Prerequisites: To use applications within the Venn Secure Enclave,they must be physically installed on the computer.
Applications available for use within the Secure Enclave can be found in the Venn Launcher under the "Launch" or "Apps" navigation tabs. The displayed applications are those authorized by your Venn administrator for use within Venn. If there is a specific business application you need to use in the enclave, please contact your Venn administrator for assistance.
If an application is visible but has a downward-facing arrow icon, it indicates that the application is either not installed or cannot be detected by Venn.
Application Installation and Detection
Administrator rights are required to install applications on the computer.
If an application has a downward-facing arrow icon, it may suggest that the application is not installed. Please review your computer's application list and confirm whether the application is installed. If it is not installed, open a browser outside of Venn and visit the application's website to download and install it. After installation, it may take a few minutes for Venn to detect the installation. If Venn does not detect the installation after several minutes, log out and back in to the Venn application.
If the application is already installed on your computer but cannot be located by Venn, the following factors may be the cause:
- The application is built on the UWP platform (typically installed from the Microsoft Store).
- The application installed is a 32 bit application (Venn only support 64 bit applications)
To resolve the detection issue:
- Uninstall the currently installed application.
- Open a browser outside of Venn.
- Visit the application's website and go to the download page.
- Locate the 64-bit (Windows) or Mac install file.
- Download and install the application.
- Wait a couple of minutes for Venn to detect the application, or log out and back in to Venn.
Launching Applications for First Use
The first time you click on an application within the Secure Enclave, you may notice a blue spinning icon overlaying the application. This indicates that the application is preparing for its initial launch within the Secure Enclave. Venn creates a unique profile for that application in Venn Disk, separate from your personal profile. For more information about Venn Disk, refer to this article. Once the application is prepared for use in the enclave, it will open and be surrounded by a Blue Border, indicating it is running within the Secure Enclave.
When an application is opened for the first time within the Secure Enclave, it is treated as if it were being installed for the first time and requires configuration. You may need to sign in to the application and customize settings for your work requirements. Below are examples of the most common applications that require initial configuration.
The browser running within the Secure Enclave for the first time will have a clean slate. Your personal browser profile, including history, pinned tabs, bookmarks, and accounts, will not be copied over. This intentional separation helps maintain the distinction between your work and personal activities. If authorized by your company, you can sign in to a profile and sync your bookmarks and history. To import bookmarks from a browser profile outside of the Secure Enclave, follow the steps outlined in this article.
Mail applications, for example Outlook, launched within the Secure Enclave for the first time will need to be configured for work use, as the associated profile is unique to Venn. Upon the initial launch, you will be prompted to log in to the work account authorized by your company. If an account is already prefilled, check it carefully to ensure it is the account you will use for work. After authentication, you will need to configure:
- Your signature
- Any views for your folders including your inbox
If your company is using Venn's built-in file system called "Workplace Drive," no additional configuration is required. Please refer to the documentation on the Workplace file system for more information. If your company utilizes a third-party file system like Google Drive or OneDrive, please follow the instructions provided in this article for configuration steps.