SaaS and Web Services 7.1.0

Size: px
Start display at page:

Download "SaaS and Web Services 7.1.0"

Transcription

1 Release Notes Revision A SaaS and Web Services Contents About this release New features Resolved issues Recommended environments Find McAfee SaaS service documentation Find product documentation About this release Thank you for choosing McAfee SaaS and Web Services. This document contains important information about the current release. We strongly recommend that you read the entire document. New features The current release includes the following new and updated features. Account Management Partner setup pages changed for Cloud SSO The Create Partner, Edit Partner, and Partner Details pages have been updated to allow partner enablement for Cloud SSO administration. A new checkbox, Cloud SSO, has been added to the pages. Customer setup pages changed for Cloud SSO The Create Customer, Edit Customer, and Customer Details pages have been updated to allow customer enablement of Cloud SSO service. Two new fields have been added, Cloud SSO and Number of Billed Users. Directory Integration page now includes Identity Bridge fields for Cloud SSO Identity (ID) Bridge settings now appear at the bottom of the Directory Integration page when the new Cloud SSO and Identity Bridge capabilities are enabled. Four of the fields are display only and reflect how the ID Bridge was configured in the epo. 1

2 epo Hostname IP Range UID Status There is an Authentication Test button to check that the ID Bridge is working. In addition, an Identity Bridge Authentication drop down list allows you to turn off the ID Bridge or enable it only for users synchronized with Active Directory domains. Changes to New User, Edit User, and User Synchronization Details pages for additional attributes The New User and Edit User pages now contain new fields to add additional attributes for a user. The User Synchronization Details page has a new rejection message when the additional attributes fail to be synchronized. In the New User and Edit User pages, the new fields are: First Name Mobile Phone Last Name Title Display Name Department This data can be useful if you use the Cloud SSO application and you automatically provision apps that user can access under the Cloud SSO umbrella. In the User Synchronization Details page, a new rejection message tracks when the attributes listed above fail to be synchronized, usually because the attribute value exceeds the maximum length of the field. New data is available on the User List page The User List page now allows you to include columns that show whether or not a user has set a security question and a password for authentication. Enhancements to Batch Edit User page Additional attributes for users can be edited in a batch file using the Batch Edit User page. More flexibility has also been added to the display on the Batch Edit User page. The following fields can be edited by uploading a batch file to the Batch Edit User page: Status Display Name First Name Title Last Name Department In addition, if you are a Customer Administrator, you can edit user passwords in a batch file. The Batch Edit User page also allows you to display only the attributes you want to display. To change which attributes are displayed, you can click in the column header for any column, select Columns from the drop down menu, and select the checkboxes for the attributes you want the page to display. You can also change the order of the attribute columns simply by selecting a column and dragging it to its new position. 2

3 Most fields in the Batch Edit User page also allow you to doubleclick the field and select from the drop down menu the option called Unset Value. This option resets the value that you uploaded in a batch value to the value previously in the field. Batch password updates removed from Password Authentication page The Password version of the User Authentication page now longer offers fields to update passwords with a batch file. Instead, the Batch Edit User window now includes the capability to update user passwords with a batch file. Create a.csv file of user data that you can use for batch user edits From the User List page, you can download a.csv file that contains specific types of user data that you specify. You can then edit the.csv file and upload it to the Batch Edit Users page for batch editing of user data. Change to filter function on Edit User tabs The filtering function of the Edit User: Group Membership and Edit User: Group Administration tabs have changed. The Filter field is no longer available. Instead, a filtering menu is available by clicking right end of the column headers. To filter the list of available groups or selected groups on the tabs, you now do the following: 1 Place your cursor on the Available Groups column heading. 2 Click the column's down arrow to display the first menu. 3 Use your cursor to highlight Filters. 4 From the Filter submenu, click the checkbox for the specific filtering option you want. 5 Enter a value for which to search for matching group names. Enhancements to group administration pages The group administration pages have been enhanced. The Groups List page now allows you to filter the group list based on ranges of values you select for one or more columns of data. Filter criteria are available on the following columns: 3

4 Filter criteria Description Group Name Description Date Created List only groups whose names start with, contain, or equal the characters you enter. List only groups whose descriptions start with, contain, or equal the characters you enter. List only groups that were created before, after, or on a specific date. You can also create a range of time based on the use of a "before" date and an "after" date together. In addition, the Groups List page now contains a Download button to allow you to download a.csv (Excel) file that contains the data from the Groups List, as well as any additional attributes a particular group might have on the Group Details page. Group Members and Group Administrators page changes The Filter field and button is no longer available on the Group Members and Group Administrators pages. Instead, a drop down list with a filtering option is available from the Available Users and Selected Users column headers in the Group Members page and the Available Group Administrators and Selected Group Administrators columns in the Group Administrators page. The Group Members page also now contains a Group Count column for both the Available Users and Selected Users sections. This column shows the number of groups to which each user is currently assigned within the Control Console. The group count can differ from the number of groups to which a user is actually assigned within the customer's Active Directory (AD), even when Directory Integration synchronizes user data by AD domain. This difference can result for various reasons. For example, users can be manually added to groups in the Control Console and not added in the Active Directory. Also, in the Control Console, groups that contain other groups are included in the user's group count. Service Provider customer type can no longer be configured The Service Provider customer type can no longer be assigned to a new customer, nor can an Enterprise customer be converted to a Service Provider customer. On the Create Customer and Edit Customer pages, the Service Provider customer type is no longer available to select. However, existing Service Provider customers continue to be supported. Cloud Single Sign On, SaaS Edition Introducing Cloud Single Sign On, SaaS Edition Cloud Single Sign On, SaaS Edition is an application integrated in the Control Console that provides identity and access management as a service over the Internet without the need for hardware and installed software on customer premises. Cloud Single Sign On allows users to log in once into the Control Console and access other applications over the Internet without the need to enter login credentials again. Conversely, Cloud Single Sign On can allow users to sign off from multiple applications at one time. With the separately purchased Identity Bridge added to the Directory Services Connector on the customer's premises, the Cloud Single Sign On capability enables users to log into the customer's corporate network and be able to access the Control Console and multiple applications without reentering credentials. In addition, if users are also synchronized through Directory Services Connector, the Identity Bridge allows the ability to sign onto the Control Console with corporate credentials even when outside of the corporate network. Access to each application is assigned by group. Access to each application can be restricted according to the following: 4

5 IP address range A multi factor one time password that users must enter each time they access an application The one time password authentication requires the use of Pledge client software to generate one time passwords from a desktop, laptop, ios mobile device, or Android mobile device. New administration pages in the Control Console If enabled, a new application tab, Cloud SSO, is available for administrators to list, search for, configure and edit application connectors. An application connector is a configuration that you define in Cloud Single Sign On. The connector allows Cloud Single Sign On to connect users to the application without requiring users to sign on to the application. If enabled, a new user tab, My Apps, is available for users to access applications over the cloud directly from the Control Console. From this tab, users can also sign out of all applications to which they are connected by clicking a single button. The tab also provides a link to download Pledge software the first time a user must use it. Protection Configuring enhanced ClickProtect features for inbound mail policies The new and improved ClickProtect feature provides enhanced protection from phishing attacks and malware infections by scanning the URL links in your inbound messages. Using the ClickProtect tab, you can configure scan time and click time actions, customize warning messages, and add trusted sites to your allow list. Improvements to the ClickProtect Overview and Click Log reports allow you to track trends and statistics as well as review the log of individual clicks and actions. ClickProtect ClickProtect safeguards your organization from web based threats that may arrive by using McAfee GTI URL Reputation. URLs are evaluated during processing ("scan time") as well as when users click on a link ("click time"). Click time scanning ensures that users are protected from changes to a URL's reputation that can occur after the message is initially scanned. Figure 2-1 New ClickProtect tab in the inbound policy window 5

6 Update ClickProtect options for an inbound policy set Configure ClickProtect to take specific scan time and click time actions that protect your users from risky URL links in inbound messages. Task For option definitions, click Help in the interface. 1 Select Protection Policies Inbound Policies 2 Highlight a custom policy or select the Default Inbound policy, click Edit. 3 In the Policy Set window, select ClickProtect. 4 Select Enable ClickProtect. 5 Select scan time and click time actions for each reputation type. 6 Under Advanced Anti malware Scan, select malware scan options as necessary. 7 Click Save. Once ClickProtect is active, you can customize the warning messages your users see as well as update the list of approved URLs. Classification tab Use the Classification tab to configure ClickProtect scan time and click time actions. Table 2-1 Classification tab option definitions Option Save Cancel Enable ClickProtect Reputation Definition Click to save changes. Click to reset without saving changes. Select to enable ClickProtect and configure your scan time and click time actions. Displays the risk categories: High Risk Specifies a URL that exhibits detrimental behavior. For example, the site is known to host malware. Medium Risk Specifies a URL that exhibits questionable behavior that may be detrimental to the user. Minimal Risk Specifies a URL that exhibits appropriate behavior or that is verified as trusted. Unverified Specifies a URL for which no reputation information has been calculated. Scan time Action Specifies the action to take at scan time, for each reputation type. Deliver message Quarantine message Deny message Tag subject 6

7 Table 2-1 Classification tab option definitions (continued) Option Click time Action Definition Specifies the action to take at click time, for each reputation type. Allow click through Select to immediately redirect the user to the website. Warn and allow click through Select to display a warning message in a browser and give the user the option to continue to the requested website. Deny click through Select to display a block message in a browser and explain why the website was denied. You can customize the warning and blocked message pages in the Custom Warnings tab. Advanced Anti malware Scan Specifies whether or not you want to scan links for malware at click time. Enable Select to enable the anti malware scan. Enable the Safe Preview token for custom warnings Select to enable the Safe Preview option in the Custom Warnings tab. You can customize the warning message page in the Custom Warnings tab. Custom Warnings tab The Custom Warnings tab allows you to customize the warning page that displays when a website risk is detected at click time. Each text field allows you to enter and format the text using the toolbar options. You can also add tokens to display specific information about a link. Table 2-2 Custom Warnings tab option definitions Option Save Cancel Warn and allow Definition Click to save the text, tokens, and HTML formatting. Click to discard your changes and restore the previously saved text. Specifies the text that displays when you select Warn and allow click through as the click time action for a risk level. This page typically warns the user of the risk and gives them the option to continue or abandon the link. Deny Click through Specifies the text that displays when you select Deny click through as the click time action for a risk level. This page typically warns the user of the risk and provides and explanation for why the website was blocked. Malware Found Error Occured Specifies the text that displays when you enable the Advanced Anti malware Scan option and malware is found. Specifies the text that displays when an error occurs. For example, a URL's reputation cannot be checked, or a website cannot be scanned for malware. Custom Warnings tokens Use these tokens to include specific details about a link in the text of your custom warning message. 7

8 Table 2-3 Tokens definitions Add this token %URL% To display The URL that the user clicked. Recommended for the Warn and allow warning message only. %URL_REPUTATION% The risk level of the website based on its reputation. Minimal Medium High Unverified %URL_CATEGORY% %IMAGE_PREVIEW% The category of the website. A safe preview of the website. In certain situations, the image preview may not display. This can happen when: Access to the page is denied due to the %URL_REPUTATION% value. For example, High Risk is set to Deny click through. The malware scan detected a virus. Safe preview is not enabled for the Advanced Anti malware Scan. The %URL_CATEGORY% value includes sexual or violent content. Extreme Gruesome Content Incidental Nudity Nudity Pornography Provocative Attire Sexual Materials An error occurs during the preview scan, or the preview scan takes longer than 20 seconds. %FROM_ADDRESS% %DATE_TIME% %SUBJECT% %MESSAGE_ID% %MALWARE_NAME% The address that sent the with the website URL. The timestamp of the . The subject line of the . The message ID of the . The name of the malware threat. Custom Warning token examples The website you requested is considered %URL_REPUTATION% risk. The link was sent to you by %FROM_ADDRESS% on %DATE_TIME%. The subject line was %SUBJECT%. This website, %URL%, is associated with the %URL_CATEGORY% category. 8

9 Allow List tab The Allow List tab allows you to configure the list of domains, IP addresses, and URLs that ClickProtect should always allow in an . For example, a website that you want to exclude from URL rewrite, or an internal website that ClickProtect is unable to access. Table 2-4 Allow List tab option definitions Option Save Cancel Domain, IP Address, or URL Definition Click to save changes. Click to restore previous settings. Enter a domain, IP address, or URL to add it to the Allow List. Maximum of 256 characters for each address. Wild cards can be used with domains and IP addresses. Maximum of 200 addresses. Options Add >> Click to add a new address to the list. << Remove Select an address in the list and click << Remove to delete it. << Remove All Click to delete all addresses from the list. Click Save to keep your changes. Allow List More Options Displays the list of allowed domains, IP addresses, and URLs. Specifies additional options for managing the allow list. Upload list (appends): Upload addresses in a text file and add them to the list. To use this option, create a file with one item per line. Uploading adds new entries to the existing list. It will not delete existing items. Browse Click to select a file to upload. Upload Click to upload the file and update the list. Click Save to keep your changes. Download list (be sure to save changes first): Download the current allow list in a.csv file. Download Click to download the list. Subscribe to the Default Inbound policy ClickProtect List Select to use the allow list associated with the default inbound policy. ClickProtect: Overview report The ClickProtect Overview report provides you with the results of your ClickProtect implementation including counts of messages affected and the number of user clicks that were allowed and denied. Table 2-5 ClickProtect Statistics Field Messages with links Messages with multiple links Total clicks Total allowed click throughs Total warn and allow click throughs Total click throughs denied due to reputation Description The total number of messages that contained a link. The total number of messages that contained more than one linke. The total number of times that recipients clicked links in their . The total number of times that recipients were allowed to access the website after clicking the link. The total number of times that recipients were taken to the warning page before being allowed to access the website. The total number of times that recipients were denied access to a website because of the site's reputation. 9

10 Table 2-5 ClickProtect Statistics (continued) Field Total click throughs denied due to malware Number of individual users that clicked Spam messages with click throughs Messages with links on the ClickProtect Allow list Description The total number of times that recipients were denied access to a website because the site contained malware. The total number of recipients that attempted to click a link in an . The total number of spam s that contained links clicked by recipients. The total number of s that contained links that are listed in the ClickProtect allow list. ClickProtect: Click Log report The ClickProtect Click Log report provides details on each link that is scanned for potential risks as well as the resulting action. Table 2-6 ClickProtect: Click Log options Field Timestamp From To Subject URL Reputation Description Displays the date and time. Displays the address of the sender. Displays the address of the recipient. Displays the subject line of the . Displays the full URL of the link. Displays the reputation of the website. High Risk Specifies a URL that exhibits detrimental behavior. For example, the site is known to host malware. Medium Risk Specifies a URL that exhibits questionable behavior that may be detrimental to the user. Minimal Risk Specifies a URL that exhibits appropriate behavior or that is verified as trusted. Unverified Specifies a URL for which no reputation information has been calculated. Category Malware Action When available, displays the category associated with the website. When found, displays the name of the malicious software. The action taken at click time. Denied malware Denied reputation Warn and allow Allowed Score Displays the spam likelihood score assigned to the as a graphical bar. The spam score ranges from 0 100% (green to red), with 100% (or red) being the highest likelihood that the is spam. 10

11 Scheduling Spam Reports in user preferences You can now schedule how often you receive spam report notifications from Protection. These new options allow you to select multiple deliveries per week and up to two reports per day. Figure 2-2 Protection Settings Schedule spam reports Use the schedule and frequency options in the Preferences tab to schedule the delivery of spam reports. Task For option definitions, click Help in the interface. 1 Select the Preferences tab. Administrators can select My Account Preferences. 2 Under Protection Settings, complete the scheduling options for spam reports. Schedule and Frequency Deselect Use policy defaults. Frequency Select one or more days of the week. Deliver reports by Select the time of day for Report 1 and Report 2. Select Skip if you do not want to receive a report. 3 Click Apply. 11

12 Protection settings in the Preferences tab Use the Preferences tab to configure the Protection settings for your account, including spam filtering options and spam report delivery options. Table 2-7 Protection Settings field definitions Field Spam Filtering Spam Actions Definition Select Enable to filter your messages for spam. Select Use policy defaults to use the default spam actions. Deselect to customize Medium Spam, High Spam, and Graymail Spam actions. Medium Spam Action Specifies the default action for spam messages that have a medium likelihood. Prepend "[SPAM]" to message subject The subject line of the has the phrase "[SPAM]" added to the beginning of the subject text and the is sent to you. Quarantine the message The is added to your spam quarantine and is not sent to you. The is reported in your Spam Report. Deny delivery The is blocked automatically. Do nothing The is forwarded to you with no processing applied. High Spam Action Specifies the default action for spam messages that have a high likelihood. Prepend "[SPAM]" to message subject The subject line of the has the phrase "[SPAM]" added to the beginning of the subject text and the is sent to you. Quarantine the message The is added to your spam quarantine and is not sent to you. The is reported in your Spam Report. Deny delivery The is blocked automatically. Do nothing The is forwarded to you with no processing applied. Graymail Spam Action Specifies the default action for graymail spam messages. Tag subject with "[GRAYMAIL]" The subject line of the has the phrase "[GRAYMAIL]" added to the beginning of the subject text and the is sent to you. Quarantine the message The is added to your spam quarantine and is not sent to you. The is reported in your Spam Report. Deny delivery The is blocked automatically. Do nothing The is forwarded to you with no processing applied. Allow Always allow graymail messages. Spam Report Schedule and Frequency Frequency Deliver Reports by Format Select Enable to receive spam reports. Select Use policy defaults to use the default spam report settings. Deselect to customize Frequency and Deliver reports by settings for spam reports. Specifies how often you receive spam reports. Select on or more days of the week. Specifies the time of day you would like to receive your reports. You have the option of receiving one or two reports per day. Specifies the format of the , Plain text or HTML. 12

13 Table 2-7 Protection Settings field definitions (continued) Field Type Spam Report Alternate Delivery Address Definition Specifies the content of the report: New items since last report All quarantined items Summary Specifies an alternate address that allows you to forward your Spam Report to a different address. The address must be provisioned in the system within one of your domains. Forwarding your Spam Report allows the recipient to have full access to your Control Console account. Be sure to use a trusted address. 13

14 Selecting your preferred region to improve MX Record setup The all new MX Records Setup page allows you configure your MX records based on your preferred. This ensures that your records are configured correctly, that inbound is routed through the Protection service for filtering, and that attackers cannot bypass the service. Figure 2-3 New MX Records Setup page with region selection 14

15 Select a region to review MX records Select a region to use its MX records for filtering. Before you begin Before changing your MX records, you must first complete the inbound servers setup process. Task For option definitions, click Help in the interface. 1 Select Protection Setup MX Records 2 Under Region, select an option to update the page. 3 Review the information under Recommended Configuration, Current Configuration, and Lock Down. Use this information to configure your MX records so that mail is routed through the Protection service. The Lock Down information allows you to configure your servers to only accept connections from the service. MX Records Setup page The MX Records Setup page allows you to determine what MX records to use based on your region, whether or not your MX records are configured correctly, and provides you with IP addresses that you can use to prevent attackers from bypassing the service. Table 2-8 MX Record Setup page option definitions Option Region Recommended Configuration Definition Specifies the location of your servers. Selecting a region determines the set of MX records you should use. Displays the recommended MX records for your selected region. Use these records to redirect your to the Protection service. To avoid delivery issues, you should replace your current configuration with the full set of MX records. 15

16 Table 2-8 MX Record Setup page option definitions (continued) Option Current Configuration Lock Down Definition Displays the current set of MX records based on a query to your authoritative DNS provider. Each record includes the following status information: Invalid The record is unrecognized and unable to route to the Protection service. Valid The record is recognized and able to route to the Protection service. Outdated The record is recognized, but does not match the current recommended MX records displayed under Recommended Configuration. You should update your records to match what is displayed. Recheck your current configuration: Check Again Click to query your authoritative DNS provider. Use this DNS server Enter the hostname of an alternative DNS server and click Check Again. Displays a list of files that you can use to limit SMTP connections and prevent attackers from bypassing Protection. Each file contains the list of IP addresses that you should allow from Protection. All others should be blocked. There are four different formats. Select the one that will work best with your environment: CIDR /21 notation Contains two /21 IP blocks. CIDR /24 notation Contains a list of /24 IP blocks. Individual IPs Contains a list of individual IP addresses. Optimized for Microsoft Office 365 For Microsoft Office 365 users, this file contains a list of IP addresses that are formatted for use when creating an Inbound Connector in Forefront Online Protection for Exchange (FOPE). Archiving Deactivating a group-specific archive retention length A change to the Retention options in the Archiving tab of the Edit Group window allows you to remove the custom value and restore the default global retention length. Figure 2-4 Archiving tab in the Edit Group window 16

17 Restore the global archive retention length for a group When necessary, remove the custom group retention length and restore the global value. This option can be useful when the group retention, or the group itself, is no longer needed. Task For option definitions, click Help in the interface. 1 Select Account Management Groups 2 Highlight the group you want to modify, click Edit. 3 In the Edit Group window, select Archiving. 4 In the Retention drop down, select the global retention value. 5 Click Apply. Web Protection New charts technology Web Protection Services has replaced CORDA with new technology for chart graphical displays in the Reports tab. Reports data affected by the change include: Traffic Overview Media Allowed Category by Site Application Allowed Category by User Threat Blocked Category The following example illustrates the new graphical display. 17

18 Resolved issues These issues are resolved in this release of the product. For a list of issues fixed in earlier releases, see the Release Notes for the specific release. Resolved Account Management issues SR# W When replacing the primary address in one account with the same address of a previously removed account, user synchronization of the Active Directory server completes and approves successfully. (875978) SR# W You can now remove the configuration settings for an Authentication Type in the User Authentication tab of the Control Console. Select Account Management Configuration User Authentication, click Clear Settings. (870368) Resolved Protection issues Message Audit SR# W You can now download the Message Audit report with Japanese characters in the title using Internet Explorer. (874984) Quarantine SR# W Archive Compliance Officers can now delete their own quarantined messages. (874956) SR# W Quarantine search results now display correctly in Internet Explorer 10. (870165) SR# W Service Provider customers and administrators with a role less than Customer Administrator can now complete Quarantine searches using a wildcard in the To address field. (870456) SR# W Oracle Messaging Communications Server users can now view the contents of their Spam Reports. (871942) Encryption SR# W The Encryption service no longer locks due to processes that have failed to timeout and exit successfully. (870406) SR# W The Encryption Welcome letter is now configurable for on premise deployments. (870334) SR# W You can now encrypt outbound messages that include non ascii characters in the filename of an attachment. (870304) Policies SR# W If you enter more than 255 characters into the Content field under Inbound Policy Spam Content Groups, you will receive an error message and the content will not save. (870362) SR# W When creating a new policy set, you can cut and paste into the Name field using the right click menu and the Save button will become active. (870360) SR# W When editing the Sender Allow or Sender Deny list in the Allow/Deny tab of a policy, the Remove All button is only active when there is at least one address already in the list. (870363) 18

19 Other resolved issues SR# W An upgrade to Postgresql fixes multiple issues in existing deployments. (870318) SR# W mod_access IP checks are now delayed when the sending IP needs to be rewound. (869727) Web Protection Resolved Issues Here is a list of issues from previous releases of the software that have been fixed in this release. Resolved Issues 1 Issue SR # W The Forensics Report does not return data for specific filtered search criteria, but does return data to a downloaded.csv file. (Reference: ) Resolution The error was found and corrected in the database and Forensics Reports now returns accurate data for filtered search criteria. 2 Issue SR # W A customer reported their policy settings were filtered through another customer's McAfee Client Proxy policy. (Reference: ) Resolution The customer's cache key was not unique to McAfee Client Proxy policy users. The customer's cache key now includes a unique customer ID. 3 Issue SR # W Users reported errors when trying to install Java. (Reference: ) Resolution Sun.com was added to the Global Whitelist, allowing users to download and install the Java executable without error. Recommended environments The following environments are supported by this release. Internet Explorer 10 Windows 8 Windows 7 Internet Explorer 9 Windows 7 Windows Vista Firefox OS X 10.8 Windows 7 OS X 10.7 Windows Vista Windows 8 Windows XP Chrome OS X 10.8 Windows 7 OS X 10.7 Windows Vista Windows 8 Windows XP 19

20 Safari 6 (Web Protection end user only) OS X 10.8 OS X 10.7 Find McAfee SaaS service documentation McAfee provides the information you need during each phase of service implementation, from setup to daily use and troubleshooting. After a service update is released, information is added to the McAfee SaaS and Web Security Support site. Task 1 Go to the McAfee SaaS and Web Security Support page at 2 Under Knowledge Base, click Reference Materials. 3 Under Reference Materials, scroll down to access information that you need: Service Enhancements and Release Notes Training Materials Service Reference Guides Find product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. Task 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 20

21 Copyright 2013 McAfee, Inc. Do not copy without permission. McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. SEWS-Release- Notes-7.1.0A00

Administration Guide Revision A. SaaS Email Protection

Administration Guide Revision A. SaaS Email Protection Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Email Protection for your account

Email Protection for your account User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Administration Guide Revision E. SaaS Email Protection

Administration Guide Revision E. SaaS Email Protection Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Creating a Content Group and assigning the Encrypt action to the Group.

Creating a Content Group and assigning the Encrypt action to the Group. Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Core Protection Suite

Core Protection Suite Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3

More information

Administration Guide Revision E. Account Management. For SaaS Email and Web Security

Administration Guide Revision E. Account Management. For SaaS Email and Web Security Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Service Updates and Enhancements

Service Updates and Enhancements Service Updates and Enhancements May 8, 2013 McAfee understands that providing the tools for a trusted communication environment is our primary directive. Accomplishing this goal requires listening to

More information

Chapter 10 Encryption Service

Chapter 10 Encryption Service Chapter 10 Encryption Service The Encryption Service feature works in tandem with Dell SonicWALL Email Security as a Software-as-a-Service (SaaS), which provides secure data mail delivery solutions. The

More information

PureMessage for Microsoft Exchange Help. Product version: 4.0

PureMessage for Microsoft Exchange Help. Product version: 4.0 PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

MySpam email filtering service Protection against spam, viruses and phishing attacks

MySpam email filtering service Protection against spam, viruses and phishing attacks MySpam email filtering service Protection against spam, viruses and phishing attacks 1. Introduction This MySpam guide describes the new service and changes to the University s current spam handling procedures.

More information

Symantec Hosted Mail Security. Console and Spam Quarantine User Guide

Symantec Hosted Mail Security. Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

C I S C O E M A I L S E C U R I T Y A P P L I A N C E

C I S C O E M A I L S E C U R I T Y A P P L I A N C E C I S C O E M A I L S E C U R I T Y A P P L I A N C E U R L F I L T E R I N G September 2015 Version 1.3 Tobias Mayer Consulting Systems Engineer The most current version of this document can be found

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

WatchGuard QMS End User Guide

WatchGuard QMS End User Guide WatchGuard QMS End User Guide WatchGuard QMS Overview The WatchGuard QMS device enables spam messages from the WatchGuard XCS to be directed to a local quarantine area that provides spam storage for each

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management AT&T Business Messaging Account Management Admin User Guide December 2015 1 Copyright 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein

More information

How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)

How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook) MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

PureMessage for Microsoft Exchange Help. Product version: 3.1

PureMessage for Microsoft Exchange Help. Product version: 3.1 PureMessage for Microsoft Exchange Help Product version: 3.1 Document date: June 2015 Contents 1 About PureMessage for Microsoft Exchange...4 2 Key concepts...5 2.1 Key concepts overview...5 2.2 Inbound,

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide

Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Service Launch Guide (US Customer) SEG Filtering

Service Launch Guide (US Customer) SEG Filtering Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required

More information

Hosted Email Security 2.0 Quick Start Guide

Hosted Email Security 2.0 Quick Start Guide Hosted Email Security 2.0 Quick Start Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide August 22, 2013 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

Office 365 Exchange Online Protection Administration Guide

Office 365 Exchange Online Protection Administration Guide Chapter 10 Office 365 Exchange Online Protection Administration Guide Office 365 version 2013 is a suite of software products: Software as a Service (SaaS). Customers can purchase Office 365 in many ways,

More information

Configuring Trend Micro Content Security

Configuring Trend Micro Content Security 9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Core Filtering Admin Guide

Core Filtering Admin Guide Core Filtering Admin Guide 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Table of Contents Login... 3 Overview... 3 Quarantine...

More information

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Symantec Hosted Mail Security Getting Started Guide

Symantec Hosted Mail Security Getting Started Guide Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

DocuSign Connect for Salesforce Guide

DocuSign Connect for Salesforce Guide Information Guide 1 DocuSign Connect for Salesforce Guide 1 Copyright 2003-2013 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1

PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1 PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1 Contents 1 INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 5 1.1 WHAT IS PANDA CLOUD EMAIL PROTECTION?... 5 1.2 FUNCTIONALITIES... 5 2 PANDA

More information

Transitioning to McAfee SaaS Email Protection from Postini

Transitioning to McAfee SaaS Email Protection from Postini Technical FAQ Transitioning to McAfee SaaS Email Protection from Postini Frequently Asked Questions Google recently and abruptly announced that all Postini customers must either migrate to Google Apps,

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32 IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Sonian Getting Started Guide October 2008

Sonian Getting Started Guide October 2008 Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using

More information

TriCore Secure Web Email Gateway User Guide 1

TriCore Secure Web Email Gateway User Guide 1 TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email

More information

Ajera 7 Installation Guide

Ajera 7 Installation Guide Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services

More information

Senior Systems Cloud Services

Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Overview. Accessing the User Interface. Logging In. Resetting your Password

Overview. Accessing the User Interface. Logging In. Resetting your Password Overview The message filtering service lets a company easily provide real-time spam and virus filtering, attack blocking, and email-traffic monitoring across a user deployment of any size. Users receive

More information

Sophos Mobile Control Administrator guide. Product version: 3.6

Sophos Mobile Control Administrator guide. Product version: 3.6 Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for

More information

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6

More information

Simplicity Itself. User Guide

Simplicity Itself. User Guide Simplicity Itself User Guide TekEx 2013 Contents WELCOME... 3 TEKEX OVERVIEW... 3 DOWNLOAD OUTLOOK... 4 CONFIGURE OUTLOOK... 5 CONFIGURE MAC EMAIL CLIENT... 10 SMARTPHONE SETUP... 12 IPHONE SETUP... 12

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

McAfee Content Security Reporter 1.0.0 Software

McAfee Content Security Reporter 1.0.0 Software Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...

More information

How To Manage Your Quarantine Email On A Blackberry.Com

How To Manage Your Quarantine Email On A Blackberry.Com Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Grapevine Mail User Guide

Grapevine Mail User Guide Grapevine Mail User Guide Table of Contents Accessing Grapevine Mail...2 How to access the Mail portal... 2 How to login... 2 Grapevine Mail user guide... 5 Copying your contacts to the new Grapevine Mail

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

Network Security Platform 7.5

Network Security Platform 7.5 M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

McAfee Client Proxy 2.0

McAfee Client Proxy 2.0 Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Important Information

Important Information June 2015 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0 eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

Connection and Printer Setup Guide

Connection and Printer Setup Guide Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Abila Grant Management. Document Management

Abila Grant Management. Document Management Abila Grant Management This is a publication of Abila, Inc. Version 2014 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

SonicWALL SSL VPN 3.5: Virtual Assist

SonicWALL SSL VPN 3.5: Virtual Assist SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

Easy Setup Guide for the Sony Network Camera

Easy Setup Guide for the Sony Network Camera -878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx

http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Cloud Director User's Guide

Cloud Director User's Guide Cloud Director 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information