|How it works||Learn how SENF works (Vendor documentation)|
|System Requirements||Review SENF's system requirements (Vendor documentation)|
|Linux||Learn how to run SENF (Vendor documentation)|
Handling Private Data
Follow the path reported in the SENF forecast window to the file to verify the data and look for other sensitive information in the file. See the Private data quick reference table.
When in doubt about what to do contact the IT Security Office (ITSO) at email@example.com. The general rule is if you don’t need it Shred IT!