FedPayments Reporter Encrypted Email Delivery Overview



Similar documents
Encrypted Users Guide. Revised 6/8/2015

UC Irvine Health Secure Mail Message Center

How To Encrypt An From A Cell Phone To A Pc Or Ipad (For A Partner) With A Cisco Encryption Solution (For Partners)

Version 4 Revised 5/2015

E Mail Encryption End User Guide

How To Use The Gtokus Secure Mail System

Instructions for Secure Cisco Registered Envelope Service (CRES)

Overview of Registered Envelopes. Registered Envelope Notification Message

SECURE EXCHANGE PALOMAR POMERADO HEALTH WITH INFORMATION SECURITY OFFICE. Version: 1.3 Updated: 12/06/2010 Updated By: 9317

Why the need for set of rules in Microsoft Outlook?

User guide Business Internet features

Encryption Services

Barracuda Security Service User Guide

Zix Encryption. Years of Innovation

MUTUAL OF OMAHA SECURE SYSTEM CLIENT/PARTNER USER GUIDE

Encryption Admin & User Guide

Registering at the Secur site

How To Open An Encrypted

U.S. Bank Secure Quick Start Guide

Encryption Services

Managing Junk Mail. About the Junk Mail Filter

10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started!

A NATURAL FIT. Microsoft Office 365 TM and Zix TM Encryption. By ZixCorp

Partner Licensing Portal for MSP Partners

Stewart Secure User Guide. March 13, 2015

Secure in Transition and Secure behind the Network Page 1

Business and Technical Description of Commercial Systems The scope of the technical solution is further described below.

Secure with ZixCorp. Iowa Division of Banking

Using the University s Spam and Virus Filtering Service

MSI Secure Mail Tutorial. Table of Contents

Login Instructions. 1. Type web URL into your browser s address bar.

Barracuda User Guide. Managing your Spam Quarantine

Overview. ExchangeDefender Admin Web Site

ENCRYPTION GUIDE

Secure transmission of Protected Health Information (PHI)

Spam Management. Manage your FOPE Spam Quarantine

If you are the recipient of an encrypted message, the following instructions will help you to decrypt your message. The California State University

FDIC Secure Procedures for External Users April 23, 2010

Nationstar Mortgage Secure Client User Guide

ESR Secure System End to End 256-bit TSL Encryption

Forefront Online Protection for Exchange (FOPE) User documentation

EJGH Encryption User Tip Sheet of 8

A New Standard in Encrypted . A discussion on push, pull and transparent delivery

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

SECURING S IN THE TITLE INDUSTRY

Secure Frequently Asked Questions

To help you spot potential junk mail, spam and phishing s you can read through the guide located on the IT Services website.

Privacy. Protecting Your Members. Monday, June 30, :00 p.m. - 4:15 p.m. Dena Bauckman, Director of Product Management Zix Corporation

Business Internet Fax service from Bell User Guide

Secure User Guide. Guidance for Recipients of Secure Messages from Lloyds Banking Group

Secure Client Guide

How to access and reply to an Egress Switch Secure free of charge. Opening a Switch Secure New User

To open and/or save an attachment:

Secure File Transfer Help Guide

Managing Junk Company: VanDeMark Chemical Inc. Authors: Jeffrey Marshal & Mark Thompson Date Created: May 2013 Date Last Updated: August 2013

Dispatch: A Unique Security Solution

FastNetSecurity SpamGuard Spam Filter How-To

Steps to Opening Your First Password-Protected Envelope

Managing Junk Folder in Outlook This document contains instructions for users on how to manage spam filters in Microsoft Outlook 2010.

Anti-Spam Configuration in Outlook 2003 INDEX. Webmail settings Page 2. Client settings Page 6. Creation date Version 1.2

Setting up Junk Filters By Louise Ryan, NW District IT Expert

Your WildBlue Subscriber Portal: A User Guide

e-shot Unique Deliverability

Outlook Web App. in Office 365. The Outlook Window. Signing In. (Outlook Exchange Faculty & Staff) Getting Started

How To Use Zixselect In Outlook 2003

ZixCorp. The Market Leader in Encryption Services. Adam Lipkowitz ZixCorp (781)

ONE Mail Direct for Desktop Software

Secure Client User Guide Receiving Secure from Mercantile Bank

Mimecast Services for Outlook (MSO4)

Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update. April 2015

How to make sure you receive all s from the University of Edinburgh

Microsoft Outlook Quick Reference Sheet

Directory and Messaging Services Enterprise Secure Mail Services

The GlobalCerts TM Secur Gateway TM

FTA Computer Security Workshop. Secure

Whitelist Management

Fax User Guide 07/31/2014 USER GUIDE

Microsoft Outlook 2000 Configuration Creation of a SPAM Filter

Secure Recipient Guide

Patient Portal: Policies and Procedures & User Reference Guide

SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

PANDA CLOUD PROTECTION User Manual 1

About junk protection

How to Use Red Condor Spam Filtering

Outlook Agent. For the latest version of this document please go to: v 1.0 May 16,2011 Audience: Staff

Welcome to MailChimp.

Compliance in 5 Steps

Quarantine Central for end users: FAQs

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Secure Messaging (Direct) Training Manual

USER S MANUAL Cloud Firewall Cloud & Web Security

T E C H N I C A L S A L E S S O L U T I O N

Help Administration (top right) > User Management > Add User Delete

Secure Portal. A Step-by-Step Guide for Using KRS ZixCorp Secure Solution

What makes Panda Cloud Protection different? Is it secure? How messages are classified... 5

Mimecast Personal Portal (MPP)

Receiving Secure Customer Support frequently asked questions

Topic: ACE Initial Account Access

Transcription:

FedPayments Reporter Encrypted Email Delivery Overview Revised 8/7/2015

The FedPayments Reporter Service offers an automated, encrypted email report delivery feature. This report delivery feature is integrated into the service and uses a third party vendor email service from ZixCorp. 2

The actual delivery and access of the email and attached reports can vary depending on whether the receiver is already using a ZixCorp product. The variability in delivery and access is by design and is intended to result in the optimal method for communicating with the end recipient of the information. ZixCorp calls this feature the Best Method of Delivery SM. 3

Because end users may experience the service differently due to variability in delivery and access methods, they may have questions. What follows is a depiction of the step-by-step progression the encrypted email service uses to identify the most appropriate method to deliver the reports. 4

Step 1: The FedPayments Reporter service automatically generates any subscribed reports, attaches the file, and then encrypts the entire email message. FedPayments Reporter 1 5

Step 2: Before transmitting, the service performs a recipient lookup in the ZixDirectory to determine the best method for delivering the encrypted email. FedPayments Reporter 2 RECIPIENT LOOKUP 6

3 DECRYPTION FedPayments Reporter Step 3: If the receiving organization leverages Zix email services for the entire company, the encrypted email is queued directly to that company, decrypted, and delivered directly into the recipient s regular inbox. Be aware that this email could be trapped by local or Internet service provider spam filters or directed to junk email folders. Emails have a specific domain name and attachment type. Check with technical support for the exact name and ensure that these are not blocked by your company email policy or by your Internet service provider. 7

4 ZIXMAIL FedPayments Reporter Step 4: If the receiving company leverages the ZixMail client software, the encrypted email is transmitted directly to that company, delivered into the recipient s normal inbox, and decrypted by the ZixMail client software. Be aware that this email could be trapped by local or Internet service provider spam filters or directed to junk email folders. Emails have a specific domain name and attachment type. Check with technical support for the exact name and ensure that these are not blocked by your company email policy or by your Internet service provider. 8

Step 5: If the receiving company does not leverage any Zix services, the encrypted email is sent to the web-based encrypted email portal and stored there for later access. FedPayments Reporter 5 ACHEDI.COM PORTAL 9

Step 6: The encrypted email portal then queues an unencrypted notification email to the recipient to alert them there are reports available for retrieval from the portal. Be aware that this email could be trapped by local or Internet service provider spam filters or directed to junk email folders. Emails have a specific domain name. Check with technical support for the exact name and ensure that it is not blocked by your company email policy or by your Internet service provider. The email containing the reports is still available for access in the encrypted email portal at ACHEDI.COM. Unencrypted Notification email ACHEDI.COM PORTAL 6 10

Step 7: Acting on the notification, the recipient can launch their web browser and access portal (ACHEDI.COM) to view their reports. If the recipient is concerned about email phishing exploits or about never receiving the notification email, the recipient should simply access the portal directly on a routine basis. The portal screens automatically adjust to support a wide range of desktop and mobile browsers. 7 ACHEDI.COM PORTAL Web browser Access to Secure Site ACHEDI.COM 11

Additional Resources Location of the encrypted email portal https://achedi.com/ Encrypted email users guide http://www.frbservices.org/eeug1/ ZixCorp website http://www.zixcorp.com/ 12

Additional Support If you are not a financial institution, contact your bank or credit union. If you are a financial institution, call 888-333-7010