WHO IS THIS TRAINING FOR?
iManage Engineers responsible for implementing iManage Security Policy Manager on premise
CAN I GET CERTIFIED?
Yes!
Following completion of the training you are invited to register for the iManage Security Policy Manager Engineer certification exam.
On passing the exam, you'll be able to claim your iManage Certified Security Policy Manager Engineer badge. Learn more about badging here.
WILL I GET HANDS ON?
Yes!
This training is around 50% practical - you will deploy an iManage Security Policy Manager Server and Agents, configure data import, enforce security policy and much more.
Verify your system will be suitable for our hands on labs at this link: http://imanage.selfpaced.training/precheck
HOW LONG WILL THIS TAKE?
Self paced training is designed to be consumed at your own speed, enabling you to consume content and work on lab exercises on your own schedule. For this course, iManage recommends allowing a minimum of 16 hours to consume all courseware and complete lab exercises.
INCLUDED FOR USEIMANAGE SUBSCRIBERS
useiManage subscribers can utilize one of their self-paced training entitlements to register for this course and certification exam.
For more information on useiManage, visit https://registration.imanage.com/pages/useimanage
COURSE BREAKDOWN
Expand sections below for an explanation of module contents.
Module 1 - Introduction to Security Policy Manager
Understand the current system security challenges and the iManage Security Policy Manager approach, including product benefits and security models available.
Module 2 - Server Installation and Setup for On-Premise
Understand the technical prerequisites of the iManage Security Policy Manager Server and how to configure before deployment. During this module, you will install your own SPM server.
Module 3 - Data Import
Explore data import options and requirements, including best practice. This module includes Client and Matter, User and Groups and User Activity imports. During this module, you will import data from an iManage Work Server database to your server.
Module 4 - Generic Migration Tool
Understand what the Generic Migration Tool offers and understand the process of carrying out a migration to iManage Security Policy Manager.
Module 5 - Agents
Understanding the iManage Security Policy Manager Agent model, how agents are used, which agents are available and how to deploy. In this module, you will deploy the iManage Work Agent.
Module 6 - SAML Authentication
Understand what SAML Authentication is and the steps required to configure SAML.
Module 7 - Interface Navigation
Get familiarized with the SPM interface and the key features. In this module, you will log into the SPM server created during previous modules, and explore the interface.
Module 8 - Application Settings
Deep dive into the settings pane of iManage Security Policy Manager. In this module, you will configure application settings necessary for future modules.
Module 9 - Roles
Overview of role management, including privileges which each role allows and how to assign roles to users and groups. You will configure roles for other users during this module.
Module 10 - Users and Groups
Exploring user options, including user and group management, assistants and conflicts. In this module, you will configure user accounts for log in and additional options, such as assistants.
Module 11 - Clients
Deep dive into creating and maintaining security at the client level, using iManage Security Policy Manager. This includes securing clients, building staffing manually and using automated functions, conflicted users and more. In this module, you will configure the setup for multiple clients to get an understanding of the process.
Module 12 - Matters
Deep dive into creating and maintaining security at the matter level, using iManage Security Policy Manager. This includes securing matters, building staffing manually and using automated functions, conflicted users and much more. In this module, you will configure Matter security.
Module 13 - Collections
This lesson will help you understand what Collections are and how they can be used to apply need-to-know security at department and location level. You will configure a Collection, including creating rules for management.
Module 14 - Cases
Understand the Case feature and how to create Cases. You will create a case and configure its security in this module.
Module 15 - Self-Maintaining Rules
Understand what Self Maintaining Rules are and how they can be applied across Assets. You will configure self maintaining rules.
Module 16 - Opposing Team Sets
Overview of the Opposing Team Sets functionality, including advanced options. You have an opportunity to build opposing team sets in your environment.
Module 17 - Holds
Understand the Hold feature and the effects of placing items on hold. You will create a hold in your environment.
Module 18 - Managing Access Requests
Understand how to manage requests for access to restricted content, looking at examples of where and how to approve/deny access. You will have an opportunity to submit and action requests in your system.
Module 19 - Reporting
Investigate the reporting and auditing capabilities of iManage Security Policy Manager. This includes system wide reports, reports for individual users/clients/matters and more specific report types, like Insider Reporting. In this module, you will have an opportunity to run some reports and investigate their results.
Module 20 - Moving from Intapp
Understand the key differences between IntApp and SPM, and how the security policies applied in Intapp translate into SPM.
Module 21 - Common Tasks
Understand some common everyday tasks a user of SPM may encounter, and some suggestions on how to deal with those.
Module 22 - iManage Integration
Understand how SPM works alongside iManage Work and iManage Records Manager to enforce security policy.
Module 23 - Points to Consider
Discuss some points that need to be consdiered when deciding how SPM can be applied and used in your organization.
REGISTER NOW
Select below to view training availability or to register for the certification exam.