Help
<  Back to Index

Connecting To Your Content

Device Settings

If you have permission to add your own content repositories, when adding a content repository via a FileFlex Connector such as a personal computer, NAS or server, you will be able to edit the device settings.

Device settings allow you to edit:

- Network settings
- Proxy settings to access the Internet
- Anti-virus settings

Device settings are accessed when adding a content source as follows:

  1. From your FileFlex Desktop App click the Application menu button (3 horizontal bars at the top right corner).
  2. Click Add Content Source – Select the device you want to add as a content repository, then click Next.
  3. Locate the device you wish to modify from the scanned list of FileFlex Connectors on your Network and click on it to select.
  4. A Link with Edit Device Settings will appear for the selected device.
  5. Edit Device Settings

  6. Click on the Edit Device Settings Link to begin.
  7. Click Proceed

  8. Click Proceed and provide the requested credentials of the admin user account on that device.
  9. Enter administrative credentials

  10. After a successful login, the Device Settings page will be loaded.


Network Settings


Network Settings

Enable Network Browsing
The Enable Network Browsing radio button allows you to enable or disable network browsing. Network browsing is enabled by default. Network browsing enables users to browse all the devices on the same local network as the device being added that have sharing enabled within their operating system configuration.

Host Name Override (optional)
The host name override allows the renaming of the connector as it appears within FileFlex. For example, when adding a server, there may be other servers on the same network with similar names. Instead of using the default machine name that might be confusing, you can rename it as appropriate ie: Engineering Department NAS.

Default Domain (optional)
This can allow you to set the default domain name assigned to users when attempting to activate their connector access.



Proxy Settings to Access the Internet

Your organization or Internet service provider may offer or require you to use a proxy. A proxy acts as an intermediary between your computer and the Internet. It intercepts all requests to the Internet to see if it can fulfill the request using its cache. Proxies are used to improve performance, filter requests, and hide your computer from the Internet to improve security. Proxies are often part of corporate firewalls.

By default the FileFlex connector agent is set to “Automatic” Proxy settings. This will automatically detect if a proxy server is in use on your network or not. If it detects that a proxy server is in use on your network it will try to use the Automatic defaults for your system and use the proxy. Generally these default settings work with no other intervention from you. In the event that the default settings fail, further configuration settings will be required from you or your IT department.

Select Manual proxy configuration under the Proxy Settings to Access the Internet settings.

Select Manual proxy configuration

  • Proxy Setting Options:
    - No proxy: Choose this if you don’t want to use a proxy.
    - Auto-detect proxy settings for this network: Choose this if you want FileFlex to automatically detect the proxy settings for your network.
    - Manual proxy configuration: Choose this if you have a list of one or more proxy servers. Ask your system administrator for the configuration information. Each proxy requires a hostname and a port number.
  • Choose the Proxy type and enter the proxy data. Click Save
  • When data is successfully stored, you will see the following message:
Success



Antivirus Settings


Antivirus Settings

The antivirus settings allow you to define which antivirus software on the host machine will be used to scan an files uploaded to it. Note: The antivirus software must already be installed and running with a valid license on the host machine.

Windows Defender is the default antivirus software for Windows based platforms. You can also select ClamAV and F-Secure SAFE from the Select an antivirus dropdown. Other platforms can be used by selecting CUSTOM from the dropdown, then in command box enter the command line for your antivirus software. You must refer to the documentation of your antivirus software to determine the command line for your software.

For example, command line documentation for popular antivirus software is referenced below.

ESET: https://support.eset.com/kb6382/?locale=en_US&viewlocale=en_US
Norton: https://support.norton.com/sp/en/us/home/current/solutions/v8278351_ns_retail_en_us
Kaspersky: https://support.kaspersky.com/11336
McAfee: https://kc.mcafee.com/corporate/index?page=content&id=KB51141

To disable antivirus scanning, choose None in the Select an antivirus dropdown.

When finished, click Save.