Intella User Manual Version 2.0.0

Total Page:16

File Type:pdf, Size:1020Kb

Intella User Manual Version 2.0.0 Intella User Manual Version 2.0.0 Contact To learn more about Intella™, please contact us using the contact information below, or contact an Intella Channel Partner. Vound Office Phone +1 888-291-7201 Email [email protected] Postal Address PO Box 308 Evergreen, Colorado 80437 U.S.A. Sales Contacts http://www.vound-software.com/partners We will be pleased to provide additional information concerning Intella and schedule a demonstration at your convenience. To become an Intella reseller, please contact us! For user and technical support please visit our website: http://www.vound-software.com Page 2 | Intella™ User Manual | © 2016 Vound Vound Colorado (“Vound”). Mention of third-party products is for © 2016 Vound. All rights reserved. informational purposes only and constitutes neither an endorsement nor a The information in this User Manual is recommendation. Vound assumes no subject to change without notice. Every responsibility regarding the performance or effort has been made to ensure that the use of these products. Under the copyright information in this manual is accurate. laws, this manual may not be copied, in Vound is not responsible for printing or whole or in part, without the written clerical errors. consent of Vound. VOUND PROVIDES THIS DOCUMENT “AS IS” Your rights to the software are governed by WITHOUT WARRANTY OF ANY KIND, the accompanying software license EITHER EXPRESS OR IMPLIED AND SHALL agreement. The Vound logo is a trademark NOT BE LIABLE FOR TECHNICAL OR of Vound. Use of the Vound logo for EDITORIAL ERRORS OR OMISSIONS commercial purposes without the prior CONTAINED HEREIN; NOR FOR INCIDENTAL written consent of Vound may constitute OR CONSEQUENTIAL DAMAGES RESULTING trademark infringement and unfair FROM THE FURNISHING, PERFORMANCE, competition in violation of federal and OR USE OF THIS MATERIAL. state laws. Other company and product names All rights reserved by Vound. Intella is a mentioned herein are trademarks of their trademark of Vound. respective companies. It is the responsibility of the user to comply with all applicable copyright laws. Page 3 | Intella™ User Manual | © 2016 Vound Contents Contact ............................................................................................................................................................................................... 2 1 Preface ..................................................................................................................................................................................... 11 1.1 Training ............................................................................................................................................................................ 12 1.2 Document conventions ................................................................................................................................................ 13 2 An introduction to Intella ................................................................................................................................................... 14 2.1 Key benefits..................................................................................................................................................................... 14 2.2 Intella editions ................................................................................................................................................................ 15 2.3 Supported file formats .................................................................................................................................................. 16 2.4 Supported sources ........................................................................................................................................................ 19 2.5 Supported languages ..................................................................................................................................................... 20 2.6 Supported platforms ..................................................................................................................................................... 20 2.7 Feedback .......................................................................................................................................................................... 20 3 Getting support ..................................................................................................................................................................... 21 3.1 Different ways to get support .................................................................................................................................... 21 3.1.1 Standard technical support .............................................................................................................................. 21 3.1.2 User support contract ...................................................................................................................................... 22 3.1.3 Certified Intella training courses .................................................................................................................... 22 3.2 Working with Vound support .................................................................................................................................... 23 3.3 Upgrade contract ........................................................................................................................................................... 23 4 Installation and configuration ............................................................................................................................................. 24 4.1 Installation ....................................................................................................................................................................... 24 4.1.1 Step 1: Check the hardware requirements ................................................................................................. 24 4.1.2 Step 2: Check the software requirements ................................................................................................... 25 4.1.3 Step 3: Learn about licenses and dongles ..................................................................................................... 26 4.1.4 Step 4: Install the software ............................................................................................................................... 26 4.1.5 Step 5 (optional): Support for S/MIME- and PGP-encrypted emails ...................................................... 27 4.2 Storage considerations ................................................................................................................................................. 27 4.3 Installation troubleshooting ........................................................................................................................................ 29 4.3.1 Error code 7 (H0007) ....................................................................................................................................... 29 4.3.2 Error code 31 (H0031) ..................................................................................................................................... 29 4.3.3 Error code 33 (H0033) ..................................................................................................................................... 29 4.3.4 Error code 37 (H0037) ..................................................................................................................................... 29 4.3.5 Error code 41 (H0041) ..................................................................................................................................... 30 4.3.6 Error code 51 (H0051) ..................................................................................................................................... 30 4.3.7 Memory settings ................................................................................................................................................. 30 4.3.8 Where are Intella's data files located? .......................................................................................................... 30 4.3.9 Where can I find Intella’s log files? ................................................................................................................. 31 5 Frequently asked questions ................................................................................................................................................ 32 6 Dongles .................................................................................................................................................................................... 36 6.1 Activation with the Dongle Manager ........................................................................................................................ 36 6.2 Activation with haspupdate.exe ................................................................................................................................. 38 6.3 Network dongles ........................................................................................................................................................... 40 6.3.1 Client and server in single subnet .................................................................................................................. 40 6.3.2 Client and server in different subnets ..........................................................................................................
Recommended publications
  • Download Fact Sheet
    Intella Process l Search l Filter l Produce. Simple. Fact Sheet Intella®: Smarter eDiscovery and Forensic Investigations Innovative, powerful, and simple – exactly the tools you need to conquer today’s data challenges and deliver world class results. Process. Search. Filter. Produce. Simple. Exponential Market Leading Industry’s Best Productivity Power Value & Pricing Key Features Customer Use Examples • Highly user-friendly interface and market-leading Intella has helped some of the world’s best known indexing speeds organizations to dramatically reduce the time, expense and • Insight Analysis feature lists the most notable user, personnel needed for their case loads. system and Internet artifacts, simplifying finding • A Fortune 500 retailer was able to bring e-discovery important data and improving examination time and functions in-house and save millions odue to Intella’s thoroughness of any investigation easy-to-use functionality. • Batch documents and assign to reviewers for subjective • The compliance department of a global financial coding for legal review institution conducts internal reviews of employee emails • Built-in instant messaging so co-workers can discuss and and files with surprising ease because of Intella’s low share documents within the tool during investigations resource/highly efficient architecture. • Automatic extraction of notable registry artifacts. This • A major international accounting and consulting firm can save the examiner many hours of manual artifact increased customer satisfaction by providing their
    [Show full text]
  • Free Email Software Download Best Free Email Client 2021
    free email software download Best Free Email Client 2021. This article is all about best free email clients and how they can help you be more productive. We also talk about Clean Email, an easy-to-use email cleaner compatible with virtually all major email services. But before we go over the best email clients for 2021, we believe that we should first explain what advantages email clients have over web-based interfaces of various email services. Clean Email. Take control of your mailbox. What Is an Email Client and Why Should I Use One? If you’re like most people, you probably check your email at least once every day. And if you’re someone whose work involves communication with customers, clients, and coworkers, the chances are that you deal with emails all the time. Even though we spend so much time writing, forwarding, and managing emails, we hardly ever pause for a moment and think about how we could improve our emailing experience. We use clunky web interfaces that are not meant for professional use, we accept outdated applications as if alternatives didn’t exist, and we settle for the default email apps on our mobile devices even though app stores are full of excellent third-party email apps. Broadly speaking, an email client is a computer program used to access and manage a user’s email. But when we use the term email client in this article, we only mean those email clients that can be installed on a desktop computer or a mobile device—not web-based email clients that are hosted remotely and are accessible only from a web browser.
    [Show full text]
  • Spear Phishing Targeting Ics Supply Chain – Analysis
    SPEAR PHISHING TARGETING ICS SUPPLY CHAIN – ANALYSIS January 20, 2021 MARKEL PICADO 1 Table of Contents Introduction ................................................................................................................................................... 3 Threat Analysis ............................................................................................................................................... 3 Distribution Strategy .................................................................................................................................. 4 Spear Phishing............................................................................................................................................ 5 Identity Theft ......................................................................................................................................... 5 Toolkit .................................................................................................................................................... 8 AgentTesla v3 Analysis ........................................................................................................................... 9 Attack Surface .......................................................................................................................................... 16 MITRE ATT&CK Mapping ..................................................................................................................... 17 Threat Actor Infrastructure ................................................................................................................
    [Show full text]
  • Downloadable Email Program for My Pc 32 Best Free Email Clients
    downloadable email program for my pc 32 Best Free Email Clients. Here are 32 best free email client software . These let you manage and access all of your email accounts in one single place easily. All these email client software are completely free and can be downloaded to Windows PC. These free software offer various features, like: can be used with IMAP, SMTP, POP3 and Gmail, keeps your emails safe and secure, lets you open various emails simultaneously, provide protection from spam, lets you view your emails offline, manage and access all of your email accounts in one single place, supports PH, LDAP, IMAP4, POP3 and SMPT mail protocols etc. So, go through this list of free email client software and see which ones you like the most. Thunderbird. Thunderbird is a free and handy email client software for your computer. It can be used with IMAP, SMTP, POP3 and Gmail. It will also work with email accounts provided by MS Exchange Server. The user interface of Thunderbird is tabbed. It lets you open various emails simultaneously. Thunderbird keeps your emails safe and secure. It also has special filters for filtering the mail. Windows Live Mail. Windows Live Mail is a free email client for your computer. It works with various email accounts. It lets you access Yahoo, Gmail, Hotmail and emails from different servers which supports POP3 and SMTP. Its security features are excellent it will also provide protection from spam. You can also view your emails offline in this freeware. Zimbra Desktop. Zimbra Desktop is a free email client.
    [Show full text]
  • RS-2500 Dual WAN Security VPN Gateway
    RS-2500 Dual WAN Security VPN Gateway Web VPN / SSL VPN Server IPSec / PPTP VPN Server Application Blocking for IM, P2P, Webmail, Video/Audio, Game, Tunnel and Remote Control applications Content Blocking for URL, Scripts, Download and Upload Bandwidth Management for user or application Authentication for Internet access Policy-based firewall Web VPN/ IPSec VPN PPTP VPN Application Content SSL VPN Server Server Blocking Filtering Dual WAN Policy Bandwidth User Multiple Load Based Management Authentication Subnet Balance Firewall Fully VPN Solution The AirLive RS-2500 is the new generation of all-in-one Dual WAN Security VPN Gateway. You can choose to create the high security IPSec VPN tunnel between offices, or the fast and easy configured PPTP VPN between office and home user. Now AirLive RS-2500 features with Web VPN (SSL VPN), user can easily create the high security IPSec VPN via web browser between office and anywhere. SSL VPN Server IPSec VPN Server SOHO Router VPN Internet VPN VPN Internet VPN LAN LAN LAN LAN PPTP VPN Server IPSec VPN Trunk 5F, No.96, Min-ChuanRd, Hsin-tien City, Taipei, Taiwan RS-2500 Internet Internet Primary VPN Backup VPN PC1 PC2 RS-2500 SSL VPN Server IPSec VPN Server SOHO Router VPN Internet VPN VPN Internet VPN LAN LAN LAN LAN PPTP VPN Server IPSec VPN Trunk RS-2500 Internet Internet Primary VPN Backup VPN PC1 PC2 RS-2500 Web VPN (SSL VPN) The AirLive RS-2500 features Windows based Web VPN (SSL VPN) function, and the remote user only needs to open browser then he can establish the high security of IPSec VPN tunnel between AirLive RS-2500 and the client PC or laptop.
    [Show full text]
  • Forcepoint DLP Supported File Formats and Size Limits
    Forcepoint DLP Supported File Formats and Size Limits Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 This article provides a list of the file formats that can be analyzed by Forcepoint DLP, file formats from which content and meta data can be extracted, and the file size limits for network, endpoint, and discovery functions. See: ● Supported File Formats ● File Size Limits © 2021 Forcepoint LLC Supported File Formats Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 The following tables lists the file formats supported by Forcepoint DLP. File formats are in alphabetical order by format group. ● Archive For mats, page 3 ● Backup Formats, page 7 ● Business Intelligence (BI) and Analysis Formats, page 8 ● Computer-Aided Design Formats, page 9 ● Cryptography Formats, page 12 ● Database Formats, page 14 ● Desktop publishing formats, page 16 ● eBook/Audio book formats, page 17 ● Executable formats, page 18 ● Font formats, page 20 ● Graphics formats - general, page 21 ● Graphics formats - vector graphics, page 26 ● Library formats, page 29 ● Log formats, page 30 ● Mail formats, page 31 ● Multimedia formats, page 32 ● Object formats, page 37 ● Presentation formats, page 38 ● Project management formats, page 40 ● Spreadsheet formats, page 41 ● Text and markup formats, page 43 ● Word processing formats, page 45 ● Miscellaneous formats, page 53 Supported file formats are added and updated frequently. Key to support tables Symbol Description Y The format is supported N The format is not supported P Partial metadata
    [Show full text]
  • Intella™ User Manual
    Intella™ User Manual Intella™ evidence made visible Vound, LLC email investigation and eDiscovery software Version 1.5 Contact To learn more about Intella™ please contact your nearest Vound representative listed below or an Intella Channel Partner. USA, Canada, Latin America Natasha Lockhart [email protected] nlockhart09 (Skype) +1 801-704-9140 +1 801-367-2169 (mobile) Europe, the Middle East, Africa Tom Balance [email protected] tballance (Skype) +1 720-746-0408 +1 303-919-0709 (mobile) Asia-Pacific Region Peter Mercer [email protected] We will be pleased to provide additional information concerning Intella and schedule a demonstration at your convenience. To become an Intella reseller, please contact us! For user and technical support please visit our website: www.vound-software.com. Vound Mention of third-party products is © 2011 Vound, LLC. All rights for informational purposes only and reserved. constitutes neither an endorsement nor a recommendation. Vound The information in this User Manual assumes no responsibility with is subject to change without notice. regard to the performance or use of Every effort has been made to these products. Under the ensure that the information in this copyright laws, this manual may not manual is accurate. Vound, LLC is be copied, in whole or in part, not responsible for printing or without the written consent of clerical errors. Vound, LLC. VOUND, LLC PROVIDES THIS Your rights to the software are DOCUMENT “AS IS” WITHOUT governed by the accompanying WARRANTY OF ANY KIND, software license agreement. The EITHER EXPRESS OR IMPLIED Vound logo is a trademark of AND SHALL NOT BE LIABLE FOR Vound, LLC.
    [Show full text]
  • Review, Email Clients with Source Code Editing
    Review, Email Clients with Source Code Editing By Micheline Johnson Updated 2013-12-05 Why is source code editing desirable? It enables the addition of variable indenting and hanging indents, tables, images, charts, videos etc. the replacement of <p> tags with <div> tags, if para spacing is not required. Wikipedia lists most email clients. Of these, the free Windows or cross-platform GUI email clients are included in the Appendix. Of these, the current mainstream desktop GUI email clients include: 1. Outlook, overkill for most purposes, and is not free. 2. Outlook Express, not available for Windows 7 3. Windows Live Mail 4. Mozilla Thunderbird, does not natively support HTML editing or tables. 5. Eudora v7.1, runs on Microsoft Windows XP/2000 (http://www.eudora.com/download/). It has problems with Windows 7, see http://mcaf.ee/cxsw8 . It runs on Windows XP, and does not appear to support editing HTML source code, or tables. 6. Eureka Email. It is very difficult to uninstall, see http://mcaf.ee/1q0ka , so I did not test it. 7. Pegasus Mail. Pegasus v4.63 allows the insertion of a table and the editing of the number of rows or columns of that table; but it does not support editing of HTML source code. It supports hanging indents to increments of one tab spacing, which is very crude. 8. DreamMail 9. FoxMail 10. SeaMonkey. http://www.seamonkey-project.org/. Allows inserting of tables. Appears to allow insertion of HTML code, but does not allow viewing of the entire HTML source code. 11. Netscape Messenger used to have an HTML editor.
    [Show full text]
  • Chapter Iii Internal & External Analysis
    CHAPTER III INTERNAL & EXTERNAL ANALYSIS 3.1 Vision & Mission Vision To be the most respected Internet Company. Earn the respect of consumers by listening, satisfying and exceeding their needs and expectations. Earn the respect of employees by continuously improving our corporate reputation so that Tencent is a company employees are proud to work for. Earn the respect within the industry by promotion the healthy development of the Inernet industry and win-win collaboration with partners. Earn the respect of society by actively assuming corporate responsibility and contributing to community development. Mission To enhance people’s quality of life through Internet services. Treat the Internet like electricity: a reliable service that makes life easier and more enjoyable. Address the diverse need of different regions and consumers by offering differentiated products and services Build a healthy and win-win Internet ecology based on open collaboration with partners. 12 3.2 PEST Analysis PEST, as an analysis framework of macro-environmental factors, which can be considered as macro-environmental factors and its usefulness line in the assumption that the success of a particular organization or management solution cannot be understood without having the information relevant to the specific business environment (Buchanan and Gibb, 1998). 3.2.1 Political factors As a majority of Tencent’s operations are located in China, therefore its results of operations, financial condition and prospects are subject to regulatory developments in China. The China’s Internet and telecommunications industries are highly regulated. Regulations issued or implemented by the State Council, MIIT, MOC, GAPP and other relevant government authorities cover many aspects of its telecommunications and Internet information services, including entry into the telecommunications industry, the scope of permissible business activities, licenses and permits for various business activities and foreign investment.
    [Show full text]
  • SMTP Reply Codes Reference & List
    AnswersThatWorkTM SMTP Status codes – SMTP Error Codes – SMTP Reply Codes SMTP Status Codes & SMTP Error Codes Reference There comes a time in the life of a Computer Consultant where, one day, he/she will have to deal with email server problems. It is inevitable. Sometimes these problems will be with the interfacing of the mail server with the ISP, in particular an inability to send mail. After checking the usual suspects such as lack of connection (your broadband line is dead), faulty router, firewall problems, DNS problems, or an incorrect SMTP server name (thanks to some clever ISP changing its SMTP server name without informing anyone – it happens!!), you will likely start delving a little deeper by checking if your email server reports any errors. Depending on the actual problem it is encountering, your mail server may not be able to provide detailed help on how to resolve the problem, and may instead only be able to provide you with an SMTP Status Code in your server’s log (these codes are also known as SMTP Error Codes or SMTP Reply Codes). It is just for such cases that we have produced this document (we use it too !! J ). So, use this document as a quick reference to common SMTP status codes or SMTP error codes for SMTP mail servers such as AA Mail Server, Alt-N MDaemon, ArGoSoft Mail Server, Axigen Mail Server, Barracuda Spam Firewall, CMail, CMailServer, E-Mail Anywhere, FTGate, GMS Mail, Internet Anywhere, Kerio MailServer (KMS), Lotus Notes, MailEnable, MailMax, Mailtraq, Merak Mail Server, Microsoft Exchange (Exchange Server 2003 NDR, Non-Delivery Report, error codes), Novell GroupWise, Qmail, PostCast Server, PostConf, PostFix, PowerMTA, QK SMTP Server, Rockliffe MailSite, SendMail, SurgeMail, TFS Secure Message Server, VisNetic Mail Server, WinMail, Zimbra, or any other SMTP / ESMTP standards compliant e-mail MTA.
    [Show full text]
  • (1) Qualified Institutional Buyers Under Rule 144A Or (2) Non-U.S
    IMPORTANT NOTICE THIS OFFERING IS AVAILABLE ONLY TO INVESTORS WHO ARE EITHER (1) QUALIFIED INSTITUTIONAL BUYERS UNDER RULE 144A OR (2) NON-U.S. PERSONS OUTSIDE OF THE UNITED STATES IMPORTANT: You must read the following before continuing. The following applies to the offering circular following this page (the “Offering Circular”), and you are therefore advised to read this carefully before reading, accessing or making any other use of the Offering Circular. In accessing the Offering Circular, you agree to be bound by the following terms and conditions, including any modifications to them any time you receive any information from us as a result of such access. NOTHING IN THIS ELECTRONIC TRANSMISSION CONSTITUTES AN OFFER OF SECURITIES FOR SALE IN THE UNITED STATES OR ANY OTHER JURISDICTION WHERE IT IS UNLAWFUL TO DO SO. THE SECURITIES HAVE NOT BEEN, AND WILL NOT BE, REGISTERED UNDER THE UNITED STATES SECURITIES ACT OF 1933, AS AMENDED (THE “SECURITIES ACT”), OR THE SECURITIES LAWS OF ANY STATE OF THE UNITED STATES OR OTHER JURISDICTION, AND SECURITIES IN BEARER FORM ARE SUBJECT TO U.S. TAX LAW REQUIREMENTS. THE SECURITIES MAY NOT BE OFFERED, SOLD OR (IN THE CASE OF NOTES IN BEARER FORM) DELIVERED WITHIN THE UNITED STATES, OR TO, OR FOR THE ACCOUNT OR BENEFIT OF, U.S. PERSONS (AS DEFINED IN REGULATION S UNDER THE SECURITIES ACT (“REGULATION S”)) EXCEPT PURSUANT TO AN EXEMPTION FROM, OR IN A TRANSACTION NOT SUBJECT TO, THE REGISTRATION REQUIREMENTS OF THE SECURITIES ACT AND APPLICABLE STATE OR LOCAL SECURITIES LAWS. THIS OFFERING CIRCULAR MAY NOT BE FORWARDED OR DISTRIBUTED TO ANY OTHER PERSON AND MAY NOT BE REPRODUCED IN ANY MANNER WHATSOEVER, AND IN PARTICULAR, MAY NOT BE FORWARDED TO ANY ADDRESS IN THE UNITED STATES.
    [Show full text]
  • United States Bankruptcy Court Northern District of Illinois Eastern Division
    Case 12-27488 Doc 49 Filed 07/27/12 Entered 07/27/12 13:10:45 Desc Main Document Page 1 of 343 UNITED STATES BANKRUPTCY COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION In re: ) Chapter 7 ) PEREGRINE FINANCIAL GROUP, INC., ) Case No. 12-27488 ) ) ) Honorable Judge Carol A. Doyle Debtor. ) ) Hearing Date: August 9, 2012 ) Hearing Time: 10:00 a.m. NOTICE OF MOTION TO: See Attached PLEASE TAKE NOTICE that on August 9, 2012 at 10:00 a.m., the undersigned shall appear before the Honorable Carol A. Doyle, United States Bankruptcy Judge for the United States Bankruptcy Court, Northern District of Illinois, Eastern Division, in Courtroom 742 of the Dirksen Federal Building, 219 South Dearborn Street, Chicago, Illinois 60604, and then and there present the TRUSTEE’S MOTION FOR ORDER APPROVING PROCEDURES FOR FIXING PRICING AND CLAIM AMOUNTS IN CONNECTION WITH THE TERMINATION AND LIQUIDATION OF FOREIGN EXCHANGE CUSTOMER AGREEMENTS (the “Motion”). PLEASE TAKE FURTHER NOTICE that if you are a foreign exchange customer of Peregrine Financial Group, Inc. or otherwise received this Notice, your rights may be affected by the Motion. PLEASE TAKE FURTHER NOTICE that a copy of the Motion is available on the Trustee’s website, www.PFGChapter7.com, or upon request sent to [email protected]. Respectfully submitted, Ira Bodenstein, not personally, but as chapter 7 trustee for the estate of Peregrine Financial Group, Inc. Dated: July 27, 2012 By: /s/ John Guzzardo One of his proposed attorneys Robert M. Fishman (#3124316) Salvatore Barbatano (#0109681) John Guzzardo (#6283016) Shaw Gussis Fishman Glantz {10403-001 NOM A0323583.DOC}4841-1459-7392.2 Case 12-27488 Doc 49 Filed 07/27/12 Entered 07/27/12 13:10:45 Desc Main Document Page 2 of 343 Wolfson & Towbin LLC 321 North Clark Street, Suite 800 Chicago, IL 60654 Phone: (877) 465-1849 [email protected] Proposed Counsel to the Trustee and Geoffrey S.
    [Show full text]