System requirements for idgard® | idgard®

System requirements for idgard®

System requirements for idgard®

To use idgard®, you do not need to install additional software on your computer. You only need a browser. Check the following points to ensure that your computer is optimally configured for the use of idgard®:
  • To make working with idgard® easier, we recommend that you store the login mask as bookmarks/favorites in your browser.
  • We recommend using the following browsers: Mozilla Firefox, Google Chrome
  • JavaScript:  Must be enabled in the browser.
  • For a flawless data exchange with idgard®, you have to authorize the ports 80 (http) and 443 (https). If the connection to https pages is prohibited, you cannot use idgard®

The data stream into the Internet could be filtered within a company network in addition to a firewall by upstream proxy servers. Therefore, we recommend that you add https://my.idgard.de/ to the so-called white list of your systems. In this way, all information from and to idgard® will be transmitted unhindered.

This article did not answer your question?

We are happy to help you! Just send us a message with your questions and we will get back to you as soon as possible. 

   Create ticket


Disclaimer
The content of this online help is intended solely for information and documentation purposes for our product idgard® and can be changed at any time without prior notice. We assume no responsibility or liability for errors or inaccuracies. Due to technical developments, uniscon GmbH reserves the right to change the functional scope of the product at any time.

(C) uniscon GmbH






    • Recent Articles

    • How can I launch the idgard add-in in my organization?

      If access to the Microsoft App Store is restricted in your organization, you may have to ask your IT admin to approve the app. If you are using Exchange Server without Microsoft 365, you can launch the add-in in your organization. Microsoft offers ...
    • Enterprise settings

      Specifications for the layout of the idgard add-in or the creation of idgard emails can be defined in the enterprise settings of the idgard web application. These settings are made by the administrator and apply to all idgard users within the ...
    • Reporting illegal content

      The Digital Services Act (DSA) is an important tool for reporting problematic or harmful content in the digital space. It allows users to report potential violations of the DSA, helping to create a safer and more responsible online environment. Here ...
    • Data room archive

      In some professions it is necessary to archive documents. For this purpose, you can create a data room archive with idgard. This data room is available forever after conversion into an archive and thus secures all documents in this data room. This is ...
    • Delete multiple users at the same time

      In the user administration, you can delete multiple user accounts at the same time using batch actions. Which users you can delete depends on your own permissions and on the permissions of the users whose user accounts you would like to delete. To ...
    • Related Articles

    • Requirements for executing a meeting pack

      Requirements for executing a meeting pack The " Meeting pack" feature is only available in the Enterprise package. Meeting packs are used for modern session management and digital collaboration. All documents required for the session are combined in ...
    • idgard® and cyber-attacks

      idgard® and cyber-attacks State-of-the-art technologies and procedures protect the idgard® system against external attacks. If hackers were able to break through this protection and gain access to the database, this would be totally useless, since ...
    • Performance, Scaling and Availability of idgard®

      Performance, Scaling and Availability of idgard® idgard® is created in such a way that all sessions are completely independent of each other. This allows them to be distributed freely among numerous servers, i.e. system scalability is largely linear ...
    • How to back up your data with idgard®.

      How to back up your data with idgard® idgard® customers are responsible for backing up their own data, since idgard® is primarily a communication system and not a data backup system. However, one can act on the assumption of continuous data ...
    • Buying idgard®

      Purchase via the test version/direct purchase The following instructions apply only to the Essential, Growth, and Enterprise license packages. If you have booked any other package, contact support. Write to support@idgard.com You have two different ...
    • Popular Articles

    • Folder upload - behaviors and limitations

      Unsupported characters in file names will be replaced by an underscore during the upload process, this applies to these characters: *, /, \, ?, :, <, >, ^, ", &, | Example: M&A_Overview.xlsx will be renamed to: M_A_Overview.xlsx File names that ...
    • Uploading files

      Uploading files You can upload one or more files up to a size of 5 GB. For a fee, we can increase the size limit of 5 GB for you. You can only upload files with the "Write" permission. There are two methods with which you can upload files to a box. ...
    • View box activities in the journal

      In data rooms and depending on the setting, certain activities can be registered in a journal. You can view the data room journal if you have the permission to do so. To view box activities in the journal: 1. Open the data room the journal of which ...
    • Welcome to the idgard® online help

      Welcome to the idgard® online help This online help is the main source of information for learning and working with idgard®. Click on one of the following links to obtain further information about idgard®. To use the online help: Search article Enter ...
    • Isn't encryption on the device the best bet for a safe cloud?

      Isn't encryption on the device the best bet for a safe cloud? The term „cloud computing“ encompasses two aspects: Data storage in a cloud for one’s self, excluding multiple or third-party access. Data processing or storage of information in a cloud, ...