SaaS and Web Services 7.1.0
|
|
- Damian McDonald
- 7 years ago
- Views:
Transcription
1 Release Notes Revision A SaaS and Web Services Contents About this release New features Resolved issues Recommended environments Find McAfee SaaS service documentation Find product documentation About this release Thank you for choosing McAfee SaaS and Web Services. This document contains important information about the current release. We strongly recommend that you read the entire document. New features The current release includes the following new and updated features. Account Management Partner setup pages changed for Cloud SSO The Create Partner, Edit Partner, and Partner Details pages have been updated to allow partner enablement for Cloud SSO administration. A new checkbox, Cloud SSO, has been added to the pages. Customer setup pages changed for Cloud SSO The Create Customer, Edit Customer, and Customer Details pages have been updated to allow customer enablement of Cloud SSO service. Two new fields have been added, Cloud SSO and Number of Billed Users. Directory Integration page now includes Identity Bridge fields for Cloud SSO Identity (ID) Bridge settings now appear at the bottom of the Directory Integration page when the new Cloud SSO and Identity Bridge capabilities are enabled. Four of the fields are display only and reflect how the ID Bridge was configured in the epo. 1
2 epo Hostname IP Range UID Status There is an Authentication Test button to check that the ID Bridge is working. In addition, an Identity Bridge Authentication drop down list allows you to turn off the ID Bridge or enable it only for users synchronized with Active Directory domains. Changes to New User, Edit User, and User Synchronization Details pages for additional attributes The New User and Edit User pages now contain new fields to add additional attributes for a user. The User Synchronization Details page has a new rejection message when the additional attributes fail to be synchronized. In the New User and Edit User pages, the new fields are: First Name Mobile Phone Last Name Title Display Name Department This data can be useful if you use the Cloud SSO application and you automatically provision apps that user can access under the Cloud SSO umbrella. In the User Synchronization Details page, a new rejection message tracks when the attributes listed above fail to be synchronized, usually because the attribute value exceeds the maximum length of the field. New data is available on the User List page The User List page now allows you to include columns that show whether or not a user has set a security question and a password for authentication. Enhancements to Batch Edit User page Additional attributes for users can be edited in a batch file using the Batch Edit User page. More flexibility has also been added to the display on the Batch Edit User page. The following fields can be edited by uploading a batch file to the Batch Edit User page: Status Display Name First Name Title Last Name Department In addition, if you are a Customer Administrator, you can edit user passwords in a batch file. The Batch Edit User page also allows you to display only the attributes you want to display. To change which attributes are displayed, you can click in the column header for any column, select Columns from the drop down menu, and select the checkboxes for the attributes you want the page to display. You can also change the order of the attribute columns simply by selecting a column and dragging it to its new position. 2
3 Most fields in the Batch Edit User page also allow you to doubleclick the field and select from the drop down menu the option called Unset Value. This option resets the value that you uploaded in a batch value to the value previously in the field. Batch password updates removed from Password Authentication page The Password version of the User Authentication page now longer offers fields to update passwords with a batch file. Instead, the Batch Edit User window now includes the capability to update user passwords with a batch file. Create a.csv file of user data that you can use for batch user edits From the User List page, you can download a.csv file that contains specific types of user data that you specify. You can then edit the.csv file and upload it to the Batch Edit Users page for batch editing of user data. Change to filter function on Edit User tabs The filtering function of the Edit User: Group Membership and Edit User: Group Administration tabs have changed. The Filter field is no longer available. Instead, a filtering menu is available by clicking right end of the column headers. To filter the list of available groups or selected groups on the tabs, you now do the following: 1 Place your cursor on the Available Groups column heading. 2 Click the column's down arrow to display the first menu. 3 Use your cursor to highlight Filters. 4 From the Filter submenu, click the checkbox for the specific filtering option you want. 5 Enter a value for which to search for matching group names. Enhancements to group administration pages The group administration pages have been enhanced. The Groups List page now allows you to filter the group list based on ranges of values you select for one or more columns of data. Filter criteria are available on the following columns: 3
4 Filter criteria Description Group Name Description Date Created List only groups whose names start with, contain, or equal the characters you enter. List only groups whose descriptions start with, contain, or equal the characters you enter. List only groups that were created before, after, or on a specific date. You can also create a range of time based on the use of a "before" date and an "after" date together. In addition, the Groups List page now contains a Download button to allow you to download a.csv (Excel) file that contains the data from the Groups List, as well as any additional attributes a particular group might have on the Group Details page. Group Members and Group Administrators page changes The Filter field and button is no longer available on the Group Members and Group Administrators pages. Instead, a drop down list with a filtering option is available from the Available Users and Selected Users column headers in the Group Members page and the Available Group Administrators and Selected Group Administrators columns in the Group Administrators page. The Group Members page also now contains a Group Count column for both the Available Users and Selected Users sections. This column shows the number of groups to which each user is currently assigned within the Control Console. The group count can differ from the number of groups to which a user is actually assigned within the customer's Active Directory (AD), even when Directory Integration synchronizes user data by AD domain. This difference can result for various reasons. For example, users can be manually added to groups in the Control Console and not added in the Active Directory. Also, in the Control Console, groups that contain other groups are included in the user's group count. Service Provider customer type can no longer be configured The Service Provider customer type can no longer be assigned to a new customer, nor can an Enterprise customer be converted to a Service Provider customer. On the Create Customer and Edit Customer pages, the Service Provider customer type is no longer available to select. However, existing Service Provider customers continue to be supported. Cloud Single Sign On, SaaS Edition Introducing Cloud Single Sign On, SaaS Edition Cloud Single Sign On, SaaS Edition is an application integrated in the Control Console that provides identity and access management as a service over the Internet without the need for hardware and installed software on customer premises. Cloud Single Sign On allows users to log in once into the Control Console and access other applications over the Internet without the need to enter login credentials again. Conversely, Cloud Single Sign On can allow users to sign off from multiple applications at one time. With the separately purchased Identity Bridge added to the Directory Services Connector on the customer's premises, the Cloud Single Sign On capability enables users to log into the customer's corporate network and be able to access the Control Console and multiple applications without reentering credentials. In addition, if users are also synchronized through Directory Services Connector, the Identity Bridge allows the ability to sign onto the Control Console with corporate credentials even when outside of the corporate network. Access to each application is assigned by group. Access to each application can be restricted according to the following: 4
5 IP address range A multi factor one time password that users must enter each time they access an application The one time password authentication requires the use of Pledge client software to generate one time passwords from a desktop, laptop, ios mobile device, or Android mobile device. New administration pages in the Control Console If enabled, a new application tab, Cloud SSO, is available for administrators to list, search for, configure and edit application connectors. An application connector is a configuration that you define in Cloud Single Sign On. The connector allows Cloud Single Sign On to connect users to the application without requiring users to sign on to the application. If enabled, a new user tab, My Apps, is available for users to access applications over the cloud directly from the Control Console. From this tab, users can also sign out of all applications to which they are connected by clicking a single button. The tab also provides a link to download Pledge software the first time a user must use it. Protection Configuring enhanced ClickProtect features for inbound mail policies The new and improved ClickProtect feature provides enhanced protection from phishing attacks and malware infections by scanning the URL links in your inbound messages. Using the ClickProtect tab, you can configure scan time and click time actions, customize warning messages, and add trusted sites to your allow list. Improvements to the ClickProtect Overview and Click Log reports allow you to track trends and statistics as well as review the log of individual clicks and actions. ClickProtect ClickProtect safeguards your organization from web based threats that may arrive by using McAfee GTI URL Reputation. URLs are evaluated during processing ("scan time") as well as when users click on a link ("click time"). Click time scanning ensures that users are protected from changes to a URL's reputation that can occur after the message is initially scanned. Figure 2-1 New ClickProtect tab in the inbound policy window 5
6 Update ClickProtect options for an inbound policy set Configure ClickProtect to take specific scan time and click time actions that protect your users from risky URL links in inbound messages. Task For option definitions, click Help in the interface. 1 Select Protection Policies Inbound Policies 2 Highlight a custom policy or select the Default Inbound policy, click Edit. 3 In the Policy Set window, select ClickProtect. 4 Select Enable ClickProtect. 5 Select scan time and click time actions for each reputation type. 6 Under Advanced Anti malware Scan, select malware scan options as necessary. 7 Click Save. Once ClickProtect is active, you can customize the warning messages your users see as well as update the list of approved URLs. Classification tab Use the Classification tab to configure ClickProtect scan time and click time actions. Table 2-1 Classification tab option definitions Option Save Cancel Enable ClickProtect Reputation Definition Click to save changes. Click to reset without saving changes. Select to enable ClickProtect and configure your scan time and click time actions. Displays the risk categories: High Risk Specifies a URL that exhibits detrimental behavior. For example, the site is known to host malware. Medium Risk Specifies a URL that exhibits questionable behavior that may be detrimental to the user. Minimal Risk Specifies a URL that exhibits appropriate behavior or that is verified as trusted. Unverified Specifies a URL for which no reputation information has been calculated. Scan time Action Specifies the action to take at scan time, for each reputation type. Deliver message Quarantine message Deny message Tag subject 6
7 Table 2-1 Classification tab option definitions (continued) Option Click time Action Definition Specifies the action to take at click time, for each reputation type. Allow click through Select to immediately redirect the user to the website. Warn and allow click through Select to display a warning message in a browser and give the user the option to continue to the requested website. Deny click through Select to display a block message in a browser and explain why the website was denied. You can customize the warning and blocked message pages in the Custom Warnings tab. Advanced Anti malware Scan Specifies whether or not you want to scan links for malware at click time. Enable Select to enable the anti malware scan. Enable the Safe Preview token for custom warnings Select to enable the Safe Preview option in the Custom Warnings tab. You can customize the warning message page in the Custom Warnings tab. Custom Warnings tab The Custom Warnings tab allows you to customize the warning page that displays when a website risk is detected at click time. Each text field allows you to enter and format the text using the toolbar options. You can also add tokens to display specific information about a link. Table 2-2 Custom Warnings tab option definitions Option Save Cancel Warn and allow Definition Click to save the text, tokens, and HTML formatting. Click to discard your changes and restore the previously saved text. Specifies the text that displays when you select Warn and allow click through as the click time action for a risk level. This page typically warns the user of the risk and gives them the option to continue or abandon the link. Deny Click through Specifies the text that displays when you select Deny click through as the click time action for a risk level. This page typically warns the user of the risk and provides and explanation for why the website was blocked. Malware Found Error Occured Specifies the text that displays when you enable the Advanced Anti malware Scan option and malware is found. Specifies the text that displays when an error occurs. For example, a URL's reputation cannot be checked, or a website cannot be scanned for malware. Custom Warnings tokens Use these tokens to include specific details about a link in the text of your custom warning message. 7
8 Table 2-3 Tokens definitions Add this token %URL% To display The URL that the user clicked. Recommended for the Warn and allow warning message only. %URL_REPUTATION% The risk level of the website based on its reputation. Minimal Medium High Unverified %URL_CATEGORY% %IMAGE_PREVIEW% The category of the website. A safe preview of the website. In certain situations, the image preview may not display. This can happen when: Access to the page is denied due to the %URL_REPUTATION% value. For example, High Risk is set to Deny click through. The malware scan detected a virus. Safe preview is not enabled for the Advanced Anti malware Scan. The %URL_CATEGORY% value includes sexual or violent content. Extreme Gruesome Content Incidental Nudity Nudity Pornography Provocative Attire Sexual Materials An error occurs during the preview scan, or the preview scan takes longer than 20 seconds. %FROM_ADDRESS% %DATE_TIME% %SUBJECT% %MESSAGE_ID% %MALWARE_NAME% The address that sent the with the website URL. The timestamp of the . The subject line of the . The message ID of the . The name of the malware threat. Custom Warning token examples The website you requested is considered %URL_REPUTATION% risk. The link was sent to you by %FROM_ADDRESS% on %DATE_TIME%. The subject line was %SUBJECT%. This website, %URL%, is associated with the %URL_CATEGORY% category. 8
9 Allow List tab The Allow List tab allows you to configure the list of domains, IP addresses, and URLs that ClickProtect should always allow in an . For example, a website that you want to exclude from URL rewrite, or an internal website that ClickProtect is unable to access. Table 2-4 Allow List tab option definitions Option Save Cancel Domain, IP Address, or URL Definition Click to save changes. Click to restore previous settings. Enter a domain, IP address, or URL to add it to the Allow List. Maximum of 256 characters for each address. Wild cards can be used with domains and IP addresses. Maximum of 200 addresses. Options Add >> Click to add a new address to the list. << Remove Select an address in the list and click << Remove to delete it. << Remove All Click to delete all addresses from the list. Click Save to keep your changes. Allow List More Options Displays the list of allowed domains, IP addresses, and URLs. Specifies additional options for managing the allow list. Upload list (appends): Upload addresses in a text file and add them to the list. To use this option, create a file with one item per line. Uploading adds new entries to the existing list. It will not delete existing items. Browse Click to select a file to upload. Upload Click to upload the file and update the list. Click Save to keep your changes. Download list (be sure to save changes first): Download the current allow list in a.csv file. Download Click to download the list. Subscribe to the Default Inbound policy ClickProtect List Select to use the allow list associated with the default inbound policy. ClickProtect: Overview report The ClickProtect Overview report provides you with the results of your ClickProtect implementation including counts of messages affected and the number of user clicks that were allowed and denied. Table 2-5 ClickProtect Statistics Field Messages with links Messages with multiple links Total clicks Total allowed click throughs Total warn and allow click throughs Total click throughs denied due to reputation Description The total number of messages that contained a link. The total number of messages that contained more than one linke. The total number of times that recipients clicked links in their . The total number of times that recipients were allowed to access the website after clicking the link. The total number of times that recipients were taken to the warning page before being allowed to access the website. The total number of times that recipients were denied access to a website because of the site's reputation. 9
10 Table 2-5 ClickProtect Statistics (continued) Field Total click throughs denied due to malware Number of individual users that clicked Spam messages with click throughs Messages with links on the ClickProtect Allow list Description The total number of times that recipients were denied access to a website because the site contained malware. The total number of recipients that attempted to click a link in an . The total number of spam s that contained links clicked by recipients. The total number of s that contained links that are listed in the ClickProtect allow list. ClickProtect: Click Log report The ClickProtect Click Log report provides details on each link that is scanned for potential risks as well as the resulting action. Table 2-6 ClickProtect: Click Log options Field Timestamp From To Subject URL Reputation Description Displays the date and time. Displays the address of the sender. Displays the address of the recipient. Displays the subject line of the . Displays the full URL of the link. Displays the reputation of the website. High Risk Specifies a URL that exhibits detrimental behavior. For example, the site is known to host malware. Medium Risk Specifies a URL that exhibits questionable behavior that may be detrimental to the user. Minimal Risk Specifies a URL that exhibits appropriate behavior or that is verified as trusted. Unverified Specifies a URL for which no reputation information has been calculated. Category Malware Action When available, displays the category associated with the website. When found, displays the name of the malicious software. The action taken at click time. Denied malware Denied reputation Warn and allow Allowed Score Displays the spam likelihood score assigned to the as a graphical bar. The spam score ranges from 0 100% (green to red), with 100% (or red) being the highest likelihood that the is spam. 10
11 Scheduling Spam Reports in user preferences You can now schedule how often you receive spam report notifications from Protection. These new options allow you to select multiple deliveries per week and up to two reports per day. Figure 2-2 Protection Settings Schedule spam reports Use the schedule and frequency options in the Preferences tab to schedule the delivery of spam reports. Task For option definitions, click Help in the interface. 1 Select the Preferences tab. Administrators can select My Account Preferences. 2 Under Protection Settings, complete the scheduling options for spam reports. Schedule and Frequency Deselect Use policy defaults. Frequency Select one or more days of the week. Deliver reports by Select the time of day for Report 1 and Report 2. Select Skip if you do not want to receive a report. 3 Click Apply. 11
12 Protection settings in the Preferences tab Use the Preferences tab to configure the Protection settings for your account, including spam filtering options and spam report delivery options. Table 2-7 Protection Settings field definitions Field Spam Filtering Spam Actions Definition Select Enable to filter your messages for spam. Select Use policy defaults to use the default spam actions. Deselect to customize Medium Spam, High Spam, and Graymail Spam actions. Medium Spam Action Specifies the default action for spam messages that have a medium likelihood. Prepend "[SPAM]" to message subject The subject line of the has the phrase "[SPAM]" added to the beginning of the subject text and the is sent to you. Quarantine the message The is added to your spam quarantine and is not sent to you. The is reported in your Spam Report. Deny delivery The is blocked automatically. Do nothing The is forwarded to you with no processing applied. High Spam Action Specifies the default action for spam messages that have a high likelihood. Prepend "[SPAM]" to message subject The subject line of the has the phrase "[SPAM]" added to the beginning of the subject text and the is sent to you. Quarantine the message The is added to your spam quarantine and is not sent to you. The is reported in your Spam Report. Deny delivery The is blocked automatically. Do nothing The is forwarded to you with no processing applied. Graymail Spam Action Specifies the default action for graymail spam messages. Tag subject with "[GRAYMAIL]" The subject line of the has the phrase "[GRAYMAIL]" added to the beginning of the subject text and the is sent to you. Quarantine the message The is added to your spam quarantine and is not sent to you. The is reported in your Spam Report. Deny delivery The is blocked automatically. Do nothing The is forwarded to you with no processing applied. Allow Always allow graymail messages. Spam Report Schedule and Frequency Frequency Deliver Reports by Format Select Enable to receive spam reports. Select Use policy defaults to use the default spam report settings. Deselect to customize Frequency and Deliver reports by settings for spam reports. Specifies how often you receive spam reports. Select on or more days of the week. Specifies the time of day you would like to receive your reports. You have the option of receiving one or two reports per day. Specifies the format of the , Plain text or HTML. 12
13 Table 2-7 Protection Settings field definitions (continued) Field Type Spam Report Alternate Delivery Address Definition Specifies the content of the report: New items since last report All quarantined items Summary Specifies an alternate address that allows you to forward your Spam Report to a different address. The address must be provisioned in the system within one of your domains. Forwarding your Spam Report allows the recipient to have full access to your Control Console account. Be sure to use a trusted address. 13
14 Selecting your preferred region to improve MX Record setup The all new MX Records Setup page allows you configure your MX records based on your preferred. This ensures that your records are configured correctly, that inbound is routed through the Protection service for filtering, and that attackers cannot bypass the service. Figure 2-3 New MX Records Setup page with region selection 14
15 Select a region to review MX records Select a region to use its MX records for filtering. Before you begin Before changing your MX records, you must first complete the inbound servers setup process. Task For option definitions, click Help in the interface. 1 Select Protection Setup MX Records 2 Under Region, select an option to update the page. 3 Review the information under Recommended Configuration, Current Configuration, and Lock Down. Use this information to configure your MX records so that mail is routed through the Protection service. The Lock Down information allows you to configure your servers to only accept connections from the service. MX Records Setup page The MX Records Setup page allows you to determine what MX records to use based on your region, whether or not your MX records are configured correctly, and provides you with IP addresses that you can use to prevent attackers from bypassing the service. Table 2-8 MX Record Setup page option definitions Option Region Recommended Configuration Definition Specifies the location of your servers. Selecting a region determines the set of MX records you should use. Displays the recommended MX records for your selected region. Use these records to redirect your to the Protection service. To avoid delivery issues, you should replace your current configuration with the full set of MX records. 15
16 Table 2-8 MX Record Setup page option definitions (continued) Option Current Configuration Lock Down Definition Displays the current set of MX records based on a query to your authoritative DNS provider. Each record includes the following status information: Invalid The record is unrecognized and unable to route to the Protection service. Valid The record is recognized and able to route to the Protection service. Outdated The record is recognized, but does not match the current recommended MX records displayed under Recommended Configuration. You should update your records to match what is displayed. Recheck your current configuration: Check Again Click to query your authoritative DNS provider. Use this DNS server Enter the hostname of an alternative DNS server and click Check Again. Displays a list of files that you can use to limit SMTP connections and prevent attackers from bypassing Protection. Each file contains the list of IP addresses that you should allow from Protection. All others should be blocked. There are four different formats. Select the one that will work best with your environment: CIDR /21 notation Contains two /21 IP blocks. CIDR /24 notation Contains a list of /24 IP blocks. Individual IPs Contains a list of individual IP addresses. Optimized for Microsoft Office 365 For Microsoft Office 365 users, this file contains a list of IP addresses that are formatted for use when creating an Inbound Connector in Forefront Online Protection for Exchange (FOPE). Archiving Deactivating a group-specific archive retention length A change to the Retention options in the Archiving tab of the Edit Group window allows you to remove the custom value and restore the default global retention length. Figure 2-4 Archiving tab in the Edit Group window 16
17 Restore the global archive retention length for a group When necessary, remove the custom group retention length and restore the global value. This option can be useful when the group retention, or the group itself, is no longer needed. Task For option definitions, click Help in the interface. 1 Select Account Management Groups 2 Highlight the group you want to modify, click Edit. 3 In the Edit Group window, select Archiving. 4 In the Retention drop down, select the global retention value. 5 Click Apply. Web Protection New charts technology Web Protection Services has replaced CORDA with new technology for chart graphical displays in the Reports tab. Reports data affected by the change include: Traffic Overview Media Allowed Category by Site Application Allowed Category by User Threat Blocked Category The following example illustrates the new graphical display. 17
18 Resolved issues These issues are resolved in this release of the product. For a list of issues fixed in earlier releases, see the Release Notes for the specific release. Resolved Account Management issues SR# W When replacing the primary address in one account with the same address of a previously removed account, user synchronization of the Active Directory server completes and approves successfully. (875978) SR# W You can now remove the configuration settings for an Authentication Type in the User Authentication tab of the Control Console. Select Account Management Configuration User Authentication, click Clear Settings. (870368) Resolved Protection issues Message Audit SR# W You can now download the Message Audit report with Japanese characters in the title using Internet Explorer. (874984) Quarantine SR# W Archive Compliance Officers can now delete their own quarantined messages. (874956) SR# W Quarantine search results now display correctly in Internet Explorer 10. (870165) SR# W Service Provider customers and administrators with a role less than Customer Administrator can now complete Quarantine searches using a wildcard in the To address field. (870456) SR# W Oracle Messaging Communications Server users can now view the contents of their Spam Reports. (871942) Encryption SR# W The Encryption service no longer locks due to processes that have failed to timeout and exit successfully. (870406) SR# W The Encryption Welcome letter is now configurable for on premise deployments. (870334) SR# W You can now encrypt outbound messages that include non ascii characters in the filename of an attachment. (870304) Policies SR# W If you enter more than 255 characters into the Content field under Inbound Policy Spam Content Groups, you will receive an error message and the content will not save. (870362) SR# W When creating a new policy set, you can cut and paste into the Name field using the right click menu and the Save button will become active. (870360) SR# W When editing the Sender Allow or Sender Deny list in the Allow/Deny tab of a policy, the Remove All button is only active when there is at least one address already in the list. (870363) 18
19 Other resolved issues SR# W An upgrade to Postgresql fixes multiple issues in existing deployments. (870318) SR# W mod_access IP checks are now delayed when the sending IP needs to be rewound. (869727) Web Protection Resolved Issues Here is a list of issues from previous releases of the software that have been fixed in this release. Resolved Issues 1 Issue SR # W The Forensics Report does not return data for specific filtered search criteria, but does return data to a downloaded.csv file. (Reference: ) Resolution The error was found and corrected in the database and Forensics Reports now returns accurate data for filtered search criteria. 2 Issue SR # W A customer reported their policy settings were filtered through another customer's McAfee Client Proxy policy. (Reference: ) Resolution The customer's cache key was not unique to McAfee Client Proxy policy users. The customer's cache key now includes a unique customer ID. 3 Issue SR # W Users reported errors when trying to install Java. (Reference: ) Resolution Sun.com was added to the Global Whitelist, allowing users to download and install the Java executable without error. Recommended environments The following environments are supported by this release. Internet Explorer 10 Windows 8 Windows 7 Internet Explorer 9 Windows 7 Windows Vista Firefox OS X 10.8 Windows 7 OS X 10.7 Windows Vista Windows 8 Windows XP Chrome OS X 10.8 Windows 7 OS X 10.7 Windows Vista Windows 8 Windows XP 19
20 Safari 6 (Web Protection end user only) OS X 10.8 OS X 10.7 Find McAfee SaaS service documentation McAfee provides the information you need during each phase of service implementation, from setup to daily use and troubleshooting. After a service update is released, information is added to the McAfee SaaS and Web Security Support site. Task 1 Go to the McAfee SaaS and Web Security Support page at 2 Under Knowledge Base, click Reference Materials. 3 Under Reference Materials, scroll down to access information that you need: Service Enhancements and Release Notes Training Materials Service Reference Guides Find product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. Task 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 20
21 Copyright 2013 McAfee, Inc. Do not copy without permission. McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. SEWS-Release- Notes-7.1.0A00
Administration Guide Revision A. SaaS Email Protection
Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationEmail Protection for your account
User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
More informationHow To Manage Your Spam On Graymail On Pc Or Macodeo.Com
User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
More informationSophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
More informationMcAfee Directory Services Connector extension
Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.
More informationSetting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
More informationSetting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
More informationAdministration Guide Revision E. SaaS Email Protection
Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
More informationTrend Micro Hosted Email Security. Best Practice Guide
Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described
More informationSaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
More informationCreating a Content Group and assigning the Encrypt action to the Group.
Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
More informationMcAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationCore Protection Suite
Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3
More informationAdministration Guide Revision E. Account Management. For SaaS Email and Web Security
Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
More informationDeploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationService Updates and Enhancements
Service Updates and Enhancements May 8, 2013 McAfee understands that providing the tools for a trusted communication environment is our primary directive. Accomplishing this goal requires listening to
More informationChapter 10 Encryption Service
Chapter 10 Encryption Service The Encryption Service feature works in tandem with Dell SonicWALL Email Security as a Software-as-a-Service (SaaS), which provides secure data mail delivery solutions. The
More informationPureMessage for Microsoft Exchange Help. Product version: 4.0
PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9
More informationTrustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
More informationConfiguration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
More informationSpambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
More informationMySpam email filtering service Protection against spam, viruses and phishing attacks
MySpam email filtering service Protection against spam, viruses and phishing attacks 1. Introduction This MySpam guide describes the new service and changes to the University s current spam handling procedures.
More informationSymantec Hosted Mail Security. Console and Spam Quarantine User Guide
Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license
More informationSteps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
More informationSophos Mobile Control Startup guide. Product version: 3.5
Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile
More informationSophos Mobile Control Startup guide. Product version: 3
Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos
More informationC I S C O E M A I L S E C U R I T Y A P P L I A N C E
C I S C O E M A I L S E C U R I T Y A P P L I A N C E U R L F I L T E R I N G September 2015 Version 1.3 Tobias Mayer Consulting Systems Engineer The most current version of this document can be found
More informationSophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
More informationWatchGuard QMS End User Guide
WatchGuard QMS End User Guide WatchGuard QMS Overview The WatchGuard QMS device enables spam messages from the WatchGuard XCS to be directed to a local quarantine area that provides spam storage for each
More informationAT&T Business Messaging Account Management
AT&T Business Messaging Account Management Admin User Guide December 2015 1 Copyright 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein
More informationHow To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)
MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE
More informationSonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
More informationSophos Mobile Control Administrator guide. Product version: 3
Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing
More informationPureMessage for Microsoft Exchange Help. Product version: 3.1
PureMessage for Microsoft Exchange Help Product version: 3.1 Document date: June 2015 Contents 1 About PureMessage for Microsoft Exchange...4 2 Key concepts...5 2.1 Key concepts overview...5 2.2 Inbound,
More informationPortal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationSoftware Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide
Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox
More informationSophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
More informationMcAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationService Launch Guide (US Customer) SEG Filtering
Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required
More informationHosted Email Security 2.0 Quick Start Guide
Hosted Email Security 2.0 Quick Start Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationSpambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
August 22, 2013 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
More informationOffice 365 Exchange Online Protection Administration Guide
Chapter 10 Office 365 Exchange Online Protection Administration Guide Office 365 version 2013 is a suite of software products: Software as a Service (SaaS). Customers can purchase Office 365 in many ways,
More informationConfiguring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
More informationCloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationCore Filtering Admin Guide
Core Filtering Admin Guide 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Table of Contents Login... 3 Overview... 3 Quarantine...
More informationATTENTION: End users should take note that Main Line Health has not verified within a Citrix
Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationSymantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
More informationSophos Anti-Virus for Mac OS X: Home Edition Help
Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
More informationDocuSign Connect for Salesforce Guide
Information Guide 1 DocuSign Connect for Salesforce Guide 1 Copyright 2003-2013 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign
More informationMcAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
More informationGREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More informationPANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1
PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1 Contents 1 INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 5 1.1 WHAT IS PANDA CLOUD EMAIL PROTECTION?... 5 1.2 FUNCTIONALITIES... 5 2 PANDA
More informationTransitioning to McAfee SaaS Email Protection from Postini
Technical FAQ Transitioning to McAfee SaaS Email Protection from Postini Frequently Asked Questions Google recently and abruptly announced that all Postini customers must either migrate to Google Apps,
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationhttp://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationIBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
More informationWhen your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
More informationFrequently Asked Questions
Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange
More informationProduct Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationSonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
More informationTriCore Secure Web Email Gateway User Guide 1
TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email
More informationAjera 7 Installation Guide
Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services
More informationSenior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
More informationOverview. Accessing the User Interface. Logging In. Resetting your Password
Overview The message filtering service lets a company easily provide real-time spam and virus filtering, attack blocking, and email-traffic monitoring across a user deployment of any size. Users receive
More informationSophos Mobile Control Administrator guide. Product version: 3.6
Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for
More informationVodafone PC SMS 2010. (Software version 4.7.1) User Manual
Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6
More informationSimplicity Itself. User Guide
Simplicity Itself User Guide TekEx 2013 Contents WELCOME... 3 TEKEX OVERVIEW... 3 DOWNLOAD OUTLOOK... 4 CONFIGURE OUTLOOK... 5 CONFIGURE MAC EMAIL CLIENT... 10 SMARTPHONE SETUP... 12 IPHONE SETUP... 12
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationMcAfee Content Security Reporter 1.0.0 Software
Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationSpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...
More informationHow To Manage Your Quarantine Email On A Blackberry.Com
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationGrapevine Mail User Guide
Grapevine Mail User Guide Table of Contents Accessing Grapevine Mail...2 How to access the Mail portal... 2 How to login... 2 Grapevine Mail user guide... 5 Copying your contacts to the new Grapevine Mail
More informationPolicy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationESET Mobile Security Windows Mobile. Installation Manual and User Guide
ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3
More informationNetwork Security Platform 7.5
M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
More informationCloud. Hosted Exchange Administration Manual
Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...
More informationESET Mobile Security Windows Mobile
ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3
More informationHow To Use Secureanything On A Mac Or Ipad (For A Mac)
User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is
More informationMcAfee Client Proxy 2.0
Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationImportant Information
June 2015 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com
More informationeprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
More informationSynchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
More informationConnection and Printer Setup Guide
Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationAbila Grant Management. Document Management
Abila Grant Management This is a publication of Abila, Inc. Version 2014 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names
More informationKaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationSonicWALL SSL VPN 3.5: Virtual Assist
SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following
More informationBIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without
More informationEasy Setup Guide for the Sony Network Camera
-878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer
More informationConfiguration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationhttp://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationCloud Director User's Guide
Cloud Director 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationBarracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
More information