Installation Guide Revision C. McAfee Gateway 7.x VMtrial Appliances

Size: px
Start display at page:

Download "Installation Guide Revision C. McAfee Gateway 7.x VMtrial Appliances"

Transcription

1 Installation Guide Revision C McAfee Gateway 7.x VMtrial Appliances

2 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundscore, Foundstone, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. Product and feature names and descriptions are subject to change without notice. Please visit mcafee.com for the most current products and features. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Gateway 7.x VMtrial Appliances Installation Guide

3 Contents 1 Introducing VMtrial 5 Description of McAfee Gateway Supported platforms McAfee Gateway features Evaluation period Performance About McAfee About VMware What you get Installing VMtrial 11 Decide how you want to use the evaluation Considerations before installing VMtrial Network information you need to collect System requirements Install VMtrial on VMware vsphere Install VMtrial on VMware Player Configure the virtual appliance Getting started with VMtrial 17 The Dashboard Benefits of using the Dashboard Dashboard portlets Testing the configuration Test connectivity Update the DAT files Using the test generator Benefits of using the test generator Generate test Generate a stream of test messages View a summary of scanned traffic Find specific test messages Exploring the appliance features Introduction to policies Encryption Compliance Settings Data Loss Prevention settings Identify quarantined messages Index 31 McAfee Gateway 7.x VMtrial Appliances Installation Guide 3

4 Contents 4 McAfee Gateway 7.x VMtrial Appliances Installation Guide

5 1 1 Introducing VMtrial McAfee Gateway Appliance (VMtrial) lets you evaluate the latest McAfee Gateway Appliance on VMware vsphere, or VMware Player. Contents Description of McAfee Gateway Supported platforms McAfee Gateway features Evaluation period Performance About McAfee About VMware What you get Description of McAfee Gateway McAfee Gateway delivers comprehensive, enterprise class protection against threats in an integrated and simple to manage appliance for SMTP and POP3. If you purchase the McAfee Gateway after this evaluation, McAfee can either supply the relevant hardware and other items that accompany an appliance, or you can access the software using a virtual appliance. Supported platforms McAfee Gateway Appliance (VMtrial) works on the following virtual platforms: VMware vsphere (ESX) 4.x VMware vsphere Hypervisor (ESXi) 4.x VMware Player 3.x McAfee Gateway 7.x VMtrial Appliances Installation Guide 5

6 1 Introducing VMtrial McAfee Gateway features McAfee Gateway features This information describes the features of the product and where to locate them in the product interface. scanning features Feature Comprehensive scanning protection Anti virus protection Anti spam protection Encryption Description Offers anti virus and anti spam protection for the following network protocols: SMTP POP3 Policies Anti Virus Reduce threats to all protocol traffic using: Anti virus settings to identify known and unknown threats in viruses in archives files, and other file types Other threat detection settings to detect viruses, potentially unwanted programs, packers, and other malware McAfee Global Threat Intelligence file reputation to complement the DAT based signatures by providing the appliances access to millions of cloud based signatures; this reduces the delay between McAfee detecting a new malware threat and its inclusion in DAT files, providing broader coverage Policies Spam Reduce spam in SMTP and POP3 traffic using: Anti spam engine, the anti spam, and anti phishing rule sets Lists of permitted and denied senders McAfee Global Threat Intelligence message reputation to identify senders of spam messages Permit and deny lists that administrators and users can create using a Microsoft Outlook plug in (user level only) Detect phishing attacks and take the appropriate action. Encryption The McAfee Gateway includes several encryption methodologies: Server to server encryption Secure Web Mail Pull delivery Push delivery The encryption features can be set up to provide encryption services to the other scanning features, or can be set up as an encryption only server used just to encrypt messages. 6 McAfee Gateway 7.x VMtrial Appliances Installation Guide

7 Introducing VMtrial McAfee Gateway features 1 Feature McAfee Global Threat Intelligence feedback Compliance Settings Data Loss Prevention Message Search Quarantine features Message Transfer Agent Description Policies Policy Options McAfee GTI feedback System Setup Wizard McAfee analyzes data about detections and alerts, threat details, and usage statistics from a broad set of customers to combat electronic attacks, protect vulnerable systems from exploit, and thwart cyber crime. By enabling this feedback service in your product, you will help us improve McAfee Global Threat Intelligence, thereby making your McAfee products more effective, as well as help us work with law enforcement to address electronic threats. Policies Compliance This release of the product includes enhancements to the way the appliance uses compliance rules: In the Compliance policy, use the Rule Creation wizard to specify the inbuilt dictionaries that you want to comply with, or create the a new rule using an existing rule as a template. Use the Mail size filtering and File filtering policies to check SMTP messages for true file types and take action on based on size and number of attachments. DLP and Compliance Use the Data Loss Prevention policy to upload and analyze your sensitive documents known as training and to create a fingerprint of each document. Reports Message search From a single location within the user interface, Message Search allows you to confirm the status of messages that have passed through the appliance. It provides you with information about the , including whether it was delivered or blocked, if the message bounced, if it was quarantined, or held in a queue pending further action. Quarantine Configuration Quarantine Options Quarantine digests Allow users to handle quarantined items without involving the administrator. McAfee Quarantine Manager Consolidate quarantine management for McAfee products. Reroute traffic on the fly based on criteria set by the administrator. For example, encrypted mail can be rerouted for decryption. Allow the administrator to determine the final status of each message. See a quick view summary of inbound messages by domain with drill down facilities per domain and undeliverable by domain. Prioritize the redelivery of undeliverable based on domain. Pipeline multiple deliveries to each domain. Rewrite an address on inbound and outbound based on regular expressions defined by the administrator. Strip headers on outbound messages to hide internal network infrastructure. Deliver messages using TLS. Manage certificates. McAfee Gateway 7.x VMtrial Appliances Installation Guide 7

8 1 Introducing VMtrial Evaluation period Reporting and System features Feature Scheduled Reports Logging options Dashboard statistics epolicy Orchestrator management of appliances Cluster Management Virtual Hosts Role based Access Control Description Reports Scheduled Reports Schedule reports to run on a regular basis and send them to one or more recipients. System Logging, Alerting and SNMP You can configure the appliance to send s containing information about viruses and other detected threats, and to use SNMP to transfer information from your appliance. Dashboard The Dashboard provides a single location for you to view summaries of the activities of the appliance, such as the flowing through the appliance, and the overall system health of the appliance. You can also go directly to areas of the user interface that you often use. System Setup Wizard Choose the epo Managed Setup option to monitor the status of your appliances and also manage your appliance from epolicy Orchestrator. You can directly manage your appliances from epolicy Orchestrator, without needing to launch the interface for each appliance. In epolicy Orchestrator, the user interface pages that you use to configure and manage your appliance have a familiar look and feel to the pages that you find within the appliances. System System Administration Cluster Management Cluster management enables you to set up groups of appliances that work together to share your scanning workloads, and to provide redundancy in the event of hardware failure. From these pages you can back up and restore your configurations, push configurations from one appliance to others, and set up load balancing between your appliances. System Virtual Hosting Virtual Hosts For the SMTP protocol, you can specify the addresses where the appliance receives or intercepts traffic on the Inbound Address Pool. Using virtual hosts, a single appliance can appear to behave like several appliances. Each appliance can manage traffic within specified pools of IP addresses, enabling the appliance to provide scanning services to traffic from many customers. System Users Users and Roles System Users Login Services In addition to the Kerberos authentication method, RADIUS authentication is also available. Evaluation period During the evaluation period, you get unlimited access to McAfee Gateway Appliance (VMtrial) features that can protect your organization from spam, phishing, viruses, undesirable content, data loss, and other threats. 8 McAfee Gateway 7.x VMtrial Appliances Installation Guide

9 Introducing VMtrial Performance 1 The evaluation period lasts for 30 days, after which time the virtual appliance will cease to function. When the evaluation period ends, an Expiry Information dialog box on the VMtrial logon page tells you "The trial has now expired." All functionality stops working. Traffic continues to pass through the VMtrial appliance but is not scanned. If you run out of time to complete your evaluation before it expires, you can save your configuration, begin another evaluation, and apply your original configuration settings. To purchase the product based on your evaluation, contact your preferred reseller. To locate a reseller, go to to find a Reseller or Distribution Partner or contact a sales representative. Performance Using virtual software to simulate a McAfee appliance impacts appliance performance and traffic throughput. Scanning throughput during the evaluation is not representative of the performance that would be achieved on a McAfee appliance with a similar hardware specification. Performance and traffic throughput are also affected by the host computer specification and the size of your Internet connection. About McAfee McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the world s largest dedicated security technology company. McAfee delivers proactive and proven solutions and services that help secure systems, networks, and mobile devices around the world, allowing users to safely connect to the Internet, browse, and shop the web more securely. Backed by its unrivaled global threat intelligence, McAfee creates innovative products that empower home users, businesses, the public sector, and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. McAfee is relentlessly focused on constantly finding new ways to keep our customers safe. About VMware VMware (NYSE:VMW), the global leader in virtualization and cloud infrastructure, delivers customer proven solutions that accelerate IT by reducing complexity and enabling more flexible, agile service delivery. VMware enables enterprises to adopt a cloud model that addresses their unique business challenges. VMware s approach accelerates the transition to cloud computing while preserving existing investments and improving security and control. With more than 250,000 customers and 25,000 partners, VMware solutions help organizations of all sizes lower costs, increase business agility and ensure freedom of choice. What you get In the evaluation.zip file, you have the following items: McAfee Gateway 7.x VMtrial Appliances Installation Guide 9

10 1 Introducing VMtrial What you get McAfee Gateway Appliance (VMtrial) installation files McAfee Gateway Appliance (VMtrial) Installation Guide Sources of information You can find installation and configuration information in the following locations: Online Help The configuration console contains page sensitive Help information to guide you through the installation process. After installation, detailed context sensitive Help with Search and Index features is available from the product interface. It provides an introduction to the product and its features, detailed instructions for configuring the software, information on recurring tasks, and operating procedures. KnowledgeBase Use the McAfee KnowledgeBase for answers to questions about McAfee Gateway Appliance. Go to and click Browse the KnowledgeBase. From the Product list, select Gateway. Documentation You have access to the latest version of the McAfee Gateway Appliance documentation. Go to click Product Documentation, and select Gateway. For help with VMware vsphere or VMware Player, go to type your question to the Search VMware Knowledge Base box, and click Search. 10 McAfee Gateway 7.x VMtrial Appliances Installation Guide

11 2 Installing VMtrial This information helps you prepare your evaluation environment and presents topics to consider before you install McAfee Gateway Appliance (VMtrial). Contents Decide how you want to use the evaluation Considerations before installing VMtrial Network information you need to collect System requirements Install VMtrial on VMware vsphere Install VMtrial on VMware Player Configure the virtual appliance Decide how you want to use the evaluation Before you start to install the evaluation, you must decide whether you want to: Use McAfee Gateway Appliance (VMtrial) to scan traffic on your network. Just evaluate the McAfee Gateway Appliance features and interface options. Considerations before installing VMtrial If you want McAfee Gateway Appliance (VMtrial) to scan traffic on your network, consider the following before you start the installation process: Which protocols do you want to scan? Choose from SMTP and POP3. Do you want to scan these protocols without changing settings on clients or servers? Does your network have a DMZ? If so, which servers are located in it? Do you have an internal DNS server? The operational mode that you want to use. Choose from explicit proxy mode, transparent bridge mode, or transparent router mode. Information about the features of each operating mode can be found in the McAfee Gateway Virtual Appliance Installation Guide available from mysupport.mcafee.com. If VMware vsphere is already installed and running correctly in your operating environment, McAfee recommends that you use it to run McAfee Gateway Appliance (VMtrial). McAfee Gateway 7.x VMtrial Appliances Installation Guide 11

12 2 Installing VMtrial Network information you need to collect Network information you need to collect Gather the following information before you start the installation process: Protocols to scan (SMTP, POP3) Host name Domain name Default gateway Choose your operational mode: explicit proxy, transparent router, transparent bridge. Information about the operational modes can be found in the McAfee Gateway Virtual Appliance Installation Guide available from LAN1 port IP address and subnet mask LAN2 port IP address and subnet mask DNS server IP address Any onward server IP address System requirements If you plan to use VMtrial in your production environment, remember that traffic throughput and performance are slower than an appliance with a similar hardware specification. VMtrial does not run on the FAT32 filesystem. Component Processor Available memory Value 2.8 GHz Pentium 4 processor with Physical Address Extension (PAE) support 1 GB Free hard disk space 50 GB Virtual environment Browser If VMware vsphere is already installed and running correctly in your operating environment, McAfee recommends that you use it to run McAfee Gateway Appliance (VMtrial). The appliance's interface is optimized for Microsoft Internet Explorer 7.0 or later, and Mozilla Firefox 3.6 or later. Install VMtrial on VMware vsphere Use this task to install McAfee Gateway Appliance (VMtrial) onto a host computer running VMware vsphere 4.x or VMware vsphere Hypervisor (ESXi) 4.x. Before you begin Download the McAfee Gateway Appliance (VMtrial) package.zip file from the McAfee download site and extract it to a location where the VMware vsphere Client can see it. Install a fully licensed copy of VMware vsphere 4.x or VMware vsphere Hypervisor (ESXi) 4.x. 12 McAfee Gateway 7.x VMtrial Appliances Installation Guide

13 Installing VMtrial Install VMtrial on VMware Player 2 The McAfee Gateway Appliance (VMtrial) performs automatic configuration using DHCP for the following parameters: Host name Domain name Default gateway DNS server The console appears when the appliance restarts until you complete the settings. 1 Start the VMware vsphere Client application. 2 Log on to the VMware vsphere server, or the vcenter Server. 3 From the Inventory list, select the host or cluster onto which you want to import the virtual appliance software. 4 Click File Deploy OVF Template Deploy From File, and click Browse to go to where you extracted the.zip file you downloaded from the McAfee download site. 5 Open the VMtrial subfolder from the.zip file, and select the McAfee_MEG_VMtrial.vSphere_ESX.ovf file, and click Open. 6 Click Next twice, and optionally type a new name. 7 Select the resource pool that you want to use if you have any configured. 8 Select the datastore that you want to use, and click Next. 9 Select the virtual networks to which the virtual appliance NICs will be connected. 10 Click Next, read the summary, then click Finish and wait for the import process to finish. You can install the virtual appliance on more than one VMware vsphere server. Install VMtrial on VMware Player Use this task to install McAfee Gateway Appliance (VMtrial) onto a host computer running VMware Player. Before you begin Download the McAfee Gateway Appliance (VMtrial) package.zip file from the McAfee download site and extract it to the computer on which you plan to run the evaluation. Download VMware Player from player. The McAfee Gateway Appliance (VMtrial) performs automatic configuration using DHCP for the following parameters: Host name Domain name Default gateway DNS server McAfee Gateway 7.x VMtrial Appliances Installation Guide 13

14 2 Installing VMtrial Configure the virtual appliance The console appears when the appliance restarts until you complete the settings. 1 Log on to the computer as an administrator. 2 Install VMware Player: a Double click the VMware Player installation file and click Run to start the installer. b c Click Next and continue through the installer selecting the desired options. On the last page, click Continue to begin the installation. The computer must be restarted before you can run McAfee Gateway Appliance (VMtrial). 3 Run the VMtrial installation file: a Browse to the folder where you extracted the McAfee Gateway Appliance (VMtrial) package.zip file. b c Open the VMtrial folder. Double click the McAfee_MEG_VMtrial.VMware_Player.vmx file. VMware Player starts, and the installation begins. You can install the virtual appliance on more than one VMware Player server. Configure the virtual appliance Use this task to configure the virtual appliance. Before you begin Ensure your virtual environment is installed and running correctly. 1 Start the virtual appliance. The installation starts automatically. 2 Read the End User License Agreement to continue with the installation, then click y to accept it and start the installation. 3 At the installation menu, select a to perform a full installation and y to continue. 4 When the installation is complete, the virtual appliance restarts. 5 On the Welcome screen, choose the language that you want to use. 6 Accept the terms of the license agreement. 7 Configure the virtual appliance from the graphical configuration wizard. 14 McAfee Gateway 7.x VMtrial Appliances Installation Guide

15 Installing VMtrial Configure the virtual appliance 2 8 Apply the configuration to the virtual appliance. Depending on the settings you entered, it might restart. You can install the virtual appliance on more than one VMware vsphere, VMware vsphere Hypervisor, or VMware Player server. To do so: a Follow the steps in this task on another VMware vsphere, VMware vsphere Hypervisor, or VMware Player server. b c Return to the previously installed virtual appliance user interface. Select System System Administration Configuration Push to send the configuration details to the second virtual appliance. McAfee Gateway 7.x VMtrial Appliances Installation Guide 15

16 2 Installing VMtrial Configure the virtual appliance 16 McAfee Gateway 7.x VMtrial Appliances Installation Guide

17 3 3 Getting started with VMtrial This information introduces you to the interface elements that make up McAfee Gateway Appliance (VMtrial). Contents The Dashboard Testing the configuration Using the test generator Exploring the appliance features The Dashboard The Dashboard provides a summary of the activity of the appliance. Dashboard Use this page to access most of the pages that control the appliance. On a cluster master appliance, use this page also to see a summary of activity on the cluster of appliances. McAfee Gateway 7.x VMtrial Appliances Installation Guide 17

18 3 Getting started with VMtrial The Dashboard Benefits of using the Dashboard The Dashboard provides a single location for you to view summaries of the activities of the appliance through a series of portlets. Figure 3-1 Dashboard portlets Some portlets display graphs that show appliance activity over the following periods of time: 1 hour 2 weeks 1 day (the default) 4 weeks 1 week Within the Dashboard, you can make some changes to the information and graphs displayed: Expand and collapse the portlet data using the and buttons in the portlet's top right hand corner. Drill down to specific data using the and buttons. See a status indicator that shows whether the item needs attention: Healthy the reported items are functioning normally Requires Attention a warning threshold has been exceeded Requires Immediate Attention a critical threshold has been exceeded Disabled a service is not enabled Use and to zoom in and zoom out of a timeline of information. There is a short delay while the view is updated. By default, the Dashboard shows data relating to the previous one day. Move a portlet to another location on the Dashboard, 18 McAfee Gateway 7.x VMtrial Appliances Installation Guide

19 Getting started with VMtrial Testing the configuration 3 Double click the top bar of a portlet to expand it across the top of the Dashboard, Set your own alert and warning thresholds to trigger events. To do so, highlight the item and click it, edit the alert and warning threshold fields, and click Save. When the item exceeds the threshold you set, an event is triggered. Depending on the browser used to view the McAfee Gateway user interface, the Dashboard "remembers" the current state of each portlet (whether it is expanded or collapsed, and if you have drilled down to view specific data), and attempts to re create that view if you navigate to another page within the user interface and then return to the Dashboard within the same browsing session. Dashboard portlets Understand the portlets found on the dashboard within the user interface of your McAfee Gateway. Option Inbound Mail Summary Outbound Mail Summary SMTP Detections POP3 Detections System Summary Hardware Summary Network Summary Services Clustering s Definition Use the Inbound Mail Summary portlet to get the delivery and status information about messages sent to your organization. Use the Outbound Mail Summary portlet to get the delivery and status information about messages sent from your organization. Use the SMTP Detections portlet to find out the total number of messages that triggered a detection based on the sender or connection, the recipient, or the content, and to view data specific to either inbound or outbound SMTP traffic. Use the POP3 Detections portlet to view how many messages triggered a detection based on threats such as viruses, packers, or potentially inappropriate images. Use the System Summary portlet displays information about load balancing, the disk space used for each partition, total CPU usage, used and available memory, and swap details. Use the Hardware Summary portlet uses status indicators to show the status of network interfaces, UPS servers, bridge mode (if enabled), and RAID status. Use the Network Summary portlet provides information about the status of your connections, network throughput and counters relating to Kernel Mode Blocking Use the Services portlet displays update and service status statistics based on protocol and external servers used by the appliance. Use the Clustering portlet, when you have configured your appliance as part of a cluster or are using the blade server hardware, provides information about the entire cluster. Use the s portlet to link directly to the areas of the user interface that search the message queue, view reports, manage policies, configure mail protocol settings and network and system settings, and access troubleshooting features. Testing the configuration This information describes how to test that the appliance is functioning correctly after installation. Contents Test connectivity Update the DAT files McAfee Gateway 7.x VMtrial Appliances Installation Guide 19

20 3 Getting started with VMtrial Using the test generator Test connectivity Use this task to confirm basic connectivity. The McAfee Gateway checks that it can communicate with the gateway, update servers and DNS servers. It also confirms that the appliance name and domain name are valid. 1 From the navigation bar, select Troubleshoot, or from the dashboard, select Run System Tests from the s area. 2 Click the Tests tab. 3 Click Start Tests. Each test should return positively. Update the DAT files Use this task to ensure that the McAfee Gateway has the most up to date detection definition (DAT) files. We recommend updating them before you configure the scanning options. As you progress using the McAfee Gateway, you can choose to update individual types of definition file and change the default scheduled updates to suit your requirements. 1 Select System Component Management Update Status. 2 To update the anti virus engine and anti virus database, click Update Now. To check that the update applied correctly, open the Services portlet in the Dashboard, and expand the Updates status. The Anti virus components will have a green status. Using the test generator McAfee Gateway Appliance (VMtrial) includes a test generator to allow you to fully test your trial of the software, without needing to configure external infrastructure to send and receive messages. Troubleshoot Tools Generate Test Benefits of using the test generator The test generator demonstrates the reporting and detection capabilities of the McAfee Gateway Appliance (VMtrial) by simulating the continual sending and receiving various types of traffic. The content of the s is randomized and consists of a selection of detection types and legitimate data. The detections trigger defined actions for viral content, spam content, compliance or Data Loss Prevention (DLP) actions. These test s do not contain any viral content, rather, they contain test strings designed specifically to ensure the anti virus detections are working correctly. When you enable the test generator, policies are automatically created. These policies are used to define the settings that are applied to the test traffic as it is scanned by the appliance. 20 McAfee Gateway 7.x VMtrial Appliances Installation Guide

21 Getting started with VMtrial Using the test generator 3 The connection and envelope properties of the generated messages are also randomized, to ensure that different policies are triggered when the messages are scanned. You can edit the policies created to test the traffic. Doing so might affect the results of the scanned test traffic. Generate test Generate a stream of messages to test the effects of the scanning policies. Table 3-1 Option definitions Diagnostics: Generate continuous test Option Enable Continuous Generation / Reset Continuous Generation Start Continuous Generation Disable Status Window Reminder Stop Continuous Generation Definition Creates new policies to define the configuration used to scan the test messages generated using continuous generation. After you have enabled continuous generation and created the policies, you can reset these policies to their initial state by clicking Reset Continuous Generation. Creates test traffic. When test traffic is being generated, a reminder message is displayed on the Status Window every minute. Click to disable the reminder messages. Stops the flow of test traffic. Generate a stream of test messages Configure the McAfee Gateway Appliance (VMtrial) software to generate a continuous stream of test messages. To fully evaluate and understand some features within McAfee Gateway, it is necessary for the appliance to scan messages. Use Generate Test Diagnostics: Generate continuous test to create a continuous stream of test messages to be scanned by the appliance. 1 Select Troubleshoot Tools Generate Test . 2 Click Enable Continuous Generation. 3 Click OK to accept the notice about your policy customizations being overwritten. The enabling of generation and the creation of the required scanning policies takes several minutes to complete. New policies are created. These are used to configure the scanning for the test message stream. 4 Click Start Continuous Generation. Your McAfee Gateway Appliance (VMtrial) starts generating a stream of messages that are scanned by the appliance. McAfee Gateway 7.x VMtrial Appliances Installation Guide 21

22 3 Getting started with VMtrial Exploring the appliance features View a summary of scanned traffic Use the Dashboard to get an "at a glance" overview of the traffic scanned by the McAfee Gateway Appliance (VMtrial). Before you begin Either arrange for external to be delivered though the virtual appliance, or generate a stream of test messages using the Generate Test Diagnostics: Generate continuous test feature. 1 Select Dashboard. 2 View the counters shown within the Mail Summary portlets. The counters increment as the traffic is scanned. Find specific test messages Use Message Search to get detailed information about the traffic scanned by the McAfee Gateway Appliance (VMtrial). Before you begin Either arrange for external to be delivered though the virtual appliance, or generate a stream of test messages using the Generate Test Diagnostics: Generate continuous test feature. 1 Select Reports Message search. 2 Click Search / Refresh. The appliance reads the current information from its database, and displays it on the page. 3 To view only information about specific actions taken, for example, messages that have been quarantined or bounced, use the available filtering options before clicking Search / Refresh. Detailed information about the scanned traffic is displayed. For further information, see the online Help for Message Search. Exploring the appliance features This information contains tasks to demonstrate the McAfee Gateway scanning features in action. It provides step by step instructions to create and test some sample policies and tells you how to generate applicable reports. Contents Introduction to policies Encryption Compliance Settings Data Loss Prevention settings Identify quarantined messages 22 McAfee Gateway 7.x VMtrial Appliances Installation Guide

23 Getting started with VMtrial Exploring the appliance features 3 Introduction to policies The appliance uses policies which describe the actions that the appliance must take against threats such as viruses, spam, unwanted files, and the loss of confidential information. Policies Policies are collections of rules or settings that can be applied to specific types of traffic or to groups of users. Encryption The Encryption pages enable you to set up McAfee Gateway to use the supported encryption methods to securely deliver your messages. Encryption The McAfee Gateway includes several encryption methodologies, and can be set up to provide encryption services to the other scanning features, or can be set up as an encryption only server used just to encrypt messages. Encrypt all traffic to a specific customer A common use of the encryption features is to configure a policy to use encryption for messages going to a specific customer. This group of tasks show how to configure your McAfee Gateway so that all messages being sent to s specific customer are sent using encryption. Create a new scanning policy Learn how to create a new scanning policy. Your appliance uses the policies you create to scan the messages sent through the appliance. You can create multiple policies to control the way different users use , or to specify different actions based on specific circumstances. 1 Select Policies Scanning Policies. 2 Select the required protocol using steps in View policies for SMTP, POP3 or McAfee Secure Web Mail. 3 Click Add policy. 4 In the Scanning Policies New Policy page, enter the following information: a b c Name for the policy. Write an optional description for the new policy. Specify where the new policy inherits its settings from. If you have a similar policy already set up, select this to allow its settings to be inherited by the new policy. d Choose if the policy is to apply to inbound or outbound traffic. (SMTP only) McAfee Gateway 7.x VMtrial Appliances Installation Guide 23

24 3 Getting started with VMtrial Exploring the appliance features e f g Select the required Match logic for the policy. Select the type of rule, how it should match, and the value that the rule tests against. If required, add additional rules, and use the and buttons to correctly order the rules. 5 Click OK. The new policy is added to the top of the list of policies. Configure the encryption settings Configure your McAfee Gateway to use encryption. 1 Select Encryption Secure Web Mail Basic Settings. 2 Select Enable the Secure Web Mail Client. 3 Select Encryption Secure Web Mail User Account Settings. Recipients are automatically enrolled, and receive a digitally signed notification in HTML format. The administrator chooses whether to do push and/or pull encryption. 4 Select Encryption Secure Web Mail Password Management. The minimum password length is eight characters. The password expires after 365 days. Enable Encryption for messages matching a compliance rule Enable the required encryption features on your McAfee Gateway for messages that match a compliance rule. In this example, messages that match the HIPAA Compliance rules will be encrypted. 1 Select Policies Compliance. 2 Click Enable compliance, and select Create new rule from template. 3 Search for the HIPAA Compliance rule and select it. 4 Click Next to progress through the wizard. 5 Select the primary action to Allow Through (Monitor). 6 In And also, select Deliver message using encryption. 7 Click Finish, and click OK to close the dialog box. 8 Select Policies Policy Options Encryption. 9 In When to Encrypt, select Only when triggered from a scanner action. 10 In On box Encryption Options, select Secure Web Mail, and click OK. 11 Apply the changes. 24 McAfee Gateway 7.x VMtrial Appliances Installation Guide

25 Getting started with VMtrial Exploring the appliance features 3 Compliance Settings Use this page to create and manage compliance rules. Policies Compliance Compliance Benefits of the compliance settings Use compliance scanning to assist with conformance to regulatory compliance and corporate operating compliance. You can choose from a library of predefined compliance rules, or create your own rules and dictionaries specific to your organization. Compliance rules can vary in complexity from a straightforward trigger when an individual term within a dictionary is detected, to building on and combining score based dictionaries which will only trigger when a certain threshold is reached. Using the advanced features of compliance rules, dictionaries can be combined using logical operations of any of, all of, or except. Restrict the score contribution of a dictionary term Use this task to restrict the score contribution of a dictionary term. Before you begin This task assumes that your rule includes a dictionary which triggers the action based on a threshold score, such as the Compensation and Benefits dictionary. You can restrict how many times a term can contribute to the overall score. For example, if testterm within a dictionary has a score of 10 and is seen five times within an , it will add 50 to the overall score. Alternatively you can restrict this, for example to contribute only twice by setting Maximum term count to 2. 1 Select Policies Compliance. 2 Expand the rule that you want to edit, then click the Edit icon next to the dictionary whose score you want to change. 3 In Maximum term count, type the maximum number of times that you want a term to contribute to the score. Edit the threshold associated with an existing rule Use this task to edit the threshold associated with an existing rule. Before you begin This task assumes that your rule includes a dictionary which triggers the action based on a threshold, such as the Compensation and Benefits dictionary. 1 Select Policies Compliance. 2 Expand the rule that you want to edit, then select the Edit icon next to the dictionary whose score you want to change. 3 In dictionary threshold, type the score on which you want the rule to trigger, and click OK. McAfee Gateway 7.x VMtrial Appliances Installation Guide 25

26 3 Getting started with VMtrial Exploring the appliance features Create a rule to monitor or block at a threshold For score based dictionaries you might want to monitor triggers that reach a low threshold, and only block the when a high threshold is achieved. 1 Select Policies Compliance. 2 Click Create new rule, type a name for it such as Discontent Low, and click Next. 3 Select the Discontent dictionary, and in Threshold, type Click Next, and Next again. 5 In If the compliance rule is triggered, accept the default action. 6 Click Finish. 7 Repeat steps 2 through 4 to create another new rule but name it Discontent High and assign it a threshold of In If the compliance rule is triggered, select Deny connection (Block). 9 Click Finish. 10 Click OK and apply the changes. Add a dictionary to a rule Use this task to add a new dictionary to an existing rule. 1 Select Policies Compliance. 2 Expand the rule that you want to edit. 3 Select Add dictionaries. 4 Select the new dictionary that you want to include, and click OK. Create a complex custom rule Use this task to create a complex rule that triggers when both Dictionary A and Dictionary B are detected, except when Dictionary C is also detected. 1 Select Policies Scanning Policies and select Compliance. 2 In the Default Compliance Settings dialog box, click Yes to enable the policy. 3 Click Create new rule to open the Rule Creation Wizard. 4 Type a name for the rule, and click Next. 5 Select two dictionaries to include in the rule, and click Next. 6 Select a dictionary that you want to exclude from the rule in the exclusion list. 7 Select the action that you want to take place if the rule triggers. 8 From the And conditionally drop down list, select All, and click Finish. 26 McAfee Gateway 7.x VMtrial Appliances Installation Guide

27 Getting started with VMtrial Exploring the appliance features 3 Create a simple custom rule Use this task to create a simple custom rule that blocks messages that contain social security numbers. 1 Select Policies Compliance. 2 In the Default Compliance Settings dialog box, click Yes to enable the policy. 3 Click Create new rule to open the Rule Creation Wizard. 4 Type a name for the rule, and click Next. 5 In the Search field, type social. 6 Select the Social Security Number dictionary, and click Next twice. 7 Select the Deny connection (Block) action, and click Finish. Block messages that violate a policy Use this to task to block messages that violate a threatening language policy. 1 Select Policies Compliance. 2 In the Default Compliance Settings dialog box, click Yes to enable the policy. 3 Click Create new rule from template to open the Rule Creation Wizard. 4 Select the Acceptable Use Threatening Language policy, and click Next. 5 Optionally change the name of the rule, and click Next. 6 Change the primary action to Deny connection (Block), and click Finish. 7 Click OK and apply the changes. Data Loss Prevention settings Use this page to create a policy that assigns data loss prevention actions against the registered document categories. Policies Compliance Data Loss Prevention Benefits of using Data Loss Prevention (DLP) You can choose to restrict the flow of sensitive information sent in messages by SMTP through the appliance using the Data Loss Prevention feature. For example, by blocking the transmission of a sensitive document such as a financial report that is to be sent outside of your organization. Detection occurs whether the original document is sent as an attachment, or even as just a section of text taken from the original document. Configuring DLP takes place in two phases: McAfee Gateway 7.x VMtrial Appliances Installation Guide 27

28 3 Getting started with VMtrial Exploring the appliance features Registering the documents that you want to protect Setting the DLP policy to action, and control the detection (this topic) If an uploaded registered document contains embedded documents, their content is also fingerprinted so the combined content is used when calculating the percentage match at scan time. To have embedded documents treated individually, they must be registered separately. Prevent a sensitive document from being leaked Use this task to block sensitive financial documents from being sent outside your organization. Before you begin This example assumes that you have already created a Finance category. 1 Select Policies Compliance Data Loss Prevention. 2 In the Default Data Loss Prevention Settings dialog box, click Yes to enable the policy. 3 Click Create new rule, select the Finance category, and click OK to have the category appear in the Rules list. 4 Select the action associated with the category, change the primary action to Deny connection (Block), and click OK. 5 Click OK again, and apply the changes. Block a section of the document Use this task to block just a small section of the document from being sent outside your organization. 1 Select Policies Compliance Data Loss Prevention. 2 In the Default Data Loss Prevention Settings dialog box, click Yes to enable the policy. 3 Enable the consecutive signatures setting, and type the number of consecutive signatures against which the DLP policy will trigger a detection. The level is set to 10 by default. 4 Click Create new rule, select the Finance category, and click OK to have the category appear in the Rules list. 5 Select the action associated with the category, change the primary action to Deny connection (Block), and click OK. 6 Click OK again, and apply the changes. Exclude a specific document for a policy Use this task to prevent a specific financial document from triggering the DLP policy settings. 1 Select Policies Compliance Data Loss Prevention. 2 In the Default Data Loss Prevention Settings dialog box, click Yes to enable the policy. 3 Click Create document exclusion, select the document you want to ignore for this policy, and click OK. 4 Click OK again, and apply the changes. 28 McAfee Gateway 7.x VMtrial Appliances Installation Guide

29 Getting started with VMtrial Exploring the appliance features 3 Identify quarantined messages Use this task to discover which messages have been quarantined by your McAfee Gateway Appliance. To view a list of all messages that have been quarantined: 1 Click Reports Message Search. 2 Select Quarantined from the Message status drop down list. 3 Click Search/Refresh. All messages that have been quarantined are displayed in the lower part of the page. s Refine the search on page 29 View a specific message on page 29 Release a quarantined message on page 30 After viewing the message that has been quarantined, you may want to release the message from Quarantine. This task allows you to do this. Refine the search You can further refine your search for quarantined messages to show only those that have been quarantined due to specific triggers. In this example, to find those messages quarantined due to compliance issues: 1 Complete the steps in Find out which messages are quarantined. 2 Select Compliance from the Category drop down list. 3 Click Search/Refresh. The lower part of the screen is refreshed to show only the messages that have been quarantined due to compliance issues. View a specific message You can view the content of a quarantined message. 1 Complete the steps in Refine the search. 2 Select the relevant quarantined message using the checkbox to the left of the page. 3 Click View Message. The selected message is displayed in a new window. From this window, you can view the content of the message. You can also choose to view the detailed header information. After you have viewed the message, by clicking the relevant buttons, you can choose further actions to perform on the message. McAfee Gateway 7.x VMtrial Appliances Installation Guide 29

30 3 Getting started with VMtrial Exploring the appliance features Release a quarantined message After viewing the message that has been quarantined, you may want to release the message from Quarantine. This task allows you to do this. To release a selected message from quarantine: 1 Complete the steps in View a specific message. 2 Click Release Selected. The selected message is released from quarantine. messages that contain viral content cannot be released from quarantine, as to do so would risk causing damage to your systems. 30 McAfee Gateway 7.x VMtrial Appliances Installation Guide

McAfee Email Gateway 7.6.400 VMtrial Appliances

McAfee Email Gateway 7.6.400 VMtrial Appliances Installation Guide Revision D McAfee Email Gateway 7.6.400 VMtrial Appliances COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide

McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances

Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances Installation Guide Revision B McAfee Email Gateway 7.x Virtual Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee(R) Email and Web Security Virtual Appliance 5.6 Installation Guide

McAfee(R) Email and Web Security Virtual Appliance 5.6 Installation Guide McAfee(R) Email and Web Security Virtual Appliance 5.6 Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Best Practices Revision A. McAfee Email Gateway 7.x Appliances

Best Practices Revision A. McAfee Email Gateway 7.x Appliances Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances Administrators Guide Revision A McAfee Email Gateway 7.5.0 Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2010

Setup Guide. Email Archiving for Microsoft Exchange Server 2010 Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee SaaS Email Archiving

McAfee SaaS Email Archiving User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

McAfee Content Security Reporter 1.0.0 Software

McAfee Content Security Reporter 1.0.0 Software Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2007

Setup Guide. Email Archiving for Microsoft Exchange Server 2007 Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Migration Guide Revision A. McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x

Migration Guide Revision A. McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x Migration Guide Revision A McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10

Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10 Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi Version 10 Document Version 10.6.2-16/04/2015 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam

More information

McAfee SiteAdvisor Enterprise 3.5 Patch 2

McAfee SiteAdvisor Enterprise 3.5 Patch 2 Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Setup Guide Revision A. WDS Connector

Setup Guide Revision A. WDS Connector Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

McAfee Data Loss Prevention 9.3.0

McAfee Data Loss Prevention 9.3.0 Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee Security for Microsoft SharePoint 3.0.0

Product Guide. McAfee Security for Microsoft SharePoint 3.0.0 Product Guide McAfee Security for Microsoft SharePoint 3.0.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

Product Guide Revision A. McAfee Web Reporter 5.2.1

Product Guide Revision A. McAfee Web Reporter 5.2.1 Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Client Proxy 1.0.0 Software

McAfee Client Proxy 1.0.0 Software Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the

More information

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Product Guide. McAfee Security for Microsoft Exchange 8.0.0

Product Guide. McAfee Security for Microsoft Exchange 8.0.0 Product Guide McAfee Security for Microsoft Exchange 8.0.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Administration Guide Revision A. SaaS Email Protection

Administration Guide Revision A. SaaS Email Protection Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

McAfee Database Activity Monitoring 5.0.0

McAfee Database Activity Monitoring 5.0.0 Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee MOVE AntiVirus (Agentless) 3.6.0

McAfee MOVE AntiVirus (Agentless) 3.6.0 Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Client Proxy 2.0

McAfee Client Proxy 2.0 Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Virtualization Guide. McAfee Vulnerability Manager Virtualization

Virtualization Guide. McAfee Vulnerability Manager Virtualization Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

User Manual. User Manual for Version 4.4.0.8

User Manual. User Manual for Version 4.4.0.8 User Manual User Manual for Version 4.4.0.8 I Endpoint Protector Virtual Appliance User Manual Table of Contents 1. Endpoint Protector Virtual Appliance Formats1 1.1. Available Formats of the Virtual Appliance...

More information

Cyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10

Cyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10 Cyberoam Virtual Security Appliance - Installation Guide for XenServer Version 10 Document Version 10.6.1-01/07/2014 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam Virtual

More information

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0 Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Cloud Director User's Guide

Cloud Director User's Guide Cloud Director 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Administration Guide Revision E. Account Management. For SaaS Email and Web Security

Administration Guide Revision E. Account Management. For SaaS Email and Web Security Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

McAfee MOVE AntiVirus 2.6.0

McAfee MOVE AntiVirus 2.6.0 Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

SevOne NMS Download Installation and Implementation Guide

SevOne NMS Download Installation and Implementation Guide SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

McAfee VirusScan Enterprise for Storage 1.1.0

McAfee VirusScan Enterprise for Storage 1.1.0 Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet

More information

McAfee Network Security Platform 8.2

McAfee Network Security Platform 8.2 8.2.7.71-8.2.3.84 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.2 Revision B Contents About this release New features Enhancements Resolved Issues Installation instructions Known

More information

provides several new features and enhancements, and resolves several issues reported by WatchGuard customers.

provides several new features and enhancements, and resolves several issues reported by WatchGuard customers. WatchGuard XCS v10.0 Update 1 Release Notes WatchGuard XCS Build 140312 Revision Date 11 November, 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard XCS v10.0 Update 1. This

More information

Network Security Platform 7.5

Network Security Platform 7.5 M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document

More information

Installation Guide. McAfee SaaS Endpoint Protection 6.0

Installation Guide. McAfee SaaS Endpoint Protection 6.0 Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Total Protection Service

Total Protection Service User Help McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

How To - Deploy Cyberoam in Gateway Mode

How To - Deploy Cyberoam in Gateway Mode How To - Deploy Cyberoam in Gateway Mode Cyberoam appliance can be deployed in a network in two modes: Gateway mode. Popularly known as Route mode Bridge mode. Popularly known as Transparent mode Article

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0 Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Product Version 1.0 Document Version 1.0-B

Product Version 1.0 Document Version 1.0-B VidyoDashboard Installation Guide Product Version 1.0 Document Version 1.0-B Table of Contents 1. Overview... 3 About This Guide... 3 Prerequisites... 3 2. Installing VidyoDashboard... 5 Installing the

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

VPN-1 VE Evaluation Guide

VPN-1 VE Evaluation Guide VPN-1 VE Evaluation Guide This document is intended for users who are new to Check Point VPN-1 products and would like to evaluate and review VPN-1 VE. We recommend reading the VPN-1 VE Administration

More information

Deployment and Configuration Guide

Deployment and Configuration Guide vcenter Operations Manager 5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Installation Guide. McAfee SaaS Endpoint Protection

Installation Guide. McAfee SaaS Endpoint Protection Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee EETech for Mac 6.2 User Guide

McAfee EETech for Mac 6.2 User Guide McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Configuring Trend Micro Content Security

Configuring Trend Micro Content Security 9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information

More information

VCCC Appliance VMware Server Installation Guide

VCCC Appliance VMware Server Installation Guide VCCC Appliance VMware Server Installation Guide Content Preface... 4 System Requirements... 4 Installation Procedure... 4 CCC Virtual Machine Installation... 5 CCC Virtual Machine Management... 12 Resource

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop. Installation Guide 8.x. Revision A

Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop. Installation Guide 8.x. Revision A Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop Installation Guide 8.x Revision A Table of contents 1 Overview...3 2 Verify system requirements...4 Virtualization requirements...4 Admin

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

GX-V. Quick Start Guide. VMware vsphere / vsphere Hypervisor. Before You Begin SUMMARY OF TASKS WORKSHEET

GX-V. Quick Start Guide. VMware vsphere / vsphere Hypervisor. Before You Begin SUMMARY OF TASKS WORKSHEET If you re not using VMware vsphere Client 4.0, your screens may vary. GX-V VIRTUAL GMS SERVER VMware vsphere / vsphere Hypervisor 2012 Silver Peak Systems, Inc. Before You Begin Comply with the GX-V Host

More information

Administration Guide Revision E. SaaS Email Protection

Administration Guide Revision E. SaaS Email Protection Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

FortKnox Personal Firewall

FortKnox Personal Firewall FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Easy Setup Guide for the Sony Network Camera

Easy Setup Guide for the Sony Network Camera -878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer

More information

About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.

About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release. Product Guide McAfee Help Desk 2.0 Software About Help Desk McAfee Help Desk is an extension installed in McAfee epolicy Orchestrator (McAfee epo ). Administrators use McAfee Help Desk to issue challenge/response

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information