- Chapter 1: Introduction
- Chapter 2: Installation and Deployment
- Chapter 3: Console
- Chapter 4: Statistics
- Chapter 5: Logs
- Chapter 6: Policies
- Chapter 7: Monitoring
- Chapter 8: Remote Maintenance
- Chapter 9: Security Monitoring
- Chapter 10: Sensitive Information
- Chapter 11: Visual Perception
- Chapter 12: Watermarks
- Chapter 13: Asset Management
- Chapter 14: Category Management
- 
Chapter 15: Request Management
			
- 15.1 Desktop Request Management
- 15.2 Encryption Request Management
- 15.3 Superior Approval
- 15.4 Permission Viewing
- 15.5 Request Approval Permission Settings
- 15.6 Self-Record Permission Settings
- 15.7 Self-Record Logs
- 15.8 Desktop Request Document Upload Settings
- 15.9 Client Requests
- 15.10 Client Self-Approval
- 15.11 Proxy Administrator
 
- Chapter 16: Network Access Detection
- Chapter 17: Data Backup
- Chapter 18: Tools
- Chapter 19: User System Management
- Chapter 20: Audit Console
- Chapter 21: Document Security Management
- Chapter 22: Windows Encrypted Client
- Chapter 23: Linux Encrypted Client
- Chapter 24: Mac Encrypted Client
- Chapter 25: USB Encrypted Client
- Chapter 26: External Viewer
- Chapter 27: Backup Encryption Server
- Chapter 28: Document Storage Request
- Chapter 29: Cloud Document Backup Server
- Chapter 30: Reporting System
- Chapter 31: WEB Console
- Chapter 32: WEB Approval
- Chapter 33: WEB Reports
- Chapter 34: Software Center
- Chapter 35: Security Viewer
- Chapter 36: Security Approval App
- Chapter 37: Dedicated Burning Tool
- Chapter 38: Access Gateway
- Chapter 39: Secure Access Gateway

 Edit button to access advanced settings. The advanced settings are the same as those in Request Approval Permission Settings.
 Edit button to access advanced settings. The advanced settings are the same as those in Request Approval Permission Settings.