Select a tile or scroll to view course information
Who is this training for?
Can I get certified in this course?
How long will this take?
What is included in this course?
Register now
Who is this training for?
iManage Security Policy Manager administrators and users who want to improve their knowledge and maximize the efficacy of iManage Security Policy Manager, on-premise or in the iManage Cloud.
Can I get certified?
How long will this take?
Self paced training is designed to be consumed at your own speed, enabling you to consume content on your own schedule.
For this course, iManage recommends allowing a minimum of 8 hours to consume all courseware and complete lab exercises.
Included with useiManage Premium
useiManage Premium subscribers can utilize one of their self-paced training entitlements to register for this course and the certification exam.
Course breakdown
This training is around 50% practical and includes access to a hands-on lab environment, enabling you to gain significant hands-on experience.
Verify your system will be suitable for our hands-on labs here.
Expand each module below for an explanation of contents
Module 1 - Introduction to Security Policy Manager
Understand the current system security challenges and the iManage Security Policy Manager approach, including product benefits and security models available.
Module 2 - Interface Navigation
Get familiar with the iManage Security Policy Manager interface and key features.
Module 3 - Application Settings
Deep dive into the settings pane of iManage Security Policy Manager. In this module, you will activate your lab environment and configure application settings necessary for future modules.
Module 4 - Roles
Overview of role management, including privileges which each role allows and how to assign roles to Users and Groups. You will configured Roles for Users during this module.
Module 5 - Users and Groups
Exploring User options, including User and Group Management, Assistants and Conflicts. In this module, you will configure User accounts for log in, and additional options such as assistants.
Module 6 - Clients
Deep dive into creating and maintaining security at the Client level. This includes securing Clients, building staffing both manually and using automated functions, conflicted Users, and much more. This module has a significant number of hands-on lab exercises.
Module 7 - Matters
Deep dive into creating and maintaining security at the Matter level. This includes securing Matters, building staffing both manually and using automated functions, conflicted Users, and much more. This module has a significant number of hands-on lab exercises.
Module 8 - Collections
This section will help you understand what Collections are, and how they can be used to apply need-to-know security at department and location level. You will configure a Collection in hands-on exercises, including creating rules for management.
Module 9 - Cases
Understand the Case feature, and how to create Cases. You will create a Case and configure security for the Case in this modules hands-on exercises.
Module 10 - Notification Events
Understand what Notification Events are, and how to create and manage them.
Module 11 - Holds
Understand the Hold feature, and the effects of placing items on Hold. You will create a Hold in your lab environment.
Module 12 - Self-Maintaining Rules
Understand what self-maintaining Rules are, and how they can be applied across assets. You will configure a Rule in your lab environment.
Module 13 - Opposing Team Sets
Overview of Opposing Team Sets, including advanced options. You will have an opportunity to build an Opposing Team Set in lab exercises.
Module 14 - Managing Access Requests
Understand how to manage requests for access to restricted content, including taking a look at examples of where and how to approve and deny access requests. You will have an opportunity to submit and action requests in your lab environment.
Module 15 - Reporting
Investigate the reporting and auditing capabilities of iManage Security Policy Manager. This includes system wide reports, reports for individual Users/Clients/Matters, and specific report types like Insider Reporting.
Module 16 - Moving from InTapp
Understand the key differences between InTapp Walls and iManage Security Policy Manager, including how policies applied in InTapp translate to security policies.
Module 17 - Common Tasks
Understand some common every day tasks that an iManage Security Policy Manager Administrator may encounter.
Module 18 - iManage Integrations
Understand how iManage Security Policy Manager works and integrates alongside iManage Work and iManage Records Manager.
Module 19 - Points to Consider
Discuss some points that need to be considered when deciding how you should use iManage Security Policy Manager to suit your organizational needs.
Register now
Select below to register:
iManage Partner? Select below to register: