Overview Using the Secure Desktop Agent Troubleshooting... 10
|
|
- Lesley Parker
- 8 years ago
- Views:
Transcription
1 Overview... 2 Installing... 2 Step 1: Download... 2 Step 2: Install... 2 Step 3: Sign In... 3 Step 4: That's It!... 3 Minimum System Requirements:... 3 Using the Secure Desktop Agent... 4 Accessing & Login In... 4 New alert notification... 5 Launching the Secure Webmail... 5 Always Display Desktop the Agent icon (optional)... 6 Reading a Secure Message... 6 Creating a Secure Message... 6 Sending a File Attachment... 7 Logging Out... 8 Uninstalling the Secure Desktop Agent... 8 Check for Updates... 9 Report an Error... 9 Troubleshooting Manually Enabling the Print to Secure Message Driver PAGE 1 of 10
2 The Desktop Agent is ideal for non-ms Outlook Users and external Guest Users with individual personal programs such as Gmail and Yahoo. The Desktop Agent acts as a secure productivity agent & notifier. It displays an icon in the User s PC system tray and lets the User know instantly when they have a new secure message, or when their sent secure messages are read, replied to and forwarded without having to open a web browser. The Desktop Agent also offers some convenient shortcuts for creating secure messages and instantly sending and sharing large files securely (asynchronously, meaning you do not have to wait for the large file to be uploaded before sending your secure message). To get started using the Desktop Agent, review the minimum system requirements outlined at the bottom of this page and follow the simple steps outlined below. NOTE: In order to install the Desktop Agent, you must follow these instructions from within the Secure Message Center (Webmail). The Desktop Agent cannot be installed from this help page. If you do not see the ability to install the Desktop Agent from the Secure Message Center (Webmail), it is not available on the Secure Messaging Platform. Contact your administrator for more information. When first prompted to 'Run/Install' or 'Save/Don't Install', press 'Run/Install'. If a confirmation dialogue window pops up, just hit 'Run/Install' again. Download size: Around 5MB NOTE: You may need administrative privileges on your computer to install the Desktop Agent. Once the software has downloaded, the installer will automatically complete the installation process. The Desktop Agent contains no spyware, no advertising, and will not install any other third party software, applications or shortcuts. NOTE: Some anti-virus or firewall software sometimes falsely identify the Desktop Agent installer as an unknown file. If prompted, select to 'Trust' the Desktop Agent installer. PAGE 2 of 10
3 When the Desktop Agent is installed, you will be prompted to sign in. Sign in using the same credentials used in your current Secure Message Center (Webmail) session. To launch the Secure Message Center (Webmail), click on the Desktop Agent icon in your task tray and select 'Launch Webmail'. Note that the Desktop Agent may be hidden along with other icons in the 'more' section of the tasktray. Select 'Customize' and 'Show Icon and Notifications' to see the Desktop Agent at all times. MS Windows 2000/XP/Vista or 7 MS.NET Framework 4.0 and above (will automatically install) Reference: PAGE 3 of 10
4 After installing the Desktop Agent, you will be prompted to login via the Secure Messaging Single Sign-On (SSO) service. Enter the same Address and Password credentials you use to login to the Secure Message Center (Webmail). 1. To launch the Desktop Agent, go in the Windows task tray, click on the task tray up arrow to open the menu that contains all applications running in the task tray. 2. Select the Desktop Agent icon (2 blue arrows) to open the menu of the Desktop Agent. 3. Select the menu entry Login to launch the Single Sign-On (SSO) login screen. 1. The Secure Login Screen of the Desktop Agent allows you to login to any Secure Messaging Platform regardless of their physical server location. 2. Enter the same Address and Password credentials you use to login to the Secure Message Center (Webmail). 3. To avoid re-entering the same credentials every time, select the Remember me on this computer and Keep me logged in options. These options should not be used if using a public computer. 4. Click Login. Once logged in, the Desktop Agent icon will be replaced with the branding of the organization s Secure Message Center. PAGE 4 of 10
5 The Desktop Agent is available in your computer system tray located on the bottom right of your Windows menu bar. The Desktop Agent automatically detects when you have new activity and alerts you by flashing in your system tray displaying a pop-up window. Click the Desktop Agent icon in the task tray to open the main menu. Select Launch Secure Webmail to automatically launch the Secure Message Center (Webmail) and read your secure messages. Select Compose Secure Message to start a new secure message, or select Send Files Securely to choose file attachments on your computer you would like to send securely. The Desktop Agent supports asynchronous transfers, which means you can send large files without having to wait for them to complete uploading before sending your secure message. NOTE: Some features might not be available depending on the configuration of the Secure Messaging Platform and your User Group profile. Contact your administrator for more information. PAGE 5 of 10
6 In order to have the Desktop Agent icon display at all times in your task tray, select the task tray up arrow and click Customize. Locate the Desktop Agent in the list of available programs and change the Behavior to Show Icon and Notifications. To read a secure message and launch the Secure Message Center (Webmail), use the menu entry Launch Secure Webmail. You will be automatically logged into the Secure Message center where you can access all your secure messages. To create a new secure message, use the menu entry Compose Secure Message. You will be automatically logged into the Secure Message center where a draft secure message is ready to be completed and sent. The same User Group permissions apply when creating a new secure message from the Desktop Agent. Professional Users can create new secure messages to anyone, whereas Guest Users can only create new secure messages from a pre-defined list of Users. NOTE: Some features might not be available depending on the configuration of the Secure Messaging Platform and your User Group profile. Contact your administrator for more information. PAGE 6 of 10
7 Use the menu entry Send Files Securely to seamlessly send large file attachments. You will first be prompted to select the file attachments you wish to attach to your new secure message, and will be automatically logged into the Secure Message center where a draft secure message is ready to be completed and sent, along with the file attachment files you selected. The Desktop Agent uses an asynchronous file transfer process whereby your file attachments might still be uploading (depending on their total size) while the draft message is launched. You can still complete your secure message, and send it, even if the file attachments are not finished uploading yet. The recipients will receive your secure message and the file attachments will be marked as Uploading until transfer completion from your computer to the Secure Message Center server. A progress status is available from the main menu when uploading large file attachments. NOTE: Some features might not be available depending on the configuration of the Secure Messaging Platform and your User Group profile. Contact your administrator for more information. PAGE 7 of 10
8 To log out of the Desktop Agent, use the menu entry Logout. This will prevent any other users to have access to your secure messages on this computer. To remove an activation, select the menu entry Tools > Secure Accounts > Remove Authorization. This will remove any cached information from your computer and force you to re-enter your credentials the next time you access the Secure Desktop Agent. Should you need to uninstall the Secure Desktop Agent for any reason, you should do this through the Add/Remove Programs interface included in Windows. Step-by-step instructions for removing the Secure Desktop Agent are provided below. 1. Close (Exit) the Secure Desktop Agent. Open the Windows Start menu and go to Control Panel. 2. In Windows XP, Click on Add/Remove Programs. For Windows Vista and Windows 7, go to uninstall a program. 3. Select Secure Desktop Agent and clicking Remove. If you do not see the ability to uninstall the Desktop Agent, the Desktop Agent was installed remotely by your IT Department using the Group Policy Deployment installation process. In this case, your administrator will have to uninstall it for you. PAGE 8 of 10
9 The latest version of the Secure Desktop Agent contains the most up-to-date feature set, the latest bug fixes and updates, as well as the newest user experience upgrades. To get the latest version, follow these quick and easy steps: In the Tools menu entry of the Desktop Agent, click on Check for Updates. If a new version is available, the dialog box will ask you if you wish to install it. Click yes, and follow the on screen instructions to complete the update process. A dialog box will appear once the update is complete, after which the Desktop Agent will automatically restart itself. If you do not see the Check for Updates menu entry, the Desktop Agent was installed remotely by your IT Department using the Group Policy Deployment installation process. In this case, your administrator will install any updates for you. If you encounter an issue during the use of the Secure Desktop Agent, the best way to contact us is through the Report an Error feature. In the menu of the Desktop Agent, go to the Tools menu and click on Report an Error. A dialog will appear where you can enter a description of the problem that will be sent along with an encrypted copy of the log information from your Desktop Agent. After you've entered the description of the problem, click Report Error. A Support Technician will contact you shortly to address your issue. Submitting an error this way will send some log information regarding the local Toolbar settings and usage. To view what log information is sent to support, click the View information sent to Support link. Reference: PAGE 9 of 10
10 You have installed the Desktop Agent and successfully logged in, but when enabling the Print to Secure Message, in some systems (typically Windows XP) you get prompted to choose an administrative user. Please follow these steps to complete the setup: 1. If you are using a Windows XP system, make sure the user account logged in has administrative privileges. If you are using Vista/Win7 be ready to elevate privileges to administrative level when requested. 2. Open the Desktop Agent root application folder: In Vista/Win7: C:\Users\<USERNAME>\AppData\Local\ 2 In XP: C:\Documents and Settings\<USERNAME>\Local Settings \Application Data\ 2 3. Select the Printer Agent / driver folder. Confirm that this sub-folder exists and that you have the following programs: x86 OS: setup.exe and unpdf.exe x64 OS: setupx64.exe and unpdfx64.exe 4. If you don t find the folder/files in the previous step, start the Desktop Agent and click on the tray icon and go to the Tools > Print to Secure Message Setup menu option. Select "Install Print to Secure Message Driver. 5. Execute the unpdf program to uninstall the Print to Secure Message Driver. If you are on a Vista/Win7 system, right-click on the file and choose the Run as administrator option. 6. Execute the setup program to install the Print to Secure Message Driver. If you are on a Vista/Win7 system, right-click on the file and choose the Run as administrator option. Reference: PAGE 10 of 10
Xythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
More informationYou can find the installer for the +Cloud Application on your SanDisk flash drive.
Installation You can find the installer for the +Cloud Application on your SanDisk flash drive. Make sure that your computer is connected to the internet. Next plug in the flash drive and double click
More information8x8 Click2Pop User Guide
USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft
More informationHow to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide
How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...
More informationCitrix Client Install Instructions
Citrix Client Install Instructions If you are using Citrix remotely, Information Technology Services recommends updating Citrix client to the newest version available online. You must be an administrator
More informationHow to use SURA in three simple steps:
How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.
More informationAspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
More informationWindows XP with Symantec AntiVirus 10 Corporate Edition
NC State University 1 of 7 Windows XP with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows xp with symantec antivirus 10 corporate edition Install SAV10 on Windows XP only
More informationNovell Filr. Windows Client
Novell Filr Windows Client 0 Table of Contents Supported Environments 2 Supported Languages 2 Getting Started 3 Which Folders Are Synchronized 3 What Actions Are Supported 4 Configuring Folders to Synchronize
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationGlobal Image Management System For epad-vision. User Manual Version 1.10
Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server
More informationInstalling the Virtual Desktop Application (MAC)
Installing the Virtual Desktop Application (MAC) The folowing instructions will guide you through the process of installing the components necessary to connect in to the NEL B Virtual Desktop environment
More informationWindows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition
NC State University 1 of 5 Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows server 2003 x64 with symantec antivirus 10 corporate edition CAUTION:
More informationCopyright Pro Softnet Corporation. All rights reserved. 2 of 24
Copyright Pro Softnet Corporation. All rights reserved. 2 of 24 Remote Access Helpdesk User Manual TABLE OF CONTENTS Introduction...4 Features...4 Administrator: Manage Technicians...5 Technician: Initiate
More informationBefore You Begin, Your Computer Must Meet the System Requirements
Before You Begin, Your Computer Must Meet the System Requirements Windows: Minimum: Windows Vista SP2 or Windows 7 & 8 Remote Desktop Protocol (connection) 7.1 or higher 150 MB hard drive space 2 GB RAM
More informationFX-BTCVT Bluetooth Commissioning Converter Commissioning Guide
FX-BTCVT Bluetooth Commissioning Converter Commissioning Guide FX-BTCVT-1 (Bluetooth Commissioning Converter) Code No. LIT-12011665 Issued December 5, 2014 Refer to the QuickLIT website for the most up-to-date
More informationJumble for Microsoft Outlook
Jumble for Microsoft Outlook Jumble is a zero knowledge, end- to- end email encryption solution that integrates with existing email platforms. Jumble integrates at the email client level and removes the
More informationHow To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationDesktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
More informationHow to Use Remote Access Using Internet Explorer
Introduction Welcome to the Mount s Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote
More informationTable of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
More informationAvaya Modular Messaging Microsoft Outlook Client Release 5.2
Avaya Modular Messaging Microsoft Outlook Client Release 5.2 Important: Instructions in this guide are applicable only if your message store is the Avaya Message Storage Server (MSS) or Microsoft Exchange
More informationZanibal Plug-in For Microsoft Outlook Installation & User Guide Version 1.1
Zanibal Plug-in For Microsoft Outlook Installation & User Guide Version 1.1 Zanibal LLC Phone: +1-408-887-0480, +234-1-813-1744 Email: support@zanibal.com www.zanibal.com Copyright 2012, Zanibal LLC. All
More informationDial-up Installation for CWOPA Users (Windows Operating System)
Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions
More informationMagaya Software Installation Guide
Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to
More informationSafe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
More information1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6
MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack
More informationLast modified on 03-01-2010 for application version 4.4.4
Last modified on 03-01-2010 for application version 4.4.4 RemotePC User Manual Table of Contents Introduction... 3 Features... 3 Install the Remote Access Host application... 4 Install the Remote Access
More informationMercy s Remote Access Instructions
Mercy s Remote Access Instructions ~~~~~~~~~~~~~~ Section A Windows 2000 / XP ~~~~~~~~~~~~~~ I. Install Meditech............................... A1 II. Install VPN Client............................. A3
More informationUser guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
More informationUSING OUTLOOK WITH ENTERGROUP. Microsoft Outlook
USING OUTLOOK WITH ENTERGROUP In this tutorial you will learn how to use Outlook with your EnterGroup account. You will learn how to setup an IMAP or POP account, and also how to move your emails and contacts
More informationHow do I use Citrix Staff Remote Desktop
How do I use Citrix Staff Remote Desktop September 2014 Initial Log On In order to login into the new Citrix system, you need to go to the following web address. https://remotets.tees.ac.uk/ Be sure to
More informationUser Guide Microsoft Exchange Remote Test Instructions
User Guide Microsoft Exchange Remote Test Instructions University of Louisville Information Technology 1.1 Who Should Use It This guide is intended for University of Louisville Faculty and Staff participating
More informationowncloud Configuration and Usage Guide
owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,
More informationContents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault
Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Outlook Plugin... 13 Using KiteDrive to Send Large
More informationFirst Time On-Campus VLab Setup Windows XP Edition
First Time On-Campus VLab Setup Windows XP Edition General: This guide is a step-by-step walkthrough of downloading, installing and configuring VMware View Client for the University of Cincinnati s VLab
More informationOPS Data Quick Start Guide
OPS Data Quick Start Guide OPS Data Features Guide Revision: October, 2014 Technical Support (24/7) - (334) 705-1605 http://www.opelikapower.com Quick Start Guide OPS Data: Beginning today, you have access
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationOCS Client Installation - Quick Start Guide. Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007
OCS Client Installation - Quick Start Guide Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007 Document Revision: March, 2010 Quick Start Guide / Introduction Page
More informationImportant Notes for WinConnect Server VS Software Installation:
Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),
More informationRev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs
Rev. 06 JAN. 2008 Document Control User Guide: Using Outlook within Skandocs Introduction By referring to this user guide, it is assumed that the user has an advanced working knowledge of Skandocs (i.e.
More informationComodo Cloud Drive Software Version 1.0
2 Comodo Cloud Drive Software Version 1.0 User Guide Guide Version 1.0.101414 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Cloud Drive...
More informationI. Configuring Digital signature certificate in Microsoft Outlook 2003:
I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to
More informationRemote Access: Internet Explorer
Introduction: Welcome to the MSVU Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote
More informationOutlook Hosted Exchange Account Configuration
Outlook Hosted Exchange Account Configuration Thank you for choosing Erado for your Exchange hosting needs. This document is designed to assist you in exporting your existing exchange or email account
More informationHow to configure your Windows PC post migrating to Microsoft Office 365
How to configure your Windows PC post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 4 Several different Microsoft Office 365
More informationParishSOFT Remote Installation
Table of Contents Setting up Remote Solution Windows 7 or Vista... 1 Connecting to ParishSOFT... 1 Accessing Your database... 3 Switching to your parish database... 4 Setting up Accounts for users... 5
More informationWindows 7 Hula POS Server Installation Guide
Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3
More informationVirtual Private Server Manual
Virtual Private Server Manual How to access your VPS....Page 2 Downloading MetaTrader 4.Page 6 Automatic Performance Updates and MT4 Restart.. Page 10 Troubleshooting.Page 14 Loading an EA..Page 15 1 How
More informationManaging Documents in the Citrix XenApp Remote Desktop
Introduction Managing Documents in the Citrix XenApp Remote Desktop What is a Citrix XenApp Remote Desktop? It is a virtualized instance of MS Windows with only enough software to run TAS in a controlled
More informationHow to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection
How to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection Revised 09/2014 These instructions presume that you already have the Cisco AnyConnect Secure
More informationRemote Online Support
Remote Online Support STRONGVON Tournament Management System 1 Overview The Remote Online Support allow STRONGVON support personnel to log into your computer over the Internet to troubleshoot your system
More informationQbox User Manual. Version 7.0
Qbox User Manual Version 7.0 Index Page 3 Page 6 Page 8 Page 9 Page 10 Page 12 Page 14 Page 16 Introduction Setup instructions: users creating their own account Setup instructions: invited users and team
More informationContents. VPN Instructions. VPN Instructions... 1
VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit
More informationFTP Over SSL (FTPS) Core FTP LE. Installing Core FTP LE"
FTP Over SSL (FTPS) Gordon State College has setup FTP Over SSL (also known as FTPS ) to allow students, faculty, and staff to access resources from our Servers from off-campus using an encrypted connection.
More informationConfiguring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
More informationInstallation Instructions Release Version 15.0 January 30 th, 2011
Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof
More informationSIMIAN systems. Sitellite Desktop User Manual. Sitellite Professional Edition
Sitellite Desktop User Manual Sitellite Professional Edition Introduction The Sitellite Desktop is a cross-platform desktop application that can manage one or more Sitellite 5-powered websites in a more
More informationMaintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum
Maintenance Guide Outpost Firewall 4.0 Personal Firewall Software from Agnitum Abstract This document is intended to assist Outpost Firewall users in installing and maintaining Outpost Firewall and gets
More informationComodo Cloud Drive Software Version 1.0
2 Comodo Cloud Drive Software Version 1.0 User Guide Guide Version 1.0 080613 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Cloud Drive...
More informationHow to Log in to LDRPS-Web v10 (L10) https://enterprise.strohlservices.com
How to Log in to LDRPS-Web v10 (L10) https://enterprise.strohlservices.com Contents First Time Login Instructions... 1 1) Use the Internet Explorer (IE) Web browser*... 1 2) Install the.net Framework...
More informationWelcome to EMP Monitor (Employee monitoring system):
Welcome to EMP Monitor (Employee monitoring system): Overview: Admin End. User End. 1.0 Admin End: Introduction to Admin panel. Admin panel log in. Introduction to UI. Adding an Employee. Getting and editing
More informationCitrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide
Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6
More informationCitrix Remote Access Work Instructions
Work Instructions Version 1.0 15 January 2010 InTACT Shared Services Centre ACT Department of Treasury Quality Management System Service Management Tools Contents Introduction... 3 Purpose... 3 Scope...
More informationInstalling VPN for PC v1.3
Follow these instructions to access your Public/Private folders from home. Please Note: If you are having connectivity issues after installing or upgrading VPN, please refer to Troubleshooting Connectivity
More informationSchools Remote Access Server
Schools Remote Access Server This system is for school use only. Not for personal or private file use. Please observe all of the school district IT rules. 6076 State Farm Rd., Guilderland, NY 12084 Phone:
More informationUSING MS OUTLOOK WITH FUSEMAIL
USING MS OUTLOOK WITH FUSEMAIL In this tutorial you will learn how to use Microsoft Outlook with your FuseMail account. You will learn how to setup an IMAP account, and also how to move your emails and
More informationOut n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x
Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...
More informationInstallation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
More informationFAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
More informationCyber Security: Software Security and Hard Drive Encryption
Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright
More informationOffice of Information Technology Connecting to Microsoft Exchange User Guide
OVERVIEW The Office of Information Technology is migrating its messaging infrastructure from Microsoft Exchange 2003 to Microsoft Exchange 2010. Moving to the latest technology will provide many enhancements
More informationConnecting Remotely via the Citrix Access Gateway (CAG)
2011 Connecting Remotely via the Citrix Access Gateway (CAG) Version 2.0 *** The CAG is intended for users with OE equipment only. Users with GFE must still use RESCUE as their VPN solution. *** All VISN
More informationSophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
More informationAdministering Jive for Outlook
Administering Jive for Outlook TOC 2 Contents Administering Jive for Outlook...3 System Requirements...3 Installing the Plugin... 3 Installing the Plugin... 3 Client Installation... 4 Resetting the Binaries...4
More informationOCS Client Installation - Quick Start Guide. Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007
OCS Client Installation - Quick Start Guide Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007 MailStreet Live Support: 866-461-0851 Document Revision: March, 2010
More informationInstallation instructions for MERLIN Dashboard
Installation instructions for MERLIN Dashboard Contents Installation Prerequisites:... 2 Procedure to manually backup and restore Views and Settings in AxOEE Manager... 3 For XP users go to:... 3 For Vista
More informationAspera Connect Browser Plugin Installation Instructions - Windows Clinical Proteomic Tumor Analysis Consortium - Data Coordinating Center (CPTAC-DCC)
Aspera Connect Browser Plugin Installation Instructions - Windows Clinical Proteomic Tumor Analysis Consortium - Data Coordinating Center (CPTAC-DCC) 9/4/2013 This document describes the steps to install
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationDynamics CRM 2011 Outlook Configuration Guide With Windows XP
Dynamics CRM 2011 Outlook Configuration Guide With Windows XP With migrating to a new version of CRM, one of the side-affects is that the Outlook Integration Client has also been updated and needs to be
More informationBackups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete
Backups User Guide for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot
More informationAventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
More informationBefore You Begin: NOTE: Please read each step of these instructions carefully as not all steps include accompanying pictures.
This document will walk you through the process of migrating your existing mail, contacts, and calendar from WOU s Webmail system to the WOU Gmail system. If you are not interested in migrating your mail,
More informationIntroduction... 2. Requesting a VPN Account... 2. Accessing the Citrix Access Gateway (CAG)... 3. Tips and Tricks... 9
NWI Research VPN Basics Table of Contents Introduction... 2 Requesting a VPN Account... 2 Accessing the Citrix Access Gateway (CAG)... 3 Tips and Tricks... 9 Back up Your Favorites and Desktop Folders
More informationQIAsymphony Management Console User Manual
April 2012 QIAsymphony Management Console User Manual For use with software version 4.0 Sample & Assay Technologies Trademarks QIAGEN, QIAsymphony, Rotor-Gene (QIAGEN Group). InstallShield (Informer Technologies,
More informationLSGMI REMOTE DESKTOP SERVICES.
LSGMI REMOTE DESKTOP SERVICES. This Document is to describe the steps that you should follow in order to have a secured Remote Access to this Service. Requirements: Access to Remote Services is only supported
More informationInstallation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access
Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Version 1 Revised 11/29/2007 Table of Contents Java Installation:...4 Browser Configuration:...4 Citrix Client Installation:...8 Attempting
More informationSophos Anti-Virus standalone startup guide. For Windows and Mac OS X
Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos
More informationPREMIUM MAIL USER GUIDE
PREMIUM MAIL USER GUIDE WHO THIS USER GUIDE IS FOR This document is for users of BigPond Premium Mail. It describes the features of BigPond Premium Mail from a user s perspective. It contains: A general
More informationI N S T A L L A T I O N G U I D E
I NSTALLATION GUIDE Make the most of your Business Internet Dial service!................................... 1 Minimum Hardware Requirements......................................................2 Quick
More informationextranet.airproducts.com Windows XP Client Configuration
extranet.airproducts.com Windows XP Client Configuration To successfully connect to the Air Products extranet.airproducts.com website and have full functionality, the client computer needs to have the
More informationARCHER & GREINER. Citrix Client Install Instructions - For ALL Citrix Users. BigHand Client Install Instructions - For BigHand Users Only
ARCHER & GREINER Citrix Client Install Instructions - For ALL Citrix Users BigHand Client Install Instructions - For BigHand Users Only Table of Contents Citrix Client Install Instructions - For ALL Citrix
More informationChanging Your Cameleon Server IP
1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may
More informationSpector 360 Deployment Guide. Version 7.3 January 3, 2012
Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server
More informationUsing MioNet. 2006 Senvid Inc. User Manual Version 1.07
Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationInstructions for using VPN and accessing your files remotely
Instructions for using VPN and accessing your files remotely Be sure that you have the latest version of JAVA installed on your computer. Go to https://sslvpn.uco.edu and sign in using your domain username
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for
More informationMicrosoft Office 365 with MailDefender
(PC) for Microsoft Office 365 with MailDefender V1.0 Contents 1 Logging in to the Office 365 Portal... 3 1.1 Outlook Web Access Exchange & Lync... 3 1.2 Team Site SharePoint Online... 3 2 Configuring your
More information