Liquid Machines Document Control Client Version 7. Helpdesk Run Book and Troubleshooting Guide

Size: px
Start display at page:

Download "Liquid Machines Document Control Client Version 7. Helpdesk Run Book and Troubleshooting Guide"

Transcription

1 Document Control Client Version 7

2 OVERVIEW OF LIQUID MACHINES DOCUMENT CONTROL VERSION FEATURES...1 Microsoft Windows Rights Management Services (RMS)...1 Policies and Rights...1 Client...1 Policy Service...1 Automatic Client Updates...2 Auditing and Advanced Dynamic Rights Enforcement...2 WHY IS DOCUMENT PROTECTION NECESSARY?...2 Policies...3 Policy Rights...3 WINDOWS RMS PROTECTION...4 WORKING WITH PROTECTED DOCUMENTS...5 OPENING A PROTECTED DOCUMENT...5 WHEN THE LIQUID MACHINES DOCUMENT CONTROL CLIENT SOFTWARE IS INSTALLED AND ENABLED...5 WHEN THE LIQUID MACHINES DOCUMENT CONTROL CLIENT SOFTWARE IS EITHER NOT INSTALLED, DISABLED, OR IN STANDBY MODE6 MODIFYING A PROTECTED DOCUMENT...7 PRINTING A PROTECTED DOCUMENT...8 CREATING AN ADOBE ACROBAT PDF...8 USING THE PRINT SCREEN FUNCTION...9 MOVING INFORMATION BETWEEN DOCUMENTS...9 Moving Information from an Unprotected Document...9 Moving Information within a Policy...10 Moving Information between Policies...11 Moving Protected Information to an Unprotected Document...11 Attempting to Move Protected Information to an Unsecured Application...12 MANAGING DOCUMENT PROTECTION WHEN THE CLIENT COMPUTER IS OFFLINE...12 Example...13 LIQUID MACHINES POLICY DROPLET TM CONTROL...14 EXPANDED POLICY DROPLET CONTROL...15 PROTECTING DOCUMENTS...17 Selecting a Policy...17 Defining an Ad Hoc Policy...18

3 Changing a Protected Document to Another Policy...23 Irreversible Change...25 Removing Protection from a Document...25 COMMON MISTAKES AND TROUBLESHOOTING...26 CONCEPTS/TRAINING...26 What Is the Client Console?...26 Operations Are Meant to Be Transparent...26 TROUBLESHOOTING CLIPBOARD OPERATIONS...26 Pasting into Unsupported Applications...26 Screen Captures (Print Screen and Alt + Print Screen)...27 Protection is Transferred via Paste Operation...27 Other Content Moving Operations...27 AVAILABLE POLICIES...27 Policy List in Client Console Is Longer Than the List in the Droplet...27 User Cannot Find a Policy to Which They Have Access...28 OPEN WITH UNSUPPORTED APPLICATION...28 NO POLICY SERVICE IS DEFINED...28 VB SCRIPTS ARE IN USE...28 MANAGING AND TROUBLESHOOTING WITH THE CLIENT CONSOLE...29 VIEWING POLICIES AND MANAGING POLICY SERVICES...30 Viewing Policy Rights...31 Adding a New Policy Service...33 Removing a Policy Service...34 Working with Multiple Policy Services...35 Configuring a Policy Service...35 Checking a Policy Service's Connection Status...36 Checking a Policy Service for an Update...37 Exporting Policy Service Information...39 Troubleshooting a Policy Service Connection...41 MANAGING AUTHENTICATION CREDENTIALS (USERNAME AND PASSWORD)...42 Using Logon Credentials...42 Using Alternate Credentials...43 Changing Authentication Credentials...43 DISABLING AND ENABLING LIQUID MACHINES DOCUMENT CONTROL...45

4 Disabling Document Control...46 Enabling Document Control...48 Putting the Document Control Client into Standby Mode...50 MANAGING CONFIGURATION INFORMATION AND THE CLIENT CONNECTION...51 Viewing Configuration Information...51 Managing the Client Connection...53 Configuring Proxy Server Information...54 CLIENT INSTALLATION PROCEDURES...55 INSTALLER PACKAGES...55 MANUAL INSTALL PROCEDURE...55 Prerequisites...55 Specifying a Control Service...55 Installing the Client Software...55 ERRORS AND LOGGING...56 LIQUID MACHINES INTERNAL ERROR...56 APPLICATION ERRORS...57 DIAGNOSTIC LOGGING...58 CONTACTING LIQUID MACHINES PRODUCT SUPPORT FOR ASSISTANCE...59 HOW TO GET HELP...59 PROVIDING INFORMATION TO SUPPORT...60

5 Overview of Document Control Version 7 Document Control enables your company's corporate information to be protected from loss or unauthorized use, regardless of its location or method of distribution. Document Control provides a security solution with flexibility. It protects documents by providing access only to authorized users and preventing unauthorized use. Document Control is activated when the computer is started and remains active unless it is explicitly disabled or put in standby state. If it is in a disabled or standby state, users will not be able to access protected documents from that computer. Features Microsoft Windows Rights Management Services (RMS) Document Control extends Microsoft Windows Rights Management Services (RMS). RMS provides the security capabilities used to encrypt and decrypt policy-protected documents. Office 2003 and 2007 Professional applications are natively able to work with RMS-protected documents. Document Control adds RMS protection to Office XP, as well as to leading desktop and enterprise applications, such as Adobe Acrobat, Adobe Reader, and Microsoft Visio. Users with the client will work with the same user interface, the Policy Droplet control, when working in all of these applications including Office 2003 and 2007 Professional. Through the Policy Droplet control, users can access content protected with policies on Document Control policy servers as well as Microsoft RMS policy servers. A document can be protected by either a Document Control policy or a Microsoft Windows RMS policy, but not by both at the same time. Policies and Rights To provide access to protected content, Document Control uses policies that specify each user's rights in protected documents. An administrator sets up policies that specify user rights on either an RMS policy server or a policy server. Related policies can be classified into policy groups. The Document Control client communicates with the Document Control servers and the Microsoft Windows RMS servers. Client The Document Control program that is installed on individual computers is referred to as the client program. The Document Control client works with desktop applications, so it does not interfere with the user s usual manner of working. Document Control manages document protection so that users can access protected documents, for a predetermined period of time, even when the client computer is not connected to the corporate network. Policy Service A policy service provides policies and rights information to client computers and receives audit information. At least one policy service is necessary to work with protected documents, but a client computer can interact with multiple policy services. One or more Document Control servers, an RMS server, or a 1

6 combination of both can be specified as policy services. Users can configure policy services, view policy rights, and check the status of connections through the Policy Service tab of the Client Console. Automatic Client Updates A Document Control client can be configured to automatically acquire configuration information for the secured applications used and software updates to the Document Control client. Automatic updates are not required but, during the client installation process, a Document Control server can be specified to act as a control service that will provide these updates. Users can check the status of their connection to the Document Control server identified as the control service on the Configuration tab of the Client Console. If a control service is specified during installation, a policy service is automatically created with the same name. This policy service is referred to as the global policy service. The policy service associated with the control service cannot be deleted as long as the control service is in effect. Auditing and Advanced Dynamic Rights Enforcement Administrators can enable auditing for a policy to create a trail of all the actions taken on documents it protects. Users must have the client software installed and enabled for auditing information to be collected when accessing protected documents. Likewise, when the Document Control client is used, administrators can enable advanced dynamic rights updates for a policy, so that if your rights in the policy's roles are updated, the client receives the updates. Again, to ensure that users get the latest updates, if this option is enabled for a policy, users must have the client software installed and enabled to access any documents protected by that policy. Why is Document Protection Necessary? In today's enterprise, the nature of work is becoming increasingly collaborative, requiring organizations to interact with expanding networks of partners, suppliers, and other third parties to achieve their business goals. This collaboration requires individuals within organizations to exchange information, often very sensitive information, with colleagues inside and outside their workgroups, in unprecedented levels. As more and more organizations use and share information digitally, the risk of improperly sharing information grows as well. Building larger walls around the organization by using firewalls and restricting access cannot guarantee the protection of sensitive internal documents. The ease of ing documents or storing them on portable media means that documents can be accidentally or deliberately shared with unauthorized users. Once authorized users open documents, they can do whatever they want with the contents--including accidentally or purposely sharing them with unauthorized parties. Document Control provides a security solution that allows corporations to protect and control their sensitive documents wherever they reside. This flexible solution allows organizations to determine which users can select policies to protect documents, change protected documents to other policies, or remove protection. 2

7 Policies To help protect your organization's sensitive or confidential documents, a policy administrator defines policies that determine how individuals in your company access information. A policy defines the rights each user has for documents protected by the policy. Different people may have different rights for the same policy, so different people will have different rights to the exact same document. Only one policy can protect a document at a time. After a policy is selected for a document, that policy and its rights protect the document wherever it goes. A document protected by a policy can only be used in an application that is managed by Liquid Machines Document Control. Most application features work the same with protected content as they do with unprotected content. However, a few application features have been disabled to fully protect the content. When a user needs access to a protected document (even when offline) Document Control automatically checks the user s identity through a transparent authentication process. It provides the appropriate level of access to the document based on the policy definition. A user cannot change a pre-defined policy's rights, but can view them through the Liquid Machines Policy Droplet control and Client Console. Policy Rights In the Policy Droplet control and the Client Console, symbols indicate a user s rights. policies include two categories of rights: Content rights and Policy rights. Content Rights Content rights determine the tasks users can perform on protected documents. A policy administrator determines which users can perform these tasks: Read: View protected content. Write: Edit and save protected content. Print: Print protected content. This symbol: Means the Content right is: Allowed Denied 3

8 Policy Rights Policy rights determine the tasks users can perform relative to a document's protection. A Liquid Machines policy administrator determines which users can perform these tasks: Select: Apply the policy to a document via the Policy Droplet control. Change: Change a document s protection from the current policy to another policy. A user can change the document s protection to any policy listed in the Policy Droplet control. Remove: Remove the document s protection. This symbol: Means the Policy right is: Allowed Denied Windows RMS Protection For Document Control users with RMS: Document Control extends Microsoft Windows Rights Management Services (RMS) protection by providing the following. A broad range of application support: Through its patent-pending auto-integration technology, extends RMS to leading desktop and enterprise applications, such as Adobe Acrobat and Microsoft Visio. In addition, it enables companies to make optimal use of existing Microsoft investments and use Microsoft Office 2002 (XP) to view and modify RMS-protected documents created in Office 2003 Professional. Comprehensive information lifecycle management: provides users with security-enhanced collaboration of electronic information through a document's lifecycle: from the moment of creation through distribution, editing, storage, and subsequent destruction and disposal. User actions, such as distilling a rightsprotected document to Adobe Acrobat or cutting and pasting protected content to an unprotected document, maintain the policy of the original document on the derived file. Consistent user interface: The Policy Droplet control displays protection status in all managed applications. Regardless of whether users are working within Office 2003 Professional, Office XP, Adobe Acrobat or Microsoft Visio, they can easily select policies and view rights through the same, easy-to-use interface. 4

9 Working with Protected Documents In an application that uses Document Control, the Policy Droplet control appears on the right side of the application's title bar. The Policy Droplet control displays the current protection state of the document. With the appropriate rights, a user can work with a protected document in the same way they work with unprotected documents. Depending on the user s rights in the policy protecting the document, Document Control may deny access to certain actions. For example, a policy may allow a user to open a document and print it but deny the same user the right to modify its content. Users can work with protected documents in the following ways. Open a protected document Modify a protected document Print a protected document Create an Adobe Acrobat PDF Use the print screen function Move information between documents Opening a Protected Document When the Document Control client software is installed and enabled If a user needs to open a protected document, they can do so as they would an unprotected document. When the user logs on to the Document Control client computer, the Document Control server verifies the user s identity through a transparent authentication process. Then, if the server determines that the user is an authorized user with the appropriate rights, the document opens. When a user opens a protected document, the Policy Droplet control displays policy information in the title bar. Users can perform any of the tasks for which they have rights. The expanded Policy Droplet control displays the following information for the selected policy: The policy group, if the policy is in a group The description and contact information Your rights Note for Document Control users with RMS: If the document is protected by an Ad Hoc policy, and a user has Full Control access, they can also view or change the policy settings in the Policy Droplet control, if an administrator allows it. Document Control provides an additional layer of security above and beyond Windows File System (WFS) protection. For example, if a user is allowed Write access to a document through the document's 5

10 WFS security properties, but is also denied Write access through the policy protecting the document, the user cannot write to the document. In that case the user is warned, upon opening the document, that any changes they make will be discarded. The reverse is also true: if a user is allowed Write access through the policy, but is also denied access through the WFS, the user cannot write to the document. If a user is denied access to a document to which they believe they should have access, they should contact the person identified in the Contact section for the policy group or policy in the expanded Policy Droplet control or on the Policy Service tab of the Client Console. Note: A user may have access to documents that are protected by policies on multiple policy services. If a user opens a document protected by a policy on a policy service that is not configured for that user, they will be prompted to configure it by entering their authentication credentials. When the Document Control client software is either NOT installed, disabled, or in standby mode When a user who does not have the Document Control client software installed attempts to open a protected document, a message similar to the one shown below will display: This message is known as the friendly file message. It includes a link for the user to visit to learn more about software. Versions and later of the Document Control client installs a plug-in into the user s browser that notices when this link is clicked. If the client software is installed and in standby mode, the plug-in will enable the client and notify that user that it has done so. If the client software is installed and disabled, the plug-in will display the following message: 6

11 Clicking OK will cause the following message to display: After clicking OK on this message dialog, the user will have to reboot their client computer in order for the Document Control client to become enabled. If you suspect this plug-in is causing problems in the browser, you can disable it for troubleshooting purposes. To disable the plug-in from within your browser, go to the Tools-> Internet Options -> Programs -> Manage Add-ons. It is the Browser Helper Object. Modifying a Protected Document A user can modify a protected document only if the user has Write rights within the policy. If the user does not have Write rights to a document, they are warned by a message like the one shown below when they open the document. 7

12 Document Control does not prevent users from changing the document as it is displayed, but they cannot save the changes. All changes are discarded when the user closes the document. If a user is denied access to a document to which they believe they should have access, they should contact the person identified in the Contact section for the policy group or policy in the expanded Policy Droplet control or on the Policy Service tab of the Client Console. Printing a Protected Document If a user needs to print a protected document, they can do so as they would an unprotected document, provided they have Print rights within the selected policy. If the user is not allowed Print rights for the document, the following message appears. If the user is denied access to a document to which they believe they should have access, they should contact the person identified in the Contact section for the policy group or policy in the expanded Policy Droplet control or on the Policy Service tab of the Client Console. Creating an Adobe Acrobat PDF With Document Control, users can create a protected Adobe Acrobat PDF from any protected document if they have the appropriate rights. The policy of the original document is automatically applied to the Adobe PDF file. Follow these steps. 1) Open the document in its native application (for example, Word or Excel). 2) Select the option to distill the content to Acrobat (that is, print to Acrobat Distiller, Acrobat PDFWriter, or Adobe PDF). Alternatively: 1) Open Adobe Acrobat. 2) On the File menu, click Create PDF and then click From File. 3) Open the file. 8

13 Using the Print Screen Function Users can use the Windows Print Screen and Alt+Print Screen functions to capture screen content with Liquid Machines Document Control as they would normally, but only when no protected documents are open. If a protected document is open on a client computer when the user attempts to use the Print Screen or Alt+Print Screen functions, they will be prohibited from pasting the results. When the user attempts to paste the results into an application, the following message appears. The user must close all protected files and perform the Print Screen or Alt+Print Screen operation once again to capture unprotected screen content. Moving Information Between Documents Information can be moved between documents by: Cutting or copying and pasting, using the Clipboard Dragging and dropping Inserting files or other objects A user s ability to move information between documents depends on their rights and where the information is moving to and from: Moving Information from an Unprotected Document Moving Information Within a Policy Moving Information Between Policies Moving Protected Information to an Unprotected Document Attempting to Move Protected Information to an Unsecured Application Moving Information from an Unprotected Document Users can move content from an unprotected document into a document protected by a policy, but they must have Write rights to save the changes to the protected document. 9

14 If a user attempts to move unprotected content to a protected document for which they do not have Write rights, Document Control does not prevent the user from changing the document as it is displayed, but they cannot save the changes. All changes are discarded when the user closes the document. If the user is unable to save a changed document and they believe that they should have this right, they should contact the person identified in the Contact section for the policy group or policy in the expanded Policy Droplet control or on the Policy Service tab of the Client Console. Moving Information within a Policy Users can move content between documents protected by the same policy, but they must have Write rights to save the changes to the protected document. Note to RMS users: In certain situations (documents protected by an Ad Hoc policy or policies created outside the environment), Remove rights are required to paste between protected documents. Users can, however, paste multiple times from one protected document into a document that started out as unprotected (even after it takes on the policy of the source document). If the user attempt to move content between documents protected by the same policy for which they do not have Write rights, Document Control does not prevent the user from changing the document as it is displayed, but they cannot save the changes. All changes are discarded when the user closes the document. If the user is unable to move content into a document, it may be because the policy does not permit the action. If a user is denied access to a document to which they believe they should have access, they should contact the person identified in the Contact section for the policy group or policy in the expanded Policy Droplet control or on the Policy Service tab of the Client Console. 10

15 Moving Information between Policies Users can move content between documents protected by different policies on the same policy service only if your rights allow it: if the policy they are moving content from gives them the right to Change to a different policy. Users can move content between documents protected by any policy on any policy service if the policy they are moving content from gives them the right to Remove the protection entirely. The figure below illustrates moving protected content to a document that is protected by a different policy: Document 1 is protected by a policy named Policy A. Document 2 is protected by a policy named Policy B. Note to RMS users: In certain situations (documents protected by an Ad Hoc policy or policies created outside the environment), Remove rights are required to paste between protected documents. If the user s rights to the document in which the moved information is pasted do not allow Write, the paste action will be allowed, but the user will not be allowed to save the change. After a user moves protected information to a document that is protected by a different policy, the moved information becomes protected by the policy of the document to which it was moved. If a user is denied access to a document to which they believe they should have access, they should contact the person identified in the Contact section for the policy group or policy in the expanded Policy Droplet control or on the Policy Service tab of the Client Console. Moving Protected Information to an Unprotected Document Users can move content from a protected document into an unprotected document if the policy the user is moving content from allows the user Write rights. The unprotected document becomes protected by the same policy as the moved content. Subsequent pastes from the original source document to the same target document will always be allowed. The figure below illustrates copying protected content to an unprotected document. 11

16 If a user s rights to the document from which the protected information is moved do not allow Write, the paste action will be denied. After the user moves protected information to an unprotected document, the policy of the protected information is immediately selected for the unprotected document, and the Policy Droplet control display changes from Unprotected to the policy name. If a user is denied access to a document to which they believe they should have access, they should contact the person identified in the Contact section for the policy group or policy in the expanded Policy Droplet control or on the Policy Service tab of the Client Console. Attempting to Move Protected Information to an Unsecured Application When a document is protected by a policy, a user can only move its content to an application that is not secured by Document Control if their rights allow them to remove the protection first. The following table describes what happens when a user attempts to move protected content to an unsecured application without removing its protection first. When the user attempts to: Paste from the Clipboard Drag and drop Insert protected text into an unsecured application The following occurs: A message is pasted instead, specifying that the text is protected by. Drag and drop is disabled. The insertion fails. Document Control does not support selecting policies for Microsoft Outlook messages. However, Microsoft Outlook allows users to use Microsoft Word as their editor. If they use Microsoft Word as their editor within the environment, the Policy Droplet control does not appear in their messages, and they cannot protect content. In addition, they can only copy protected content into the body of an message if they have the Remove right. In that case, the paste is allowed, and the content pasted into the will be unprotected. They can, however, attach protected files to your messages. Managing Document Protection When the Client Computer is Offline If a user has been granted offline rights within the governing policy, they can access documents that are protected by Document Control even when their client computer is not connected to the corporate network. 12

17 Document Control manages document protection while offline by storing policy information on the user s computer. Each time the Document Control client and server communicate, updated policy information is downloaded to the user s computer. When the user attempts to access a protected document while offline, Document Control uses the policy information stored on the user s computer to determine their rights. Every policy has two settings that govern when the user can access protected documents. These limits are defined and maintained by the policy administrator. Offline: The user can access protected content when their computer is not connected to the network. Offline access can be limited to a certain number of days before the user is required to connect to the corporate network to obtain updated policy information. Users must have connected to their corporate network at least once before they can work with protected documents offline. Note for Document Control users with RMS: Users must be connected to their corporate network the first time they open a protected document. Example Expire: Users can access protected content for a duration (number of days), until a certain date, or with no expiration date. When expiration is specified with a duration, the duration begins on the date on which the document was last saved. Together, these settings control when protected documents may be accessed. The following example shows how these settings might be configured in a policy to control offline access to documents protected by the policy. Settings The number of consecutive days the user can work offline is 3. The expiration date of the document is 8 days. Results If a document was last saved on September 9, 2008, the user can access the protected document until September 17, If the user goes offline on September 9, 2008, they will be allowed offline access to documents protected by this policy until September 12, After that date, they must reconnect to the network before they will be able to work offline with those documents again. If a user attempts to access a protected document offline after the offline period has expired, a message informs the user that they must connect to the network for updated policy information. 13

18 Policy Droplet TM Control The Policy Droplet control appears in the title bar of applications that are secured by Document Control. The illustration below shows the Policy Droplet control as it appears in Microsoft Word. The Policy Droplet control displays one of the following, depending on how the document is protected. Protection Not protected by a policy Protected by a policy Protected by an Ad Hoc policy Protected by an Ad Hoc policy with RMS before Liquid Machines Document Control was installed Policy Droplet Control Display Unprotected policy name Permissions in Effect Do Not Distribute Users should click on the Policy Droplet control to expand it. It displays further information related to the task the user is performing. 14

19 Expanded Policy Droplet Control When a user clicks the Policy Droplet control, it expands. With the appropriate rights, they can use the Policy Droplet control for the following tasks. Selecting a policy to protect a document. Defining an Ad Hoc policy. Changing an Ad Hoc policy (if the user have Full Control). Changing to another policy to protect a document. Removing protection from a document. The expanded Policy Droplet control contains information specific to the task the user is performing. The following illustration shows its content when the user is selecting a policy. 15

20 To see the policy groups and policies available from a different policy service, select another policy service from the Show Policies From list. Policies can come from three places: policy services RMS policy service, labeled RMS Policy Service (server name) Ad Hoc policies To open the Client Console, click the button with the ellipsis (...). To see the policies in a policy group, click the plus (+) sign. To collapse the policy group, click the minus (-) sign. To see additional information about a policy group or a policy, click its name. Additional information appears at the bottom to help the user select the appropriate policy for their document. The user can select different policy groups or policies in turn to view the following information: A description of the policy group or policy. If no description has been provided, the description box displays, "No description is available." Symbols indicating the users rights within the selected policy. Information about the contact person for the selected policy group or policy. If the user is denied access to a function in a protected document to which they believe they should have access, they should contact this person. If no contact information has been provided, the contact box displays, "No contact information is available." Information about offline access and expiration. To save any changes and collapse the Policy Droplet control, click the OK button. To collapse the Policy Droplet control without making any changes, either click the Cancel button or click the Policy Droplet control in the title bar again. To access Help for information on how to use Document Control to protect documents, click the Help button. To see information about the Document Control client, click the About button. Note to Document Control users with RMS: In the Policy Droplet control, although users can modify Ad Hoc policy settings for documents they have authored, they cannot modify Liquid Machines policy settings. 16

21 Protecting Documents In the Policy Droplet Control, they can: Selecting a Policy 1) Select a policy for a document. 2) Change to another policy. 3) Remove protection from a document. When users create a new document or open an existing unprotected document in an application that is secured by Document Control, the Policy Droplet control appears in the title bar. Users can protect an unprotected document by selecting a policy for it, as long as they have the appropriate rights. Click the Policy Droplet control to expand it. 17

22 In the expanded Policy Droplet control, users may see one or more policy group names and policy names. If not, they do not belong to policies that allow the user to select them for their documents on the selected policy service. In that case, they can select another policy service or they must leave their document unprotected. If the user does not belong to a policy to which they believe they should, they should contact their server administrator. Click the arrow next to the Show Policies From list and select the policy service from the list. The policy service name is the label given to the server on which the policy information resides. Note to Document Control users with RMS: If an administrator allows, users can also define an Ad Hoc policy. If the policy is in a policy group, click the plus (+) sign to the left of the policy group name to display its policies. Click the policy name to select it. Users can select only one policy for their document at a time. Selecting a policy also selects the Restrict permission to this document check box. Click the OK button. The Policy Droplet control collapses to display the name of the selected policy, and Document Control protection takes effect immediately, unless the policy selection is irreversible. users cannot change the policy's rights settings, but they can view them in the expanded Policy Droplet control or on the Policy Service tab of the Client Console. Defining an Ad Hoc Policy Note: This function is only available to Document Control users with RMS. If a system administrator has enabled this option, users can define an Ad Hoc policy to limit access to a document to specific users. When the Ad Hoc Policies policy service is selected in the Policy Droplet control the contents of the Policy Droplet control changes, so users can define the details of the policy by identifying users and their permissions. Users can define an Ad Hoc policy s users with: Read permission, who can only read the document. Change permission, who can read, edit, and save the document. 18

23 To define an Ad Hoc policy for the document, follow these steps. 1) Select the Ad Hoc Policies policy service in the Policy Droplet control. 2) Select the Restrict permission to this document check box. 3) To specify users with Read permission for the document, enter addresses in the box to the right of the Read button. Use one of these methods: a) Click the Read button and select addresses from an Outlook address book. b) Type addresses in the box, separated by semicolons. c) To include everyone, click. 4) To specify users with Change permission for the document, enter addresses in the box to the right of the Change button. Use one of these methods: 19

24 a) Click the Change button and select addresses from an Outlook address book. b) Type addresses in the box, separated by semicolons. c) To include everyone, click. 5) To define additional permissions and administrative settings for the document, click the More Options button. 6) To confirm your selection, click the OK button. The Policy Droplet control in the title bar of the document displays Permissions in Effect. Selecting Addresses from An Outlook Address Book When a user defines an Ad Hoc policy, they can select addresses for Read and Change permissions from an Outlook Address book. When they click the Read button or the Change button on the Policy Droplet control, the Select Names window appears. To search for a user, type the name in the Type Name or Select from List box. 20

25 To change the source of the name list, click the arrow next to the Show Names from list. To select a user for Read permission, click the user name in the list, and then click the Read button. The address appears in the Read box. To select a user for Change permission, click the user name in the list, and then click the Change button. The address appears in the Change box. To confirm your selections, click the OK button. The Select Names window closes, and the Policy Droplet control includes the user s selections in the appropriate boxes. Defining Additional Permissions and Administrative Settings When a user defines an Ad Hoc policy, they can set additional permissions and administrative settings for the document. When the user clicks the More Options button on the Policy Droplet control, the Permission window appears. In the Permission window, users with Full Control can specify settings for expiration, printing, copying, and accessing content programmatically. Users with Full Control can also enter contact information and connection requirements. 21

26 To add or remove users: To add a user or users with Read, Change, or Full Control rights click the Add button. To remove a user, select the user in the list and click the Remove button. To select any of the following additional permissions or settings: To set an expiration date for the document, select the This document expires on check box and type or select an expiration date in the box. To allow users to print the protected content, select the Print content check box. Any user who has any type of access to the document will be able to print the protected content. To allow users to access data in the protected document through application scripts, select the Access content programmatically check box. Any user who has any type of access to the document can access the protected content 22

27 programmatically. To allow users with Read permission to use Windows Clipboard functions to move content from the protected document, select the Allow Read users without the client to use the clipboard check box. Users should keep in mind that if they allow these users to use the clipboard, any information they copy will be unprotected. Note: Users with Change permission can always move protected content using Clipboard functions. To inform users of an address to which they can submit requests for additional permissions, select the Users can request additional permissions from check box and enter a contact address. Only a user with Full Control access to the document can change permissions. To force users to verify their permission by connecting to the Windows Rights Management server every time they attempt to access the document, select the Require a connection to verify a user's permission check box. To confirm the selections, click the OK button. The Permission window closes. Changing a Protected Document to Another Policy Once a policy has been selected to protect a document, users can change it to a different policy, as long as they have the appropriate rights in both policies. To change from one policy to another, users must have the Change right in the original policy, and the policy must appear as an option in the Policy Droplet control, as shown below. 1) Click the Policy Droplet control to expand it. 23

28 In the expanded Policy Droplet control, users might see one or more policy group names or policy names. If they see only the current policy, then they may not have Change rights to the policy or they may not have any available policies in the current policy service. If other policy services are available, the user may be able to change to a policy on another policy service. If no additional policies are shown, then the user cannot change the policy. If a user does not belong to a policy to which they believe they should, they should contact their policy administrator. 1) To select a policy from a different policy service, click the arrow next to the Show Policies From list and select the policy service from the list. The policy service is the name of the server on which the policy information resides. Note: Users must have Remove rights for the policy that currently protects the document to change it to a policy on a different policy service. 2) If the policy is in a policy group, click the plus (+) sign to the left of the policy group name to display its policies. 24

29 Irreversible Change 3) Click the policy name to select it. Only one policy can protect a document at a time. Selecting a policy also checks the Restrict permission to this document check box. 4) Click the OK button. The Policy Droplet control collapses to display the name of the selected policy, and Document Control protection takes effect immediately, unless the change is irreversible. A policy selection is considered irreversible if, after the new policy settings are applied, the user cannot return the document to its previous protection state (a selected policy or unprotected) using the Policy Droplet control. When the user makes an irreversible change, displays the following warning message. 1) To proceed with the policy selection, click the Yes button. The new policy settings are applied to the document, the message box closes, and the Policy Droplet control collapses. The Policy Droplet control in the title bar of the application displays the name of the policy selected for the document. 2) To close the message window, click the No button. The user is returned to the Policy Droplet control, where they may select a different policy or close the Policy Droplet control. Removing Protection from a Document A user can remove protection from a policy-protected document, if they have the Change and Remove rights within that policy. 1) Click the Policy Droplet control to expand it. 2) Click the Restrict permission to this document check box to clear it. If the check box is grayed out, the user s rights in the policy do not allow them to remove protection from documents. 3) Click the OK button. Document Control immediately removes any protection from the document content and changes the Policy Droplet control value to Unprotected. 25

30 Common Mistakes and Troubleshooting The configuration and training necessary to address the issues below is covered in the product documentation. This list is meant to alert you to the most common issues that may arise, why they happen, and how to resolve them. In general, you will find that the Document Control Client is a robust, transparent, and simple application. Often, your main focus will not be problems with the client software, but helping users build process and add value around enterprise rights management and encrypted documents. Concepts/Training What Is the Client Console? The Client Console is meant to help configure, troubleshoot, and gather information about the Client. It is not necessary for users to be aware of the Client Console or how to use it. The interfaces with which users interact during normal operation are the Policy Droplet and the application, such as Microsoft Word or Adobe Acrobat, itself. The Client Console is accessible from the Windows Start Menu. This means that users may discover it and be curious about it. You may choose as part of training to ask users to ignore the console, to inform them that you will show them how to use it in the event you need to troubleshoot a problem, or to fully familiarize them with the console s elements. Choose the best course of action based on company policy and the skill of your users. Operations Are Meant to Be Transparent The Client is designed to make workflow with protected documents as transparent as possible. The only actions users take is to add protections to a new document, or change or remove protections on an existing document. All other user actions happen transparently by interacting with the regular application interface. The transparency of can have the effect that users forget that is installed. When a special protected document behavior occurs, for example the blocking of a print or cut-and-paste operation, users may forget why it happens, and will report the behavior as a problem to the helpdesk. Reminding users that is installed and is protecting those operations and documents may be all that is needed. Troubleshooting Clipboard Operations Pasting into Unsupported Applications When the receiving application in a cut and paste operation is one that does not support, the document that was intended to receive the pasted content instead receives a message similar to the following text: The data on the clipboard is protected by a policy (//Corporate Baseline/Corporate Default) and cannot be pasted into this document. This is normal behavior, but users are sometimes confused or startled by the message. Familiarize yourself with the message so you can quickly recognize and explain it, and train your users to recognize it, too. 26

31 Screen Captures (Print Screen and Alt + Print Screen) When a user tries to paste a Windows screen capture while any protected document is open, an error graphic that is similar to that which is shown below will be displayed. The error displays even when the content of a protected document is not visible on the screen. Simply have the user close all protected documents and try the screen capture again. Once all protected documents are closed the screen capture will behave as expected. Protection is Transferred via Paste Operation If a user pastes information from a protected document into a new or existing unprotected document within a -supported application, the unprotected document will become automatically protected with the same protections as the document from which the information was copied. Users sometimes are unaware of the change, and do not understand how the document to which the information was pasted became protected. Other Content Moving Operations Some other methods of moving content between applications, for example dragging and dropping from one Office application to another, will simply fail silently and without warning when the protections prevent copy and paste. Available Policies Policy List in Client Console Is Longer Than the List in the Droplet A user may discover in the list of policies to which they have rights in the Client Console has more policies in it than the list they can see in the Policy Droplet control. Since the Droplet is used to apply policies to documents, it contains only policies in which a user s role allows Select rights. By default, the Policy Service tab of the Client Console lists all policies in which the user has role membership. Selecting the Selectable in Policy Droplet radio button in the Policy Service tab changes the view to list only those policies that would display in the Policy Droplet. The list should match the list they can see in the Policy Droplet. 27

32 User Cannot Find a Policy to Which They Have Access Users may sometimes be aware that they should have access to a certain policy, but they don t see it in the Droplet or in the Client Console. There are a number of reasons this may happen: The user does not have role membership to the Policy. At the server level, the user has not in fact been given role membership to the policy. You will need to contact a server administrator or a business administrator who has access to change the policy, in order to verify that the user should have access and then give them role membership to the policy. The user s role membership is recent and the client has not yet received an update from the server. You may learn that the user does in fact already have role membership to the policy, but still the policy does not appear in the users Policy Droplet control or Client Console. The user may have been recently added as a role member to the policy and that change has not yet been reflected on the client because a client/server communication has not occurred since the change was made. Requesting an update from the server by clicking the Update Now button on the Policy Service tab of the Client Console will resolve the problem in this case. You may find that after requesting the update, the client console shows the policy but the droplet does not. This will happen appropriately when the user does not have Select rights to the policy. It may also happen when the user does in fact have Select rights but a -supported application is open when a client/server communication occurs. Close all supported applications (including Outlook if Word is used as the editor) and then reopen a Liquid-Machines supported application. The droplet should show the policy. Open with Unsupported Application If the user opened a protected document in an unsupported application, they will be able to view the encrypted byte stream, which looks like a bunch of random characters and symbols. Users are sometimes confused or startled by this behavior. No Policy Service is Defined When the user expands the Policy Droplet, they should see the server defined at the top, near the label Show policies from:. If this is not the case, try the following: Have the user logoff and then logon again Reboot the client computer They may have forgotten to specify the service when installing the client. Refer to the Client Installation Procedures section of this document on page 55. VB Scripts are in Use If a policy denies scripting, then the Document Control Client will try to block all VB scripting functionality. If scripting is allowed by a policy, then there are still certain actions that are accessible via scripting that may be blocked by other policy settings (e.g., printing and saving). In addition, the 6.4 version of the LMDC Client introduced a feature whereby scripting integration can be disabled in the Document Control Client, resulting in scripting being fully functional, regardless of the policy settings. This new feature is intended to be used in cases where the client scripting integration is interfering with scripting in unacceptable ways. It should be used only if a problem with scripting is observed and should be thought of as 28

33 script-only "Standby" feature. Product Support can assist you with the use of this feature if it is necessary to troubleshoot a problem. Managing and Troubleshooting with the Client Console If your organization is using a Document Control server, the Document Control Client Console can be used for troubleshooting purposes. It provides you with tools and information that allow you to manage Document Control and troubleshoot unexpected behavior. The Client Console includes the following: Policy Service tab: To view policy information and manage policy services. Client State tab: To control the operation of Document Control on your computer. Configuration tab: To view configuration information and manage the client connection. To open the Document Control Client Console, use one of these methods: In the expanded Policy Droplet control, click the button labeled with the ellipsis (...). 29

34 From the Windows Start menu: On the Windows task bar, click the Start button. Click All Programs or Programs. Click. Click Client Console. Viewing Policies and Managing Policy Services On the Policy Service tab of the Client Console, users can: View their rights in a selected policy. Add a new policy service using the Add button. Remove a policy service using the Remove button. Check the status of the connection to a policy service or export policy service information to an XML file using the Details button. Request an update from the selected policy service using the Update Now button. Change the authentication credentials (username and password) used to access a Liquid Machines policy service using the Change button. 30

35 Viewing Policy Rights On the Policy Service tab of the Client Console, users can view the rights they are allowed under a policy. 31

36 Select the policy service from the Show Policies From list. Select a radio button for the policies you want to show: All policies Only the policies that are selectable in the Policy Droplet control If the policy is in a policy group, click the plus (+) sign to the left of the policy group name to display its policies. To select the appropriate policy, click the policy name. When a policy group or policy is selected, the lower section of the Policy Service tab window displays additional information about the selected policy or policy group. Users can select different policy groups or policies in turn to view the following information: A description of the policy group or policy. If no description has been provided, the description box displays, "No description is available." Information about the contact person for the selected policy group or policy. 32

37 Symbols indicating the user s Content and Policy rights in the selected policy group or policy. Information about whether documents protected by the selected policy are audited, the user s offline access to the policy group or policy, and expiration for documents protected by the policy. Adding a New Policy Service If a user needs access to policies on a policy service that has not been configured for their computer, they can add a new policy service. On the Policy Service tab of the Client Console, click the Add button. The New Policy Service dialog box appears. In the New Service Address box, enter the name of the server location where policies are stored. For example: servername.domainname.com. If you need more information, contact the server administrator or the source of the protected document(s) to which the user needs access. Select an option for authentication credentials, the username and password used to access the policy service. Users who are members of a corporate directory configured at the server and are logged into the computer with their credentials for that directory, can authenticate to the Liquid Machines policy service using their normal domain logon credentials via the Use Logon Credentials option. Members of a corporate directory configured at the server can select the Use Alternate Credentials option to log on to a domain-resident computer under different domain logon credentials, or to log on from a non-domain-resident computer using their domain credentials. 33

38 Click the OK button. The Client Console connects to the new policy service and attempts to authenticate the credentials provided. If authentication is successful, a dialog box indicates that the policy service connection is complete. If authentication fails, a dialog box indicates the failure. There is a delay while the policy service is contacted. Policy services cannot be added if the client computer is offline or if the policy service is unavailable. Removing a Policy Service If a user no longer need to access policies on a policy service, they can remove the policy service from the Policy Service tab of the Client Console. Note: Users cannot remove a policy service while -secured applications are open. If the user uses Microsoft Word as their editor for Outlook, then Outlook must also be closed. Users cannot remove the global policy service, that is the policy service associated with the control service. 1) Select the policy service from the Show Policies From list. 2) Click the Remove button. 34

39 3) A dialog box asks if the user if they want to remove the policy service. To confirm, click the OK button. 4) The Policy Service tab reappears with the policy service removed from the list. Note: If the user attempts to remove the policy service associated with the control service the operation will not be permitted and the following message will be displayed: Working with Multiple Policy Services Users may have access to protected documents on more than one policy service, or they may want to protect documents with policies from different policy services. With the appropriate rights, they can access documents on any policy service. Users can see and select the policy services to which they have access in the Show Policies From list in the expanded Policy Droplet control. Users might need to access a protected document on a policy service that is not already configured for their computer. In that case, they can configure the policy service. Configuring a Policy Service When a user is working with multiple policy services, they might need to configure a policy service. Reactive Policy Service Configuration If a user tries to access a document that is protected by a policy on a policy service that is not already configured for their computer, they are automatically prompted to add that policy service. When they attempt to open the document, they are asked to enter their authentication credentials (either logon username and password or alternate credentials). The credentials are validated and added for the policy service, and the user can access the document according to their rights in the policy that protects the document. After logging on to the policy service the first time, the user does not need to enter their credentials again; the policy service and their authentication credentials are now known to the client. Manual Policy Service Configuration Alternatively, users can select a policy from a policy service that is not configured for their client computer by adding the new policy service using the Client Console as described in the Adding a New Policy Service section on page

40 Checking a Policy Service's Connection Status The Document Control server communicates with the computers that use the client on a regular basis. The server administrator sets the frequency of those communications, also known as the polling frequency. During those communications, the server passes along policy and rights information. On the Policy Service tab of the Client Console, you can check the status of the connection to a policy service. 1) Select the policy service from the Show Policies From list. 2) The Connection Status appears at the bottom of the tab. OK = The connection was successful. Failed = The connection was unsuccessful. For more information, click the Details button. The Policy Service Details dialog box appears. 36

41 It contains the following information: Note: All dates and times are specified in local client time. Last Successful Update: The date and time the last successful server update was received. Last Update Attempt: The date and time the last server update was attempted. Ideally, this would be the same date and time as the Last Successful Update. Last Update Status: A brief description of the status of the last server update attempt: o o Succeeded Failed - reason for the failure Next Scheduled Update: The date and time the next server update will be attempted. Users can also check a policy service for an update by clicking the Update Now button. Note: Users can check the status of the Document Control control service on the Configuration tab of the Client Console. Checking a Policy Service for an Update A policy service update causes the policy service to pass new policy information and information about policy changes to the Document Control client. Policy service communications are scheduled regularly, but a user can also request an update to a policy service outside of the regular schedule on the Policy Service tab of the Client Console. For example, if a policy administrator has just updated a user s rights, the user may want to immediately request a policy service update so these rights will be downloaded to the client. 37

42 Select the policy service from the Show Policies From list. To request an immediate policy service update, do one of the following: Click the Update Now button, next to the Connection Status. Click the Details button at the bottom of the tab. 38

43 On the Policy Service Details dialog box, click the Update Now button, next to Check Service for Update. If any -protected applications (including Microsoft Outlook, if Word is used as the editor) are open during the policy service update, the user must close them and then reopen them after the update to reflect any updated policy information. A message confirms a successful update or provides a reason for a failed update. Exporting Policy Service Information Users can export policy service information to an XML file, which can be used by the Help Desk or Liquid Machines Product Support for troubleshooting. 39

44 On the Policy Service tab of the Client Console, select the policy service from the Show Policies From list. Click the Details button at the bottom of the tab. The Policy Service Details dialog box appears. 40

45 1) To export the information for the policy service to a file, click the Export button, next to Export Service Info to File. 2) In the File Export Window, select a location and enter an appropriate file name. 3) Click the Save button. Troubleshooting a Policy Service Connection When a policy service update fails, there are some steps you can take to determine if the problem is due to a problem with the network or something else. Any user should be able to attempt to login to the Document Control Server web admin console. If the user is a server administrator, they will be allowed access. If the user is not a server administrator, they should be denied access with a specific message indicating they are not privileged to administer the server. Any other result means that something is wrong with the authentication infrastructure and you may need to involve a server administrator. (Unless a name and password was forgotten, an account locked out, something like that.) Always check connectivity to the server using a web browser and ensure that the proxy settings in the LMDC Client Console make sense given how they are set in the web browser. Try to ping the Document Control Server s IP address from the computer that is experiencing the problem. An unsuccessful result means that there is a problem with the network in general. If in the Client Console, when you try the "Update" button for a given policy service or on the "Configuration" tab, you get an "application protocol error," gather verbose dci_log*.txt files and send them to Product Support. This message 41

46 indicates that something has going wrong with the data that the client and server are trading back and forth. Managing Authentication Credentials (Username and Password) Authentication credentials are the username and password used to access a policy service. Users must enter their authentication credentials when they configure a new policy service or when they first attempt to access a document that is protected by a policy on a policy service that is not yet configured on their computer. If the user is a member of a corporate directory configured at the Document Control server and is logged on to the client computer with their credentials for the directory, they can authenticate to the policy service using their normal domain logon credentials. If the user is a member of a corporate directory configured at the Document Control server, they can use alternate credentials to authenticate to the Liquid Machines policy service via a domain-resident computer under different domain logon credentials, or from a non-domain-resident computer using their domain credentials. Users can change their authentication credentials only while online. Using Logon Credentials If a user is a member of a corporate directory configured at the Document Control server, they can set up their authentication credentials so that their computer authenticates their domain username and password against the policy service. 1) In the Authentication Credentials dialog box, select Use Logon Credentials. The user s credentials appear to the right. 42

47 2) Click the OK button. The Client Console attempts to connect to the policy service with the logon credentials provided. If authentication is successful, a dialog box indicates that the policy service connection is complete. If authentication fails, a dialog box indicates the failure. There is a delay while the policy service is contacted. Using Alternate Credentials When a user wants to log on to a policy service with authentication credentials that are different from the logon credentials used to log on to the client computer, they can use alternate credentials. If the user is a member of a corporate directory configured in the Document Control server and they want authenticate to the policy service via a domain-resident computer under different domain logon credentials, or via a non-domain-resident computer using their own domain credentials, they can use alternate credentials. To set up alternate credentials, follow these steps. In the Authentication Credentials dialog box, select Use Alternate Credentials. Enter the user s username and password. Click the OK button at the bottom of the tab. Note: If the user is using their domain credentials from a non-domain computer or other domain logon credentials on a domain computer, they must specify the fully qualified domain name in the username field. Example: [email protected] Changing Authentication Credentials On the Policy Service tab of the Client Console, a user can change their authentication credentials, that is, the username and password they use to access a policy service. The user can only change authentication credentials while they are online, because the policy service must be contacted to verify the credentials. 43

48 Note: A user cannot change their authentication credentials for a policy service while any secured applications are open. If they use Microsoft Word as their editor for Outlook, then Outlook must also be closed. At the top of the tab, click the Change button. The Authentication Credentials dialog box appears. 44

49 In the Authentication Credentials dialog box, do one of the following: Select Use Logon Credentials. The user s current login credentials appear to the right. Select Use Alternate Credentials and enter the username and password. Note: If the user is using their domain credentials from a non-domain client computer or other domain logon credentials on a domain computer, they must specify the fully-qualified domain name in the username field. Example: [email protected] Click the OK button. The Client Console attempts to connect to the policy service with the logon credentials provided. If authentication is successful, a dialog box indicates that the policy service connection is complete. If authentication fails, a dialog box indicates the failure. There is a delay while the policy service is contacted. Disabling and Enabling Document Control From the Client State tab of the Client Console, users can: Disable the client for troubleshooting or in the event of unexpected behavior. Enable the client after it has been stopped. Put the client into Standby mode for troubleshooting purposes or to use only when needed. 45

50 When Document Control is enabled, the Standby and Disable buttons are active and the Enable button is grayed out. When Document Control is Disabled, the Enable button is active and the Standby and Disable buttons are grayed out. When Document Control is in Standby mode, the Enable and Disable buttons are active and the Standby button is grayed out. Disabling Document Control The Document Control client must sometimes be disabled and enabled for troubleshooting or in the event of unexpected behavior. Warning! Only disable the Document Control client when asked to do so by internal Help Desk or Product Support staff for troubleshooting. While the Document Control client is disabled, protected documents are inaccessible to all users who use the client computer. A reboot is required to enable the Document Control client from a disabled state. To disable the Document Control client, click the Disable button. The following message appears. 46

51 To proceed with disabling the Document Control client, click the OK button. Under certain conditions, Document Control cannot be disabled. When the user attempts to disable under these conditions, the following messages may appear. When additional users are logged on to the client computer, the following message appears. To close the message, click the OK button. When the additional users have logged off, the user can attempt to disable the Document Control client. When protected files are open, the following message appears. To close the message, click the OK button. Close the protected files that were identified in the message. When the protected files have been closed, the user can attempt to disable the Document Control client. When Document Control is disabled, protected data that has been copied to the Windows Clipboard through a copy or cut operation is removed from the Clipboard. The following message warns the user that the protected Clipboard data will 47

52 be lost. To close the message, click the OK button. When the Document Control client is successfully disabled, the following message appears. To close the message, click the OK button. After troubleshooting or resolving the unexpected behavior, enable Document Control. Enabling Document Control The Document Control client sometimes must be put in a standby state for use as needed, or disabled and enabled for troubleshooting or in the event of unexpected behavior. Enabling from Standby state: When the client has been put in a standby state, to re-enable Liquid Machines Document Control, click the Enable button. The following message appears, asking the user to confirm their request to enable the client: To enable the client, click the OK button. Document Control will automatically become active. The following message appears, confirming that the client is now enabled. 48

53 Enabling from a Disabled state: When the client has been disabled, to re-enable Document Control, click the Enable button. For Document Control to become active, the computer must be restarted. The following message appears, informing the user that the client is enabled and asking if the user wants to reboot now. To enable the client, click the OK button. The following message appears, requesting that the user restart their computer. To restart the user s computer immediately, click the Yes button. To restart the user s computer at a later time, click the No button. After the user restarts their computer, Document Control is activated at logon, and the Enable Client button of the Client State tab is grayed out. 49

54 Putting the Document Control Client into Standby Mode Standby mode sets the Client to stop "injecting" any of the supported applications. The client process is still running and integrated into the login sessions, but the droplet no longer appears in supported applications such as Word and Excel. Standby mode can be turned on and off from the Client Console and does not require the user to reboot or logout to take effect. Users should close all protected documents before switching in and out of standby mode otherwise a message dialog will appears asking them to do so. If unprotected documents are open when standby mode is enabled, the droplet will disappear from open applications. When the client is enabled from standby mode, the droplet will not reappear in open applications without first closing and reopening the applications. On the troubleshooting side, Standby mode allows you to quickly eliminate as a variable when dealing with issues at the application level. Is Excel crashing? Enable standby mode and see if the problem goes away. Standby does not address login issues, so if for example a login session hangs half way through the login sequence, standby will not help you would have to disable the client completely to determine if is involved in that behavior. On the roll-out side, standby mode allows you to deploy the Client in its least invasive mode, and users can turn it on later as they need to protect content or access protected content. To install the Client in standby mode, include the flag CLIENTSTATE=STANDBY in the installer command line. The status is also indicated and controlled in the Windows Registry by the expanded string value "Client State" in the key HKEY_LOCAL_MACHINE\Software\\Client\Client State. We do not recommend you manipulate this registry setting though, as the Client will not trigger a state change merely because the registry value has changed. That is to say, it does not monitor the event of the value being changed. To put the Document Control client into a Standby state, click the Standby button. The following message appears. To proceed with putting the Document Control client in a standby state, click the OK button. The following message appears: 50

55 To close the message, click the OK button. When the Document Control client is needed to apply protection to a document or access a document that has already been protected by, you ll need to re-enable Document Control. Managing Configuration Information and the Client Connection On the Configuration tab of the Client Console, users can view information about the Document Control client. They can also check the status of the client connection, request a control service update, and configure proxy server information. Viewing Configuration Information To find information about the Document Control client, on the Client Console, click the Configuration tab. Help Desk staff or Product Support staff may request this information for troubleshooting. 51

56 The Client Console Configuration tab includes the following information. Version: The version of the Client software. Installed Bundles: The application bundles that are currently installed. Control Service: The name of the control service specified for the client and connection status information. Proxy Server: The name and port to be used when a proxy server is in use. 52

57 Managing the Client Connection A Document Control client can be configured to automatically acquire configuration information for the secured applications used and software updates from a control service. In that case, users can check the status of their connection to the Document Control control service and request an update. On the Client Console, click the Configuration tab. Under Control Service, the Client Console Configuration tab includes the following information. The name of the current control service, if one is specified. Note: All dates and times are specified in local time. Last Update: The date and time the last control service update was received. Update Status: A brief description of the status of the last server update: Succeeded Failed - reason for the failure 53

58 Next Update: The date and time of the next server update. Update Now button: To update the control service and receive Document Control client software updates, click this button. Note: Users can check the connection status of a policy service on the Policy Service tab. Configuring Proxy Server Information In some organizations, the Document Control client must communicate with the Liquid Machines Document Control server through a proxy server. When this is the case, users must configure the Document Control client so it is aware of the proxy server. On the Client Console, click the Configuration tab. Then click the Configure button that is located in the Proxy Settings section. In the Proxy Settings window, select the setting that is appropriate to your organization as follows: Use Direct Connection to Policy Services. When this option is selected, the Document Control client will connect to the server via a direct network connection regardless of whether a proxy is available. Auto-detect Proxy Settings. When this option is selected, the client computer s proxy settings will be checked. If a proxy is available, the method used to access the policy service will mirror that which is specified in the proxy s settings. For example, the proxy s settings may state that a direct connection should always be attempted first - if it fails, then try the proxy server. Manual Proxy Configuration. When this option is selected, connection to the server will always be via the proxy server. This option requires the user to provide a Host for the proxy server and the port to be used as described below: o HOST: The fully-qualified DNS name for the proxy server as servername.domainname.com Example: prxysrv1.acmecorp.com o Port: The port over which communications should occur. Example: 80 54

59 Use Proxy only if Direct Connection Fails checkbox: When the Manual Proxy Configuration option is selected, this checkbox may be checked to indicate a direct connection must be attempted before a connection through the specified host. In this case the specified host is only attempted when the direct connection attempt results in a failure. Client Installation Procedures Installer Packages Refer to Knowledge Base articlekd-621: Using the Microsoft Windows Installer to Customize the Liquid Machines Client Installation located in the Liquid Machine Customer Care Center at Valid authentication credentials are required to access the Customer Care Center. Manual Install Procedure Under normal circumstances the client should be installed according to your IT department s standard practices. This manual procedure is provided for reference only Prerequisites In addition to Windows 2000, Windows XP SP2, Windows Vista, or Windows 2003 Server (for terminal services installations), in order to use the client users will need to have applications that can be managed by Document Control also installed. Applications that are currently supported by Liquid Machines Document Control 7.x include: Microsoft Office 2003 Professional Microsoft Office XP Microsoft Office 2007 Adobe Acrobat 6 and 7 Adobe Reader 7 and 8 Specifying a Control Service As part of the client installation a control service may be specified. Installing the Client Software 1) Double-click on the lmdc-client-x86.msi (for 32-bit computers) or lmdc-client-x64.msi (for 64-bit computers) file located in the Client folder to start the client installation wizard. The Preparing to Install window will display. 2) Follow the installation wizard through the process. The bullets below describe each of the windows displayed during the installation and the action required: a) License Agreement: Review the license agreement text. 55

60 b) Click the I Accept button to accept the terms of the agreement and proceed with the installation. If you do not accept the terms of the agreement, click the Cancel button. The installation process will be terminated. c) Customer Information: Enter a User Name and your Company Name in the spaces provided. Click the Next button to continue. d) Setup Type: Choose the type of installation to be performed. Choose Standard if no Document Control control service is to be used. Choose Custom in order to specify a Document Control control service. Click the Next button to continue. e) If a custom setup is selected, eenter the Document Control 7.x control service as servername.domainname.com. Click the Next button to continue. f) If a custom setup is selected, the Custom Setup window will display. Click the Next button to continue. g) Ready to Install the Program: Click the Install button to continue. A series of progress bars will be displayed while the Document Control 7.x client software is installed. h) InstallShield Wizard Complete: The appearance of this window indicates that the installation process is completed. Click the Finish button to continue. When the software installation process is completed, you will be prompted to restart the computer. To begin using the Document Control Client immediately, click the Yes button to restart your computer. To restart at a later time, click the No button. Errors and Logging Internal Error The only error that will display for a user, and which happens very rarely, is a Internal Error. The Client will present a Internal Error dialog as shown below when such an error occurs. 56

61 The dialog will indicate that the current application must be shut down, or that the Client itself has been shut down in which case a reboot is required. For debugging purposes, the Internal Error is also known as an invariant error. If a user receives an invariant error, see if the user can reproduce the error by repeating the same actions that were performed when the error occurred. If the behavior can be easily reproduced, report the error along with specific steps to reproduce the behavior to Product Support. Product Support will ask you to explain the steps used to reproduce the error, including what applications and operating system are installed on the computer, and what version of each was in use (including service packs). They may also ask to you enable diagnostic logging and gather logs files according the procedures below. When this type of error occurs, an entry is always written to the lqmi_invariant_failures.txt file, located in C:\Program Data\\Client\App Logging on Windows Vista machines C:\Program Data (x86)\\client\app Logging on 64-bit machines C:\Documents and Settings\All Users\Application Data\\Client\App Logging on all other operating systems. This file is usually small, so it is easy to pick out the error, especially if you know what time it occurred. Application Errors It is possible that the Client could cause another application that it manages, for example Microsoft Word or Microsoft Excel, to experience an error. If a user experiences such an error after the Client is installed, put the Client in standby mode from the Client Console as per instructions in the Putting the Document Control Client into Standby section of this document on page 50. Does the error go away? If so, enable the Client again from the Console as per the instructions in the Enabling Document Control section of this document on page 48, reboot the machine, and see if the error returns again. If it does, contact Product Support. 57

62 Diagnostic Logging Diagnostic logging is enabled through a series of Windows registry entries. Which registry entries are useful often depends on the nature of the problem that is occurring. To set diagnostic logging: In the Windows registry key HKEY_LOCAL_MACHINE\Software\\Client\Diagnostic Logging, create a subkey named after the executable you want to diagnose. So for example, for the "DCI" service, you would create a key for lmdci.exe. For supported applications such as Word, Excel or Adobe Reader, you would create keys for winword.exe, excel.exe, or acrord32.exe accordingly. We also integrate with the Windows logon process, which is winlogon.exe. In the key, create a string value called Severity and set it to ALL. If specific logging is required, Product Support may supply you with registry files that will set the registry key values appropriately. If you use the regedit program to view the Windows registry values that are set, you may see strings containing values that look like: ::lqmi::agency::agents::minet::impl::minet_treq ::lqmi::agency::mstorage These roughly correspond to object classes and class hierarchies in the code. We call these channels in the context of diagnostic logging. When our developers have narrowed down the place in code where an issue is occurring and needs logging from additional troubleshooting steps, they may ask us to set the scopes so that the log contains only the information they need, and is clear of any other noise. There is no way for Helpdesk or Support to predict what will be the appropriate channels for a given issue, so the best process is simply to log ALL for submitting the issue as described above, and let our engineering team guide whether scopes need to be set for any subsequent logs gathered. Diagnostic logs can be found in C:\Program Data\\Client on Windows Vista machines C:\Program Data (x86)\\client on 64-bit machines C:\Documents and Settings\All Users\Application Data\\Client on all other operating systems. In this folder are a number of log files with names that are of the form dci_log_yyyymmddn.log. Where yyyymmdd is the date on which the log file was created and n is the sequence number used to distinguish between multiple log files when more than one file is created for a specific date. All files in the App Logging sub-folder are also log files. When you send us diagnostic files, send any files that have the name dci_log_*.txt or guard_log*.txt from 58

63 C:\Program Data\\Client on Windows Vista machines C:\Program Data (x86)\\client on 64-bit machines C:\Documents and Settings\All Users\Application Data\\Client on all other operating systems. You should send only those files that logged information during the time period in which the error occurred. You should also send any files that are larger than 0 bytes in size, in particular lqmi_invariant_failures.txt, from C:\Program Data\\Client\App Logging on Windows Vista machines C:\Program Data (x86)\\client\app Logging on 64-bit machines C:\Documents and Settings\All Users\Application Data\\Client\App Logging on all other operating systems. When you set logging for a specific application, the logging is written to the dci_log_*.txt files. In addition to diagnostic logging, the Document Control client can be configured to produce mini-dumps as a diagnostic tool. This is a stack trace with debug symbols that our Engineering team can load into a debugger to determine what is happening. The information produced by the mini-dump tool is similar to what Microsoft s Dr. Watson tool collects. To help facilitate the diagnostic process, you can include a mini-dump whenever you send diagnostic files to Product Support. To produce mini dump output: Create the registry key HKEY_LOCAL_MACHINE\SOFTWARE\\Client\Diagnostic Logging\ProcessDump and in it make a DWORD called Active and set it to "1". The default location of the dump file is C:\, but you can also control this location with the string value "Location" in the same registry key. The mini-dump output will be written to a file that is named with an lqmi_ prefix and a.dmp extension. Contacting Product Support for Assistance How to Get Help To receive help from Product Support, you must have been identified as a support contact for your organization. Pre-named support contacts can contact Product Support in any of the following ways: 59

64 Via phone or , select option #3 Via at Via the web at Valid authentication credentials are required. Product Support is available from Monday through Friday between the hours of 8:00AM and 8:00PM US Eastern Time, excluding -recognized holidays. For a full list of the holidays that are recognized by, go to Providing Information to Support Product Support will require information in order to effectively troubleshoot your issue. Exactly what information will be required depends on the nature of the issue you re reporting. Some commonly-requested information is listed below. About your software o Product involved o Version of product involved About the computer that is experiencing the problem o Operating system, including service packs o Version of supported applications involved, including service packs where applicable o An.nfo file which details the software and hardware configuration of the computer involved. This file can be created from within any Microsoft Office application by selecting Help > About > System Information from the menu and saving the resulting report. About the issue. Note: Not all of the information listed here will be necessary for every issue. This list is intended to give you an idea of what types of information might be useful and requested. o For some issues it may be useful to obtain a tree view of the installation directory. This is created from the command line via the following command: tree /f /a "c:\program files\liquid machines\client" > installtreeoutput.txt o For some issues, a permission dump of the DCI state directory may be useful. One utility that can do this is available here: The command syntax would be: setacl -on "c:\documents and settings\all users\application data\liquid machines\client\dcistate" -ot file -actn list -rec cont_obj -lst "f:tab;w:d,s;i:y;s:y" -bckp stacloutput.txt -silent o It may be important to know whether the process "lmdci.exe" was in fact running at the time the behavior occurred. o If you are able to reproduce behavior, the exact series of key strokes, mouse clicks, file names, files themselves (if possible), and any other environmental conditions that seem relevant, are always helpful. 60

65 o o It is always useful to know what date and time window, and in what time zone, the behavior occurred, for the purposes of seeking out the relevant information in the log files. The Windows utility "Process Explorer" can be used to see what DLL's a particular process or application has loaded. Knowing whether DLL's with names of form lqmb*.dll have loaded by the affected process can be helpful. 61

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

Protected PDF Common Installation Issues

Protected PDF Common Installation Issues Protected PDF Common Installation Issues July 14, 2011 Version 1.1 TABLE OF CONTENTS Basic Instructions for Readers ------------------------------------------------------------------------- 2 Common Questions

More information

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS 03Archer.indd 71 8/4/05 9:13:59 AM Address Book 3.1 What Is the Address Book The Address Book in Outlook is actually a collection of address books

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency

More information

Using TLS Encryption with Microsoft Outlook 2007

Using TLS Encryption with Microsoft Outlook 2007 Using TLS Encryption with Microsoft Outlook 2007 This guide is meant to be used with Microsoft Outlook 2007. While the instructions are similar, the menu layouts and options have changed since the previous

More information

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

CITRIX TROUBLESHOOTING TIPS

CITRIX TROUBLESHOOTING TIPS CITRIX TROUBLESHOOTING TIPS The purpose of this document is to outline the Most Common Frequently Asked Questions regarding access to the County of York Computer Systems via Citrix. SYSTEM REQUIREMENTS:

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

User Guide. IntraLinks Courier Plug-in for Microsoft Outlook

User Guide. IntraLinks Courier Plug-in for Microsoft Outlook IntraLinks Courier Plug-in for Microsoft Outlook User Guide Copyright 2012 IntraLinks, Inc. Version 3.2 September 2012 IntraLinks 24/7/365 support US: 212 543 7800 UK: +44 (0) 20 7623 8500 See IntraLinks

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08 Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL Installation and System Administrator's Guide 4MASIN450-08 2011 Sage Software, Inc. All rights reserved. Sage, the Sage logos and the Sage product

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

Chapter 15: Forms. User Guide. 1 P a g e

Chapter 15: Forms. User Guide. 1 P a g e User Guide Chapter 15 Forms Engine 1 P a g e Table of Contents Introduction... 3 Form Building Basics... 4 1) About Form Templates... 4 2) About Form Instances... 4 Key Information... 4 Accessing the Form

More information

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

The Peer Reviewer s Guide to Editorial Manager

The Peer Reviewer s Guide to Editorial Manager The Peer Reviewer s Guide to Editorial Manager Registering with EM The Register option is found in the main toolbar. New users simply click on REGISTER. [Note: You may have been proxy registered as a review

More information

Web Conferencing Version 8.3 Troubleshooting Guide

Web Conferencing Version 8.3 Troubleshooting Guide System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which

More information

Administrator s Guide

Administrator s Guide Administrator s Guide Citrix Network Manager for MetaFrame XPe Version 1.0 Citrix Systems, Inc. Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Copyright Pro Softnet Corporation. All rights reserved. 2 of 24

Copyright Pro Softnet Corporation. All rights reserved. 2 of 24 Copyright Pro Softnet Corporation. All rights reserved. 2 of 24 Remote Access Helpdesk User Manual TABLE OF CONTENTS Introduction...4 Features...4 Administrator: Manage Technicians...5 Technician: Initiate

More information

Microsoft Outlook Setup With Exchange Server. Outlook 2007 2010 2013

Microsoft Outlook Setup With Exchange Server. Outlook 2007 2010 2013 Microsoft Outlook Setup With Exchange Server Outlook 2007 2010 2013 Revised 12/1/2014 CONTENTS SUMMARY... 3 I. OUTLOOK SETUP... 4 II. PERSONAL FOLDERS SETUP... 7 III. RULES SETUP... 9 Rule #1: Move Inbox

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

Using Remote Web Workplace Version 1.01

Using Remote Web Workplace Version 1.01 Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote

More information

Sophos Cloud Migration Tool Help. Product version: 1.0

Sophos Cloud Migration Tool Help. Product version: 1.0 Sophos Cloud Migration Tool Help Product version: 1.0 Document date: June 2015 Contents 1 About the Sophos Cloud Migration Tool...4 2 How does Sophos Cloud differ from on-premise management?...5 3 How

More information

WatchDox for Windows. User Guide. Version 3.9.5

WatchDox for Windows. User Guide. Version 3.9.5 WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Version 1 Revised 11/29/2007 Table of Contents Java Installation:...4 Browser Configuration:...4 Citrix Client Installation:...8 Attempting

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook

More information

POINT OF SALES SYSTEM (POSS) USER MANUAL

POINT OF SALES SYSTEM (POSS) USER MANUAL Page 1 of 24 POINT OF SALES SYSTEM (POSS) USER MANUAL System Name : POSI-RAD System Release Version No. : V4.0 Total pages including this covering : 23 Page 2 of 24 Table of Contents 1 INTRODUCTION...

More information

Remote Desktop Service

Remote Desktop Service Remote Desktop Service (Windows Vista Edition) Regulations Before connecting to the network, you must familiarise yourself with the regulations for computing use at the University of Greenwich. You are

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

What is OneDrive for Business at University of Greenwich? Accessing OneDrive from Office 365

What is OneDrive for Business at University of Greenwich? Accessing OneDrive from Office 365 This guide explains how to access and use the OneDrive for Business cloud based storage system and Microsoft Office Online suite of products via a web browser. What is OneDrive for Business at University

More information

Remote Access VPN SSL VPN Access via Internet Explorer

Remote Access VPN SSL VPN Access via Internet Explorer The following instructions will allow you to access your company network remotely, via your Internet Explorer web browser. 1. Launch Internet Explorer and choose Internet Options from the Tools menu. 2.

More information

Student ANGEL FAQs. General Issues: System Requirements:

Student ANGEL FAQs. General Issues: System Requirements: Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first

More information

How to Connect to Berkeley College Virtual Lab Using Windows

How to Connect to Berkeley College Virtual Lab Using Windows How to Connect to Berkeley College Virtual Lab Using Windows Minimum Requirements Create and Save a Remote Desktop Services Connection Connecting to a Remote Desktop Services session Copy Files between

More information

Using. Microsoft Virtual PC. Page 1

Using. Microsoft Virtual PC. Page 1 Using Microsoft Virtual PC T4 Page 1 Microsoft Virtual PC Microsoft Virtual PC allows multiple Guest Operating Systems (Virtual Machines) to run using the resources of the Host Operating System (The PC

More information

Email Set Up Instructions

Email Set Up Instructions Email Set Up Instructions Email Support...1 Important Fist Steps for all Users...2 DO YOU KNOW YOUR USERNAME AND PASSWORD?...2 Install the Despaminator CompanyV Certificate...2 What is Your Mail Client?...2

More information

Vodafone Email Plus. User Guide for Windows Mobile

Vodafone Email Plus. User Guide for Windows Mobile Vodafone Email Plus User Guide for Windows Mobile 1 Table of Contents 1 INTRODUCTION... 4 2 INSTALLING VODAFONE EMAIL PLUS... 4 2.1 SETUP BY USING THE VODAFONE EMAIL PLUS ICON...5 2.2 SETUP BY DOWNLOADING

More information

IceWarp Outlook Connector 4 User Guide

IceWarp Outlook Connector 4 User Guide IceWarp Unified Communications IceWarp Outlook Connector 4 User Guide Version 10.3 Printed on 23 February, 2011 Contents IceWarp Outlook Connector 4 1 Installing IceWarp Connector... 2 Pre-Installation

More information

The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0.

The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0. The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0. Copyright 1994-2007 by Northrop Grumman. All rights reserved. Northrop Grumman, the

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide

More information

TrueEdit Remote Connection Brief

TrueEdit Remote Connection Brief MicroPress Server Configuration Guide for Remote Applications Date Issued: February 3, 2009 Document Number: 45082597 TrueEdit Remote Connection Brief Background TrueEdit Remote (TER) is actually the same

More information

Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x)

Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x) Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x) Start your Internet Explorer browser and direct it to the faculty home page. Click on the link Remote Access,

More information

AT&T Conferencing Add-in for Microsoft Outlook v10.5

AT&T Conferencing Add-in for Microsoft Outlook v10.5 AT&T Conferencing Add-in for Microsoft Outlook v10.5 July 2014 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

Government buyer user manual System Requirements and Administration Version 2.0

Government buyer user manual System Requirements and Administration Version 2.0 Queensland Government etendering website Government buyer user manual System Requirements and Administration Version 2.0 July 2011 etender Help Desk phone 07 3836 0141 Table of contents 1 Introduction...

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009 Getting Started with Microsoft Office Live Meeting Published October 2007 Last Update: August 2009 Information in this document, including URL and other Internet Web site references, is subject to change

More information

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) March, 2013 Ref. 03.10 Kepware Technologies Table of Contents 1. Overview... 1 1.1 What is DCOM?... 1 1.2 What is OPCEnum?... 1 2. Users and

More information

Corporate Telephony Toolbar User Guide

Corporate Telephony Toolbar User Guide Corporate Telephony Toolbar User Guide 1 Table of Contents 1 Introduction...6 1.1 About Corporate Telephony Toolbar... 6 1.2 About This Guide... 6 1.3 Accessing The Toolbar... 6 1.4 First Time Login...

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007

Getting Started with Microsoft Office Live Meeting. Published October 2007 Getting Started with Microsoft Office Live Meeting Published October 2007 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless

More information

Terminal Server Guide

Terminal Server Guide Terminal Server Guide Contents What is Terminal Server?... 2 How to use Terminal Server... 2 Remote Desktop Connection Client... 2 Logging in... 3 Important Security Information... 4 Logging Out... 4 Closing

More information

ProperSync 1.3 User Manual. Rev 1.2

ProperSync 1.3 User Manual. Rev 1.2 ProperSync 1.3 User Manual Rev 1.2 Contents Overview of ProperSync... 3 What is ProperSync... 3 What s new in ProperSync 1.3... 3 Getting Started... 4 Installing ProperSync... 4 Activating ProperSync...

More information

DEPARTMENT OF EDUCATION. Online Application General Information

DEPARTMENT OF EDUCATION. Online Application General Information DEPARTMENT OF EDUCATION CHILD NUTRITION PROGRAM Online Application General Information Contents Revision History... 2 Revision History Chart... 2 Welcome to the Child Nutrition Programs Website... 3 What

More information

Windows XP Exchange Client Installation Instructions

Windows XP Exchange Client Installation Instructions WINDOWS XP with Outlook 2003 or Outlook 2007 1. Click the Start button and select Control Panel: 2. If your control panel looks like this: Click Switch to Classic View. 3. Double click Mail. 4. Click show

More information

How to connect to VUWiFi

How to connect to VUWiFi Wireless Registration Instructions Windows XP How to connect to VUWiFi 1. The first step in setting up your wireless card for VUWiFi is to open your Network Connections window. You can find this by going

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

PROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein

PROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein PROJECTIONS SUITE Database Setup Utility (and Prerequisites) Installation and General Instructions v0.9 draft prepared by David Weinstein Introduction These are the instructions for installing, updating,

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2 Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2 Installation and Configuration Introduction This document will walk you step by step in removing MSDE and the setup and

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

PKI Contacts PKI for Fraunhofer Contacts

PKI Contacts PKI for Fraunhofer Contacts Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 15.10.2013

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

NYS OCFS CMS Contractor Manual

NYS OCFS CMS Contractor Manual NYS OCFS CMS Contractor Manual C O N T E N T S CHAPTER 1... 1-1 Chapter 1: Introduction to the Contract Management System... 1-2 CHAPTER 2... 2-1 Accessing the Contract Management System... 2-2 Shortcuts

More information

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe

More information

Password Memory 6 User s Guide

Password Memory 6 User s Guide C O D E : A E R O T E C H N O L O G I E S Password Memory 6 User s Guide 2007-2015 by code:aero technologies Phone: +1 (321) 285.7447 E-mail: [email protected] Table of Contents Password Memory 6... 1

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide NFIRS 5.0 Software Version 5.3 Prepared for: Directorate of Preparedness and Response (FEMA) Prepared by:

More information

How to Use Remote Access Using Internet Explorer

How to Use Remote Access Using Internet Explorer Introduction Welcome to the Mount s Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote

More information

Windows Server 2008 R2 Initial Configuration Tasks

Windows Server 2008 R2 Initial Configuration Tasks Windows Server 2008 R2 Initial Configuration Tasks I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support for the

More information

ithenticate User Manual

ithenticate User Manual ithenticate User Manual Updated November 20, 2009 Contents Introduction 4 New Users 4 Logging In 4 Resetting Your Password 5 Changing Your Password or Username 6 The ithenticate Account Homepage 7 Main

More information

Wireless Network Configuration Guide

Wireless Network Configuration Guide CIT Table of Contents Introduction... 1 General Wireless Settings... 1 1. Windows XP Wireless Configuration... 2 2. Windows XP Intel Pro Wireless Tool... 7 3. Windows Vista Using the Windows Wireless Tools...

More information

DCA. Document Control & Archiving USER S GUIDE

DCA. Document Control & Archiving USER S GUIDE DCA Document Control & Archiving USER S GUIDE Decision Management International, Inc. 1111 Third Street West Suite 250 Bradenton, FL 34205 Phone 800-530-0803 FAX 941-744-0314 www.dmius.com Copyright 2002,

More information

Colligo Email Manager 6.0. Offline Mode - User Guide

Colligo Email Manager 6.0. Offline Mode - User Guide 6.0 Offline Mode - User Guide Contents Colligo Email Manager 1 Key Features 1 Benefits 1 Installing and Activating Colligo Email Manager 2 Checking for Updates 3 Updating Your License Key 3 Managing SharePoint

More information

eopf Release E Administrator Training Manual

eopf Release E Administrator Training Manual eopf Release E Administrator Training Manual i The United States Office Of Personnel Management eopf Administrator Training Manual for eopf v5 eopf Version 4.1, July 2007, March 2008, March 2009; eopf

More information

...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0...

...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0... TABLE OF CONTENTS...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0...2 INSTALLING THE ENDPOINT ANALYSIS...4 LOGGING OFF

More information

InfoView User s Guide. BusinessObjects Enterprise XI Release 2

InfoView User s Guide. BusinessObjects Enterprise XI Release 2 BusinessObjects Enterprise XI Release 2 InfoView User s Guide BusinessObjects Enterprise XI Release 2 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,

More information

MessageGuard 3.0 User Guide

MessageGuard 3.0 User Guide MessageGuard 3.0 User Guide Table of Contents Introduction... 3 Installing the MessageGuard Desktop Client... 3 Sending Secure E-mail Messages with the Desktop Client... 11 Reading Secure E-mail Messages

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

NHSmail mobile configuration guide NotifySync V4.7 for Blackberry

NHSmail mobile configuration guide NotifySync V4.7 for Blackberry Only devices running NotifySync version 4.7 support encryption at rest NHSmail mobile configuration guide NotifySync V4.7 for Blackberry Version: V.4 Date: March 2011 THIS INFORMATION IS FOR NHS STAFF

More information

LogMeIn Backup. User Guide

LogMeIn Backup. User Guide LogMeIn Backup User Guide Contents About LogMeIn Backup...4 Getting Started with LogMeIn Backup...5 How does LogMeIn Backup Work, at-a-glance?...5 About Security in LogMeIn Backup...5 LogMeIn Backup System

More information

Federated Identity Service Certificate Download Requirements

Federated Identity Service Certificate Download Requirements Federated Identity Service Certificate Download Requirements Version 3.2 Exostar, LLC February 14, 2013 Table of Contents Introduction... 1 Purpose... 1 FIS System Requirements... 2 Adding Exostar as a

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

GP REPORTS VIEWER USER GUIDE

GP REPORTS VIEWER USER GUIDE GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

Decision Support AITS University Administration. Web Intelligence Rich Client 4.1 User Guide

Decision Support AITS University Administration. Web Intelligence Rich Client 4.1 User Guide Decision Support AITS University Administration Web Intelligence Rich Client 4.1 User Guide 2 P age Web Intelligence 4.1 User Guide Web Intelligence 4.1 User Guide Contents Getting Started in Web Intelligence

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

webforms Quick Reference

webforms Quick Reference Page 1 of 9 webforms Quick Reference Version 6.0 Background & Overview webforms is the latest addition to the Progressive B2B product range. Ideal for s who are yet to become EDI (Electronic Data Interchange)

More information