking area md his bmld°ng. Placed ia the cmta ofthe islmd was a youug teee &om wttich a ,,,,,.

Figure 33: Updated KeyCite status flags in a word-processing document Generating KeyCite Information for Your Document Hiding and Showing Citation Links and KeyCite Status Flags After inserting and reviewing citation links and KeyCite status flags in your document, you may no longer want them to be displayed in your document.

To hide citation links and KeyCite status flags in your document, click Hide/Show Flags on the toolbar (Figure 34). r ! : a s Chck Htde/Show ' .. '" Click Hide/Show Fla stoeitherhideor show citation links flags. Summuyjudgmmt is appropdate whea lbtte ia no genvine issue ofmafedal fact and the moving party is mEOed to judgment n a matter oflaw. DooUn v. FzvironmenW Power Ltd., 360 L2d 493, 496 (D. C. 1976). The moving party bears the bueden ofprov'n, g tbat there are no mateial facts at issue. Id ; Tuma v. Amedcsa Motors Grn Coep., 392 A2d 1005, 1006 (D. C. 1978). All facts must be viecved ia the tit most favorable to the opposing party. Id Summary judgment is specially inappropriate in premises hboy cues in which there are disputed facts with regard to tbe d ; bndant's neESnce Id at 1007. Ajury must dedde whetha a defendaot'had control over tbe premises or the ab7by to employ adequate measares for [the plamtis] protectioa from foreseeable dangers... [snd] had propuly and suffdw0y discharged its duty ia : ; : tbatrespecc'U'uads v. Safeway Stoms, lne., 107 A2d 118, 121 . C, 1954) ; SeamaaBody Coporation v. Iadusttial Conumssioo. 204Wu. 1S7, 23SN. W. 433 (1931). TnejumsuchacMeshouldbenutnMedthataiede&ndantdidmdeed have a duty to take reasonable care to dscova foreseeable dangers nad to protect those on its premises-iaciudi0. g tbe pttinti-6'om potential hazards by issuing an adequate warning. Id. See also Waslvagton Metropotitm Area Transit Authority V. Johmon, 699. A-2d 404 (D. C. 1997). See also Wis. SRAT. § 101. 11 (2002). A defmdaat's duig to protect a persoa &om iajury oa the defeadant's properiy is no better Mustated dm in cues in which the defendant fuzed to iy ; ht a pathway on its premises. When a tow-strung wire or dark object on the ground obstructs a place wbae people could reasonably be anticipated to wafk, the defendant has a daty to wam. The most apparent method for mating an adequate wming is by mstal (n a fight This point is ehmidated by cases from other AuisdicEom dut have considmd the issue of tiabitity anda facts dosely snalogous -' to those at issue here. For example, in Btauttem v. Levitt. 264 N. Y. S. 2d 318 (App. Dw.), appeaids6d 266N. Y. S. 2d ; 1025 (1965), a tenant sued his landlord for injuies sustained when the tenant fcN in the apartment building's parkmgtot. Tbe pl a&r pmlg Lis car on a dark, raiay sot, attempted to aoss the pukiag lot by walkiag aaoss m'islaad'W akd m the lot between the parking area and tns building Placed in die center ofthe island was a young tree &om which awire was '. 2S l"b d Figure 34 : A word-processing document withoutcitationlinks or KeyCite status flags To display the citation links and KeyCite status flags in your document, click Hide/ Show Flags again.

The current view (hidden or shown) is in effect when you print your document.

Once you insert flags, it is best to edit your document while the citation links and flags are shown. If you prefer to edit your document without citation links and KeyCite status flags, first delete them by clicking Delete Flags. Then edit the document and reinsert the citation links and KeyCite status flags by clicking Insert Flags (see"Deleting Citation Links and KeyCite Status Flags"below).

Deleting Citation Links and KeyCite Status Flags To delete citation links and KeyCite status flags from your document, click Delete Flags on the toolbar. This action permanently removes all West km information from your document. If you want to show-citation links and KeyCite status flags in your document after deleting them, click Insert Flags again.

36 Generating KeyCite Information for Your Document Linking to Documents on Westlaw Once you add citation links to a document with West km, you can link directly to documents on Westlaw.

To open a document in westlaw. com, click the hypertext link of the citation in your document (Figure 35). Click a hypertext link to open a document on Westlaw. ARGUATM ' nacu>tix S=mzyjudgmea is 2ppropnate only whmdi= is no gmine is= ofmatuw fact and the moving putyu entitled to judgtaeat as s matter of law. Doolin v. Eavirovmmtal Povra Ltd., C 360 A2d 493. 49G iD. C. 1976) The moving party thae arc no matesial facts at issae. C Id Tama v. Atnesicea Motors Gea Cosp., C 392 wtberarenOmaterfjtERCtSatUSUe¢WTUrnerVVASCrXS ; mMOtOrSiCOrPRe392 A2d 1005. 1006 (D C. 1978). facts nvut be viewed ia the bt most fivonble to tbe opposing pany. OId Summuy sute'es tiab0ity carcs ia wbich thae are dispvted facts wdh rcgad to tht defendas a p r t neglience. CM. at 1007. A jury must dedde feadam'had control over ibe premises or the ab9'dy to employ adeqaatemeuuresfor (thepl>m>is] protectioafrom6frnseen Cs daty m that rcapect'Iands v. Safewap Storca, Ine., C) 07 A ladmaial Commusioa, h204 Wis. 157 235 N. W. 433 (1931). defemdmt did indeed bava a duty to take reasonable cue to discs premises-mchdins the p) aintia ?-B'om potential hazards by issuinj, '& ; ttm. t. bL-tropoEtm Am& Transit Authority v. Jobwot4 P-699, A d404 tumour v. Ameriran Motars Caneral r_wowauN_ A defendzf 5 dufty eproteCttba per¢5a fts prermses Wben a tOW-fU v 7 t as2 ^. 2dPiftoe WSt defendant faed to E& a pathway on its preraises. VWnhe=n a low-Syilb. 1). C., 197a. WIlrlC people coatdrcasoaably be aoticipated to walk, tbe defen , , . f ; l, Nqu. d Mareh 16, 197a. (Approa. 4 p.... cresting nadequtewanDDjitsbyrrtilngab3bt twepatlitpi^ a"S 8w i - Thispointiseiucidatedbycasesfromothajmisdictioasibathave'.' : KC, 9 tiQDCj&). r Buspasseuger6ledsu'dagaiosttransitaadtotityandmanufacdrerofb ustorccover"' to those at issue here. For eaarople, in Blaustein v. Levitt, forit*6es received by hffinfau on bw because ofg2eged defective design ofbw. NY. S. 2d1025t19G51. ateaantsuedhislandlordforinjuries Prin (Al Options " t ! TheSupeliorCourt, FredL. McIntyre, J., granteddefendantmanu6ctura'smotion lot The pointe after parking his ear on a dark, rainy at. att , . 't. for aummasyjudgmeat, end plamtnffappealed The Court ofAppeals, Kelty J., held : ; situated in the lot between the parking area and hu bmldmg. Plac apdte)i51. 1. Ist] Etrh"nced.-C, p, t" i] !, :. tbs ! Plais daim ofnegtigent desipt of bus and mamrufacturer's defense of 1t 91'.-"' coambatory aegtigence raised qaestiom of fact tbat rbovld have bem dedded by i. Tijmer v. American jmy pnchtd-aryj*- Reversed and rded for tria < ; t Nebeker J 6ted co cu r wi * t S {-t jffT _E ; : Oct ib, s970^^ s. (A, "aM. r.. ' Nebeker, J, 9ed concnrting opioa West Ileadnotes s . x ; LijKevCaeNotea .. : 228 Judgnent.. Z228V On Mokon or Summmy Proceeding e : :. 228k181 Grounds for Summary Judgmem '. -. Figure 35: A citation's hypertext link in a word-processing document and the citation's full-text document on Westlaw.

Generating KeyCite Information for Your Document Accessing KeyCite Information on Westlaw Once you add KeyCite status flags to a document with West km, you can link directly to KeyCite information on Westlaw.

To view KeyCite information for a citation in westlaw. com, click the KeyCite status flag for the citation (Figure 36). Click a KeyCite status flag to view °lnwt .. Hraihtw, 'aiugr r r. t, KeyCite information on Westlaw. ARGUA4MT Summary judgment is appropdate on when tbere ie no genvine issue of mataial fact md the movg pany is eatiNed to junmt u a matter of law. Dootia v. Fnv'aoammbl Powa Ltd., 4 360 A2d d93. 496 (D C. 19761. Tbe movang paAy bern the burden ofproviog that therc arc no mateial6cb at issue. O Id. ; Tumtt v, Amedem Motora Grn Cosp., t9 392 A2d t 005. 1006 tD. C. 197> ;). All 6cb must be viewed in the light most favorable to the opposing party. a Id. Svmcaasy judjvúentir erpedaüy isppropdate rnprernues iiabinty caues enwhich there are duputed facts with re ; prd to the de8endimfs' neg) igence. CId at 1007. Ajtey nwst dedde whether a defendam' ad control ova the premises or the abHity to employ adequab measures for [the plaintiff ] protection from forcseeable daagers... [and] had properly and sucieatdy diseLrged itsduiyiatbatrespe dsv. SafewayStorcs, Inc., 707A2dit8. 1 ? t (D. C. 194) : SeammBodyCosporatioav., Iadusaial Commissio h 04 Wis. 157 235 N. W. 433 t931. Tbe'in such a case should be iestucted tAat the de&adnat did indeed bave to take reasoaable cerc to disco did. premiset-'mcdtdngthep.. ompotmtialhanrdsbyis' MetropotitmAreaTransBAutho v. Jolmso0. h699A2d404 : : f1'tekitsvf : yr t o [tex j fs. ; ntraao tab ! mts k, s Mota . . " A defeadant's duty to protect a penon iajusy oa du defen, . y, yV..-." defimdant faied to b& a pathway on its pr'es. When a low-st where people coiddmmonablybe anticipated wakthe&fmd 235 H. W. 433 t' :, tdtt. J l4fii. sistt3CCtdhgite] riXs. ; u. V..., a3sn. w. a3 creatiqg m adequate wam'mg 6 bp instatli a ligbt. . : : :, sesu.. m.. 1931. 93 (Appx. I page) this point is ehuddated by cases from other judsdictions have NiW tit8t] titt t.,, _ : :, xy to those at issue here. For enmple, in Baustein v. : : 204 N'SS. 157 1, T.-f. S2d 1025 (1965). a tenmt md his landlord f"iq*es iv lot Tlu p1 a8a paddng his csr oa a dack, ramy at9ht, att v Appeat from ajudgneat of tbe Cimuit Court for Dant Couaty ; A G. Zmama0. ; " sffiuftd in the lot between the parki4g area and his bwft Plat N fio Cicu Judge. Hi IOphonv : L. fAlfst,. ; t t : - J, nma ", ,", ., y, s , , ; :, p * T6is action was commmced on tbe 9th day of October, 1929 in the crcest court 4 . for Dam covoty to set aside m ordtt md award of the Indushial Coamasaoa m a ; ' ;--certainproceedinginw/richClemmtTiskewiczwuapplitammdSeama aBody Corporation, Chades Abresch & Co. md Bmployers'Mutual Iiabitity Iasurmce ompany wen mspondm-&. The commission found *at the applicant, m Febnwy 22, 1929, at the time he wu iajnred, wu not m employee of C6arles Abrescb & f : . ; Co., butwas in the employ ofthe SeamanBody Corporafion, md awarded Icompensation accordin*. On appeal to die circuk court it held *at the appecank at d time he was in was an mployee lomed by the Se Body W*oo #do g W'Corporafionto Charles Abresch &Co., and was in the employ of the latter. From end on the 3d day of 1930, setting aside the order and award, 'su. ' a. yeM a",. a.. 2. ; _-r'md remanding the record to the Indushial Commission, Chades Abresch & Co*, 9 ^ "'I md Fmployers'Mumal Labilily Tnsuraace Compmy appealed N 111atGav us. EsteilatqfY tttt't- !'t r ( t Lncate r ( Figure 36: A KeyCite status flag in a word-processing document and KeyCite information on Westlaw 38 Generating KeyCite Information for Your Document r 1 km l 1 ! Ll ! 111 l lll_ ll ! 1111 n s r, r i _ s .. illl I 11 I it-''', : f, dt | 1-I _ _ .,. i..,. : ;' l | | l | _ ! ; fu n 2. 0 , _ l W l _ ; g / / : : : BB U - I. _.. Li £ ; i xa, I ; l i i I I L I gllL iN i iR I i Customer Service If you have questions about West km, please contact us: For help with: Call or e-mail : General or technical questions West km Technical Support 1-888-877-6529 (option 8) kmsupport@prolaw. com Search questions about Westlaw or West km West Reference Attorneys 1-800-REF-ATTY 1-800-733-2889 west. referenceattorneys@thomson. com Billing and account assistance West Customer Service 1-800-3284880 west. customer. service@thomson. com Notice About This Guide West continues to develop new features and improve existing features for this product. Because of these improvements and the evolving nature of Internet technology, some screen displays and features may have changed since publication.

Information in this guide is current through June 9,2003.

Authors: Jana Otto Hiller, John Cavatieri, Alan Redding, John Richmond, Bob Sturm, and Brett Truhler KeyCite, KeySearch, Wesdaw, and westlaw. com are registered trademarks and West km is a trademark of West Publishing Corporation.

Internet Explorer, Microsoft, and Windows are registered trademarks of Mcrosoft Corporation.

Corel and WordPerfect are registered trademarks of Corel Corporation.

Lotus Notes is a registered trademark of Lotus Development Corporation.

0 2003 West Group. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic or mechanical, including photocopying, recording, or otherwise, without the prior written permission of the publisher.

West 610 Opperman Drive Eagan, MN 55123-1396 Printed in the United States of America t | 7 | 1 West km Overview 1 1. 1 West km Features 1 1. 2 West km Server Components 1 2 Installing the West km Application 5 2. 1 What You Need 6 2. 2 Run the West km Setup Program 7 2. 3 Enable ActiveX Controls and the West km Client Application 14 2. 4 Disable Anonymous Access for Full-Text Searching 15 2. 5 Create the West km Database 16 2. 5. 1 Create the West km Database 16 2. 5. 2 Import KeySearch Data into the West km Database 20 2. 6 Create the West km RID Database 22 2. 7 Configure 2. 7. 1 Install the CaRE Flat-File Database 25 2. 7. 2 Modify CaRE Memory Settings 26 2. 7. 3 Set Number of KeySearch Topic Assignments per Document 27 2. 7. 4 Install Simple CaRE Driver 27 2. 8 Start West km Services 29 2. 9 Verify Properties for the Event Log 29 2. 10 Set Security 30 2. 10. 1 Integrated Windows Authentication 34 2. 10. 2 West km Custom Authentication 36 2. 10. 3 No Authentication 38 2. 10. 4 Minimum Security Requirements for West km 39 2. 11 Configure DMS Services 44 2. 11. 1 Configuration for DOCSFusion 5. 0 44 2. 11. 2 Configuration for manage 45 2. 11. 3 DMS Properties in Configuration Files 46 3 Administering the KeySearch Hierarchy 49 3. 1 Customizing the KeySearch Hierarchy 50 3. 1. 1 Adding a KeySearch Topic 51 3. 1. 2 Editing a KeySearch Topic 52 3. 1. 3 Copying a KeySearch Topic 52 3. 1. 4 Hiding and Showing a KeySearch Topic 52 3. 1. 5 Deleting a KeySearch Topic 53 3. 2 Assigning Documents to a KeySearch Topic 53 3. 3 Removing Documents from a KeySearch Topic 54 3. 4 Deleting Documents from West km 55 4 Indexing Your Organization's Documents 57 4. 1 What You Need 59 4. 2 Access the Administrative Tool in West km 59 4. 3 Designate Administrator Accounts 60 4. 4 Designate Databases Containing Document Collections 61 4. 4. 1 Designating Databases with iManage, DOCS Open/PCDocs, DOCSFusion, and Lotus Notes 61 4. 4. 2 Designating Databases with ProLaw Version 9 62 4. 4. 3 Designating Databases with the NT File System 63 4. 4. 4 Editing Databases 64 4. 5 Define and Index Document Collections 65 4. 5. 1 Define Document Collections 65 4. 5. 2 Add Document Collections with ProLaw Version 9 68 4. 5. 3 Index Document Collections 69 4. 5. 4 Removing Document Collections 70 4. 5. 5 Monitoring Indexing of Document Collections 70 4. 5. 6 Stopping Indexing 73 4. 6 Synchronize Document Collections 73 4. 7 Create and Update Full-Text Indexes 74 4. 8 Set a Document Security Level 75 4. 9 Administer West km Members 76 - 4. 9. 1 Finding a Member 77 4. 9. 2 Adding a Member 78 4. 9. 3 Editing a Member 78 ii Contents 4. 9. 4 Adjusting the Professionals Table Configuration for 78 4. 9. 5 Using the Professionals Table with West km Custom Authentication.......... 80 5 Tracking Program Activity 81 5. 1 Monitoring Events 81 5. 1. 1 Information Events 81 5. 1. 2 Warning Events 82 5. 1. 3 Error 82 5. 2 Using Trace 82 5. 2. 1 Configuring West km Trace Logs 84 5. 2. 2 Configuring CaRE Trace 85 5. 2. 3 Viewing Trace 86 5. 3 Tracking 86 5. 3. 1 Turning Usage Tracking On and Off 88 5. 3. 2 Querying and Exporting Usage Data 88 6 Setting Properties in Configuration Files 89 6. 1 Setting Properties in a Distributed 90 6. 2 Changing Your West km 92 6. 3 Changing the Display of Your Citing 92 6. 4 Configuring Document Counts in the KeySearch Hierarchy 94 7 Backing Up and Removing the West km Application 97 7. 1 Backing Up West km 97 7. 2 Removing the West km Application 97 7. 3 Removing West km 99 7. 4 Removing the Web Share Virtual 100 8 Installing the West km Client Application 101 8. 1 Installing the West km Client at a 101 8. 1. 1 Configuring the West km 103 8. 2 Silently Installing the West km Client over a 104 8. 3 Modifying or Removing the West km 105 Contents Appendix A : Installed West km Databases, Folders, and. dll Files....... 107 Appendix B : More about the West km Automated Setup 109 Appendix C : West km Ports 119 Appendix D : List of Properties in Configuration Files 121 Index 149 /' iv Contents West km Overview 1.1 West km Features 1 1.2 West km Server Components 1 <BR> <BR> <BR> <BR> <BR> <BR> <BR> f'i<BR> <BR> <BR> Welcome to West km (West knowledge management), a legal research product that integrates KeyCite and full-text search technology with your organization's internal documents, such as briefs and memoranda.

1.1 West km Features With West km, members of your organization can easily find and reuse your organization's best work. In westlaw. com, members can build a citations list of your organization's documents that cite a Westlaw document. They can also access your organization's internal documents and Westlaw content simultaneously using full- text search methods and the KeySearch hierarchy of legal topics.

West km also embeds citation links and KeyCite status flags in word-processing documents, providing instantaneous views of the validity of legal citations in the document.

This administrator guide explains how to t install, back up, and remove the West km application administer the KeySearch hierarchy index document collections at your organization track West km program activity # set properties in West km configuration files # install the West km client plug-in This guide assumes you are familiar with your organization's document management system (DMS), saving searches in your DMS, and network administration.

For more information about West km end-user functionality, refer to the West km User Guide.

1. 2 West km Server Components West km comprises several server components, as shown in the following West km Systems Diagram. West km Systems Diagram Westlaw RID West km information in Westlaw password. Westlaw password. - Passes name of West km server to workstation - Pa sses organization name to label subtabs Westlaw Servers Cite ID Servers (RID) Organization's Firewall _ i°i i DMS Citation recognition requests ; returns cite IDs. Must have organization's i__ source IP address for RID's security validation Can be one server DMS Database Server DMS Document Storage s if under 100 users if under 100 users r i _________________________________ I______ ________ _-____ _ I : I I I I server Workstation Wof4cstation--- I I i ; pppp I I I IILLJJ I Makes calls I I to West km HTML Document Server (s) I (can be separate if I I I p pp p p ?'sip ! high-bandwidth connection) I I , NDD0DO0j o S0DDD, iDD v j--- , I oaoocc'ao, apo _. _ I West km/OS Web Server indexing Server t ! ! !' (Delivery Server) 1 I West km Database I ___________-_________-______-_______-____ L---------------------------------------------------------- 2 Chapter 1: West km Overview Following is a description of each server component: West km server: Operates as the center of West km operations. It provides the front- end administration and also schedules indexing. (The West km server resides on the same machine as the IIS Web server; together they are referred to as the delivery server.) US Web server: Supplies the ASP. NET environment for the West km administration front end and uses the Internet to access and display indexed documents in westlaw. com. (The IIS Web server resides on the same machine as the West km server; together they are referred to as the delivery server.) Indexing server: Converts documents to HTML, finds citations in documents, assigns documents to KeySearch topics, and records citation locations and KeySearch assignments to the West km database. RID (reference identifier) engine software on the indexing server identifies citations, and West's classification and routing engine (CaRE) software on the indexing server assigns documents to KeySearch topics.

West km database: The West km database stores metadata about documents (e. g., KeyCite data about document citations, KeySearch topic assignments), document profile information, data for indexing scheduling, and KeySearch data. The West km RID database stores Westlaw document references for citation identification.

HTML document server (s): One or more HTML document servers store HTML renderings of indexed documents and full-text indexes of document collections. Each DMS database or library is mapped to an HTML folder with several levels of subfolders. At the bottom of the hierarchy, each HTML document is stored in a unique subfolder containing an HTML conversion of the original document (with no citation markup) and a style sheet file.

DMS server: Houses your organization's document management system and managed documents.

Cite ID servers (RID): If citations cannot be identified locally, Cite ID servers at West analyze documents to determine KeyCite information for citations and retrieve reference IDs to link the documents to Westlaw.

Westlaw servers: Hosts Westlaw services.

KeyCite flags server (not shown): Determines the current status of a KeyCite citation.

One dedicated server can be used for all West km server components (excluding your organization's DMS, which should reside on a separate server). Or, components can be distributed among several servers. Your ideal configuration will depend upon the number of users at your organization, the number of documents you are indexing with West km, the size of the documents, and the number of citations in the documents.

Following is a diagram of a typical server configuration. The West km database can reside on its own server or on the indexing server; likewise, the HTML document server can reside on the delivery server or on one or more separate servers.

1.2 West km Server Components Typical Server Configuration for West km Doms y DMS Database i aaoana oaaaaoo < ílDDI101 L I. Database C l DODODt E West km/IIS Web Server DMS Server (Delivery Server) West km Database r I r rs p M1 . r--7 smm am mm C 30DODOI _ 0000000 b C UOOUOOO HTML Document Server (s) Indexing Server For detailed hardware and software requirements for West km, visit www. westkm. com/sysreq. html. For details about the configuration properties related to a distributed architecture, see"6.1 Setting Properties in a Distributed Architecture"on page 90.

4 Chapter 1: West km Overview Chapter 2 Installing the West km Application 2.1 What You Need 6 2.2 Run the West km Setup Program 7 2.3 Enable ActiveX Controls and the West km Client Application 14 2.4 Disable Anonymous Access for Full-Text Searching 15 2.5 Create the West km Database 16 2.6 Create the West km RID Database 22 2.7 Configure CaRE 25 2.8 Start West km Services 29 2.9 Verify Properties for the Event Log 29 2.10 Set Security 30 2.11 Configure DMS Services 44 The following table summarizes the software and databases that are installed with West km: West km HTML Delivery Database Indexing Document Software Installed Server Server* Server Servers Full-text searching (FTS) X X software (NextPage NXT 3) West km server application X West km database X West km RID database X West km indexing service X West km HTML Delivery Database Indexing Document Software Installed Server Server1 Server Servers West km HTML search service X RID engine X West's classification and X routing engine (CaRE) 1. Databases on the West km database server are installed manually.

To install West km, complete the steps in the following subsections.

2.1 What You Need Prior to installing West km, visit www. westkm. com/sysreq. html to make sure you meet the hardware requirements and that the necessary server software (and software versions) are installed. If you are distributing the West km server components among several machines, the following table summarizes the required software on the West km server components prior to the West km application installation: West km HTML Delivery Database Indexing Document Software Requirement Server Server Server Servers Windows 2000 ServerXXXX Internet Information Server (IIS) X Microsoft SQL Server X Internet Explorer X Microsoft. NET Frameworkt X X X Sun Java Runtime Environmenti X 1. Microsoft. NET Framework and Sun Java Runtime Environment can be installed as part of the West km installation.

Note: If your organization uses a Sybase database server for ProLaw Version 9, and you want to take advantage of the West km integration with ProLaw, you will need to install OLE DB Provider on the delivery server and the indexing server to enable a connection with the Sybase database. Please contact your ProLaw support representative for details.

Prior to installing West km, you will also need the following: « Access to all West km server components and the names of the servers e-The West km CD-ROMs a A folder where you want the West km database to be installed 6 Chapter 2: Installing the West km Application a Information to set up your initial West km administrative user, including name, network ID, and Westlaw password a The password for the kmuser account to enable ActiveX controls and the West km client application (you will receive this password from West km Technical Support) a The username and password for your system administrator account in SQL Server (on the server containing the West km database) a If indexing documents stored in DOCSFusion 5.0 or iManage, your installation disks for these programs 2.2 Run the West km Setup Program This series of steps installs the West km software. If you have one dedicated server for all West km server components (excluding your organization's DMS), you can complete these steps only once. If you have a distributed architecture, complete these steps for each of the following West km server components that resides on a separate machine: t Delivery server t Indexing server « HTML document servers 1. Close all open applications.

2. Insert the West km CD-ROM 1 (Setup) into your CD-ROM drive. At the root folder, double-click setup. exe.

3. If Microsoft. NET Framework is not detected, you will be prompted to install it.

To do so, click Yes at the Microsoft. NET Framework license agreement. West km will then install and configure Microsoft NET Framework.

Microsoft. NET Framework is required on the delivery server, indexing server, and HTML document servers. - re°am°r°imte axauetar, or » anrrsrrg :. SUPPLDgWAtEND FOR "m4 « mS r, Ou '^ com i u REEID BEDOUNI) SY THE 1EAMS C a : . Mectrark a>iGa, 'fi3tax"jarn wkvrram ., - InfNrsaDroer : a, ! srokrhyauhsr° rNe , eppistUCeMietw^, afswarttsdanprt <'od ? WT ro 0 f so li4e anos PFIODUCT EM , : eddeCamarrdnott6io8IanaAdr£ (yCh. t 2 tHpBSUt s Bopaw #gt « tptAQi « ? 1E d*-eNQ t# ! iPtgfltÙ*XeX@ee* DTHISSUtWI. EMENTAIdCA YnUCYQNnt. 0. GfCEETd yj. Dps° « xaE°rIseamxatasnus. irauaaaxmen>ri, au : dioG. roNa. rnstaIIwINwe. teinldtsaumuNaxepr... duasmmxnt :- 2.2 Run the West km Setup Program 4. If Sun Java Runtime Environment is not detected, you will be prompted to install it. To do so, complete the steps below. Java Runtime Environment is required on the indexing server. a. At the Java Runtime Environment License Agreement screen, click Yes. x S= ; = ; 6 - CM ', , =-; ' 'OF $A4 COi YMP h 84friN "Sl. Gi sss g CEi GA4#1H YtettAAHbTNIH TOdp. GF tEBMS MP1#a i ! #'THS'NHilS6tfr't !. °&'f43F1. .. . dFPtld FQ AifJllFDilIi. IFiHESf ! S ! sM : ! ! se6.'p ; BS. a ruz term i b. At the Choose Destination Location screen, accept the default location and click Next. w xar, rri, irrrio rws.. ,, w F 5. If Internet Explorer 5.5 or later is not detected, a warning dialog box will display.

Click OK to continue with the installation. You need to install Internet Explorer 5.5 or later on the delivery server when the installation completes in order to have access to all features. . 0'I"'11, I ! °,.,, ., "; 6. Do the following when you are prompted by the West km installation wizard: 8 Chapter 2 : Installing the West km Application a. At the Welcome screen, click Next to continue. Wak to ttm lnxtaishidd Vr"d lm Wazt ka _ Wllbo_ lo Iho InddSheld Wd 1ol Wul ks _ The IndatSFieId Wsad wi iutel Wea km anyou =Wm To cmtivmckkNeA '"i u ; m", 4t".'-5--, . r ( ri b. At the Important Information screen, review the list of prerequisite software.

If all necessary prerequisite software has been installed, click Next.

(Otherwise, click Cancel to exit setup, install the prerequisite software, and rerun the setup program.) x i dathk*_i=h4Wo X E iN m w s f < tE .", Q f ^, a ai * y °b. rx It% ri' e. . 2i t 4 ca'dl4ta 3 S''4s'a , ^. 'v, y >t"s , 's 3 s. s. Sfnu », y' c. At the Choose Destination Location screen, select the folder where you want West km installed: 'To install to the default destination folder, click Next.

To install to a different destination folder, click Browse, double-click the folder for installation, click OK, and then click Next to continue.

2.2 Run the West km Setup Program v R | oa Sde SdU J S g h x t p-=e se6d 1. 1d.. 1.. S&, W. 3 ita r- , r4 n, Fmlw----. _ =- rriy. at. ; aiar.. , , ;--_ itia. d. At the Select Features screen, select the features you want to install on this server and click Next. For example, if you are installing all West km components on one server, select all the features. If you are using separate servers for West km components (e. g. , a dedicated server for just the West km server), select only the feature (s) you want installed on this server and clear the others: SAt Fg.. i Sd Fulun, Gnoselhefedu SduPwlrslal Wat km HTML S-h S., i. ? ''1wea4n, ndmanpsen ; ce T . yWmtWnHTMLSexhSavice , kv x - G s ts.

The following software is installed for each selected component: West km Server West km server application Full-text searching (FTS) software (NextPage NXT 3) West km documentation files West km Indexing West km indexing service Service RID engine CaRE West km documentation files West km HTML West km HTML search service Search Service Full-text searching (FTS) software (NextPage NXT 3) Depending on the components you select, some or all of the remaining screens in the installation wizard will display.

10 Chapter 2: Installing the West km Application Note: If you opt not to install some features, you can install them later by rerunning the West km setup program and selecting Modify. e. At the Server and Document Locations screen, complete the following and click Next: In the Delivery Server text box, type the name of the server where you are installing the delivery server component.

In the Domain Name text box, either retype the delivery server name or type the domain name for the delivery server (e. g., yourdomain. com).

In the Indexing Server text box, type the name of the server where you are installing the indexing server component.

In the Database Server text box, type the name of the server where you will install the West km database and the West km RID database.

If you want to enable full-text indexing to run on your organization's documents, select Enable Full Text Indexing.

If you want to enable CaRE to automatically assign your organization's documents to KeySearch legal topics during indexing, select Enable Categorization. S-. d D-A Lw.. 6- SP-* c-Pm. *. aM A bbdd K'MSRV 13, mv s . k, M % RV > w y ..- : 2 f, t 3 tt k ff f E vs r '"e0. a ar F 2.2 Run the West km Setup Program f. At the Proxy Server Settings screen, depending on the configuration of your organization's network and if you have a proxy server, select Use a proxy server for your LAN and enter your proxy server settings. Then click Next. Pno'Swwr SNlipa Pm. Y servd Lt 1#Pqy7di'at6tyCdIfFAlF f i ? | _ , HSNYM9lt ;.', et 7 . cE C Yn | xE54 ; 4 ; ? s r t X g. At the Professionals Administrator Account screen, enter the information to set up the initial West km administrative user and click Next.

First Name: the administrator's first name Last Name: the administrator's last name Account: the administrator's ID to log on to your organization's network Westlaw Password: the administrator's password to sign on to Westlaw West km Username: a username for the administrator to log on to West km West km Password and Verify: a password for the administrator to log on to West km Note: The West km username and password are used only if you select the West km authentication security model; see"2.10. 2 West km Custom Authentication"on page 36 for details. Adssaiueah AdniuWata Aecard Spe* pd.-, 4 a=.," mu,. mars ys s rcetlu5879 ^ SK8, : 'IPfid9% . : 158792LaE ldGiSNk$i-i- : ^s,, <aae tie4ta : 12 Chapter 2: Installing the West km Application h. At the Start Copying Files screen, review your installation selections. If the selections are correct, click Next. (Otherwise, click Back to navigate back through the wizard screens and change your selections.) os ; 51an1 Cap¢p Fbs Bmw Edao wp, p fien." : St. t Copying Fikm Ri5. Vkq. bt., c. *V t , 4a WaitkrttSfty. ., 5 y _ C 1 S i. At the Setup Status screen, wait for the progress bar to complete. j. At the Wizard Complete screen, select the option to restart your computer (if it's provided) and click Finish. i InstalShiald Ward ConpWn _e hlsldlShield Wezd CO Th XmWshUlf2&d hYI idß bXbdW YM r Yes, I wmt M re9a1 rty campUa now. t Ye. ì wrl lo lef 111 nv ; wa now ! No. I Ramve any dha hae Hai dinas, rd Umddc Frnhro canplxe sanp. s uu Q. k kt tpdt ft. boL 7. If you were not prompted to do so in the previous step, restart your computer to complete the setup of the West km application.

The West km setup program automatically installs NextPage NXT 3 for full-text indexing and searching. For more information about the manual steps behind this process, see"Appendix B: More about the West km Automated Setup"on page 109.

For a list of databases, folders, and. dll files that are installed, see"Appendix A: Installed West km Databases, Folders, and. dll Files"on page 107. For a list of the ports that are used by West km, see"Appendix C: West km Ports"on page 119.

2.2 Run the West km Setup Program 2.3 Enable ActiveX Controls and the West km Client Application On the delivery server, complete these steps to enable the ActiveX controls that allow members at your organization to load your organization's documents from West km and to use the West km client application.

1. Go to Start I Programs I Administrative Tools I Computer Management.

2. In the Computer Management window, expand the System Tools item in the navigation tree in the left frame, and then expand Local Users and Groups. . L = ; 1 L (I X r : r : : w Wotor S+occout o... E3 s 5* Tk NET 0w_w « « ~ @. NET 60 cwolt MAwmt (LO"o DA-h a=A for adl* ft ,} 5wS REN k S+o=~w I EvtWaHa C t dibinaaantfapestxmsstot... 5ystp, ll9ZGEWFe... GsetGmtArmmt But-haurtfammymousxm... I-dcoMt P, dS Pi9 « * E 9urodFddus bnxx krx Di. MMW Pro6w Pro. appt Prol E, | w ç wX.. i - GeaCs Raaqs (£ SaNmsandfkaUau L. 4 u_ am Groups TIK. T. UJW Tll, *. n. UJ- This c-t 1,. d by Tor*.... Groups L-5-i and Appkft. BWMm' ! 3. Right-click Users under Local Users and Groups and click New User.

4. In the New User dialog box, do the following: a. Type kmuser in the User name text box. b. Type the password for the kmuser in the Password and Confirm password text boxes. You will receive this password from West km Technical Support, available at 1-888-877-6529, option 8. c. Clear the User must change password at next logon check box. d. Select the User cannot change password check box. e. Select the Password never expires check box. f. Click Create. g. Click Close.

14 Chapter 2 : Installing the West km Application x .. drax.., ,,,.. M v ! t''''^ v : e4* g ! g : C rdv r. , 3 i o 5. Close the Computer Management window.

2.4 Disable Anonymous Access for Full-Text Searching Full-text searching (FTS) software is provided with the purchase of West km.

Complete these steps on the delivery server and any HTML document server components that reside on a separate machine to disable anonymous access for full- text searching.

If you are using integrated Windows authentication as a security model, these steps are required to ensure that users are authenticated. If you are using West km custom authentication, these steps are optional. See"2.10 Set Security"on page 30 for more information about West km security models.

1. Go to Start I Programs I West km I FTS Content Network Manager.

2. At the Server Connection dialog box, type the name and password of your FTS administrator account in the User name and Password text boxes and click OK.

(By default, the name of the FTS administrator account is Administrator. The password you will receive from West km Technical Support, available at 1-888- 877-6529, option 8.) i S Xs Q ?. N S, < ; 2'V -I hKT1 ? iN2eway. d , 21$ ? ?,.'. w 'lisp$ . ee.,. ; ; ;, ?,, ,. .-/.)'QJJ 3. In the Content Network Manager window, right-click the root node (i. e., localhost or the server name) in the navigation tree and click Properties.

4. In the Server Properties dialog box on the General tab, click Properties under Access control module.

2. Disable Anonymous Access for Full-Text Searching 5. In the Access Control Properties dialog box, clear the Allow anonymous access check box and click OK. X ' : SY'ddied. lbn, EtGtKtItF'i. _-. wa dWblse. s ? ? 2 X r ; MowGe''ti ! NIdUklitolq1 x ? ? Z ? ;} s 6. At the Server Properties dialog box, click OK.

7. At the Content Network Manager, click the Apply All Changes button.

8. Close the Content Network Manager window.

2.5 Create the West km Database Complete the following steps to create the West km database and import KeySearch data into the West km database.

2. 5.1 Create the West km Database 1. On the West km database server, go to Start I Programs I Microsoft SQL Server I Enterprise Manager. The SQL Server Enterprise Manager window is displayed. ......... [ 9t ; s w n Group """"'"-"'. -"' ''--' -. ; "".. t'11 SQL 5.- 2. If the West km database will reside on a separate server, register that server: a. Expand the Microsoft SQL Servers item in the navigation tree in the left frame to display the list of servers. b. Right-click SQL Server Group in the navigation tree, select New SQL Server Registration, and then click Next at the Register SQL Server wizard.

16 Chapter 2 : Installing the West km Application c. Select the server to register from the list at left, click Add, and then click Next. d. Select the SQL Server Authentication connection option, then click Next. e. Enter the login name and password for the SQL server, then click Next. f. Add the server to an existing server group by selecting a group from the Group name drop-down list, then click Next. g. Click Finish and then click Close.

3. In the SQL Server Enterprise Manager window, do the following to create the database: a. Right-click the Databases folder below the SQL server that will contain the West km database and select New Database. r ;, b. In the Database Properties dialog box, type km in the Name text box. ' aae ! nif r aa iUit Nez ShicsY -Ni N, irdve 'i. 4% : a a. eaFS ;'. tr,. Iw MR6 iSPt !" "Gtr Isaveddul, °'.. razz .-, :.. v ;'a. ., : ..... m. i > t. s = S 0 n c. Click the Data Files tab. Under Location, click and edit the path to the desired location for the database.

2.5 Create the West km Database IL a oetbaaxK v.,,.. _ L T g v 1. : - d... r '', ". : , tet, (amde « a-. . .. . .. C ^^""d ; 10 " (d% kkNoag8at6k t71S, se j r :' ;, Httt d. Click the Transaction Log tab. Under Location, click and edit the path to the desired location for the database log file and click OK. - , ; 4.""c ri r ata. a. t ) 55S ~ . b '-0 > t gaz , i I . '" :' t, 5''; u-i 7 e. Close the SQL Server Enterprise Manager window.

4. Go to Start I Programs I Microsoft SQL Server I Query Analyzer.

18 Chapter 2 : Installing the West km Application 5. At the Connect to SQL Server dialog box, type the name of your SQL server, select SQL Server authentication, type your name and password of your system administrator account in SQL Server, and click OK. - . s.. . , :-,,.

6. In the SQL Query Analyzer window, click the File menu and click Open. In the Open Query File dialog box, navigate to the DB subfolder in the West km installation folder (e. g., C : \Program Files\Westkm\DB), select km. sql, and click Open. MYIOCmateuw. sq ~. 5 ;',, JBhnJJ". brLSo-*he ", be=_s, jL 7. Click the Execute Query button El on the toolbar. This step populates the West km database.

8. Repeat steps 6-7 for the following query files in the order listed: # km_1_01.sql (update the database schema from version 1 to 1.01) # km_1_1. sql (update the database schema from version 1.01 to 1.1) # km_1_2. sql (update the database schema from version 1.1 to 1.2) km_2_0. sql (update the database schema from version 1.2 to 2.0) km-create-admin. sql (create an administrative user for West) # km_create_user. sql (create a generic West km user) km_vlOCreateUser. sql (set up the initial West km administrative user) 9. Close the SQL Query Analyzer window.

2.5 Create the West km Database 2. 5.2 Import KeySearch Data into the West km Database After creating the West km database, you must import KeySearch data. This process will add approximately 30 MB of data to the West km database.

Note: Even if you don't enable CaRE, KeySearch data is needed to manually classify your organization's documents to KeySearch legal topics.

1. On the West km database server, insert the West km CD-ROM 2 (RID/ KeySearch) into your CD-ROM drive. Navigate to the KeySearch subfolder and double-click setup. exe.

2. At the Wizard Welcome screen, click Next. Wekoe M Ihe InstdShidd Word (a West lu KSH Data ThelnstdShidd Waad wi intel Wmt Wn K5H Ddn onyvunqtd, TocorBeue, ridcNal s i -s ITtC.

3. At the Features screen, select a temporary location for the import batch file, data files, and SQL scripts that will import the KeySearch data (this location requires approximately 4 MB of disk storage space): 'To select the default destination folder, click Next.

To select a different destination folder, click Browse, double-click the folder you want, click OK, and then click Next to continue. 8 iL ! ; iib. L FeaNea to bn iulalnd" : , 71F hr a S dea4wimFatiet iX '=s ths ,, 40 DnFeldet-, : ; Sx HDSt bllDE6whit,. x % -, N, X, (llods ; ; : B'Y> |s id T 20 Chapter 2 : Installing the West km Application 4. At the Enter Database Information screen, enter or select the following information and click Next: Server Name: Type the name of the server where you installed the West km database.

Database Name: Type km.

Database Administrator and Password: Type the name and password of your system administrator account in SQL Server. This account is needed to log in and run the import scripts.

If you want the import scripts to run as part of this install process, select the Run osql and import KSH data check box. The scripts take approximately one minute to run. _... tv i Mfnldnareroaied , : P DBB. _ . 3dddfM. , 7 ru ... : ovAas6kpaYKSHdettc , F s JSIc.. _ f ; <$adsei&i y 5. At the Check Setup Information screen, review your selections and click Next. IS s _ : adaam em, r,. ir, s, :''.'''. , ; =Ccss ; : r aW& Sb* [fitmmabm *25 F<.. « . . kM. Runosfalpa ! ti. IAa ; 'hWd _.. Sxk 6. If you selected to run the import scripts as part of this install process, the ImportKSH. bat file automatically runs, importing the data and verifying that the correct number of rows have been imported. When prompted, press X.

7. At the Wizard Complete screen, click Finish.

2.5 Create the West km Database tufs __ IralSISFWdWegdfOpile Savp fm frisMd intaig Wext km KSH Deta m yw mmpla.

8. If you elected not to run the import scripts as part of this install process, navigate to the destination folder you selected (e. g., C : \Program Files\Westkm\KSH Data) and double-click ImportKSH. bat to import the KeySearch data. When prompted, press X.

9. Once the KeySearch data is imported, remove the import batch file, data files, and SQL scripts: a. Go to Start I Settings I Control Panel I Add/Remove Programs. b. Select West km KSH Data and click Change/Remove. c. Click OK at both confirmation prompts. d. Click Finish.

2.6 Create the West km RID Database Complete the following steps to create the West km RID database for storing Westlaw document references and for identifying citations. The West km RID database takes approximately 220 MB of storage space.

1. On the West km database server, insert the West km CD-ROM 2 (RID/ KeySearch) into your CD-ROM drive.

2. Copy the RID\kmRID. bak file on the CD-ROM to a ldcation on your hard drive.

22 Chapter 2 : Installing the West km Application 3. Go to Start I Programs I Microsoft SQL Server I Enterprise Manager. The SQL Server Enterprise Manager window is displayed. Ca Root "rl. SQL r.- l l boL rm 4. It is recommended that the West km RID database reside on the same server and in the same folder as the West km database. If the West km RID database will reside on a separate server, however, register that server: a. Expand the Microsoft SQL Servers item in the navigation tree in the left frame to display the list of servers. b. Right-click SQL Server Group in the navigation tree, select New SQL Server Registration, and then click Next at the Register SQL Server wizard. c. Select the server to register from the list at left, click Add, and then click Next. d. Select the SQL Server Authentication connection option, then click Next. e. Enter the login name and password for the SQL server, then click Next. f. Add the server to an existing server group by selecting a group from the Group name drop-down list, then click Next. g. Click Finish and then click Close.

5. In the SQL Server Enterprise Manager window, right-click the Databases folder below the SQL server that will contain the West km RID database and select All Tasks. Then select Restore Database.

2.6 Create the West km RID Database 6. On the General tab in the Restore database dialog box, type kmRID in the Restore as database text box and select From Device. tc ; mr . E... kk s is '. k"r) +< ~L 1 ruz n, «, :. B : -s. 7K tutrbu', ; y ; UKrFriqy Ft L 3 : d T .'t J Ç i,,. ! r > N" 7. Click Select Devices.

8. In the Choose Restore Devices dialog box, click Add. : : F ww m s k= : e ; y : eratn' ,. S s +e v 5t , 3"tiCk1t, p, « h t 'filt , y 9. In the Choose Restore Destination dialog box, select File name. Then type the full path name to the file kmRID. bak, which you copied to your hard drive in step 2. Click OK. ', <.. «-. S<tii) W) e&tMe) <<Jf) tM ! <t'M ! t ( ! tt<) <t<Mt ( ! f ! ! i' : S ! g)''. XM. : e) M&<M (e<t) <) tSM<) i<<tt. : SdactFrlanameor6acktpitavafaugatviNmtoNait : h.,", '.'k'a narne : Q Xkht |D : WiSlD. bli g C ll updQ f . S 0 24 Chapter 2: Installing the West km Application I 10. In the Choose Restore Devices dialog box, click the Options tab. Under Move to physical file name, click and edit the database file pathnames to the desired location for the database (do not edit the logical file names). Then click OK. Is Cr m. X e. i iUDA it*, HlD. S IIN -----'c : D kXJ ^ > j, ii : : y '3. 8R't ? d. t Efiid¢ ; r A ! ws ! S X e_s i t r 11. In the Restore database dialog box on the General tab, select Restore backup set and Database-complete and click OK.

12. When the database has been restored, delete the kmRID. back file from your hard drive.

2.7 Configure CaRE '-, CaRE is West's proprietary software for document classification. When enabled to run, CaRE assigns documents with at least one case law citation to KeySearch legal topics during indexing.

CaRE includes a software component, which is installed on the indexing server during the West km setup, and a flat file database component, which is installed manually on the indexing server.

As necessary, complete the steps in the following subsections to configure CaRE.

2.7. 1 Install the CaRE Flat-File Database If you want CaRE to run on your organization's documents during indexing, you must install CaRE database files to the indexing server. These files take approximately 1 GB of storage space.

1. On the indexing server, insert the West km CD-ROM 3 (CaRE) into your CD- ROM drive. At the root folder, double-click West km 2.0 CaRE Data. exe and follow the on-screen prompts.

2. Select the following location for the CaRE flat-file database: West km installation folder\CaRE\data\filedb folder. The default location is C : \Program Files\Westkm\CaRE\data\filedb.

2. 7 Configure CaRE 2.7. 2 Modify CaRE Memory Settings Depending on the resources of your indexing server, you may want to modify the amount of memory used by CaRE processes. By default, CaRE is configured to use 1 GB of dedicated RAM.

To decrease or increase the amount of RAM that CaRE reserves, adjust the following side array property in the ksh. classify. server. conf file (located at West km installation folder\CaRE\Psetup\etc) on the indexing server: param. sideArray. memoryLimit : 350000000 (See"6 Setting Properties in Configuration Files"on page 89 for instructions on setting properties in configuration files.) The total memory used by CaRE is 650 MB plus the size of the side array, which determines how much statistical data is cached by CaRE. For example, if you want CaRE to use no more than 1 GB total memory, the memory limit should be 350 MB, which translates to a value of 350000000 for the side array property.

Memory limit desired Size of side array Value for side array property 800 MB 150 MB 150000000 900 MB 250 MB 250000000 1 GB 350 MB 350000000 1. 1 GB 450 MB 450000000 1. 2 GB 550 MB 550000000 1. 3 GB 650 MB 650000000 1. 4 GB 750 MB 750000000 1. 5 GB 850 MB 850000000 Increasing or decreasing the value of the side array property translates directly into an equivalent increase or decrease in CaRE memory usage. CaRE performance is improved with increased values and can worsen with decreased values.

CaRE performance is ultimately a function of the size and current content of the size arrays (cache), activity on the indexing server, other processes on the indexing server, and SQL Server's cache.

26 Chapter 2: Installing the West km Application 2.7. 3 Set Number of KeySearch Topic Assignments per Document By default, CaRE categorizes each document into the five most relevant topics in the KeySearch hierarchy. You can change the number of topic assignments by adjusting the following property in the AtlasIndexingService. exe. config file on the indexing server: add key="careNumScores"value="5"/> (See"6 Setting Properties in Configuration Files"on page 89 for instructions on setting properties in configuration files.) It is recommended that you not exceed 10 for this value.

2.7. 4 Install Simple CaRE Driver If desired, you can install a driver to test and troubleshoot CaRE.

To install Simple CaRE Driver, complete the following: 1. On the indexing server, navigate to the West km installation folder\CaRE\SimpleDriver folder (e. g., C : \Program Files\Westkm\CaRE\SimpleDriver).

2. Double-click Setup. exe.

3. At the Welcome screen, click Next to continue. 111 Welcome to the Simple CaRE Driver Setup Wizard r, :. <) tM. .) i [t*t<) t ;..-, #srt indatbpnaatsdwNnciusW, r 2.7 Configure CaRE 4. At the Select Installation Folder screen, do the following: a. Enter the following path in the Folder text box-West km installation folder\CaRE\Simple CaRE Driver\. For example, type C: \Program Files\Westkm\CaRE\Simple CaRE Driver\. b. Select Everyone. c. Click Next. Select Installation Folder *'tao, '''i. '% \ m XL ' ! M ! ! ! 't 7 5. At the Confirm Installation screen, click Next.

6. At the Installation Complete screen, click Close.

To test CaRE using Simple CaRE Driver, do the following: 1. On the indexing server, navigate to the West km installation folder\CaRE\Simple CaRE Driver folder and double-click SimpleCareDriver. exe.

2. In the Simple CaRE Driver Form, enter the text that you want CaRE to classify in the Enter text to be classified text box and click Send Request.

The Results text box displays the categories to which the entered text was classified by CaRE. _ : =m,,. i X,. S'; cO77'Ç ^'as j77115 '.- NaoftheCMS :. z . N i NVdXCt afrubcadradas. apa ; nntDdadeN/AppdaeAs. EkicConGUdan. Ire.. UrledSlduFdeGyandGunaiyCorpmYandGernad ;,., . : bedon. egåld DtlsbrUA*s, El : nllbblogt, UritdSlóluEdeSyandGutly Calçong andGard 5 '-.. HerouanceCapaatimlcad'rvey'DdeManM'J. aqemdcantradaardteosudier. m>pative. scokinplonecovda0eiut f A t7ylSf7. A aUndA7. 7tl 8 « e7|O6~edstandh*17ß*Fl hU7=pro*7 Fla suft, ré . . CtlegolylD : CondnxGanlarACanhecloniBadnScae. 58610006817FF. Drd,.. CdnpoylD : CdeqaYTde :, nsumcel5elieslPasmmIBardsScaa ; lpTOB6169S15E-05I , Cele9wy10 : CdegayTite : InsuancelSudeslPeCoroadslCaVactalDmdsSare237NlW3E-0SI C ID : FA,"ldc Corkrh% ConhadotO Bond. S. 2. 37m4S9M-051 Wtpl9 ID : Uìtsols : Bt : Im « ¢SSt « o So : l 0252109a597E-051 ! Me<W : M< ! jX !'fhn*M : t\StMf<t\Hi « i<SM'OB2t [9ES9 ! E<5) : EB4 28 Chapter 2 : Installing the West km Application 2.8 Start West km Services To start West km services, for each service in the order listed below, complete these steps on the service's associated server: West km Service Associated Server West km Indexing Service Indexing server West km HTML Search Service HTML document server 1. When the West km Indexing Service is started, it will start the West km indexing helper ser- vice, the West km CaRE service, and the West km CaRE CNC service.

1. Go to Start I Programs I Administrative Tools (Services.

2. In the Services window, if the Status column does not say Started for the service, right-click the name of the service (e. g. , West km Indexing Service) and click Start. tlWIXD GZ D aW3 I2z ; *SystemEantNotlkN6n Tredasystanevent... Rsted Mtametlc IawelSy#em 6a XTSd *&wÆb R u L~n statad mmwai LMWSYA. M sTO » ESIOS* *wi R LiS ..'*Tdxt Nowsaremoteusx... Menud Wcaan ° TRWA 5&-varpr sttm A4... ti L.. *st- T~ » a RiF = L~ o> TIWobfl Riod Z LoXn B Lhibr S ppb M~susn*7 Md Locwstan 9iSsM Lti « Rd... Msd LoedSysbs WestFmCNtEWCSUVke RMed Ntanatk LocdSy : hm °. 4q W<h R u S5 » i> Wst KM bddw H*. S,,-St. W Atk. Wk sWestKM Rated = ». » wr ; S, r*mir M sd Lv. fSo i *WettKMLdmqSavke Rshd Avtomic txa6y9hm : ; sWhlvhsM*b hisstr l Rd Maul L sl : *W <bwsMenepematmrVmwtetni, nwaessys<eemn,... Rartna rutameHc LocalSyd : wn : '" : : : *WSdowsManpemaotlrtGmmrtetl... ProNdessyRansms... Rarted Mmud LoufSybm- : *V7rcbwsTYro Satxthemnputerd... Rarted Htandk LadSystem : j : *WOrks<eGm ProHdesndewdcco... Rerted Mtamatk LadSystem , : : *WaIdlWdeWCbPuhlin9ervke PrwIdesWebcmr... Rartad AutmnNJC LaceSystem. ; - ; r. ,". ., "., '-g..., a 3. After starting the service on the server, close the Services window.

2. 9 Verify Properties for the Event Log The event log is created when the West km services are started. You may need to adjust the log properties to ensure that the log won't become full. (If you have a distributed architecture, complete these steps on the indexing server and delivery server.) 1. Go to Start I Programs I Administrative Tools I Event Viewer.

2. Right-click ProLaw in the navigation tree of the Event Viewer window and select Properties.

3. The Maximum log size should be 32768 ; change it if necessary.

2.9 Verify Properties for the Event Log 4. Select Overwrite events as needed. - TIXX z t ,.- 4 , NdA*go'J',,''": ? ;''''* : 1z, X*"=. s w a , bftdp3.." : NotAve'teMs"° ;., ?. , ! ~ +N i 1o 0 t. otP B S A 9 HE t , t B t'r. ara . _,. ,....,. _.- lIK twa 5. Click OK.

6. Close the Event Viewer window.

2.10 Set Security You can select one of three security models in West km to control access to West km resources at your organization. For more information about using these models, refer to the following subsections.

Integrated Windows authentication (IWA): If your organization administers computer users in an NT domain, you can use defined groups to administer your West km members. See"2.10. 1 Integrated Windows Authentication"on page 34 for details. Integrated Windows authentication is the default security model.

West km custom authentication: If your organization does not administer computer users in an NT domain, you can control your members'access to West km via usernames and passwords administered in West km.

No authentication: If you don't want to set document security at your organization (not recommended), anyone at your organization can access West km.

Depending on your DMS, authentication model, and authenticating network, the following table lists the configuration that is required for West km document security and authentication to function properly.

30 Chapter 2 : Installing the West km Application West km Authentication Authenticating DMS Model Network1 Configuration Details DOCS Open/IWA Windows The Network ID in the Professionals table must match the Windows PCDocs network ID (qualified by domain) for each member.

DOCS Open/Custom Windows The Network ID in the Professionals table must match the Windows PCDocs network ID (qualified by domain) for each member.

Each member must have a Custom User Name and Custom User Password in the Professionals table.

DOCS Open/Custom Novell The Network ID in the Professionals table must match the Novell PCDocs network ID for each member.

Each member must have a Custom User Name and Custom User Password in the Professionals table. iManage IWA Windows The DMS library information in Database Management must contain an Admin username and password.

The Network ID in the Professionals table must match the Windows network ID (qualified by domain) for each member.

If iManage is configured to use virtual usemames, one of the following must be configured: All members must have their iManage virtual usernames entered into the Professionals table. The web. config file must have DmsUserIdsRequired set to y to enable this field. This configuration relies on West km logic to apply document level security.

All members must have their iManage virtual usernames and passwords entered into the Professionals table. The web. config file must have DmsUserIdsRequired set to y and DmsUserPasswordsRequired set to y to enable these fields. This configuration relies on iManage to apply security. Note that if a user changes his or her iManage password, it must also be changed in the Professionals table.

2.10 Set Security West km Authentication Authenticating DMS Model Network'Configuration Details iManage Custom Windows or The DMS Library information in Database Management must Novell contain an Admin username and password.

Each member must have a Custom User Name and Custom User Password in the Professionals table.

If iManage is configured to use virtual usernames, one of the following must be configured: All members must have their iManage virtual usemames entered into the Professionals table. The web. config file must have DmsUserIdsRequired set to y to enable this field. This configuration relies on West km logic to apply document level security.

All members must have their iManage virtual usernames and passwords entered into the Professionals table. The web. config file must have DmsUserIdsRequired set to y and DmsUserPasswordsRequired set to y to enable these fields. This configuration relies on iManage to apply security. Note that if a member changes his or her iManage password, it must also be changed in the Professionals table.

If iManage is configured to use network usernames : The Network ID in the Professionals table must match the network ID (Windows or Novell, whichever applies) for each member.

DOCSFusion IWA Windows The Network ID in the Professionals table must match the Windows network ID (qualified by domain) for each member.

One of the following must be configured: The DMS library information in Database Management must contain an Admin username and password. This option does not require password management like the option below. However, it does not allow user-based access records to be logged when users pull documents from the DMS during Load Copy.

All members must have their DOCSFusion usernames and network passwords (either Windows or Novell, whichever applies) entered into the Professionals table. The web. config file must have FusionUselndividualLogins set to true to enable these fields. Note that if a member changes his or her network password, it must also be changed in the Professionals table. This option allows DOCSFusion to log user-based access records when members pull documents from the DMS during Load Copy.

32 Chapter 2 : Installing the West km Application West km Authentication Authenticating DMS Model Network1 Configuration Details DOCSFusion Custom Windows or Each member must have a Custom User Name and Custom User Novell Password in the Professionals table.

The Network ID in Professionals must match the network ID (either Windows or Novell, whichever applies) for each member.

! One of the following must be configured: The DMS library information in Database Management must contain an Admin username and password. This option does not require password management like the option below. However, it does not allow user-based access records to be logged when members pull documents from the DMS during Load Copy.

All members must have their,. DOCSFusion usernames and network passwords (either Windows or Novell, whichever applies) entered into the Professionals table. The web. config file must have FusionUselndividualLogins set to true to enable these fields. Note that if a member changes his or her network password, it must also be changed in the Professionals table. This option allows DOCSFusion to log user-based access records when members pull documents from the DMS during Load Copy.

Lotus Notes2 IWA Windows The Network ID in the Professionals table must match the Windows network ID (qualified by domain) for each member.

Lotus Notes2 Custom Windows or Each member must have a Custom User Name and Custom User Novell Password in the Professionals table.

NTFS3 IWA Windows The Network ID in the Professionals table must match the Windows network ID (qualified by domain) for each member.

NTFS3 Custom Windows or Each member must have a Custom User Name and Custom User Novell Password in the Professionals table.

ProLaw9 IWA Windows The Network ID in the Professionals table must match the Windows network ID (qualified by domain) for each member.

ProLaw 9 Custom Windows or The Network ID in the Professionals table must match the network Novell ID (either Windows or Novell, whichever applies) for each member.

Each member must have a Custom User Name and Custom User Password in the Professionals table.

1. This network is the network to which users authenticate when signing on to the organization's network and with which the organizations DMS is configured to interoperate.

2. All Lotus Notes documents are treated as public in West km.

3. All NTFS documents are treated as public in West km.

For more information about administering West km members in the Professionals table, see"4.9 Administer West km Members"on page 76. using virtual logins if your organization uses iManage as its DMS, see"4.9. 4 Adjusting the Professionals Table Configuration for iManage"on page 78. controlling access to your West km documents via the document security implemented in your DMS, see"4. 8 Set a Document Security Level"on page 75.

2.10 Set Security To index documents with West km, a Windows domain administrator account is required. This account must have access to all NTFS and DOCS Open/PCDocs documents you are indexing and to all West km server components. In the West km NT Security Diagram on page 35, this account is represented by the West km Admin on the resource domain. If you are not using an NT networking environment, the Windows domain administrator account needs to be created locally with the same password on all West km server components.

2.10. 1 Integrated Windows Authentication In a Windows NT networking environment, you can use defined groups to administer your West km members and to grant them the rights and resource permissions necessary to use West km.

In the West km NT Security Diagram on the following page, the Windows domain administrator account is represented by the West km Admin account, which you create and then add to the West km admin local groups on the indexing, delivery, and HTML document servers. (If you have multiple resource domains, you must create the West km Admin account at the user domain level.) Users of West km can be added to West km user global groups, which in turn are added to West km user local groups on the delivery and HTML document servers (or users can be added directly to the local groups). The groups labeled optional in the diagram are not necessary if the Everyone group is set to Read/Execute.

In the diagram, the necessary NT permissions on application directories, IS configuration settings, and defaults for NT services are listed underneath each server component. See also"2.10. 4 Minimum Security Requirements for West km"on page 39.

34 Chapter 2 : Installing the West km Application West km NT Security Diagram West km User User Domain. User Domain West krn Uwr Global G up Wide Area Network Global Group Domain User (option (optional) Domain Use _ Resource Domain -from one- West \ s l West km Admin \ \ v 1 i/1 \y i 1 w y ....... West km West km User West km West km User West km Admin Local Local Group Admh Local LMI Group Admin Local Group (optional) Group (optional) Group Indexing Server Delivery Server HTML Document Server NT Permisslons NT Mrrnlssions NT Pvrtnissions West km applicetion directories : West km application directories : HTMLStore directory : Westkm\ : Westkm\ : Please see the text of the Set Security section in this guide Local Admins-Full Control Local Admins-Full Control Domain Admins-Fuif Control Domain Admins-Full Control IIS Configuratton Everyone-Read Everyone-Read NextPage NXT 3 virtual directory : Anonymous-on WastkmlLogs\ WostkmSLogsl ; ASP. NET account-Read, List Folder Contents, Read and Execute, Write ASP. NET account-Read, List Fokler Contents, Read and Execute, Write NTSSrvIcn West km HTML Search-system account WestkmlReports\ : WestkmSReports\ : IUSR-Read, List Folder Contents, Read and Execute. Write IUSR-Read, List Folder Contents, Read and Execute, Write WestkmlFTSeerchWextPageiBin\ : Westkm\FTSearcMNaxtPagaSBin\ : IUSR-Read, List Folder Contents, Read and Execute, Write IUSR-Read, List Folder Contents. Read and Execute, Write Its Configuration Its Configuration Doesn ? neadto be installed West km virtual directory : Anonymous-off NT Services integrated Windows Authenlication-on West km indexing-system account West km Indexing Helper-system account NextPage NXT 3 virtual directory : Anonymous-on NT SoMeea Does not apply 2.10 Set Security 2.10. 2 West km Custom Authentication If you are not using an NT networking environment, you control your members' access to West km via usernames and passwords administered in West km.

To use West km custom authentication as a security model, set the authentication property in Web. config to kmAuthentication and IIS permissions to anonymous, as described in the following subsections.

2.10. 2.1 Set the Authentication Property To use West km custom authentication, change the following property in the Web. config file to kmAuthentication. (The default value is IWA.) <BR> <BR> <BR> <BR> <BR> <add key="atlas AuthenticationMode"value="kmAuthentication"/> (See"6 Setting Properties in Configuration Files"on page 89 for instructions on setting properties in configuration files.) The kmAuthentication setting will add columns for Custom User Name and Custom User Password to the Professionals table, where you can administer your West km members'login information.

Your members will then be prompted to enter the West km username and password you designate for them when they access West km content from their Web browser or word processor.

For more information about administering your West km members with this security model, see"4.9. 5 Using the Professionals Table with West km Custom Authentication"on page 80.

2.10. 2.2 Set IIS Permissions to Anonymous For West km custom authentication, it is recommended that IIS permissions be set to anonymous: 1. On the delivery server, go to Start I Programs I Administrative Tools I Computer Management.

36 Chapter 2 : Installing the West km Application 2. In the Computer Management window, expand the Services and Applications item in the navigation tree in the left frame, and then expand Internet Information Services and Default Web Site. fill 'F'a ; ( H ; i"LiIi3t. tio jw-"L>w, a _..",. : at-"Yu. ><t _.."-'. ""' i ja T*, A5iET Zvexcowc AcczCfOrrFro. >TW* Tekplny'T C'9xcwit AcsantfxrurYnp0. W. NETWakn. 5., k. WMttatrd t ItlFtGfWEH... LtGestPCCant aitimwtfaana, mnsxm.- : iii-56 Eo IWAM_EG-M Lmxh US Prs Aa DA4n courk fa k*mtvt kd. dg S. k, l- Intunetld'amation5avl : ". hnsuz kns2 g DefmJt Web 2e pdsw Prdew Sypart Prdaw I. t ». T » ; ; ; us5mroles i : f' rwc USS. Tck ~ iF BT' i S STET5 !) HBtMntc « ;' ; Pft- e mc-cW t nit i i ss,,, gA- 0imf M, _.

3. Right-click km under Default Web site and click Properties.

4. In the km Properties dialog box, click the Directory Security tab and then click Edit under Anonymous access and authentication control. Im r v S-; à'g'I x , % ssdaaio. a ; ! . GtH#RtB'CR hn p mtttN. a r, EcR, ;.' a-t BQtK, _ fiAaaraotuadmnicrw. aW :. YktGewtnS. , av4ieaia7. tASndW' + '1 GrvP.. t' ','.--, g, iL ; ; °.' PK .," G ;'v"--Neyt 2.10 Set Security 5. In the Authentication Methods dialog box, do the following: a. Select the Anonymous access check box. b. Clear the Basic authentication and Integrated Windows authentication check boxes. c. Click OK. - ,. _ o+D y \ s j ; 4~rue*. d+e « D",,, ; i X v to on td vt, : L, 7 L 7 9 rS. ^" &, a a s J .. \ a., 8 ,, S... k-t, 1- s'. 'NSt """ataC'' L o p-g t 6. Click OK to close the km Properties dialog box.

7. In the Computer Management window, click Services under Services and Applications in the left frame.

8. Right-click World Wide Web Publishing Service in the right frame and click Restart.

9. Close the Computer Management window.

2.10. 3 No Authentication To use no authentication, do the following: Change the following property in the Web. config file to None. (The default value is IWA.) <add key="atlasAuthenticationMode"value="None"/> (See"6 Setting Properties in Configuration Files"on page 89 for instructions on setting properties in configuration files.) a In the Professionals table, add a member with a network ID of km_test_user (not tied to a network account) and select the Westkm Admin check box. Do not enter values for the other fields. (See"4.9 Administer West km Members"on page 76 for instructions on adding West km members.) a Set IIS permissions to anonymous access, as described in"2.10. 2.2 Set IIS Permissions to Anonymous"on page 36.

38 Chapter 2 : Installing the West km Application 2.10. 4 Minimum Security Requirements for West km This section describes how to set minimum security rights for West km. Configuring your West km servers according to these guidelines will ensure that your West km environment is as secure as possible.

West km provides a utility (West km IIS Lockdown) that will install the Microsoft IIS Lockdown 2.1 and URLScan 2.5 utilities and configure NTFS permissions in a way that allows West km to function, yet still be secure. You can also set permissions manually.

Important : The West km IIS Lockdown utility replaces-not modifies or adds- any existing permissions for the locations listed under The following rights are set in"2.10. 4.5 Changes Made by the West km IIS Lockdown Utility"on page 43.

Refer to the following articles on the Microsoft Web site for more information on US Lockdown and URLScan: Windows 2000 Server Baseline Security Checklist: www. microsoft. com/technet/ treeview/default. asp? url=/technet/security/tools/chklist/w2ksvrcl. asp IIS Lockdown Tool: www. microsoft. com/technet/treeview/default. asp? ulr=/ technet/security/tools/tools/locktool. asp URLScan Security Tool: www. microsoft. com/technet/treeview/default. asp? url=/ technet/security/tools/tools/urlscan. asp 2.10. 4.1 Installing the West km IIS Lockdown Utility 1. On the delivery server, insert the West km CD-ROM 1 (Setup) into your CD- ROM drive.

2. Navigate to the Install Utilities\WestkmIISLockDown folder on the CD-ROM and double-click WestkmIISLockDown. exe to launch the installation.

Note: Do not press any keys during the installation.

3. When the installation completes, restart your computer.

4. In Windows Explorer, navigate to C : \Logs and double-click WestkmIISLockDown. log.

5. In the log file, scroll to the bottom and verify the display of this message : The installation of the WestkrrcIISLockDown Utility was successful.

If you do not see this message, a problem occurred during the installation. Read through the log file and look for any errors or failed operations. If no errors are present, try removing and reinstalling the utility.

6. If you have any problems with installing the utility or with West km after installation of the utility, call West km Technical Support at 1-888-877-6529 (option 8) for assistance.

2.10 Set Security / 2.10. 4.2 Removing the West km IIS Lockdown Utility 1. On the delivery server, insert the West km CD-ROM 1 (Setup) into your CD- ROM drive.

2. Navigate to the Install Utilities\WestkmIISLockDown folder on the CD-ROM and double-click WestkmIISLockDown. exe. The utility will detect that it was installed previously and begin the removal process.

Note: No user intervention is required during removal.

3. When the removal process completes, restart your computer.

4. In Windows Explorer, navigate to C: \Logs and double-click WestkmlISLockDown. log.

5. In the log file, scroll to the bottom and verify the display of this message: You have successfully removed the WestkmIISLockDown Utility.

If you see The removal of the WestkmIISLockDown utility was not successful.

Check the Uninstall Section of the log file to see what failed, then a problem occurred during the removal process. Refer to the"Verifying the uninstall worked properly"section in the log file to see what failed.

If no information in this section tells you what failed, call West km Technical Support at 1-888-877-6529 (option 8) for assistance.

6. If you have any problems with installing the utility or with West km after installation of the utility, call West km Technical Support at 1-888-877-6529 (option 8).

2.10. 4.3 Setting Rights with Lockdown Applied The West km IIS Lockdown utility creates a local Web Anonymous Group and sets the rights for it, as well as the local ASP. NET account. For details, see The following rights are set in"2.10. 4.5 Changes Made by the West km IIS Lockdown Utility"on page 43.

Note: By default, the Lockdown utility will deny Write access to all Web Content directories (i. e. , Westkm) for the Web Anonymous Group. You need to ensure that you clear the Deny check box in order for Write access to work.

In addition, set rights as follows: Document locations (local machine): The local ASP. NET account needs the following rights on any document location that you want to index: Share permissions: Read, Change NTFS : Read, Read and Execute, List Folder Contents, Write 40 Chapter 2 : Installing the West km Application Document locations (remote machine) : « The local ASP. NET account needs the following rights on any document location that you want to index : Share permissions : Read, Change # NTFS : Read, Read and Execute, List Folder Contents, Write zea Your West km domain administrator account needs the following rights on the remote document directories : Share permissions : Read, Change 'NIFS : Read, Read and Execute, List Folder Contents, Write HTML storage locations (local machine) : The local ASP. NET account needs the following rights on any HTML storage location that you create : Share permissions : Read, Change 'NIFS : Read, Read and Execute, List Folder Contents, Write HTML storage locations (remote machines) : The local ASP. NET account needs the following rights on any HTML storage location that you create : Share permissions : Read, Change # NTFS : Read, Read and Execute, List Folder Contents, Write a Your West km domain administrator account needs the following rights on the remote HTMLStore folder : Share permissions : Read, Change # NTFS : Read, Read and Execute, List Folder Contents, Write After changing folder permissions for West km, restart IIS and the West km services.

2. 10. 4. 4 Setting Rights without Lockdown Applied If you don't install the West km IIS Lockdown utility, set rights as follows : Local ASP. NET account : The local ASP. NET account needs the following rights in order for application logging to function. If you do not grant these rights, you will be unable to create HTML storage locations and index your documents.

Location : West km installation folder\Logs Assigned rights : Read, Read and Execute, List Folder Contents, Write Local IUSR : The local IUSR_ServerName needs the following rights in order for the application to modify INI files, as well as report. The IUSR ServerName account is used for anonymous access.

2. 10 Set Security Location: West km installation folder\Reports Assigned rights: Read, Read and Execute, List Folder Contents, Write Location: West km installation folder\FTSearch\NextPage\Bin Assigned rights: Read, Read and Execute, List Folder Contents, Write Location: West km installation folder\FTSearch\NextPage\Ext Assigned rights: Read, Read and Execute, List Folder Contents, Write Document locations (local machine): # The local ASP. NET account needs the following rights on any document location that you want to index: Share permissions: Read, Change NTFS : Read, Read and Execute, List Folder Contents, Write Document locations (remote machine): The local ASP. NET account needs the following rights on any document location that you want to index : Share permissions: Read, Change # NTFS : Read, Read and Execute, List Folder Contents, Write # Your West km domain administrator account needs the following rights on the remote document directories: Share permissions: Read, Change # NTFS : Read, Read and Execute, List Folder Contents, Write HTML storage locations (local machine): "The local ASP. NET account needs the following rights on any HTML storage location that you create: 'Share permissions: Read, Change # NTFS : Read, Read and Execute, List Folder Contents, Write HTML storage locations (remote machines): The local ASP. NET account needs the following rights on any HTML storage location that you create: Share permissions: Read, Change NTFS : Read, Read and Execute, List Folder Contents, Write # Your West km domain administrator account needs the following rights on the remote HTMLStore folder: Share permissions: Read, Change NTFS : Read, Read and Execute, List Folder Contents, Write After changing folder permissions for West km, restart IIS and the West km services.

42 Chapter 2 : Installing the West km Application 2.10. 4.5 Changes Made by the West km IIS Lockdown Utility Changes service smtpsvc startup type from Automatic to Disabled.

Backed up metabase Locked httpext. dll Locked idq. dll Disabled Internet Printing Installed URLScan Removed script map :. htw, C: \WINNT\System32\webhits.dll Removed script map :. ida, C: \WINNT\System32\idq.dll Removed script map :. idq, C: \WINNT\System32\idq. dll Removed script map :. htr, C: \WINNT\System32\inetsrv\ism. dll Removed script map :. idc, C:\WINNT\System32\inetsrv\httpodbc. dll Removed script map :. shtm, C: \WINNT\System32\inetsrv\ssinc. dll Removed script map :. shtml, C: \WINNT\System32\inetsrv\ssinc. dll Removed script map :. stm, C:\WINNT\System32\inetsrv\ssinc. dll Removed script map :. printer, C: \WINNT\System32\msw3prt. dll Removed script map :. htw, C: \WINNT\System32\webhits. dll Removed script map :. ida, C : \WINNIESystem32\idq. dll Removed script map :. idq, C: \WINNT\System32\idq. dll Removed script map :. htr, C: \WINNT\System32\inetsrv\ism. dll Removed script map :. idc, C:\WINNT\System32\inetsrv\httpodbc. dll Removed script map :. shtm, C: \WINNT\System32\inetsrv\ssinc. dll Removed script map :. shtml, C:\WINNT\System32\inetsrv\ssinc. dll Removed script map :. stm, C:\WINNT\System32\inetsrv\ssinc.dll Removed script map :. printer, C:\WINNT\System32\msw3prt. dll Installed 404. dll to system32\inetsrv Removed printer virtual dir (/LM/W3SVC/l/ROOT/Printers) Removed samples (/LM/W3SVC/l/ROOT/nSSamples) Removed MSADC virtual dir (/LM/W3SVC/1/ROOT/MSADC) Removed scripts virtual dir (/LM/W3SVC/l/ROOT/Scripts) Removed IISAdmin virtual dir (/LM/W3SVC/l/ROOTESAdmin) Removed IISAdmin web site (/LM/W3SVC/2) Removed Admin virtual dir (/LM/W3SVC/l/ROOT/IISHelp) Set Deny All ACE for anonymous Web users on system utilities under C:\WINNT Set Deny Write ACE for anonymous Web users under C: \inetpub\wwwroot Set Deny Write ACE for anonymous Web users under C: \Program Files\Common Files\Microsoft Shared\Web Server Extensions\40\isapi Set Deny Write ACE for anonymous Web users under C : \Program Files\Westkm The following rights are set: The local ASP. NET account is set to the following: # Location : West km installation folder\Logs Assigned rights: Read, Read and Execute, List Folder Contents, Write 2.10 Set Security The local Web Anonymous Group is set to the following: Location: West km installation folder\Reports Assigned rights: Read, Read and Execute, List Folder Contents, Write t Location: West km installation folder\FTSearch\NextPage\Bin Assigned rights : Rights: Read, Read and Execute, List Folder Contents, Write Permissions are replaced on the West km installation folder (e. g., C : \Program Files\Westkm) with the following: Everyone Assigned rights: Read, Read and Execute, List Folder Contents x Administrators Assigned rights: Full Control a Web Anonymous Users Assigned rights: Deny All # Web Applications Group Assigned rights: Deny All Note: The West km IIS Lockdown utility replaces-not modifies or adds-any existing permissions on the above locations.

The following files are created: C: \Logs\WestkmIISLockDown. log: This log file contains information on what was done during the installation of the utility. It also indicates if the install or removal failed or succeeded.

C: \Logs\Pre_Rights. txt : This file lists the rights of Program Files\Westkm befort the installation of the Lockdown utility. o C: \Logs\Post Rights. txt : This file lists the rights of Program Files\Westkm after the installation of the Lockdown utility.

2. 11 Configure DMS Services If your organization is indexing documents that are managed by a DMS, make the following configuration changes as indicated for your DMS.

2.11. 1 Configuration for DOCSFusion 5.0 If you are indexing documents stored in DOCSFusion 5.0, make the following configuration changes. Also refer to"2.11. 3 DMS Properties in Configuration Files" on page 46.

2.11. 1. 1 Install the DOCSFusion API Complete the following steps on the delivery server and the indexing server to install the DOCSFusion API and establish a connection to the DOCSFusion server.

1. Close all open applications.

44 Chapter 2: Installing the West km Application 2. Insert the DOCSFusion 5.0 CD-ROM into your CD-ROM drive.

3. Go to Start I Run, type the command cmd, and click OK.

4. In the command window, type the command D:, where D : \ is. your CD-ROM drive, and press Enter.

5. Type the command cd dm api and press Enter.

6. Type the command Setup. exe/standalone and press Enter to start the installation.

7. When prompted, accept all the installation defaults.

8. In the command window, type exit and press Enter.

9. Go to Start I Programs I Hummingbird I Hummingbird DM Connection Wizard 5.0.

10. At the Wizard Welcome screen, click Next.

11. When prompted, enter the DOCSFusion server name and click Next.

Note: If necessary for your DOCSFusion configuration, first select Show Fail-Over and Load-Balancing Configuration.

12. At the Wizard Complete screen, click Finish.

2.11. 1.2 Copy West km Forms to the DOCSFusion Server Complete the following steps to copy West km forms to the DOCSFusion server.

1. Insert the West km CD-ROM 1 (Setup) into your CD-ROM drive and navigate to the Fusion Forms folder.

2. Copy the following files from the Fusion Forms folder on the CD-ROM to the DOCSFusion server where the DOCSFusion 5.0 software is installed. Place the files in the DOCSObjects folder (default location of C : \Program Files\Hummingbird\DM Server\DOCSObjects). km-versions. FRM km_getquicksearches. FRM km. km_default_profile. FRM km_default client matter_profile. FRM (Copy this file only if your organization uses this custom form; otherwise use your organization's custom form. If you need assistance determining whether your organization needs a custom form, contact West km Technical Support.) 2.11. 2 Configuration for iManage If you are indexing documents stored in iManage, make the following configuration changes. Also refer to"2.11. 3 DMS Properties in Configuration Files"on page 46.

If the iManage Server product was not installed on the delivery server, register the imanage. dll file on the delivery server so that it can communicate with your 2.11 Configure DMS Services organization's DMS server. If the indexing server is on a separate machine from the delivery server, also register this file on the indexing server.

1. Copy the imanage. dll file from your iManage installation disk to the bin subfolder of the installation folder on the delivery server, e. g. , C: \Program Files\Westkm\bin\.

2. At a command prompt, type regsvr32 West km installation folder\bin\imanage. dll and click OK. For example, type regsvr32 c: \program files\westkm\bin\imanage. dll.

3. Adjust the value for the iManage version property in the Web. config file according to your iManage API version. (See"6 Setting Properties in Configuration Files"on page 89 for instructions on setting properties in configuration files.) <add key="IManageVersion"value=ff 1. O"/> Property values are as follows, depending on your iManage setup: iManage Setup Value for IManageVersion Property Server 4.1, service pack 4 and higher 1.0. 1.151 (client is InfoRite 5.3) Server 4.1, service pack 6 and higher 0 (client is InfoRite 5.3) Server 7.0 and higher 2.0 (client is DeskSite 6.0) 2.11. 3 DMS Properties in Configuration Files You may need to make changes to properties in West km configuration files to control communication between your DMS server and West km components.

For more information about setting properties in configuration files, see"6 Setting Properties in Configuration Files"on page 89.

Following is a list of DMS products and the properties whose values may need to be adjusted for that DMS. For property descriptions and allowable ranges, see "Appendix D: List of Properties in Configuration Files"on page 121. iManage Web. config and AtlasIndexingService. exe. config PLClientMatterSeperator IManageMaxRowsForSearch IManageSessionTimeout IManageVersion IManageUseTrustedLogin DmsUserIdsRequired DmsUserPasswordsRequired 46 Chapter 2 : Installing the West km Application IManageUseCombinedClientMatter IManageAttrMappingTitle IManageAttrMappingAbstract IManageAttrMappingClass IManageAttrMappingMatter IManageAttrMappingMatterDescription IManageAttrMappingClient IManageAttrMappingClientDescription IManageAttrMappingAuthor DOCS Open/PCDocs Web. config and AtlasIndexingService. exe. config PLClientMatterSeperator prefetchDocsProfiles PCDocsSecurityLumpSize PCDocsSecurityCacheGroups PCDocsUseClientMatterMetaData PCDocsUseCombinedClientMatter PCDocsUseSubversions PCDocsUseMatterCustomSql PCDocsMatterCustomSql DOCSFusion Web. config and AtlasIndexingService. exe. config PLClientMatterSeperator FusionUseIndividualLogins FusionGetQuickSearchFormName FusionGetVersionlnfoFormName FusionUseSubversions FusionUseDbFormsToRunQuickSearches FusionNonDbRunQuickSearchFormName FusionDefauItProfileSearchFormName FusionUseClientMatterMetaData FusionUseCombinedClientMatter FusionClientMatterSearchFormName <BR> <BR> FusionIgnoreMissingCustomMetaData<BR> <BR> <BR> FusionClientIdFormFieldName FusionMatterIdFormFieldName FusionClientNameFormFieldName FusionMatterNameFormFieldName 2.11 Configure DMS Services - Administering the KeySearch Hierarchy 3.1 Customizing the KeySearch Hierarchy 50 3.2 Assigning Documents to a KeySearch Topic 53 3.3 Removing Documents from a KeySearch Topic 54 ri 3.4 Deleting Documents from West km 55 KeySearch is a tool from West that helps researchers easily and precisely retrieve documents relevant to a particular legal topic. Your West km members can use the KeySearch hierarchy of topics to retrieve relevant documents at your organization, as well as on Westlaw.

The KeySearch hierarchy in the westlaw. com interface retrieves documents at your organization and on Westlaw. The KeySearch hierarchy in the West km interface retrieves just documents at your organization.

If you choose, West's classification and routing engine (CaRE) can automatically assign your organization's documents to KeySearch topics when you index your documents in West km. If you are designated as an information manager, you can also customize the existing KeySearch hierarchy for your organization's specific needs. create and edit queries that use full-text searching to retrieve documents on KeySearch topics. o manually assign a document collection to KeySearch topics (an option during indexing).

Note: If you want to assign a document collection to a customized KeySearch topic at the time of indexing, you must create the topic beforehand.

After your documents have been indexed in West km, as an information manager you can manually assign one or more documents to a KeySearch topic. a manually remove one or more documents from a KeySearch topic. manually delete one or more documents from West km.

To designate a West km member as an information manager, select the Information Manager option for the member in the West km Professionals table. See"4. 9 Administer West km Members"on page 76 for details.

3.1 Customizing the KeySearch Hierarchy To access the KeySearch hierarchy of legal topics so you can customize it for your organization, 1. Open Internet Explorer on the delivery server or any other workstation with access to the delivery server and access http ://setvername/km/pldefault. aspx, where servername is the name of your delivery server.

2. Click KeySearch Admin on the West km toolbar.

The KeySearch topics are listed alphabetically in the right frame. In this view, you can perform all KeySearch search functions, as well as customize the hierarchy. C. t ! a a 'ta suat ; xam*t , . $ E) Adnttnt'. tratR fw (S56) Haatt (222) t, nqs. Primr. A'. Ha, pitals, Mental Health N 01 l, limiglotion Low (IB) SW-. s,, X i3 Agriculttlrs ( ;, 1) i3 Illlmlgrntion i rmw islt ?) Eb All A. Vi7 00. MM , 2mHi x wsetenn<anan ; iaem_., al j4_a zatir. Jn, iD ; tv Indiounais Po. nies (46) ; , Domnsdc Relat, ns Gam6li Caino Trraties d Insurana. Cl Altnrnetlve Dispute Resolution (ADR) (12t) (7tfi) . ;, y Banl ; mutW. Insurance, Securihes Law Etad Faith. Liabilit Covera g v Vehicles, rrSiXrance Ouot3 « T To browse the list of KeySearch topics and subtopics, click the Browse icons 0 or hypertext links.

Links in regular text (not italics) represent standard topics and subtopics. They can retrieve both Westlaw and your organization's documents.

Links in italic text represent customized topics and subtopics that you have created. They retrieve only your organization's documents.

Links in gray text represent standard or customized topics and subtopics that you have hidden from the view of West km members.

When you browse to a topic, a bread crumb trail at the top of the right frame shows your location in the KeySearch hierarchy. You can click a hypertext link in the bread crumb trail to move to that location in the hierarchy. ; 9tecens ? 8ankruptcV 5-5sets ? Management 50 Chapter 3: Administering the KeySearch Hierarchy To display document counts after topics in the KeySearch hierarchy, click Get Doc Counts in the left frame. These numbers indicate the number of unique documents at your organization that have been assigned to that topic via manual classification or West's classification and routing engine (CaRE). To configure the display of these numbers, see"6.4 Configuring Document Counts in the KeySearch Hierarchy"on page 94.

To exit the administrative view of the KeySearch hierarchy and view the hierarchy as it is displayed to West km members, click KeySearch on the West km toolbar.

Note: Customizations you make to the KeySearch hierarchy are not reflected in the KeySearch Scan feature until you update your organization's full-text indexes. See"4.7 Create and Update Full-Text Indexes"on page 74 for details.

3.1. 1 Adding a KeySearch Topic You can create a customized KeySearch topic by adding it to the KeySearch hierarchy : 1. In the administrative view of the KeySearch hierarchy, browse to the topic or subtopic above the point where you want to add the new topic. You can add a topic from any standard or customized topic within the hierarchy.

2. Click Add Node in the left frame.

3. Enter the following information for the new topic and click OK.

Category name The topic name that is displayed in the KeySearch hierarchy.

Shortcut name An optional name for the topic that is displayed as a hypertext link on the page one level above the new topic.

Location The location in the KeySearch hierarchy where the topic will be added. To select a different location, click Look-Up Location, browse to the location for the new topic, and click Use this Node.

Query An optional full-text query that is used to retrieve documents for the topic, in additional to automatic and manual classification methods. - ..- litìlinboi IStevensduliil2a e, irg Add Node (Bolded't2mSs) requined) BhrJrtrFutname : [,, > -Westkm- Steveiis, Siiiytlie anci Joiies Add Node (Bolded item (s) required) Category name LocaUon : ITOPICSEmPIoYmentLaw, \, Query : employee employer employment labor/p unlawful ! wmngfull/5 discharg ! : fire fired firing tenninatl/p union/s memberl activl assodatl organizl' ; ; ; S Wi 3. 1 Customizing the KeySearch Hierarchy The hierarchy is displayed at the topic above the newly created topic. The new topic is represented by a hypertext link in italic text.

Note: When you are indexing your documents and CaRE is configured to run, CaRE will not assign documents to customized KeySearch topics.

3.1. 2 Editing a KeySearch Topic You can edit a KeySearch topic you have created: 1. In the administrative view of the KeySearch hierarchy, browse to the topic or subtopic that you want to edit. You can edit any topic you have created, whether it is shown or hidden.

2. Click Edit Node in the left frame.

3. Edit the information for the topic and click OK.

The hierarchy is displayed at the topic above the edited topic.

3.1. 3 Copying a KeySearch Topic You can create a customized KeySearch topic by copying it from another topic: 1. In the administrative view of the KeySearch hierarchy, browse to the topic or subtopic that you want to copy. You can copy from any standard or customized topic within the hierarchy.

2. Click Copy Node.

3. Enter a category name and shortcut name (if desired) for the new topic.

4. The location is prepopulated from the topic you are copying. To select a new location, click Look-Up Location, browse to the location for the new topic, and click Use this Node.

5. The query is prepopulated from the topic you are copying. Edit the query if desired.

6. Click OK.

The hierarchy is displayed at the topic above the newly created topic. The new topic is represented by a hypertext link in italic text.

Note: When you are indexing your documents and CaRE is configured to run, CaRE will not assign documents to customized KeySearch topics.

3.1. 4 Hiding and Showing a KeySearch Topic You can hide any KeySearch topic from the view of West km members at your organization.

1. In the administrative view of the KeySearch hierarchy, browse to the topic or subtopic that you want to hide. You can hide any standard or customized topic within the hierarchy.

52 Chapter 3: Administering the KeySearch Hierarchy 2. Click Hide Node in the left frame.

The hierarchy is displayed at the topic above the hidden topic. The topic and its subtopics are represented by gray text.

Note: Hiding a topic will not hide the same topic appearing elsewhere in the KeySearch hierarchy. For example, hiding Searches and Seizures under Constitutional Law will not automatically hide Searches and Seizures under Criminal justice.

To show a topic that you have previously hidden, browse to the topic or subtopic that you want to show and click Show Node.

Note: When you are indexing your documents and CaRE is configured to run, CaRE will assign documents to hidden KeySearch topics.

3.1. 5 Deleting a KeySearch Topic You can delete a KeySearch topic you have created: 1. In the administrative view of the KeySearch hierarchy, browse to the topic or subtopic that you want to delete. You can delete any topic you have created, whether it is shown or hidden.

2. Click Delete Node.

3. Click OK to confirm the deletion.

The hierarchy is displayed at the topic above the deleted topic.

3.2 Assigning Documents to a KeySearch Topic After your organization's documents are indexed in West km (see"4 Indexing Your Organization's Documents"on page 57), you can manually assign a document or a set of documents to a KeySearch topic. Assigning a document to a KeySearch topic ensures that the document appears in the result list when a West km member accesses that topic.

To manually assign documents to a KeySearch topic, 1. In the West km pages, generate a result list of your organization's documents: To build a list of your organization's documents that cite a particular citation, click KeyCite on the West km toolbar, type the citation in the New citation next box under KeyCite for Firm Documents, and click GO.

To search for your organization's documents, click Search on the West km toolbar, type one or more search terms in the text boxes under Search for Firm Documents, and click GO. (If you type multiple search terms, all terms must be found.) To access your organization's documents already assigned to a KeySearch topic, click KeySearch on the West km toolbar and search a topic.

3.2 Assigning Documents to a KeySearch Topic 2. In the result list in the right frame, select the check box preceding each document you want to assign to a KeySearch topic. To select all documents in the result list, click the Select All check box r in the result list heading.

3. Click Classify Selected Documents.

4. Navigate to the topic to which you want the documents assigned and click OK.

If a document collection containing a manually assigned document is re-indexed, the document stays assigned to the topics you've specified.

You can also assign a document to a KeySearch topic by clicking Classify this Document from a document's detail page. In addition, the KeySearch Topics section of this page lists all the topics to which the document is assigned. If a hand icon appears next to a topic, the document is manually assigned to that topic. If no hand icon appears, the document was automatically assigned via CaRE. Auffiw. TRI- _ : b w _ C., U- ,. zut tzaa t alar4cWr0. 4Y#M ! ChTtIOwNxri ; '< r n, x yattutbntteectwqsniatstcf '-h - :'. t, ec lrRKtaadmcApPYis"rtllsateyxmqnFats#-ta o -- : v...... . _ _.. . . S'. dnc --T s : FX : -, n- y rerseerW rnC grWtycovereltt4cdcreueVam, aoway w,,-AX r,. HP u k L ; b Ro brA h9ZWlabe CanreptTrlws d CrertppQnf äcn or Dlt EM'! ! iF ! lTiQs ; Relrr Iniuwo Cowq » \Tdwt d covip er Cs SK's R=llulrencaTZbtkyCom\Tdf7ardCover » gnluy##t e. J. , ProdudslleRrWoduaaxdlmura, ee 1, 3 , t3,",,,.,, % RomobLw » Cowr » tifX2rsordCirArs 3. 3 Removing Documents from a KeySearch Topic After your organization's documents are indexed in West km (see"4 Indexing Your Organization's Documents"on page 57), you can manually remove a document or a set of documents from a KeySearch topic. Removing a document from a KeySearch topic ensures that the document will not appear in the result list when a West km member accesses that topic.

To manually remove documents from a KeySearch topic, 1. In the West km pages, click either KeySearch or KeySearch Admin on the West km toolbar and browse to the topic from which you want to remove documents.

2. Click the Search all of... link at the top of the page or select a topic link prefaced by a Search icon 0.

3. Click Search to run the KeySearch query.

54 Chapter 3: Administering the KeySearch Hierarchy 4. In the result list in the right frame, select the check box preceding each document you want to remove from the active KeySearch topic. To select all documents in the result list, Select All check box in the result list heading.

5. Click Remove Selected Documents from Topic.

6. Click OK.

If a document collection containing a manually removed document is re-indexed and CaRE is enabled, the document will be reclassified.

Note: You can also remove a document from a KeySearch topic by clicking Remove next to a listed KeySearch topic on a document's detail page.

3.4 Deleting Documents from West km After your organization's documents are indexed in West km (see"4 Indexing Your Organization's Documents"on page 57), you can permanently delete one or more documents from West km.

Note: With this method, deleted documents cannot be re-added to West km unless you designate a new database and define and index a document collection containing that document (see"4.4 Designate Databases Containing Document Collections"on page 61 and see"4. 5 Define and Index Document Collections" on page 65). It is preferable that you remove documents from West km by either deleting the documents from your organization's file system or by modifying your defined document collections to exclude the documents.

To delete documents from West km, 1. In the West km pages, generate a result list of your organization's documents: To build a list of your organization's documents that cite a particular citation, click KeyCite on the West km toolbar, type the citation in the New citation next box under KeyCite for Firm Documents, and click GO.

To search for your organization's documents, click Search on the West km toolbar, type one or more search terms in the text boxes under Search for Firm Documents, and click GO. (If you type multiple search terms, all terms must be found.) To access your organization's documents already assigned to a KeySearch topic, click KeySearch on the West km toolbar and search a topic.

2. In the result list in the right frame, select the check box preceding each document you want to delete from West km. To select all documents in the result list, click Select All check box r. in the result list heading.

3. Click Delete Selected Documents from West km.

4. At the confirmation message, click OK.

3.4 Deleting Documents from West km Indexing Your Organization's Documents 4.1 What You Need 59 4.2 Access the Administrative Tool in West km 59 4.3 Designate Administrator Accounts 60 4.4 Designate Databases Containing Document Collections 61 4.5 Define and Index Document Collections 65 4.6 Synchronize Document Collections 73 4.7 Create and Update Full-Text Indexes 74 4.8 Set a Document Security Level 75 4. 9 Administer West km Members 76 When you initially index your organization's documents, West km imports the document collections you designate from your organization's DMS or NT file system (NTFS). As shown in the West km RID and CaRE Indexing Process diagram, West km then converts the documents to an HTML format, identifies citations, assigns documents to KeySearch legal topics using West's classification and routing engine (CaRE), and stores the converted documents. In a separate indexing process, West km creates the appropriate full-text search indexes. (Throughout these processes, the original document in the DMS is unchanged.) West km RID and CaRE Indexing Process 1. Schedules indexing West km 2. Picks up task Database i 7. Creates document profiles and c nnnnnDn records citation information in Indexing Server database Delivery Server 8. Assigns documents to DMS 3. Gets documents KeySearch topics with CaRE and o M « with the DMS query ER records CARE data in database J g'i 4. Coverts documents to 14TML DOMS Server c. Stores documents Document File Server 5. Identifies document West km citations HTML Document Server (s) RID Database 6. Identifies document citations (if not recognized by West km RID database) Organization's Firewall I H iml linil 1m1 itE5il liwil lmil L1 1 I Di I I Di I =Z c gugugugiSgugugUgugguggiqigi- Cite ID Servers (RID) at West Subsequent update processes keep the documentation information current in West km: The indexing update process-either automatically or manually run-indexes any updated or new documents in the collection since indexing was last run. The indexing update process converts updated or new documents to HTML, indexes their citations, and assigns them to KeySearch topics. In addition, the indexing update process applies KeySearch classification and display name changes that have been made to a document collection since the last indexing.

« The synchronization process removes documents from West km, according to changes in your organization's document collections. Synchronization also schedules any new documents in the collection for indexing. t The full-text update process creates and updates the indexes that are used to search your organization's documents by terms.

Supported platforms and formats for the documents you want to index include the following: a Microsoft Word, versions through 2002 z Corel WordPerfect, versions through 10 a Lotus Word Pro, versions 96 through Millennium Edition 9.6 58 Chapter 4: Indexing Your Organization's Documents For information regarding support for other formats, call your West km representative at 1-888-877-6529 (option 8).

4.1 What You Need Prior to indexing your organization's documents as explained in this chapter, you need the following: a Document collections identifiable for indexing in NTFS folders or in saved searches in DMS databases.

Your full-text searching (FTS) administrator account name and password (if you have not disabled full-text searching software).

A Windows domain administrator account with access to all NTFS and DOCS Open/PCDocs documents you are indexing and to all West km server components.

A user ID and password for an account that has the necessary read-only rights to access your organization's DMS and the documents you are going to index.

If your organization uses Novell network software and DOCS Open/PCDocs, the user name and password for the Novell server login and the name of the Novell tree or the IP address of the Novell server.

# If your organization uses ProLaw Version 9 and Sybase database server, the network protocol for connecting to the database server.

# On your HTML document server (s), a folder to store HTML document renderings and the creation of a share for that folder; if you will use multiple HTML document storage locations, you need to create a folder and share for each.

If you want to assign a document collection to a customized KeySearch topic, creation of the topic.

# Consideration of when and how often to update West km indexes after the initial indexing of documents.

Information on your organization's West km members, including names, network IDs, and Westlaw passwords.

4.2 Access the Administrative Tool in West km Using the administrative tool in West km, you can do the following: # Designate databases or libraries that contain the document collections that you want to be indexed Define and then index those document collections Monitor the indexing processing of documents # Synchronize West km with the documents in your document collections Designate the update frequency of the full-text index of your document collections 4.2 Access the Administrative Tool in West km M Select a document security level to control access by your active West km members to your organization's documents « Administer your West km members View usage tracking data (see"5.3 Tracking Usage"on page 86) To access the administrative tool, 1. Make sure the West km Indexing Service is running (see"2.8 Start West km Services"on page 29 for details).

2. Open Internet Explorer on the delivery server or any other workstation with access to the delivery server and access http ://servername/km/plhome. aspx, where servername is the name of your delivery server.

4.3 Designate Administrator Accounts Before indexing your documents in West km, you must enter your full-text searching (FTS) administrator account and Windows domain administrator account.

A Windows domain administrator account is required. This account must have access to all NTFS and DOCS Open/PCDocs documents you are indexing and to all West km server components. In the West km NT Security Diagram on page 35, this account is represented by the West km Admin on the resource domain. If you are not using an NT networking environment, the Windows domain administrator account needs to be created locally with the same password on all West km server components.

To designate administrator accounts in West km, 1. In the administrative tool, click System Options in the left frame.

2. In the NextPage Admin User ID and Password text boxes, enter the name and password of your FTS administrator account. By default, the name is administrator. You will receive the password from West km Technical Support (available at 1-888-877-6529, option 8). i INextPageAdminUserlf2 : admWStrator Password ; ***"** i 3. Under Remote Access, type the user name (e. g., cat\kmadmin) and password for a Windows domain administrator account with access to all NTFS and DOCS Open/PCDocs documents you are indexing and to all West km server components. See"2.10 Set Security"on page 30 for more information. Remote Access : User Name : catkmadmm passwaed : *****"** 4. Click Save.

60 Chapter 4: Indexing Your Organization's Documents 4.4 Designate Databases Containing Document Collections To index documents in West km, you must first designate the databases or DMS libraries that contain the document collections you want to index. Depending on your document storage method (i. e. , a DMS or the NT file system), designate your databases as instructed in the following subsections.

4.4. 1 Designating Databases with iManage, DOCS Open/PCDocs, DOCSFusion, and Lotus Notes 1. In the administrative tool, click Database Management in the left frame. , , ? IhI s « ver : oetebase : was Usa m : Passwad : _ Td" H 1'j : Pd : 2. Click Add a Database.

3. In the Add a Database dialog box, type or select the following for the database that contains the document collections you want to be indexed: a. Type the name of the server containing the DMS documents in the Server text box. b. Type the name of the database containing the document collections in the Database text box. c. Select the DMS used to manage the documents from the DMS Type drop- down list. d. Type the user ID and password for the DMS server login in the User ID and Password text boxes.

DOCSFusion: The user ID is the name of the DOCSFusion administrator account whose primary group is docs_supervisors, and the password is the network password of the domain account tied to the DOCSFusion administrator account. The DOCSFusion administrator account must have the correct security settings to run all the DOCSFusion quick searches to be used with West km.

4.4 Designate Databases Containing Document Collections DOCS Open/PCDocs: The user ID and password are for a SQL Server account that has the necessary read-only rights to access the DOCS Open/ PCDocs database. e. If your organization uses Novell network software and DOCS Open/ PCDocs, in the bottom section of the dialog box type the user name and password for the Novell server login in the User Name and Password text boxes. Type the name of the Novell tree or the IP address of the Novell server in the Tree or Server IP text box. f. Select a location to store the HTML documents for this database from the HTML Storage Location drop-down list.

To designate a new location, click Add Storage Location, type the full path name (e. g. , D: \HtmlStore) for the storage location you created on the HTML document server, type the server name (e. g. , HTMLSRV), type the share name you created for the storage location (e. g., HtmlDocsl), and click OK. g. If desired, select a display name for this database from the Office Display Name drop-down list. This name, such as a location or a practice category, will be used to identify the database to your West km members.

To designate a new display name, click Add Office Display Name, type the name you want (e. g. , LA Office, Corporate), and click OK. i a,. . a i LA ----------- -i= m i ^..., =11 | _s S1 n l S = I I I ! 1 _. e I_ l | , JIM _ I | I | 4. Click OK in the Add a Database dialog box.

5. At the Update successful notification message, click OK.

6. Repeat steps 2-5 for each database that contains document collections you want to index.

4.4. 2 Designating Databases with ProLaw Version 9 1. In the administrative tool, click Database Management in the left frame.

2. Click Add a Database.

3.. In the Add a Database dialog box, type or select the following for the database that contains the document collections you want to be indexed: a. Type the name of the server containing the documents in the Server text box.

62 Chapter 4: Indexing Your Organization's Documents b. Type the name of the database containing the document collections in the Database text box. c. Select ProLaw Version 9 from the DMS Type drop-down list. d. Type the user ID and password for the ProLaw server login in the User ID and Password text boxes. e. If your organization uses a Sybase database server for ProLaw Version 9, select the Sybase check box and type the network protocol for connecting to the database server in the Protocol text box; for example, tcpip {host=&num &num &num . &num &num &num . &num &num &num . &num &num }, where &num &num &num . &num &num &num . &num &num &num . &num &num is the IP address. f. Select a location to store the HTML documents for this database from the HTML Storage Location drop-down list.

To designate a new location, click Add Storage Location, type the full path name (e. g. , D: \HtmlStore) for the storage location you created on the HTML document server, type the server name (e. g. , HTMLSRV), type the share name you created for the storage location (e. g., HtmlDocsl), and click OK. g. If desired, select a display name for this database from the Office Display Name drop-down list. This name, such as a location or a practice category, will be used to identify the database to your West km members.

To designate a new display name, click Add Office Display Name, type the name you want (e. g. , LA Office, Corporate), and click OK. i e_l _S _ S1 l Si I l l = | E X | - e : . : : : _E al @ | 4. Click OK in the Add a Database dialog box.

5. At the Update successful notification message, click OK.

6. Repeat steps 2-5 for each database that contains document collections you want to index.

4.4. 3 Designating Databases with the NT File System 1. In the administrative tool, click Database Management in the left frame.

2. Click Add a Database.

3. In the Add a Database dialog box, type or select the following for the folder that contains the document collections you want to be indexed: a. Type the name of the server containing the documents in the Server text box.

4.4 Designate Databases Containing Document Collections b. Type the location on the server where the documents are stored in the Database/Share text box (e. g. , if the documents are located at \\pheasant\documents, then type documents). c. Select NTFS from the DMS Type drop-down list. d. Select a location to store the HTML documents for this folder from the HTML Storage Location drop-down list.

To designate a new location, click Add Storage Location, type the full path name (e. g. , D: \HtmlStore) for the storage location you created on the HTML document server, type the server name (e. g., HTMLSRV), type the share name you created for the storage location (e. g., HtmlDocsl), and click OK. e. If desired, select a display name for this database from the Office Display Name drop-down list. This name, such as a location or a practice category, will be used to identify the database to your West km members.

To designate a new display name, click Add Office Display Name, type the name you want (e. g. , LA Office, Corporate), and click OK. eBM l ; S _ sg E E E g g z s I X = Z E X i 2 2 2 | W W i i | | 4. Click OK in the Add a Database dialog box.

5. At the Update successful notification message, click OK.

6. Repeat steps 2-5 for each database that contains document collections you want to index.

4.4. 4 Editing Databases To edit a designated database, select the server and database you want to edit at the Database Management page. Then edit or select new values and click Save. If you cannot click in a text box or select a value, that field cannot be edited.

Note: If you change the display name of a database with defined document collections and those collections do not have custom display names, the display name change is applied to those document collections during the next indexing of the collection.

64 Chapter 4: Indexing Your Organization's Documents 4.5 Define and Index Document Collections Once you have designated the databases or libraries that contain your document collections, you can define and index those collections from the Indexing Options page.

To access the Indexing Options page, click Indexing Options in the left frame of the administrative tool. In the top portion of the Indexing Options page, a list of servers, databases (or libraries), and document collections available for indexing are displayed. For example, available document collections could be sets of NTFS folders or DMS queries you have already created and saved.

In the bottom portion of the. page, currently indexed document collections are displayed. '*. HTMLSpVWUrDxri 10 : 1F, IprStuel AvdaE6 Foiders : D Fm RMI Et Y SE i, °fsY '°I°d, ç Alwb9bidDXU SCd : M : NrwrHyGdendOOammkCOledba : Z b w t HTM5Riovtt » : \Hita) >>9 : 0l : XPM k = ~, HTM5RtHDæt1íD : \Hi) » 9 : 01 : SFM s p = ~ o HTMGiDstl íD : \HiSI » >9 : 01 : 56 PM A pbkw. NTMLSWHbTD-1 p : \IiUZt..) 2i2st=9 : ol : S ! PM o> bib, dbk xbet HTMISRVIHl : \HtmEhe) : \HtnSt zXng : oH9PM -e^ : r. kithllA11116t-'. :).

4.5. 1 Define Document Collections Complete the following steps to define new document collections: 1. If you added a database on the Database Management page before accessing the Indexing Options page, click F5 to refresh the display.

2. If you added a database for ProLaw Version 9 on the Database Management page, follow the instructions under"4.5. 2 Add Document Collections with ProLaw Version 9"on page 68 for each collection you want to add. Then proceed with step 5 below.

3. Select the server containing the DMS documents you want to index from the Server drop-down list.

4. Select the database containing the document collection from the Database drop- down list.

5. If the documents are managed using a DMS, select the document collection you want to index from the Available list.

4.5 Define and Index Document Collections 124/ 6. If the documents are stored using the NT file system, click the Browse button next to the Available Folders text box. In the File name text box, enter the server and share (\\server\share\) and navigate to the folder whose documents you want to index as a collection. Select a document in the folder and click Open.

7. Click Add to Indexed. _a_ T d dZ HIMV*I @ : » o} o s b Qo RKn QoX Odt : r 1 » o, r r n f oa r, . r d-.. ts kk. U--tw : r°fy d doo, mrM hM Unw stegarbs : Specify affua loeadonfor l6is collectian : F Q tasmm u% ooratsara, tekdds nsaedieuxssnora, 4mnxsanab : 8. Select how you want the documents in the collection to be indexed (select as many that apply): If you want all subfolders at the location to be indexed as part of this collection, select the Include subfolders check box (this option is available for NTFS documents only).

If you want to index only the text of documents (and not index citation information or classify documents using CaRE), select Bypass Cite Recognition.

If you want to index only documents that contain one or more citations, select the Citations Only check box.

If you want a default jurisdiction to be used for citations in this document collection that are missing jurisdictional information, select a state from the Default Jurisdiction drop-down list.

9. Select an option for assigning documents in this collection to KeySearch legal topics. (If you disabled CaRE during the installation process, then classification options are not available.) Do Not Classify Documents: Select this option if you don't want documents automatically-assigned to KeySearch topics.

66 Chapter 4: Indexing Your Organization's Documents Classify Documents using the West km CaRE Engine: Select this option if you want CaRE to automatically assign documents with at least one case law citation to KeySearch topics. (If you selected to bypass cite recognition, this option is not available.) Classify all documents into these categories: Select this option to assign all documents to the listed KeySearch topics. To add a topic to the list, click Add, navigate to the topic, and click Save. To remove a topic from the list, select it and click Delete.

Note: To assign documents to a KeySearch topic that you have created, you must first create the topic. See"3. 1.1 Adding a KeySearch Topic"on page 51 for details. G Do Not Oessiy Doarnxts r CInssPy Daaunents ush9 the West lan CARE Enqine RewiZ~u (-'C al dwxorb kto dM CgtgiI ] 10. If you want this document collection to have a display name different than the display name for the database containing the collection, select Custom. Then either select a new name, such as a location or a practice category, from the drop- down list. To create a new display name, click Add a Library. Specify office location for this collection : ¢ L4 OFFke | Te9 r « tx, oy_-cc. a y dt. r ; rY..

11. If you want the index for this document collection to be automatically updated, select Schedule Updates According to This Schedule. The default update schedule is every day at 12: 00: 00 a. m. (midnight), starting on the day after the current day. To change the update schedule do the following: a. Type and select the frequency at which you'd like the indexing updates to occur. For example, type 2 and select Weeks to update the index every other week. b. If you selected Weeks or Months in the previous step, select the day of the week on which you want indexing to occur. Coo Not Schedule Update : R Schedule Updates Acceding to this 5cheduie : BuAd EverY Next Scheduled Run : WeeksA : Y Smdays..... _". 9f25f200312 : 00 : 00AM -- 4.5 Define and Index Document Collections c. Click the Next Scheduled Run calendar icon im to set the date and time on which you want indexing updates to start. Navigate to the month and year, click the date, select the time, and click OK. 2 : 30 : 00 AM u Mo IL We We Fr Sa Su 11 : 00 : 00 AM 1 2 3 4 I : m ; w 7 8 9 10 11 12 13 2 : 00 : 00 AM 7 8 9 10 11 12 13 2 : OD : 00 AM 7 o o in _--2 : 30 : 00 PM , ; a 14 15 16 17 18 2 20 3. mmAm Ui 21 22 23 24 {iX 26 27 3 : 3ß. ZAf 6 28 29 30'4 : OO : aO AM :"°=i' -........ 4 : 30 : 00 AM, . : ;. ; :'.. : : !.... 5, 00 ; DDAM) : (P : AM, * iw Updates will start according to the frequency you select, starting from the date and time of the next scheduled run. For example, if today's date is Friday, April 25, the following settings would result in these update dates: Setting for Frequency Setting for Next Scheduled Run Date Update Will Run 2 weeks on Sundays Friday, April 18 (previous date) Sunday, May 4 2 weeks on Sundays Friday, April 25 (today's date) Sunday, May 11 2 weeks on Sundays Friday, May 2 (future date) Sunday, May 18 After an update starts, the Next Schedule Run setting will automatically change to reflect the next date and time the update is scheduled to run.

Note: For the fastest processing speed, it is recommended that you (1) set start times after regular business hours, and (2) stagger start times when indexing multiple documents collections.

12. Click OK.

The document collection (s) is added to the Currently Indexed Document Collections list on the Indexing Options page.

To edit a document collection's definitions, on the Indexing Options page click the Edit icon p to the left of the collection in the Currently Indexed Document Collections list, make your changes, and click OK. Changes will be applied during the next indexing of the collection.

4.5. 2 Add Document Collections with ProLaw Version 9 If you are indexing documents stored in ProLaw Version 9, complete the following steps to add a new document collection: 1. On the Indexing Options page, select the server containing the ProLaw Version 9 documents you want to index from the Server drop-down list.

2. Select the database containing the documents from the Database drop-down list.

68 Chapter 4: Indexing Your Organization's Documents 3. Click Add Collection.

4. In the Document Collection dialog box, type a collection name and fill in any ProLaw Version 9 criteria you want used to select documents for inclusion in this collection. If you don't indicate any criteria, all documents in the selected database will be included. - XY 1 G f X v <*'i1 , a rr t : < r t 3 n f 5. Click OK.

The collection is added to the Available Collections list on the Indexing Options page and is available for indexing.

To edit a collection you've already defined, select the collection in the Available Collections list and click Edit Collection.

4.5. 3 Index Document Collections Once you define a document collection, you need to index its documents. Complete these steps to index newly defined document collections, fully re-index previously indexed collections, or manually launch updates to indexed collections: 1. On the Indexing Options page, click the document collections in the Currently Indexed Document Collections list for each collection that you want to index.

Selected collections are highlighted.

2. To start indexing, do one of the following: To index a newly defined collection or fully re-index a previously indexed collection, click Start Bulk Indexing. Indexing processes start immediately.

To update the index for a previously indexed collection, click Start Incremental Update. Update processes start immediately.

Note: Full indexing includes the creation of full-text search indexes for the document collection, whereas indexing updates do not. See"4.7 Create and Update Full-Text Indexes"on page 74 for information on updating the full-text indexes at your organization.

3. You receive notification that the indexing process has started. Click OK.

The time required for indexing varies, depending on the processing power of the indexing server, the speed of your Internet connection, the number and length of documents, the number of citations within documents, the number of documents 4.5 Define and Index Document Collections with one or more case law citations, the configuration of West km, and other activities on the server.

As soon as a document is indexed, it becomes available to your active West km members.

4.5. 4 Removing Document Collections If you no longer want a document collection to be indexed, you can remove the collection from the Currently Indexed Document Collections list: 1. On the Indexing Options page, click the document collections in the Currently Indexed Document Collections list for each collection that you want to remove.

Selected collections are highlighted.

2. Click Remove Collections.

3. At the Removing a collection notification message, click OK.

4. At the Update successful notification message, click OK.

If you remove a document collection from the Currently Indexed Document Collections list that has been already indexed, it will prevent the collection from being re-indexed. The documents as they were last indexed, however, will still be available to members until the document collection is synchronized (see"4.6 Synchronize Document Collections"on page 73 for details). In addition, the documents will still be represented in full-text indexes until full-text indexes are updated (see"4.7 Create and Update Full-Text Indexes"on page 74).

4.5. 5 Monitoring Indexing of Document Collections You can view the indexing progress of a document collection. Statistics are shown for both bulk indexing and indexing update processes, whether automatically or manually initiated.

1. In the administrative tool, click Indexing Statistics in the left frame.

2. Select the document collection for which you want to view indexing statistics from the Choose a Document Collection drop-down list and click Next. To view statistics on all documents scheduled for indexing, select All Firm Documents.

Note: You can also view indexing statistics for a document collection by clicking the collection's name in the Currently Indexed Document Collections list on the Indexing Options page.

3. The indexing statistics for documents in the selected document collection are displayed. If you want to update the statistics while the indexing process is running, click Refresh.

70 Chapter 4: Indexing Your Organization's Documents Last Bulk Load The Last Bulk Load table shows the indexing statistics for just the documents being indexed (or last indexed) in the collection. For bulk indexing, the figures total the number of documents in the collection (excluding the figure for any deleted documents). For indexing updates, the figures total just the new or modified documents that are being indexed within the collection (excluding the figure for any deleted documents).

All Bulk Loads The All Bulk Loads table shows the current indexing statistics for all the documents in the collection. Whether the current processes are for bulk indexing or indexing updates, the figures always total the number of documents in the collection (excluding the figure for any deleted documents).

By default, the tables display figures for the following categories: This category: Shows how many documents in the collection : Scheduled Are currently remaining to be indexed Indexed Have been successfully indexed Errored Have not been indexed because of processing errors Identified as corrupt Have not been indexed because they are corrupt Physical file missing Have not been indexed because the document file could not be found Excluded based on file type Have not been indexed because the document file is an unsupported file type Deleted from syncing Have not been indexed because the document (which was previously indexed) was deleted and then removed from the collection during the West km synchronization process To view a more detailed breakdown for the Scheduled, Indexed, and Errored categories, change the following property in the Web. config file to Y. (The default value is N.) <add key="ShowIndividualStatusCode"value="Y"/> (See"6 Setting Properties in Configuration Files"on page 89 for instructions on setting properties in configuration files.) 4.5 Define and Index Document Collections With this property set toY, the following additional categories are displayed in the tables. The total of figures for a group's individual categories equals the group figure.

Group category: This individual category : Shows how many documents in the collection : Scheduled Scheduled Are currently remaining to be indexed.

Scheduled (Delegated) Are currently in process.

Indexed Indexed (Completed successfully) Have been successfully indexed.

Indexed (RID partial error) Have been indexed, but with an error in identifying citations with RID; at least one citation in the document was identified.

Errored Errored (HTML conversion) Have not been indexed because of a failure to convert the document to HTML.

Errored (RID failure) Have not been indexed because of a failure in RID to identify citations; no citations in the document were identified.

Errored (General failure) Have not been indexed because of a general processing failure.

Errored (RID timed out) Have not been processed because RID failed to communicate for 120 seconds.

West km will attempt to re-index documents in the Errored (RID failure) and Errored (General failure) categories after six hours (360 minutes), as indicated by the value of the following property in AtlasIndexingService. exe. config: <add key="indexer ErrorReprocessThresholdMinutes"value="360"/> Note: If the indexing service is stopped, any delegated documents will not be re-indexed immediately after restarting the service. West km will attempt to re-index these documents after six hours (360 minutes), as indicated by the value of the indexer_DelegatedReprocessThresholdMinutes property in AtlasIndexingService. exe. config.

For documents in these categories, re-indexing will continue to be attempted at this rate in relation to the last failed attempt until the documents are indexed or until another indexing process is run and attempts to index the documents. At that point, the result of the most recent indexing process affecting the documents determines re- indexing attempts going forward.

Regardless of the result of a previous indexing process, the following occurs: a During bulk indexing, all documents will be re-indexed.

During an indexing update, only documents that are new or have been modified and that have a date and time after indexing last occurred will be re-indexed.

(New or modified documents with a date and time before indexing last occurred will only be indexed if they were identified by the synchronization process.) 72 Chapter 4 : Indexing Your Organization's Documents If you want to see more detailed information about West km indexing activity, for example if several documents had errors, see"5. 2 Using Trace Logs"on page 82.

For information on monitoring the status of full-text indexing, see"4. 7 Create and Update Full-Text Indexes"on page 74.

4.5. 6 Stopping Indexing t'If you want to stop the indexing process while it is running, do so by stopping the the West km services and the Word Wide Web Publishing Service. For each service listed, complete these steps on the service's associated server to stop the service: 1. Go to Start I Programs I Administrative Tools I Services. <BR> <BR> <BR> <P> 2. In the Services window, right-click the name of the service (e. g., West km<BR> <BR> <BR> Indexing Service) and click Stop.

West km Service Associated Server West km Indexing Indexing server West km Indexing Helper Service Indexing server West km CaRE Service Indexing server West km CaRE CNC Service Indexing server World Wide Web Publishing Service Delivery server To restart services after they have been stopped, restart the World Wide Web Publishing Service and then start the West km services as instructed in"2.8 Start West km Services"on page 29.

4.6 Synchronize Document Collections The synchronization feature in West km analyzes your currently indexed document collections and then a removes indexed documents that have been deleted from your organization's file system removes indexed documents that are in collections you have removed from the Currently Indexed Document Collections list identifies new documents in the collections and schedules them for indexing To synchronize your document collections, complete the following steps: 1. In the administrative tool, click System Options in the left frame.

2. Under KM->DMS Document Synchronization, select the frequency at which you want your document collections to be synchronized by selecting-a setting from the Frequency drop-down list.

4.6 Synchronize Document Collections 3. Click the Next Scheduled Run calendar icon B to set the date and time on which you want synchronization processes to start. Navigate to a month and year, click a date, select a time, and click OK.

Synchronization processes will start according to the frequency you select, starting from the date and time of the next scheduled run.

Note: For the fastest processing speed, it is recommended that you set the start time after regular business hours.

4. Click Save.

5. If you want synchronization to start immediately (regardless of the frequency and next scheduled run settings), click Run Now.

For deleted or removed documents, entries in the West km database and HTML renderings are deleted. The documents will still be represented in full-text indexes, however, until full-text indexes are updated (see"4.7 Create and Update Full-Text Indexes"below).

417 Create and Update Full-Text Indexes You can create and update full-text indexes of your West km documents. Full-text indexes are used to retrieve your organization's documents when a West km member at your organization performs a term search on your organization's documents.

A full-text index is created for each defined database (see"4. 4 Designate Databases Containing Document Collections"on page 61) and is based on the HTML document renderings of indexed documents. The update process examines new, deleted, and modified documents since full-text indexing was last run and updates the indexes.

To create or update the full-text indexes at your organization, 1. In the administrative tool, click System Options in the left frame.

2. Under Full Text Index Rebuild, select the frequency at which you want your full- text indexes to be updated by selecting a setting from the Frequency drop-down list.

3. Click the Next Scheduled Run calendar icon ma to set the date and time on which you want full-text indexing updates to start. Navigate to a month and year, click a date, select a time, and click OK.

Full-text indexing updates will start according to the frequency you select, starting from the date and time of the next scheduled run.

Note: For the fastest processing speed, it is recommended that you set the start time after regular business hours.

4. Click Save.

74 Chapter 4: Indexing Your Organization's Documents 5. If you want full-text indexing to start immediately (regardless of the frequency and next scheduled run settings), click Run Now.

The full-text indexing process automatically creates the NextPage NXT 3 content service that defines the HTML documents that will be indexed for full-text searching; for more information about the manual steps behind this process, see "Appendix B: More about the West km Automated Setup." Note: If you disabled full-text searching software during the installation process, then settings to update the full-text index are not available.

To monitor the status of full-text indexing of documents, go to Start Programs) West km I FTS Content Network Manager. When prompted, enter the name and password of your FTS administrator account. (By default, the name of the FTS administrator account is Administrator. The password you will receive from West km Technical Support, available at 1-888-877-6529, option 8. ) Then click the View menu, click Statistics, and re-enter the name and password of your FTS administrator account if prompted. *, r . r^, .. x W.. w 'r °£'°, . ;. , OS09= losm9rmn 00 : 00 : 09 N. OLid 9K 1se617 15 : 9623 sXceshS lofflan 4Kld 5RM 11 : wN { t aaaaas w e aim, 20e3 PddF (w) 01 11 : 2959 2 59 2 294 59 4 Lek- « M7 (Mc5M7 11 : 50 : M 11 : 50 : 04 tMtMtAf DO tueeeM fOxOOOOOOfn fuzz i x a zw ss pfld. (OV00000007 11 : 2'1 4.8 Set a Document Security Level By selecting a document security level, you control the access that your active West km members have to your indexed documents. The security levels are based upon the security implemented in your organization's DMS.

To select a document security level, 1. In the administrative tool, click System Options in the left frame.

2. Under Document Security Level, select the security level you want: None: All matching organization documents are listed in West km results, and all active West km members can view and load them. This is the lowest security setting and is selected by default.

Always Display Titles: All matching organization documents are listed in West km results, but members can only view and upload a document if they have the necessary DMS access rights.

4.8 Set a Document Security Level Full : Only documents to which the members have necessary DMS access rights are listed in West km results. This is the highest security setting.

Important: The performance you experience in West km is inversely proportional to the security level you select. The lowest security level will produce the best performance; the highest security level will negatively affect performance.

3. Click Save.

You can also select a security model for West km. See"2.10 Set Security"on page 30 for details.

4.9 Administer West km Members You can administer your West km members-for example, activate or deactivate a member, add information for a member, or add a member.

In the administrative tool, click Professionals in the left frame. The Professionals page is displayed. km _ : A . . aS. Arxl.... r r r . 1 irx. il ; r r r r c r. l r_ r_ e= _ bñw r ö. r i [or K r _r K ttt9W~A-^i--r iE SoWMi sn i WMir xnmH. . CR : s........ _."...... _.... y.., :-.,.,., _,......... 1. p snNlnnet Nt1 Nda aM511', : v C 3wararr w am z : nan Lxvm CAl : hnwmo , 5. IV MOHI 1Z7WIM n : sbna ea j ... _.' ; uunwa ; ( ! iE : EJt : The Professionals table on the bottom portion of page lists members of your organization and includes the following categories of information: Name fields The member's full name.

Network ID The member's ID to log on to the organization's network, including the domain name.

Westlaw ID The member's password to sign on to Westlaw, including numbers and letters.

76 Chapter 4: Indexing Your Organization's Documents Active User When selected, the member is able to access your organization's documents from westlaw. com. You can have as many active members as provided in your license agreement.

Westkm Admin When selected, the member has rights to the West km administrative tool.

Information When selected, the member has rights to administer your Manager organization's KeySearch hierarchy.

To change the sort order of the table, click the column heading by which you want to sort.

The initial list of members is compiled in the Professionals table during the indexing process. This list includes the Name field only and is based on the authors of documents in your document collections. From this list, you will need to edit member information, such as activate and add required information for a member, as well as add members. well as add members.

Note: Because the initial list of members is compiled from document authors, individual who are no longer with your organization may be included in the Professionals table. Although members cannot currently be deleted from the Professionals table, you can always edit member information to reflect an active employee.

The number of active West km members you are allowed is determined by your license agreement. Please call your West km representative at 1-888-877-6529 (option 8) if you need to purchase additional licenses.

4.9. 1 Finding a Member You can use the Search Criteria section on the Professionals page to easily find the listing for a particular member of your organization.

1. In the Search Criteria section, select whether you want to search for an inactive member, an active member, or both.

2. Type either the full name or last name of the member in the appropriate text box.

Results will contain the specified text anywhere in that portion of the name. Sear_chGkera : __ ' Y"'tnactiveriACt'rve C : g"". _", - Ful Name : Last Name : : i '. I.....,.... s, dNelder... ! ; 3. Click Search.

The members matching your search criteria are listed in the Professionals table. (To display all members in the Professionals table, select Both in the Search Criteria section, clear any values in the text boxes, and click Search.) 4.9 Administer West km Members 4.9. 2 Adding a Member If a member isn't listed in the Professionals table, you can add the member.

Note: To avoid duplicate entries, always check the Professionals table for the member before adding a new entry.

1. Type the member's information in the first blank row of the text boxes in the table. A red asterisk indicates required information. In addition, active members require a Westlaw ID.

2. Repeat step 1 for as many as four additional new members. ------------ F ; q. ----------- 1-...--__.. "_-_.. _.... k'°^....-_.. _. 4..... a. P-Z---------, C- roi .-..--ll.. y., y. y=_y.. llnl nnnnnll G r o . r. w. eiwa 3. Click Add Professionals.

If you want to add an extensive list of members to the Professionals table, call West km Technical Support at 1-888-877-6529 (option 8) for information on importing members.

4.9. 3 Editing a Member You can edit an existing member's listing, for example, to activate or deactivate a member or add information for a member.

1. Click Edit next to the member's listing in the Professionals table.

2. Make the necessary changes to the member's row and fill in all required information, which is marked with a red asterisk. In addition, active members require a Westlaw ID. RbP6i RosdbPukLn, : osa4o ! Parkhmd. .. u5278 : 7962BDED (r ; e [d" [J : - : : 3. Click Update.

4.9. 4 Adjusting the Professionals Table Configuration for iManage West km typically uses NT login information along with other information in the Professionals table to verify the identity of West km members. If your organization uses iManage as its DMS and uses virtual logins rather than NT integrated logins, you can add a column in the table for a DMS user ID. If you want, you can also add a column for a DMS password.

78 Chapter 4 : Indexing Your Organization's Documents To add these columns, adjust the following properties and values in the Web. config file as appropriate. (See"6 Setting Properties in Configuration Files"on page 89 for instructions on setting properties in configuration files.) If your organization does not use NT integrated logins with iManage, change the value for the following property to Y. This will add a DMS UserID column to the Professionals table, as well a Server\DB column for the server and database to which the member has access.

<add key="DmsUserIdsRequired"value="Y"/> N To also add a DMS Password column to the Professionals table, change the value for the following property to Y. (If not present already, this will also add a Server\DB column for the server and database to which the member has access.) add key="DmsUserPasswordsRequired"value="Y"/> By default, both values are set to N. When the value of the DmsUserIdsRequired property is set to Y, the Professionals page appears as follows. km z :. a. ... _,.,. _..'- s-, r_a,. <.. s." rtf'. 3... ! Sw..... i. ... .. ri r. . _.. L. _.. _-. _''... _-I F------,, r7 : 777777E777=r7777=r7777=r7777= FiE77= II _..-...-l__...-_'_'--.'r. _ _-... _-f_. _-i n n r w_. nrl.. . . ,.. ; . i ; r r, n P*I rliQ. F'jiiW6278 j>2iL-iR i < ! MX Sd r, ir. pt F, n r. 1,,. ; 1.. iu vi. _ ; ; : _ ; : ; __... _......... ___....-. _... _.... _... ___... _.... cpxmswnak : r.. _.... _. : : snW : 3F6r01 1 7N w2iir 1287ii7KS-IR r r ------- !.-_---i-----.--i-_ : _ _ _. l _. _. _"_".,""""_"w_"_ YIoHt'J ceo, abll667 1124234, ri sr2. r {plwZdS. 1 w1 _. _. _..,.... _ ,..... shrmmN st, am I -ur, . mssr-memras . f' : p, t. ; 11 drsrtldoa. nn... s, ; ... ., , : i KK * sC w tz ms V _m F = iz, .... _ y....,.. _ .,,. - i ;. wre rm J ivd. . mnema smssKOS _ q_ : Rf - (......... "'' fKKnY fluNne 1C', Cry pW076,.. YSU. CP I'_n.. .. plw ; S _....-fA Note: More than one database may be accessible to one member; in this situation, a drop-down list is displayed in the Server\DB column. When adding or editing a member's information, you will need to select the databases from the Servers drop-down list to which you want the member to have access and specify the member's DMS login information. The login information will apply to all selected databases.

4.9 Administer West km Members 4.9. 5 Using the Professionals Table with West km Custom Authentication If your organization uses West km custom authentication as its security model, the Professionals table will also include columns for Custom User Name and Custom User Password.

When administering your West km members, you will need to add West km usernames and passwords for each of your active members. Usernames and passwords are limited to 64 characters, and passwords are case-sensitive. Your active members will be prompted for this login information when accessing West km content from their Web browser or word processor. , , v ;. _'si. -. .' . ? , ; , i. "''.. IhI-'n il- ( ! n n . f-'t l IL 21_ L ii LJ n n o 1 _ : f_-i .. _. r n çr oi yiX 1s v w w __... __. ». __. ».... _....'.... r, . . w. ana r : HaWe G'llNVe C'lvan i, W r. m. : . xra : r :. I I ~rr RR i Sd ; Srrr ll 11 ri I iai 2 ! *. D * X-i j _, ri""_ _, b, _,,,", _,, __ j, ____, wj sdneder sme : iYaarr : ! pA _ A6 .... . owa. rn r. : ; wd. w aenWSers exasss ! 111 ' « ^ . d4 t t T ..........

See"2. 10.2 West km Custom Authentication"on page 36 for more information about the West km custom authentication security model.

80 Chapter 4 : Indexing Your Organization's Documents Tracking Program Activity ;. 1 5.1 Monitoring Events 81 5.2 Using Trace Logs 82 5.3 Tracking Usage 86 <BR> <BR> f9<BR> <BR> <BR> The event viewer and the tracing feature in West km provide a log of West km activity and allow you to monitor'program processes and troubleshoot errors. This logging occurs while West km services are running.

5.1 Monitoring Events An event log is created when West km services are started for the first time. Events are then logged as significant milestones are reached during the indexing process or when an error occurs.

Events are categorized as information, warning, or error events. In particular, you should monitor the event viewer for error events, which indicate that a West km server component has failed a required function.

If you have a distributed architecture, an event log is created on the delivery server, indexing server, and HTML document servers. The event log on the indexing server has more specific indexing messages, which make up the bulk of event logging.

To access the event log, complete these steps: 1. On the appropriate server, go to Start I Programs I Administrative Tools I Event Viewer.

2. In the Event Viewer window, click ProLaw in the navigation tree. Events are listed in the right frame.

3. To view more information about a specific event, double-click it.

5.1. 1 Information Events Informational events are logged when x the West km indexing service is started a the West km indexing service is stopped indexing of a document collection is started a indexing of a document collection is finished 5. 1.2 Warning Events Warning events are logged when a West km server component fails to read its configuration property for starting one of the West km services. a the processing of a document failed. a worker thread was aborted because it received a stop service command while processing a document. This could occur because West km didn't have rights to read the document or the document couldn't be found. the indexer believes it has encountered a corrupt document. This occurs when a document fails to be converted to HTML within the configuration time-out. In this instance, the service will automatically restart.

5.1. 3 Error Events Error events are logged when West km failures occur. This could happen when a the West km indexing service fails to extract a collection of documents from the DMS for indexing a a critical thread within the service has failed and the service needs to be restarted to function properly a a thread responsible for processing a group of documents fails x one of the West km services fails to start the delivery server could not access or communicate with another West km server component, e. g. , the West km database, the indexing server, or the HTML document server 5. 2 Using Trace Logs If you encounter error events in the event log, you can use trace logs to gather additional information about program activity, allowing you to troubleshoot problems more effectively.

By default, West km trace logs are located in the Logs subfolder in the West km installation folder (e. g. , C: \Program Files\Westkm\Logs). Trace logs relating to West's classification and routing engine (CaRE) are located in the CaRE\logs subfolder in the West km installation folder.

Trace logs include the following: West km IIS Trace Log Description Records activity on the IIS Web server application File Name prolaw. log 82 Chapter 5: Tracking Program Activity Description Records activity on the IIS Web server application Configured in this File Web. config (delivery server) West km Indexing Trace Log Description Records activity on the West km Indexing Service File Name prolawindexing. log Configured in this File AtlasIndexingService. exe. config (indexing server) West km Indexing Helper Trace Log Description Records activity on the West km Indexing Helper Service File Name prolawindexinghelper. log Configured in this File AtlasIndexingHelperService. exe. config (indexing server) West km Search Trace Log Description Records activity on the West km HTML Search Service File Name prolawHtmlSearch. log Configured in this File HtmlSearchService. exe. config (HTML document server) CaRE Trace Log Description Intended only for debugging exceptions, it records events for the West km CaRE Service when the program exits.

The program typically aborts when any major exception is encountered and error messages are written to the log file.

File Name careservice. date. log Configured in this File ksh. classify. server. conf CaRE Command and Control Trace Log Description Intended only for debugging exceptions, it records events for the West km CaRE CNC Service when the program exits. The program typically aborts when any major exception is encountered and error messages are written to the log file.

File Name cncservice. date. log Configured in this File cnc_ksh. conf 5.2 Using Trace Logs 5.2. 1 Configuring West km Trace Logs For the West km trace logs (i. e. , those whose names begin with West km in the section above), you can control the level of activity that is recorded, as well as the name and path of the trace log.

Turn on the logs when necessary, view the log files, and then turn off the logs when you are finished troubleshooting.

Important: West km trace logs increase in size quickly, so be sure to turn them off when you are finished troubleshooting.

To access and change West km trace log settings, complete the following steps: 1. Open the configuration file (listed above) in Notepad for the trace log you want to adjust. See"6 Setting Properties in Configuration Files"on page 89 for the servers and locations associated with West km configuration files. - <caigurat on> -..... .,..... <-...,.,. o,., <conf1gsecions> :- <sect1on name'-"westGroup. ProLaw. Diagnostics. ProLawTraceLevel ype :'system. configuratlon. 0ialonaryseaionuanrller systen' ersiond. 0. 3300. 0, culture. neutral, Pub11cKeyToken=b77a5c561934e089, ustan. null °/> </configseaians>" <wastGroup. proLaw. Dl agnosri cs. pronwrracaLEval > < !-- add trace level with bit mask value only, e. g. 2An <add key-"indexingJ. eve71" va7ue : e"> <add key."indexingleve72"va7ue-"16f/> y, 4a <add key-"PLTtmcEt. L" value-"2147483647"/> < !- lnt32 ? ax value--> « ltestroup proLaw. Otagnostics. ProuwnraceLevel> °' <system. d1agnostics> sw1tches> 46 < :-- 7urn on trace level by adding levels you want together. Ex : info + warning-3--> <add name-"ProLawswitch"value. ^0"/> /> </stltches>' <trace autof1ush-"true"1ndem : sl2a-"4"> ' <11steners>. S4e <add name."ProLawtraceLog"'d ype."system. 0lagnostics. TextwritertraceListener" nlt1allzeData."c : \progråm f11es\westkm\prolawindexhng. 10g"/> S ; 4 </11steners> « </trace> 'step diagnostics> ° <appsettings> <'-for DMs Integration-> ? <add key."IManageMaxROwsFOrsearch" value:'100000"/> °° <add key-"IManagesessionrimeoue"value 3600"/> ; yp : <add key."IManageVers10n"value."l. 0"/> < !-- used by Factory, e, o create correct iManage rbject > j < !-- adU key iManageuseTrusted !. ogin value Y/> <......'_-. y,'" 2. Locate ProLawSwitch in the configuration file.

< !-- Turn on trace level by adding levels you want together.

Ex: info + warning = 3--> <add name="ProLawSwitch"value="0"/> 3. Change the value of the ProLawSwitch to correspond to the activity you'd like to record in the trace log: Tracing Value Activity Traced 0 tracing is off 8 entering and exiting 16 input parameters and return values 31 all tracing is on 84 Chapter 5: Tracking Program Activity To record multiple types of activity, add the tracing values for the activities you want to be recorded. For example, type a value of 24 (8 + 16) if you want to record both function entering and exiting (value of 8) and function input parameters and return values (value of 16).

4. To change the location and name of a trace file, locate ProLawTraceLog in the configuration file and change the path and file name: <add name="ProLawTraceLog" type="System. Diagnostics. TextWriterTraceListener" initializeData="c: \program files\westkm\logs\prolawIndexing. log"/> 5. Save the configuration file.

6. Stop and then start the associated West km service on the appropriate server for the configuration file (see"6 Setting Properties in Configuration Files"on page 89).

5.2. 2 Configuring CaRE Trace Logs For the West km CaRE trace logs (i. e. , those whose names begin with CaRE in the section above), you can control the type of activity that is recorded, as well as the name and path of the trace log.

To access and change CaRE trace log settings, complete the following steps: 1. Open the configuration file (listed above) in Notepad for the trace log you want to adjust. See"6 Setting Properties in Configuration Files"on page 89 for the servers and locations associated with West km configuration files.

2. To set a path and file name for the trace log, adjust the following property: log. file: C: \Program Files\Westkm\CaRE\logs\careservice. % m% d% Y. log You can enter the following date variables in the file name: % Y 4-digit year % y 2-digit year % m 2-digit number (0-padded) representing the month % d 2-digit number (0-padded) representing the day 3. To determine whether a time stamp is placed on each log message, adjust the following property: log. format. long: 1 If set to 1, a time stamp is placed on each log message; if set to 0, a time stamp is not included.

4. Save the configuration file.

5. 2 Using Trace Logs 5. Stop and then start the associated West km service on the appropriate server for the configuration file (see"6 Setting Properties in Configuration Files"on page 89).

A newly named log file will be created each day if appropriate. To keep log files to a minimum, it is recommended that you purge log files on a daily or weekly basis.

Note : Although not recommended, CaRE trace logging can be turned off by not defining the log. file property.

5.2. 3 Viewing Trace Logs To view a trace log, navigate to the location designated in the trace file's associated configuration file and open the log file in Notepad. i 1.".. bi.. @ ir iii ator me : 6 4 2002 12 : 02 : 04 PM Loa Po er starte n vers on 1. o mo e 1/1/ pateT e : syt4/2ao2 12 : 02 : 04 PM LoadPOller started oateTime : 8/14/2002 12 : 02 : sLnformlate10nssvent Documem work load poller started Daterime : 8/14/2002 12 : 02 : 05 PM information Event : eulk Load Daemon Started. DateTime : e/14/2002 12 : 02 : 05 PM Information Event : Atlas Indexing service started successfully [nosessionID : 8/l4/2002 12 : 02 : 05 PM] Entering savedsearch. cet04eadysavedsearchWstxml 0 savedsearch. cet0. eadysavedsearchLtsman7 : return va7ue-a'., [nosesslonID : 8/14/2002 12 : 02 : 06 PM] Enter1 ng savedsearch. 6etStrandedBul kLoads EnosesslonID : 8/14/2002 12 : 02 : 06 PM] Param lRecoveryT1meout-300 Lnosess1oniD : 4n002 12 : 02 : 06 PMJ Exiting savedsearch. aetstrandedsulkLOads : return va, ue= l ateT1me : 8/14/2002 12 : 02 : 06 PM Handling aulkLoadDaemon shutdown for 300 seconds. DateTime : 8/14/2002 12 : 02 : 07 PM Loadpoller going to sleep for 30000 milles l ecause DocumemD1str1butor. GetworkLoad returneo O docs,'o DateTime : 8/14/2002 12 : 02 : 37 PM LoadPoller going to sleep for 30000 Mill i because Dacueeittoistrlhutor. cetwarkLOad returneU 0 docks. Daterie : 8/14/2002 12 : 03 : 08 PM Loadpol7er going to sleep for 30000 mi111s because oocunerrc0lstributor. GetworkLOad returned 0 docs. jateTime : 8/T. 4/2002 12 : 03 : 38 PM LoadPoller going to sleep for 30000 mi111s because oocunent0lstributor. setwOrkl. oad recurned 0 docks. jaieTime : 8/14/2002 12 : 04 : 08 PM LoadPoller going to sleep for 30000 mi111s because DocunerrcDistributor. GetworkLoad returned 0 docs. DateTime : 8/14/2D02 12 : 04 : 39 PM LoadPoller going to sleep for 30000 m1111s because DocumentDlstributor. 6etWorkLoad returned 0 docs. Daterie : 8/14/2002 12 : 05 : 09 PM LoadPoller going to sleep for 30000 milles because DocunerrcDlstributor. GetworkLoad returned 0 docs. - : i 5. 3 Tracking Usage You can track, query, and export your organization's usage in West km. Data includes the type and date of the West km document transaction, the user completing the transaction, and the related matter and document number.

To view West km usage data for your organization, access the administrative tool (see"4.2 Access the Administrative Tool in West km"on page 59) and click Usage Tracking in the left frame.

86 Chapter 5: Tracking Program Activity i : st km., _| 90rtDXo : txa : R9D, k. : ErdDk. : t'iJ 1 ^°w' t. : 2mmL. ao,,, ddL akm, a, ! : I 3YmYD ? z u s ? wn.. zaeouoi'"abuL ab. ndi Iaas 1 3mfmaji u siarn 27B (WOl RmaIdL Ridnm 13256... _. i 21I16PA1 T79F001 HmaHL Pklmen kn1mtfts 13756 1 3 (2'd10321114PM . w . 1 3jfif20Q32I121RA Pi4. n ; 'S.. JHA. n C eHnINNrva i The following types of transactions are tracked in the table at the bottom of the right frame: Transaction Description kmKeyCite an organization's document is retrieved as part of a citations list kmSearch an organization's document is retrieved as part of a search kmKeySearchConceptual an organization's document is retrieved in a KeySearch result because of its CaRE classification kmKeySearchFullText an organization's document is retrieved in a KeySearch result because of a query run on its full text kmKeySearchRelevant an organization's document is retrieved as part of a most statistically relevant KeySearch result (the document is either manually classified or retrieved both by CaRE classification and full text) kmKeySearchDefault an organization's document is retrieved in a KeySearch result when CaRE is disabled or when it is part of a customized KeySearch topic. kmViewDoc an organization's document is viewed kmKcFlags when an organization's document is viewed (ViewDoc), the number of unique citations with KeyCite status flags in the document kmEditDoc a copy of an organization's document is loaded kmInsertFlags KeyCite status flags are inserted in a word-processing document using the West km client kmUpdateFlags KeyCite status flags are updated in a word-processing document using the West km client 5.3 Tracking Usage For transactions other than kmViewDoc, the Units column provides the number of unique citations with KeyCite status flags in the document for that transaction.

5. 3. 1 Turning Usage Tracking On and Off By default, usage data is turned on and logged to the West km database. To turn usage tracking off or on, open the Web. config file (default location of C : \Program Files\Westkm\Web. config) in Notepad, change the value setting for the usage tracking property, and save the configuration file. (See"6 Setting Properties in Configuration Files"on page 89.) The property determining whether usage tracking is on or off is as follows, where a value of true turns usage tracking on, and a value of false turns it off.

<add key="atlasUseUsageTracking"value="true"/> 5.3. 2 Querying and Exporting Usage Data To query your usage data, enter your criteria in the text boxes at the top of the usage tracking page and click Search. The transactions that match your criteria are displayed in the usage tracking table.

For the document number, matter, and user criteria, transactions will be found whose values start with the letters you type. For the date criteria, you can either type the date (e. g. , 4/25/2003) or click the Date browse button (...), navigate to a month and year, click a date, and click OK.

To display all usage tracking transactions, clear any values in the text boxes and click Search.

Once you have queried your usage data, you can export the data displayed in the usage tracking table to a text file of comma-separated values. You can then compile that data in another program, such as Excel, to create customized usage reports for your organization.

To export usage data to a file, click Export. By default, the file is saved to the following location on the delivery server : West km installation folder\Reports\UsageReportFile. txt (e. g. , C: \Program Files\Westkm\Reports\UsageReportFile. txt).

To change the location of the exported file, open the Web. config file (default location of C: \Program Files\Westkm) in Notepad, change the path and file name of the value setting for the UsageReportFile property, and save the configuration file.

(See"Setting Properties in Configuration Files"on page 89.) <add key="UsageReportFile"value="C : \Program Files\Westkm\Reports\UsageReportFile. txt"/> If you would like assistance extracting your organization's usage data and compiling it in one or more customized reports, call your West km representative at 1-888-877- 6529 (option 8).

88 Chapter 5: Tracking Program Activity 147 z Setting Properties in Configuration Files 6.1 Setting Properties in a Distributed Architecture 90 6.2 Changing Your West km Images 92 6.3 Changing the Display of Your Citing Documents 92 6.4 Configuring Document Counts in the KeySearch Hierarchy 94 West km has several configuration files whose properties control communication among the various West km components. You can access and change settings in these configuration files.

Configuration File Location and File Name1 Associated Server, Associated Service Indexing West km installation folder\bin\ Indexing Server West km Indexing Service AdaslndexingService. exe. config Indexing Helper West km installation folder\bin\ Indexing Server West km Indexing Helper AdasIndexingHelperService. exe. config Service CaRE West km installation folder\CaRE\etc\ Indexing Server West km CaRE Service; defaults. conf West km CaRE CNC Service West km installation folder\CaRE\etc\ Indexing Server West km CaRE Service ksh. classify. server. conf West km installation folder\CaRE\etc\ Indexing Server West km CaRE CNC Service cnc ksh. conf uS Westhminstallationfolder\ DeliveryServer Noassociatedservice ; Web. config refresh the Web page SearchWestkminstallationfolder\bin\HTMLDocumentWestkmHTMLSea rch HtmISearchService. exe. config Server Service 1. The default location for the West km installation folder is C: \Program Files\Westkm.

See"Appendix D: List of Properties in Configuration Files"on page 121 for a description of the properties in each configuration file.

To open a configuration file and view or change its properties, 1. Open the configuration file you want to view or change in Notepad. If your West km server components are distributed across machines, make sure you open the file on the configuration file's associated server.

2. Make the necessary adjustments to properties in the configuration file.

3. Save the configuration file.

4. Stop and then start the associated West km service for the configuration file you've changed by completing the following steps: a. Go to Start I Programs I Administrative Tools Services. b. Right-click the service and click Stop. c. Right-click the service and click Start.

Note: If you've made changes to the Web. config file, you do not need to restart any service; just refresh the Web page.

6.1 Setting Properties in a Distributed Architecture One dedicated server can be used for all West km server components (excluding your organization's DMS, which should reside on a separate server). Or, components can be distributed among. several servers.

If you have a distributed server configuration and your configuration changes after installation, do the following: On any new servers, run the West km setup program as described in"2.2 Run the West km Setup Program"on page 7, selecting the features you want to install.

On any existing servers whose West km features are affected by the configuration change, go to Start I Settings I Control Panel I Add/Remove Programs, select West km, click Change/Remove, select Modify, and follow the prompts. This process will remove the features you don't select and either install or reinstall the features you do select.

"Make sure the properties shown in the Typical Server Configuration for West km diagram below are adjusted accordingly. When editing these properties, make the changes on the configuration file's associated server.

The property values in the following diagram assume that the delivery server (KMSRV) was installed on D: \Westkm, the indexing server (IDXSRV) was installed on C : \Westkm, and the West km database resides on its own machine (DBSRV). In addition, the controller port values are the defaults. These values may need to change depending on what ports are being used by other processes. See"Appendix C: West km Ports"on page 119 for a complete list of the ports used by West km.

90 Chapter 6: Setting Properties in Configuration Files Typical Server Configuration for West km Web. config (KMSRV) i ! < DMS Irel, l sHTM4òptirJns> B DMe <HTMLConversionOpt'qr) s : , ;.-. ' ; ;'... _... I'='J _ ____ DMS <add key="atles_htmiconvert_template"vaiue=-"d : \westkmtbin\conversion tempiate. htm"/> Da ffb... </HTMLCohveretonOptiohs, < u00003fi z. C U eesu ceooa aoacaoo <app5ettings> West km/IiS Web Server'DMS Server (Delivery Server) !, _ (DMSSRV), si-D, aNase » çónnHr, PrtLawSiDåta-> < aw Data y= rfipnStriiig valtis="tData Sourca='KMSRV' ; West km : fn6af Gataztog--'km ; User : ID--'icmuser' ; Password='kmuser'" ! > West km Database. < : aadkeyMatemptacKcMoeditL. tnva) ue=ttp -<r KeySeat Scart lndex-coriffguraon-,. <. key, 'dexey, ;. Dehvery5brver^ vaiue--"KMSRV" ! >- (DBSRV) <addkey="ButkCoadGontrfllferSeryer". atue="IDXSRV" ! >. _....- dd key-"BuikLoadCcntrdtsort"daiue-8085 ! >. <add key="mdexnglFdBufIdGpntrolierServer"valua= : IDXSRV"J>, i : M mm <addkeyndeg'RiBa) aContm)) eitt'a) ue=D85'-'''.-' 222 <add-kei-indoxinq. PtbfileSlyncControlt6rServer" val6WIDXSRV*/> C ; 3DD ; i ; ; z ujluUUl b C uuuE. ea'qd, dk r-*in===XSRV^/> HTML Document Server (s) Indexing Server <add ker indexm SpcssntoRerPorP valuë", 8085wB (HTMLSRV) (IDXSRV)... </appSetb.,,., Atlas lndexingservice. exe. config (IDXSRV) At) as) ndexingService. exe. config (tDXSRV), : :- <appseftings> ... AtIaslndexingHelperService. exe. config (IDXSRV) < !-BulkLoadController->-"B add key="BulkLoadControllerServer'value="IDXSRV'V-HTMLCdnvemionO pflons>,' add key="BulkLoadControtlerPorE value="8085"/>.,', <add key-tatiats btmlco'r, Xert tbrnpiawl'Yålue="c. \westkm\binXconversion_templatethtmnP < !- Indexing-> c/HTMICoriyersionOptians ; . <add key--"indexing. FUBuildContrallerServer"valu <add key="indexing F6BuildControllerPort"value=-"8085^i>'<appSettings> <add key="indexing ProfileSyncControllerServer"vatiue=^lDXSRV" (> :.. -., aaddkey="indexin9-proiilesynccontiollerpori vatue--8085",/> ädqWër-inXeper ; iiërPori, >valué=28086-l> <add key="indexe gtndexingHe ! perControllerPOrt". ialue="8086 ! > <add key="indexer_HtmlSearchContro ! ierPott" vatue-'8087" ! > <lapp5eifings> ' <add key add key="care_Server"value="IDXSRV"I> <)-KeySearch Scan Index configuration->.- :. HtmISearchService. exe. config (HTMLSRV) <I-DataBase to connect to for ProLaw Data add key="DbConnectionString"value=-"Data Source=DBSF2V' _ ; ° cappSettmgs Initiai Catalog='km' ; UserlD='kmuser ; Password='kmuse t>, add ke--. md > y-="exer_Htm (SearchControt [erPort" vaiue 8087"f..- </appSettings> 6.1 Setting Properties in a Distributed Architecture 6.2 Changing Your West km Images In westlaw. com, your organization's documents are identified to members with images unique to your organization. These images are saved in the images subfolder in the installation folder on the delivery server (e. g. , C: \Program Files\Westkm\images) and can be changed to alternate. gif or. jpg images.

The images are as follows: Image Description Required Dimensions Default File Name Property Name in Web. config Your organization's documents 65 (w) x 49 (h) pixels firmbrandinglogo. gif adasimageFitm on westlaw. com. 90 (w) x. 68 (h) inches Ut Smylle uS Westlaw document headers 65 (w) x 43 (h) pixels firmsplat. gif atias_ada_xml_FirmSplat . 90 (w) x. 60 (h) inches mix Westlaw Information Tabs 140 (w) x 16 (h) pixels firmdoclistsplat. gif atlas_adal FirmDocListSplat 1. 94 (w) x. 22 (h) inches The West km page 350 (w) x 30 (h) pixels firmmoreinfologo. gif adasimage_FirmMoreInformation Stevens, Smythe & Jones 4. 86 (w) x. 42 (h) inches To change the images, you can either (1) replace the existing images with new. gif images with the same name, or (2) place new. gif or. jpg images (with new names) in the images subfolder and change the image property values in the Web. config file to point to the new file names.

To change the image property values, open the Web. config file (default location of C : \Program Files\Westkm\Web. config) in Notepad, change the value settings for the image properties as necessary, and save the configuration file. The new images appear in West km immediately.

Note: The name of your organization is also displayed in westlaw. com on your organization's subtabs. If you want to change your organization's name on these subtabs, call West km Technical Support at 1-888-877-6529 (option 8).

6.3 Changing the Display of Your Citing Documents You can select the way that your organization's citing documents are sorted in westlaw. com: (1) in reverse chronological order, based on the date the document was last modified, or (2) by their depth of treatment, and then in reverse chronological order. By default, documents are sorted by their depth of treatment.

For the depth of treatment option, KeyCite depth of treatment stars are used to indicate the extent to which each of your organization's documents discusses a displayed Westlaw document. The designation is based on the number of times your 92 Chapter 6: Setting Properties in Configuration Files organization's document cites the displayed Westlaw document. The default settings for each depth of treatment category are as follows: Symbol Default Definition Default Range **** Examined Your organization's document cites the displayed Westlaw document 10 or more times.

*** Discussed Your organization's document cites the displayed Westlaw document 6-9 times.

** Cited Your organization's document cites the displayed Westlaw document 2-5 times.

* Mentioned Your organization's document cites the displayed Westlaw document 1 time.

To change these display options, open the Web. config file (default location of C : \Program Files\Westkm\Web. config) in Notepad, change the value settings for the display properties as necessary, and save the configuration file.

The property that determines the sort order is as follows, where a value of true sorts by depth of treatment and a value of false sorts reverse chronologically: Depth Star settings--> <add key="atlas use depth stars"'value="true"/> The properties for the depth of treatment stars are as follows: <add key="atlas4starscaption"value="Examined"/> <add key="atlas4starsmax"value="2147483647"/> < !-- Int32 Max value--> <add key="atlas4starsmin"value="10"/> <add key="atlas3starscaption"value="Discussed"/> <add key="atlas3starsmax"value=", 9"/> <add key="atlas3starsmin"value="6"/> <add key="atlas_2stars_caption" value="Cited" /> <add key="atlas_2stars_max" value="5" /> <add key="atlas_2stars_min" value="2" /> <add key="atlas_1stars_caption" value="Mentioned" /> <add key="atlas_1stars_max" value="1" /> <add key="atlas_lstars_min"value="O"/> Change the caption values if you want to change the definitions of the depth of treatment categories. Change the min and max values to indicate the range of times your organization's document must cite the displayed Westlaw document in order to belong to a particular depth of treatment category.

6.3 Changing the Display of Your Citing Documents 6.4 Configuring Document Counts in the KeySearch Hierarchy You can select whether numbers are displayed after topics in the KeySearch hierarchy that indicate the number of unique documents at your organization that have been assigned to that topic via manual classification or West's classification and routing engine (CaRE). N y, ; t Stevens, Siiiytlie aiicl Jones z (, t t ndmnktrat vo aw (sss) ilalLh (azz) r Eahaustion, OPOn Moefinns. Primarv Hosnitals. Mental Heelth. N _ 7urisdiction Hom , os 9aR8 zt n inirdgration Layi (18) Fedora) AM. Pest Contm)..'SstMMbs. tstbm. Dmortatmnand ( i.)"t' : . 3 Vetarinanans Removal. Waturalizatson, Ex , Bt f ! I'EG (mBBts ! lttSl9arus Peonles (a6 Dornastic Rolations Gamhli t i i r Casins, Trca4es n & Attomote PRte f) em) « Men (APR) (121) atlnafSBtBie) Binkruptey iniirance, . ectirities Law Bad Faith, Liabilitv Coverao 4ehicla_s, Jnsurance Geroras i. iS i T S E ^=>r, » fg These document counts are configurable for end users viewing the KeySearch hierarchy in westlaw. com and in the West km pages, as well as for information managers in the KeySearch administrative view. The following options are available: Automatically display document counts Enable document counts with a Get Doc Counts link in the left frame of the KeySearch hierarchy Disable document counts The Get Doc Counts link option is set by default for all views of the KeySearch hierarchy. When clicked, this link displays document counts for the topics on the current page of the KeySearch hierarchy.

Note: West km gets document counts from the West km database in real time, so the numbers can change if Get Doc Counts is clicked multiple times from the same location in the KeySearch hierarchy. This action is not recommended, however, because of the database resources that are required.

To configure document counts, open the Web. config file (default location of C: \Program Files\Westkm\Web. config) in Notepad, adjust the value settings for the document count properties as necessary, and save the configuration file.

94 Chapter 6: Setting Properties in Configuration Files The document count properties are as follows. The properties in each column correspond to a particular view of the KeySearch hierarchy: Properties for westlaw. com and Properties for the KeySearch administrative view Name the West km pages (for end users) (for information managers) Display adasksshowdoccountsinwesdaw adasksshowdoccountsinadmintool Link adasksshowgetdoccountlinkinwesdaw adasksshowgetdoccountIinkinadnuntoo ! To automatically display document counts, set a value of true for the Display property for the view you want to adjust. (The corresponding Link property is then set automatically to false.) To enable document counts with a Get Doc Counts link in the left frame, set a value of false for the Display property and a value of true for the Link property for the view you want to adjust.

To disable document counts, set a value of false for both the Display and Link properties for the view you want to adjust.

6.4 Configuring Document Counts in the KeySearch Hierarchy - Backing Up and Removing the West km <BR> <BR> Ap plication<BR> <BR> <BR> <BR> <BR> <BR> <BR> <BR> Ap 7.1 Backing Up West km 97 7.2 Removing the West km Application 97 ri 7.3 Removing West km Databases 99 7.4 Removing the Web Share Virtual Directory 100 7.1 Backing UP West km As a standard precaution, you should regularly back up the following West km components: # West km database 5 West km RID database West km installation folder and all subfolders Documents in HTML storage locations 7. 2 Removing the West km Application To remove the West km application, complete the following steps on each West km server component: 1. Go to Start I Settings I Control Panel I Add/Remove Programs.

2. If you installed Simple CaRE Driver, select it, click Remove, and click Yes.

3. Select West km 2.0 and click Change/Remove.

4. At the InstallShield Wizard, select Remove and click Next. : welcowe . s :, Modfv, ropei, a rcve Ihe progam 4dtia'tilVasiKMSntaD'#itycumaiie ent tttdm. C ! Eaf a . 1 ;' Lfod :', 4. ' ;' : <e'e ! ! f "sew 0 Lß} S K rkCBh (t ',.

S. At the Confirm Uninstall dialog box, click OK. + ". 'i"" 6. At the Stop IIS Services dialog box, click Yes. f f, p ~ i'tW - ! k'1,'^' SSS. JiE x., . 3-EtkF, 'tltd 7. At the Maintenance Complete dialog box, click Finish. Naintenarca Capbtv lShildW2iYd hu frisid pedalt msisaw apcetnm m Wed km - If NextPage NXT 3 software was installed as part of the West km installation, it will be removed with West km.

98 Chapter 7: Backing Up and Removing the West km Application Other additional third-party software that was installed as part of the West km server installation (i. e. , Microsoft. NET Framework, Sun Java Runtime Environment 1.3. 1) is not removed with West km. If you wish to remove this software, do so separately via Add/Remove Programs in the Control Panel.

In addition, the Westkm folder will not be removed and will contain iManage. dll files and West km log files. The config_backup subfolder will contain backup copies of West km configuration files.

7. 3 Removing West km Databases To remove the West km database and West km RID database, complete the following steps on the server containing the databases: 1. Go to Start I Programs I Microsoft SQL Server Enterprise Manager.

2. In the SQL Server Enterprise Manager window, expand the navigation tree in the left frame to display the databases for the server containing the databases. aOwMateRoot3 5 X.-9. A e SQL S- DeAb- modes CmmhRcot ; t fnsdb I 4 I Y -O bD ! - nodi mb . NSh*d u 9AV. t Svk. E @ M_ 1i} 3 RllokV i so, E s 94pi5a' E F13M*dD*, t Mta a1_.. a : 3. Right-click km in the Databases folder and click Delete.

4. Right-click kmRID in the Databases folder and click Delete.

5. In the navigation tree, expand the Security folder under the server name and click Logins.

7.3 Removing West km Databases NMI ZiCa. *R. t tjConsdoRrlot X 3* ITSJ E-SCZL S-gs=Tww-ie. *- Whd-G P. & . A SSQLS « vorGrolp t 1fiEGMEV4*tratrr Pt rrxtor . ''_5 _ . 1..' : S GroLq) EG-B4VATkistratm W"KUW PMA astff NT) RlkdTi St. dd P. * 1. Stdd P. IA 1. w rub a1 e N~hd. 1 F p : t b torçdb r" b^ sa Radxd Parti masta f$-mmta MW,- -) Jt fnai) Ep-PLbs Pubs L. l Swor Rrib W RMkUn 5--ty S.-Ri. U*MS- - y Ranoto Savtts - R-. t. 5- &SU*edSefvaM. ; cx° a r, xa''n. x.. i. w"xr nvL7 r = 6. In the right frame, right-click kmadmin and click Delete.

7. In the right frame, right-click kmuser and click Delete.

8. Close the SQL Server Enterprise Manager window.

7.4 Removing the Web Share Virtual Directory To remove the Web share virtual directory for West km, complete the following steps on the delivery server: 1. Go to Start I Programs I Administrative Tools I Internet Services Manager.

2. In the Internet Information Services window, expand the server name in the navigation tree in the left frame, and then expand the Default Web Site item. ! SM-. ; s tt" ', , . , , i w3"" m V. TCP F i0-* YZ wt 'A6C 'a * nSAdnn , D*IA llll ; t4. T WAX lE : N ! U 'Ë rF3'W W NXTAPPMTS l ws l | w Li 2 3. Right-click the km item under Default Web site and click Delete.

4. Right-click the NXT item under Default Web Site and click Delete.

5. Right-click the NXTAPPLETS item under Default Web site and click Delete.

100 Chapter 7: Backing Up and Removing the West km Application Chapter 8 Installing the West km Client Application 8.1 Installing the West km Client at a Desktop 101 8.2 Silently Installing the West km Client over a Network 104 8.3 Modifying or Removing the West km Client 105 The West km client allows members of your organization to embed citation links and KeyCite status flags in their Microsoft Word and Corel WordPerfect documents, providing an instantaneous view of the validity of legal citations in a document.

This client can be installed at the client desktop or over a network using a push installation method such as System Management Server.

8.1 Installing the West km Client at a Desktop To install the West km client at a client desktop, complete the following steps: 1. Close all open applications.

2. Insert the West km CD-ROM 1 (Setup) into your CD-ROM drive.

3. Navigate to the Client folder on the CD-ROM and double-click Westkm client. exe.

4. At the Welcome dialog box, click Next. Welrnne Io Ihe InatdShidd waeod faWest kn » s Tho tntldSti0Wzo d rSt iXtW i tem CE on ym cowa. To cwtim. cick Noi 7 7, t w 5. At the Choose Destination Location dialog box, select the folder where you want the West km client installed: To install to the default destination folder, click Next.

To install to a different destination folder, click Browse, double-click the folder for installation, click OK, and then click Next to continue. ,.. 4#,. g, ; a.... sd.. eaa. §, . saww : wa." Ch.-D. Wb. L-6- Sdstt Sota, owi t ; § 2- ; k. r ; ''ffe^, . i. : r z 6. At the West km Delivery Server Location dialog box, type the name of the delivery server and click Next. : Wed k DeWep Sarvw Leeetien . D Sw-'";-"' v rCd : fL5INFJ... ..,.....,-.- CyMCG., peatk ,.

102 Chapter 8: Installing the West km Client Application 7. At the Wizard Complete dialog box, click Finish.

Note: If you are prompted to restart your computer, either select that option or restart your computer before running your word processor. lShild Wuuld Conpile SdW h. khd htANWtt k. C6. 9-y-w4. t..

8. If a proxy server exists between the client machine and the West km delivery server, add the delivery server's address to the list of proxy server exceptions in Internet Explorer on the client machine. Access the Exceptions list by going to Tools I Internet Options I Connections I LAN Settings I Advanced in Internet Explorer.

8.1. 1 Configuring the West km Client By default, your West km members are prompted to enter a matter ID the first time they add citation links and KeyCite status flags to a word-processing document. In addition, this citation markup is deleted only when the Delete Flags feature is invoked.

After you install the West km client, you have the option to bypass prompts for the matter ID. (Note: If bypassed, a matter ID will not be included in the transactions tracked from the West km client.) « automatically delete citation markup from word-processing documents when save operations are performed.

To adjust these options, change the registry settings for the computer on which the West km client is installed as follows: o KMNoMatterID: Set the registry value to 1 to bypass the matter ID prompt; set the registry value to 0 enable the matter ID prompt.

KMAutoDelete: Set the registry value to 1 to automatically delete citation markup when save operations are performed; set the registry value to 0 disable automatic deletion of citation markup.

8.1 Installing the West km Client at a Desktop 82 Silently Installing the West km Client over a Network To silently install the West km client over a network using a push installation method, complete the following steps: 1. Close Microsoft Word.

2. Insert the West km CD-ROM 1 (Setup) into your CD-ROM drive.

3. Copy the installation files in the Client\Network Setup folder on the CD-ROM to a shared location on your network (e. g. , p: \westkm).

4. Record the silent installation in an InstallShield setup file (. iss): a. Go to Start I Run, type command, and press Enter to access a command prompt. b. Type setup. exe at the shared network location, followed by the-r switch to record the setup and the-fl switch to indicate the full path where the. iss file is to be placed. Then press Enter.

For example: setup. exe-r-fl"p : \westkm\setup. iss" Note: If the-fl switch is not used, then a setup. iss file will be placed in the Windows folder, e. g., C : \Windows or C : \WINNT. c. Follow steps 4-7 under"8.1 Installing the West km Client at a Desktop," selecting the values that you want for the silent installations. d. Type exit and press Enter to close the command prompt window.

5. For the silent installation, call setup. exe at the shared network location and use the. iss file. The-s switch indicates the silent installation and the-fl switch indicates the. iss file to use.

For example: setut,, exe-s-fl"p : \westkm\setup. iss" Note: If Microsoft Word is opened while the installation is in progress, then the installation could fail. If a return value is needed that indicates completion, e. g. , for a batch file, then use start lwait together with the-sms switch when calling setup. exe.

For example: start/wait setup. exe-s-sms-fl"p : \westkm\setup. iss" Note: If a proxy server exists between the client machine and the West km delivery server, you will also need to add the delivery server's address to the list of proxy server exceptions in Internet Explorer on the client machine. Access the Exceptions list by going to Tools I Internet Options I Connections I LAN Settings I Advanced in Internet Explorer.

104 Chapter 8 : Installing the West km Client Application 8.3 Modifying or Removing the-West km Client Complete these steps if you want to change the location of the West km delivery server after the West km client has been installed, or if you want to remove the West km client: 1. Go to Start I Settings I Control Panel I Add/Remove Programs.

2. Select West km Client and click Change/Remove.

3. At the Welcome screen, do one of the following: If you want to remove the West km client, select Remove and click Next.

When you are asked to confirm the deletion, click Yes.

If you want to change, the location of the West km delivery server, select Modify and click Next. Type the name of the delivery server and click Next.

4. Click Finish.

8. 3 Modifying or Removing the West km Client Appendix A Installed West km Databases, Folders, and. dll Files Databases The following databases are installed on the West km database server: km West km database for storing KeyCite and document metadata, data for indexing scheduling, KeySearch data, and CaRE data for assigning documents to KeySearch topics kmRID West km RID database for identifying citations in your organization's documents Folders The following folders are installed in the West km installation folder (e. g., C : \Program Files\Westkm). bin West km server binaries CaRE West's classification and routing engine software Client West km client installation files config_backup Backup copies of West km configuration files upon removal controls ActiveX controls DB West km database SQL scripts Documentation West km documentation FTSearch Files to enable full-text searching, including NextPage NXT 3 images Web application images lib RID Java libraries Logs West km trace logs ProLawlO. Custom Code for knowledge management feature reports Usage report log Scan Used to create and hold the Scan full-text searching file Scripts Web application scripts Stylesheets Web application stylesheets Xml XML data templates Registered. dll Files The following. dll files are registered during installation: West km installation folder\bin\PLIndexingCOM. dll West km installation folder\bin\CiteFinder. dll West km installation folder\bin\PwdCrypt. dll C: \WINNT\system32\msxml3.dll C: \WINNT\system32\msxml3a.dll C: \WINNT\system32\msxml3r. dll 108 Appendix Appendix B More about the West km Automated Setup For your information and troubleshooting purposes, this appendix contains the manual steps behind some of the automated setup processes in West km.

Installation and Update of NextPage NXT 3 Software If you want to use the full-text indexing and searching capabilities of West km, install and configure NextPage NXT 3 version 3.4 software (provided with the purchase of West km) on each of the following West km server components that resides on a separate machine: a delivery server HTML document servers Installing NextPage NXT 3 Software 1. Close all open applications.

2. Insert the West km CD-ROM 1 (Setup) into your CD-ROM drive and navigate to the Program Files/Westkm/Temp/NXT folder.

3. Double-click Setup. exe.

4. At the installation page, click INSTALL NXT3.

5. At the Welcome dialog box, click Next. Ckk to S' cor vaLkWt. q3onkmurrarr.. 'NN'''**'**''**''**'''".'"'''' Aerareaamg i5edpsan b* t6 iq OF. TMwt eatfi » wtNH&uRaan, ; ;'-- s b i, EX, $ ;, +., o , Ytr6Drolaiteiheslskt (bM. , 6. At the Software License Agreement dialog box, click Yes. ! vow" + , e f , çG M_ in ; e ! etw . osp'A a ioywt . 4't, a, cvsii uEt'ole : ;. usxdaryktohar meard'.. .,, ;, .. rJtQamS#sa » Ag. Eadde0. 4M.. . uxtak#iltetetGUPtbetrorItpltto $tar : r" : 4 7. At the User Information dialog box, enter your name, your company, and the NXT 3 serial number and click Next. (You will receive the NXT 3 serial number from West km Technical Support, available at 1-888-877-6529, option 8.) ..... ...... 'o ..,.. L _..,, ;... iu£.. ;., tia ! >.. :... : :. : 110 Appendix 8. At the Choose Destination Location dialog box, select C: \Program Files\Westkm\FTSearch\Nextpage for the installation folder and click Next. tit G++2 a. < .., rtacs. ; C f" F 9. At the Select Components dialog box, clear the Documentation and Sample Files check boxes, so that only Server Files and Language Templates are selected.

Then click Next. - 3.., 7 r Ss e S « vs. W Zx e V Eu a D ' riti e , =< : = S, Q°es4 f9C. K'..,, 10. At the Select Program Folder dialog box, accept the default program folder and click Next. Mkm. ASQLS bzw ,.'p, dr ; ntretrveTmh i M'r indlSQLSemr S :'MiaoudtS4L5erva X .' Slainp. C$ad : lla4>w.

More about the West km Automated Setup 11. At the Enter Admin Password dialog box, type the password of your full-text searching (FTS) administrator account in the Password and Confirm text boxes.

You will receive the password from West km Technical Support (available at 1- 888-877-6529, option 8). K n 4 12. At the Setup Complete dialog box, click Finish. If you are prompted to restart your computer, do not do so. I- v i, ;.. X e 5 f e-&,'$. C f i y d Ya Updating NextPage NXT 3 Software 1. On the West km CD-ROM 1 (Setup), navigate to the Program Files/Westkm/ Temp/NXTSP3 folder, double-click setup. exe to open the InstallShield wizard for installing NXT 3.4 service pack 3, and complete the following steps: 112 Appendix a. At the Welcome screen, click-Next. x Wekone to Uw ImtaiShicld Ward fa NXT 3. 1 SP3- The Imla6NddVlcad wi imd tCLf 3. 1 SP 3 anyw mnWa. Tocadnrs. dckNaA. G. s r'§ b. At the License Agreement screen, click Yes. LiunuAmt. Pb lad ího IdoZXl asidp ,, r - £ r t t sdrf ! tw a (ntaitV SP, 7>St . c. At the Backup Path screen, type the path where you want to back up existing NXT 3 files and click Next. om*up Path tnO* ! Æ . Kdt . dW> ^, CM : d _ More about the West km Automated Setup d. At the Start Copying Files screen, click Next. u. Pais e odo e « « ng rt \ X 7s M_m. irP. yCtivms k !'t2tckk atsde t, _C. b'BailSV4t&dNda,'r st. t Cpyi ra" ; ', o tes KS ! M r, >et ! SIda... e. At the Wizard Complete screen, clear the Show the readme file check box and click Finish. 'nazi ImtalShidd Wrsrd CwpIaW SetuphasfiidndiWaiglDff 3. lSP3myvuwnputd. r f 2. On the West km CD-ROM 1 (Setup), navigate to the Program Files/Westkm/ Temp/NXTSP4 folder, double-click setup. exe to open the InstallShield wizard for installing NXT 3.4 service pack 4, and complete the same steps as for service pack 3.

3. Go to Programs I Administrative Tools I Services.

4. In the Services window, right-click World Wide Web Publishing Service in the right frame and click Stop.

114 Appendix 5. Go to Start I Run, type the command regsvr32-u External COMSupport. dll at the C: \Program Files\Westkm\FTSearch\Nextpage\bin folder, press Enter, and click OK. x t Djs' w32-u : mWW*wt gsT WW t'' ! C ! mWcf=TS <'' ; : SE) }' 6. Go to Start I Run, type the command regsvr32-u COMServices. dll at the C:\Program Files\Westkm\FTSearch\Nextpage\bin folder, press Enter, and click OK.

7. Copy all of the files from the Program Files/Westkm/Temp/NXTHotFix folder on the West km CD-ROM to the C : \Program Files\Westkm\FTSearch\Nextpage\bin folder on the server. Overwrite the existing files.

8. Go to Start I Run, type the command regsvr32 External COMSupport. dll at the C:\Program Files\Westkm\FTSearch\Nextpage\bin folder, press Enter, and click OK. - ) , mrostwuanlrsoera, woa : < 9. Go to Start I Run, type the command regsvr32 COMServices. dll at the at the C: \Program Files\Westkm\FTSearch\Nextpage\bin folder, press Enter, and click OK.

10. In the Services window, right-click World Wide Web Publishing Service in the right frame and click Start.

11. Close the Services window.

More about the West km Automated Setup Creation of the NextPage NXT 3 Content Service The West km full-text indexing process completes the following steps to define the HTML documents that will be indexed by NextPage NXT 3 for full-text searching.

1. Go to Start I Programs I NextPage I NXT 3 I Content Network Manager.

2. At the Server Connection dialog box, type the name and password of your NextPage administrator account in the User name and Password text boxes and click OK. (By default, the user name of the NextPage administrator account is Administrator.) S 7777777 w : 3= IST »,- 1., ; l DS toe 4 3. In the Content Network Manager window, right-click NXT in the navigation tree and click New I Folder.

4. In the Add Folder dialog box, type Westkm in the Name, Title, and ID text boxes and click OK. W o , 4 : r 5. In the Content Network Manager window, click the Apply All Changes button @ 6. In the navigation frame, expand the NXT item, right-click the Westkm folder, and click New I Content Service.

116 Appendix 7. In the Add Content Service dialog box, do the following: a. Verify that File System Service is selected from the Type drop-down list. b. Type HTMLStore in the Name, ID, and Title text boxes. c. Type the following value in the Index Sheets text box, adjusting the path if West km was not installed to C: \Program Files\Westkm : text/html=C: \Program Files\Westkm/FTSearch/IndexSheets/ HTML. xil; metadata=C: \Program Files\Westkm/FTSearch/IndexSheets/ Metadata. xil d. Click OK. HTKSbDr sot j"""rne . y. p rv t ! " ;. ;, e ç""||""""S wqomm" DfA z, 'V wS, rs , S. M, reT"StE fi ?.

8. At the Wizard Welcome screen for File System Service, click Next.

9. At the File System Service screen, do the following: a. Type the path for the HTML document location (e. g., CAHTMLStore) in the Root path text box.

Important: Do not use the Browse button to navigate to the path. b. Type the same path in the Metadata path text box.

Important : Do not use the Browse button to navigate to the path. c. Type the following value in the text box to the right of the « Add button, and then click « Add: . css ;. gif ;. xsd ;. js ;. xsl ;. vsd ;. jpeg ;. jpg ;. rdf ;. nxt % FlkrBpsFewBardte ; v : atS ; * lcmo. o'"a , ; fg fef [C : r/re'S < 0. t : : * > E 0 ! He : :. » g ff. i ',, xN. v°° 6. av. ws>a' : a', ; :". i, ; _ . nec . va' . % Sd. _1c..., d. Click Next.

More about the West km Automated Setup 10. At the Build Schedule screen, clear the Build content service immediately check box, verify that Do not schedule builds of this content service is selected, and click Next. x 9d : e4shdnoaawkFula » tEntnectdereSeAS' : ° f'uttaticd. btl «. attks, '. -CMMMMjM'tteli. i*"" :'''*-.'. '' ; t'Aatd4a'd_ r sqt¢ FGI it713 #. 4. (fS. Pti , won"" r '. b& : 11. At the Wizard Completed screen, click Finish.

12. In the Content Network Manager window, click the Apply All Changes button @ 13. Close the Content Network Manager window.

Removal of NextPage NXT 3 Software The West km setup program automatically installs NextPage NXT 3 for full-text indexing and searching. You can remove this software-for instance, if a problem occurs with the automatic installation and you want to remove and then manually install NextPage NXT 3.

To remove NextPage NXT 3, go to Start I Settings I Control Panel I Add/Remove Programs and then select and remove the following in the order listed: West km Full-Text Indexing Service Pack 4 a West km Full-Text Indexing Service Pack 3 x West km Full-Text Indexing 118 Appendix 1 West km Ports The ports used by West km are listed below. Port settings may need to be adjusted in West km configuration files if a conflict exists with another service already using that port or if a firewall between West km server components blocks ports.

Microsoft SQL Server SQL Server's default port is 1433.

West km Delivery Server-)) S Configuration File <add key="PLDmsServicePort"value="5364"/> <add key="BulkLoadControllerPort"value="8085"/> <add key="indexing_FtiBuildControllerPort"value="8085"/> <add key="indexing_ProfileSyncControllerPort" value="8085"/> <add key="ProLawTaskCompilerPort"value="5364"/> West km Indexing Server-indexing Configuration File <BR> <BR> <BR> <add key="PLDmsServicePort"value="5364"/><BR> <BR> <BR> <BR> <BR> <BR> <BR> <add key="indexing_FtiBuildControllerPort"value="8085"/><BR > <BR> <BR> <BR> <BR> <BR> <add key="BulkLoadControllerPort"value="8085"/><BR> <BR> <BR> <BR> <BR> <BR> <BR> <add key="indexing_ProfileSyncControllerPort"value="8085"/> <add key="indexer_HtmlSearchControllerPort" value="8087" /> <add key="indexer_IndexingHelperControllerPort" value="8086" /> <add key="care_Port"value="11116"/> West km Indexing Server-indexing Helper Configuration File <add key="indexer_IndexingHelperControllerPort"value="8086"/> West km HTML Document Server-Search Configuration File <add key="indexer HtmlSearchControllerPort"value="8087"/> List of Properties in Configuration Files atlasIndexingService. exe. config 121 AtlasIndexingHelperService. exe. config 131 HtmISearchService. exe. config 132 Web. config 132 defaults. config 146 ksh. classify. server. conf 146 cncksh. conf 147 Following is a description of the properties in each configuration file.

Indexing Configuration File : AtlaslndexingService. exe. config Property Name Allowable Range Description PLTRACE_OFF Preassigned integer values. Tracing levels. One or more tracing levels PLTRACE_INFO Do not modify. can be enabled by setting the value for<BR> <BR> PLTRACE_WARNING ProLawTraceSwitch.<BR> <BR> <BR> <P> PLTRACE_ERROR ATLASTRACE_HIGHLEVEL ATLASTRACE_LOWLEVEL PLTRACE ALL DEFAULTJURIS State code. RID processing options. These will be GET_KC_FLAGS True/False. specific to an organization, based on APOS_AS_SECTION True/False. document content and indexing DOC_YEAR True/False. requirements for the organization.

DOC TYPE True/False.

Indexing Configuration File : AtiasindexingService. exe. config (Continued) Property Name Allowable Range Description ProLawSwitch 0 to disable tracing. Sets tracing levels for the service.

2147483647 to enable all Tracing levels are defined in the tracing levels. WestGroup. ProLaw. Diagnostics. ProLawT Custom combination of raceLevel config section. trace level values. Add together trace level values to enable multiple trace levels.

ProLawTraceLog Local filename path. Set the initializeData attribute to the local filename path where tracing information for the service will be written.

IManageMaxRowsForSearch Integer value. Maximum number of records to return for an iManage saved search.

IManageSessionTimeout Integer value in seconds. Session time-out value for iManage connection.

IManageVersion 1.0, 1.0. 0.142, 2.0 IManage API version.

DmsUserIdsRequired Y/N. Controls usage of iManage virtual user DmsUserPasswordsRequired accounts and passwords for authenticating members. If set to Y, iManage security will determine document access rights. If set to N, internal security logic is used to determine document access rights.

IManageUseTrustedLogin Y/N. Controls login method for the iManage DMS server. Trusted login uses NT login; otherwise iManage-defined login required.

IManageUseCombinedClientMatter Y/N. Controls if matter ID and client ID from DMS should be combined in ProLaw database.

IManageAttrMappingTitle String. Indicates how to map iManage document IManageAttrMappingAbstract profile custom profile attributes to IManageAttrMappingClass associated ProLaw document profile IManageAttrMappingMatter attributes.

IManageAttrMappingMatterDescription IManageAttrMappingClient IManageAttrMappingClientDescription IManageAttrMappingAuthor PrefetchDocsProfiles True/False. Reserved for future performance Do not modify. enhancement when retrieving documents from DMS.

PCDocsSecurityLumpSize Integer value. SQL statement group size parameter used Recommended range when retrieving security attributes for is 75-250. documents.

PCDocsSecurityCacheGroups True/False. Controls checking group permissions for user on per-process basis.

PCDocsUseClientMatterMetaData True/False. Indicates whether client matter metadata is used in the DMS database.

122 Appendix Indexing Configuration File : AtlaslndexingService. exe. config (Continued) Property Name Allowable Range Description PCDocsUseCombinedClientMatter True/False. Controls if matter ID and client ID from DMS should be combined in ProLaw database.

PCDocsUseSubversions True/False. Controls use of subversions for documents.

PCDocsUseMatterCustomSql True/False. Controls whether custom SQL is used to retrieve client matter metadata instead of default legal profile.

PCDocsMatterCustomSql SQL statement. SQL query used to retrieve matter ID and The following aliases must client ID from custom profile. be used: Contact West km Technical Support for matterid SQL statement requirements. matter name client client name PCDocsQuickSearchSqlTimeout Integer value in seconds. Maximum amount of time to wait for PCDocs-related SQL queries to complete. If the time-out period is exceeded, an exception is generated and the document is not indexed.

PLClientMatterSeperator"-" (hyphen). Separator character to be used when Do not modify. creating combined client ID and matter ID attribute in ProLaw document profile.

FusionUselndividualLogins True/False. Control if Load Copy should use individual login (entered in Professionals page) or administrative level account.

Can only be set to True in web. config.

FusionGetQuickSearchFonnName String. Name of form used to retrieve the list of Do not modify. quicksearches from the Fusion server.

FusionGetVersionlnfoFormName String. Name of form used to retrieve version Do not modify. information from the Fusion server.

FusionUseSubversions True/False. Controls use of sub-versions for documents.

Important: Changing this setting requires re-indexing.

FusionUseDbFormsToRunQuickSearch True/False. Controls if database forms are used to run quicksearches.

This should only be set to True if Fusion server was upgraded or if customized forms are being used.

FusionNonDbRunQuickSearchFormName String. Name of form used to run a quicksearch.

This is an external form, not a database form.

This property is ignored if FusionUseDbFormsToRunQuickSearches is set to False.

FusionDefaultProfileSearchFormName String. Name of form used to retrieve the default Do not modify. profile metadata from the Fusion server.

List of Properties in Configuration Files Indexing Configuration File : AtlaslndexingService. exe. config (Continued) Property Name Allowable Range Description FusionUseClientMatterMetaData True/False. Controls loading of client and matter metadata. If set to False, other client/matter related properties are ignored.

FusionUseCombinedClientMatter True/False. Controls whether matter ID and client ID from DMS are combined in ProLaw database.

This property is ignored if FusionUseClientMatterMetaData is set to False.

FusionClientMatterSearchFormName String. Name of the form used to retrieve client/ matter metadata.

If the default legal profile is being used, do not modify this property.

If a custom profile is being used, specify a custom external form name.

The following properties related to form field names must be unique; FusionClientldFormFieldName<BR> <BR> <BR> FusionMatterldFormFieldName<BR> <BR> <BR> FusionClientNameFormFieldName<BR> <BR> <BR> FusionMatterNameFonnFieldName This property is ignored if FusionUseClientMatterMetaData is set to False.

FusionIgnoreMissingCustomMetaData True/False. For debugging purposes only.

Do not modify. Leave set to False unless debugging.

FusionClientldFormFieldName String. Name of field in custom form, specified in FusionClientMatterSearchFormName, to use as the client ID.

This property can be optionally set if the client ID is contained in the matter ID.

If the default legal profile is being used, do not modify this property.

This property is ignored if FusionUseClientMatterMetaData is set to False.

FusionMatterIdFormFieldName String. Name of field in custom form, specified in FusionClientMatterSearchFormName, to use as the matter ID.

This property must be set and may contain the client ID.

If the default legal profile is being used, do not modify this property.

This property is ignored if FusionUseClientMatterMetaData is set to False.

124 Appendix Indexing Configuration File : AtlaslndexingService. exe. config (Continued) Property Name Allowable Range Description FusionClientNameFormFieldName String. Name of field in custom form, specified in FusionClientMatterSearchFormName, to use as the client name.

If the default legal profile is being used, do not modify this property.

This property is ignored if FusionUseClientMatterMetaData is set to False.

FusionMatterNameFormFieldName String. Name of field in custom form, specified in FusionClientMatterSearchFormName, to use as the matter name.

If the default legal profile is being used, do not modify this property.

This property is ignored if FusionUseClientMatterMetaData is set to False.

FusionSecurityLumpSize Integer value. SQL statement group size parameter used Recommended range when retrieving security attributes for is 75-250. documents.

FusionSecurityCacheGroups True/False. Controls checking group permissions for user on per-process basis. indexer_CreateControllerFlag 0/1. Controls starting bulk load controller. This controller is responsible for preparing newly added document collections to be recognized by the load poller for indexing.

If running indexing across multiple servers in a distributed processing environment, enable this option on a single server. indexer_CreateDaemonFlag 0/1. Controls starting the indexing daemon.

This daemon is responsible for preparing existing document collections to be recognized by the load poller for re- indexing.

If running indexing across multiple servers in a distributed processing environment, enable this option on a single server. indexer_CreateFtiBuildDaemonFlag 0/1. Controls starting the full-text indexing build daemon. This daemon is responsible for preparing newly added NextPage control services for full-text indexing.

If running indexing across multiple servers in a distributed processing environment, enable this option on a single server.

List of Properties in Configuration Files Indexing Configuration File : AtlaslndexingService. exe. config (Continued) Property Name Allowable Range Description ind « er_CreateDocSyncDaemonFlag Ot1. Controls starting the document synchronization daemon. This daemon is responsible for preparing existing document collections to be synchronized with indexing information in the km database.

If running indexing across multiple servers in a distributed processing environment, enable this option on a single server. indexer_CreateBulkLoadPurgeDaemonFlag 0/1. Controls starting the bulk load purge daemon. This daemon is responsible for removing expired bulk load and saved search schedule items in the West km database. The expiration period is 30 days and is not currently modifiable.

If running indexing across multiple servers in a distributed processing environment, enable this option on a single server. indexerCheckFtiBuildFreqSeconds Integer value in seconds. How often to check if a full-text indexing build needs to be started. indexer_FtiBuildMaxSecondsSameDoc Integer value in seconds. Amount of time to wait for NextPage to Progress process a document for full-text indexing. If time-out period is exceeded, the full-text indexing build is aborted. NextPage will continue to attempt to re-index the document. indexer_FtiBuildThreadSleepIntervalSeconds Integer value in seconds. How often the full-text indexing daemon checks for documents ready to be indexed. indexer_NextPageSearchFolder String. Root folder name for NextPage content Do not modify. services.

Defaults to"Westkm." indexerNextPageExcludeList List of file extensions File extensions of files to ignore when separated by semicolons. building the full-text index for a content service. nextpageindexsheets List of file paths of Files containing templates for building full- NextPage index sheets. text indexes. nextpagehtmlstoreindexsheets List of file paths of Files containing templates for building full- NextPage index sheets. text indexes.

The @PO parameter is populated by the administrative interface when a new HTML storage location is added. indexerpelegatedReprocessThresholdMinutes Integer value in minutes. Amount of time to wait before attempting to index delegated documents when the indexing service is manually stopped, unexpectedly stopped, or crashes. indexer_ErrorReprocessThresholdMinutes Integer value in minutes. Amount of time to wait before attempting to re-index documents that errored due to a RID failure or a general failure.

126 Appendix Indexing Configuration File : AtlaslndexingService. exe. config (Continued) Property Name Allowable Range Description indexer_PollFrequencySeconds Integer value in seconds. The amount of time for the LoadPoller to wait before checking if there is more indexing processes to be delegated. indexer_MaxWorkerThreads Integer value. The maximum number of threads used by the indexer. This number should never be greater than the indexer_ProxyMax property in AtlasIndexingHelperService. exe. config. indexerDocumentBatchSize Integer value. Number of documents to be indexed that are assigned to a single process thread.

This number is highly dependent on amount of system memory and number of CPUs. indexerDaemonInterva ! Seconds Integer value in seconds. How often the indexing daemon checks for documents ready to be re-indexed. indexer_BulkLoadRecoveryTimeSpanMinutes Integer value in minutes. Amount of time to wait before attempting to index"stranded"documents loaded by the bulk load controller.

Stranded bulk load documents have not been scheduled for indexing yet, due to the indexing service either unexpectedly stopping or crashing. indexer_MaxDocProcessingTimeInSeconds Integer value in seconds. Maximum time to wait for indexing of a document to be completed. If time-out period is exceeded, document is marked as corrupt and no attempt is made to re-index the document. indexer_MaxRIDProcessingTimeInSeconds Integer value in seconds. Maximum amount of time to wait for RID processing to complete. If the time-out period is exceeded, the document is marked as bad and no attempt is made to re-index the document. indexer_MaxDocRetryTimesFromService Integer value. Maximum number of attempts at indexing Crashing a document that has errors unrelated to indexing service stopping or crashing. indexer_MaxStardtelperServiceAttempts Integer value. Maximum number of attempts at starting the indexing helper service. indexer_HelperServiceStartTimeoutInMinutes Integer value in minutes. Maximum amount of time to wait for the indexing helper service to start. indexer_HeIperServiceStopTimeoutInMinutes Integer value in minutes. Maximum amount of time to wait for the indexing helper service to stop. indexer_CheckSyncFreqSeconds Integer value in seconds. How often to check if syncing needs to be started. indexer_CheckBulkLoadPurgeSeconds Integer value in seconds. How often to check if bulk load purging needs to be started.

.-data-commands Integer value. Maximum number of data commands to process in one round trip to avoid network errors. Default value is 40. A value of 0 processes all commands.

List of Properties in Configuration Files Indexing Configuration File : AtiasindexingService. exe. config (Continued) Property Name Allowable Range Description atlasindexinghtmltemproot Local path. Location of temporary folder used by indexing process for HTML conversions and related processing. atlasindexing_ridinfoinxmi Y/N. Controls inclusion of RID server diagnostic information in the RID data passed back to the indexing process. atlasindexing_noconvertofhtmlfiles Y/N. Controls whether HTML files should run through HTML conversion process during indexing.

This may be necessary if source HTML documents have a different encoding than target encoding of the West km server. atlas_indexing_types_for_events Integer value. Indicates what DMS types receive event Possible values are: records.

0 = PC Docs Event records are used to determine parent/ 1 = iManage child relationships between documents and 2 = Lotus Notes attachments.

3 = NTFS 4 = ProLaw V9 atlas_indexing_eventdesc String. Event record description. atlas_citetypes_caselawlist List of citation codes. Citation codes representing different types adascitetypessfcaselawlist Do not modify. of legal documents. atlas citetypes_statuteslist<BR> <BR> <BR> adascitetypessfstatutslist<BR> <BR> <BR> adascitetypesshortformlist indexer_DaemonStartTime HH : MM : SS date format. Set start time for indexing daemon.

A start time and end time define the time span during which indexing services will run. indexer_DaemonEndTime HH : MM: SS date format. Set end time for indexing daemon.

A start time and end time define the time span during which indexing services will run. indexer_PollerStartTime HH: MM : SS date format. Set start time for indexing load poller.

A start time and end time define the time span during which indexing services will run. indexerPollerEndTime HH: MM: SS date format. Set end time for indexing load poller.

A start time and end time define the time span during which indexing services will run. indexer FtiBuildDaemonStartTime HH: MM : SS date format. Set start time for full-text indexing build daemon.

A start time and end time define the time span during which full-text indexing builds will run.

128 Appendix Indexing Configuration File : AtlaslndexingService. exe. config (Continued) Property Name Allowable Range Description indexerFtiBuildDaemonEndTime HH: MM: SS date format. Set end time for full-text indexing build daemon.

A start time and end time define the time span during which full-text indexing builds will run. dz indexerDocSyncDaemonStartTime HH : MM : SS date format. Set start time for document syncing daemon.

A start time and end time define the time span during which document syncing will run. indexer_DocSyncDaemonEndTime HH: MM : SS date format. Set end time for document syncing daemon.

A start'time and end time define the time spart during which document syncing will run. indexer_BulkLoadPurgeDaemonStartTime HH: MM: SS date format. Set start time for bulk load purge daemon.

A start time and end time define the time span during which indexing services will run. iindexer_BulkLoadPurgeDaemonEndTime HH: MM: SS date format. Set end time for bulk load purge daemon.

A start time and end time define the time span during which indexing services will run. indexing_FtiBuildControllerServer Name of server. Identifies server where full-text indexing build controller is running. indexing_FtiBuildControllerPort Open port. TCP communications port for full-text indexing build controller on full-text indexing server.

BulkLoadControllerServer Localhost or name of Identifies indexing server. indexing server.

BulkLoadControllerPort Open port. TCP communications port for indexing service on indexing server. indexing_ProfileSyncControllerServer Name of server. Identifies server where profile sync controller is running. indexing_ProfileSyncControllerPort Open port. TCP communications port for full-text indexing server. indexer_HtmlSearchControllerPort Open port. TCP communications port for Html Search Service on HTML document server. indexer_TndexingHelperControllerPort Open port. TCP communications port for indexing helper service. indexer_CareServices String. List of display names for CaRE services. indexer_StartAndStopCareService 0/1. Controls whether the indexing service should start and stop the CaRE service. If set to 0, the CaRE service must be started manually.

List of Properties in Configuration Files Indexing Configuration File : AtlaslndexingService. exe. config (Continued) Property Name Allowable Range Description indexer_StopCareServiceDelayMinutes Integer value in minutes. Amount of time to wait before stopping the CaRE service. This allows the CaRE service time to complete its current process. indexer_MaxStartCareServiceAttempts Integer value. Maximum number of attempts at starting the CaRE service. indexerCareServiceStartTimeoutInMinutes Integer value in minutes. Maximum amount of time to wait for the CaRE service to start. indexerCareServiceStopTimeoutInMinutes Integer value in minutes. Maximum amount of time to wait for the CaRE service to stop. care_Server String. Identifies server where CaRE service is running. care_Port Open port. TCP communications port for CaRE service. care_URI URL. For locating CaRE processes.

Do not modify. @ care_Hostname URL. Network name of server running CaRE Do not modify. CNC process. care_Usemame String. Username for CaRE administrative Do not modify. account. care_Password String. Password for CaRE administrative account.

Do not modify. careNumScores Integer value. Controls the number of scores received from CaRE. indexerDeliveryServer String. Identifies server where the full-text scan index is located. indexer_NextPageScanlndex_NextPageFolder String. NextPage location of the scan index for the KeySearch hierarchy data. indexer_NextPageScanlndex NextPageSenice String. NextPage service name that builds and updates the scan index. The scan index is an index of the KeySearch hierarchy data. indexer_NextPageScanTndex XmlFileDirectory Local path. Location of folder on the delivery server containing KeySearch hierarchy input data for building the scan index. indexer_NextPageScanIndex_XmlFileName Local filename. Name of file containing KeySearch hierarchy input data. indexerNextPageScanIndexIndexDirectory Local path. Location of folder on the delivery server containing the scan index for KeySearch hierarchy data. indexer_NextPageScanIndex_IndexSheetFilePat Local filename. File containing templates for building the h scan index.

DbConnectionString Server name depends on West km database connection string. system configuration; database user and password should not be modified.

130 Appendix Indexing Helper Configuration File : AtlasindexingHelperService. exe. config Property Name Allowable Range Description indexer_ProxyMax Integer value. Number of proxy objects created for HTML converter and KeyCite finder components.

Must be equal or greater than the value for indexerMaxWorkerThreads property specified in AdaslndexingService. exe. config. If not, there will not be enough proxy objects to meet demand of worker threads and indexing errors may result. indexer_lncludeCitationTitlesFlag 0/1. Controls RID processing to include document tides. indexer_IndexingHelperControllerPort Open port. TCP communications port for indexing helper service. atlashtmlconverttemplate Local path. Locations of template file containing HTML conversion options. adasjitmlconvertcharset windowsl22, Character encoding set for HTML utf8. conversion.

INlTIAL_HEAP_SIZE Integer value must be a Java Virtual Machine memory settings.

MAX HEAP_SIZE multiple of 1024 greater These values depend on the size of an than 1MB. Append the organization's documents, the number of letter k or K to indicate citations contained in the documents, and kilobytes, or m or M to the amount of server memory. indicate megabytes. Organizations with typically large documents may want to increase the initial heap size. Organizations with documents containing a high density of citations may want to increase the maximum heap size.

ProLawSwitch 0 to disable tracing. Sets tracing levels for the service.

2147483647 to enable all Tracing levels are defined in the tracing levels. WestGroup. ProLaw. Diagnostics Custom combination of ProLawTraceLevel config section. trace level values. Add together trace level values to enable multiple trace levels.

ProLawTraceLog Local filename path. Set the initializeData attribute to the local filename path where tracing information for the service will be written. atlas_indexing_query_timeout Integer value in seconds. Maximum amount of time to wait for Do not modify, indexing-related SQL queries to complete.

List of Properties in Configuration Files Search Configuration File : HtmiSearchService. exe. config Property Name Allowable Range Description ProLawSwitch 0 to disable tracing. Sets tracing levels for the service.

2147483647 to enable all Tracing levels are defined in the tracing levels. WestGroup. ProLaw. Diagnostics Custom combination of ProLawTraceLevel config section. trace level values. Add together trace level values to enable multiple trace levels.

ProLawTraceLog Local filename path. Set the initializeData attribute to the local filename path where tracing information for the service will be written. indexer_HtmlSearchControllerPort Open port. TCP communications port for the HTML Search Service on the HTML document server.

IIS Configuration File : Web. config Property Name Allowable Range Description PLTRACE_OFF Preassigned integer values. Tracing levels. One or more tracing levels PLTRACE INFO Do not modify. can be enabled by setting the value for PLTRACE_WARNING ProLawTraceSwitch.

PLTRACE_ERROR <BR> <BR> ATLASTRACE_HIGHLEVEL<BR> <BR> <BR> <BR> ATLASTRACE_LOWLEVEL PLTRACE ALL DEFAULTJURIS State code. RID processing options. These will be GET_KC_FLAGS True/False. specific to an organization, based on APOS_AS_SECTION True/False. document content and indexing DOC_YEAR True/False. requirements for the organization.

DOC_TYPE True/False. atlas_htmlconvert_template Local path. Locations of template file containing HTML conversion options. atlas_htmlconvert_charset UTF-8. Only UTF-8 is supported in order to Do not modify, support NextPage full-text indexing. startqueryprogress True/False. Controls bypassing user authentication for Do not modify. progress queries.

<WestkmDisplayOptions> Y/N. Controls display of citation information on title Westlaw pages. If set to Y, information field docno will be hidden. modified_date_time author matter <BR> <BR> matter_desc<BR> <BR> <BR> <BR> dmslibraryname<BR> <BR> <BR> <BR> <BR> <BR> </WestkmDisplayOptions> 132 Appendix 115 Configuration File : Web. config (Continued) Property Name Allowable Range Description ProLawSwitch 0 to disable tracing. Sets tracing levels for the service.

2147483647 to enable all Tracing levels are defined in the tracing levels. WestGroup. ProLaw. Diagnostics Custom combination of. ProLawTraceLevel config section. trace level values. Add together trace level values to enable multiple trace levels.

ProLawTraceLog Local filename path. Set the initializeData attribute to the local filename path where tracing information for the service will be written.

DbConnectionString Server name depends on West km database connection string. system configuration; database user and password should not be modified.

WindowsDomainName String. Domain of the West km users.

Used to authenticate Word client users. atlas AuthenticationMode Possible values are: Authentication mode to use. A value of None None uses a predefined km test user kmAuthentication account. A value of kmAuthentication IW requires a custom West km account to be created by the West km administrator. A<BR> Values are case-sensitive.<BR> value of IWA uses your current Windows logon account.

List of Properties in Configuration Files IIS Configuration File : Web. config (Continued) Property Name Allowable Range Description atlas_xsl_FirmCiteList XSL stylesheet path. Stylesheets for administrative tool Web atlas_xsl_FirmCiteListParentChild Do not modify. pages. atlas_xsl_RidXmlToKcFlagXml atlas_xsl_FirmDocumentList atlas_xsl_FirmDocumentListHeader atlas_xsl_FirmDocumentListFullScreen atlas_xsl_FirmDocContext <BR> <BR> adasxsLFirmDocNav<BR> <BR> <BR> atlas_xsl_DbXmlToCiteListXml<BR> <BR> <BR> <BR> atlas_xsl_DbXmlToDocContextXml<BR> <BR> <BR> <BR> atlas, _xslDbXmlToReferencesXml atlas_xsl_DbXmlToFirmDocumentListXml atlas_xsLChooselndexingStats atlas_xsl_ShowIndexingStats atlas_xsl_ShowlndexingStatsDetail<BR> <BR> <BR> adasxsLSearchCiteList<BR> <BR> <BR> <BR> atlas_ sl_SearchCiteListFullScreen<BR> <BR> <BR> atlas_xsLSearchCiteListHeader atlas_xsl_SearchCiteListFooter <BR> <BR> atlas_xsl_SearchQueryProgress<BR> <BR> <BR> atlas_xsl_KeySearchAdmin atlas_xsl_KeySearchCategoryDetail atlas_xsl_KeySearchCategoryDetailError<BR> <BR> <BR> <BR> atlas_xsl_KeySearchBrowseLocation atlas_xsl_KeySearchHierarchy atlas_xsl_KeySearchHierarchyLeft atlas_xsLKeySearchHierarchyRight atlas_xsl_KeySearchScanNoResults atlas_xsl_KeySearchScanResults adasxsLKeySearchScanTaxXml atlas_xsl_KeySearchAdminSearch atlas_ada_sql_GetProfileInformation SQL statements. Data access statements for West km atlas_ada_sql_GetSplatForDocument Do not modify. database. atlas_ada_sql_GetSplatForTab adasadasqLGetFirmDocumentList adasadasqLGetFirmDocumentListNoDepth Stars <BR> <BR> atlas_ada_sql_GetFirmDocumentListCount<BR> <BR> <BR> <BR> atlas_ada_sql_GetOffsets atlas_ada_sql_GetCountCitedDocs atlas_ada_sql_GetFirmDocumentListAll atlas_ada_sql_GetCiteList<BR> <BR> <BR> atlas_ada sql_CheckDocForCites<BR> <BR> <BR> <BR> atlas_sql_AddUsageRecord atlas_ada_sql_GetFirmTabList atlas_ada UseKCFlags True/False. Controls inclusion of KeyCite flags in Do not modify. indexed documents.

Only used for testing. atlas_ada_UseOldRIDFormat True/False. Controls support for older RID citation Do not modify. markup format. Only used for testing. atlas_htmlstream_size Integer value between 0 Controls size of HTML data sent to RID and X. server for optimizing performance.

134 Appendix IIS Configuration File: Web. config (Continued) Property Name Allowable Range Description atlas_applySecurityOnSplat True/False. Controls display of organization's West km icon. If set to False, icon is displayed regardless of user access to organization document list. User may still be restricted from accessing organization documents, but the icon display informs user that organization documents containing the citation do exist.

If set to True, the icon is only displayed after checking that user has access to at least one document in the organization's document list. confidentiality_message String. Optional warning message detailing privacy Set value to""to prevent concerns. The message is displayed in a pop- display of message box. up window once per session. Users will see the pop-up window when they view the first organization document in that session. atlas_WebProxyHost IP address or URL. Proxy server setup. atlas_WebProxyPort Open port number. If using machine settings for proxy server atlas_WebProxyBypassProxyOnLocal True/False. setup, leave these entries commented out. adasimageworkproduct Local path or URL of Images used when displaying Westlaw atlas_image_clicktoedit image file. pages. atlas_image_ViewMax Do not modify. atlasimage_ViewSplit<BR> <BR> <BR> atlasimage_citesDoc<BR> <BR> <BR> atlasimage_nextPage atlasimagesearchstatus atlasimageinfoicon<BR> <BR> <BR> atlasimage_star atlas_image_ping atlasimage cFlag adasimagegFlag atlas_image_nFlag atlas_image_rFlag adasimageuFlag atlas_image_yFlag adasimageclosfldr adasimageggo atlas_Image_mag_glass_tr atlasimageinformation<BR> <BR> <BR> adasimage activeArrow product logo firm_header_logo atlas_image_Firm Modify these to change Images used when displaying Westlaw atlasimage_FirmMoreInformation organization-specific logos pages. atlas_ada_xml_FirmSplat and images. atlas_ada_xml_FirmDocListSplat List of Properties in Configuration Files IIS Configuration File: Web.config (Continued) Property Name Allowable Range Description atlas_url_DocumentContext URL. West km URLs used by Web broker to atlas_url_Document Do not modify. maintain context. atlas_url_DocumentNav atlas_template_SerialNumLink adastemplateCiteLink <BR> atlas_template_DocNameLink<BR> <BR> <BR> <BR> <BR> atlas template_KCSerialNumLink<BR> <BR> <BR> <BR> <BR> atlas template_KCCiteLink<BR> <BR> <BR> <BR> atlas template_KCDocNameLink<BR> <BR> <BR> <BR> <BR> atlas template_FullScreenDocListLink<BR> <BR> <BR> <BR> <BR> atlas_template_ViewMaxLink atlas template clicktoeditLink Modify domain name West km URLs used by Web broker to portion of URL to server maintain context. name or domain name of KM server. atlas_more_info_link_domain West km admin Web page Web page to handle"More Information" name. link.

Do not modify. atlas_docsecurity_error_page West km admin Web page Default error page to display when name. document security is violated.

Do not modify. atlas_ada_url_kcFlagServer URL. KeyCite flags server for retrieving current Do not modify. status of KeyCite flags in Westlaw documents. atlas_domain_westlaw URL. Westlaw domain URL used to construct Do not modify. Westlaw links. atlas_url_WestlawFind URL. Wesdaw URLs to link to from Word plug- atlas_url_WestlawKeyCite Do not modify. in. westkm_use_library_groupings True/False. Controls display of library groupings in Westlaw pages and the administrative tool. westkm_alllibraries text String. Default display name in the library grouping drop-down list. This value is only used if westkmuselibrarygroupings is set to True. atlas_use_depth_stars Modify to change the Controls sort order and depth of treatment atlas_4stars_caption display of citing documents categories for citing documents in atlas_4stars_max and set depth of treatment westlaw. com. atlas_4stars_min categories. atlas_3stars_caption <BR> atlas_3stars_max<BR> <BR> <BR> <BR> <BR> atlas 3stars min<BR> <BR> <BR> <BR> <BR> adas2starscaption<BR> <BR> <BR> <BR> atlas_2stars_max<BR> <BR> <BR> <BR> <BR> atlas 2stars min atlas_lstars_caption atlas_1stars_max atlaslstarsmin 136 Appendix IIS Configuration File : Web. config (Continued) Property Name Allowable Range Description adasstylehighlight HTML text style tags. Text styles to apply in Westlaw pages. atlasstyle_no_confidence_link<BR> <BR> <BR> atlas_style_docviewerbannerbody<BR> <BR> <BR> adasstyledocviewerbannerheading atlas_create_no_confidence_links True/False. Text styles to apply in Westlaw pages. adasfdlnumfirstpage Integer value. Controls number of organization atlas_fdl num_other_page documents to display on KC Citing Ref tab in Westlaw. atlas_UseUsageTracking True/False. Controls enabling of usage tracking. atlas_useTitleInCiteOffsets True/False. Controls RID processing to include document tides.

Only used by Word plug-in. atlas_showNextPagelogo True/False. Controls display of the NextPage logo in the Do not modify. search cite list displayed in westlaw.com. adasrecordcountforfullsecurity String. How to display the record count in the Possible values are: organization document list when full Default security is on. With full security on, the user Approx may not have rights to all the documents in Morethan the list, so the caption in the document list should indicate this. Examples would be "Approximately 34 document (s)" or "Showing more than 40 documents." adasindexingquerydmeout Integer value in seconds. Maximum amount of time to wait for Do not modify. indexing-related SQL queries to complete. indexer_DeliveryServer String. Identifies server where the full-text scan index is located. isdexer_NextPageScanlnd « _NextPageFolder String. NextPage location of the scan index for the KeySearch hierarchy data. indexer_NextPageScanlndex_NextPageService String. NextPage service, name that builds and updates the scan index. The scan index is an index of the KeySearch hierarchy data. indexer_NextPageScanIndex_XmlFileDirectory Local path. Location of folder on the delivery server containing KeySearch hierarchy input data for building the scan index. indexer_NextPageScanIndex_XmlFileName Local filename. Name of file containing KeySearch hierarchy input data. indexer_NextPageScanlndex_IndexDirectory Local path. Location of folder on the delivery server containing the scan index for KeySearch hierarchy data. indexer_NextPageScanlndex_IndexSheetFile Local filename. File containing templates for building the Path scan index. atlas_citetypes_caselawlist List of citation codes. Citation codes representing different types atlas_citetypes_sf_caselawlist Do not modify. of legal documents. atlas_citetypes_statuteslist atlas_citetypes_sf_statutslist<BR> <BR> adascitetypesshortformlist List of Properties in Configuration Files IIS Configuration File : Web. config (Continued) Property Name Allowable Range Description IManageMaxRowsForSearch Integer value. Maximum number of records to return for an iManage saved search.

IManageSessionTimeout Integer value in seconds. Session time-out value for iManage connection.

IManageVersion 1.0, 1.0. 1.151, 2.0 iManage API version.

DmsUserIdsRequired Y/N. Controls usage of iManage virtual user DmsUserPasswordsRequired accounts and passwords for authenticating members. If set to Y, iManage security will determine document access rights. If set to N, internal security logic is used to determine document access rights.

IManageUseTrustedLogin Y/N. Controls login method for the iManage DMS server. Trusted login uses NT login; otherwise iManage-defined login required.

IManageUseCombinedClientMatter Y/N. Controls if matter ID and client ID from DMS-should be combined in ProLaw database.

IManageAttrMappingTitle String. Indicates how to map iManage document IManageAttrMappingAbstract profile custom profile attributes to IManageAttrMappingClass associated ProLaw document profile IManageAttrMappingMatter attributes.

IManageAttrMappingMatterDescription IManageAttrMappingClient IManageAttrMappingClientDescription IManageAttrMappingAuthor prefetchDocsProfiles True/False. Reserved for future performance Do not modify. enhancement when retrieving documents from DMS.

PCDocsSecurityLumpSize Integer value. SQL statement group size parameter used Recommended range is 75-when retrieving security attributes for 250. documents.

PCDocsSecurityCacheGroups True/False. Controls checking group permissions for user on per-process basis.

PCDocsUseClientMatterMetaData True/False. Indicates whether client matter metadata is used in the DMS database.

PCDocsUseCombinedClientMatter True/False. Controls if matter ID and client ID from DMS should be combined in ProLaw database.

PCDocsUseSubversions True/False. Controls use of sub-versions for documents.

Important: Changing this setting requires re-indexing! PCDocsUseMatterCustomSql True/False. Controls if matter ID and client ID should be retrieved from custom profile instead of default legal profile.

138 Appendix 115 Configuration File : Web. config (Continued) Property Name Allowable Range Description PCDocsMatterCustomSql SQL statement. SQL query used to retrieve matter ID and The following aliases must client ID from custom profile. be used: matterid matter-name clientid client name PLClientMatterSeperator"-" (hyphen). Separator character to be used when Do not modify. creating combined client ID and matter ID attribute in ProLaw document profile.

FusionUselndividualLogins True/False. Control if Load Copy should use individual login (entered in Professionals page) or administrative level account.

Can only be set to True in web. config.

FusionGetQuickSearchFormName String. Name of form used to retrieve the list of Do not modify. quicksearches from the Fusion server.

FusionGetVersionlnfoFormName String. Name of form used to retrieve version Do not modify. information from the Fusion server.

FusionUseSubversions True/False. Controls use of sub-versions for documents.

Important: Changing this setting requires re-indexing.

FusionUseDbFormsToRunQuickSearch True/False. Controls if database forms are used to run quicksearches.

This should only be set to True if Fusion server was upgraded or if customized forms are being used.

FusionNonDbRunQuickSearchFormName String. Name of form used to run a quicksearch.

This is an external form, not a database form.

This property is ignored if FusionUseDbFormsToRunQuickSearchesis set to False.

FusionDefauitProfileSearchFormName String. Name of form used to retrieve the default Do not modify. profile metadata from the Fusion server.

FusionUseClientMatterMetaData True/False. Controls loading of client and matter metadata. If set to False, other client/matter related properties are ignored.

FusionUseCombinedClientMatter True/False. Controls whether matter ID and client ID from DMS are combined in ProLaw database.

This property is ignored if FusionUseClientMatterMetaData is set to False.

List of Properties in Configuration Files IIS Configuration File : Web. config (Continued) Property Name Allowable Range Description FusionclientMatterSearchFormName String. Name of the form used to retrieve client/ matter metadata.

If the default legal profile is being used, do not modify this property.

If a custom profile is being used, specify a custom external form name.

The following properties related to form field names must be unique: FusionClienddFormFieldName<BR> <BR> <BR> FusionMatterIdFormFieldName<BR> <BR> <BR> FusionClientNameFormFieldName<BR> <BR> <BR> FusionMatterNameFormFieldName This property is ignored if FusionUseClientMatterMetaData is set to False.

FusionIgnoreMissingCustomMetaData True/False. For debugging purposes only.

Do not modify. Leave set to False unless debugging.

FusionClientIdFormFieldName String. Name of field in custom form, specified in FusionClientMatterSearchFormName, to use as the client ID.

This property can be optionally set if the client ID is contained in the matter ID.

If the default legal profile is being used, do not modify this property.

This property is ignored if FusionUseClientMatterMetaData is set to False.

FusionMatterIdFormFieldName String. Name of field in custom form, specified in FusionClientMatterSearchFormName, to use as the matter ID.

This property must be set and may contain the client ID.

If the default legal profile is being used, do not modify this property.

This property is ignored if FusionUseClientMatterMetaData is set to False.

FusionClientNameFormFieldName String. Name of field in custom form, specified in FusionClientMatterSearchFormName, to use as the client name.

If the default legal profile is being used, do not modify this property.

This property is ignored if FusionUseClientMatterMetaData is set to False.

140 Appendix IIS Configuration File : Web. config (Continued) Property Name Allowable Range Description FusionMatterNameFormFieIdName String. Name of field in custom form, specified in FusionClientMatterSearchFormName, to use as the matter name.

If the default legal profile is being used, do not modify this property.

This property is ignored if FusionUseClientMatterMetaData is set to False.

FusionSecurityLumpSize Integer value. SQL statement group size parameter used Recommended range when retrieving security attributes for is 75-250. documents.

FusionSecurityCacheGroups True/False. Controls checking group permissions for user on per-process basis.

PLDmsServicePort Open port.. NET Remoting port number.

This property must have the same value in all service configuration files.

PCDocsDmsServiceEndPoint PCDocsDmsService.. NET Remoting endpoint.

Do not modify.

NtfsDirServiceEndPoint NtfsDirectoryService.. NET Remoting endpoint.

Do not modify.

NtfsFileServiceEndPoint NtfsFileService.. NET Remoting endpoint.

Do not modify.

BulkLoadControllerServer Localhost or name of Identifies indexing server. indexing server.

BulkLoadControllerPort Open port. TCP communications port for indexing service on indexing server. indexing_FtiBuildControllerServer Name of server. Identifies server where full-text indexing build controller is running. indexing_FtiBuildControllerPort Open port. TCP communications port for full-text indexing build controller on full-text indexing server. indexing_ProfileSyncControllerServer Name of server. Identifies server where profile sync controller is running. indexing_ProfileSyncControllerPort Open port. TCP communications port for full-text indexing server. atlas_doc_marginHeight Integer value in pixels. Controls vertical margin when displaying organization documents. atlas_doc_marginWidth Integer value in pixels. Controls horizontal margin when displaying organization documents. atlas_error_page West km admin Web page Default error page for admin screens. name.

Do not modify. heracles_nextpage_enabled True/False. Controls whether full-text index builds are performed.

List of Properties in Configuration Files IIS Configuration File : Web. config (Continued) Property Name Allowable Range Description heracles_nextpage_max_hits Integer value. Maximum number of documents to process for full-text indexing. heracles_nextpage_overflow_hits Integer value. Maximum number of documents to process before generating an exception. To prevent an exception, this number must be greater than the value for heracles_nextpage_max_hits.

Allows overriding of heracles_nextpage_max_hits in cases where the organization wants to be notified after a certain number of documents have been processed. heracles. jiextpagequerytimeout Integer value. Maximum amount of time to wait for NextPage-related SQL queries to complete.

If time-out period is exceeded, an exception is generated and document is not indexed. heraclesrtextpagesearchroot String. Root folder name for NextPage content Do not modify. services.

Defaults to"Westkm." herac ! esnaturallanguageconfigroot Local path. Location of Natural Language configuration files. heracles-page-size Integer value. Number of records to be displayed per page. heracles_progress_refresh_rate Integer value in seconds. Amount of time between page refreshes for Do not modify. the administrative tool status page. prolaw_doc_fulltext_sort_limit Integer value. Maximum number of records that ProLaw will allow to be sorted for display through the ProLaw UI. If search results are more than this number, sorting will not be allowed on full-text searches. pro ! awdocsearchminimumprocesscount Integer value. Number of documents to process for full- text indexing when full security is on. With full security on, the user may not have rights to all the documents in the list. The atlasrecordcountforfullsecurity property will control how the count of matching documents with user rights is displayed in the ProLaw UI. prolawdocsearchmaxinctause Integer value. Performance factor for controlling maximum number of documents to include in specific SQL queries. prolawdocsearchsecuritymultfactor Integer value. Performance factor related to the percentage of documents to which users have rights. Used to reduce the number of database accesses caused by users having rights to a low percentage of total documents indexed.

142 Appendix IIS Configuration File : Web. config (Continued) Property Name Allowable Range Description protawdocsearchfttermmultfactor Integer value. Performance factor related to pro ! awdocsearchsecuritymultfactor.

Used to reduce the number of database accesses caused by searches using more than just full-text criteria. prolawdocsearchmaxhits Integer value. Maximum number of documents to process for full-text indexing. prolawdocsearchoverflowhits Integer value. Maximum number of documents to process before generating an exception. To prevent an exception, this number must be greater than the value for prolaw_doc_search_max_hits.

Allows overriding of prolawdocsearchmaxhits in cases where organization wants to be notified after a certain number of documents have been processed. prolawdocsearchquerytimeout Integer value. Maximum amount of time to wait for NextPage-related SQL queries to complete.

If time-out period is exceeded, an exception is generated and document is not indexed. plgrid_pagesize Integer value. Number of full-text search result items to display per page. showDocumentContext True/False. Controls display of document context in the More Information pages.

KeyCiteModeMsg String. Message to display in document profile view under More Information link if, that document has not been processed by KeyCite. atlasfirtnname String. Text to display under the top category in the firm customized KeySearch hierarchy view. attasksshowdoccountsinwestlaw True/False. Controls automatic display of document counts in Westlaw KeySearch hierarchy view. Document count equals the number of CaRE classified documents plus the number of manually classified documents. atlasksshowgetdoccountlmkinwestlaw True/False. Controls display of the Get Doc Counts link in Westlaw KeySearch hierarchy view.

This property is ignored if atlasksshowdoccountsinwestlawis set to True. atlasksshowdoccountsinadmintool True/False. Controls automatic display of document counts in the KeySearch administrative view. Document count equals the number of CaRE classified documents plus the manually classified documents.

List of Properties in Configuration Files IIS Configuration File : Web. config (Continued) Property Name Allowable Range Description atlasksshowgetdoccountIinkinadnun True/False. Controls display of the Get Doc Counts link tool in KeySearch administrative view.

This property is ignored if atlas_ks_show_doc_counts_in_admin_tool is set to True. adasksdoccountsquerydmeoutsecs Integer. Maximum amount of time to wait for completion of SQL query to calculate KeySearch document counts. atlas_care enabled True/False. Controls whether documents are processed with CaRE. atlas_ks_toggle_text String. Text to display under the link in Westlaw to enable a user to toggle to the KeySearch hierarchy that retrieves Westlaw documents only.

UsageReportFile Local filename path. Contains output from usage report generator.

MoreInfoDisplayOption Y/N. Controls display of More Information link.

ShowIndividualStatusCode Y/N. Controls whether indexing statistics are displayed with grouped status codes or individual status codes for indexing and error counts on the administrative tool Indexing Statistics page.

IndexingStatsQueriesBufferInSeconds Integer value in seconds. Include in the indexing statistics the scheduled indexing runs for a document collection that have been started within this amount of time prior to the latest scheduled indexing run. This allows indexing statistics to more accurately reflect indexing counts for concurrent update and"catch-up" indexing processes. Catch-up indexing processes changes that do not require the HTML conversion and cite recognition stages of indexing. For example, an indexing update requiring 2 documents to be re-indexed is scheduled 1 second after a catch-up indexing process on 3 documents.

The statistics should reflect a total of 3 documents currently being indexed.

<httpHandlers> String. Identifies the Http Handler for requests to <add verb="*"path="PLDefauit. aspx" PLDefault. aspx. type="ProLaw. Broker. ProLawBroker, Default. aspx is the entry point into More ProLaw. Broker"/> Information.

</httpHandlers> 144 Appendix IIS Configuration File : Web. config (Continued) Property Name Allowable Range Description <httpHandlers> String. Identifies the Http Handler for requests to <add verb="*"path="ksAdmin. aspx" various KeySearch pages. type="ProLaw. Broker. AtIasBroker, ProLaw. Broker"/> <BR> <BR> <BR> <add verb="*"<BR> <BR> <BR> path= iksAddCategoty. aspx" type="ProLaw. Broker. AtlasBroker, ProLaw. Broker"/> <add verb="*" path="ksBrowseLocation. aspx" type="ProLaw. Broker. AtlasBroker, ProLaw. Broker" /> </httpHandlers> ** compilation Debug attribute can be true Controls ASP. NET debugging. or false. Leave set to false unless debugging ASP. NET ; otherwise run-time performance will be impacted. customErrors DefaultRedirect attribute Controls display of custom error page. set to West km admin Web Leave Mode attribute set to RemoteOnly page name. Do not modify-for security purposes.

Mode attribute can be set to the following : On Off RemoteOnly authentication Mode attribute can be set Controls authentication method for to the following : ASP. NET.

Windows Leave Mode attribute set to Windows for Forms security purposes.

Passport None trace Do not modify. Controls enabling of application trace logging.

SessionState Server IP address depends West km database connection string. on system configuration; database user and password should not be modified.

List of Properties in Configuration Files CaRE Configuration File : defaults. conf Property Name Allowable Range Description app. cwd Local path replaces CaRE installation folder, which is usually [ ! cm_CareInstallDir]. C : \Program Files\Westkm\CaRE\. exchangePort Open port. Used for communications between the West km CaRE service and the West km CaRE CNC service. The default port is 11115.

This value needs to change only if there is a port conflict.

CaRE Configuration File : ksh. classify. seryer. conf Property Name Allowable Range Description config. includes Local path (s). Location of other configuration files to Multiple file paths must be include. The CaRE installation folder separated by semicolon. replaces Ll careTnstallDirl. param. sideArray. memoryLimit Integer. Controls the amount of memory used by CaRE processes. The total memory used by CaRE is 650 MB plus this property value.

By default, 1 GB of dedicated RAM is used, translating to a value of 350000000 for this property. log. file String. Path and log filename format string.

Valid substitutions are % Y-4-digit year % y-2-digit year % m-2-digit 0-padded number representing the month % d-2-digit 0-padded number representing the day log. format. long 1/0. Controls the format of log messages. If set to 1, the service uses a long format that places a time stamp on each log message. log. format. stderr 1/0. Controls whether messages are logged to standard error, i. e. , console (screen) output, as well as the log file specified in log. file. A value of 1 enables standard error logging. A value of 0 disables it.

Standard error logging is useful only when debugging the console version of CaRE. It doesn't apply to the Windows service version used with West km.

146 Appendix CaRE Configuration File : cnc_ksh. conf Property Name Allowable Range Description config. includes Local path (s). Location of other configuration files to Multiple file paths must be include. The CaRE installation folder separated by semicolon. replaces Lkm_CareTnstallDirl. param. net. httpPort Open port. TCP communications port for the West km CaRE CNC service. It must match the care_Port property in AtlasTndexingService. exe. config. The default port is 11116. This value needs to change only if there is a port conflict. log. file String. Path and log filename format string.

Valid substitutions are % Y-4-digit year % y-2-digit year % m-2-digit 0-padded number representing the month % d-2-digit 0-padded number representing the day log. format. long 1/0. Controls the format of log messages. If set to 1, the service uses a long format that places a time stamp on each log message. log. format. stderr 1/0. Controls whether messages are logged to standard error, i. e. , console (screen) output, as well as the log file specified in log. file. A value of 1 enables standard error logging. A value of 0 disables it.

Standard error logging is useful only when debugging the console version of CaRE. It doesn't apply to the Windows service version used with West km. threadCount 1. The number of threads used for low priority tasks in the Command and Control (CnC) program. There are no low priority tasks defined when CnC is used within West km, so this property should be set to 1. priorityThreadCount 1-9. The number of threads the Command and Control (CnC) program uses to simultaneously process classification requests. A value of 9 (the default) directs the CnC program to use up to 9 simultaneous threads, thereby enhancing performance.

The CnC program is responsible for routing classification requests from multiple clients to the CaRE engine.

List of Properties in Configuration Files -A-, ActiveX controls 14 activity, tracking 81 adding databases 61 document collections 65 document storage locations 62 KeySearch topics 51 members 78 administering West km members 76 administrative tool 59, 77 administrator account 21,34, 60 initial user 12,19 KeySearch 49,77 rights 77 anonymous disabling in NextPage NXT 3 15 US permissions 36 assigning documents 53 AtlaslndexingHelperService. exe. config distributed architecture configuration 90 properties listing 131 setting properties 89 trace log configuration 83 AtlaslndexingService. exe. config CaRE configuration 27 distributed architecture configuration 90 DOCS Open configuration 47 DOCSFusion configuration 47 error re-indexing threshold 72 iManage configuration 46 properties listing 121 setting properties 89 trace log configuration 83 authentication custom 36 in iManage 78 integrated Windows 34 none 38 and Professionals table 80 setting security 30 automated setup 109 -B- bulk index 69,72 bypass cite recognition 66 -C- CaRE See classification and routing engine (CaRE) trace logs 83 CaRE flat-file database 25 changing West km images 92 citations only 66 Cite ID servers (RID) 3 classification and routing engine (CaRE) configuration 25 configuration files 89 document counts 94 enabling 11 flat-file database 25 at indexing 49,57, 67 at installation 6 Simple CaRE Driver 27, 97 trace logs 83 client West km 14 client, West km 101 cnc_ksh. conf 89,147 configuration of CaRE 25 of DMS services 44 files 46,89, 121 us 34 iManage 45 of West km trace logs 84 content service, NextPage NXT 3 116 copying KeySearch topics 52 Corel WordPerfect 58 counts of documents classified by CaRE 94 custom authentication 36 customizing KeySearch topics 50 -D- databases designating 61 installed 107 See also CaRE flat-file database See also West km database See also West km RID database date of indexing 67,74 default CaRE memory setting 26 depth of treatment ranges 92 display name for document collection 67 document security 75 image file names 92 jurisdiction 66 number of document assignments via CaRE 27 ports 90 professionals table configuration 79 security setting 30 sort order 92 trace log locations 82 usage tracking setting 88 West km installation folder 102 Index defaults. conf 89,146 defining document collections 65 deleting documents 55,58, 73 KeySearch topics 53 delivery server installed software 5, 6 installing West km 7 name 11 NextPage NXT 3 109 permissions 34 port settings 119 depth of treatment stars 92 desktop installation of West km client 101 display name for document collection 67 distributed architecture diagram 3 event logs in 29,81 installing West km in 7 setting properties 90 dll files registered 107 DMS 57 configuration 44 designating databases with 61 libraries 61 properties 46 server 3 DOCS Open document security and authentication 31 domain administrator account 34,60 domain user account 62 properties 47 DOCSFusion configuring 44 document security and authentication 32 domain user account 61 properties 47 document collections defining 65 designating databases containing 61 editing 68 removing 70 synchronizing 73 updating full-text indexes 58, 74 updating indexes 58,67, 69,72 documents assigning to KeySearch topics 53 CaRE counts 94 deleting 55,73 HTML 57,62 indexing 57,69 monitoring indexing of 70,75 removing from KeySearch topics 54 searching 55 security 75 setting number of CaRE assignments 27 sort order 92 synchronizing 58 domain administrator account 34,60 150 Index domain name 11,60 - E- editing document collections 68 KeySearch topics 52 members 78 error events 82 event log 29 monitoring 81 exporting usage 88 exporting usage data 86 -F- failures 82 features of West km 1 files installed 107 See also configuration files finding members in the Professionals table 77 folders installed 107 full index 69,72 full-text indexing creation of 57 enabling 11 monitoring 75 updates 58, 74 See also full-text searching See also indexing See also NextPage NXT 3 full-text searching administrator account 60 creating the content service 75, 116 disabling anonymous access 15 folder 107 and KeySearch 49 password 60,112 software 5 See also full-text indexing See also NextPage NXT 3 - H- hiding KeySearch topics 52 hierarchy, KeySearch 50 HTML document server 3 installed software 5, 6 installing West km 7 NextPage NXT 3 109 permissions 34 port settings 119 services 29 storage locations 62 HTML documents 57, 62 HTML search service See West km HTML search service HtmlSearchService. exe. config 89 distributed architecture configuration 90 properties listing 132 setting properties 89 trace log configuration 83 -I- s configuration file See Web. config permissions 36 trace log 82 US Web server 3 images, changing 92 iManage authentication with 78 configuration 4S document security and authentication 31 properties 46 include subfolders 66 incremental indexing updates 69,72 indexing bulk 69,72 configuration file See AdaslndexingSenice. exe. config monitoring 70, 7S stopping 73 updates 58, 67,69, 72 See also full-text indexing indexing helper configuration file See AtlasIndexingHelperService. exe. config trace log 83 indexing server 3 installed software 5, 6 installing West km 7 name 11 permissions 34 port settings 119 services 29 indexing service See West km indexing service indexing trace log 83 information events 81 information manager 49,77 initial West km administrative user 12,19 installed databases, folders, and files 107 installing NextPage NXT 3 109 West km 5, 7 West km client 101 integrated Windows authentication 34,78, 80 Internet Explorer 6,8 Internet Information Server (IIS) 6 See also IIS -J- jurisdiction 66 - K- KeyCite 55, 92 KeySearch data, importing 20 KeySearch topics adding 51 assigning documents to 53 copying 52 customizing 50 deleting 53 editing 52 hiding and showing 52 removing documents from 54 setting number of CaRE document assignments 27 ksh.classify.server.conf 26, 89, 146 -L- legal topics See KeySearch topics library DMS 61 name 67 logs event 81 trace 82,84 usage 86 viewing 86 Lotus Notes 33 Lotus Word Pro 58 - M- members 76 adding 78 editing 78 finding in the Professionals table 77 memory, setting CaRE 26 Microsoft. NET Framework 6,7 Microsoft SQL Server port setting 119 software requirement 6 system administrator account 21 Microsoft Word 58 monitoring indexing 70, 75 - N- naming a document collection 67 network ID 76 network installation of West km client 104 NextPage NXT 3 5 administrator account 60 creating the content service 75, 116 disabling anonymous access 15 folder 107 installing 109 password 60,112 removing 118 updating 112 Notepad 88 configuration files 90 display properties 93,94 images 92 trace logs 84, 85, 86 usage tracking 88 NT file system Index designating databases 63 document security and authentication 33 domain administrator account 34,60 indexing documents 57 NT integrated Windows authentication 34,78, 80 - 0- OLE DB Provider 6 overview of West km 1 -p- passwords full-text searching 60,112 Microsoft SQL Server 21 West km 30,80 Westlaw 12,76 path name, West km 9 PCDocs See DOCS Open permissions ES36 West km NT security 34,39 ports 90,119 professionals See members ProLaw ., adding document collections with 68 designating databases with 62 document security and authentication 33 and Sybase database server 6 ProLaw event log 29 monitoring 81 properties in configuration files 89,121 in a distributed architecture 90 DMS 46 event log 29 proxy server 12, 103, 104 -Q- querying members in the Professionals table 77 usage 88 usage data 86 - R- RAM, setting CaRE 26 registered dll files 107 removing document collections 70 documents from KeySearch 54 West km application 97 West km client 105 West km full-text indexing application 118 See also deleting reporting usage 88 requirements 6,39 RID database See West km RID database 152 Index RID servers 3 rights administrator 77 West km NT security 34 -s- search configuration file See HtmlSearchService. exe. config trace log 83 searching documents 55 security requirements 39 setting a document security level 75 setting a model for West km 30 server components 1, 5 services defaults for NT 34 monitoring events 81 See also West km services setting properties 89 setup, automated 109 showing KeySearch topics 52 silent installation of West km client 104 Simple CaRE Driver 27,97 software installed S requirements 6 sorting of citing documents 92 stars 92 statistics, indexing 70 stopping indexing 73 West km services 73 storage of documents 62 Sun Java Runtime Environment 6,8 Sybase database server 6 synchronizing document collections 58, 73 See also indexing system diagram typical server configuration 3,90 West km NT security 34 West km server components 1 system requirements 6 -T- time of indexing 67,74 topics, legal See KeySearch topics trace logs configuring 84 using 82 viewing 86 tracking program activity 81 usage 86 transactions, usage 86 Conclusion The embodiments described above are intended only to illustrate and teach one or more ways of making and using the present invention, not to restrict its breadth or scope. The actual scope of the invention, which embraces all ways of practicing or implementing the teachings of the invention, is defined only by one or more issued patent claims and their equivalents.

- u- updating full-text indexes 58,74 indexes 58,67, 69,72 NextPage NXT 3 112 usage, tracking 86 users See members - V- viewing trace logs 86 virtual logins 78 -w- warning events 82 Web share virtual directory 100 Web. config authentication 36 display properties 93,94 distributed architecture configuration 90 DOCS Open configuration 47 DOCSFusion configuration 47 image properties 92 iManage configuration 46,79 indexing statistics 71 properties listing 132 setting properties 89 trace log properties 83 usage tracking properties 88 West km administrative tool 59,77 authentication 80 f' automated setup 109 custom authentication 36 documents defining collections 65 deleting 55,58 indexing 57,69 removing collections 70 security 75 sort order 92 synchronizing collections 73 updating full-text indexes 58,74 updating indexes 58,67, 69,72 images 92 initial administrative user 12,19 installing 5 members 76 overview 1 passwords 30 security 30,75 security requirements 39 server components 1,81 services 29 tracking activity 81 West km application 5 installing 7 removing 97 West km CaRE CNC sérvice activity log 83 starting 29 stopping 73 West km CaRE service activity log 83 starting 29 stopping 73 West km client enabling 14 installing 101 removing 105 West km database 3 creating 16 importing KeySearch data 20 at installation 5, 11,107 West km database server installed software 5, 6 name 11 West km HTML search service activity log 83 at installation 6 starting 29 West km IIS Lockdown utility 39 West km indexing helper service activity log 83 starting 29 stopping 73 West km indexing service 5 activity log 83 starting 29 stopping 73 West km RID database 3 creating 22 at installation 5, 107 server name 11 West km server 3 West km services configuration files 89 monitoring events 81 starting 29 stopping 73 Westlaw and KeyCite 92 and KeySearch SO passwords 12,76 servers 3 Windows 2000 Server 6 Windows authentication See integrated Windows authentication Index