Recent Articles
Delete multiple users at the same time
In the user administration, you can delete multiple user accounts at the same time using batch actions. Which users you can delete depends on your own permissions and on the permissions of the users whose user accounts you would like to delete. To ...
Change the user status for multiple users at the same time
In the user administration, you can deactivate multiple activated user accounts or reactivate multiple deactivated user accounts at the same time. Regardless of which users you select, the batch options are only performed for those users for whom ...
Manage permissions for multiple users at the same time
In the user administration, you can change permissions for multiple users at the same time. Which permissions you can grant or modify depends on your own permissions and on the permissions of the users whose user accounts you would like to edit. To ...
Modify user groups and notifications
You can assign multiple users to the same user groups in the user administration. You can also edit the notification settings for multiple users at the same time. To assign multiple users to the same user groups at the same time, proceed as follows: ...
Batch actions
You can perform actions for multiple users at the same time in the user administration. When you select one or multiple users in the user overview, the available batch options are displayed in the top bar. The user overview, filter, and search field ...
Related Articles
Switching license packages
Switching license packages The following instructions apply only to the Essential, Growth, and Enterprise license packages. If you have booked any other package, contact support. Write to support@idgard.com You can switch to a different license ...
Billing the use of idgard®
Payment method in idgard® The following instructions apply only to the Essential, Growth, and Enterprise license packages. If you have booked any other package, contact support. Write to support@idgard.com Due date After the booking has been ...
2-Factor authentication default settings
2-Factor authentication settings To increase the protection factor, you can force the use of a 2-FA in idgard®. Changes at this point are only effective for newly created users. To make this setting, you need the permission of an Administrator. The ...
Enforce 2-factor authentication for all users
Enforce two-factor authentication When a user is created, a 2-factor authentication for the login is forced. Without the assignment of a 2-FA method, the user cannot be created. If you want the SMS pass code method to be used for users, you must ...
Move objects within a box
There are 2 methods to move a file, folder or message. You can use the "Move" function or move these objects using "Drag&Drop". If you want to move the objects of others, you need the right of a creator or administrator of a box. To move your own ...
Popular Articles
Uploading files
Uploading files You can upload one or more files up to a size of 5 GB. For a fee, we can increase the size limit of 5 GB for you. You can only upload files with the "Write" permission. There are two methods with which you can upload files to a box. ...
Folder upload - behaviors and limitations
Unsupported characters in file names will be replaced by an underscore during the upload process, this applies to these characters: *, /, \, ?, :, <, >, ^, ", &, | Example: M&A_Overview.xlsx will be renamed to: M_A_Overview.xlsx File names that ...
View box activities in the journal
In data rooms and depending on the setting, certain activities can be registered in a journal. You can view the data room journal if you have the permission to do so. To view box activities in the journal: 1. Open the data room the journal of which ...
Welcome to the idgard® online help
Welcome to the idgard® online help This online help is the main source of information for learning and working with idgard®. Click on one of the following links to obtain further information about idgard®. To use the online help: Search article Enter ...
Isn't encryption on the device the best bet for a safe cloud?
Isn't encryption on the device the best bet for a safe cloud? The term „cloud computing“ encompasses two aspects: Data storage in a cloud for one’s self, excluding multiple or third-party access. Data processing or storage of information in a cloud, ...