Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
governance [2024_03_04 17:51] – steven | governance [2024_03_18 21:09] – [1 User Management] steven | ||
---|---|---|---|
Line 4: | Line 4: | ||
===== 1 User Management ===== | ===== 1 User Management ===== | ||
- | {{ :: | + | {{ :: |
Users and user roles can be controlled directly by the Cloud Administrator when setting up the Cloud File Server. | Users and user roles can be controlled directly by the Cloud Administrator when setting up the Cloud File Server. | ||
Line 14: | Line 14: | ||
Once shared folders for the Cloud File Server have been added, the Cloud File Server Admin can control access to folders and sub folders using an access control list. If a user has no permission to a folder the folder is not displayed at all in their file tree. | Once shared folders for the Cloud File Server have been added, the Cloud File Server Admin can control access to folders and sub folders using an access control list. If a user has no permission to a folder the folder is not displayed at all in their file tree. | ||
- | FAQ: We often get asked if we support Active Directory integration. We support Active Directory integration, | + | FAQ: We often get asked if we support Active Directory integration. We support Active Directory integration, |
Line 20: | Line 20: | ||
- | {{ :: | + | {{ :: |
The Access Anywhere Admin can setup Audit Watch notifications. Notifications are based upon rules that are invoked on file events. If a file of a certain description, | The Access Anywhere Admin can setup Audit Watch notifications. Notifications are based upon rules that are invoked on file events. If a file of a certain description, | ||
Line 79: | Line 79: | ||
Click on Archive to proceed or Cancel to cancel. | Click on Archive to proceed or Cancel to cancel. | ||
- | If you proceed a background task will be created which will create a zip file containing the audit log entries. | + | If you proceed a background task will be created which will create a zip file containing the audit log entries. |
- | {{ : | + | |
+ | {{ : | ||
+ | |||
+ | Audit logs archives will be placed by the background task in an Audit logs Archive directory in the admin' | ||
+ | |||
+ | {{ : | ||
- | Audit logs archives will be placed by the background task in an Audit logs Archive directory in the admin' | ||
- | {{ : | ||
Select Erase Logs from the pulldown menu to erase old audit log entries. | Select Erase Logs from the pulldown menu to erase old audit log entries. | ||
<WRAP center round important 60%> | <WRAP center round important 60%> | ||
When you erase audit log entries they will no longer be available from Access Anywhere. | When you erase audit log entries they will no longer be available from Access Anywhere. | ||
</ | </ | ||
- | When you erase audit log entries, only entries from before a date that you select will be erased: | + | When you erase audit log entries, only entries from before a date that you select will be erased: |
- | {{ : | + | |
+ | {{ : | ||
After you have selected the date click on Erase to proceed or click on Cancel if you have changed your mind. | After you have selected the date click on Erase to proceed or click on Cancel if you have changed your mind. | ||
=== Tracing Downloads by Watermark === | === Tracing Downloads by Watermark === | ||
- | The Access Anywhere provides a [[watermarking|]] feature that affixes a random watermark code to downloaded PDF files. You may sometimes want to learn the details of when a watermarked file was downloaded. | + | The Access Anywhere provides a [[watermarking|]] feature that affixes a random watermark code to downloaded PDF files. You may sometimes want to learn the details of when a watermarked file was downloaded. |
- | {{ : | + | |
- | This will take you to the Watermarking Logs page: \\ \\ | + | {{ :cloudappliance: |
- | {{ : | + | This will take you to the Watermarking Logs page: |
+ | |||
+ | {{ : | ||
When this page loads it displays a list of all watermarked file downloads in reverse chronological order. | When this page loads it displays a list of all watermarked file downloads in reverse chronological order. | ||
Line 105: | Line 111: | ||
[[cloudappliance/ | [[cloudappliance/ | ||
+ | |||
===== 6 Recording GEO locations ===== | ===== 6 Recording GEO locations ===== | ||
- | + | {{ : | |
- | {{ : | + | |
GEO locations are recorded with regards to where a file was uploaded from and also where a file was uploaded to. This can ensure companies comply with electronic data laws and international compliance regimes | GEO locations are recorded with regards to where a file was uploaded from and also where a file was uploaded to. This can ensure companies comply with electronic data laws and international compliance regimes | ||
Line 115: | Line 121: | ||
===== 7 Disable File Sharing ===== | ===== 7 Disable File Sharing ===== | ||
- | |||
- | |||
{{ :: | {{ :: | ||
- | \\ \\ | ||
The Access Anywhere Admin can disable any sharing or collaboration features of Access Anywhere entirely by disabling the ability for any user to do any form of file sharing or collaboration from Access Anywhere policies page. | The Access Anywhere Admin can disable any sharing or collaboration features of Access Anywhere entirely by disabling the ability for any user to do any form of file sharing or collaboration from Access Anywhere policies page. | ||
===== 8 Controlling User Access to Storage ===== | ===== 8 Controlling User Access to Storage ===== | ||
- | |||
- | |||
{{ :: | {{ :: | ||
- | \\ \\ | ||
As the Organization, | As the Organization, | ||
Line 137: | Line 137: | ||
===== 9 Encryption options ===== | ===== 9 Encryption options ===== | ||
- | {{:/ | + | {{:/ |
Cloud Admins can choose for all files to be encrypted when stored on private / cloud storage. This encryption is AES 256 bit military grade encryption. | Cloud Admins can choose for all files to be encrypted when stored on private / cloud storage. This encryption is AES 256 bit military grade encryption. | ||
Line 146: | Line 146: | ||
===== 10 File versioning Options ===== | ===== 10 File versioning Options ===== | ||
- | {{:/ | + | {{:/ |
To ensure the lifecycle of a file is tracked then file versioning can be turned " | To ensure the lifecycle of a file is tracked then file versioning can be turned " | ||
Line 157: | Line 157: | ||
* [[geoip|IP white listing / black listing]] | * [[geoip|IP white listing / black listing]] | ||
* [[antivirus|Virus Scanning Protection]] | * [[antivirus|Virus Scanning Protection]] | ||
- | * [[ransomwareprotection|Ransomware Protection]] | ||
* [[watermarking|Watermarking Documents]] | * [[watermarking|Watermarking Documents]] |