Use your UNNCNetID and password to log in. The first time you login to the system, you may receive the following screen:
|
|
- Catherine Norman
- 8 years ago
- Views:
Transcription
1 (Secure FTP to/from Outside (non-unmc Parties) Information Technology Services July 2012 Contact the ITS Helpdesk at or with questions. Personnel at UNMC occasionally need to transfer very large data files to or from people or organizations outside of UNMC. While small files can be transferred via , very large files often exceed the size limitations imposed by many systems. Other methods, such as physically sending CD s or DVD s may be too slow and can present significant security exposure. UNMC is using a software package named MOVEit DMZ to provide a mechanism to safely and securely transfer data files (and particularly large data files) to and from outside (non UNMC) parties. The package allows users to employ web browsers and FTP clients to easily exchange files over encrypted connections using a variety of protocols. Basically, the system allows users to upload and download files to and from a securely encrypted personal folder. Files placed in the folder are automatically deleted after 30 days. While the system provides a wide range of features and options, this document focuses only on two tasks: 1) Making a document available for an outside user to retrieve 2) Creating a secure space for an outside user to put a file for you to retrieve. To start using the MOVEit system for either of these tasks, launch your favorite browser (i.e. Internet Explorer, Firefox, etc.) and go to the following web site: You should get a screen resembling the following: Page 1 of 7
2 Use your UNNCNetID and password to log in. The first time you login to the system, you may receive the following screen: The web site may require that an ActiveX control be installed on your computer in order to take advantage of all of the site s features. If you receive the Wizard Installation screen (above) select the option to Try to install the ActiveX Wizard and follow the prompts on your screen to complete the installation. Following installation of the ActiveX control (if it was necessary) you will be taken to the MOVEit Home screen. It should resemble the following: Making a document available for an outside user to retrieve The easy way to make a file available for a user outside UNMC is to use the Send a New Message option. In effect, you will use the MOVEit system to send an to the outside user and you will attach your file(s) to the . The attached file(s) won t actually be sent via , instead they will be put in a secure folder and the outside user will receive (in their ) instruction on how to retrieve the file(s). Use the following instructions: 1) Under the Send a New Message title, enter an address for the user that you are transferring the file(s) to. 2) Type a subject in the corresponding field 3) Click on the Compose Message button IF THIS IS THE FIRST TIME YOU HAVE USED MOVEit TO SEND A FILE TO THIS USER, you will get a screen similar to the following: Page 2 of 7
3 4) After creating the new temporary user (or if you had previously created the user) you should get a screen resembling the following: 5) You must type a message in the large empty area. 6) Click on the Attach button at the bottom of the screen. You will be shown the Add/Remove Attachments screen. Page 3 of 7
4 7) To upload the file you wish to send, click on CLICK HERE to Launch the Upload Wizard You should receive a new screen the following: 8) Click on Add File 9) Browse to the file that you wish to upload and click Open 10) You will be returned to the screen above where you can either add another file or click Next 11) Another screen (named MOVEit Upload Wizard Upload Attachment ) will be displayed where you can specify some upload options it is OK to simply ignore all of the options and click Next 12) When the file transfer is complete, you will be returned Add/Remove Attachments screen. Using the buttons on the screen, you can add more attachments, edit your message, or send the completed package to the address you provided in step #1 above. Your recipient (the address that you provided) will receive an from: unmcmit@unmc.edu IF THIS IS THE FIRST TIME THEY HAVE RECEIVED FROM UNMCMIT: The user will actually get two messages from unmcmit@unmc.edu. The first will provide them with their userid and password necessary to collect the file(s) that you have Page 4 of 7
5 sent. It will also contain a URL ( web link ) that they can click on to login into the MOVEit system... the first time they login to the system, they will be required to create a new (secure) password. The second that they receive will indicate that there is a secure message waiting for them. The user will receive an from unmcmit@unmc.edu indicating that there is a secure message waiting for them. The will contain a link that the user can click on to go to the secure site to retrieve their and attachment. They will have to provide the userid and password provided in the first from unmcmit in order to retrieve the file that you sent. If this is the first time they login to the system, they will be required to create a new (secure) password. After clicking on the link and logging into the system, the user will get a screen similar to the following: The user can delete the message/attachment, or reply to your note by clicking on the appropriate button. They can also download the file that you sent, by clicking on the attachment. Creating a secure space for an outside user to put a file for you to retrieve The easy way to create a secure space for an outside user to put a file that you can retrieve is to, again, start with the Send a New Message option. You will use the MOVEit system to send a note to the user s account that will then provide them with credentials (i.e. a userid and password) so that they can access the system to place the file they want you to receive. From the Home MOVEit screen, under the Send a New Message title: 1) Enter an address for the user 2) Type a subject 3) Click on the Compose Message button 4) If you have previously completed this process for the address you entered in #1, you will be taken to the Secure Message screen. Otherwise you will get a screen resembling the following: Page 5 of 7
6 5) Type a name in the Full Name field and click on the Add New Temporary User Button. 6) After creating the new temporary user (or if you had previously created the user) you should get a screen resembling the following: 7) You must type a message in the large empty area. 8) Click on the Send button to send the message to the address you provided in step #1 above. Your recipient (the address that you provided) will receive an from: unmcmit@unmc.edu Page 6 of 7
7 The will provide them with their userid and password necessary to access the MOVEit system. It will also give them a link they can click on to access the MOVEit system. The first time the user tries to access the MOVEit system, they will receive the screen below, requiring them to create a new password: After clicking on the link and logging into the system, the user will get a screen similar to the following: The user can now follow the instructions for Making a document available for an outside user to retrieve (starting on page 3 above) to send their document to you. (updated by mbohlson) Page 7 of 7
Novo Nordisk Secure File Transfer User Guide
hehe Novo Nordisk Secure File Transfer User Guide Table of Contents 1. Purpose of this document... 2 2. Getting Access... 2 3. Installing the Upload/Download Wizard (first time only)... 2 4. Uploading
More informationMarcum LLP MFT Guide
MFT Guide Contents 1. Logging In...3 2. Installing the Upload Wizard...4 3. Uploading Files Using the Upload Wizard...5 4. Downloading Files Using the Upload Wizard...8 5. Frequently Asked Questions...9
More informationHow to Guide: Secure Transfer Services
Submitted by: SRA International, Inc. - 4300 Fair Lakes Court - Fairfax, VA 22033 The Corporation for National & Community Service (CNCS) How to Guide: Secure Transfer Services Summary 2/21/2012 CNCS-HTGSTS-
More informationState of Florida Drinking Water and Wastewater Inventory MOVEit DMZ Handbook Current as of: 5/27/2014
State of Florida Drinking Water and Wastewater Inventory MOVEit DMZ Handbook INTRODUCTION The Department of Health (DOH) MOVEit DMZ application is utilized for secure transmission of large files (>8MB).
More informationGDC4S Dropbox User Guide
GDC4S Dropbox User Guide Contents Foreword... 1 Dropbox User Guides... 1 Sign On... 2 Your Home Page... 3 Create/Send a New Message... 4 Adding a Previously Used Recipient... 4 Adding a New to You User...
More informationMOVEit Encrypted File Transfer
MOVEit Encrypted File Transfer User Manual August 2014 Contact: Information Security security@siu.edu Table of Contents 1. OVERVIEW... 3 2. ACCESSING MOVEIT... 4 3. INSTALLING THE MOVEIT UPLOAD/DOWNLOAD
More informationCISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.
1/15/15 Samson V. 1. These instructions are for users who reside outside the University of Colorado Denver that receive encrypted emails from faculty or staff of UC Denver. As a part of our HIPAA compliance
More informationUSC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9
About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but
More informationHoneywell Secure Email External User Guide August 2013
Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to
More informationMoveit DMZ User Manual
ARKANSAS BLUE CROSS BLUE SHIELD Moveit DMZ User Manual EDI Services 2/1/2013 Index Moveit DMZ Introduction...1 Initial Login and Password Change...2 Navigation...8 Getting Started Folders...11 Upload a
More informationGRS Advantage Website User Reference Guide
GRS Advantage Website User Reference Guide This document describes how to use the GRS Advantage Website. Table of Contents GRS Advantage Website... 2 Accessing the Website... 2 Requesting Access to the
More informationUsing Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
More informationWordCom, Inc. Secure File Transfer Web Application
WordCom, Inc. Secure File Transfer Web Application Table of Contents 1. Introduction 2. Logging into WordCom s File Transfer Web Client 3. Toolbar buttons 4. Sending a package in Enhanced Mode (If installed
More informationProofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees.
Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees. To create a new email message to be sent securely to an EBS-RMSCO employee: 1. Click on the
More informationTriCore Secure Web Email Gateway User Guide 1
TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email
More informationUsing ProjectWise Explorer for File Transfer
Using ProjectWise Explorer for File Transfer Use the link below to register for a log in and password for ProjectWise. http://apps.dot.illinois.gov/consultantreg/ To access ProjectWise Web Explorer use
More informationMunson Medical Center Exchange Clinical Information Objective General Instructions
Munson Medical Center Exchange Clinical Information Objective General Instructions It is Munson Medical Center s interpretation that to complete Core Measure Performing at least one test of certified EHR
More informationWorking with Office Applications and ProjectWise
Working with Office Applications and ProjectWise The main Microsoft Office Applications (Word, Excel, PowerPoint and Outlook) are all integrated with ProjectWise. These applications are aware that ProjectWise
More informationMicrosoft OneDrive. How to login to OneDrive:
Microsoft OneDrive The beauty of OneDrive is that it is accessible from anywhere you have an Internet connection. You can access it from a Mac or Windows computer. You can even access it on your Smartphone
More informationUpgrade of Business Systems Data Warehouse Reporting
Upgrade of Business Systems Data Warehouse Reporting The Business Systems Data Warehouse Reporting System was upgraded to a new version of Business Objects the weekend of December 12 th. The current system
More informationMSGCU SECURE MESSAGE CENTER
MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and
More informationHow to recover IE Client
HIKVISION EUROPE B.V. How to recover IE Client (WebClientActiveX Control) Name: WebClientActiveX Control Publisher: HANGZHOU HIKVISION DIGITAL TECHNOLOGY CO.,LTD. Type: ActiveX Control Version: 2.4.0.56
More informationFile Share Service User guide
File Share Service User guide Version: 2.0 Written by: Sriram Rao Last Modified: 03/16/2012 1 Index Index... 2 Overview... 3 Change Log... 4 Login Instructions... 5 Searching files by name or content...
More informationBackground Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
More informationWPS Secure-EDI For Internet Claim Submissions Getting Started
Contents WPS Secure-EDI For Internet Claim Submissions Getting Started Access WPS Secure-EDI and Sign-On 2 Change Your Password 2 Upload/Download Wizards 4 WPS Secure-EDI Home Page 5 Upload (Send) Files
More informationErie 1 BOCES/WNYRIC. Secure File Transfer. Upload/Download Wizard
Erie 1 BOCES/WNYRIC Secure File Transfer Upload/Download Wizard Revised June 3, 2014 These instructions were created using Internet Explorer Version 11. If you are a using a Firefox or Chrome browser you
More informationEDGETECH FTP SITE CUSTOMER & VENDOR ACCESS
EDGETECH FTP SITE CUSTOMER & VENDOR ACCESS 1. The EdgeTech FTP site is a web hosted site, not a true FTP site, remember to use http:// not ftp:// in the web address. IMPORTANT: Do Not use FileZilla or
More informationFrequently Asked Questions
Frequently Asked Questions What is Xythos? Xythos is a secure web-based file storage system that allows you to place files in a central location so they can be accessed via the internet. You can upload,
More informationTERAcloud w w w. t e r a c l o u d. u k
Accessing your account Once you have received the confirmation email, there will be a link to your personal area where you can download the backup application. In the example here we are using the support
More informationAdvanced Digital Imaging
Asset Management System User Interface Cabin River Web Solutions Overview The ADI Asset Management System allows customers and ADI to share digital assets (images and files) in a controlled environment.
More informationAir Resources Board File Transfer Protocol (FTP)
Air Resources Board File Transfer Protocol (FTP) A Handbook for External Users (those not connected to the ARB network) July 2006 How do I use ARB FTP? What is the FTP server and who can use it? What software
More informationWelcome to the TransPerfect Translations Secure File Transfer Website What is Secure FTP?
Welcome to the TransPerfect Translations Secure File Transfer Website What is Secure FTP? SFTP (Secure File Transfer Protocol) is an added layer of security provided to our clients. SFTP requires an encrypted
More informationeadvantage Certificate Enrollment Procedures
eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of
More informationInstructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View:
Instructions to Sign On and Off of Self Service Applications NOTE: Internet Explorer 7 and 8 are the only supported Browsers for the PeopleSoft Student Self Service applications. If you experience technical
More informationUsing Microsoft Expression Web to Upload Your Site
Using Microsoft Expression Web to Upload Your Site Using Microsoft Expression Web to Upload Your Web Site This article briefly describes how to use Microsoft Expression Web to connect to your Web server
More informationSEC External Guide for Using Accellion
Securities and Exchange Commission Office of Information Technology SEC External Guide for Using Accellion The Securities and Exchange Commission National Exam Program Hotline (202) 551-3925 Washington,
More informationRegistering at the Securemail site
Registering at the Securemail site Before using the Secure Mail service for the first time, you must perform a one-time service registration by completing the following steps. 1. When a Secure Mail is
More informationSchools Remote Access Server
Schools Remote Access Server This system is for school use only. Not for personal or private file use. Please observe all of the school district IT rules. 6076 State Farm Rd., Guilderland, NY 12084 Phone:
More informationSecure Messaging Service
Human Resources Secure Messaging Service Receiving Secure Emails from West Berkshire Council Table of Contents What are Secure Messaging notifications?... 3 How do I set up my Secure Messaging account?...
More informationVCW FTP Microsoft Outlook Add-In Configuration and Implementation
VCW FTP Microsoft Outlook Add-In Configuration and Implementation After installation of the Microsoft Outlook Plug-In; the WS_FTP icon in the system tray needs to be configured with the following parameters
More informationUSING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)
USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful
More informationAccessing the FTP Server - User Manual
CENTRAL BANK OF CYPRUS Accessing the FTP Server - User Manual IT Department, CENTRAL BANK OF CYPRUS TABLE OF CONTENTS 1 EXECUTIVE SUMMARY... 1 1.1 AUDIENCE... 1 1.2 SCOPE... 1 2 CHANGES FROM THE OLD FTP
More informationNew World Construction FTP service User Guide
New World Construction FTP service User Guide A. Introduction... 2 B. Logging In... 4 C. Uploading Files... 5 D. Sending Files... 6 E. Tracking Downloads... 10 F. Receiving Files... 11 G. Setting Download
More information(CP) Claim Processing Electronic Select Short Cut Key (F12) Type in Menu Id:
Manual Section 4 Claim Processing (CP) Claim Processing Electronic Select Short Cut Key (F12) Type in Menu Id: CP and enter The # symbol will generate the next Claim ID Process Type: Proof (This will check
More informationRemote Desktop Web Access. Using Remote Desktop Web Access
Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationInformation Technology Department Secure File Transfer System User Guide
Information Technology Department Secure File Transfer System User Guide Lasted Updated: October 29, 2009 1 Table of Contents 1. Secure FTP Web Application Overview... 3 2. Secure FTP Web Application URL...
More informationSecure File Transfer Guest User Guide Updated: 5/8/14
Secure File Transfer Guest User Guide Updated: 5/8/14 TABLE OF CONTENTS INTRODUCTION... 3 ACCESS SECURE FILE TRANSFER TOOL... 3 REGISTRATION... 4 SELF REGISTERING... 4 REGISTER VIA AN INVITATION SENT BY
More informationEJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading
More informationHow do I use Citrix Staff Remote Desktop
How do I use Citrix Staff Remote Desktop September 2014 Initial Log On In order to login into the new Citrix system, you need to go to the following web address. https://remotets.tees.ac.uk/ Be sure to
More informationSecure email. Instructions for Use
Secure email Instructions for Use Contents Introduction... 2 Opening an encrypted email... 3 Attachments... 7 Sending and Replying to emails... 8 Returning to and accessing your encrypted emails after
More informationCCH Axcess Portal Client User Guide
CCH Axcess Portal Client User Guide Keys Quick reference to the key aspects of a particular function Icon Legend Tip Notes Best practice tips and shortcuts Informational notes about functions Warning Important
More informationECA IIS Instructions. January 2005
ECA IIS Instructions January 2005 THIS PAGE INTENTIONALLY BLANK ECA IIS Instructions ii July 22, 2005 Table of Contents 1. Install Certificate in IIS 5.0... 1 2. Obtain and Install the ECA Root Certificate
More informationUsing Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
More informationIBI Group FTP: Usage Instructions
IBI Group FTP: Usage Instructions Version: Windows; Last Updated: April 22 nd 2009 There are two IBI Group supported methods for connecting to the FTP site, My Computer and FileZilla Client Software. If
More informationUsing the Westat Secure Transfer System (WSTS)
Welcome to the National Hospital Care Survey! You now have a username and password to sign on to the Westat Secure Transfer System (WSTS) maintained by Westat, an agent of the CDC s National Center for
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationFTP Help Guide
MCS FTP (File Transfer Protocol) Version 2 August 2004 The MCS FTP site is for large file transfers that normally would not attach and sent over email. An identity is created for each MCS employee and
More informationDSHS Secure FTP Instructions
DSHS Secure FTP Instructions NOTE: Screenshots are for illustration purposes only! Please follow written directions! Important directions will be in RED. Getting logged into the DSHS secure ftp server:
More informationMY HELPDESK - END-USER CONSOLE...
Helpdesk User Guide Page 1 Helpdesk User Guide Table of Contents 1 INTRODUCTION... 3 1.1. OBJECTIVES... 3 1.2. END-USER CONSOLE... 3 1.3. SUMMARY OF RESPONSIBILITY... 3 1.4. HELPDESK INCIDENT LIFE CYCLE...
More informationHosted Service Tips and Troubleshooting
Hosted Service Tips and Troubleshooting Table of Contents General Tips... 2 Add the Login page to your Internet Explorer s list of Trusted Sites... 2 Uninstall/Reinstall the Citrix online plug-in... 3
More informationResearch Ethics System How To Supervise A Student Application Returned by Administrator. This symbol represents a handy tip or further information.
This symbol represents a handy tip or further information. 1. Logging In Open Internet Explorer or Firefox and log in to the system through the Business Systems front door page - https://frontdoor.spa.gla.ac.uk/login/
More informationFTP Use. Internal NPS FTP site instructions using Internet Explorer:
FTP Use File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers
More informationRunning Argos via VPN client
These instructions will show you how to run Argos reports from a home PC or laptop. Argos is not a web based program. It runs from NSU s network. To establish a connection, we need three components; the
More informationConfiguring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
More informationHow to Use JCWHosting Reseller Cloud Storage Solution
How to Use JCWHosting Reseller Cloud Storage Solution Go to https://www.internetspace.co.za and log in with your Cloud Reseller account username and password. How to Use create a cloud account for your
More informationSecure File Transfer Help Guide
Secure File Transfer Help Guide Establish a Secure File Transfer Account When a package is sent to your email address, you will receive an email from the sender that includes a link to instructions to
More informationRemote Storage Area (RSA) Basics
Remote Storage Area (RSA) Basics Table of Contents Remote Storage Area Overview... 3 What is Remote Storage Area?... 3 Who has access to RSA?... 3 How much space is available?... 3 Basic RSA Use... 4 How
More informationState Health Repository Tool (SHRT) Testing Instructions
Step 1 - Access the SHRT State Health Repository Tool (SHRT) Testing Instructions 1. Close out any other open browsers. 2. Enter https://shrt.adp.com in the Address field of your browser and press Enter
More informationFinance & Information Management Network Operations
Finance & Information Management Network Operations Accessing Advance via External Affairs remote access system, Citrix. 1. Using a web browser, it s possibly to access Advance without the application
More informationDropSend Getting Started Guide
DropSend Getting Started Guide DropSend Ltd. 2012 Step 1: How to send a file without registration If you want to quickly send a large file, you can do it from the homepage in just a couple of clicks. Here
More informationOUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010
OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010 CONTENTS What is Outlook Anywhere? Before you begin How do I configure Outlook Anywhere with Outlook 2010? How do I use Outlook Anywhere? I already
More informationInstalling a Browser Security Certificate for PowerChute Business Edition Agent
Installing a Browser Security Certificate for PowerChute Business Edition Agent The Agent component of PowerChute Business Edition has a "self-signed" security certificate. This means that when you access
More informationYour Archiving Service
It s as simple as 1, 2, 3 This email archiving setup guide provides you with easy to follow instructions on how to setup your new archiving service as well as how to create archiving users and assign archiving
More informationOutlook Web Access (OWA) for Staff
Outlook Web Access (OWA) for Staff Note:The full version runs on Internet Explorer (IE) and the Light version runs on all other browsers (Firefox, Safari, Chrome etc). Web access URL / note the s after
More informationUser Guide Trust Safety Accounting Upload PC Law and SFTP Software Release: Final Date
User Guide Trust Safety Accounting Upload PC Law and SFTP Software Release: Final Date: July 22, 2015 TABLE OF CONTENTS Page TRUST SAFETY ACCOUNTING UPLOAD USER GUIDE... 2 BACKGROUND... 2 HOW TO USE THE
More informationSentral servers provide a wide range of services to school networks.
Wazza s QuickStart Publishing iweb Sites to a Sentral Server Background Mac OS X, Sentral, iweb 09 Sentral servers provide a wide range of services to school networks. A Sentral server provides a publishing
More informationUser Guide. The AMF's File Transfer Service (FTS)
User Guide The AMF's File Transfer Service (FTS) TABLE OF CONTENTS 1 INTENDED USERS... 3 2 SCOPE OF GUIDE... 3 3 BACKGROUND... 3 4 REQUIRED CONFIGURATION... 3 5 CONTACT INFORMATION FOR SUPPORT... 4 6 SECURITY...
More informationUser Guide. UserGuide_VersionCS8.1
User Guide Overview The AARNet CloudStor service enables AARNet customers to store, access and share files powered by the high speed AARNet network. Logging into AARNet CloudStor via https://cloudstor.aarnet.edu.au
More informationTechnical Support Set-up Procedure
Technical Support Set-up Procedure How to Setup the Amazon S3 Application on the DSN-320 Amazon S3 (Simple Storage Service) is an online storage web service offered by AWS (Amazon Web Services), and it
More informationGetting Started... Login to your Account. Set your Preferences Once logged in, click Preferences on the left.
Getting Started... Login to your Account https://med1.neocertifiedmail.com Mark the site as a favorite for quick reference for later. Set your Preferences Once logged in, click Preferences on the left.
More informationIndustrial Security Facilities Database (ISFD) Troubleshooting Tips
Industrial Security Facilities Database (ISFD) Troubleshooting Tips ATTENTION: ALL ISFD Users The Industrial Security Facilities Database (ISFD) was developed to Internet Explorer (IE) 7 operating standards.
More informationUser Guide to Nuance Secure File Transfer (SFT)
User Guide to Nuance Secure File Transfer (SFT) Policy 1. SFT accounts are assigned to an individual, not a department or group and should not be shared under any circumstances. It is the responsibility
More informationGUIDELINES. Electronic Reporting for Ozone-Depleting Substances. Part 3: Submitting ODS Data to EPA via CDX: Initial Setup and Submission
GUIDELINES Electronic Reporting for Ozone-Depleting Substances Part 3: Submitting ODS Data to EPA via CDX: Initial Setup and Submission March 2008 If you need assistance with these guidelines, please contact:
More informationAd Hoc (Temporary) Accounts Instructions
DLG/PDV SFTP Server Instructions 1. Ad Hoc (Temporary) Accounts. 2. LeadsGen (Permanent) Accounts. 3. Manually configuring SFTP Clients (WinSCP & FileZilla). 4. Uploading files into SFTP server. 5. Frequently
More informationhttps://weboffice.edu.pe.ca/
NETSTORAGE MANUAL INTRODUCTION Virtual Office will provide you with access to NetStorage, a simple and convenient way to access your network drives through a Web browser. You can access the files on your
More informationWorkSite Web Instructions for Lane Powell PC Employees. How to access your documents in WorkSite Web
WorkSite Web Instructions for Lane Powell PC Employees Interwoven s WorkSite Web gives users of the WorkSite Document Management System access to their work via Internet Explorer. (At this time, only Microsoft
More informationOneDrive in Office 365
OneDrive in Office 365 OneDrive is a universal tool that allows you to upload and share documents with others. You can upload Word Documents, PDFs, Excel spreadsheets, images, and other Office files. Contents
More informationExternal End User Training Guide: Secure Email Extract
External End User Training Guide: Secure Email Extract Version 6 August 12, 2013 Prepared by 7/29/2013: Kris Chromey, Training Coordinator Michelle Tuscher, Vault Implementation Coordinator Edited for
More informationCollege of William and Mary. wmfiles.wm.edu. A Reference and Training Guide
wmfiles.wm.edu A Reference and Training Guide 08/15/2012 Table of Contents Page What is Xythos Software? 3 Creating a New Folder 4 Uploading Files 4 Coping, Moving, Deleting, Renaming Files 5 Sharing Files
More informationQuick Start Guide. Hosting Your Domain
Quick Start Guide Hosting Your Domain http://www.names.co.uk/support/ Table of Contents Web Hosting... 3 FTP (File Transfer Protocol)... 3 File Manager... 6 SiteMaker... 7 2 Please keep these documents
More informationWelcome to HomeTown Bank s Secure E-mail! User Guide
Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the
More informationSimple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015
Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Table of Contents Logging into the Drive Application 4 Log In Sign Up Access the Drive Application
More informationFrequently Asked Questions The next section includes FAQs to help you to access and use your student email account.
Factsheet 22 Student Email September 2011 This factsheet can be made available in alternative formats. Please make your request at the Library Help Desk, telephone 01642 342100 or email libraryhelp@tees.ac.uk
More informationTrusted Relationships. Sending Invitations. Sending Invitations from Outlook
Trusted Relationships Establishing Trusted Relationships through the invitation process are core to the Securencrypt security process. This insures that you can only share secure documents with someone
More informationSecure Email Actions for Email Recipients
Secure Email Actions for Email Recipients Actions for Email Recipients The recipient cannot forward encrypted email outside the secure system. Each email will only be available to the recipient for 30
More informationSoftChalk Cloud and Desire2Learn Quick Guide This document was created with SoftChalk Create 8, available at https://uits.kennesaw.
SoftChalk Cloud and Desire2Learn Quick Guide This document was created with SoftChalk Create 8, available at https://uits.kennesaw.edu/downloads/ Linking a SoftChalk Cloud Lesson into Desire2Learn Linking
More informationFile Transfer with Secure FTP
File Transfer with Secure FTP The Princeton Review values the security of all client s information and would like to encourage all FTP file transfers to and from our clients be conducted utilizing a Secure
More informationDeleted Cookies Cause Online Banking Users to be Asked For Secure Code at Each Login
Deleted Cookies Cause Online Banking Users to be Asked For Secure Code at Each Login Internet Explorer Version When you first access Online Banking from a new computer or new Web browser, you are asked
More informationCan I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.
How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined
More information