top of page

Search Results

Results found for empty search

  • Forms Addict Alert - Configuring form data sources and CSS/JS

    By Kyle Knebel February 2022 Consultant’s Corner: This month we are going to spotlight two valuable and exciting features of Laserfiche Forms. The first feature we will review is Database Lookups. The second feature we will review is JavaScript. We’ll also look at the best practices for these options and discuss important items to think about when upgrading. Laserfiche Forms comes in two basic “flavors”: the Essentials edition and the Professional edition. The Professional edition is included for all On-Premises installations if you have a Laserfiche RIO environment. If you have a Laserfiche Avante license, the Professional Edition is still available as an add-on option. Database Lookups are included in Forms Professional only. For those with Laserfiche Cloud, Database Lookups function differently and will therefore not be discussed in this article. All flavors of Laserfiche Forms have CSS (Cascading Style Sheets) and JavaScript functionality available out-of-the-box in the latest version. Now that we have the basics, let’s get into the details. Connecting to a Data Source Once a process is associated with a data lookup source, while in that process, forms can access information in the data source to automatically fill out fields or suggest values to users. This follows best practices aimed at reducing error-prone and unnecessary manual data entry. Any Forms Processes that have been added to the data source will have access to the source regardless of the user. This delegation of access is completed entirely in the background. Note: You must have the System Administrator security role assigned in order to make these changes. Here are the steps to configure a Data Source: Step 1: Select the account drop-down at the top right corner, then choose Administration. (In this example the user is logged in as “Forms”) Step 2: Select Data Sources from the System Settings option on the left side of the screen. Step 3: Select the New data source button at the far right. Step 4: The “New Data Source” dialog box will appear, ready for configuration. Step 5: Enter the Name field of this data source you are creating. Note: For some earlier versions of Forms, the name needs to be surrounded by double-quotes if it has spaces. Step 6: Select the DBMS type. Step 7: Next, you will have two choices, MS SQL Server, or ODBC. Select one. As of Forms 10.2 the ODBC type is available. As per the Laserfiche help file: Note: As of Forms 10.2 the ODBC type is available. As per the Laserfiche help file: Fully supported ODBC drivers include: Microsoft Access Database Engine (supporting Excel, Access, CSV, and TXT), MSSQL, MySQL, PostgreSQL, Oracle, OpenEdge, IBM DB2, FileMaker, SoftVelocity Topspeed, and Pervasive. These drivers have been tested with Forms. While other ODBC drivers may work, they have not been tested, and may have potential issues. Step 8: For ODBC, enter the Data Source Name or if you are using a SQL Server, enter the Server and Database fields. Step 9: Enter the Account Name and Password. Step 10: Select Test the connection. Step 11: Add your desired processes to this data source using the Add/remove processes button. This will allow the processes to use the source for lookups. Step 12: Using the checkboxes on the left, select the processes that will use this data source and press Save. Step 13: Now, in the Forms Designer, you will find the Data Source listed under the Form’s “Lookup Rules” tab. Some Exciting Uses of Java Script 1. Use JavaScript to apply a phone number mask to a field. JavaScript can be used to preselect the format in which you’d prefer U.S. phone numbers to display. When a U.S. phone number is entered into a field the user simply needs to input the numbers and the field will show as follows: To set up the above, please follow the following steps: a.) The field should be a Single Line field type. b.) On the Advanced tab of the field, scroll down to the CSS Class field and enter the word “phone.” c.) Then, click on the CSS and JavaScript tab of the form and insert the JavaScript below (see step d. for code to input) in the JavaScript box. Save and preview the form. d.) JavaScript to add for phone number mask: /* Mask single line input to autoformat for phone number (_)_-__ */ $(document).ready(function () { //Download the script and apply the masks $.getScript("***************************************", function () { ApplyMask(); }); //Re-apply masks when the "Add" link is clicked * ONLY IF IN A COLLECTION* $("").click(ApplyMask); }); function ApplyMask() { //Loop through each input element with a parent containing the "phone" css clsas $(".phone input").each(function () { //Get the element and apply the mask var el = $(this); el.mask("(000) 000-0000", { placeholder: "(_) _-__" }); //Get the parent and remove the class //This prevents the same elements from being found in future calls to this method var parent = el.parent('.phone'); parent.removeClass("phone"); }); } 2. Use JavaScript to disable or enable the submit button if a radio button matches a condition of a field value. JavaScript can be used to help regulate who can select Submit based on the option they pick in the radio button field. For example, if you do not want users who have selected “yes” to have the ability to submit you can hide the option altogether. To set up the above, please follow the following steps: a.) Under the Advanced tab, navigate to the CSS class field and enter “hideSubmit”. b.) Then, click on the CSS and JavaScript tab of the form and insert the JavaScript below (see step c. for code) in the JavaScript box. Save and preview the form. c.) JavaScript to add for disabling or enabling submit button: $(document).ready(function(){ // apply event handler to radio inputs $('.hideSubmit input').change(function(){ // if 1 or more YES selections are found if($('.hideSubmit input[value="YES"]:checked').length > 0){ // hide submit button $('.Submit').hide(); } // otherwise else{ // show submit button $('.Submit').show(); } }); }); CSS Class = hideSubmit 3. Use JavaScript to limit a date field to today’s date or earlier. Limiting the date field will narrow the options available for users. This can help minimize the possibility of errors for users filling out your Forms and can be created using JavaScript. To set up the above, please follow the following steps: a.) Under the Advanced tab, add “MyDateFieldSelector” in the CSS class field. b.) Then, click on the CSS and JavaScript tab of the form and insert the JavaScript below (see step c. for code) in the JavaScript box. Save and preview the form. c.) JavaScript to add for disabling or enabling submit button: $(function() { $(document).ready(function () { var todaysDate = new Date(); // Gets today's date var year = todaysDate.getFullYear(); // YYYY var month = ("0" + (todaysDate.getMonth() + 1)).slice(-2); // MM var day = ("0" + todaysDate.getDate()).slice(-2); // DD var maxDate = (year +"-"+ month +"-"+ day); // Results in today's date // Now to set the max date value for the calendar to be today's date $('.MyDateFieldSelector input').attr('max',maxDate); }); }); We hope you found this article interesting and will find a way to put some of these ideas into your Forms in the near future! CDI NEWSLETTER Stay up to date with all the latest Laserfiche news, CDI webinars, blogs, and more!

  • Snapshot printing mastery, options detailed!

    By Kyle Knebel January 2022 Consultant’s Corner: Laserfiche Snapshot is a tool that creates images and text from electronic files. The tool saves you the step of printing out a document and then scanning it into the repository. For example, you can print images and text from a Web page, Word Document, Excel spreadsheet, text editor, etc. This is a great tool to archive a version of a document, web page, or report. Since this was a document captured when it was printed, it will remain a “point-in-time” copy of that document. Also, it will be viewable in Laserfiche without opening an external application! Any file opened with a Windows application with printing capabilities can use Laserfiche Snapshot. In addition, Snapshot can save files to your repository for on-premise installs or to a Laserfiche Cloud repository. Snapshot has many options, including color printing, print profiles, shared printing to a network computer, bates numbering, choice of file formats and quality, embedded annotations, watermarks, and page size/orientation options. Let’s get into some details, shall we? Basics: Once installed on a computer, it is recommended that the user run the “Snapshot configuration (Current User)” application under the Laserfiche folder on the Windows start menu before first use. These settings will be remembered for the current Windows user logged into the machine from then on. Note: If other Windows users access this same machine and they want to print using Snapshot, they will need to run this step, as well, but only once for each account. Note: We will address a Shared Printer configuration a bit later. Snapshot can be used to print to a repository either on your network, over the Internet via SSL, or to Laserfiche Cloud. How great is that?! Step 1: Setup your server, repository, and login credentials A.) Upon first running the Configuration utility, you’ll be asked to enter the repository Server name. For on-premises installations, the name of the server or network IP Address can be used. You can obtain this from your Laserfiche Administrator if not sure. Just type it in the box since it may not be in the drop-down list. For a connection over the web/Internet via SSL, you’ll need the Fully Qualified Domain Name (FQDN) address, otherwise known as the URL to the server. It should match the URL for the Web Client (and the SSL certificate usually); make sure to check the SSL box. For Cloud environments, you’ll need your Account ID (9 digit number). B.) Then, enter your login credentials. Step 2: Configure Snapshot General, Template, Tags, Document Handling, Text, and Advanced settings A.) General settings include an option to prompt for document naming, folder path, template, tags, and document handling or to use the pre-set values you might enter here on these tabs. Document Properties like the name can be left with the default of "%(PrintJobName)," which does exactly what you think it does. It uses the naming that the print job gives to the document. You can also add additional tokens to the name. An example is shown in the image below. Set your default folder path in the repository where you want the document to be stored. Set the Volume, as well; typically, this is “DEFAULT.” B.) The Template tab Set a preferred template if you want always to use a template when using Snapshot Check the box to allow the Laserfiche default template. (Note: The default template will come from the user’s settings that they have set in the General node of the New Document Options dialog box found under Tools.) C.) Apply Tags if desired Check any tag that you would like to apply to new documents. D.) The Document Handling tab This tab allows you to configure how Laserfiche deals with a document found with the same name already in the specified folder path. E.) The Text tab By default, Snapshot is set to obtain text directly from the print job, but it does depend on whether the text is coming from the print job, as it may not. If this is not the case, or you are unsure, it is recommended to “Perform OCR on the images created.” If you don’t want a text-searchable document, configure not to import text. F.) The Advanced tab Profile Management: For any configuration, click the "Save As…" button to create a new profile. The profile can be saved as either a current user (Windows) profile or for all Windows users of this local machine. Just check the appropriate radio button. OR Choose the Default image viewer for print preview, which gives you the choice of Laserfiche’s built-in image viewer, or you can pick your preferred Windows image viewing application. Step 3: Set Printing Preferences (the details!) Back on the General tab, you can preset your print preferences. Here’s where things get interesting! (Note: These same settings can be found when printing from your application, just select "Printer Properties.") With Printer Properties/Preferences, you can: Set paper output sizes and resolutions Control image file format Set embedded annotations Apply Bates number stamps Set watermarks Redirect to a physical printer at the same time as you print to Laserfiche Save different print profiles A.) Device settings allow you to control how big the page size will be, the orientation, and the resolution (300 dpi is best practice). The "Edit Paper List…" button allows you to limit your paper size choices in the drop-down list above it. You can also add a paper size that is not listed. For U.S. dimensions, specify 0.01 inches. B.) File Formats allow you to set the image format, color depth, and photo quality. Using TIFF Group 4 or JPEG file formats, you can select additional options. Internet TIFF format - If the TIFF file format is selected as the output image format and this box is checked, the driver creates a TIFF file that is compatible with the requirements listed in Chapter 3 of RFC 2301 File Format for Internet Fax (which is not part of this document). Chapter 3 of RFC 2301 File Format for Internet Fax lists the required tags for black-and-white faxes. The extra tag the driver includes in the TIFF file if this flag is checked is NEWSUBFILETYPE. Reverse bit order in TIFF - If this box is checked, the driver saves TIFF images with reverse bit order and sets the value of the FILL ORDER tag in the image file to Reverse. Add Page Numbering Tag - If this box is checked, the driver sets the page number tag of every page in the output TIFF file. The quality factor ranges between 1-100, 100 being best. For Dithering methods, the fastest is Floyd-Steinberg, and the slowest is Stucki, but it renders the highest quality output. C.) Watermark will allow for either the first page only or unique watermarks on the first page. If you choose "Add watermark to the first page only" the options will be limited to the "1. page only" sections. D.) Embed Annotation allows the user to specify the position of the user-defined text, type, color, and font size used to print the annotation on all images. You can also set custom Header and/or Footer annotations. E.) Bates Numbering allows a sequential index numbering scheme to be applied to document pages. They will be visible when printed. To make Bates numbers searchable from Snapshot, you will need to set the Text tab option to "Perform OCR on the images created for the print job." Tip: If you set the font color to the page color (White, for example) you can OCR the pages and make the Bates number searchable, however, it won’t show on the images or printed copy. Step 4: Manage Print Profiles The Profile Manager tab allows you to save different print configurations, like a Bates numbering setting, or any combination of print settings. Clicking on the "Add Current Settings as a New Profile…" will allow you to enter the name and description. The profiles can be managed from this tab at any time. Step 5: Shared Printer settings Snapshot can be used as a Network Printer that will be available to all users on the network by sharing it through the Sharing tab on the Laserfiche Snapshot Properties dialog box. To install Snapshot as a Shared Printer, you will install the software with a custom configuration, or modify the existing installation in the Apps Settings on the server. Simply check the "Snapshot Shared Printer" option. Click on the Sharing tab, and check the box "Share this printer" to allow others to print to this printer source. Note: If you want the client computer to perform the rendering and other work of print jobs, select Render print jobs on client computers. If you want the print server to perform the rendering and other work of print jobs, clear this option. CDI NEWSLETTER Stay up to date with all the latest Laserfiche news, CDI webinars, blogs, and more!

  • The Fundamentals of Enterprise Content Management (ECM)

    When considering using Enterprise Content Management (ECM), it is essential to recognize the fundamentals of the software’s services. The foundation of any ECM includes collecting content, records management, automation processes, and information security. These fundamental elements are what empower organizations to execute their content management goals efficiently and cost-effectively. Collecting Content Any ECM requires the capture and importing of information to begin implementing its duties. The captured data can range from digital files to scanned documents, including: Invoices Resumes and job applications Contracts Images Reports Emails Modern content management software utilizes digital repository’s to store data. As a result, having digital storage can dramatically increase the efficiency of an organization to capture, manage, and search data with ease. Records Management Beyond organization, a digital repository can allow users to apply rules on the documents, such as who can access certain content, provide specific classification on data, and execute advanced searches. Once successfully importing the information into the digital repository, you can do the following functions: Provide specific classification and search functions for documents based on metadata. Search documents through text. Search by document creation date, the names of users who checked out documents, and other metadata. Find specific words or phrases within document text, metadata, annotations, and entry names. Establish user restrictions such as who can view, edit or create documents. Create flexible folder structures to organize data. A great ECM successfully eliminates obstacles when searching for information. It allows employees to retrieve data needed to help their organization or their customers immediately. The fast access to information enables staff to make better decisions and provide prompt responses. Process Automation Once you have classified and organized your data in the repository, you now can initiate workflows and automation. With automation, you can skip manual tasks to streamline communication and processes throughout your organization. Examples of workflows and automation include: Approve or deny vacation requests. Push important documents through various steps of review and approvals. Route documents to the appropriate users promptly. Information Security With any organization, the security of sensitive data is paramount. Secure documents protect the information of customers and employees from data breaches. Earlier on, we touched on some of the security measures but to expand on the list; you can also do the following: Apply restrictions to folders, documents, fields, and other document properties. Monitor system activity such as logging in or out, creating or destroying data, making password changes, and much more. Although all data goes into the same repository, you can keep information separate based on department. For example, you can restrict confidential employee information to only the HR managers and HR departments. Ultimately, ECM software seeks to achieve the same goals. They aim to provide solutions to make all content interactions occur in one single system. There is also the possibility to integrate with other tools to expand content capabilities. If you want to learn more about the Laserfiche integrations that CDI offers, please click on the button below. The link will direct you to our Laserfiche integration page. CDI NEWSLETTER Stay up to date with all the latest Laserfiche news, CDI webinars, blogs, and more!

  • Adding a Windows Active Directory User to Laserfiche Directory Server (LFDS)

    By Kyle Knebel This month, we will look at how to add a new Windows user through Laserfiche Directory Server (LFDS) after purchasing one or more additional full licenses. As you expand your Laserfiche system, you may find that you need to add additional Laserfiche users. Having submitted your purchase order for new licenses, you should be able to ‘Renew’ your LFDS licensing site’s Master License within a day or two. This action tells LFDS to query Laserfiche for any new licensing that was purchased. This ‘Renew’ action will update your LFDS system with any new license(s). Renewing the LFDS Licenses LFDS is accessible from the server via a link in the Windows Start menu, or you can use a web browser and navigate to the LFDS website. The site URL is usually HTTPS://{servername]/LFDS. In the LFDS site, click on the Settings tab (in between Applications and Audit Options) Under the General tab, you will see a ‘Renew Primary License’ hyperlink in the Primary License section. Press the hyperlink, and LFDS will automatically add those new user licenses you just ordered and query Laserfiche corporate headquarters for the latest information. Adding a User to LFDS (and to the repository) If a Windows Active Directory (AD) user has been granted a named Full user license in LFDS, they can use that license to sign into any repository in the system. This account will only take up one user license. Steps: In LFDS, navigate to the Accounts tab. a.) Click the “+ Users” button and select “Windows Active Directory User” to add the Windows User or Group account. b.) Ignoring the Organization drop-down, click on the Register directory user(s) button on the far right. c.) Search for Users or Groups in your Active Directory domain. For example, if you search for an AD Group, you can add all those members. Then selectively remove some of the members, if not all, who will be using Laserfiche before finishing the process. d.) For Users or Groups, click on a single entry in the Search results pane to add it to the list of added users. Or search for all the required users and groups, and then press Add All. This will add that user or set of users to the Added Users list. e.) Press OK at the bottom when ready to add them to LFDS. Note: Registering a user in Directory Server does not automatically add that account to your Laserfiche repository. Suppose a Windows Active Directory user has been registered in a Directory Server licensing site (LFDS) but has not been granted access to the repository. In that case, they will not be able to sign in. You will also need to give that user access to your Laserfiche repository(s) in the LF Admin Console. f.) In the appropriate server, open the LF Admin Console of the applicable repository(s), then navigate to the Users & Groups node, and add the account as a Windows Accounts entry. Set their Authentication as “Trust: allow access.” Then assign their Rights as you would for any other user or group. CDI NEWSLETTER Stay up to date with all the latest Laserfiche news, CDI webinars, blogs, and more!

  • Avoid Getting Spooked by Your Workflow this Halloween!

    October 2021 Consultant's Corner By Kyle Knebel This month's Consultant's Corner article will cover a topic I think you'll find very helpful. I brought this up during my training sessions on Laserfiche Workflow and thought I'd share it here, as well. Laserfiche Workflows are powerful and can quickly change your Laserfiche content, either scheduled or when something changes in your repository. Many workflows are built with ‘Start Rules,’ which run a workflow based on specific criteria, like a newly created document moved to a particular folder. Most of the time, entries are being uploaded or managed by end-users, and then a workflow might run on that entry. But what if a different workflow moved the original starting entry back to that same starting folder that was being monitored? Does Workflow care who put it there? And let’s say that the “starting” workflow runs on that document. What if this document gets processed and then ends up back in the same monitored folder? And then the process gets repeated? Now we have a problem! In a matter of seconds, there could be thousands of repeating workflows, looping back and forth, out of control. That’s a Halloween “nightmare” nobody wants to see! A client many years ago had this situation occur to them with a workflow they had built. In their case, the Laserfiche system and SQL database was installed on the server’s C: drive (the primary drive). Unfortunately, their looping workflow created multiple entries and the log files so that it filled the C: drive and crashed the server! Our technical support team was able to recover the server and get them running again. However, I’m sure the client would have liked to avoid it. So how do we solve this? One of the best ways to prevent “runaway” workflows is to add a specific condition to your start rules. Just add: User does not equal {workflow user} In the example screenshot below, the workflow account is ‘wf.’ However, additional criteria, like specifying an entry path or metadata requirements, will also prevent excessive workflows. The best practice is to be as specific as possible with the start conditions and use entry paths to limit an entry to trigger a workflow. The example above shows that the entry type, path, metadata, and user are explicitly defined. This is always a good idea. And that’s how you avoid a spooky workflow this Halloween! Thank you, and have a Great Paperless Day! CDI NEWSLETTER Stay up to date with all the latest Laserfiche news, CDI webinars, blogs, and more!

  • List of Haunted Workplaces in North America

    By Taylor Pope & Julio Velela Have you ever stayed late at the office? The cleaning crew had finished for the night, and most of the lights turned off with just a few florescent bulbs flickering. You look out the window from your desk and see nothing but darkness. Typically, your workplace shouldn’t creep you out, but what if your building is known for its “alleged” paranormal activity? Would you stay late to finish that project? In the spirit of October and with Halloween just around the corner, the CDI team wanted to add to the boo-tastic season with a few stories of haunted workplaces around North America. Trick or treat yourselves to some candy and enjoy our list of spooky stories! Now, let’s check out these wicked workplaces. Ghost Girl in Fargo, North Dakota Screenshot of little ghost girl caught on camera, YouTube. Late at night, in the office of Flint Group in Fargo, North Dakota, staff members have been visited by a few ghostly companions who roam their halls. Employees that work after hours have spoken of seeing people drifting around the office. One of those characters is a little girl that can be seen and heard calling for her mama. Sure, their stories might be hard to believe, but the little girl has supposedly been caught on camera. Above is a screenshot of the footage claimed to be the girl who wanders the office late at night, but she is not the only one. Due to all the paranormal activity, a psychic medium was recruited. The psychic focused on investigating the three spirits commonly seen: the little girl, a tall man in a coat, and a dog. After her investigation, she believed that the girl was about seven years old and that the tall man in the coat is the dog's owner. It has been a while since Flint Group reported a ghost sighting, so who knows if the spirits are still active. However, it would be safe to say I’m sure staff members draw straws for who must stay late to finish assignments. The Lawless Spirits in New Mexico Having to get a lawyer or fighting your case in a courtroom can be a stressful situation. Can you imagine dealing with those very same lawyers and courtrooms that just so happen to also host a few ghostly busybodies? A deputy district attorney from New Mexico, Gloria McCary, says her former office was haunted. In an interview with Forbes, she retold stories of hearing voices and noises that no one could explain. Her colleagues would hear papers being shuffled around at night, the sound of forceful clicking as if someone was typing on a keyboard, and chairs shifting in other rooms. Oddly enough, Gloria was not scared of these accounts at first. Instead, she was intrigued by all the haunting encounters everyone in the office was experiencing. However, even the bravest among us have a limit. After having to deal with those creepy sounds for so long, Gloria decided to start taking her work home instead of staying late with the busy ghosts. The law firm eventually relocated to a different office which we’re sure all employees appreciated. Haunted Basement in Chicago, Illinois Photo source: Wikipedia Imagine this – you’ve just got hired as a postal worker with great benefits and great hours. You love getting to interact with people all day, but while chatting with a customer they tell you a story. A story about the very building you work in and its bloody history. Would you work inside a building where a serial killer was known to murder all their victims? What if the building was knocked down and a new structure was built over the rubble? If you look to our next haunted workplace as an example, even a demolition cannot expel ghosts who were met by a horrifying and tragic end. Located near the 1893 World's Fair in Chicago, Illinois, a man owned a mixed-use building full of hidden chambers, secret passages, and trap doors. That building would later be known as the "Murder Castle." That is the site where the owner and serial killer, H.H. Holmes, murdered approximately 27 people. Two years after Holmes was arrested in 1895, the structure caught fire, and the building stayed vacant for 40 years. The building was later demolished, and in its place, the Englewood Post Office was built. According to the postal workers that work there, the basement is full of horrors. You can hear disembodied voices and footsteps echoing from below. Workers have also said to have seen chairs move all on their own. Very few are surprised this location would be the site of many accounts of ghostly activity considering the actions of H.H Holmes. For example, his use of trapped doors to transport his victims to the basement to carry out gruesome acts was sure to leave behind the spirits of some -understandingly- very angry victims. Haunted Toy Store in Sunnyvale, California In the 1970s, the Toy R Us franchise store was expanding into California. One of the buildings that they chose to lease was located in a town called Sunnyvale. Little did they know that the land on which the building was built had a long history of unfortunate deaths. Martin and Mary Murphy, a married couple, were one of the first pioneers to California through the Sierra Nevadas. In the 1840s, they eventually settled in the bay area and built a ranch in present-day Sunnyvale. They were a very influential family, but unfortunately, many members of their family passed away at young ages. All of which was said to have been “accidental” or caused by disease. Those poor young souls are the ones that supposedly still haunt the grounds to this day. Many Toys R Us employees reported seeing faucets in the bathroom turn themselves on, toys move down the aisles, and a ghostly fog appeared in the store. The paranormal activity grabbed the attention of a TV program to run a special covering the history of the store location and the terrifying experiences that the staff endured. You might be glad to hear the toy store, which gained much fame for the ghosts that roamed their aisles, is no longer in business. Another company has now found the courage to call the building their new home. REI has announced that they are relocating their Mountain View, California store to Sunnyvale in the same building as the haunted Toy R Us. Time will tell if the REI employees are met by those same ghostly spirits. We hope you liked hearing about these haunted workplaces, and feel free to share this list with your team and friends. From your CDI team here, we’ll be witch-ing you a Happy Halloween! CDI NEWSLETTER Stay up to date with all the latest Laserfiche news, CDI webinars, blogs, and more!

  • Managing Physical Records With Laserfiche Records Management Edition

    By Kyle Knebel This month’s Consulting Corner article will cover using Records Management edition features to manage physical boxes and documents. This article will address a simple need to handle paper-based content that can't be scanned into your Laserfiche system, maybe already housed in a warehouse, is only occasionally retrieved, and will eventually be destroyed. If you are already a seasoned Laserfiche administrator or Records Manager, this will be very straightforward. The steps will include an example template to be applied to “0-page” documents, then placed under Records Management and managed using the Laserfiche Records Management module features. Here’s how we can accomplish our management of “Physical Records.” 1.) Configure a Template for use with your physical records Using your Laserfiche Administration/Management Console, create a new template, for example, “Physical Records,” as shown below. 2.) Add physical boxes as document entries in the Repository As of Laserfiche version 10.4.1, you have been able to apply Records Management (RM) properties to content without being constrained by a Records Series structure so that the following steps can be applied to entries regardless of their location in the repository. However, if you already have a formal Records Series structure, one should keep using it since the inheritance of RM properties makes life easier. In the appropriate location, whether it be a Records Folder under a Records Series or standard folder, create a 0-page document. You could use Laserfiche Workflow to deal with many copies, but we’ll create one manually for now. If the document is made in a Record Series or a Records Folder, the RM properties will be inherited. Apply the template that you created, like the “Physical Records” template example in Step 1. If this document doesn’t live in a Record Series, ensure that the appropriate Records properties are assigned to the document to manage its RM life cycle. Manage the documents as you would for any other “Records,” but remember you will have to go out and physically destroy the box when you do the same in Laserfiche. You can then run searches (reports) for these documents using a custom search using the template and records management properties, like ready for cutoff or ready for destruction. If all your records are managed using Records Folders, you can use that search instead of a search by Records. If possible, a best practice is to maintain records in a Records Folder, thereby reducing the need to manage individual records documents. Top Tip: Laserfiche Workflow can be used to send emails with a list of records ready for records management activities, like being Cutoff or Destroyed. Many users already have an index of record inventory attached to each box. If this inventory is contained within Excel or another database, it can be imported into Laserfiche using Workflow to create the physical records in Laserfiche automatically. If using the Laserfiche Mobile App, you may also use barcode scanning from your mobile phone if the box or record contains a barcode. This allows users to search for records associated with the box index when standing in front of the physical records. CDI NEWSLETTER Stay up to date with all the latest Laserfiche news, CDI webinars, blogs, and more!

  • What You Need to Know About The Adobe Sign Integration

    By Julio Velela The Laserfiche Integration with Adobe Sign is a game-changer for all self-hosted customers. Adobe Sign will allow developers across your organization to build robust processes that collect e-signatures with complete ease. In addition, you will be able to upload documents for signing, request, and track signatures using different role assignments and store signed documents in the Laserfiche repository. Using this excellent integration requires customers to have the following: Laserfiche Forms 10 and above Laserfiche Workflow Laserfiche repository Forms server Adobe Sign enterprise licensing For more information on licensing, go to Adobe Sign for enterprise and business at https://acrobat.adobe.com/us/en/sign/business.html. Adobe Sign can fulfill your digital signature needs with more than 8 billion transactions processed from millions of signers worldwide. You can also expect greater efficiency and security since to help protect sensitive information, Adobe Sign follows industry-standard security practices and encrypts all documents. On top of that, Adobe e-signatures are legally valid and enforceable in nearly every industrialized country worldwide. Where to Find the Form Process The Adobe Sign integration can be found in Laserfiche Business Process Library under Adobe Sign – Send for Signature Forms. Users will be able to upload a single file to Adobe Sign and send it out for signature. Workflow uploads the document to the Laserfiche repository and sends it to Adobe Sign over HTTPS upon submission. Signers will then receive an email requesting a signature and a link to the document in Adobe Sign. This process uses the following forms: Upload Documents for Signature Adobe Sign User Interface This process calls the following workflows: [AdobeSign] – Forms Signature Invoke [AdobeSign] – Forms Wait for AdobeSign UI As with all Laserfiche Business Process Library processes, you can adjust this workflow to fit your needs. The workflow can be applied to different processes to send documents for signature using Adobe Sign. How to Get Started Step One: Select the Adobe Sign – Send for Signature Forms process and upload Documents for Signature Form To upload a file for signature, select the Upload button. You will then need to browse your computer for the file you want to use. Note: Only a single file can be sent to Adobe Sign. If multiple files are attached, an error similar to the following appears: Step two: Select how signatures are added to the document Using the Adobe Sign UI: To use the Adobe Sign UI, select Adobe Sign UI. When the form is submitted, the Adobe Sign user interface will appear. Using an Adobe Sign Template: To use an Adobe Sign template, select Adobe Sign Template. In the Adobe Sign Template box, enter the name of the template. Note: The name of the template needs to match exactly as it appears in Adobe Sign. If the workflow cannot find the template, it will follow the path for the Default option. Select the option for the email sender you want to use. For example, if you select Adobe Sign, the email will come from Adobe Sign. If you select Laserfiche, the Workflow server will send the document for signature. Using Default Signature Fields: To use the signature fields already in the document or to have Adobe Sign add a signature field on the bottom of the last page, select Default. Step three: Select the option for the email sender you want to use If you select Laserfiche, the Workflow server will send the emails using its default setting. Step four: Select the Parameters you want to change Enter the full path in the Save To Laserfiche Path box to change the repository location where the uploaded file is stored. Otherwise, leave the box blank to use the default path. To change the Adobe Sign API user, enter an email address in the Adobe Sign API User Email box. Otherwise, leave the box blank to use the default API user. Adobe Sign User Interface Form If you select Adobe Sign Template or Default on the submission form, the document will be sent to Adobe Sign for signature. If you select Adobe Sign UI on the submission form, a second form appears. The second form uses an iframe to display the Adobe Sign user interface. From a user perspective, the form appears similar to the following: From a recipient perspective, the form appears similar to the following: Why use Adobe Sign? Adobe Sign can take your internal approvals further by automating e-signature requests from external parties. Feel secure with your sensitive data with Adobe Sign’s industry-standard security practices. Launch the process and apply it to workflows without requiring coding effort. It is exciting that Laserfiche and Adobe have teamed up to create this incredible integration. If you are a self-hosted customer of Laserfiche products, don't wait to utilize this tool for your e-signature requests. Streamline your processes and make it easier for people to sign internal and external documents from your organization. This is still a new integration, and there is little content out there covering the full potential of this feature. CDI will keep tabs on any updates and changes that Laserfiche releases on the Adobe Sign integration. Meanwhile, don't hesitate to contact our support team at support@cdi.support if you have questions or want to learn more. CDI NEWSLETTER Stay up to date with all the latest Laserfiche news, CDI webinars, blogs, and more! If you have any questions regarding Laserfiche or wish to speak with a CDI professional team member, contact us at support@cdi.support.

  • The "LFDS Two-Step": Adding a Windows User to Laserfiche Directory Server and Repository

    By Kyle Knebel August 2021 Consulting's Corner This month's article will cover the basics of how to add a Windows account into Laserfiche Directory Server, from now on referred to as “LFDS.” Then we’ll add them to a repository. When Laserfiche RIO licensing came out (for organizations with 50+ users), the license model allowed multiple repositories to be created, with various users logging into each one. Laserfiche designed an authentication system called LFDS, such that users were given a license in LFDS, then added to any repositories to which they needed access. Implied in that previous sentence are the two steps it takes to configure a user with repository access. Here’s how we can accomplish our “LFDS Two-Step”: STEP ONE: Configure a Windows Active Directory User in the Laserfiche Directory Server This process will describe the creation of a Windows Active Directory user in LFDS. The concept here is that you can add this account to any repositories (via LF Admin Console) in your RIO or Avante Laserfiche environment, such that this account can log in to one or more repositories. Windows Active Directory named users are not Laserfiche Server or repository specific. If a windows Active Directory (AD) user has been granted a named license in LFDS, they can use that license to sign in to any Laserfiche Web application or repository on the system, provided they have been added to that repository or application. This account will still only take up one user license. Here are the required steps: To navigate to the LFDS Administration page, either login to the Laserfiche Directory Server machine and launch the application shortcut, or use a web browser and use the URL of HTTP://{server name}/LFDS, where {server name} is the name of the server on which LFDS resides. In LFDS, navigate to the Accounts tab. Click the “+ Users” button to add the Windows Active Directory User account. This could also be an AD Group if you desire. Next, leave the Organization drop-down choice set to (Root), then click on the Register directory user(s)button on the right side. Search for Users or Groups in your Active Directory domain. For example, if you search for an AD Group, you can add all those members, then selectively remove some of the members (if not all will be using Laserfiche) before finishing the process. Select one or more users listed in the “Search Results” list in the search results section and press Add All. This will add that user or set of users to the Added Users list. Press OK at the bottom when ready to add them to LFDS. Next, we need to allocate a license to this new account, so find the new user in the list of Accounts, and select it. With the General tab of the user-selected, select the appropriate License type for the user. Your system may have more (or fewer) choices than shown here. Once you’ve set the License type, this user will have that type of access in other Laserfiche applications (like Forms) or other accessible repositories. STEP TWO: Add the User to the Repository Since registering a user in Directory Server does not automatically add that account to your Laserfiche repository, one needs to grant them access to the repository. Otherwise, they will not be able to sign in to even one repository. Open the LF Admin Console of the appropriate repository(s) in the proper server, navigate the Users & Groups node, and add the account as a New Windows Account… entry. Set their Authentication as “Trust: allow access.” Also, make sure to assign Feature rights or Privileges as normal. Finally, press the “...” button to add the user’s windows account to this repository. In the “Select User or Group” pop-up, type in the user’s name in the white box, then press “Check Names.” At this point, you can select the name and press OK. Then you finally press OK to finish. Have a Great Paperless Day! CDI NEWSLETTER Stay up to date with all the latest Laserfiche news, CDI webinars, blogs, and more! If you have any questions regarding Laserfiche or wish to speak with a CDI professional team member, contact us at support@cdi.support.

  • Audit Trail 11: New Features and New Look

    By Kyle Knebel July 2021 Consulting's Corner Laserfiche’s release of Version 11 in March 2021 revamped the Audit Trail engine and reporting interface. The same three editions (Starter, Standard, and Advanced) still exist. However, Audit Trail has changed the way it is configured and how reports are generated. When it comes to Audit Trail 11 Configuration, most of it stays the same, but now, instead of a SQL database, there is a ‘Search Engine.’ This is a significant change to the architecture, and it will increase the performance of the reporting system. Additionally, the installation will convert your pre-existing reports from the SQL database into the new format if you upgrade from a previous version. Laserfiche Audit Trail 11 looks more like the Web Client’s search pane than ever before for the Report filter. In addition, a simple but expandable list of filters is available on the ‘Report Filters’ pane. Selectable report columns are now grouped to make them easier to find. There are also many more columns, allowing you to view even more granular information about your repository activity. These include a set of Changes columns that pinpoint what changed during the audited operation. For example, you can display the value before the change and after the change. Event Types are even easier to select in the new interface. Just click ‘Add,’ and the new, easy-to-use selector pops up to give you the same familiar event types to choose from. As you select event types, the number of available items is decremented at the top of the screen. And the report columns now have filters for even more flexibility. Laserfiche’s Audit Trail 11 offers a new set of easy-to-use functions and faster reporting. If you are already licensed for an Audit Trail, the upgrade is free with your current LSAP plan. If you are interested in learning more, please reach out to our sales team or your CDI account representative. Have a Great Paperless Day! If you have any questions regarding Laserfiche or wish to speak with a CDI professional team member, contact us at support@cdi.support.

  • June 2021 Consultant’s Corner

    By Kyle Knebel Laserfiche 11 - Hybrid Direct-Share By now, many of you have heard about Laserfiche’s new Direct Share for on-premises installations in Version 11. This powerful feature is already part of the Laserfiche Cloud environment. When the need to share a document with a person outside the company arises, Cloud users can choose to either email that content or ‘Share’ the content with a unique, anonymous, password-protected link to the files. Now, that same functionality has been expanded to include on-premises installations, too. The new feature has some requirements to make this work, and not all environments are ready. At this time, RIO platforms and Subscription licensing platforms will add the “Hybrid Direct-Share” option. Please talk to your CDI Account Representative for further details and pricing. However, once you have licensed your system to include the “Hybrid Direct-Share” option, you are ready to: Send documents in your repository to recipients using a unique anonymous link. Send documents in your repository for a limited time, with an expiration that you define. Send documents in your repository and receive a notification when they are viewed. Send documents in your repository and view the status of who shared the file, with whom it was shared, and when it was accessed. Allow Laserfiche Administrators to view the status of who shared the file, with whom it was shared, and when it was accessed. Setting up your Hybrid Direct-Share system is straightforward. There are just a few steps. Step one: Log in to the Cloud account that you have been provided. Next, you will be able to generate one or more API keys. These are found under the Account Administration > Settings area. At this point, you will need to generate the API key, which is a one-time token. The good news is that you can download the unique key as a text file or copy it to the computer clipboard. Copy the key to the clipboard or download the text file. Once created, you can Delete or Disable the Key, as well. Step two: The next step is to configure your Web Server to use the API Key you just created. Copy your API Key to a file or computer clipboard to be ready for the next step. Navigate to the Web Client Configuration utility on the Laserfiche Web Server. If you are on the server itself, you can access it via the Start menu. If you are using a web browser from your workstation, enter the URL for the configuration utility. Typically, this is HTTP://{servername}/Laserfiche/Configuration/ and requires elevated administrative rights. Next, click on the “Services” node on the left pane. Scroll down to the “Direct Share” option and enable it. Enter the Direct Share API key (the Service Principal Key) Choose your region. Laserfiche.com for the US, Laserfiche.ca for Canada Then click Verify. Once completed, your Web Clients will be able to share documents. If you have any questions regarding Laserfiche or wish to speak with a CDI professional team member, contact us at support@cdi.support.

  • Most Common Cyberattack Methods Across All Industries

    By Julio Velela Lately, you probably have heard buzzwords like cyberattacks, ransomware, and hackers all over news media platforms. That is not surprising since many companies have fallen victim to significant cyberattacks, most noticeably the attack at The Colonial Pipeline and the world's largest meat processor, JBS. Of course, these threats are not new, but they are becoming more sophisticated in their methods. We have had attempted cyberattacks at CDI, and we are constantly training our staff and adopting new methods to prevent damaging breaches of our data. It is a company effort to make sure that hackers are blocked and identified. One step towards data security is to recognize the common methods hackers use to attack organizations. Phishing Emails Across all industries, the most common method hackers use to breach an organization’s cybersecurity is through phishing emails. These emails are carefully crafted to trick the recipient into opening an attachment or clicking a link that contains a virus. Unfortunately, this method depends on the lack of knowledge or training of an employee towards identifying suspicious emails. As a result, due to their deceitful appearance, many employees can accidently download malicious files. Phishing emails can have attached PDF, ZIP files, Word Documents, and many other formats routinely shared within an organization’s network. Hackers use these attachments to trick recipients into “Enabling Macros” upon opening the document. The hacker can then run a script that downloads and executes a malicious executable file (EXE) from an external web server. The EXE would include the functions necessary to encrypt the data on the victim’s machine. At that point, one device is compromised with malware or ransomware in the organization. This situation alone can cause significant risk to sensitive data. However, depending on how advanced the ransomware or malware is, it can spread across all devices if not caught in time. Remote Desktop Protocol Many companies utilize remote desktop protocols (RDP) for various reasons, most commonly for IT support. With RDP, administrators can securely access a user’s machine remotely to assist with any issues. RDP typically runs over port 3389. Why is port 3389 important? In 2017, it was determined that over 10 million machines had port 3389 open and advertising this on the public internet. Hackers can search for those machines to find devices that are vulnerable to viruses. Once a target is identified, hackers can access open-source password-cracking tools to log in as an administrator remotely. Once they’re in as an administrator, hackers fully control the machine and initiate a ransomware encryption operation. With this level of control, a hacker can also delete or steal data and disable backup protocols from anywhere in the world. This gives an organization more reasons to pay ransom. Drive-By Downloads from a Compromised Website Another well-known method for hackers to attack organizations is through drive-by downloads. This is a tricky method since it uses compromised websites to deliver malicious downloads without the user’s knowledge. Hackers use kits allowing the ability to scan the visiting device for its specific weaknesses silently. Once a flaw is found, the attacker can input code in the background without clicking anything. By that point, the visiting device is compromised. You might think that this only occurs in sketchy sites, but that is not the case. Hackers often initiate drive-by downloads by taking advantage of known vulnerabilities in the software of legitimate websites. Then, they will either embed malicious code on a site or redirect the user to another site that the hacker controls. For example, popular sites such as New York Times, the BBC, and the NFL have been targeted in a ransomware campaign through hijacked advertisements. USB and Removable Media Sometimes a cyberattack isn’t implemented by a distant shady character; it can be done in person using a USB device. It is straightforward; all the hacker needs to do is download all the malicious files they need in the USB drive, insert them into a company device, and transfer the files over. No tricks or disguises are required, but it does require direct access to a company device. If an in-person infiltration is not possible, you can still execute an attack through this method. For example, hackers can send out USB drives containing hidden viruses to companies as promotional give-aways. The victim thinks it’s an innocent branded USB drive, but it is a trojan horse for ransomware. An organization must have up-to-date virus protection, protocols, and company training to recognize cyber-attack threats. Cyber-attacks will continue to become more sophisticated with their methods as time goes on. Identifying how a hacker can implement an attack is an excellent start to prevent ransomware, malware, or a data breach. If you have any questions regarding Laserfiche or wish to speak with a CDI professional team member, contact us at support@cdi.support.

bottom of page