gpg4o Manual Version 3.0
|
|
|
- Corey Campbell
- 9 years ago
- Views:
Transcription
1 gpg4o Manual Version 3.0
2 Table of Contents 1 GENERAL SYSTEM REQUIREMENTS INSTALLATION Required Software Installing GnuPG Installing gpg4o Setting gpg4o Generating and Importing License-Files UTILIZING GPG4O Sending Public Keys Importing Public Keys Sending Encrypted and/or Signed Messages Receiving of Encrypted and/or Signed Messages Sending and Receiving Encrypted Attachments Definition of Key Trust Obtaining Software Updates Utilization of Key Servers SEND RULES Domain Based Key Search Management of Send Rules Rule Evaluation MISCELLANEOUS What Is to Be Done in Case of Errors? Sending Log-Files Contents of Log-Files UNINSTALLING Uninstalling under Windows Vista or Windows Uninstalling under Windows XP Version 3.0
3 1 General 1 General gpg4o GPG for Microsoft Outlook 2010 gpg4o was developed as an Add-In for Microsoft Outlook 2010 and is supported by the 32- as well as by the 64-Bit version. gpg4o assures a safe electronic communication by encrypting and decrypting s and their file attachments. Of course, signing and verifying is also possible. The integrated key management by gpg4o provides the simple and uncomplicated handling of public keys. The validity of external keys is verified by means of the Web of Trust function. For this purpose information of known key owners is used. Version 3.0 3
4 2 System Requirements 2 System Requirements In order to be able to utilize gpg4o, your system must fulfill at least the following requirements: Operating system: Microsoft Windows XP SP3, Windows Vista SP1 or higher, Windows 7; 32- or 64-Bit Versions program: Microsoft Outlook 2010, 32- or 64-Bit Version 4 Version 3.0
5 3 Installation 3 Installation 3.1 Required Software For installing you need the (GNU General Public License) GnuPG version until version 2.0 which is exempt from charges and the Add-In gpg4o gpg for Outlook 2010 developed by Giegerich & Partner. All necessary downloads can be found on: Installing GnuPG After having downloaded GnuPG click Execute in the download window of your browser in order to start the installation procedure of GnuPG. Alternatively, you may browse to your download folder and execute the file "gnupg.exe" there by double click. The window shown in the following will appear. Click "Next" in order to start the installation process. Please mind that you need an active Internet connection during the installation process in order to be able to download additional components if necessary (f. i. the.net- Framework 4). In the following dialogue you will see the License Agreement. Below the dialogue In short" you will find a summary of the License Agreement with GnuPG. Once you have decided to accept the License Agreement (precondition for the installation), click "Next" and continue the installation. Version 3.0 5
6 3 Installation In the next dialogue you are asked to select the components to be installed. If you use GnuPG only for the utilization of gpg4o you can deactivate the checkmarks at "NLS" and "Documentation". 6 Version 3.0
7 3 Installation If, during the previous inquiry, you have also selected "NLS" to be installed a dialogue will appear after having clicked "Next" permitting you to define the desired language. The default language is that of your operating systems. In order to continue, please click "Next". In the next dialogue you will be asked to select the installation path. For most applications it is sufficient to adopt the preselection. Confirm the installation path with "Next". Version 3.0 7
8 3 Installation Afterwards, you may also define in which start menu folder the programs shortcuts shall be filed. Here, too, the preselection is generally the correct choice. You may now assure yourself again that you have indicated all setups correctly. By clicking "Install" GnuPG will be installed on your computer. 8 Version 3.0
9 3 Installation In the terminal window you can see the installation details. By clicking "Next" you close the setup wizard. The installation of GnuPG has thus been completed and you may continue installing gpg4o. Version 3.0 9
10 3 Installation 3.3 Installing gpg4o Before installing gpg4o please close the application Microsoft Outlook 2010, as otherwise, there might be problems during installation. Having done this, execute the file "gpg4o_setup.exe" by double-click. The installation will start now. In doing so, the presence of all required components (for example.net Framework 4) is checked. Missing components will then automatically be installed. As soon as all the necessary components have been installed, the wizard will continue installing gpg4o. Click on Next to start the installation process. 10 Version 3.0
11 3 Installation In the following dialogue you will see the End-User License Agreement. Once you have decided to accept the License Agreement (precondition for the installation), select the radio-button next to I Agree, click "Next" and continue the installation. In the following dialog you will be asked, to set the installation path. Here the default setting is normally the best choice. Confirm the installation path by clicking on Next. Version
12 3 Installation After having clicked "Next" the installation procedure will be started by gpg4o. Now the installation of gpg4o is completed. You can start the configuration of gpg4o by restarting Microsoft Outlook Version 3.0
13 3 Installation Version
14 3 Installation 3.4 Setting gpg4o Start Microsoft Outlook 2010 now in order to begin the setting of your new software. The configuration wizard appears which will help you to set up gpg4o. Click "Next", in order to start the configuration. First of all, the installation path of GnuPG is inquired. Here, the default path of the GnuPG-Installation should generally appear. If this is not the case the selection will be highlighted red. In this case click "Search" and search for the GnuPG-installation on your hard disk and select the file "gpg.exe" or "gpg2.exe" in the installation folder. The installation path should now be highlighted green. Furthermore, you have the possibility of altering the language of gpg4o. Once you have made all the settings, click "Next" in order to continue the configuration. 14 Version 3.0
15 3 Installation Next the individual accounts will be configured (usually one address corresponds to one account). To this end select the desired account on the left side of the configuration wizard. On the right side you will find the corresponding updated settings. Activate the checkmark at "Use gpg4o for this account". Thus, the add-in supports the marked account. With the selection box "Keypair to use with this account" you define which keypair shall be used for signing and decrypting messages. With the next two check boxes the default behaviour of gpg4o with regard to sending of s is determined. The preselected default is no signing and/or encrypting of s. The function of the lowest option is to determine whether when sending HTML-mails a default enquiry has to be made if said mails shall be converted into the plain text format. Version
16 3 Installation If you do not have a keypair for your address yet you can generate a new keypair via the selection menu. For this purpose click "Generate new keypair" in the selection box Keypair to use with this mail account. In the following dialogue enter your name and the desired passphrase (password). In addition, you may also define the length of the two keys (main-key and subkey) Afterwards, click "OK". Note: The longer the key the higher the quality and, thus, the security of encryption of your s and their attachments. After the information that the keypair has now been generated the entry fields will be deactivated. At that time it is no longer possible to modify the entries. In the left bottom of the dialogue field a progress bar appears. The time required for generating the key mostly depends on the hardware utilized by you. It is possible that this procedure can take 30 seconds or more. After the keypair has been generated you will get back to the configuration wizard. Here, you will now see the newly generated key. If you use several accounts, repeat the procedure described for the other addresses. 16 Version 3.0
17 3 Installation Finally, the keypairs are checked and the result will be displayed on the Summary page. By placing a checkmark in the last column Send testmail you can check your gpg4o installation. For this you will receive a testmail after completing the Configuration Wizard. If errors occur here, please send an with the log-files to [email protected]. In chapter 6, "Miscellaneous" you can find a description of how to find the log-files and how to send them to us. Click "Finish" in the configuration wizard now in order to terminate the configuration. After a successful installation you will see a new flag named "gpg4o - GPG for Outlook 2010 ", if you look at the menu bar in Microsoft Outlook Here, you will find the key management and the possibility of modifying your settings. In order to obtain further information with regard to gpg4o please click "About gpg4o". In the window appearing then you can find additional information concerning your license and the currently utilized version. Version
18 3 Installation 3.5 Generating and Importing License-Files After having processed the online-ordering of gpg4o you can manage your licenses via our web interface ( For login you utilize the same access data that you use in our shop. In the following menu you can see a summary of your licenses. You can see how many licenses are at your disposal altogether and how many of them are already utilized or which of them are still available. In order to make alterations to your licensing, click the pen-symbol (edit license). Now enter the address you desire. In order to be able to enter several addresses at once, separate them from each other with a new line. Subsequently, you can choose whether you want to download the license file directly or whether you want to have it sent by . Alternatively, you can 18 Version 3.0
19 3 Installation also define by checkmarks to which addresses the license shall be sent. Here, you can select individual addresses or all addresses. addresses which have already been entered can be individually adapted via the push-buttons Edit and Delete. Moreover, you can see the date until which updates will be placed at your disposal. Now you can import the license. For this purpose open Microsoft Outlook 2010 and choose gpg4o GPG for Outlook 2010 in the ribbon. There click the push-button About gpg4o. In the information window appearing now choose the item Import license. A file selection dialogue will appear. Browse to your license and choose Open. Now, your license file is imported and a corresponding message will appear which you can confirm by clicking OK. It is also possible to import the license file once you have received it by as file attachment. For this purpose click the right mouse button on the file attachment and choose the item Import license for gpg4o in the context menu. Version
20 4 Utilizing gpg4o 4 Utilizing gpg4o After gpg4o has been configured and corresponding keypairs for your accounts have been generated you now have to inform your communication partners of your public key. A keypair consists of two keys. One private-key and one public-key. When generating the keypair you were asked to enter a passphrase (password) for the keypair. Like all other of your passwords you should keep this passphrase safe and should not tell it to third parties. 20 Version 3.0
21 4 Utilizing gpg4o 4.1 Sending Public Keys In order to send an encrypted and/or signed you generated a new message. Browse to "gpg4o - GnuPG for Outlook 2010 " via the menu bar. There additional sending options are placed at your disposal. Place a checkmark in the check box "Attach my public key" and, if desired, in the check box "Sign message". Write your in plain text format now and send it. This will now be automatically provided with an attachment comprising your public key. If your communication partner has already imported your public key it is not necessary to send the key another time. Mind that when directly sending s the default options selected by you are utilized, insofar as you have not specified any rules (see chapter 5). Pay careful attention when you encrypt s and when you do not. The public key can be imported by all current encryption tools which support the OpenPGP-Standard. It comprises only the public part of the keypair, not the private part. You must NEVER send your passphrase or your private-key! Version
22 4 Utilizing gpg4o 4.2 Importing Public Keys In order to be able to send an as an encrypted mail or in order to verify a signed you need the so-called public key from the sender. If the recipient sends you a key as an attachment you can import it via the context menu (click right mouse button on the attachment) into your key management or via the ribbon by clicking on Import public key. Also you have the possibility to import a key from a key server (see Chapter 4.8). This exchange of the public key must be made once with every contact with whom you want to exchange encrypted s. 22 Version 3.0
23 4 Utilizing gpg4o 4.3 Sending Encrypted and/or Signed Messages You can now send encrypted and/or signed s. In order to guarantee the best possible compatibility with all current programs you should write your s in plain text format. Of course, you also have the possibility of sending s in HTML-format. A corresponding selection possibility will appear as soon as you choose the option Encrypt message. If you want to define your selection as default you will have to activate the checkmark Don t ask me again. In the account settings (see paragraph 3.4) you can reset this option. Version
24 4 Utilizing gpg4o Before sending your , set the checkmark for Sign if you intend to send your signed or for Encrypt to send it encrypted. If you selected both your will be send signed and encrypted. Continue with a click on Send. 1 Settings for gpg4o 2 Here you can set, if your gets encrypted and/or signed and if you want to send your public key as attachment. You will now be asked to enter your passphrase (password). For this purpose kindly use the passphrase you have chosen for your key when setting gpg4o. 24 Version 3.0
25 4 Utilizing gpg4o 4.4 Receiving of Encrypted and/or Signed Messages If you receive an encrypted and/or signed another field will be shown below the read-only view. Here, you can now read the s decrypted or without signature blocks. In addition, symbols signalize whether the was received as encrypted or signed mail. In this case the coloured box on the left will show the validity of the signature. 1 - Encrypted 2 - Encrypted attachment and public key of Mr. Mustermann 3 - Decryption status 4 - Decrypted attachment and public key of Mr. Mustermann Version
26 4 Utilizing gpg4o 4.5 Sending and Receiving Encrypted Attachments As soon as you send an encrypted which contains an attachment or as soon as you receive such an gpg4o will do the rest for you quite automatically. You can attach files to your s as normal without having to worry about the details. As soon as the check mark is placed with encrypt all attachments will be encrypted as well in addition to the text of the . If you receive an encrypted with attachment you can either save the attachment or open it directly. For this purpose the options Preview, Open, Save as und Save all attachments are placed at your disposal in the context menu (click right mouse button on the attachment). Alternatively, you may also save the attachment by drag-and-drop in a folder. With the option Preview or with a simple click on the attachment it will be shown in the display as you know it from Microsoft Outlook Definition of Key Trust In principle the transfer of public keys is safe as long as you can trust the persons who receive your public key. However, it cannot be excluded that a third party generates a public key in your name and circulates it. If this person has access to your s it can decrypt and read them with the faked public key. Having done this, the third person could then send you the s again with your original public key so that you will not notice that your s were compromised. In order to avoid such a situation there is the possibility of signing keys and, thus, guaranteeing their authenticity. For this purpose click the item "Key management" in the ribbon "gpg4o - GPG for Outlook 2010 " and select the key you want to sign. When clicking the right mouse button a context menu will appear where you choose the item "Sign...". In the following dialogue you can define with which key you want to sign. Furthermore, you can indicate how sure you are of the authenticity of the key to be signed. With this selection the strength of the signature is defined. You can additionally define to which extent you trust your contacts to sign external keys and to classify them as authentic. For this purpose select one key from the key management and click the entry "Define trust..." in the context menu (click right mouse button). In the following dialogue several selection options have been placed at your disposal in order to define the trust into this contact. You should only choose the option "I trust him absolutely" for your own keys, however, as this option also has an influence on the behaviour of the validity of the keys and is not intended for external keys. The trust level indicated by you remains a secret of GnuPG and will never be exported or transferred to others. 26 Version 3.0
27 4 Utilizing gpg4o 4.7 Obtaining Software Updates In the configuration wizard you may execute a manual check for updates on the first page by clicking the corresponding button Check for update now. If this check shall be made regularly, place the check mark with Check for updates every time Outlook starts. Thus, a new version of pg4o is searched whenever Outlook is started and is offered to you for installation. The installation of the update is made in the background and does not require any confirmations on your part. After completion of the installation you should start Outlook again so that modifications are effective. Version
28 4 Utilizing gpg4o 4.8 Utilization of Key Servers In addition to the possibilities with regard to the sending of keys, explained in the paragraphs 4.1 and 4.2, you may also distribute your public key via a key server and, at the same time, import public keys of your communication partners from it. For this purpose click the item Key management in the ribbon gpg4o - GPG for Outlook 2010 and select your key. When clicking the right mouse button the context menu will open from which you choose the entry Upload key to key server. Here, you have the possibility to select a key server and to make your public key accessible with it. Now, you only have to inform your communication partner of the selected key server so that he will be able to import your public key. For importing a key via a key server, click the item Key management in the ribbon gpg4o - GPG for Outlook In the menu bar of the new window, click Key and there Search key server. Here, you have the possibility of entering the name or the key-id of your communication partner and of selecting the key server to be utilized. If the searched key is found you will be able to choose and import it. 28 Version 3.0
29 5 Send Rules 5 Send Rules In order to prevent you from having to indicate the settings for encrypting and signing for each of your s there are send rules in gpg4o doing that for you (see paragraph 5.2). In this window you also have the possibility of activating the domain based key search (see paragraph 5.1). 5.1 Domain Based Key Search In order to prevent you from having to search a corresponding key for every missing key of a recipient or if you possess a global key for a certain company you may activate the domain based key search. Thus, a possible matching key from the domain of the recipient will be automatically proposed to you from your key list in case of a missing key. For activating the domain based key search click the item Send rules in the ribbon gpg4o - GPG for Outlook In the appearing window, place a check mark with domain based key search. gpg4o will do the rest for you.. If you write an to [email protected] but if you do not possess a key for this recipient, gpg4o will now offer you an alternative key from the relative domain. If you refuse this key you may select another key for encrypting your as usual. Version
30 5 Send Rules 5.2 Management of Send Rules In the overview of the send rules you have the possibility of sorting and testing your existing rules without any influence on the rule evaluation. For this purpose click the item Send rules in the ribbon gpg4o - GPG for Outlook For creating a new rule click the button Add in the overview. 30 Version 3.0
31 5 Send Rules Enter a name for this new rule in the opening window. Afterwards, complete the conditions. When working out the conditions mind to design them as specifically as possible in order to avoid later conflicts. Having done this, choose the encryption options to be utilized and the public keys of the recipient(s). The keys will be utilized later for encrypting when sending the if the rule is applied. If you want gpg4o to select the matching key for you, just leave the selection with Recipient s current key. Otherwise choose those keys here which shall be utilized for encrypting the . Version
32 5 Send Rules 5.3 Rule Evaluation In order to apply a rule when sending an all preconditions indicated in the domain Conditions have to be fulfilled. When creating a new all your rules are browsed and all matching rules are selected. This selection is based exclusively on the conditions of the individual rules and not on the classification in the rules list. The following example shows two rules: Do not encrypt contains two conditions: Encrypt intern contains one condition: 32 Version 3.0
33 5 Send Rules If you write an to now and if you select as sender, both of your rules will apply. Thus, you will come into conflict as the settings for encrypting within the rules are different. In order to avoid this conflict in the future you may add a further condition to the rule Encrypt intern for a sender who is not [email protected]. Version
34 6 Miscellaneous 6 Miscellaneous 6.1 What Is to Be Done in Case of Errors? Unfortunately it is not always possible to completely exclude errors in software products and installations. Precisely in complex environments errors may happen which do not occur during development. We kindly ask you to help us disclose and correct errors! In order to be able to rapidly correct occurring errors we need detailed information of them. Please furnish all the details of the error occurred. Describe also the circumstances which have led to the error in order to permit us to reproduce it. Please inform us of the version utilized by you. You can see it by clicking "gpg4o - gpg for Outlook 2010 " in the ribbon menu of Microsoft Office 2010 and by selecting the push button "About gpg4o" in the following window. Please send us the error reports as well as the log files via the contact form provided for this purpose (see paragraph 6.2). If you have suggestions for improvement please send them to us via the same contact form for we always lend a ready ear to you for such problems. 6.2 Sending Log-Files In order to send a log-file to our support, click "gpg4o gpg for Outlook 2010 " in the ribbon menu of Microsoft Office Here choose the push button "About gpg4o" and in the dialogue appearing then click "Send Log-Files". Then, a preconfigured will open automatically with the log-files as attachment. 6.3 Contents of Log-Files In order to optimize the efficiency of our development in the elimination of possibly occurring errors, status reports are written into so-called log-files by gpg4o. These status reports contain neither personal information nor passwords or contents of s. Before sending the together with the log-files you can see the information passed on by unpacking the attached *.zip-file. All files contained therein consist of plain text. 34 Version 3.0
35 7 Uninstalling 7 Uninstalling If you uninstall gpg4o or also GnuPG, all generated and imported keys will remain and will be at your disposal again after a new installation. If you want to delete your key completely you should do it via the key management of gpg4o and uninstall the program only then. 7.1 Uninstalling under Windows Vista or Windows 7 In order to uninstall gpg4o click System control in the Windows start menu and browse to the item Programs there and afterwards to Uninstall Program. You will now see the list of all programs installed on your computer. Select gpg4o GPG for Outlook 2010 and click Uninstall in the menu. 7.2 Uninstalling under Windows XP In order to uninstall gpg4o click System control in the Windows start menu and browse to the item Software. You will now see the list of all programs installed on your computer. Select gpg4o GPG for Outlook 2010 and click Remove. Version
LiteCommerce Advanced Security Module. Version 2.8
LiteCommerce Advanced Security Module Version 2.8 Reference Manual Revision date: Jul/03/2007 LiteCommerce Advanced Security Module Reference Manual I Table of Contents Introduction...1 Administrator...2
SECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
How to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
ProperSync 1.3 User Manual. Rev 1.2
ProperSync 1.3 User Manual Rev 1.2 Contents Overview of ProperSync... 3 What is ProperSync... 3 What s new in ProperSync 1.3... 3 Getting Started... 4 Installing ProperSync... 4 Activating ProperSync...
SQL Server 2008 R2 Express Edition Installation Guide
Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details
1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts
This document will guide you through setting up your outgoing server (SMTP) Microsoft Outlook and Windows Live Mail. There is also a section below that guides you through the manual configuration of your
Baylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
Vodafone Text Centre User Guide for Microsoft Outlook
Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message
GPG installation and configuration
Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing
Time Matters for Microsoft Outlook. Technology Preview User Guide
Time Matters for Microsoft Outlook Technology Preview User Guide Contents Overview of Time Matters for Microsoft Outlook... 2 Requirements... 2 Install Time Matters for Microsoft Outlook... 3 Specify a
IBM Aspera Add-in for Microsoft Outlook 1.3.2
IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6
Global Image Management System For epad-vision. User Manual Version 1.10
Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------
USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2
Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2 Table of Contents Table of Contents... 1 I. Introduction... 3 A. ASP.NET Website... 3 B. SQL Server Database... 3 C. Administrative
Salesnet CRM Documents
Salesnet CRM Documents Outlook Add-In for Salesnet CRM Requirements Installation Instructions Add-in Overview Release Notes 2001-2012 Salesnet. All Rights Reserved. Document History Salesnet CRM Documents
STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
I. Configuring Digital signature certificate in Microsoft Outlook 2003:
I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to
Xythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
1) Important browser information New 2) Why is my browser so slow? 3) How can I view more than one screen without the other disappearing?
Known/Unresolved issues: Browser Scan to e-mail Creating Help Desk tickets for the scan-to-email issue is no longer necessary. A member of MIS will follow up with each office to determine scan-to-email
ProjectWise Explorer V8i User Manual for Subconsultants & Team Members
ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support
Microsoft Exchange Hosted Archive (MEHA)
Microsoft Exchange Hosted Archive (MEHA) All the Features of NYSeMAIL Archiving including Using for Business Continuity Using MEHA Using MEHA The Microsoft Exchange Hosted Archive (MEHA) can be accessed
Grapevine Mail User Guide
Grapevine Mail User Guide Table of Contents Accessing Grapevine Mail...2 How to access the Mail portal... 2 How to login... 2 Grapevine Mail user guide... 5 Copying your contacts to the new Grapevine Mail
1. Open the Account Settings window by clicking on Account Settings from the Entourage menu.
Using TLS Encryption with Microsoft Entourage This guide assumes that you have previously configured Entourage to work with your Beloit College email account. If you have not, you can create an account
Getting Started... Login to your Account. Set your Preferences Once logged in, click Preferences on the left.
Getting Started... Login to your Account https://med1.neocertifiedmail.com Mark the site as a favorite for quick reference for later. Set your Preferences Once logged in, click Preferences on the left.
Manual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
NetWrix File Server Change Reporter. Quick Start Guide
NetWrix File Server Change Reporter Quick Start Guide Introduction... 3 Product Features... 3 Licensing... 3 How It Works... 4 Getting Started... 5 System Requirements... 5 Setup... 5 Additional Considerations...
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System
STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System Abstract The intention of this document is to ensure successful installation of 3rd-Party software required for
To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to be verified.
TO: UAN CLIENTS FROM: UAN STAFF DATE: OCTOBER 8, 2008 SUBJECT: Steps for Initial Setup of Microsoft Outlook To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to
owncloud Configuration and Usage Guide
owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,
Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password
Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol
CBH Provider EDI Browser Manual
CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions
Archive Add-in Administrator Guide
Archive Add-in Administrator Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential
MailEnable Connector for Microsoft Outlook
MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for
Virtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007
Email Signing and Encryption using Microsoft outlook 2007 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.
Zimbra Connector for Microsoft Outlook User Guide 7.1
Zimbra Connector for Microsoft Outlook User Guide 7.1 March 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
Installation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
Using Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
About This Guide... 4. Signature Manager Outlook Edition Overview... 5
Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System
Distribution List Manager User s Manual
Distribution List Manager User s Manual Welcome... 2 Configuring the Add-in... 3 Settings Tab... 3 Advanced Tab... 4 Troubleshooting... 5 Distribution List Manager Copyright 2008 Sperry Software Inc. P
Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.
User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10
Installation instructions for MERLIN Dashboard
Installation instructions for MERLIN Dashboard Contents Installation Prerequisites:... 2 Procedure to manually backup and restore Views and Settings in AxOEE Manager... 3 For XP users go to:... 3 For Vista
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Vodafone PC SMS 2010. (Software version 4.7.1) User Manual
Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6
User Guide. Version 3.0 April 2006
User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark
Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2010
Email Signing and Encryption using Microsoft outlook 2010 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.
Installing the Microsoft Network Driver Interface
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
Release 2.0. Cox Business Online Backup Quick Start Guide
Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.
Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration
Installation Instruction STATISTICA Concurrent Network License with Borrowing Domain Based Registration Notes: ❶ The installation of the Concurrent network version entails two parts: a) a server installation,
Colligo Email Manager 6.0. Connected Mode - User Guide
6.0 Connected Mode - User Guide Contents Colligo Email Manager 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Email Manager 2 Checking for Updates 3 Updating Your License
Secure Agent Quick Start for Windows
Secure Agent Quick Start for Windows 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
TECHNICAL NOTE. The following information is provided as a service to our users, customers, and distributors.
page 1 of 11 The following information is provided as a service to our users, customers, and distributors. ** If you are just beginning the process of installing PIPSPro 4.3.1 then please note these instructions
What is a Mail Merge?
NDUS Training and Documentation What is a Mail Merge? A mail merge is generally used to personalize form letters, to produce mailing labels and for mass mailings. A mail merge can be very helpful if you
Webmail Instruction Guide
Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with
User s Manual. Management Software for ATS
ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.
EMAIL QUICK START GUIDE
IT Services Microsoft Outlook 2010 EMAIL QUICK START GUIDE Contents What is Outlook?...2 Quick Guide to Email...2 Create a new e-mail message...2 Forward or reply to an e-mail message...2 Creating new
Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header
Using Webmail Technical Manual: User Guide Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox
Zimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0
Zimbra Connector for Microsoft Outlook User Guide Network Edition 7.0 February 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international
Using Outlook web access.
Pages: 1 of 10 Using Outlook web access. Introduction...2 Accessing Webmail...2 Client Options...2 Premium Client Features...3 Initial Screen Premium Client...3 Similarities to Outlook Client...4 Inbox
1. Introduction... 2. 2. Requesting and setting up a certificate... 2. 2.1 Requesting a certificate... 2. 2.2. Creating a certificate...
Contents 1. Introduction... 2 2. Requesting and setting up a certificate... 2 2.1 Requesting a certificate... 2 2.2. Creating a certificate... 8 2.3. Installing a certificate... 12 2.4. Setting up the
PGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
Foxit Reader Deployment and Configuration
Copyright 2004-2015 Foxit Software Incorporated. All Rights Reserved. No part of this document can be reproduced, transferred, distributed or stored in any format without the prior written permission of
Colligo Email Manager 5.1. User Guide
5.1 User Guide Contents Enterprise Email Management for SharePoint 2010 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Email Manager 2 Managing SharePoint Sites 5 Adding
DigiDelivery Client Quick Start
DigiDelivery Client Quick Start Installing the DigiDelivery Client To download and install the DigiDelivery client software: 1 Launch your Web browser and navigate to www.digidesign.com/digidelivery/clients.
SAS 9.3 Foundation for Microsoft Windows
Software License Renewal Instructions SAS 9.3 Foundation for Microsoft Windows Note: In this document, references to Microsoft Windows or Windows include Microsoft Windows for x64. SAS software is licensed
imageprograf Direct Print & Share Guide
imageprograf Direct Print & Share Guide imageprograf Direct Print & Share Guide Ver. 2.0 Canon Inc. 1. Features of imageprograf Direct Print & Share The features of imageprograf Direct Print & Share are
User guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
GPG4win / Kleopatra Documentation. Secure file and e-mail encryption by using GnuPG for Windows
GPG4win / Kleopatra Documentation Secure file and e-mail encryption by using GnuPG for Windows GPG4win Detailed How To: Installing Gpg4win: 1. Go to the following website http://www.gpg4win.org/download.html,
Microsoft Outlook Web Access Handbook
Microsoft Outlook Web Access Handbook Introduction Outlook Web access allows you to use a web browser (Internet Explorer or Firefox) to read your email, send email, and check your online calendar. This
Encrypting Your Email Using the free COMODO Secure Email Certificate
Encrypting Your Email Using the free COMODO Secure Email Certificate These instructions will guide you through the process of getting a free Secure Email Certificate Issued by COMODO. This document will
Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500
Outlook Email User Guide IS TRAINING CENTER 833 Chestnut St, Suite 600 Philadelphia, PA 19107 215-503-7500 This page intentionally left blank. TABLE OF CONTENTS Getting Started... 3 Opening Outlook...
Verizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
Advanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
NETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
Tutorial. Patch Management
Tutorial Patch Management 2011 DeskCenter Solutions AG Table of Contents 1. Introduction...3 2. Software deployer...4 2.1 Preparing the software deployer...4 2.2 Configuring software deployers...4 3. Central
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Backup Exec 15. Quick Installation Guide
Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
Microsoft Outlook 2010. Reference Guide for Lotus Notes Users
Microsoft Outlook 2010 Reference Guide for Lotus Notes Users ContentsWelcome to Office Outlook 2010... 2 Mail... 3 Viewing Messages... 4 Working with Messages... 7 Responding to Messages... 11 Organizing
State of Michigan Data Exchange Gateway. Web-Interface Users Guide 12-07-2009
State of Michigan Data Exchange Gateway Web-Interface Users Guide 12-07-2009 Page 1 of 21 Revision History: Revision # Date Author Change: 1 8-14-2009 Mattingly Original Release 1.1 8-31-2009 MM Pgs 4,
FileCruiser. Desktop Agent Guide
FileCruiser Desktop Agent Guide FileCruiser Desktop Agent Guide Contents Contents Getting Started with FileCruiser 1 Using the FileCruiser Agent 2 Desktop Shortcut 2 Log in to FileCruiser Agent 3 Using
PLEASE NOTE: The client data used in these manuals is purely fictional.
Welcome! CAREWare Quick Start guides will walk you through the basics of setting up, managing and using the main CAREWare functions. It is intended for non-technical users who just need to get basic information
BULLGUARD BAckUp GUIDE
BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running
PDG Software. Encryption Guide
Encryption Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2006 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership
MessageGuard 3.0 User Guide
MessageGuard 3.0 User Guide Table of Contents Introduction... 3 Installing the MessageGuard Desktop Client... 3 Sending Secure E-mail Messages with the Desktop Client... 11 Reading Secure E-mail Messages
Issue Tracking Anywhere Installation Guide
TM Issue Tracking Anywhere Installation Guide The leading developer of version control and issue tracking software Table of Contents Introduction...3 Installation Guide...3 Installation Prerequisites...3
Avaya Modular Messaging Microsoft Outlook Client Release 5.2
Avaya Modular Messaging Microsoft Outlook Client Release 5.2 Important: Instructions in this guide are applicable only if your message store is the Avaya Message Storage Server (MSS) or Microsoft Exchange
MobileStatus Server Installation and Configuration Guide
MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)
EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...
Set Up E-mail Setup with Microsoft Outlook 2007 using POP3
Page 1 of 14 Help Center Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Learn how to configure Outlook 2007 for use with your 1&1 e-mail account using POP3. Before you begin, you will need
