- Chapter 1: Introduction
- Chapter 2: Installation and Deployment
- Chapter 3: Console
- Chapter 4: Statistics
- Chapter 5: Logs
- Chapter 6: Policies
- Chapter 7: Monitoring
- Chapter 8: Remote Maintenance
- Chapter 9: Security Monitoring
- Chapter 10: Sensitive Information
- Chapter 11: Visual Perception
- Chapter 12: Watermarks
- Chapter 13: Asset Management
- Chapter 14: Category Management
- Chapter 15: Request Management
- Chapter 16: Network Access Detection
- Chapter 17: Data Backup
- Chapter 18: Tools
- Chapter 19: User System Management
- Chapter 20: Audit Console
- Chapter 21: Document Security Management
-
Chapter 22: Windows Encrypted Client
- 22.1 Client Operating Status
- 22.2 File Explorer
- 22.3 Encrypted Document Scan Tool
- 22.4 Encrypted Files
- 22.5 Decrypt Files
- 22.6 Request Decryption
- 22.7 Read-Only Access
- 22.8 Export
- 22.9 Request Export
- 22.10 Export Extraction
- 22.11 Modify Encrypted Document Security Attributes
- 22.12 Modify Encrypted Document User Permissions
- 22.13 Request Change of Encrypted Document Attributes
- 22.14 View Document Attributes
- 22.15 Request Temporary Offline
- 22.16 View Request Information
- 22.17 Encrypted System Information
- 22.18 Offline Authorization Login
- 22.19 Import License File
- 22.20 Login and Logout of the Encryption System
- 22.21 Parameter Settings
- 22.22 Using the Encryption USBKey
- 22.23 Proxy Administrator
- 22.24 Force Update Policy
- Chapter 23: Linux Encrypted Client
- Chapter 24: Mac Encrypted Client
- Chapter 25: USB Encrypted Client
- Chapter 26: External Viewer
- Chapter 27: Backup Encryption Server
- Chapter 28: Document Storage Request
- Chapter 29: Cloud Document Backup Server
- Chapter 30: Reporting System
- Chapter 31: WEB Console
- Chapter 32: WEB Approval
- Chapter 33: WEB Reports
- Chapter 34: Software Center
- Chapter 35: Security Viewer
- Chapter 36: Security Approval App
- Chapter 37: Dedicated Burning Tool
- Chapter 38: Access Gateway
- Chapter 39: Secure Access Gateway