Security and Permissions (High) Flashcards

1
Q

Which takes precedence. Item level Security or Object Level Security

A

Item Level Security overrides Object Level Security

Action - See in lab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you secure text behind a redaction?

A

The only proper way to secure the text behind a redaction is to the produce the document that contains the redacted text. If a group has View rights only to a markup set (not Edit or Delete rights) and a reviewer in that group loads a document in the Viewer because they have no other way to view that document, they can actually see the text behind the redaction, in which case that text is not totally secured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where can Productions be found and who has access to them by default

A

Productions appear in the viewer by default and there are no specific permissions applied.
Do stop Productions being visible to certain groups set the “Production” permission to NONE for that group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a user has VIEW access to the History tab but does not have permission for VIEW ALL AUDITS will they be able to access the history tab?

A

No. They need access to the tab and also need the VIEW ALL AUDITS permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four types of Browser?

A

Folders
Field Tree
Advanced & Saved Searches
Clusters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you change permissions to an individual object. e.g. a specific view

A

You must find the individual object through Administration tab. e.g If it’s a field it will be in the Field tab.

Click edit security and you will need to click to Overwrite Inherited Security. Then set the specific permisisons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you change permissions to an individual folder. e.g. a specific folder in the folder tree

A

Right click the specific folder and click “Secure”.

Click edit security and you will need to click to Overwrite Inherited Security. Then set the specific permisisons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If you drag a folder with item level security into another folder. What security does that folder end up with?

A

The child folder will inherit the parent folders security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What users can access the Instance Details tab?

A

Only System Admins can access the Instance Details Tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Within Instance Details tab you can manage security. What elemtens of Relativity have security managed in here?

A

Access to System Admin Objects, e.g. Client, Matter, relativity Scripts. Stuff that isnt held in the workspaces.

You control access to the objects and also Tab Visibility for these Instance Level objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Where would you altar security permissions for the following items?
Agent Operations
Change Queue Priority
Force Logout on User Status
Manage Object Types
Send Message
Use Quick Nav
View Admin Repository
View Audits
A

Within Instance Security under the ADMIN OPERATIONS Tab

These arent objects, they are admin operations. So makes sense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you determine exactly what permissions a certain group has?

A

Within Instance details use Group Permissions Report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What permisions do you need to have in order to access the following items?
Library Application View - Upload Application button
New Script page - Edit and delete buttons

A

Along with various other system critical items throughout relativity these items can only be accessed by System Administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If you perform a job while previewing a user’s security settings, the audited action is credited the USER you are Previewing as or as YOU?

A

The Audited action is credited to you.

The preview feature just allows you to simulate what the user would see

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You wish to View Another Users Personal Items. How do you achieve this?

A

Within the Workspace details tab, in the Relativity utilities Console on right hand side you click on “View Another Users Personal Items”. Then select teh user(s) whose items you wish to view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you set a user to only be able to login from specific IP ranges?

A

In the Users tab you can set the trusted IP range for each user.

Alternatively you could set a trusted IP range at teh instance level for the entire instance using the Relativity.Authentication WindowsAuthIpRange instance Setting. Instance Settings are under the Instance Settings Tab.

17
Q

How do you configure Windows Integretaed Authentication?

A

You must enable the “UseWindowsAuthentication” and “WindowsAuthIpRange” Instance Settings.

When “WindowsAuthIpRange” is not set then any IP can access. If oyou set IP ranges here then only specified IPs can login using Windows Auth.
Anything outside of that IP range will revert to other log in methods