W H I T E P A P E R : T E C H N I C A L. Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving

Size: px
Start display at page:

Download "W H I T E P A P E R : T E C H N I C A L. Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving"

Transcription

1 W H I T E P A P E R : T E C H N I C A L Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving Rob Forgione Technical Field Enablement March 2009

2 White Paper: Symantec Technical Contents Purpose... 3 Enterprise Vault Services and Tasks... 4 Exchange Server Security... 5 Enterprise Vault System Mailboxes... 5 Journal Mailboxes... 5 Client Access... 6 Access to items via Outlook... 6 Outlook on Terminal Services and Citrix... 7 Outlook 2003 Script Permissions... 7 Vault Cache security... 8 Accessing items via Enterprise Vault Outlook Web Access (OWA)... 8 Forms based Authentication Enterprise Vault Anonymous Account for OWA Configuring the Enterprise Vault Anonymous user on the Enterprise Vault server OWA 2007 and ISA OWA 2000/2003 and ISA Accessing items via RPC over HTTP Exchange 2007 RPC over HTTP and ISA Exchange 2003 RPC over HTTP and ISA Conclusion If you have any comments on this Whitepaper please EV-TFE-Feedback@Symantec.com

3 Purpose The purpose of this document is to detail how Enterprise Vault: Can securely access data to be archived Provides security surrounding end-user access Provides a means for administrators to securely manage Exchange data This document will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Exchange and Active Directory and provide insight as to how to change some of the settings to be configured in line with organizational preferences. This whitepaper assumes the reader has already read the Security Model for Enterprise Vault 8.0 and SQL server whitepaper and is familiar with the security concepts of Enterprise Vault. The Security Model series consists of: Security Model Enterprise Vault 8.0 and SQL server Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving Enterprise Vault 8.0 Security Model for Lotus Domino Archiving Enterprise Vault 8.0 Security Model for File System Archiving Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving Enterprise Vault 8.0 Security Model for SMTP Archiving Enterprise Vault 8.0 Security Model for Discovery Accelerator 8.0 Enterprise Vault 8.0 Security Model for Compliance Accelerator 8.0 Enterprise Vault 8.0 Security Model for Automatic Classification Engine 8.0 Enterprise Vault 8.0 Security Model for Secure Messaging 8.0 This whitepaper is intended to train the reader the concepts behind Enterprise Vault 8.0 security for Microsoft Exchange servers and users of Microsoft Outlook, Outlook Web Access, and RPC over HTTP. 3

4 Enterprise Vault Services and Tasks Enterprise Vault s Exchange archiving solution uses the following Enterprise Vault Tasks: Exchange Provisioning Task Exchange Mailbox Archiving Task Exchange Journaling Task Exchange Public Folder Task PST Locator Task PST Collector Task PST Migrator Task Exchange archiving tasks are run within the context of the VSA by default. If required, administrators can change the tasks to run under different accounts. This may be useful if they have different Exchange Server environments. However, the chosen account must have the following permissions: Act as part of the operating system Log on locally Log on as a service Replace a process level token 4

5 Exchange Server Security The Vault Service Account (VSA) needs to be able to access mailboxes on the Exchange Servers that Enterprise Vault is to archive. For the optimal security, Full Control permissions should be set explicitly on each Exchange Server that will be archived. If an additional Exchange Server is added to the environment at a later time, this procedure needs to be performed again on the new server to enable access to its mailboxes for the VSA. If desired, to save configuration time, permissions at the Organization or Administrative Group level can be added in the Exchange hierarchy, provided these permissions flow down to the individual Exchange servers. Microsoft Knowledge Base Article describes in more detail how to achieve this. This will enable the permissions to be propagated automatically to any new Exchange Servers added below the level at which the permissions are assigned. The VSA should not be a member of the Domain Administrators group, as Domain Admin accounts, by default, inherit specific Deny permissions which prevent the ability to archive from mailboxes. It is therefore better to assign Exchange Server permissions explicitly. Enterprise Vault System Mailboxes Enterprise Vault System Mailboxes (sometimes referred to as Service Mailboxes) are the primary mailboxes that Enterprise Vault archiving tasks use to establish MAPI connections to the target Exchange servers with. Every Exchange server that hosts mailboxes to be archived requires an EV system mailbox hosted locally on the Exchange server. If an environment has 14 Exchange server targets, the solution will require 14 EV system mailboxes. Each EV system mailbox requires an associated account in AD. This account only requires a mailbox. There are no additional AD or EV permissions needed for this account. Once the EV system mailbox has been created, it is a good idea to either log into windows using the EV system mailbox account or to send a message to the account s mailbox to activate it. This is because Enterprise Vault cannot log into the EV system mailbox until a prior MAPI connection has been established. The EV system mailbox is a dedicated mailbox for MAPI based archiving operations and cannot be enabled for archiving or journaling. It is recommended to keep these mailboxes empty and dedicated for use by Enterprise Vault and no other applications. Exchange Administrators may be tempted to hide the System mailbox from the GAL, however, this will cause EV login to fail thus breaking the archiving mechanism. Journal Mailboxes Journal Mailboxes are used specifically for Exchange to funnel copies of all of the message traffic to and from all journal enabled recipients to a specific mailbox. Enterprise Vault then archives all of these messages into a Journal archive. Organizations should feel free to grant Read permissions to the Journal archive for any accounts they feel should have access to search through all corporate . However, for organizations that take a more strict approach to access, only the Vault Service account (VSA) would require access for Enterprise Vault applications that require it, such as Compliance Accelerator or Discovery Accelerator. The Journal Mailbox should not be used as the EV system mailbox, and vice versa. As discussed previously, EV system mailboxes are used for MAPI based archiving operations and cannot be enabled for archiving. Sending all journaled s to an EV system mailbox will result in MAPI errors and degradation of the system. 5

6 Client Access Access to items via Outlook Enterprise Vault uses Microsoft Internet Information Services (IIS) and web-based security when any access to archived items is requested. The EV server verifies the requesting user by either Integrated Windows Authentication (IWA), that is, their logged on user credentials, or through a Basic authentication prompt. Upon installation of the EV server, the Enterprisevault virtual directory is configured to accept both Basic and Integrated Windows authentication. The concept of user access to archived items in Exchange mailboxes is simple. The original items have been removed and most often have (optionally) been replaced by a shortcut. This shortcut is nothing more than a custom message that contains information such as the original item s metadata and (optionally) the body and/or links to the attachment. Double clicking the shortcut runs a VB Script in the background that calls the Enterprise Vault server and requests that a copy of the original item be temporarily delivered to the requestor. The Enterprise Vault server looks at the requesting user ID variables being sent and compares them to the Vault ID security ACL. If the requesting user does not have permissions to view the item, access will be denied. For SSL communications between Client workstations and Enterprise Vault, see the section titled Client Access Security in the prerequisite Security Model for Enterprise Vault 8.0 and SQL Database Server whitepaper. 6

7 Outlook on Terminal Services and Citrix The default installation of Outlook on Terminal Services or Citrix can cause difficulty for users accessing archived items. This is due to a security feature on Terminal Server and Citrix that blocks Visual Basic Scripting Support. As stated previously, the retrieval of archived items for viewing is done with VB Scripting. Without this, the call fails and the user is presented with the contents of the shortcut in Exchange, rather than the retrieved item. Refer to this Microsoft technical article to addresses this issue: Outlook 2003 Script Permissions Similar to the Terminal Server and Citrix issue, Outlook 2003 users that have been given delegate rights or otherwise granted access to another user s mailbox or Outlook folder will not be able to access archived items if mailbox owners do not override the Outlook security setting of restricting VB Script in shared folders. The same also holds true for shortcuts in Public Folders. Figure 1 shows the necessary settings in Outlook 2003 to address this. Figure 1 Outlook 2003: Advanced Options These options can also be forcibly enabled via an Outlook setting set in the Advanced properties of the Enterprise Vault Exchange Mailbox Policy. Reference Figure 2. Figure 2 - Exchange Mailbox Policy Advanced settings for Outlook 7

8 Vault Cache security One of the benefits of the Enterprise Vault client add-in is the use of Vault Cache. Vault Cache files reside on the local user s PC or laptop which allows for access to archived items when not connected to the network, as well as a network bandwidth optimization benefit. Vault Cache security is typically left to the devices of the host operating system such as encryption methods and NTFS security on the folder (typically C:\Documents and Settings\<USER>\Local Settings). Accessing items via Enterprise Vault Outlook Web Access (OWA) The following figures will show how the Enterprise Vault works with different types of OWA deployments. Figure 3 - Enterprise Vault and OWA 2007 In Figure 3 above, the Exchange 2007 CAS server connects to the Enterprise Vault server using anonymous authentication. On the Enterprise Vault server, the Enterprise Vault Anonymous account manages the anonymous connections. When a user starts Archive Explorer or an archive search from the OWA client, the client will always try to connect directly to the Enterprise Vault Web Application on the Enterprise Vault server. If clients connect to the Exchange 2007 CAS server using Microsoft ISA Server, then the Enterprise Vault Web Access application must be published by the ISA Server in addition to the Exchange 2007 CAS server. 8

9 Figure 4 - EV and OWA 2000/2003 with a Front End Exchange server Figure 4 shows OWA 2000 and 2003 users connecting to the front-end server using basic authentication. Integrated Windows Authentication (IWA) is used for the connection between Exchange Servers. Anonymous authentication is used for the connection between the back-end Exchange Server and the Enterprise Vault server. On the Enterprise Vault server, the Enterprise Vault Anonymous account manages the anonymous connections. An Enterprise Vault Exchange Mailbox Policy setting can be used to enable OWA 2003 clients to connect directly to the Enterprise Vault server when users start Archive Explorer or an archive search from their OWA client. If clients connect to the OWA 2003 front-end server through an ISA Server, and direct connections are configured for Archive Explorer and archive search, then the OWA 2003 front-end server and the Enterprise Vault Web Access application must be published to clients. If direct connections are not configured (default for OWA 2003) then only the OWA 2003 front-end server needs to be published. 9

10 Figure 5 - EV and OWA 2000/2003 Back End only Figure 5 illustrates how users connect to one of two Back-end Exchange Servers directly. This configuration can provide more security, as it could force users to use IWA authentication instead of basic authentication when connecting to the OWA servers. Anonymous authentication is used for the connection between the Exchange Server and the Enterprise Vault server and the Enterprise Vault Anonymous account manages the anonymous connections. As in previous configurations, an Enterprise Vault Exchange Mailbox Policy setting can be used to enable OWA 2003 clients to connect directly to the Enterprise Vault server when users start Archive Explorer or an archive search from their OWA client. If clients connect to the OWA 2003 back-end server through an ISA Server, and direct connections are configured for Archive Explorer and archive search, then the OWA 2003 back-end server and the Enterprise Vault Web Access application must be published to clients. If direct connections are not configured (default for OWA 2003) then only the OWA 2003 back-end server needs to be published. 10

11 Forms based Authentication When using forms-based authentication, OWA 2003 and OWA 2007 client users are prompted to re-enter login credentials when starting the Enterprise Vault Search or Archive Explorer features in the OWA client. This is because the request accesses a different IIS virtual directory which requires different authentication. The authentication is valid for the session. The View mode setting, which can be controlled in the Advanced Exchange Mailbox Policy settings, controls what happens when a user clicks the Open the original item banner in the shortcut. If OWA is set, then the original item is rendered by OWA (and looks like an OWA message). If Enterprise Vault is set, then the item is rendered by Enterprise Vault (and looks like a Web browser page). When View mode is set to Enterprise Vault, users are prompted to re-authenticate when they first open an archived item. Enterprise Vault Anonymous Account for OWA The EV OWA Anonymous Account was created to allow OWA users the ability to access archived items without having to use clear text Basic Authentication to verify the requesting user s identity to Enterprise Vault. The EV OWA Anonymous Account in its simplest definition is an account that is leveraged by Enterprise Vault behind the scenes to request items on behalf of the user. Because the Anonymous account is only used with specific commands and tasks, and the fact that it is not able to access any network resources except the designated EV virtual directories and files, makes it technically impossible for any data to be compromised through any possible misuse of the account. Configuring the Enterprise Vault Anonymous user on the Enterprise Vault server The Anonymous user account must be created with the intention that it is only used for EV OWA access. The account must be a domain user account (a local machine account cannot be used). When the owauser.wsf script runs to configure the EV OWA Extensions, it assigns the following user rights to the Anonymous user: Access this computer from the network (SeNetworkLogonRight) Log on as a service (SeInteractiveLogonRight) Log on as a batch job (SeBatchLogonRight) Bypass traverse checking (SeChangeNotifyPrivilege) For OWA 2003/2007, owauser.wsf creates (or updates) the EVAnon virtual directory on the Enterprise Vault server. EVAnon points to the Enterprise Vault\WebApp folder and assigns anonymous access permissions to the Enterprise Vault Anonymous user. It also grants any customer specified back-end OWA servers access to EVAnon. Figure 6 shows how the script protects the EVAnon virtual directory. 11

12 Figure 6 - EVAnon virtual directory properties In Figure 6 above, the EVAnon virtual directory will only accept calls from Exchange server The EVAnon virtual directory will not accept calls from any other servers. For OWA 2000, owauser.wsf updates the IIS settings for the OWARDR.asp file in the EnterpriseVault virtual directory, so that requests for OWARDR.asp are run under the context of the EV OWA Anonymous user. Access to OWARDR.asp is only granted to specified back-end OWA servers in a fashion similar to Figure 6 above. The owauser.wsf script also creates (or updates) the following two Registry values: 12

13 AnonymousUser o Located under HKEY_CURRENT_USER\Software\KVS\Enterprise Vault o The value of this setting is the full name, including the domain, of the Anonymous user. For example, mydomain\ev_owa OwaWebAppAlias (OWA 2003 only) o Under HKEY_LOCAL_MACHINE\SOFTWARE\KVS\Enterprise Vault\Install o The value of this setting is EVAnon To complete the configuration, a restart of the Enterprise Vault Admin service and synchronization of the mailboxes is required. Restarting the Enterprise Vault Admin service loads the Enterprise Vault Anonymous User account into the EV server so EV will recognize it. Synchronizing the mailboxes reads the value of the OWAWebAppAlias registry key and loads it into the hidden settings of the mailbox so the mailbox knows how to contact the EV server when a user requests to view an item. OWA 2007 and ISA 2006 Microsoft ISA Server 2006 can be used to secure access to OWA 2007 servers by using Web publishing rules to make Exchange 2007 OWA Web site available on the Internet. Figure 7 shows how ISA Server 2006 can provide access to Enterprise Vault. Figure 7 - ISA 2006, Exchange 2007, EV 2007 In addition to publishing the OWA 2007 Web site, organizations also need to publish the Enterprise Vault Web Access application to their clients as Archive Explorer and archive search client requests attempt to connect to the Enterprise Vault server directly. Organizations should also reference technote which details a known ISA 2006 issue in which users can not open attachments via OWA 2003 and RPC client using connection set to 'Use Proxy'. 13

14 OWA 2000/2003 and ISA 2004 When configuring ISA Server 2004 for basic or forms-based authentication, the Mail Server Publishing Rule will typically reference 3 standard paths, which are the Exchange, Public and Exchweb virtual directories. For Enterprise Vault support, the extra path of EnterpriseVaultProxy needs to be added. Figure 8 shows the process of end user access via OWA using and ISA Firewall. Figure 8 - ISA 2004, Exchange 2003/2000, EV To add the EnterpriseVaultProxy path in ISA, an administrator needs to add and publish /EnterpriseVaultProxy/* to the list of paths in the ISA Firewall Policy. 14

15 Accessing items via RPC over HTTP Outlook users can access mailboxes on Exchange Server 2007 (Outlook Anywhere) and 2003 using Remote Procedure Calls (RPC) over HTTP. With this protocol, MAPI protocol is used to tunnel Outlook RPC requests inside an HTTP session. This allows remote Outlook users to connect to their Exchange Server mailbox without the requirement for Outlook Web Access (OWA) or a virtual private network (VPN) connection. The HTTP session terminates at a server running Internet Information Services (IIS) that has the Microsoft Windows Server 2003 RPC over HTTP Proxy networking component installed. This server is called an RPC proxy server. To support user access to Enterprise Vault using OWA and/or RPC over HTTP, the OWA & RPC Extensions EV component needs to be installed and configured on the Exchange and Enterprise Vault servers. The steps for configuring OWA access are different from the steps for configuring RPC over HTTP access; however, the security model does not change. The EV client will attempt to connect directly to the EV server using HTTP. If successful, the client will use that method for EV requests. If the direct connection attempt fails, then it will connect in a fashion similar to OWA in the previous section, which means that connections between RPC target Exchange Servers and Enterprise Vault servers will use EV Anonymous authentication. Exchange 2007 RPC over HTTP and ISA 2006 Microsoft ISA Server 2006 can be used to secure RPC over HTTP access to Exchange 2007 Servers by using Web publishing rules to make the RPC Web site available on the Internet. To configure the ISA 2006, organizations need to: Configure an RPC firewall policy that publishes the \rpc virtual directory on the Exchange 2007 CAS server through ISA Server Configure an Enterprise Vault firewall policy on ISA 2006 that publishes the \EnterpriseVault virtual directory on the Enterprise Vault server. Exchange 2003 RPC over HTTP and ISA 2004 Microsoft ISA Server 2004 can be used to secure access to RPC Exchange Servers by using Web publishing rules (reverse proxy), to make RPC proxy servers available on the Internet. To configure the ISA 2004, organizations need to: Configure an RPC firewall policy that publishes the \rpc virtual directory on the RPC proxy server through ISA Server Configure an Enterprise Vault firewall policy that publishes the \EnterpriseVaultProxy virtual directory on the RPC proxy server through ISA Server Procedures for configuring RPC and Enterprise Vault firewall policies for can be found in the Configuring ISA Server 2004 for Exchange Server 2003 RPC over HTTP access to Enterprise Vault section of the Setting_up_Exchange_Server_Archiving.pdf that ships with Enterprise Vault

16 Conclusion In this whitepaper we have discussed the security aspects of archiving Exchange servers with Enterprise Vault 8.0. We have discussed the necessity for an Enterprise Vault service mailbox and the security around Journal archives and Vault Cache. We discussed end-user access to archived items from Outlook, OWA, and RPC over HTTP as well as the additional security provided with the use of ISA servers. Below is a list of the other Security Model topics in this series that may be of interest. Enterprise Vault 8.0 Security Model for File System Archiving Enterprise Vault 8.0 Security Model for Microsoft Sharepoint Archiving Enterprise Vault 8.0 Security Model for SMTP Archiving Enterprise Vault 8.0 Security Model for Discovery Accelerator 8.0 Enterprise Vault 8.0 Security Model for Compliance Accelerator 8.0 Enterprise Vault 8.0 Security Model for Automatic Classification Engine 8.0 Enterprise Vault 8.0 Security Model for Secure Messaging 8.0 Enterprise Vault 8.0 Security Model for Lotus Domino Archiving 16

17 About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help businesses and consumers secure and manage their information. Headquartered in Cupertino, Calif., Symantec has operations in 40 countries. More information is available at For specific country offices and contact numbers, please visit our Web site. For product information in the U.S., call toll-free 1 (800) Symantec Corporation World Headquarters Stevens Creek Boulevard Cupertino, CA USA +1 (408) (800) Copyright 2009 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

PST Migration with Enterprise Vault 8.0: Part 1 - Solution Overview. Author: Andy Joyce, EV Technical Product Management Date: April, 2009

PST Migration with Enterprise Vault 8.0: Part 1 - Solution Overview. Author: Andy Joyce, EV Technical Product Management Date: April, 2009 WHITE PAPER: TECHNICAL PST Migration with Enterprise Vault 8.0: Part 1 - Solution Overview Author: Andy Joyce, EV Technical Product Management Date: April, 2009 White Paper: Symantec Technical PST Migration

More information

Prerequisite Software for EV Installation on Windows 2003

Prerequisite Software for EV Installation on Windows 2003 Implementation Prerequisite Software for EV Installation on Windows 2003 Windows 2008 Server SP1, including:.net Framework 2.0 Message Queuing (no AD integration) IIS (with Active Server Pages enabled)

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

Enterprise Vault Whitepaper

Enterprise Vault Whitepaper Enterprise Vault Whitepaper Enterprise Vault and Microsoft Office 365 This document outlines the integration of the offsite Office 365 email service with an on-premises Enterprise Vault solution. If you

More information

WHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview

WHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE

More information

Enterprise Vault Whitepaper Move Archive Feature Overview

Enterprise Vault Whitepaper Move Archive Feature Overview Enterprise Vault Whitepaper Move Archive Feature Overview This document provides an overview of the Enterprise Vault Move Archive feature This document applies to the following version(s) of :

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up Exchange Server Archiving 9.0 Symantec Enterprise Vault: Setting up Exchange Server Archiving The software described in this book is furnished under a license agreement

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up Exchange Server Archiving 11.0 Symantec Enterprise Vault: Setting up Exchange Server Archiving The software described in this book is furnished under a license agreement

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up Exchange Server Archiving 10.0 Symantec Enterprise Vault: Setting up Exchange Server Archiving The software described in this book is furnished under a license agreement

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and proven email archiving Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage, and

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

EV 10.0.3 Feature Briefing

EV 10.0.3 Feature Briefing EV 10.0.3 Feature Briefing Exchange Server 2013 OWA Support This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the

More information

250-310. Administration of Symantec Enterprise Vault 10.0 for Exchange. Version: Demo. Page <<1/12>>

250-310. Administration of Symantec Enterprise Vault 10.0 for Exchange. Version: Demo. Page <<1/12>> 250-310 Administration of Symantec Enterprise Vault 10.0 for Exchange Version: Demo Page 1.Enterprise Vault converts mail message attachments to text or HTML. What is a benefit of changing the

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

Veritas Enterprise Vault. Setting up Exchange Server Archiving

Veritas Enterprise Vault. Setting up Exchange Server Archiving Veritas Enterprise Vault Setting up Exchange Server Archiving 12 Veritas Enterprise Vault: Setting up Exchange Server Archiving Last updated: 2015-12-09. Legal Notice Copyright 2015 Veritas Technologies

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up Domino Server Archiving 8.0 Symantec Information Foundation Symantec Enterprise Vault: Setting up Domino Server Archiving The software described in this book is furnished

More information

250-308. Administration of Symantec Enterprise Vault 8.0 for Exchange Exam. http://www.examskey.com/250-308.html

250-308. Administration of Symantec Enterprise Vault 8.0 for Exchange Exam. http://www.examskey.com/250-308.html SYMANTEC 250-308 Administration of Symantec Enterprise Vault 8.0 for Exchange Exam TYPE: DEMO http://www.examskey.com/250-308.html Examskey SYMANTEC 250-308 exam demo product is here for you to test the

More information

CMT for Exchange 3.7. Requirements

CMT for Exchange 3.7. Requirements CMT for Exchange 3.7 Requirements May 2016 Table of Contents Section 1. Introduction... 3 Section 2. Migration Control Center and Workstation Requirements... 4 Section 3. Onsite System Administrator...

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,

More information

Migrating Exchange Server to Office 365

Migrating Exchange Server to Office 365 Migrating Exchange Server to Office 365 By: Brien M. Posey CONTENTS Domain Verification... 3 IMAP Migration... 4 Cut Over and Staged Migration Prep Work... 5 Cut Over Migrations... 6 Staged Migration...

More information

Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism

Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism Technical Note Configuring Outlook Web Access with Secure WebMail Proxy for eprism Information in this document is subject to change without notice. This document may be distributed freely only in whole,

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Enterprise Vault for Microsoft Exchange Server

Symantec Enterprise Vault for Microsoft Exchange Server Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy

More information

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Understanding the use of Act! in a Terminal Server or Citrix Presentation Server environment Table of Contents Introduction...

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement

More information

Enterprise Vault. For Microsoft Exchange Server. Installing and Configuring Version 5.0

Enterprise Vault. For Microsoft Exchange Server. Installing and Configuring Version 5.0 Enterprise Vault For Microsoft Exchange Server Installing and Configuring Version 5.0 March 2005 This publication and the software it describes are the intellectual property of kvault Software Ltd (KVS).

More information

W H I T E P A P E R : T E C H N I C AL. Enterprise Vault 9.0 Archiving from Exchange Server 2010. Dan Strydom Technical Field Enablement November 2010

W H I T E P A P E R : T E C H N I C AL. Enterprise Vault 9.0 Archiving from Exchange Server 2010. Dan Strydom Technical Field Enablement November 2010 W H I T E P A P E R : T E C H N I C AL Enterprise Vault 9.0 Archiving from Exchange Server 2010 Dan Strydom Technical Field Enablement November 2010 White Paper: Symantec Technical Contents Introduction...

More information

How To Export Data From Exchange To A Mailbox On A Pc Or Macintosh (For Free) With A Gpl Or Ipa (For A Free) Or Ipo (For Cheap) With An Outlook 2003 Or Outlook 2007 (For An Ub

How To Export Data From Exchange To A Mailbox On A Pc Or Macintosh (For Free) With A Gpl Or Ipa (For A Free) Or Ipo (For Cheap) With An Outlook 2003 Or Outlook 2007 (For An Ub Exchange Client Quick Start Guide GAPC Hosted Exchange Client Guide Page 1 of 12 Client Requirements Hosted Exchange requires Outlook 2003 and Windows XP for MAPI access to your hosted Exchange mailboxes,

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the

More information

WHITE PAPER. Symantec Enterprise Vault and Exchange 2010. Alex Brown Product Manager

WHITE PAPER. Symantec Enterprise Vault and Exchange 2010. Alex Brown Product Manager WHITE PAPER Symantec Enterprise Vault and Exchange 2010 Alex Brown Product Manager Introduction... 3 Plans for Exchange Server 2010 support and compatibility?... 3 So what is new in Exchange Server 2010?...

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email

More information

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec

More information

Dell Client Profile Updating Utility 5.5.6

Dell Client Profile Updating Utility 5.5.6 Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System

More information

NYSeMail Office 365 Administration Guide for Agencies

NYSeMail Office 365 Administration Guide for Agencies NYSeMail Office 365 Administration Guide for Agencies Office 365 Overview... 34 What is included... 34 Software Requirements... 34 Message Limits... 34 Provisioning... 34 Archive and Retention Policy...

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

The End User Experience. Introduction to Archiving for End Users

The End User Experience. Introduction to Archiving for End Users The End User Experience Introduction to Archiving for End Users Revision: 1 Last Revised: 14 March 2013 Copyright This documentation and software described herein is copyrighted. Under copyright laws,

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

Enterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage

Enterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage Enterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage This document provides background and guidance on how configure Symantec Enterprise Vault with generic Network Attached

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Configuring Internal and External WebApp URLs for OWA 2007 SP4 and later Symantec Enterprise Vault: Configuring Internal and External WebApp URLs for OWA The software

More information

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see Deploy Inbox Rules below. Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them

More information

W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers

W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt. USC Marshall School of Business Academic Information Services Configuring Outlook 2010 RPC Over HTTP Protocol For Windows 7 Home Computers or Wireless Laptops The steps in this document cover how to configure

More information

Outlook Profiler 2.5 Series Instruction Manual

Outlook Profiler 2.5 Series Instruction Manual Outlook Profiler 2.5 Series Instruction Manual Copyright 2001-2015 GOFF Concepts LLC. All rights reserved. GOFF Concepts assumes no responsibility for errors or omissions in this document; nor does GOFF

More information

ENTERPRISE VAULT 9.0 FEATURE BRIEFING

ENTERPRISE VAULT 9.0 FEATURE BRIEFING ENTERPRISE VAULT 9.0 FEATURE BRIEFING Enterprise Vault 9.0 Exchange Archiving Updates This document is for internal and partner use only. Do not distribute copies of this document to customers. If you

More information

How to Setup and Manage LAUSD E-mail in Outlook

How to Setup and Manage LAUSD E-mail in Outlook LAUSD ITD Service Desk How to Setup and Manage LAUSD E-mail in Outlook (08/11/08) LAUSD ITD Service Desk 333 S. Beaudry Ave. Phone 213.241.5200 Fax 213.241.5224 Table of Contents Acceptable Use Policy...2

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

Archive One Policy V4.2 Quick Start Guide October 2005

Archive One Policy V4.2 Quick Start Guide October 2005 Archive One Policy V4.2 Quick Start Guide October 2005 Archive One Policy Quick Start Guide V4.2 Page 1 of 33 CONTENTS Introduction... 3 Components...3 Before You Start...4 System Requirements...5 Prerequisites...7

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Copyright http://support.oracle.com/

Copyright http://support.oracle.com/ Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.

More information

Employee Active Directory Self-Service Quick Setup Guide

Employee Active Directory Self-Service Quick Setup Guide Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:

More information

Deploying the Barracuda Load Balancer with Microsoft Exchange Server 2010 Version 2.6. Introduction. Table of Contents

Deploying the Barracuda Load Balancer with Microsoft Exchange Server 2010 Version 2.6. Introduction. Table of Contents Deploying the Barracuda Load Balancer with Microsoft Exchange Server 2010 Version 2.6 Introduction Organizations use the Barracuda Load Balancer to distribute the load and increase the availability of

More information

Symantec Enterprise Vault for Lotus Domino

Symantec Enterprise Vault for Lotus Domino Symantec Enterprise Vault for Lotus Domino Store, Manage and Discover Critical Business Information Overview Industry-leading email archiving for Lotus Domino With the recognition that email has become

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Email Client configuration and migration Guide Setting up Thunderbird 3.1

Email Client configuration and migration Guide Setting up Thunderbird 3.1 Email Client configuration and migration Guide Setting up Thunderbird 3.1 1. Open Mozilla Thunderbird. : 1. On the Edit menu, click Account Settings. 2. On the Account Settings page, under Account Actions,

More information

Shared Hosting with Exchange 2003 (Part 1)

Shared Hosting with Exchange 2003 (Part 1) Shared Hosting with Exchange 2003 (Part 1) http://www.msexchange.org/tutorials/shared_hosting_exchange_2003_part1.html?printversion Page 1 of 10 Home Articles & Tutorials Exchange 2003 Articles Migration

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

SHARING FILE SYSTEM RESOURCES

SHARING FILE SYSTEM RESOURCES 1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions

More information

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able

More information

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009 Application Note AN-10233 June 2009 ShoreTel 9: Active Directory Integration This application note outlines the configuration required to prepare a customer s Microsoft Active Directory environment for

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016 Version 2.0 April 2016 Folder Proxy + OWA + ECP/EAC Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Lepide Exchange Recovery Manager

Lepide Exchange Recovery Manager Configuration Guide Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights

More information

Zimbra Connector for Microsoft Outlook User Guide 7.1

Zimbra Connector for Microsoft Outlook User Guide 7.1 Zimbra Connector for Microsoft Outlook User Guide 7.1 March 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync

More information

Backup Exec 2010: Archiving Options

Backup Exec 2010: Archiving Options Backup Exec 2010: Archiving Options White Paper: Backup Exec 2010: Archiving Options Backup Exec 2010: Archiving Options Contents Introduction............................................................................................

More information

Configuring your email client to connect to your Exchange mailbox

Configuring your email client to connect to your Exchange mailbox Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add

More information

Implementation Guide for protecting

Implementation Guide for protecting Implementation Guide for protecting Remote Web Workplace (RWW) Outlook Web Access (OWA) 2003 SharePoint 2003 IIS Web Sites with BlackShield ID Copyright 2010 CRYPTOCard Inc. http:// www.cryptocard.com

More information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables

More information

Veritas Enterprise Vault for Microsoft Exchange Server

Veritas Enterprise Vault for Microsoft Exchange Server Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

How to Configure Entourage 2008 for Email Client

How to Configure Entourage 2008 for Email Client How to Configure Entourage 2008 for Email Client Introduction (Revised 04/28/11) LAUSD IT Helpdesk 333 S. Beaudry Ave. 9 th Floor Phone 213.241.5200 Before you configure Microsoft Entourage 2008 E-mail

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007

INTEGRATION GUIDE. DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007 INTEGRATION GUIDE DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

What s New in Ghost Solution Suite 3.0

What s New in Ghost Solution Suite 3.0 What s New in Ghost Solution Suite 3.0 This document highlights some of the most impactful new features of Ghost Solution Suite 3.0 For more comprehensive information, please view the Ghost Solution Suite

More information

Collaboration Technology Support Center Microsoft Collaboration Brief

Collaboration Technology Support Center Microsoft Collaboration Brief Collaboration Technology Support Center Microsoft Collaboration Brief September 2005 HOW TO INTEGRATE MICROSOFT EXCHANGE SERVER INTO SAP ENTERPRISE PORTAL Authors Robert Draken, Solution Architect, Comma

More information

TS: Microsoft Exchange Server 2010, Configuring

TS: Microsoft Exchange Server 2010, Configuring EXAM 70-662 TS: Microsoft Exchange Server 2010, Configuring Question: 1 Your network contains an Active Directory forest. All domain controllers run Windows Server 2008. You need to ensure that you can

More information

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with

More information

Title of Presentation

Title of Presentation Title of Presentation Hosted Messaging And Collaboration Solution Hosted Services Part 1 Name Title Organization Agenda Hosted Messaging and Collaboration Solution Hosted Services Technical Overview Hosted

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Microsoft Lync Server 2010

Microsoft Lync Server 2010 Microsoft Lync Server 2010 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: March. 2012 For the most up to date version of the Scale to a Load Balanced Enterprise Edition

More information

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010 Foundation IT Written approximately Dec 2010 1 Outlook Web Access With the new version of Exchange 2010 Outlook Anywhere has been enabled and configured with a secure socket layer (SSL) certificate from

More information

Configure ActiveSync with a single Exchange server (Exchange sync for an iphone)

Configure ActiveSync with a single Exchange server (Exchange sync for an iphone) Configure ActiveSync with a single Exchange server (Exchange sync for an iphone) I recently picked up a first-generation iphone from a friend and after playing around with it for a while I decided that

More information

WHITE PAPER: ENTERPRISE SOLUTIONS. Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d Agent for Active Directory

WHITE PAPER: ENTERPRISE SOLUTIONS. Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d Agent for Active Directory WHITE PAPER: ENTERPRISE SOLUTIONS Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d For use with Microsoft Windows 2000 Server and Windows Server 2003 White Paper: Enterprise

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook

More information

TELSTRA BUSINESS MAIL QUICK REFERENCE GUIDE

TELSTRA BUSINESS MAIL QUICK REFERENCE GUIDE 1.1 Introduction 01 1.2 The Checklist 02 1.3 Business Mail Requirements 03 1.4 Downloading & Installing Outlook 2003 04 BEFORE YOU START 1.1 INTRODUCTION 1.1.1 Who this Guide is For 1.1.2 What s in this

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information