McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices

Size: px
Start display at page:

Download "McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices"

Transcription

1 McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices

2 COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FLASHBOX, FOUNDSTONE, GROUPSHIELD, HERCULES, INTRUSHIELD, INTRUSION INTELLIGENCE, LINUXSHIELD, MANAGED MAIL PROTECTION, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, MCAFEE.COM, NETSHIELD, PORTALSHIELD, PREVENTSYS, PROTECTION-IN-DEPTH STRATEGY, PROTECTIONPILOT, SECURE MESSAGING SERVICE, SECURITYALLIANCE, SITEADVISOR, THREATSCAN, TOTAL PROTECTION, VIREX, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. License Attributions Refer to the product Release Notes. 2

3 Contents Protecting against data loss from removable devices and file systems Device control Content protection rules Use case: Blocking wireless communication Use case: Making all USB removable storage read-only except authorized devices Use case: Blocking files containing personal identity information Use case: Blocking files created by a GIS application Use case: Disabling all CD/DVD burners from writing

4 Protecting against data loss from removable devices and file systems The purpose of this document is to provide a brief overview of ways to protect against data loss and to walk you through several use cases and best practices for data loss protection. Contents Device control Content protection rules Device control protects enterprises from the risk associated with unauthorized transfer of data from within or outside the organization. Data loss is defined as confidential or private information leaving the enterprise as a result of unauthorized communication through channels such as applications, physical devices, or network protocols. Memory sticks are the smallest, easiest, cheapest, and least-traceable method of downloading large amounts of data, which is why they are often considered the "weapon of choice" for unauthorized data transfer. McAfee Device Control allows monitoring and controlling external device behavior based on the device attributes rather than the content being copied. Using McAfee Device Control, devices attached to enterprise computers, such as smart phones, removable storage devices, Bluetooth devices, MP3 players, or Plug and Play devices, can be monitored, blocked, or configured to be read-only. There are two types of device control rules available in McAfee Device Control: Plug and Play device rules Removable storage device rules Plug and Play device rules Plug and Play device rules work on the device driver level, and can be used to block and monitor devices. Whenever a new device is plugged into the computer, McAfee Device Control will match the new device attributes against the device attributes defined in the Plug and Play device rule. If a match is found, McAfee Device Control will perform the action (block/monitor/notify user) defined by the device rule. Plug and Play device rules are used to restrict the use of peripheral devices such as Bluetooth adapters and modems. Although Plug and Play device rules can also be applied to removable storage devices, McAfee does not recommend using them for such devices. Pros and cons of Plug and Play device rules Pros: 4

5 Device control Allow for blocking any type of device. Block devices at a very low level, before the driver has a chance to load. Allow for easy blocking of entire device classes and bus types (such as "block all USB"). Cons: The device blocking is based only on the device attributes and does not inspect content. Can only block or monitor. Cannot make a device read only. Recommended use cases: Block all Bluetooth adapters and modems The enterprise wants to restrict end users from using Bluetooth and modem communication to transfer data. Block all Wireless communication The enterprise wants to restrict end users from using wireless communication while connected to the corporate network. See Use case: Blocking wireless communication. Removable storage device rules Removable storage device rules are used for blocking and monitoring removable storage devices such as flash drives, MP3 players, and external hard drives. They can block, monitor, or configure the removable storage to read-only. Whenever a new removable storage device is plugged into the computer, McAfee Device Control will match the new device attributes against the device attributes defined in the removable storage device rule. If a match is found McAfee Device Control will perform the action defined by the device rule. Removable storage device rules work on the file system level, and allow for more flexibility than Plug and Play device rules. For example, the removable storage device rule can match a device based on its file system type (NTFS, FAT32) or file system volume label. In addition, they provide more accurate device names. For example an ipod is recognized by the Plug and Play mechanism as USB mass storage device, whereas the removable storage rule recognizes it as Apple ipod, which is more meaningful. (This description fits older ipods. The ipod Touch is recognized as a Windows Image Acquisition device.) McAfee recommends using removable storage device rules, rather than Plug and Play device rules, to control all devices that provide removable storage, such as USB mass storage devices, Flash Drives ("Disk on Key"), and CD\DVD. NOTE: Since Plug and Play device rules are applied on the device driver level, they are applied before removable storage device rules. The implication is that if a removable storage device is blocked by both types of rule, the removable storage device rule will not be applied. Pros and cons of removable storage device rules Pros: Allow read-only mode for removable storage devices. Allow for greater flexibility for device matching (file system type, volume label). Cons: The device blocking is based only on the device attributes and does not inspect content. Recommended use cases: Make all USB removable storage read-only except authorized devices. An enterprise has purchased a specific brand of encrypted flash drive and would like to restrict the use of any other flash drive. See Use case: Making all USB removable storage read-only except authorized devices. 5

6 Content protection rules Disable all CD/DVD burners from writing. The enterprise wants to restrict engineering end users from using CD/DVD burners to write CDs. McAfee Device Control is not able to analyze the content written to CD/DVD therefore removable storage device rules should be used. See Use case: Disabling all CD/DVD burners from writing. Content protection rules Unlike device control functionality that blocks the entire device, content protection rules protect individual files based on their content. When a file is copied to a network shared folder or a removable storage device McAfee Host Data Loss Prevention performs deep content analysis to classify the content, and performs one (or more) of the following actions: Block Moves the file to the local quarantine folder and deletes its content from the removable storage. This action is not available for network shared folders. Monitor Sends an incident event to the Host DLP ( in version 3.0, the epolicy Orchestrator) database for monitoring and case management. Store Evidence Stores the original file that was copied so it can be viewed in the Host DLP Monitor. Notify user Shows a popup to the end-user as notification of the action that was performed. Encrypt Encrypts the file using McAfee Endpoint Encryption. This action is available in version 3.0. Removable storage protection rules Removable storage protection rules allow for blocking and monitoring of individual files being written to removable devices according to file attributes and their content classification. When a file is copied to a removable storage device, the Host DLP Agent inspects, analyzes, and classifies the file content, and if the file classification matches one or more of the removable storage protection rules, the agent will apply the action defined in the rule. Host DLP provides several content classification techniques, including: Regular expression matching Keyword Application that created or edited the file Current storage location Where the file is being copied to. McAfee recommends using removable storage protection rules whenever an enterprise allows use of removable storage devices, but wants to restrict (or monitor) the data that is written to them. Pros and cons of removable storage protection rules Pros: Allow blocking individual files according to their content and attributes, rather than block the entire device. Cons: uses CPU resources to analyze every file copied to removable media. 6

7 Content protection rules Recommended use cases: Block copying of files containing personal identity information (PII). There are many forms of PII: Social Security Number (SSN), driver's license number, National Identification Number, and so on. McAfee Host Data Loss Prevention contains pre-defined regular expression patterns (Secured Text Patterns) that can be used to create these rules. See Use case: Blocking files containing personal identity information. NOTE: version 3.0 introduces regular expression validators to reduce false positives. Blocking copying of files created by a Geographic Information System (GIS) application to removable storage. Certain applications create files that contain binary information that cannot be content inspected. provides a unique technology to classify content based on the application that creates or edits the file. See Use case: Blocking files created by a GIS application. By creating application-based tagging rules the Host DLP Agent can tag any file that is created by a GIS application. This tag can then be used in removable storage protection rules to block or monitor copying of GIS files to removable storage. Network file system protection rules Network file system protection rules are very similar to removable storage protection rules, but they apply to the Windows network file system (shared folders) rather than devices. They support monitoring files copied to a defined Windows share, but it do not support blocking the copy operation. version 3.0 introduces the ability to encrypt files that are copied to the network, to enforce compartmentalization policies, using McAfee Endpoint Encryption. Recommended use cases: Monitor all files containing credit card numbers being copied to public folders on a file server. Many organizations provide public folders for file sharing on the network. Reckless users can copy sensitive files to these folders. Using McAfee Host Data Loss Prevention you can create a network file system protection rule to Monitor, Notify User, and Store Evidence for every file that contains sensitive information, such as credit card numbers, when copied to the public folder on the network. Ideally, such files should also be encrypted. Compartmentalization (available in version 3.0 using McAfee Endpoint Encryption integration) Assume your organization has an engineering group, a finance group, and a sales group. You can use the version 3.0 and McAfee Endpoint Encryption integration to generate three encryption keys FINANCE_KEY, ENGINEERING_KEY and SALES_KEY. Each key is available only to members of that group to unlock files. Using these keys in network file system protection rules can ensure that every sensitive file that is copied to a network shared folder will be properly encrypted, and visible only to authorized users. 7

8 The following examples demonstrate the techniques discussed in the text. Use case: Blocking wireless communication Use case: Making all USB removable storage read-only except authorized devices Use case: Blocking files containing personal identity information Use case: Blocking files created by a GIS application Use case: Disabling all CD/DVD burners from writing Use case: Blocking wireless communication Assume an organization wants to restrict end users from using wireless communication while connected to the corporate network. With McAfee Device Control it is possible to define a policy that differentiates between users who are online (connected to the corporate network) and those who are offline. The following example shows how to block wireless adapters while a user is connected to the corporate network. Example 1 In the Navigation Bar under Device Management, select Device Definitions. 2 Right-click in the device definitions panel, and click Add New Plug and Play Device Definition. Type Wireless Network Adapters to rename, and press Enter. 3 Double-click the device definition to edit it. Select Device Class, then select Network Adapters and click OK. 4 Select Device Name. The definition parameter edit dialog box appears. 5 Click Add New and type wireless into the text box. Select the Allow Partial Match option. 6 Click Add New and type wlan into the text box. Select the Allow Partial Match option. 8

9 7 Click Add New and type into the text box. Select the Allow Partial Match option. Click OK twice to complete the definition. 8 In the Navigation Bar under Device Management, select Device Rules. 9 Right-click in the device definitions panel, and click Add New Plug and Play Device Rule. Type Block wireless network adapters when online to rename, and press Enter. 10 Double-click to edit the rule. Select Wireless Network Adapters in the Include column. Click Next. 11 Select Block, Monitor, and Notify User. 9

10 12 For each action, deselect the Offline option. Click Finish. Use case: Making all USB removable storage read-only except authorized devices Assume an organization that purchased a specific brand of encrypted flash drives and would like to restrict the use of all other flash drives. Example 1 In the Navigation Bar under Device Management, select Device Definitions. 2 Right-click in the device definitions panel, and click Add New Removable Storage Device Definition. Type USB Removable Storage to rename, and press Enter. 3 Double-click the device definition to edit it. Select Bus Type, select USB and click OK. 4 Right-click in the device definitions panel again, and click Add New Removable Storage Device Definition. Type McAfee Encrypted USB Devices to rename, and press Enter. 5 Double-click the device definition to edit it. Select Bus Type, select USB Vendor ID/Product ID and click Add New. The definition paramete edit dialog box appears. 6 Click Add New to add each of the following devices: Vendor ID 1A4B 1A4B 1A4B Product ID 022A Description McAfee Standard Encrypted USB McAfee Standard Driverless Encrypted USB McAfee Zero-Footprint Bio 10

11 Vendor ID 1A4B 1A4B Product ID Description McAfee Zero-Footprint Non-Bio McAfee Encrypted USB Hard Disk TIP: Use the mouse to select the Product ID and Description text boxes. 7 In the Navigation Bar under Device Management, select Device Rules. 8 Right-click in the device definitions panel, and click Add New Removable Storage Device Rule. Type Block all USB except McAfee to rename, and press Enter. 9 Double-click to edit the rule. Select USB Removable Storage in the Include column, and select McAfee Encrypted USB Devices in the Exclude column. Click Next. 10 Select Monitor, Notify User and Read Only. Click Finish. Use case: Blocking files containing personal identity information The following example shows how to create a content-based tagging rule that will tag any file containing a social security number, and how to create a removable storage protection rule that will prevent copying these files to removable storage. Example 1 In the Navigation Bar under Rules, select Tagging Rules. Right-click in the tagging rules panel, click Add New Content Based Tagging Rule, and type SSN Tagging Rule to rename the rule. 11

12 2 Double-click the rule to edit it. From the pre-defined list of secured text patterns, check Social Security Number. Click Next. 12

13 3 On the tags page, click Add New, type SSN Tag in the Name text box, click OK, then Finish. 4 In the Navigation Bar under Rules, select Reaction Rules. Right-click in the panel, click Add New Removable Storage Protection Rule, and rename it Block PII copied to removable storage. 5 Double-click the rule to open the wizard. You can skip all of the steps except the following: a On the tags page, select the SSN tag created in step 4. b On the actions page, select Block, Monitor, Notify User, and Store Evidence. Use case: Blocking files created by a GIS application The following example shows how to create an application-based tagging rule that will tag any file that is created or edited by a Geographic Information System (GIS) application, and how to create a removable storage protection rule that will prevent copying GIS files to removable storage. Example 1 In the Navigation Bar under Applications, select Enterprise Applications List. 2 Right-click in the application list panel, and click Add. Browse to the GIS application executable, then click Open. Note the exact executable name. You will need it in the next step. Click Add, then Close. 3 In the Navigation Bar under Applications, select Application Groups. Right-click in the panel, and click Add New Application Group. Type GIS Applications in the Name text box and press Enter. 13

14 4 Double-click the GIS Applications group. Browse to the name of the vendor and select it. Click the plus sign next to the name to view the details. If there are other products by the same vendor you don't want to include in the rule, deselect them. 5 In the Navigation Bar under Rules, select Tagging Rules. Right-click in the tagging rules panel, click Add New Application Based Tagging Rule, and type GIS Tagging Rule to rename the rule. 6 Double-click the rule, select GIS Applications, then click Next. 7 (Optional) Click Select from list, select Graphic files, then click Next three times to reach the Tags page. 8 Click Add New, name the tag GIS Tag, click OK, then Finish. 9 In the Navigation Bar under Rules, select Reaction Rules. Right-click in the panel, click Add New Removable Storage Protection Rule, and rename it Block GIS files copied to removable storage. 10 Double-click the rule to open the wizard. You can skip all of the steps except the following: a On the tags page, select the GIS Tag created in step 6. b On the actions page, select Block, Monitor, Notify User, and Store Evidence. Use case: Disabling all CD/DVD burners from writing Assume an organization wants to restrict engineering end users from using CD/DVD burners to write CDs. McAfee Host Data Loss Prevention is not able to analyze the content written to CD/DVD, therefore removable storage device rules should be used. Limitation: The following CD/DVD burners are not protected in McAfee Host Data Loss Prevention v2.2: 14

15 Alcohol 120% Iomega Hotburn Example 1 In the Navigation Bar under Device Management, select Device Definitions. 2 Right-click in the device definitions panel, and click Add New Removable Storage Device Definition. Type CD/DVD Devices to rename, and press Enter. 3 Double-click the device definition to edit it. Select CD/DVD Drives and click OK to close the definition dialog. 4 In the Navigation Bar under Device Management, select Device Rules. 5 Right-click in the device definitions panel, and click Add New Removable Storage Device Rule. Type Block all CD-R burning to rename, and press Enter. 6 Double-click to edit the rule. Select CD/DVD Devices in the Include column. Click Next. 7 Select Notify User and Read Only. Click Finish. 15

Implementing McAfee Device Control Security

Implementing McAfee Device Control Security Implementing McAfee Device Control Security COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service

Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service Application Note Configuring McAfee Firewall Enterprise for McAfee Web Protection Service This document explains how to configure McAfee Firewall Enterprise (Sidewinder ) to redirect all web traffic to

More information

McAfee Email Gateway 7.x Encryption and IronPort Integration Guide

McAfee Email Gateway 7.x Encryption and IronPort Integration Guide Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption

More information

Total Protection Service

Total Protection Service User Help McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software

Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee Optimized Virtual Environments for Servers. Installation Guide McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation

More information

McAfee Solidcore Change Reconciliation and Ticket-based Enforcement

McAfee Solidcore Change Reconciliation and Ticket-based Enforcement Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Release Notes for McAfee VirusScan Enterprise for Storage 1.0

Release Notes for McAfee VirusScan Enterprise for Storage 1.0 Release Notes for McAfee VirusScan Enterprise for Storage 1.0 About this document New features Known issues Where to find McAfee enterprise product information License attributions About this document

More information

McAfee Risk Advisor 2.7

McAfee Risk Advisor 2.7 Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

epolicy Orchestrator Log Files

epolicy Orchestrator Log Files Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

Recommended Recommended for all environments. Apply this update at the earliest convenience.

Recommended Recommended for all environments. Apply this update at the earliest convenience. Release Notes McAfee Enterprise Mobility Management 11.0 Patch 4 About this document About this release Bug fixes and enhancement Installation instructions Files affected by patch Troubleshooting installation

More information

Release Notes for McAfee epolicy Orchestrator 4.5

Release Notes for McAfee epolicy Orchestrator 4.5 Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator

More information

McAfee VirusScan Enterprise for Storage 1.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x

McAfee VirusScan Enterprise for Storage 1.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x McAfee VirusScan Enterprise for Storage.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x COPYRIGHT Copyright 200 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Agent Handler

McAfee Agent Handler McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into

More information

Release Notes for Host Intrusion Prevention 8.0

Release Notes for Host Intrusion Prevention 8.0 Release Notes for Host Intrusion Prevention 8.0 About this document New features Known issues Finding product documentation About this document Thank you for choosing this McAfee product. This document

More information

Verizon Internet Security Suite Powered by McAfee User Guide

Verizon Internet Security Suite Powered by McAfee User Guide Verizon Internet Security Suite Powered by McAfee User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Solidcore 5.1.0 Product Guide

McAfee Solidcore 5.1.0 Product Guide McAfee Solidcore 5.1.0 Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise

Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise Application Note Configuring Department of Defense Common Access Card Authentication on McAfee Firewall Enterprise McAfee Firewall Enterprise version 7.x and 8.x This application note describes how to

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee epolicy Orchestrator

McAfee epolicy Orchestrator Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be

More information

McAfee EETech for Mac 6.2 User Guide

McAfee EETech for Mac 6.2 User Guide McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2007

Setup Guide. Email Archiving for Microsoft Exchange Server 2007 Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee VirusScan Enterprise 8.8 software Product Guide

McAfee VirusScan Enterprise 8.8 software Product Guide McAfee VirusScan Enterprise 8.8 software Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2010

Setup Guide. Email Archiving for Microsoft Exchange Server 2010 Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee GTI Proxy 1.0.0 Administration Guide

McAfee GTI Proxy 1.0.0 Administration Guide McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

McAfee Total Protection Service Installation Guide

McAfee Total Protection Service Installation Guide McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0 Best Practices Guide McAfee Endpoint Protection for Mac 1.1.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

McAfee UTM Firewall Control Center Product Guide. version 2.0

McAfee UTM Firewall Control Center Product Guide. version 2.0 McAfee UTM Firewall Control Center Product Guide version 2.0 COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

McAfee Data Loss Prevention 9.3.0

McAfee Data Loss Prevention 9.3.0 Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

McAfee Encrypted USB Hard Disk Non-Bio Quick Start Guide

McAfee Encrypted USB Hard Disk Non-Bio Quick Start Guide McAfee Encrypted USB Hard Disk Non-Bio Quick Start Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

McAfee Security for Microsoft SharePoint 2.5.0 User Guide

McAfee Security for Microsoft SharePoint 2.5.0 User Guide McAfee Security for Microsoft SharePoint 2.5.0 User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0 Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

McAfee SiteAdvisor Enterprise 3.5.0

McAfee SiteAdvisor Enterprise 3.5.0 Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Product Guide Revision A. McAfee Total Protection for Data Loss Prevention 9.2 Software

Product Guide Revision A. McAfee Total Protection for Data Loss Prevention 9.2 Software Product Guide Revision A McAfee Total Protection for Data Loss Prevention 9.2 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

Network Threat Behavior Analysis Monitoring Guide. McAfee Network Security Platform 6.1

Network Threat Behavior Analysis Monitoring Guide. McAfee Network Security Platform 6.1 Network Threat Behavior Analysis Monitoring Guide McAfee Network Security Platform 6.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Seagate Media Sync User Guide

Seagate Media Sync User Guide Seagate Media Sync User Guide Seagate Media Sync User Guide 2013 Seagate. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or

More information

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0 Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager SharePoint Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.

About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release. Product Guide McAfee Help Desk 2.0 Software About Help Desk McAfee Help Desk is an extension installed in McAfee epolicy Orchestrator (McAfee epo ). Administrators use McAfee Help Desk to issue challenge/response

More information

McAfee SaaS Email Archiving

McAfee SaaS Email Archiving User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

email-lead Grabber Business 2010 User Guide

email-lead Grabber Business 2010 User Guide email-lead Grabber Business 2010 User Guide Copyright and Trademark Information in this documentation is subject to change without notice. The software described in this manual is furnished under a license

More information

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec

More information

Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS

Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS - About this Document - About this Release - Purpose

More information

McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide

McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

McAfee SiteAdvisor Enterprise 3.5 Patch 2

McAfee SiteAdvisor Enterprise 3.5 Patch 2 Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Product Guide. McAfee SaaS Endpoint Protection 5.2.0

Product Guide. McAfee SaaS Endpoint Protection 5.2.0 Product Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

McAfee Change Control and Application Control 6.0.0 Product Guide For use with epolicy Orchestrator 4.5.0 and 4.6.0

McAfee Change Control and Application Control 6.0.0 Product Guide For use with epolicy Orchestrator 4.5.0 and 4.6.0 McAfee Change Control and Application Control 6.0.0 Product Guide For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

Clickfree Software User Guide

Clickfree Software User Guide Clickfree Software User Guide Last Revised: Nov 2, 2011 Clickfree_backup_software_user_guide_v1.0 Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation.

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

For a list of supported environments for VirusScan Enterprise 8.7i on Microsoft Windows, see (McAfee) KnowledgeBase article KB51111.

For a list of supported environments for VirusScan Enterprise 8.7i on Microsoft Windows, see (McAfee) KnowledgeBase article KB51111. McAfee VirusScan Enterprise 8.7i Repost Patch 5 Release Notes Thank you for using McAfee software. This document contains important information about the current release. We strongly recommend that you

More information

McAfee Host Intrusion Prevention 8.0 Product Guide for use with epolicy Orchestrator 4.5

McAfee Host Intrusion Prevention 8.0 Product Guide for use with epolicy Orchestrator 4.5 McAfee Host Intrusion Prevention 8.0 Product Guide for use with epolicy Orchestrator 4.5 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Using Websense Data Endpoint Client Software

Using Websense Data Endpoint Client Software 1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization

More information

A Buyer's Guide to Data Loss Protection Solutions

A Buyer's Guide to Data Loss Protection Solutions A Buyer's Guide to Data Loss Protection Solutions 2010 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense

More information

McAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6

McAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6 McAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

DP-313 Wireless Print Server

DP-313 Wireless Print Server DP-313 Wireless Print Server Quick Installation Guide TCP/IP Printing (LPR for Windows 95/98/Me/2000) Rev. 03 (August, 2001) Copyright Statement Trademarks Copyright 1997 No part of this publication may

More information

Best Practice Document Hints and Tips

Best Practice Document Hints and Tips Marshal Ltd. Date: 02/06/2007 Marshal EndPoint Security From Best Practice Document Hints and Tips Marshal Software Ltd CSL 005 Marshal EndPoint Security Best Practice (2) Privacy Control: None Version:

More information

PGP Portable Quick Start Guide Version 10.2

PGP Portable Quick Start Guide Version 10.2 PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files

More information

FX-BTCVT Bluetooth Commissioning Converter Commissioning Guide

FX-BTCVT Bluetooth Commissioning Converter Commissioning Guide FX-BTCVT Bluetooth Commissioning Converter Commissioning Guide FX-BTCVT-1 (Bluetooth Commissioning Converter) Code No. LIT-12011665 Issued December 5, 2014 Refer to the QuickLIT website for the most up-to-date

More information

Client Manager for Endpoint Protection (CMEP) User s Guide

Client Manager for Endpoint Protection (CMEP) User s Guide Client Manager for Endpoint Protection (CMEP) July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product

More information

VIRTUAL DESKTOP COMPANION SOFTWARE FOR WINDOWS

VIRTUAL DESKTOP COMPANION SOFTWARE FOR WINDOWS VIRTUAL DESKTOP COMPANION SOFTWARE FOR WINDOWS USER MANUAL 25205A About this Manual Thank you for getting the Boogie Board Sync 9.7 LCD ewriter. This manual will help you with the Sync Virtual Desktop

More information

BUS-WATCH R1001/R4001 Quick Guide Series

BUS-WATCH R1001/R4001 Quick Guide Series Part 1: Video File Source Connection To Review stored video, you must first connect a PC to a video file source. There are 2 ways to connect to the stored video files: Through the Removable Hard Drive

More information

McAfee(R) Email and Web Security Virtual Appliance 5.6 Installation Guide

McAfee(R) Email and Web Security Virtual Appliance 5.6 Installation Guide McAfee(R) Email and Web Security Virtual Appliance 5.6 Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-04 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,

More information

System Status Monitoring Guide. McAfee Network Security Platform 6.1

System Status Monitoring Guide. McAfee Network Security Platform 6.1 System Status Monitoring Guide McAfee Network Security Platform 6.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Creating a Virtual CDFS File Server

Creating a Virtual CDFS File Server Table of Contents Table of Contents Introduction 1 Foreword... 1 Legal Notices... 2 Document Conventions... 2 What Virtual CD FS can do for you... 3 New Features in Version 9... 4 Virtual CD FS Licensing...

More information

Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual

Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual Contents For AP v2.10.0.0 Release For Windows 98/ME/2000/XP Version 1.1B (08/27/2004) Contents...1 Introduction...1 Features & Specifications...2

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

McAfee Host Data Loss Prevention Administration Intel Security Education Services Administration Course

McAfee Host Data Loss Prevention Administration Intel Security Education Services Administration Course McAfee Host Data Loss Prevention Administration Intel Security Education Services Administration Course The McAfee Host Data Loss Prevention (DLP) Administration course provides attendees with in-depth

More information

Anti-Spyware Enterprise Module software

Anti-Spyware Enterprise Module software Anti-Spyware Enterprise Module software version 8.0 Guide What is the Anti-Spyware Enterprise Module? The McAfee Anti-Spyware Enterprise Module is an add-on to the VirusScan Enterprise 8.0i product that

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

Setting Up Email on Your Palm. Treo 700wx Smartphone

Setting Up Email on Your Palm. Treo 700wx Smartphone Setting Up Email on Your Palm Treo 700wx Smartphone Intellectual property notices 2006 Palm, Inc. All rights reserved. Trademark, copyright, patent, and other intellectual property notices are set forth

More information

File Management and File Storage

File Management and File Storage File Management and File Storage http://training.usask.ca Information Technology Services Division Table of Contents File Management at the University of Saskatchewan...3 Introduction...3 Creating Files

More information