User manual
Table Of Contents
- Chapter 1 Introducing FileMaker Pro
- Chapter 2 Using databases
- About database fields and records
- Opening files
- Opening multiple windows per file
- Closing windows and files
- Saving files
- About modes
- Viewing records
- Adding and duplicating records
- Deleting records
- Entering data
- Working with data in Table View
- Finding records
- Performing quick finds in Browse mode
- Making find requests in Find mode
- Finding text and characters
- Finding numbers, dates, times, and timestamps
- Finding ranges of information
- Finding data in related fields
- Finding empty or non-empty fields
- Finding duplicate values
- Finding records that match multiple criteria
- Finding records except those matching criteria
- Viewing, repeating, or changing the last find
- Saving find requests
- Deleting and reverting requests
- Hiding records from a found set and viewing hidden records
- Finding and replacing data
- Sorting records
- Previewing and printing databases
- Automating tasks with scripts
- Backing up database files
- Setting preferences
- Chapter 3 Creating databases
- Planning a database
- Creating a FileMaker Pro file
- Creating and changing fields
- Setting options for fields
- Creating database tables
- Creating layouts and reports
- Working with layout themes
- Setting up a layout to print records in columns
- Working with objects on a layout
- Working with fields on a layout
- Working with parts on a layout
- Creating and editing charts
- Chapter 4 Working with related tables and files
- Chapter 5 Sharing and exchanging data
- Sharing databases on a network
- Importing and exporting data
- Saving and sending data in other formats
- Sending email messages based on record data
- Supported import/export file formats
- Setting up recurring imports
- ODBC and JDBC
- Methods of importing data into an existing file
- About adding records
- About updating existing records
- About updating matching records
- About the importing process
- Converting a data file to a new FileMaker Pro file
- About the exporting process
- Working with external data sources
- Publishing databases on the web
- Chapter 6 Protecting databases
- Protecting databases with accounts and privilege sets
- Creating accounts and privilege sets
- Viewing extended privileges
- Authorizing access to files
- Security measures
- Enhancing physical security
- Enhancing operating system security
- Establishing network security
- Backing up databases and other important files
- Installing, running, and upgrading antivirus software
- Chapter 7 Converting databases from FileMaker Pro 11 and earlier
- Index
Chapter 6 | Protecting databases 141
1 Secure the client workstations that access a database. Lock the computers down and restrict
access by using a screensaver that requires a password.
1 Ensure the physical security of backup copies of files stored on portable media, such as tapes
and CDs.
Enhancing operating system security
Use the security features of your operating system to restrict access to important data. The
network administrator should provide access only to individuals authorized to administer and
maintain the system or the FileMaker databases. In addition, they should:
1 Track system user IDs and passwords.
1 Restrict access to the FileMaker Pro application and file directories, servers, and web pages.
1 Review remote access settings for file sharing and FTP.
1 Restrict file upload or download access.
1 Make sure all users have the latest, most secure versions of operating system software.
1 To streamline processes, you can enable external authentication, which uses accounts that
have been configured in the Windows Domain Authentication or in Apple Open Directory. For
more information, see Help.
1 Do not put FileMaker Pro files on file servers to share them. Use the built-in networking feature
in FileMaker
Pro and FileMaker Server. This prevents the files from being inappropriately
copied or from introducing record locking and potential corruption issues when files are shared
with inappropriate methods.
Establishing network security
Databases shared on an intranet or the internet use the TCP/IP protocol. You may also use the
TCP/IP protocol when you share databases peer-to-peer, or with FileMaker
Server. Though
TCP/IP is good for moving data and allowing clients to connect to your data, it was not designed
with security as a primary objective. Unless you take precautions, it can provide uninvited access
to your host computer, server software, databases, and perhaps to other client machines on your
internal network. TCP/IP doesn't provide very much protection for data, so it is important to place
barricades such as firewalls and SSL data encryption in the path of uninvited visitors.
1 The most common barricade method used is the firewall, which separates your network into two
distinct environments: a public environment that is “outside the firewall,” and a private
environment that is “behind the firewall.” Users outside of the firewall will only have access to
those TCP/IP or hardware addresses that you expose. You can concentrate your security on
those server machines that are exposed, while allowing machines behind the firewall to operate
with fewer safeguards.
1 Using wireless networking devices, like the Apple AirPort Extreme and other 802.11n networking
cards and base stations, can pose security challenges. These devices can broadcast your
network traffic beyond the walls of your building, so it is extremely important to encrypt your
wireless networking signals. Always use the maximum level of signal encryption available.