A FOSTER WHEELER (THAILAND) LTD PROOFPOINT SECURE FILE TRANSFER SERVER USER DOCUMENTATION
|
|
- Derick McDonald
- 8 years ago
- Views:
Transcription
1 Rev 01, 15/11/2012 A FOSTER WHEELER (THAILAND) LTD PROOFPOINT SECURE FILE TRANSFER SERVER USER DOCUMENTATION CONTENTS 1.0 INTRODUCTORY INFORMATION EVERYONE TO READ I HAVE BEEN SENT A DOCUMENT, WHAT NOW? HOW DO I RETURN A DOCUMENT TO THE SENDER? I AM AN EMPLOYEE OF FOSTER WHEELER. WHAT CAN I DO? HOW DO I SEND A DOCUMENT? APPENDIX A: ERROR SCREEN SHOTS; REASONS AND RESOLUTIONS Document deletion Message withdrawal Forward message APPENDIX B: FOLDER/LARGE FILE APPLET CERTIFICATE SAMPLE Throughout we use a convention of Sender@Address.com as the person who sends the file; the Receiver@Address.com is the recipient and the document is marked Sample Document.docx. was chosen for easier reading and Foster Wheeler are not affiliated in any way with the real company If, after reading this document, you have any questions or concerns, please contact: The Foster Wheeler employee who requested you use this system.
2 1.0 INTRODUCTORY INFORMATION EVERYONE TO READ Welcome to the Proofpoint secure transfer service based on Accellion technology. You will have received an which contains a document link. Before you use the system there are a few points that need to be understood. All documents are deleted after 14 days. Documents cannot be recovered once deleted/purged. Document links sent to you are restricted to you. The system will only allow these links to be forwarded onto FW Employees who are marked at the Standard access level. An ID that is not used for 90 days will be automatically removed from the system and you will need to register an account again Passwords must be 8 characters in length. If the password is incorrectly entered 6 times it will cause the account to lock out for one hour. You will need Java 1.6.0_05 or higher installed to take advantage of the Large File Transfer utility. This utility allows for document downloads greater than 2GB and will resume interrupted downloads. This utility also allows multiple files to be uploaded in one step. Sun Java can be downloaded from The system will advise you if an update is required. FW Staff have the option to download this if they have Run Advertised Programs available. The first time the Java Applet is loaded it will require you to accept a Certificate. A sample image of the certificate is provided in Appendix B. Please accept and select ALWAYS when prompted. Authentication is persistent across the Internet Browsing session. If the Internet Browser is closed it may request you re-enter your Proofpoint credentials to access the system. If you are working on a shared or public computer, ensure you log off or close all copies of the Internet Browser once work has completed.
3 2.0 I HAVE BEEN SENT A DOCUMENT, WHAT NOW? 1. When a link contained in the is followed, it takes us to the Foster Wheeler File Transfer server. To proceed either click on the Document name or choose the (Large File Transfer) Applet link. 2. We will need to verify you are the recipient. Please enter your address.
4 3. Once you have clicked on Submit, a check is made to see if you have a registered account. If not, an is sent containing a Verification Code and a Verification Link. Copy the Verification Code into the next prompt and click on Verify The next screen will also be presented if you chose to follow the Verification Link in the rather than enter the Verification Code. Please enter a password here.
5 5. Now that your account has been created we will be taken back to the download page. You may be prompted to re-enter your and password.
6 3.0 HOW DO I RETURN A DOCUMENT TO THE SENDER? When you first registered an account on the system you will have been automatically created as a Restricted User. This level of access allows you to: Reply to the sender. Send new documents to FW Employees. A restriction is that the recipient must be a Standard level access user. Upload up to 4.88 GB of data. Audit who received your document and when it was downloaded. Delete the document you sent. Particular attention must be given to who you are able to send documents to. You cannot send to all Foster Wheeler employees. You can send documents only to licensed Standard users; the following message will advise you if the receiver is a Restricted user. As a rule, the person who sent you a document will be a Standard user and you can send documents to them. On a Project there will be a set of named individuals and it will be the Projects responsibility to advise who these are. Refer to the section 5.0 How do I send a document? on the actual steps in sending a document.
7 4.0 I AM AN EMPLOYEE OF FOSTER WHEELER. WHAT CAN I DO? There are two levels of access you will have. If you have been officially created in Proofpoint then you are now a Standard User and have the rights stated below. If instead you have been sent a document and registered your own account then you are a Restricted User and are under the limitations mentioned in the previous section. Due to licensing and security considerations on the roles, not all FW employees will have Standard access. If you want to elevate your access or require a new account, please raise a request through e-helpdesk system for a standard user account which is required your project manager approval If ICT created your account, you will have received an with login details. Your login id will be your address (forename_surname@fwuk.fwc.com) with your normal network login password. Restricted accounts use a separate password maintained in the Proofpoint system. One caveat is that if you change from a Restricted to a Standard account, the password will remain under Proofpoint control and will not change to use your network password. As a Standard user you will be able to: Send documents to anyone anywhere. There is (currently) no hard limit on the size of uploaded documents. Be aware that the receiver may be on a slow link and what takes 5 minutes to upload from the network may take several days to download. As a rule of thumb, large sets of data over 1GB should be considered as a candidate for courier on an encrypted DVD. You can forward links to other Standard users. This allows you to share a document that has not been explicitly sent to another user. Audit who received your document and when it was downloaded. Delete/Withdraw the document you sent. Invite users into the system (as a Restricted User); this method allows for their setup in Proofpoint without the need to send an initial document. By sending a document to someone you will be responsible for creating them as a Restricted account. Request a user return a document without their need to register. This method provides a one time link that the recipient can use to upload a document without their authentication being required. Refer to the section 5.0 How do I send a document? on the actual steps in sending a document.
8 5.0 HOW DO I SEND A DOCUMENT? 1. Enter the Foster Wheeler Proofpoint home page into an Internet Browser:
9 2. The default page once logged in is the SEND FILE page. NOTE: The tick box next to Files in the above image toggles between the Single File Upload option and the Multiple/Large File Upload option. We recommend you use the Ticked option unless technical issues prevent this. Single File Upload Uses the Internet Browser to perform the document upload. No changes made to the machine. Can choose only one file to be uploaded; can be repeated to include multiple files. The largest single file allowed is 2GB. Folder/Large File Applet Use Java to perform the document upload(s). It requires Sun Java or higher to work and downloads an Applet to the local machine. Some machines may not allow this. This is available to Foster Wheeler staff who are in an SCCM site (Control Panel > Run Advertised Programs). Can upload a single file greater than 2GB. If size restrictions are in effect, these will be visible on the Send File screen; if no size restriction is seen then upload sizes are restricted to available space on the Proofpoint server. Up to four files can be selected for upload at the same time. Once completed, another four can be selected and attached. You can select a Folder to upload. This will zip the contents of that folder and attach the compressed folder/file to the Proofpoint server.
10 3. The File Manager tab records three types of information: What documents you have uploaded [CABINETS tab]. What documents you have received [INBOX tab]. What documents you have sent [SEND HISTORY tab]. Each is worth exploring a little further as you can not only audit documents yet also perform further tasks, such as withdrawing a document sent in error. FILE MANAGER > CABINETS tab This area stores documents that have been uploaded into Proofpoint. Note that these documents may or may not have been sent: they may have been uploaded for use in future s. Options exist to Send a document from this page, produce a Delivery Report, and Upload a document for future use. The option exists that you can delete a document from Proofpoint in this page. If you do, any recipients of this attachment will not be able to download it. They will see an error message (Error 6.1 in Appendix A).
11 FILE MANAGER > INBOX tab Here, you can see the list of Documents sent to you and perform a download from the links. Note the Forward Files option. You can forward links to STANDARD users only. All other accounts will be denied with Error 6.3 in Appendix A. FILE MANAGER > SEND HISTORY tab Documents can be resent to the original recipient with two choices. Resend Message requires a message to be selected using the leftmost column. Resend Files requires the File Name (column) to be selected and this option allows for multiple files to be selected and placed into a new message.
12 The Withdraw Files option allows you to withdraw a message or document from use. The Recipient, if they follow the original link will receive an error message (Error 6.2 in Appendix A). The withdrawn document is no longer available to the recipient yet is still available in the CABINET for resending. The alternate option is that in the CABINET tab, the file can be deleted yet this physically removes it. There are two symbols in the above screenshot that have the same meaning whether in this page or in your Inbox. The Paper with red diagonal line signifies that the document has been withdrawn. The Trash bin icon signifies that the document has been deleted.
13 6.0 APPENDIX A: ERROR SCREEN SHOTS; REASONS AND RESOLUTIONS 6.1 Document deletion Reason Document has been deleted by the Sender from their FILE MANAGER > CABINET page. Resolution Sender will need to Upload the document and Resend. 6.2 Message withdrawal Reason Sender has withdrawn the Download Request from Recipient. Resolution Sender will need to resend original Download file or Send a new Download.
14 6.3 Forward message Reason User has performed a link Forward to another user who is not a member of the STANDARD or EXTENDED rights group. Resolution Send to an authorised user. Download file and send to user via non-proofpoint means.
15 7.0 APPENDIX B: FOLDER/LARGE FILE APPLET CERTIFICATE SAMPLE The first time the Java Folder/Large File Applet is loaded it will prompt for a certificate to be loaded. Please accept and select Always.
S-Doc User Guide. Instructions on using the Secure Document Online Courier with the CAAT Pension Plan. September 2012
S-Doc User Guide Instructions on using the Secure Document Online Courier with the CAAT Pension Plan Secure solution provided by Accellion September 2012 S E C U R E C O L L A B O R A T I O N U S E R G
More informationAccellion, Inc. 1900 Embarcadero Road Suite 207 Palo Alto, CA 94303 Tel +1 650 739-0095 Fax +1 650 739-0561. info@accellion.com
Accellion, Inc. 1900 Embarcadero Road Suite 207 Palo Alto, CA 94303 Tel +1 650 739-0095 Fax +1 650 739-0561 info@accellion.com TABLE OF CONTENTS QUICK START... 4 Create an Account... 4 Send a file... 4
More informationSEC External Guide for Using Accellion
Securities and Exchange Commission Office of Information Technology SEC External Guide for Using Accellion The Securities and Exchange Commission National Exam Program Hotline (202) 551-3925 Washington,
More informationHertSFX. User Guide V2.04. Hertfordshire s Secure File Exchange Portal. (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17
Hertfordshire s Secure File Exchange Portal User Guide V2.04 (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17 CONTENTS 1. About HertSFX... 3 2. HertSFX Limitations... 3 3. Getting Started... 3
More informationDATA PROTECTION. OneWorld Encrypted Messages USER GUIDE
DATA PROTECTION OneWorld Encrypted Messages USER GUIDE Table of Contents 1 Why use Encrypted emails?... 3 2 Activation and Login... 4 2.1 Activating Your New OneWorld Encrypted Messages Account... 4 2.2
More informationPOLICY PATROL MFT. Manual
POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated
More informationMUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE
MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE Mutual of Omaha Secure Email Client/Partner User Guide April 2015 TABLE OF CONTENTS INTRODUCTION 3 About this Guide 3 CREATING A MUTUAL OF
More informationMSGCU SECURE MESSAGE CENTER
MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and
More informationManual POLICY PATROL SECURE FILE TRANSFER
Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
More informationWordCom, Inc. Secure File Transfer Web Application
WordCom, Inc. Secure File Transfer Web Application Table of Contents 1. Introduction 2. Logging into WordCom s File Transfer Web Client 3. Toolbar buttons 4. Sending a package in Enhanced Mode (If installed
More informationNew World Construction FTP service User Guide
New World Construction FTP service User Guide A. Introduction... 2 B. Logging In... 4 C. Uploading Files... 5 D. Sending Files... 6 E. Tracking Downloads... 10 F. Receiving Files... 11 G. Setting Download
More informationState of Michigan Data Exchange Gateway. Web-Interface Users Guide 12-07-2009
State of Michigan Data Exchange Gateway Web-Interface Users Guide 12-07-2009 Page 1 of 21 Revision History: Revision # Date Author Change: 1 8-14-2009 Mattingly Original Release 1.1 8-31-2009 MM Pgs 4,
More informationAbila Grant Management. Document Management
Abila Grant Management This is a publication of Abila, Inc. Version 2014 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names
More informationTable of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...
Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...
More informationWatchDox for Windows. User Guide. Version 3.9.5
WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to
More informationUSC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9
About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but
More informationB/E Aerospace FTP Tool Training Guide
Below are the instructions on how to use our secure webenabled file transfer program (FTP). You will be able to complete your FTP transaction via the web 24/7 365 days a year. Logon: Within a web browser,
More informationU.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
More informationTitan Apps. Drive (Documents)
Titan Apps Drive (Documents) University of Wisconsin Oshkosh 7/11/2012 0 Contents What is Titan Apps?... 1 Need Help with Titan Apps?... 1 What other resources can I use to help me with Titan Apps?...
More informationWakefield Council Secure email and file transfer User guide for customers, partners and agencies
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationExternal End User Training Guide: Secure Email Extract
External End User Training Guide: Secure Email Extract Version 6 August 12, 2013 Prepared by 7/29/2013: Kris Chromey, Training Coordinator Michelle Tuscher, Vault Implementation Coordinator Edited for
More informationACCELLION WEB USERS GUIDE. Kitedrive, Kitepoint & Workspaces
ACCELLION WEB USERS GUIDE Kitedrive, Kitepoint & Workspaces Release 9.8 8/12/2013 Contents What s New... 4 Overview of the Accellion Solution... 5 Managing Files... 5 Sharing Files... 5 Getting Started...
More informationRMFT Web Client User Guide
RMFT Web Client User Guide Software Version 2.5 Supported Browsers: Browser Internet Explorer Firefox Safari Google Chrome Version 7.0 and above 3 and above 3.2 and above 1.0 and above August 7, 2011 RepliWeb,
More informationINFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR. User Guide for the RightFax Fax Service. Web Utility
INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR User Guide for the RightFax Fax Service Web Utility August 2011 CONTENTS 1. Accessing the Web Utility 2. Change Password 3. Web Utility:
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationUser s Guide For Department of Facility Services
Doc s File Server User s Guide For Department of Facility Services For Ver : 7.2.88.1020 Rev : 1_05-27-2011 Created by : Elliott Jeyaseelan 2 Table of Contents SERVER LOGIN & AUTHENTICATION REQUIREMENTS
More informationOutlook Web Access User Guide
Table of Contents Title Page How to login...3 Create a new message/send attachment...5 Remove the reading pane...10 Calendar functions...11 Distribution lists...11 Contacts list...13 Tasks...18 Options...19
More informationGetting started with OneDrive
Getting started with OneDrive What is OneDrive? OneDrive is an online storage area intended for business purposes. Your OneDrive library is managed by the University. You can use it to share documents
More informationMarcum LLP MFT Guide
MFT Guide Contents 1. Logging In...3 2. Installing the Upload Wizard...4 3. Uploading Files Using the Upload Wizard...5 4. Downloading Files Using the Upload Wizard...8 5. Frequently Asked Questions...9
More informationBackground Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
More information1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6
MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack
More informationUser Guide. IntraLinks Courier Plug-in for Microsoft Outlook
IntraLinks Courier Plug-in for Microsoft Outlook User Guide Copyright 2012 IntraLinks, Inc. Version 3.2 September 2012 IntraLinks 24/7/365 support US: 212 543 7800 UK: +44 (0) 20 7623 8500 See IntraLinks
More informationIBM Aspera Add-in for Microsoft Outlook 1.3.2
IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6
More informationSecure Message Center User Guide
Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account
More informationStewart Secure Email User Guide. March 13, 2015
Stewart Secure Email User Guide March 13, 2015 Table of Contents Introduction... 1 What is secure email?... 1 Why secure email?... 1 What is personal, non-public information?... 1 How is my data protected?...
More informationQuick Start : i-fax User Guide
Quick Start : i-fax User Guide Introduction Welcome to the i-fax System User Guide! This manual will help new users navigate i-fax System and perform common tasks. This manual is task-oriented. You will
More information2. Registration You need to register an account before you can start using sft.pearson.com. You can do this either by
1. SFT.PEARSON.COM is a web based secure file transfer utility that enables secure delivery of data of any type and size to and from anyone with a valid email address. It works very much like email but
More informationOneDrive in Office 365
OneDrive in Office 365 OneDrive is a universal tool that allows you to upload and share documents with others. You can upload Word Documents, PDFs, Excel spreadsheets, images, and other Office files. Contents
More informationWatchDox for Windows User Guide. Version 3.9.0
Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or
More informationIcebox - Sendio SPAM Filter
Icebox - Sendio SPAM Filter Sendio Icebox The Navajo Department of Information Technology (DIT) installed and implemented a SPAM filter in 2008 to capture unwanted mail before it gets to your email inbox.
More informationIcebox - Sendio SPAM Filter
Icebox - Sendio SPAM Filter Sendio Icebox The Navajo Department of Information Technology (DIT) installed and implemented a SPAM filter in 2008 to capture unwanted mail before it gets to your email inbox.
More informationOneDrive for Business User Guide
OneDrive for Business User Guide Contents OneDrive for Business and Office 365... 2 Storing University Information in the Cloud... 2 Signing in... 2 The Office 365 Interface... 3 The OneDrive App... 3
More informationTable of Contents. Page 3
Welcome to Exchange Mail Customer Full Name Your e-mail is now being delivered and stored on the new Exchange server. Your new e-mail address is @rit.edu. This is the e-mail address that you should give
More informationSOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
More informationVoice Mail Online User Guide
Voice Mail Online User Guide Overview Welcome to the online version of SaskTel Voice Mail that is now accessible from any computer with Internet access You can listen to, sort, forward and/or delete your
More informationHMRC Secure Electronic Transfer (SET)
HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government
More informationOneDrive for Business User Guide
OneDrive for Business User Guide Contents About OneDrive for Business and Office 365... 2 Storing University Information in the Cloud... 2 Signing in... 2 The Office 365 Interface... 3 The OneDrive for
More informationCryptshare for Outlook User Guide
Cryptshare for Outlook User Guide V1.6.2 Befine Solutions AG Werthmannstr. 15 79098 Freiburg i. Br. Germany Web: https://www.cryptshare.com E-Mail: info@cryptshare.com Tel.: +49 761 389 13 0 Fax: +49 761
More informationYale Secure File Transfer User Guide
Yale Secure File Transfer For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Yale Secure File Transfer User Guide This document provides information and detailed steps for using Yale's
More informationContents. Using Web Access... 1. Managing Shared Folders... 28. Managing Account Settings... 36. Index... 39
Contents Using Web Access... 1 Using the Sign In Page... 1 Signing In to Seagate Global Access... 2 Creating a Seagate Global Access Account... 2 If You Forget Your Password... 5 Viewing Central Axis Details...
More informationManaged File Transfer Utility
The Managed File Transfer Utility (MFT) is a file transfer solution that enables DOT users and external parties to transfer files securely through an intuitive interface without some of the email pitfalls.
More informationTIBCO Slingshot User Guide
TIBCO Slingshot User Guide v1.8.1 Copyright 2008-2010 TIBCO Software Inc. ALL RIGHTS RESERVED. Page 1 September 2, 2011 Documentation Information Slingshot Outlook Plug-in Important Information SOME TIBCO
More informationMasergy Fax Solutions Virtual Fax and Fax Line User Guide
Masergy Fax Solutions Virtual Fax and Fax Line User Guide Version 1 July 30, 2015 Table of Contents Getting Started 3 Installation 3 Print to Fax..9 Web to Fax.13 Receiving Fax..17 Page 2 of 17 Getting
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationHow to use Office 365 with your OneDrive File Storage Facility
How to use Office 365 with your OneDrive File Storage Facility As a student at Pembrokeshire College you will have access to Microsoft s Office 365 and the OneDrive file storage facility. Microsoft Office
More informationHow To Configure CU*BASE Encryption
How To Configure CU*BASE Encryption Configuring encryption on an existing CU*BASE installation INTRODUCTION This booklet was created to assist CU*Answers clients with the configuration of encrypted CU*BASE
More informationWeb Meetings through VPN. Note: Conductor means person leading the meeting. Table of Contents. Instant Web Meetings with VPN (Conductor)...
Table of Contents Instant Web Meetings with VPN (Conductor)...2 How to Set Up a Scheduled Web Meeting with VPN (Conductor)...6 How to Set Up a Support Web Meeting with GVSU VPN Service (Conductor)...15
More informationDropbox PTO. 4l Dropbox page 1 of 15
Dropbox 1. What is Dropbox? Dropbox is a website www.dropbox.com which enables you to store your files in a central location so that you can access them from any computer. You have control over which files
More informationEgnyte App for Android Quick Start Guide
Egnyte App for Android Quick Start Guide Introduction Welcome to the Quick Start Guide for the Egnyte App for Android. This guide will explain how to: Access files. Download content for offline access.
More informationSecure Messaging Quick Reference Guide
Secure Messaging Quick Reference Guide Overview The SHARE Secure Messaging feature allows a SHARE registered user to securely send health information to another SHARE registered user. The Secure Messaging
More informationSpambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
More informationUsing Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
More informationCan I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.
How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined
More informationRev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs
Rev. 06 JAN. 2008 Document Control User Guide: Using Outlook within Skandocs Introduction By referring to this user guide, it is assumed that the user has an advanced working knowledge of Skandocs (i.e.
More informationSecure Email - Customer User Guide How to receive an encrypted email
How to receive an encrypted email This guide has been developed for customers/suppliers of Glasgow City Council who are due to receive sensitive information from us. It will explain how to use our secure
More informationFrequently Asked Questions
Frequently Asked Questions What is Xythos? Xythos is a secure web-based file storage system that allows you to place files in a central location so they can be accessed via the internet. You can upload,
More informationGovernment buyer user manual System Requirements and Administration Version 2.0
Queensland Government etendering website Government buyer user manual System Requirements and Administration Version 2.0 July 2011 etender Help Desk phone 07 3836 0141 Table of contents 1 Introduction...
More informationecall Help Table of contents Status: July 2013
ecall Help Status: July 2013 Table of contents 1. The structure and navigation elements of ecall... 2 1.1 Main Navigation... 2 1.2 The Menu... 2 1.3 Menu sub-items... 3 1.4 Help... 3 1.5 Mandatory fields...
More informationBahamas Tax Information Exchange Portal Documentation
Bahamas Tax Information Exchange Portal Documentation This sub section of the Portal Documentation covers the following Topics: Portal Overview Portal Login Account Status Reportable Account File Processing
More informationP309 - Proofpoint Encryption - Decrypting Secure Messages Business systems
Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:
More informationOneDrive for Business User Guide
OneDrive for Business User Guide Contents OneDrive for Business and Office 365... 2 Storing University Information in the Cloud... 2 Signing in... 2 The Office 365 Interface... 3 The OneDrive App... 3
More informationjohnireland@eircom.net
Email Electronic mail is the transmission of mainly text based messages across networks. This can be within a particular network - internal mail - or between networks - external mail. The most common network
More informationNeoMail Guide. Neotel (Pty) Ltd
NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.
More informationADP Secure Email Client User Guide
ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.6 August 2014 ADP Secure Email Client User Guide August 2014 Copyright Information ADP
More informationCustomer Control Panel Manual
Customer Control Panel Manual Contents Introduction... 2 Before you begin... 2 Logging in to the Control Panel... 2 Resetting your Control Panel password.... 3 Managing FTP... 4 FTP details for your website...
More informationSecure File Transfer Help Guide
Secure File Transfer Help Guide Establish a Secure File Transfer Account When a package is sent to your email address, you will receive an email from the sender that includes a link to instructions to
More informationCOX BUSINESS ONLINE BACKUP
COX BUSINESS ONLINE BACKUP Quick start Guide www.cox.com Services and features not available in all areas and package options vary by market. Rates and speeds vary by market. Number of users and network
More informationTriCore Secure Web Email Gateway User Guide 1
TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email
More informationTransitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1
Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is required
More informationOutlook Web Access End User Guide
Outlook Web Access End User Guide Page 0 Outlook Web Access is an online, limited version of an Outlook client which can be used to access an exchange account from a web browser, without having an Outlook
More informationFAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
More informationCISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.
1/15/15 Samson V. 1. These instructions are for users who reside outside the University of Colorado Denver that receive encrypted emails from faculty or staff of UC Denver. As a part of our HIPAA compliance
More informationXythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
More informationMikogo User Guide Linux Version
Mikogo User Guide Linux Version Table of Contents Registration 3 Downloading & Running the Application 4 Start a Session 5 Join a Session 6 Features 7 Participant List 7 Switch Presenter 8 Remote Control
More informationOutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does
More informationSaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
More informationUsing the Filex File Distribution System
Using the Filex File Distribution System Contents Introduction... 1 Section 1: Creating and Sharing Folders... 1 Section 2: Sharing Files... 6 Important notes... 10 Introduction Filex is a file distribution
More informationSage 200 Web Time & Expenses Guide
Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than
More informationSecure Provider Website. Instructional Guide
Secure Provider Website Instructional Guide Operational Training 2 12/12/2012 Table of Contents Introduction... 4 How to Use the Manual... 4 Registration... 5 Update Account... 8 User Management... 10
More informationCloud Web Portal User Guide Version 2.0
Cloud Web Portal User Guide Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
More informationReceiving Secure Emails
Receiving Secure Emails This document explains how you can access emails that have been sent to you through CyberArk s Secure Email system in several simple steps. When you receive a secure email, you
More informationOUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010
OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010 CONTENTS What is Outlook Anywhere? Before you begin How do I configure Outlook Anywhere with Outlook 2010? How do I use Outlook Anywhere? I already
More informationHow to Use the File Transfer (FTP) Service
How to Use the File Transfer (FTP) Service How to Use the File Transfer (FTP) Service...1 What is a File Transfer Service?...2 First Steps...2 How to Upload Files to the File Transfer Service...2 How to
More informationFax-to-Email Application User Guide
Fax-to-Email Application User Guide Table of Contents 1 Welcome to Windstream Fax-to-Email...1 2 Getting Started with Windstream Fax-to-Email...1 2.1 Getting Started Splash Screen... 1 2.2 Navigation...
More informationZoom Instructions and Information
Zoom Instructions and Information 1. Get Zoom set up Everyone call get a free Zoom account, go to http://zoom.us Put in your Andrews University email account and click Sign Up Free Click Sign Up A box
More informationNCH Secure Web Delivery Instructions
NCH Secure Web Delivery Instructions Typically when you send an email to a person, it is sent in Clear Text and can be viewed as it traverses the internet. Email is typically not considered a good vehicle
More informationMSI Secure Mail Tutorial. Table of Contents
Posted 1/12/12 Table of Contents 1 - INTRODUCTION... 1-1 INTRODUCTION... 1-1 Summary... 1-1 Why Secure Mail?... 1-1 Which Emails Must Be Encrypted?... 1-2 Receiving Email from MSI... 1-2 Sending Email
More informationSECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011
SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 Introduction In October, 2008, the Division of Welfare and Supportive Services (DWSS) announced the introduction of secure e-mail through ASM 17-08.
More information