Activity monitoring Accesses HowTo's/Configuration Reporting
Overview This article provides information for creating backups of GFI Archiver Archive Store(s). It is highly recommended to create backups of GFI Archiver Archive Stores regularly in order to avoid ...
Overview This article shares the process of adding archiving rules in GFI Archiver. Learn more about Using Archiving Rules in GFI Archiver. Process Follow these steps: Open GFI Archiver admin interf...
Overview This article describes the process to configure Index File Location credentials. When you configure the Index File Location credentials, you will be able to enter UNC (Universal Naming Conven...
Overview GFI Archiver's Database Activity Auditing feature uses the tracing capabilities of SQL Server® to record all activities affecting the archive databases. This article provides information ab...
Overview This article describes the process to configure Word Breaker. Word Breaking is the breaking down of text into individual text tokens or words. Many languages, especially those with Roman alph...
Overview User settings need to be adjusted to use the Mailbox Folder Structure Retrieval (UMPolling) feature within GFI Archiver for the following environments: EWS - Exchange Web Services Microsoft E...
Overview This article shares the process for creating new roles in GFI Archiver according to your organization's requirements. Each role is defined by a unique name and a set of permissions. Process...
Overview This article shares the process for assigning roles in GFI Archiver. A user or group can be assigned one role. No user or group can be assigned two roles. However, since a user can be a membe...
Overview GFI Archiver ships with five predefined roles, two of which offer different levels of Full Access. Administrator Auditor Full Access and Administrator Full Access User (Default) This article...
Overview This article shares the process for removal of user roles within GFI Archiver. Process Follow these steps to delete a role: Go to Configuration. Click Roles and Permissions. The Roles and P...