Trend Micro InterScan Messaging Security Virtual Appliance 8.5. Best Practice Guide
|
|
- Melvyn Wiggins
- 8 years ago
- Views:
Transcription
1 Trend Micro InterScan Messaging Security Virtual Appliance 8.5 Best Practice Guide
2 Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real individual, company, product, or event, unless otherwise noted. Complying with all applicable copyright laws is the responsibility of the user. Copyright 2013 Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. All other brand and product names are trademarks or registered trademarks of their respective companies or organizations. Authors: Steve Pak / Jarno Buenaobra / Bryan Xu / Marcel Rieger / Eric Cai Editorials: Nadia Trivinio Released: September Trend Micro Inc. 2
3 <Table of Contents Table of Contents Table of Contents... 3 Chapter 1: Preface... 5 Chapter 2: Product Description... 6 Chapter 3: Hardware > Sizing Guidelines > Recommended Hardware IMSVA Server... 9 Chapter 4: Software > Recommendations LDAP TMCM Logging DDA server version requirement Chapter 5: Deployment > Network Topology INTERNET IMSVA Mailbox servers INTERNET MTA IMSS Mail box servers > Component Layout > Fault Tolerance and Load Balancing Chapter 6: > GUI Configuration Scanning Exceptions Notifications SMTP Routing Cloud Pre-Filter Steps to enable DDA integration > Policy Settings Policy Routing Global Antivirus Rule Regular Expressions Filter Ordering Creating Global White List for Inbound Mails Separating Phishing/WRS Checking from Anti-Spam Rule Scan Method C&C Contact Alert Services Scan Engine Trend Micro Inc. 3
4 <Table of Contents 6.3 > Configuration Files imss.ini File foxdns.ini File > Database Updating the configuration settings in the database Database Maintenance Schedule > Others Spam Settings EUQ SMTP Authentication Rule Samples Chapter 7: Backup and Disaster Recovery > Backup and Restore from the GUI > Manual Database Backup and Recovery > Backing up and Restoring Cloud Pre-filter account settings Chapter 8: References > Communication Ports > ERS Console > TLS (Transport Layer Security) Settings > Product Updates > Upgrade/Migration Trend Micro Inc. 4
5 Preface Chapter 1: Preface Welcome to Trend Micro InterScan Messaging Security Virtual Appliance v8.5 Best Practices Guide. This document is designed to help resellers and customers develop a set of best practices when deploying and managing the InterScan Messaging Security Virtual Appliance (IMSVA). This document is also designed to be used in conjunction with the following guides, both of which provide more details about IMSVA than are given here: Trend Micro InterScan Messaging Security Virtual Appliance v8.5 Installation Guide Trend Micro InterScan Messaging Security Virtual Appliance v8.5 Administrator s Guide Trend Micro IMSVA 8.5 Reviewers Guide Trend Micro Inc. 5
6 Product Description Chapter 2: Product Description InterScan Messaging Security Virtual Appliance (IMSVA) is a comprehensive antivirus and content management solution for the Internet mail gateway. There are 5 major components in an IMSVA environment that need to be identified when architecting the deployment. Each component is briefly described below. 1. Central Controller The main IMSS server that allows administrators to manage multiple IMSS Scanners using one IMSS Web Console 2. Scanner Service Accepts and scans SMTP and POP3 connections. 3. EUQ Service End User Quarantine service allows end users to checked their quarantined spam mails to check if they are spam or not. The first server where you will install EUQ on will become the Primary EUQ server where end-users will connect. Secondary EUQ servers provide load-balancing and better performance. 4. Cloud Pre-Filter Managed security service powered by the Trend Micro Security Platform. This allows the inbound messages to be scanned for spam, phishing, malware, and other messaging threats before reaching the network. 5. IP-Filter Consists of Reputation Service and IP-Profiler modules. The two modules provide anti-spam capability that can filter SMTP connection based on the IP-address of the connecting SMTP server. 6. Reputation Services First part of the IP-Filterring module, which prevents spam mails. It identifies and blocks spam using RBL to block SMTP connectiton based on the IP-address of the connecting MTA server. 7. IP Profiler Second part of the IP-filterring module. It allows administrators to block SMTP connections based on security violations and threshold settings Trend Micro Inc. 6
7 Hardware Chapter 3: Hardware On top of the normal MTA tasks of receiving and delivering s, IMSS has to disassemble, evaluate, scan and reassemble the s. This makes IMSVA a CPU and disk I/O intensive application. Careful planning needs to be done to make sure the IMSVA hardware can handle the load of the environment. 3.1 > Sizing Guidelines Important: This information can be used as a starting reference only. Actual performance will vary depending on features enabled, topology, performance tweaks, and scan-exclusions as outlined throughout this best practice document. This Sizing Guidelines are based off IMSVA 7.0. When doing sizing planning for IMSVA 8, the main goal is to determine how many IMSVA Scan Servers are needed using the two given customer environment data. These are the Average Message Size and the Total Throughput. 1. Average Message Size (KBytes) This is the average message size as seen in your environment. 100 KBytes is a common size for an environment if the other details are unknown. 2. Total Throughput (Messages/hour) This is the number of messages passing through the SMTP gateway per hour. If growth is expected, size for the planned growth. This is the number of messages passing through the proposed IMSS gateway. If IMSS is to be used to filter both incoming and outgoing mail, the total number of mail messages must be used. Internal messages that do not pass through IMSS at the gateway should not be included the Total Throughput variable. Messages that will be filtered by the IP-Filtering (ERS or IP-Profiler) module should not be included. STEP 1: Using Ave. Message Size, determine the Maximum Steady Throughput. Maximum Steady Throughput is the max number of messages/hr IMSVA can process without queuing. Use the following tables to determine the Maximum Steady Throughput. Please take note that these data assumes that the user is using the 2 default IMSVA filters (Antivirus and AntiSpam Filters).The values may vary if additional Filters are used but these numbers make a very good baseline as seen in other customers Trend Micro Inc. 7
8 Trend Micro InterScan Messaging Security Virtual Appliance 8.5 Hardware Volume Category Item 0 Estimated Seats per Server Throughput Server Hardware Item information High Volume ~38,000 ~240,100 Messages per hour (67 Messages per second) VMware ESX 3.5 Virtual Machine -4 Virtual CPUs -4 GB RAM -VM Network adapter -LSI Logic SCSI controller -80 GB Virtual Disk Host Server Hardware GHz Intel Xeon CPU -8 GB available on Host -Perc 6/I SAS -3 x 73 GB 15,000 RPM SAS hard drive NOTE Notes on Test Results Dedicated host (only one IMSVA 7.0 virtual machine running on this host) Default Configuration of IMSVA 7.0: o Antivirus + Anti-spam active o ERS, IP Profiling, Web EUQ inactive The above sizing estimates imply no message queuing on the IMSVA server. An average user is defined: o 50 messages sent/received across the gateway per 8 hour day (total) o Average message size 108 KB o This is mildly aggressive sizing to ensure accurate capacity planning If only antivirus or anti-spam is enabled, increase throughput by 10 percent in Table 1 Content filtering can be more expensive in resource consumption than both Antivirus and Anti-spam depending on the number and type of filters used. If the customer requires many content filters. STEP 2: Determine the number of IMSS servers required. Number of servers = Total Throughput / Max Steady Throughput Trend Micro Inc. 8
9 Hardware I.e. Ave Msg size is 100KB. IMSVA 7 with the High Volume specs and the Total Throughput is 300,000 Mgs/hour Number of servers = 300,000/240,100 = 1.25 In this example, the number of IMSVA servers recommended is 2 (1.25 rounded up) NOTE The data present is based of IMSVA 7.0. Using Content Filter with complex rules and other options can greatly reduce the throughput. 3.2 > Recommended Hardware IMSVA performs heavy disk I/O operations similar to most SMTP applications. Leveraging the fastest disk RPM and RAID configuration is known to significantly improve performance. IMSVA will also automatically spawn more processes to keep up with incoming traffic. Therefore, adding more RAM is another key element to increasing performance IMSVA Server Below are the recommended hardware specifications for an IMSVA Server. Please note that these are not the minimum system requirements for this product. CPU: Four Intel Xeon processors 3.16GHz. RAM: 8 GB Disk Drive: 15,000RPM hard disk drive or faster Trend Micro Inc. 9
10 Software Chapter 4: Software This section will go over software best practices for IMSVA. Since IMSVA is a virtual appliance, you do not need to worry about hardening or tuning the softwar. This section will give you guidelines on the third party software that are used by IMSVA. 4.1 > Recommendations LDAP IMSVA supports the following three types of LDAP servers: Microsoft Active Directory 2003, 2008 or Global Catalog IBM Lotus Domino 6.5 and 8.5 Sun One LDAP 5.2 or above OpenLDAP TMCM Version 5.5 Service Pack 1 Patch 3 Version 6.0 Patch Logging To maintain optimum performance for the modules that read and write information from the database, Trend recommends maintaining the database to the smallest possible size. To do this, you can decrease the configured number of days for storing event logs (under Logs Settings) and quarantined/archived events 2013 Trend Micro Inc. 10
11 SuBest Practice Guide Software (under Quarantine & Archive Settings) and lessen the number of reports to save (under Reports Settings) DDA server version requirement DDA 2.92 and DDA Trend Micro Inc. 11
12 Deployment Chapter 5: Deployment This section will go over deployment best practices for IMSVA. Here we will give recommendations as to the placement of IMSVA in relation to the mailboxes and your MTA(s). You will get information on which components you can enable/disable on each IMSVA and different load balancing / fault tolerance techniques that are commonly used. 5.1 > Network Topology IMSVA 8.5 comes with Postfix, which is a complete MTA. This allows you to put IMSVA anywhere in your topology just like any other MTA. However, if you intend to use the IP Profiler and ERS features, you must place your IMSVA on the edge of the network. Cloud Pre-Filter has no impact on how IMSVA should be deployed. With Cloud Pre-Filter, Trend Micro recommends adding the IMSVA s address to the domain s MX records, and the placing IMSVA at a lower priority than the Cloud Pre-Filter. This allows IMSVA to provide service continuity as a backup to Cloud Pre-Filter. Below are some common topologies with IMSVA INTERNET IMSVA Mailbox servers This is the ideal setup especially if ERS and IP-Profiler will be used. The Postfix MTA that comes with IMSVA will act as the front MTA server. Postfix is fully compatible with all the ERS and IP-Profiler features INTERNET MTA IMSS Mail box servers This setup is recommended if you don t want to replace your current front MTA server with IMSVA. Although you will not be able to use IP Profiler, you can still use ERS depending on which MTA server you are running. Almost all popular MTAs support RBL feature which is the technology behind ERS. Please follow the links below for more information about how to enable ERS on other MTA servers. ERS Standard: 2013 Trend Micro Inc. 12
13 SuBest Practice Guide Deployment ERS Advanced: For more deployment options, refer to the InterScan Messaging Security Virtual Appliance Installation Guide. 5.2 > Component Layout Please see the InterScan Messaging Security Virtual Appliance Instation Guide and InterScan Messaging Security Virtual Appliance 8.0 Administrator s Guide for an explaination on the parent-child relationship between the IMSVA and groups. IMSVA 8.5 has major components that can run separately on different virtual machines. This allows IMSVA to support a distributed type of deployment. Although it can also support the single-server type of deployment, distributed deployment provides better performance and fault-tolerance. Below are different types of deployments and their advantages. Figure 1 Single Server Deployment All IMSVA Components are on the same server. This is the simplest type of deployment, which is best for small network environments. Use this option if the server s hardware specifications can handle the amount of s that will go through IMSVA. Considerations: If you intend to use ERS and IP Profiler, the server should be the edge of the network. An edge MTA is the one that accepts s directly from the Internet. Since there is only one IMSVA server in the environment, there is a single point of failure, which may interrupt flow if the server goes down Trend Micro Inc. 13
14 Deployment Figure 2 Distributed Deployment (medium-size environment) Server 1 has parent virtual appliance with Scanner, Policy, and EUQ services all started. Server 2 has a child virtual appliance with Scanner, Policy, and EUQ services all started. Server N has a child virtual appliance with Scanner, Policy, and EUQ services all started. Use this type of deployment for better scalability. In this type of deployment, you can easily add more virtual appliances in the future if necessary. Since there are multiple Scanner servers that can accept s, this setup provides fault-tolerance, which avoids the interruption of flow if one IMSVA goes down. The EUQ client access load is distributed to multiple secondary EUQ Servers by the parent EUQ Servers. NOTE see Section 3.1 Sizing Guidelines to determine how many IMSS Scanner servers are necessary to support your environment. Considerations: If you intend to use ERS and IP Profiler, the IMSVA Scanner servers should be at the edge of the network. The IMSVA Scanner servers should be ones accepting s directly from the Internet. EUQ Users should have access to Server 1, which is hosting the Primary EUQ Server. The parent server may become the bottleneck depending on the amount of logs, quarantined events, etc. that needs to be stored. Even with the Scanner service running on the parent, you can set this to be the least priority in the mail routing so it has more resources to run its other tasks. In environments with more than two child devices, the Scanning, Policy, and EUQ services should be disabled on the parent virtual appliance, if possible, to avoid its overload Trend Micro Inc. 14
15 SuBest Practice Guide Deployment Figure 3 Distributed Deployment (large-size environment) Server 1 has the parent virtual appliance with the Scanner, Policy, and EUQ services all disabled. Dedicated child virtual appliances with only Scanners and Policy services enabled. Dedicated child virtual appliances with only EUQ service enabled Use this type of deployment to achieve the highest level of performance, scalability and fault-tolerance. In this setup, users can add more IMSVA Scanner servers in the future if necessary. Disabling all the services on the parent device provides better performance especially if there are several child devices to manage. Specializing appliances to run either the Scanner/Policy Services or EUQ service will provide the best performance output. NOTE see Section 3.1 Sizing Guidelines to determine how many IMSS Scanner servers are necessary to support your environment. Considerations: If you intend to use ERS and IP Profiler, the IMSVA running the Scanner and Policy services should be at the edge of the network. EUQ Users should have access to Server 1, which is hosting the main EUQ Server. Multiple-location Considerations IMSVA works well in a multiple-location environment. Below are things to be aware of when implementing IMSVA on a multiple-location environment. Deploy at least one parent virtual appliance in each localtion. Use TMCM to manage multiple parent appliances Trend Micro Inc. 15
16 Deployment 5.3 > Fault Tolerance and Load Balancing Why Load Balance Load balancing provides the following network benefits: Increased / and or sustained traffic throughput without increased latency (when compared to a non-load balanced solution). Rudimentary high availability capabilities. Load Balancing Methods There are several methods for accomplishing load balancing for both SMTP and HTTP. These are: Hardware load balancing DNS round robin Hardware Load Balancing Many organizations consider hardware load balancing the preferred solution. This is because it provides a balanced delivery of services to end users. A hardware solution typically balances traffic for OSI Layers 4 through 7 and is otherwise known as an application switch. By using a hardware load balancer, all the work to determine which node should process which request is handled by the hardware, away from the nodes. Adding, removing, or updating equipment to the group also is easier. Hardware load balancing also provides several ways to balance the network, whether that solution includes a high-end switch or an additional network appliance. General Configuration for a Hardware Load Balancer for Inbound SMTP Traffic Configuring a hardware load balancer involves: Selecting the pool of IP addresses that the load-balanced devices are going to use. Configuring the load balancer to use a virtual server IP address for the load-balanced pool of devices. Choosing destination protocol triggers that send only the specified protocol from the virtual server to the loadbalanced pool Trend Micro Inc. 16
17 SuBest Practice Guide Deployment No additional changes need to be made to external DNS MX records, unless the new virtual server IP address is different from the published MX record. DNS Round Robin Round robin works by having separate DNS name records (Name Record As) bound to the same canonical name record (Name Record C) for each server that provides a specific service. These A and C name records use the zone s minimum time-to-live value (TTL) to specify the time period the DNS record is kept before it is requested again. In this way, when DNS clients request the C name record for a service, the DNS server resolves the list of servers, but only returns one entry. The client requesting the C name record uses that server for the duration of the TTL. When the end of the TTL period is reached, the query is performed again. Using this technique, a DNS record that is sent to Client A could be different from that sent to Client B thus, Client A s traffic might go to Server A and Client B s traffic might go to Server B. The effect of using DNS Round Robin is that each of the Record A servers is used in the most efficient way possible to provide the service to the end client. Example (DNS Zone Configuration): server1.mydomain.tld IN A ; server2.mydomain.tld IN A ; server3.mydomain.tld IN A ; server4.mydomain.tld IN A ; proxy.mydomain.tld IN CNAME server1.mydomain.tld; proxy.mydomain.tld IN CNAME server2.mydomain.tld; proxy.mydomain.tld IN CNAME server3.mydomain.tld; proxy.mydomain.tld IN CNAME server4.mydomain.tld; In the above example, all MTA s would be configured to use proxy.mydomain.tld and could use one of four possible servers for each TTL period Trend Micro Inc. 17
18 Chapter 6: This section will go over the different configuration best practice for IMSVA. You can change the IMSVA configuration in three ways. Via the GUI Via local configuaration files (ini files) Via the database Changes made in the GUI are stored in either the local configuration files and/or the database. The priority in which IMSS will use the configuration settings if there is a conflict between the local files and the database is it will prioritize the setting specified in the local ini files. If the particular setting is not found in the local ini files, IMSS will use the setting in the database. The next sections will focus on the different configuration methods. 6.1 > GUI Configuration Scanning Exceptions Policy -> Scanning Exceptions -> Security Settings Violations Category Description This is the maximum size a message including attachment can be. Set this according to your company policy. The default value is set to 30 MB. Total # recipients exceeds Total # embedded layers in compressed The maximum number of recipients allowed within a single message. Messages with a lot of recipients can cause increased latency in message rule matching. A layer is defined by a compressed file within a compressed file. Has been used in previous attacks to hide malware deeper than scan 2013 Trend Micro Inc. 18
19 SuBest Practice Guide Category Description file exceeds engines previously scanned. Recommended value is 5. The default value is set at 20 layers. Total decompressed size of any single file exceeds Total # files in compressed file exceeds This setting is to prevent zip file attacks. The size set here should be relative to your total message size limit. Example: If you set your maximum message size to 5MB, the total size should not exceed 50MB. The default value is set at 50 MB. This setting is to prevent zip file attacks. Having a zip file with 50,000 files inside of it, although small in size, could cause significant scan time. Set this at a reasonable rate for the message size you are accepting. The default value is at 1000 files. Log Settings Logs -> Settings Category Database log update interval Number of days to keep logs for query. Number of days to keep in log files Maximum log file size for each service Description Logs are uploaded for reports and message tracking at this interval. For quicker updates to Message tracking, you can lower this to one minute. However, you will have more regular connections to the database instead of fewer connections but sending more data during each. The default value is set at 1 minute. This is the amount of days to keep the logs in the database which can be used to control the size of the database. Remember if you set it under 30 days, you will lose monthly report functionality. The default value is set at 30 days. Log files should be kept as long as necessary. Care should be taken to keep past log files for an extended period of time to prevent hard drive space consumption. Input 0 to remove any size restriction. Clear the input box to prevent IMSS from deleting any log files. The default value is set at 90 days. Acceptable values are between 100 and As above, please keep hard drive storage in mind. Input 0 to remove any size restriction. The default value is set at 2000 MB Trend Micro Inc. 19
20 Administration -> Updates -> Components PARAMETER Enable Scheduled Update USAGE / NOTES It is recommended to enable scheduled update to be performed at least hourly. If hourly is specified, change the minute interval so all Trend Micro products do not update at a single time which could cause a drop in the amount of bandwidth available Notifications Administration -> Notifications -> Events PARAMETER Delivery queue contains more messages than Retry queue folder contains more messages than USAGE / NOTES This number should be scaled based on the amount of messages received by the IMSS installation. (Example: If you receive 100,000 s a day, it should be set much lower than if you receive 1,000,000 s a day). The default value is set at messages Much like the delivery queue, this number should be scaled based on the amount of messages received by the IMSS installation. The default value is at messages NOTE It is best to get the baseline of Mails in Delivery Queue and Mails in Deffered Queue during peak operation to set the values. Also, note that if the there is a large influx of s, the notification can be trigger, so the setting can be increased to reflect this normal behavior. Administration -> Notifications -> Delivery Settings PARAMETER To Addresses Server name or IP Address SMTP Server Port USAGE / NOTES This should list all of the administrative addresses which require notifications in the Events tab. All policy based notifications are configurable for different addresses. The server IP address of the IMSVA machine should be listed here with a port number of This is a bypass port where no scanning will occur. If you d like to filter your own notifications, a port of or 25 can be used. Care should be taken as this adds additional load to the server and notifications could get filtered by your policies Trend Micro Inc. 20
21 SuBest Practice Guide SMTP Routing Administration -> SMTP Routing -> Connections Category Simultaneous Connections Incoming Transport Layer Security Settings Description This is the Postfix simultaneous SMTP client connection setting (maxproc column for smtpd in master.cf). The default value is 200. That is good number to start with then can be increased gradually depending on the available CPU and RAM of the server, if needed. See Section 8.3 for more information about TLS and certificates Administration -> SMTP Routing -> Message Rule Category Maximum Message Size Maximum number of recipients (1 to unlimited) Incoming Message Settings Permitted Senders of Relayed Mail Description This is the Postfix message size limit setting (message_size parameter in main.cf). The value depends on the company policy. In most customers, the limit is 5mb to 10mb. The default value is at 20 MB. If the size is larger than this, it will be rejected during the mail transaction. This is more efficient than taking action on the size of the message in Security Settings or a Size policy. This is the Postfix single message recipient limit setting (smtpd_recipient_limit parameter in main.cf). This is the maximum number of recipients allowed for a single message. A large number of recipients can cause delays during policy matching. If more recipients are specified in the mail envelope, they will receive a 452 Too many recipients error and it s up to the sending mail server to split and retry the message. Most of the time, legitimate mails will only have less than 100 recipients. The default value is at 1000 recipients. This is a Postfix anti-relay setting (relay_domains parameter in main.cf). To ensure that IMSVA receives incoming messages, Trend Micro recommends adding all internal domains in your network. This is another Postfix anti-relay setting (mynetworks parameter in main.cf). Add the ip addresses or network addresses of the hosts that you want to be able to send mails through postfix regardless of the destination domain Trend Micro Inc. 21
22 Administration -> SMTP Routing -> Domain-based Delivery PARAMETER Message Delivery Settings USAGE / NOTES All domains should be listed that to be used as SmartHosts. IMSVA will use DNS to delivery other domains Cloud Pre-Filter In order to use Cloud Pre-Filter, administrator should has control on their MX records, or at least has a way to request MX records change. Mail flow impact for inbound mail Enabling Cloud Pre-filter will change the inbound mail flow demonstrated as below: Without Cloud Pre-Filter With Cloud Pre-Filter 2013 Trend Micro Inc. 22
23 SuBest Practice Guide Steps to enable DDA integration 1. Open IMSVA web console, navigate to Policy Scan Engine, and select Enable Advanced Threat Scan Engine to enable ATSE. 2. Navigate to Administration IMSVA Configuration Deep Discovery Advisor Configuration, enable DDA and configure DDA server info. An example as following chart: // Administrator can get API key from DDA console Administrator About info. 1. Administrator can query DDA analysis status from IMSVA web console: 6.2 > Policy Settings Policy Routing Enter the Internal Addresses which can be either domains or LDAP groups. When selecting Both Incoming and Outgoing, you will have to specify all the internal domains for which IMSS is accepting mail Trend Micro Inc. 23
24 The easiest way is to gather all your internal domains in a text file. The file can be imported under the Internal Addresses area so IMSS will correctly know Incoming vs. Outgoing in the reports. If you are using incoming messages or outgoing messages, in the Recipients and Senders section of the policy creation, you can create a new Address Group and import all your domains Global Antivirus Rule Scanning Conditions For the scanning conditions of the Global Antivirus Rule in the GUI (Policy -> Policy List -> Global antivirus rule -> And scanning conditions match), it is recommended to have IntelliTrap turned on for better protection. Please also enable as many Spyware/Grayware Scan options as your company policy will allow. Action on Special Viruses For the actions on special viruses found in the Policy -> Policy List -> Global antivirus rule -> The action is - > Special Viruses, it is recommended to keep the setting for mass-mailing viruses enabled and the action to be delete. This way all messages that are detected to be mass-mailers will be deleted and will not enter your network Regular Expressions InterScan Messaging Security Virtual Appliance (IMSVA) 8.5 treats all keyword expressions as regular expressions and supports the following regular expressions. Characters Regular Expression Description. (dot) Any character (byte) except newline x The character 'x' \\ The character '\' \a The alert (bell) character (ASCII 0x07) \b 1. If this meta-symbol is within square brackets [] or, it will be treated as the backspace character (ASCII 0x08). For example, [\b] or \b 2013 Trend Micro Inc. 24
Trend Micro InterScan Messaging Security Virtual Appliance 9.0. Best Practice Guide
Trend Micro InterScan Messaging Security Virtual Appliance 9.0 Best Practice Guide 文 Information in this document is subject to change without notice. The names of companies, products, people, characters,
More informationT E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
More informationESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008
ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationTrend Micro, Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro, Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationConfiguration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
More informationTrustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
More informationwww.trendmicro.com/download/documentation/
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationE-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company
E-mail Filter SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company CONTENTS CONTENTS INTRODUCTION About This Document...2 Product
More informationImplementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
More informationeprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
More informationWatchGuard XCSv Setup Guide
WatchGuard XCSv Setup Guide All XCSv Editions Copyright and Patent Information Copyright 2010 2013 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, LiveSecurity, and
More information1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
More informationSpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...
More informationTrend Micro Hosted Email Security. Best Practice Guide
Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described
More informationInstalling GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation
More informationInstalling GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
More informationGFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"
More informationEmail Security 8.0 Administrator s Guide
Email Security 8.0 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationEmail Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
More informationEmail Security 7.4 Administrator s Guide
Email Security 7.4 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationInstalling GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in
More informationGFI Product Manual. Getting Started Guide
GFI Product Manual Getting Started Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty
More informationTREND MICRO. InterScan VirusWall 6. SMTP Configuration Guide. Integrated virus and spam protection for your Internet gateway.
TM TREND MICRO TM TM InterScan VirusWall 6 Integrated virus and spam protection for your Internet gateway for Linux TM SMTP Configuration Guide Trend Micro Incorporated reserves the right to make changes
More informationThe Leading Email Security Suites
The Leading Email Security Suites What is SpamSniper? The Leading Email Security Suites for Your Secure Messaging SpamSniper is the leading email security solution which locates in front of mail server
More informationSecure Messaging Service
Secure Messaging Service Powered by Trend Micro Email Security Platform for Service Providers Service Provider s Guide Trend Micro Incorporated reserves the right to make changes to this document and
More informationInstalling GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
More informationChapter 6: ScanMail emanager
Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the purpose of ScanMail emanager
More informationSymantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
More informationWeb. Anti- Spam. Disk. Mail DNS. Server. Backup
Email Server Appliance N ew generation of Server Appliance, AirLive, is designed for the SMB or enterprise that needs to install an easy maintained and fully functional mail server. It not only preserves
More informationWebsense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
More informationhttp://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationRelease Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
More informationUser Guide. ThreatTrack Security Product Manual
User Guide ThreatTrack Security Product Manual Copyright 2014 ThreatTrack Security, Inc. All Rights Reserved. The legal rights, license, and warranties of the software product described herein are governed
More informationFrequently Asked Questions
Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange
More informationHow To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (
GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationCopyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
More informationInstalling Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
More informationLesson Plans Configuring Exchange Server 2007
Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:
More informationInstallation Guide. Version 1.5. May 2015 Edition 2002-2015 ICS Learning Group
Installation Guide Version 1.5 May 2015 Edition 2002-2015 ICS Learning Group 1 Disclaimer ICS Learning Group makes no representations or warranties with respect to the contents or use of this manual, and
More informationCipherMail Gateway Quick Setup Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................
More informationAloaha Mail and Archive
Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally
More informationescan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
More informationComodo KoruMail Software Version 4.0
St rat Comodo KoruMail Software Version 4.0 Admin Guide Guide Version 4.0.030615 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to KoruMail Messaging Gateway...5
More informationIceWarp Unified Communications. AntiVirus Reference. Version 10.4
IceWarp Unified Communications AntiVirus Reference Version 10.4 Printed on 13 January, 2012 Contents AntiVirus 1 Anti-Virus... 2 Latest Avast! Engine... 2 Kaspersky Anti-Virus Support... 2 Support for
More informationSPAMINA Email Service Firewall 3.3.1.1 / Administrator s Manual / 1
SPAMINA Email Service Firewall 3.3.1.1 / Administrator s Manual / 1 Contents 1 INTRODUCTION TO CLOUD EMAIL FIREWALL... 6 1.1 WHAT IS CLOUD EMAIL FIREWALL?...6 1.2 FUNCTIONALITIES...6 2 CLOUD EMAIL FIREWALL
More informationMailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
More informationEmail Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
More informationMDaemon Vs. Microsoft Exchange Server 2013 Standard
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS
More informationHow To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)
A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365
More information8.2. InterScan Messaging Security Virtual Appliance. Installation Guide. Hybrid SaaS Email Security. Messaging Security
TM InterScan Messaging Security Virtual Appliance Hybrid SaaS Email Security 8.2 Installation Guide m Messaging Security Trend Micro, Incorporated reserves the right to make changes to this document and
More informationSonicWALL Email Security Appliance Administrator Guide
SonicWALL Email Security Appliance Administrator Guide Version 7.3 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Part Number:
More informationGRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
More informationEiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
More informationMetalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
More informationGREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
More informationGFI Product Manual. GFI MailEssentials Administrator Guide
GFI Product Manual GFI MailEssentials Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,
More informationComprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
More informationHow To Upgrade To Symantec Mail Security Appliance 7.5.5
Release notes Information Foundation 2007 Symantec Mail Security Appliance 7.5 Copyright 1999-2007 Symantec Corporation. All rights reserved. Before installing or upgrading: Migration issues If you are
More informationAdmin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam
Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...
More informationTrend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
More informationEnglish Translation of SecurityGateway for Exchange/SMTP Servers
Testing: Alt N Technologies SecurityGateway by Sandra Lucifora Administrators spend a considerable amount of their time on the job on eliminating unwanted messages. Viruses, Phishing, and Spoofing pose
More informationServer Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
More informationQuick Start Policy Patrol Mail Security 10
Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
More information5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager
5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...
More informationhttp://docs.trendmicro.com/en-us/enterprise/interscan-messaging-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
More informationEmail Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
More informationprovides several new features and enhancements, and resolves several issues reported by WatchGuard customers.
WatchGuard XCS v10.0 Update 1 Release Notes WatchGuard XCS Build 140312 Revision Date 11 November, 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard XCS v10.0 Update 1. This
More informationNetwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
More informationAvira Exchange Security Small Business Edition. Quick Guide
Avira Exchange Security Small Business Edition Quick Guide Table of contents Table of contents 1 Introduction...3 2 System requirements...4 3 The Avira Exchange Console...5 3.1 Virus Scanner status...6
More informationwww.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationFortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
More informationSmart Business Architecture for Midsize Networks Network Management Deployment Guide
Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart
More informationIBM Lotus Protector for Mail Security. Administrator Guide. Version 2.8 Release 2.8.1 SC27-3829-01
IBM Lotus Protector for Mail Security Administrator Guide Version 2.8 Release 2.8.1 SC27-3829-01 Copyright statement Copyright IBM Corporation 2006, 2013. U.S. Government Users Restricted Rights Use, duplication
More informationwww.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
More informationPrinterOn Enterprise Administration Support Guide
PrinterOn Enterprise Administration Support Guide Version 2.5 Doc Rev: 1.1 Table of Contents 1. Overview...4 2. Hardware and Operating System Requirements...5 2.1. Hardware Requirements...5 2.2. Software
More informationInstallation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
More informationApplication Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationPreface... 4. Introduction to Proofpoint Essentials... 5
July 2014 Preface... 4 About this Guide... 4 Intended Audience and Prerequisite Knowledge... 4 Other Sources of Information... 4 Contacting Proofpoint Essentials Support... 4 Knowledge Base... 5 Support
More informationSMTPSWITCH MAILER V6 FEATURES
SMTPSWITCH MAILER V6 FEATURES 22 Powerful Features Packed in a Single Email Marketing/Bulk Mailing Program! Easy and Advanced WYSIWYG/HTML Editing SMTPSwitch Mailer has a powerful built-in WYSIWYG editor
More informationPageScope Router. Version 1.5. Configuration Guide
PageScope Router Version 1.5 Configuration Guide Table of Contents TABLE OF CONTENTS... 2 1. Introduction...3 1.1 IP Address and Domain Name...3 2. Sending Files to PageScope Router...4 2.1 MFP Device
More informationAdministration Guide for the System Center Cloud Services Process Pack
Administration Guide for the System Center Cloud Services Process Pack Microsoft Corporation Published: May 7, 2012 Author Kathy Vinatieri Applies To System Center Cloud Services Process Pack This document
More informationEmail Image Control. Administrator Guide
Email Image Control Administrator Guide Image Control Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationIntercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
More informationDeployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php
Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with
More informationhttp://docs.trendmicro.com/en-us/enterprise/interscan-messaging-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
More information5nine Cloud Monitor for Hyper-V
5nine Cloud Monitor for Hyper-V Getting Started Guide Table of Contents System Requirements... 2 Installation... 3 Getting Started... 8 Settings... 9 Authentication... 9 5nine Cloud Monitor for Hyper-V
More informationPHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
More informationHelpSystems Web Server User Guide
HelpSystems Web Server User Guide Copyright Copyright HelpSystems, LLC. Robot is a division of HelpSystems. HelpSystems Web Server, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationSymantec Mail Security for SMTP. Administration Guide
Symantec Mail Security for SMTP Administration Guide Symantec Mail Security for SMTP Administration Guide The software described in this book is furnished under a license agreement and may be used only
More informationResonate Central Dispatch
Resonate Central Dispatch Microsoft Exchange 2010 Resonate, Inc. Tel. + 1.408.545.5535 Fax + 1.408.545.5502 www.resonate.com Copyright 2013 Resonate, Inc. All rights reserved. Resonate Incorporated and
More informationRequest Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationObjective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
More information1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12
Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied, including but
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationAvira Managed Email Security AMES FAQ. www.avira.com
Avira Managed Email Security AMES FAQ www.avira.com Can AMES be used immediately after an account for our organization has been set up in the MyAccount user portal? Using your account requires a change
More informationSymantec Protection for SharePoint Servers 6.0.4 Implementation Guide
Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book
More information