Administrator Quick Start Guide

Size: px
Start display at page:

Download "Administrator Quick Start Guide"

Transcription

1 Administrator Quick Start Guide -

2 Index 1. Cloud Firewall Introduction 2. Licensing model 3. Initial Cloud Firewall configuration 3.1 Cloud Firewall Inbound filtering Domain configuration Mailbox configuration Manual mailbox configuration Importing mailboxes from lists Automatic user provisioning using SMTP Automatic user provisioning using LDAP (Active Directory) Platform customization Configuring the MX records in the DNS Additional security configuration (Firewall) 3.2 Cloud Firewall Outbound filtering 3.3 Configuring SPF records in the DNS 4. Additional information 5. Contact

3 Administrator Quick Start Guide 1. Cloud Firewall Introduction Cloud Firewall is a security solution for based on the concept of software as a service (SaaS). This concept lets companies focus on their core business, freeing the from the management tasks and operating costs associated with traditional security solutions. Cloud Firewall consists of a multilayer system which combines protection filters and processes using proprietary technologies (Cloud Firewall proactive, trusted lists...) and as standard technologies (IP reputation, Bayesian networks, white lists and black lists, grey lists, traffic shaping...) to ensure maximum effectiveness. By removing spam, viruses and phishing - with more than ten different filters -, it not only reduces the load on the server but also mitigates productivity problems caused by employees deleting spam. In addition connection filters, there are two filtering modes: automatic mode and guaranteed mode. Cloud Firewall has an interface which is intuitive and easy to set up, allowing administrators to rapidly start up the protection components required to ensure the company s security. Some of the funcionalities of Cloud Firewall are: Central Setup Easy Management Multilayer Antispam Incoming Backup - Users registration Manual Importing from a file LDAP callout with Alias discovery SMTP callout logs with the possibility of open s (if you choose this option when you Purchase), add senders / IP s to white list / blacklist, classify s as Valid / Spam Cluster active-active avoiding any information lost in case of incidence Administrators per domain Trusted lists by User Customized filters Notification software

4 2. Licensing model Cloud firewall is subscribed as a service and every mailbox protected by the solution will require a license from the license pool available on the service. The administrator can review the number of licenses being used and available under Administration -> Status -> State of Subscription: In order to obtain the total number of licenses needed for your organization, the following points need to be considered: Alias Domains In case the platform is protecting an existing domain (i.e. spaminatesting.com ) with users already created under that domain already consuming licenses in the system and in case you have another domain that is an alias of that existing domain (we assume that all users in the alias domain will be the same users already existing in the main domain), the alias domain can be configured as an alias of the main domain. All users present in the main domain will be implicitly configured in the alias domain and these users will not consume an extra license. - Alias accounts Each license of the solution will protect one mail mailbox and up to 5 aliases addresses associated to the main mailbox consuming the license. In order to associate the alias accounts covered by a single license in the system, it is required that alias addresses are properly configured in the system. Alias accounts can be configured manually (section ) or using LDAP Automatic Sign-up mode when enabling Alias search in the LDAP configuration. Bear in mind that alias discovery is not an available option when using SMTP automatic Sign-up mode and therefore LDAP provisioning is advised in organizations with alias addresses. In case your organization has alias mailboxes protected by the solution and in case those alias accounts are not properly configured as alias in Cloud Firewall configuration, the platform will consume a license for those alias mailboxes.

5 3. Initial Cloud Firewall configuration This quick configuration guide covers the initial steps needed to protect your domains and mailboxes for your users. All configuration steps detailed in this guide are to be performed using the enterprise management interface of Spamina s Cloud Firewall. Access to your enterprise management interface should have been provided to you along with this quick configuration guide. The enterprise management interface can be accessed from this URL: https:// firewall.spamina.com/admin using your unique credentials provided to you. Please review the access URL for your account as provided to you in the welcome sent to the address of the administrator. Your access URL may vary. All steps described in this are mandatory in order to setup Cloud Firewall with the domains and mailboxes that will be protected by the solution. Please note that configuration covered in section 3.1 is mandatory and, in case the steps detailed in this guide are not fully completed before forwarding inbound s to the Cloud Firewall solution, both inbound and outbound s will be bounced back with a permanent error code. This will have the final effect of s never being delivered to the destination users, so we advise to read through this guide and perform all the configuration steps for domains and users to be protected. Section concerning outbound filtering (3.2) is optional in case you do not requiere Cloud Firewall to perform outbound filtering for your organization. Section covering security (3.1.6) is also optional. 3.1 Cloud Firewall Inbound Filtering The following steps should be completed to protect inbound s arriving to your organization: - Configuration of domain(s) to be protected by the platform. Configuration of mailboxes to be protected by the platform. Initial customization of Cloud Firewall, in case you want to change the look and feel of the user interface and the communication sent to mailboxes protected by the platform. DNS MX redirection to Cloud Firewall so will flow through the solution. This sectin will provide detailed instructions for each configuration step.

6 3.1.1 Domain configuration First configuration step is to configure in the platform the domain or domains that will be protected by Cloud Firewall. This configuration is done under Administration -> Domains. For each domain to be protected by the solution, we need to configure a new domain clicking on New Domain : The information required for each new domain is as follows: Select the checkbox The domain to be registered is an alias in case the domain you are configuring is an alias domain of another existing domain already configured in the platform. Enter the name of the domain to be protected under Name (ie: spaminatesting.com). A contact address is required. Notifications generated by the platform related to this domain will be sent to the specified address (such as the user synchronization process or in case the domain has reached the maximum allowed number of licenses). We recommend using an external address, as notifications stating that the mail server are unreachable will be sent to this notification address. You can limit the maximum number of licenses that will be consumed by users provisioned in this domain. You can select the default language that will be used for this domain. All end user notifications as well as the end user management interface for users created under this domain will be available in the specified language as a default. - After configuring this section, you need to configure the host or IP address where Spamina Cloud Firewall will deliver inbound s after being filtered. This hostname or IP address will be the current address whre your server hosting the mailboxes of the specified domain is located. Bear in mind that in case you have not yet redirected your DNS MX records to the Spamina filtering solution, you can fetch your current server location into the Recipient Server settings by clicking on Get SMTP. Please make sure that the Recipient Server settings are pointing to the current location of the server whre the mailboxes for the configured domain are hosted before saving the configuration.

7 The platform allows the configuration of several MX hosts and each of them can be configured with a different priority. Make sure that the Priority field is set to something different than 0 and consider that configured hosts with lower priority will be preferred when delivering inbound to your organization. Once all MX hosts have been properly configured, make sure to run the test SMTP check to ensure that the platform can contact the specified MX hosts. Please review the firewall settings at your organization in case this check fails, and make sure connectivity to the configured MX hosts on port 25 is allowed from Spamina s Cloud. The source IP address for delivery to your organization will be always performed from the following set of IP address belonging to Spamina s Cloud Firewall service: / / /24 Please review the latest IP addresses ranges under your administrator management console under the Manuals -> Configuration information section. After configuring the Recipient servers, you may now save the configuration for your protected domain or you may define a Domain Administrator at this point. A domain administrator will have the specified access credentials to the administration interface located under https:// service.spamina.com/adminb and will be able to change configuration settings only for the domain being configured in this section. Once all fields have been configured, save the domain configuration and proceed to the next step: Mailbox Configuration

8 3.1.2 Mailbox configuration Spamina Cloud Firewall requires that all mailboxes that will be protected by the platform are configured in the system. If you do not configure the mailboxes protected by the solution (either manually or setting up an automatic Sign-up mode), Spamina will reject inbound and outbound s with a permanent error code to/from your organization. Mailbox (also known as User) configuration can be achieved in different ways: Manual User configuration: The administrator can manually provision the mailboxes (or alias addresses) individually. The administrator can also import a list of users (TXT or CSV format). Automatic Sign-up configuration: Each domain being protected by the solution can be configured to automatically add user mailboxes using two different methods: SMTP or LDAP. Both provisioning mechanisms can coexist in the solution. The administrator may configure manually some mailboxes and have, at the same time, the automatic sign-up mode in the domain being protected Manual User configuration Mailboxes that will be protected by the solution can be added manually using the management interface under Administration -> Users. Using this screen, the administrator can create users with a main canonical address (primary delivery address) and alias addresses linked to another main delivery address already existing in the system. In order to create the main address of a user in the system, click Create User : the following minimum information required in order to provision a new user in the system is: Domain: A domain should be selected from the drop down list of already provisioned domains in the system. This will be the domain of the main address of the user to be protected. Language: IDefault language for this user. This will be the language for all the system generated notifications for the user. By default the system will select the language choosen at the time the domain of the address was configured. Full Name: This information is used for administration purposes in order to list the users by their real name and surname instead of the address being configured.

9 User Login: This will be the address for the users being created. You only need to enter the name of the mailbox, as the domain will be selected from the Domain field. Password: The system requieres each user to have a password for accessing the End User management interface on the system. Using the previous exemple we will be provisioning the following mailbox to be protected by the platform: homer. Once details about the user to be protected are entered in the platform, you need to save the configuration. Back in the User menu, the administrator can create an alias address linked to a main mailbox created previously by clicking on Create user alias : The following minimum information is required in order to create an alias address account bound to a main delivery address: Domain in which Alias will be created: This will be the domain hosting the alias address. It is not necessary that the domain in which the alias account is to be created is the same as the domain hosting the main delivery address. Main Domain: Domain hosting the main delivery address to which we want to link the alias address being created. Alias: Name of the alias account to be protected by the solution, without and the domain part. Main Account: The main delivery address we will be binding the alias to the main account must have been created previously on the system.

10 The following example will create the alias address bound to the main address account Once the alias details have been entered you can save the configuration Importing Mailboxes from lists Cloud Firewall allows the administrator to manually import a list of users into the system using files. This can be done from Administration -> Users -> Import : Before performing the users import, we need to prepare a file containing the name of the mail (and alias) addresses that will be protected by Cloud Firewall. The file to import could be a.csv or a.txt having the following format: Full name, address, password Full name, address The password and the comma separated list of aliases are optional. If no password is given, Spamina Cloud Firewall will auto generate one at the time the user is imported into the system. Please consider the following tips in case you want to specify the passwords for your users in the file to be imported: Lowercase and uppercase letters a to z, except ñ Numbers 0-9 Symbols allowed: _. - Minimum length of 8 characters and a maximum of 64 characters

11 The address present in the file to be imported can be specified in any the following two formats: 1. Including the domain the mailbox belogs to: In this scenario, a valid example of the contents of a file to be imported would be: Michael Perk, aras249gt Anthony Perkins, 32kios5d Timothy Perkins, Anthony, 2. Not including the domain the mailbox belongs to: In this scenario, a valid example would be: Michael Perk, mperk, aras249gt Anthony Perkins, aperkins, 32kios5d Timothy Perkins, tperkins Anthony, alopes,,alopes.alias1,alopes.alias2 It is important to select the domain under which the users will be imported in case the address specified in the file do not specify the domain (case 2 as presented above). If the domain is present in the file to be imported, it is mandatory that you leave the Select a domain field empty in the import menu as the import process will fail otherwise. You cannot import a file which has addresses both with and without a domain. Taking the previous points into consideration when creating the file to import, select the file in using the import menu and click on import. Please bear in mind that the import process is not performed real time and it will take several mnutes to complete depending on the number of users to be imported. Cloud Firewall will notify the system administration via , sending a summary detailing the result of the import process Automatic user provisioning using SMTP Spamina Cloud Firewall can be configured to automatically sign-up users using the SMTP protocol. Using this automatic provisioning mechanism, users that are not currently present in the system will be automatically provisioned at the time the first inbound is processed for the user present in a domain being protected by the solution. Automatic SMTP provisioning of users can be configured under Administration -> Sign-up mode. SMTP automatic sign-up is configured on a per domain basis as follows:

12 Once SMTP activation mode has been selected and the configuration is saved, the system will request the administrator to enter a valid address of a user existing in the domain being configured for automatic sign-up mode. This check verifies whether the server being protected is valid for SMTP automatic provisioning. In case you enter a valid address existing in the domain being configured for SMTP sign-up provisioning and if the check fails, the server may not be suitable for SMTP automatic sign-up mode. This verification may fail in case the client server is configured to accept - at SMTP level - all addresses, event the ones for non-existing users in the organization. In Microsoft Exchange terms this is also known as Recipient Validation and, if disabled, will accept all addresses for a domain. Recipient validation must be enabled in order for Spamina s Cloud Firewall to properly provision users via the SMTP automatic sign-up mode. Please double check with your administration to ensure that your mail server is rejecting s - at SMTP level - for non existing addresses at your domain. The system will not allow you to configure SMTP Automatic Sign-up mode in case the previous check fails. Once SMTP automatic sign-up mode has been configured, the system will provision users automatically at the time s are processed by the platform for those users. This means that shortly after the SMTP automatic sign-up mode has been enabled, the administrator will not immediately see the complete set of users provisioned in the management interface (under Administration -> Users). Cloud Firewall user database will be built up progressively, as new users keep receiving s from the internet through Cloud Firewall. One essential point that must be taken into account when enabling the SMTP automatic sign-up mode is that all mail addresses for your organization, regardless whether they are main mailboxes or alias addresses, will be provisioned as a main mailbox in Spamina s Cloud Firewall, consuming a license form the system. Bear in mind that this is an important consideration when computing the license consumption by the system. In case your organization is making an extensive use of alias mailboxes, we recommend enabling the LDAP provisioning is able to discover alias addresses and therefore license consumption will be more accurate Automatic user provisioning using LDAP (Active Directory) Another auto provisioning mechanism available in the platform is the use of LDAP queries against the directory service present inside the client s network. This is the advised sign-up mechanism to be used for medium to large corporations. The main difference between both automatic sign-up modes, SMTP and LDAP, is that LDAP provisioning is capable of detecting alias addresses and binds them automatically to a main mailbox, both for management and proper license consumption purposes. LDAP sign-up mode can be enabled globally (for all domains) or on a per domain basis. We recommend configuring LDAP provisioning globally - across all domains - whenever possible, this is, when all domains being protected by the solution are governed by the same domain controller or directory server. You may configure different LDAP servers in case your organization has independent domain controllers or directory servers per domain.

13 The minimum requirements needed to configure the LDAP user sign-up are as follows: Spamina s Cloud Firewall cloud servers need access to your directory servers (Active Directory / Lotus / LDAP) using any of the customer s public Ip adresses or using a fully qualified domain name that is visible on the internet. Spamina s Cloud Firewall cloud servers will query your directory servers using the LDAP or LDAPS protocols Spamina s Cloud Firewall cloud servers can do anonymous LDAP queries, although we recommend using the credentials of a specifically created user for this purpose. The IP address range of Spamina s cloud servers from which we will be querying the end customer directory server is as follows: / / /24 Please review the latest IP addresses ranges under your administrator management console under the Manuals -> Configuration information section. We require that the customer allow LDAP or LDAPS connections from the IP address ranges specified above. When configuring the LDAP user sign-up mode with Active Directory, it is required that a user is created in the Domain Controller. This user needs to belong to the Domain Users group and the system requires the credentials of that user to be configured. Please perform the following action in the primary domain controller of your organization to create this user: 1. Create a specific user belonging to the Domain Users group. 2. The password assigned to the user must contain alphanumeric characters and the _ and - symbols only. Please do not use any other characters as the password for this user. 3. When creating the user, please specify that the password does not need to be changed by the user and that the password never expires. This is essential, as most of the issues reported by customers using LDAP user sign-up mode are due to the fact that the password as configured in Spamina s Cloud Firewall is no longer valid as it expired on the customer directory service. Once this specific user has been created in your Domain Controller, you need to get the path to the Distinguished Name for that user. Just open a command line window on your Domain Controller (Start -> Run -> cmd) and run the following command: dsquery.exe user name [USER] In case the new user created was named spamina, here is the command that must be run on the domain controller and the output returned: dsquery.exe user name spamina CN=spamina,CN=Computers,DC=dctest,DC=local The user to be configured in the LDAP sign-up mode management interface will be the path as returned by the previous command: CN=spamina,CN=Computers,DC=dctest,DC=local. Please copy that information from the command line tool. Once the user has been configured and the Distinguished name of the user obtained, the LDAP user sign-up mode can be configured under Administration -> Sign-up mode -> LDAP [Setup]

14 The following section will describe the most common configuration options used when configuring LDAP sign-up mode with Microsoft Active Directory: LDAP Server: Please select the correct directory server type used in your organization. In this guide we will be using Active Directory Connection: Host: Enter the IP address or FQDN of your LDAP server. Please note that this IP/FQDN for your directory service must be reachable from Spamina s IP address ranges Port: 389 (default) Anonymous Connection: [Unchecked] As Microsoft Active Directory does not allow anonymous connections this option must be left unchecked. Username: A valid CN path must be entered in this box. Using the previous steps, we can enter the CN path as returned by the dsquery.exe command run on the domain controller CN=spamina,CN=Computers,DC=dctest,DC=local Password: Enter the password choosen for the user created following the previous example: Once all data has been properly entered in this configuration section, the administrator can validate the current values by clicking on the check button. This test will validate that the host and port specified can be reached by Spamina s cloud servers and that the credentials provided are valid. Please double check that connectivity is allowed from Spamina s cloud servers to your infrastructure in case you get connection errors. Search Scope: DN Base: Starting point in the LDAP tree from where Spamina s Cloud Firewall look for users in your organization. It is recommended to configure a starting point as possible from your organization s tree root, so all users will be found regardless of the organizational unit they are configured on. The DN Base can be obtained from the CN of the user created in our previous example. When configuring Active Directory, the DN Base usually matches the part of the user s CN that starts with DC. In our previous example, it will be: DC=dctest,DC=local

15 A Level: Select this option if all the users inside your organization are present in the DN Base. Subtree: Select this option if all the users inside your organization are present at this level and other sublevels starting from the DN Base path. This is the recommended option when a DN Base close to the root tree has been configured. Search for username: These values will be automatically filled in when selecting the correct type of directory server used in your organization (Active Directory / Open LDAP / Lotus Domino). In case you are configuring an Active Directory server, you may need to check The attribute stores the full address option: At this point, you can click on the Check button to validate the configuration entered for your LDAP server. A valid main address present in your organization will be requested (not an alias address) and the system will check whether we can retrieve the information for this user using the current configuration, validating the current settings: If the address provided during the check is not found, please double check the configuration entered in this section woth your domain administrator. The schema used at your organization may differ from the examples used here. Alias Search: This option is, by far, the option that makes LDAP automatic provisioning more appealing than SMTP provisioning. It refers to the ability to automatically discover and bound alias addresses to main addresses in your organization, both for computing the correct number of licenses that you will consume and for management purposes. We strongly recommend enabling this option whenever LDAP sign-up is being configured. Enable Alias Discovery: proxyaddresses Most Active Directory + Exchange installations will use this attribute (proxyaddresses) to specify the alias addresses of a given user.

16 LDAP Filter: (objectclass=*)) Please note that you can specify different filter option here in order to retrieve only the desired information. We will be using (objectclass=*) in this example so we will retrieve all alias addresses. Is the field multi-valued? : No This is usually the default setting from Microsoft Active Directory + Exchange. Alias separator: For Microsoft Active Directory + Exchange you should enter the : sign in this option. This will be the character that will separate different alias addresses inside the configured attribute. Is the Alias the same object as the mailing adress? Yes Microsoft Active Directory + Exchange will store alias addresses in the same objetc as the user. Once this section has been configured, the administrator can validate the settings using the Check button. A valid alias adress present in your organization is requested and the system will check that the corresponding main address of the user is correctly retrieved using the current settings: In case the check is not returning the main adress of the user with the specified alias address, please double check the values entered in this section with your domain administrator, as your corporate schema may differ from the standard one shipped with Microsoft products.

17 User Information recovery: This section specifies what attributes inside your directory schema contain the full name of the user information being retrieved. This is a covenient configuration section to have configured so the information about a user in Cloud Firewall will be displayed using the name and surname of the user. The typical configuration for Microsoft Active Directory is as follows: Attribute that contains the user s surname: displayname Stores the first name and surname together: [Checked] After filling in all the required information and performing the relevant checks on each section, the configuration must be saved. When filling in all the sections in the LDAP sign-up mode, please perform all the checks available in the interface. The previous checks should be succesful in order to consider the LDAP provisioning mode enabled correctly: Spamina s Cloud Firewall is able to connect to your directory server. Spamina s Cloud Firewall is able to locate users in your directory server (the check under the Search for username performs correctly when providing a valid main address in your organization). Spamina s Cloud Firewall is able to locate alias addresses for your users (the check under the Alias Search performs correctly when providing an existing alias address in your system and the check is able to return the associated main address for that user).en caso de activar el descubrimiento de alias, se debe realizar la verificación para comprobar que el sistema localiza las cuentas principales a partir de las direcciones de alias. In case any of the previous checks encounters an error the LDAP sign-up mode will not be correctly configured. Should this happen, please make sure to save the configuration and come back later to the relevant failing section to reconfigure the options after double checking the values with your domain administrator. The examples provided in the sectios depicted above are oriented towards a Microsoft Active Directory + Microsoft Exchange deployment. The depicted configurations may vary depending on you re the schema used in your organization or in case the default Microsoft Active Directory schema has been modified.

18 3.1.3 Platform customization Once the domain and users setup has been completed, the platform is ready to protect the users under the configured domains. The next configuration step is to customize the default platform behavior. It is recommended to complete the following basic customizations: Welcome message: In case any of the available automatic sign-up modes (SMTP or LDAP) have been configured, the platform can send a welcome message to automatically provisioned mailboxes with credentials that will grant each protected user access to the End User control panel. From this end user control panel, each protected user will have the ability to review their quarantined s and change their filtering preferences. If you want to make your users aware that this control panel exist and provide them with their unique passwords to access this service, you must enable this option (please note that the welcome message is disabled by default and therefore your end users will not be notified and will not be aware that this control panel exist).

19 Blocked report: Spamina s Cloud Firewall can be configured to send a summary to your end users containing information about the quarantined s in the system. Using the digest , your end users can unblock the s classified as spam and add the sender to the user s whitelist in order to avoid blocking further s coming from the same sender. The delivery frequency of the blocked reports can be changed from Personalization -> Blocked report: Logo: The company administrator can upload a personalized logo that will be included in all system notifications to users being protected by the solution (welcome message, blocked reports, etc) as well as in the end user management interface. The logo can be changed under Personalization -> Logo: Note that the customizations can be performed globally (for all domains configured in the platform) or on a per domain basis. The level at which the customization is being applied can be selected using the Settings for scroll down menu at the top of the page.

20 3.1.4 Configuring the MX records in the DNS After all previous steps have been completed the platform is ready to protect inbound s destined to your organization. In order to complete the deployment of Cloud Firewall into your organization s delivery flow, you need to change the MX records for the protected domains and point them to the following service hosts: mx01cef.spamina.com mx02cef.spamina.com Please review your current service MX records as shown in the administration interface under the Manuals -> Configuration information section. The MX records as stated here may vary depending on your configuration. We recommend setting the MX records of the protected domains to both service hosts with the same priority (for instance 10 ) in order to achieve load balancing inside Spamina s Cloud Firewall platform. Please note that Spamina does not have access to the DNS settings, nor does Spamina have the ability to change the MX records of the domains being protected on behalf of our customers. This is a task that must be performed by the end client, as the DNS register belongs to the end client. oplease check this point with your DNS service provider or with your network administrator in order to obtain more information on how to perform modifications to your DNS settings. Once the MX records for the domains to be protected by Spamina have been changed to our service hosts, Spamina s Cloud Firewall will start processing inbound s and the platform will retain Spam s and will only deliver valid s to the protected mail servers of your organization Additional security configuration (Firewall) Once the MX records of the domains being protected by the solution have been changed and are pointing to Spamina s Cloud Firewall, our customers may want to restrict inbound delivery to the servers being protected by allowing only inbound coming from Spamina s Cloud IP address ranges. Our IP address range is as follows: / / /24 Please review the latest IP addresses ranges under your administrator management console under the Manuals -> Configuration information section. You may want to restrict inbound destined to your corporate mail servers only from these IP addresses. The restriction should be applied to TCP traffic with destination port 25 only allowing delivery from Spamina s Cloud Firewall IP address ranges. 3.2 Cloud Firewall Outbound Filtering Once inbound protection has been configured following all steps described in section 3.1, Cloud Firewall can be configured to filter outbound flowing out of your organization to the internet. Outbound filtering is independent from inbound filtering; in fact some customers may not want to filter outbound s being delivered to the internet. However, outbound filtering requires that inbound filtering is properly configured, as it is required that both domains and users are correctly setup in Cloud Firewall.

Cloud Email & Web Security. Administrator Quick Start Guide

Cloud Email & Web Security. Administrator Quick Start Guide Administrator Quick Start Guide - Index 1. Cloud Email Firewall Introduction 2. Licensing model 3. Initial Cloud Email Firewall configuration 3.1 Cloud Email Firewall Inbound email filtering 3.1.1 Domain

More information

PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1

PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1 PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1 Contents 1 INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 5 1.1 WHAT IS PANDA CLOUD EMAIL PROTECTION?... 5 1.2 FUNCTIONALITIES... 5 2 PANDA

More information

Important Information

Important Information June 2015 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

SPAMINA Email Service Firewall 3.3.1.1 / Administrator s Manual / 1

SPAMINA Email Service Firewall 3.3.1.1 / Administrator s Manual / 1 SPAMINA Email Service Firewall 3.3.1.1 / Administrator s Manual / 1 Contents 1 INTRODUCTION TO CLOUD EMAIL FIREWALL... 6 1.1 WHAT IS CLOUD EMAIL FIREWALL?...6 1.2 FUNCTIONALITIES...6 2 CLOUD EMAIL FIREWALL

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Panda Cloud Email Protection. Quick guide Service registration procedure

Panda Cloud Email Protection. Quick guide Service registration procedure Panda Cloud Email Protection Quick guide Service registration procedure November 2009 Content Welcome to Panda Cloud Email Protection... 3 1.- Factors to consider... 3 2.- Domain registration... 4 3.-

More information

Core Protection Suite

Core Protection Suite Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange

More information

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.

More information

Chapter 10 Encryption Service

Chapter 10 Encryption Service Chapter 10 Encryption Service The Encryption Service feature works in tandem with Dell SonicWALL Email Security as a Software-as-a-Service (SaaS), which provides secure data mail delivery solutions. The

More information

Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration

Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration 1.1 How do I access the records of the domain(s) that I administer? To access the domains you administer, you

More information

Implementing MDaemon as an Email Security Gateway to Exchange Server

Implementing MDaemon as an Email Security Gateway to Exchange Server Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend

More information

Quick Start Guide Sendio Hosted

Quick Start Guide Sendio Hosted Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START

More information

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.

More information

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Core Filtering Admin Guide

Core Filtering Admin Guide Core Filtering Admin Guide 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Table of Contents Login... 3 Overview... 3 Quarantine...

More information

Deploying ModusGate with Exchange Server. (Version 4.0+)

Deploying ModusGate with Exchange Server. (Version 4.0+) Deploying ModusGate with Exchange Server (Version 4.0+) Active Directory and LDAP: Overview... 3 ModusGate/Exchange Server Deployment Strategies... 4 Basic Requirements for ModusGate & Exchange Server

More information

escan SBS 2008 Installation Guide

escan SBS 2008 Installation Guide escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.

More information

Installing Policy Patrol on a separate machine

Installing Policy Patrol on a separate machine Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the

More information

SaskTel Hosted Exchange Administrator Guide

SaskTel Hosted Exchange Administrator Guide SaskTel Hosted Exchange Administrator Guide Customer Center Administration Portal At least the first of the following tasks (Accept the Terms of Service) needs to be completed before the company portal

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

eprism Enterprise Tech Notes

eprism Enterprise Tech Notes eprism Enterprise Tech Notes Utilizing Microsoft Active Directory for eprism s Directory Services Context eprism can integrate with an existing LDAP (Lightweight Directory Access Protocol) directory for

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

Installing Policy Patrol with Lotus Domino

Installing Policy Patrol with Lotus Domino Policy Patrol 9 technical documentation May 21, 2013 If you have Lotus Domino R5/6/7/8/9 Mail Server, you must install Policy Patrol on a separate Windows 2003/2008/2012 machine and forward your mails

More information

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc. Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Hosted Email Security 2.0 Quick Start Guide

Hosted Email Security 2.0 Quick Start Guide Hosted Email Security 2.0 Quick Start Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

SonicWALL Email Security Appliance Administrator Guide

SonicWALL Email Security Appliance Administrator Guide SonicWALL Email Security Appliance Administrator Guide Version 7.3 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Part Number:

More information

INLINE INGUARD E-MAIL GUARDIAN

INLINE INGUARD E-MAIL GUARDIAN INLINE INGUARD E-MAIL GUARDIAN Activation Guide December 8, 2008 600 Lakeshore Parkway, AL 35209 888.3InLine support@inline.com 1 InLine InGuard E-Mail Guardian Activation Guide The InLine InGuard E-Mail

More information

Guardian Digital Secure Mail Suite Quick Start Guide

Guardian Digital Secure Mail Suite Quick Start Guide Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Installation Guide For ChoiceMail Enterprise Edition

Installation Guide For ChoiceMail Enterprise Edition Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004

More information

Barracuda Spam Firewall Administrator s Guide

Barracuda Spam Firewall Administrator s Guide Barracuda Spam Firewall Administrator s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license.

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Dell SonicWALL Hosted Email Security. Administration Guide

Dell SonicWALL Hosted Email Security. Administration Guide Dell SonicWALL Hosted Email Security 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Email Services Deployment. Administrator Guide

Email Services Deployment. Administrator Guide Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...

More information

Service Overview & Installation Guide

Service Overview & Installation Guide Service Overview & Installation Guide Contents Contents... 2 1.0 Overview... 3 2.0 Simple Setup... 4 3.0 OWA Setup... 5 3.1 Receive Test... 5 3.2 Send Test... 6 4.0 Advanced Setup... 7 4.1 Receive Test

More information

Hosted Email Security 2.0 Administrator s Guide

Hosted Email Security 2.0 Administrator s Guide Hosted Email Security 2.0 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

A D M I N I S T R A T O R V 1. 0

A D M I N I S T R A T O R V 1. 0 A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Preface... 4. Introduction to Proofpoint Essentials... 5

Preface... 4. Introduction to Proofpoint Essentials... 5 July 2014 Preface... 4 About this Guide... 4 Intended Audience and Prerequisite Knowledge... 4 Other Sources of Information... 4 Contacting Proofpoint Essentials Support... 4 Knowledge Base... 5 Support

More information

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection

More information

Quick Start Guide Getting started with your Hetzner package

Quick Start Guide Getting started with your Hetzner package Welcome to Hetzner! This guide will show you how to setup your domain name, website and email services you have subscribed to. Before getting started, it is important to understand that when you order

More information

eprism Email Security Suite

eprism Email Security Suite Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered

More information

Instructions Microsoft Outlook Express Page 1

Instructions Microsoft Outlook Express Page 1 Instructions Microsoft Outlook Express Page 1 Instructions Microsoft Outlook Express This manual is written for users who already have an e-mail account configured in Outlook Express and will therefore

More information

Instructions Android Smartphone & Tablet Page 1

Instructions Android Smartphone & Tablet Page 1 Instructions Android Smartphone & Tablet Page 1 Instructions Android Smartphone & Tablet This manual is written for users who already have an e-mail account configured in their Android phone or tablet

More information

Email DLP Quick Start

Email DLP Quick Start 1 Email DLP Quick Start TRITON - Email Security is automatically configured to work with TRITON - Data Security. The Email Security module registers with the Data Security Management Server when you install

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Barracuda Email Security Service User Guide

Barracuda Email Security Service User Guide Barracuda Email Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses,

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Quick Start Guide. Sendio Email System Protection Appliance. Sendio 5.0

Quick Start Guide. Sendio Email System Protection Appliance. Sendio 5.0 Sendio Email System Protection Appliance Quick Start Guide Sendio 0 Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +949.274375 www.sendio.com QUICK START GUIDE SENDIO This Quick Start

More information

Service Launch Guide (US Customer) SEG Filtering

Service Launch Guide (US Customer) SEG Filtering Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required

More information

Configuring Your Gateman Email Server

Configuring Your Gateman Email Server Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile

More information

Quick Start Policy Patrol Mail Security 10

Quick Start Policy Patrol Mail Security 10 Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in

More information

Customer Tips. Basic E-mail Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices.

Customer Tips. Basic E-mail Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices. Xerox Multifunction Devices Customer Tips November 24, 2003 This document applies to these Xerox products: x WC Pro 32/40 Color x WC Pro 65/75/90 x WC Pro 35/45/55 WC M35/M45/M55 x DC 555/545/535 x DC

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Barracuda Spam & Virus Firewall User's Guide 5.x

Barracuda Spam & Virus Firewall User's Guide 5.x Barracuda Spam & Virus Firewall Barracuda Spam & Virus Firewall User's Guide 5.x This guide describes how you can check your quarantined messages, classify messages as spam and not spam, manage whitelisting

More information

Email Migration Project Plan for Cisco Cloud Email Security

Email Migration Project Plan for Cisco Cloud Email Security Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f

More information

Email Protection for your account

Email Protection for your account User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

DOMAIN CENTRAL HOSTING EMAIL

DOMAIN CENTRAL HOSTING EMAIL Welcome to our hosting services, we have created the following documents to help you get up and running as quickly as possible. If at any stage you encounter difficulties, you are welcome to send a help

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

How does the Excalibur Technology SPAM & Virus Protection System work?

How does the Excalibur Technology SPAM & Virus Protection System work? How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

Address Synchronization Tool Administrator Guide

Address Synchronization Tool Administrator Guide Address Synchronization Tool Administrator Guide This guide is for systems administrators configuring the Address Synchronization Tool to update the information used by MessageLabs in the provision of

More information

PineApp Surf-SeCure Quick

PineApp Surf-SeCure Quick PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.

More information

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section

More information

Hosted Email Security Quick Start Guide

Hosted Email Security Quick Start Guide Hosted Email Security Quick Start Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda. Version 3.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2009, Barracuda Networks

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Purchase College Barracuda Anti-Spam Firewall User s Guide

Purchase College Barracuda Anti-Spam Firewall User s Guide Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to

More information

Sonian Getting Started Guide October 2008

Sonian Getting Started Guide October 2008 Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using

More information

Email Protection for your account

Email Protection for your account User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

PureMessage for Microsoft Exchange Help. Product version: 4.0

PureMessage for Microsoft Exchange Help. Product version: 4.0 PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9

More information

Web24 Web Hosting Guide

Web24 Web Hosting Guide Web24 Web Hosting Guide Welcome Dear Web24 customer, We would like to thank you for choosing Web24 as your preferred web hosting provider. To make your experience as enjoyable as possible, we have prepared

More information

Web Hosting Getting Started Guide

Web Hosting Getting Started Guide Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload

More information

Migration Quick Reference Guide for Administrators

Migration Quick Reference Guide for Administrators Migration Quick Reference Guide for Administrators 10 Easy Steps for Migration Maximize Performance with Easy Settings Changes Communicating with Your Users Reporting Spam Resources Page 1 10 Easy Steps

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

How to Logon with Domain Credentials to a Server in a Workgroup

How to Logon with Domain Credentials to a Server in a Workgroup How to Logon with Domain Credentials to a Server in a Workgroup Johan Loos johan@accessdenied.be Version 1.0 Authentication Overview Basically when you logon to a Windows Server you can logon locally using

More information

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda. Version 5.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2012, Barracuda Networks

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Office 365 Exchange Online Protection Administration Guide

Office 365 Exchange Online Protection Administration Guide Chapter 10 Office 365 Exchange Online Protection Administration Guide Office 365 version 2013 is a suite of software products: Software as a Service (SaaS). Customers can purchase Office 365 in many ways,

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM

WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create

More information