Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Size: px
Start display at page:

Download "Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology"

Transcription

1 getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on ( ) March 2010

2 Contents 1 Introduction to Symantec Endpoint Encryption Storing a file on removable USB drive (e.g. memory stick, external hard drive, etc.) Saving to USB Drive for storage or sharing internally Saving to USB Drive for Sharing Externally Sending a File securely via Receiving an Encrypted File via Access an encrypted file on a USB drive, on a RMG computer with SEE installed Access an encrypted file on a USB drive on a computer without SEE installed Accessing a Self-Extracting file on a Removable USB Drive Storing and Accessing files on CD/DVD Saving to CD/DVD for storage or internal transfer Saving to CD/DVD for External Transfer Accessing Files on a Secure CD/DVD Accessing on a RMG computer with SEE installed Accessing on a computer without SEE installed Accessing a Self-Extracting file on a CD/DVD Drive...21 Appendix A. Using the SEE User Client Console...23 Appendix B. Exchanging information securely our policies...27

3 1 Introduction to Symantec Endpoint Encryption Symantec Endpoint Encryption (SEE) software ensures that only authorised users are allowed to access removable devices such as memory sticks or CD/DVDs and that any information written to these devices is secure. When SEE is installed on your PC or laptop, you ll be automatically registered as an authorised user. This will mean that any file you save to a removable device will be automatically encrypted. This process will be seamless and you will be able to open documents on your PC as normal without noticing any difference. However, when sharing files with RMG users without SEE installed or with external users, you will need to create a separate file with a password. For details, go to section 2 - Storing a file on removable USB drive When SEE is installed, you ll also get an application for burning files to a CD/DVD, ensuring they are always encrypted. This application will replace all other CD burning software in RMG. Full details are in section 7. Symantec Endpoint Encryption (SEE) supports the RMG information security policies, further details of which can be found in Appendix B.

4 2 Storing a file on removable USB drive (e.g. memory stick, external hard drive, etc.) 2.1 Saving to USB Drive for storage or sharing internally Step 1 Whenever you save a file to a USB removable device, that file will now be automatically saved as an encrypted file. This means the file can only be accessed or shared internally within RMG. Step 2 The file icon displayed in Windows Explorer now includes a padlock, indicating the file is encrypted. Step 3 You can now remove the USB drive from your computer. All RMG computers will have Symantec Endpoint Encryption (SEE) installed by the end of July While the rollout takes place, only computers with SEE installed will be able to access files saved in this manner. The file won t open on RMG PC s without SEE installed or on external computers such as your home computer or one belonging to an external partner. If you need to share the information in the file with external third parties, or anyone in RMG who has not yet had the software installed, you will need to use a password to encrypt the file. See section 2.2 below.

5 2.2 Saving to USB Drive for Sharing Externally When sharing information on a removable USB drive with external third parties, or anyone in RMG yet to have the software installed, you will need to create a Self Extracting Archive (.exe) file encrypted with a password that you supply. The information will only be accessible to a third party by using that password. Step 1 Insert the removable USB drive into your computer. Step 2 Select the file(s) to be encrypted. Using Windows Explorer, browse to the location of the file(s) that you want to encrypt. A single file or multiple files can be encrypted to a self extracting file. Right-click the selected file(s), point to Symantec, and select Encrypt to self-extracting file.

6 The SEE Removable Storage Self-Extracting Archive dialogue box appears Step 3 Complete the fields in the Dialog box as follows: In the Archive Name field, type a name for the self-extracting file or use the default archive name that is displayed. The archive name can be different to the names of the files contained within it, however, it makes it easier for the recipient if you name the archive file with the same name as the original file. If you do use a different name ensure you advise the recipient of the names of the individual files so they can find the files when they extract them to their computer. Select the file path for the removable USB drive in the Encrypt to field, or browse to the appropriate folder in the Folders/Drives box. You need to save the archive directly to the removable device. If moved to the device later, the recipient won t be able to view it. To create a new folder or subfolder, select an existing folder then click the New folder button. The Create Folder dialogue appears. In the new folder field, type the name of the new folder and click OK. Your folder is created and you are returned to the SEE Removable Storage Self- Extracting Archive box to complete. If you have already saved a self-extracting file of the same name to this location and want to replace it with this one, tick the Overwrite existing files box.

7 Tick the Password to allow you to enter a password in the Password and Confirm boxes. Click Encrypt Step 4 When the encryption is complete you ll get this message: Step 5 Click OK to confirm Step 6 Send the removable device to the external third party Step 7 Send the password to the third party separately and securely via , or over the telephone. You should never send a password with the removable media on which it is encrypted. Ensure the password is at least eight characters long and is a mix of upper and lower case letters, numbers and symbols.

8 3 Sending a File securely via (Please be aware that the functionality in this section may not work whilst our systems are prepared for the migration from Lotus Notes to Microsoft Outlook) If you need to send a file to someone outside RMG using , you ll need to create a Self Extracting Archive file, encrypted with a password that you supply. The information will only be accessible to a third party by using that password. Step 1 Select the file(s) to be encrypted and ed Using Windows Explorer, browse to the location of the file(s) that you want to encrypt. A single file or multiple files can be encrypted to a self extracting file. Right-click the selected file(s), point to Symantec, and select Encrypt, rename and The SEE Encrypt, rename and dialog box appears

9 Step 2 Complete the fields in the Dialog box as follows: In the Archive Name field, type a name for the self-extracting file or use the default archive name that is displayed. The archive name can be different to the names of the files contained within it. It makes it easier for the recipient if you rename the archive. If you do use a different name ensure you advise the recipient of the names of the individual files. This will enable them to find the files when they extract them to their computer. Tick the Password to allow you to enter a password in the Password and Confirm boxes Click Step 3 Complete the Message details When the encryption is complete a New Mail is displayed with the encrypted file attached and a message telling the recipient how to access the file is included in the Mail Body Add the Recipient details and Subject and Send the message Step 4 Send the password to the third party separately and securely via a separate , or over the telephone. You should never send a password with the containing the encrypted file. Ensure the password is at least eight characters long and is a mix of upper and lower case letters, numbers and symbols.

10 4 Receiving an Encrypted File via (Please be aware that the functionality in this section may not work whilst our systems are prepared for the migration from Lotus Notes to Microsoft Outlook) When the recipient receives the encrypted file as an attachment, they save the attachment to their computer, and rename the attachment so that it has.exe as the file extension, instead of.rse. They then double click on the renamed file to display the SEE Removable Storage Extractor screen. They complete this by choosing the location on their computer in the Extract to field and the password you gave them in the password box. The file is extracted to the specified location and can be accessed by the recipient in the normal way. When looking for the extracted files, keep in mind that they might have different names to the archive file. If you are unsure you will need to contact the sender of the file.

11 5 Access an encrypted file on a USB drive, on a RMG computer with SEE installed In the screen shot below, a USB Drive containing an encrypted file has been plugged into your computer and is accessible as Drive F: The encrypted files appear in the folder listing in Windows Explorer. The padlock symbol which can be gold or red - indicates that the file is encrypted. A gold padlock means you can copy or open the file without a password. A red padlock means you will need to enter the password to decrypt the file when you try to copy or open it. When sharing encrypted files with other RMG users with SEE installed, this will not occur. If a file is displayed with the extension.exe and a padlock symbol, it has been saved as a self extracting executable archive. For details on accessing the files in the archive, refer to the next section.

12 6 Access an encrypted file on a USB drive on a computer without SEE installed Files encrypted and copied by SEE in the normal way (as described in section 2.1) cannot be opened automatically on a computer without SEE installed. If anyone tries to access the files using Windows Explorer they will see files with XML added to the end of the file name. If they try to access one of the files by double clicking it, this message will appear If this occurs because the user is waiting for SEE to be installed on their computer, the originator of the file should copy the file as a self extracting file as described in section 2.2 and send them the password separately and securely.

13 7 Accessing a Self-Extracting file on a Removable USB Drive Files that are to be securely transferred externally will be encrypted and should be saved as a self extracting file (as described in section 2.2) Step 1 To access these files, open Windows Explorer. The files will be displayed with a padlock symbol as shown here. To extract an unencrypted version of the file to your hard disc so you can access the file as normal. Double-click the self-extracting file name to start the process. A dialog box is displayed and you need to fill in the details. Step 2 Extract to: Type the name of folder on your hard disc where you want to save the extracted file to or Press to select the folder Password Enter the password provided by the originator, in the box (this is the password that was used when the self extracting file was originally created). Press Extract Note the number of remaining password attempts. Step 3 If the password is correct you will see this message and a normal unencrypted file will be placed on your hard drive that you can access as normal When looking for the extracted file(s), keep in mind that they may have different names to the archive file. The person who created the self-extracting file will be able to advise the original file names.

14 If you enter the wrong password, you see this message and will be able to try again to re-enter the password After five wrong passwords, you ll see this message You will not be able to try to decrypt the file again for a period of five minutes (the screen shot above was taken with one minute remaining).

15 8 Storing and Accessing files on CD/DVD 8.1 Saving to CD/DVD for storage or internal transfer When SEE is installed on your computer, it installs a program to burn files to a CD or DVD. This program will replace all other versions of CD burning Software in RMG. Follow the process below to burn files to a CD or DVD. Step 1 To launch the CD-DVD Burner, click Start - All Programs - Symantec Endpoint Encryption - SEE-RS Edition CD-DVD Burner, as shown below. Alternatively you can right click on the SEE User Client icon in the system tray (bottom right hand corner of your screen) and select Symantec Endpoint Encryption - SEE-RS CD-DVD Burner

16 Step 2 Complete the following dialogue box. An explanation of the fields and how you complete them follows: The Destination Drive drop-down list displays all of the available CD/DVD drives. Select your CD/DVD Drive. The Policies box is for information and indicates that files burned to disc will be encrypted. The Disc Information box gives you information about the disc currently in the selected drive. The Files and/or Folders to be burned box displays a list of files and folders that you select for burning. As you add files and folders using the buttons at the bottom of the screen they are added to this list. Add Files - This button allows you to select individual files from your computer to be added to the CD/DVD. Add Folders - This button allows you to select folders from your computer to be added to the CD/DVD.

17 Remove files - If you have added a file or folder to the list and change your mind before burning the CD/DVD you can remove it by selecting it from the list box and clicking this button. If you want to add a label to the CD/DVD before type the name in the Disc Volume Label box. burning, Step 3 Burn when you have selected all the files to be burned, press this button. The files are prepared, encrypted and finally written to the CD/DVD. The progress of each stage can be monitored in the Progress bar and the Activity Details box Step 4 When all files have been written successfully, this message appears. If you need to create a another CD/DVD with the same files, put a new disc in the CD/DVD writer and click Yes If you are finished, click No to end the Burner program.

18 8.2 Saving to CD/DVD for External Transfer Any files, which will be transferred to a Third party, must be stored on the CD/DVD as self extracting executables, using a password which must be supplied to the third party. The self extracting files will have to be created on your hard drive first, before copying to the CD using the CD/DVD writer. Step 1 The process for creating a self extracting archive on the hard disc is almost identical to the process for creating a self extracting archive on a Removable device as detailed in section 2.2. The only difference is in Step 3, when you are completing the Encrypt To part of dialog box. You need to save the self extracting file to a location on your hard drive. Complete the fields in the Dialog box as follows: In the Archive Name field, type a name for the self-extracting file - or use the default archive name that is displayed. The archive name can be different to the names of the files contained

19 within it. It makes it easier for the recipient if you name the archive file with the same name as the original file. If you do not use a different name ensure you advise the recipient of the names of the individual files. This will enable them to find the files when they extract them to their computer. Type the file path for the location on your hard drive where you want to save the file, in the Encrypt to field, or browse to the appropriate folder in the Folders/Drives box. You need to save the archive directly to the hard drive for copying to the CD at a later date. To create a new folder or subfolder on your hard disc, select an existing folder then click the New folder button. The Create Folder dialogue appears. In the new folder field, type the name of the new folder and click OK. Your folder is created and you are returned to the SEE Removable Storage Self-Extracting Archive box to complete. If you have already saved a self-extracting file of the same name to this location and want to replace it with this one, tick the Overwrite existing files box. Tick the Password to allow you to enter a password in the Password and Confirm boxes Click Encrypt Step 2 Once you have saved the self extracting file to your hard disc, you use the CD/DVD writer utility to copy that archive to your CD following the instructions in section 8.1 of this guide.

20 9 Accessing Files on a Secure CD/DVD 9.1 Accessing on a RMG computer with SEE installed If you are accessing a CD/DVD on an authorised workstation in RMG, then the files will appear with the gold padlock icon (described in section 5) and can be accessed as described for files on a removable USB device also detailed in section 5 of this guide. 9.2 Accessing on a computer without SEE installed If you try to access encrypted CD/DVD files from an RMG computer without SEE installed or any external computer, you won t be able to, unless the files have been saved as self extracting files. If not, when you access the CD/DVD files in Windows Explorer, you will not icons and the file names will end in and look at the see the padlock XML. If you try to access one of the files by it, you get this message: double clicking

21 10 Accessing a Self-Extracting file on a CD/DVD Drive A self extracting archive that has been saved to CD/DVD can be accessed using the same steps detailed for accessing a self extracting archive on a removable USB device. The process is explained in section 7 of this guide.

22 Appendix - Additional Information

23 Appendix A. 1. Reviewing SEE account Settings Using the SEE User Client Console The User Client Console can be launched at any time from the Start Menu, to review and modify your SEE settings, if required. The User Client Console displays your user name in the top right corner of screen, as you are the user currently logged on to the workstation. The Left column contains a menu of the options available to you. They include an option to change/review Account Settings You can only make changes to the settings of your own account. If any check boxes are greyed-out, this means you do not have the necessary privileges to change this setting. The majority of settings in the console will be greyed-out. To review or modify your account settings, select the appropriate option under the Account Settings portion in the left column. For example, you can review the One Time Password settings by clicking the One Time Password option, under Account settings. Since RMG are using SEE for Removable Storage only, the option for One Time Password is not used, so selecting that option displays this message

24 A similar message is displayed if Authenti-Check is selected, as that feature is not used with Removable storage either. Selecting the Password option displays this message, because your registered SEE account uses the same password as your normal Windows User account. Use the Quick Help icon to display the Quick Help pane, then move your mouse over to the option on the left hand pane on which you want help. 2. Reviewing SEE Removable Storage Policies You can review the SEE policies in place on your computer. Removable Storage is enabled on your computer, so to review the policies in relation to Removable devices, click on the Removable Storage option on the left hand side to see a description of those policies on the right hand side. In the example shown below, you are allowed to read and write to removable devices. Any new files you write to the removable device will be encrypted automatically by SEE. 3. Setting or Changing your Default Password

25 When you want to securely transfer a file to a third party via a removable device(described on page 7 of this guide), you have to supply a password. You will need to share the password with the authorised third party, who can then use the password to decrypt the file and access the information. To simplify the process, you can specify a default password. The default password can be used for every file you are going to share, avoiding the need to type a password for every individual file. You can change that default password from the SEE User Client console. Step 1 Select the Default Password option in the console Step 2 Enter the new password in the Password and Confirm Password boxes Step 3 Click OK to save the new password. Note on Passwords:

26 The Default Password panel displays the password length that is required by RMG policy, the symbols that are allowed in your password, and any requirements for the number of symbols, uppercase letters, lowercase letters, and/or digits that your password must contain. The RMG password policy requires you to ensure the password is at least eight characters long and is a mix of upper and lower case letters, numbers and symbols.

27 Appendix B. Exchanging information securely our policies Our policies covering the secure exchange of electronic information are: 1. Information Classification Policy - How to exchange information securely Royal Mail Group information must be classified according to the sensitivity of the content of the data. We have four levels of classification: Level PUBLIC INTERNAL CONFIDENTIAL STRICTLY CONFIDENTIAL Description Information that has been created for external distribution, or released under the Royal Mail Publication Scheme, to meet the requirements of the Freedom of Information Act (2000). Information accessible to all employees, agents and contractors relating to the ongoing business of the Royal Mail Group. Information that has been assessed to be of a sensitive nature and likely to cause damage following unauthorised disclosure. Information meeting the classification standards of government departments, the security services or clients, or assessed to be so sensitive that unauthorised disclosure would cause acute organisational damage. All data that isn t rated Public as described above i.e. Internal, Confidential or Strictly Confidential, must be encrypted when copied from your PC or laptop to a form of removable media, such as CD, DVD, USB drive (memory stick, external hard drive, etc.) or any other removable media. For more information, please see: Information Classification Policy-v1.1.pdf 2. Encryption Policy Exchanging removable media with external third parties When exchanging files with a third party, you must ensure that the information is protected during the exchange. If using mobile media, you need to create a self-decrypting file (see page 7 of this guide). The password for decrypting the file should never be sent with the mobile media on which it is encrypted. Always send the decrypting password separately in an or over the telephone. For more information, please see Encryption Policy-v1.1.pdf 3. User Access Management Policy

28 When choosing a password for your third party encrypted file, ensure it s at least eight characters long and contains a mix of numbers, upper and lower case letters, and symbols. To access the file, the third party will need to enter the password you created. They will have five attempts to input the correct password before the file becomes locked. For more information, please see - User Access Management Policy-v1.1.pdf To see our policies and supporting guidelines in full, go to

Managing Contacts in Outlook

Managing Contacts in Outlook Managing Contacts in Outlook This document provides instructions for creating contacts and distribution lists in Microsoft Outlook 2007. In addition, instructions for using contacts in a Microsoft Word

More information

SonicWALL CDP Local Archiving

SonicWALL CDP Local Archiving This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving

More information

Using Websense Data Endpoint Client Software

Using Websense Data Endpoint Client Software 1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization

More information

McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation

McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation 2013.06 McAfee Endpoint Encryption for Files and Folders (EEFF) uses powerful encryption technology to allow you to protect information

More information

Encryption. Introduction to using 7-Zip

Encryption. Introduction to using 7-Zip IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: [email protected] www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff

More information

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4

More information

Backing Up and Deleting Files

Backing Up and Deleting Files CHAPTER 5 Backing Up and Deleting Files Video files can be copied from the hard disk to external storage media, such as CD-R, DVD, MO, or ZIP drives. Video files saved on the hard disk can be easily deleted

More information

USER MANUAL. v. 11.4.1 ---------------------- December 2015 ----------------------

USER MANUAL. v. 11.4.1 ---------------------- December 2015 ---------------------- USER MANUAL v. 11.4.1 ---------------------- December 2015 ---------------------- Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark 15

More information

How to use Office 365 with your OneDrive File Storage Facility

How to use Office 365 with your OneDrive File Storage Facility How to use Office 365 with your OneDrive File Storage Facility As a student at Pembrokeshire College you will have access to Microsoft s Office 365 and the OneDrive file storage facility. Microsoft Office

More information

USER MANUAL. v. 11.3 ------------------------ January 2014 ------------------------

USER MANUAL. v. 11.3 ------------------------ January 2014 ------------------------ USER MANUAL v. 11.3 ------------------------ January 2014 ------------------------ 1 Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark

More information

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support

More information

Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync)

Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) This document is intended for those users moving from WVWC s Bobcat Mail system to the new Google Apps mail system

More information

Figure 1: Restore Tab

Figure 1: Restore Tab Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup

More information

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing

More information

Encrypting Files Using AxCrypt

Encrypting Files Using AxCrypt Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

Simple Computer Backup

Simple Computer Backup Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:

More information

4. Click Next and then fill in your Name and E-mail address. Click Next again.

4. Click Next and then fill in your Name and E-mail address. Click Next again. NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to

More information

Outlook Web Access (OWA) 2010 Email Cheat Sheet

Outlook Web Access (OWA) 2010 Email Cheat Sheet June 9, 2014 Outlook Web Access (OWA) 2010 Email Cheat Sheet Outlook Web Access 2010 allows you to gain access to your messages, calendars, contacts, tasks and public folders from any computer with internet

More information

Migrating From WVWC Mail to Google Apps

Migrating From WVWC Mail to Google Apps Migrating From WVWC Mail to Google Apps This document is intended for those users moving from WVWC s old mail server to the new Google Apps mail system. If you DO NOT have bobcats in your email address,

More information

Email Archiving. Follow these steps to archive your email:

Email Archiving. Follow these steps to archive your email: Email Archiving Archiving is a process by which your email messages and attached files are moved from the database on our email server to a location on your computer. This document contains step-by-step

More information

How to: Using archive files in Microsoft Outlook

How to: Using archive files in Microsoft Outlook How to: Using archive files in Microsoft Outlook Preface This 'How To' will guide you in archiving or making a backup of your Outlook folders. Keep in mind that these are two different actions: A backup

More information

How To Configure CU*BASE Encryption

How To Configure CU*BASE Encryption How To Configure CU*BASE Encryption Configuring encryption on an existing CU*BASE installation INTRODUCTION This booklet was created to assist CU*Answers clients with the configuration of encrypted CU*BASE

More information

How to manage the Adaptive Call Recorder (v.9-50)

How to manage the Adaptive Call Recorder (v.9-50) How to manage the Adaptive Call Recorder (v.9-50) The Adaptive Hybrid Call Recorder records all telephone calls that are made and received. Recording calls provides an audit of what was said in every conversation.

More information

You can also get to OWA by typing https://mymail.saisd.net. You have now entered the new and improved Web Outlook.

You can also get to OWA by typing https://mymail.saisd.net. You have now entered the new and improved Web Outlook. Access E-Mail from Anywhere through the Internet Start your Internet Browser i.e. Internet Explorer Go to www.saisd.net Refer to Quick Links on the right side of the page Click on Web Outlook Were it shows

More information

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process. Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they

More information

https://mail.wheelock.edu

https://mail.wheelock.edu The Wheelock College Guide to Understanding Microsoft Outlook Web Access Maintained by: Wheelock College Department of Information Technology Version 1.1 June 2006 https://mail.wheelock.edu This document

More information

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.

More information

Encrypting a USB Drive Using TrueCrypt

Encrypting a USB Drive Using TrueCrypt Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and

More information

EMAIL QUICK START GUIDE

EMAIL QUICK START GUIDE IT Services Microsoft Outlook 2010 EMAIL QUICK START GUIDE Contents What is Outlook?...2 Quick Guide to Email...2 Create a new e-mail message...2 Forward or reply to an e-mail message...2 Creating new

More information

Steps for using MagicConnect

Steps for using MagicConnect Getting Started Getting Started MagicConnect is a remote access service that allows you safe remote access to a target device from your remote device. What is a remote device? It is a Windows device, iphone/ipad,

More information

NHS Mail Basic Training Guide

NHS Mail Basic Training Guide Royal Derby Hospital 2011 Education, Training and Development I.T. Training Department NHS Mail Basic Training Guide Version 3.1 ND 05/11 No amendments should be made to the document without the Authors

More information

User Guide. Digital Signature

User Guide. Digital Signature User Guide Digital Signature ENTRUST ESP 9..2 Document version: 2.2 Publication date: January 2014 This guide is the exclusive property of Notarius Inc. All reproduction, printing or distribution of this

More information

INTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7

INTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7 INTRODUCTION TO WINDOWS AND FILE MANAGEMENT Windows 7 The Work Environment Your computer monitor is designed to resemble a desktop and is often referred to as such. Just as you might put on a regular desktop,

More information

WSDOT ProjectWise V8i Training 101

WSDOT ProjectWise V8i Training 101 WSDOT PROJECTWISE V8I TRAINING 101 ABOUT THIS TRAINING This training is intended to give a user the ability to open ProjectWise and access working files. Once you become comfortable working within the

More information

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop. User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10

More information

GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely

GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status

More information

Using Outlook WebAccess

Using Outlook WebAccess Using Outlook WebAccess Outlook Toolbars - Terminology Update all folders New Move/Copy Reply Forward Check for New Messages Help Show/Hide Folders Delete Reply to All Show/Hide Reading Pain Search Address

More information

NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ. NTI Backup Now EZ User's Guide

NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ. NTI Backup Now EZ User's Guide NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ NTI Backup Now EZ User's Guide Backup Now EZ User's Guide 2009 NewTech Infosystems, Inc. i Table of Contents INTRODUCTION... 3 WELCOME TO NTI BACKUP NOW EZ...

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

How to access your email via Outlook Web Access

How to access your email via Outlook Web Access How to access your email via Outlook Web Access 1) Open your internet browser and type in the following address: www.law.miami.edu * Aol users must minimize their browser and use Internet Explorer 6.0+

More information

Why the need for set of rules in Microsoft Outlook?

Why the need for set of rules in Microsoft Outlook? Why the need for set of rules in Microsoft Outlook? Rules are used in Microsoft Outlook to organize incoming Emails. Setting up rules in Outlook automates various actions that can be taken on incoming

More information

NTI Backup Now EZ v2 User s Guide

NTI Backup Now EZ v2 User s Guide NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced

More information

Release 2.0. Cox Business Online Backup Quick Start Guide

Release 2.0. Cox Business Online Backup Quick Start Guide Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.

More information

Creating and Sharing Contact Groups in Outlook Client

Creating and Sharing Contact Groups in Outlook Client Creating and Sharing Contact Groups in Outlook Client If you frequently address messages to groups of contacts you may find it helpful to create contact groups that can be addressed rather than having

More information

Prepared by Mythtech Limited OFFICE 365 EMAIL MIGRATION MANUAL GUIDELINE

Prepared by Mythtech Limited OFFICE 365 EMAIL MIGRATION MANUAL GUIDELINE Prepared by Mythtech Limited OFFICE 365 EMAIL MIGRATION MANUAL GUIDELINE Table of Contents Change Password... 1 Send New Email... 2 Forward E-mail... 3 Reply E-mail... 4 Archive old emails... 5 Office

More information

MICROSOFT OUTLOOK 2010 WORK WITH CONTACTS

MICROSOFT OUTLOOK 2010 WORK WITH CONTACTS MICROSOFT OUTLOOK 2010 WORK WITH CONTACTS Last Edited: 2012-07-09 1 Access to Outlook contacts area... 4 Manage Outlook contacts view... 5 Change the view of Contacts area... 5 Business Cards view... 6

More information

Step by step guide how to password protect your USB flash drive

Step by step guide how to password protect your USB flash drive Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos

More information

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition NC State University 1 of 5 Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows server 2003 x64 with symantec antivirus 10 corporate edition CAUTION:

More information

TASKE Call Center Management Tools

TASKE Call Center Management Tools TASKE Call Center Management Tools Version 7 Integrating and Configuring Blue Pumpkin PrimeTime and PrimeTime Skills TASKE Technology Inc. Copyright 2000, TASKE Technology Inc. All rights reserved. Printed

More information

Auto Archiving Folders in Outlook XP

Auto Archiving Folders in Outlook XP Auto Archiving Folders in Outlook XP Your Outlook email account on the Exchange server is allotted 50 megabytes of storage space on the server. Items in the Inbox, Calendar, Sent Items, Deleted Items,

More information

Instructions for Creating an Outlook E-mail Distribution List from an Excel File

Instructions for Creating an Outlook E-mail Distribution List from an Excel File Instructions for Creating an Outlook E-mail Distribution List from an Excel File 1.0 Importing Excel Data to an Outlook Distribution List 1.1 Create an Outlook Personal Folders File (.pst) Notes: 1) If

More information

Using SSH Secure File Transfer to Upload Files to Banner

Using SSH Secure File Transfer to Upload Files to Banner Using SSH Secure File Transfer to Upload Files to Banner Several Banner processes, including GLP2LMP (Create PopSelect Using File), require you to upload files from your own computer to the computer system

More information

When you have decided what to include in your signature, you will need to open the signatures and stationery dialogue box:

When you have decided what to include in your signature, you will need to open the signatures and stationery dialogue box: Signatures An email signature is a block of information which is added to the bottom of an email to give the recipient information about the sender. It functions in a similar way to using headed paper

More information

HOW TO BURN A CD/DVD IN WINDOWS XP. Data Projects

HOW TO BURN A CD/DVD IN WINDOWS XP. Data Projects Page 1 HOW TO BURN A CD/DVD IN WINDOWS XP There are two ways to burn files to a CD or DVD using Windows XP: 1. Using Sonic RecordNow! Plus or 2. Using the Windows Explorer CD Burning with Sonic Recordnow!

More information

NICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express

NICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express NICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express 1. DESCRIPTION This guide explains the procedure for using the NICCA issued digital certificate

More information

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the

More information

Microsoft Outlook. KNOW HOW: Outlook. Using. Guide for using E-mail, Contacts, Personal Distribution Lists, Signatures and Archives

Microsoft Outlook. KNOW HOW: Outlook. Using. Guide for using E-mail, Contacts, Personal Distribution Lists, Signatures and Archives Trust Library Services http://www.mtwlibrary.nhs.uk http://mtwweb/cgt/library/default.htm http://mtwlibrary.blogspot.com KNOW HOW: Outlook Using Microsoft Outlook Guide for using E-mail, Contacts, Personal

More information

OUTLOOK WEB ACCESS. User Guide

OUTLOOK WEB ACCESS. User Guide OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.

More information

Most of your tasks in Windows XP will involve working with information

Most of your tasks in Windows XP will involve working with information OFFICE 1 File Management Files and Folders Most of your tasks in Windows XP will involve working with information stored on your computer. This material briefly explains how information is stored in Windows

More information

Moving your GroupWise archive to Outlook 2010 Key step to take the day after your e-mail upgrade

Moving your GroupWise archive to Outlook 2010 Key step to take the day after your e-mail upgrade Moving your GroupWise archive to Outlook 2010 Key step to take the day after your e-mail upgrade About this guide /transformation Who should use it This guide is intended for those DBHDD (Department of

More information

E-mail Encryption. How do I send my e-mail encryption key?

E-mail Encryption. How do I send my e-mail encryption key? E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout

More information

Outlook Web Access E-mail

Outlook Web Access E-mail Outlook Web Access E-mail A. Accessing the mailbox via the Internet 1. Open your browser Firebox or Internet Explorer 2. In the URL address location box, key mail.asbury.edu for students and mail2.asbury.edu

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

Windows XP with Symantec AntiVirus 10 Corporate Edition

Windows XP with Symantec AntiVirus 10 Corporate Edition NC State University 1 of 7 Windows XP with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows xp with symantec antivirus 10 corporate edition Install SAV10 on Windows XP only

More information

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security... Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4

More information

REDUCING YOUR MICROSOFT OUTLOOK MAILBOX SIZE

REDUCING YOUR MICROSOFT OUTLOOK MAILBOX SIZE There are several ways to eliminate having too much email on the Exchange mail server. To reduce your mailbox size it is recommended that you practice the following tasks: Delete items from your Mailbox:

More information

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is required

More information

WINDOWS 7 MANAGE FILES AND FOLDER WITH WINDOWS EXPLORER

WINDOWS 7 MANAGE FILES AND FOLDER WITH WINDOWS EXPLORER WINDOWS 7 MANAGE FILES AND FOLDER WITH WINDOWS EXPLORER Last Edited: 2012-07-10 1 Introduce Windows Explorer... 3 Navigate folders and their contents... 5 Organize files and folders... 8 Move or copy files

More information

Jumble for Microsoft Outlook

Jumble for Microsoft Outlook Jumble for Microsoft Outlook Jumble is a zero knowledge, end- to- end email encryption solution that integrates with existing email platforms. Jumble integrates at the email client level and removes the

More information

Outlook Web App User Guide

Outlook Web App User Guide Outlook Web App Table of Contents QUICK REFERENCE... 2 OUTLOOK WEB APP URL... 2 Imagine! Help Desk...... 2 OUTLOOK WEB APP MAIN WINDOW... 2 KEY NEW FEATURES... 3 GETTING STARTED WITH OUTLOOK... 4 LOGGING

More information

Outlook Web Access is accessible to all users where Internet access is available. This document contains instructions on how to use OWA.

Outlook Web Access is accessible to all users where Internet access is available. This document contains instructions on how to use OWA. Welcome to the City of Sarasota s Outlook Web Access (OWA). As a member of the Board you are required to use your City-issued email address for correspondence that is related to the business of the Advisory

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

Outlook Web Access (OWA) User Guide

Outlook Web Access (OWA) User Guide Outlook Web Access (OWA) User Guide September 2010 TABLE OF CONTENTS TABLE OF CONTENTS... 2 1.0 INTRODUCTION... 4 1.1 OUTLOOK WEB ACCESS SECURITY CONSIDERATIONS... 4 2.0 GETTING STARTED... 5 2.1 LOGGING

More information

Advanced Outlook Tutorials

Advanced Outlook Tutorials Advanced Outlook Tutorials Filtering: Create a filter to send email directly to a specific folder from a certain sender: 1. Right click on the sender s email. 2. Choose Rules. 3. Click on Create Rule.

More information

Using Entrust certificates with Microsoft Office and Windows

Using Entrust certificates with Microsoft Office and Windows Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

Introduction to MS WINDOWS XP

Introduction to MS WINDOWS XP Introduction to MS WINDOWS XP Mouse Desktop Windows Applications File handling Introduction to MS Windows XP 2 Table of Contents What is Windows XP?... 3 Windows within Windows... 3 The Desktop... 3 The

More information

Exchange Granular Restore User Guide

Exchange Granular Restore User Guide User Guide Contents 1. overview... 2 2. Backup considerations... 3 Exchange VM Detection... 3 VSS Application backups... 3 Restore vs. Recovery... 3 Backup user identity... 3 3. Creating an Exchange backup...

More information

BUS-WATCH R1001/R4001 Quick Guide Series

BUS-WATCH R1001/R4001 Quick Guide Series Part 1: Video File Source Connection To Review stored video, you must first connect a PC to a video file source. There are 2 ways to connect to the stored video files: Through the Removable Hard Drive

More information

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords School IT Systems Support Herts for Learning Ltd SROB220, Robertson

More information

Outlook Web Access. PRECEDED by v\

Outlook Web Access. PRECEDED by v\ Outlook Web Access Logging in to OWA (Outlook Web Access) from Home 1. Login page http://mail.vernonct.org/exchange 2. To avoid these steps each time you login, you can add the login page to your favorites.

More information

SP Widget. Users Manual

SP Widget. Users Manual SP Widget Users Manual 1 Contents 1. Disclaimer notice... 4 2. Product intro...5 3. System requirements... 5 4. Introduction... 6 4.1 Activating SP Widget... 6 Illustration 4.1... 6 4.2 Browser interface...

More information

Installing the VPN Client for Microsoft Windows OS

Installing the VPN Client for Microsoft Windows OS Installing the VPN Client for Microsoft Windows OS 1. Go to the VPN Information Center web site and click on the Cisco VPN Client for Microsoft Windows OS link. 2. A File Download window will appear. Click

More information

IT Quick Reference Guides Using Windows 7

IT Quick Reference Guides Using Windows 7 IT Quick Reference Guides Using Windows 7 Windows Guides This sheet covers many of the basic commands for using the Windows 7 operating system. WELCOME TO WINDOWS 7 After you log into your machine, the

More information

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS 03Archer.indd 71 8/4/05 9:13:59 AM Address Book 3.1 What Is the Address Book The Address Book in Outlook is actually a collection of address books

More information

How to Copy Photos to a CD Using Microsoft Windows XP or Microsoft Windows Vista

How to Copy Photos to a CD Using Microsoft Windows XP or Microsoft Windows Vista How to Copy Photos to a CD Using Microsoft Windows XP or Microsoft Windows Vista There are many occasions, where you will want to copy (sometimes called burn ) photo files to a CD. You may be creating

More information

Transitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1

Transitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1 Transitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is

More information

GIAC Introduction to Security Fundamentals. Laptop and External Drive Configuration Guide Version 1.2 SEC301

GIAC Introduction to Security Fundamentals. Laptop and External Drive Configuration Guide Version 1.2 SEC301 GIAC Introduction to Security Fundamentals Laptop and External Drive Configuration Guide Version 1.2 SEC301 SEC301 - Hands-on Exercises Addendum Page 1 Table of Contents Background... 3 Ensure that the

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...

More information

Remote Access End User Guide (Cisco VPN Client)

Remote Access End User Guide (Cisco VPN Client) Remote Access End User Guide (Cisco VPN Client) Contents 1 INTRODUCTION... 3 2 AUDIENCE... 3 3 CONNECTING TO N3 VPN (N3-12-1) OR EXTENDED VPN CLIENT... 3 4 DISCONNECTING FROM N3 VPN (N3-12-1) AND EXTENDED

More information