User Facing How-Tos
Repository for user-facing how to documents
-
Getting Started with GL Wand 5
GL Wand V 5 How to Start with GL Wand V 5 Please see attached guide! Text Steps Below In Oracle you will see that you have a new responsibility: Excel4Apps Wands After clicking on the new responsibility, system will launch the Excel4apps software and will open Excel with a couple of new Tabs: Excel4apps and GL Wand Very Important: DO NOT CLOSE THE JAVA WINDOW WHILE YOU ARE USING GL WAND Congratulations, GL Wand V. 5 Add-in is already installed in your computer What is new in this version? 1. You need to open Oracle and click on Excel4apps Wands responsibility to turn on GL Wand, after that you can open your GL Wand templates 2. You can move between responsibilities in GL Wand, you do not need to reconnect every time you want to change responsibilities 3. You can select if you want Parent and/or Child values when you use Discover function 4. More options for Expand function. a. Example: Put on any cell -%-%-%-%-% then click on Expand, confirm the segments and you will get all the combinations
-
How To - Company Portal - Application Store
These instructions will help you find and install Coeur approved applications - no admin credentials required! Open the Microsoft Company Portal (search for "company" in your W10-11 Start Menu) Navigate to the 'Apps' section and search for the app you wish to install (e.g. reader) Find the latest version of you app and click ‘Install’ Follow the on-screen instructions to complete the installation (Applications requested and installed through Company Portal do not require admin credentials).
-
ITSM and ITAM - Freshservice ITIL Glossary if Definitions
ITSM - IT Service Management Service: A means of delivering value to customers by facilitating outcomes customers want to achieve without the ownership of specific costs and risks (e.g. providing something to a customer they don't have). Incident: An unplanned interruption to an IT service or reduction in the quality of an IT service. It requires a response to restore normal service operation as quickly as possible. (e.g. something a customer already has is broken). Problem: A cause of one or more incidents. The focus is on identifying the underlying cause of an incident and implementing a workaround or a permanent solution. Change: The addition, modification, or removal of anything that could have an effect on IT services. This includes changes to all architectures, processes, tools, metrics, and documentation, as well as changes to IT services and other configuration items. Configuration Item (CI): Any component that needs to be managed in order to deliver an IT service. CIs may vary widely in complexity, size, and type, ranging from an entire service or system to a single software module or a minor hardware component. Service Level Agreement (SLA): A documented agreement between a service provider and a customer that identifies both services required and the expected level of service. Request Fulfillment: The process of dealing with service requests from users. This includes requests for information, access to services or resources, or for a standard change. Release Management: The process of planning, designing, building, testing, and deploying releases. Releases can be of various types, including software, hardware, or both. Capacity Management: Ensures that the IT service provider has, at all times, sufficient capacity to meet the current and future agreed demands of the customers' business processes. Availability Management: The practice of ensuring that IT services can be accessed and used as agreed upon by the terms of the SLA. ITAM - IT Asset Management Asset: Any resource or capability that can contribute value to an organization. In ITAM, this usually refers to any item of hardware, software, or information technology service that is part of the IT environment. Asset Lifecycle: The stages through which an IT asset passes during its time with an organization, from acquisition to disposal. These stages typically include planning, procurement, deployment, usage, maintenance, and disposal. Asset Register/Inventory: A detailed record of all IT assets in an organization, including their configurations, locations, users, and the relationships between assets. Software Asset Management (SAM): A business practice for managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization. Hardware Asset Management (HAM): The process of managing the physical components of computers and computer networks, from acquisition through disposal. License Compliance: Ensuring that the organization complies with all legal and contractual requirements regarding the use of software licenses. Asset Tracking: The process of tracking physical assets, either by scanning barcode labels attached to the assets or by using GPS, RFID, or other technology to track their location. Depreciation: The gradual reduction in the financial value of an asset over time, particularly important for accounting and financial reporting purposes. End-of-Life Management: The process of handling IT assets that have reached the end of their useful life, including decisions about recycling, reselling, or disposing of them in an environmentally responsible manner. Audit: A systematic process of evaluating an organization's IT assets to ensure compliance with various policies and regulatory requirements, and to verify the accuracy of IT asset records.
-
How To - Report a Suspicious Email in Outlook
How To Report a Suspicious Email - Current Outlook Client In our day-to-day work, we’re often faced with deciphering whether an email is legitimate or not. While spam and nuisance messages can be easily deleted, what should be done about suspicious or malicious emails? Mimecast has a simple solution that is quick and easy! Select the suspicious email, then navigate to the blue Mimecast button on the far right of the ribbon. Click on the Mimecast Icon, then select the octagonal button. Confirm by clicking the button, and you’re done! How To Report a Suspicious Email - New Outlook Client Click the dot menu (…) on the top right of the email and navigate to the Mimecast icon, then click the report phishing button. You’re Done! Manage Blocked and Permitted Senders with Mimecast Navigate to the blue Mimecast button on the far right of the ribbon. Click on the Managed Senders option. Wait for the login popup to appear, click the button then use your Coeur email to log in. Manage Blocked, Permitted, and Auto-Permitted users from the portal.
-
How To - New Mobile Device Management Installation Guide
New Mobile Device Management Installation Guide - 2024 In the next couple of weeks, we will be reaching out to users to assist or confirm that the new Intune portal is up and running on their devices. We will be moving from our current Mobile device management platform, ManageEngine to Intune. This is to better manage, secure and keep audit of our mobile equipment in keeping with the ever-changing IT environment. From your Device AppStore please search for and download “Intune Company Portal.” Open the app after downloading and click on your Coeur email. Click “OK” and then “Allow” to enable Notification. Then “Close” and then “Continue” Select Begin to initiate setup process. Select “Can” and click Continue. The installation process will now begin. Click Continue on the next screen. Select “Allow” to continue download. After Closing and moving to next setup checklist item, click Continue and follow these directions to complete the install. Go to your phone Settings > General>VPN &Device Management. Click on Management Profile. Click on Install Enter your device passcode Click Install and then install on the next screen Select Trust Click Done after installation completes The “Comp Portal” should now be visible from your apps folder/home screen
-
User How-To - DLP Message Block Override for Email and SharePoint
This How-to Article is intended to help users override a false positive DLP (data loss prevention) block in Email, OneDrive, and SharePoint. IMPORTANT - Once you have populated the field, The override tooltip reference below can take 30-60 seconds to appear in some instances. If your initial attempt to send fails - please enter your recipients into the field and wait for the tooltip to appear before sending again. IMPORTANT -If you do not see this tooltip in your Outlook client - The workaround is to resend the email from your web client at https://outlook.office.com. TO OVERRIDE A FALSE POSITIVE - Click on the "Learn More" or "Show Details" tooltip, and then click override. Please see additional information below This Toolip can show in Excel, Word, etc. as well. If you are not seeing the tooltip, but your share is being blocked, please navigate to the web version of your app here https://office.com. If this information does not solve your problem - please submit a ticket and our DLP experts will work to help you get your message sent. Additional Information - Microsoft Learning - DLP Policy and Tips
-
How To - Find the MAC Address (WiFi Hardware Address) On My Device
This article covers generic instructions for the following devices as of 2024-4 Windows 10 workstations Windows 11 workstations Apple Mobile Devices Android Mobile Devices Windows 10 To find the MAC address on Windows 10 through the Settings app, use these steps: Open Settings. Click on Network & Internet. Click on Ethernet or Wi-Fi depending on your network connection. Select the connection. Under the "Properties" section, confirm the physical address (MAC) of the device. Windows 11 1. First, use the Windows 11 keyboard shortcut “Windows + I” to open the Settings app. Here, move to “Network and Internet” settings from the left sidebar and open “Wi-Fi” in the right pane if you have a wireless connection. In case you have connected an Ethernet cable to your PC, click on “Ethernet”. 2. Now, scroll down and click on “Hardware properties“. 3. Here, you will find the MAC address of your Windows 11 PC at the bottom. Apple Mobile Devices Tap Settings Tap General Tap About The device's MAC address will be listed next to Wi-Fi Address Android Mobile Devices From the Home screen, tap the Menu key and go to your Settings Select About Phone or About Tablet Select Status The device's MAC address will be listed next to Wi-Fi MAC address
-
How-To - Coeur Email Signature Templates and Branding
COUER MINING - EMAIL SIGNATURE TEMPLATES - 2024 Email signatures are often the first contact people have with our company and should always be included at the end of your business emails. The information in an email signature should be standardized and positioned uniformly. The overall layout and the structure of our email signature is the same across the company and should follow the guidelines below. Guidelines The logo used in your email signature must represent your primary work location. Logos - Corporate and site logos Notice of Confidentiality must be included in all email signatures. Use the templates below to adhere to the guidelines in the Coeur Branding Manual. If in doubt, reach out to Corporate Communications for branding questions. Main Templates Copyable Templates can be found here - Coeur Mining - Email Signature Templates - 2024.docx Optional Identifiers Three optional, additional identifiers are available for your email signature. CEO Action for Diversity – if you have taken the Action for Diversity pledge and would like to include it in your email signature, please use that option. Coeur Hero - If you are a Coeur Hero and would like to include that status in your email signature, please use that option. Emergency Response Team Members - If you are a member of one of our emergency response teams and would like to include that status in your email signature, please use that option. Creating and Saving Signatures in Outlook Create and add an email signature in Outlook for Windows - Microsoft Support Create and add an email signature in Outlook.com or Outlook on the web - Microsoft Support Additional Resources Guidelines can be found here - COEUR MINING BRAND MANUAL_2022.pdf Resources including letterhead, logos, etc. can be found here - 2022 Coeur Brand Guidelines Support Please reach out to IT for technical support at https://servicedesk.coeur.com/
-
SharePoint Users - File Sharing Guidelines
Purpose The purpose of this guideline is to help users understand and manage access to documents and information on SharePoint, ensuring secure and appropriate sharing practices within the organization. Key Points 1. Understand Your Role and Permissions: - Know the level of access you have been granted (Owner, Member, Visitor). - Understand the permissions associated with your role, such as viewing, editing, or full control- 1. Owners Responsibilities: - Full Control: Owners have complete access to all site settings and content. They can manage permissions, create and delete sites, libraries, lists, and pages. - User Management: Owners can add, remove, and change the permissions of other users. - Customization: They can customize site structure, appearance, and settings, ensuring the site meets organizational needs. - Security Oversight: Responsible for ensuring that the site is secure and that permissions are granted appropriately. 2. Member Responsibilities: - Edit Content: Members can add, edit, and delete content such as documents, lists, and pages within the site. - Collaboration: They can collaborate with other users by sharing documents, assigning tasks, and participating in discussions. - Limited Management: While members can contribute significantly to site content, they do not have the ability to change site settings or manage permissions. 3. Visitors Responsibilities: - View Content: Visitors can only view content within the site. They do not have the ability to add, edit, or delete any content. - Read-Only Access: Their primary role is to consume information without making any modifications. Visitors are typically users who need access to information but do not need to interact with the content. 2. Sharing Documents and Folders: - Only share documents and folders with users who need access to perform their job functions. - Use the "Share" feature to grant access, and specify whether users can view or edit the content. 3. Managing Permissions: - Regularly review the permissions for documents and folders you own. - Remove access for users who no longer need it or who have left the organization. 4. Sharing with External Users: - Follow organizational policies for sharing with external users. - Ensure that external sharing is necessary and approved by your manager or IT department. 5. Using Links for Sharing: - Use secure links for sharing documents and specify the access level (view or edit). - Set expiration dates for shared links when possible. 6. Monitoring Shared Content: - Regularly check who has access to your shared content. - Use the "Manage Access" feature to view and adjust permissions. 7. Educating Yourself and Others: - Stay informed about best practices for information security and data sharing. - Educate your colleagues about the importance of managing access responsibly. Best Practices - Limit Access: Grant the minimum level of access necessary for users to perform their tasks. - Audit Regularly: Periodically review shared content and permissions to ensure they are still appropriate. - Be Cautious: Be mindful of sharing sensitive or confidential information. Use encryption and other security measures when necessary. - Stay Updated: Follow organizational updates and training sessions on SharePoint and information security. Reporting Issues If you encounter any issues or have concerns about sharing practices, please contact the IT support team or your SharePoint administrator immediately.
-
How To - Report a Cyber Incident
Coeur Mining Inc - Cyber Incident Reporting Process 1. Recognize the Incident Identify any unusual or suspicious activities, system malfunctions, or security breaches. Cyber Awareness Training is an excellent resource. Common incidents may include phishing scams, system outages, unauthorized access attempts, data breaches, malware infections, and suspicious hardware failures. If the incident presents a risk to safety, business operations, threats of violence or terrorism, notify your supervisor immediately. 2. Report the Incident Immediate Threat If a cyber incident poses a threat to personal safety or significant operational impact, notify your supervisor immediately. Once your supervisor has been notified - IT support can be contacted in several ways: Best Method - IT Support Portal - https://coeur.freshservice.com Local IT Manager via Microsoft Teams IT ServiceDesk Hotline - Local number appearing on your phone list (Corporate - 312-489-5950) Non-Urgent Issues For incidents that are not immediately critical, use the following reporting methods: Email: Email itservicedesk@coeur.com with the subject line "Cyber Incident Report - [Brief Description]". Incident Report Form: Fill out the Incident Report Form available on the IT service portal. https://coeur.freshservice.com 3. Provide Essential Details When reporting the incident via phone, email, ticket, or teams, include the following information: Your Name and Contact Information Date and Time of Incident Description of the Incident (What happened? What systems are affected?) Location (Physical location or system affected) Impact (How is this impacting your work? Is any data compromised?) Immediate Actions Taken (If any, such as disconnecting from the network, shutting down the system, etc.) 4. Follow-Up and Communication Once a ticket is submitted - you will receive an acknowledgment of your report via email. The Security Team will provide updates on the status of the incident when appropriate. In case additional information is required, be prepared to assist the IT team with further details. 5. Escalation Process If you are experiencing a critical cyber incident, have already notified your supervisor, and do not receive a response to your ticket, call, or email - please contact: Your local IT Manager via Microsoft Teams or local phone list. Corporate Senior Manager, IT Operations: Bryan Nord - m 907-209-7467 6. Post-Incident Review Once the incident is resolved, participate in a brief review to discuss the incident and provide feedback. The IT team will document the incident, actions taken, and lessons learned to prevent future occurrences. Communication Channels IT Helpdesk: https://coeur.freshservice.com/ Email: itservicedesk@coeur.com Local Site - IT Manager via Microsoft Teams or phone list Corporate - Senior Manager, IT Operations - Bryan Nord 907-209-7467 Please keep this document accessible and ensure all users are familiar with the incident reporting process. Regular training and awareness sessions will help maintain readiness and ensure prompt reporting and resolution of incidents. For further questions or clarification, contact the IT department at itservicedesk@coeur.com.