FAQ
   
FAQs by Category 

Installation Guide


Previous Next Expand Collapse Search


ChapterCan be sorted ascendingFAQCan be sorted ascendingQuestionSorted ascending
1.5-About Curtain e-locker
4.200069Activate Curtain e-locker
9.100206Allow protected files copy/send out of protected zone
1.5.200063Architecture of Curtain e-locker
5.500086Assign workstations/users to Control Policy Group
6.0800079Audit Trail
1.300058Backend systems(e.g. Windows file server) also have access control. Why do we need Curtain e-locker?
7.300127Backup and restore Curtain Admin policies and audit log manually
1.5.100011Basic Controls of Curtain e-locker
9-Best Practice
1.100095Challenges on Data Leakage
6.1500225Change or reset login password for Curtain Admin, Server Plug-in and Client
2.4.400193Change Tomcat Port 8005 for Curtain Server Plug-in
2.4.300202Check whether Tomcat Port 8005 is occupied on Curtain Server Plug-in
1.5.300052Components of Curtain e-locker
5-Configurations
5-Configurations
5.200084Configure Control Policy Group
5.100082Create Control Policy Group
6.1200216Create shortcut for protected application
2.300078Curtain Basic Access Rights
1.5.400037Curtain Protected Zone
5.600085Define Protected Server Resources
5.900207Disable protection temporarily
8.300036Enable/disable Curtain Debug Log
5.8.100183Exception Rule
5.8-Exception Rule
8-Frequently Asked Questions
8.400214Generate unique token for cloned Curtain Client
5.400211Grant control policy by user/user group
 
Previous Next Expand Collapse Search