Use of Exchange Mail and Diary Service Code of Practice
|
|
|
- Hannah Bishop
- 9 years ago
- Views:
Transcription
1 Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are made to Active Directory, university s Mail Relays and the university's computing regulations. This code of practice is intended to support the Information Security Policy of the University and should be read in conjunction with that document. 1. Code of Practice Version Revision Date CoP Template Author Notes Version Version 28/05/2012 Version 1 st Version 1.4 Stephen Smith Initial 1 st Draft. Draft 01/02/2013 Version 1.0 Version 1.4 Stephen Smith Interim review QA Date QA Process Notes 29/05/2012 to 12/06/2012 Review internally by Technical Staff and IS Apps leaders prior to presenting back to the IS Security Working Group. Technical staff QA 2 minor amendments to the system description applied. Suggested date for Revision of the CoP Author 01/02/2013 Stephen Smith 2. System description Revision Date System Version 29/05/2012 Exchange 2007 (SP3) Author John McFarlane Notes The system s service pack is regularly reviewed with any rollups tested and scheduled for live deployment following the service strategy for patching. Communications and alerts are managed accordingly within IS and following the standard IS model for planned system events. 2.1 System name Microsoft Exchange 2007 (SP3) 2.2 Description of system Exchange provides , ediary scheduling, shared contacts and delegable task lists to staff, staff visitors and research graduates. Users can access their s and schedules securely with their preferred client interface (i.e. Outlook, Thunderbird, Mac Mail, Active Sync and Blackberry). CoP Template, Version Jun
2 2.3 Data Person: University User Names, Forename and Surname, Organisational Unit and Job Title. Some preference settings defined by the users are kept with the account so that these are supplied to the user wherever they connect. Core data handled by the system: messages, scheduling data, contact lists and delegable task lists. 2.4 Components Core System: Exchange 2007 (operating between 2 sites) Internet Security and Acceleration (ISA) System (back-office security of connections through the system) Hub Transport (mail transport and protocols in and out of the system) Client Access Server (CAS) (Load Balanced and Resilient) Fileshare Witness Server (synchronisation between sites) Dependencies on other systems: Active Directory (includes Domain Controllers) applies the frontline security allowing users to authenticate their credentials with the service. University of Edinburgh Mail Relays University of Edinburgh Network Other systems depending on Exchange: Blackberry Enterprise System Davmail Gateway Data Protection Manager (DPM) 2.5 System owner The system is owned and managed by the Multimedia and Communications team of IS Applications Service Management. 2.6 User base The user base who are entitled to use this service for free are: All Staff All Staff Visitors All Research Graduates 2.7 Criticality The Exchange system is a top priority service and considered business critical because it stores and handles s, schedules, tasks and contacts on behalf of all users of the system. CoP Template, Version Jun
3 2.8 Disaster recovery status As a top priority service, Exchange uses the IS Alerts and call escalations process for critical escalation in the event of disaster. The Exchange System continuously replicates and synchronises data between sites. In the event of a failure at the primary site, automated failover processes are in place to ensure continuity of service Although the mail service can be recovered locally from this replication, DPM offers an extra layer of protection in the event of a disaster. The system includes Data Protection Manager (DPM) owned and managed by ITI Architecture. This facility backs up the underlying Exchange system on a regular basis with the recovery process documented and tested. In the event of disaster affecting the automated failover and full recovery of the service would be initiate involving various parties in IS and potential external 3 rd parties as appropriate. As well as DPM, Exchange also relies heavily upon the operation of the Active Directory (including Domain Controllers), Mail Relays and the University Network to ensure this system remains fully operational and available to users. Disaster Recovery plans for each of these systems must also be considered with the Exchange system plans. 3. User responsibilities 3.1 Data Users are required to protect their password to access the system. They are also governed by the computing regulations and applicable law to ensure data protection principals are adhered to when exporting or forwarding personal data to other mail services. 3.2 Usernames and passwords Exchange uses Active Directory for authentication. The Active Directory code of practice should be referred to. Users should never write down their password or give out their password to anyone else. Users should never include passwords in s or reply to s asking for such details. IS staff will not ask for a user s password in an Physical security Users are required to protect University data being transported away from the system by means of portable, physical storage device. They are also governed by the computing regulations and applicable law to ensure data protection principals are adhered to. CoP Template, Version Jun
4 3.4 Remote/mobile working Users may access Exchange using mobile devices or computers connecting via public networks or WiFi services. Users should configure a passcode to gain access to and use the device, and set an idle timeout (e.g. 1 minute) that will automatically lock the device when not in use. This helps prevent unauthorised access to data. More details about mobile device security connecting to University IT Services is at: Users must provide private credentials in order to connect to the system and the data is encrypted between the system and connecting device. When users login via a web browser the system can be made public aware allowing it to close unwanted user sessions more swiftly. The system also prompts users to close their web browser when they logout. Users using this service from a public place should utilise these additional security features provided by the service. 3.5 Downloads and removal of data from premises The University s policy on storage, transmission and use of personal data and sensitive business information out with the University computing environment applies. There are no system restrictions that would prevent users from downloading data via their own account. 3.6 Authorisation and access control Accounts are created automatically in accordance with IS service entitlements policy. All users entitled to an account on Exchange may access their own account and may also permit other users of the service view or edit access (i.e. delegated access) as required. Any action taken by the delegate is auditable by the system and visible to recipients (i.e. sent on behalf of. By default the system does not allow any user to send s on behalf of another users account. Only IS Staff are permitted administrator privileges in order to support users accordingly. Access is granted to staff when authorised by a senior member of staff in IS. IT staff must abide by university regulations when handling users accounts and data. 3.7 Competencies Staff should be aware of the computing regulations. 4. System Owner Responsibilities CoP Template, Version Jun
5 4.1 Competencies Systems staff in IS Applications along with our infrastructure and network providers in ITI are all skilled and trained technically to support the security of our Exchange system. Skills and expertise may vary between IS teams depending upon which component the team is responsible but includes the following key areas in order to help keep our Exchange system secure: - Network traffic monitoring - Identifying unusual patterns in data usage and connections - Firewall configuration - Mail relays (including mail routing messages onto Exchange) - Active Directory and domain control configuration - Internet Security and Acceleration (ISA) Server - Server patching - and Ediary connection protocols 4.2 Operations The system is continuously monitored and alerts on standby in the event of any identifiable threat to the integrity or security of the system. Schedules are also in place for regular patches to operating systems and server software. Latest service packs are reviewed and scheduled from the point these become available. Exchange also relies upon Active Directory, Mail Relays and the University Network. The code of practice for these systems should also be considered. 4.3 System documentation Service level documentation and Self-help guidance for all users is published on the IS website. Service level documentation is owned and maintained by IS Service Management. All user topics are owned and maintained by IS User Services. Systems documentation along with service level procedures are located in the collaborative tools section of the IS wiki (Insite). Internal user support documentation is located on the User Services knowledge base. 4.4 Segregation of Duties IS Technical and Support staff have administrator privileges on the system as described in 3.6 above. IS Applications Technology Management permit access levels on requests authorised by senior IS staff only. All users login to the system via Active Directory which is run and managed by IS ITI Architectures. 4.5 Security incidents Security incidents are raised with IS IRT team to take the appropriate action. 4.6 Fault/problem reporting Significant faults arising with the service may raise an alert automatically with the technical team for a quick response. All enquiries or problems being reported should go via IS Helpline in the first instance. CoP Template, Version Jun
6 4.7 Systems development Smaller developments (i.e days effort) such as service improvements are prioritised and managed through service calls between IS teams and the business accordingly. All planned changes are communicated, documented in our change control system and any known user impact is published to IS alerts, news feed and twitter. Larger developments (10 days or more effort) are managed through a project cycle (following PRINCE 2 methodology). A range of online project tools and templates provide a framework for managing new developments. All work is quality checked by project stakeholders at key stages of the project. Any changes being applied to the Exchange system are tested in a test environment before being deployed onto the live systems. 5. System Management 5.1 User account management User accounts are created and managed automatically according to IT service entitlement and identity ageing policies. Gold copy master systems (i.e. HR system and Visitor Management System, EDDIR, Org Hierarchy) trigger the identity management processes centrally. Exchange connects to the Identity Management System which sources and notifies the identity data with any changes associated to each account. Exchange relies upon the Active Directory system in order to provision user accounts. Refer to the code of practice for the Active Directory system also. 5.2 Access control Admin level access is granted following a manual process as described in 3.6 and again in 4.4 above. Users entitled to use the service are granted user level access to their own accounts automatically. Users (or owner of an account) can permit other users to view mail folders, send mail on behalf of the owner, or manage the schedule of the owner. This is known as delegate access. Any interaction by the delegate is audited by the system and is visible to recipients of mail messages or meeting invites accordingly. All access to the system is automatically controlled according to IT service entitlement and identity ageing policies as described in 5.1 above. CoP Template, Version Jun
7 5.3 Access monitoring Logs track all messaging and usage through the system. Logs are replicated to a separate physical site and backed up along with messages and accounts data (including the unique identifier of the account). 5.4 Change control A change control system and alerts publication records any changes applied to the live system. 5.5 Systems clock synchronisation Time synchronisation is controlled from the Active Directory system. Refer to code of practice for the Active Directory system also. 5.6 Network management All network activities are carried out by ITI Networks. Refer to the code of practice for University network systems also. 5.7 Business continuity Data is continuously replicated through each day and held up to 7 days. In the event of a system failure users are switched over to the replica site. Databases on the live site are then built from the Data Protection Manager system before users are switched back to the live site. Communications with support staff and alerts are published throughout. 5.8 Security Control Exchange comes with Internet Security and Acceleration (ISA) Servers which can apply back-to-back firewall capabilities, Virtual Private Networks, advanced application and web filtering, intrusion detection, client access rules and more. The system monitors, logs and alerts session activity, connectivity status across connection protocols and various levels of Exchange performance. Exchange relies upon the PIX firewalls applied to the University network owned and managed by ITI Network Services. Refer to the code of practice for those systems accordingly. 6. Third Party 6.1 Outsourcing N/A The Exchange 2007 system operates entirely on-site. 6.2 Contracts and Agreements Exchange complies with the agreed Microsoft campus and SELECT licenses purchased by the University. All server-side licenses are installed and up-to-date. ITI Architectures section owns and manages the University account agreed with our Microsoft supplier. 6.3 Compliance with the university security policy N/A Covered by this CoP and complies with University governance and Policies. 6.4 Personal data N/A Covered by this CoP and complies with University governance and Policies. CoP Template, Version Jun
Use of UniDesk Code of Practice
Use of UniDesk Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the UniDesk service. References are made to Exchange, EASE, Shibboleth, Identity
Use of EASE Code of Practice. This code of practice is also qualified by The University of Edinburgh computing regulations, found at:
Use of EASE Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be read in conjunction with this document. http://www.ed.ac.uk/schools-departments/information-services/about/policiesandregulations/security-policies/security-policy
Use of (Central) Load Balancers Code of Practice
Use of (Central) Load Balancers Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be read in conjunction with this
Use of The Information Services Active Directory Service (AD) Code of Practice
Use of The Information Services Active Directory Service (AD) Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be
SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service
Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
BUILT FOR YOU. Contents. Cloudmore Exchange
BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault
Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Outlook Plugin... 13 Using KiteDrive to Send Large
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Microsoft Office 365 from Vodafone. Administrator s Guide for Midsize Businesses and Enterprises
Microsoft Office 365 from Vodafone Administrator s Guide for Midsize Businesses and Enterprises Contents Footer bar Return to contents page Go to next of section Return to start of section Previous page
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
How To Secure An Emr-Link System Architecture
EMR-Link Security Administration Guide Introduction This guide provides an overview of the security measures built into EMR-Link, and how your organization s security policies can be implemented with these
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
Information Services. Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional
Information Services Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional Amendment & Authorisation History Ver Date Changes Name Author A 29/3/05
Installation Guide. Research Computing Team V1.9 RESTRICTED
Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots
Keyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
Amazon WorkMail. User Guide Version 1.0
Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection
All your apps & data in the cloud, all in one place.
The Cloud Desktop For Business Unify Your Business IT Experience All your apps & data in the cloud, all in one place. The Cloud Desktop houses all of your organization's applications and data in one easy-to-access
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Data Network Security Policy
Authors: Mike Smith Rod Makosch Network Manager Data Security Officer IM&T IM&T Version No : 1 Approval Date: March 2005 Approved by : John Aird Director of IM&T Review Date : 1 April 2006 Trust Ref: C7/2005
Our Cloud Offers You a Brighter Future
Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Technical specifications
Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
REDCENTRIC MANAGED EXCHANGE SERVICE SERVICE DEFINITION
REDCENTRIC MANAGED EXCHANGE SERVICE SERVICE DEFINITION SD052 V1.2 Issue Date 01 July 2014 1) OVERVIEW The Redcentric Managed Exchange Service (MEX) is an email messaging service, hosted and managed by
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Dublin Institute of Technology IT Security Policy
Dublin Institute of Technology IT Security Policy BS7799/ISO27002 standard framework David Scott September 2007 Version Date Prepared By 1.0 13/10/06 David Scott 1.1 18/09/07 David Scott 1.2 26/09/07 David
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
Vodafone Total Managed Mobility
Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Level I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Agent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
ITAR Compliant Data Exchange
ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/
Core Protection Suite
Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group
Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Version: 1.3 Last updated: 14/04/2016 1 Introduction This user guide is intended for third party email users users who receive,
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Microsoft Exchange Online from BT. Service Description (Shared Platform)
Microsoft Exchange Online from BT Version 5.1 January 2004 Confidentiality statement All information contained in this document is provided in confidence for the sole purpose of adjudication, and shall
NOS for Network Support (903)
NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
How to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.
PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Configuring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
Deployment Guide: Unidesk and Hyper- V
TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Getting Started Guide: Getting the most out of your Windows Intune cloud
Getting Started Guide: Getting the most out of your Windows Intune cloud service Contents Overview... 3 Which Configuration is Right for You?... 3 To Sign up or Sign in?... 4 Getting Started with the Windows
Policy Based Encryption Gateway. Administration Guide
Policy Based Encryption Gateway Administration Guide Policy Based Encryption Gateway Admin Guide 1 Contents Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control...
Introduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
Cyber Essentials Questionnaire
Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.
SafeMail April 2015. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres.
SafeMail April 2015 Secure cloud solutions with guaranteed UK data sovereignty. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres. Detailing the
FuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide
Exchange ControlPanel Administration Guide Table of Contents Top Level Portal Administration... 4 Signing In to Control Panel... 4 Restoring Account Password... 5 Change Account Details... 7 Viewing Account
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
Policy Based Encryption Gateway. Administration Guide
Policy Based Encryption Gateway Administration Guide Document Revision Date: Sept. 11, 2012 Policy Based Encryption Gateway Admin Guide i Contents Description of Policy Based Encryption... 1 Policy Based
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
ARCHITECTURAL OVERVIEW E-mail Availability Service (EAS) with ActiveMailbox
ARCHITECTURAL OVERVIEW E-mail Availability Service () with ActiveMailbox E-mail Availability Service () with ActiveMailbox For Microsoft Exchange -Centric Environments The Market Need for Through direct
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Spillemyndigheden s Certification Programme Information Security Management System
SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...
Exhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
Quick Start Guide Sendio Hosted
Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START
PREMIUM MAIL USER GUIDE
PREMIUM MAIL USER GUIDE WHO THIS USER GUIDE IS FOR This document is for users of BigPond Premium Mail. It describes the features of BigPond Premium Mail from a user s perspective. It contains: A general
