IDOL Keyview Filter SDK 12.8 C Programming Guide

Total Page:16

File Type:pdf, Size:1020Kb

IDOL Keyview Filter SDK 12.8 C Programming Guide IDOL KeyView Software Version 12.8 Filter SDK C Programming Guide Document Release Date: February 2021 Software Release Date: February 2021 Filter SDK C Programming Guide Legal notices Copyright notice © Copyright 2016-2021 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are as may be set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To check for updated documentation, visit https://www.microfocus.com/support-and-services/documentation/. Support Visit the MySupport portal to access contact information and details about the products, services, and support that Micro Focus offers. This portal also provides customer self-solve capabilities. It gives you a fast and efficient way to access interactive technical support tools needed to manage your business. As a valued support customer, you can benefit by using the MySupport portal to: l Search for knowledge documents of interest l Access product documentation l View software vulnerability alerts l Enter into discussions with other software customers l Download software patches l Manage software licenses, downloads, and support contracts l Submit and track service requests l Contact customer support l View information about all services that Support offers Many areas of the portal require you to sign in. If you need an account, you can create one when prompted to sign in. To learn about the different access levels the portal uses, see the Access Levels descriptions. IDOL KeyView (12.8) Page 2 of 381 Filter SDK C Programming Guide Contents Part I: Overview of Filter SDK 11 Chapter 1: Introducing Filter SDK 12 Overview 12 Features 12 Platforms, Compilers, and Dependencies 13 Supported Platforms 13 Supported Compilers 14 Software Dependencies 14 Windows Installation 15 UNIX Installation 16 Package Contents 16 License Information 17 Enable Advanced Document Readers 17 Pass License Information to KeyView 18 Directory Structure 19 Chapter 2: Getting Started 21 Architectural Overview 21 File Caching 22 Filtering 23 Subfile Extraction 23 Memory Abstraction 23 Use the C-Language Implementation of the API 24 Input/Output Operations 24 Filtering in File Mode 25 Filtering in Stream Mode 25 Multithreaded Filtering 26 The Filter Process Model 27 Filter API 27 File Extraction API 28 Persist the Child Process 28 In the API 28 In the formats.ini File 28 Run Filter In Process 29 In the API 29 In the formats.ini File 29 Run File Extraction Functions Out of Process 29 Restart the File Extraction Server 29 Out-of-Process Logging 30 Enable Out-of-Process Logging 30 Set the Verbosity Level 30 Enable Windows Minidump 31 IDOL KeyView (12.8) Page 3 of 381 Filter SDK C Programming Guide Keep Log Files 31 Run File Detection In or Out of Process 32 Specify the Process Type In the formats.ini File 32 Specify the Process Type In the API 32 Stream Data to Filter 32 Part II: Use Filter SDK 34 Chapter 3: Use the File Extraction API 35 Introduction 35 Extract Subfiles 36 Sanitize Absolute Paths 37 Extract Images 38 Recreate a File’s Hierarchy 38 Create a Root Node 39 Recreate a File’s Hierarchy—Example 39 Extract Mail Metadata 40 Default Metadata Set 40 Extract the Default Metadata Set 41 Extract All Metadata 41 Microsoft Outlook (MSG) Metadata 41 Extract MSG-Specific Metadata 43 Microsoft Outlook Express (EML) and Mailbox (MBX) Metadata 43 Extract EML- or MBX-Specific Metadata 43 Lotus Notes Database (NSF) Metadata 44 Extract NSF-Specific Metadata 44 Microsoft Personal Folders File (PST) Metadata 45 MAPI Properties 45 Extract PST-Specific Metadata 46 Exclude Metadata from the Extracted Text File 47 Extract Subfiles from Outlook Files 47 Extract Subfiles from Outlook Express Files 47 Extract Subfiles from Mailbox Files 47 Extract Subfiles from Outlook Personal Folders Files 48 Choose the Reader to use for PST Files 48 MAPI Attachment Methods 50 Open Secured PST Files 50 Detect PST Files While the Outlook Client is Running 51 Extract Subfiles from Lotus Domino XML Language Files 51 Extract .DXL Files to HTML 52 Extract Subfiles from Lotus Notes Database Files 52 System Requirements 52 Installation and Configuration 53 Windows 53 Solaris 53 AIX 5.x 54 Linux 54 IDOL KeyView (12.8) Page 4 of 381 Filter SDK C Programming Guide Open Secured NSF Files 55 Format Note Subfiles 55 Extract Subfiles from PDF Files 55 Improve Performance for PDFs with Many Small Images 55 Extract Embedded OLE Objects 56 Extract Subfiles from ZIP Files 56 Default File Names for Extracted Subfiles 56 Default File Name for Mail Formats 56 Default File Name for Embedded OLE Objects 58 Chapter 4: Use the Filter API 59 Generate an Error Log 59 Enable or Disable Error Logging 60 Use the API 60 Use Environment Variables 60 Change the Path and File Name of the Log File 60 Report Memory Errors 61 Use the API 61 Use Environment Variables 61 Specify a Memory Guard 61 Report the File Name in Stream Mode 61 Report Extended Error Codes 62 Specify the Maximum Size of the Log File 62 Extract Metadata 62 Extract Metadata for File Filtering 63 Extract Metadata for Stream Filtering 63 Example 63 Convert Character Sets 65 Determine the Character Set of the Output Text 65 Guidelines for Character Set Conversion 65 Set the Character Set During Filtering 66 Set the Character Set During Subfile Extraction 66 Customize Character Set Detection and Conversion 67 Extract Deleted Text Marked by Tracked Changes 67 Filter PDF Files 68 Filter PDF Files to a Logical Reading Order 68 Enable Logical Reading Order 69 Use the C API 69 Use the formats.ini File 70 Rotated Text 70 Extract Custom Metadata from PDF Files 71 Extract Custom Metadata by Tag 71 Extract All Custom Metadata 71 Filter Tagged PDF Content 72 Skip Embedded Fonts 72 Use the formats.ini File 73 Use the C API 73 IDOL KeyView (12.8) Page 5 of 381 Filter SDK C Programming Guide Control Hyphenation 73 Use the formats.ini File 74 Use the C API 74 Filter Portfolio PDF Files 74 Filter Spreadsheet Files 74 Filter Worksheet Names 74 Filter Hidden Text in Microsoft Excel Files 75 Specify Date and Time Format on UNIX Systems 75 Filter Very Large Numbers in Spreadsheet Cells to Precision Numbers 76 Extract Microsoft Excel Formulas 76 Standardize Cell Formats 78 Numbers 78 Text 78 Dates 78 Filter XML Files 79 Configure Element Extraction for XML Documents 79 Modify Element Extraction Settings 80 Explore XML Extraction Settings with the Sample Program 80 Specify an Element's Namespace and Attribute 82 Configure Headers and Footers 83 Filter Hidden Data 83 Hidden Data in Microsoft Excel Documents 84 Example 85 Toggle Hidden Excel Data Settings in the formats.ini File 85 Hidden Data in HTML Documents 85 Tab Delimited Output for Embedded Tables 86 Table Detection for PDF Files 86 Exclude Japanese Guide Text 86 Source Code Identification 87 Configure the Proxy for RMS 88 Chapter 5: Sample Programs 89 Introduction 89 tstxtract 89 filter 91 Part III: C API Reference 94 Chapter 6: File Extraction API Functions 95 KVGetExtractInterface() 95 fpCloseFile() 97 fpExtractSubFile() 97 fpFreeStruct() 99 fpGetMainFileInfo() 100 fpGetSubFileInfo() 101 fpGetSubFileMetaData() 102 fpOpenFile() 104 IDOL KeyView (12.8) Page 6 of 381 Filter SDK C Programming Guide fpSetExtractionTimeout() 105 Chapter 7: File Extraction API Structures 107 KVCredential 107 KVCredentialComponent 108 KVExtractInterface 108 KVExtractSubFileArg 109 KVGetSubFileMetaArg 112 KVMainFileInfo 113 KVMetadataElem 114 KVMetaName 115 KVOpenFileArg 116 KVOutputStream 117 KVSubFileExtractInfo 118 KVSubFileInfo 119 KVSubFileMetaData 122 Chapter 8: Filter API Functions 123 KV_GetFilterInterfaceEx() 124 fpCanFilterFile() 126 fpCanFilterStream() 127 fpCloseStream() 128 fpConfigureRMS() 128 fpFiletoInputStreamCreate() 130 fpFileToInputStreamFree() 131 fpFilterConfig() 132 fpFilterFile() 138 fpFilterStream() 139 fpFreeFilterOutput() 141 fpFreeOLESummaryInfo() 142 fpFreeXmpInfo() 143 fpGetDocInfoFile() 144 fpGetDocInfoStream() 145 fpGetKvErrorCodeEx() 146 fpGetOLESummaryInfo() 147 fpGetOLESummaryInfoFile() 148 fpGetTrgCharSet() 149 fpGetXmpInfo() 150 fpGetXmpInfoFile() 152 fpInit() 154 fpInitWithLicenseData() 156 fpOpenStream() 160 fpOpenStreamEx2() 161 fpRefreshFilterKVOOP() 162 fpSetReplacementChar() 163 fpSetSrcCharSet() 164 fpSetTimeout() 165 fpShutdown() 166 IDOL KeyView (12.8) Page 7 of 381 Filter SDK C Programming Guide Chapter 9: Filter API Structures 167 KVFltInterfaceEx 168 ADDOCINFO 171 KV_CONFIG_Arg 172 KVFilterOutput 173 KVInputStream 174 KVMemoryStream 175 KVRMSCredentials 175 KVStructHead 177 KVSumInfoElemEx 178 KVSummaryInfoEx 179 KVXConfigInfo 180 KVXmpInfo 182 KVXmpInfoElems 183 Chapter 10: Enumerated Types 184 Introduction 184 Programming Guidelines 185 ENDocAttributes 185 KVCredKeyType 186 KVErrorCode 186 KVErrorCodeEx 188 KVMetadataType 192 KVMetaNameType 193 KVSumInfoType 194 KVSumType 195 LPDF_DIRECTION 198 Appendixes 200 Appendix A: Supported Formats 201 Key to Supported
Recommended publications
  • Docuarchive Product Sheet
    DocuArchive Product Sheet Contents 1 What this document contains ............................................................................................... 3 2 DocuArchive Server components ........................................................................................ 3 2.1 DocuArchive ArchiveServer ..................................................................................................... 3 2.1.1 Hardware and software requirements ...................................................................................... 3 2.1.2 Runtime environment ............................................................................................................... 3 2.1.3 Supported storage technologies .............................................................................................. 4 2.1.4 Quantitative characteristics ...................................................................................................... 5 2.2 DocuArchive MediaServer ....................................................................................................... 6 2.2.1 Runtime requirements .............................................................................................................. 6 2.2.2 Hardware and software requirements ...................................................................................... 6 2.3 DocuArchive DBServer ............................................................................................................ 6 2.3.1 Hardware and software requirements .....................................................................................
    [Show full text]
  • February 2005)
    TechNews November 2006 TechNews is a technology, news and analysis service aimed at those in the education sector keen to stay informed about technology developments, trends and issues. Please navigate the newsletter by clicking on items within the table of contents. Networking and wireless ........................................................................................................... 2 Analysis: Trusted Computing and Network Access Control............................................................................. 2 Networking and wireless news ................................................................................................. 4 Becta Infrastructure Services Framework ............................................................................................................... 4 802.11n update ....................................................................................................................................................... 4 Predicted growth in GPS-based services................................................................................................................ 4 Mobile WiMAX......................................................................................................................................................... 5 Short range wireless developments ........................................................................................................................ 5 4G progress ...........................................................................................................................................................
    [Show full text]
  • Automated Software System for Checking the Structure and Format of Acm Sig Documents
    AUTOMATED SOFTWARE SYSTEM FOR CHECKING THE STRUCTURE AND FORMAT OF ACM SIG DOCUMENTS A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF APPLIED SCIENCES OF NEAR EAST UNIVERSITY By ARSALAN RAHMAN MIRZA In Partial Fulfillment of the Requirements for The Degree of Master of Science in Software Engineering NICOSIA, 2015 ACKNOWLEDGEMENTS This thesis would not have been possible without the help, support and patience of my principal supervisor, my deepest gratitude goes to Assist. Prof. Dr. Melike Şah Direkoglu, for her constant encouragement and guidance. She has walked me through all the stages of my research and writing thesis. Without her consistent and illuminating instruction, this thesis could not have reached its present from. Above all, my unlimited thanks and heartfelt love would be dedicated to my dearest family for their loyalty and their great confidence in me. I would like to thank my parents for giving me a support, encouragement and constant love have sustained me throughout my life. I would also like to thank the lecturers in software/computer engineering department for giving me the opportunity to be a member in such university and such department. Their help and supervision concerning taking courses were unlimited. Eventually, I would like to thank a man who showed me a document with wrong format, and told me “it will be very good if we have a program for checking the documents”, however I don’t know his name, but he hired me to start my thesis based on this idea. ii To Alan Kurdi To my Nephews Sina & Nima iii ABSTRACT Microsoft office (MS) word is one of the most commonly used software tools for creating documents.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Online Help Startpage
    Online_Help_Startpage Online Help Startpage Welcome to the FreeCAD on-line help This document has been automatically created from the contents of the official FreeCAD wiki documentation, which can be read online at http://apps.sourceforge.net/mediawiki/free-cad/index.php?title=Main_Page . Since the wiki is actively maintained and continuously developed by the FreeCAD community of developers and users, you may find that the online version contains more or newer information than this document. But neverthless, we hope you will find here all information you need. In case you have questions you can't find answers for in this document, have a look on the FreeCAD forum, where you can maybe find your question answered, or someone able to help you. How to use This document is divided into several sections: introduction, usage, scripting and development, the last three address specifically the three broad categories of users of FreeCAD: end-users, who simply want to use the program, power-users, who are interested by the scripting capabilities of FreeCAD and would like to customize some of its aspects, and developers, who consider FreeCAD as a base for developing their own applications. If you are comletely new to FreeCAD, we suggest you to start simply from the introduction. Contribute As you may have experienced sometimes, programmers are really bad help writers! For them it is all completely clear because they made it that way. Therefore it's vital that experienced users help us to write and revise the documentation. Yes, we mean you! How, you ask? Just go to the Wiki at http://apps.sourceforge.net/mediawiki/free-cad/index.php in the User section.
    [Show full text]
  • On the Interoperability of Ebook Formats
    It is widely seen as a serious problem that European as well as international customers who have bought an ebook from one of the international ebook retailers implicitly subscribe to this retailer as their sole future ebook On the Interoperability supplier, i.e. in effect, they forego buying future ebooks from any other supplier. This is a threat to the qualified European book distribution infrastructure and hence the European book culture, since subscribers to one of these of eBook Formats ebook ecosystems cannot buy future ebooks from privately owned community-located bricks & mortar booksellers engaging in ebook retailing. This view is completely in line with the Digital Agenda of the European Commission calling in Pillar II for “an effective interoperability Prof. Christoph Bläsi between IT products and services to build a truly digital society. Europe must ensure that new IT devices, applications, data repositories and services interact seamlessly anywhere – just like the Internet.” Prof. Franz Rothlauf This report was commissioned from Johannes Gutenberg University Johannes Gutenberg-Universität Mainz – Germany Mainz by the European and International Booksellers Federation. EIBF is very grateful to its sponsors, namely the Booksellers Association of Denmark, the Booksellers Association of the Netherlands and the Booksellers Association of the UK & Ireland, whose financial contribution made this project possible. April 2013 European and International Booksellers Federation rue de la Science 10 – 1000 Brussels – Belgium – [email protected]
    [Show full text]
  • Association of Gene Ontology Categories with Decay Rate for Hepg2 Experiments These Tables Show Details for All Gene Ontology Categories
    Supplementary Table 1: Association of Gene Ontology Categories with Decay Rate for HepG2 Experiments These tables show details for all Gene Ontology categories. Inferences for manual classification scheme shown at the bottom. Those categories used in Figure 1A are highlighted in bold. Standard Deviations are shown in parentheses. P-values less than 1E-20 are indicated with a "0". Rate r (hour^-1) Half-life < 2hr. Decay % GO Number Category Name Probe Sets Group Non-Group Distribution p-value In-Group Non-Group Representation p-value GO:0006350 transcription 1523 0.221 (0.009) 0.127 (0.002) FASTER 0 13.1 (0.4) 4.5 (0.1) OVER 0 GO:0006351 transcription, DNA-dependent 1498 0.220 (0.009) 0.127 (0.002) FASTER 0 13.0 (0.4) 4.5 (0.1) OVER 0 GO:0006355 regulation of transcription, DNA-dependent 1163 0.230 (0.011) 0.128 (0.002) FASTER 5.00E-21 14.2 (0.5) 4.6 (0.1) OVER 0 GO:0006366 transcription from Pol II promoter 845 0.225 (0.012) 0.130 (0.002) FASTER 1.88E-14 13.0 (0.5) 4.8 (0.1) OVER 0 GO:0006139 nucleobase, nucleoside, nucleotide and nucleic acid metabolism3004 0.173 (0.006) 0.127 (0.002) FASTER 1.28E-12 8.4 (0.2) 4.5 (0.1) OVER 0 GO:0006357 regulation of transcription from Pol II promoter 487 0.231 (0.016) 0.132 (0.002) FASTER 6.05E-10 13.5 (0.6) 4.9 (0.1) OVER 0 GO:0008283 cell proliferation 625 0.189 (0.014) 0.132 (0.002) FASTER 1.95E-05 10.1 (0.6) 5.0 (0.1) OVER 1.50E-20 GO:0006513 monoubiquitination 36 0.305 (0.049) 0.134 (0.002) FASTER 2.69E-04 25.4 (4.4) 5.1 (0.1) OVER 2.04E-06 GO:0007050 cell cycle arrest 57 0.311 (0.054) 0.133 (0.002)
    [Show full text]
  • Symantec Web Security Service Policy Guide
    Web Security Service Policy Guide Version 6.10.4.1/OCT.12.2018 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Copyright © 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other coun- tries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 www.symantec.com Policy Guide/Page 4 Symantec Web Security Service Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology as well as the WebPulse™ cloud com- munity of over 75 million users.
    [Show full text]
  • Programming Resume
    Thomas John Hastings Programming Resume Introduction: I am a highly motivated self-starter with a passion for problem solving. As the owner of a thriving entertainment agency, Big Top Entertainment, I used coding as a way to automate and improve our business processes. I also designed, built and programmed my own unique performance equipment. Since the pandemic and recurring lockdowns have put live entertainment on hold, I have repurposed my passion for programming into a full time focus. I am looking for a challenge, to be involved in building something, learning new technology and sharing the knowledge I have gained from my own projects. Programming – languages and frameworks: Processing I have extensive knowledge of this Java-based creative programming language. The great thing about Processing is the way you can deploy to Desktop, Mobile, and Cloud with only a few modifications to the same code base. Android (Java) I have seven Android apps published to the Google Play Store, five of which are written in Java. I have developed many more for personal use, including the most recent, CoronaVirusSA, an open source app which graphs reliable stats on the COVID-19 outbreak in South Africa. JavaScript Anyone developing for the web needs to know JavaScript. I am familiar with the Flask back end with Jinja, Bootstrap, JQuery, as well as the excellent Tabulator library for tables. Currently (2020/21) my free time is spent on a couple of entertainment related side projects using this stack. Linux I have been using Ubuntu as my main computing system for over 10 years, both in the cloud (DigitalOcean) and on my Laptop.
    [Show full text]
  • Microsoft Exchange 2007 Journaling Guide
    Microsoft Exchange 2007 Journaling Guide Digital Archives Updated on 12/9/2010 Document Information Microsoft Exchange 2007 Journaling Guide Published August, 2008 Iron Mountain Support Information U.S. 1.800.888.2774 [email protected] Copyright © 2008 Iron Mountain Incorporated. All Rights Reserved. Trademarks Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated. All other trademarks and registered trademarks are the property of their respective owners. Entities under license agreement: Please consult the Iron Mountain & Affiliates Copyright Notices by Country. Confidentiality CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN. The information set forth herein represents the confidential and proprietary information of Iron Mountain. Such information shall only be used for the express purpose authorized by Iron Mountain and shall not be published, communicated, disclosed or divulged to any person, firm, corporation or legal entity, directly or indirectly, or to any third person without the prior written consent of Iron Mountain. Disclaimer While Iron Mountain has made every effort to ensure the accuracy and completeness of this document, it assumes no responsibility for the consequences to users of any errors that may be contained herein. The information in this document is subject to change without notice and should not be considered a commitment by Iron Mountain. Iron Mountain Incorporated 745 Atlantic Avenue Boston, MA 02111 +1.800.934.0956 www.ironmountain.com/digital
    [Show full text]
  • Symantec Web Security Service Policy Guide
    Web Security Service Policy Guide Revision: NOV.07.2020 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Policy Guide/Page 4 Symantec WSS Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology, including the WebPulse™ cloud community. With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to create and enforce granular policies that are applied to all covered users, including fixed locations and roaming users. If the WSS is the body, then the policy engine is the brain. While the WSS by default provides malware protection (blocks four categories: Phishing, Proxy Avoidance, Spyware Effects/Privacy Concerns, and Spyware/Malware Sources), the additional policy rules and options you create dictate exactly what content your employees can and cannot access—from global allows/denials to individual users at specific times from specific locations.
    [Show full text]
  • 4. Empty Folders This Report Gives an Overview of All the Empty Folder and a List of Their Locations
    File share analysis reports Introduction It is hard to find an organization that is not still using file shares. Nowadays, file shares are outdated, have high costs to maintain, create chaos due to the immense numbers of copies of files and insufficient ways of structuring them, and risk exposure is significant. Do you finally want to order this chaos and solve the problems it brings? Xillio file share analysis Xillio can perform extensive file share analysis, and generate reports in a very short time frame. You can run this process through your preferred systems integrator, or just let Xillio do the work. The analysis lets you understand which content on your file shares is redundant, obsolete and trivial. Or, gives insight in what content is located on your files shares in general. The Xillio file share analysis package includes a number of pre-built reports and analyses. This data is all captured using the delivered scripts and robots and stored in a database for easy access and reporting. This data may be further exported to Excel or integrated with another Business Intelligence tool of choice for further analysis. In this document Xillio explains the delivery of the file share analysis. Each report gives different insights, examples of which are also given in this document. These insights are not extensive, there are many other variations of these which can be produced to create your own new insights. To guide you through this process, for each report the most used insights that you can get out of it, is described. Report examples 1.
    [Show full text]