POLICY PATROL MFT. Manual

Size: px
Start display at page:

Download "POLICY PATROL MFT. Manual"

Transcription

1 POLICY PATROL MFT Manual

2 MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated or reduced to any electronic medium or machine-readable form without the prior written consent of Red Earth Software except that you may make one copy of the program solely for back-up purposes. Policy Patrol is a registered trademark of Red Earth Software. All product names referenced in this documentation belong to the respective companies. Copyright by Red Earth Software. All rights reserved.

3 Contents at a Glance 1 Introduction Installation File Transfers Contacts Users Exchange Agents & Rules Settings Troubleshooting... 81

4 Table of Contents 1 Introduction Why do you need Managed File Transfer? Policy Patrol highlights Why Policy Patrol? Conventions Installation Introduction Microsoft SQL Server or MySQL If you are using Microsoft SQL Server If you are using MySQL Installing the MFT Server Prerequisites Installation Installing the Exchange Server Agent Prerequisites Installation Completing Setup Adding Users to Policy Patrol MFT Synchronizing users from Active Directory Inviting users to Policy Patrol MFT Policy Patrol user groups Group permissions Uninstalling Policy Patrol File Transfers New Transfer Authentication Options Expiration options Notification options Upload notifications Download notifications Inbox Outbox Drafts Deleted Search File Transfers Contacts Manage contacts Invite Contacts Setting up a New Account Downloading Files Inbox Outbox Drafts New Transfer Changing Account Information Users Manage users Invite users Changing Account Information Exchange Agents & Rules... 47

5 6.1 Agent Management Agent Rules General Rule Users Rule Direction Rule Conditions Rule Exceptions Rule Actions Editing a Rule Ordering rules Templates Image Replacement Default Transfer Settings Retention Policy Branding Uploading Your Logo Customizing the Portal Theme Anti-Malware Install Metascan Enable Metascan in Policy Patrol Settings SMTP Settings Send Test Active Directory Updates Licenses Widgets Troubleshooting Knowledge Base How can I permanently delete a file? How can I change my password or security question? How can I change the expiration date of a File Transfer? Contacting Red Earth Software iv

6 Chapter 1 Introduction P olicy Patrol MFT allows users to exchange files securely inside and outside the organization, without requiring the user to change the way they work. By making use of rules, Policy Patrol can ensure that files are automatically exchanged according to company policy. 1.1 Why do you need Managed File Transfer? All companies have a need to exchange files with external contacts. The most common way of exchanging files is by attaching them to an . Although this is an easy and fast way of exchanging files, there are a number of disadvantages to this method: 1. Large attachments might not get through since most mail servers impose limits on the size of attachments. 2. can be intercepted and confidential attachments can be exposed. 3. You cannot be sure that the intended recipient has received and downloaded your files. Another solution is to use FTP to send and receive files. The problem with FTP is that it is usually not secure and it involves the Administrator setting up FTP accounts and maintaining these accounts and permissions which can be time intensive and pose delays for the user trying to send the files. The other solution is to burn files on a CD or DVD and send them via courier. Needless to say this method is far from ideal; there is a high cost involved and it delays delivery. Companies require a solution that allows their users to send and receive large and confidential files securely and instantly. A Managed File Transfer solution allows files to be uploaded to a secure server, from where the (if applicable authenticated) recipient can download the files and the sender receives confirmation that the files have been downloaded. 5

7 1 INTRODUCTION 1.2 Policy Patrol highlights Policy Patrol offers the following capabilities: Send and receive files securely with external contacts. Send and receive files securely inside the organization. Standard Authentication for one-off contacts. Advanced Authentication for regular contacts and increased security. Automatically send attachments securely without requiring user input. Specify conditions that must be met in order to send attachments securely. Overcome attachment size limits. Manage the life cycle of files. Central visibility into the files that are being exchanged by your company. Role based access Audit trail for each individual file, including who uploaded and downloaded the file and when. If download/upload is interrupted the process can be started from where it failed, instead of having to start from scratch again. Receive upload and download notifications. 1.3 Why Policy Patrol? Policy Patrol integrates into your current environment and lets you set company-wide rules for sending attachments securely. The advantage of this is two-fold; Thanks to the Exchange Server integration the process is completely transparent to the user, and does not require the user to change the way they currently work. In addition, thanks to the comprehensive rules, companies no longer need to leave it up to the user to decide when to send files securely. Instead, the company can define rules and policies that will govern the sending of attachments and rest assured that files are exchanged securely when necessary. Since the integration is at Exchange Server level, there is no client installation necessary. Users can also send file transfers via your company portal, and your customers and suppliers can send files to you via your website. 1.4 Conventions Conventions used in this manual: Bold text is used to signify a selection or button, for instance the Deliver button, or the option Move to Folder. Courier font is used to signify text that must be entered in the program, for instance enter pricelist and click Submit to search for the term. Paragraph and chapter names are listed in between parentheses, for instance for instructions on how to install Policy Patrol, consult chapter 2 Installation. 6

8 1 INTRODUCTION Keys are displayed in capitals and in between brackets, such as [CAPS], [TAB] or [DELETE]. Throughout the manual there are Tips, Info and Notes that contain useful information: Note type: Tip Info Note Contains: Useful information to get the best out of Policy Patrol More in-depth, background information Important notes that you should be aware of 7

9 Chapter 2 Installation T his chapter describes the steps for installing the different Policy Patrol MFT components and their system requirements. 2.1 Introduction The Policy Patrol MFT program consists of the following components: 1. Policy Patrol MFT Server 2. Policy Patrol MFT Agent (for Exchange) The components must be installed in the order listed above. Note The Policy Patrol MFT Agent is the only component that must be installed on an Exchange Server machine. The Policy Patrol MFT Server can be installed on the same machine as the Policy Patrol MFT Agent or on a different machine, depending on your preference. 2.2 Microsoft SQL Server or MySQL Before installing the Policy Patrol MFT Server, Microsoft SQL Server or MySQL needs to be installed. For more information see the respective paragraph below. 8

10 2 INSTALLATION If you are using Microsoft SQL Server Policy Patrol MFT supports Microsoft SQL Server 2008 R2 or Microsoft SQL Server must be installed before the Policy Patrol MFT Server is installed. Policy Patrol MFT can be installed on the same machine as Microsoft SQL Server, but it can also be installed on a different machine. Note that if Microsoft SQL Server is installed on another machine, you must make sure that in Server Properties > Connections, the Allow remote connections to this server checkbox is checked. Also, the SQL Database user (entered during the Policy Patrol MFT Server installation) needs to use SQL Server authentication, not Windows authentication If you are using MySQL MySQL or higher needs to be installed before installing the Policy Patrol MFT Server. For instructions on how to install MySQL, consult the following web page: MySQL can be installed on the same machine as any of the Policy Patrol MFT components, but it can also be installed on a different machine. Important: If MySQL is installed on a different machine follow the next steps before installing Policy Patrol MFT Server: 1. Open a DOS command prompt on the server that has MySQL installed. (e.g.: cd C:\Program Files\MySQL\MySQL Server 5.5\bin); 2. Run the following command from the mysql\bin directory: mysql -uroot -ppassword (in this case, password is your root password created when installing MySQL); 3. A mysql> prompt should be displayed. 4. To grant remote connection privileges, run the following commands: mysql> GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY 'PASSWORD'; (where PASSWORD is the password used to connect to MySQL remotely from now on; and root is the user you created and used for the Policy Patrol MFT instance) mysql> FLUSH PRIVILEGES; mysql> exit; 2.3 Installing the MFT Server The MFT Server is the component that securely stores the files on the file server. The MFT Server must be installed before the Policy Patrol MFT Agent can be installed. 9

11 2 INSTALLATION Prerequisites To install the Policy Patrol MFT Server, the following needs to be installed on the machine: Windows Server 2012, 2008/2008 R2 or Windows SBS 2011 Microsoft Internet Information Services (IIS) 7 Microsoft.NET Framework 4.0 (if you do not have this installed, the Policy Patrol installation program will download and install it for you) Note Before installing the Policy Patrol MFT Server, Microsoft SQL Server or MySQL needs to be installed. For more information see the respective paragraph above. We recommend using a machine that meets the Microsoft.NET Framework 4.0 system requirements: Minimum 1Ghz processor, 512 MB RAM, and 60 MB free disk space for the Policy Patrol components. Note however that if you do not yet have Microsoft.NET 4.0 Framework installed this will require another 600 MB 2 GB of disk space, depending on your operating system: Installation To install Policy Patrol MFT Server follow the next steps: 1. Double-click on ppmftserver.exe. The Install Program will start up. If you do not have Microsoft.NET Framework installed, the Policy Patrol installation program will install it for you. 2. In the Welcome screen, click Next. 3. Read the License Agreement and select Yes to accept the agreement 10

12 2 INSTALLATION 4. In Install Policy Patrol MFT Server to select the destination folder for the Policy Patrol installation. By default the program will be installed in C:\Program Files (x86)\red Earth Software\Policy Patrol MFT\Server. If you wish to change the location, click Change and select another folder. The Temporary Storage Location is used for any temporary files that need to be stored by the MFT Server. By default this location is or C:\Program Files (x86)\red Earth Software\Policy Patrol MFT\Server\Data\. If you need to change the location, click Change. The File Storage Location is used to store permanent files. Files that are sent and received by Policy Patrol MFT will be stored in this location until they expire or are removed. By default this location is C:\Program Files (x86)\red Earth Software\Policy Patrol MFT\Web\Storage\. If you want to change the file storage to another location on the current machine, click Change. If you want to use a network path, click Next and follow the instructions after installation in the Policy Patrol MFT Web Setup Wizard to change the location to a network path (see paragraph 2.5). When you are ready, click Next. 5. In Policy Patrol MFT Server IP (local IP address), your local IP address will be entered. You only need to change this if your machine has multiple IP addresses. If you have multiple addresses, you must enter the IP address that the Policy Patrol MFT Server is being installed on. 11

13 2 INSTALLATION In Port enter the port to be used for communicating with the Policy Patrol MFT Agent. By default this is port If you want to use a different port, remember that you will need to enter the same port number when installing the Policy Patrol MFT Agent (point 6 in paragraph 2.4.2), since the Policy Patrol MFT Server and Agent ports must match. It is recommended to leave the checkbox Add Port To Firewall ticked to ensure that your Windows Firewall is not blocking the communication between the Policy Patrol MFT components. 6. Enter the MySQL or MSSQL Server settings. Enter the IP Address or server name of the MySQL or MSSQL server to be used. If you are using MSSQL Express, you must use the full MSSQL server instance name, for example: SERVERNAME\SQLEXPRESS. Enter a Database user name and password. The Database user must have permissions to create a new database. Enter the database name that will be created, for instance ppmft_codata. Click Test Connection to verify that the settings were entered correctly. Click Next to continue. 7. Create a Policy Patrol MFT Instance. In Site URL enter the subdomain and domain that will be used in your URL. For instance if you enter upload as the subdomain, and yourdomain.com as the domain, your Policy Patrol MFT URL will be as follows: Note that the subdomain should not include spaces and cannot be more than 100 characters. Make a note of the subdomain (in this example upload) since this is the name of the Policy Patrol MFT Server instance and needs to be entered during the Policy Patrol MFT Agent installation. 12

14 2 INSTALLATION 8. Enter the Administrator account details. This account can be used to login to the Policy Patrol MFT Portal. Enter the Administrator s First Name and Last Name. Enter the User Name to be used when logging onto the Policy Patrol MFT Portal. Enter the password and enter it again to confirm. Enter the Administrator s address. Enter the address again to confirm. 9. Click Install to confirm the installation. If you want to review or change your installation settings, click Back. 10. In the Installation wizard complete dialog, click Finish. 13

15 2 INSTALLATION 2.4 Installing the Exchange Server Agent This component processes and applies Exchange Rules. The Exchange Server Agent must be installed on the Exchange Server machine Prerequisites The following programs need to be installed on the same machine: Windows Server 2012, 2008/2008 R2 or Windows SBS 2011 Microsoft Exchange Server 2007, 2010 or 2013 Microsoft.NET Framework 4.0 (if you do not have this installed, the Policy Patrol installation program will download and install it for you) Note The Policy Patrol MFT Agent must be installed on the Exchange Server machine. If you have multiple Exchange Servers you must install Policy Patrol on the Exchange Server(s) with the Hub Transport Role Installation To install the Policy Patrol MFT Agent follow the next steps: 1. Double-click on ppmftagent.exe. The Install Program will start up. If you do not have Microsoft.NET Framework 4.0 installed, the Policy Patrol installation program will download it for you. 2. In the Welcome screen, click Next. 14

16 2 INSTALLATION 3. Read the License Agreement and select I accept the terms in the license agreement to accept the agreement. 4. Select the destination folder for the Policy Patrol installation. By default the program will be installed in C:\Program Files\Red Earth Software\Policy Patrol MFT\Agent (32-bit) or C:\Program Files (x86)\red Earth Software\Policy Patrol MFT\Agent (64-bit). If you wish to change the location, click Change and select another folder. When you are ready, click Next. 5. Enter the Policy Patrol MFT Agent Settings. In MFT Agent Name, enter the name for the agent. This name will be shown in the Agent list in the Policy Patrol MFT Portal. In MFT Instance Name, enter the MFT Instance Name (subdomain) you entered during the Policy Patrol MFT Server, in our example upload (See paragraph point 7). 15

17 2 INSTALLATION 6. Enter the Policy Patrol MFT Agent IP Address and Port Settings. In Agent IP (Local IP Address), enter the IP address of the local machine. In MFT Server IP Address, enter the IP address of the Policy Patrol MFT Server. In Port for communicating with the server, enter the port to be used by the Policy Patrol MFT Agent to communicate with the Policy Patrol MFT Server. By default this is port If you changed the port during the Policy Patrol MFT Server installation (see point 5 in paragraph 2.3.2), you must enter the same port in this dialog (the Policy Patrol MFT Server and Agent ports must match). Select the checkbox Add Firewall Rule For This Port if you want the installer to automatically insert an exception for the port in the Windows Firewall (recommended if you have Windows Firewall enabled). 7. Click Install to confirm the installation. If you want to review or change your installation settings, click Back. 8. In the Installation wizard complete dialog, click Finish. 2.5 Completing Setup Now you must login to the Policy Patrol MFT Portal to complete the Setup. 16

18 2 INSTALLATION 1. Login to the Policy Patrol MFT portal, in our example Enter the credentials that you entered during the Policy Patrol MFT Server installation. 2. Click Next in the Web Setup Wizard screen. 17

19 2 INSTALLATION 3. Select whether you wish to store files on a local drive on the Policy Patrol MFT Server (Local Drive), or to a network path (Network Share). If you select Local Drive, the storage folder that was entered during installation will be used (see point 4 in paragraph 2.3.2). If you select Network Share, you will be asked to enter the network path details: In UNC Path To Remote Folder, enter the network path to the shared folder, for example \\HostName\SharedFolder. Enter user credentials with access to the UNC path (note that the user must have read/write permissions for that folder). Enter the Domain\UserName, for example AUT\Administrator, and the password. When you are ready, click Next. 18

20 2 INSTALLATION 4. In SMTP Host, enter the IP address of the SMTP host. In SMTP Port, leave 25 entered, unless you know it uses a different port. Click on Advanced Settings to see advanced options. Select Enable SSL to specify whether SSL is used to access the configured SMTP host. Select Ignore Certificate if you wish any SSL certificate warnings to be ignored. If the SMTP host requires SMTP authentication you must enter your Domain, i.e. YOURDOMAIN, user name and password. When you are ready, click Next to continue. 19

21 2 INSTALLATION 5. In the My Account dialog, enter the account information for the Administrator. Click Next. You have now completed the set up for Policy Patrol MFT. Click Finish to enter the Portal. You must now add users to Policy Patrol MFT as described in paragraph Adding Users to Policy Patrol MFT You can add Policy Patrol MFT users by synchronizing with the Active Directory and adding members to the Policy Patrol MFT Active Directory Groups. Alternatively you can invite users by going to Users > Invite User in the Policy Patrol MFT Portal. 20

22 2 INSTALLATION Synchronizing users from Active Directory If you wish to automatically add Policy Patrol MFT users by applying group memberships in Active Directory, you must follow the next steps in the Policy Patrol MFT Portal: 1. Go to Settings > Active Directory. 2. In Server Address enter the IP address of your Domain Controller. Enter the Administrator username (DOMAIN\Username) and password. This account must have rights to create groups in Active Directory. If you select Enable synchronization, Policy Patrol will query the Policy Patrol Active Directory Groups for new users. If Policy Patrol finds new users it will add them to the Unlicensed users list. Select Automatically license new users if you wish to automatically add any new users to the Licensed users group. Note Licensed users can send and receive transfers. Unlicensed users can only see past transfers. 3. When you are ready, Click Update. If everything is correct, you should see a green circle with a check mark followed by: Active Directory synchronization is running. You will now see three Policy Patrol MFT Groups in Active Directory: 21

23 2 INSTALLATION Group Policy Patrol MFT Compliance Officers Policy Patrol MFT Administrators Policy Patrol MFT Users Default members No default members Domain Administrators No default members By default the Domain Administrators are a member of the Policy Patrol MFT Administrators group. The different permissions per user group are described in the paragraph Policy Patrol user groups. In order to allow users to send and receive transfers, you must add them to one of the Policy Patrol MFT groups. Note In order to provide users access to Policy Patrol MFT, they will need to be added as a member of one of the Policy Patrol MFT Active Directory groups, or they need to be invited as a user (see below) Inviting users to Policy Patrol MFT In addition to synchronizing with Active Directory, you can also invite users as follows: 1. Go to Users > Invite New User. 22

24 2 INSTALLATION 2. Enter the user details: First Name, Last Name, and Address. In Username, enter the suggested user name (the user name is used when the user logs on to the Portal). This user name will be prefilled when they create their account. If desired, the user can change the user name when setting up their account. In Custom Message, enter the message you would like to include (if any). This message will be inserted into the User invitation message. Select the user role for this user: User, Administrator or Compliance Officer. Click Invite. The user will be listed under Pending User Invitations. 3. The user will now receive an invitation that will ask the user to click on the link in the to create their user account. When they click on the link, they will be asked to enter their account details. If they did not receive the invitation , go to Users > View Pending Invitations. Click on Resend Invitation for the User. 4. The user will then receive an asking them to activate their account. The account will now be enabled and the user will be listed under Users > Manage Users. Info The texts for invitation and activation s can be edited in Settings > Templates. 23

25 2 INSTALLATION 2.7 Policy Patrol user groups Policy Patrol MFT can be used by three different user groups, based on their role within the organization: Policy Patrol MFT Compliance Officers (these users have access to all options in the program and can view all users transfers, and permanently delete transfers and files from the Deleted folder). Policy Patrol MFT Administrators (these users can access all settings, add licenses, install components, but can only view their own transfers - they have no access to file transfers from other users. They also cannot permanently delete files and transfers, only move transfers to the deleted folder). Policy Patrol MFT Users (these users can invite contacts, move files and transfers to deleted items, but can only view their own transfers and cannot view settings or permanently delete from deleted items) Group permissions Below is an overview of the permissions per user group: Permissions Compliance Officers Administrators Users View your own transfers Yes Yes Yes View transfers of others Yes No No Permanently remove from deleted Yes No No View Settings node Yes Yes No Disable contacts Yes Yes Yes Reset password for contact Yes Yes Yes Delete contact Yes No No View deleted items folder Yes No No 2.8 Uninstalling Policy Patrol When uninstalling Policy Patrol MFT, uninstall each component from Add or Remove programs. Make sure however, that you uninstall Policy Patrol MFT Server last. 24

26 Chapter 3 File Transfers T his chapter describes how to initiate new file transfers and the different transfer options that are available. In addition it describes how to manage file transfers including searching, expiring and deleting file transfers. 3.1 New Transfer Files can be uploaded by clicking on New Transfer. 25

27 3 FILE TRANSFERS To select files to be uploaded, click on Add Files or the plus sign (+). Alternatively, drag and drop files into the area marked with Drag files here. You can select single or multiple files. You can also select entire folders to be uploaded. Each file will appear in the list along with the size of the file. The total size of all files will also be listed. If you want to remove a file from the upload, click on the minus sign (-) next to the file. Click on the Thumbnails button in the top right corner to see the thumbnails for the files. To go back to the List view, click on the List button next to it. To upload the files to the Policy Patrol MFT server click on Start Upload. Note that you do not need to click on Start Upload; when you click Send the files will automatically be uploaded too. Now enter the name and address of the recipient and the subject for the . Multiple recipients need to be separated by a comma. If you wish to add a message, click on Add a message and enter the message to be included in the notification to the recipient. 26

28 3 FILE TRANSFERS In Adjust Transfer Settings there are a number of further options available that are discussed in the next paragraphs. When you are ready, click Send. The file transfer will now be listed in your Outbox folder. If you are not ready to send the transfer yet, you can click Save. The transfer will be saved in your Drafts folder. To send the transfer from Drafts, click on the Edit button for the Transfer and click on the Send button Authentication Options Select whether you wish to send the file(s) using Standard Authentication or Advanced Authentication. If Standard Authentication is selected, the recipient will receive an with a unique URL in the to the uploaded file(s). The advantage of this method is that it is easy for the recipient to retrieve the files. The recipient simply has to click on the link and download the files from a web page. The disadvantage of this method is that theoretically anyone who intercepts the is able to download the files. 27

29 3 FILE TRANSFERS Advanced Authentication is a more secure way of sending files. If Advanced Authentication is selected, the recipient will receive an that they have received a new transfer. When they click on the download link they will be asked to enter their Policy Patrol MFT credentials, after which the files will be downloaded. If the contact does not yet have an existing account, the contact will automatically receive an invitation asking them to create a new user account. After creating the account, the contact will be able to download the files Expiration options Select whether you wish the files to expire. You can either select to expire the file(s) after a certain number of days, and/or you can select to expire the file(s) when they have been downloaded for a specified number of times per recipient. If you select to expire the files after a certain number of days, the expiration date will be shown in the Expiration column of the Transfer details. Once this expiration date is reached, the files will no longer be available to the recipient and the transfer will be marked as Expired in the Sender s Outbox folder. If you select to allow only a certain number of downloads per recipient, the recipient will automatically be denied access to the file once the maximum number of downloads is reached. Once all recipients of a file transfer have reached the maximum number of downloads, the file transfer will be marked as Expired in the Sender s Outbox folder. 28

30 3 FILE TRANSFERS Notification options You can select from a number of notification options: Upload notifications Select Send notification when upload succeeds to receive an notification when your files are successfully uploaded. If you select the option Send notification when upload fails, you will receive an if there is a failure during upload Download notifications You can also select to receive a download notice when the file is downloaded by the recipient. Select On First Download if you only wish to receive a notification the first time the recipient downloads the file(s). If you wish to receive a notification each time the files are downloaded by the recipient, select On Every Download. If you do not want to receive a download notice, select Never. 3.2 Inbox You can view all incoming transfers by going to Inbox. The sender, subject, recipient, date received, and number of files will be listed for each file transfer you received. Note If the sender or recipient name is not known, the address will be displayed. Click on the transfer to view the details (you can click on any item, e.g. subject, sender, etc). The details pane shows the sender, recipient, date and message for the file. For each file included in the file transfer, the file name and size will be displayed. To download the file, click on the download link next to the file. To return to the Inbox view, click << Back. Note When an incoming file transfer expires (i.e. the expiration date is reached or your maximum number of downloads is reached) the file transfer will no longer be listed in the Inbox. 29

31 3 FILE TRANSFERS If you wish to delete a file transfer, select the checkbox next to the file transfer and click on the Delete button. A warning dialog will pop up. If you choose Yes, the selected transfer is moved to the Deleted folder. The file(s) will still remain on the File Server though. A warning dialog will pop up. If you choose OK, the selected files are moved to the Deleted folder. If only one file is deleted from a transfer with several files, the deleted file will be listed in the Deleted folder identically to the original transfer, but the only file in the transfer in the Deleted items will be the deleted file. The other files will remain in the File Transfers in the Inbox folder. The file(s) will still remain on the file server though. 3.3 Outbox You can view all sent transfers by going to Outbox. The recipient, subject, date sent, number of files, and status will be listed for each transfer you sent (and has not been deleted). Click on the transfer to view the details (you can click on any item, e.g. subject, sender, etc). The details pane shows the sender, recipient, date and message for the file. For each file included in the file transfer, the file name, size, and status will be displayed. To download the file, click on the download link. If you wish to view or change the expiration date or maximum number of downloads, you can click on the Details button. The Details button next to the file transfer will show information about all the files in the transfer, if you click on the > sign next to the file transfer and then on the Details button next to the file name you wil see information about that file only. The Expiration tab includes information on the expiration date for the file. The Download Limit tab includes information on the number of times the file was downloaded and the maximum number of allowed downloads. To change the expiration date, click on the Expiration tab and select the option..expire on.. (where the selected date will be the expiration date),..expire in.. (where you enter the number of days the file should be available from today) or.. extend by.. (where you enter the number of additional days the file should be available after the existing expiration date). Click Apply to save the changes. 30

32 3 FILE TRANSFERS To change the maximum number of allowed downloads, click on the Download Limit tab and enter the additional number of downloads that you wish to apply (this will be in addition to the number of allowed downloads listed at the top of the dialog). Click Apply to save the changes. If you change the expiration date to a date that has passed, the files will marked as Expired. The file(s) will still remain on the File Server, however the recipient will no longer have access to the files. If you only expire one file from a transfer with several files, the file will show as Expired in the list and will no longer be available to the recipient. All other files in the file transfer will still be available. If you wish to delete a file transfer, select the file transfer and click on the Delete button. A warning message will appear. If you choose OK, the file transfer is moved to the Deleted folder. The file(s) will still remain on the File Server, however the recipient will no longer have access to the files (if the recipient clicks on the file link, they will see a message saying that the file has expired and is no longer available). To delete an individual file, select the file(s) to be deleted and click on the Delete button. A warning dialog will pop up. If you choose OK, the selected files are moved to the Deleted folder and will be listed under the file transfer. The file(s) will still remain on the file server, however the recipient will no longer have access to the files. 3.4 Drafts Drafts Transfers are transfers that have not yet been sent. Draft Transfers are created by going to New Transfer and then clicking Save instead of Send. You can view all draft transfers by going to Drafts. The subject, recipient, and number of files will be listed for each draft file transfer. Note If the sender or recipient name is not known, the address will be displayed. 31

33 3 FILE TRANSFERS If you wish to send a draft file transfer, select the transfer and click on the Edit button. You will now go to the New Transfer dialog. Make any necessary changes and click on the Send button. To delete a file transfer from Drafts, click on the Delete button next to the file transfer. The item will now no longer appear in Drafts. 3.5 Deleted You can view all deleted transfers by going to Deleted. The sender, subject, recipient, date received, and number of files will be listed for each transfer that was deleted. Note If the sender or recipient name is not known, the address will be displayed. If you wish to permanently delete a file transfer, select the transfer to be permanently deleted and click on the Purge button (note that this button is only available to Compliance Officers). A warning dialog will pop up. If you click OK, the transfer and its associated files will be permanently removed from the file server. If the recipient clicks on the link of an expired or deleted file, they will see a message saying that the file has expired and is no longer available. If you wish to permanently delete only certain files from the file transfer, select the file(s) to be permanently deleted and click on the Purge button (note that this button is only available to Compliance Officers). A warning dialog will pop up. If you click OK, the selected files will be permanently removed from the file server. The other files in the file transfer will still remain in 32

34 3 FILE TRANSFERS the Deleted folder and on the file server. If the recipient clicks on the link of an expired or deleted file, they will see a message saying that the file has expired and is no longer available. Click on the > sign next to the transfer to see the files included in the transfer. The File Name and Size will be listed, along with a download icon to download the file. Note You cannot edit the Expiration date or Maximum number of downloads for a Deleted transfer. To do this, you would have to restore the file transfer or file first. To restore a file transfer, select the appropriate file transfer(s) and click on the Restore button. The selected file transfers will be moved from the Deleted folder to the appropriate folder (Inbox or Outbox). To restore individual files only, select the appropriate file(s) and click on the Restore button. A dialog will pop up asking you to confirm whether you wish to restore the selected file(s). When you click OK, the selected files will be moved from the Deleted folder to the appropriate folder (Inbox or Outbox). If not all files from a transfer are restored, only the selected file(s) will be moved. The file transfer will remain listed in the Deleted folder but will only show the other remaining file(s). If there is only one file in the transfer, restoring the file will also restore and move the entire transfer out of the Deleted folder and back to the appropriate folder. Note If an incoming file transfer is deleted, it will remain visible in the Deleted folder until it expires (i.e. the expiration date is reached or the maximum number of downloads per recipient is reached). When it expires, the file transfer will no longer be listed in the Deleted folder. 3.6 Search File Transfers Policy Patrol MFT includes a simple search field that is accessible in the top right corner of the Portal. If you enter a search query in this field, Policy Patrol will search for items and will display any results that match. Policy Patrol will search the following fields: Sender: This includes the name and address of the sender. 33

35 3 FILE TRANSFERS Recipient: This includes the name and address of the recipient. Subject: This is the subject of the file transfer or . Body: This is the body of the or the optional message that was entered during the file transfer. File name: The name of the files in the transfer. 34

36 Chapter 4 Contacts P olicy Patrol MFT allows you to send secure file transfers to contacts outside your organization. If using Advanced Authentication, contacts need to create an account in order to be authenticated. This chapter describes how to manage and create accounts for contacts and how they can download files. 4.1 Manage contacts Go to Contacts > Manage contacts to see a list of contacts that have set up an account and can use Advanced Authentication. For each contact the name, company, address, and status will be displayed. 35

37 4 CONTACTS To temporarily disable a contact, click on the Disable button next to the contact. If the contact goes to the Policy Patrol MFT portal, or clicks on a file download link, they will see a message saying that their account has been disabled. To enable a contact again, click on the Enable button next to the contact. To reset the password for the contact, click on Reset Password. The contact will receive an asking them to create a new password. Note that there are no action buttons for contacts using an external account to sign in, such as Google or LinkedIn. 4.2 Invite Contacts There are three ways to invite new contacts to set up an account in order to exchange secure files with you: 1. By sending the new contact secure files through the New Transfer page and selecting the Advanced Authentication option. 2. By going to Invite Contacts and submitting an invitation to create a new account (you would choose this option if you wish to receive files from this recipient, or if you wish the recipient to create the account before you send any files for increased security). 3. By sending the contact an for which an policy rule applies with Advanced Authentication. To invite a new contact, go to Contacts > Invite New Contact. Enter the first name, last name and address, company and suggested user name. The will already include the standard template. If you wish to add a custom message too, you can do this by entering text in the Message field. When you are ready, click Invite. 36

38 4 CONTACTS Once a contact has been sent an invitation they will be listed in Pending Invitations. When the contact clicks on the verification link in the and sets up their account, the contact will be moved from Pending Invitations and will be listed under Manage contacts. If the contact has not yet set up their account you can resend the invitation by clicking on the button Resend Invitation. If you wish to delete a pending invitation, you can click on the Delete button. 4.3 Setting up a New Account After sending an invitation to a new contact, the contact will receive an invitation (the text can be customized in Templates). The invitation will contain a link that will show a dialog allowing the user to create a new account in Policy Patrol MFT or sign in with an existing Google or LinkedIn account. 37

39 4 CONTACTS To create a new account in Policy Patrol MFT, click on Create new Policy Patrol MFT Account. The contact will now be asked to enter their name, address, company name and password. They must also select a security question from the list and enter the answer to the security question (the answer is not case sensitive). If the user forgets their password, they will be able to reset their password by providing the correct answer to the security question. After the contact clicks on the button Create Account, the contact will receive a verification with a link. When the contact clicks on the link in the , the account will be enabled. If the contact does not click on the link to verify the address, the Contact will be listed in de the Pending Contact Invitations list. To use an existing Google or LinkedIn account, the contact must click on the appropriate button and enter their login details. An additional dialog will appear asking the contact to enter some additional information. After completing the account creation, an activation link will be sent to the contact s address. The account will be enabled when the contact clicks on the activation link. The contact will now be able to login to Policy Patrol MFT by clicking on the Google or LinkedIn button and entering their login details. 38

40 4 CONTACTS If the Contact has forgotten their password, they will be able to click on the I forgot my password link. The contact must enter the answer to their security question. If the answer to the security question is correct, the Contact is sent an with a link from where they can reset their password. You can also reset the password for a contact from Manage Contacts (see paragraph 4.1). If you reset the password for a contact, they will receive an with a link to reset their password. 39

41 4 CONTACTS 4.4 Downloading Files When the Contact has received new files and clicks on the download link, the Contact will be asked to enter their Policy Patrol MFT portal login details. The download will start automatically after entering the details. 40

42 4 CONTACTS 4.5 Inbox Contacts will be able to browse incoming file transfers by going to the Inbox folder. When a transfer expires or is deleted by the Sender, the file transfer will no longer be displayed in the Inbox. If a Contact clicks on a link in an notification of an expired or deleted transfer, the Contact will see a message saying that the files have expired. To view and download the files of the file transfer, the Contact must click on the > sign next to the File Transfer. To delete the transfer, the Contact can select the checkbox next to the transfer and click on the Delete button. To delete individual files, the checkbox next to the file must be selected and then the Contact must click Delete. 4.6 Outbox Contacts can browse their outgoing file transfers from the Outbox. 41

43 4 CONTACTS 4.7 Drafts The Drafts folder lists saved transfers that have not yet been sent. 4.8 New Transfer Contacts will be able to send files securely to your organization by going to New Transfer. The options will be the same as described in Chapter 3. Note Contacts can only send files to Policy Patrol MFT users, not to contacts or other external addresses. 4.9 Changing Account Information If you wish to change your details or your security question and answer, you can do this by going to My Account > My Information. Click Save to save any changes. To change your password, go to Change Password. Enter your old password and your new password. Confirm your new password and click Save. 42

44 Chapter 5 Users P olicy Patrol MFT licenses users from your Active Directory. This chapter describes how to import users, license users and disable users. 5.1 Manage users In Manage users you will see a list of Active Users, Unlicensed Users and Disabled Users. Users in the Active Users list are able to send and receive files through Policy Patrol MFT. 43

45 5 USERS To disable a user, click on the Disable button next to the user. The user will now be moved from the Active Users list to the Disabled Users list. To unlicense a user, click on the Unlicense button next to the user. The user will now be moved from the Active Users list to the Unlicensed Users list. 5.2 Invite users To invite a new user, go to Users > Invite New user. Enter the First name, Last name, address, Suggested user name and message. Click Invite. The user will receive an invitation . Until the user creates their account, they will be listed in Pending Invitations. To delete a user from Pending Invitations, click on the Delete button next to the user in Pending Invitations. To resend the invitation to the user, click on the Resend Invitation button next to the user. 5.3 Changing Account Information If the user account is synchronized with Active Directory, the user will not be able to make any changes to their account or password since Policy Patrol MFT will use Windows Integrated Authentication and the user can use their Windows password to log onto the Policy Patrol MFT portal. The user will see the following note: Your account is managed by Active Directory. 44

46 5 USERS If the user was invited to become a Policy Patrol User without Active Directory synchronization, the user will be able to change their password and update their security question, by clicking on My Account. 45

47 5 USERS In My Information, the user can change their name, company and security question and answer. Click Save to apply the changes. To change your password, go to Change Password. Enter your Old Password and then enter your new password in New Password and enter it again in Confirm password. Click Save to update the password. 46

48 Chapter 6 Exchange Agents & Rules P olicy Patrol MFT allows you to set central policies to ensure the secure transfer of certain files without requiring any user intervention. Exchange Server Rules allow you to set policies for your attachments. 6.1 Agent Management 47

49 6 EXCHANGE AGENTS Note The Exchange Agents node is only visible to Administrators and Compliance Officers. When Exchange Agents are installed they are automatically added to the list. The Exchange Agents are used to run rules on incoming and outgoing s and are installed on the Exchange Server. For each Agent the Name, Address, and State (Disconnected/Connected) is listed. To disconnect an Agent, click on the Disconnect button. Agents listed in Known Agents have not been registered. 6.2 Agent Rules Policy Patrol allows you to configure rules that specify which attachments must be sent via secure transfer. This gives you the peace of mind that certain attachments will always be sent via secure transfer, without requiring any action on the user s part. To create a new Rule, go to Settings > Manage Rules and click on the Add Rule button. A rules wizard will appear that will guide you through a number of dialogs. Notice that the bottom pane contains the rule description. This description is updated each time you make new selections. You will be guided through the following dialogs: General In the General dialog you must enter the Rule Name, Rule Description and select whether the rule is Enabled. When ready, click on the right arrow to go to the next dialog. 48

50 6 EXCHANGE AGENTS Rule Users Select the Users for the rule. Select All users to apply the rule to all users listed as Active users in Users > Manage users. Select Selected users if you wish to apply the rule to specific users only. 49

51 6 EXCHANGE AGENTS Rule Direction Select the Direction for the rule. You can select Internally Sent, Internally Received, Externally Sent, Externally Received. 50

52 6 EXCHANGE AGENTS Rule Conditions In the Conditions dialog you can select which conditions must trigger the rule. If you select multiple conditions you can select Match any of the conditions or Match all of the conditions. For instance if you wish to send all files via secure file transfer that have a sensitivity of Confidential and are larger than 1 MB, you must select Match all of the conditions. If you wish to send attachments larger than 1 MB via secure file transfer, as well as s that have been marked as Confidential, then you must select Match any of the conditions. 51

Manual POLICY PATROL SECURE FILE TRANSFER

Manual POLICY PATROL SECURE FILE TRANSFER Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information

Manual POLICY PATROL SIGNATURES FOR OUTLOOK, GOOGLE APPS & OFFICE 365

Manual POLICY PATROL SIGNATURES FOR OUTLOOK, GOOGLE APPS & OFFICE 365 Manual POLICY PATROL SIGNATURES FOR OUTLOOK, GOOGLE APPS & OFFICE 365 MANUAL Policy Patrol Signatures This manual, and the software described in this manual, are copyrighted. No part of this manual or

More information

How To Use The Policy Patrol Archiver Server

How To Use The Policy Patrol Archiver Server POLICY PATROL ARCHIVER FOR ADMINISTRATORS Manual MANUAL Policy Patrol Archiver For Administrators This manual, and the software described in this manual, are copyrighted. No part of this manual or the

More information

Installing Policy Patrol on a separate machine

Installing Policy Patrol on a separate machine Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the

More information

Quick Start Policy Patrol Mail Security 10

Quick Start Policy Patrol Mail Security 10 Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

Quick Start Policy Patrol Mail Security 9

Quick Start Policy Patrol Mail Security 9 Quick Start Policy Patrol Mail Security 9 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Quick Start Policy Patrol Spam Filter 9

Quick Start Policy Patrol Spam Filter 9 Quick Start Policy Patrol Spam Filter 9 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Manual POLICY PATROL EMAIL DISCLAIMERS

Manual POLICY PATROL EMAIL DISCLAIMERS Manual POLICY PATROL EMAIL DISCLAIMERS MANUAL Policy Patrol Email Disclaimers & Signatures This manual, and the software described in this manual, are copyrighted. No part of this manual or the described

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

MANUAL. Policy Patrol Email. Disclaimers. Version 7

MANUAL. Policy Patrol Email. Disclaimers. Version 7 MANUAL Policy Patrol Email Disclaimers This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated or

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide

Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Table of Contents TABLE OF CONTENTS... 3 1.0 INTRODUCTION... 1 1.1 HOW TO USE THIS GUIDE... 1 1.2 TOPIC SUMMARY...

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Omtool Server Monitor administrator guide

Omtool Server Monitor administrator guide Omtool Server Monitor administrator guide May 29, 2008 (4.0342-AA) Omtool, Ltd. 6 Riverside Drive Andover, MA 01810 Phone: +1/1 978 327 5700 Toll-free in the US: +1/1 800 886 7845 Fax: +1/1 978 659 1300

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

Installation & Configuration Guide

Installation & Configuration Guide Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks

More information

Quick Start Policy Patrol Spam Filter 5

Quick Start Policy Patrol Spam Filter 5 Quick Start Policy Patrol Spam Filter 5 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

Installing Policy Patrol with Lotus Domino

Installing Policy Patrol with Lotus Domino Policy Patrol 9 technical documentation May 21, 2013 If you have Lotus Domino R5/6/7/8/9 Mail Server, you must install Policy Patrol on a separate Windows 2003/2008/2012 machine and forward your mails

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Quick Start Policy Patrol Disclaimers 10

Quick Start Policy Patrol Disclaimers 10 Quick Start Policy Patrol Disclaimers 10 This guide will help you start using Policy Patrol Disclaimers as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

IBackup Drive User Guide

IBackup Drive User Guide IBackup Drive User Guide TABLE OF CONTENTS Introduction... 3 Features... 4 Install IBackup Drive... 5 Login to IBackup Drive... 5 About Main Screen... 7 Settings... 8 Toolbar Options... 11 IBackup Drive

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

POLICY PATROL ARCHIVER FOR USERS. Manual

POLICY PATROL ARCHIVER FOR USERS. Manual POLICY PATROL ARCHIVER FOR USERS Manual MANUAL Policy Patrol Archiver For Users.0 This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

Getting Started Guide

Getting Started Guide GFI MailArchiver for Exchange Getting Started Guide By GFI Software Ltd. http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and

More information

Manual POLICY PATROL EMAIL MAIL SECURITY

Manual POLICY PATROL EMAIL MAIL SECURITY Manual POLICY PATROL EMAIL MAIL SECURITY MANUAL Policy Patrol Email Mail Security This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Online Backup Client User Manual

Online Backup Client User Manual For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

ScriptLogic File System Auditor User Guide

ScriptLogic File System Auditor User Guide ScriptLogic File System Auditor User Guide FILE SYSTEM AUDITOR I 2005 by ScriptLogic Corporation All rights reserved. This publication is protected by copyright and all rights are reserved by ScriptLogic

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

WatchDox for Windows User Guide. Version 3.9.0

WatchDox for Windows User Guide. Version 3.9.0 Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or

More information

Lepide Exchange Recovery Manager

Lepide Exchange Recovery Manager Configuration Guide Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

Secure Message Center User Guide

Secure Message Center User Guide Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Archive Attender Version 3.5

Archive Attender Version 3.5 Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

Installing GFI FAXmaker

Installing GFI FAXmaker Installing GFI FAXmaker System Requirements Before you install GFI FAXmaker, please ensure that the following requirements are met. GFI FAXmaker FAX Server: A Windows 2000, 2003, 2008 server or Windows

More information

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1 Users Help Manual Lepide Event Log Manager Lepide Software Private Limited. Page 1 Users Help Manual for Lepide Event Log Manager Lepide Software Private Limited, All Rights Reserved This User Guide and

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Diamond II v2.3 Service Pack 4 Installation Manual

Diamond II v2.3 Service Pack 4 Installation Manual Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance

More information

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Microsoft Corporation Published: September 2009 Abstract This step-by-step guide describes a sample scenario for installing Microsoft

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

CoCreate Manager Server Installation Guide. CoCreate Manager Server Installation Guide 1

CoCreate Manager Server Installation Guide. CoCreate Manager Server Installation Guide 1 CoCreate Manager Server Installation Guide CoCreate Manager Server Installation Guide 1 CoCreate Manager Server Installation Guide 2 Table Of Contents 1. CoCreate Manager Server 2008 4 1.1. Installation

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Neoteris IVE Integration Guide

Neoteris IVE Integration Guide Neoteris IVE Integration Guide NESD-00090-00 CAY051402 The Secure Email Client upgrade option enables Neoteris IVE users to use standardsbased email clients to access corporate email from remote locations.

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

Team Foundation Server 2013 Installation Guide

Team Foundation Server 2013 Installation Guide Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide

More information

PLEASE NOTE: The client data used in these manuals is purely fictional.

PLEASE NOTE: The client data used in these manuals is purely fictional. Welcome! CAREWare Quick Start guides will walk you through the basics of setting up, managing and using the main CAREWare functions. It is intended for non-technical users who just need to get basic information

More information

Team Foundation Server 2012 Installation Guide

Team Foundation Server 2012 Installation Guide Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation

More information

1 of 10 1/31/2014 4:08 PM

1 of 10 1/31/2014 4:08 PM 1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings

More information

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...

More information

Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide

Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account? Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

SharePoint Password Change & Expiration 3.0 User Guide

SharePoint Password Change & Expiration 3.0 User Guide SharePoint Password Change & Expiration 3.0 User Guide Copyright Copyright 2008-2013 BoostSolutions Co., Ltd. All rights reserved. All materials contained in this publication are protected by Copyright

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

WatchDox for Mac User Guide

WatchDox for Mac User Guide WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized

More information