Groupwise 18 Client User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Groupwise 18 Client User Guide GroupWise 18 Client User Guide October 2019 Legal Notices © Copyright 1993 - 2020 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Contents About This Guide 13 1 Getting Started 15 1.1 Installing the GroupWise Client . 15 1.2 Logging In to GroupWise . 15 1.2.1 Assigning a Password to Your Mailbox without LDAP Authentication . 16 1.2.2 Using Advanced Authentication . 16 1.3 Using the Home Folder . 17 1.4 Displaying QuickViewer . 17 1.4.1 Turning QuickViewer On and Off . 17 1.4.2 Positioning the QuickViewer . .18 1.4.3 Using QuickViewer. 18 1.5 Using the Windows Taskbar to Perform Key Tasks . 18 1.6 Exploring the Folder List . 19 1.6.1 Home Folder . 19 1.6.2 Mailbox Folder . 20 1.6.3 Sent Items Folder . 20 1.6.4 Calendar Folder . 20 1.6.5 Frequent Contacts Folder . .20 1.6.6 Tasklist Folder . 20 1.6.7 Documents Folder . 21 1.6.8 Cabinet Folder . 21 1.6.9 Work in Progress Folder . 21 1.6.10 Junk Mail Folder . 21 1.6.11 Trash Folder. 21 1.6.12 Shared Folders . 22 1.6.13 IMAP4 Account Folder . 22 1.6.14 NNTP Newsgroup Account Folder. 22 1.6.15 RSS Feeds Folder . 22 1.7 Understanding GroupWise Item Types . 22 1.7.1 Mail . 22 1.7.2 Appointment. 23 1.7.3 Task . 23 1.7.4 Reminder Note. 23 1.7.5 Phone Message. 23 1.8 Personalizing the GroupWise Interface . 23 1.8.1 Understanding the Main GroupWise Window . 23 1.8.2 Understanding the Main Menu. 24 1.8.3 Understanding the Nav Bar . 25 1.8.4 Understanding the Main Toolbar . 25 1.8.5 Understanding Item Lists . 26 1.9 Identifying Icons That Appear Next to Items. 26 1.10 Learning More . 28 1.10.1 Online Help . 29 1.10.2 GroupWise Welcome Tab . 29 1.10.3 GroupWise Documentation Web Page . 29 1.10.4 Quick Starts . 29 1.10.5 GroupWise Cool Solutions Web Community . 30 Contents 3 2 Getting Organized 31 2.1 Customizing the GroupWise Interface . 31 2.1.1 Selecting a GroupWise Scheme . 31 2.1.2 Customizing Individual GroupWise Appearance Settings . 32 2.1.3 Customizing the Main Toolbar . 32 2.1.4 Setting Your Default Start Folder . 33 2.1.5 Setting Default Views for Reading . 33 2.1.6 Setting the Default Read/Compose View and Font . 34 2.1.7 Setting the QuickViewer Default Behavior. 34 2.1.8 Changing Your Default Item Views . 34 2.1.9 Automatically Reading the Next Item in Your Mailbox . 35 2.1.10 Changing the GroupWise Interface Language . 35 2.2 Using Categories to Organize Items . 35 2.2.1 Understanding Categories . .35 2.2.2 Assigning Categories to Items . 36 2.2.3 Working with Categories . 37 2.3 Using Folders to Organize Your Mailbox . 38 2.3.1 Understanding Folder Lists . .39 2.3.2 Displaying Folder Lists. 40 2.3.3 Working with Folders . ..
Recommended publications
  • Free Email Software Download Best Free Email Client 2021
    free email software download Best Free Email Client 2021. This article is all about best free email clients and how they can help you be more productive. We also talk about Clean Email, an easy-to-use email cleaner compatible with virtually all major email services. But before we go over the best email clients for 2021, we believe that we should first explain what advantages email clients have over web-based interfaces of various email services. Clean Email. Take control of your mailbox. What Is an Email Client and Why Should I Use One? If you’re like most people, you probably check your email at least once every day. And if you’re someone whose work involves communication with customers, clients, and coworkers, the chances are that you deal with emails all the time. Even though we spend so much time writing, forwarding, and managing emails, we hardly ever pause for a moment and think about how we could improve our emailing experience. We use clunky web interfaces that are not meant for professional use, we accept outdated applications as if alternatives didn’t exist, and we settle for the default email apps on our mobile devices even though app stores are full of excellent third-party email apps. Broadly speaking, an email client is a computer program used to access and manage a user’s email. But when we use the term email client in this article, we only mean those email clients that can be installed on a desktop computer or a mobile device—not web-based email clients that are hosted remotely and are accessible only from a web browser.
    [Show full text]
  • SMTP Protocol
    CS 280 Lecture 4: Application Layer, Email, DNS, P2P John Magee 21 September 2016 Most slides adapted from Kurose and Ross, Computer Networking 7/e Source material copyright 1996-2016 1 J.F Kurose and K.W. Ross Chapter 2: outline Last Class: 2.1 principles of network Next Class: applications 2.6 video streaming and 2.2 Web and HTTP content distribution networks Today: 2.7 socket programming with UDP and TCP 2.3 electronic mail • SMTP, POP3, IMAP 2.4 DNS 2.5 P2P applications Application Layer 2-2 outgoing Electronic mail message queue user mailbox Three major components: user agent . user agents . mail servers mail user server . simple mail transfer agent protocol: SMTP SMTP mail user server agent User Agent SMTP . a.k.a. “mail reader” SMTP user agent . composing, editing, reading mail server mail messages user . e.g., Outlook, Thunderbird, agent iPhone mail client user . outgoing, incoming agent messages stored on server Application Layer 2-3 Electronic mail: mail servers mail servers: user agent . mailbox contains incoming messages for user mail user server . message queue of outgoing agent (to be sent) mail messages SMTP mail user . SMTP protocol between server agent mail servers to send email SMTP messages SMTP user agent • client: sending mail mail server server • “server”: receiving mail user server agent user agent Application Layer 2-4 Electronic Mail: SMTP [RFC 2821] . uses TCP to reliably transfer email message from client to server, port 25 . direct transfer: sending server to receiving server . three phases of transfer • handshaking (greeting) • transfer of messages • closure . command/response interaction (like HTTP) • commands: ASCII text • response: status code and phrase .
    [Show full text]
  • Statement from Directtrust Regarding the EFAIL Vulnerability
    Statement from DirectTrust regarding the EFAIL Vulnerability Summary EFAIL is a set of attacks used to exploit vulnerabilities in email clients that decrypt and display PGP and S/MIME encrypted messages by coercing them into sending the decrypted text of the emails to an attacker. Properly implemented, Direct is NOT vulnerable. However, we recommend that if you are exchanging with anyone outside of the DirectTrust Network, you will want to understand at a reasonable depth how their implementation protects against EFAIL. How does EFAIL work? EFAIL consists of two different attack scenarios that create “backchannels” to send the decrypted text to an attacker. Both require an attacker to first obtain the encrypted message. 1. The attacker “wraps” the encrypted body with carefully crafted markup that can result in an email client decrypting the message and sending the decrypted body to the attacker. 2. The attacker manipulates the encrypted body of the message using well known S/MIME weaknesses that produce a message that can send the decrypted body to the attacker once rendered in the email client. Although the attacks are different, the end result is the same: a vulnerable email client sends the decrypted text to the attacker. How is this relevant to Direct? Direct uses S/MIME to encrypt messages, so in theory every Direct message could be vulnerable to this attack. However, Direct, when implemented correctly, is NOT vulnerable. The vulnerability is only applicable if decryption and rendering of the message are done in certain email clients like Thunderbird, iOS, Apple Mail, and some versions of Outlook.
    [Show full text]
  • Pega Customer Service Reference Guide Iii
    Pega Customer Service 7.1.4 Version REFERENCE GUIDE © Copyright 2015 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks, all rights reserved. Other brand or product names are trademarks of their respective holders. Consult the 718ThirdPartyLicense.pdf file on the installation media for information about the software delivered with the product. Notices This publication describes and/or represents products and services of Pegasystems Inc. It may contain trade secrets and proprietary information that are protected by various federal, state, and international laws, and distributed under licenses restricting their use, copying, modification, distribution, or transmittal in any form without prior written authorization of Pegasystems Inc. This publication is current as of the date of publication only. Changes to the publication may be made from time to time at the discretion of Pegasystems Inc. This publication remains the property of Pegasystems Inc. and must be returned to it upon request. This publication does not imply any commitment to offer or deliver the products or services described herein. This publication may include references to Pegasystems Inc. product features that have not been licensed by you or your company. If you have questions about whether a particular capability is included in your installation, please consult your Pegasystems Inc. services consultant. Although Pegasystems Inc. strives for accuracy in its publications, any publication may contain inaccuracies or typographical errors, as well as technical inaccuracies. Pegasystems Inc. may make improvements and/or changes to the publication at any time. Any references in this publication to non-Pegasystems websites are provided for convenience only and do not serve as an endorsement of these websites.
    [Show full text]
  • Groupwise Mobility Quick Start for Microsoft Outlook Users
    GroupWise Mobility Quick Start for Microsoft Outlook Users August 2016 GroupWise Mobility Service 2014 R2 allows the Microsoft Outlook client for Windows to run against a GroupWise backend via Microsoft ActiveSync 14.1 protocol. This document helps you set up your Outlook client to access your GroupWise account and provides known limitations you should be aware of while using Outlook against GroupWise. Supported Microsoft Outlook Clients CREATING THE GROUPWISE PROFILE MANUALLY Microsoft Outlook 2013 or 21016 for Windows 1 On the machine, open Control Panel > User Accounts and Family Safety. Microsoft Outlook Mobile App Adding a GroupWise Account to the Microsoft Outlook Client You must configure the Microsoft Outlook client in order to access your GroupWise account. The following instructions assume that the Outlook client is already installed on your machine. You can use the GroupWise Profile Setup utility to set the profile up automatically or you can manually create the GroupWise profile for Outlook. Using the GroupWise Profile Setup Utility Creating the GroupWise Profile Manually 2 Click Mail. 3 (Conditional) If a Mail Setup dialog box is displayed, USING THE GROUPWISE PROFILE SETUP UTILITY click Show Profiles to display the Mail dialog box. You must first obtain a copy of the GWProfileSetup.zip from If GroupWise is installed on the machine, the Profiles your system administrator before following the steps below list includes a GroupWise profile, as shown in the to create the profile on your workstation. following screenshot. You need to keep this profile and create a new profile. 1 Extract the GWProfileSetup.zip to a temporary location on your workstation.
    [Show full text]
  • March/April 2006
    The newsletter for IPFW computer users Information Technology Services March-April 2006 By Joseph McCormick Manager of Client Support his spring, most Indiana counties T will observe Daylight Savings Time Data Security and Your Workstation (DST) for the first time since 1970. In 2006, DST begins at 2 a.m. on the first Sunday in April (April 2) and ends at 2 option involves a reboot which With recent security incidents at a.m. on the last Sunday in October refreshes your workstation, and the (October 29). other campuses and businesses, it has next time you log in to the network, become imperative that we all take Because of modifications to the Trend OfficeScan antivirus steps to protect data accessed through GroupWise, to accommodate the software installed on your Windows our computers. Precautions should change to Daylight Savings Time, your workstation automatically updates. also be taken to protect data stored on calendar items scheduled between April Keep your workstation up-to- any portable devices such as laptops, 2 at 2:00 a.m. and October 29 at 2:00 date with vendor patches and virus disks or flash drives. Here are a few a.m. are now showing up an hour later protection by activating updates key steps that we can all do quickly to than originally scheduled. Unfortunately, promptly when you are signaled that increase security significantly. this problem was unavoidable as we they are ready. Windows XP/2000 adjusted the system to recognize Daylight users: when you see the “msg”. at the Savings time. bottom of your tool bar that says you Your cooperation is key to The only way to correct this have new updates, please click on the providing overall campus problem is to manually change your button and add your updates.
    [Show full text]
  • [Hal-00744922, V1] Improving Content Availability in the I2P Anonymous
    Improving Content Availability in the I2P Anonymous File-Sharing Environment Juan Pablo Timpanaro, Isabelle Chrisment*, Olivier Festor INRIA Nancy-Grand Est, France *LORIA - ESIAL, Universit´ede Lorraine Email: fjuanpablo.timpanaro, [email protected] Email: [email protected] Abstract. Anonymous communication has gained more and more inter- est from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anony- mous file-sharing among users. However, one major problem with anony- mous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21648 new torrents were introduced in the BitTor- rent community, whilst only 236 were introduced in the anonymous I2P network, for four different categories of content. Therefore, how can a user of these anonymous networks access this varied and non-anonymous content without compromising its anonymity? In this paper, we improve content availability in an anonymous environment by proposing the first internetwork model allowing anonymous users to access and share content in large public communities while remaining anonymous. We show that our approach can efficiently interconnect I2P users and public BitTorrent swarms without affecting their anonymity nor their performance. Our model is fully implemented and freely usable. 1 Introduction Peer-to-peer file-sharing has always been one of the major sources of the Internet hal-00744922, version 1 - 24 Oct 2012 traffic, since its early beginnings in 2000. It has been moving from semi-central approaches (eDonkey2000, for example), to semi-decentralized approaches (Kazaa, for instance) to fully decentralized file-sharing architectures (like the KAD net- work).
    [Show full text]
  • Security with SSH.Pdf
    Security with SSH Network Startup Resource Center http://www.nsrc.org/ These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Topics • What is SSH • Where to get SSH • How to enable and configure SSH • Where to get SSH clients for Windows • Host keys: authentication of server to client • Issues to do with changing of the host key • Password authentication of client to server • Cryptographic authentication client to server • hostkey exchange, scp, and sftp labs What is SSH? From Wikipedia: Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively). i.e., ssh gives you a secure command line interface on remote machines… Topics • Where SSH applies directly to dealing with these two areas of security: - Confidentiality - Keeping our data safe from prying eyes • Authentication and Authorization - Is this person who they claim to be? - With keys alternative method to passwords Where to get SSH • First see if SSH is installed on your system and what version. Easiest way is: $ ssh ±V • Commonly used SSH in Linux and FreeBSD is OpenSSH. You can find the home page here: http://www.openssh.org/ • You can install OpenSSH via packages on Linux and FreeBSD. Ubuntu 12.04.3 LTS currently installs version 5.9p1 of OpenSSH. Obtain SSH Client for Windows There are several free, shareware, and commercial ssh clients for Windows.
    [Show full text]
  • Freebsd Opengroupware - English
    FreeBSD OpenGroupware - English FreeBSD As Basis For OpenGroupware.org PostgreSQL As Database FreeBSD can currently look back on a history of over 30 PostgreSQL, like BSD, originated at the University of Ca- years. It originated at the University of Berkeley and lifornia and is also distributed under the BSD license. It's FreeBSD evolved over a few intermediate steps into the project one of the oldest and most advanced object-relational founded in 1993 called FreeBSD. The supported architec- database management systems (ORDBMS) in the realm tures are the following: i386, amd64, Alpha, Itanium, of free software and looks back on a development of OpenGroupware.org SPARC, PPC (Mac) and others. over 15 years. PostgreSQL is largely conforming to the FreeBSD has very good support for multiprocessor sys- SQL92/SQL99 standards, that means that all functions in The ideal solution for professional the standards are available and behave as defined; that tems (SMP) and is distributed under the BSD license team communication on the Internet, which grants the user nearly every freedom and is free is not always the case with some commercial and non- commercial SQL database systems. of cost. Apart from having to name the origins of the with FreeBSD and PostgreSQL code, the user may use it in any which way he or she pleases. FreeBSD is a gift to humanity, we are pleased when you use it! FreeBSD has not only got many features, it also has a What is a groupware solution? huge amount of free and open software in its so-called Ports Collection.
    [Show full text]
  • Functional HCL Notes Email Archiving Solution
    AM ™ ArchiveMail DATASHEET Functional HCL Notes™ email archiving solution Key In Detail on Introducti Characteristics Benefits For the Users: Continuous growth in data volumes related to messaging and the practical limits imposed by Notes database architecture make email archiving systems essential. M Improved productivity due to automatic management of archive. COOPERTEAM’s Archive Mail™ is a functional archiving solution which responds to the M needs of administrators by allowing them to manage archiving policies efficiently and Access to archived documents from automatically, whilst still guaranteeing their users access to their documents and the Notes client, iNotes and mobile attached files. devices. Archive Mail™ automates the archiving of messages, calendar entries, tasks and contacts M Multi-criteria searching available for to one archive per year, hosted on either dedicated or shared function servers. Archiving both server & workstation. policies can be based on document ageing criteria. In addition, the archive process can be triggered when the mail database exceeds its For the Administrators: threshold (quota), or manually by users after selecting documents to be archived. M Optimization of the Domino Archive Mail™ allows administrators to manage multiple archive databases and easily infrastructure. implement ILM (Information Lifecycle Management) policies, and to correctly align the M Align messaging storage costs, value storage costs of the archived documents with their value to the business. for the business and quota policies. M Once Archive Mail™ is implemented, documents that meet the configured ageing Automated and centralised parameters for archiving are transferred to an archive database at a frequency predeter- management of archiving mined by their profile administrator.
    [Show full text]
  • In the United States District Court for the District of Kansas
    Case 2:14-cv-02046-JAR-KGG Document 19 Filed 11/09/15 Page 1 of 26 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS DORAN LAW OFFICE, ) ) Plaintiff, ) v. ) Case No. 14-2046-JAR-GLR ) STONEHOUSE RENTALS, INC., ) ) Defendant. ) ___________________________________ ) MEMORANDUM AND ORDER Plaintiff Doran Law Office filed this action seeking to recover legal fees and expenses owed by Defendant Stonehouse Rentals, Inc. Defendant did not answer the Complaint within the time allowed by law and stated on the Summons, and default was entered by the Clerk of the District Court. Upon application of Plaintiff, the Court then entered default judgment in the amount of $133,024.30. Defendant filed a Motion to Set Aside Entry of Default and Default Judgment (Doc. 12). An evidentiary hearing was held September 10, 2015. After considering the arguments, evidence, and testimony presented by the parties, the Court is prepared to rule. For the following reasons, the Court denies Defendant’s motion. I. Factual and Procedural Background Plaintiff Doran Law Office filed its complaint against Stonehouse Rentals, Inc. (“Stonehouse”) on January 31, 2014.1 In the Complaint, Plaintiff states that Defendant is a Kansas corporation registered with the Kansas Secretary of State, with its registered agent listed as Salah Ibrahim and its registered office on record as 22858 Fall Leaf Road, Linwood, Kansas. Plaintiff hired a special process server, Aristocrat Investigations, who attempted to 1Doc. 1. Case 2:14-cv-02046-JAR-KGG Document 19 Filed 11/09/15 Page 2 of 26 personally serve Defendant’s president and resident agent, Salah Ibrahim.
    [Show full text]
  • Zimbra Tips & Tricks
    TOP ZIMBRA 15 TIPS & TRICKS This guide brings you the top 15 Zimbra Tips & Tricks to help you save time while working in Zimbra. If you find these Tips & Tricks helpful, you may also like our tutorial demos: The top 15 Zimbra Tips & Tricks (based on clicks on Zimbra’s “Did You Know?” blog) are: Throughout this guide, look for pop-up boxes highlighting quick tips Email Tips and Tricks and facts. 1 Searching in Zimbra TIP: Skip ahead to any 2 Importing Into and Exporting From Zimbra section of the 15 Tips & 3 Changing Your Zimbra Preferences Tricks by clicking on the 4 Changing Your Zimbra Theme titles to the right. 5 Setting Zimbra Email and SMS (text) Reminders 6 Enabling Zimbra’s Mandatory Spellcheck 7 Sorting Email 8 Creating an Appointment with the Mini Calendar 9 Creating an Email Distribution List or Contact Group 10 Opening an Email in a Separate Window 11 Turning on Zimbra’s Activity Stream 12 Switching from Conversation View to Message View 13 Sharing Your Zimbra Calendar Outside Your Organization 14 Sharing in Zimbra 15 Enabling Zimbra Two-Factor Authentication 1 Searching in Zimbra There are many great and easy ways to search in Zimbra: • Quick keyword search • Complex search • Right-click search Quick Keyword Search You can do a quick search using keywords like from, to, in, etc. Click here to see all search keywords. How much time do you spend searching To search by keyword: for a specific email? keyword: search word(s) Searches are easy and fast in Zimbra. Search Examples: your entire Zimbra • Find all email received from Mark (all email with “Mark” in the From account, including attachments, in seconds.
    [Show full text]