FAQ

   


FAQs by Category 

Installation Guide



 
 
FAQ No.:00337 
Category:Installation 

 
Question:Checklist before implementing Curtain e-locker
 
Answer:Target audience: Project manager

Objective of this FAQ: collect user's requirements and propose system design according to the requirements

Questions to the Customer:
1. What is purpose of the Curtain e-locker project? Prevent internal users to leak sensitive data out of the company? Or focus on logging?
2. What kind of files/systems do you want to apply e-locker protection? Please list out one by one in details:
      a. Name of the files/systems (e.g. ERP system)
      b. Where are the files/data stored? (e.g. server and user's PCs)
      c. If there are servers, how many servers? Please list out server information in details:
          i. OS and its version
          ii. Location
          iii. If the data is stored in database, which database and its version?
          iv. Any share folder you want to protect?
          v. Antivirus
      d. How many user's PCs using the files/system? Please list out user's PCs in details:
          i. OS and its version
          ii. Location
          iii. Which application do the users use to access the files/systems in server? (e.g. ERP rich client and web interface), please list of all the applications and their versions
          iv. Antivirus
      e. How many users use the files/systems?
      f. How do they work with the files/systems? (e.g. generate reports and download the reports to their PCs)
      g. Do they need to share the files/data with external parties? Or share with colleagues only?
      h. For the users they need to share with external parties, how frequent do they share the files/data with external parties? If there are different user groups, please specify.
      i. Any servers/users/PCs need to bypass e-locker to access the protected server's data? (e.g. backup, replication) If yes, please specific.