FAQ
Access control is very important in every component of an IT infrastructure. In almost all cases, it is not desirable that individuals can access files from...
Wed, 13 Nov, 2019 at 1:58 PM
This depends on the way your INDICA instance is set up. In most cases, a connection is made to the Active Directory (AD). INDICA reads the Access Control Li...
Thu, 12 Dec, 2019 at 11:53 AM
"DeNISTing" is a method to exclude (or partially parse) filetypes from indexation that are highly unlikely to contain evidentiary value. This will...
Wed, 22 Apr, 2020 at 10:18 AM
When a case manager uploads data to the INDICA eDiscovery platform, the data will get processed. In case of (compressed) archive files (PST, zip, rar, etc.)...
Thu, 6 Aug, 2020 at 3:28 PM
As you might know, on December the 9th 2021 Apache foundation revealed a severe security vulnerability in the Apache Log4j software. The found vulnerability...
Mon, 13 Dec, 2021 at 5:45 PM
As you may know subsequent vulnerabilities were found in Log4j. You can read about the first occurrence in INDICA Security Patch CVE-2021-44228. Further in...
Wed, 29 Dec, 2021 at 4:22 PM