Blue Coat ICS PROTECTION Scanner Station Version

Size: px
Start display at page:

Download "Blue Coat ICS PROTECTION Scanner Station Version"

Transcription

1 Blue Coat ICS PROTECTION Scanner Station Version USB Malware Defense for Industrial Computers User Guide, version 5.3.1

2 Contents Contents 1. ABOUT About this Guide System Requirements Help and Support INTRODUCTION Blue Coat Shark ICS Protection What is ICS Protection? What is the Scanner Station Version? What is the ICS Protection Workflow? Blue Coat SandBox Technology Internet Update Decompression Supported File Formats USING ICS PROTECTION SCANNER STATION Functional Overview Scan Removable USB Device for Malware Case 1 USB Validated Case 2 USB Infected Case 3 USB Partially Validated Create Portable Malware Cleaner Create ICS Protection Driver Package Page 2

3 About 1. About 1. About this Guide This manual is intended for users and service providers of Industrial Control Systems who utilize portable USB devices to access ICS devices such as Windows-based HMI computers and engineering workstations. This manual assumes no technical knowledge on the part of the reader. 2. System Requirements The Blue Coat ICS Protection Scanner Station contains all of the necessary hardware, software, and connectivity needed to protect industrial control system computers against malicious files from portable USB devices. 3. Help and Support The Blue Coat ICS Protection Scanner Station is an intuitive, easy-to-use anti-malware solution designed to perform a limited number of functions repeatedly across a wide range of industrial environments. Please see the companion manual, Blue Coat ICS Protection Scanner Station Administrator Guide, for instructions on how to install and configure the appliance and how to upgrade licensed software. Support Resources Figure 1 ICS Protection Scanner Station protects Windows-based HMI computers and engineering workstations from USB-borne malware Page 3

4 Introduction Blue Coat ICS Protection Introduction 2.1. Blue Coat ICS Protection What is Blue Coat ICS Protection? Blue Coat ICS Protection stops malware from entering ICS environments and comes in two versions: ICS Protection - Network version ICS Protection - Scanner Station version By combining both versions in one, you will get a comprehensive protection of your ICS environment. This document covers only the usage of ICS Protection Scanner Station version What is the Scanner Station Version? The Scanner Station version of ICS Protection is a new technology from Blue Coat providing protection for ICS infrastructure. ICS Protection scans and cleans USB devices for malware, and provides the option to technologically enforce security policies for USB device usage What is the ICS Protection Workflow? ICS Protection works as a scanner station for all USB based removable media. It can scan USB media for malware, clean them from the USB media before it s used in any HMI computer, Engineer PC or any other Windows based computer. By installing a small agent on the system you want to protect, ICS Protection can enforce iron-clad USB security policies across the entire ICS infrastructure, meaning that no USB device can be used on these Windows computers if they have not been scanned by ICS Protection. ICS Protection is a two-folded solution: 1) The physical scanner station This is where you scan and clean your USB devices. 2) The non-interruptible kernel driver This is the driver that will stop non-scanned USB devices from being used. The typical workflow/usage of ICS Protection is to scan your USB devices before they will be used in any Windows based ICS computers. Figure 2 Validated USB device permitted to access ICSP protected computer Page 4

5 Introduction Blue Coat ICS Protection Any attempt to use a USB device in an ICSP protected computer without first scanning it with the ICS Protection Scanner Station will be denied. Figure 3 Malware infected USB device is denied access to ICSP protected computers Blue Coat SandBox Technology Blue Coat SandBox technology enables ICS Protection to detect new malware before a detection signature has been released by analyzing code behavior in a virtual environment before it runs on a real machine Internet Update InternetUpdate can be set to automatically update the virus scanning engine and signature files at hourly intervals. See the companion manual Blue Coat ICS Protection Scanner Station Administrator Guide Decompression Supported File Formats ICSP can decompress packets representing files compressed in a number of different formats before scanning the content. ACE ACE Apple Single ARJ BZip2 CAB CAB CHM/ITSF GZ InnoSetup Installer LZH Mail / MIME MSI self extractors (compression / decompression) (compression / decompression) self extractors (compression / decompression) with Base 64, QP, or UUE encoding (compression / decompression) Page 5

6 Introduction Blue Coat ICS Protection Nullsoft Installer RAR RAR RAR TAR Wise SFX ZIP ZIP 7Zip Version 2 Version 3 (store / decompression) Version 3 (self-extractors) (compression / decompression) (compression / decompression / append new objects) self extractors Page 6

7 Using ICS Protection Scanner Station Functional Overview 2. Using ICS Protection Scanner Station The ICS Protection Scanner Station scans USB devices for malware so they can be safely used within the ICS environment. Connect portable USB devices using the included mini-usb-to-usb cable in the front of the Scanner Station, or use the built-in USB ports located on the underside of the Scanner Station. Figure 4 Mini-USB-to-USB cable Figure 5 Built-in USB ports Note: Using the removable and replaceable mini-usb cable will reduce wear-and-tear on the build-in USB ports and may extend the useable lifespan of the ICS Protection Scanner Station Functional Overview Blue Coat ICS Protection Scanner Station provides three (3) primary functions: Scan Removable Device Quickly scans USB devices for malware so they can be safely used on target ICS devices, such as Windows-based HMI computers and engineering workstations. Create Malware Cleaner Scans Windows computers for malware from a USB device and cleans infected systems, regardless of the source of the infection. Create Driver Package Copies the driver package to the mounted USB storage device. This executable package can then be used to install the Kernel driver at the target computer that is to be protected. Page 7

8 Scan Removable USB Device for Malware 3.2. Scan Removable USB Device for Malware Insert a USB device into the Scanner Station. The three icons will be enabled. 1. Click Scan removable device. Figure 6 ICS Protection Home screen 2. (Encrypted USB devices only) If you are scanning an encrypted USB device, the Enter password for USB memory stick screen displays alongside a password entry field. Otherwise, skip to step 3. Enter the USB device password using the attatched keyboard and click continue. Page 8

9 Scan Removable USB Device for Malware Validated 1. If the password is accepted, click continue again to finish unlocking the encrypted USB device. When the USB device is unlocked, it automatically proceeds to the scanning stage.. 2. If the password is incorrectly entered, the Wrong password! screen appears with the remaining number of attempts allowed before content on the encrypted USB device is wiped. 3. The Scanning removable device screen appears as all files on the USB device are scanned for malware. Figure 7 Scanning Removable Device screen Page 9

10 Scan Removable USB Device for Malware Validated Case 1 USB Validated If no malware is detected, the Validated screen appears. Remove and use the USB device. Figure 8 USB device has been validated for use on protected ICS computers Page 10

11 Scan Removable USB Device for Malware Infected Case 2 USB Infected If malware has been detected, the Infected screen appears. The user must choose to keep the file and not be allowed to use the USB device or to delete the malicious file, and then have use of the device. Note: Cleaning or deleting malicious files is optional, and the option must be set by the administrator at the Web Admin console. See the Blue Coat ICS Protection Administrator Guide for additional details. Figure 9 USB device is infected and user must choose to delete or keep the file Keeping the infected file informs the user that the USB device will not be usable for the ICSP enabled computers. The Details button displays more information about the malicious file that was detected. Figure 10 Infected USB device will be blocked from use on protected ICS computers Page 11

12 Scan Removable USB Device for Malware Infected ICS Protection displays details about the malicious file. Please follow your company policies concerning the proper resolution of the identified condition. Figure 11 Details of malicious file detected on USB device If the user agreed to delete the malicious file, the following screen confirms that one or more malicious files were found and either cleaned or deleted. The USB device may now be used on ICSP enabled computers. Figure 12 Infected files have been removed and the USB device may now be used Page 12

13 Scan Removable USB Device for Malware Partially Validated Case 3 USB Partially Validated Note: The Partially Validated screen may appear in other cases such as when ICS Protection cannot scan a file due to either the presence of password-protected archives or encrypted files. In these cases, the unknown file(s) will not be usable but the rest of the files on the USB device will continue to be available. Figure 13 Partially valided USB device will be allowed access to ICSP computers Pressing Details displays additional information about the file that was found to be malicious and deleted. Figure 14 Details of a password-protected file that could not be scanned Page 13

14 Scan Removable USB Device for Malware Infected 3.3. Create Portable Malware Cleaner The portable malware cleaner can be used in situations where you suspect that a Windows computer may have been infected by malware. The malware cleaner is a tool that is always updated and can scan and clean Windows computers from a USB device. Figure 15 ICS Protection Home screen Insert the USB device and click Create Malware Cleaner. ICS Protection first scans the USB device to make sure that it is not already infected with malware before allowing it for use on ICSP enabled computers. Figure 16 Malware cleaner files successfully copied to the USB device 3.4. Create ICS Protection Driver Package A USB-based driver package installs the ICS Protection driver on Windows-based HMI computers and engineering workstations stations to prevent access by USB devices that have not been scanned by ICS Protection. Insert a USB device and click the Create Driver Package icon. Page 14

15 Scan Removable USB Device for Malware Infected Figure 17 ICS Protection Home screen A confirmation displays when the driver package has been created on the USB device. The USB device is then scanned to make sure it is not already infected with malware before allowing access to ICSP enabled computers. Figure 18 Driver installation files successfully copied to the USB device Page 15

16 Scan Removable USB Device for Malware Infected 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9, DRTR, MACH5, PACKETWISE, POLICYCENTER, PROXYAV, PROXYCLIENT, SGOS, WEBPULSE, SOLERA NETWORKS, DEEPSEE, DS APPLIANCE, CONTENT ANALYSIS SYSTEM, SEE EVERYTHING. KNOW EVERYTHING., SECURITY EMPOWERS BUSINESS, BLUETOUCH, the Blue Coat shield, K9, and Solera Networks logos and other Blue Coat logos are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain other countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue Coat or that Blue Coat has stopped using the trademark. All other trademarks mentioned in this document owned by third parties are the property of their respective owners. This document is for informational purposes only. BLUE COAT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. BLUE COAT PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU. Americas: Rest of the World: Blue Coat Systems, Inc. Blue Coat Systems International SARL 420 N. Mary Ave. 3a Route des Arsenaux Sunnyvale, CA Fribourg, Switzerland Page 16

Decrypt Inbound SSL Traffic for Passive Security Device (D-H)

Decrypt Inbound SSL Traffic for Passive Security Device (D-H) Decrypt Inbound SSL Traffic for Passive Security Device (D-H) SSL Visibility Appliance First Steps Guide Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG,

More information

Blue Coat Security First Steps. Solution for HTTP Object Caching

Blue Coat Security First Steps. Solution for HTTP Object Caching Solution for HTTP Object Caching Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM,

More information

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,

More information

Blue Coat Security First Steps Transparent Proxy Deployments

Blue Coat Security First Steps Transparent Proxy Deployments Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,

More information

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,

More information

Blue Coat Security First Steps Solution for Recording and Reporting Employee Web Activity

Blue Coat Security First Steps Solution for Recording and Reporting Employee Web Activity Solution for Recording and Reporting Employee Web Activity SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Web Application Classification Feature

Web Application Classification Feature Web Application Classification Feature PacketShaper 11.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Blue Coat Security First Steps Solution for Streaming Media

Blue Coat Security First Steps Solution for Streaming Media Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Blue Coat Security First Steps Solution for Controlling Web Applications

Blue Coat Security First Steps Solution for Controlling Web Applications Blue Coat Security First Steps Solution for Controlling Web Applications SGOS 6.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,

More information

SECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES

SECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only

More information

Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP

Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE

NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE : THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE A CLOSER LOOK REVEALS WHY PROXY-BASED ARCHITECTURE IS UNIQUELY EFFECTIVE IN DEFENDING AGAINST WEB-BASED THREATS. The web is central to the way we work, live,

More information

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon

More information

WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS

WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS WHITEPAPER EXECUTIVE SUMMARY Microsoft SharePoint is a web-based collaboration and information-sharing platform designed as a centralized replacement for multiple web applications. SharePoint leverages

More information

Blue Coat Systems. Client Manager Redundancy for ProxyClient Deployments

Blue Coat Systems. Client Manager Redundancy for ProxyClient Deployments Blue Coat Systems Client Manager Redundancy for ProxyClient Deployments Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means

More information

Security Report. Security Empowers Business DO NOT ENTER. Blue Coat Research Maps the Web s Shadiest Neighborhoods. September 2015

Security Report. Security Empowers Business DO NOT ENTER. Blue Coat Research Maps the Web s Shadiest Neighborhoods. September 2015 Security Report Security Empowers Business DO NOT ENTER Blue Coat Research Maps the Web s Shadiest Neighborhoods September 2015 The Web s Shadiest Neighborhoods KEY FINDINGS There has been an explosion

More information

Blue Coat Security First Steps Solution for Integrating Authentication

Blue Coat Security First Steps Solution for Integrating Authentication Solution for Integrating Authentication using IWA Direct SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

A TECHNICAL REVIEW OF CACHING TECHNOLOGIES

A TECHNICAL REVIEW OF CACHING TECHNOLOGIES WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,

More information

VIRTUALIZED SECURITY: THE NEXT GENERATION OF CONSOLIDATION

VIRTUALIZED SECURITY: THE NEXT GENERATION OF CONSOLIDATION WHITEPAPER A consolidated security infrastructure is more than just an idea; in today s world of increasingly diversified threats and associated rising costs, it s imperative that organizations adopt a

More information

Content Analysis System Guide

Content Analysis System Guide Content Analysis System Guide Version 1.1.4.1 - 2 - Content Analysis System Administration Guide Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER,

More information

SNMP Critical Resource Monitoring

SNMP Critical Resource Monitoring SNMP Critical Resource Monitoring SGOS 6.5.x and later i SNMP Critical Resource Monitoring Contact Information Americas: Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the World:

More information

Reverse Proxy Deployment Guide

Reverse Proxy Deployment Guide Reverse Proxy Deployment Guide PDF of the Online WebGuide SGOS 6.5.x and Later Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,

More information

Integrating the ProxySG and ProxyAV Appliances. For SGOS 6.5 and later and AVOS 3.5 and later

Integrating the ProxySG and ProxyAV Appliances. For SGOS 6.5 and later and AVOS 3.5 and later Integrating the ProxySG and ProxyAV Appliances For SGOS 6.5 and later and AVOS 3.5 and later i Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the

More information

BOOSTING INTERNET ACCESS LINK PERFORMANCE WITH BLUE COAT WAN OPTIMIZATION TECHNOLOGIES

BOOSTING INTERNET ACCESS LINK PERFORMANCE WITH BLUE COAT WAN OPTIMIZATION TECHNOLOGIES PERFORMANCE WITH BLUE COAT WHITEPAPER EXECUTIVE SUMMARY Gateways to Internet traffic are facing unprecedented loads and growth rates in all types of industries and organizations due to the growth of mobile

More information

Policy Guide. Version 6.8.2/Doc Revision: 10/23/15

Policy Guide. Version 6.8.2/Doc Revision: 10/23/15 Policy Guide Version 6.8.2/Doc Revision: 10/23/15 Blue Coat Web Security Service Copyrights 2015 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Blue Coat Cloud Data Protection Server Administration Guide

Blue Coat Cloud Data Protection Server Administration Guide Blue Coat Cloud Data Protection Server Administration Guide Software version 4.5.x September 16, 2015 2015 Blue Coat Systems, Inc. All rights reserved. Blue Coat, the Blue Coat logos, ProxySG, PacketShaper,

More information

IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES

IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES TECHNICAL BRIEF INTRODUCTION The purpose of this document is to explain how Integrated Windows Authentication (IWA) works with the ProxySG appliance,

More information

Administration Guide. Content Analysis 1.3.6.x

Administration Guide. Content Analysis 1.3.6.x Administration Guide Content Analysis 1.3.6.x Third Party Copyright Notices 2016 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,

More information

Blue Coat ProxySG Authentication Guide. SGOS 6.5.x

Blue Coat ProxySG Authentication Guide. SGOS 6.5.x Blue Coat ProxySG Authentication Guide SGOS 6.5.x 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9,

More information

Initial Configuration Guide

Initial Configuration Guide Initial Configuration Guide For Virtual Appliances Management Center 1.3.2.1 Version 1.3.2.1 Third Party Copyright Notices Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER,

More information

Proxy Forwarding Access Method

Proxy Forwarding Access Method Proxy Forwarding Access Method Version 6.8.3/Doc Revision: 12/17/15 Blue Coat Web Security Service Proxy Fowarding Access Method Copyrights 2015 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG,

More information

Proxy Forwarding Access Method

Proxy Forwarding Access Method Proxy Forwarding Access Method Version 6.8.5/Doc Revision: 02/26/16 Blue Coat Web Security Service/Page 2 Proxy Fowarding Access Method/Page 3 Copyrights 2016 Blue Coat Systems, Inc.All rights reserved.

More information

Blue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS 5.5-6.2

Blue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS 5.5-6.2 Blue Coat Systems Reference Guide WCCP Reference Guide For SGOS 5.5-6.2 Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the World: Blue Coat Systems

More information

Secure Web Gateway Virtual Appliance Initial Configuration Guide Platform: VMware vsphere Hypervisor

Secure Web Gateway Virtual Appliance Initial Configuration Guide Platform: VMware vsphere Hypervisor Secure Web Gateway Virtual Appliance Initial Configuration Guide Platform: VMware vsphere Hypervisor SGOS 6.5.x and later i Secure Web Gateway Virtual Appliance Contact Information Americas: Blue Coat

More information

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the

More information

BCAAA 6.1 Service Requirements

BCAAA 6.1 Service Requirements BCAAA 6.1 Service Requirements Current Version: 6.1.3 Image Location: The current version of BCAAA is available for download with the latest SGOS GA releases SGOS Compatibility: SGOS 5.4, 5.5, 6.x Platform

More information

Blue Coat Systems. PacketShaper Redundant Setup

Blue Coat Systems. PacketShaper Redundant Setup Blue Coat Systems PacketShaper Redundant Setup Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled,

More information

ProxySG 510/810 Series. Hard Disk Drive Installation

ProxySG 510/810 Series. Hard Disk Drive Installation Blue Coat 510/810 Series Disk Drive Installation Blue Coat ProxySG 510/810 Series Hard Disk Drive Installation Section A: Before You Begin About this Document This document describes how to replace disk

More information

Security Empowers Business

Security Empowers Business WHITEPAPER PREPARING YOUR NETWORK TO MANAGE TODAY S WEB THREATS AND LEVERAGE KEY WEB TRENDS Today s complex web environment is driving the need for a web security infrastructure with greater levels of

More information

Blue Coat Systems Cloud Security Service Overview. Blue Coat Cloud Security Service (ThreatPulse)

Blue Coat Systems Cloud Security Service Overview. Blue Coat Cloud Security Service (ThreatPulse) Blue Coat Systems Cloud Security Service Overview Blue Coat Cloud Security Service (ThreatPulse) Blue Coat Cloud Security Service: Security Statements Contact Information Americas: Blue Coat Systems Inc.

More information

Products & Services. Security Empowers Business SHIFT FORWARD. Security powers business acceleration.

Products & Services. Security Empowers Business SHIFT FORWARD. Security powers business acceleration. Products & Services Security Empowers Business SHIFT FORWARD Security powers business acceleration. Security & Policy Enforcement Center Old-school security is all about protection. Avoiding the unthinkable.

More information

EXPLORING ADVANCED THREATS

EXPLORING ADVANCED THREATS Whitepaper Blue Coat Advanced Threat Protection Series Security Empowers Business EXPLORING ADVANCED THREATS Advanced Threat Protection (ATP) Essentials, Part 1 SECURITY ISN T ONLY ABOUT PREPARING FOR

More information

BLUE COAT SYSTEMS 2014 MOBILE MALWARE REPORT

BLUE COAT SYSTEMS 2014 MOBILE MALWARE REPORT Security Report Security Empowers Business BLUE COAT SYSTEMS 2014 MOBILE MALWARE REPORT A New Look at Old Threats MOBILE DEVICES STILL REMAIN LARGELY FREE OF DRIVE-BY DOWNLOADS Mobile Malware: A New Look

More information

REVOLUTIONIZING ADVANCED THREAT PROTECTION

REVOLUTIONIZING ADVANCED THREAT PROTECTION REVOLUTIONIZING ADVANCED THREAT PROTECTION HOW TO BEAT ADVANCED THREATS WITH AN INTEGRATED APPROACH TO SECURITY VISIBILITY, ANALYTICS, THREAT INTELLIGENCE, AND ENFORCEMENT INTRODUCTION Today s threat protection

More information

NEXT GENERATION SECURITY ANALYTICS: REAL WORLD USE CASES KEY FEATURES AND NEW USES FOR THE BLUE COAT SECURITY ANALYTICS PLATFORM

NEXT GENERATION SECURITY ANALYTICS: REAL WORLD USE CASES KEY FEATURES AND NEW USES FOR THE BLUE COAT SECURITY ANALYTICS PLATFORM NEXT GENERATION SECURITY ANALYTICS: REAL WORLD USE CASES KEY FEATURES AND NEW USES FOR THE BLUE COAT SECURITY ANALYTICS PLATFORM SECURITY ANALYTICS: MUCH MORE THAN NETWORK FORENSICS Prior generations of

More information

Unified Agent Access Method

Unified Agent Access Method Unified Agent Access Method Version 6.8.5/Doc Revision: 04/21/16 Blue Coat Web Security Service/Page 2 Page 3 Copyrights 2016 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER,

More information

Installation Guide Wireless 4-Port USB Sharing Station. GUWIP204 Part No. M1172-a

Installation Guide Wireless 4-Port USB Sharing Station. GUWIP204 Part No. M1172-a Installation Guide Wireless 4-Port USB Sharing Station 1 GUWIP204 Part No. M1172-a 2011 IOGEAR. All Rights Reserved. PKG-M1172-a IOGEAR, the IOGEAR logo, MiniView, VSE are trademarks or registered trademarks

More information

SSL Proxy Deployment Guide

SSL Proxy Deployment Guide SSL Proxy Deployment Guide SGOS 6.5 and later Version: 02-07.14.15 - 2 - Copyrights 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS,

More information

SV800 and SV1800 Getting Started Guide

SV800 and SV1800 Getting Started Guide SV800 and SV1800 Getting Started Guide Version: 3.8 Document Revision: 09/19/14 Blue Coat SV800 & SV1800-2 - Getting Started Guide Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights

More information

SNMP Monitoring with Cacti

SNMP Monitoring with Cacti Blue Coat Systems SNMP Monitoring with Cacti A Guide to Proactively Monitor ProxySG and ProxyAV Appliances in SWG and WANOP Deployments Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide.

More information

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6.

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6. Technical note Version 1.0 23/12/13 Product Information Partner Name Web Site Product Name Blue Coat Systems, Inc. www.bluecoat.com ProxySG Version & Platform SGOS 6.5 Product Description Blue Coat ProxySG

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

Exchange Security. User Manual

Exchange Security. User Manual Exchange Security User Manual Avira Exchange Security Table of contents Table of contents 1 Quickstart... 5 1.1 Installing on an Exchange server... 5 1.2 Starting the Avira Exchange Security Management

More information

COMPUTER SETUP GUIDE LAPTOP

COMPUTER SETUP GUIDE LAPTOP COMPUTER SETUP GUIDE LAPTOP HARDWARE SET UP Please allow seven business days for all computer equipment to arrive. In some cases, components may be shipped in multiple boxes and may arrive on different

More information

Blue Coat Systems Reporter 9.x

Blue Coat Systems Reporter 9.x Blue Coat Systems Reporter 9.x Initial Configuration Guide Reporter Versions 9.4.x Blue Coat Reporter 9.x Initial Configuration Guide Contact Information Americas: Blue Coat Systems Inc. 420 North Mary

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance

An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance An Oracle Technical White Paper May 2015 How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing Kaspersky

More information

Initial Configuration Guide

Initial Configuration Guide Blue Coat Systems ProxySG VA Initial Configuration Guide For SGOS 5.5.2 or later Platform: ESX / ESXi Server Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121

More information

ScanShell.Net Install Guide

ScanShell.Net Install Guide ScanShell.Net Install Guide Please install the software first - DO NOT PLUG IN THE SCANNER The scanner has been carefully packaged to avoid damage during transportation. Before operating the scanner, please

More information

AVG File Server 2012. User Manual. Document revision 2012.03 (8/19/2011)

AVG File Server 2012. User Manual. Document revision 2012.03 (8/19/2011) AVG File Server 2012 User Manual Document revision 2012.03 (8/19/2011) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This

More information

Each ievo reader needs its own network cable, as each reader has its own IP address. Ensure this has been taken into consideration

Each ievo reader needs its own network cable, as each reader has its own IP address. Ensure this has been taken into consideration WELCOME ievo would like to thank you for purchasing our product. ievo advise the use of a. Ensure you have calculated the correct power supply amp rating if you are connecting the ievo board and other

More information

ProxySG ICAP Integration

ProxySG ICAP Integration ProxySG ICAP Integration Blue Coat s proxies can utilize the Internet Content Adaptation Protocol (ICAP) to hand off HTTP requests and/or responses to an external server for configured processing and transformation.

More information

Threat Containment for Facebook

Threat Containment for Facebook Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing

More information

F-Secure Anti-Virus. for Windows Servers. Administrator s Guide

F-Secure Anti-Virus. for Windows Servers. Administrator s Guide F-Secure Anti-Virus for Windows Servers Administrator s Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either

More information

Xerox Security Bulletin XRX13-006

Xerox Security Bulletin XRX13-006 Cumulative update for Common Criteria Certification Background The System Software Versions listed below for the WorkCentre 5845/5855/5865/5875/5890, WorkCentre 7220/7225, WorkCentre 7830/7835/7845/7855

More information

TREND MICROTM ServerProtectTM for EMC Celerra TM

TREND MICROTM ServerProtectTM for EMC Celerra TM TREND MICROTM ServerProtectTM for EMC Celerra TM Filers Getting Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

More information

Using PacketShaper to Control Bring Your Own Device Traffic

Using PacketShaper to Control Bring Your Own Device Traffic Blue Coat Systems Using PacketShaper to Control Bring Your Own Device Traffic Tips and Tricks Supporting the BYOD Worldwide Phenomenon Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide.

More information

McAfee MOVE / VMware Collaboration Best Practices

McAfee MOVE / VMware Collaboration Best Practices McAfee MOVE / VMware Collaboration Best Practices Christie J. Karrels Sales Engineer Federal DoD January 11, 2013 1 P a g e Contents Introduction... 3 Traditional Anti-Malware vs. Optimized Anti-Malware...

More information

Asset Inventory Reference

Asset Inventory Reference www.novell.com/documentation Asset Inventory Reference ZENworks 11 Support Pack 3 July 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Project management integrated into Outlook

Project management integrated into Outlook y Project management integrated into Outlook InLoox PM 7.x Help for the configuration for MySQL-Server An InLoox Whitepaper Published: October 2011 Copyright: InLoox GmbH 2011 You find up-to-date information

More information

User Manual. HitmanPro.Kickstart User Manual Page 1

User Manual. HitmanPro.Kickstart User Manual Page 1 User Manual HitmanPro.Kickstart User Manual Page 1 Table of Contents 1 Introduction to HitmanPro.Kickstart... 3 2 What is ransomware?... 4 3 Why do I need HitmanPro.Kickstart?... 6 4 Creating a HitmanPro.Kickstart

More information

Blue Coat Systems ProxySG Appliance

Blue Coat Systems ProxySG Appliance Blue Coat Systems ProxySG Appliance SGOS 6.2 Upgrade/Downgrade Feature Change Reference Version SGOS 6.2 Blue Coat SGOS 6.2 Upgrade/Downgrade Feature Change Reference Contact Information Americas: Blue

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Downloading and Configuring WebFilter

Downloading and Configuring WebFilter Downloading and Configuring WebFilter What is URL Filtering? URL filtering is a type of transaction content filtering that limits a user s Web site access through a policy that is associated with a specific

More information

Wireless Network Guide

Wireless Network Guide DYONICS PULSE Wireless Image Solution The Power of Connection. Surgical media access made simple. Wireless Network Guide DYONICS PULSE WIRELESS IMAGE SOLUTION Contents Introduction...1 DYONICS PULSE Network

More information

McAfee VirusScan Enterprise 8.7 Users Guide

McAfee VirusScan Enterprise 8.7 Users Guide McAfee VirusScan Enterprise 8.7 Users Guide MCAFEE VIRUSSCAN 8.7 (VS) USER'S GUIDE This document aims to introduce to the users McAfee VS 8.7 software and covers information about how to use it in order

More information

McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation

McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation 2013.06 McAfee Endpoint Encryption for Files and Folders (EEFF) uses powerful encryption technology to allow you to protect information

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Sophos for Microsoft SharePoint Help. Product version: 2.0

Sophos for Microsoft SharePoint Help. Product version: 2.0 Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2

More information

T E C H N I C A L S A L E S S O L U T I O N

T E C H N I C A L S A L E S S O L U T I O N Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

User Guide - escan for Linux File Server

User Guide - escan for Linux File Server 1 User Guide - escan for Linux File Server 2 I. Required escan for Linux RPMS / Debian packages RPM Package Name File name mwadmin mwav escan escan-rtm mwadmin-x.x-x..i386.rpm mwav-x.x-x.

More information

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

More information

Avira AntiVir Exchange User Manual

Avira AntiVir Exchange User Manual Avira AntiVir Exchange User Manual Contents 1 Quickstart... 5 1.1 Installation on an Exchange server... 5 1.2 Starting the AntiVir Exchange Management Console... 5 1.3 Configuration in the AntiVir Exchange

More information

FOUR STEPS TO HIGH PERFORMANCE WAN AND INTERNET

FOUR STEPS TO HIGH PERFORMANCE WAN AND INTERNET WHITEPAPER VISIBILITY AND CONTROL ARE KEY TO AN EFFECTIVE WAN PERFORMANCE STRATEGY Problems with application and network performance on the WAN and Internet links are caused by many and varied issues congestion,

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

Using the ievo fingerprint reader with Net2

Using the ievo fingerprint reader with Net2 Using the ievo fingerprint reader with How does it work? The ievo system stores the encoded fingerprint information within each reader. Once registered on the enrolment reader, the fingerprint data is

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Email Data Protection. Administrator Guide

Email Data Protection. Administrator Guide Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,

More information

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet

More information

ThinkPad USB Portable Secure Hard Drive User Guide

ThinkPad USB Portable Secure Hard Drive User Guide ThinkPad USB Portable Secure Hard Drive User Guide Note Before installing the product, be sure to read the information in Lenovo Limited Warranty on page B-1 and Before you begin the installation on page

More information

Winzer Corporation 1 Revision: 4.0

Winzer Corporation 1 Revision: 4.0 Table of Content Section 1: Getting Started... 2 1.1 Overview... 2 Section 2: Installation Overview... 3 2.1 Install CD / Start.exe... 3 2.2 Welcome Screen... 4 2.3 Device Selection... 4 2.4 Auto or Industrial...

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

AccXES Account Management Tool Administrator s Guide Version 10.0

AccXES Account Management Tool Administrator s Guide Version 10.0 AccXES Account Management Tool Administrator s Guide Version 10.0 701P41531 May 2004 Trademark Acknowledgments XEROX, AccXES, The Document Company, and the identifying product names and numbers herein

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

IceWarp Unified Communications. AntiVirus Reference. Version 10.4

IceWarp Unified Communications. AntiVirus Reference. Version 10.4 IceWarp Unified Communications AntiVirus Reference Version 10.4 Printed on 13 January, 2012 Contents AntiVirus 1 Anti-Virus... 2 Latest Avast! Engine... 2 Kaspersky Anti-Virus Support... 2 Support for

More information

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

F-Secure Anti-Virus for Windows Servers. Administrator's Guide F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System

More information