A plataforma Trader Workstation (TWS) da IBKR é um sistema global de negociações que oferece aos clientes um pacote de ferramentas de negociação on-line. O TWS pode ser instalado nos sistemas operacionais Windows, Mac OS X e Linux, e requer a instalação de um Java Runtime Environment (JRE). Portanto, ao instalar o TWS, o programa também faz download dos arquivos Java necessários para execução com o Java Virtual Machine (JVM).
Às vezes, durante o processo de instalação ou atualização do TWS, alguns tipos de software, como aplicativos de antivírus, podem exibir um alerta e impedir a conclusão do processo. Nesses casos, você pode ignorar com segurança os avisos e outras mensagens para concluir a instalação da plataforma de negociações.
Download do instalador e de patches de atualização do TWS
Os instaladores do TWS disponíveis nas áreas de download do site ibkr.com ou dos sites regionais da IBKR são bloqueados e assinados digitalmente usando todos os procedimentos de segurança exigidos pelos padrões do setor e não contêm códigos ou processos maliciosos. As mesmas práticas padrão do setor são usadas para os patches de atualização do TWS, que são baixados e instalados automaticamente ao iniciar o TWS (somente se houver uma atualização disponível). Mesmo assim, caso você receba um alerta, recomendamos que você tenha cuidado. Caso pretenda manter o arquivo de instalação do TWS na sua máquina para usá-lo futuramente, as mesmas medidas de precaução para proteger os dados contra vírus e malware devem ser aplicadas.
Por que recebo um aviso quando instalo o TWS ou quando a atualização automática do TWS é executada?
É possível que você veja um alerta (semelhante à Figura 1) e seu sistema de segurança espere você tomar uma decisão sobre como processar o arquivo suspeito. Geralmente, existem as opções de colocar o arquivo em quarentena, exclui-lo, ignorá-lo ou criar uma exceção permanente para ele.
Observe que seu antivírus pode, de maneira autônoma, colocar o arquivo do instalador do TWS em quarentena ou excluir esse arquivo ou algum de seus componentes sem pedir sua confirmação e sem exibir avisos. No entanto, isso acontece somente se você predefinir seu antivírus para reagir especificamente dessa maneira.
Figura 1.
O que devo fazer ao receber um aviso?
Caso receba um aviso durante a instalação ou atualização do TWS, recomendamos as seguintes etapas:
1. Exclua o instalador do TWS e faça download dele novamente no site principal ou regional da IBKR
a) Exclua o arquivo do instalador do TWS já presente no seu computador e exclua-o também da sua Lixeira (esvazie a sua Lixeira).
b) Na tabela a seguir, clique na área de download do TWS correspondente à sua localização.
Localização | Área de download do TWS |
EUA | https://www.ibkr.com |
Ásia/Oceania | https://www.interactivebrokers.com.hk |
Índia | https://www.interactivebrokers.co.in |
Europa | https://www.interactivebrokers.co.uk https://www.interactivebrokers.eu |
c) Confira o certificado do site. A maioria dos navegadores de Internet enviarão um alerta imediatamente caso o certificado do site seja inválido, esteja comprometido ou vencido. No entanto, se quiser verificar manualmente a validade do certificado do site, clique no cadeado próximo ao endereço (URL) e confira se a Conexão está avaliada como segura e se não há avisos de segurança (veja a Figura 2 a seguir).
Figura 2.
d) Clique no botão com a versão do TWS que você deseja usar e faça download novamente do instalador do TWS.
2. Confira a assinatura digital do arquivo do instalador do TWS que você baixou
Normalmente, você receberá imediatamente um aviso de segurança caso a assinatura digital de um arquivo esteja comprometida. No entanto, caso deseje realizar uma verificação manual, prossiga da seguinte maneira, de acordo com seu sistema operacional:
Para Windows
a) No Windows file explorer, acesse sua pasta de Downloads ou a pasta em que você colocou o instalador do TWS.
b) Clique com o botão direito do mouse no arquivo do instalador do TWS, selecione Propriedades e, em seguida, clique na guia "Assinaturas digitais".
c) Clique em "Detalhes" e em "Exibir Certificado" para verificar o status do certificado e o signatário. O signatário legítimo é "IB Exchange Corp." (Veja a Figura 3 abaixo).
Figura 3.
Para Mac OS X
a) Clique na lupa (Pesquisa Spotlight) no canto superior direito da tela e digite Terminal. A partir dos resultados da pesquisa, inicie o aplicativo Terminal.
b) Digite cd Downloads e pressione Enter.
c) Digite codesign -dv --verbose=4 tws-latest-macosx-x64.dmg e pressione Enter. Observe que o nome do arquivo (tws-latest-macosx-x64.dmg) pode ser diferente de acordo com a versão do TWS que você decidiu baixar. Se necessário, substitua o nome do arquivo no comando pelo nome apropriado.
d) Verifique o resultado do comando e confira se o "Developer ID Application" é "IB Exchange Corp." (veja a Figura 4 abaixo).
Figura 4.
3. Execute o arquivo do instalador do TWS que você baixou
Depois de fazer download novamente do instalador do TWS e depois de confirmar que o arquivo é original (pontos 1. e 2. acima), você pode prosseguir com a instalação. Caso você ainda receba um aviso do seu antivírus, considere-o um falso-positivo e ignore-o. Caso precise de ajuda nesta etapa, continue na próxima seção.
Como eu posso identificar um alerta como falso-positivo?
Todos os sistemas de segurança modernos permitem a criação de exceções para tratar de casos de falsos-positivos. Uma exceção é uma regra que força o mecanismo de antivírus a não fazer a varredura de um arquivo ou processo específico. Esse arquivo ou processo específico será considerado seguro e nenhum outro alerta será lançado para ele.
O procedimento para criar uma exceção pode variar de acordo com o tipo de software de segurança que você estiver usando. Talvez seja possível criar uma exceção temporária ou permanente diretamente no pop-up de alerta ou talvez seja necessário criar uma exceção manualmente em uma seção específica no painel de configuração principal.
Caso não tenha certeza sobre o procedimento, recomendamos que você consulte a documentação do seu antivírus.
Depois de configurar uma exceção para o arquivo de instalação do TWS ou para o processo do atualizador do TWS, esses arquivos serão desbloqueados e será possível concluir as respectivas tarefas.
O que mais posso fazer em caso de dúvidas ou se o meu sistema apresentar comportamento anormal?
Caso tenha motivos para acreditar que sua máquina esteja comprometida ou infectada, recomendamos que você realize uma varredura completa do sistema. Geralmente, basta clicar com o botão direito do mouse no ícone do antivírus presente na barra de ferramentas na parte inferior da tela (para Windows) ou na barra do menu superior (para MacOS) e você encontrará a opção para iniciar uma varredura completa do sistema. Também é possível iniciar a tarefa na janela principal do antivírus. Caso não tenha certeza sobre o procedimento, recomendamos que você consulte a documentação do seu antivírus.
Como meu sistema de segurança faz a varredura dos arquivos que eu baixo da Internet?
Mecanismos modernos de antivírus e antimalware reconhecem as ameaças com base nas seguintes opções:
Varredura com base em assinatura: o sistema de varredura do antivírus busca um padrão específico de bytes catalogado anteriormente como malicioso ou suspeito. O antivírus pode verificar também as assinaturas de arquivos (chamadas hash) em um banco de dados de ameaças conhecidas (chamado definições de vírus).
Análise de comportamento: o mecanismo de antivírus detecta operações específicas que individualmente podem não representar uma ameaça, mas que, quando correlacionadas, assemelham-se à atividade habitual de um software malicioso (por exemplo, a capacidade de um código de se replicar ou de se ocultar, fazer download de arquivos adicionais na Internet, entrar em contato com hosts externos na Internet, modificar o registro do sistema operacional etc.). Esse tipo de varredura foi desenvolvido para detectar ameaças aos computadores anteriormente desconhecidas.
Detecção heurística: o sistema de varredura descompila o código ou executa-o em um ambiente virtual restrito. Em seguida, ele classifica e pondera as operações executadas pelo código diante de um conjunto de regras predefinido com base em comportamento.
Proteção com base em nuvem e aprendizado de máquina: essas são técnicas relativamente novas. O arquivo que precisa ser analisado é enviado para a nuvem do fornecedor do antivírus/sistema de segurança, onde algoritmos sofisticados realizam uma análise aprofundada da autenticidade e do comportamento do código.
Esses métodos são infalíveis?
Ameaças modernas são muito sofisticadas e, como vírus biológicos, podem fazer com que o código e as assinaturas sofram mutações. Além disso, novos tipos de malware e exploits são criados todos os dias e se espalham rapidamente pela Internet. Portanto, os métodos de reconhecimento de ameaças mencionados acima não são infalíveis, mas podem garantir uma alta porcentagem de reconhecimento de malware quando combinados.
Enquanto as técnicas com base em assinatura são excelentes para reconhecer ameaças conhecidas e menos propensas a falsos-positivos, elas não são tão eficientes para identificar malware desconhecido ou mutações de tipos existentes de malware. Nessa área, os métodos comportamentais e heurísticos têm um desempenho muito melhor, ainda que tenham maior propensão a falsos-positivos, pois o processo de detecção desses métodos não tem como base um código vazio correspondente, mas um certo grau de interpretação e, portanto, de incerteza.
O termo "falso-positivo" é usado quando um sistema de segurança classifica como malware um arquivo ou processo inócuo.
Referências:
Some support related issues require diagnostics files and logs to be uploaded along with screenshots. The information will help our team to investigate and resolve the issue that you are experiencing.
This article will help you with detailed steps on how to upload diagnostics files and logs from various Interactive Brokers’ trading platforms.
Note: IBKR does not monitor the diagnostic bundle repository throughout the day. Should you spontaneously decide to upload a diagnostic bundle, without being instructed by Interactive Brokers, please inform our Client Services via Message Center ticket or phone call otherwise your error report will go unnoticed.
Please click on one of the links below, according to the platform you are using:
7. Enter your comments in the field and tap ‘Attach Image’ to attach the screenshot/s you previously saved in your camera roll
A diagnostic trace for Client Portal can be captured following the steps on IBKB3512
Regulators expect brokerage firms to maintain controls designed to prevent the firm from submitting orders to market centers that create a risk of disruptive trading (e.g., the risk of sudden, transient price moves).
To comply with these expectations, Interactive Brokers implements various price filters on customer orders. Those price filters may, in certain circumstances, price cap customer orders in order to avoid market disruption, and those Price Caps will generally be in a % range from a reference price range calculated by IB. (The range of the Price Cap varies depending on the type of instrument and the current price.)
Although the price caps are intended to balance the objectives of trade certainty and minimized price risk, a trade may be delayed or may not take place as a result of price capping. More information is available in Interactive Broker’s Order Routing and Payment for Order Flow Disclosure.
If a customer’s order(s) are price capped by IB’s systems, that customer will either receive (i) real-time notification of those price cap(s) in Trader Workstation or via the API or FIX tag 58 (for FIX users); and/or (ii) a daily FYI message containing a digest of the first 10 order(s) that were price capped the prior day, the initial price cap(s) for those order(s) (if applicable), and the Price Cap Range(s) for further Price Cap(s) of those order(s).
Customers may opt out from receiving future FYI Messages by clicking the relevant opt-out link within an FYI Message. By opting out from receiving these future FYI Messages, a customer:
IBKR's Trader Workstation (TWS) is a global trading system enabling clients to use a suite of online trading tools. The TWS can be installed on Windows, Mac OS X and Linux, and it requires the presence of a Java Runtime Environment (JRE). Therefore, when you install the TWS, it also downloads the necessary Java files in order to run using a Java Virtual Machine (JVM).
Sometimes, during the installation or update process of the TWS, software such as Antivirus applications will show an alert and prevent the process to complete. The warning and other messages in this case can safely be ignored, and you can complete the installation of the trading platform.
Downloading the TWS installer and update patches
The TWS installers available in the download areas of ibkr.com or IBKR regional web sites are sealed and digitally signed using all the safety procedures required by the industry standards and do not contain any malicious code or process. The same industry standard practices have been used for the TWS update patches, which are automatically downloaded and installed when launching the TWS (if and only if there is an update available). Nevertheless, if you have received an alert, we recommend you to be cautious. Should you intend to keep the TWS installation file on your machine for future use, you should make sure that the same precautions for the protection of data from viruses and malware are applied to it.
Why do I receive a warning when I install the TWS or when the TWS automatic update runs?
You might see an alert (similar to Figure 1 but not limited to) and your security system would wait for your input on how to process the suspicious file. You usually have the option to quarantine the file, delete it, ignore it once or create a permanent exception for it.
Please note that your antivirus might autonomously quarantine or delete the TWS installer file or some of his components without asking for your confirmation and without showing you any warning. Nevertheless, this should only happen if you have preset your antivirus to specifically react in this way.
Figure 1.
What should I do when I receive a warning?
In case you receive a warning during the TWS installation or update, we recommend the following steps:
1. Delete the TWS installer and download it again from the IBKR main or regional web site
a) Delete the TWS installer file already present on your computer and then delete it as well from your Trash (empty your Trash)
b) From the table below, click on the TWS download area correspondent to your location
Location | TWS download area |
US | https://www.ibkr.com |
Asia / Oceania | https://www.interactivebrokers.com.hk |
India | https://www.interactivebrokers.co.in |
Europe | https://www.interactivebrokers.co.uk https://www.interactivebrokers.eu |
c) Check the website certificate. Most Internet browsers will immediately alert you in case the site certificate is invalid, compromised or expired. Nevertheless, if you want to check manually the validity of the site certificate, click on the padlock close to the address (URL) and make sure the Connection is reported as secure and no security warning are present (see Figure 2 below).
Figure 2.
d) Click on the button labeled with the TWS version you wish to use and download again the TWS installer
2. Check the digital signature of the TWS installer file you have downloaded
Normally you will immediately receive a security warning in case the digital signature of a file is compromised. Nevertheless, if you wish to perform a manual check, proceed as follows, according to your Operating System:
For Windows
a) From the Windows file explorer, access your Downloads folder or the folder where you placed the TWS installer
b) Right click on the TWS installer file, select Properties and then click on the tab "Digital Signatures"
c) Click on "Details" and on "View Certificate" to check the certificate status and signer. The legitimate signer is "IB Exchange Corp." (See Figure 3 below)
Figure 3.
For Mac OS X
a) Click on the magnifier glass (Spotlight Search) on the top right of your screen and type Terminal. From the search results, launch the Terminal app
b) Type cd Downloads and press Enter
c) Type codesign -dv --verbose=4 tws-latest-macosx-x64.dmg and press Enter. Please notice that the name of the file (tws-latest-macosx-x64.dmg) may differ according to the TWS version you decided to download. If needed, replace the file name in the command with the appropriate one
d) Check the command output and make sure the "Developer ID Application" is "IB Exchange Corp." (see Figure 4 below)
Figure 4.
3. Run the TWS installer file you have downloaded
Once you have downloaded again the TWS installer and after you made sure the file is original (points 1. and 2. above), you can proceed with the installation. Should you still receive a warning from your antivirus, you can reasonably consider it as a false positive and ignore it. Should you need guidance on this step, please proceed directly to the next section.
How can I signal an Alert as false positive?
All modern security systems allow the creation of exceptions, precisely in order to address false positive cases. An exception is a rule forcing the antivirus engine not to scan a specific file or process. That specific file or process will hence be deemed safe and no further alerts will be raised for it.
The procedure for creating an exception may vary, according to the security software you are using. You may be able to create a temporary or permanent exception directly from the alert pop-up or you may have to create one manually from a specific section in the main configuration panel.
If you are unsure of the procedure, we recommend you to consult your antivirus documentation.
Once you have set an exception for the TWS installer file or for the TWS updater process, those will be no longer blocked and will be able to complete their respective tasks successfully.
What else can I do if I have doubts or if my system behaves abnormally?
If you have reasons to believe your machine may be compromised or infected, we recommend performing a full system scan. Usually you can right click on the antivirus icon present on the bottom taskbar (for Windows) or on the upper menu bar (for MacOS) and you will find the option to launch a full system scan. Alternatively, you may start that task from the main antivirus window. If you are unsure of the procedure, we recommend you to consult your antivirus documentation.
How does my security system scan the files I download from the Internet?
Modern antivirus and anti-malware engines base their threats recognition on:
Signature-based scanning: the antivirus scanner searches for a specific pattern of bytes that was previously catalogued as malicious or at least suspicious. The antivirus may check as well file signatures (called hash) against a database of known threats (called virus definitions).
Analysis of behavior: the antivirus engine detects specific actions which individually may not represent a threat but, when correlated together, resemble the usual activity of a malicious software (e.g. the ability of a code to replicate or hide itself, download additional files from the Internet, contact external hosts over the Internet, modify the Operating System registry) This type of scan is designed to detect previously unknown computer threats.
Heuristic detection: the scanner de-compiles the code or runs it within a virtual, restricted environment. It then classifies and weights the actions performed by the code against a predefined, behavior based, rule set.
Cloud-based protection and machine learning: those are relatively new techniques. The file that needs to be analyzed is sent to the antivirus / security system vendor cloud where sophisticated algorithms perform a deep analysis of the code authenticity and behavior.
Are those scan methods infallible?
Modern threats are very sophisticated and, like biological viruses, can mutate their code and their signatures. Moreover, new malwares and exploits are created every day and spread rapidly over the Internet. The threat recognition methods mentioned above are therefore not infallible but can guarantee a high percentage of malware recognition when combined together.
While signature based techniques are very successful in recognizing known threats and less prone to false positives, they are not so efficient in recognizing unknown malware or mutations of existing ones. In this area, the behavioral and heuristic methods perform much better although they are more prone to false positives since their detection is not based on bare code matching but on a certain degree of interpretation and hence uncertainty.
The term "false positive" is used when a security system classifies an innocuous file or process as malware.
Reference:
The SEC Vendor Display Rule requires that brokers give clients access to the NBBO at the point of order entry. In order to provide users with free live streaming market data, we cannot display this free stream when entering an order without the client subscribing to the paid NBBO. Please note, this does not apply to non-IBLLC clients.
Under the Rule 603(c) of Regulation NMS (Vendor Display Rule), when a broker is providing quotation information to clients that can be used to assess the current market or the quality of trade execution, reliance on non-consolidated market information as the source of that quotation would not be consistent with the Vendor Display Rule.
All clients (IBKR Lite and Pro) have access to streaming real-time US equity quotes from Cboe One and IEX at no charge. Since this data does not include all markets, we cannot show this quote when entering parameters for a US stock quote. Therefore and according to FINRA's enforcement of the SEC rule, IBKR provides IBLLC US clients a free default snapshot service, “US Snapshots VDR Required”. If clients do not sign up for an NBBO US equity data service and they are an IBLLC client, they will have access to free real-time snapshots when making trading decisions on US stocks. Order routing will not change based on what is shown on the screen. If one is subscribed to NBBO quotes or not, by default the trade will still take place with the assistance of the SMART order router designed to provide the best price for the order.
Please see the sample screenshots below from TWS Classic and TWS Mosaic for what occurs when placing an order without the NBBO streaming subscription for US equities.
TWS Classic:
1. Screenshot of quotes showing without order entry line item
2. Screenshot of quote going blank when putting in the order entry line item
TWS Mosaic:
1. Screenshot of quotes showing without order entry line item
2. Screenshot of quote going blank when putting in the order entry line item
Store settings on server allows clients the ability to store their Trader Workstation (TWS) settings/configuration on the cloud and retrieve them at anytime from another computer. This feature allows you to use the layout of a specific user on two or more machines.
In some specific circumstances, the operation which stores/downloads the settings to/from the cloud may fail and the following error message may appear shortly after the TWS has loaded on the screen:
How to overcome this error message?
The underlying causes of this message are usually the following:
By default, Trader Workstation (TWS) is designed to display in a font size and style which can be read comfortably for the average user across various screen sizes and resolutions. With the advent of new technologies, there has been an exponential push to make monitors with higher display sizes and your layout may need to be further adjusted manually. This document serves to explain how to manually adjust the font size for TWS.
To adjust font size throughout TWS:
Note: It is possible that currently not all windows will be adjusted in the same way.
TWS connects to IBKR servers via port 4000 and 4001, if using SSL, and will not operate on any other port. If you are using a proxy server, it needs to be a transparent with both inbound and outbound ports open so that the TWS can function properly.
Below are listed all the gateways, along with the corresponding destination host that might be used by the TWS when you use our services, please allow access to those hosts.
The easiest way to test whether your connection needs any special setup or has been configured properly is to use IBKR's Dedicated Test page, which will provide a dynamic test of your network’s connection against our main trading and market data servers. If a “Success” response is returned, there is nothing more for you to do. If the response is “Failure”, we recommend adding an exception for the new hosts to your network’s configuration or review your changes.
Note: If your network uses a browser proxy, the test page can produce false positives. In this case, or if you are not sure what your network setup is, turn to your network administrators, who can perform ping and telnet tests to the hosts listed below to confirm compliance with the connectivity requirements.
CLIENT PORTAL AND WEBSITE |
||||
REGION/PRODUCT |
SERVER (HOST) |
PORTS1 |
||
IBKR WEBSITE – AMERICA |
443 |
|||
IBKR WEBSITE – Canada |
443 |
|||
IBKR WEBSITE – UK |
443 |
|||
IBKR WEBSITE – INDIA2 |
443 |
|||
IBKR WEBSITE – JAPAN2 |
443 |
|||
IBKR WEBSITE – HONG KONG2 |
www.interactivebrokers.com.hk | 443 | ||
IBKR WEBSITE – CHINA2 |
www.ibkr.com.cn | 443 | ||
IBKR WEBSITE - AUSTRALIA |
www.interactivebrokers.com.au | 443 | ||
CLIENT PORTAL – EAST |
443 |
|||
CLIENT PORTAL – CENTRAL |
443 |
1: Standard Communication: TCP Port 80 | SSL Communication: TCP Port 443.
2: This IB Server host does not support ping request.
Important Note: If you are accessing Client Portal from a corporate network where the Internet access is provided through a load balancing equipment, you may receive error messages about expired/invalid session and/or missing web content upon or after the login phase. The load-balancer cycles your outbound connections over two or more network interfaces to equalize the network workload. Because of this mechanism, your HTTP requests reach our systems from different IP addresses, invalidating your Client Portal session. In this scenario, as a solution, please ask your network administrator or IT group to configure your machine/device for bypassing the load-balancer. This will allow your session to remain valid and alive.
DESKTOP TWS |
|||
REGION/TOOL |
PRIMARY/BACKUP |
SERVER (HOST) |
PORTS |
|
PRIMARY |
|
|
BACKUP |
|||
|
PRIMARY |
|
|
BACKUP |
|||
|
PRIMARY |
|
|
BACKUP |
|||
TWS ASIA |
PRIMARY |
4000 / 4001 |
|
BACKUP |
|||
TWS ASIA - CHINA3 |
PRIMARY |
4000 / 4001 |
|
BACKUP |
mcgw1_hb1.ibllc.com.cn | ||
TWS AUTO-UPDATE | PRIMARY | 443 | |
RISK NAVIGATOR |
PRIMARY |
443 |
|
TWS CLOUD SETTINGS |
PRIMARY |
443 |
|
IB CAM |
PRIMARY |
4000 / 4001 |
|
DIAGNOSTICS REPORTS |
PRIMARY |
443 |
3: Gateway dedicated to clients with accounts assigned to the Hong Kong server, but are physically connecting from Mainland China.
The Trader Workstation (TWS) software needs to connect to our gateways and market data servers in order to work properly. Connectivity issues affecting your local network or your Internet Service Provider network may negatively affect the TWS functionality. In this article we will indicate how to test your connectivity using an automated connectivity test web page.
2) Please wait until all the tests have been completed and results have been displayed. If you see "Success" as outcome for all tests, your connectivity to IB Servers is reliable at the present moment. No additional connectivity troubleshooting or configuration should be needed.
3) If you see "Fail" as outcome for one or more test/s, please click on the link "Fail" itself in order to display the "IB Network Troubleshooting Guide". That section will help you conduct some manual tests to identify the cause of the failure.
Note for Corporative environments and Proxy server users: the automated "Connectivity Test" page may return misleading results in case your machine is accessing the Internet through a Proxy server. This usually happens if you are connected to a company network. If this is your case, we kindly ask you to contact your Network Administrator or your IT Team and ask them to perform a manual connectivity tests towards the destination servers indicated in the table on the top of the IB automated "Connectivity Test" web page itself. The manual connectivity test should be conducted using destination TCP ports 4000 and 4001. Should they prefer to have the server list in another format or should they need to set up the firewall / IP Management rules, you can forward them this page.
The portfolio page allows you to view and montor your current portfolio at the individual position level, including psoition quantity, market value, current bid-ask and profit/loss. Instructions for locating the page vary by trading platform and are outlined below:
TWS Classic - First check to see if you have detached the page from the main window (an option provided by right clicking on the tab). If this is the case, the page will be open but hidden behind the main window. Minimize the main window by clicking on the minimize icon located in the upper-right hand corner of the screen. If you are able to then view the portfolio page and wish to reattach it, simply right click on the tab to open the menu and select the "Attach Page" option.
If the page is not detached, select the "Account Window" option from the top menu bar and then "Portfolio Window" menu option.
Mosiac - from the Montor window, click on the small + sign located to the right of any existing monitor tabs. Then select "Portfolio" and this page will reappear.