VerQu Utilities

Have VerQu Do The Work

VerQu offers a wide variety of utilities that automate your daily tasks.

Ocean with an island and boat
Data moving through the cloud

The Right Tool For The Job

Each utility listed below was built with a specific purpose in mind. While these tools might not be applicable on a wide scale, they can do their job efficiently and effectively. To learn more about any of the tools listed below, please contact

Provides a seamless user experience for legacy references/stubs of a documentation management system (eDOCS) that may remain in the organization (whether within other documents, emails or other files) after a successful migration to a newer system (NetDocuments). The interceptor works by catching the event of a user opening/clicking a DRF file or pdoc link and translating the file/link to the appropriate document NetDocuments and requesting that document on behalf of the user.

The translation is done by reading the legacy information, specifically the database name and document id, and searching for the document in NetDocuments with this information in the legacy field. Once found, this item is returned to the user without knowing any knowledge of the interception, translating and redirecting.

The Help Desk Access Utility for NetDocs is used by Help/Support Desk personnel to search for and take action on documents within the NetDocuments environment with elevated credentials provide via the access license. The utility’s elevated credentials allow for additional actions to be taken by the Help/Support Desk personnel without elevating their individual credentials, while also limiting the functionality by means of the actions within the utility.

These actions are searching across cabinets or scoped (with advanced search parameters), obtaining all the details about the result set of searched documents and finally having the ability to check in a document that is currently checked in. All actions are called through native NetDocument API functions and logged appropriately for a complete audit trail.

Computer with a folder in it


Fledge at its core “unpacks” a PST into a much more easily accessible file system. It accomplishes this by first having the user point to a directory where the PSTs are stored. From there, it recreates all of the folders inside of the PST, as well as the messages inside of those folders. The end result is a directory filled with folders that share the name of the PST they were “unpacked” from, along with every message from the previously mentioned PST.

PST Probe

The search function of PSTProbe allows the user to search all the messages within a targeted PST. The user may input specific terms to search for in the messages Subject, Body, Recipients, or Author. In addition to specific terms, the program also has the capability to limit its search to a specific time frame. Once the program runs, a new pst is created with all of the messages that fulfilled the search requirements.

Computer tower with a folder in front of it


Scope is a Bloomberg chat parser and searcher. The user inputs a PST or a specific msg and the name of the user they are searching for. Possible outputs are an easily read CSV file detailing every action the targeted user took inside of each message, as well as a list of every user who has been in the room at least once. The other output is a modified msg file which highlights every action or mention of the targeted user.

A revolving circle around people

PST Extract

PSTExtract requires a list of EntryIDs before the user can use the program. Once the user has acquired the list, they simply need to select the pst to extract from, the list of EntryIDs, and finally the pst to extract those messages to.

Journal Manifest

The Journal Manifest program extracts the envelope information of either a specific msg file or all of the messages inside of a pst, and outputs it into a CSV.

Two pieces of paper

Mail Splitter

Mail Splitter is a program that is used when you have a rather large msg file that needs to be broken up into smaller msg files. The user inputs a msg file and as an output is given multiple msg files that do not exceed the maximum size value.

Contact Us