Jumble Encryption for Microsoft Outlook
|
|
- Hilary Floyd
- 5 years ago
- Views:
Transcription
1 Jumble Encryption for Microsoft Outlook Jumble provides truly usable and secure encryption by integrating with existing clients. Users can easily and securely communicate from their client simply by clicking the Secure Send button as Jumble integrates at the client level. Jumbles easy and cost-effective to set-up as it removes the need for significant capital outlay normally required for deployment and management of enterprise and/or gateway-based encryption products. Jumble performs encryption and decryption at the client level and therefore provides full endto-end encryption of data. Jumble secures both data and file attachments. Jumble users do not need to manage cryptographic keys, nor do they need to be registered to receive a Jumble encrypted . Jumble does not store any client data, nor does it not have access to the encryption keys. NOTE: THIS DOCUMENT APPLIES TO JUMBLE FOR OUTLOOK, VERSION 3.3 System Requirements Jumble recommends using Microsoft Windows 7 or later. Jumble supports the following versions of Microsoft Outlook: Microsoft Outlook 2010 Microsoft Outlook 2013 Microsoft Outlook 2016 Microsoft Outlook Office365
2 Installation Instructions To install Jumble follow these steps: 1. Download the installation file from the Jumble website: 2. Ensure Outlook is not running, close it if it s open. 3. Once the setup.exe file has downloaded, double click it to start the installation and follow the on-screen instructions the installer may prompt you to accept the terms and conditions (also available here: and install additional required libraries from Microsoft, accept the prompts and the installation will complete. Figure 1 - Installation Dialog 4. Once the setup has finished open Outlook. Figure 2 - Outlook Start Screen 2 P age
3 Login to Jumble To send secure s in Outlook you will need to login to Jumble, follow these steps to login: 1. Along the top menu bar you will notice an item labelled ADD-INS, select the ADD-INS menu to access the Jumble menu. Figure 3 - Outlook Menu with Add-Ins 2. Then click the Jumble icon. Figure 4 - Jumble Menu Item in Outlook 3. You will then be prompted to login to your Jumble account; if you don t already have a account you can register for free by clicking the Sign Up button. Figure 5 - Jumble Login Screen 3 P age
4 Upon successful login you will see a dialog similar to the one below, showing your address, account status and Jumble plan name. This dialog window can now be closed. If the Jumble account has not been activated the account status will show as INACTIVE to activate the Jumble account, simply click the link in the activation you received during the registration process (if you didn t receive this you can re-send it from the Jumble website); once completed, you can logout of Jumble (within the Outlook dialog) and log-in and now your status will show as ACTIVE. Figure 6 Jumble Account Screen 4 P age
5 Sending a secure Sending a secure is as easy as sending a regular , you simply need to choose to send securely: 1. Click New as normal Figure 7 - Outlook Menu 2. Compose your ; Jumble also supports secure attachments, add attachments using the Attach File menu item as normal, if required 3. When ready to send the , simply click Secure Send rather than Send and the will be encrypted within Outlook before leaving your computer Figure 8 - Jumble Secure Send Button in Outlook Menu 5 P age
6 Reading a secure MS Outlook Users with Jumble Installed When logged-in to Jumble all encrypted s received will automatically decrypt as they are opened. You will notice the message Message secured by Jumble added to the bottom of each decrypted . If there s an encrypted attachment you simply need to double-click (or right-click) the file to save it, Jumble will decrypt the file before it is saved you can then open the file as normal. Figure 9 - A Decrypted 6 P age
7 Reading a secure Not an Outlook User If you re not a MS Outlook user or it s not possible to install Jumble software on your computer, please follow these steps to decrypt and access secure s: Click the 'Read ' button in the encrypted you have just received This will take you to the Jumble website where you will need to login if you have an account, or register if you don't have an account o Note: registration simply allows us to verify you are the owner of the recipient address and are authorised to access the encrypted Once logged-in, you'll be redirected to the Decrypt page (or click the 'Decrypt' link in the header menu) Simply copy the entire encrypted you received and paste in to the text box on screen and click the 'Decrypt' button At this point you'll be asked to reconfirm your password and then the will be decrypted and shown on-screen 7 P age
8 Decrypting Attachments Not an Outlook User If the encrypted contained attachments you'll be notified in the box at the bottom-left of the screen (see above) To decrypt the attachments, save them from the original to your local computer (rightclick and choose Save As or click to download) Back on the Decrypt page, click 'Add attachment' on the right of the screen and select the files you saved that need to be decrypted Click the 'Decrypt' button again and the attachments will be shown on the bottom-left of the screen, click the filename to download the decrypted attachments 8 P age
9 Revoking (recalling) and expiring encrypted s Using Jumble, users can revoke/recall or expire an . To revoke an , click on the Sent Items folder and select the you want to revoke, then click the Revoke button. Once this happens the recipient will no longer have access to the encrypted they will be notified that the sender has revoked the . Figure 10 Revoking an 9 P age
10 To expire and , simply click Set Expiry Time and then select the date and time after which the recipient can no longer view the encrypted . Once the has expired the recipients will not be able to access the they will be notified that the has expired.\ Figure 11 Setting to expire 10 P age
11 When the user is not logged-in to Jumble (or if you re logged-in to the wrong Jumble account) It may happen where an encrypted is sent to a user who: does not have Jumble installed; is a registered user, but is using an client currently not supported by Jumble; or has multiple and Jumble accounts and is logged-in to a Jumble account that is for a different address. Each address must have an associated Jumble account. When this happens the user will receive a message as shown in figure 12. Figure 12 - A Jumble Encrypted This can be decrypted by installing Jumble software and logging-in using the appropriate Jumble account, or the user can decrypt this on the Jumble website. 11 P age
Jumble for Microsoft Outlook
Jumble for Microsoft Outlook Jumble provides truly usable and secure email encryption by integrating with existing email clients. Users can easily and securely communicate from their email client simply
More informationWebsense Secure Messaging User Help
Websense Secure Messaging User Help Welcome to Websense Secure Messaging, a tool that provides a secure portal for the transmission and viewing of sensitive, personal data in email. Use the portal to view
More informationTo: Proofpoint Protection Server administrators From: Proofpoint Re: Informing your user community about encrypting and decrypting secure
To: Proofpoint Protection Server administrators From: Proofpoint Re: Informing your user community about encrypting and decrypting secure email This memo describes how to use Proofpoint Encryption to send
More informationVanguard Secure Service (VSES) User Guide
Vanguard Secure Email Service (VSES) User Guide Enterprise Security and Fraud October 20, 2017 Contents Guide for Users of Secure Email From Vanguard 1 View Secure Email 1 New Registration 3 Compose a
More informationChanging Settings for ViewMail for Outlook (Version 8.0 Only)
Changing Settings for ViewMail for Outlook Note This content applies to ViewMail for Outlook version 8.0 only. For later ViewMail versions, see the Quick Start Guide for Cisco ViewMail for Microsoft Outlook
More informationSubscription Item Administrator s Guide
Table of Contents Introduction... 2 What is GovDelivery?... 2 What is Email Subscription?... 2 How Does It Work?... 2 What is an Item Administrator?... 2 Logging into GovDelivery... 3 Logging Out of GovDelivery...
More informationIntroduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired...
WEB MESSAGE CENTER END USER GUIDE The Secure Web Message Center allows users to access and send and receive secure messages via any browser on a computer, tablet or other mobile devices. Introduction...
More informationSharePoint. Team Site End User Guide. Table of Contents
Table of Contents Introduction... 1 Logging in for the First Time:... 1 Areas of the team site:... 2 Navigating the team site:... 3 Adding Content to the team site:... 3 The Ribbon:... 3 Adding a Link:...
More information1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to
VMWare AirWatch User Guide for Web Browser You can access your AirWatch Files from a web browser. How to login AirWatch Cloud Storage? 1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari)
More informationSecure File Transfer External User Guide. Guidance for 3 rd Party Recipients of Secure File Transfers from Lloyds Banking Group
Secure File Transfer External User Guide Guidance for 3 rd Party Recipients of Secure File Transfers from Lloyds Banking Group Version: 3.0 Last updated: 28/09/2017 This user guide is intended for unregistered
More informationDigital Certificate Service (DCS) - User Guide
Digital Certificate Service (DCS) - User Guide Information Security Branch Contents Using this Guide... 3 User Requirements... 3 Secure E-mail Messaging... 4 Send a Secure E-mail Message... 4 Receive a
More informationExchange Address Book Order
Exchange Address Book Order From your Outlook Ribbon, locate the Address Book Click on Tools, Options 3 options are available, as shown below, select Custom to arrange the order of your address books.
More informationWeb Outlook. Tenafly Technology Department
Tenafly Technology Department Web Outlook If you would like to begin using the Web-based Outlook service to check your email remotely, you can do so immediately by visiting the Tenafly School District
More informationWindows User Manual 1
Windows User Manual 1 Creating and Installing a Dropbox Account... 3 How to Create a Dropbox Account... 3 How to Install Dropbox... 3 How to Register and Sign into Dropbox... 3 Install and Register for
More informationContents. Egress Switch Administration Panel User Guide. Switch Administration Panel- Quick Start Guide
Electronic Version Switch Administration Panel- Quick Start Guide Contents Contents... 1 Installing Switch to User s Machines... 2 Adding Organizational Units... 3 Inviting Users... 4 Egress Switch Administration
More informationUSER GUIDE. EBMS SECURE MailGate
USER GUIDE EBMS SECURE EMAIL MailGate USER REGISTRATION When a secure email is sent to a new user, Secure Mailbox generates a notification and sends it to their email account. The notification contains
More informationConfiguring Microsoft Outlook to Connect to Hosted Exchange Service
Configuring Microsoft Outlook to Connect to Hosted Exchange Service Configuring Microsoft Outlook for Hosted Exchange Service Version: 1.0 Updated on: April 27, 2011 Page 1 of 7 TABLE OF CONTENTS Configuring
More informationTelephony Toolbar Enterprise. User Guide
Telephony Toolbar Enterprise User Guide Release 4.4 October 2009 Table of Contents 1 Summary of Changes... 7 1.1 Changes for this Release... 7 2 About This Guide... 8 2.1 Open Telephony Toolbar-Corporate...
More informationMulti-factor Authentication Instructions
What is MFA? Multi-factor Authentication (MFA) is a security measure to confirm your identity in addition to your username and password. It helps in the prevention of unauthorized access to your account.
More informationADP Secure Client User Guide
March 2018 ADP Secure Email Client User Guide A guide to exchanging secure emails using the HPE Voltage SecureMail TM System Version 2.2 The ADP logo and ADP are registered trademarks of ADP, LLC. ADP
More informationWindows user guide for version 3.3
1 Windows user guide for version 3.3 2 Contents 1. Installation...4 1.1. How to install BABEL on your Windows desktop...4 2. Getting started...5 2.1. First run...5 2.2. Password setup...5 2.3. Key import...5
More informationProtected Attachment Repository Uses for PEAR Alternatives to PEAR Notifications Addresses...
Table of Contents Protected Email Attachment Repository... 5 Uses for PEAR... 5 Alternatives to PEAR... 6 Email Notifications... 6 Email Addresses... 6 Requirements... 7 User Agents and Operating Systems...
More informationEasiShare ios User Guide
Copyright 06 Inspire-Tech Pte Ltd. All Rights Reserved. Page of 44 Copyright 06 by Inspire-Tech Pte Ltd. All rights reserved. All trademarks or registered trademarks mentioned in this document are properties
More informationCommunication. Identity
Mailock User guide OUR MISSION STATEMENT To Secure your Communication Data Identity Contents Introducing Mailock... 5 Business Users... 5 What do you need to run Mailock?... 5 In a browser... 5 On a mobile
More informationUSB 2.0 Ultimate Card Reader
Manual USB 2.0 Ultimate Card Reader english Manual_Page 2 Content 1. Installation 3 2. Functions of Application Software 4 A. The File Management Function 4 B. The File-Security Function 4 C. The Private
More informationKean University. System Guide. cougar.kean.edu. Your window to the world
Kean University E-Mail System Guide cougar.kean.edu www.kean.edu Your window to the world USING KEAN UNIVERSITY E-MAIL SYSTEM (COUGAR) This document is divided into three sections: Messenger Express Basics:
More informationFlex Supplier Portal How to use Flex Supplier Portal
Flex Supplier Portal How to use Flex Supplier Portal TABLE OF CONTENT TABLE OF CONTENT... 2 Introduction... 4 How to access Flex Portal... 5 OKTA account registration... 5 How to login OKTA (After registration)...
More informationEntrust Cloud Enterprise. Enrollment Guide
Entrust Cloud Enterprise Enrollment Guide Entrust Cloud Enterprise Enrollment Guide Document issue: 1.0 Copyright 2016 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of
More informationOutlook Guide. Microsoft Outlook User Guide. Desktop App. Enterprise Application Systems INFORMATION TECHNOLOGY
INFORMATION TECHNOLOGY Enterprise Application Systems Microsoft Outlook User Guide Outlook Guide Desktop App Mt. San Antonio College Information Technology 1100 North Grand Avenue Building 23 Walnut, CA
More informationMobile Client. User Manual. Version: 2.0.0
Mobile Client User Manual Version: 2.0.0 Index Sr. No. Topic Page 1 Requirement 3 2 How to use Mobile Client 4 3 Compose Message 5 4 Select Contacts 6 5 Manage Contacts 17 6 Manage Distribution List 23
More informationOUTLOOK ATTACHMENT EXTRACTOR 3
OUTLOOK ATTACHMENT EXTRACTOR 3 PROGRAM HELP GILLMEISTER SOFTWARE WWW.GILLMEISTER-SOFTWARE.COM 1 TABLE OF CONTENTS 1 Table of contents... 1 2 Start... 4 3 Main menu... 4 3.1 Menu entries of the group Menu...
More informationAustralia Online Forms for Research Software User Manual
Australia Online Forms for Research Software User Manual Version 1.3 Released 21 August 2010 2 P a g e A u s t r a l i a O n l i n e F o r m s f o r R e s e a r c h Contents 1. Introduction 5 2. Getting
More informationTurnkeyMail 7.x Help. Logging in to TurnkeyMail
Logging in to TurnkeyMail TurnkeyMail is a feature-rich Windows mail server that brings the power of enterprise-level features and collaboration to businesses and hosting environments. Because TurnkeyMail
More informationPage 1 of 20. Agent Portal v2.0. Training Guide
Page 1 of 20 Agent Portal v2.0 Training Guide Welcome to Agent Portal v2.0 Page 2 of 20 What is Agent Portal? Agent Portal is your gateway to all things AUI. As an appointed agent, you will have access
More informationPKI Contacts PKI for Fraunhofer Contacts
Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 03.02.2017
More informationStarting ParTEST. Select Start, Programs ParTEST ParTEST Enter your User Name and password
Starting ParTEST User Login Select Start, Programs ParTEST ParTEST Enter your User Name and password If you still logged into ParTEST as the Administrator Select File, Logout. Enter your User name and
More informationNTP Software Quota & File Sentinel
NTP Software Quota & File Sentinel Version 4.0 Installation and User s Guide ii Copyright Copyright 2002 NTP Software. All rights reserved. Quota & File Sentinel, Enterprise Application Services Extension,
More informationGetting Started Guide
Getting Started Guide November 2017 2 Table of Contents 1.0 Introduction to Your Vitrium Security Account... 3 1.1 About Vitrium Security... 3 1.2 Definition of Key Terms... 3 1.3 Overview of the Main
More informationncrypted Cloud works on desktops and laptop computers, mobile devices, and the web.
OS X User Manual Welcome to ncrypted Cloud! ncrypted Cloud is a Security Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the
More informationWeb-based Interface User Guide
Web-based E-mail Interface User Guide www.twcbc.com back back to TOC to TOC Header Table Text of Contents and Info Table Of Contents Login 3 Composing a Mail Message 4 Creating a Contact 6 Creating a Folder
More informationProcedures and Steps for Receiving a New CAC at the Detroit Arsenal
Procedures and Steps for Receiving a New CAC at the Detroit Arsenal (And what to do after you ve received your CAC) Table of Contents Before Making your CAC Appointment:... 2 Schedule CAC Renewal... 2
More informationSecure Recipient Guide
Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...
More informationInstruction Manual "Schaeffler FileExchange" Solution. Instruction Manual: "Schaeffler FileExchange" Solution
Instruction Manual "Schaeffler FileExchange" Solution Instruction Manual: "Schaeffler FileExchange" Solution Brief Description This instruction manual describes how you can use the Schaeffler FileExchange
More informationWelcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...
Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted
More informationQuestionnaire 4.0 Setup Guide 2006/4/14
Email Questionnaire 4.0 Setup Guide 2006/4/14 Introduction Email Questionnaire is an interactive email survey system. Unlike other on-line questionnaire systems that need a web server to construct, distribute
More informationNETWRIX PASSWORD EXPIRATION NOTIFIER
NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationFile Fetch User s Manual
File Fetch User s Manual Welcome... 2 Configuring the Add-in... 3 File Fetch Settings... 3 File Fetch Example... 4 Troubleshooting... 5 File Fetch Copyright 2008 Sperry Software Inc. P a g e 1 Welcome
More informationA Guide for Customer Accounts
A Guide for Customer Accounts Introduction This document contains set up and configuration guides for ODDS Customer Accounts. This manual helps to assist customers with the setup of their ODDS account,
More informationOYSTOR USER ADMIN GUIDE
OYSTOR USER ADMIN GUIDE CONTENT 1. CREATING NEW USERS IN YOUR ACCOUNT 2. CREATING GROUPS OF CONTACTS 3. SETTING ACCESS RIGHTS ON SHARED FOLDERS 4. YOUR OYSTOR ACTIVITY PAGE 5. BACKUP ALL THOSE IMPORTANT
More informationWeb Mail Check v 1.0
Web Mail Check v 1.0 TABLE OF CONTENTS LAUNCHING WEB MAIL CHECK... 3 HOME PAGE... 4 LOG IN... 4 LANGUAGE... 5 DIRECTIONS... 5 READING MESSAGES... 8 HEADERS... 10 PRINTER FRIENDLY VERSION... 11 REPLYING
More informationHitachi High Technologies America, Inc. Password Policy
Hitachi High Technologies America, Inc. Password Policy Revision Date: 4/17/2015 Table of Contents Table of Contents...2 Overview...3 Scope. 3 Guidelines...3 A. General Password Construction Guidelines...3
More informationOffice 365. Exporting and Importing Safe and Blocked Senders List
Office 365 Exporting and Importing Safe and Blocked Senders List Table of Contents Exporting Safe and Blocked Senders List... 3 Exporting Safe Senders List... 3 Exporting Blocked Senders List... 8 Importing
More informationAriba Sourcing Event Evaluator Getting Started Guide
What is the Ariba Sourcing? Ariba Sourcing is a project management application designed specifically for online competitive bidding. Buyers at the University of Washington who create Sourcing Projects
More informationNoSpamProxy 12.1 Installation Manual. Protection Encryption Large Files
NoSpamProxy 12.1 Installation Manual Protection Encryption Large Files Imprint All rights reserved. The manual and the depicted programs are copyrighted products of Net at Work GmbH, Paderborn, Germany.
More informationEnd User Manual. December 2014 V1.0
End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How
More informationCCIS. Critical Care Information System. Login Guide. Version /12/2015. Prepared By: CCIS Provincial Implementation Team.
CCIS Critical Care Information System Login Guide Version 11.0 12/12/2015 Prepared By: CCIS Provincial Implementation Team CritiCall Ontario Table of Contents 1. How to Login to CCIS for the first time?...
More informationBarracuda Security Gateway User 's Guide 6 and Above
Barracuda Email Security Gateway User 's Guide 6 and Above This guide describes how you can use the Barracuda Email Security Gateway web interface to: Check your quarantined messages Classify messages
More informationAccessMail Users Manual for NJMLS members Rev 6
AccessMail User Manual - Page 1 AccessMail Users Manual for NJMLS members Rev 6 Users Guide AccessMail User Manual - Page 2 Table of Contents The Main Menu...4 Get Messages...5 New Message...9 Search...11
More informationWAM!NET Submission Icons. Help Guide. March 2015
WAM!NET Submission Icons Help Guide March 2015 Document Contents 1 Introduction...2 1.1 Submission Option Resource...2 1.2 Submission Icon Type...3 1.2.1 Authenticated Submission Icons...3 1.2.2 Anonymous
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationMulti-factor Authentication Instructions
What is MFA? (MFA) is a security measure to confirm your identity in addition to your username and password. It helps in the prevention of unauthorized access to your account. MFA authentication is typically
More informationUnipass Secur Client FAQ Document v1.2. This document a summary of some of the most common questions asked about the Unipass Secur client.
Unipass Securemail Client FAQ Document v1.2 This document a summary of some of the most common questions asked about the Unipass Securemail client. UIdP Project Team May 2016 Contents Section 1 - Unipass
More informationishipdocs User Guide
ishipdocs User Guide 11/8/2016 Disclaimer This guide has been validated and reviewed for accuracy. The instructions and descriptions it contains are accurate for ishipdocs. However, succeeding versions
More informationUser Manual Documentation
User Manual Documentation Overview Dated: 10 th February 2018 Webmail is essentially using a web browser, such as Internet Explorer or Firefox, to access your Email account. The advantages of such a system
More informationOffice 365. Send and Retrieve Protected s
Office 365 Send and Retrieve Protected Emails Table of Contents Sending Protected Emails... 3 Outlook 2013 or Outlook 2016 for PC... 3 Outlook 2016 for Mac... 4 Outlook Web App (http://email.miami.edu)...
More informationNokia E61i support
Nokia E61i Nokia E61i Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior
More informationTradeGuider VSA Plug-in for NinjaTrader quick install and setup guide.
TradeGuider VSA Plug-in for NinjaTrader quick install and setup guide. Introduction. This short guide will help you to download and install the TradeGuider VSA Plug-in for the NinjaTrader platform. This
More information13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3.
SECURE ACCESS MAN AG E R FIRST TIME LOGIN GUIDE A U T H O R : E X O S T A R D ATE: M A R C H 2 0 1 5 V E R S I O N : 3.0 1 S E C U R E A CCESS M A N A G E R SECURE ACCESS MANAGER OVERVIEW... 3 SUMMARY...
More informationJiJi Technologies JiJi Password Expiration Notification User Manual
JiJi Technologies JiJi Password Expiration Notification User Manual Page 02 Contents OVERVIEW...3 FEATURES...3 SYSTEM REQUIREMENTS...3 INSTALLATION...4 WORKING WITH JiPEN...7 Create Notification...7 Configure
More informationWEBppliance for Windows User Administrator's Help
WEBppliance for Windows User Administrator's Help September 23, 2003 Contents About This Document...3 How to use this Help system...4 Getting started...6 What to do first... 6 Viewing your account settings...
More informationPortal/Extranet User Guide for Clients
Portal/Extranet User Guide for Clients Welcome to the ichannel Portal/Extranet. This guide will walk you through logging into your personalized, secure portal/extranet site. It will also show you how to
More informationThis help covers the ordering, download and installation procedure for Odette Digital Certificates.
This help covers the ordering, download and installation procedure for Odette Digital Certificates. Answers to Frequently Asked Questions are available online CONTENTS Preparation for Ordering an Odette
More informationSophos Mobile Control SaaS startup guide. Product version: 7
Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login
More informationDocuSign Workflow Owner (RSA/Post-Award Analyst) User Guide
DocuSign Workflow Owner (RSA/Post-Award Analyst) User Guide Topics: Assigning Single Approver and Optional Note Adding Additional Workflow Tracking the Status of an Envelope* Receiving Completion or Declination
More informationSP Widget V3.0 User Manual. SP Widget V3.0 User Manual
SP Widget V3.0 User Manual 1 Table of Contents 1. Intellectual Property & Copy Rights.....4 2. Product Introduction...5 3. System Requirements.. 5 4. Introduction..6 4.1 Activate SP Widget.6 4.2 Browser
More informationUser Guide. BlackBerry Workspaces for Windows. Version 5.5
User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing
More informationAndroid User Guide. for version 5.3
Android User Guide for version 5.3 Contents 1. Installation... 3 1.1. How to install Babelnet... 3 1.2. Enter Babelnet in the search field.... 3 1.3. Safety precautions when using Babelnet on your Android...
More informationClick the Options link in the upper right corner of the Outlook Web Access window (see illustration below).
Message Options Click the Options link in the upper right corner of the Outlook Web Access window (see illustration below). In the list that appears, click the See All Options link. The Options window
More informationAttorney Web Inquiry
SPARTAN Technology Solutions The Spartan system allows attorneys to view all warrants on cases assigned to them. Attorneys can find warrants by defendant name, warrant number, indictment number, law enforcement
More informationUser Manual of Webmail Version 5
User Manual of Webmail Version 5 English Version: 1.0 Page 1 of 13 TABLE OF CONTENTS 1. ACCESS...3 1.1 Accessing to Webmail 5...3 2. COMPOSE AND SEND E-MAIL MESSAGE...4 2.1 Composing a new E-mail message...4
More informationTIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide
TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide Software Release 8.1 March 2018 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES
More informationM+NetMail Client User Guide
M+NetMail Client User Guide Trademarks...M+NetMail TM, MyRealBox Apple Inc....Safari Microsoft Corporation...Outlook Express Mozilla... Thunderbird Novell, Inc...GroupWise QUALCOMM... Eudora Copyright
More informationDepartment of Technology MEDIA EXCHANGE WEB APPLICATION USER MANUAL
Department of Technology MEDIA EXCHANGE WEB APPLICATION USER MANUAL 1 Contents: MediaShuttle Transfer Application Configuration Settings and Internet Browser Settings.... 3 Firewall Settings... 5 Username
More informationSECARDEO. certbox. Help-Manual. Secardeo GmbH Release:
certbox Help-Manual Secardeo GmbH Release: 02.12.2014 certbox Help Manual 02.12.2014 Table of Contents 1 Search and retrieve Public Key Certificates... 1 1.1 Search by an e-mail address... 1 1.2 Download
More informationDiscover IceWarp Server Do Amazing Things Together. Now compatible with: OS X El Capitan, ios 9, Outlook 2016
Discover IceWarp Server 11.4.1 Do Amazing Things Together New TeamChat collaboration tool for teams & projects New WebDocuments for online editing of Office files WebAdmin white labeling for truly personalized
More informationwill be our first year of this service. We ask for your patience as we all learn this new system.
FileDepot Directions Several years ago we decided to put all student recitals on a special drive in our server. This saves space in folders and in storage. Recording Services put them on the server when
More informationVMware Horizon FLEX Client User Guide
Horizon FLEX 1.10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationTaxpayer Enhancements:
Taxpayer Enhancements: 1. Authentication for Business Returns and K-1 Distribution: To enhance security for business returns and K-1 distribution, we have removed the need for the recipients to enter the
More informationPURCHASING AND USING A PERSONAL SECURE CERTIFICATE. Document issue: 12.1 Date of issue: March 2017
PURCHASING AND USING A PERSONAL SECURE EMAIL CERTIFICATE Document issue: 12.1 Date of issue: March 2017 Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
More informationMedia Writer. Installation Guide LX-DOC-MW5.1.9-IN-EN-REVB. Version 5.1.9
Media Writer Installation Guide Version 5.1.9 Regulations and Compliance Tel: 1-844-535-1404 Email: TS_PACSGEAR@hyland.com 2018 Hyland. Hyland and the Hyland logo are trademarks of Hyland LLC, registered
More informationIntegrate Microsoft Office 365. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: March 5, 2017 Abstract This guide provides instructions to configure Office 365 to generate logs for critical events. Once EventTracker is configured to collect
More informationShould you encounter any issues or have questions as you go through this registration process, please send an to:
User Registration In order to use EFIS 2.0, a one-time registration process is required. This document outlines the steps required to register your user account and access EFIS 2.0: This registration process
More informationEnterprise Edge 2.0 Unified Messaging Client Installation Guide
Enterprise Edge 2.0 Unified Messaging Client Installation Guide www.nortelnetworks.com 2000 Nortel Networks P0911954 Issue 01 Contents Chapter 1 Installing Enterprise Edge Unified Messaging Accessories
More informationMEDIASEAL Encryptor Client Manual
MEDIASEAL Encryptor Client Manual May 2018 Version 3.7.1 Fortium Technologies Ltd www.fortiumtech.com Copyright 2018 - Fortium Technologies Ltd Information contained in this document is subject to change
More informationNZ Online Forms for Research Software Manual
NZ Online Forms for Research Software Manual Version 1.5 Released May 2016 2 P a g e N Z O n l i n e F o r m s f o r R e s e a r c h 1 INTRODUCTION... 6 2 GETTING STARTED... 6 2.1 Creating an Account...
More informationSophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 7
Sophos SafeGuard File Encryption for Mac Quick startup guide Product version: 7 Document date: December 2014 Contents 1 About Sophos SafeGuard File Encryption for Mac...3 2 First use...4 3 Working with
More informationBUSINESS CLOUD FAX By Northland Communications
BUSINESS CLOUD FAX By Northland Communications QUICK REFERENCE GUIDE TABLE OF CONTENTS LOGGING INTO THE WEB CLIENT... CREATING + SENDING... HOW TO CREATE + SEND A FAX TO A WEB CLIENT. ADDING ATTACHMENTS...
More informationMoving Forward Together
Moving Forward Together AMITA HEALTH INFORMATION SERVICES EMAIL MIGRATION INFORMATION The purpose of IT integration is to bridge the technology and infrastructure between Adventist Midwest Health sites
More informationOffice365 Outlook. The username is your complete employee number followed
Office365 Outlook Sign In 1. Navigate to the shortcut for Office 365 on your desktop or enter the following url: http://portal.dekalbschoolsga.org. 2. Enter the username and password for your 365 account.
More information