Search Results

Search Results

Articles tagged "legacy" returned 11 results.

Page 1 of 2

How to use the legacy drag & drop design tool

Warning The legacy drag & drop design tool is retiring on 31st July 2023. For more information on these changes, and how to prepare, please visit this page. If you...

Legacy Touch Point Settings & Categories

Touch Point Settings and Touch Point Categories can be found in the Settings area. Legacy Touch Point Settings As an Administrator you can use this screen to configure the interval...

Connect Email Design Tool Changes 2023

...legacy and new drag and drop templates. In late July 2023 the legacy design tool will be retiring Users can no longer create new templates, or edit existing designs created...

Marketing Settings

...view legacy campaigns from the view menu only. New Mode only will not provide access to legacy campaigns. Info You can switch between Campaign Modes to review Legacy Campaigns. Close...

Gold-Vision 8 Upgrade Planning

...if you use any of the following, you may wish to delay your upgrade until later in the year. Gold-Vision functionality Legacy Campaigns Please speak to your Account Manager if...

Gold-Vision Technical Requirements

...mobile device Up to date Browser : Windows – Chrome or Edge (Excludes Microsoft Edge Legacy) MacOS – Safari, Chrome or Edge iOS – Safari, Chrome or Edge Android –...

Outlook Plugin

...button. Enter the web address you use for accessing Gold-Vision, suffixed /legacy Close modal   You can also test the connection from this screen. If you use a Gold-Vision server...

Downloading the Data Import Tool

...the new URL which includes ‘legacy’ Configure the Import Tool After downloading and installing the import tool, run it. Enter the URL found on the Lead Management Settings > Data...

Mail Tracking Settings

...user from trying to impersonate when connecting. Ignore Certificate Errors Allows email tracking connections to Exchange to ignore certificate warnings. Use Native Email-Add Legacy setting for use under direction of...

Modern Authentication Overview

...Authentication to give users access to workstations, network resources and other services within the environment. This legacy authentication approach is not seen as secure enough as online services become widely...