Configure the Content Analyzer.
As an Acrolinx administrator you can extend the file types that Acrolinx checks. See the article How to Configure Acrolinx to Recognize Your File Type to learn more.
If you use the MSI installer properties to automate the installation of the Acrolinx Content Analyzer, you can use the properties in the following table to specify preferences during installation.
Property |
Description |
---|---|
|
Specify the Acrolinx URL. Example msiexec /i AcrolinxContentAnalyzer2019.msi /qb ACROLINX_SERVER_ADDRESS=https://demo-inc.acrolinx.com CautionNote: This property works for first-time installations only. The property gets ignored during an update and whichever Acrolinx URL is currently configured gets used instead. |
|
Microsoft Information Protection lets you add sensitivity labels to your content. To prevent writers from using Acrolinx to check content with sensitive data, you can set up the Content Analyzer to check content with certain labels. Configure the names of labels that you want Acrolinx to check. If you list more than one label, separate with a semicolon. The values aren't case-sensitive. This currently works for Word, PowerPoint, and Excel, but not for Outlook. For example, you might create the following labels: CautionThe values must be the "Name" (NOT the "Display name") of the sensitivity label
Example msiexec.exe /i AcrolinxContentAnalyzer.msi /qn ACROLINX_SERVER_ADDRESS=https://demo.acrolinx.com ACROLINX_MIP_ACCEPTEDLABELS=general;custom label |
|
Specify if Acrolinx should check content that doesn't have a sensitivity label assigned. You'd normally assign this kind of label to sensitive content via Microsoft Information Protection. You can specify this property in Word, PowerPoint, and Excel. Currently, this isn't possible in Outlook. The available values are:
Example msiexec.exe /i AcrolinxContentAnalyzer.msi /qn ACROLINX_SERVER_ADDRESS=https://demo.acrolinx.com ACROLINX_MIP_PREVENTEMPTYLABELS=true |
*Since an installer isn't available for Mac and Linux, set the environmental variables as follows:
To configure the environmental variable via a .plist
file, do the following:
-
In the release folder, find the following lines in
com.acrolinx.ca.plist
and specify the valueslaunchctl setenv ACROLINX_MIP_ACCEPTEDLABELS
andlaunchctl setenv ACROLINX_MIP_PREVENTEMPTYLABELS
. For example:launchctl setenv ACROLINX_MIP_ACCEPTEDLABELS General
launchctl setenv ACROLINX_MIP_PREVENTEMPTYLABELS true
Tip
If you want to add multiple labels, use the following format:
launchctl setenv ACROLINX_MIP_ACCEPTEDLABELS "General;Confidential"
-
Copy the adjusted file to
/Library/LaunchAgents
. -
Sign out and sign back into your computer. When you sign back in, be sure to uncheck Reopen windows.
-
Content Analyzer will use the specified values.
To analyze network behavior, you can open Chrome DevTools with the parameters --open-dev-tools
or -o
in your command line. Chrome DevTools will open in a Content Analyzer window.
You also might want to see a more detailed log level. To enable debug logging, use the parameters --debug
or -d
in your command line.
The Content Analyzer accepts all certificates in your OS certificate store. If your organization uses non-standard SSL certificates, like a self-signed certificate, you can add that certificate to your OS certificate store.
The steps to add a certificate to the OS certificate store differ depending on your browser and your operating system. Below we describe how to add a certificate for a Windows 10 operating system via the Chrome browser.
Warning
Self-signed certificates aren’t considered secure. Only import a certificate that you're sure you trust. In general, importing untrustworthy certificates could make your system vulnerable.
To add an SSL certificate to your Windows 10 certificate store via the Chrome browser, follow these steps:
-
Open Chrome and enter the URL that you want to check. You'll see a warning that your connection isn’t private.
-
To open the certificate information, click the Not secure error to the left of the URL field, and click Certificate (Invalid) in the dropdown.
-
In the certificate information window, go to the Details tab and click Copy to file... This will open the certificate export wizard.
-
In the certificate export wizard, follow the steps to name and save the certificate to a local folder.
-
Open the saved certificate and click Install Certificate. This will open the certificate import wizard.
-
Select the store location for the Current User and click Next.
-
Select Place all certificates in the following store and click Browse.
-
Select Trusted Root Certification Authorities and click OK.
-
Click Next and complete the certificate import. Accept the warning message asking whether you really want to import this certificate.
-
To check that it worked, open Chrome and enter the URL that you want to check. You should no longer see a warning. You can now check that site with the Content Analyzer.
Most content doesn't just have text, it also includes images, diagrams, and sometimes markup like XML or HTML. To check correctly, Acrolinx needs to extract the text from your content. You can define the extraction settings using Content Profiles. You can configure your Content Profiles, but your guidance package also comes with default Content Profiles.