User manual
Table Of Contents
- Chapter 1 Introducing FileMaker Pro
- Chapter 2 Using databases
- About database fields and records
- Opening files
- Opening multiple windows per file
- Closing windows and files
- Saving files
- About modes
- Viewing records
- Adding and duplicating records
- Deleting records
- Entering data
- Working with data in Table View
- Finding records
- Performing quick finds in Browse mode
- Making find requests in Find mode
- Finding text and characters
- Finding numbers, dates, times, and timestamps
- Finding ranges of information
- Finding data in related fields
- Finding empty or non-empty fields
- Finding duplicate values
- Finding records that match multiple criteria
- Finding records except those matching criteria
- Viewing, repeating, or changing the last find
- Saving find requests
- Deleting and reverting requests
- Hiding records from a found set and viewing hidden records
- Finding and replacing data
- Sorting records
- Previewing and printing databases
- Automating tasks with scripts
- Backing up database files
- Setting preferences
- Chapter 3 Creating databases
- Planning a database
- Creating a FileMaker Pro file
- Creating and changing fields
- Setting options for fields
- Creating database tables
- Creating layouts and reports
- Setting up a layout to print records in columns
- Working with objects on a layout
- Working with fields on a layout
- Working with parts on a layout
- Displaying data in charts
- Chapter 4 Working with related tables and files
- Chapter 5 Sharing and exchanging data
- Sharing databases on a network
- Importing and exporting data
- Saving and sending data in other formats
- Sending email messages based on record data
- Supported import/export file formats
- Setting up recurring imports
- ODBC and JDBC
- Methods of importing data into an existing file
- About adding records
- About updating existing records
- About updating matching records
- About the importing process
- Converting a data file to a new FileMaker Pro file
- About the exporting process
- Working with external data sources
- Publishing databases on the web
- Chapter 6 Protecting databases
- Protecting databases with accounts and privilege sets
- Creating accounts and privilege sets
- Viewing extended privileges
- Authorizing access to files
- Security measures
- Enhancing physical security
- Enhancing operating system security
- Establishing network security
- Backing up databases and other important files
- Installing, running, and upgrading antivirus software
- Chapter 7 Converting databases from FileMaker Pro 6 and earlier
- Index
136 FileMaker Pro User’s Guide
Establishing network security
Databases shared on an intranet or the internet use the TCP/IP protocol. You may also use the TCP/IP
protocol when you share databases peer-to-peer, or with FileMaker
Server. Though TCP/IP is good for
moving data and allowing clients to connect to your data, it was not designed with security as a primary
objective. Unless you take precautions, it can provide uninvited access to your host computer, server
software, databases, and perhaps to other client machines on your internal network. TCP/IP doesn't provide
very much protection for data, so it is important to place barricades such as firewalls and SSL data
encryption in the path of uninvited visitors.
1 The most common barricade method used is the firewall, which separates your network into two distinct
environments: a public environment that is “outside the firewall,” and a private environment that is
“behind the firewall.” Users outside of the firewall will only have access to those TCP/IP or hardware
addresses that you expose. You can concentrate your security on those server machines that are exposed,
while allowing machines behind the firewall to operate with fewer safeguards.
1 Using wireless networking devices, like the Apple AirPort and other 802.11b networking cards and base
stations, can pose security challenges. These devices can broadcast your network traffic beyond the walls
of your building, so it is extremely important to encrypt your wireless networking signals. Always use
the maximum level of signal encryption available.
Backing up databases and other important files
Develop plans for restoring data, including alternate sites and systems to run business-critical information
services. A current backup can help you recover from a situation where someone loses the administrator
account information for a file, or from a situation where user error (and sometimes bad database design)
causes data to be deleted or modified inappropriately.
Keep these points in mind:
1 Host databases with FileMaker Server and create regularly-scheduled, automated backups.
Don’t use third-party backup software on hosted FileMaker Pro databases. First, use FileMaker Server
to make a backup copy of your database, then run your third-party backup software on the copy. Backup
software can damage open, hosted databases.
For example, make local backups of files at 6:00 am, 9:00 am, 12:00 noon, 3:00 pm, 6:00 pm, and 11:30
pm weekdays. At midnight, make an incremental backup of the entire system to the enterprise backup
system. Finally, Friday night at midnight, perform a full system backup. Copy and store the backup tapes
at a remote location. This way, if the server goes down for some reason other than catastrophic failure of
multiple drives, the more recent backup of the data files can be used, meaning a maximum of 3 hours of
lost data. If there is a catastrophic drive failure, then the previous evening’s tape can be used, minimizing
the loss to one day’s data. Of course, these procedures can be tailored to your situation and data value.
1 Make sure backup copies aren’t damaged or inaccessible. Verify that they are functioning properly before
you need them. Run diagnostic tools on your hard drive and your backup files regularly.
1 Ensure that you can restore an entire set of files from backup copies.
1 Regularly export the data to protect against file corruption.
1 Protect the backup media itself. Store backups in a separate and fire-proof location.
1 Assign backup administrators who can retrieve files, in case the network administrator is unavailable.