Jumble Encryption for Microsoft Outlook

Size: px
Start display at page:

Download "Jumble Encryption for Microsoft Outlook"

Transcription

1 Jumble Encryption for Microsoft Outlook Jumble provides truly usable and secure encryption by integrating with existing clients. Users can easily and securely communicate from their client simply by clicking the Secure Send button as Jumble integrates at the client level. Jumbles easy and cost-effective to set-up as it removes the need for significant capital outlay normally required for deployment and management of enterprise and/or gateway-based encryption products. Jumble performs encryption and decryption at the client level and therefore provides full endto-end encryption of data. Jumble secures both data and file attachments. Jumble users do not need to manage cryptographic keys, nor do they need to be registered to receive a Jumble encrypted . Jumble does not store any client data, nor does it not have access to the encryption keys. NOTE: THIS DOCUMENT APPLIES TO JUMBLE FOR OUTLOOK, VERSION 3.3 System Requirements Jumble recommends using Microsoft Windows 7 or later. Jumble supports the following versions of Microsoft Outlook: Microsoft Outlook 2010 Microsoft Outlook 2013 Microsoft Outlook 2016 Microsoft Outlook Office365

2 Installation Instructions To install Jumble follow these steps: 1. Download the installation file from the Jumble website: 2. Ensure Outlook is not running, close it if it s open. 3. Once the setup.exe file has downloaded, double click it to start the installation and follow the on-screen instructions the installer may prompt you to accept the terms and conditions (also available here: and install additional required libraries from Microsoft, accept the prompts and the installation will complete. Figure 1 - Installation Dialog 4. Once the setup has finished open Outlook. Figure 2 - Outlook Start Screen 2 P age

3 Login to Jumble To send secure s in Outlook you will need to login to Jumble, follow these steps to login: 1. Along the top menu bar you will notice an item labelled ADD-INS, select the ADD-INS menu to access the Jumble menu. Figure 3 - Outlook Menu with Add-Ins 2. Then click the Jumble icon. Figure 4 - Jumble Menu Item in Outlook 3. You will then be prompted to login to your Jumble account; if you don t already have a account you can register for free by clicking the Sign Up button. Figure 5 - Jumble Login Screen 3 P age

4 Upon successful login you will see a dialog similar to the one below, showing your address, account status and Jumble plan name. This dialog window can now be closed. If the Jumble account has not been activated the account status will show as INACTIVE to activate the Jumble account, simply click the link in the activation you received during the registration process (if you didn t receive this you can re-send it from the Jumble website); once completed, you can logout of Jumble (within the Outlook dialog) and log-in and now your status will show as ACTIVE. Figure 6 Jumble Account Screen 4 P age

5 Sending a secure Sending a secure is as easy as sending a regular , you simply need to choose to send securely: 1. Click New as normal Figure 7 - Outlook Menu 2. Compose your ; Jumble also supports secure attachments, add attachments using the Attach File menu item as normal, if required 3. When ready to send the , simply click Secure Send rather than Send and the will be encrypted within Outlook before leaving your computer Figure 8 - Jumble Secure Send Button in Outlook Menu 5 P age

6 Reading a secure MS Outlook Users with Jumble Installed When logged-in to Jumble all encrypted s received will automatically decrypt as they are opened. You will notice the message Message secured by Jumble added to the bottom of each decrypted . If there s an encrypted attachment you simply need to double-click (or right-click) the file to save it, Jumble will decrypt the file before it is saved you can then open the file as normal. Figure 9 - A Decrypted 6 P age

7 Reading a secure Not an Outlook User If you re not a MS Outlook user or it s not possible to install Jumble software on your computer, please follow these steps to decrypt and access secure s: Click the 'Read ' button in the encrypted you have just received This will take you to the Jumble website where you will need to login if you have an account, or register if you don't have an account o Note: registration simply allows us to verify you are the owner of the recipient address and are authorised to access the encrypted Once logged-in, you'll be redirected to the Decrypt page (or click the 'Decrypt' link in the header menu) Simply copy the entire encrypted you received and paste in to the text box on screen and click the 'Decrypt' button At this point you'll be asked to reconfirm your password and then the will be decrypted and shown on-screen 7 P age

8 Decrypting Attachments Not an Outlook User If the encrypted contained attachments you'll be notified in the box at the bottom-left of the screen (see above) To decrypt the attachments, save them from the original to your local computer (rightclick and choose Save As or click to download) Back on the Decrypt page, click 'Add attachment' on the right of the screen and select the files you saved that need to be decrypted Click the 'Decrypt' button again and the attachments will be shown on the bottom-left of the screen, click the filename to download the decrypted attachments 8 P age

9 Revoking (recalling) and expiring encrypted s Using Jumble, users can revoke/recall or expire an . To revoke an , click on the Sent Items folder and select the you want to revoke, then click the Revoke button. Once this happens the recipient will no longer have access to the encrypted they will be notified that the sender has revoked the . Figure 10 Revoking an 9 P age

10 To expire and , simply click Set Expiry Time and then select the date and time after which the recipient can no longer view the encrypted . Once the has expired the recipients will not be able to access the they will be notified that the has expired.\ Figure 11 Setting to expire 10 P age

11 When the user is not logged-in to Jumble (or if you re logged-in to the wrong Jumble account) It may happen where an encrypted is sent to a user who: does not have Jumble installed; is a registered user, but is using an client currently not supported by Jumble; or has multiple and Jumble accounts and is logged-in to a Jumble account that is for a different address. Each address must have an associated Jumble account. When this happens the user will receive a message as shown in figure 12. Figure 12 - A Jumble Encrypted This can be decrypted by installing Jumble software and logging-in using the appropriate Jumble account, or the user can decrypt this on the Jumble website. 11 P age

Jumble for Microsoft Outlook

Jumble for Microsoft Outlook Jumble for Microsoft Outlook Jumble provides truly usable and secure email encryption by integrating with existing email clients. Users can easily and securely communicate from their email client simply

More information

Websense Secure Messaging User Help

Websense Secure Messaging User Help Websense Secure Messaging User Help Welcome to Websense Secure Messaging, a tool that provides a secure portal for the transmission and viewing of sensitive, personal data in email. Use the portal to view

More information

To: Proofpoint Protection Server administrators From: Proofpoint Re: Informing your user community about encrypting and decrypting secure

To: Proofpoint Protection Server administrators From: Proofpoint Re: Informing your user community about encrypting and decrypting secure To: Proofpoint Protection Server administrators From: Proofpoint Re: Informing your user community about encrypting and decrypting secure email This memo describes how to use Proofpoint Encryption to send

More information

Vanguard Secure Service (VSES) User Guide

Vanguard Secure  Service (VSES) User Guide Vanguard Secure Email Service (VSES) User Guide Enterprise Security and Fraud October 20, 2017 Contents Guide for Users of Secure Email From Vanguard 1 View Secure Email 1 New Registration 3 Compose a

More information

Changing Settings for ViewMail for Outlook (Version 8.0 Only)

Changing Settings for ViewMail for Outlook (Version 8.0 Only) Changing Settings for ViewMail for Outlook Note This content applies to ViewMail for Outlook version 8.0 only. For later ViewMail versions, see the Quick Start Guide for Cisco ViewMail for Microsoft Outlook

More information

Subscription Item Administrator s Guide

Subscription Item Administrator s Guide Table of Contents Introduction... 2 What is GovDelivery?... 2 What is Email Subscription?... 2 How Does It Work?... 2 What is an Item Administrator?... 2 Logging into GovDelivery... 3 Logging Out of GovDelivery...

More information

Introduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired...

Introduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired... WEB MESSAGE CENTER END USER GUIDE The Secure Web Message Center allows users to access and send and receive secure messages via any browser on a computer, tablet or other mobile devices. Introduction...

More information

SharePoint. Team Site End User Guide. Table of Contents

SharePoint. Team Site End User Guide. Table of Contents Table of Contents Introduction... 1 Logging in for the First Time:... 1 Areas of the team site:... 2 Navigating the team site:... 3 Adding Content to the team site:... 3 The Ribbon:... 3 Adding a Link:...

More information

1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to

1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to VMWare AirWatch User Guide for Web Browser You can access your AirWatch Files from a web browser. How to login AirWatch Cloud Storage? 1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari)

More information

Secure File Transfer External User Guide. Guidance for 3 rd Party Recipients of Secure File Transfers from Lloyds Banking Group

Secure File Transfer External User Guide. Guidance for 3 rd Party Recipients of Secure File Transfers from Lloyds Banking Group Secure File Transfer External User Guide Guidance for 3 rd Party Recipients of Secure File Transfers from Lloyds Banking Group Version: 3.0 Last updated: 28/09/2017 This user guide is intended for unregistered

More information

Digital Certificate Service (DCS) - User Guide

Digital Certificate Service (DCS) - User Guide Digital Certificate Service (DCS) - User Guide Information Security Branch Contents Using this Guide... 3 User Requirements... 3 Secure E-mail Messaging... 4 Send a Secure E-mail Message... 4 Receive a

More information

Exchange Address Book Order

Exchange Address Book Order Exchange Address Book Order From your Outlook Ribbon, locate the Address Book Click on Tools, Options 3 options are available, as shown below, select Custom to arrange the order of your address books.

More information

Web Outlook. Tenafly Technology Department

Web Outlook. Tenafly Technology Department Tenafly Technology Department Web Outlook If you would like to begin using the Web-based Outlook service to check your email remotely, you can do so immediately by visiting the Tenafly School District

More information

Windows User Manual 1

Windows User Manual 1 Windows User Manual 1 Creating and Installing a Dropbox Account... 3 How to Create a Dropbox Account... 3 How to Install Dropbox... 3 How to Register and Sign into Dropbox... 3 Install and Register for

More information

Contents. Egress Switch Administration Panel User Guide. Switch Administration Panel- Quick Start Guide

Contents. Egress Switch Administration Panel User Guide. Switch Administration Panel- Quick Start Guide Electronic Version Switch Administration Panel- Quick Start Guide Contents Contents... 1 Installing Switch to User s Machines... 2 Adding Organizational Units... 3 Inviting Users... 4 Egress Switch Administration

More information

USER GUIDE. EBMS SECURE MailGate

USER GUIDE. EBMS SECURE  MailGate USER GUIDE EBMS SECURE EMAIL MailGate USER REGISTRATION When a secure email is sent to a new user, Secure Mailbox generates a notification and sends it to their email account. The notification contains

More information

Configuring Microsoft Outlook to Connect to Hosted Exchange Service

Configuring Microsoft Outlook to Connect to Hosted Exchange Service Configuring Microsoft Outlook to Connect to Hosted Exchange Service Configuring Microsoft Outlook for Hosted Exchange Service Version: 1.0 Updated on: April 27, 2011 Page 1 of 7 TABLE OF CONTENTS Configuring

More information

Telephony Toolbar Enterprise. User Guide

Telephony Toolbar Enterprise. User Guide Telephony Toolbar Enterprise User Guide Release 4.4 October 2009 Table of Contents 1 Summary of Changes... 7 1.1 Changes for this Release... 7 2 About This Guide... 8 2.1 Open Telephony Toolbar-Corporate...

More information

Multi-factor Authentication Instructions

Multi-factor Authentication Instructions What is MFA? Multi-factor Authentication (MFA) is a security measure to confirm your identity in addition to your username and password. It helps in the prevention of unauthorized access to your account.

More information

ADP Secure Client User Guide

ADP Secure  Client User Guide March 2018 ADP Secure Email Client User Guide A guide to exchanging secure emails using the HPE Voltage SecureMail TM System Version 2.2 The ADP logo and ADP are registered trademarks of ADP, LLC. ADP

More information

Windows user guide for version 3.3

Windows user guide for version 3.3 1 Windows user guide for version 3.3 2 Contents 1. Installation...4 1.1. How to install BABEL on your Windows desktop...4 2. Getting started...5 2.1. First run...5 2.2. Password setup...5 2.3. Key import...5

More information

Protected Attachment Repository Uses for PEAR Alternatives to PEAR Notifications Addresses...

Protected  Attachment Repository Uses for PEAR Alternatives to PEAR Notifications Addresses... Table of Contents Protected Email Attachment Repository... 5 Uses for PEAR... 5 Alternatives to PEAR... 6 Email Notifications... 6 Email Addresses... 6 Requirements... 7 User Agents and Operating Systems...

More information

EasiShare ios User Guide

EasiShare ios User Guide Copyright 06 Inspire-Tech Pte Ltd. All Rights Reserved. Page of 44 Copyright 06 by Inspire-Tech Pte Ltd. All rights reserved. All trademarks or registered trademarks mentioned in this document are properties

More information

Communication. Identity

Communication. Identity Mailock User guide OUR MISSION STATEMENT To Secure your Communication Data Identity Contents Introducing Mailock... 5 Business Users... 5 What do you need to run Mailock?... 5 In a browser... 5 On a mobile

More information

USB 2.0 Ultimate Card Reader

USB 2.0 Ultimate Card Reader Manual USB 2.0 Ultimate Card Reader english Manual_Page 2 Content 1. Installation 3 2. Functions of Application Software 4 A. The File Management Function 4 B. The File-Security Function 4 C. The Private

More information

Kean University. System Guide. cougar.kean.edu. Your window to the world

Kean University.  System Guide. cougar.kean.edu.   Your window to the world Kean University E-Mail System Guide cougar.kean.edu www.kean.edu Your window to the world USING KEAN UNIVERSITY E-MAIL SYSTEM (COUGAR) This document is divided into three sections: Messenger Express Basics:

More information

Flex Supplier Portal How to use Flex Supplier Portal

Flex Supplier Portal How to use Flex Supplier Portal Flex Supplier Portal How to use Flex Supplier Portal TABLE OF CONTENT TABLE OF CONTENT... 2 Introduction... 4 How to access Flex Portal... 5 OKTA account registration... 5 How to login OKTA (After registration)...

More information

Entrust Cloud Enterprise. Enrollment Guide

Entrust Cloud Enterprise. Enrollment Guide Entrust Cloud Enterprise Enrollment Guide Entrust Cloud Enterprise Enrollment Guide Document issue: 1.0 Copyright 2016 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of

More information

Outlook Guide. Microsoft Outlook User Guide. Desktop App. Enterprise Application Systems INFORMATION TECHNOLOGY

Outlook Guide. Microsoft Outlook User Guide. Desktop App. Enterprise Application Systems INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY Enterprise Application Systems Microsoft Outlook User Guide Outlook Guide Desktop App Mt. San Antonio College Information Technology 1100 North Grand Avenue Building 23 Walnut, CA

More information

Mobile Client. User Manual. Version: 2.0.0

Mobile Client. User Manual. Version: 2.0.0 Mobile Client User Manual Version: 2.0.0 Index Sr. No. Topic Page 1 Requirement 3 2 How to use Mobile Client 4 3 Compose Message 5 4 Select Contacts 6 5 Manage Contacts 17 6 Manage Distribution List 23

More information

OUTLOOK ATTACHMENT EXTRACTOR 3

OUTLOOK ATTACHMENT EXTRACTOR 3 OUTLOOK ATTACHMENT EXTRACTOR 3 PROGRAM HELP GILLMEISTER SOFTWARE WWW.GILLMEISTER-SOFTWARE.COM 1 TABLE OF CONTENTS 1 Table of contents... 1 2 Start... 4 3 Main menu... 4 3.1 Menu entries of the group Menu...

More information

Australia Online Forms for Research Software User Manual

Australia Online Forms for Research Software User Manual Australia Online Forms for Research Software User Manual Version 1.3 Released 21 August 2010 2 P a g e A u s t r a l i a O n l i n e F o r m s f o r R e s e a r c h Contents 1. Introduction 5 2. Getting

More information

TurnkeyMail 7.x Help. Logging in to TurnkeyMail

TurnkeyMail 7.x Help. Logging in to TurnkeyMail Logging in to TurnkeyMail TurnkeyMail is a feature-rich Windows mail server that brings the power of enterprise-level features and collaboration to businesses and hosting environments. Because TurnkeyMail

More information

Page 1 of 20. Agent Portal v2.0. Training Guide

Page 1 of 20. Agent Portal v2.0. Training Guide Page 1 of 20 Agent Portal v2.0 Training Guide Welcome to Agent Portal v2.0 Page 2 of 20 What is Agent Portal? Agent Portal is your gateway to all things AUI. As an appointed agent, you will have access

More information

PKI Contacts PKI for Fraunhofer Contacts

PKI Contacts PKI for Fraunhofer Contacts Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 03.02.2017

More information

Starting ParTEST. Select Start, Programs ParTEST ParTEST Enter your User Name and password

Starting ParTEST. Select Start, Programs ParTEST ParTEST Enter your User Name and password Starting ParTEST User Login Select Start, Programs ParTEST ParTEST Enter your User Name and password If you still logged into ParTEST as the Administrator Select File, Logout. Enter your User name and

More information

NTP Software Quota & File Sentinel

NTP Software Quota & File Sentinel NTP Software Quota & File Sentinel Version 4.0 Installation and User s Guide ii Copyright Copyright 2002 NTP Software. All rights reserved. Quota & File Sentinel, Enterprise Application Services Extension,

More information

Getting Started Guide

Getting Started Guide Getting Started Guide November 2017 2 Table of Contents 1.0 Introduction to Your Vitrium Security Account... 3 1.1 About Vitrium Security... 3 1.2 Definition of Key Terms... 3 1.3 Overview of the Main

More information

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web.

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web. OS X User Manual Welcome to ncrypted Cloud! ncrypted Cloud is a Security Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the

More information

Web-based Interface User Guide

Web-based  Interface User Guide Web-based E-mail Interface User Guide www.twcbc.com back back to TOC to TOC Header Table Text of Contents and Info Table Of Contents Login 3 Composing a Mail Message 4 Creating a Contact 6 Creating a Folder

More information

Procedures and Steps for Receiving a New CAC at the Detroit Arsenal

Procedures and Steps for Receiving a New CAC at the Detroit Arsenal Procedures and Steps for Receiving a New CAC at the Detroit Arsenal (And what to do after you ve received your CAC) Table of Contents Before Making your CAC Appointment:... 2 Schedule CAC Renewal... 2

More information

Secure Recipient Guide

Secure  Recipient Guide Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...

More information

Instruction Manual "Schaeffler FileExchange" Solution. Instruction Manual: "Schaeffler FileExchange" Solution

Instruction Manual Schaeffler FileExchange Solution. Instruction Manual: Schaeffler FileExchange Solution Instruction Manual "Schaeffler FileExchange" Solution Instruction Manual: "Schaeffler FileExchange" Solution Brief Description This instruction manual describes how you can use the Schaeffler FileExchange

More information

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud... Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted

More information

Questionnaire 4.0 Setup Guide 2006/4/14

Questionnaire 4.0 Setup Guide 2006/4/14 Email Questionnaire 4.0 Setup Guide 2006/4/14 Introduction Email Questionnaire is an interactive email survey system. Unlike other on-line questionnaire systems that need a web server to construct, distribute

More information

NETWRIX PASSWORD EXPIRATION NOTIFIER

NETWRIX PASSWORD EXPIRATION NOTIFIER NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

File Fetch User s Manual

File Fetch User s Manual File Fetch User s Manual Welcome... 2 Configuring the Add-in... 3 File Fetch Settings... 3 File Fetch Example... 4 Troubleshooting... 5 File Fetch Copyright 2008 Sperry Software Inc. P a g e 1 Welcome

More information

A Guide for Customer Accounts

A Guide for Customer Accounts A Guide for Customer Accounts Introduction This document contains set up and configuration guides for ODDS Customer Accounts. This manual helps to assist customers with the setup of their ODDS account,

More information

OYSTOR USER ADMIN GUIDE

OYSTOR USER ADMIN GUIDE OYSTOR USER ADMIN GUIDE CONTENT 1. CREATING NEW USERS IN YOUR ACCOUNT 2. CREATING GROUPS OF CONTACTS 3. SETTING ACCESS RIGHTS ON SHARED FOLDERS 4. YOUR OYSTOR ACTIVITY PAGE 5. BACKUP ALL THOSE IMPORTANT

More information

Web Mail Check v 1.0

Web Mail Check v 1.0 Web Mail Check v 1.0 TABLE OF CONTENTS LAUNCHING WEB MAIL CHECK... 3 HOME PAGE... 4 LOG IN... 4 LANGUAGE... 5 DIRECTIONS... 5 READING MESSAGES... 8 HEADERS... 10 PRINTER FRIENDLY VERSION... 11 REPLYING

More information

Hitachi High Technologies America, Inc. Password Policy

Hitachi High Technologies America, Inc. Password Policy Hitachi High Technologies America, Inc. Password Policy Revision Date: 4/17/2015 Table of Contents Table of Contents...2 Overview...3 Scope. 3 Guidelines...3 A. General Password Construction Guidelines...3

More information

Office 365. Exporting and Importing Safe and Blocked Senders List

Office 365. Exporting and Importing Safe and Blocked Senders List Office 365 Exporting and Importing Safe and Blocked Senders List Table of Contents Exporting Safe and Blocked Senders List... 3 Exporting Safe Senders List... 3 Exporting Blocked Senders List... 8 Importing

More information

Ariba Sourcing Event Evaluator Getting Started Guide

Ariba Sourcing Event Evaluator Getting Started Guide What is the Ariba Sourcing? Ariba Sourcing is a project management application designed specifically for online competitive bidding. Buyers at the University of Washington who create Sourcing Projects

More information

NoSpamProxy 12.1 Installation Manual. Protection Encryption Large Files

NoSpamProxy 12.1 Installation Manual. Protection Encryption Large Files NoSpamProxy 12.1 Installation Manual Protection Encryption Large Files Imprint All rights reserved. The manual and the depicted programs are copyrighted products of Net at Work GmbH, Paderborn, Germany.

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

CCIS. Critical Care Information System. Login Guide. Version /12/2015. Prepared By: CCIS Provincial Implementation Team.

CCIS. Critical Care Information System. Login Guide. Version /12/2015. Prepared By: CCIS Provincial Implementation Team. CCIS Critical Care Information System Login Guide Version 11.0 12/12/2015 Prepared By: CCIS Provincial Implementation Team CritiCall Ontario Table of Contents 1. How to Login to CCIS for the first time?...

More information

Barracuda Security Gateway User 's Guide 6 and Above

Barracuda  Security Gateway User 's Guide 6 and Above Barracuda Email Security Gateway User 's Guide 6 and Above This guide describes how you can use the Barracuda Email Security Gateway web interface to: Check your quarantined messages Classify messages

More information

AccessMail Users Manual for NJMLS members Rev 6

AccessMail Users Manual for NJMLS members Rev 6 AccessMail User Manual - Page 1 AccessMail Users Manual for NJMLS members Rev 6 Users Guide AccessMail User Manual - Page 2 Table of Contents The Main Menu...4 Get Messages...5 New Message...9 Search...11

More information

WAM!NET Submission Icons. Help Guide. March 2015

WAM!NET Submission Icons. Help Guide. March 2015 WAM!NET Submission Icons Help Guide March 2015 Document Contents 1 Introduction...2 1.1 Submission Option Resource...2 1.2 Submission Icon Type...3 1.2.1 Authenticated Submission Icons...3 1.2.2 Anonymous

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

Multi-factor Authentication Instructions

Multi-factor Authentication Instructions What is MFA? (MFA) is a security measure to confirm your identity in addition to your username and password. It helps in the prevention of unauthorized access to your account. MFA authentication is typically

More information

Unipass Secur Client FAQ Document v1.2. This document a summary of some of the most common questions asked about the Unipass Secur client.

Unipass Secur Client FAQ Document v1.2. This document a summary of some of the most common questions asked about the Unipass Secur client. Unipass Securemail Client FAQ Document v1.2 This document a summary of some of the most common questions asked about the Unipass Securemail client. UIdP Project Team May 2016 Contents Section 1 - Unipass

More information

ishipdocs User Guide

ishipdocs User Guide ishipdocs User Guide 11/8/2016 Disclaimer This guide has been validated and reviewed for accuracy. The instructions and descriptions it contains are accurate for ishipdocs. However, succeeding versions

More information

User Manual Documentation

User Manual Documentation User Manual Documentation Overview Dated: 10 th February 2018 Webmail is essentially using a web browser, such as Internet Explorer or Firefox, to access your Email account. The advantages of such a system

More information

Office 365. Send and Retrieve Protected s

Office 365. Send and Retrieve Protected  s Office 365 Send and Retrieve Protected Emails Table of Contents Sending Protected Emails... 3 Outlook 2013 or Outlook 2016 for PC... 3 Outlook 2016 for Mac... 4 Outlook Web App (http://email.miami.edu)...

More information

Nokia E61i support

Nokia E61i  support Nokia E61i Nokia E61i Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior

More information

TradeGuider VSA Plug-in for NinjaTrader quick install and setup guide.

TradeGuider VSA Plug-in for NinjaTrader quick install and setup guide. TradeGuider VSA Plug-in for NinjaTrader quick install and setup guide. Introduction. This short guide will help you to download and install the TradeGuider VSA Plug-in for the NinjaTrader platform. This

More information

13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3.

13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3. SECURE ACCESS MAN AG E R FIRST TIME LOGIN GUIDE A U T H O R : E X O S T A R D ATE: M A R C H 2 0 1 5 V E R S I O N : 3.0 1 S E C U R E A CCESS M A N A G E R SECURE ACCESS MANAGER OVERVIEW... 3 SUMMARY...

More information

JiJi Technologies JiJi Password Expiration Notification User Manual

JiJi Technologies JiJi Password Expiration Notification User Manual JiJi Technologies JiJi Password Expiration Notification User Manual Page 02 Contents OVERVIEW...3 FEATURES...3 SYSTEM REQUIREMENTS...3 INSTALLATION...4 WORKING WITH JiPEN...7 Create Notification...7 Configure

More information

WEBppliance for Windows User Administrator's Help

WEBppliance for Windows User Administrator's Help WEBppliance for Windows User Administrator's Help September 23, 2003 Contents About This Document...3 How to use this Help system...4 Getting started...6 What to do first... 6 Viewing your account settings...

More information

Portal/Extranet User Guide for Clients

Portal/Extranet User Guide for Clients Portal/Extranet User Guide for Clients Welcome to the ichannel Portal/Extranet. This guide will walk you through logging into your personalized, secure portal/extranet site. It will also show you how to

More information

This help covers the ordering, download and installation procedure for Odette Digital Certificates.

This help covers the ordering, download and installation procedure for Odette Digital Certificates. This help covers the ordering, download and installation procedure for Odette Digital Certificates. Answers to Frequently Asked Questions are available online CONTENTS Preparation for Ordering an Odette

More information

Sophos Mobile Control SaaS startup guide. Product version: 7

Sophos Mobile Control SaaS startup guide. Product version: 7 Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login

More information

DocuSign Workflow Owner (RSA/Post-Award Analyst) User Guide

DocuSign Workflow Owner (RSA/Post-Award Analyst) User Guide DocuSign Workflow Owner (RSA/Post-Award Analyst) User Guide Topics: Assigning Single Approver and Optional Note Adding Additional Workflow Tracking the Status of an Envelope* Receiving Completion or Declination

More information

SP Widget V3.0 User Manual. SP Widget V3.0 User Manual

SP Widget V3.0 User Manual. SP Widget V3.0 User Manual SP Widget V3.0 User Manual 1 Table of Contents 1. Intellectual Property & Copy Rights.....4 2. Product Introduction...5 3. System Requirements.. 5 4. Introduction..6 4.1 Activate SP Widget.6 4.2 Browser

More information

User Guide. BlackBerry Workspaces for Windows. Version 5.5

User Guide. BlackBerry Workspaces for Windows. Version 5.5 User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing

More information

Android User Guide. for version 5.3

Android User Guide. for version 5.3 Android User Guide for version 5.3 Contents 1. Installation... 3 1.1. How to install Babelnet... 3 1.2. Enter Babelnet in the search field.... 3 1.3. Safety precautions when using Babelnet on your Android...

More information

Click the Options link in the upper right corner of the Outlook Web Access window (see illustration below).

Click the Options link in the upper right corner of the Outlook Web Access window (see illustration below). Message Options Click the Options link in the upper right corner of the Outlook Web Access window (see illustration below). In the list that appears, click the See All Options link. The Options window

More information

Attorney Web Inquiry

Attorney Web Inquiry SPARTAN Technology Solutions The Spartan system allows attorneys to view all warrants on cases assigned to them. Attorneys can find warrants by defendant name, warrant number, indictment number, law enforcement

More information

User Manual of Webmail Version 5

User Manual of Webmail Version 5 User Manual of Webmail Version 5 English Version: 1.0 Page 1 of 13 TABLE OF CONTENTS 1. ACCESS...3 1.1 Accessing to Webmail 5...3 2. COMPOSE AND SEND E-MAIL MESSAGE...4 2.1 Composing a new E-mail message...4

More information

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide Software Release 8.1 March 2018 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

M+NetMail Client User Guide

M+NetMail Client User Guide M+NetMail Client User Guide Trademarks...M+NetMail TM, MyRealBox Apple Inc....Safari Microsoft Corporation...Outlook Express Mozilla... Thunderbird Novell, Inc...GroupWise QUALCOMM... Eudora Copyright

More information

Department of Technology MEDIA EXCHANGE WEB APPLICATION USER MANUAL

Department of Technology MEDIA EXCHANGE WEB APPLICATION USER MANUAL Department of Technology MEDIA EXCHANGE WEB APPLICATION USER MANUAL 1 Contents: MediaShuttle Transfer Application Configuration Settings and Internet Browser Settings.... 3 Firewall Settings... 5 Username

More information

SECARDEO. certbox. Help-Manual. Secardeo GmbH Release:

SECARDEO. certbox. Help-Manual. Secardeo GmbH Release: certbox Help-Manual Secardeo GmbH Release: 02.12.2014 certbox Help Manual 02.12.2014 Table of Contents 1 Search and retrieve Public Key Certificates... 1 1.1 Search by an e-mail address... 1 1.2 Download

More information

Discover IceWarp Server Do Amazing Things Together. Now compatible with: OS X El Capitan, ios 9, Outlook 2016

Discover IceWarp Server Do Amazing Things Together.   Now compatible with: OS X El Capitan, ios 9, Outlook 2016 Discover IceWarp Server 11.4.1 Do Amazing Things Together New TeamChat collaboration tool for teams & projects New WebDocuments for online editing of Office files WebAdmin white labeling for truly personalized

More information

will be our first year of this service. We ask for your patience as we all learn this new system.

will be our first year of this service. We ask for your patience as we all learn this new system. FileDepot Directions Several years ago we decided to put all student recitals on a special drive in our server. This saves space in folders and in storage. Recording Services put them on the server when

More information

VMware Horizon FLEX Client User Guide

VMware Horizon FLEX Client User Guide Horizon FLEX 1.10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Taxpayer Enhancements:

Taxpayer Enhancements: Taxpayer Enhancements: 1. Authentication for Business Returns and K-1 Distribution: To enhance security for business returns and K-1 distribution, we have removed the need for the recipients to enter the

More information

PURCHASING AND USING A PERSONAL SECURE CERTIFICATE. Document issue: 12.1 Date of issue: March 2017

PURCHASING AND USING A PERSONAL SECURE  CERTIFICATE. Document issue: 12.1 Date of issue: March 2017 PURCHASING AND USING A PERSONAL SECURE EMAIL CERTIFICATE Document issue: 12.1 Date of issue: March 2017 Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Media Writer. Installation Guide LX-DOC-MW5.1.9-IN-EN-REVB. Version 5.1.9

Media Writer. Installation Guide LX-DOC-MW5.1.9-IN-EN-REVB. Version 5.1.9 Media Writer Installation Guide Version 5.1.9 Regulations and Compliance Tel: 1-844-535-1404 Email: TS_PACSGEAR@hyland.com 2018 Hyland. Hyland and the Hyland logo are trademarks of Hyland LLC, registered

More information

Integrate Microsoft Office 365. EventTracker v8.x and above

Integrate Microsoft Office 365. EventTracker v8.x and above EventTracker v8.x and above Publication Date: March 5, 2017 Abstract This guide provides instructions to configure Office 365 to generate logs for critical events. Once EventTracker is configured to collect

More information

Should you encounter any issues or have questions as you go through this registration process, please send an to:

Should you encounter any issues or have questions as you go through this registration process, please send an  to: User Registration In order to use EFIS 2.0, a one-time registration process is required. This document outlines the steps required to register your user account and access EFIS 2.0: This registration process

More information

Enterprise Edge 2.0 Unified Messaging Client Installation Guide

Enterprise Edge 2.0 Unified Messaging Client Installation Guide Enterprise Edge 2.0 Unified Messaging Client Installation Guide www.nortelnetworks.com 2000 Nortel Networks P0911954 Issue 01 Contents Chapter 1 Installing Enterprise Edge Unified Messaging Accessories

More information

MEDIASEAL Encryptor Client Manual

MEDIASEAL Encryptor Client Manual MEDIASEAL Encryptor Client Manual May 2018 Version 3.7.1 Fortium Technologies Ltd www.fortiumtech.com Copyright 2018 - Fortium Technologies Ltd Information contained in this document is subject to change

More information

NZ Online Forms for Research Software Manual

NZ Online Forms for Research Software Manual NZ Online Forms for Research Software Manual Version 1.5 Released May 2016 2 P a g e N Z O n l i n e F o r m s f o r R e s e a r c h 1 INTRODUCTION... 6 2 GETTING STARTED... 6 2.1 Creating an Account...

More information

Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 7

Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 7 Sophos SafeGuard File Encryption for Mac Quick startup guide Product version: 7 Document date: December 2014 Contents 1 About Sophos SafeGuard File Encryption for Mac...3 2 First use...4 3 Working with

More information

BUSINESS CLOUD FAX By Northland Communications

BUSINESS CLOUD FAX By Northland Communications BUSINESS CLOUD FAX By Northland Communications QUICK REFERENCE GUIDE TABLE OF CONTENTS LOGGING INTO THE WEB CLIENT... CREATING + SENDING... HOW TO CREATE + SEND A FAX TO A WEB CLIENT. ADDING ATTACHMENTS...

More information

Moving Forward Together

Moving Forward Together Moving Forward Together AMITA HEALTH INFORMATION SERVICES EMAIL MIGRATION INFORMATION The purpose of IT integration is to bridge the technology and infrastructure between Adventist Midwest Health sites

More information

Office365 Outlook. The username is your complete employee number followed

Office365 Outlook. The username is your complete employee number followed Office365 Outlook Sign In 1. Navigate to the shortcut for Office 365 on your desktop or enter the following url: http://portal.dekalbschoolsga.org. 2. Enter the username and password for your 365 account.

More information