Select a tile or scroll for course information

Who is this training for?

Can I get certified in this course?

How long will this take?

What is included in this course?

Register now


Who is this training for?



iManage engineers responsible for implementing iManage Security Policy Manager on-premise.


Can I get certified?

Yes!

Following completion of the self-paced training, you're invited to register for the iManage Security Policy Manager Engineer exam. On passing the exam, you'll earn a digital badge from Credly.

Learn more about badging here.


How long will this take?


Self paced training is designed to be consumed at your own speed, enabling you to consume content on your own schedule.

For this course, iManage recommends allowing a minimum of 16 hours to consume all courseware and complete lab exercises.


Included with useiManage Premium


useiManage Premium subscribers can utilize one of their self-paced training entitlements to register for this course and the certification exam.


Course breakdown

 

This training is around 50% practical and includes access to a hands-on lab environment, enabling you to gain significant hands-on experience.

Verify your system will be suitable for our hands-on labs here.

 


Expand each module below for an explanation of contents

Module 1 - Introduction to Security Policy Manager

Understand the current system security challenges and the iManage Security Policy Manager approach, including product benefits and security models available.

Module 2 - Server Installation and Setup for On-Premise

Understand the technical prerequisites of the iManage Security Policy Manager Server and how to configure before deployment. During this module, you will install your own Security Policy Manager server in your lab environment.

Module 3 - Data Import

Explore data import options and requirements, including best practice. This module includes Client and Matter, User and Groups and User Activity imports. During this module, you will import data from an iManage Work Server database to your server.

Module 4 - Generic Migration Tool

Understand what the Generic Migration Tool offers and understand the process of carrying out a generic migration.

Module 5 - RAVN Security Policy Service

Understand the purpose of RAVN Security Policy Service, crawl and query workflows and configuration with the Work Server and iManage Work Agent.

Module 6 - Agents

 Understand the iManage Security Policy Manager Agent model, how agents are used, which agents are available and how to deploy. In this module, you will deploy the iManage Work agent..

Module 7 - SAML Authentication

Understand what SAML Authentication is and the steps required to configure SAML for iManage Security Policy Manager.

Module 8 - Interface Navigation

Get familiar with the iManage Security Policy Manager interface and the key features.

Module 9 - Application Settings

Deep dive into the settings pane of iManage Security Policy Manager. In this module, you will configure application settings necessary for future modules

Module 10 - Roles

Overview of role management, including privileges which each role allows and how to assign roles to users and groups. You will configure roles for your users during this module.

Module 11 - Users and Groups

Exploring user options, including user and group management, assistants and conflicts. In this module, students will configure user accounts for log in and additional options, such as assistants.

Module 12 - Clients

Deep dive into creating and maintaining security at the client level, using iManage Security Policy Manager. This includes securing clients, building staffing manually and using automated functions, conflicted users and much more. This module has a significant hands on component.

Module 13 - Matters

Deep dive into creating and maintaining security at the matter level, using iManage Security Policy Manager. This includes securing matters, building staffing manually and using automated functions, conflicted users and much more. This module has a significant hands on component.

Module 14 - Collections

This lesson will help you understand what Collections are and how they can be used to apply need-to-know security at department and location level. You will configure a Collection, including creating rules for management in your lab environment.

Module 15 - Cases

Understand the Case feature and how to create Cases. You will create a case and configure its security in this modules labs.

Module 16 - Notification Events

Understand what Notification Events are and how to create and manage Notification Events.

Module 17 - Holds

Understand the Hold feature and the effects of placing items on hold. You will create a hold in your lab environment.

Module 18 - Self-Maintaining Rules

Understand what Self Maintaining Rules are and how they can be applied across Assets. You will configure self maintaining rules in hands-on exercises.

Module 19 - Opposing Team Sets

Overview of the Opposing Team Sets functionality, including advanced options. You have an opportunity to build opposing team sets in your environment.

Module 20 - Managing Access Requests

Understand how to manage requests for access to restricted content, looking at examples of where and how to approve/deny access. You will have an opportunity to submit and action requests in your lab environment.

Module 21 - Reporting

Investigate the reporting and auditing capabilities of iManage Security Policy Manager. This includes system wide reports, reports for individual users/clients/matters and more specific report types, like Insider Reporting.

Module 22 - Moving from InTapp

Understand the key differences between InTapp Walls and iManage Security Policy Manager, and how the security policies applied in InTapp translate into SPM.

Module 23 - Common Tasks

Understand some common every day tasks that an iManage Security Policy Manager Administrator may encounter

Module 24 - iManage Integration

Understand how iManage Security Policy Manager works and integrates alongside iManage Work and iManage Records Manager.

Module 25 - Points to Consider

Discuss some points that need to be considered when deciding how you should use iManage Security Policy Manager to suit your organizational needs.


Register now

Select below to register:

Technical


iManage Partner? Select below to register:

Partners