Home → General Information :: General Support → Printer Friendly Version
Trumpet Support hours are Monday through Friday, 8am-4pm MST.
If you encounter a problem with any of Trumpet's software or have a question about our software then you should open a "Support Request." This can be accomplished by completing the following steps:
2. Click the "Update Request" button
Our research indicates that users who perform the following steps get their issues resolved much faster than those who do not:
Your end goal should be to enable a Trumpet support technician to recreate your issue. If you don't provide the information up front, we will have to spend iterations requesting the information from you.
For urgent issues, see this article: What to do if you have an urgent issue
Initial attempt: | "When I try to search for text in a file, it doesn't work" |
Much better: | "When I do a text in file search (see attached screen shot of the Find dialog I am using), the document list returns no documents. I think that it should return document 74325, which contains the text phrase 'investment policy.' This used to work, but hasn't worked since Monday." |
Initial attempt: | "Worldox isn't working on my computer" |
Much better: | "I can launch Worldox, but when I open a new Word document and click the Save button, I get a regular Save As dialog (see attached screen shot) instead of the Worldox index card. This worked fine until this morning. Other users aren't having this issue." |
This is the process for taking a screen shot:
Tip: If your email application doesn't allow pasting of images (most do, but some don't), paste the screen shot into a Word document and email that.
If you prefer to save the screen shot as a file first, please be sure to use PNG as the file format.
When you receive a response from Trumpet's support team, it will have a line that reads "Reply ABOVE THIS LINE to add a note to this request". If you put any content below this line, we will *not* see it. So be sure to place your responses above the line!
Here's a screen shot of what this looks like:
On Friday 12/10/2021 at 8:00am PST, we became aware of a new exploit impacting servers across the Internet called LogJam (Vulnerability ID: CVE-2021-44228). The vulnerability itself is in a widely used logging library called Log4j, versions prior to 2.15.0.
The vulnerability is to inbound requests to software from the public Internet.
Java security patches issued earlier this year contain mitigations that prevent LogJam. Any system running Java with patch at or above 6u211, 7u201, 8u191, and 11.0.1 will not be vulnerable to LogJam.
Based on our evaluation of the threat, for this vulnerability to be an actual risk of being exploited, an application must meet ALL of the following criteria:
This article is intended to provide you with our vulnerability assessment and corrective action plan of the impact of LogJam on Trumpet’s products. See table below. Rest assured that we are also evaluating our internal servers (and we recommend that you do as well!). We've provided links to technical details of this vulnerability at the end of this article for your reference.
Assessments are based on the latest production releases of each product. For maximum security, ensure you are running the latest versions of your Trumpet software.
Application & Production Version #
| Vulnerability Assessment
| Corrective Action Status
|
---|---|---|
SignatureBridge
(Cloud based, you're on the latest!) | Connected to the public Internet: YES
Uses vulnerable version of Log4j: YES Uses protected JDK: YES (11.0.13) Assessment: System not at risk |
12/10/21 1:42pm PST Out of an abundance of caution, we pushed a patch to SignatureBridge that eliminates the vulnerable version of Log4j |
Assemblage (to include Emailer Module, Auto Filer, Trumpet Publisher, PDF Splitter)
(2.3.61) |
Connected to the public Internet: NO
Assessment: System not at risk | We will be issuing a patch that removes the vulnerable Log4j library in the next two weeks.
|
Symphony OCR - On Premise
(8.1.0) |
Connected to the public Internet: NO
Assessment: System not at risk | We will be issuing a patch that removes the vulnerable Log4j library in the next week.
|
Symphony OCR - WD Cloud
(8.1.0) |
Connected to the public Internet: NO
Assessment: System not at risk | We will be applying a patch that removes the vulnerable Log4j library in the next two weeks.
|
Symphony Profiler - On Premise
(2.0.62) |
Connected to the public Internet: NO
Assessment: System not at risk | We will be issuing a patch that removes the vulnerable Log4j library in the next week.
|
Symphony Profiler - WD Cloud
(2.0.62) |
Connected to the public Internet: NO
Assessment: System not at risk | We will be applying a patch that removes the vulnerable Log4j library in the next two weeks.
|
Virtuoso, Virtuoso Embedded Search
| Does not use Log4j at all; System not at risk
| No action
|
AuditSync
|
Connected to the public Internet: NO
Assessment: System not at risk | We will be issuing a patch that removes the vulnerable Log4j library in the next four weeks.
|
Attach Plus
| Does not use Log4j at all; System not at risk
| No action
|
BatesCL
|
Connected to the public Internet: NO
Assessment: System not at risk | We will be issuing a patch that removes the vulnerable Log4j library in the next four weeks.
|
8.3 Filename Tool |
Does not use Log4j at all; System not at risk
|
No action
|
For any clients who receive Worldox support from Trumpet: Worldox has assured us that all of their products are safe from risk. Contact support@worldox.com or wdccsupport@worldox.com (cloud support) if you'd like more details.
Layman’s description of the vulnerability: https://arstechnica.com/information-technology/2021/12/minecraft-and-other-apps-face-serious-threat-from-new-code-execution-bug/
Technical description of the vulnerability: https://www.lunasec.io/docs/blog/log4j-zero-day/
Pursuant to the requirements of the Health Plan Transparency in Coverage Rule, details about the In Network and Out of Network rates for Trumpet's medical plans can be found here: https://transparency-in-coverage.uhc.com/
At Trumpet, we care deeply about the security of your data and being HIPAA compliant in all things. In that spirit, we want to relay a recommendation that will help keep you in tiptop shape with HIPAA policies and best practices. The recommendation is regarding your ability to audit security events, specifically as it relates to our access to your system.
Background: Our remote access tool, ScreenConnect (by ConnectWise), is used by our team to operate and support your automation solutions on your locally hosted bot machine(s). It tracks user activity by name and shows when our team members log in and log off. These activities log events in the Windows Event Viewer. In the unlikely event of a security incident, these logs can be used by your team to audit activity on the machines.
Recommendation: HIPAA does not have a set length for retention, but it is best practice to keep records for 6 years. We recommend consulting with your Compliance and IT teams to create processes and mechanisms for archiving these Windows event logs in accordance with this best practice.
While we cannot offer formal advice on how to capture or store these logs, we have included a screenshot of what the event log looks like inside the Event Viewer interface for your reference.
Event Viewer: Windows Logs > Application
Event ID: 101, Level: Information, Source: ScreenConnect
Please contact customersuccess@trumpetinc.com if you have any questions.