First, please note that when you select one of the rows displayed on this page, additional sections become available, including "Activities" and "Files." The columns in the main table are explained in the order they appear on the screen. If you would like a description of the other sections, additional explanatory tables are provided below.
Main table
Column
| Description |
|---|
| To recover | If you have a SESAR license, this column allows you to retrieve a message sent via Secure Exchanges. To do so, simply check the box corresponding to the message you wish to retrieve, and then click the "Retrieve" button. |
| Opening status | Indicates whether the message is Open, Unread, Expired, Deleted, etc. |
| Date of creation | Date the secure message was sent. |
| Number of openings | Number of times the message has been opened. |
| RECIPIENT | Recipient's email address. |
| Sender's email address | Your email address associated with the submission. |
| Subject | Subject of the message sent. |
| Message type | Type of sending (message, reply). |
| Last updated | Date and time of the last action performed by the recipient (opening the message, replying, etc.) |
| The signing process is complete. | This box will be checked if your submission contained files to be signed and the signing process is completed by all signatories. |
| Contains files that need to be signed | This box will be checked if your submission contained files to be signed. |
| Number of files | This column indicates the number of files included in the message. |
| Number of activities | This column indicates the number of activities on the message. |
| Delete a message | You can also revoke access to a message on this page. To do so, double-click on the line corresponding to the message you wish to revoke.
|
Table "Activities"
To view the details of activities associated with a specific message, you must select a row in the main section. Once the row is selected, you will see all actions performed on that message appear in the lower section of the interface. These columns allow you to track the different actions performed on the messages:
Column
| Description |
|---|
| Remote IP | This column shows you the IP address of the machine that interacted with the message. This can be useful for identifying the origin of message accesses. |
| Status | The action status is displayed here. This could be an attempt to open the message, file retrieval, a test, or message deletion. |
| Date | The date on which each activity took place is indicated in this column, allowing you to follow the sequence of events chronologically. |
| Reference | This column indicates the exact reference of the action that was performed, such as opening a secure message, retrieving files, the signing process, displaying the message in the inbox, or even searching for information on the sender's IP address. |
Table "Files"
Finally, in the third section, you will find a table linked to the files attached to each message. Just as with the activities, you must select a row containing files to see their details:
Column
| Description |
|---|
| File name | This column displays the names of the attached files. This allows you to easily identify each file exchanged. |
| Opening status | Here you will see whether the file has been opened by the recipient or not. |
| Number of openings | This column gives you the exact number of times the file has been opened by the recipient. |
| Date of creation | This column indicates the date and time the file was created and sent via Secure Exchanges. |
| Last updated | This column indicates the last update associated with file activity. This could be an action such as opening the message, retrieving the attachment, or another interaction with the message. |
| File size | This column indicates the size of the exchanged file. |
| This is a file to be signed | When the box in this column is checked, it informs you that the file is a file to be signed. |
| Hashing | This column shows you the unique numerical value of the file. A file hash is like a unique fingerprint that ensures the file's integrity and security. It allows you to verify that the file has not been modified during its transfer. |