Chapter | FAQ | Question |
1.5 | - | About Curtain e-locker |
4.2 | 00069 | Activate Curtain e-locker |
9.1 | 00206 | Allow protected files copy/send out of protected zone |
1.5.2 | 00063 | Architecture of Curtain e-locker |
5.5 | 00086 | Assign workstations/users to Control Policy Group |
6.08 | 00079 | Audit Trail |
1.3 | 00058 | Backend systems(e.g. Windows file server) also have access control. Why do we need Curtain e-locker? |
7.3 | 00127 | Backup and restore Curtain Admin policies and audit log manually |
1.5.1 | 00011 | Basic Controls of Curtain e-locker |
9 | - | Best Practice |
1.1 | 00095 | Challenges on Data Leakage |
6.15 | 00225 | Change or reset login password for Curtain Admin, Server Plug-in and Client |
2.4.4 | 00193 | Change Tomcat Port 8005 for Curtain Server Plug-in |
2.4.3 | 00202 | Check whether Tomcat Port 8005 is occupied on Curtain Server Plug-in |
1.5.3 | 00052 | Components of Curtain e-locker |
5 | - | Configurations |
5 | - | Configurations |
5.2 | 00084 | Configure Control Policy Group |
5.1 | 00082 | Create Control Policy Group |
6.12 | 00216 | Create shortcut for protected application |
2.3 | 00078 | Curtain Basic Access Rights |
1.5.4 | 00037 | Curtain Protected Zone |
5.6 | 00085 | Define Protected Server Resources |
5.9 | 00207 | Disable protection temporarily |
8.3 | 00036 | Enable/disable Curtain Debug Log |
5.8.1 | 00183 | Exception Rule |
5.8 | - | Exception Rule |
8 | - | Frequently Asked Questions |
8.4 | 00214 | Generate unique token for cloned Curtain Client |
5.4 | 00211 | Grant control policy by user/user group |