Frequently Asked Questions
|
|
- Willa Woods
- 8 years ago
- Views:
Transcription
1 Privacy Security Compliance Frequently Asked Questions Encryption Services Watch our video tutorials at Ave B NW Suite 20 Winter Haven, FL
2 Table of Contents General Information What is Protected Trust Encryption? Can I still use my own address? How can I access my Protected Trust Encryption? What Operating Systems is Protected Trust Encryption compatible with? Which method of encryption is used with Protected Trust Encryption? What regulations can Protected Trust Encryption help me comply with? What are the differences between a free user and a business user? How much storage is included? How do I contact customer support? Protected Trust Encryption Can I only send protected messages to other registered users? How can I reset my password? What is the maximum size of a message that is supported by Protected Trust Encryption? What if I forgot the answer to my shared secret? What is the maximum number of recipients per message that is supported by Protected Trust Encryption? How can I verify that the intended recipient viewed my protected message? How can I delete a protected message? How can I forward a protected message? What does it mean to revoke a protected message? Can I un-expire a protected message? What should I do, if I do not receive an invitation ? Microsoft Outlook Add-in How do install and uninstall the Protected Trust Encryption Outlook add-in for Microsoft Outlook? What versions of Outlook is the add-in compatible with? How do I check if I have the latest update of the Protected Trust Encryption Outlook Add-In? Contact Support Ave B NW Suite 20 Winter Haven, FL
3 General Information What is Protected Trust Encryption? Protected Trust Encryption is an encryption framework that enables organizations to securely communicate electronic data via a simple user experience. We provide a powerful messaging platform that offers confidence that only authorized users have access to protected information reducing the hassle of encryption while complying with the latest governmental regulatory standards keeping information safe through communications. Can I still use my own address? Yes, you will send protected messages from the address that you use to register to Protected Trust Encryption with, so you can keep your address and domain. How can I access my Protected Trust Encryption ? You may access your protected messages at any time by logging in with your registered credential at or if you are using the Protected Trust Encryption Outlook Add-in, by logging in to your Outlook profile. What Operating Systems is Protected Trust Encryption compatible with? The Protected Trust Encryption Outlook add-in for Microsoft Outlook is compatible with Windows XP or later versions of Windows. The Protected Trust Encryption web portal can be viewed from any web browser on any operating system. Which method of encryption is used with Protected Trust Encryption? Protected Trust Encryption uses Transport Layer Security (TSL) and Advanced Encryption Standard (AES) 2 bit. What regulations can Protected Trust Encryption help me comply with? Protected Trust Encryption is compliant with all major regulations: HIPAA, HITECH, GLBA, SOX, CJIS 199 Ave B NW Suite 20 Winter Haven, FL
4 What are the differences between free users and business users? Business users can unlimitedly send protected messages as opposed to free users who can only send five free messages per month. Business users can request custom branding, and have access to the admin portal. Access to the admin portal gives your organization s administrator the option to add/remove users, view activity reports, modify users accounts, and update billing information. How much storage is included? Storage quota is based on pooled storage for the entire organization, which is 1 GB per user. For additional storage please contact (8) How do I contact customer support? You can open up a case by writing in to support@ with your Protected Trust Encryption account (preferred method) or you may reach a live Support Technician Monday-Friday 9:00AM-9:00PM EST by calling Protected Trust Encryption Can I only send protected messages to other registered users? No, you can send protected messages to anyone. If you need to send a protected message to a non-registered user, it is not required for the recipient to register with Protected Trust Encryption to be able to receive encrypted messages. How can I reset my password? There are two ways you can reset your password. If you forgot your password, go to Enter your registered address and phone number that was used to register, and then follow the onscreen instructions to reset the password. If you do not remember the phone number you used to register, please contact support@ and we can provide you with last four digits of the registered phone number. If you know your password but would like to change it, login to the Protected Trust Encryption control panel with your registered and password. Got to My Dashboard > Profile/Change Password > Type in new password twice to confirm > click Save Changes 199 Ave B NW Suite 20 Winter Haven, FL
5 What is the maximum size of a message that is supported by Protected Trust Encryption? If you are a free user or standard Business user, the maximum size of a message that is supported is 2 MB including attachments. If you are a business user with the productivity add-on, you can send up to GB through the Protected Trust Encryption add-in and through the Protected Trust Encryption web portal 2 GB including attachments. What if I forgot the answer to my shared secret? If you cannot open a protected message because you forgot the answer to the shared secret, you will need to contact the sender by another means to verify the shared secret. If the sender also does not remember the answer to the shared secret, they will need to resend the message with a new-shared secret or new verification method. What is the maximum number of recipients per message that is supported by Protected Trust Encryption? The maximum number of recipients per message is 2 recipients. Please note that you must also abide by our Terms of Use agreements. Spamming is prohibited. How can I verify that the intended recipient viewed my protected message? Protected Trust Encryption provides a proof of delivery log, which shows who viewed the message, when the message was viewed, and the IP address and city/state of where the message was viewed, if available. When you send a message, you may also select a read receipt, which will send you a notification as soon as the message has been opened. How can I delete a protected message? If you have the Protected Trust Encryption Outlook Add-In installed, you can delete a protected message just as you normally would in Outlook. However, this does not delete the message in the Protected Trust Encryption web portal. Protected messages cannot be deleted, only expired or revoked. It is up to the sender to decide when a message is going to expire. How can I forward a protected message? The Protected Trust Encryption web portal does not support a forwarding feature. This is so the intended recipients only view messages. However, users with the Outlook add-in can forward messages as normal. 199 Ave B NW Suite 20 Winter Haven, FL
6 What does it mean to revoke a protected message? When a message is revoked through the Protected Trust Encryption web portal, the message will still remain in your Inbox or Sent folder. However, the contents within the message can no longer be viewed or accessed. Can I un-expire a protected message? Once a protected message has been expired, due to security purposes it cannot be un-expired. What should I do, if I do not receive an invitation ? If you did not receive your Protected Trust Encryption invitation , you need to contact your organization s administrator and ask them to send you another invitation. Microsoft Outlook Add-in How do install and uninstall the Protected Trust Encryption Outlook add-in for Microsoft Outlook? To download and install the Protected Trust Encryption Outlook add-in for Microsoft Outlook, go to /Download, > click Download and save file > click on the setup program you downloaded in your browser s recent downloads list. After installation completes, Microsoft Outlook will start up automatically. To uninstall the Protected Trust Encryption Outlook Add-In: Outlook 2007: Launch Outlook, go to Tools > Trust Center > Add-ins > click on the Protected Trust Encryption Add-in > click Go > this will open up COM add-ins page, uncheck the Protected Trust Encryption Add-in to disable Outlook 2010: Launch Outlook, go to File tab > Options > Add-ins > Go > select Protected Trust Encryption Add-in > click uninstall > OK What versions of Outlook is the add-in compatible with? The Protected Trust Encryption Outlook Add-in is compatible with Outlook 200, Outlook 2007, and Outlook 2010 both 2-bit and -bit. How do I check if I have the latest update of the Protected Trust Encryption Outlook Add-In? When you launch Outlook, click on the Protected Trust Encryption menu, select Options, and then click Check for updates. 199 Ave B NW Suite 20 Winter Haven, FL
7 Contact Support To get support for journaling, please contact the Protected Trust Support Team through the standard support channels: Web: Protected Trust Message: (preferred) Phone: (8) About Protected Trust Protected Trust brings to the market the synergy between several products and services focused on just one thing risk management for a company s digital assets. Protected Trust combines operational experience, a physically secure infrastructure, Cloud based managed services, and an expert culture of security and privacy. Protected Trust exists to protect the informational assets of businesses, helping them manage their risk and limit their exposure to liability and data misuse. The suite of products and services offered by Protected Trust is unique, focused intently on the privacy, security, and compliance of digital information assets. For information please, access send us an to info@ or call us on About Citrix ShareFile Based in Raleigh, North Carolina, Citrix ShareFile provides software that helps businesses exchange files easily, securely and professionally. The ShareFile service was launched in November 200. In the six years following its initial release, ShareFile grew organically with no outside capital to almost 20,000 paying corporate customers and million business users spread across more than 100 countries around the world. In October 2011, Citrix Systems announced its acquisition of ShareFile. Citrix Systems, Inc. (NASDAQ:CTXS) is a leading provider of virtual computing solutions that help people work and play from anywhere on any device. More than 20,000 enterprises rely on Citrix to create better ways for people, IT and business to work through virtual meetings, desktops and datacenters. Citrix virtualization, networking and cloud solutions deliver over 100 million corporate desktops and touch approximately 7 percent of Internet users each day. Citrix partners with over 10,000 companies in 100 countries. Annual revenue in 2010 was $1.87 billion. Learn more at The ShareFile service has won numerous awards, including CNET s WebWare 100. As a company, ShareFile was named one of North Carolina s top 2 Companies to Watch in 2010 and was twice named to Inc. magazine s prestigious Inc. 00 list of fastest-growing private businesses. Copyright 201 Protected Trust. All rights reserved. Protected Trust logos are registered trademarks of Protected Trust in United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are property of their respective owners. Protected Trust reserves the right to change, modify, transfer or otherwise revise this publication without notice Ave B NW Suite 20 Winter Haven, FL
ShareFile provides effective collaboration and file access wherever and whenever you need it. WHITE PAPER ShareFile by Citrix.
WHITE PAPER ShareFile by Citrix Sponsored by ShareFile provides effective collaboration and file access wherever and whenever you need it By Carmen P. Fleischauer ShareFile Citrix Systems, Inc. www.sharefile.com
More informationCloud Web Portal User Guide Version 2.0
Cloud Web Portal User Guide Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
More informationSecureSend File Transfer Portal Usage Guide
System Documentation 03/01/2012 SecureSend File Transfer Portal Usage Guide Recommended Usage Instructions and Frequently Asked Questions Jose Ruano, Stephen Weatherly TABLE OF CONTENTS EXECUTIVE SUMMARY...3
More informationStewart Secure Email User Guide. March 13, 2015
Stewart Secure Email User Guide March 13, 2015 Table of Contents Introduction... 1 What is secure email?... 1 Why secure email?... 1 What is personal, non-public information?... 1 How is my data protected?...
More informationGetting Started. Send a file in 3 easy steps Quickly organize and share your files
Getting Started Send a file in 3 easy steps Quickly organize and share your files Getting Started with Citrix ShareFile Welcome to ShareFile! You can use your ShareFile account to easily and securely exchange
More informationProtected Trust Setup Guide for Brother MFC Devices
Protected Trust Setup Guide for Brother MFC Devices Summary Protected Trust Email Encryption is a versatile secure email service. This guide details three use cases between Protected Trust and your Brother
More informationU.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
More informationMSGCU SECURE MESSAGE CENTER
MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and
More informationNCH Secure Web Delivery Instructions
NCH Secure Web Delivery Instructions Typically when you send an email to a person, it is sent in Clear Text and can be viewed as it traverses the internet. Email is typically not considered a good vehicle
More information1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6
MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack
More informationFDIC Secure Email Procedures for External Users April 23, 2010
FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationUSC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9
About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationCOX BUSINESS ONLINE BACKUP
COX BUSINESS ONLINE BACKUP Quick start Guide www.cox.com Services and features not available in all areas and package options vary by market. Rates and speeds vary by market. Number of users and network
More informationWelcome to Sookasa. Getting Started Guide for SafeMonk users
Welcome to Sookasa Getting Started Guide for SafeMonk users Welcome to Sookasa! About Us Like Safemonk, Sookasa provides Dropbox encryption to protect your information at the file level, so it s safe both
More informationHow do I see an encrypted INCISIVE MD email for the first time?
CrossCurrent, Inc. 5331 SW Macadam Ave, Suite 216 Portland, Oregon 97239 How do I see an encrypted INCISIVE MD email for the first time? Summary With the release of INCISIVE MD 5.2, emails sent to email
More informationSecure Message Center User Guide
Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account
More informationWebEx Integration to Outlook. User Guide
WebEx Integration to Outlook User Guide 072310 Copyright 1997 2010 Cisco and/or its affiliates. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the Cisco WebEx logo are trademarks or
More informationWelcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5. Getting Started 1.2... 7 Download ncrypted Cloud...
Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted
More informationMac OS X User Manual Version 2.0
Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
More informationCloud. Hosted Exchange Administration Manual
Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...
More informationPORTLANDDIOCESE.ORG Email - How to Connect Table of Contents
1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2013 for Windows... 3 Outlook for Mac 2011... 4 Mac OS X 10.6+... 4 iphone
More informationGuide: Using Citrix for Home/ Office
Guide: Using Citrix for Home/ Office Contents Important information about disconnecting from Citrix 1 How to access Citrix Site 2 How to install Citrix Receiver for Home/ Personal Device (ipad, android
More informationInstallation & Activation Guide. Lepide Active Directory Self Service
Installation & Activation Guide Lepide Active Directory Self Service , All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights reserved under
More informationCentral Desktop Enterprise Edition (Security Pack)
Central Desktop Enterprise Edition (Security Pack) The Central Desktop Security Pack is included in the Enterprise Edition of Central Desktop. The Enterprise Edition is for companies and organizations
More informationMUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE
MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE Mutual of Omaha Secure Email Client/Partner User Guide April 2015 TABLE OF CONTENTS INTRODUCTION 3 About this Guide 3 CREATING A MUTUAL OF
More informationGetting Started With Citrix ShareFile
Guide Getting Started With Citrix ShareFile Learn the basics of your ShareFile account. Plus, get the answers to some of our most frequently asked how-to questions. ShareFile.com Welcome to ShareFile!
More informationWord Secure Messaging User Guide. Version 3.0
Word Secure Messaging User Guide Version 3.0 Copyright 2007-2013 WordSecure, LLC. All Rights Reserved. Page 1 of 7 1. Introduction Word Secure Messaging is a program that allows you to exchange encrypted
More informationInstallation Instructions
Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand
More informationSecure Email User Guide
Secure Email User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Resetting your SecureMail password..
More informationManual POLICY PATROL SECURE FILE TRANSFER
Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
More informationOnline File Folder. Getting Started Guide. Become an Expert at Managing Your Files Online. wind. Online File Folder // Getting Started Guide
Getting Started Guide Online File Folder Become an Expert at Managing Your Files Online Getting Started Guide Page 1 Getting Started Guide: Online File Folder Version 2.1 (2.22.11) Copyright 2010. All
More informationExternal End User Training Guide: Secure Email Extract
External End User Training Guide: Secure Email Extract Version 6 August 12, 2013 Prepared by 7/29/2013: Kris Chromey, Training Coordinator Michelle Tuscher, Vault Implementation Coordinator Edited for
More informationHow to access and reply to an Egress Switch Secure Email free of charge. Opening a Switch Secure Email New User
How to access and reply to an Egress Switch Secure Email free of charge As an Egress Switch Secure Email recipient, you can access encrypted files quickly and easily. You can also communicate securely
More informationPaperClip. em4 Cloud Client. Setup Guide
PaperClip em4 Cloud Client Setup Guide Copyright Information Copyright 2014, PaperClip Inc. - The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Inc. All brand and product
More informationSpambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
More informationDigitalPersona Privacy Manager Pro
DigitalPersona Privacy Manager Pro DigitalPersona Privacy Manager Pro is a centrally-managed secure communication solution for businesses. It allows sensitive documents and communications to remain private,
More informationActive Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
More informationUser Guide. IntraLinks Courier Plug-in for Microsoft Outlook
IntraLinks Courier Plug-in for Microsoft Outlook User Guide Copyright 2012 IntraLinks, Inc. Version 3.2 September 2012 IntraLinks 24/7/365 support US: 212 543 7800 UK: +44 (0) 20 7623 8500 See IntraLinks
More informationPipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com
Add-In for MS Outlook 205 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook Learn how to use sales lead management with Pipeliner MS Outlook Add-In. CONTENT. Setting up Pipeliner Add-In
More informationAbout Email Archiving for Microsoft Exchange Server
Setup Guide Revision A McAfee SaaS Email Archiving Service Configuring Microsoft Exchange Server 2013 About Email Archiving for Microsoft Exchange Server The McAfee SaaS Email Archiving service stores
More informationCitrix Remote Access Portal U s e r M a n u a l
Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting
More informationHow To Set Up A Sartorius Mailbox In Outlook On A Non-Standard Pc On A Windows Xp Oracle 365 On A Pc Oracle365 On A Sertorius Mailbox On A Microsoft Office365 On Pc Orca 2 On A
CA-IS Documentation Installing and Using Sartorius Office365 on non-standard Installing and Using Sartorius Office365 on non-standard Install and user guide 002 9/19/2012 3:10:00 PM Heiko Moeller 12/18/2012
More informationADP Secure Email Client User Guide
ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.0 July 2008 2008 ADP, Inc. Copyright Information ADP provides this publication as is
More informationAbout DropSend. Sending Files with DropSend
About DropSend DropSend is a service that allows businesses and individuals to send large files, store files online and collaborate in a quick and easy way. DropSend Business Plan will help your company
More informationSecure Email Actions for Email Recipients
Secure Email Actions for Email Recipients Actions for Email Recipients The recipient cannot forward encrypted email outside the secure system. Each email will only be available to the recipient for 30
More informationIBM Aspera Add-in for Microsoft Outlook 1.3.2
IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6
More informationWelcome to ncrypted Cloud!
Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the
More informationADP Secure Email Client User Guide
ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.6 August 2014 ADP Secure Email Client User Guide August 2014 Copyright Information ADP
More informationSaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
More informationHealthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationAdministrators Help Manual
Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service
More informationAjera 7 Installation Guide
Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services
More informationONE Mail Direct for Desktop Software
ONE Mail Direct for Desktop Software Version: 1 Document ID: 3931 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2015, ehealth Ontario All rights reserved No part of this document may
More informationPaperClip. em4 Cloud Client. Manual Setup Guide
PaperClip em4 Cloud Client Manual Setup Guide Copyright Information Copyright 2014, PaperClip Inc. - The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Inc. All brand
More informationPOLICY PATROL MFT. Manual
POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated
More informationSubscription Administrator Guide. For GS1 Canada Services
For GS1 Canada Services The information contained in this document is privileged and confidential and may otherwise be exempt from disclosure under applicable law. It is intended solely for the entity
More informationPolicy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationNETWRIX USER ACTIVITY VIDEO REPORTER
NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationHealthcare Compliance Solutions
Healthcare Compliance Solutions Let Protected Trust be your Safe Harbor In the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH), the U.S. Department of Health and Human
More informationIMPORTANT: You must complete this step before you can install and activate SafeSend.
Initial Setup Guide Welcome to SafeSend! This guide has been created to assist with your initial setup. Please follow the below steps to get started. If you are a Firm Administrator and are setting your
More informationUse your Microsoft Outlook Calendar System to invite participants to Conferencing audio and Web Meeting conferences easily and efficiently.
GlobalConference Audio and Web Conferencing Solution Conferencing Scheduler User Guide Use your Microsoft Outlook Calendar System to invite participants to Conferencing audio and Web Meeting conferences
More informationOverview. ExchangeDefender Admin Web Site
SPAM Settings Overview The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the safety and convenience of your web browser.
More informationCreating a Content Group and assigning the Encrypt action to the Group.
Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
More informationEmployee Active Directory Self-Service Quick Setup Guide
Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:
More informationSeagate Access for Personal Cloud User Manual
Seagate Access for Personal Cloud User Manual 2015 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks of Seagate
More informationWatchDox for Windows User Guide. Version 3.9.0
Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or
More informationMagaya Software Installation Guide
Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to
More informationWhitelist Management
Whitelist Management Overview The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the safety and convenience of your web
More informationHow To Open An Encrypted Email
Due to HIPAA requirements, HCDDS must implement a secure method for sending emails that contain information about individuals we serve to people outside the agency s secure network. To accomplish this,
More informationNTI Backup Now EZ v2 User s Guide
NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationVersion 2.1.x. Barracuda Message Archiver. Outlook Add-In User's Guide
Version 2.1.x Barracuda Message Archiver Outlook Add-In User's Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Copyright 2005-2009, Barracuda
More informationDomain Guide. For the latest version of this document please go to: http://www.exchangedefender.com/docs. v 1.0 May 16,2011 Audience: Staff
Domain Guide For the latest version of this document please go to: http://www.exchangedefender.com/docs v 1.0 May 16,2011 Audience: Staff Table of Contents ExchangeDefender Overview.. 3 ExchangeDefender
More informationStore, Edit and Share your files in OneDrive for Business on Web. A. Activate OneDrive for Business (Only for First-time Users)
Store, Edit and Share your files in OneDrive for Business on Web A. Activate OneDrive for Business (Only for First-time Users) B. Create a New Document at OneDrive for Business C. Rename a Document at
More informationPageScope Router. Version 1.5. Configuration Guide
PageScope Router Version 1.5 Configuration Guide Table of Contents TABLE OF CONTENTS... 2 1. Introduction...3 1.1 IP Address and Domain Name...3 2. Sending Files to PageScope Router...4 2.1 MFP Device
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationConnecting to the University Wireless Network
Connecting to the University Wireless Network Wifi is available to staff and registered students of University in certain areas of the three campuses of the University. This area of coverage will be expanded
More informationAvira Secure Backup INSTALLATION GUIDE. HowTo
Avira Secure Backup INSTALLATION GUIDE HowTo Table of contents 1. Introduction... 3 2. System Requirements... 3 2.1 Windows...3 2.2 Mac...4 2.3 ios (iphone, ipad and ipod touch)...4 3. Avira Secure Backup
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationDocument Exchange Server 2.5
KOFAX Document Exchange Server 2.5 Administrator s Guide for Fujitsu Network Scanners 10001820-000 2008-2009 Kofax, Inc., 16245 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved.
More informationSecure File Transfer Guest User Guide Updated: 5/8/14
Secure File Transfer Guest User Guide Updated: 5/8/14 TABLE OF CONTENTS INTRODUCTION... 3 ACCESS SECURE FILE TRANSFER TOOL... 3 REGISTRATION... 4 SELF REGISTERING... 4 REGISTER VIA AN INVITATION SENT BY
More informationCitrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide
Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6
More informationMicrosoft Outlook. Transition from the ECS Exchange Server to the University Exchange Server. ECS Computing Services August 21, 2012 Version 3.
Microsoft Outlook Transition from the ECS Exchange Server to the University Exchange Server ECS Computing Services August 21, 2012 Version 3.3 1 Table of Contents Transition Process... 4 What is going
More informationNetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
More informationSC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
More informationEsi-Mail. Setup and User s Guide. Visit http://www.esiusers.com for up-to-date help. 0450-0479 Rev. A
Esi-Mail Setup and User s Guide 0450-0479 Rev. A Visit http://www.esiusers.com for up-to-date help. Table of contents Introduction... 1 About this guide... 1 System requirements... 2 ESI hardware requirements...
More informationBarracuda User Guide. Managing your Spam Quarantine
Managing your Spam Quarantine Barracuda User Guide Step1: Open your internet browser and go to http://myspam.datatechhosting.com this will automatically redirect you to Barracuda s email security service
More informationReceiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
More informationEnterprise Site Manager (ESM) & Administrator Console Installation / Uninstall
Enterprise Site Manager (ESM) & Administrator Console Installation / Uninstall July 2013 For further information visit our support page: www.pearsonwbl.edexcel.com/our-support 1 Contents Please note clicking
More informationEvoko Room Manager. System Administrator s Guide and Manual
Evoko Room Manager System Administrator s Guide and Manual 1 1. Contents 1. Contents... 2 2. Read this first! Introduction to this Guide... 6 3. User Guide... 6 4. System Architecture Overview... 8 ----
More informationUser Management Tool 1.5
User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management
More informationLepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with
Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3
More informationVodafone Text Centre User Guide for Microsoft Outlook
Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message
More informationAbila Grant Management. Document Management
Abila Grant Management This is a publication of Abila, Inc. Version 2014 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names
More informationBefore You Begin, Your Computer Must Meet the System Requirements
Before You Begin, Your Computer Must Meet the System Requirements Windows: Minimum: Windows Vista SP2 or Windows 7 & 8 Remote Desktop Protocol (connection) 7.1 or higher 150 MB hard drive space 2 GB RAM
More informationIsItUp Quick Start Manual
IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: Contact1@tarosoft.com
More information