Who is this training for?
Deploying on premise
Can I get certified?
Following completion of the training you are invited to register for the iManage Security Policy Manager certification exam.
Will I get hands on?
This training is around 50% practical - you will deploy an iManage Security Policy Manager Server and Agents, configure data import, enforce security policy and much more.
Verify your system will be suitable for our hands on labs at this link: http://imanage.selfpaced.training/precheck
Expand sections below for an explanation of module contents.
Module 1 - Overview
Understand the current system security challenges and the iManage Security Policy Manager approach, including product benefits.
Module 2 - Server Installation
Understand the technical prerequisites of the iManage Security Policy Manager Server and how to configure before deployment. During this module, students will install their own server.
Module 3 - Data Import
Explore data import options and requirements, including best practice. During this module, students will import data from an iManage Work Server database to their server.
Module 4 - User Activity
Walk through of user activity functionality of iManage Security Policy Manager, including where the data is used in the system and how to import. In this module, students will import User Activity into their Server.
Module 5 - Migration
Detailed discussion of migrating to iManage Security Policy Manager from iManage Work security and ethical walls applications.
Module 6 - Agents
Understanding the iManage Security Policy Manager Agent model, how agents are used, which agents are available and how to deploy. In this module, students will deploy agents for iManage Work and the HR agent.
Module 7 - Access and Interface
Walkthrough of the iManage Security Policy Manager administration interface.
Module 8 - Application Settings
Deep dive into the settings pane of iManage Security Policy Manager. In this module, students will configure application settings necessary for future modules.
Module 9 - Roles
Overview of role management, including privileges which each role allows and how to assign roles to users and groups. Students will configure roles for their users during this module.
Module 10 - Users
Exploring user options, including user and group management, assistants and conflicts. In this module, students will configure user accounts for log in and additional options, such as assistants.
Module 11 - Client Security
Deep dive into creating and maintaining security at the client level, using iManage Security Policy Manager. This includes securing clients, building staffing manually and using automated functions, conflicted users and much more. This module has a significant hands on component.
Module 12 - Matter Security
Deep dive into creating and maintaining security at the matter level, using iManage Security Policy Manager. This includes securing matters, building staffing manually and using automated functions, conflicted users and much more. This module has a significant hands on component.
Module 13 - Opposing Team Sets
Overview of the Opposing Team Sets functionality, including advanced options. Students have an opportunity to build opposing team sets in their environment.
Module 14 - Cases
Understand the Case feature and how to create Cases. Students will create a case and configure its security in this module.
Module 15 - Access Requests
Understand how to manage requests for access to restricted content, looking at examples of where and how to approve/deny access. Students will have an opportunity to submit and action requests in their system.
Module 16 - Reports
Investigate the reporting and auditing capabilities of iManage Security Policy Manager. This includes system wide reports, reports for individual users/clients/matters and more specific report types, like Insider Reporting.
Select below to view training availability or to register for the certification exam.