Get your questions answered from our list of frequently asked questions.
There are numerous ways you can distribute your Vitrium-protected content and it will largely depend on which Vitrium application you have:
Vitrium Security Pro | Vitrium Security Enterprise | VitriumOne |
Send protected content via:
|
Send protected content via:
|
Send protected content via:
|
If you want to check out a user’s activity you need to review “User Activity Log” report in Reports tab. You can access a specific user’s activity report whether by filtering the report by the User Name or going to the Users tab and click on the report icon
This report shows the date and time when a file was accessed, what the file name is, which user accessed the file, which group the user belongs to, which method they used to unlock the file (web or PDF), which IP address they used to unlock from, what their tracking ID is (a specific ID from their application or browser’s cookie), and also which application or browser was used, what version, and what operating system they used.
If there are different Tracking IDs or different IP addresses, it means that the user has unlocked or tried to unlock the content from different devices and from different locations. Note that Secured PDF files can only be accessed in Adobe Reader or Acrobat on a desktop or Laptop so the Application shown for secured PDF content is only Reader; However, Secured web links are accessible through a browser whether in desktops, smartphones or tablets.