User Guide. The AMF's File Transfer Service (FTS)
|
|
- Cameron Franklin
- 8 years ago
- Views:
Transcription
1 User Guide The AMF's File Transfer Service (FTS)
2 TABLE OF CONTENTS 1 INTENDED USERS SCOPE OF GUIDE BACKGROUND REQUIRED CONFIGURATION CONTACT INFORMATION FOR SUPPORT SECURITY UPLOADING A FILE... 4
3 1 INTENDED USERS This guide is intended for registrants using the File Transfer Service (FTS) of the Autorité des marchés financiers (the AMF ) to upload files. 2 SCOPE OF GUIDE The guide provides the technical information required to use the FTS. 3 BACKGROUND The File Transfer Service enables registrants to securely transmit electronic documents to the AMF. The transfer is made via a secure Web interface, using the HTTPS protocol. Each registrant must therefore have an account and password for identification purposes prior to the transfer. 4 REQUIRED CONFIGURATION The AMF's File Transfer Service is a Web-based application. To use the service, you must have access to the Internet and a Web browser, such as: Microsoft Internet Explorer Mozilla Firefox Apple Safari Note: The service was tested with the above browsers. We therefore recommend that you use a recent version of one of these browsers. In principle, the system should function with other browser types. If you have any problems, please contact our Support department (see contact information below). No other installation is required on the workstation of a user who wants to use the service. 3
4 5 CONTACT INFORMATION FOR SUPPORT Organizations transmitting files using the FTS are asked to contact Support in the event of problems or for further information about the system at the following address: 6 SECURITY Data files uploaded using the FTS are protected by the following security measures: Files are transferred using a secure HTTPS protocol (SSL protocol), which encrypts files sent through the Internet. The criteria for forming the passwords assigned to you make it difficult to decrypt the files. FTS users are authorized to upload files but may not download, delete, display or rename files. Each registrant is assigned limited, compartmentalized access to the system with very specific access rights. A registrant is therefore unable to view the files previously transmitted by another registrant. Uploaded files are regularly sent to other AMF IT systems. 7 UPLOADING A FILE The process for uploading a file using the FTS appears below. Connect to the Internet, if you have not already done so. Enter the following address in your Web browser: 4
5 Enter your account ID and password. Choose English from the drop-down Language list, if you have not already done so. Then click Login. In the FTS interface, click on the Upload icon. In the Upload File dialog box, click on Browse Files. 5
6 In the Choix des fichiers à transférer par fichiers.lautorite.qc.ca [Select files to upload using fichiers.lautorite.qc.ca] dialog box, select the file to upload and then click Open. The name of the file selected will then appear in the Upload File dialog box with a pending status. 6
7 To upload several files at the same time, click on the Browse Files button again and select a file. Repeat until all of the files to upload have been selected. If a file was accidentally added to the list of files to upload, click on the file in the list to select it. Then click on the Remove button. When all of the files to upload have been selected, click on the Upload button. 7
8 During the transfer process, the file being uploaded displays an uploading status. A progress bar indicates the percentage of data transferred and the number of files remaining. Once a file has been uploaded, it disappears from the list. When all of the files have been transferred, the Upload File dialog box displays Upload completed! Click on the Close button. 8
9 The uploaded files will then be displayed in the interface. Note: If you have to upload a number of files during the same session using the FTS, you may see some of the uploaded files disappear from the screen. This is because these files have been transferred to other AMF IT systems to be processed. To end your FTS interface session, click on the Logout button. Then click on the OK button in the Are you sure you want to log out? dialog box. You will automatically be redirected to the authentication page and your session will be closed. 9
Remedy ITSM Service Request Management Quick Start Guide
Remedy ITSM Service Request Management Quick Start Guide Table of Contents 1.0 Getting Started With Remedy s Service Request Management. 3 2.0 Submitting a Service Request.7 3.0 Updating a Service Request
More informationReading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)
Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email
More informationMSGCU SECURE MESSAGE CENTER
MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and
More informationRemedy ITSM Service Request Management Quick Start Guide
Remedy ITSM Service Request Management Quick Start Guide For use by customers of IT services with Remedy ITSM at Missouri S&T Version 1.5 December 11, 2013 Table of Contents 1.0 Getting Started With Remedy
More informationBackground Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
More informationCUNY TUMBLEWEED (SECURE TRANSPORT) USER GUIDE
CUNY TUMBLEWEED (SECURE TRANSPORT) USER GUIDE INTRODUCTION Tumbleweed (Secure Transport) is used to provide secure file transfer of critical business files, financial transactions and sensitive data such
More informationDOCUMENT MANAGEMENT SYSTEM
DOCUMENT MANAGEMENT SYSTEM USER S MANUAL By: MIS Department Software Division Page 1 of 14 1. Overview Document Management System is a powerful web based file manager and storage utility. It was developed
More informationhttps://weboffice.edu.pe.ca/
NETSTORAGE MANUAL INTRODUCTION Virtual Office will provide you with access to NetStorage, a simple and convenient way to access your network drives through a Web browser. You can access the files on your
More informationSophos UTM. Remote Access via IPsec Configuring Remote Client
Sophos UTM Remote Access via IPsec Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
More informationHow To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On
Installation and Setup of Google Drive for Students on Mac OS X Purpose: This guide will lead you through the Google Drive Installation and Configuration. Pre-requisites: 1) ODU Student Gmail account 2)
More informationExperian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
More informationSchools Remote Access Server
Schools Remote Access Server This system is for school use only. Not for personal or private file use. Please observe all of the school district IT rules. 6076 State Farm Rd., Guilderland, NY 12084 Phone:
More informationAccessing the FTP Server - User Manual
CENTRAL BANK OF CYPRUS Accessing the FTP Server - User Manual IT Department, CENTRAL BANK OF CYPRUS TABLE OF CONTENTS 1 EXECUTIVE SUMMARY... 1 1.1 AUDIENCE... 1 1.2 SCOPE... 1 2 CHANGES FROM THE OLD FTP
More informationMassey University Wireless Network Client Configuration Mac OS X 10.6 10.9
Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9 MAC wireless network Requirements Information Technology Services You must have an active Massey username and password (i.e. you
More informationRemote Access: Citrix Client Setup
Introduction: The following documentation is intended to assist first time or active users with installation of the Citrix ICA connection software required to access the MSVU Remote Access system desktop
More informationMY EWU PORTAL FEATURES AND BENEFITS. Promotion of the Eastern brand name
MY EWU PORTAL The My EWU web portal is an interactive website that provides single sign-on access to different EWU information and services. Content is based on your role or roles for example; student,
More informationAccessing the Illinois CRM Report Archive Database
Accessing the Illinois CRM Report Archive Database Connecting to the Illinois CRM Report Archive Database The Illinois CRM Report Archive is a web-based database. Browsers supported are: Windows: Internet
More informationTable of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...
Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...
More informationRemote Storage Area (RSA) Basics
Remote Storage Area (RSA) Basics Table of Contents Remote Storage Area Overview... 3 What is Remote Storage Area?... 3 Who has access to RSA?... 3 How much space is available?... 3 Basic RSA Use... 4 How
More informationwww.thedatalocker.com Customer Service: 1-877-264-3715 Email Us: marketing@thedatalocker.com
TheDataLocker online backup allows you to store, backup and retrieve any computer data over the internet to a secured remote system. Its main function is to generate a duplicate of your important files
More informationMicrosoft Exchange Hosted Archive (MEHA)
Microsoft Exchange Hosted Archive (MEHA) All the Features of NYSeMAIL Archiving including Using for Business Continuity Using MEHA Using MEHA The Microsoft Exchange Hosted Archive (MEHA) can be accessed
More informationJumble for Microsoft Outlook
Jumble for Microsoft Outlook Jumble is a zero knowledge, end- to- end email encryption solution that integrates with existing email platforms. Jumble integrates at the email client level and removes the
More informationEmpathy. ITSI Online ebook Purchasing and Activation System
Empathy ITSI Online ebook Purchasing and Activation System Contents Overview Empathy Registration and Login What is Empathy? Getting Started: Registration and Login Empathy Account Creation (Registration)
More informationITSC ServiceDesk User Guide. For. End-User Inquiry Submission
ITSC ServiceDesk User Guide For End-User Inquiry Submission April 2014 The contents of this document remain the property of and may not be reproduced in whole or in part without the express permission
More informationHow To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
More informationCHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
More informationInstructions for Secure Email Cisco Registered Envelope Service (CRES)
Instructions for Secure Email Cisco Registered Envelope Service (CRES) Please read the official Cisco Guidance on the Cisco Registered Envelope Service And Frequently Asked Questions A courtesy attempt
More informationInternet Remote Access FirePass SSL VPN
Internet Remote Access FirePass SSL VPN Remote access to select Central Washington Hospital (CWH) information systems is available for hospital workers. Using a Web browser (Internet Explorer, Firefox,
More informationRecommended Browser Setting for MySBU Portal
The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,
More informationHow To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
More informationNYS OCFS CMS Contractor Manual
NYS OCFS CMS Contractor Manual C O N T E N T S CHAPTER 1... 1-1 Chapter 1: Introduction to the Contract Management System... 1-2 CHAPTER 2... 2-1 Accessing the Contract Management System... 2-2 Shortcuts
More informationCONNECTING TO THE DTS WIRELESS NETWORK USING WINDOWS VISTA
CONNECTING TO THE DTS WIRELESS NETWORK USING WINDOWS VISTA There are three steps to accessing the web through the DTS wireless network. 1. Obtain the wireless network Username and Password. This is something
More informationTerminal Four. Content Management System. Moderator Access
Terminal Four Content Management System Moderator Access Terminal Four is a content management system that will easily allow users to manage their college web pages at anytime, anywhere. The system is
More informationUsing SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
More informationSophos UTM. Remote Access via PPTP Configuring Remote Client
Sophos UTM Remote Access via PPTP Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
More informationClientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
More informationSophos UTM. Remote Access via SSL Configuring Remote Client
Sophos UTM Remote Access via SSL Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
More informationNew Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
More informationHOW TO USE OIT EMAIL VIA THE WEB
HOW TO USE OIT EMAIL VIA THE WEB A) Logging into your MyOIT account which includes your email account 1) Open a browser such as Firefox, Chrome or Safari. Please do not use Internet Explorer. 2) In the
More informationA Quick Guide to Creating a Job Posting
Creating a job posting is as easy as 1-2-3! Welcome to ework, Mason s online applicant tracking system. To access the system go to https://jobs.gmu.edu/hr. Log on using your ework user ID and password.
More informationVPN: Using WebVPN SSL Client This document outlines the process for using the WebVPN SSL with Internet Explorer and Firefox
VPN: Using WebVPN SSL Client This document outlines the process for using the WebVPN SSL with Internet Explorer and Firefox 1. Introduction The WebVPN SSL Client does not require the manual installation
More informationSelection Manager: Quick Start Guide
VERSION 1103 01.24.12 SELECTION MANAGER GUIDE Selection Manager: Quick Start Guide PART 1: GENERAL INFORMATION Selection Manager is the hiring official s interface for USA Staffing. In Selection Manager,
More informationADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
More informationInitial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion
Initial Setup of Microsoft Outlook Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access Protocol
More informationProofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees.
Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees. To create a new email message to be sent securely to an EBS-RMSCO employee: 1. Click on the
More informationFigure 1: Restore Tab
Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup
More informationMeredith Mass Transit Web Client User Guide For Ad Hoc Accounts
Meredith Mass Transit Web Client User Guide For Ad Hoc Accounts Mass Transit is an easy to use, flexible Web based file transfer program. A temporary (Ad Hoc) account has been created for you on the Meredith
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationMunson Medical Center Exchange Clinical Information Objective General Instructions
Munson Medical Center Exchange Clinical Information Objective General Instructions It is Munson Medical Center s interpretation that to complete Core Measure Performing at least one test of certified EHR
More informationSophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
More informationVPN: Using the WebVPN SSL Client
IS1504 VPN: Using the WebVPN SSL Client Page 1 of 10 VPN: Using the WebVPN SSL Client This document outlines the process for using the WebVPN SSL client with Internet Explorer and Firefox User Guide IS1504
More informationRemote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
More informationThe Toyota Foundation Grant Programs Guide for Web-based Grant Applications (Project Proposals)
The Toyota Foundation Grant Programs Guide for Web-based Grant Applications (Project Proposals) 1 1. Before Applying Please check the following before starting application processes via the Toyota Foundation
More informationEDE Electronic Data Exchange Instructions April 2007
EDE Electronic Data Exchange Instructions The Minnesota Revenue Department has a web-based data transfer process called EDE Electronic Data Exchange. The address entry point for property-tax-related data
More informationPersonal Computer and Mobile Printing
Personal Computer and Mobile Printing IT Services now offers students, faculty, and staff the ability to print from personal laptops and Apple ios devices on the Fort Wayne campus without having access
More informationimageprograf Direct Print & Share Guide
imageprograf Direct Print & Share Guide imageprograf Direct Print & Share Guide Ver. 2.0 Canon Inc. 1. Features of imageprograf Direct Print & Share The features of imageprograf Direct Print & Share are
More informationSale Grammar School Remote Desktop Services User Instructions
Sale Grammar School Remote Desktop Services User Instructions Sale Grammar School Remote Desktop Services allows Staff and Students access to a virtual school computer while connected to the internet at
More informationWinSen Online Payment / Prelease Service
WinSen Online Payment / Prelease Service SENTINEL SYSTEMS CORPORATION 1620 Kipling St Lakewood, CO 80215 800-456-9955 303-242-2010 FAX www.sentinelsystems.com Revised 11/06/2006 Introduction This service
More informationCan I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.
How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined
More informationInstall and End User Reference Guide for Direct Access to Citrix Applications
Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a
More informationRemote Access for LAPD Users Using Aventail SSL VPN
Remote Access for LAPD Users Using Aventail SSL VPN About Aventail SSL VPN This document describes how to access the LAPD network remotely, using a technology called SSL (Secure Socket Layer) VPN (Virtual
More informationInstalling Citrix for Mac
Installing Citrix for Mac 1) Go to: http://receiver.citrix.com. 2) Click on Download Receiver. 3) On the bottom left hand corner of your computer screen, the Citrix Download should appear. Click on that
More informationGigabyte Content Management System Console User s Guide. Version: 0.1
Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...
More informationSSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer
SSL Intercept Mode Certificate Installation Guide Revision 1.0.0 Warning and Disclaimer This document is designed to provide information about the configuration of CensorNet Professional. Every effort
More informationVPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
More informationThe LRS File Transfer Service offers a way to send and receive files in a secured environment
File Transfer Service The LRS File Transfer Service offers a way to send and receive files in a secured environment using HTTPS or FTPS. It also supports unsecured standard FTP transfers. The service supports
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationTriCore Secure Web Email Gateway User Guide 1
TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email
More informationGRS Advantage Website User Reference Guide
GRS Advantage Website User Reference Guide This document describes how to use the GRS Advantage Website. Table of Contents GRS Advantage Website... 2 Accessing the Website... 2 Requesting Access to the
More informationPC Requirements and Technical Help. Q1. How do I clear the browser s cache?
Q1. How do I clear the browser s cache? A1. Clear your browser's cache, and close all other applications that are running in your PC to free up memory space. For instructions on clearing cache (temporary
More informationLaw Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7.
Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7. This document contains detailed instructions on all features. Table
More information91.527 - Human Computer Interaction Final Project Tutorial. Hardware Inventory Management System (HIMS) By M. Michael Nourai
91.527 - Human Computer Interaction Final Project Tutorial Hardware Inventory Management System (HIMS) By Table of Contents Introduction... 3 Running HIMS... 3 Successful Login to HIMS... 4 HIMS Main Screen...
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationPaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu
PaperStream Connect Setup Guide Version 1.0.0.0 Copyright Fujitsu 2014 Contents Introduction to PaperStream Connect... 2 Setting up PaperStream Capture to Release to Cloud Services... 3 Selecting a Cloud
More informationUsing Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
More informationTxEIS Browser Settings
TxEIS Browser Settings Updated May 2016 The TxEIS Browser Settings document lists supported browsers and recommended browser settings which will allow you to utilize the TxEIS system at its fullest potential
More informationWordCom, Inc. Secure File Transfer Web Application
WordCom, Inc. Secure File Transfer Web Application Table of Contents 1. Introduction 2. Logging into WordCom s File Transfer Web Client 3. Toolbar buttons 4. Sending a package in Enhanced Mode (If installed
More informationInitial Setup of Mozilla Thunderbird with IMAP for Windows 7
Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access
More informationHow To Use Touchtone.Com'S Digital Phone Service Web Portal User Guide (For Ip Phones) On A Pc Or Ip Phone (For A Cell Phone) On Pc Or Mac) On Your Ip Phone On A Mac Or Ip Cell Phone On
Digital Phone Service Web Portal User Guide TouchTone provides subscribers an easy-to-use Web-based administrator portal to help manage your IP phone s features and call routing functions. In this document
More informationWelcome to the TransPerfect Translations Secure File Transfer Website What is Secure FTP?
Welcome to the TransPerfect Translations Secure File Transfer Website What is Secure FTP? SFTP (Secure File Transfer Protocol) is an added layer of security provided to our clients. SFTP requires an encrypted
More informationEntrust Managed Services PKI Administrator Guide
Entrust Managed Services PKI Entrust Managed Services PKI Administrator Guide Document issue: 3.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered
More informationCDUfiles User Guide. Chapter 1: Accessing your data with CDUfiles. Sign In. CDUfiles User Guide Page 1. Here are the first steps to using CDUfiles.
CDUfiles User Guide Chapter 1: Accessing your data with CDUfiles Here are the first steps to using CDUfiles. Sign In Open your web browser and enter cdufiles.cdu.edu.au or Note: Use cdufiles.egnyte.com
More informationBackupAgent Management Console 4.0.1 User Manual
BackupAgent Management Console 4.0.1 User Manual May 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes
More informationOneDrive in Office 365
OneDrive in Office 365 OneDrive is a universal tool that allows you to upload and share documents with others. You can upload Word Documents, PDFs, Excel spreadsheets, images, and other Office files. Contents
More informationUsing Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
More informationInstructions For Opening UHA Encrypted Email
Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled
More informationAfter selecting Internet Options in previous step,tab will appear on the screen containing Content as one of the tab. Click on Content tab.
New SSL certificates have been deployed for PFMS and Bharatkosh portals on 29/02/2016. Some of the users are facing problem to open these sites. To resolve this problem CCA(Chief Certifying Authority)
More informationOnline Backup Management Console 3.8 User Manual
Online Backup Management Console 3.8 User Manual September 2010 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human
More informationIMAP and SMTP Setup in Email Clients
IMAP and SMTP Setup in Email Clients Configuring an Email Client for IMAP Configuring an Email Client for the SMTP Server Overview Internet Message Access Protocol (IMAP), or a remote connection through
More informationVirtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production
Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services
More informationEgnyte Single Sign-On (SSO) Installation for Okta
w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Installation for Okta To set up Egnyte so employees can log in using SSO, follow the steps below to configure Okta and Egnyte to work with each other.
More informationTo set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other.
w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Installation for VMware Horizon To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to
More informationSNAMP Data Server Tutorial
SNAMP Data Server Tutorial The server hosted by UC Merced is a data server that is used to share data among the science teams and with the public. To ensure the proper data disclosure, a sharing level
More informationDartmouth College Technical Support Document for Kronos PC version
Dartmouth College Technical Support Document for Kronos PC version Contents How to Save the Kronos URL as a Favorite or Bookmark... 2 Internet Explorer... 2 Firefox... 4 Possible Problems When Logging
More information8x8 Click2Pop User Guide
USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft
More informationWindows Wireless Network Connection Instructions
Windows Wireless Network Connection Instructions Windows 7 Step 1: A. On the taskbar, right-click the wireless icon. B. Click Open Network and Sharing Center. Windows 8 Step 1: A. On the taskbar, right-click
More informationCox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0
Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE
More informationUsing ProjectWise Explorer for File Transfer
Using ProjectWise Explorer for File Transfer Use the link below to register for a log in and password for ProjectWise. http://apps.dot.illinois.gov/consultantreg/ To access ProjectWise Web Explorer use
More informationTIMETABLE ADMINISTRATOR S MANUAL
2015 TIMETABLE ADMINISTRATOR S MANUAL Software Version 5.0 BY GEOFFPARTRIDGE.NET TABLE OF CONTENTS TOPIC PAGE 1) INTRODUCTION 1 2) TIMETABLE SPECIFICATIONS 1 3) SOFTWARE REQUIRED 1 a. Intranet Server (XAMPP
More informationHoneywell Secure Email External User Guide August 2013
Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to
More information