The Default Conversion Option
MarkLogic 8—February, 2015
Content Processing Framework Guide—Page 68
Microsoft Word 95 and Other Microsoft Office Errors
Set the Needed Permissions on the Root Directory
Default or Inherited Collections and Permissions
Enable Debugging Capabilities
Create Your Own Error Handling Pipeline
220.127.116.11 Microsoft Word 95 and Other Microsoft Office Errors
The Default Conversion Option only converts Microsoft Office 97 and newer documents; it
cannot convert Microsoft Office 95 and earlier documents. If you try to convert Microsoft
Word 95 or older documents (or other Microsoft Office 95 documents), the conversion will fail,
putting the document in the
state. If this happens, you can
do the following:
• Find all of the documents that are in the error state (For details, see “Find Documents in
the Error State” on page 61).
• Open the documents in a newer version of Microsoft Word and then re-save them (as
newer Word documents, not Word 95 or older documents).
• Reload the saved files into the database.
Once you reload the documents into a database with content processing installed and configured,
the new documents will be converted.
There are other types of errors you might get with Microsoft Office documents. For example, if a
document is password protected, the conversion will fail because it needs the password to open
the document. In general, you can address these types of issues by opening the document in the
appropriate Microsoft Office application, changing the cause of the error (for example, removing
the password protection), re-saving the document, and reloading the document into the
18.104.22.168 Set the Needed Permissions on the Root Directory
When you add documents to the database for conversion, the user who adds the documents must
have the needed permissions to add and modify documents. If you are using WebDAV server to
drag-and-drop documents into the database, the root directory of the WebDAV server must also
have the needed permissions.
One simple way to accomplish these security requirements is to do the following:
• Create a URI privilege for the URI that is configured as the root directory of your
• Create a role that has the URI privilege and has default permissions of read. insert, and
update for the role.