Skip to main content


This can happen if the files found are outside the user's permission range, that is, they require admin credentials to access. Escalate to your local technical support. They will either handle the files themselves or give you access to the locations.

Read more

Have you ever seen warning like the one shown here?

It may have made you wonder if someone was sending you forged email. You should always be on your guard, but there can also be an innocent explanation.

First, remember that every message has a complex set of headers...Read more


You can configure a scanner for any Perceptive Content client computer. Scanning profiles and capture profiles define the behavior of the scanner in connection with the Perceptive Content client. You must have the...Read more