Chapter | FAQ | Question |
1 | - | Introduction |
1 | - | Introduction |
1.5 | - | About Curtain e-locker |
2 | - | Preparation before Installation |
2 | - | Preparation before Installation |
2.2 | - | System Requirements |
2.4 | - | Open Port for Curtain e-locker |
3 | - | Installation |
3 | - | Installation |
4 | - | Product Activation |
4 | - | Product Activation |
5 | - | Configurations |
5 | - | Configurations |
5.8 | - | Exception Rule |
6 | - | Other Features |
7 | - | Ongoing Maintenance |
8 | - | Frequently Asked Questions |
9 | - | Best Practice |
1.3 | 00058 | Backend systems(e.g. Windows file server) also have access control. Why do we need Curtain e-locker? |
6.08 | 00079 | Audit Trail |
8.4 | 00214 | Generate unique token for cloned Curtain Client |
6.05 | 00013 | Smart Copy-and-Paste Control |
6.04 | 00076 | Screen Capture Protection |
6.06 | 00077 | Secure Print-to-PDF |
1.5.2 | 00063 | Architecture of Curtain e-locker |
4.2 | 00069 | Activate Curtain e-locker |
9.1 | 00206 | Allow protected files copy/send out of protected zone |
7.1 | 00031 | Patch Management |
5.5 | 00086 | Assign workstations/users to Control Policy Group |
8.1 | 00205 | How to avoid conflict with Antivirus ? |