Dell Data Protection Protected Workspace

Size: px
Start display at page:

Download "Dell Data Protection Protected Workspace"

Transcription

1 Dell Data Protection Protected Workspace End User Guide Dell Data Protection Protected Workspace v5 Created and Maintained by Invincea, Inc. Proprietary For Customer Use Only

2 2 Contents Purpose and Intended Audience... 4 Dell Data Protection Protected Workspace?... 4 The Dell Data Protection Protected Workspace WebRedirector... 4 WebRedirector Notifications... 4 Dell Data Protection Protected Workspace Icons... 5 Dell Data Protection Protected Workspace Desktop Icon...5 Dell Data Protection Protected Workspace System Tray Icon...5 Dell Data Protection Protected Workspace Start Menu Icons...5 Common Application Tasks... 6 Starting Dell Data Protection Protected Workspace or Launching New Browser Window...6 Additional Ways to Launch a New Browser Window...8 Dell Data Protection Protected Workspace First Run...9 Changing Your Home Page Internet Explorer Mozilla Firefox Google Chrome Selecting Your Preferred Browser Native Browser Downloads File Download Additional Dialogs File Upload Dialogs Safely Opening Documents with Protected Workspace Document Protection An Additional Note about Document Protection Enabling / Disabling Document Protection Protected Application Drop Down Menu Unprotect Current Page Using the Unprotect Current Site Feature Dell Data Protection Protected Workspace Suspicious Activity Detection Software and Configuration Updates Auto Restore Sending Support Logs to Dell Support for Review Dell Data Protection Protected Workspace System Tray Options Open Internet Explorer Open Firefox Open Google Chrome Restore... 29

3 3 Suspect Activity Details Preferences About Exit Preference Menu Options General Tab Basics Always protect my default web browser Load in the background when Windows starts Border Color Selector Dialog Apps Tab Auto-Restore Tab Automatic Restore Remind me to restore my browser option Daily Option Weekly Option After Elapsed Option Next auto-restore Display Security Tab Activity Blocking Terminate suspect processes immediately as they are detected Remove suspect documents on detection Remove downloads from an suspect session Clear all browsing data from a suspect session Only open documents originating from the internet Downloads Block unsafe file extensions from downloading Block executable downloads that are not digitally signed Update Tab Software Update Configuration Status Trusted Sites Tab... 42

4 4 Purpose and Intended Audience This document is intended to provide information and instruction for tasks that are considered day-to-day for users of the Protected Workspace product. Dell Data Protection Protected Workspace? Dell Data Protection Protected Workspace provides a secure container for users to run the most common web browsers and document applications. By running these applications in a secure container, users are protected from malicious attacks that may come via a website or infected document. Protected Workspace helps by securing web browsing, using the Protected Workspace WebRedirector to ensure that only sites that have been trusted can be opened outside of the secure container. This experience is automated and mostly transparent to the user to ensure a consistent browsing experience. The Dell Data Protection Protected Workspace WebRedirector The Protected Workspace WebRedirector controls which websites are viewed in a user s unprotected web browser versus a protected browser in the Protected Workspace secure container. When a user attempts to access a website in the unprotected browser that is not considered trusted the WebRedirector will reopen the requested page in a Protected Workspace protected browser to ensure a safe browsing experience. In addition to ensuring users are opening untrusted content in a protected browser, the WebRedirector also ensures that trusted websites can be opened in an unprotected browser by the same process. If a user is browsing in a protected browser and visits a trusted site, the requested site is then reopened in an unprotected browser. This is generally done for internal company websites or for sites that have compatibility issues while running in the secure container. WebRedirector Notifications The WebRedirector has several different notification dialog boxes that help to educate the user about when they are moving between trusted and untrusted pages. However, to make the experience more transparent, administrators may have disabled these notifications. The first notification is presented to the user when a trusted site is accessed in a protected browser. This dialog gives the user the ability to select if they want to remain within the protected browser or to continue with the unprotect operation. Pressing the Unprotected button will open the page that is being requested in the unprotected browser. This may be necessary for sites that need additional plugins or operating system integration, such as Microsoft SharePoint sites. Pressing the Protected button will continue opening the page in the protected browser.

5 5 Dell Data Protection Protected Workspace Icons After the Installation of Dell Data Protection Protected Workspace, a new icon will be located on the desktop, a new icon will be located in the system tray and a new folder will be created within the Start Menu. The following section helps to identify each of these new icons and what their functions are. Dell Data Protection Protected Workspace Desktop Icon The Protected Workspace icon found on the desktop is a point of execution for the Protected Workspace application. Double clicking on this icon will start the Protected Workspace application if it is not currently running or will launch a new browser window if it is running. This icon can also be copied or pinned on to the quick launch tool bar to allow for easier access. Dell Data Protection Protected Workspace System Tray Icon The Protected Workspace system tray icon can be found in the system tray (next to the clock) when the Protected Workspace secure container is running. Product actions, such as opening a new browser window, restoring Protected Workspace to a clean state or modifying user preferences are available from this tray icon. More details on what options are available and how to use them can be found later in this document. Dell Data Protection Protected Workspace Start Menu Icons Protected Workspace can also be launched (either starting the program, or opening a new browser window) by going to the start menu, choosing All Programs, then Dell, then Protected Workspace. Within this folder is a Protected Workspace shortcut that can be used to run the application. Additionally, this folder contains a support tool that can be used to send support logs in case of an issue with the product. NOTE: The desktop icon, system tray icon and start menu items may not be available if they have been disabled by the administrator. If they are not available, contact your administrator for additional information.

6 6 Common Application Tasks The following section offers step by step instructions for common application tasks. Starting Dell Data Protection Protected Workspace or Launching New Browser Window To start the Protected Workspace product or to launch a new protected browser window within the secure container, double-click on the Protected Workspace icon on the desktop. If the product is not running, clicking on the desktop icon will display a Preparing protected environment notification as the secure container is created. Once that process has finished, a protected browser window will be displayed. To indicate that the Protected Workspace product is running, a system tray icon showing the Protected Workspace logo is displayed in the system tray.

7 7 Applications running in the Protected Workspace secure container contain a customizable border color that outlines application windows opened within the secure container. This is to help the user distinguish between the unprotected applications and those running in the secure container. The following screenshot displays a protected Internet Explore with a green border.

8 8 Additional Ways to Launch a New Browser Window Once Protected Workspace is running the user can open a new protected browser window by doing one of three simple tasks. The first is to double-click on the Protected Workspace icon on the desktop. The second is to right click on the Protected Workspace system tray icon, and select Open Internet Explorer, Open Firefox or Open Google Chrome from the menu. Note that the preferred browser (the one opened by double clicking the Protected Workspace desktop icon) is listed first and is bold. In the screen shot below, Internet Explorer is the preferred browser. Also, only available browsers will be listed. Finally, the user can go to the Start Menu, choose All Programs, open the Dell folder, then the Protected Workspace folder, and finally choose Dell Protected Workspace.

9 9 Dell Data Protection Protected Workspace First Run When Protected Workspace is run for the first time, the user will asked to select a few product configuration options (or leave the defaults) and then will be guided through a brief tour of the product. This tour provides the user with a simple overview of the product functionality. Once the tour completes, the product will finish loading. The tour can also be accessed by right clicking on the Protected Workspace system tray icon, choosing About then pressing the Tour button. This second option provides the user a way to view the tour if an administrator has disabled it from being displayed on the first run of the product. The configuration screen allows users to select whether or not they want their default browser protected, if they want document protection enabled, which file type they want protected and also whether or not they want to show a border around protected windows (along with border color). Users can then select Begin Tour to progress through the first run tour, Previous to return to the prior screen, or Skip Tour to exit the tour and start the Protected Workspace product.

10 10 Changing Your Home Page Internet Explorer The homepage of a protected browser is customizable just like an unprotected browser. To change the homepage from the default homepage for protected Internet Explorer, select Tools or the tools icon from the menu at the top of protected Internet Explorer window. After the drop down menu appears, select Internet Options from the list of options. Note: Screenshots below are from IE9, but the outlined steps should also work for Internet Explorer 7, 8, 10 and 11. When the Internet Options box appears, delete any text that exists in the box below To create homepage tabs, type each address on its own line. Once this box is cleared, enter the address for the new homepage, such as Click OK when finished. Open a new protected browser window or press the Home button to verify the homepage is now set to the new URL entered.

11 11 Mozilla Firefox To change the homepage for protected Mozilla Firefox, select Tools from the menu at the top of a protected Firefox window. After the drop down menu appears, select Options from the list of options. When the Options box appears, verify that the General tab is selected. Next to When Firefox starts: select Show my homepage from the dropdown (if not selected already). Now delete any text that exists in the box labeled Home Page. Once this box is cleared, enter the address for the new homepage, such as Then click OK.

12 12 Google Chrome To change the homepage for protected Google Chrome, select the Customize and Control icon to the right of the address bar. After the drop down menu appears, select Settings from the list of options. Now locate On Startup and click the radio button next to Open a specific page or set of pages. Now click on the Set pages link to enter your homepage.

13 13 After the new homepage has been entered, click the OK button and then close the Settings tab to save your changes.

14 14 Selecting Your Preferred Browser Within the Protected Workspace secure container there is the concept of a preferred browser, since the application has the ability to protect multiple browsers. The preferred browser is the browser within the secured container that will be used by default. This browser will be opened for hyperlinks or any other host request for the default browser (when Protected Workspace is set as the host default browser). Additionally, whenever the Protected Workspace icon is double clicked, the preferred browser will open. If multiple browsers are available for a user, the user can select which is preferred through the Apps tab on the Preferences menu. The user is able to select any browser from the Protected Apps list and check the Use the browser to open web pages checkbox to set the selected browser as preferred. Only a single browser can have this option selected and one browser must always be selected. If only one browser is available, no changes can be made. Note, this ability may have been disabled by an administrator.

15 15 Native Browser Downloads Protected Workspace leverages the same download dialogs that would be presented via a web browser without the Protected Workspace protection. Users should expect to see and use these dialogs as they normally would, without Protected Workspace in the environment. In certain cases, administrators may enable confirmation dialog boxes to ensure that file save or open actions that will leave the Protected Workspace secure container alert the user. For example, if a user has confirmation dialogs enabled for open actions and a user were to open a PDF file, no dialog box would be displayed as the file would open in a secured application within the Protected Workspace container. When the browser dialog displays and the user chooses to Save or Open a file, the Protected Workspace confirmation dialog box will display before the final stage of moving the download file out of the secure container. If the Cancel button is pressed on the Protected Workspace confirmation dialog, the download will be deleted from the secure container rather than being copied to the host.

16 16 File Download Additional Dialogs Protected Workspace also has advanced download features that help to protect the user. These advanced options prevent certain files from being downloaded by a protected browser in the secure container. One of these advanced features is the ability to block downloads for certain types of files. If a file download is blocked by type, the following message will be displayed when a request to download the file type occurs. This option can be enabled by the administrator for a variety of file types or can be enabled/disabled through the user preferences UI. If enabled through the preferences UI by the user, the default extension types will be blocked. These extensions include: bas, bat, chm, cmd, com, cpl, crt, dll, exe, hlp, hta, inf, ins, isp, msc, msi, msp, mst, pif, reg, scr, sct, shb, shs, sys, vb, vbe, vbs, wsc, wsf, wsh When this feature is active, the following dialog will display to alert the user of the extra level of protection that is in place. A second advanced feature is to validate that executable files have a valid digital signature before allowing the file to be downloaded by a protected browser. If this feature is enabled, and a requested executable file does not have a valid digital signature, the following dialog will indicate to the user that the file cannot be downloaded.

17 17 File Upload Dialogs In some cases, when a user attempts to upload a file to a website, Protected Workspace will display an additional dialog box indicating that the file is being secured. This dialog box is an indicator that the file is being transferred into the secure container so that it can be uploaded to the website as requested. This dialog is used to inform the user that the website action will not be completed until the securing process finishes, and the website may appear unresponsive or hung until the file is fully secured. Once the securing process is completed, the Protected Workspace dialog box will close and the website will continue its action. Additionally, users may see the securing dialog when opening a large protected document, as the document may take a moment to transfer into the container and open in a protected application.

18 18 Safely Opening Documents with Protected Workspace Document Protection In addition to preventing malware from infecting a computer via a web browser attack, Protected Workspace also offers the ability to securely open documents inside of the Protected Workspace secure container. This helps to prevent malicious documents from affecting the computer as well. Currently, Protected Workspace offers a secure way to open documents for several different file types. Protected Workspace secures: Adobe Reader and Adobe Acrobat: allowing secure viewing of PDF files Microsoft Word: allowing secure viewing of DOC, DOCX and may other MS Word files Microsoft Excel: allowing secure viewing of XLS, XLSX and may other MS Excel files Microsoft PowerPoint: allowing secure viewing of PPT, PPTX and may other MS PowerPoint files The protected document applications can be identified as the protected browsers are by the customized border color that surrounds the application. The following windows provide examples of the protected applications with the border displayed.

19 19 An Additional Note about Document Protection When editing documents inside of a protected application, the document application is subject to the Restore process, just as the protected browsers are. When a Restore of the secure container needs to be executed, all protected applications need to be closed out. To help ensure users do not lose any unsaved changes, the protected applications will prompt the user to save the document. If the Restore is delayed because of an unsaved file, an additional dialog will display over the system tray indicating that the Protected Workspace Restore cannot continue until the unsaved document is saved or closed.

20 20 Enabling / Disabling Document Protection The Protected Workspace product gives users a simple way to enable or disable document protection for protected applications. By disabling document protection for an application, the associated file types for that application will no longer open inside the Protected Workspace secure container. To control which application have document protection enabled, navigate to the Preference menu from the drop menu or system tray menu. Choose the Apps tab. On the Apps tab, all applications that can be protected by Protected Workspace are listed in the Protected Apps list. By clicking on an application name in this list, details about that application and available options are listed. To enable or disabled document protection for a specific application, simply check or uncheck the Enable document protection checkbox. This can be done for one or all available applications. The protection will be enabled or disabled for all file types listed under Protected file types for the selected application. Note: The ability to enable or disable document protection may have been disabled by an administrator. In this case, the option would appear grayed out.

21 21 Protected Application Drop Down Menu Unprotect Current Page Protected Workspace adds a drop down menu on the top edge of all protected applications. The drop down menu is an indicator that an application is protected by Protected Workspace and also allows for quick access to features of the product, such as the preferences menu. The drop down menu can be found in the middle of the top edge of the any protected application window. It is a small gray button that displays the menu when clicked. Besides informing the user that the application they are using is protected by Protected Workspace, the menu also provides the user with quick access to two different software options. The first option is the Preferences option, which is always displayed at the bottom of the menu. By selecting Preferences, the user preferences UI will be displayed, as it would be if the user selected the Preferences option from the system tray menu. This option is designed to allow the user a second control point to access the preferences menu. The second option, Unprotect Current Page, is used to reopen the current page being displayed in protected browser in an unprotected browser (outside of the container). This is useful if the page being viewed in the protected browser is not rendering correctly or if there is some sort of compatibility issue. This option is currently only available for browsers protected by Protected Workspace and may be disabled by an administrator, which removes the option from the menu.

22 22 Using the Unprotect Current Site Feature When using the Unprotect Current Page feature, the user will be prompted with the below dialog before the site is moved to the unprotected browser to ensure they are aware of the potential danger of browsing outside of the protected browser. The user can choose to continue by pressing the Unprotect button or they can cancel the action by pressing the Cancel button. Users have the ability to select subdomains when unprotecting a page. This allows users the ability to trust a very specific subdomain, or then entire domain, depending on the necessity. The dialog box also contains a check box with the option Always trust this website. When checked, this option stores the domain of the site that is being unprotected, so that any future visits to this domain in the protected browser will be automatically redirected to the unprotected browser. This is convenient for business related sites that are used frequently and do not work correctly in the protected browser. Once these sites are permanently stored, they can be managed in the Preferences menu if they need to be removed. If the site is not permanently stored, it will be removed from the temporary trusted sites list at the next restore. The Trusted Sites tab within the Preferences menu allows for the user to view the sites that have been permanently listed as trusted sites and to also remove a site if it no longer needs to be trusted. This can be done by selecting the site in the list and pressing the Remove button. If the user wishes to remove all sites, they can press the Remove All button.

23 23 Additionally, administrators have the option to require a justification of the unprotect action. When an administrator has enabled this feature, the dialog box for the unprotecting a site will contain a text box to enter the business justification. This business justification and the unprotected website will be reported to the administrator when the Unprotect button is pressed.

24 24 Dell Data Protection Protected Workspace Suspicious Activity Detection Protected Workspace has a built in detection engine that detects unsafe behavior within the secure container. When a suspicious activity is detected, Protected Workspace indicates a restore needs to be completed to return the secure container to a clean state. The following Protected Workspace Alert is displayed to the user. The user can click the Restore button, which will destroy the dirty container and recreate a clean container. Alternatively, the user has the option to close the notification and continue working in the dirty state, though this is not recommended. If the user dismisses the Protected Workspace Alert without restoring the container the Protected Workspace system tray icon will turn red until the restore is completed. This serves as a reminder to the user that the container is dirty and needs to be restored. If an administrator chooses, the user may not be given the option to dismiss the alert as mentioned above. In this case the user will be presented with a countdown timer that indicates when the restore will happen. Once the timer has expired, the product will automatically execute the restore process.

25 25 It is important to note that if the restore happens by the expiring timer, a protected browser window will NOT be displayed when the restore completes, unlike what happens during a manual restore process. A dialog box will be displayed though to indicate that the container has been restored and the cause of the restore was a detected threat. Note: The above dialogs display default messages. These may be customized by an administrator and show different text.

26 26 Software and Configuration Updates Protected Workspace software includes a software and configuration update feature that allows administrators to update the software version and configuration of the product remotely. When a new version of the Protected Workspace software has been published, there are three different ways that software update may be applied. With the first method the software upgrade will start immediately. When this method is used the following notification will be displayed to the user. This notification contains a countdown timer, which informs the user when the update will be applied. The user has the ability to press the Install Now button if they are ready for the update, otherwise the update will be automatically applied once the timer expires. The second method allows the user to decide when the software update will be applied. The user can choose to press the Install Now or Install Later button. Closing the dialog has the same effect as pressing the Install Later button. Pressing the Install Now button will immediately exit Protected Workspace, closing all protected applications, and start the upgrade process. Once the upgrade process has finished, the product will restart and the user will be presented with a protected browser. If the user chooses to press the Install Later button, this will delay the install until the next time the product is Restored or Restarted. The final method is for the software update to be applied silently in the background with no user interaction. In this case, the software will be silently downloaded to the client system and will go through the upgrade process the next time the product is restored or restarted. There are no dialogs presented to the user with this method. For all methods, while the update process is running, the user will see the following message displayed above the system tray.

27 27 Auto Restore Protected Workspace product has an auto-restore feature that is used to restore the secure container to a clean state at a scheduled interval. The auto-restore feature has the ability to be pre-configured by the administrator or it can be configured via the user preferences menu. The auto-restore can occur in two different fashions; forced or optional. When an administrator has decided that the auto-restore does not need to be forced, the user will be presented with the below dialog box, which gives the ability for the auto-restore to be cancelled. By pressing the Keep Browsing button, the auto-restore is dismissed and will trigger again at the next scheduled time. If the user presses the Restore Now button, all protected applications will be closed and the secure container will be restored to a clean state. It is recommended that users preform the restore when the alert is displayed. When the administrator has decided to force the restore process the user will be presented with the below dialog, which offers a countdown timer until the restore is to occur. When the timer expires, the restore process will occur. Optionally, the user has the ability to press the Restore Now button to make the restore process happen prior to the expiration of the timer. For users that manage the auto-restore timer via the preference menu, it is recommended that auto-restore option be enabled to ensure that a clean protected browser is used each day. It is recommended that the Protected Workspace secure container be restored every 24 hours or at least once each day. Restoring the product ensures that the secure container is always clean and free of malicious activity. It is also important to note that the Protected Workspace protected browser is restarted each time the computer is restarted or a user logs onto the PC. If this occurs, the auto-restore may not be necessary till the following day.

28 28 Sending Support Logs to Dell Support for Review The Protected Workspace application has a built in log reporting tool that allows for product logs to be uploaded to support for review. This tool may be used at any time to report an issue or it may display automatically for some errors. The Protected Workspace Report Submitter dialog box provides a dialog box to enter additional details about the error or what may have been occurring when the error was displayed. If the dialog box displays the text (required) this field must be filled in prior to submitting the log report. In addition to filling out the description field, the Privacy Policy check box needs to be selected before the submit button will be active and allow the report to be sent. In certain cases, logs in addition to the default logs may be requested. These can be enabled by pressing the options button prior to submitting the report. The Options button allows for additional log types and a screenshot to be included. If using the screenshot feature, be sure that the Report Submitter dialog box is not blocking the error message that needs to be captured before pressing the Submit button.

29 29 Dell Data Protection Protected Workspace System Tray Options The following section outlines the menu options available from the Protected Workspace System Tray Icon. The System Tray Menu can be accessed by right-clicking on the Protected Workspace Icon in the system tray. NOTE: The system tray icon may not be available if it has been disabled by the administrator. If it is not available, contact your administrator for additional information. Open Internet Explorer Open Internet Explorer is used to open an Internet Explorer browser window within the Protected Workspace secure container. If Internet Explorer is the only browser available or is set as the preferred browser, it will appeared bold and at the top of the menu. In the above screen shot, Internet Explorer is the preferred browser. Open Firefox Open Firefox is used to open a Mozilla Firefox browser window within the Protected Workspace secure container. The preferred browser defined in the preferences menu is bold and listed first. If Mozilla Firefox is not available in the secure container, it will not be displayed in this menu. Open Google Chrome Open Google Chrome is used to open a Google Chrome browser window within the Protected Workspace secure container. The preferred browser defined in the preferences menu is bold and listed first. If Google Chrome is not available in the secure container, it will not be displayed in this menu. Restore The Restore option is used to restore the Protected Workspace secure container to a clean state if suspicious activity has been detected or if the container needs to be reset for any other reason. It is recommended that the Protected Workspace secure container be restored at least once a day.

30 30 Suspect Activity Details When suspicious activity has been detected by Protected Workspace threat detection, this additional menu item will be displayed in the system tray menu. The user may select the Suspect Activity Details option to view further information regarding the activity. The user is able to click the Restore button from this window to restore the Protected Workspace secure container back to a clean state. Preferences The Preferences option is used to configure settings for the Protected Workspace secure container and protected applications, such as auto-restore or setting Protected Workspace as the default browser. Depending on how the administrator has configured the Protected Workspace product, some of these options may be disabled. The preference options are explained in greater detail in the next section.

31 31 About The About option is used to view the current version of the Protected Workspace software installed on the client machine, and to view (if connected to a Protected Workspace Management Server) the CMS group and configuration revision that is currently applied to the client. The Help button can be used to open a designated Help site (either the Protected Workspace default or a client customized version). Finally, by pressing the Tour button, the first run tour will be displayed. Exit The Exit option is used to cleanly close down the Protected Workspace secure container when it is no longer needed or when it needs to be restarted completely. Using the Exit option is the only way to fully shutdown the Protected Workspace product. Closing all protected application windows will leave Protected Workspace running in the background.

32 32 Preference Menu Options The following section identifies the options that are available in the user preferences interface. The Preferences interface can be accessed by right clicking on the Protected Workspace System tray icon and selecting Preferences It is important to note that all of the options within the user preferences interface can be administratively controlled, so some of the options explained in the following section may be grayed out or not configurable. The preferences menu can also be accessed from the drop down menu that is found on the top of any protected application.

33 33 General Tab The General Tab provides options configuring Protected Workspace as the default browser, configuring if Protected Workspace should start with Windows, and for changing the border color around protected windows. Basics The Basics section of the General tab allows modification of two different options listed below. Always protect my default web browser By selecting this check box, Protected Workspace will act as the default browser and will pass information to a protected browser any time the default browser is invoked (such as via a hyperlink) on the PC. Unselecting this check box will set the default browser back to the previously set default browser. Load in the background when Windows starts This check box will define if the Protected Workspace product will start automatically in the background each time the computer is restarted. It is recommended that this option be checked so that the first time the product is used, there is no delay in bringing up the browser window. Border The Border section of the General tab allows the option to enable or disable a colored border that is shown around protected application windows. To enable the border, simply check the option box. When this box is not checked, no border will be displayed. By default, the browser displays with a green border, but this can be customized by pressing the Pick Color button and choosing a new color from the color picker. The new color will take affect when the OK button is pressed on the Preferences dialog.

34 34 Color Selector Dialog To select a new border color, select one of the pre-populated colors, or enter your own color combination. Press OK to select the new color.

35 35 Apps Tab The Apps Tab provides the ability to specify which programs within the secure container will be used to handle browsing and document protection. For web browsing, all available web browsers will be listed, and the user can choose which browser will be preferred for browsing in the secure container. This can be done by selecting Use this browser to open web pages for the browser that is preferred. Additionally, certain applications can be specified to handle different documents types. By default, Adobe Reader is enabled to protect PDF documents within the secure container, but other applications may be available, such as Adobe Acrobat. Document handling can also be enabled on Internet Explorer or Firefox for static htm and html pages stored on the local PC.

36 36 Auto-Restore Tab If the Administrator has allowed it, this tab is visible. The Auto-Restore Tab provides options for configuring the Auto- Restore settings. Automatic Restore The Automatic Restore section of the Auto-Restore tab provides the ability to enable and disable a scheduled restore of the Protected Workspace secure container. The Auto-Restore can be customized to occur on a defined schedule. Selecting the Enable Auto-Restore checkbox will enable the auto restore feature with the settings selected. The restore will close all open Protected Workspace protected applications and restore the Protected Workspace secure container to a clean state. If the checkbox is unselected, Auto-Restore will be disabled. Remind me to restore my browser option The Remind me to restore my browser option provides a drop down menu with three options; daily, weekly and after elapsed. The end user will be able to customize the schedule based on these options. Daily Option The Daily option changes the dialog box to allow for the end user to select a specific time each day that the secure container will auto restore. Weekly Option The Weekly option changes the dialog box to allow for the end user to select what day of the week the secure container will auto-restore and at what exact time that day the auto-restore will occur. After Elapsed Option The After Elapsed option allows for the user to select the time period in hours and minutes after startup or restore that an auto-restore will be started. This time period begins when the product is started or restored. For example, if this option is set to 12 hours, the secure container will be restored after the container has been continually running for that period of time. The timer resets each time a restore is done.

37 37 Next auto-restore Display The Next auto-restore display indicates when the next auto-restore will take place based on the settings that are configured.

38 38 Security Tab The Security Tab provides options for configuring the Security settings. Activity Blocking The Activity Blocking section of the Security tab gives the end user the ability to configure additional options on how certain activities are handled. Please note that some options are only available if the Administrator has allowed it. Selecting the check mark in front of an option will enable that feature. Terminate suspect processes immediately as they are detected This option allows for the Protected Workspace secure container to terminate suspect processes as soon as they are detected. The end user will be notified of the infection and prompted to restore. Remove suspect documents on detection This option allows for the Protected Workspace secure container to delete documents that are located on the end user PC if a threat is detected within the document. This document will be permanently deleted. The user will be notified if this occurs. An example of this option would be the user opening a PDF on their desktop that contained malicious content. This file would be deleted from the desktop and a restore of the Protected Workspace secure container would be executed (or prompted). Remove downloads from an suspect session This option allows for the Protected Workspace secure container to immediately remove any files downloaded during a session that is deemed infected from the host machine. The user will be notified of the deleted files at the time of infection. An example of this option would be if the user downloaded three PDF documents with the protected browser and then browsed to a malicious site. These three documents would be removed from the location that they were downloaded to. Clear all browsing data from a suspect session This option allows for the Protected Workspace secure container to clear all browsing data (additional bookmarks, changes to browser settings, history, cookies, etc.) during a suspect session (when a suspicious activity alert is displayed). If the option is not checked, then the browsing history and data will remain intact when the restore

39 39 happens, even if they have been modified by the attack (such as changing the home page to something malicious or adding in malicious bookmarks). Only open documents originating from the internet This option will allow only documents that originate from the internet to be opened in a Protected Workspace protected document application. Documents which are created locally will be opened outside of the secure container. When not selected, all documents will be opened in the secure container (for document types that Protected Workspace is default program). Downloads The Downloads section of the Security Tab gives the end user the ability to configure additional options on how files are handled when downloaded. Block unsafe file extensions from downloading This option allows for Protected Workspace to immediately stop any blacklisted file types from being downloaded by a protected browser. If this option is not checked, the files will be downloaded to the Protected Workspace downloads folder unless an infection is detected. The following is the default list of file types that will be blocked by enabling this option (can be modified by an administrator): bas, bat, chm, cmd, com, cpl, crt, dll, exe, hlp, hta, inf, ins, isp, msc, msi, msp, mst, pif, reg, scr, sct, shb, shs, sys, vb, vbe, vbs, wsc, wsf, wsh Block executable downloads that are not digitally signed This option allows for Protected Workspace to immediately stop any executable without digital signature from being downloaded. Executable downloads that are digitally signed will be downloaded. If this option is not checked, all executable files, regardless of signature status, will be downloaded to the Protected Workspace downloads folder unless an infection is detected.

40 40 Update Tab The Update Tab provides options for the software and configuration update settings. Software Update When the Administrator has allowed it, users can select the check box Automatically check for software updates to enable auto updates, otherwise this option is grayed out. This will allow the product to automatically check for software and configuration updates when the product is started up and on the interval specified in the following drop down. The options are as follows. On Restore: Upon restore from either a suspicious activity or auto-restore. Hourly: Protected Workspace will check for software updates every hour. Daily: Protected Workspace will check for software updates every day. Users also have the ability to press the Check Now button to immediately check for software and configuration updates. This can be helpful if an administrator has posted a configuration or software update and it needs to be applied immediately. This button will always be available, even if the administrator has prevented users from being able to modify or disable the update feature. Configuration Status The Configuration Status section provides additional details about the connection between the client software and the management system it is currently configured to be managed by. The Configuration Status section provides four pieces of information: Version: Displays the full product name and version number of the client software Config Server: Displays the defined URL for the management server that is currently defined Last Heartbeat: Displays the timestamp of the last heartbeat that occurred and indicates if that heartbeat was successful by displaying a green (success) or red (fail) icon

41 41 Group / Revision: Displays the name of the group within the management system that this host is currently part of and which configuration revision is currently being run

42 42 Trusted Sites Tab The Trusted Sites Tab provides the ability to remove previously stored trusted sites. This tab displays the sites that were trusted via the Unprotected this page option in the drop down menu. Domains / URLs that were specified as Always trust this site will be listed. If a user wishes to remove a single domain / URL from this list, they can select the domain / URL to be removed and then can press the Remove button. If a user wishes to clear all of the domains / URLs listed, they can press the Remove All button.

NHS blocked attachments

NHS blocked  attachments NHS blocked email attachments The following file types are blocked on the Relay and NHSmail services File type Description avi Audio Video Interleaved animation file bas BASIC programming files bat DOS

More information

Subscription management... 2

Subscription management... 2 greendisk manual Subscription management... 2 Creating a user in my.green.ch...2 Authorisation management for users and groups... 4 Logging in to your greendisk... 4 Users and authorisations... 4 Assignment

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

ENCRYPTED . Copyright UT Health 1

ENCRYPTED  . Copyright UT Health 1 ENCRYPTED EMAIL The improper use or disclosure of sensitive information presents the risk of identity theft, invasion of privacy, and can cause harm and embarrassment to students, faculty, staff, patients,

More information

Wholesale Lockbox User Guide

Wholesale Lockbox User Guide Wholesale Lockbox User Guide August 2017 Copyright 2017 City National Bank City National Bank Member FDIC For Client Use Only Table of Contents Introduction... 3 Getting Started... 4 System Requirements...

More information

Recommended Browser Settings

Recommended Browser Settings Recommended Browser Settings Internet Explorer Settings (PC) Mozilla Firefox Settings (PC) Mozilla Firefox Settings (Mac) Safari Settings (Mac) Chrome Settings (PC) Infinite Campus recommends modifying

More information

Training Bulletin TITLE: CHIP-CARD BROWSER RECOMMENDATIONS AUDIENCE: GENERAL MANAGERS, FRONT DESK STAFF DATE: DECEMBER 12. Intro

Training Bulletin TITLE: CHIP-CARD BROWSER RECOMMENDATIONS AUDIENCE: GENERAL MANAGERS, FRONT DESK STAFF DATE: DECEMBER 12. Intro TITLE: CHIP-CARD BROWSER RECOMMENDATIONS AUDIENCE: GENERAL MANAGERS, FRONT DESK STAFF DATE: DECEMBER 12 Intro As a web-based application, the choiceadvantage Property Management System is impacted by the

More information

Managing Your Website with Convert Community. My MU Health and My MU Health Nursing

Managing Your Website with Convert Community. My MU Health and My MU Health Nursing Managing Your Website with Convert Community My MU Health and My MU Health Nursing Managing Your Website with Convert Community LOGGING IN... 4 LOG IN TO CONVERT COMMUNITY... 4 LOG OFF CORRECTLY... 4 GETTING

More information

SSRS 2016 for WITS. Web Portal User Guide. Applies to: WITS Version 18.0+

SSRS 2016 for WITS. Web Portal User Guide. Applies to: WITS Version 18.0+ SSRS 2016 for WITS Web Portal User Guide Applies to: WITS Version 18.0+ Microsoft SQL Server Reporting Services (SSRS) 2016 Last Updated June 1, 2017 Microsoft SQL Server 2016 Report Builder 3.0 Version

More information

Recommended Browser Settings

Recommended Browser Settings Recommended Browser Settings August 2015 This document is intended for restricted use only. Infinite Campus asserts that this document contains proprietary information that would give our competitors undue

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Learning Center Computer and Security Settings

Learning Center Computer and Security Settings Learning Center Computer and Security Settings Learning Center Computer Settings Please Note: To allow your computer to communicate most effectively with the Learning Center, and update your training record

More information

Introduction to the SAM Student Guide 4. How to Use SAM 5. Logging in the First Time as a Pre-registered Student 5 Profile Information 7

Introduction to the SAM Student Guide 4. How to Use SAM 5. Logging in the First Time as a Pre-registered Student 5 Profile Information 7 Contents Introduction to the SAM Student Guide 4 How to Use SAM 5 Logging in the First Time as a Pre-registered Student 5 Profile Information 7 Logging into SAM as a New User 9 Forgot Password 14 Grace

More information

Release Notes Viedoc 4.34

Release Notes Viedoc 4.34 Release Notes Available for users on 2017-04-20 Page 1 of 8 New functionality List of new functionality that has been added to this release. File Upload release adds support for file upload. The File Upload

More information

Comodo Dragon. User Guide Guide Version Software Version Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310

Comodo Dragon. User Guide Guide Version Software Version Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo Dragon Software Version 20.0 User Guide Guide Version 20.0.070312 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1. Comodo Dragon - Introduction... 4 2. System

More information

Cisco NAC Appliance Agents

Cisco NAC Appliance Agents 10 CHAPTER This chapter presents overviews, login flow, and session termination dialogs for the following Cisco NAC Appliance access portals: Cisco NAC Agent, page 10-1 Cisco NAC Web Agent, page 10-28

More information

Assistant User Guide

Assistant User Guide mydatavo Assistant User Guide 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Table Of Contents Features...ii Introduction...1 1. Installing mydatavo Assistant...1 1 System Requirements... 1 1.2

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

SharePoint: Fundamentals

SharePoint: Fundamentals SharePoint: Fundamentals This class will introduce you to SharePoint and cover components available to end users in a typical SharePoint site. To access SharePoint, you will need to log into Office 365.

More information

USER MANUAL. PowerFrame TM Personal. UPS Monitoring Software

USER MANUAL. PowerFrame TM Personal.   UPS Monitoring Software USER MANUAL PowerFrame TM Personal UPS Monitoring Software www.bxterra.com 1 TABLE OF CONTENTS Introduction... Structure... Applications... Features... System Requirements... Supported Operating Systems...

More information

Sync User Guide. Powered by Axient Anchor

Sync User Guide. Powered by Axient Anchor Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7

More information

Courseload 2.0 Documentation

Courseload 2.0 Documentation Courseload 2.0 Documentation Table of Contents What is Courseload?... 3 Using Courseload... 3 Requirements for Your Computer... 3 Installing the Chrome Frame Plugin... 3 Allowing Mixed Content on Internet

More information

Colligo Manager for Outlook User Guide. User Guide

Colligo  Manager for Outlook User Guide. User Guide Colligo Email Manager for Outlook User Guide User Guide Contents About This Guide... 5 Audience... 5 Requirements... 5 Terminology... 5 Colligo Technical Support... 5 Installation... 6 EXE Installation...

More information

SharePoint: Fundamentals

SharePoint: Fundamentals SharePoint: Fundamentals This class will introduce you to SharePoint and cover components available to end users in a typical SharePoint site. To access SharePoint, you will need to log into Office 365.

More information

Browser Configuration Reference

Browser Configuration Reference Sitecore CMS 7.0 or later Browser Configuration Reference Rev: 2013-09-30 Sitecore CMS 7.0 or later Browser Configuration Reference Optimizing Internet Explorer and other web browsers to work with Sitecore

More information

Chrome. Browsing in Chrome. The Omnibox. Video: Browsing in Chrome. To use the Omnibox: Omnibox suggestion icons. Page 1

Chrome. Browsing in Chrome. The Omnibox. Video: Browsing in Chrome. To use the Omnibox: Omnibox suggestion icons. Page 1 Chrome Browsing in Chrome Browsing in Chrome Page 1 Chrome makes browsing the Web quick and easy. In this lesson, we'll talk about navigating to websites in Chrome. You'll also learn how use tabs, access

More information

FIREFOX MENU REFERENCE This menu reference is available in a prettier format at

FIREFOX MENU REFERENCE This menu reference is available in a prettier format at FIREFOX MENU REFERENCE This menu reference is available in a prettier format at http://support.mozilla.com/en-us/kb/menu+reference FILE New Window New Tab Open Location Open File Close (Window) Close Tab

More information

VERSION 7 JUNE Union Benefits. Employer User Guide Data Collection Tool

VERSION 7 JUNE Union Benefits. Employer User Guide Data Collection Tool VERSION 7 JUNE 2018 Union Benefits Employer User Guide Data Collection Tool About this guide This document is intended to provide an overview of the main sections of the Data Collection Tool ( DCT ) for

More information

Comodo Chromium Secure Software Version 36.1

Comodo Chromium Secure Software Version 36.1 Comodo Chromium Secure Software Version 36.1 User Guide Guide Version 36.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Comodo Chromium Secure - Introduction...4

More information

Protecting computers from hidden threats. Implementation Guide. PestPatrol. In a Networked Environment

Protecting computers from hidden threats. Implementation Guide. PestPatrol. In a Networked Environment Protecting computers from hidden threats Implementation Guide PestPatrol In a Networked Environment TABLE OF CONTENTS Implementation Guide INTRODUCTION 3 PESTPATROL: A BRIEF OVERVIEW 3 PESTPATROL IN A

More information

An Introduction to Google Chrome

An Introduction to Google Chrome An Introduction to Google Chrome Box is an online file sharing and cloud content management service and it provides features such as: Getting Google Chrome 1. To get started with Google Chrome, you have

More information

Qbox User Manual. Version 7.1

Qbox User Manual. Version 7.1 Qbox User Manual Version 7.1 Index Page 3 Page 6 Page 8 Page 9 Page 10 Page 12 Page 14 Page 15 Introduction Setup instructions: users creating their own account Setup instructions: invited users and team

More information

Comodo Dragon Software Version 24.0

Comodo Dragon Software Version 24.0 Comodo Dragon Software Version 24.0 User Guide Guide Version 24.0.011613 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Comodo Dragon - Introduction... 4 2.System

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

EDGE, MICROSOFT S BROWSER

EDGE, MICROSOFT S BROWSER EDGE, MICROSOFT S BROWSER To launch Microsoft Edge, click the Microsoft Edge button (it s the solid blue E) on the Windows Taskbar. Edge Replaces Internet Explorer Internet Explorer is no longer the default

More information

BE Share. Microsoft Office SharePoint Server 2010 Basic Training Guide

BE Share. Microsoft Office SharePoint Server 2010 Basic Training Guide BE Share Microsoft Office SharePoint Server 2010 Basic Training Guide Site Contributor Table of Contents Table of Contents Connecting From Home... 2 Introduction to BE Share Sites... 3 Navigating SharePoint

More information

Learning Center Computer and Security Settings

Learning Center Computer and Security Settings Learning Center Computer and Security Settings Learning Center Computer Settings Please Note: To allow your computer to communicate most effectively with the Learning Center, and update your training record

More information

Electronic Committees (ecommittees) Frequently Asked Questions v1.0

Electronic Committees (ecommittees) Frequently Asked Questions v1.0 3 Electronic Committees (ecommittees) Frequently Asked Questions v1.0 SABS 2012-12-06 Table of Contents 1 Contents 1 Login and access... 3 1.1 How to access the ecommittee workspace... 3 1.1.1 Via the

More information

NAMI Affiliate Profile Center Contact Manual

NAMI Affiliate Profile Center Contact Manual NAMI Affiliate Profile Center Contact Manual Standards of Excellence/Center for Excellence November 2013 Table of Contents Chapter Page I. NAMI Affiliate Profile Center Contact Training Timetable 3 II.

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s

Instructions for Configuring Your Browser Settings and Online Security FAQ s Instructions for Configuring Your Browser Settings and Online Security FAQ s General Settings The following browser settings and plug-ins are required to properly access Digital Insight s webbased solutions.

More information

Introduction. Paradigm Publishing. SNAP for Microsoft Office SNAP for Our Digital World. System Requirements

Introduction. Paradigm Publishing. SNAP for Microsoft Office SNAP for Our Digital World. System Requirements Introduction Paradigm Publishing Paradigm understands the needs of today s educators and exceeds the demand by offering the latest technological advancements for coursework settings. With the success of

More information

Practice Labs User Guide

Practice Labs User Guide Practice Labs User Guide This page is intentionally blank Contents Introduction... 3 Overview... 3 Accessing Practice Labs... 3 The Practice Labs Interface... 4 Minimum Browser Requirements... 5 The Content

More information

Update to IPBrick v6.4. December 19, 2018

Update to IPBrick v6.4. December 19, 2018 Update to IPBrick v6.4 December 19, 2018 Contents 1 Introduction 3 2 Migrating an IPBrick v6.3 to 6.4 3 2.1 Installation on an IPBrick with High Availability (HA)............... 3 3 Migrating an IPBrick

More information

Antivirus and Content Shield Protect your SharePoint Farm Using the AvePoint Antivirus and Content Shield Solution

Antivirus and Content Shield Protect your SharePoint Farm Using the AvePoint Antivirus and Content Shield Solution Quick Start Guide Antivirus and Content Shield Protect your SharePoint Farm Using the AvePoint Antivirus and Content Shield Solution This document is intended for anyone wishing to familiarize themselves

More information

Conveyancing Manager Version 3.0 Document Synchronisation Frequently Asked Questions

Conveyancing Manager Version 3.0 Document Synchronisation Frequently Asked Questions Conveyancing Manager Version 3.0 Document Synchronisation Frequently Asked Questions Release date: 13/04/2015 Release version: CM 3.0 Document version: 1.2 Author: Monica Chand Table of Contents 1. Introduction

More information

Colligo Briefcase 3.4

Colligo Briefcase 3.4 3.4 Enterprise, Pro, and Lite Editions User Guide ipad Table of Contents Introduction... 4 Key Features... 4 Benefits... 4 Devices Supported... 5 SharePoint Platforms Supported... 5 Colligo Briefcase Lite...

More information

RONA e-billing User Guide

RONA e-billing User Guide RONA e-billing Contractor Self-Service Portal User Guide RONA e-billing User Guide 2015-03-10 Table of Contents Welcome to RONA e-billing What is RONA e-billing?... i RONA e-billing system requirements...

More information

Workstation Configuration

Workstation Configuration Workstation Configuration December 15, 2017 - Version 9.3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Document Management System. for QC Postfunding Review

Document Management System. for QC Postfunding Review Document Management System for QC Postfunding Review Contents Quick Overview: How to Submit Documents to FM Processing... iii How to Log in to the Document Management System (DMS)... iv How to Search for

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

Middlebury College Software Management & Self Service

Middlebury College Software Management & Self Service Windows 10 Configuration Tips & Resources Information Technology Services Revised October 12, 2017 The First-Time Login Must Be On-Campus 1. Make sure your new Windows 10 laptop is on campus when you log

More information

Panopto. End-User Guide

Panopto. End-User Guide Panopto End-User Guide Table of Contents INTRODUCTION... 3 PROVISIONING A COURSE... 3 LOGGING IN... 7 NAVIGATION... 8 PREPARING TO RECORD... 9 CREATING A SIMPLE RECORDING (AUDIO AND VIDEO ONLY)... 10 CREATING

More information

Ministry of Education EFIS User Set Up Guide Version 1.9

Ministry of Education EFIS User Set Up Guide Version 1.9 Ministry of Education EFIS 2.0 - User Set Up Guide Version 1.9 August 22, 2016 1 Table of Contents 1 Table of Contents... 2 2 Document History... 3 3 Description and System Requirements... 4 3.1 Description...

More information

Microsoft Excel 2007 Macros and VBA

Microsoft Excel 2007 Macros and VBA Microsoft Excel 2007 Macros and VBA With the introduction of Excel 2007 Microsoft made a number of changes to the way macros and VBA are approached. This document outlines these special features of Excel

More information

EQUELLA. Moodle User Guide. Version 6.2

EQUELLA. Moodle User Guide. Version 6.2 EQUELLA Moodle User Guide Version 6.2 Document History Document No. Reviewed Finalised Published 1 12/12/2013 13/12/2013 13/12/2013 December 2013 edition. Information in this document may change without

More information

CitiDirect Online Banking

CitiDirect Online Banking CitiDirect Online Banking Reports and Inquiry Guide February 2009 3 Contents Overview 2 Report vs. Inquiry 3 Additional Resources 3 Online Help 3 CitiDirect Customer Support 3 Setting Preferences for Reports

More information

Colligo Briefcase 3.0

Colligo Briefcase 3.0 3.0 Enterprise, Pro, and Lite Editions User Guide ipad TABLE OF CONTENTS Introduction... 4 Key Features... 4 Benefits... 4 Devices Supported... 5 SharePoint Platforms Supported... 5 Colligo Briefcase Lite...

More information

From the Insert Tab (1), highlight Picture (2) drop down and finally choose From Computer to insert a new image

From the Insert Tab (1), highlight Picture (2) drop down and finally choose From Computer to insert a new image Inserting Image To make your page more striking visually you can add images. There are three ways of loading images, one from your computer as you edit the page or you can preload them in an image library

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

Web Browser Application Troubleshooting Guide. Table of Contents

Web Browser Application Troubleshooting Guide. Table of Contents Web Browser Application Troubleshooting Guide The following trouble shooting guide outlines tips for common problems which may resolve incorrect or unexpected behavior of NMFTA s web based applications.

More information

Windows 10 Configuration Tips & Resources

Windows 10 Configuration Tips & Resources Windows 10 Configuration Tips & Resources I n f o r m a t i o n T e c h n o l o g y S e r v i c e s Revised April 16, 2018 The First-Time Login Must Be On-Campus 1. Make sure your new Windows 10 laptop

More information

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 Table of Contents... ii GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Use AT&T Toggle Applications on an iphone or ipad... 1 AT&T Toggle... 2 Set up Work Email within AT&T Toggle...

More information

VMware Workspace Portal End User Guide

VMware Workspace Portal End User Guide VMware Workspace Portal End User Guide Workspace Portal 2.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Workshare Compare 9.5

Workshare Compare 9.5 Workshare Compare 9.5 User Guide Workshare 9.5.3 April 2018 9.5.787.3184 Workshare Compare 9.5 User Guide Table of Contents Chapter 1: Introducing Workshare Compare...8 What is Workshare Compare?... 9

More information

Colligo Briefcase 3.4

Colligo Briefcase 3.4 3.4 Enterprise, Pro, and Lite Editions User Guide iphone and ipod Touch Table of Contents Introduction... 4 Key Features... 4 Benefits... 4 Devices Supported... 5 SharePoint Platforms Supported... 5 Colligo

More information

Microsoft Windows SharePoint Services

Microsoft Windows SharePoint Services Microsoft Windows SharePoint Services SITE ADMIN USER TRAINING 1 Introduction What is Microsoft Windows SharePoint Services? Windows SharePoint Services (referred to generically as SharePoint) is a tool

More information

Cayuse IRB User Guide

Cayuse IRB User Guide Electronic Proposal Development and Submission Product version 1.9.2 Last updated 7/12/2017 Trademark, Publishing Statement, and Copyright Notice 1998-2017 Cayuse, LLC. All rights reserved. This software

More information

Table of Content. Last updated: June 16th, 2015

Table of Content. Last updated: June 16th, 2015 BROWSER SETTINGS MASTER DOCUMENT Last updated: June 16th, 2015 Table of Content General Information... 2 Internet Explorer 8,9, & 11 Settings... 3 Safari Settings... 5 Firefox Settings... 6 Google Chrome

More information

Frequently Asked Questions. Question # Page #

Frequently Asked Questions. Question # Page # Circles of Trust Frequently Asked Questions Question # Page # 1 What is Circles of Trust?... 2 2 Where can I get Circles of Trust?... 2 3 What is a.tef file?... 2 4 Someone sent me a.tef file. How do I

More information

Client Installation Guide

Client Installation Guide GENView Provisioning and Portals Portal Server Client Installation Guide Release: 9.4 Document revision: 03.01 Describes the steps for installing the GVPP-PS client application. www.genband.com 630-01903-01

More information

2012 Natural Gas Conference Portland, Oregon September 24, 2012

2012 Natural Gas Conference Portland, Oregon September 24, 2012 2012 Natural Gas Conference Portland, Oregon September 24, 2012 What is SharePoint? SharePoint is a website that is accessed through a web browser (Internet Explorer, FireFox, etc) and an internet connection

More information

Electronic Recontracting

Electronic Recontracting Electronic Recontracting AN AGENCY AND PRODUCER GUIDE & FAQS The manual on the electronic recontracting process via Sircon s Producer Express from Producer Services and Administration Blue Cross and Blue

More information

Online Reporting and Information Management System (ORIMS) Manage Financial Returns User Guide for Banks & Trust Companies

Online Reporting and Information Management System (ORIMS) Manage Financial Returns User Guide for Banks & Trust Companies (ORIMS) Manage Financial Returns User Guide for Banks & Trust Companies March 31, 2015 Version 1.0 Version History Version Changes Date 1.0 Original release March 31, 2015 2 Table of Contents 1. Introduction...

More information

Comodo Antivirus Software Version 2.2

Comodo Antivirus Software Version 2.2 Comodo Antivirus Software Version 2.2 User Guide Guide Version 2.2.082318 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 Table of Contents... ii GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Start Using Toggle... 1 Personal... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle

More information

FAXLAN CLIENT v3.0 USER GUIDE

FAXLAN CLIENT v3.0 USER GUIDE FAXLAN CLIENT v3.0 USER GUIDE Draft Version 1.2 May 15 th, 2003 2 TABLE OF CONTENTS 1. FAXLAN CLIENT OVERVIEW... 3 1.1 FAXLAN CLIENT V3.0 FEATURES... 3 1.2 FAXLAN CLIENT V3.0 SYSTEM REQUIREMENTS... 3 2.

More information

Anchor User Guide. Presented by: Last Revised: August 07, 2017

Anchor User Guide. Presented by: Last Revised: August 07, 2017 Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...

More information

Browser Guide for PeopleSoft

Browser Guide for PeopleSoft Browser Guide for PeopleSoft Business Process Guide For Academic Support Specialists (Advisors) TABLE OF CONTENTS PURPOSE...2 INTERNET EXPLORER 7...3 GENERAL TAB...4 SECURITY TAB...6 PRIVACY TAB...10 CONTENT

More information

Lab - Configure Browser Settings in Windows 8

Lab - Configure Browser Settings in Windows 8 Introduction In this lab, you will configure browser settings in Microsoft Internet Explorer. Recommended Equipment A computer with Windows 8 An Internet connection Step 1: Set Internet Explorer as the

More information

California Institute of Technology

California Institute of Technology California Institute of Technology Human Resources Using Kronos Workforce Timekeeper A User Guide For System Requirements Operating System Kronos is compatible for use with PC s (running Windows 2000 or

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

CourseWorks Quick Start

CourseWorks Quick Start Introduction CourseWorks Quick Start CourseWorks (aka Sakai ) is the university's new course management system, which allows instructors to develop and maintain course Web sites. With CourseWorks, instructors

More information

STUDY ASSISTANT. Adding a New Study & Submitting to the Review Board. Version 10.03

STUDY ASSISTANT. Adding a New Study & Submitting to the Review Board. Version 10.03 STUDY ASSISTANT Adding a New Study & Submitting to the Review Board Version 10.03 Contents Introduction... 3 Add a Study... 3 Selecting an Application... 3 1.0 General Information... 3 2.0 Add Department(s)...

More information

Sign in and Meeting Issues

Sign in and Meeting Issues Account Activation Fails, page 2 Automatic Login Problems Occur After Cookies are Imported from Microsoft Internet Explorer, page 2 Browser Compatibility Issues, page 2 Cannot Connect to WebEx Site or

More information

CONTENTS PAGE. Top Tip: Hold down the Ctrl key on your keyboard and using your mouse click on the heading below to be taken to the page

CONTENTS PAGE. Top Tip: Hold down the Ctrl key on your keyboard and using your mouse click on the heading below to be taken to the page USER GUIDE CONTENTS PAGE Top Tip: Hold down the Ctrl key on your keyboard and using your mouse click on the heading below to be taken to the page Part 1) How to create a new account...2 Part 2) How to

More information

Republicbank.com Supported Browsers and Settings (Updated 03/12/13)

Republicbank.com Supported Browsers and Settings (Updated 03/12/13) Republicbank.com Supported Browsers and Settings (Updated 03/12/13) We support the Internet Explorer 8.0 & 9.0. If you are using Internet Explorer 7.0 or earlier you will need to update your browser. Click

More information

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Comodo Dome Antispam MSP Software Version 2.12 Comodo Comodo Dome Antispam MSP Software Version 2.12 User Guide Guide Version 2.12.111517 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

ConsumerTesting.com Online Applications Supplier Help Document

ConsumerTesting.com Online Applications Supplier Help Document ConsumerTesting.com Online Applications Supplier Help Document Online Application Help Page! of! 1 17 Online Application for Testing Help Document BEFORE STARTING... 3 ACCESSING THE ONLINE APPLICATION...

More information

IHS Standards Expert FAQs

IHS Standards Expert FAQs IHS Standards Expert FAQs New IHS Standards Expert FAQs based on Customer First surveys How can I find out what is part of my subscription? How do I know what I have access to? There are two easy ways

More information

Metrics that Matter Setup. v12.7

Metrics that Matter Setup. v12.7 Metrics that Matter Setup v12.7 Metrics That Matter Setup Page 2 of 16 Contents Client Settings... 3 Supported Browser Configurations... 3 Screen Resolution... 3 Smartphone Device Support... 4 Pop-Up Blocker

More information

AT&T Toggle. 12/12/2013 Page i

AT&T Toggle. 12/12/2013 Page i Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle Messaging...

More information

BROWSER TIPS FOR PEOPLESOFT USER GUIDE

BROWSER TIPS FOR PEOPLESOFT USER GUIDE BROWSER TIPS FOR PEOPLESOFT USER GUIDE If you have questions about information in this document, or, if after reading it, you cannot find the information you need, please submit a help desk ticket in Footprints.

More information

Workshare Desktop App. User Guide

Workshare Desktop App. User Guide Workshare Desktop App User Guide February 2018 Workshare Desktop App User Guide Table of Contents Introducing the Workshare Desktop App...4 What is the Desktop App?... 5 Key features of the Workshare desktop

More information

mytsa Knowledge Technical Guide

mytsa Knowledge Technical Guide mytsa Knowledge Technical Guide mytsa Knowledge Target Audience: All Partners using mytsa Knowledge Overview: To facilitate the learning process on mytsa Knowledge, all partners are advised to install

More information

Production Assistance for Cellular Therapies (PACT) PACT Application System User s Guide

Production Assistance for Cellular Therapies (PACT) PACT Application System User s Guide Production Assistance for Cellular Therapies (PACT) PACT Application System User s Guide Version 1.0 February 9, 2017 Version 1.0 TABLE OF CONTENTS 1.0 Getting Started... 1 1.1 Access to the Internet...

More information

GROUPWISE INSTRUCTIONS

GROUPWISE INSTRUCTIONS Viewing the GroupWise Home Desktop From the Folder List on the left-hand side of the screen, [Click] on the yourname HOME FOLDER The Home view provides panels of shortcut views which can be customized.

More information

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1 Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...

More information

BASIC NAVIGATION & VIEWS...

BASIC NAVIGATION & VIEWS... Content Overview VISUAL TOUR... 5 NEW FEATURES IN OUTLOOK 2010... 6 BASIC NAVIGATION & VIEWS... 7 SETTING PREFERENCES... 7 Creating an Outlook Shortcut... 7 Choosing a Startup View... 7 CUSTOMIZING INBOX

More information

Content Publisher User Guide

Content Publisher User Guide Content Publisher User Guide Overview 1 Overview of the Content Management System 1 Table of Contents What's New in the Content Management System? 2 Anatomy of a Portal Page 3 Toggling Edit Controls 5

More information

Page Topic 02 Log In to KidKare 02 Using the Navigation Menu 02 Change the Language

Page Topic 02 Log In to KidKare 02 Using the Navigation Menu 02 Change the Language Page Topic 02 Log In to KidKare 02 Using the Navigation Menu 02 Change the Language help.kidkare.com 03 Enroll a Child 03 Withdraw a Child 03 View Pending and Withdrawn Children 04 View Kids by Enrollment

More information