Skip to main content

First-Time Login & Setup

Welcome to NXGEN GCXONE. This comprehensive tutorial guides you through the complete process of setting up your account, configuring your organization, and establishing your first monitoring site. Whether you're new to cloud-based security platforms or migrating from traditional systems, this guide ensures you have a solid foundation for your security infrastructure.


Overview

The first-time setup process involves five key phases that systematically build your security infrastructure:

  1. Account Activation - Register and verify your account credentials
  2. Organization Setup - Configure your company structure and hierarchy
  3. User Management - Set up roles and permissions for team members
  4. Site Configuration - Create your first monitoring location
  5. Device Integration - Connect your security hardware to the platform

Each phase builds upon the previous one, ensuring a logical progression from basic account setup to full system operation.


Prerequisites & Preparation

Before beginning the setup process, ensure you have the following ready:

Network Requirements

  • Internet Connection: Minimum 10 Mbps stable broadband connection
  • IP Whitelisting: Administrative access to configure firewall rules
  • Port Availability: Ensure ports 80, 443, 554, and 123 are open on your firewall
  • DNS Resolution: Confirm your network can reach nxgen.cloud domain

Account Requirements

  • Business Email: Valid corporate email address for registration
  • Administrative Access: Permission to configure network and security systems
  • Contact Information: Primary and secondary contact details for account recovery

Hardware Preparation

  • Workstation: Modern web browser (Chrome, Edge, or Firefox) with JavaScript enabled
  • Device Credentials: Administrator access credentials for your security devices
  • Documentation: IP addresses, port numbers, and login credentials for all equipment
  • Network Information: Subnet information and gateway addresses for device discovery

System Requirements

  • Operating System: Windows 10/11, macOS 10.15+, or Linux (Ubuntu 18.04+)
  • RAM: Minimum 8GB (16GB recommended for optimal performance)
  • Storage: 50GB available disk space for logs and temporary files
  • Display: 1920x1080 minimum resolution for dashboard visibility

Video Tutorial

Complete First-Time Login & Setup Tutorial (15 minutes)


Phase 1: Account Registration & Activation

  1. 1

    Step 1: Access the Registration Portal

  2. 2

    Navigate to the GCXONE Portal using your preferred web browser.

  3. 3

    GCXONE Portal Homepage

  4. 4

    What you'll see:

  5. 5
    • Clean, professional login interface
    • Prominent "Register" button for new users
    • Links to documentation and support resources
    • Security badges and compliance indicators
  6. 6

    Step 2: Enter Registration Details

  7. 7

    Click the Register button and complete the registration form with your organization information.

  8. 8

    Registration Form

  9. 9

    Required Information:

  10. 10
    • Full Name: Your complete professional name as it appears on business documents
    • Business Email: Corporate email address (personal emails not accepted)
    • Phone Number: Direct contact number for account verification
    • Company Name: Official legal business entity name
    • Industry: Select from predefined security, retail, healthcare, education, and other sectors
    • Company Size: Number of employees for appropriate service tier assignment
  11. 11

    Step 3: Choose Setup Path

  12. 12

    Select your preferred configuration approach based on your current infrastructure.

  13. 13

    Setup Path Selection

  14. 14

    Available Options:

  15. 15
    • Existing Infrastructure: For companies with current IP camera systems requiring migration
    • New Installation: For greenfield security deployments with new equipment
    • Demo Environment: For evaluation, training, and proof-of-concept purposes
    • Managed Service: For organizations preferring vendor-managed setup
  16. 16

    Recommendation: Choose "Existing Infrastructure" if you have cameras already installed, or "Demo Environment" to explore features before committing to hardware purchases.


Phase 2: Account Verification & Password Setup

  1. 1

    Step 4: Email Verification

  2. 2

    Check your email inbox (including spam/junk folders) for the verification message from no-reply@nxgen.cloud.

  3. 3

    Password Setup Interface

  4. 4

    Important Notes:

  5. 5
    • The verification link expires in 24 hours for security purposes
    • If expired, use the "Resend Verification" link on the login page
    • Verification is required before account activation
    • Keep this email for your records as it contains important account information
  6. 6

    Troubleshooting Email Delivery:

  7. 7
    • Check spam/junk folders first
    • Add nxgen.cloud to your email whitelist
    • Corporate firewalls may block automated emails
    • Contact IT department if emails are being filtered
  8. 8

    Step 5: Password Creation

  9. 9

    Click the verification link to access the secure password setup page.

  10. 10

    Password Setup Form

  11. 11

    Password Requirements:

  12. 12
    • Minimum 12 characters in length (longer passwords are more secure)
    • At least one uppercase letter (A-Z)
    • At least one lowercase letter (a-z)
    • At least one number (0-9)
    • At least one special character (!@#$%^&*)
    • Cannot contain your email address or company name
    • Cannot be a common dictionary word
  13. 13

    Password Best Practices:

  14. 14
    • Use a passphrase combining multiple words
    • Consider using a password manager for secure storage
    • Avoid reusing passwords from other systems
    • Change password immediately if you suspect compromise
  15. 15

    Step 6: Initial Login

  16. 16

    Return to the portal and log in using your newly created credentials.

  17. 17

    Initial Login Dashboard

  18. 18

    First Login Experience:

  19. 19
    • Personalized welcome dashboard
    • Interactive setup wizard with progress tracking
    • Quick access tiles to key configuration areas
    • Real-time notifications and system status indicators
    • Guided tour options for new users
  20. 20

    Security Features:

  21. 21
    • Multi-factor authentication prompt (recommended)
    • Session timeout warnings
    • Secure cookie management
    • Audit logging of login attempts

Phase 3: Organization & Hierarchy Setup

  1. 1

    Step 7: Organization Configuration

  2. 2

    Access the organization settings to establish your company structure and operational parameters.

  3. 3

    Organization Configuration

  4. 4

    Configuration Options:

  5. 5
    • Company Details: Legal name, address, tax information, and registration numbers
    • Billing Information: Payment methods, billing contacts, and invoice preferences
    • Support Preferences: Preferred communication channels and escalation procedures
    • Compliance Settings: Industry-specific requirements and regulatory compliance options
    • Branding: Company logo, colors, and custom messaging for user interfaces
  6. 6

    Organization Structure Considerations:

  7. 7
    • Define business units or divisions if applicable
    • Set up cost centers for billing allocation
    • Configure multi-tenant settings for managed service providers
    • Establish data retention policies and backup procedures
  8. 8

    Step 8: Create Your First Customer

  9. 9

    Set up your primary customer entity within the platform hierarchy.

  10. 10

    Customer Setup Interface

  11. 11

    Customer Information:

  12. 12
    • Customer Name: Official business entity name as registered
    • Contact Details: Primary and secondary contacts with emergency numbers
    • Service Level: Standard, Premium, or Enterprise based on requirements
    • Time Zone: Local operating timezone for scheduling and reporting
    • Industry Classification: For specialized feature sets and compliance requirements
    • Contract Details: Service agreement references and support level agreements
  13. 13

    Customer Setup Best Practices:

  14. 14
    • Use consistent naming conventions across all customer records
    • Include emergency contact information for critical situations
    • Set appropriate service levels based on operational requirements
    • Consider geographic distribution for efficient support routing
  15. 15

    Step 9: Site Establishment

  16. 16

    Create your first physical monitoring location with detailed configuration.

  17. 17

    Site Configuration

  18. 18

    Site Details:

  19. 19
    • Site Name: Descriptive location identifier (e.g., "Main Campus - Building A")
    • Physical Address: Complete street address with postal code
    • Geographic Coordinates: GPS coordinates for mapping and analytics
    • Operating Hours: Business hours and holiday schedules
    • Site Type: Campus, warehouse, retail, office, or specialized facility
    • Security Level: Normal, high-security, or critical infrastructure designation
  20. 20

    Site Configuration Considerations:

  21. 21
    • Include detailed address information for emergency services
    • Set appropriate operating hours for automated scheduling
    • Consider geographic location for weather-related monitoring
    • Plan for future expansion when naming sites

Phase 4: User Management & Permissions

  1. 1

    Step 10: Role Definition

  2. 2

    Configure user roles and access permissions before inviting team members to ensure proper security controls.

  3. 3

    Predefined Roles:

  4. 4
    • System Administrator: Full platform access with configuration and user management capabilities
    • Site Manager: Location-specific administration with device management and reporting access
    • Security Operator: Real-time monitoring and incident response capabilities
    • Viewer: Read-only access for reports, analytics, and historical data review
    • Auditor: Compliance and audit-focused access with limited operational controls
  5. 5

    Role-Based Access Control (RBAC) Principles:

  6. 6
    • Assign minimum necessary permissions for each role
    • Regularly review and update role permissions
    • Use role inheritance for hierarchical permission structures
    • Implement approval workflows for sensitive operations
  7. 7

    Step 11: Custom Role Creation

  8. 8

    Create specialized roles tailored to your organization's specific operational requirements.

  9. 9

    Role Customization Options:

  10. 10
    • Permission Matrix: Granular control over specific features and functions
    • Time Restrictions: Business hours limitations and shift-based access
    • Geographic Limits: Location-based access control for regional operations
    • Approval Workflows: Multi-level authorization requirements for critical actions
    • Device Access: Specific camera or sensor permissions by location or type
    • Reporting Access: Customized dashboard and report visibility
  11. 11

    Advanced Role Features:

  12. 12
    • Conditional permissions based on time or location
    • Temporary role elevation for specific tasks
    • Audit logging of all permission changes
    • Integration with external identity providers
  13. 13

    Step 12: User Invitations

  14. 14

    Invite team members and assign appropriate roles with proper onboarding procedures.

  15. 15

    Invitation Methods:

  16. 16
    • Bulk Import: CSV upload for multiple users with role pre-assignment
    • Individual Invites: Personal invitations with custom welcome messages
    • Role Assignment: Immediate activation or pending approval workflow
    • Welcome Package: Automatic access to training materials and documentation
    • Integration Options: SSO integration with Active Directory or LDAP
  17. 17

    User Onboarding Process:

  18. 18
    • Automated welcome emails with login instructions
    • Required training module completion
    • Supervisor approval for role activation
    • Temporary password generation with forced reset
    • Progress tracking for new user setup completion
  19. 19

    Security Considerations:

  20. 20
    • Email verification required before account activation
    • Password complexity enforcement
    • Multi-factor authentication recommendations
    • Account lockout policies for failed login attempts

Phase 5: Device Integration & Testing

  1. 1

    Step 13: Device Discovery Setup

  2. 2

    Begin connecting your security hardware to the platform using automated discovery tools.

  3. 3

    Device Discovery Interface

  4. 4

    Supported Manufacturers:

  5. 5
    • Hikvision: IP Cameras, NVRs, Thermal Cameras, Access Control
    • Dahua: Full product line compatibility with AI analytics
    • Axis Communications: PTZ and fixed cameras with audio support
    • Uniview: Enterprise security solutions and large-scale deployments
    • Hanwha Techwin: Wisenet series with advanced video analytics
    • Bosch: Professional security systems integration
    • Pelco: Sarix series cameras and management systems
    • Avigilon: High-definition surveillance solutions
  6. 6

    Device Compatibility Considerations:

  7. 7
    • ONVIF Profile S and Profile T support required
    • RTSP streaming capability for video access
    • HTTP/HTTPS API access for configuration
    • NTP support for time synchronization
  8. 8

    Step 14: Manual Device Addition

  9. 9

    Add devices individually with detailed configuration when automatic discovery is not suitable.

  10. 10

    Device Parameters:

  11. 11
    • IP Address: Static IP assignment or DHCP reservation with fixed lease
    • Port Configuration: RTSP (554), HTTP (80), HTTPS (443) port specifications
    • Authentication: Secure username and password credentials
    • ONVIF Settings: Protocol version, authentication method, and capabilities
    • Network Settings: Gateway, subnet mask, DNS servers
    • Time Configuration: NTP server settings for synchronization
  12. 12

    Manual Configuration Benefits:

  13. 13
    • Precise control over device settings
    • Troubleshooting capability for discovery issues
    • Support for devices behind complex network architectures
    • Detailed logging of configuration changes
  14. 14

    Step 15: Auto-Discovery Process

  15. 15

    Use intelligent discovery to automatically map your network and identify compatible devices.

  16. 16

    Discovery Features:

  17. 17
    • Network Scanning: Comprehensive subnet scanning with configurable ranges
    • Capability Mapping: Automatic feature identification and configuration
    • Health Assessment: Initial connectivity and performance testing
    • Batch Configuration: Apply standardized settings to multiple similar devices
    • Progress Tracking: Real-time status updates during discovery process
    • Error Handling: Detailed logging of discovery failures and resolutions
  18. 18

    Discovery Best Practices:

  19. 19
    • Run discovery during low-traffic periods
    • Segment large networks to avoid timeouts
    • Verify firewall rules allow discovery traffic
    • Test with a single device before full network scan
    • Save discovery results for documentation and auditing
  20. 20

    Step 16: Validation & Testing

  21. 21

    Perform comprehensive validation to ensure all systems are functioning correctly.

  22. 22

    System Validation

  23. 23

    Testing Checklist:

  24. 24
    • Video Streams: Real-time video verification at multiple resolutions
    • Audio Channels: Two-way audio functionality and quality testing
    • Alarm Integration: Event triggering and notification delivery verification
    • Recording: Continuous recording and event-based capture validation
    • PTZ Controls: Pan, tilt, zoom functionality for applicable cameras
    • Analytics: Motion detection and video analytics performance
    • Network Performance: Bandwidth utilization and latency measurements
  25. 25

    Validation Procedures:

  26. 26
    • Test from multiple client locations
    • Verify during different times of day
    • Document baseline performance metrics
    • Establish monitoring thresholds for alerts

Post-Setup Validation Checklist

Use this comprehensive checklist to ensure your setup is complete, functional, and ready for production use:

Account & Access

  • Email verification completed and confirmed
  • Strong password configured meeting all requirements
  • Multi-factor authentication enabled and tested
  • Account recovery options configured with backup contact methods
  • Login session tested from multiple devices and locations
  • Password reset process verified

Organization Structure

  • Organization details fully configured with accurate information
  • Primary customer created with complete contact information
  • First site established with verified geographic coordinates
  • Geographic information accurate and mapping functional
  • Business hierarchy properly established
  • Billing and contact information verified

User Management

  • Administrative roles properly defined with appropriate permissions
  • Team members invited and accounts activated
  • Permission levels appropriate for each user's responsibilities
  • Role-based access control tested and validated
  • User training materials distributed and acknowledged
  • User onboarding process completed for all team members

Device Integration

  • Hardware credentials verified and securely stored
  • Network connectivity confirmed from platform to all devices
  • Video streams functional at required resolutions
  • Audio channels operational (if applicable)
  • Alarm events processing correctly
  • Device health monitoring active
  • Time synchronization verified across all devices

System Configuration

  • NTP configuration applied to all devices
  • Firewall rules validated and documented
  • Network bandwidth requirements verified
  • Backup procedures established
  • Monitoring thresholds configured
  • Alert notifications tested

Security Validation

  • Access controls implemented according to security policy
  • Audit logging enabled and functional
  • Data encryption verified in transit and at rest
  • Compliance requirements met for your industry
  • Incident response procedures documented

Best Practices & Optimization Tips

Security First Approach

  • Password Management: Implement enterprise-grade password policies with regular rotation
  • Access Reviews: Conduct quarterly audits of user permissions and access patterns
  • Network Segmentation: Maintain separate VLANs for security systems and general business traffic
  • Multi-Factor Authentication: Require MFA for all administrative accounts
  • Least Privilege Principle: Grant minimum necessary permissions for each role

Performance Optimization

  • Bandwidth Planning: Calculate requirements based on camera resolution, frame rates, and concurrent users
  • Storage Management: Implement tiered retention policies for different content types
  • Load Balancing: Distribute monitoring workloads across multiple operators and locations
  • Quality of Service: Prioritize security traffic on network infrastructure
  • Caching Strategies: Implement edge caching for frequently accessed content

Operational Excellence

  • Standardized Naming: Establish and enforce consistent naming conventions across all assets
  • Documentation: Maintain detailed configuration records and change management procedures
  • Backup Procedures: Implement regular automated backups with offsite replication
  • Monitoring: Establish comprehensive system health monitoring and alerting
  • Training: Provide ongoing training and certification for security operators

Scalability Planning

  • Capacity Planning: Monitor resource utilization trends and plan for growth
  • Modular Architecture: Design systems to accommodate future expansion
  • Vendor Management: Maintain relationships with multiple equipment suppliers
  • Technology Roadmap: Stay informed about emerging security technologies

Compliance & Audit

  • Regulatory Compliance: Ensure systems meet industry-specific requirements
  • Audit Trails: Maintain comprehensive logging of all system activities
  • Data Retention: Implement appropriate data lifecycle management policies
  • Privacy Protection: Safeguard personally identifiable information

Troubleshooting Common Issues

Account Activation Problems

Issue: Verification email not received Solutions:

  • Check spam/junk folders
  • Add no-reply@nxgen.cloud to safe senders
  • Request new verification email
  • Verify email address accuracy

Issue: Password requirements not met Solutions:

  • Use password generator for complexity
  • Avoid common words or personal information
  • Ensure minimum 12-character length
  • Include all required character types

Login Difficulties

Issue: Cannot access login page Solutions:

  • Verify internet connectivity
  • Check firewall settings for nxgen.cloud
  • Clear browser cache and cookies
  • Try alternative browsers
  • Disable VPN if applicable

Issue: Session timeout issues Solutions:

  • Enable "Remember Me" for extended sessions
  • Configure longer session timeouts in settings
  • Check network stability
  • Verify account status with support

Organization Setup Challenges

Issue: Cannot create customer/site Solutions:

  • Verify administrative permissions
  • Check organization limits
  • Ensure required fields completed
  • Contact support for account verification

Device Integration Issues

Issue: Device discovery fails Solutions:

  • Verify network connectivity to device
  • Check firewall rules for device ports
  • Confirm correct credentials
  • Test with direct IP access
  • Verify ONVIF compatibility

Issue: Video stream not working Solutions:

  • Check RTSP port accessibility (554)
  • Verify codec compatibility
  • Test with different browsers
  • Check bandwidth limitations
  • Review camera configuration

Quick Reference Tables

Essential URLs & Ports

ServiceURL/AddressPurposePortProtocolNotes
Main Portalhttps://nxgen.cloudPrimary login and dashboard443HTTPSMain user interface
Video StreamingDevice-specificReal-time video access554RTSPCamera-specific endpoints
API Gatewayapi.nxgen.cloudREST API access443HTTPSProgrammatic access
NTP Servertime1.nxgen.cloudTime synchronization123UDPGlobal time sync
WebSocketws.nxgen.cloudReal-time events443WSSLive notifications
SMTP Relaysmtp.nxgen.cloudEmail notifications587SMTPAlert delivery

Supported Device Manufacturers

ManufacturerCamera TypesSpecial FeaturesIntegration LevelNotes
HikvisionIP, PTZ, Thermal, ANPRDeep analytics, thermal imagingFullMost popular choice
DahuaFull range, AI camerasAI analytics, facial recognitionFullComprehensive feature set
AxisProfessional series, PTZAudio integration,ZipstreamFullHigh-quality audio
UniviewEnterprise, large systemsCentralized management, AIFullScalable deployments
HanwhaWisenet series, multi-sensorMulti-sensor support, AIFullAdvanced analytics
BoschProfessional, AUTODOMEIntelligent tracking, audioFullPremium professional
PelcoSarix series, PTZSureVision, analyticsFullEnterprise focus
AvigilonHD surveillanceHigh-definition, analyticsFullPerformance optimized

User Role Permissions Matrix

FeatureSystem AdminSite ManagerSecurity OperatorViewerAuditor
User Management✅ Full
Device Configuration✅ Full✅ Site-level
Organization Setup✅ Full
Live Video Access✅ All sites✅ Assigned sites✅ Assigned sites✅ Assigned sites✅ Assigned sites
Alarm Management✅ Full✅ Site alarms✅ Active response✅ Read-only
Event Playback✅ All✅ Site events✅ Assigned events✅ Assigned events✅ All events
Reporting✅ Full✅ Site reports✅ Operational✅ Basic✅ Compliance
Configuration✅ System✅ Site settings
Audit Logs✅ Full✅ Site logs✅ Full
API Access✅ Full✅ Limited✅ Read-only

📞 Support & Next Steps

Getting Help

  • Documentation: Explore the full GCXONE Documentation
  • Video Tutorials: Access training videos
  • Community Forum: Join discussions in the community
  • Technical Support: Contact support at support@nxgen.cloud

What's Next?

Congratulations on completing your first-time setup! Here are your immediate next steps:

  1. Connect Your First Device - Follow the Device Integration Guide
  2. Configure Alarm Rules - Set up intelligent Alarm Management
  3. Configure Alarm Rules - Set up intelligent Alarm Management

Need immediate assistance? Our support team is available 24/7 at support@nxgen.cloud or through the in-platform help system.