Installation Guide. McAfee Security for Microsoft Exchange Software

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software"

Transcription

1 Installation Guide McAfee Security for Microsoft Exchange Software

2 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Security for Microsoft Exchange Software Installation Guide

3 Contents Preface 5 About this guide Audience Conventions What's in this guide Finding product documentation Pre-installation 7 Microsoft Exchange server roles What's included with the software System requirements Components and services installed by the software Installing McAfee Security for Microsoft Exchange 11 Installing for Microsoft Exchange Server Installing for Microsoft Exchange Server 2007 and Using McAfee Security for Microsoft Exchange Cluster replication Cluster replication setup Types of cluster installation Adding McAfee Security for Microsoft Exchange as a resource to the cluster group on Windows 2003 (32 or 64 bit) Adding McAfee Security for Microsoft Exchange as a resource to the cluster group Windows 2008 (64 bit) Testing your installation Testing the anti-virus component Testing the anti-spam component Using McAfee Virtual Technician to test your installation Program maintenance 23 Role based modification Modifying the installation Repairing the installation Removing the program Restoring default settings Purge and Optimization Upgrading the software 27 Upgrading a standalone product epolicy Orchestrator upgrade Upgrading McAfee Security for Microsoft Exchange using epolicy Orchestrator Upgrading McAfee Security for Microsoft Exchange using epolicy Orchestrator Managing using epolicy Orchestrator 4.5 or Prerequisites McAfee Security for Microsoft Exchange Software Installation Guide 3

4 Contents Deploying the McAfee Agent Checking in McAfee Security for Microsoft Exchange into the Master Repository Checking in the extension Deploying the software using epolicy Orchestrator Deploying the software using epolicy Orchestrator Sending an agent wake-up call Setting policies within epolicy Orchestrator Creating or editing policies in epolicy Orchestrator Creating or editing policies in epolicy Orchestrator Enforcing policies Scheduling tasks Creating an AutoUpdate task in epolicy Orchestrator Creating an AutoUpdate task in epolicy Orchestrator Creating an on-demand scan task Creating a status report task in epolicy Orchestrator Creating a status report task in epolicy Orchestrator Creating a configuration report task in epolicy Orchestrator Creating a configuration report task in epolicy Orchestrator Removing the extension using epolicy Orchestrator 4.5 or Index 45 4 McAfee Security for Microsoft Exchange Software Installation Guide

5 Preface This guide provides the information you need to install your McAfee product. Contents About this guide Finding product documentation About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Conventions This guide uses the following typographical conventions and icons. Book title or Emphasis Title of a book, chapter, or topic; introduction of a new term; emphasis. Bold User input or Path Code Text that is strongly emphasized. Commands and other text that the user types; the path of a folder or program. A code sample. User interface Hypertext blue Words in the user interface including options, menus, buttons, and dialog boxes. A live link to a topic or to a website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. McAfee Security for Microsoft Exchange Software Installation Guide 5

6 Preface Finding product documentation What's in this guide This guide is organized to help you find the information you need. Finding product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 6 McAfee Security for Microsoft Exchange Software Installation Guide

7 1 Pre-installation McAfee Security for Microsoft Exchange safeguards the following Microsoft Exchange products. They are: Microsoft Exchange Server 2003 SP2 Microsoft Exchange Server 2007 SP2, SP3 Microsoft Exchange Server 2010 SP1 Use this information to prepare for the installation of McAfee Security for Microsoft Exchange. Information includes server roles, system requirements, and components included with the software. Contents Microsoft Exchange server roles What's included with the software System requirements Components and services installed by the software Microsoft Exchange server roles The installation of McAfee Security for Microsoft Exchange is based on the role that was used to install Microsoft Exchange Server. Microsoft Exchange Server 2003 can be installed as a front-end server (Gateway Role) or back-end server (Mailbox role) or as both. Appropriate files are installed based on the roles you select. Microsoft Exchange Server 2007 and 2010 can be installed in the following roles: Edge Transport Server Runs in the perimeter outside a domain and provides message hygiene and security. It is installed on a standalone server that is not a member of an Active Directory domain. Hub Server Handles all mail flow inside the organization, applies transport rules, and delivers messages to a recipient's mailbox in an Active Directory domain. Mailbox Server Holds the Exchange databases containing the user mailboxes. An installation with a dual role of Mailbox with Hub is also supported. Client Access and Unified Messaging roles of Microsoft Exchange Server 2007 and 2010 are not applicable for installing McAfee Security for Microsoft Exchange. McAfee Security for Microsoft Exchange Software Installation Guide 7

8 1 Pre-installation What's included with the software What's included with the software McAfee Security for Microsoft Exchange 7.6 includes the following components. McAfee Anti-Spam for McAfee Security for Microsoft Exchange 7.6 McAfee Agent 4.5 Patch3 McAfee Agent is a component of epolicy Orchestrator that must be installed on each computer on the network. The agent collects and sends information between the epolicy Orchestrator server and repositories, and manages McAfee Security for Microsoft Exchange installations across the network. What's included in the package The McAfee Security for Microsoft Exchange package contains the following folders: Setup Contains four files: the setup.exe file, which is required for the standard installation, and the respective config.xml file for all the languages. setup_x86.exe Installs McAfee Security for Microsoft Exchange on a 32 bit system. setup_x64.exe Installs McAfee Security for Microsoft Exchange on a 64 bit system. ASAddon_x86.exe Installs the Anti-Spam component on a 32 bit system. ASAddon_x64.exe Installs the Anti-Spam component on a 64 bit system. MSMEePOUpgrade.exe Migrates policies from GroupShield for Exchange 7.0.X to McAfee Security for Microsoft Exchange 7.6. in an upgrade using epolicy Orchestrator. There will be separate installation packages for 32bit and 64 bit operating systems. Readme Contains the Readme.txt file. Manuals Contains the installation guide, configuration guide and product guide in PDF format. epoextension Contains the extension that needs to be checked in to the epolicy Orchestrator server for managing the product using epolicy Orchestrator. 8 McAfee Security for Microsoft Exchange Software Installation Guide

9 Pre-installation System requirements 1 System requirements Before you install McAfee Security for Microsoft Exchange, ensure that your server meets these requirements: Table 1-1 System Requirements Component Operating system Requirement Microsoft Windows 2003 Standard/Enterprise Server (32-bit) Microsoft Windows 2003 Standard/Enterprise Server R2 (32-bit) Microsoft Windows 2003 Standard/Enterprise Server (64-bit) Microsoft Windows 2003 Standard/Enterprise Server R2 (64-bit) Microsoft Windows 2008 Standard/Enterprise Server SP2 (64-bit) Microsoft Windows 2008 Standard/Enterprise Server R2 (64-bit) Microsoft Exchange Server Microsoft Exchange Server 2003 with Service Pack 2 Microsoft Exchange Server 2007 SP2 Microsoft Exchange Server 2007 SP3 Microsoft Exchange Server 2010 SP1 Browser Microsoft Internet Explorer 7.0, 8.0 Mozilla Firefox 2.0 or later (Firefox 4.0 is not supported) Processor Intel x86 architecture-based processor (only for Exchange Server 2003) Intel x64 architecture-based processor that supports Intel Extended Memory 64 technology (Intel EM64T) AMD x64 architecture-based processor with AMD 64-bit technology Memory Microsoft Exchange Server 2003 Minimum: 1 GB RAM (Recommended: 2 GB RAM) Microsoft Exchange Server 2007 Minimum: 2 GB RAM (Recommended: 4 GB RAM) Microsoft Exchange Server 2010 Minimum: 4 GB RAM (Recommended: 4 GB RAM for all individual roles and 8 GB for multiple roles) Disk space Network Minimum 740 MB 10/100/1000 Mbps Ethernet card Display 1024 x 768 McAfee epolicy Orchestrator Versions 4.5 or 4.6 McAfee Agent Version 4.5 Patch3 or Version 4.6 For IIS 7.0, you will need to configure IIS 6.0 in the Compatibility mode. McAfee Security for Microsoft Exchange Software Installation Guide 9

10 1 Pre-installation Components and services installed by the software Components and services installed by the software McAfee Security for Microsoft Exchange installs several components on your Exchange server. McAfee Anti-Spam for McAfee Security for Microsoft Exchange Detects spam and phishing content. Access Control Allows or denies access to the McAfee Security for Microsoft Exchange user interface for specific users or groups. Product Configuration Launches McAfee Security for Microsoft Exchange standalone version or through a web interface. Sitelist Editor Specifies the location where automatic updates (including DATs and scanning engines) are downloaded from. Cluster Replication Setup Replicates the quarantine database, policy configurations and product updates (Microsoft Exchange Server 2010 only). This is dependent upon the replication setting across a Data Availability Group (DAG), recognized by a McAfee Security for Microsoft Exchange installation. Services available McAfee Framework Service Prerequisite for installing and using epolicy Orchestrator. For more details on this service, refer the epolicy Orchestrator product documentation. McAfee Security for Microsoft Exchange Protects your Microsoft Exchange Server (versions 2003, 2007, 2010) from viruses, unwanted content, potentially unwanted programs, and banned file types/ messages. McAfee Anti-Spam rules updater Required to update the anti-spam rules. 10 McAfee Security for Microsoft Exchange Software Installation Guide

11 2 Installing 2 McAfee Security for Microsoft Exchange This section describes how McAfee Security for Microsoft Exchange is installed in various compatible environments with features depending on your requirement. McAfee Security for Microsoft Exchange can be installed on a standalone server as well as be deployed using epolicy Orchestrator. See Managing using epolicy Orchestrator 4.5. for deployment using epolicy Orchestrator. Contents Installing for Microsoft Exchange Server 2003 Installing for Microsoft Exchange Server 2007 and 2010 Using McAfee Security for Microsoft Exchange Cluster replication Testing your installation Installing for Microsoft Exchange Server 2003 Install McAfee Security for Microsoft Exchange on a system where Microsoft Exchange Server 2003 is installed. This method includes a wizard that leads you through the installation process with a series of instructions. During the installation process, Exchange services could stop or restart. 1 As an administrator, log on to the system where Exchange server 2003 is installed. 2 Create a temporary directory on your local drive. 3 Download the archived software package and extract it to the temporary directory you created. 4 From the Setup folder, double-click setup_x86.exe (this is the setup application for a 32-bit operating system). A dialog box appears with language options for the installation. 5 Select a language from the drop down list, then click OK. The Welcome screen appears. 6 Click Next. The Preparing to Install screen prepares the installation wizard to guide you through the program setup process and extracts all the required installation files. After this process completes, the Select Exchange Server Role dialog box appears. The three options are: McAfee Security for Microsoft Exchange Software Installation Guide 11

12 2 Installing McAfee Security for Microsoft Exchange Installing for Microsoft Exchange Server Select the required role. Mailbox Setup configures McAfee Security for Microsoft Exchange for the Mailbox role and install the relevant component - VirusScan API. Gateway Setup configures McAfee Security for Microsoft Exchange for the Gateway role and install the relevant components Transport Scan ( Anti-Spam and Anti-VirusScan API). Both Setup configures McAfee Security for Microsoft Exchange for both Mailbox and Gateway roles and install the relevant components: On-Demand Scan and Transport Scan ( Anti-Spam and Anti-VirusScan API). 8 Select Enable User Junk Folder Routing to allow the scanner to route your spam s to the client's junk folder. This is applicable only for the Mailbox role, and if you have installed the McAfee Anti-Spam Add-on on your server. 9 Click Next to display the Setup Type dialog box. 10 Select an installation type: Typical Commonly used features are installed. Buffer Overflow Protection and Anti-Spam Add-On components are not installed. You will not be protected against spam and phish s. You can configure the product using a web browser or the standalone user interface. Buffer Overflow Protection is applicable for a 32-bit operating system and only if VirusScan Enterprise is installed. Web based Product Configuration (Web user interface) is installed in all three types of installation. Complete (Recommended) Web based Product Configuration, Buffer Overflow Protection and Anti-Spam Add-On are installed. The product is configured for maximum performance with protection against spam and phishing attacks. Custom Select which application features you want to install and where to install them. This is recommended for advanced users. If you select Custom, a dialog box displays the features you can install with an option to change the installation folder. 11 Click Next to display the End User License Agreement screen. 12 McAfee Security for Microsoft Exchange Software Installation Guide

13 Installing McAfee Security for Microsoft Exchange Installing for Microsoft Exchange Server Accept the terms in the license agreement, then click Next. The Additional Configuration Settings dialog box appears. Figure 2-1 McAfee Security for Microsoft Exchange Additional Configuration Settings 13 Select Import existing configuration to import the McAfee Security for Microsoft Exchange configuration from another system. This configuration setting is saved as a.cfg file. To import this configuration, click Import, browse to the.cfg file, then click Open. This option is useful if you are installing McAfee Security for Microsoft Exchange on a new system and would like to retain the configuration from an existing installation on another system. You can also import existing configurations from versions of GroupShield for Exchange 7.0.x that are supported by McAfee Security for Microsoft Exchange. See Upgrading the software for the supported versions. a b c Under Select Quarantine mechanism, select a location to store the quarantined items, then complete the options for the location you selected. If you select Local Database, click Browse to change the default location (optional). If you select McAfee Quarantine Manager, type the IP address of the Quarantine Manager server, the Port number and the Callback Port number. Under Administrator address, type the address to which all notifications, configuration reports, and status reports must be sent. 14 Enter all the required details, then click Next. The Set Protection Profile dialog box appears. McAfee Security for Microsoft Exchange Software Installation Guide 13

14 2 Installing McAfee Security for Microsoft Exchange Installing for Microsoft Exchange Server 2007 and Select one of these protection profiles: Default This profile provides maximum performance with optimum protection. Enhanced This profile enables default file filter rules and provides maximum protection. It also provides real-time protection using McAfee Global Threat intelligence file and message reputation. Use existing (Upgrade only) This option uses the existing protection profile. 16 Click Next. The Choose Shortcuts screen appears. 17 Select Create Desktop shortcuts if you want the installation wizard to create shortcuts for the application on the desktop. 18 Click Next. The Ready to Install the Program screen displays a summary of all the selected configuration. 19 Verify the configuration, then click Install to proceed with the installation. The Installing progress bar displays the features being copied, initialized, and installed. 20 When the installation is complete, the installation wizard Completed screen appears. Select the options as required. Launch product User Interface To launch the McAfee Security for Microsoft Exchange user interface after you exit the installation wizard. Show the readme file To view the Release Notes of the product (Readme.txt) for information on any last minute additions or changes to the product, known issues or resolved issues. Update DAT and Engines (Recommended) To update McAfee Security for Microsoft Exchange with the latest DAT files, engine, and anti-spam updates. Register at McAfee Business Community to stay up to date To receive information regarding the product, new releases, updates and other relevant information. 21 Click Finish. When the installation wizard exits, McAfee Security for Microsoft Exchange is successfully installed on your system. We recommend that you restart your computer after the installation process is complete. Installing for Microsoft Exchange Server 2007 and 2010 McAfee Security for Microsoft Exchange can be installed with the Edge transport role, Hub transport role, and Mailbox role. Install McAfee Security for Microsoft Exchange on a system where Microsoft Exchange Server 2007 or 2010 is installed. McAfee Security for Microsoft Exchange will execute Transport Scanning for the Edge transport and Hub transport roles, and VirusScan API for the Mailbox role. 1 As an administrator, log on to the system where Exchange server 2007 or 2010 is installed. 2 Create a temporary directory on your local drive. 3 Download the archived software package and extract it to the temporary directory you created. 4 From the Setup folder, double-click setup_x64.exe (this is the setup application for a 64-bit operating system). A dialog box appears with language options for the installation. 14 McAfee Security for Microsoft Exchange Software Installation Guide

15 Installing McAfee Security for Microsoft Exchange Installing for Microsoft Exchange Server 2007 and Select a language from the drop down list, then click OK to display the Welcome screen. 6 Click Next to display the Preparing to Install screen. It prepares the installation wizard which will guide you through the program setup process and extracts all the required installation files. When this process is complete, the Exchange Server Role Detection screen appears. Figure 2-2 McAfee Security for Microsoft Exchange Exchange Server 2010 Role Detection McAfee Security for Microsoft Exchange automatically detects the roles selected during the installation of Microsoft Exchange Server 2007 or Click Next to display the Setup Type. 8 Select an installation type: Typical Commonly used features are installed along with Web based Product Configuration. The Anti-Spam Add-On component is not installed. Complete (Recommended) Web based Product Configuration, Anti-Spam Add-On and Cluster Replication Setup are installed. Cluster Replication Setup is applicable only for a Microsoft Exchange Server 2010 installation. Custom Select which application features you want to install and where to install. This is recommended for advanced users. If you select Custom, a dialog box displays the features you can install. To change the destination folder for the installation files, click Change. If the Mailbox role has been installed in Microsoft Exchange Server 2007 or 2010, the service Cluster Replication Setup is installed (only for Microsoft Exchange Server 2010). 9 Click Next to display the End User License Agreement screen appears. McAfee Security for Microsoft Exchange Software Installation Guide 15

16 2 Installing McAfee Security for Microsoft Exchange Installing for Microsoft Exchange Server 2007 and Accept the terms in the license agreement, then click Next. The Additional Configuration Settings dialog box appears. 11 Select Import existing configuration to import the McAfee Security for Microsoft Exchange configuration from another system. This configuration setting is saved as a.cfg file. To import this configuration, click Import, browse to the.cfg file, then click Open. This option is useful if you are installing McAfee Security for Microsoft Exchange on a new system and would like to retain the configuration from an existing installation on another system. You can also import existing configurations from versions of GroupShield for Exchange 7.0.x that are supported by McAfee Security for Microsoft Exchange. See Upgrading the software for a list of supported versions). a b c Under Select Quarantine mechanism, select a location to store all the quarantined items, then complete the options for the location you selected. If you select Local Database, click Browse to change the default location (optional). If you select McAfee Quarantine Manager, type the IP address of the Quarantine Manager server, the Port number and the Callback Port number. Under Administrator address, type the address to which all notifications, configuration reports and status reports must be sent. 12 Enter all the required details, then click Next. The Set Protection Profile dialog box appears. 13 Select one of these protection profiles: Default This profile provides maximum performance with optimum protection. Enhanced This profile enables default file filter rules and provides maximum protection. It also provides real-time protection using McAfee Global Threat intelligence file and messaging reputation. Use existing (Upgrade only) This option uses the existing protection profile. 14 Click Next. The Choose Shortcuts screen appears. 15 Select Create Desktop shortcuts if you want the installation wizard to create shortcuts for the application on the desktop. 16 Click Next. The Ready to Install the Program screen displays a summary of all the selected configuration. 17 Verify the configuration, then click Install to proceed with the installation. The Installing progress bar displays the features being copied, initialized, and installed. 18 When the installation is complete, the installation wizard Completed screen appears. Select the options as required. Launch Product User Interface To launch the McAfee Security for Microsoft Exchange standalone user interface after you exit the installation wizard. Show the readme file To view the Release Notes of the product (Readme.txt) for information on any last minute additions or changes to the product, known issues or resolved issues. Update Now (Recommended) To update McAfee Security for Microsoft Exchange with the latest DAT files, engine, and anti-spam updates. 16 McAfee Security for Microsoft Exchange Software Installation Guide

17 Installing McAfee Security for Microsoft Exchange Using McAfee Security for Microsoft Exchange 2 Register at McAfee Business Community to stay up to date To receive information regarding the product, new releases, updates and other relevant information. Show Windows Installer logs To view the log file of the installation process. 19 Click Finish. When the installation wizard exits, McAfee Security for Microsoft Exchange is successfully installed on your system. We recommend that you restart your computer after the installation process is complete. To use the software, refer to the topic Using McAfee Security for Microsoft Exchange. Using McAfee Security for Microsoft Exchange This topic describes on how to access the McAfee Security for Microsoft Exchange software and other utilities. Use the McAfee Security for Microsoft Exchange software by clicking Start Programs McAfee Security for Microsoft Exchange menu and accessing the following options: Access Control To allow or deny access to the McAfee Security for Microsoft Exchange user interface for specific users or groups. Product Configuration To launch McAfee Security for Microsoft Exchange standalone version. Product Configuration (Web Interface) To launch McAfee Security for Microsoft Exchange through a web interface. You can use this to run the application from a remote system using the web. Sitelist Editor To specify the location from where automatic updates (including DAT file and scanning engines) are downloaded. Cluster replication The Cluster Replication Setup Utility helps in the replication of the quarantine database, Policy configurations, engine and DATs. This utility is available only for a McAfee Security for Microsoft Exchange installation that is recognized by a Data Availability Group (DAG), in which case the McAfee Security for Microsoft Exchange Replication Service is also available. Depending on the configuration settings, this utility replicates quarantined items from one server to the other, and makes them highly accessible. Data recorded on the active server node is copied to the passive server node, enabling a copy of the server configuration as well as the data. By not requiring shared storage, the active node and passive node can be located in separate geographical locations without the performance impact of synchronous replication solutions. Automated failover to the passive server node is transparent to the end user, dramatically reducing the risk of data loss by relying on logs and queues and providing a less costly and less complex recovery solution for the administrator. This utility is available only if McAfee Security for Microsoft Exchange 7.6 is installed on a 64-bit system with Microsoft Exchange Server 2010 in the Mailbox role. McAfee Security for Microsoft Exchange Software Installation Guide 17

18 2 Installing McAfee Security for Microsoft Exchange Cluster replication The primary component in a Data Availability Group is called Active Manager. Microsoft Exchange Server 2010 relies on the Active Manager to manage switch-overs and fail-overs between mailbox servers that are a part of a Data Availability Group. Active Manager runs on all Mailbox servers in a given Data Availability Group and can be installed in two roles: Primary Active Manager (PAM) Standby Active Manager (SAM) For details regarding these roles, refer to the relevant Exchange 2010 documentation. Contents Cluster replication setup Types of cluster installation Adding McAfee Security for Microsoft Exchange as a resource to the cluster group on Windows 2003 (32 or 64 bit) Adding McAfee Security for Microsoft Exchange as a resource to the cluster group Windows 2008 (64 bit) Cluster replication setup Configure the replication settings for Quarantine database, Policy configurations, Engine and DATs. 1 From the Start menu, click All Programs McAfee Security for Microsoft Exchange Cluster Replication Setup. A dialog box appears with various parameters to be defined for this service. If the Mailbox role is installed in Microsoft Exchange Server 2010, the service Cluster Replication Setup is automatically installed in all three types of setup (Typical, Complete and Custom). 2 From Server name retrieve the available servers for replication which are part of Data Availability Group and have McAfee Security for Microsoft Exchange installed with Exchange Server in the mailbox role. Available server(s) displays a list of servers that can be added for replicating the quarantine database, Policy configurations, Engine and DATs. Replication server(s) displays a list of servers that have been configured as replication servers for the quarantine database, Policy configurations, Engine and DATs. 3 Select the server from Available server(s) and click >> to add it to the Replication server(s) list. 4 Select Stop Replication service to stop the McAfee Security for Microsoft Exchange Cluster Replication service. 5 Select Start Replication service for to manage the McAfee Security for Microsoft Exchange Cluster Replication service. Select one or more options from the following: Policy Configuration Engine/DATs Quarantine Database 6 Click Apply to save and apply the cluster replication settings. 7 When prompted, restart the McAfee Security for Microsoft Exchange service, which is required for the replication to work. 18 McAfee Security for Microsoft Exchange Software Installation Guide

19 Installing McAfee Security for Microsoft Exchange Cluster replication 2 Types of cluster installation Cluster replication can be carried out using the following three methods. Cluster Continuous Replication (CCR) on Exchange Server 2007 To install McAfee Security for Microsoft Exchange on all the nodes of the cluster, follow the steps mentioned in the Standard Installation section. McAfee Security for Microsoft Exchange 7.6 will not be a cluster aware application on Microsoft Exchange Server 2007 CCR cluster. Both the nodes have to be managed independently and will work as standalone instances. Single Copy Cluster (SCC) on Exchange Server 2007 To install McAfee Security for Microsoft Exchange on all the nodes of the cluster, follow the steps mentioned in the Standard Installation section. In a Single Copy Cluster environment, McAfee Security for Microsoft Exchange can be added only as a Cluster Resource. We recommend that you always install the McAfee Security for Microsoft Exchange on the passive node first. Do a failover and install on the node that has become passive now. McAfee Security for Microsoft Exchange 7.6 should be added to the cluster groups where the Exchange virtual server is present after the installation on the nodes of the cluster. In case of an upgrade, ensure that the Active Node is upgraded first. Cluster installation on Exchange Server 2003 In Exchange Server 2003, there are two types of nodes: Active node The cluster server that currently owns cluster group resources and responds to network requests made to those services. Passive node The cluster server that does not currently own cluster group resources, but is available if the active node fails. These nodes form two types of server clusters: Active/Passive cluster The cluster includes active and passive nodes. The passive nodes are used only if an active node fails. Active/Active cluster All nodes are active. In the event of a failover of an active node, the remaining active nodes take on the additional processing operations. To install McAfee Security for Microsoft Exchange on all the nodes of the cluster, follow the steps mentioned in the Standard Installation section. Install McAfee Security for Microsoft Exchange as a standalone node on an Active/Active cluster. McAfee Security for Microsoft Exchange Software Installation Guide 19

20 2 Installing McAfee Security for Microsoft Exchange Cluster replication Adding McAfee Security for Microsoft Exchange as a resource to the cluster group on Windows 2003 (32 or 64 bit) Use this task to add McAfee Security for Microsoft Exchange as a resource to a cluster group, so that McAfee Security for Microsoft Exchange can behave as a cluster application. 1 In Cluster Administrator, select the Exchange cluster group where you want to add the McAfee Security for Microsoft Exchange resource. Ensure that the McAfee Security for Microsoft Exchange cluster resource is created in the same cluster group where you have Microsoft Exchange resources configured. 2 From the File menu, select New Resource. The New Resource wizard appears. 3 Type a suitable name for the McAfee Security for Microsoft Exchange resource. 4 From the Resource Type drop-down list, select McAfee Cluster Framework. 5 From the Group drop-down list, select the cluster group where the McAfee Security for Microsoft Exchange resource needs to be added. 6 Click Next. The Possible Owners screen appears. Check if the nodes of the cluster on which McAfee Security for Microsoft Exchange is installed, are listed in the Possible Owners list. 7 Click Next. The Dependencies screen appears. Make the current resource McAfee Cluster Framework dependent on a resource of type Physical Disk. 8 Click Next. The Parameters screen appears. In the Shared Data Drive section, verify if the disk that was selected from the Dependencies screen is displayed. 9 Click Finish. A confirmation dialog box appears. 10 Click OK. The cluster resource is successfully created. 11 In Cluster administrator, right-click on the newly created resource and from the context menu, select Bring Online. This will start the McAfee Security for Microsoft Exchange service on the active node and the quarantine database will be created in the designated drive. Multiple instances of the Postgress.exe*32 process will appear under the Processes tab of the Manager along with RPCServ.exe*32, and SAFeService.exe*32. In a Windows 2003 (32 bit) environment, you will have Postgress.exe, RPCServ.exe, and SAFeService.exe running, as these are native 32 bit processes. Adding McAfee Security for Microsoft Exchange as a resource to the cluster group Windows 2008 (64 bit) Use this task to add McAfee Security for Microsoft Exchange as a resource to a cluster group in a Windows 2008 (64 bit) environment. 1 Click Start Run, type cmd, then click OK. Ensure that you have logged in as the administrator. 20 McAfee Security for Microsoft Exchange Software Installation Guide

21 Installing McAfee Security for Microsoft Exchange Testing your installation 2 2 Type the following commands to navigate to the cluster folder and run the cluster command. Press ENTER after each command. cd <windows folder>\cluster cluster /UNREGADMINEXT:McPPClusResEx.dll 3 Close the command prompt. Ensure that the McAfee Security for Microsoft Exchange cluster resource is created in the same cluster group where you have Microsoft Exchange resources configured. 4 Click Start Administrative Tools Failover Cluster Management. The Failover Cluster Management console appears. 5 Select the cluster group in which you would like to create the cluster resource. In the Actions window (displayed on the right of the main console), click Add resource. 6 From the drop-down list select More resources. Then select Add McAfee Cluster Framework. 7 In the main console, New McAfee Cluster Framework appears. Right click on this and select Properties. The New McAfee Cluster Framework Properties window appears. 8 Click the Properties tab. 9 In Grid, click the Value field and enter the drive that was selected to store the McAfee Security for Microsoft Exchange configuration and the database, for example F:\. Then click OK. 10 In Cluster administrator, right-click on the newly created resource and select Bring Online. This will start the McAfee Security for Microsoft Exchange service on the active node and the quarantine database will be created in the designated drive. Multiple instances of the Postgress.exe*32 process will appear under the Processes tab of the Manager along with RPCServ.exe*32, and SAFeService.exe*32. Testing your installation When you have completed the installation of McAfee Security for Microsoft Exchange, we recommend that you test the installation. This is to ensure that the software is installed properly and can detect viruses and spam within messages. Contents Testing the anti-virus component Testing the anti-spam component Using McAfee Virtual Technician to test your installation Testing the anti-virus component The recommended method to test an anti-virus product is to attach an EICAR anti-virus test file to an message, and to send the message through the Exchange server where you ve just installed McAfee Security for Microsoft Exchange. The EICAR standard anti-virus test file was created jointly by several anti-virus vendors throughout the world to implement a standard by which customers can verify their anti-virus installations. Important: This file is not a virus. Ensure that you delete the file when you have finished testing your installation to avoid alarming unsuspecting users. McAfee Security for Microsoft Exchange Software Installation Guide 21

22 2 Installing McAfee Security for Microsoft Exchange Testing your installation 1 Copy the following line into its own file, then save the file with the name EICAR.COM: The file size will be 68 or 70 bytes. 2 Send an message through the Exchange server with the EICAR test file as an attachment. When McAfee Security for Microsoft Exchange examines the message, it reports finding the EICAR test file, but is unable to clean or repair the EICAR file because it is a test file. 3 McAfee Security for Microsoft Exchange replaces the EICAR test file with an alert message. Testing the anti-spam component You can test the operation of the software by running the GTUBE (General Test mail for Unsolicited Bulk ) test. The test message must be sent from an external account (a different domain). 1 Create a new message. 2 In the body of the message, copy the following text: XJS*C4JDBQADN1.NSBN3*2IDNEN*GTUBE-STANDARD-ANTI-UBE-TEST- *C.34X Ensure that you copy this with no extra spaces or line breaks. 3 From an external address, send this message to a mailbox address on the server where you have installed the McAfee Security for Microsoft Exchange with McAfee Anti-Spam Add-On component. McAfee Anti-Spam scans the message, recognizes it as a junk message, and takes action (as per the configuration). The GTUBE test overrides blacklists and whitelists. For more information on the GTUBE test file, visit Using McAfee Virtual Technician to test your installation McAfee Virtual Technician automatically checks for common deviations that may have occurred since you installed the product. You can test if McAfee Security for Microsoft Exchange is installed correctly by running McAfee Virtual Technician. To download McAfee Virtual Technician, visit: 22 McAfee Security for Microsoft Exchange Software Installation Guide

23 3 Program maintenance You can use the Modify option to change the way in which program features are installed. The option Repair helps you in repairing installation errors in the program, such as fixing the missing or corrupt files, shortcuts, and registry entries. Use this section to modify or repair an existing installation or remove the McAfee Security for Microsoft Exchange program from your computer. Contents Role based modification Modifying the installation Repairing the installation Removing the program Restoring default settings Purge and Optimization Role based modification In Exchange 2003, you can choose to install the front-end related components. Additionally you can protect the servers installed with Transport and Mailbox roles. The same is applicable for Exchange 2007 and Exchange 2010 servers. The modify installation feature allows you to add or remove new features to an existing McAfee Security for Microsoft Exchange installation. For example, you have installed McAfee Security for Microsoft Exchange on a front-end Exchange 2003 server without the Anti-Spam Scanning and Buffer Overflow protection features. At a later stage you can modify the existing McAfee Security for Microsoft Exchange installation and include these new capabilities without reinstalling the application. You can also modify the role of an existing McAfee Security for Microsoft Exchange installation depending on the requirement. Consider a scenario where you have installed McAfee Security for Microsoft Exchange with the Hub role on one server and with the Mailbox role on another server. All the users are connected to the server with the Mailbox role which in turn is connected to the sever with the Hub role. At some stage you decide to combine the two roles on a single server. You can modify the installation on the server with the Mailbox role to additionally execute the Hub role, without uninstalling and reinstalling the application. If you are removing a role, then first remove it from the McAfee Security for Microsoft Exchange, then from Microsoft Exchange. If you are adding a role, then first add it to Microsoft Exchange, then to McAfee Security for Microsoft Exchange. McAfee Security for Microsoft Exchange Software Installation Guide 23

24 3 Program maintenance Modifying the installation Modifying the installation Use this task to change McAfee Security for Microsoft Exchange program features as required and change the way program features are installed on your computer. 1 In the folder containing the installation files, double-click the icon for the setup file for your operating system: 32-bit setup_x86.exe 64-bit setup_x64.exe The Welcome screen appears. 2 Click Next. The Program Maintenance screen appears. 3 Select Modify to change program features as required, then click Next. The Custom Setup screen appears. 4 Select the program features you want to modify and click Next. The End User License Agreement screen appears. 5 Select I accept the terms in the license agreement, then click Next. The Ready to Modify the Program screen appears. 6 Click Install to complete the installation with the modified program features. On completion of the installation, the InstallShield Wizard Completed screen appears. 7 Click Finish to exit Program Maintenance. Repairing the installation Use this task to repair installation errors in the program. You can fix missing or corrupt files, shortcuts and registry entries. Repairing an installation will revert to the default configuration settings. 1 In the folder containing the installation files, double-click the icon for the setup file for your operating system: 32-bit setup_x86.exe 64-bit setup_x64.exe The Welcome screen appears. 2 Click Next. The Program Maintenance screen appears. 3 From the Program Maintenance screen, select Repair, then click Next. The Ready to Repair the program screen appears. 4 Click Install to complete the repair. On completion of the installation, the InstallShield Wizard Completed screen appears. 5 Click Finish to exit Program Maintenance. 24 McAfee Security for Microsoft Exchange Software Installation Guide

25 Program maintenance Removing the program 3 Removing the program Use this task to remove an existing installation (standalone) of McAfee Security for Microsoft Exchange from your computer. 1 In the folder containing the installation files, double-click the icon for the setup file for your operating system: 32-bit setup_x86.exe 64-bit setup_x64.exe The Welcome screen appears. 2 Click Next. The Program Maintenance screen appears. 3 From the Program Maintenance screen, select Remove, then click Next. The Preserve Settings screen appears. 4 Select Preserve quarantine database to retain the quarantine database. Then click Next. The Remove the program screen appears. 5 Click Remove to remove the installation of McAfee Security for Microsoft Exchange from your system. On completion of the removal, the InstallShield Wizard Completed screen appears. 6 Click Finish to exit Program Maintenance. Use Add/Remove programs to uninstall McAfee Security for Microsoft Exchange. In this method, the quarantine database is preserved by default. If you do not want to preserve the existing quarantine database, follow the above procedure. Restoring default settings You can restore the interface to its original out-of-the-box configuration. Click Settings & Diagnostics Import and Export Configuration Restore Default. This restores the interface with the original out-of-the-box settings. McAfee Security for Microsoft Exchange Software Installation Guide 25

26 3 Program maintenance Purge and Optimization Purge and Optimization Use this task to remove old items marked for deletion from the database. Using the optimization task, you can recover disk space being taken up by deleted database records. 1 Click Settings & Diagnostics Detected Items. The Detected Items page appears. The section Local Database has two tasks: Purge of old items frequency To specify how frequently old items marked for deletion should be removed from the database. Optimization frequency To specify how frequently should the database be optimized. The default value for both the tasks is set at Monthly. 2 Click Edit Schedule to modify the schedule. For more information, click Edit Schedule and refer the online help of the page that appears. These tasks should be performed on a regular basis to maintain adequate free space in the database. 26 McAfee Security for Microsoft Exchange Software Installation Guide

27 4 4 Upgrading the software You can upgrade a standalone product to McAfee Security for Microsoft Exchange 7.6 or you can also upgrade your product using epolicy Orchestrator. Upgrade from earlier versions of GroupShield for Exchange to McAfee Security for Microsoft Exchange version 7.6. The product upgrades supported are: GroupShield for Exchange version Patch 1 and above GroupShield for Exchange version Rollup2 and above s Upgrading a standalone product on page 28 McAfee Security for Microsoft Exchange version 7.6 supports upgrading your configuration settings from the previous version of the product. When upgrading to a new version of McAfee Security for Microsoft Exchange, you do not need to uninstall the existing version. epolicy Orchestrator upgrade on page 29 If your existing product is managed by epolicy Orchestrator and you upgrade it to McAfee Security for Microsoft Exchange version 7.6, then the policies present in epolicy Orchestrator also need to be upgraded to McAfee Security for Microsoft Exchange version 7.6. Upgrading McAfee Security for Microsoft Exchange using epolicy Orchestrator 4.5 on page 29 This task will guide you through the process of upgrading your installation of McAfee Security for Microsoft Exchange through epolicy Orchestrator 4.5. Upgrading McAfee Security for Microsoft Exchange using epolicy Orchestrator 4.6 on page 30 This task will guide you through the process of upgrading your installation of McAfee Security for Microsoft Exchange through epolicy Orchestrator 4.6. Contents Upgrading a standalone product epolicy Orchestrator upgrade Upgrading McAfee Security for Microsoft Exchange using epolicy Orchestrator 4.5 Upgrading McAfee Security for Microsoft Exchange using epolicy Orchestrator 4.6 McAfee Security for Microsoft Exchange Software Installation Guide 27

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

Best Practices Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Best Practices Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Best Practices Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

epolicy Orchestrator Log Files

epolicy Orchestrator Log Files Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software

Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Security 1.0 User Guide

McAfee Security 1.0 User Guide McAfee Security 1.0 User Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Total Protection Service

Total Protection Service User Help McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Security for Microsoft SharePoint 2.5.0 User Guide

McAfee Security for Microsoft SharePoint 2.5.0 User Guide McAfee Security for Microsoft SharePoint 2.5.0 User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

McAfee Risk Advisor 2.7

McAfee Risk Advisor 2.7 Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights

More information

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Email Gateway 7.x Encryption and IronPort Integration Guide

McAfee Email Gateway 7.x Encryption and IronPort Integration Guide Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee Optimized Virtual Environments for Servers. Installation Guide McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee Total Protection Service Installation Guide

McAfee Total Protection Service Installation Guide McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Product Guide. McAfee Security for Microsoft Exchange 8.0.0

Product Guide. McAfee Security for Microsoft Exchange 8.0.0 Product Guide McAfee Security for Microsoft Exchange 8.0.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0 Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

McAfee SiteAdvisor Enterprise 3.5 Patch 2

McAfee SiteAdvisor Enterprise 3.5 Patch 2 Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Release Notes for McAfee epolicy Orchestrator 4.5

Release Notes for McAfee epolicy Orchestrator 4.5 Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator

More information

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0 Best Practices Guide McAfee Endpoint Protection for Mac 1.1.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Verizon Internet Security Suite Powered by McAfee User Guide

Verizon Internet Security Suite Powered by McAfee User Guide Verizon Internet Security Suite Powered by McAfee User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS

Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS - About this Document - About this Release - Purpose

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee Solidcore Change Reconciliation and Ticket-based Enforcement

McAfee Solidcore Change Reconciliation and Ticket-based Enforcement Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

McAfee VirusScan Enterprise 8.8 software Installation Guide

McAfee VirusScan Enterprise 8.8 software Installation Guide McAfee VirusScan Enterprise 8.8 software Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Installation Guide for PCs. McAfee All Access

Installation Guide for PCs. McAfee All Access Installation Guide for PCs McAfee All Access COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

McAfee Agent Handler

McAfee Agent Handler McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Recommended Recommended for all environments. Apply this update at the earliest convenience.

Recommended Recommended for all environments. Apply this update at the earliest convenience. Release Notes McAfee Enterprise Mobility Management 11.0 Patch 4 About this document About this release Bug fixes and enhancement Installation instructions Files affected by patch Troubleshooting installation

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

========================================================== ==========================================================

========================================================== ========================================================== Release Notes for McAfee(R) Security Version 1.1 Copyright (C) 2011 McAfee, Inc. All Rights Reserved. ========================================================== Release Date: June 27, 2011 ==========================================================

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

McAfee epolicy Orchestrator 4.5 Product Guide

McAfee epolicy Orchestrator 4.5 Product Guide McAfee epolicy Orchestrator 4.5 Product Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

McAfee SiteAdvisor Enterprise 3.5.0

McAfee SiteAdvisor Enterprise 3.5.0 Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Product Guide. McAfee SaaS Endpoint Protection 5.2.0

Product Guide. McAfee SaaS Endpoint Protection 5.2.0 Product Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service

Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service Application Note Configuring McAfee Firewall Enterprise for McAfee Web Protection Service This document explains how to configure McAfee Firewall Enterprise (Sidewinder ) to redirect all web traffic to

More information

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

McAfee VirusScan Enterprise 8.8 software Product Guide

McAfee VirusScan Enterprise 8.8 software Product Guide McAfee VirusScan Enterprise 8.8 software Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

Release Notes for McAfee VirusScan Enterprise for Storage 1.0

Release Notes for McAfee VirusScan Enterprise for Storage 1.0 Release Notes for McAfee VirusScan Enterprise for Storage 1.0 About this document New features Known issues Where to find McAfee enterprise product information License attributions About this document

More information

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.3.0 Software Installation Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

AntiSpyware Enterprise Module Beta 2

AntiSpyware Enterprise Module Beta 2 AntiSpyware Enterprise Module 8.7 - Beta 2 Product Guide About the AntiSpyware Enterprise Module The McAfee AntiSpyware Enterprise Module 8.7 is an add-on to the VirusScan Enterprise 8.7i product that

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Archive Attender Version 3.5

Archive Attender Version 3.5 Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Implementing McAfee Device Control Security

Implementing McAfee Device Control Security Implementing McAfee Device Control Security COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0 Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Product Guide Revision A. McAfee Web Reporter 5.2.1

Product Guide Revision A. McAfee Web Reporter 5.2.1 Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

http://docs.trendmicro.com/en-us/enterprise/scanmail-for-microsoft-exchange.aspx

http://docs.trendmicro.com/en-us/enterprise/scanmail-for-microsoft-exchange.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

McAfee Solidcore 5.1.0 Product Guide

McAfee Solidcore 5.1.0 Product Guide McAfee Solidcore 5.1.0 Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or

More information

PureMessage for Microsoft Exchange startup guide

PureMessage for Microsoft Exchange startup guide PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: May 2010 Contents 1 About this guide...3 2 Planning your PureMessage deployment...4 3 Installing PureMessage...6 4 Starting

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Anti-Spyware Enterprise Module software

Anti-Spyware Enterprise Module software Anti-Spyware Enterprise Module software version 8.0 Guide What is the Anti-Spyware Enterprise Module? The McAfee Anti-Spyware Enterprise Module is an add-on to the VirusScan Enterprise 8.0i product that

More information

McAfee VirusScan Enterprise for Storage 1.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x

McAfee VirusScan Enterprise for Storage 1.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x McAfee VirusScan Enterprise for Storage.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x COPYRIGHT Copyright 200 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

PureMessage for Microsoft Exchange startup guide. Product version: 3.1

PureMessage for Microsoft Exchange startup guide. Product version: 3.1 PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: June 2015 Contents 1 About this guide...4 2 Planning your PureMessage deployment...5 2.1 Deploying PureMessage to Exchange

More information

McAfee GTI Proxy 1.0.0 Administration Guide

McAfee GTI Proxy 1.0.0 Administration Guide McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Product Guide. McAfee Security for Microsoft SharePoint 3.0.0

Product Guide. McAfee Security for Microsoft SharePoint 3.0.0 Product Guide McAfee Security for Microsoft SharePoint 3.0.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee MOVE AntiVirus (Agentless) 3.6.0

McAfee MOVE AntiVirus (Agentless) 3.6.0 Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management

Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management Administration guide Host software WinCCU Installation Complete gas volume and energy data management Contents 1 Introduction... 1 Safety first... 1 Warning... 1 Typographic conventions... 1 Product versioning...

More information

McAfee SaaS Email Archiving

McAfee SaaS Email Archiving User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Product Guide. McAfee Security for Microsoft Exchange 8.5.0

Product Guide. McAfee Security for Microsoft Exchange 8.5.0 Product Guide McAfee Security for Microsoft Exchange 8.5.0 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

GFI Product Manual. Getting Started Guide

GFI Product Manual. Getting Started Guide GFI Product Manual Getting Started Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty

More information

Release Notes for Host Intrusion Prevention 8.0

Release Notes for Host Intrusion Prevention 8.0 Release Notes for Host Intrusion Prevention 8.0 About this document New features Known issues Finding product documentation About this document Thank you for choosing this McAfee product. This document

More information

McAfee epolicy Orchestrator

McAfee epolicy Orchestrator Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Oracle WebCenter Content Service for Microsoft Exchange

Oracle WebCenter Content Service for Microsoft Exchange Oracle WebCenter Content Service for Microsoft Exchange Installation and Upgrade Guide 10g Release 3 (10.3) November 2008 Oracle WebCenter Content Service for Microsoft Exchange Installation and Upgrade

More information

McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide

McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information