Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.
|
|
- Lucas Garrison
- 8 years ago
- Views:
Transcription
1 Collax Web Security Howto This howto describes the setup of a Web proxy server as Web content filter. Requirements Collax Business Server Collax Security Gateway Collax Platform Server including Collax Web Security module Optional Collax Surf Protection powered by Cobion Collax Virus Protection powered by Kaspersky Collax AntiVir Protection powered by Avira Objective If various user groups in a network are to be granted different permissions for Internet access and content, it is necessary to define Web content filter rules. Depending on the needs, these filter rules can be expanded into complex rule sets. Based on a practical example, this document demonstrates the basic creation of such rule sets on a Collax Business Server. Task A medium-sized enterprise wants to implement different Web page access rules for its employees. The management and the administrators are to have full access to all Web pages. For the employees, certain categories are to be excluded. The trainees' access is to be limited to wikipedia.org and the company Web site. Moreover, all HTTP traffic is to be screened for viruses. The anti-virus solution Collax Virus Protection powered by Kaspersky serves this purpose. Solution Basically, the rule set can be configured in three different ways: 1. Authentication directly with the Web proxy by entering the login and password of the user on the CBS. 2. Authentication with the Active Directory (AD) server. The client logs on to the Windows domain. The CBS must be a member of the Windows domain. Three groups containing all users of the network must be created on the AD server (for our example), i.e. the Windows domain must not contain any users that do not belong to one of these three groups. Otherwise, such users would have the same permissions as the administrator group. 3. Distinction on the basis of the IP addresses of the individual clients. This method does not require any authentication. This howto only explains the solution of option 1. First, create three groups: Proxy_Management Proxy_Employees Proxy_Trainees 2014 Collax GmbH Status:Final Version:5.8 Date: November 20, 2014
2 Distribute the created users to the groups. Please note that users that do not belong to any proxy group will be granted the permissions of one of these groups. It is not possible to determine exactly which one this will be. Important: For this reason, every user must be allocated to one of these groups. The "LocalNet" must be allocated to at least one group. Subsequently, activate the Web proxy under "Services Infrastructure Web Proxy Web Proxy Server" and configure the basic settings. address of the proxy admin If an error occurs, the proxy server will display a Web page with an error message. This Web page shows the address of the local administrator. Specify the address in this field. Do not enter any groups under "Policy Settings", as we want to set up the Web proxy with authentication. Collax Web Security Howto 2/8
3 Basic Settings The image below shows the basic configuration of the Web proxy server. Maximum cache size (MB) Use this parameter to set the maximum size of the cache on the hard disk. The value should be larger than 128 MB. The maximum value is MB (10 GB). Depending on the speed of the disk system, there is a limit after which the cache becomes slower. Normally, a value between 512 MB and 2 GB should be suitable. Note: Enter the numeric value in MB without specifying the unit. Additional SSL/TLS ports As a general rule, the HTTP proxy cannot cache HTTPS requests, as it is unable to read the encrypted data. However, the CONNECT method can be used to forward HTTPS data over the proxy; this method enables a client to establish an indirect connection to an HTTPS server. However, the HTTP proxy cannot verify whether the connection really is an HTTPS connection. Therefore, only certain ports are permitted for the CONNECT method, namely 443, 563, and In this field, you can specify additional ports for use with the CONNECT method. For example, to access other Collax servers over the proxy, "8001" must be entered here additionally. Maximum request size (kb) This setting limits the size of individual requests to a Web server. In this way, you can limit the size of files that may be sent to a Web server. By default, this field is blank, i.e. the size of requests is not limited. Maximum reply size (kb) This setting limits the size of files that may be downloaded over the proxy. By default, this field is blank, i.e. the size is not limited. Collax Web Security Howto 3/8
4 Note: If the value is too small, the proxy may be unable to reply. If an error message of the proxy is larger than the maximum reply size, no message will be displayed in the event of an error. For this reason, entries smaller than 10 kb will be set to 10 kb. Log proxy activity If you enable this option, all requests will be logged. The date, time, client IP number, and the requested URL will be stored in the log file. If user authentication is enabled, the login will also appear in the log file. Note: These user-specific data may be subject to legal provisions and privacy laws. If applicable laws prohibit logging, do not enable this function. Enable log analysis Enable this option to generate a statistical analysis from the log files. The analysis is anonymized, i.e. URLs are not clearly associated with users. However, it provides information about the entire traffic of a user or system. Anonymize HTTP header If you enable this option, the proxy will remove certain HTTP headers from the requests forwarded to the outside. Number of redirector programs In this field, enter the number of processes that the Web proxy starts for processing URL requests. The redirect program is started several times in order to be able to process incoming URL requests concurrently. The number can be increased if the processing of requests is delayed. The respective log messages can be viewed by specifying the "squid" program under "Status/Maintenance Status System System Log Files". Example: Consider increasing the number of redirector processes to at least ## in your config file. Enable BASIC authentication The simplest method for authenticating users is the BASIC method. When a user wants to access Internet pages through the Web proxy, the user details are queried via a pop-up. No further settings are required on the workstation. Enable NTLM authentication This method will only work if the SMB/CIFS service is activated and can be used to implement single sign-on with older operating systems and Web browsers. The workstations must have joined an NT domain or AD (does not apply to Windows Server 2008). Collax Web Security Howto 4/8
5 Enable Kerberos authentication (SPNEGO) This method enables Windows, Linux, and MacOS users to log in to the Web proxy via single sign-on in a Kerberos realm. With this method, Windows workstations within an Active Directory are automatically authenticated via single sign-on. Activate parent proxy Enable this option to use a parent proxy. Proxy servers can be connected in series. The client sends the request to a proxy in the local network, which in turns queries another proxy server, e.g. the provider's proxy server. The parent proxy is such a superordinate system. In the last section, you can enter networks and domains for which the proxy is not to be used. Browsers with JavaScript support can automatically be configured for proxy use. For this purpose, the URL of a JavaScript file must be specified in the browser configuration. The configuration file "proxy.pac" is generated from the settings in this dialog and saved to the directory of the Web server. No proxy for names without domain Enable this option in order not to use a proxy if the host name does not contain any domain, i.e. when addressing a server in the local domain. No proxy for these domains Here you can specify a list of domains for which no proxy is to be used. The domains in the list are separated by spaces. No proxy for these networks Here you can select the networks for which no proxy is to be used. Rules This dialog is located under "Services Infrastructure Web Proxy Web Security Rules". The filter rules for the Web-proxy server are defined in this dialog. A rule determines which URL lists are valid at what times and whether the URLs in the lists are blocked or allowed. The groups for which the rules are to be valid can be defined in the usage policy. Several rules may apply to one group. The sequence of the rules is governed by different priorities. If a URL matches several rules, the rule with the highest priority will be used. Normally, you should either allow everything and block only specific URLs or block everything and allow specific URLs. This policy should be set in the existing "All" rule. The "All" rule should be the last rule with the lowest priority. The Collax Surf Protection and Dansguardian lists are used to make it easier for the administrator to configure the rules. In these lists, many URLs are grouped by subjects. The administrator can select the categories that are to be prohibited for the employees. To activate the Collax Surf Protection, you need a license key that can be obtained from Collax. After the activation, create your individual Cobion lists under "Services Infrastructure Web Proxy Web Security Cobion Lists". Collax Web Security Howto 5/8
6 To use the Dansguardian lists, install them under "Status/Maintenance Software Licenses and Modules". To perform the installation, click the plus after "Dansguardian". For the trainees, define a "Custom List" with the two URLs "collax.com" and "wikipedia.org" under "Services Infrastructure Web Proxy Web Security Custom Lists". Next, create the needed rules under "Services Infrastructure Web Proxy Web Security Rules". Use descriptive names. Under the "Policy Settings" tab, you can select the groups to which this rule is to apply. Perform this step for each defined proxy group. Collax Web Security Howto 6/8
7 The overview shows the list of rules, sorted by priority. For each group (except for the Proxy_Management group in this example), at least one group that implements restrictions (priority 2, 4, and 5) must be created. Finally (for each group), there is a global rule (3, 6, and 7) that allows or prohibits everything. The rules should always be created in such a way (or, if created retroactively, they should be moved in such a way) that all rules for the first group are listed consecutively, then all rules for the second group, etc. The field "Process further rules" must be set to "Yes" for all rules above the concluding global rule. For example, consider the rules for the employees. 1. Rule 4 contains the whitelist of domains that should always be allowed, e.g. the home page. As further rules for this group will follow, check "Process further rules". 2. Rule 5 contains the Dansguardian and Cobion lists that should always be prohibited for the employees. Here too, check "Process further rules". 3. Rule 6: Concluding global rule. This rule applies to "all domains" and allows access to pages not prohibited by the previous rules. For this group, no further rules need to be processed. Access Alert Typical message for a prohibited page: Access denied The access to the document under is included in the "none ()" list. The URLs in this list are currently blocked for all members of your group due to the rule "Trainees_Prohibited_group ()". Please contact your administrator if you believe that an error has occurred. To eliminate the problem, the following details may be required: User Trainee_1 Host Host IP URL list none Rule Trainees_prohibited_group Collax Web Security Howto 7/8
8 Virus Protection First of all, a license needs to be obtained for Collax Virus Protection and Avira AntiVir Protection. Install the software via "Status/Maintenance Software Licenses and Modules". Moreover, you can use the free Web filter from ClamAV. Now simply activate the virus protection under "System Infrastructure Web Proxy Web Security Anti-Virus Web Filtering" to automatically apply it to all accessed HTTP pages as long as the Web proxy is used. SSL Interception This dialog is located under "Services Infrastructure Web Proxy Web Proxy Server" in the options. Normally, the content of encrypted HTTP traffic (HTTPS) cannot be evaluated or filtered, as encryption is used between the Web server and the browser. In this section, you can configure settings that enable the Web proxy to intercept this encrypted traffic, e.g. to analyze the content for malware or unwanted contents. Collax Web Security Howto 8/8
Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module
Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common
More informationCollax Active Directory
Collax Active Directory Howto This howto describes the configuration of a Collax server for joining a Windows Active Directory Service (ADS) domain. Furthermore, this howto focuses on how to set up the
More informationSecurity IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
More informationVolume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More information800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410
800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment
More informationSecure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationTIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
More informationTIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
More informationHow to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
More informationSecure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationContents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
More informationqliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
More informationCarisbrooke. End User Guide
Carisbrooke Contents Contents... 2 Introduction... 3 Negotiate Kerberos/NTLM... 4 Scope... 4 What s changed... 4 What hasn t changed... 5 Multi-Tenant Categories... 6 Scope... 6 What s changed... 6 What
More informationWeb Remote Access. User Guide
Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior
More informationKerio WinRoute Firewall Features Summary and Simple Setup Guide (for version 6.x)
Kerio WinRoute Firewall Features Summary and Simple Setup Guide (for version 6.x) Network setup and KWF installation/administration Before Installing Manual TCP/IP configuration on the firewall host DHCP
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationVersion 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform
Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically
More informationPOP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
More informationCollax E-Mail Archive
Collax E-Mail Archive Howto This howto describes how a Collax server can easily be set up as an e-mail archive in order to enable team members to access their own e-mail archive. Additionally, auditor
More informationConfiguring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
More informationENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
More informationDescription of Microsoft Internet Information Services (IIS) 5.0 and
Page 1 of 10 Article ID: 318380 - Last Review: July 7, 2008 - Revision: 8.1 Description of Microsoft Internet Information Services (IIS) 5.0 and 6.0 status codes This article was previously published under
More informationSurfCop for Microsoft ISA Server. System Administrator s Guide
SurfCop for Microsoft ISA Server System Administrator s Guide Contents INTRODUCTION 5 PROGRAM FEATURES 7 SYSTEM REQUIREMENTS 7 DEPLOYMENT PLANNING 8 AGENTS 10 How It Works 10 What is Important to Know
More informationNETASQ ACTIVE DIRECTORY INTEGRATION
NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos
More informationEmailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password
Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol
More informationwww.stbernard.com Active Directory 2008 Implementation Guide Version 6.3
800 782 3762 www.stbernard.com Active Directory 2008 Implementation Guide Version 6.3 Contents 1 INTRODUCTION... 2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION... 3 2.1 Supported
More informationApp Orchestration 2.0
App Orchestration 2.0 Configuring NetScaler Load Balancing and NetScaler Gateway for App Orchestration Prepared by: Christian Paez Version: 1.0 Last Updated: December 13, 2013 2013 Citrix Systems, Inc.
More informationReporting Installation Checklist
This checklist is designed to help you before and during your Websense Enterprise Reporting installation. Print this checklist for reference as you prepare for and perform the installation, especially
More informationVMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
More informationSSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
More informationSecuring access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
More informationConfiguring Global Protect SSL VPN with a user-defined port
Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure
More informationUser's Manual. Intego Remote Management Console User's Manual Page 1
User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
More informationhttp://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationDecryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationBusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 How to configure an Internet Information Services server as a front end to a WebLogic application server Overview Contents This document describes the process of
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationQuickstart guide to Configuring WebTitan
Quickstart guide to Configuring WebTitan 1. Install the License Once you have received the evaluation license by e-mail, you log on to WebTitan as follows using a browser as admin/hiadmin. Then navigate
More informationAuthentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
More informationpfsense Captive Portal: Part One
pfsense Captive Portal: Part One Captive portal forces an HTTP client to see a special web page, usually for authentication purposes, before using the Internet normally. A captive portal turns a web browser
More informationSETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.
SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. 1. Setting up your network to allow incoming connections on ports used by Eyemax system. Default ports used by Eyemax system are: range of ports 9091~9115
More informationCYAN SECURE WEB APPLIANCE. User interface manual
CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network
More informationRebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
More informationSetup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account.
Setup Corporate (Microsoft Exchange) Email This tutorial will walk you through the steps of setting up your corporate email account. Microsoft Exchange Email Support Exchange Server Information You will
More informationBlue Coat Security First Steps Solution for Integrating Authentication
Solution for Integrating Authentication using IWA Direct SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationBarracuda Web Filter Demo Guide Version 3.3 GETTING STARTED
Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware
More informationUser Guide. Cloud Gateway Software Device
User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).
More informationUSG40HE Content Filter Customization
USG40HE Content Filter Customization This guide is designed to help with the setup of the ZyWALL s content filtering feature. Supported Devices USG40HE Firmware version 4.10(AALA.0) or later Overview Content
More informationGetting Started Guide
Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional
More informationFTP, IIS, and Firewall Reference and Troubleshooting
FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the
More informationNETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationAdministrator Guide. v 11
Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main
More informationHosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone
More informationKaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationConfiguring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
More informationObjective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
More informationISA Server Plugins Setup Guide
ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationFilter Avoidance and Anonymous Proxy Guard
March 21, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Filter Avoidance and Anonymous Proxy Guard Filter Avoidance The award winning XLi technology
More informationDynamic DNS How-To Guide
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
More informationAccessing TP SSL VPN
Accessing TP SSL VPN This guide describes the steps to install, connect and disconnect the SSL VPN for remote access to TP intranet systems using personal notebooks. A. Installing the SSL VPN client Junos
More informationHosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationContents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10
Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...
More informationGroup Management Server User Guide
Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring
More informationIntegrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationTenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
More informationNETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
More informationPC-Duo Web Console Installation Guide
PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks
More informationCYAN Secure Web Microsoft ISA Server Deployment Guide
February 2010 Applies to: CYAN Secure Web 1.7.18 and above Table of Contents 1 Introduction...2 2 Prerequisites...3 3 Deployment scenarios...4 3.1 Variant 1: CYAN Secure Web is downstream proxy...4 3.2
More informationManaged Antivirus Quick Start Guide
Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt
More informationAVG Business Secure Sign On Active Directory Quick Start Guide
AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and
More informationSpam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationF-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
More informationTECHNICAL TRACKSNETWORKING ESSENTIALS OPPORTUNISTIC LOCKING
OPPORTUNISTIC LOCKING Opportunistic Locking is a feature within Windows NT-based computers such as Windows NT 4, Windows 2000, and Windows XP Professional. Windows XP home edition, which is based on the
More informationFileMaker Server 13. Getting Started Guide
FileMaker Server 13 Getting Started Guide 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
More informationCiphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
More informationCitrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
More informationDESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO
DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download
More informationInstallation Procedure SSL Certificates in IIS 7
Installation Procedure SSL Certificates in IIS 7 This document will explain the creation and installation procedures for enabling an IIS website to use Secure Socket Layer (SSL). Check IIS for existing
More informationDeploying the BIG-IP System with Oracle E-Business Suite 11i
Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system
More informationUser Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
More informationApp Orchestration 2.5
Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load
More informationSecure Web Gateway 11.5 Release Notes
Trustwave is pleased to announce the release of Secure Web Gateway version 11.5. Review the Release Notes below for further information. Contents New Features... 1 General Enhancements and Bug Fixes...
More informationCyclope Internet Filtering Proxy
Cyclope Internet Filtering Proxy - Installation Guide - Cyclope-Series - 2010 - Table of contents 1. Overview - 3-2. Installation - 4-2.1. System requirements - 4-2.2. Cyclope Internet Filtering Proxy
More informationSchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
More informationCLEARSWIFT SECURE Web Gateway HTTPS/SSL decryption
CLEARSWIFT SECURE Web Gateway HTTPS/SSL decryption Introduction This Technical FAQ explains the functionality of the optional HTTPS/SSL scanning and inspection module available for the Web Gateway and
More informationInstalling GFI Network Server Monitor
Installing GFI Network Server Monitor System requirements Computers running GFI Network Server Monitor require: Windows 2000 (SP4 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5
More informationCYAN SECURE WEB HOWTO. NTLM Authentication
CYAN SECURE WEB HOWTO June 2008 Applies to: CYAN Secure Web 1.4 and above NTLM helps to transparently synchronize user names and passwords of an Active Directory Domain and use them for authentication.
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationDocufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
More informationConnecting Software. CB Mobile CRM Windows Phone 8. User Manual
CB Mobile CRM Windows Phone 8 User Manual Summary This document describes the Windows Phone 8 Mobile CRM app functionality and available features. The document is intended for end users as user manual
More informationWebsense Web Security Gateway: What to do when a Web site does not load as expected
Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.
More information