Reviewing Document Details from the Index Browser
To review document details from the Index Browser
In the index Browser, locate the document for which you want to review details (see Finding Documents Using the Index Browser).
In the search results, click Details below the document.
In the information panel that appears, select the Properties tab to review the properties associated with the document.
Click to expand the content of the tabs in one continuous panel.
The following table presents the available properties.
Link presented in the search results to display the document location.
Clickable URI Link that is opened when the document is clicked in the search results.
Link to open the Quick View version of the document in a new window (see What Is a Quick View?).
Title given to a document by its author in the document properties. For more information about giving a title to a document, refer to the documentation of the application used to create the document (ex.: Microsoft Word, Adobe Acrobat Pro). The document title and the document filename can be different and are stored in separate fields.
Author of a document. The author of a document is the user logged onto the workstation when the document is created. The author name can be modified in the document properties. For more information about modifying the author of a document, refer to the documentation specific to the application.
File type of the document (see Supported File Formats).
Language extracted by the Coveo Platform for a document (see Supported Languages).
Size, in bytes, of the document original file.
Creation or last modification date of the document.
Date the document was added to the index.
Duration for audio or video documents.
Whether the document is an attachment or not.
Whether the document contains attachments or not.
Whether the document was indexed by reference (only file information) or content (see What Is the Difference between Indexing by Reference and Indexing by Content?).
Whether the document is protected against unauthorized duplication or not. Copy protection is common on commercial PDF, audio, or video documents.
Note: The content of copy protected documents is searchable, but will not be displayed in a search result to prevent showing it in a context where users can make a copy.
Example: With Adobe Acrobat Pro, in the Password Security Settings dialog box, when you clear the Enable copying of text, images, and other content check box, the document becomes copy protected, and users viewing it in Acrobat will not be able to copy its content.
In a search result, the file name appears at the place of the title, and the excerpt and Quick View are not available.
Note: When the account you use to access the Administration Tool does not have the permissions to see an indexed document, the following message appears in its Properties tab:
You do not have the permissions to view the document properties.
An account member of the System Administrator (Full Access) role has access to properties for all indexed document (see About Administration Roles). Consider making your account a member of this role (see Assigning Users to Administration Roles).
In the information panel, select the Permissions, to review the users/groups associated with the document, their source security provider, and if they are allowed to see the document in search results.
Tip: The content of the Permissions tab is very useful to help understand or troubleshoot why a document is visible or not in search results for a given user or group of users.
1 Click the Display drop-down list to select either the Effective Combined Permissions or one specific permission set under a permission level to list the corresponding security entities and understand why a user sees a document or not (see Permission Levels and Sets). 2 Click a security entity to open it in the Security Browser page and review the security entity members (see Using the Security Browser). 3 Review this column to identify the type of each security entity. 4 Review this column to identify the type of security provider with which each security entity was retrieved. 5 Review this column to see if a security entity allows seeing the document or not in search results. 6
Type in the Filter box to easily refine the list of security entities to the ones containing the typed string. This feature is useful to quickly find a specific security entity or field in long lists.
Since each CES server (master and mirrors) has a security cache instance, security identities can differ from a CES server to another.
When not a member of any group, a user is known by the security cache instance of servers on which it has performed at least one query. Considering document effective permissions are computed on the master server, a specific user can be missing on a document effective permissions if the user never performed a query on the master server.
Yet, the missing user can see the document in search results on a mirror server. In such case, to see the user in the document effective permissions, the user only has to perform a query on the master server.
An internal Anonymous permission was introduced to allow security providers to match a repository anonymous user (such as extranet\anonymous) and consequently, allow any user to see anonymous repository content in search results.
CES 7.0.7104– (October 2014) The Anonymous permission can misleadingly appear with the denied icon () in the Allowed column when it was not set.
CES 7.0.7183+ (November 2014) The Anonymous permission appears only when it is explicitly allowed.
In the information panel that appears, select the Fields tab to review the Name, Type, and Value of fields indexed for the document. The available fields vary depending on the type of source and the built-in or custom field set used (see Available System Fields and Adding or Modifying Custom Fields).
Fields are displayed in the document properties only if:
They contain a value (ex.: @syslanguage is displayed only if the language of the document is recognized by CES).
They are set as a display field.
CES 7.0.6339+ (January 2014) Tag fields such as those created by the Text Analytics module are identified with the tag icon.
Tip: In the Permissions and Fields tabs, you can type a string in a Filter box to easily refine the list to the elements containing the typed string. This feature is useful to quickly find a specific security entity or field in long lists.
In the information panel that appears, select the Summary tab to review a list of complete sentences recognized as important by an advanced linguistic algorithm.
Note: When no summary is displayed, summarization may have been disabled for this source to save CPU resources (see Modifying General Source Parameters).