Product Guide Revision A. McAfee Secure Web Mail Client Software
|
|
- Terence Evans
- 8 years ago
- Views:
Transcription
1 Product Guide Revision A McAfee Secure Web Mail Client Software
2 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Secure Web Mail Client Software Product Guide
3 Contents 1 Preface 5 About this guide Audience Conventions Finding product documentation Introducing McAfee Secure Web Mail Client 7 Secure Web Mail Modes of message delivery Accessing Secure Web Mail Client 9 Log on to Secure Web Mail Client for the first time Sign In to Secure Web Mail Client Create Security questions How security questions work Reset your forgotten password Managing your secure mailbox 13 Expired messages Search for a message Delete messages Viewing messages View a specific message 17 Download an attachment Forward a message Reply to a message Compose a message. 19 Add an attachment to a message Account settings 21 View and edit your account settings Account window details Index 23 McAfee Secure Web Mail Client Software Product Guide 3
4
5 Preface Contents About this guide Finding product documentation About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Users People who use the computer where the software is running and can access some or all of its features. Conventions This guide uses the following typographical conventions and icons. Book title or Emphasis Title of a book, chapter, or topic; introduction of a new term; emphasis. Bold User input or Path Code Text that is strongly emphasized. Commands and other text that the user types; the path of a folder or program. A code sample. User interface Hypertext blue Words in the user interface including options, menus, buttons, and dialog boxes. A live link to a topic or to a website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. McAfee Secure Web Mail Client Software Product Guide 5
6 Preface Finding product documentation Finding product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 6 McAfee Secure Web Mail Client Software Product Guide
7 1 Introducing 1 McAfee Secure Web Mail Client McAfee Secure Web Mail Client provides an environment for the delivery of encrypted messages with securely delivered web mail when no secure connection can be established. Using outbound S/MIME, PGP, and SSL/TLS secure message delivery depends on the ability of the receiving mail server to support these methods of encryption. If the receiving server cannot accommodate a secure method for any reason, and the McAfee Gateway Secure Mode is enabled, Gateway drops the message. Contents Secure Web Mail Modes of message delivery Secure Web Mail Secure Web Mail Client allows you to securely receive messages. Secure Web Mail is one of the methods used to deliver messages of a sensitive nature. Secure Web Mail notifies you when you have a message waiting in a secure web-based mailbox, and provides a link and/or an attachment that allows you to retrieve the message. Modes of message delivery messages can be delivered securely by one of two processes: push encryption and pull encryption. Push encryption Push encryption stores the encrypted massage in your system as an attachment to the notification message. Opening this attachment sends the information to the Secure Web Mail system, where it is decrypted and made available for you to view. Deleting the message or attachment will permanently remove the message. Pull encryption Pull encryption stores the encrypted message on the Secure Web Mail system. You will receive a notification message that contains a link that allows you to view the message stored on the senders system. The administrator can configure your delivery options for both push and pull encryption. In that case, you can use either method to access your messages. McAfee Secure Web Mail Client Software Product Guide 7
8
9 2 Accessing 2 Secure Web Mail Client You must set up your access to McAfee Secure Web Mail Client in order to log on when you want to send or recieve encrypted . Depending upon your message storage options, you can log on to your secure mail account using one or more of the following methods: Open your browser and type the address of the McAfee Gateway server. When you enter your credentials, your mailbox displays. If you are using push encryption, click the attachment in the notification . When you enter your credentials, the secure message appears. If you are using pull encryption, click the link in the notification . When you enter your credentials, the secure message list displays. Notification s are sent to your regular account. When you log on for the first time, you will be required to provide proper authentication information. Contents Log on to Secure Web Mail Client for the first time Sign In to Secure Web Mail Client Create Security questions. How security questions work Reset your forgotten password Log on to Secure Web Mail Client for the first time The first time you log on to Secure Web Mail Client, you must create an account. Before you begin You must have received a notice that you have an encrypted message waiting. Depending on how the System Administrator has configured Secure Web Mail, you may need to define a number of security questions as part of your Secure Web Mail setup. If needed, you will be directed to a second setup page to define these questions. 1 Click the link in your notification message. The log on window appears. 2 Select your language preference. McAfee Secure Web Mail Client Software Product Guide 9
10 2 Accessing Secure Web Mail Client Sign In to Secure Web Mail Client 3 Enter your chosen password, then enter it again to confirm. 4 Click Save. Depending on the configuration of the Secure Web Mail Client, either the security questions page or the Secure Web Mail mailbox appears. Sign In to Secure Web Mail Client To send and receive secure messages, sign in to Secure Web Mail. 1 Follow the link from your notification message. The logon window displays. 2 Select you preferred language. 3 Enter your password. 4 Click Sign In. The Secure Web Mail Client mailbox is displayed. If you are signed in, but allow Secure Web Mail to remain idle, a timeout warning message appears, and your session expires. You must sign in again. Create Security questions. You may need to create a number of security questions and answers that pertain only to you. Before you begin The administrator must have configured security questions as part of Secure Web Mail Client security, for you to see the security questions page. The use of security questions and the number of questions asked are defined by the administrator. If the Secure Web Mail Client system administrator makes any changes to the security requirements, you may be presented with this page when you log onto the Secure Web Mail Client. 1 Select the question to which you will provide an answer. You can select a pre-defined question from the drop-down list, or you can choose to add your own question. If you choose Add my own question, a further text field appears. Enter your own question into this field. 2 Enter the answer to the above question. 3 Repeat steps 1 and 2 for each question presented. 4 Click Save. 10 McAfee Secure Web Mail Client Software Product Guide
11 Accessing Secure Web Mail Client How security questions work 2 How security questions work Your administrator might require stronger authentication by asking you to reply to one or more security questions. Secure Web Mail Client, if so configured, presents you with a predetermined number of questions when you are attempting to reset your password. If you provide the configured number of correct responses, a password reset message is sent to your address. The administrator sets the number of questions presented to you and the number of correct responses required. Reset your forgotten password If you forget your password, request permission to reset it. 1 Click the Forgot your password? link on the log on window. 2 Depending on the system configuration, you may be required to answer your previously configured security questions. A password reset message is sent. 3 Follow the link in the received password reset message. 4 Enter your new password. Your password must comply with any requirements the administrator has set. 5 Confirm your password by retyping it. 6 Click Save. Your password is changed. McAfee Secure Web Mail Client Software Product Guide 11
12
13 3 Managing 3 your secure mailbox Your mailbox is the place where you can view your messages and take action on them. From the mailbox window, you can perform one or more of the following actions: View your list of secure messages Refresh the list of displayed secure messages Flag one or more messages for follow-up Select one or more messages to be deleted View individual messages Compose new messages, if allowed by the system administrator Search for messages Contents Expired messages Search for a message. Delete messages Viewing messages Expired messages To avoid accumulating too many messages in your mailbox, Secure Web Mail Client deletes expired messages. The administrator configures two expiration periods as numbers of days for messages to remain in your mailbox: Expiration for unread messages, based on the time the message arrived. Expiration for read massages, based on the time when you read the message. Secure Web Mail Client generates two notifications each for both read and unread messages, one when deletion is approaching, but is not imminent, and one when deletion is imminent. You can access your mailbox and take action on the messages if necessary. Search for a message. From your secure mailbox, you can search for one or more messages using the search fields at the upper right of the window. Before you begin This task assumes you have accessed your secure mailbox. McAfee Secure Web Mail Client Software Product Guide 13
14 3 Managing your secure mailbox Delete messages You can conduct searches based on the message status, by typing a text string into the search box, or by a combination of both methods. 1 To search for messages that have a specific status, select the status from the drop down list. Select All, Read, Unread, Flagged, Expiring, or Draft. When you conduct your search, only messages with the selected status will display. You can search for only one status at a time. 2 To search for messages using a text string, type the string in the search box. For example, you can search for messages from one recipient, or messages containing specific words in the subject. When you conduct your search, only messages that meet your text criteria will display. 3 Click the search icon. The search begins. When the search is complete, the message list will contain only those messages that meet your search criteria. You can restore your full message list by clicking Show All in the action bar, or by deleting your search text. Delete messages You can delete one or more messages from your secure mailbox window. Before you begin This task assumes you have accessed your secure mailbox. You can delete a single message, or a group of selected messages in your mailbox. 1 To delete an open message, click Delete in the message action bar. The message is deleted. 2 To delete one or more messages from the message list: a b Select the messages you want to delete by selecting the check box to the left of each message. Click Delete (not the associated checkbox). A confirmation message appears. c Click Delete Selected Messages. The selected messages are deleted. 14 McAfee Secure Web Mail Client Software Product Guide
15 Managing your secure mailbox Viewing messages 3 Viewing messages When you have accessed your mailbox, you can view all the messages currently stored there. Your mailbox window shows basic information about each message, including the sender's address, the subject of the message, and the date or time of delivery. From the list of your messages, you can perform several useful funtions. You can: Flag one or more messages for further action by clicking the flag icon to the right of the message. Select one or more messages from the list for specific action by selecting the check box to the left of the message. Delete all messages by clicking the Delete link in the action bar. McAfee Secure Web Mail Client Software Product Guide 15
16
17 4 View 4 a specific message When you receive an notification that a secure has been sent to you, do the following: 1 If you have received a push notification, open the attachment. a Type your credentials in the logon window. b Click Sign In. Your secure message opens. 2 If you have received a pull notification, click View Message. a b Type your credentials in the logon window. Click Sign In. Your secure message opens. Contents Download an attachment. Forward a message. Reply to a message. Download an attachment. You can view and download message attachments from secure messages. Before you begin This task assumes you have accessed your secure mailbox (pull encryption) or the secure message (push encryption). 1 Open your secure message. The message opens. 2 Click on the attachment. A dialog box asking if you want to open the attachment or save it appears. 3 Select the action you prefer - open or save the attachment. The attachment downloads. McAfee Secure Web Mail Client Software Product Guide 17
18 4 View a specific message Forward a message. Forward a message. You can forward a secure message. Your message goes back to the Secure Web Mail server, and then on to the recipient. Before you begin You must know the address of the recipient of your message. Secure Web Mail Client has no lookup capability. This task assumes you have successfully opened your secure message. 1 Click Forward in the message toolbar. 2 Type the recipient's address in the message header. 3 Click Send. Your messages forwards to the designated recipient. Reply to a message. You can reply to your secure message. Your reply is sent to the Secure Web Mail server, and then is sent to the recipient. Before you begin This task assumes you have accessed your secure message. 1 Open your message. 2 Click Reply in the message toolbar. The message expands to show the reply space. 3 Type your message. 4 Click Send. Your reply transmits to the recipient. 18 McAfee Secure Web Mail Client Software Product Guide
19 5 Compose 5 a message. You can compose and send secure messages from your mailbox. Your message goes to the Secure Web Mail server to be sent to the recipient. Before you begin You must know the address of the recipient of your message, because no address lookup is available. 1 Access your secure mailbox. 2 Click New to begin your message. 3 Type the address for one or more recipients. If configured, you can also add cc and bcc recipients. 4 If required, request a read receipt for your message by selecting Send me a read receipt. 5 Type your message. You are given the option of writing your message in Plain Text, or, by selecting Rich Text, adding formatting to your message. 6 Click Send. Your message goes to the Secure Web Mail server to be delivered to the recipient(s). Add an attachment to a message. You can add an attachment by clicking the Add attachment link and browsing to the file or message you want to attach. You can add attachments to reply messages as well as new messages you create. Before you begin This task assumes you have drafted a new message or a reply that you intend to send. 1 Click Add attachment. 2 Browse to the file you want to add, and select it. 3 Click the command to open or attach the file. The file appears as an attachment in your message header. 4 Click Send. McAfee Secure Web Mail Client Software Product Guide 19
20 5 Compose a message. Add an attachment to a message. The message with the attachment goes to the Secure Web Mail server to be delivered to the recipient. 20 McAfee Secure Web Mail Client Software Product Guide
21 6 Account settings There is a single account settings window where you can view sign-in details, flag whether you are copied on sent messages, view and change your message storage options, reset your password, and view or change your security questions. Contents View and edit your account settings Account window details View and edit your account settings You can view and edit your account settings from your message window. Before you begin This task assumes you have logged on to Secure Web Mail Client and navigated to your incoming message or message list. 1 Click Account at the upper right corner of your message browser. The Account window displays. 2 View and/or change the information in each section of the window. 3 Click Save to save any changes. Account window details The following table explains the fields on the Account settings window. Table 6-1 Account fields Field Sign In Activity Message Delivery Message Storage Description Displays the date and time of the last sign in. Click Details to view previous account activity. When selected, you receive copies of all outgoing messages. When selected, specifies where messages are stored. Unread messages are stored for a pre-configured number of days and then deleted. McAfee Secure Web Mail Client Software Product Guide 21
22 6 Account settings Account window details Table 6-1 Account fields (continued) Field Password Reset Description You can reset your password on this window in compliance with your system's password rules. Security Questions Specifies your security questions. To change a security question, click on the edit icon next to the question. 22 McAfee Secure Web Mail Client Software Product Guide
23 Index A about this guide 5 C conventions and icons used in this guide 5 D documentation audience for this guide 5 product-specific, finding 6 documentation (continued) typographical conventions and icons 5 M McAfee ServicePortal, accessing 6 S ServicePortal, finding product documentation 6 T Technical Support, finding product information 6 McAfee Secure Web Mail Client Software Product Guide 23
24 A00
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Email Gateway 7.x Encryption and IronPort Integration Guide
Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption
More informationepolicy Orchestrator Log Files
Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationMcAfee Host Data Loss Prevention 9.1 Cluster Installation Guide
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationProduct Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0
Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
More informationHardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software
Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee Risk Advisor 2.7
Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights
More informationRelease Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software
Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying
More informationMcAfee epolicy Orchestrator 4.5 Cluster Installation Guide
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationMcAfee SaaS Email Archiving
User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationApplication Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service
Application Note Configuring McAfee Firewall Enterprise for McAfee Web Protection Service This document explains how to configure McAfee Firewall Enterprise (Sidewinder ) to redirect all web traffic to
More informationRecommended Recommended for all environments. Apply this update at the earliest convenience.
Release Notes McAfee Enterprise Mobility Management 11.0 Patch 4 About this document About this release Bug fixes and enhancement Installation instructions Files affected by patch Troubleshooting installation
More informationDesktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationMcAfee Optimized Virtual Environments for Servers. Installation Guide
McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationSetup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010
Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationMcAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationTotal Protection Service
User Help McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Directory Services Connector extension
Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.
More informationMcAfee GTI Proxy 1.0.0 Administration Guide
McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationRelease Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
More informationMcAfee SiteAdvisor Enterprise 3.5.0
Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationMcAfee Solidcore Change Reconciliation and Ticket-based Enforcement
Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationMcAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices
McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationTotal Protection Service
User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationRelease Notes for Host Intrusion Prevention 8.0
Release Notes for Host Intrusion Prevention 8.0 About this document New features Known issues Finding product documentation About this document Thank you for choosing this McAfee product. This document
More informationProduct Guide. McAfee epolicy Orchestrator 4.6.0 Software
Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationMcAfee SiteAdvisor Enterprise 3.5 Patch 2
Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationInstallation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationInstallation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software
Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationArchive Add-in User Guide
Archive Add-in User Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential to
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationData Center Connector 3.0.0 for OpenStack
Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationImplementing McAfee Device Control Security
Implementing McAfee Device Control Security COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationVerizon Internet Security Suite Powered by McAfee User Guide
Verizon Internet Security Suite Powered by McAfee User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationMcAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationProduct Guide. McAfee SaaS Endpoint Protection 5.2.0
Product Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2003
Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationRelease Notes for McAfee VirusScan Enterprise for Storage 1.0
Release Notes for McAfee VirusScan Enterprise for Storage 1.0 About this document New features Known issues Where to find McAfee enterprise product information License attributions About this document
More informationInstallation Guide. McAfee epolicy Orchestrator 4.6.0 Software
Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationBest Practices Guide. McAfee Endpoint Protection for Mac 1.1.0
Best Practices Guide McAfee Endpoint Protection for Mac 1.1.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationMcAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationMcAfee Asset Manager Console
Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationProduct Guide Revision A. McAfee Web Reporter 5.2.1
Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationU.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationInstallation Guide. McAfee SaaS Endpoint Protection 5.2.0
Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationMcAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
More informationDirectory and Messaging Services Enterprise Secure Mail Services
Title: Directory and Messaging Services Enterprise Secure Mail Services Enterprise Secure Mail Services for End Users Attention: Receivers of Secure Mail Retrieval of Secure Mail by the Recipient Once
More informationProduct Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationMcAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationGRS Advantage Website User Reference Guide
GRS Advantage Website User Reference Guide This document describes how to use the GRS Advantage Website. Table of Contents GRS Advantage Website... 2 Accessing the Website... 2 Requesting Access to the
More informationApplication Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise
Application Note Configuring Department of Defense Common Access Card Authentication on McAfee Firewall Enterprise McAfee Firewall Enterprise version 7.x and 8.x This application note describes how to
More informationMcAfee Content Security Reporter 1.0.0 Software
Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationMcAfee Solidcore 5.1.0 Product Guide
McAfee Solidcore 5.1.0 Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or
More informationSpambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
August 22, 2013 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2007
Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationAdministration Guide Revision E. SaaS Email Protection
Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
More informationMcAfee Total Protection Service Installation Guide
McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2010
Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationSpambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
More informationHoneywell Secure Email External User Guide August 2013
Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to
More informationMcAfee VirusScan Enterprise 8.8 software Product Guide
McAfee VirusScan Enterprise 8.8 software Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationemail-lead Grabber Business 2010 User Guide
email-lead Grabber Business 2010 User Guide Copyright and Trademark Information in this documentation is subject to change without notice. The software described in this manual is furnished under a license
More informationWebsense Secure Messaging User Help
Websense Secure Messaging User Help Welcome to Websense Secure Messaging, a tool that provides a secure portal for the transmission and viewing of sensitive, personal data in email. Use the portal to view
More informationNationstar Mortgage Secure Email Client User Guide
Nationstar Mortgage Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Nationstar Mortgage Secure Email Message Center Version 1.0 July 2010 1 Nationstar Public Copyright Information
More informationUser Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software
User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationPolicy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationArchive Add-in Administrator Guide
Archive Add-in Administrator Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential
More informationMcAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationCreating a Content Group and assigning the Encrypt action to the Group.
Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
More informationMcAfee epolicy Orchestrator
Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be
More informationTriCore Secure Web Email Gateway User Guide 1
TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationBCSD WebMail Documentation
BCSD WebMail Documentation Outlook Web Access is available to all BCSD account holders! Outlook Web Access provides Webbased access to your e-mail, your calendar, your contacts, and the global address
More informationOrbital ATK Secure Email: Receiving Encrypted Messages. Why Orbital ATK Secure Email? Initial Email: Orbital ATK Secure Email Notification
Orbital ATK Secure Email: Receiving Encrypted Messages This document is intended for Orbital ATK Employees, Partners & Clients as an introduction & instructional user guide for Orbital ATK Secure Email.
More informationSecure Messaging Quick Reference Guide
Secure Messaging Quick Reference Guide Overview The SHARE Secure Messaging feature allows a SHARE registered user to securely send health information to another SHARE registered user. The Secure Messaging
More informationMcAfee Enterprise Mobility Management 11.0 Software
Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationBest Practices Revision A. McAfee Email Gateway 7.x Appliances
Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Agent Handler
McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into
More informationVodafone Email Plus. User Guide for Windows Mobile
Vodafone Email Plus User Guide for Windows Mobile 1 Table of Contents 1 INTRODUCTION... 4 2 INSTALLING VODAFONE EMAIL PLUS... 4 2.1 SETUP BY USING THE VODAFONE EMAIL PLUS ICON...5 2.2 SETUP BY DOWNLOADING
More informationADP Secure Email Client User Guide
ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.0 July 2008 2008 ADP, Inc. Copyright Information ADP provides this publication as is
More informationAdministration Guide Revision A. SaaS Email Protection
Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationNetwork Threat Behavior Analysis Monitoring Guide. McAfee Network Security Platform 6.1
Network Threat Behavior Analysis Monitoring Guide McAfee Network Security Platform 6.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationMcAfee VirusScan Enterprise for Storage 1.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x
McAfee VirusScan Enterprise for Storage.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x COPYRIGHT Copyright 200 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationFDIC Secure Email Procedures for External Users April 23, 2010
FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving
More informationOutlook Web Access Tipsheets
You can use a Web browser to access your Outlook mailbox from any computer with an Internet connection. You can use Outlook Web Access with Microsoft Internet Explorer, Mozilla Firefox and many other browsers.
More informationProduct Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationFocus On echalk Email. Introduction. In This Guide. Contents:
Focus On echalk Email Introduction Email can be very useful in a school setting. For instance, instead of writing out a memo and delivering it to everyone s mailbox in the main office, you can simply send
More informationADP Secure Email Client User Guide
ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.6 August 2014 ADP Secure Email Client User Guide August 2014 Copyright Information ADP
More informationOutlook Web Access (OWA) User Guide
Outlook Web Access (OWA) User Guide September 2010 TABLE OF CONTENTS TABLE OF CONTENTS... 2 1.0 INTRODUCTION... 4 1.1 OUTLOOK WEB ACCESS SECURITY CONSIDERATIONS... 4 2.0 GETTING STARTED... 5 2.1 LOGGING
More informationOutlook Web Access E-mail
Outlook Web Access E-mail A. Accessing the mailbox via the Internet 1. Open your browser Firebox or Internet Explorer 2. In the URL address location box, key mail.asbury.edu for students and mail2.asbury.edu
More informationCITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE
CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE INTRODUCTION You can access your email account from any workstation at your school using Outlook Web Access (OWA),
More informationCharter Email. Email Addresses Create / Manage
Charter Email Email Addresses Create / Manage You can create and manage your email addresses from your My Account. If you have not already done so as the primary account holder, you will need to create
More informationSaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
More informationD&B SafeTransPort Tutorial YOUR MANAGED FILE TRANSFER SOLUTION FOR SECURE FILE TRANSFERS WITH D&B
Tutorial YOUR MANAGED FILE TRANSFER SOLUTION FOR SECURE FILE TRANSFERS WITH D&B Overview Overview Topics Covered overview, features and benefits Account activation and password maintenance Using the User
More information