Proofpoint Enterprise Archive. Legal Discovery and Supervision

Size: px
Start display at page:

Download "Proofpoint Enterprise Archive. Legal Discovery and Supervision"

Transcription

1 Proofpoint Enterprise Archive Legal Discovery and Supervision May 2014

2 Proofpoint Enterprise Archive Copyright and Trademark Notices Proofpoint Archive is proprietary software licensed to you for your internal use by Proofpoint Inc. This software is Copyright Proofpoint, Inc. The copying, modification or distribution of Proofpoint Archive is subject to the terms of the Proofpoint Software License, and any attempt to use this software except under the terms of that license is expressly prohibited by U.S. copyright law, the equivalent laws of other countries, and by international treaty. Proofpoint and Proofpoint Archive are trademarks of Proofpoint Inc. McAfee is a registered trademark of McAfee, Inc. and/or its affiliates in the US and/or other countries. Virus Scanning capabilities may be provided by McAfee, Inc. Copyright 2011 McAfee, Inc. All Rights Reserved. F-Secure Anti-Virus Copyright , F-Secure Corp. VMware, the VMware boxes logo, GSX Server, ESX Server, Virtual SMP, VMotion and VMware ACE are trademarks (the Marks ) of VMware, Inc. Voltage and Secure Messaging are registered trademarks of Voltage Security, Inc. Copyright Voltage Security, Inc. All Rights Reserved. Apache 2.2 licensing information is available at Perl (Practical Extraction and Report Language) is copyrighted by Larry Wall. It is free software and it is redistributed by Proofpoint under the terms of the Artistic License that comes with the Perl Kit, Version 5.0. Source is available at Regular expression support is provided by the PCRE library package, which is open source software, written by Philip Hazel, and copyright by the University of Cambridge, England. Source is available at ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/. Some database support in this solution is provided by MySQL. Copyright 1997, 2011, Oracle and/or its affiliates. All rights reserved. Copyright , 1998, 2004 Thomas Williams, Colin Kelley Permission to use, copy, and distribute this software and its documentation for any purpose with or without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Permission to modify the software is granted, but not the right to distribute the complete modified source code. Modifications are to be distributed as patches to the released version. Permission to distribute binaries produced by compiling modified sources is granted, provided you 1. distribute the corresponding source modifications from the released version in the form of a patch file along with the binaries, 2. add special version identification to distinguish your version in addition to the base release version number, 3. provide your name and address as the primary contact for the support of your modified version, and 4. retain our contact information in regard to use of the base software. Permission to distribute the released version of the source code along with corresponding source modifications in the form of a patch file is granted with same provisions 2 through 4 for binary distributions. This software is provided "as is" without express or implied warranty to the extent permitted by applicable law. THIS SOFTWARE IS PROVIDED BY THE DEVELOPER ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE DEVELOPER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Portions of this software are Copyright The FreeType Project ( All rights reserved. Additional graphical support is provided by libgd: Portions copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring Harbor Laboratory. Funded under Grant P41-RR02188 by the National Institutes of Health. Portions copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc. Portions relating to GD2 format copyright 1999, 2000, 2001, 2002 Philip Warner. Portions relating to PNG copyright 1999, 2000, 2001, 2002 Greg Roelofs. Portions relating to gdttf.c copyright 1999, 2000, 2001, 2002 John Ellson (ellson@graphviz.org). Portions relating to gdft.c copyright 2001, 2002 John Ellson Portions relating to JPEG and to color quantization copyright 2000, 2001, 2002, Doug Becker and copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, Thomas G. Lane. This software is based in part on the work of the Independent JPEG Group. See the file README-JPEG.TXT for more information.

3 Portions relating to WBMP copyright 2000, 2001, 2002 Maurice Szmurlo and Johan Van den Brande. Permission has been granted to copy, distribute and modify gd in any context without fee, including a commercial application, provided that this notice is present in user-accessible supporting documentation. This does not affect your ownership of the derived work itself, and the intent is to assure proper credit for the authors of gd, not to interfere with your productive use of gd. If you have questions, ask. Derived works includes all programs that utilize the library. Credit must be given in user-accessible documentation. This software is provided AS IS. The copyright holders disclaim all warranties, either express or implied, including but not limited to implied warranties of merchantability and fitness for a particular purpose, with respect to this code and accompanying documentation. Although their code does not appear in gd 2.0.4, the authors wish to thank David Koblas, David Rowley, and Hutchison Avenue Software Corporation for their prior contributions. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( zlib.h interface of the zlib general purpose compression library version 1.2.2, October 3rd, 2004 Copyright (C) Jean-loup Gailly and Mark Adler This software is provided as-is, without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Jean-loup Gailly jloup@gzip.org Mark Adler madler@alumni.caltech.edu Unifont copyright Paul Hardy of Unifoundry.com (unifoundry@unifoundry.com) released under the terms of the GNU General Public License (GNU GPL) version 2.0. Tomcat, Log4j, Apache CXF Apache Copyright Apache Software Foundation Java JRE, JavaMail, Sun JavaServerFaces Copyright 1997, 2011, Oracle and/or its affiliates. All rights reserved. JBoss RichFaces Copyright Red Hat. Red Hat is a registered trademark of Red Hat, Inc. Proofpoint gratefully acknowledges contributions of the open source community to Proofpoint Archive. References to open source software used with Proofpoint Archive is collected into a single repository which can be found in the installed Proofpoint Archive package in src/opensource/opensource. That repository, consisting of the contributions from open source projects but not including the proprietary Proofpoint Archive software referred to above is a collective work that is Copyright Proofpoint Inc. You will find in this repository copies of the source code, or references of where to find, every open source program not referenced in this copyright notice, that was used in Proofpoint Archive. Copyright (c) 2005, Google Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of Google Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (c) , Daniel Stenberg, <daniel@haxx.se>. All rights reserved. Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.

4 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder. Proofpoint uses the following components which are licensed under the Apache License Version 2.0: Glassfish Jasper API - Copyright All rights reserved. SLF4j - Copyright (c) QOS.ch. All rights reserved. (Under the MIT license.) Copyright Proofpoint, Inc. Proofpoint, Inc. All rights reserved. PROOFPOINT is a trademark of Proofpoint, Inc. All other product names and brands are the property of their respective owners.

5 Preface... 4 About this Guide... 4 Prerequisite Knowledge... 4 Other Sources of Information... 4 Contacting Proofpoint Technical Support... Error! Bookmark not defined. What s New in Version Introduction... 6 Proofpoint Archive: Part of the Proofpoint Family... 6 Proofpoint Archive Overview... 6 Accessing Proofpoint Archive... 7 About the Proofpoint Archive User Interface... 7 Adding Names to Entities... 7 Setting Preferences... 7 About Legal Discovery... 9 Information Management... 9 Identification, Collection and Preservation Phases of Electronic Discovery... 9 Analysis, Review and Processing Phases of Electronic Discovery... 9 Production and Presentation Phases of Electronic Discovery About Searching How Searching Works Search Steps Types of Search Criteria Using Boolean Logic for Content Searches Saving Search Criteria Performing Searches Content-Based Searching Location-Based Searching Attachment-Based Searching People-Based Searching Date-Based Searching Communication Flow-Based Searching InfoTag-Based Searching Working with Search Results How Search Results are Presented Working with Messages Found by a Search Message Properties Saving Results in Archive Folders Copyright Proofpoint, Inc. 1

6 Creating and Modifying Legal Holds About Legal Holds Types of Legal Holds Choosing a Legal Hold Type Discovery Segmentation Impact on Legal Holds Assigning Permissions for Legal Hold Access Working with Ad-Hoc Legal Holds Working with People-Based Legal Holds Sending Legal Hold Notifications Managing Legal Holds Releasing a Hold Exporting Legal Hold Information Proofpoint Content Collection About Content Collection Adding Content Collection to a Legal Hold Managing Collection Tasks Deleting Collection Tasks and Collected Files Viewing Collected Files in the Archive Exporting Messages Encryption s Role in the Export Process Understanding the Export Process Exporting Messages from Search Result Exporting Messages from a Folder Exporting Messages to FTP Site Managing the Export Progress Completing the Export Sharing an Export Job Specifying an Export Job Retention Period Viewing Exported Messages in Outlook Performing Supervision Functions About Supervision For Reviewers: Passing and Failing Messages For Senior Reviewers: Supervision Interface For Senior Reviewers: Review Tasks For Senior Reviewers: Issue Investigation and Management Tasks Viewing the Audit Trail About the Audit Trail Viewing Audit Trail Exporting Audit Trail Copyright Proofpoint, Inc. 2

7 Appendix A Search Criteria and Indexing Search Criteria: Keywords and Phrases Search Criteria: Special Characters Indexing Size Considerations Glossary Index Copyright Proofpoint, Inc. 3

8 Preface About this Guide This guide introduces Proofpoint Enterprise Archive and provides step-by-step instructions for using the system to perform advanced searches of your own or other peoples mail stored in the archive. This guide also explains specific functions related to legal holds and message review. These functions are available only to users who have the appropriate user access. Prerequisite Knowledge This document is intended for a business user with technology experience. You should be familiar with functions common to user interfaces, such as selecting multiple items using the Shift key and checking or clearing options. You should understand your company s electronic messaging policy. While Proofpoint Archive is a critical element of any message compliance system, you play an important role in ensuring that information is used appropriately. Access to the archive of messages comes with a responsibility to understand and apply the standards outlined in your company s electronic messaging policy. To take full advantage of advanced search functionality, some basic understanding of Boolean logic is helpful. While the Proofpoint Archive user interface attempts to shield you from these complexities, understanding the difference between A and B or C and A and (B or C) helps to ensure that you achieve expected results when searching the archive. Other Sources of Information This guide covers a number of topics addressing procedural information for day-to-day use. For other information, see: Online Help: Click the "help" button to display online help for the product. Finding Your Own Messages: Explains basic search processes available from Microsoft Outlook or OWA. Intended for users who will search the archive for messages from their own mailboxes. Reports: Explains available reports and how to generate them. Contacting Support If you need help resolving an issue, please contact your local help desk. Copyright Proofpoint, Inc. 4

9 Preface What s New in Version Revised explanation of disposition placeholder. Added Internet Explorer 11 (in compatibility mode) to supported browsers. Messages archived from social networks or other sources identified by icon. Improved description of some of the UI-based procedural steps. Copyright Proofpoint, Inc. 5

10 Introduction This chapter introduces Proofpoint Enterprise Archive and its main interface elements. The chapter includes the following topics: Proofpoint Archive: Part of the Proofpoint Family 6 Proofpoint Archive Overview 6 Accessing Proofpoint Archive 7 About the Proofpoint Archive User Interface 7 Adding Names to Entities 7 Setting Preferences 7 Proofpoint Archive: Part of the Proofpoint Family Proofpoint offers a comprehensive solution for data protection and governance through an integrated, security-as-a-service platform. Complementing the Proofpoint data protection and security solutions, Proofpoint Archive allows your organization to archive and discover communication across all major communication channels including on-premise and cloud-based , instant messaging, social media and other web-based applications. Proofpoint Archive Overview Proofpoint Archive provides a complete message archiving solution that can protect your organization from legal liabilities and regulatory risks while improving storage management and end-user productivity. Its easy-to-implement, easy-to-use web interface offers fully secure archiving with robust search and discovery, supervision, and enforcement features. Proofpoint Archive securely stores your electronic messages for the retention period you specify, while keeping them fully searchable and retrievable in real-time (or with a batch process). At any time, archived messages can be easily viewed, retrieved to a user s inbox or exported to an Outlook data file or EDRM XML file. Proofpoint Archive includes features used to: design, edit and maintain an electronic messaging policy, including retention, enforcement and supervision rules perform advanced and comprehensive searches of a message s header, body, or attachments, easily meeting even the most stringent discovery requirements generate reports that help properly assess patterns and behavior, and help evaluate the effectiveness and enforcement of your policies manage mailbox sizes, removing storage-intensive attachments from Exchange while keeping those attachments accessible to Outlook users (stubbing) implement a systematic supervision process for selecting and reviewing the content of electronic messages based on your organization s policy for acceptable use of Note: Some functions are optional and may not be available to all users. Copyright Proofpoint, Inc. 6

11 Introduction Accessing Proofpoint Archive Note: Use Internet Explorer 8, 9, 10, or 11 (in compatibility mode) on the PC. You must have JavaScript enabled. 1. Open your web browser. 2. Enter the URL of the Archiving Appliance in the address bar of your web browser. The Login Screen appears. If it is blocked by a pop-up blocker, you need to allow pop-ups from this site before proceeding. Note: Your administrator can provide you with the URL of the Archiving Appliance. You may be able to access it using a similar URL to the one you use to access your mail server. For example, if you normally enter you would enter You may need to add the URL to your trusted sites list. 3. Optionally, choose the language you want used for the user interface. 4. Enter the user name and password you use to log in to your computer and click Enter. Note: You can also log in using your primary SMTP address or UPN. The Proofpoint Archive interface opens. Note: User names and passwords for Proofpoint Archive are fully integrated with your network user name and password. Whenever you change your password on the network, your password used to log in to Proofpoint Archive is also changed. After a period of 60 minutes of inactivity, you will be logged out automatically. If you attempt to perform a task using your open browser window after you have been automatically logged out, you will be prompted to log in again. Once you do, the action is performed. About the Proofpoint Archive User Interface Choose from the available modules by clicking on the module name in the top right of the interface. Choosing a module opens a new screen with a navigation menu of choices on the left. To return to the main screen where the different modules are shown, click the Proofpoint logo. When you click an item in the navigation menu, the workspace (right side of the screen) changes as a result. Adding Names to Entities When setting up some entities in Proofpoint Archive, you need to add names of Active Directory users and/or groups. The same mechanism is used everywhere this is necessary: 1. Enter all or part of the appropriate name. 3. Click Check Name. A list of suggested names appears for you to choose from, on two tabs: one listing names currently in Active Directory, the other listing names that were in Active Directory but have since been deleted. 4. Select the desired name and click Add. Setting Preferences Proofpoint Archive user interface preferences allow you to choose: the opening screen you see when you log on (for example, if you most often search messages, you can have the interface open with the E-Discovery module opened) preferred language defaults for standard (Personal Archive) or advanced (E-Discovery) searches (sort order, mailbox scope and date range) Copyright Proofpoint, Inc. 7

12 Introduction default sort order for Supervision review message lists 1. Click the in the top right corner of the interface, then click Preferences. The Preferences screen appears. 2. Click the appropriate tab and set your preferences. 3. Click Save. Copyright Proofpoint, Inc. 8

13 About Legal Discovery This chapter provides background information about electronic legal discovery. It includes the following topics: Information Management 9 Identification, Collection and Preservation Phases of Electronic Discovery 9 Analysis, Review and Processing Phases of Electronic Discovery 9 Production and Presentation Phases of Electronic Discovery 10 Information Management One of the best ways to reduce risk during legal discovery is to implement proactive information management practices. The foundation of such an approach is the establishment and enforcement of retention policies. Without clearly defined, and consistent applied, retention of information, it becomes very hard to prove that information was disposed of in the course of normal business as opposed to a malicious destruction of evidence. With Proofpoint Archive s policy component you can define, communicate and enforce retention of electronic communications. Capturing all communications in a searchable repository in an unalterable, de-duplicated form provides on-going litigation readiness. Identification, Collection and Preservation Phases of Electronic Discovery At the point that your organization suspects that a matter may arise, you want to be able to assess the risk to your organization. Collecting data from various sources just to perform early case assessment is often cost-prohibitive, so many firms fail to appreciate their position at this point. With a searchable repository, you can easily search for items that may be relevant and make appropriate plans for addressing the matter. This investigation capability also makes it easier to identify the scope of information that should be covered under a preservation order. With all content captured in the archive for some time period, it becomes the best place to implement a preservation hold (a legal hold, in Proofpoint Archive. Not only can Proofpoint Archive be used to hold existing content that is relevant to the matter, it can also be configured to actively evaluate and hold new messages as they are archived. This avoids the expensive, error-prone manual processes typically required for litigation holds. As information is collected on an ongoing basis, rather than at the point of a litigation hold, the process is quick and painless. Analysis, Review and Processing Phases of Electronic Discovery While the case progresses, you may need to perform ongoing assessment of the contents of the legal hold, for example, to prepare for meetings. The contents of all or just specific legal holds can be searched the same way as the archive can be. Advanced searching capabilities can be used to cull the dataset to focus on the relevant materials, which can then be exported to PST or EDRM XML files for integration into a litigation review platform. Copyright Proofpoint, Inc. 9

14 About Legal Discovery Production and Presentation Phases of Electronic Discovery For cases that do not require sophisticated review functionality, items that should be produced can be exported to PST or EDRM XML files for delivery directly to opposing counsel. Copyright Proofpoint, Inc. 10

15 About Searching This chapter provides an overview of the advanced searching feature in Proofpoint Archive. The chapter includes the following topics: How Searching Works 11 Search Steps 11 Types of Search Criteria 12 Using Boolean Logic for Content Searches 14 Saving Search Criteria 14 How Searching Works You can search within your own mailbox or across some or all of the mailboxes to which you have been granted access. Discovery users can search across the entire archive. If Discovery Segmentation is enabled, when searching the active archive or retention series, Discovery users can only search within the divisions to which they have been granted access. When searching their own mailbox or within legal holds, divisional filtering is not applicable. Discovery Administrators continue to have full access to the entire archive. To have Discovery Segmentation enabled, contact Proofpoint Professional Services. Searching falls into two types: standard (Personal Archive) or advanced (E-Discovery). Standard searching (Personal Archive) is intended for end users searching their own mailboxes. It offers the same features as those offered from within Outlook/OWA, and is described in Finding Your Own Messages. Advanced searching (E-Discovery) provides greater flexibility and control than standard searching. An advanced search contains one or more types of criteria that are combined, allowing you to constrain the search results to specific messages. While each type of search criteria (see "Types of Search Criteria" on page 12) is optional, a message must meet all of the specified criteria to be considered a match. To repeat a search, you can simply save its criteria and perform it again. The results of a search are displayed for you to work with. Search Steps Step 1: Open the Search Screen Open the E-Discovery module and, if necessary, in the navigation menu, click Search. The search screen opens. Note: You can choose a different language for the interface from the Language list. Copyright Proofpoint, Inc. 11

16 About Searching Step 2: Enter the Appropriate Search Criteria Specify search criteria using one of the available methods and click Search or press ENTER. For details about which special characters (such as punctuation marks) are and are not preserved in the archive, see "Appendix A Search Criteria and Indexing" on page 48. Note: You can, if you wish, simply leave all criteria blank, but this is not usually desirable because it may retrieve a large set of messages. Alternatively, you can repeat a recent or saved search: click Saved Searches (in the navigation menu) and navigate to and select the desired search name. Note: Executing a saved search rather than a new search simply applies the saved search criteria to the current data set. Since new messages are added to the archive all the time, search results are likely to be different each time you execute a saved search. Step 3: View Results Search results show both the criteria used for the search and the list of messages the search found. You can modify the search criteria and perform the search again, save the search criteria (see "Saving Search Criteria" on page 15), clear the criteria and start again, or work with the messages the search retrieved. Note: For users of Proofpoint Archive batch searching, search results are stored in a folder instead of being displayed on the screen. Types of Search Criteria You can choose to search using one or all of the following criteria: Content-Based Search Criteria Search for keywords (optionally, using Boolean AND/OR logic) that must appear in the message content, in the fields that you specify (subject, body, attachment and/or SMTP header). See "Content-Based Searching" on page 16. Location-Based Search Criteria Search for: only messages in a specific mailbox or mailboxes only messages that are part of a specific retention series only messages that are in a legal hold only messages that are in a specific legal hold, with the further ability to search only messages that were added to that hold manually only messages that are in the active archive messages in either the active archive or any legal hold. If you are searching based on retention series or active archive, you can also search the divisions to which you have access, provided that Discovery Segmentation has been enabled. See "Location-Based Searching" on page 17. Copyright Proofpoint, Inc. 12

17 About Searching Attachment-Based Search Criteria Search for messages that contain an attachment at all, or only for those with an attachment of a specific type. For example, you can search only for messages with Microsoft Word documents attached. See "Attachment-Based Searching" on page 19 This search looks only at attachment presence and/or type: if you want to search for the actual content of an attachment, use content-based search criteria. Note: You can combine attachment-based search criteria with content-based search criteria to look for a particular type of document that features particular words or phrases. For example, you can search for messages with Microsoft Word document attachments that contain the word Confidential. Date-Based Search Criteria Search for messages based on the date they were: sent archived (normally the same as the send date, but may be different for imported messages) available for disposition. See "Date-Based Searching" on page 20. Note: Messages available for disposition need to be removed from the archive using a process explained in the Policy Creation and Management document People-Based Search Criteria Search based on the people who sent or received the message (the parties), and on their participation in the communication (for example, whether they sent it or received it). Messages must match both the specified parties and their type of participation. See "People-Based Searching" on page 19. Communication Flow-Based Search Criteria Search for messages based on whether they were exchanged internally, received from an external address, or sent to an external address. See "Communication Flow-Based Searching" on page 21. InfoTag-based Scope Criteria Search for messages tagged with specific InfoTags (used to categorize a message). See "InfoTag-Based Searching" on page 21. Copyright Proofpoint, Inc. 13

18 About Searching Using Boolean Logic for Content Searches In addition to entering words and phrases, you can also use basic Boolean logic to refine or expand searches. The following elements are supported: Term AND OR Meaning Indicates that the words/phrases are both required. As spaces between words and/or phrases are treated as an AND, use of this keyword is generally not required. Usage: Bob Smith AND factory Indicates that one or the other of the words/phrases is required, but they don t both have to be in the message for it to match. Usage: Bob Smith OR factory - hyphen Indicates that the following word or phrase must not be in the message. Usage: Bob Smith factory () brackets Indicates a grouping of logical elements for evaluation. Generally brackets are only required when you combine AND and OR logic in a single search. Usage: ( Bob Smith OR Mary Jones ) AND factory ~ tilde Inserting a tilde followed by a number lets you do a proximity search to find matches within the proximity of the original results. In the example, all documents that contain search terms within 3 words of searchtermb will be found. Usage: searchterma searchtermb ~3 Note: The operators AND" and "OR" must be entered with capital letters. The lower case versions are used to search for content containing the words and and or themselves. Saving Search Criteria Your three most recent sets of search criteria are automatically saved and available by clicking Saved Searches in the navigation menu of the E-Discovery module, in a system-created folder called Recent Searches. Searches are identified by their occurrence (most recent, next most recent and third most recent). If you find yourself frequently searching for the same things, it may be useful to create the criteria for future use: each time you use a saved search (by clicking on its name), the search is carried out as defined in the criteria. The results may vary, depending on which messages are currently in the archive. To keep your saved searches organized, store the search criteria in a folder. You can optionally share a folder with other users. To create a folder to organize saved searches: 1. Open the E-Discovery module and, if necessary, in the navigation menu, click Search. 2. In the navigation menu, click Saved Searches, The Saved Searches screen appears. 3. Click New Folder. 4. When prompted, enter a name for the new folder and click OK. The folder is created. Note: Within a given level, folder names must be unique. For example, you cannot have two folders directly under Saved Searches that are both called "Complaints", but you can have a "Complaints" folder in a Customer folder and a "Complaints" folder in an Internal folder. Note: To remove or rename a folder, right-click on it and choose Delete or Rename. Copyright Proofpoint, Inc. 14

19 About Searching Saving Search Criteria To save search criteria: 1. Execute a search, then click Save Search. The Save Search screen appears. 2. In the Save search in tree, select the folder in which the search criteria should be saved. - or - Create a folder in which to save the search criteria by clicking New Folder and entering a folder name. 3. Enter a Name for your saved search criteria. Note: Within a given folder, the names of saved searches must be unique. 4. Click Save. The Save Search screen closes. Note: To remove or rename a saved search, click on the Rename. To share search criteria: 1. Save search criteria in a folder (as described above). 2. In the navigation menu, click Saved Searches. 3. Click on the on the right side of the screen and choose Share. The Sharing Details screen appears. to the right of the saved search and choose Delete or 4. Enter the user with whom you want to share the search criteria folder and click Add. 5. Click Save. Copyright Proofpoint, Inc. 15

20 Performing Searches Performing Searches This chapter explains how to perform searches using different types of criteria. It includes the following topics: Content-Based Searching 16 Location-Based Searching 17 Attachment-Based Searching 19 People-Based Searching 19 Date-Based Searching 20 Communication Flow-Based Searching 21 InfoTag-Based Searching 21 Content-Based Searching To enter individual content-based search criteria: 1. Check the options for the parts of the message (body, subject, attachment and/or header) that should be searched. 2. In the "Enter word or phrases..." field, enter the words or phrases (in quotation marks) to search for. Note: You can use basic Boolean logic in your searches. See "Using Boolean Logic for Content Searches" on page Click Search. To enter a set of keywords as content-based search criteria: 1. Click Helper (to the right of the field used to enter words or phrases). The Keyword Editor screen appears. 2. Enter the keywords to search for. Multiple words on one line are interpreted as a phrase. Note: You can paste a list of keywords from the Clipboard into the Find box. 3. Choose whether the search should include exact matches, exact matches and potential matches, or only exact matches (see below). 4. Click Save. The keywords you specified appear, in the correct syntax, In the "Enter word or phrases..." field. 5. To add additional words/phrases for searching, click Helper again. Calling out potential matches is useful when you have messages that could not be fully indexed by Archive. There are several reasons why a message cannot be fully indexed: a message is encrypted, an attachment is corrupted, an attachment is password protected, and so on. When searching for a message, the default behavior for Archive is to return only messages that match exactly the keyword search criteria. But with advanced search, you have the option to modify the default behavior to include potential matches or only return potential matches. This is useful when potential matches need to be identified so that they can be processed separately. The Keyword Editor contains a Query Builder function: 1. In the Keyword Editor, click Query Builder. The keywords specified in the editor (if any) appear in the bottom portion of the screen. You can enter or paste from the clipboard additional keywords in the top portion of the screen. 2. Choose whether the message must contain one (OR) or all (AND) of the keywords. 3. Choose how the two lists work together: messages must either match both lists (AND) or either list (OR). 4. Click Save. Copyright Proofpoint, Inc. 16

21 Performing Searches Location-Based Searching Searching Based on Retention Series or Legal Hold 1. Click Active Archive. A new screen appears. 2. Choose the scope of the search. To search: within a specific retention series, select it from the retention list both the active archive and all legal holds, click Active archive and all legal hold (Discovery Administrators only) just legal holds click All legal holds (Discovery Administrators only) within a specific legal hold select from the holds list and choose whether or not you want to show only items manually added by users Note: When searching based on retention series or active archive, you can also search the divisions to which you have access, provided that Discovery Segmentation has been enabled. Divisions that are grayed out in the list are those to which you do not have access. Note: If searching across all legal holds, the same message may be found in several of those holds. As a result, the message will appear several times in the results list. If in place of a message you see this message has been disposed, the message has been removed from the legal hold (because it belonged to a custodian who has been removed): such messages cannot be viewed. 3. Click Save. The selection screen closes. 4. If desired, specify the mailboxes you want to search by following one of the procedures below. Specifying mailboxes will limit your search results to those messages in the legal hold that are associated with those mailboxes. Typically, specifying mailboxes requires you to be a Discovery user, however, if you have been granted access to a legal hold, you can search all mailboxes in that legal hold. Note: Even if Discovery Segmentation is enabled, it is not applicable if you are searching your own mailbox. You can search a maximum of 1024 mailboxes. Searching Imported Data Pending Verification (Discovery Administration Users Only) Note that messages found using these procedures cannot be exported, retrieved, or copied to an archive folder. 1. Click Active Archive. A new screen appears. 2. Click Imports in Staging - Archive. - or - Click Imports in Staging - Legal Hold and choose the legal hold in which to search. 3. Click Save. Copyright Proofpoint, Inc. 17

22 Performing Searches Searching Based on Mailbox To search all or just your mailbox: 1. Click All Mailboxes (just below the field used to enter words or phrases). A new screen appears. 2. To search all mailboxes, leave the default All mailboxes selected. - or - To search just your mailbox, click My Mailbox. 3. Click Save. The selection screen closes. To search specific mailboxes by group: 1. Click All Mailboxes (just below the field used to enter words or phrases). A new screen appears. 2. Click Only search in the following mailboxes. 3. Specify the group name, following the steps in "Adding Names to Entities" on page 7. All mailboxes belong to members of that group are included in the search. Note: You can search on a maximum of 1024 mailboxes. 4. Click Save. The selection screen closes. To search specific mailboxes by user: 1. Click All Mailboxes (just below the field used to enter words or phrases). A new screen appears. 2. Click Only search in the following mailboxes. 3. Copy and paste up to 150 SAM account names or addresses into the box (duplicates are automatically removed). - or - Specify the user name, following the steps in "Adding Names to Entities" on page Repeat until all mailboxes are added. Note: The mailboxes that you can see are controlled by the permissions assigned to your user account. You can search on a maximum of 1024 mailboxes. 5. Click Save. The selection screen closes. To search mailboxes identified in imported list (Discovery Users Only): 1. Prepare the list of mailboxes to be imported, with a maximum of 150 SAM account names or addresses separated by newlines or semicolons (;). Optionally, copy the names to the clipboard. 2. Click All Mailboxes. A new screen appears. 3. Click Import. 4. Click Browse to navigate to the location of the file containing mailboxes to be searched and click Open. - or - Click Paste from clipboard and paste the list of mailboxes. The names appear in the box (duplicates are automatically removed). 5. Continue to import or add mailboxes as desired, to a maximum of 1024 mailboxes. 6. Click Save. The selection screen closes. Copyright Proofpoint, Inc. 18

23 Performing Searches Attachment-Based Searching 1. Check the Has Attachment checkbox. 2. Choose the scope of the search. To search for messages with: any type of attachment, choose <any type> (the default) a specific type of attachment, choose a file type from the list or, if the type is not shown, choose Other from the list and then, in the text area, type the file extension of attachments for which to search Note: You can enter multiple file extensions with a space between them. Do not enter periods or wildcards, such as *. 3. Click Search. People-Based Searching 1. From the list under the Mailbox/Archive selection area, select the type of participation (see below). 2. You are prompted to choose the party for the search: click Add and identify the party as described below. If you chose Then you need to Internal Person Department, Role, Partner (searches for belonging to the people in the selected user group) External Person Display Name (searches for messages sent or received by the person or group matching the selected display name) Domain (searches for messages sent by anyone in the selected domain) Specify the name - or Enter a personal Internet address for the person. From the Select a list, choose the department, role or partner. Enter the person s Internet address and click Add. Repeat for additional addresses for the person. Enter the display name. Enter the Internet domain name. When evaluating a message, if any of the elements that define a party match, then the message is said to include that person. For example, if a party was defined as being the Active Directory user John Smith with the Internet mail address jsmith@hotmail.com, a message sent to either jsmith@hotmail.com or any of the addresses associated with the Active Directory user John Smith would be said to include that party. 3. Click Save. The screen closes and the selected party is added to the list. Specifying the Participation To do this Find messages where at least one of the selected parties is either the sender or recipient of the message. Use if you don t care whether the parties are senders or recipients. Select this criteria From or To ANY of these parties Find messages where all of the selected parties are either the sender or recipient of the message. Use if you want to match only messages where all the specified parties are participating as either senders or recipients. From or To ALL of these parties Find messages where at least one of the specified parties is the sender of the From ANY of these Copyright Proofpoint, Inc. 19

24 Performing Searches To do this message. Use if you want to match only messages coming from specific parties. Find messages where at least one of the specified parties is the recipient of the message. Use if you want to match only messages received by specific parties. Find messages where all of the specified parties are the recipient of the message. Use if you want to match only messages where all of the parties are recipients. Select this criteria senders To ANY of these recipients To ALL of these recipients Using the From ANY of these senders criteria to identify the senders, find messages only where one of the specified parties is a recipient of the message. Using the From ANY of these senders criteria to identify the senders, find messages only where all of the specified parties are a recipient of the message. From ANY of these senders & To ANY of these recipients From ANY of these senders & To ALL of these recipients Find messages exchanged between the selected roles or departments. Use if you want to find messages exchanged between any member of a role or department and any member of another role or department. Between ANY of these role/department pairs Note: A "sender" is the name shown in the FROM field of the message. A recipient is a name shown in any of the TO, CC or Bcc fields. Date-Based Searching Entering Sent or Archive date-based search criteria: 1. From the Date/Time list, choose the type of date criteria. To search based on the date messages were sent, choose Send Date. - or - To search based on the date messages were added to the archive, choose Archive Date. 2. Leave the default of "any date" or choose one of the following modifiers: To specify... Choose... the date that messages must have been sent on the last date that messages must have been sent on the earliest date that messages must have been sent on the earliest and the latest date that a message must have been sent on messages sent during the current week messages sent during the current month messages sent during the current year On Before After Between This Week This Month This Year. messages sent during the last specific number of days Last 30 days. Last 90 days. Last year The system displays the appropriate number of calendar fields (for example, if you chose Between, it will display two fields). 3. Click in the appropriate calendar field, then click the desired date. Use the arrow keys if necessary to navigate through months and years. Note: Between date range criteria are inclusive of the end dates. All other date range criteria are exclusive of the specified date. If you specify a search for anything between today and tomorrow, messages from both days will be included. If you specify a search for anything before or after today, today s messages are NOT included. 4. Click Search. Copyright Proofpoint, Inc. 20

25 Performing Searches To enter Disposition or Retention date-based search criteria: 1. From the Date/Time list, choose the type of date criteria: To search based on the date messages can be disposed, choose Target Disposition Date. - or - To search based on the date messages were archived for indefinite retention, choose Indefinite Retention. 2. Choose the date as above. Note: You cannot search based on target disposition date if searching within a legal hold, since all items in the legal hold have the same disposition date. Communication Flow-Based Searching From the Flow list, choose: Internal (messages sent between people within the company) Inbound (messages sent from an external address) Outbound (messages sent by someone within the company to at least one external address) InfoTag-Based Searching In the InfoTags area, click beside one or more InfoTags. Clicking sets one of three possible states: selected, excluded and not selected. Select InfoTags to retrieve any messages tagged with any of the selected InfoTags (for example, if you select both News and Travel, you retrieve messages tagged with either of those InfoTags). Exclude InfoTags to ignore messages tagged with any of the excluded InfoTags. Copyright Proofpoint, Inc. 21

26 Working with Search Results This chapter explains the various functions that can be performed on messages retrieved by a search. It includes the following topics: How Search Results are Presented 22 Working with Messages Found by a Search 23 Message Properties 23 Saving Results in Archive Folders 24 How Search Results are Presented By default, the messages found by the search are listed on the left of the search screen, and, once a message is selected, the Preview of the selected message appears on the right. The toolbar can be used to change this. Note: Messages from social networks or other sources are identified by a unique icon. The list shows basic information about 15 messages at a time, sorted by the criteria specified in your preferences (see "Setting Preferences" on page 7). To move through the pages of a multi-page result list, use the navigation buttons at the bottom of the list. Note: If your search retrieves many matches, consider narrowing your search criteria to avoid having to navigate through pages. The results list is temporary and will be replaced by your next search. To gather the results for further analysis, save the search results in a folder: see "Saving Results in Archive Folders" on page 24 Copyright Proofpoint, Inc. 22

Email Archiving Service Finding Your Own Messages Guide

Email Archiving Service Finding Your Own Messages Guide Email Archiving Service Finding Your Own Messages Guide This guide is for end-users. It explains how to search for your own messages within the email archive using Outlook and Outlook Web Access (OWA).

More information

Release 6.3 Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 www.proofpoint.com

Release 6.3 Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 www.proofpoint.com Proofpoint Messaging Security Gateway Virtual Edition Installation Guide Release 6.3 Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 www.proofpoint.com Website:www.proofpoint.com Toll-free telephone:

More information

Release 7.0 Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94086 www.proofpoint.com

Release 7.0 Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94086 www.proofpoint.com Proofpoint Protection Server Reference Guide Proofpoint Protection Server Proofpoint Messaging Security Gateway Proofpoint Messaging Security Gateway Virtual Edition Release 7.0 Proofpoint, Inc. 892 Ross

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

RSA Two Factor Authentication

RSA Two Factor Authentication RSA Two Factor Authentication VERSION: 1.0 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 16 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc..

More information

Netmail Search for Outlook 2010

Netmail Search for Outlook 2010 Netmail Search for Outlook 2010 Quick Reference Guide Netmail Search is an easy-to-use web-based electronic discovery tool that allows you to easily search, sort, retrieve, view, and manage your archived

More information

System Center Virtual Machine Manager 2012 R2 Plug-In. Feature Description

System Center Virtual Machine Manager 2012 R2 Plug-In. Feature Description System Center Virtual Machine Manager 2012 R2 Plug-In Feature Description VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

Message Archiving. Microsoft Exchange Journaling Configuration Guide. For Exchange Server 2007 and 2010

Message Archiving. Microsoft Exchange Journaling Configuration Guide. For Exchange Server 2007 and 2010 Message Archiving Microsoft Exchange Journaling Configuration Guide For Exchange Server 2007 and 2010 Google Message Discovery Postini Message Archiving Google, Inc. 1600 Amphitheatre Parkway Mountain

More information

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

Log Insight Manager. Deployment Guide

Log Insight Manager. Deployment Guide Log Insight Manager Deployment Guide VERSION: 3.0 UPDATED: OCTOBER 2015 Copyright Notices Copyright 2002-2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Message Archiving. Microsoft Exchange Journaling Configuration Guide. For Exchange Server 2000 and 2003

Message Archiving. Microsoft Exchange Journaling Configuration Guide. For Exchange Server 2000 and 2003 Message Archiving Microsoft Exchange Journaling Configuration Guide For Exchange Server 2000 and 2003 Google Message Discovery Postini Message Archiving Google, Inc. 1600 Amphitheatre Parkway Mountain

More information

RSA Two Factor Authentication. Feature Description

RSA Two Factor Authentication. Feature Description RSA Two Factor Authentication Feature Description VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

RSA Data Security, Inc. Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm.

RSA Data Security, Inc. Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. Adobe Reader for ios, Android, and Adobe Reader Touch for Windows may contain one or more of the following Third Party Software Notices and/or Additional Terms and Conditions RSA Data Security, Inc. Portions

More information

Proofpoint Administration Guide

Proofpoint Administration Guide Proofpoint Administration Guide Proofpoint Protection Server Proofpoint Messaging Security Gateway Proofpoint Messaging Security Gateway Virtual Edition Release 7.0 Proofpoint, Inc. 892 Ross Drive Sunnyvale

More information

Message Archiving User Guide

Message Archiving User Guide Message Archiving User Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com RESTRICTION ON USE, PUBLICATION,

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

NearPoint for Microsoft Exchange Server

NearPoint for Microsoft Exchange Server Information Immediacy, Discovery, & Continuity 4.2 NearPoint for Microsoft Exchange Server Archive Self-Service Retrieve (SSR) Client User s Guide 4.2 Copyright 2003-2010, Mimosa Systems, Inc. All Rights

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only

More information

Microsoft SharePoint

Microsoft SharePoint Microsoft SharePoint VERSION: 1.1 UPDATED: JULY 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 13 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc.. All rights

More information

Email Archiving Service Overview and Setup Guide

Email Archiving Service Overview and Setup Guide Email Archiving Service Overview and Setup Guide This guide is for the IT administrator the person that sets up the appliance and deals with Exchange and Active Directory. Service Version: ArchivingP_3.5

More information

Email Data Protection. Administrator Guide

Email Data Protection. Administrator Guide Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,

More information

Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm.

Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. The Apache Software License, Version 1.1 Copyright (c) 1999-2001 The Apache Software Foundation. All rights reserved. 3.

More information

Virtual LoadMaster for Microsoft Hyper-V

Virtual LoadMaster for Microsoft Hyper-V Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8 VERSION: 1.3 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 20 Copyright

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Port Following. Port Following. Feature Description

Port Following. Port Following. Feature Description Feature Description VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

How To Use Nearpoint Ediscovery On A Pc Or Macbook

How To Use Nearpoint Ediscovery On A Pc Or Macbook NearPoint ediscovery Option User's Guide Software Release 4.2 Copyright 2003-2010, Mimosa Systems, Inc. All Rights Reserved. Mimosa Systems, Inc. 3200 Coronado Drive Santa Clara, CA 95054 www.mimosasystems.com

More information

Webmail Instruction Guide

Webmail Instruction Guide Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net All rights reserved. Redistribution

More information

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8 Installation Guide VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc..

More information

Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20

Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20 Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed

More information

USER GUIDE: MANAGING NARA EMAIL RECORDS WITH GMAIL AND THE ZL UNIFIED ARCHIVE

USER GUIDE: MANAGING NARA EMAIL RECORDS WITH GMAIL AND THE ZL UNIFIED ARCHIVE USER GUIDE: MANAGING NARA EMAIL RECORDS WITH GMAIL AND THE ZL UNIFIED ARCHIVE Version 1.0 September, 2013 Contents 1 Introduction... 1 1.1 Personal Email Archive... 1 1.2 Records Management... 1 1.3 E-Discovery...

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

OWA - Outlook Web App

OWA - Outlook Web App OWA - Outlook Web App Olathe Public Schools 0 Page MS Outlook Web App OPS Technology Department Last Revised: May 1, 2011 Table of Contents MS Outlook Web App... 1 How to Access the MS Outlook Web App...

More information

NetWrix Exchange Mail Archiver Version 1.5 Administrator Guide

NetWrix Exchange Mail Archiver Version 1.5 Administrator Guide NetWrix Exchange Mail Archiver Version 1.5 Administrator Guide Contents 1. Introduction... 3 1.1. What is the NetWrix Exchange Mail Archiver?...3 1.2. Product Architecture...4 1.3. Licensing...5 1.4. System

More information

Merak Outlook Connector User Guide

Merak Outlook Connector User Guide IceWarp Server Merak Outlook Connector User Guide Version 9.0 Printed on 21 August, 2007 i Contents Introduction 1 Installation 2 Pre-requisites... 2 Running the install... 2 Add Account Wizard... 6 Finalizing

More information

Adobe DNG Flat Field Plug-in (1.0) Software Notices and/or Additional Terms and Conditions

Adobe DNG Flat Field Plug-in (1.0) Software Notices and/or Additional Terms and Conditions Adobe DNG Flat Field Plug-in (1.0) Software Notices and/or Additional Terms and Conditions This page and/or pages linked from this page contain Third Party Software Notices and/or Additional Terms and

More information

OWA User Guide. Table of Contents

OWA User Guide. Table of Contents OWA User Guide Table of Contents 1. Basic Functionality of Outlook Web Access... 2 How to Login to Outlook Web Access (OWA)... 2 Change Password... 3 Mail... 3 Composing Mail... 5 Attachments - Web Ready

More information

Archive Attender Version 3.5

Archive Attender Version 3.5 Archive Attender Version 3.5 End User Quick Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com End User Quick Guide Table of Contents What is Archive Attender?... 3 How it Works... 3 What happens

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Quick Start Program Advanced Manual ContactWise 9.0

Quick Start Program Advanced Manual ContactWise 9.0 Quick Start Program Advanced Manual ContactWise 9.0 Copyright 2010 GroupLink Corporation. All Rights Reserved. ContactWise is a registered trademark of GroupLink Corporation. All other trademarks are the

More information

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header. Using Webmail Technical Manual: User Guide The Webmail Window To save an attachment: 1. Click once on the attachment name. Or, if there are multiple attachments, click the Save icon to save all attachments

More information

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide BlackBerry Web Desktop Manager Version: 5.0 Service Pack: 4 User Guide Published: 2012-10-03 SWD-20121003174218242 Contents 1 Basics... 5 Log in to the BlackBerry Web Desktop Manager... 5 Connect your

More information

How To Use The Policy Patrol Archiver Server

How To Use The Policy Patrol Archiver Server POLICY PATROL ARCHIVER FOR ADMINISTRATORS Manual MANUAL Policy Patrol Archiver For Administrators This manual, and the software described in this manual, are copyrighted. No part of this manual or the

More information

Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG...

Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... Table of Contents INTRODUCTION... 2 HOME PAGE... 3 Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... 11 Raising a Service Request... 12 Edit the Service Request...

More information

formerly Help Desk Authority 9.1.2 Quick Start Guide

formerly Help Desk Authority 9.1.2 Quick Start Guide formerly Help Desk Authority 9.1.2 Quick Start Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

GEO Sticky DNS. GEO Sticky DNS. Feature Description

GEO Sticky DNS. GEO Sticky DNS. Feature Description GEO Sticky DNS Feature Description VERSION: 5.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Sonian Cloud-Powered Archive Service. End User (My Archive) Guide

Sonian Cloud-Powered Archive Service. End User (My Archive) Guide Sonian Cloud-Powered Archive Service End User (My Archive) Guide Software Release Date: April 2012 Legal Notices Warranty The only warranties for Sonian products and services are set forth in the express

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Hosted Mail Archiving (HMA) User Guide

Hosted Mail Archiving (HMA) User Guide Log in to Personal Archive To log in to Personal Archive Hosted Mail Archiving (HMA) User Guide 1. Please click on the archive link in your HMA activation confirmation email to access your archive. Once

More information

Boost Libraries Boost Software License Version 1.0

Boost Libraries Boost Software License Version 1.0 Citrix AppDNA Listing of Open Source Components The following is a listing of open source licensed software which may accompany AppDNA. Each of the components listed below may be redistributed under the

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

HIGHSEC eid App Administration User Manual

HIGHSEC eid App Administration User Manual HIGHSEC eid App Administration User Manual Contents 1 Introduction... 3 2 Application overview... 3 3 Managing HIGHSEC eid App... 3 3.1 Deleting card pairings... 4 4 Inspecting smart card contents... 5

More information

Email access via the Internet. Outlook Web Access

Email access via the Internet. Outlook Web Access Email access via the Internet Outlook Web Access SiX Document Title/ Search Keyword(s): Email access via the Internet Outlook Web Access Service Group: E-Learning & Information Management Contact Details:

More information

Microsoft Dynamics GP. Electronic Signatures

Microsoft Dynamics GP. Electronic Signatures Microsoft Dynamics GP Electronic Signatures Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without

More information

Sample- for evaluation purposes only! Advanced Outlook. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.

Sample- for evaluation purposes only! Advanced Outlook. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2012 Advanced Outlook TeachUcomp, Inc. it s all about you Copyright: TeachUcomp, Inc. Phone: (877) 925-8080 Web: http://www.teachucomp.com

More information

SDN Adaptive Load Balancing. Feature Description

SDN Adaptive Load Balancing. Feature Description SDN Adaptive Load Balancing Feature Description VERSION: 4.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Enterprise Manager to Enterprise Console upgrade guide. Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.

Enterprise Manager to Enterprise Console upgrade guide. Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7. Enterprise Manager to Enterprise Console upgrade guide Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.1 Document date: July 2011 Contents 1 About this guide...3 2 What are

More information

FileMaker Security Guide The Key to Securing Your Apps

FileMaker Security Guide The Key to Securing Your Apps FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account

More information

Job Status Guide 3.0

Job Status Guide 3.0 Job Status Guide 3.0 ii Copyrights and Trademark Notices Copyright 2011 Telestream, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, altered, or translated

More information

Welcome to InFixi Exchange Mailbox Recovery Software. Help Guide. Exchange Mailbox recovery software

Welcome to InFixi Exchange Mailbox Recovery Software. Help Guide. Exchange Mailbox recovery software Welcome to InFixi Exchange Mailbox Recovery Software Help Guide Exchange Mailbox Recovery Software 1 Introduction about InFixi Exchange Mailbox Recovery Software InFixi Exchange Mailbox Recovery software

More information

DCA. Document Control & Archiving USER S GUIDE

DCA. Document Control & Archiving USER S GUIDE DCA Document Control & Archiving USER S GUIDE Decision Management International, Inc. 1111 Third Street West Suite 250 Bradenton, FL 34205 Phone 800-530-0803 FAX 941-744-0314 www.dmius.com Copyright 2002,

More information

TIBCO Slingshot User Guide

TIBCO Slingshot User Guide TIBCO Slingshot User Guide v1.8.1 Copyright 2008-2010 TIBCO Software Inc. ALL RIGHTS RESERVED. Page 1 September 2, 2011 Documentation Information Slingshot Outlook Plug-in Important Information SOME TIBCO

More information

Outlook Live Basics. for Students

Outlook Live Basics. for Students Outlook Live Basics for Students 2 Outlook Live for Support Staff Outlook Live for Support Staff 3 Getting Started... 6 Signing into your Outlook Account... 6 Migrating your Account... 8 Address Book...

More information

Exchange 2003 Standard Journaling Guide

Exchange 2003 Standard Journaling Guide Exchange 2003 Standard Journaling Guide Websense Email Security Solutions v7.3 Websense Advanced Email Encryption Copyright 1996-2011 Websense, Inc. All rights reserved. This document contains proprietary

More information

MParchive Version 3. Administrator Guide. May 2012

MParchive Version 3. Administrator Guide. May 2012 MParchive Version 3 Administrator Guide May 2012 Contents Preface...................................................................................... 6 About this guide...........................................................................

More information

PureMessage for Microsoft Exchange Help. Product version: 4.0

PureMessage for Microsoft Exchange Help. Product version: 4.0 PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9

More information

How To Archive A Mail From A Mailbox On A Server On A Password Protected (Smtp) On A Pc Or Mac (Mailbox) On An Ipa (For A Password Safemail) On Your Pc Or Ipa On A Mac

How To Archive A Mail From A Mailbox On A Server On A Password Protected (Smtp) On A Pc Or Mac (Mailbox) On An Ipa (For A Password Safemail) On Your Pc Or Ipa On A Mac Symantec Enterprise Vault Setting up SMTP Archiving 11.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

DocuShare User Guide

DocuShare User Guide DocuShare User Guide Publication date: April 2011 This document supports DocuShare Release 6.6.1 Prepared by: erox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California 94304 USA

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

The LSUHSC N.O. Email Archive

The LSUHSC N.O. Email Archive The LSUHSC N.O. Email Archive Introduction The LSUHSC N.O. email archive permanently retains a copy of all email items sent and received by LSUHSC N.O. Academic email users. Email items will be accessible

More information

Microsoft Office Outlook 2013

Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Navigating the Outlook Interface The Components of the Outlook 2013 Interface Component Title bar Quick Access Toolbar The ribbon Ribbon tabs Folder pane Content pane Sort

More information

Activelock Customer Management 1.0

Activelock Customer Management 1.0 Activelock Customer Management 1.0 Mark Bastian January 19, 2009 Contents Overview... 3 Activelock EULA... 3 Activelock Customer Management Forms... 4 Main Menu... 4 Customer Management... 5 New Software

More information

Colligo Email Manager 6.0. Connected Mode - User Guide

Colligo Email Manager 6.0. Connected Mode - User Guide 6.0 Connected Mode - User Guide Contents Colligo Email Manager 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Email Manager 2 Checking for Updates 3 Updating Your License

More information

Email -- Reading and Printing Email

Email -- Reading and Printing Email Email -- Reading and Printing Email Checking for New Email By default, webmail checks for new email automatically. If you want to manually check for new email, click the Check Email button. Or, click the

More information

Personal Archive User Guide

Personal Archive User Guide Personal Archive User Guide Personal Archive gives you an unlimited mailbox and helps you quickly and easily access your archived email directly from Microsoft Outlook or Lotus Notes. Since Personal Archive

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Outlook Web Access User Guide

Outlook Web Access User Guide Table of Contents Title Page How to login...3 Create a new message/send attachment...5 Remove the reading pane...10 Calendar functions...11 Distribution lists...11 Contacts list...13 Tasks...18 Options...19

More information

Sophos for Microsoft SharePoint Help. Product version: 2.0

Sophos for Microsoft SharePoint Help. Product version: 2.0 Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

Email Archiving Administrator Guide

Email Archiving Administrator Guide Email Archiving Administrator Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2012 McAfee, Inc. This document contains information that is proprietary and confidential

More information

Clearview Customer Web Access

Clearview Customer Web Access Clearview Customer Web Access This document outlines the Clearview Process flows for Logging in to Customer Web Access Service Listing o Service Order Desktop o Service Tasks o Viewing Service Schedules

More information

Email Track and Trace. Administration Guide

Email Track and Trace. Administration Guide Administration Guide Track and Trace Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

BlackBerry Desktop Manager Version: 1.0.1. User Guide

BlackBerry Desktop Manager Version: 1.0.1. User Guide BlackBerry Desktop Manager Version: 1.0.1 User Guide SWD-857131-0929025909-001 Contents Basics... 2 About BlackBerry Desktop Manager... 2 System requirements: BlackBerry Desktop Manager... 2 Set up your

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2013. Mastering Outlook Made Easy for Lawyers CPE Edition v.2.

A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2013. Mastering Outlook Made Easy for Lawyers CPE Edition v.2. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2013 Mastering Outlook Made Easy for Lawyers CPE Edition v.2.0 TeachUcomp, Inc. it s all about you Copyright: Copyright 2013 by TeachUcomp,

More information

Outlook 2007 - Exchange

Outlook 2007 - Exchange Information Technology MS Office Outlook 2007 Users Guide Outlook 2007 - Exchange Mail, Calendar, Contacts, Notes & Tasks Folders IT Training & Development 677-1700 training@csun.edu TABLE OF CONTENTS

More information

Table of Contents INTRODUCTION...2 HOME PAGE...3. Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...

Table of Contents INTRODUCTION...2 HOME PAGE...3. Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG... Table of Contents INTRODUCTION...2 HOME PAGE...3 Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...12 REQUEST...14 Request List View... 15 Creating a New Incident...

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Outlook Web Access (OWA) User Guide

Outlook Web Access (OWA) User Guide Outlook Web Access (OWA) User Guide September 2010 TABLE OF CONTENTS TABLE OF CONTENTS... 2 1.0 INTRODUCTION... 4 1.1 OUTLOOK WEB ACCESS SECURITY CONSIDERATIONS... 4 2.0 GETTING STARTED... 5 2.1 LOGGING

More information

Administrator Operations Guide

Administrator Operations Guide Administrator Operations Guide 1 What You Can Do with Remote Communication Gate S 2 Login and Logout 3 Settings 4 Printer Management 5 Log Management 6 Firmware Management 7 Installation Support 8 Maintenance

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book is furnished under a

More information

MailStore Server 5.0 Documentation

MailStore Server 5.0 Documentation MailStore Server 5.0 Documentation 2010 deepinvent Software GmbH 24. May 2011 Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners.

More information

Live Office. Personal Archive User Guide

Live Office. Personal Archive User Guide Live Office Personal Archive User Guide Document Revision: 14 Feb 2012 Personal Archive User Guide Personal Archive gives you an unlimited mailbox and helps you quickly and easily access your archived

More information