Support Articles
-
Connect, Pair, or Troubleshoot Your Poly Headset
Your Bluetooth USB adapter comes pre-paired to your headset. To connect to your PC, follow these steps. 1. Turn on your headset and insert the Bluetooth USB adapter into your laptop or PC. 2. The USB adapter LED flashes and then turns solid to indicate the headset is connected to the USB adapter. If you are wearing your headset you hear “PC connected” to indicate the connection has been established. When on a call, the LED on the USB adapter flashes blue. When not on a call the LED is solid. 3. The Poly Lens Desktop App should be preinstalled on your laptop. If not, it can be downloaded by visiting poly.com/lens. This allows you to customize your headset behavior through advanced settings and options. 4. Update the Poly Lens App by right clicking on the icon in the taskbar and selecting Open. 5. Select your device name and then select the update button, if available. While updating: • Do not use your Poly device until the update is complete. • Disconnect your Poly device from paired devices such as phones, tablets and computers. • Do not start a second update from a second device. • Do not stream media. • Do not answer or place a call. Pair the USB adapter again Typically, your USB adapter is pre-paired to your Poly audio device. In the event that your adapter is disconnected or bought separately, you will need to pair the adapter to your Poly device. 1. Insert the high-fidelity Bluetooth USB adapter into your laptop or computer and wait for your computer to recognize it. 2. Put your Poly audio device in pair mode. 3. Launch Poly Lens Desktop App and navigate to Poly BT700. 4. Put your Bluetooth USB adapter into pair mode by selecting "Pair new device" on the adapter's main page or overflow menu. Your adapter flashes red and blue. Pairing is successful when you hear "pairing successful" and "PC connected" and the Bluetooth USB adapter LED is solid. NOTE To pair again using Plantronics Hub Desktop App, navigate to the app's Poly BT700 general settings and select "Pair." Find more information on your Poly headset by clicking here.
-
Email Delivery Optimization
The following article is a reprint from: https://www.leapworks.io/blog/master-email-deliverability How to master email deliverability Bret Carmichael Whether you're starting a company or starting a newsletter, email deliverability is important. You need your email to reach your recipient's inbox. In this guide, you'll learn techniques to get your email to reader inboxes and keep it out of spam folders. Use a domain you own Lots of businesses start small. It might be tempting to send email from a free Gmail account, but you should avoid it. Free email providers, like Gmail and Hotmail, are great for personal use. They're inappropriate for business use though. They lack professional appeal and erode consumer confidence. If you're using a Gmail address to send a newsletter, your email is more likely to land in a recipient's spam folder than is an email from a domain you own. Spammers love to use Gmail addresses. They're free and infinitely disposable. When enough email from a Gmail address is categorized as spam, the spammer throws away the old address and creates a new one. As a well-meaning business who's using a Gmail address, you'll have to overcome your recipient's initial distrust when they first receive your email. Using a domain you own is the first step to improving your email deliverability. Buying a domain is easy, and you can choose from a number of domain registrars that sell them. Hover (not an affiliate link) is the best one. Its pricing is simple and transparent. It doesn't try to upsell customers on services they don't need. Use a premium email provider Businesses that own their own domains also tend to have their own websites. Web hosting companies will often provide email to their customers for free. Don't use it. If for some reason, you need to change hosting providers, migrating your email to a new web host will be a significant hurdle. It's best to separate your email hosting from your web hosting. In using a premium email provider, you'll benefit from improved security and a number of additional features. If you're someone who loves and uses Gmail, Google's own G-Suite is easily your best option. With plans starting at $6/user/month, G-Suite delivers the experience you already know and includes Google's office productivity suite: Drive, Docs, Sheets, Slides, and other applications. For many, Microsoft delivers the best mix of user experience and capabilities. Office 365 comes with both web applications and desktop applications. It includes Outlook, Word, Excel, PowerPoint, and others. However, plans that provide email hosting (which you want) start at $12.50/user/month, more than twice the cost of Google G-Suite. Email deliverability starts at your web host You have one web host and one email host. However, you can send email from several providers. For example, though you may host your email on Google G-Suite, you might also use Mailchimp to send a newsletter. On top of that, you might use a service like Amazon SES to send email. Already, you have three distinct services sending mail as you and on your behalf. For each provider that sends email as your domain, you need to create corresponding DNS entries at your web host. These DNS entries act as approval for the email service to send mail as you. In the absence of that approval, anyone could send email as your domain, with or without your permission. In fact, this happens a lot. There's a term for it. When a spammer impersonates a valid entity, it's called spoofing. Making DNS entries at your web host doesn't actually stop anyone from pretending to be you. Instead, the entries function together to establish your legitimate email providers as trusted senders and any others as not-trusted. Recipient email providers inspect messages for approval traits when processing new email. When you send messages that lack the necessary DNS records as approvals, you have problems with email deliverability. Your recipient never sees your message because it lands squarely in their spam folder. For each email provider you use, you'll need to create two to three DNS records at your web host. This may sound complicated, but web hosts make it easy, and email providers like Google, Microsoft, and Mailchimp all offer easy-to-follow instructions. They each have incentive for your email to reach its intended recipient. Most help you verify that you correctly created the DNS entry. We recommend the following standards for delivery optimization: SPF: Specifies the servers and domains that are authorized to send email on behalf of your organization. DKIM: Adds a digital signature to every outgoing message, which lets receiving servers verify the message actually came from your organization. DMARC: Lets you tell receiving servers what to do with outgoing messages from your organization that don’t pass SPF or DKIM. SPF SPF stands for "Sender Policy Framework." It's critical to email deliverability. For example, if you're using Mailchimp for your newsletter and don't add an SPF-type DNS record for Mailchimp, you can all but guarantee that your newsletter will be routed directly to your reader's spam folder. The SPF record tells email providers, "I've allowed Mailchimp to send mail as me." DKIM DKIM stands for "DomainKeys Identified Mail." It adds a message-level signature to every email. When an email is sent, it's signed with a private key. On the receiving side, the mail server validates the signature with a public key, which is the DKIM-type DNS record. Where combined with an SPF record, DKIM delivers a strong signal that your email is legitimate. You don't have to understand how this works, just that more email providers are starting to require DKIM. This sounds complicated, but your email provider makes it easy. You copy the DKIM value it gives to you. Then, you'll paste the same value as a DNS record at your web host. DMARC What is it? DMARC doesn't do any authentication. It produces reporting and stands for "Domain Message Authentication Reporting." DMARC tells you where SPF and DKIM are working and where they're not. You need this for a couple of reasons. First, if someone is emailing people and pretending to be you, you'll want to stop this. This is especially true if you work in financial services, where bad actors might phish for your clients' data. Second, if you're sending messages that are missing SPF or DKIM, you'll need to fix them. Your readers might not be getting your email, and your domain reputation may be taking a hit and hurting your email deliverability. Your domain reputation matters because it drives whether your emails go to the inbox or spam. When it takes damage, it can take months to repair. During that time, customers won't be getting your email. How to setup reporting DMARC reporting is ugly. Luckily, Postmark is easy to set up and provides attractive DMARC reporting for free. When creating a DMARC-type DNS record at your web host, you'll have the option of three different policy types. The p= means "policy." p=none. This policy provides no instructions to receiving mail servers. If an email you send is missing and SPF or DKIM record, the receiving mail server will handle it however it wants. This is where you should start. It's DMARC reporting only. p=quarantine. This policy does what the name suggests. If an email you send is missing and SPF or DKIM record, the receiving mail server will quarantine it. This usually means that your message will automatically be moved to spam. There's little reason to ever use this policy. p=reject. This policy is the more severe of the three. If an email you send is missing and SPF or DKIM record, the receiving mail server will refuse to accept it. It won't go to the recipient's spam folder. The recipient won't get it at all. This is where you should end after months of DMARC reporting. What to do with the reports you receive Postmark will send you weekly DMARC reports. If you see email providers that are failing SPF or DKIM, fix them. If you see a provider that you don't use, that might be a spammer trying to spoof you. Even after you've fixed any issues, continue with your report-only (p=none) policy for a few months. You never know. Once you're satisfied that SPF and DKIM are aligned for every email you send, change your policy to "reject" (p=reject). When next someone tries to spoof you, the recipient mail server will reject the spam or phishing email. This is great, especially if you work in a field that deals with NPI (Non-Public Information), where real harm could be done to one of your customers if they're tricked into providing confidential information to someone pretending to be you. DMARC helps protect your sending domain reputation and achieve a high rate for email deliverability. Use sub-domains to prevent email deliverability problems The email-sender reputation for a subdomain differs from the reputation of another subdomain and the root domain. The subdomain news.example.com has a reputation that differs from example.com. Take advantage of this, and use a different subdomain for each type of email you send. Most businesses send regular, person-to-person email from their root domain, example.com. There's little risk of the root domain being flagged as spam because the emails are used to conduct day to day business between people who often know each other. Emails of this nature are not sent to masses of recipients. For this same reason, it would be catastrophic for the root domain – business class or operational emails – to be blacklisted as spam. It could bring work to a halt. Newsletter-type emails get marked as spam all the time. It's not good to expose your root domain to that kind of risk. Use a different subdomain for each unique class of email you send. The practice is instructive to receiving mail servers and helps them understand the email they're processing. Importantly, it also compartmentalizes your risk. That's a good thing. Should email deliverability suffer in one place, it doesn't have to suffer everywhere. hello@news.example.com. Use a subdomain like "news" for your newsletter. hello@cart.example.com. Use a subdomain like "cart" for transactional emails. your.name@chat.example.com. Use a subdomain like "chat" if you have a chat widget on your website that will send email to visitors. your.name@example.com. Use your root domain for day to day work, like emailing coworkers and contacts at other companies. Be a good email citizen If you want people to read your email, create value for your recipients. The more value you create, the more engagement you'll get. We wrote a whole guide to help you. Read our, "Email marketing guide for brand building." It's full of ideas. Focus on engagement The number of recipients on your mailing list is not a badge of honor. What matters is how many people read your emails. Aim for high engagement. That's what helps secure good email deliverability. Two companies send a newsletter. The first company sends its newsletter to 1,000 subscribers, and 10 people read it. The second company sends its newsletter to 100 subscribers, and 30 people read it. The second newsletter is more effective. It reaches 3 times as many readers with only 1/10 of the total subscribers. Clean up your list If people aren't reading your email, remove them from your mailing list. Alternatively, move them to a new segment and send them mail less frequently. Don't keep sending people emails they don't read. Providers like Gmail are smart. When a person routinely deletes messages from the same sender without first reading them, Gmail picks up on that. It will start helping the recipient by automatically moving emails from you to the spam folder. Since it's far easier to get into spam than to get out, it's better that you respond to unengaged recipients by removing them from your list and protecting your domain reputation and email deliverability. Make unsubscribing easy Companies do a poor job at this. If a recipient wants to unsubscribe from your mailing list, let them unsubscribe. They're not reading your email anyway. When a recipient can't unsubscribe, you're at best, creating a negative association with your brand. At worst, you're creating the same negative association, and you're forcing the recipient to repeatedly mark your email as spam. Give people a choice Lots of businesses collect email addresses in-person by exchanging business cards. If that description fits your business, ask the people you meet if you can add them to your mailing list. Or, ask them in a thank-you note after you meet them. Avoid adding people to your list without their permission. Great email deliverability is one-part technology knowhow and one-part behavior. Get both parts right and your recipients will get your email. With little patience, you can do it, and your effort will pay dividends to your business.
-
FAQ's about Endpoint Management
What is an Endpoint? An endpoint is any device that is physically an end point on a network. Laptops, desktops, mobile phones, tablets, servers, and virtual environments can all be considered endpoints. In the context of our companies, the endpoints we are responsible for are company-owned devices like laptops, servers, and network equipment. What is Endpoint Management? Endpoint management is the practice of authenticating and supervising the access rights of endpoint devices to a network and applying security policies that prevent any external or internal threats posed by that access. Network owners typically use endpoint security management software to: Apply and monitor endpoint security policies throughout the entire network with small software apps on each managed device (agents) Enable security administrators to manage these devices and processes from one central console or application What is a Management Agent? A management agent is a small program that runs in the background on your computer, essentially making it a managed device. It communicates with a central management system that provides the security policies for the organization. Your computer has many such agents. Anti-virus software is essentially an agent running in the background. Virus definitions are automatically updated from a central management system and the agent enforces virus policies locally. Your VOIP software is a type of agent running in the background, waiting for an incoming call. So, agents are commonly found on all computers. Can the management agent "spy" on me? No. The management agent is not designed to monitor your activities. Its function revolves on security enforcement. It checks the status of the computer's updates and ensures that critical updates are installed, it manages the anti-virus software on the computer, and it ensures that your password is sufficiently complex. I have personal information on my computer. Is that accessible to the management agent? Remember that your company-owned device is company owned. You're essentially a guest on the computer. The management agent does not have access to your password protected accounts, like your online email account or files. We strongly discourage the storage of personal files on the computer. A better solution is to store your personal files in password protected cloud storage like your personal Google Drive or iCloud.
-
How To Change MacBook User Password
-
Overview of Your Poly Headset
Make/Take/End Calls Answer or end a call by tapping the Call button. To dial the last number you dialed, double-tap the Call button. Voice assistant works with Siri, Google Assistant™, or Cortana. To use voice assistants, press and hold the Call button for 2 seconds to activate your phone's default voice assistant. Wait for the phone prompt to activate voice dialing, search, and other smartphone voice controls. Mute/unmute While on an active call, choose: • Tap the red Mute button • Take off/put on your headset while on an active call (requires active smart sensors) OpenMic While not on a call, tap the red Mute button to activate OpenMic and hear your surroundings. Control the level of ambient noise you hear by adjusting the volume wheel. Volume Rotate the volume wheel forward (+) or backward (–) to control the volume. Play or pause music Choose: • Put on/take off the headset (requires active smart sensors) • Tap the Play/pause button NOTE: Functionality varies by application. Does not function with web-based apps. Track selection Tap the Forward button or Back button to control the track selection. Use Sensors Smart sensors respond when you put on or take off your headphones. With active sensors if a call comes through then putting on the headset will answer the call and taking off the headset will mute the headset. With active sensors if music or media is playing then putting on the headset will resume the music/media (if playing previous to taking off) and taking off the headset will pause the music/media. With active sensors if on mute then putting on the headset will unmute if on an active call and taking off the headset will mute if on an active call. NOTE: Functionality varies by application. Does not function with web-based apps. Reset sensors You may need to reset the sensors if they are not working as expected. There are two ways to reset the headset sensors. Choose: • With your headset powered on, charge your headset on the charge stand for 10 seconds • Press and hold both the Mute and Play/pause buttons for more than 4 seconds until the LEDs flash purple twice, being careful to not touch the earcup padding or allow it to come in contact with surfaces Disable Sensors You can disable your headset smart sensors 2 ways: • Manage sensors in Poly Lens App • Hold both the Mute and Call buttons for more than 4 seconds until the LED flashes purple then red. Repeat to reactivate; the LED flashes purple then blue NOTE: Sensors cannot be disabled while streaming audio. ANC (Active Noise Canceling) ANC reduces external noise and enhances your music and sound quality. Your headset ships with ANC on. To turn ANC off, slide the switch away from "ANC." Find more information on your Poly headset by clicking here.
-
Save emails as PDF (Gmail and Outlook)
***Please note: the steps and pictures below may look different on your device. These steps are specifically for Windows 10. GMAIL: 1) Open the email you want to convert to PDF then click on the three dots on the right 2) Click "Print" 3) Change dropdown to "Save as PDF" 4) Click "Save" 5) Choose save location on your PC or network share 6) Name the PDF and make sure "PDF" is selected in drop down for "save as type" 7) Click "Save" Your email is now saved as a PDF in the location you selected OUTLOOK: 1) Open Outlook and click on the email you want to save as a PDF 2) Click "File" 3) Click "Print" on the left pane 4) Change drop down to "Microsoft Print to PDF" 5) Click "Print 6) Choose save location on your PC or network share 7) Name the PDF and make sure "PDF" is selected in drop down for "save as type" 8) Click "Save" Your email is now saved as a PDF in the location you selected
-
Problems, Issues, or Troubleshooting Your Poly Headset
How do I pair my headset to a computer or laptop? Plug in the USB Bluetooth adapter to your computer or laptop. The adapter is paired to your headset and connects to computer audio. See this article for more information. During a call, nobody can hear me or I can't hear anybody. Check the following: • To configure the headset sound on your computer, go to Start menu > Control Panel > Sound > Playback tab. Select Poly BT700, set it as the Default Device and click OK. For Mac devices, go to Apple menu > System Preferences > Sound. On both the Input and Output tabs, select Poly BT700. • Ensure that only one softphone application is opened at a time. • For best performance, ensure your headset firmware is up to date. During a call, I get interference and drops in sound. Your headset is configured for optimal performance during conference calls. Stereo telephony is on by default. To increase Bluetooth density, change the setting from stereo telephony to mono telephony by holding the Mute button for four seconds while not on a call, until you hear "Wideband stereo off." You can also change the setting in Poly Lens Desktop App or Plantronics Hub for Windows/Mac by going to Settings > Wireless > Extended Range Mode. I hear computer audio through my headset. How do I switch audio back to my computer's internal speaker? To switch audio back to your computer's internal speaker from your headset and adapter, go to your computer audio settings and change your output device, or simply unplug your Bluetooth adapter. I hear an echo when not on a call. Check and see if OpenMic is on by pressing the red mute button on the boom when you are not on a call. Our exclusive OpenMic feature lets you control the level of ambient noise you hear. The headset talk time is not accurate. Charge the headset fully to reset the accuracy of the talk time prompts. Can I connect my headset to a mobile phone and computer at the same time? Yes, your headset can connect to mobile and PC. Your headset remembers up to 8 devices, but connect to up to 2 devices at a time. That includes the USB Bluetooth adapter.
-
Malware removal using Bitdefender
Issue: In Google Chrome, I have started to get random tabs popping up with promotional signup offers. How do I stop this from happening? Steps to take: The random pop-up tabs you're experiencing in Google Chrome are likely caused by adware or unwanted extensions. Here's how to stop them: Check Your Extensions: Open Chrome and type chrome://extensions in the address bar. Review the list of extensions and disable or remove any that you don't recognize or trust. Scan for Malware: Use your computer's antivirus or anti-malware software to perform a full system scan. Consider using a reputable adware removal tool like Malwarebytes or AdwCleaner. Clear Browsing Data: Open Chrome and press Ctrl+Shift+Delete (Windows) or Cmd+Shift+Delete (Mac). Select "Cookies and other site data" and "Cached images and files." Choose a time range that covers when the problem started. Click "Clear data." Block Pop-ups and Redirects: Go to Chrome's settings (three dots in the top right corner). Click "Privacy and security" > "Site settings" > "Pop-ups and redirects." Ensure that the setting is set to "Don't allow sites to send pop-ups or use redirects." Reset Chrome Settings (Optional): If the problem persists, you can reset Chrome to its default settings. This will remove all extensions and clear browsing data. Go to Chrome's settings, click "Advanced," and then "Reset and clean up." Click "Restore settings to their original defaults" and confirm. Additional Tips: Be Cautious What You Install: Avoid downloading software from untrusted sources. Keep Software Updated: Keep your browser, operating system, and antivirus software up to date. Use an Ad Blocker: Consider installing a reputable ad blocker extension like uBlock Origin or Adblock Plus. Avoid Clicking on Suspicious Links: Be wary of clicking on links or ads from unknown sources. If you continue to experience problems after trying these steps, you may want to seek help from a computer professional. How to run a Full Scan on Bitdefender Endpoint Security managed solution Follow the steps below to run a Full Scan on Bitdefender. Right-click on the Bitdefender icon in your system tray by the clock: The following menu will appear: Click on the Scan icon on the top right side: The following menu will appear: Click on Full Scan. You will confirmation of your request in the main part of the application.
-
Docusign Tutorials