TRITON - Data Security Help
|
|
- Ronald Anderson
- 8 years ago
- Views:
Transcription
1 TRITON - Data Security Help Websense Data Security v7.6
2 , Websense, Inc. All rights reserved Sorrento Valley Rd., San Diego, CA 92121, USA Published 2010 Printed in the United States and Ireland The products and/or methods of use described in this document are covered by U.S. Patent Numbers 5,983,270; 6,606,659; 6,947,985; 7,185,015; 7,194,464 and RE40,187 and other patents pending. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without prior consent in writing from Websense, Inc. Every effort has been made to ensure the accuracy of this manual. However, Websense, Inc., makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Websense, Inc., shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.
3 Contents Part 1: Getting Started Topic 1 Overview Data Security basics Data Security protector Data Security databases What can I protect? PreciseID fingerprinting Managing Websense Data Security Web Security Gateway Anywhere mode Security Gateway mode Topic 2 Navigating the System Data Security s navigation and content panes Main tab Settings tab Today page Deploy button Icons Breadcrumbs Check boxes Pagination Topic 3 Initial Setup Entering your subscription key Defining general system settings Configuring user directory server settings Setting up alerts Setting up notifications Configuring system modules Configuring the protector Deploying your settings TRITON - Data Security Help i
4 Contents Part 2: Securing Your Company s Data Topic 4 Policies Overview What s in a policy? Viewing policies Editing a policy Update rules of current policy Update exceptions of current rule Update rules of multiple policies Update exceptions of multiple rules Delete policies Policy levels Selecting items to include or exclude in a policy Topic 5 Configuring the Data Loss Prevention Policy Configuring outbound and inbound attributes Defining policy owners Identifying trusted domains Topic 6 Configuring the Web Data Loss Prevention Policy Configuring Web attributes Selecting Web destinations Defining policy owners Topic 7 Creating DLP Policies for Regulatory & Compliance Creating a regulatory and compliance policy Welcome Regions Industries Finish Policy list Changing the policies you selected Changing your industry or region Topic 8 Creating Custom DLP Policies Custom Policy Wizard - General Custom Policy Wizard - Condition Viewing or editing a conditions and thresholds Custom Policy Wizard - Severity & Action Custom Policy Wizard - Source Custom Policy Wizard - Destination Rule Wizard - Finish Selecting a content classifier Patterns & Phrases ii Websense Data Security
5 Contents File Properties Fingerprint Transaction Size Number of Attachments Number of Destinations Managing rules Adding exceptions Rearranging exceptions Adding a new exception Topic 9 Classifying Content Content classifier menu bar Details pane Patterns & Phrases Adding or editing a regular expression classifier Adding a key phrase classifier Adding a dictionary classifier File properties Adding a file-type classifier Adding a file-name classifier Adding a file-size classifier Scripts Editing a predefined script File fingerprinting File Fingerprinting Wizard - General File Fingerprinting Wizard Root Folder/Site Root File Fingerprinting Wizard - Scanned Files/Documents File Fingerprinting Wizard - Scheduler File Fingerprinting Wizard - File Filtering File Fingerprinting Wizard - Finish Database fingerprinting Connecting to data sources Preparing for fingerprinting How matches are counted Creating a database fingerprint classifier Database Fingerprinting Wizard - General Database Fingerprinting Wizard - Data Source/Site Database Fingerprinting Wizard - Field Selection Database Fingerprinting Wizard - Scheduler Database Fingerprinting Wizard - Fingerprinting Type Database Fingerprinting Wizard - Finish Creating a rule from a content classifier TRITON - Data Security Help iii
6 Contents Topic 10 Defining Resources Sources and destinations User directory entries Custom users Custom computers Networks Domains Business Units URL categories Printers Endpoint Devices Endpoint Applications Endpoint Application Groups Applying a column filter Adding custom application groups Remediation Action Plans Remediation scripts Notifications Topic 11 Creating Discovery Policies Creating a discovery policy Scheduling the scan Performing file system discovery Performing SharePoint discovery Performing database discovery Performing Exchange discovery Performing Outlook PST discovery Performing endpoint discovery Viewing discovery status Viewing discovery results Updating discovery Configuring discovery incidents Copying or moving discovered files Preparing and running the remediation scripts Topic 12 Scheduling Discovery Tasks Scheduling network discovery tasks File System tasks SharePoint tasks Database tasks Exchange tasks iv Websense Data Security
7 Contents Outlook PST tasks Scheduling endpoint discovery tasks Topic 13 Viewing Incidents and Reports The report catalog Editing a report Scheduling tasks Viewing the incident list Previewing incidents Managing incident workflow Remediating incidents Escalating incidents Managing incident reports Tuning policies Viewing the dashboard Viewing top violated policies Viewing incidents by severity and action Viewing top sources and destinations Viewing incident trends Viewing assessment reports Viewing sensitive data reports Topic 14 Viewing Status and Logs Viewing the Today page Monitoring system health Viewing endpoint status Viewing deployment status Viewing logs Traffic log System log Audit log Part 3: Administering the System Topic 15 Configuring System Settings Setting reporting preferences Setting general preferences Setting preferences for data loss prevention forensics Setting preferences for discovery incidents Backing up the system Scheduling backups Monitoring backups Backup folder contents TRITON - Data Security Help v
8 Contents Restoring the system Exporting incidents to a file Configuring endpoints Configuring user directory settings Adding a new user directory server Rearranging user directory servers Importing users Configuring remediation Configuring alerts Setting general alert preferences Setting up properties Editing outgoing mail server properties Configuring the incident archive Entering subscription settings Subscription alerts Configuring URL categories and user names Importing URL categories Topic 16 Configuring Authorization Defining administrators Viewing administrators Editing administrators Working with roles Adding a new role Configuring personal settings Topic 17 Archiving Incidents Remote SQL Server machines Archiving a partition Restoring a partition Deleting a partition Archive threshold Topic 18 Updating Predefined Policies and Classifiers Viewing your update history Installing policy updates Restoring Policies to a previous version Determining the policy version you have Topic 19 Managing System Modules Adding modules Configuring modules Configuring the management server vi Websense Data Security
9 Contents Configuring a supplemental Data Security Server Configuring the SMTP agent Configuring the fingerprint repository Configuring the endpoint server Configuring the crawler Configuring the forensics repository Configuring the policy engine Configuring the protector Configuring ICAP Configuring the Web Content Gateway module Configuring the Security Gateway module Configuring the ISA agent Configuring the printer agent Configuring the integration agent Configuring protector services Configuring SMTP Configuring HTTP Configuring FTP Configuring chat Configuring plain text Balancing the load Defining load balancing distribution Topic 20 Configuring Endpoint Deployment Viewing and managing endpoint profiles Adding an endpoint profile General tab Servers tab Properties tab Encryption tab Rearranging endpoint profiles Deploying endpoint profiles Backing up encryption keys Restoring encryption keys Configuring endpoint settings Monitoring endpoint removable media Selecting endpoint destination channels to monitor Bypassing endpoint clients Using the endpoint client software Disabling an endpoint client Viewing contained files Viewing logs TRITON - Data Security Help vii
10 Contents Updating the endpoint client Topic 21 Troubleshooting Part 4: Appendices Problems and Solutions Discovery Endpoint Fingerprinting Incidents Miscellaneous Performance Printer agent Linking Service Online Help Technical Support Appendix A Predefined Policies Data Loss Prevention policies Personally Identifiable Information (PII) Private Health Information (PHI) Credit Cards Financial Data Acceptable Use Company Confidential and Intellectual Property United States Federal and Industry Regulations IUnited States - State Laws EMEA Policies APAC Regulations Discovery policies PCI Private Information Company Confidential and Intellectual Property Acceptable Use Regulations Appendix B Predefined Classifiers File-type classifiers NLP scripts Dictionaries Regular Expression patterns Appendix C Supported File Formats viii Websense Data Security
11 Contents Appendix D Endpoint Applications Built-in support Importing other applications Appendix E File Size Limits Appendix F How Do I Archive my incident data? Configure a policy? Create a custom block message? Define an exception? Filter incidents? Fingerprint data? Ignore sections of my document when fingerprinting? Fingerprint specific field combinations in a database table? Mitigate false positives in pattern or dictionary phrases? Move from monitor to protect? Perform discovery? Permanently delete incidents? Appendix G Glossary Index TRITON - Data Security Help ix
12 Contents x Websense Data Security
13 Part I Getting Started Websense Data Security
14 TRITON - Data Security Help
15 1 Overview Websense Data Security protects organizations from information leaks and data loss both at the perimeter and inside the organization. Websense Data Security can operate alone in the network, or be paired with Websense Web and security solutions (on-premises or in the cloud), to provide a wellrounded Essential Information Protection solution for your organization. When paired with Websense Web security solutions, Data Security prevents data loss over Web channels such as HTTP, HTTPS, and FTP. When paired with Websense security solutions, Data Security prevents data loss through . If Web or channels are all you need to monitor, you do not need a separate Websense Data Security subscription; Data Security technology is built in. You can manage all 3 Websense solutions Web, data, and from a central location: the TRITON Unified Security Center. If you require data loss prevention over other channels such as printers, USB drives, or LANs or if you are interested in discovering the location of sensitive data inside your network, you can subscribe to additional Websense Data Security components. Websense Data Security can utilize a variety of agents to intercept data on ISA servers, print servers, and more. Endpoints that are deployed on users computers (PCs, laptop, etc.) enable administrators to analyze content within a user s working environment and block or monitor policy breaches as defined by the endpoint profiles. Speak to your Websense sales representative for more information about these Data Security options. Data Security basics Websense Data Security protects organizations from data loss by: Monitoring data as it travels inside or outside the organization Protecting data while it is being manipulated in office applications, with policybased controls that align with business processes The 2 main components of Websense Data Security are: The Data Security Management Server TRITON - Data Security Help 1
16 Overview The Data Security Policy Engine The Data Security Management Server is a Windows-based machine where you install the Websense Data Security software. This machine provides the core information loss technology, capturing fingerprints, applying policies, and storing incident forensics. You can install multiple Data Security servers, sharing the analysis load, but one must be the primary, management server. There is a policy engine on all Websense Data Security servers, Web Security Gateway proxies, and Security Gateway appliances. The policy engine is responsible for parsing your data and using analytics to compare it to the rules in your policies. The policy database is a repository for all of the policies you create. For optimal performance, it is stored locally on each server as well, as is the fingerprint database. The policy database is pushed during the deploy operation, while fingerprints are distributed automatically as they are generated. Data Security protector If you have a full Websense Data Security subscription, you may also make use of the Data Security protector. The protector is a Linux-based machine that intercepts and analyzes traffic on a variety of channels, such as , HTTP, FTP, and chat. It is an essential component of Websense Data Security providing monitoring and blocking capabilities to prevent data loss and leaks of sensitive information. Using PreciseID technology, the protector can accurately monitor sensitive information in transit on any port. Content analysis is performed by the on-box policy engine, so no sensitive data leaves the protector during this process. Data Security databases Websense Data Security has 2 databases for incident and forensics data: The incident database contains information about policy breaches, such as what rule was matched, how many times, what were the violation triggers, what was the date, channel, source, ID, and more. It is stored in Microsoft SQL Server along with policy configuration data. When the incident database gets very large, it is partitioned so you can archive it onto different physical disks. You do this by navigating to Settings > General > Archive and using the options on the resulting screen. The forensics repository contains information about the transaction that resulted in the incident, such as the contents of an body: From:,To:, Cc: fields; attachments, URL category, host name, file name, and more. To configure the size and location of the forensics repository, navigate to Settings > Deployment > System Modules and click Forensics Repository on the management server. Both incident data and forensics data are displayed in the Incidents, Last n days report. 2 Websense Data Security
17 Overview What can I protect? Related topics: Sources and destinations, page 131 Classifying Content, page 91 Defining Resources, page 129 Remediation, page 141 Websense Data Security lets you control or monitor the flow of data throughout your organization. You can define: Who can move and receive data What data can and cannot be moved Where the data can be sent How the data can be sent What action to take in case of a policy breach With a full subscription, Websense Data Security secures: Network and endpoint - You can monitor or prevent sensitive information from being ed in or outside of your domain from both network and endpoint computers. Web channels FTP - You can monitor or prevent sensitive information from being uploaded to file transfer protocol (FTP) sites. Chat - You can monitor sensitive information going out via instant messenger applications such as Yahoo! Messenger. Plain text -You can monitor or prevent sensitive information from being sent via plain text (unformatted textual content). HTTP/HTTPS - You can monitor or prevent sensitive information from being posted to a Web site, blog, or forum via HTTP. Endpoint HTTP/HTTPS - You can monitor or protect endpoint devices such as laptops from posting sensitive data to the Web. Network and endpoint printing - You can monitor or prevent sensitive data from being printed on any printer in your network. Endpoint applications - You can monitor or prevent sensitive data from being copied and pasted from one application to another on Windows endpoint clients. This is desirable, because endpoint clients are often disconnected from the corporate network and can pose a security risk. Endpoint removable media - You can monitor or prevent sensitive information from being written to a removable device such as a USB flash drive, CD/DVD, or TRITON - Data Security Help 3
18 Overview external hard disk. All removable media is supported on Windows endpoints. All but CD/DVD devices are supported on Linux endpoints. Endpoint LANs - Users commonly take their laptops home and then copy data through a LAN connection to a network drive/share on another computer. You can specify a list of IP addresses, host names or IP networks of computers that are allowed as a source or destination for LAN copy. You can intercept data from an endpoint client. You can set a different behavior according to the endpoint type (laptop/other) and location (connected/not connected to the corporate network). Note that Endpoint LAN control is currently applicable to Microsoft sharing only. By such comprehensive monitoring of these channels, you can prevent data from leaving your organization by the most common means. PreciseID fingerprinting Related topics: File fingerprinting, page 106 Database fingerprinting, page 112 Scripts, page 104 Classifying Content, page 91 One of the ways that you can classify data in your organization is by fingerprinting it using the Websense patented PreciseID technology. (Other ways include identifying key phrases, regular expression patterns, dictionaries, or file types. See Classifying Content, page 91.) The power of PreciseID techniques is its ability to detect sensitive information despite manipulation, reformatting, or other modification. Fingerprints enable the protection of whole or partial documents, antecedents, and derivative versions of the protected information, as well as snippets of the protected information whether cut and pasted or retyped. PreciseID technology can fingerprint 2 types of data: structured and unstructured. Structured fingerprinting defines what tables and what data inside the table should be fingerprinted. (To set this up, select Main > Policy Management > Content Classifiers > Database Fingerprinting.) Unstructured fingerprinting defines files and folders that should be fingerprinted. (To set this up, select Main > Policy Management > Content Classifiers > File Fingerprinting.) 4 Websense Data Security
19 Overview These classifiers not only define what to fingerprint, but when and how often to run the fingerprinting scan. That way, if files or data change after fingerprinting, Data Security stays up to date. At scan time, PreciseID technology examines the content of documents or raw data and extracts a set of mathematical descriptors or information fingerprints. These fingerprints are compact and describe the underlying content. By assigning unique identities to each information asset, PreciseID technology can track information in motion with great precision. Original content cannot be recreated or reverse engineered from the PreciseID information fingerprint. PreciseID supports real-time hash validation for data identification and integrity. You can fingerprint data in all common languages. Websense has fine-tuned fingerprinting for English, Spanish, German, Russian, Hebrew, and Japanese. Managing Websense Data Security Related topics: Navigating the System, page 7 The interface that you use to manage Websense Data Security is called the TRITON Unified Security Center. TRITON has modules for Web security, security, and data security. TRITON is a Web-based user interface that enables you to perform basic setup, system maintenance, policy creation, reporting, and incident management for all three modules in the same location. The TRITON center consolidates all aspects of Websense setup and configuration, incident management, system status reports, and role-based administration. For more information on using the TRITON interface, see the TRITON Help system. Select TRITON Settings on the TRITON toolbar, then click Help > Help Contents. Web Security Gateway Anywhere mode Websense Data Security works seamlessly with Websense Web Security and Websense Web Security Gateway. If you have Websense Web Security Gateway Anywhere, only content on Web channels is analyzed, and you are not required to purchase a separate Data Security subscription or a protector appliance. TRITON - Data Security Help 5
20 Overview The Web channels covered by Web Security Gateway Anywhere include HTTP, HTTPS, FTP, and FTP-over-HTTP. This allows you to prevent posts to Web sites, blogs, and forums as well as FTP sites. Note If you have Websense Web Security Gateway Anywhere, you won t see all the options that are presented in this Help documentation. If you require access to other options and channels that you see here, talk to your Websense account representative about purchasing a full Websense Data Security subscription. Security Gateway mode Websense Data Security is integrated into Websense Security Gateway and Websense Security Gateway Anywhere. If you have Websense Security Gateway, data loss is prevented over . You are not required to purchase a separate Data Security subscription, SMTP agent, or a protector appliance. Note If you have Websense Security Gateway, you won t see all the options that are presented in this Help documentation. If you require access to other options and channels that you see here, talk to your Websense account representative about purchasing a full Websense Data Security subscription. 6 Websense Data Security
21 2 Navigating the System TRITON Unified Security Center navigation is described in the TRITON Help System. Select TRITON Settings on the TRITON toolbar, then click Help > Help Contents for more information. In this section, you will learn how to navigate the TRITON - Data Security interface. It covers: Data Security s navigation and content panes Today page Deploy button Icons Breadcrumbs Check boxes Pagination Data Security s navigation and content panes Related topics: Main tab, page 10 Settings tab, page 11 The left pane of the TRITON Unified Security Center is known as the navigation pane. The navigation pane is organized with tabs and buttons, some of which offer a TRITON - Data Security Help 7
22 Navigating the System menu of options. The right pane is known as the content pane. The content in this pane varies according to the selection in the navigation pane. The navigation pane is collapsible to enable larger working space and a wider display area for all TRITON pages. In TRITON - Data Security, this is especially useful for the Data Loss Prevention and Discovery reports. 8 Websense Data Security
23 Navigating the System To collapse the navigation pane, click the arrows in the upper-right corner of the pane. To expand it, click the arrows again. You can do this on any page in the TRITON security center. Collapse Arrow There are 2 tabs on the navigation pane: Main and Settings. In TRITON - Data Security: The Main tab is where you create and fine-tune policies, perform discovery, manage incidents, and view system status and logs. The Settings tab is where you administer the system. Here, you can perform system maintenance; configure endpoint deployment; and configure settings, modules, and roles. Note If you have Websense Web Security Gateway Anywhere, your tabs look slightly different. That s because not all of the options apply to you, such as discovery and endpoint. TRITON - Data Security Help 9
24 Navigating the System Main tab Related topics: Viewing Incidents and Reports, page 199 Creating Custom DLP Policies, page 67 Creating Discovery Policies, page 155 Scheduling Discovery Tasks, page 169 Classifying Content, page 91 Defining Resources, page 129 Viewing Status and Logs, page 241 Reporting Data Loss Prevention: View and manage data loss prevention incidents relevant to the active administrator. You can assign incidents to other administrators and view consolidated reports on incidents and information leaks. This gives you a complete picture of what s going on inside your network. You can also schedule reporting tasks. Discovery*: View information about incidents that were discovered through discovery. Using this screen, you can assign, view, and monitor discovery incidents. *Not included with Websense Web Security Gateway Anywhere or Security Gateway. Policy Management Data Loss Prevention (DLP) Policies: Create or manage a network or endpoint policies. You can create policies from scratch or by using predefined regulatory and compliance policies. Discovery Policies*: Create or manage discovery policies. You can create policies from scratch or by using a predefined regulatory template. Discovery Tasks*: Schedule discovery tasks. Content Classifiers: Describe the data to be governed. You can classify data by file properties, key phrases, dictionaries, scripts, a database fingerprint, a directory (including SharePoint) fingerprint, and/or a file fingerprint. Resources: Define the source and destination of the data you want to protect, the endpoint device or application that may be in use, and the remediation or action to take when a violation is discovered (such as block or notify). *Not included with Websense Web Security Gateway Anywhere or Security Gateway. 10 Websense Data Security
25 Navigating the System Status Today: The Today page appears first when you first view TRITON - Data Security. It provides an at-a-glance dashboard of the enterprise data loss prevention status. For more information about the Today page, see Today page, page 12. System Health: This enables you to monitor Websense Data Security performance. See Monitoring system health, page 244. Endpoint Status*: On this page you can view a list of data endpoints that are registered with the Data Security Management Server, including information regarding an endpoint s discovery, profile and policy, and the host s system summary. See Viewing endpoint status, page 246. Traffic Log: This enables you to see details of the traffic being monitored by Websense Data Security. See Traffic log, page 248. System Log: Here you can view a list of the events sent from system components, such as the Data Security servers, protectors, and policy engines. See System log, page 251. Audit Log: This page displays a list of actions that administrators have performed in the system. See Audit log, page 251. Settings tab * Not included with Websense Web Security Gateway Anywhere. Related topics: Configuring System Settings, page 255 Configuring Authorization, page 283 Archiving Incidents, page 293 Managing System Modules, page 303 Configuring Endpoint Deployment, page 341 Main tab, page 10 General System: Configure basic system settings for incidents and forensics, user directories, mail gateways, Websense product integration, and more. Authorization: Set up and manage TRITON - Data Security system administrators and assign roles. Archive: Archive partitions for incident storage. Policy Updates: Install updates to Websense predefined regulatory and compliance policies. TRITON - Data Security Help 11
26 Navigating the System Deployment System Modules: Manage system components such as Data Security servers, fingerprint repositories, policy engines, and agents. Endpoint*: Configure endpoint profiles. * Not included with Websense Web Security Gateway Anywhere or Security Gateway. Today page When you log onto TRITON - Data Security, the Today page displays. This page includes a comprehensive view of data loss prevention incidents that occurred in the last 24 hours, and the total number of discovery incidents. From the Today page, you can see any system alerts and act on them quickly and easily. You can also view incidents by host names and policy categories so you know where your greatest risks lie. For details about the Today page and its contents, see Viewing the Today page, page 242. Deploy button In Websense Data Security, your policy and configuration changes are saved as soon as you make them and click OK, but they are localized to the Data Security Management Server. To deploy changes across all servers running Websense Data Security components in your network, you must click the Deploy button on the TRITON toolbar. The Deploy button deploys your policy changes across all Data Security components the protector, agents, gateways, endpoint hosts, etc. This includes changes to policies, rules, exceptions, resources, content classifiers, and tasks. If you have changes waiting to be deployed, the Deploy button turns yellow to indicate the deployment is required. 12 Websense Data Security
27 Navigating the System Click the left button (the magnifying glass icon) to view the status of the last deployment. Click the right button to deploy the settings you configured. If no changes are awaiting deployment, the Deploy button is white, but you can still view deployment status. If you are not allowed to deploy or see the last status, these buttons are greyed out. In TRITON - Web Security, the Save All button performs a similar function. Before you click Deploy, be sure to review your configuration changes. When you click Deploy, a confirmation message appears: You are about to deploy the current settings. Click OK to continue. Click OK to deploy the changes across your network. You will see a table indicating the dynamic status of the components being deployed. Deploying changes can take time, and if a component is down or disconnected from the network, deployment to that specific component will fail. However, once the component becomes available again, it will get all the pending updates. If Websense Data Security encounters problems, you ll see a message indicating deployment failure in the table. While your changes are being deployed across your network, you can see the status column updates for each module change from Processing to either Success or Failed. See Troubleshooting for tips on how to solve failed deployments. Note When deploying settings to the protector, active instant messenger (IM) sessions are no longer monitored. Every IM session that is opened after the deploy is monitored; however, existing connections are not be monitored after the deploy. If you have deployed a protector in inline mode, users lose Internet connection for approximately 5 seconds when you deploy changes to network settings. TRITON - Data Security Help 13
28 Navigating the System Icons The following icons are used throughout the TRITON - Data Security interface: Icon System Modules Data Security Management Server Data Security Server Protector Content Gateway SMTP agent ISA agent Printer agent Security Gateway agent Fingerprint repository Endpoint server Crawler Forensics repository Policy engine 14 Websense Data Security
29 Navigating the System Icon ICAP server Deployment Status Modified Disabled Forced Bypass Severity High Medium Low Incident Status Flags New In Process Closed Endpoint Operations Print Cut/copy TRITON - Data Security Help 15
30 Navigating the System Icon Paste File access Download Screen capture Channels HTTP Endpoint FTP IM Printer SMTP ICAP Web Details report Escalate View 16 Websense Data Security
31 Navigating the System Icon Print preview - Current, selected, or all filtered incidents Reporting Details report Summary report Run Edit Save As Export to PDF Export to CSV Add scheduled task - accesses the Task Scheduler screen Delete Print and Export Export to PDF Export to CSV Print Preview System-wide TRITON - Data Security Help 17
32 Navigating the System Icon When a user modification or update to the system fails, the Error icon is displayed at the top of the screen with an explanation of the failure. When a user modification or update to the system succeeds, the Success icon is displayed at the top of the screen with a description of what has been done. The Information icon provides added details when clicked. The Note icon is displayed when extra information is supplied that is pertinent to the configuration. Breadcrumbs Breadcrumbs appear at the top of each screen, providing you with the complete path of screens that you have visited up to the current page. The paths are clickable links that direct you to the relative screen. The Help system also includes breadcrumbs. Check boxes Most check boxes used in the TRITON - Data Security interface function in a hierarchical manner. In tables, the title check box enables you to select or deselect all the check boxes below it. In forms, clicking a check box allows you to access the 18 Websense Data Security
33 Navigating the System check boxes below it and then activate them as necessary. Disabling the highest-level check box disables lower-level check boxes as well. Pagination In tables where there is more than one page of data (more than 100 items), the pagination control enables you to move from one page to another. The Next and Previous buttons move to the next or previous pages, while the First button moves to the first page and the Last button accesses the final page. TRITON - Data Security Help 19
34 Navigating the System 20 Websense Data Security
35 3 Initial Setup Related topics: Entering your subscription key, page 22 Defining general system settings, page 22 Setting up notifications, page 25 Configuring Web attributes, page 56 Configuring outbound and inbound attributes, page 51 Creating a regulatory and compliance policy, page 63 Configuring system modules, page 27 Deploying your settings, page 31 If you have Websense Web Security Gateway Anywhere or Websense Security Gateway installed, follow these steps: 1. Define the general system settings, such as user directories and alerts. (See Defining general system settings, page 22.) 2. Select and define attributes for your Web or policy. (See Configuring Web attributes, page 56 and Configuring outbound and inbound attributes, page 51.) 3. Deploy your settings. (See Deploying your settings, page 31.) If you have only Websense Data Security, follow these basic steps: 1. Enter your Websense Data Security subscription key. (See Entering your subscription key, page 22.) 2. Define the general system settings, such as user directories and alerts. (See Defining general system settings, page 22.) 3. Set up notifications. (See Setting up notifications, page 25.) 4. Configure system modules (protector deployments only). (See Configuring system modules, page 27.) 5. Create regulatory and compliance policies. (See Creating a regulatory and compliance policy, page 63.) 6. Deploy your settings. (See Deploying your settings, page 31.) TRITON - Data Security Help 21
36 Initial Setup Basic instructions are provided in this chapter. For more detailed instructions, follow the links under Related topics. Entering your subscription key Related topics: Entering subscription settings, page 278 Before beginning to work with Websense Data Security you must enter your subscription key: 1. Log on to TRITON - Data Security. If you have never entered subscription information before, the subscription page appears automatically. If you need to navigate to the subscription page: a. Select Settings > General > System. b. From the System pane, choose Subscription. 2. Browse to your subscription file, then click Submit. Your current subscription information is displayed, and the TRITON - Data Security application restarts. 3. If your license is about to expire, you ll see a notice in this screen, along with an Update button. Click the Update button to update your subscription. Once updated, you ll need to log off and then log on again to see accurate information on the subscription screen. Note If you have Websense Web Security Gateway Anywhere or Websense Security Gateway, your subscription information is communicated to the Data Security Management Server automatically. Defining general system settings Related topics: Configuring user directory server settings, page 23 Setting up alerts, page 24 Configuring System Settings, page 255 On the Settings tab, there are settings to configure before you can get started. Namely, you need to: 22 Websense Data Security
37 Initial Setup Configure user directory server settings. This lets you resolve user details during analysis and enhance the details displayed with the incident. Set up alerts. This lets you configure the cases when administrators receive alerts from the system, such as when a subscription is about to expire or disk space is reaching its limit. Configuring user directory server settings Related topics: Configuring user directory settings, page 267 In the TRITON Console, define the LDAP user directory to use when adding and authenticating TRITON administrators with network accounts. (Select TRITON Settings from the TRITON toolbar, then select User Directories.) On the Data Security tab, you define the user directory to use for Data Security users and other policy resources such as devices and networks. 1. Select Settings > General > System. 2. Click the User Directories option in the System pane. 3. Click New in the toolbar. 4. In the Add User Directory Server screen, complete the following fields: Field Name Type Connection Settings IP address or host name Port User distinguished name Password Root naming context Use SSL encryption Enter a name for the user directory server. Select the type of directory from the drop-down menu: Active Directory, Domino, ADAM, or CSV file. Enter the IP address or host name of the user directory server. Enter the port number of the user directory server. Enter a user name that has access to the directory server. Enter the password for this user name. Optionally, enter the root naming context that Websense Data Security should use to search for user information. If you supply a value, it must be a valid context in your domain. If the Root naming context field is left blank, Data Security begins searching at the top level of the directory service. Select this box if you want to connect to the directory server using Secure Sockets Layer (SSL) encryption. TRITON - Data Security Help 23
TRITON - Data Security Help
TRITON - Data Security Help Websense Data Security v7.5.3 1996 2010, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2010 Printed in the United States
More informationEmail DLP Quick Start
1 Email DLP Quick Start TRITON - Email Security is automatically configured to work with TRITON - Data Security. The Email Security module registers with the Data Security Management Server when you install
More informationWeb DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. TRITON - Web Security is automatically configured to
More informationWeb DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. The Web Security manager is automatically configured
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationWebsense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
More informationReleasing blocked email in Data Security
Releasing blocked email in Data Security IN-TopicInfo:Topic 41101/ Updated: 02-May-2011 Applies To: Websense Data Security v7.1.x Websense Data Security v7.5.x Websense Data Security v7.6.x - v7.8x SMTP
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationDisaster Recovery. Websense Web Security Web Security Gateway. v7.6
Disaster Recovery Websense Web Security Web Security Gateway v7.6 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2011 The products and/or methods
More informationConfiguration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
More informationDeployment Guide. Websense TRITON AP-DATA Gateway and Discover. v8.0.x
Deployment Guide Websense TRITON AP-DATA Gateway and Discover v8.0.x 1996 2014, Websense, Inc. All rights reserved. 10900 Stonelake Blvd, 3rd Floor, Austin, TX 78759, USA Published December 2014 Printed
More informationA Buyer's Guide to Data Loss Protection Solutions
A Buyer's Guide to Data Loss Protection Solutions 2010 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationCopyright 2013 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationSecure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
More informationIntegrated Citrix Servers
Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationTRITON Unified Security Center Help
TRITON Unified Security Center Help Websense TRITON Unified Security Center v7.7 2011-2012, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2012 Printed
More informationInstallation Guide Supplement
Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,
More informationNetwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015
Netwrix Auditor Administrator's Guide Version: 7.1 10/30/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationInstallation Guide. Websense TRITON Enterprise. v7.8.x
Installation Guide Websense TRITON Enterprise v7.8.x 1996 2014, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2014 Printed in the United States and Ireland
More informationTRITON - Web Security Help
TRITON - Web Security Help Websense Web Security Websense Web Filter v7.6 1996 2015, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2015 Printed in the
More informationM86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
More informationMoving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
More informationRemote Filtering Software
Remote Filtering Software Websense Web Security Solutions v7.7-7.8 1996 2013, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2013 The products and/or
More informationTransparent Identification of Users
Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationUser Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19
CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface User Guidance
More informationGFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"
More informationCustomer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using
More informationContents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
More information2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
More informationUser's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationUser Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration
User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves
More informationWeb Remote Access. User Guide
Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior
More informationSophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
More informationDameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
More informationwww.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014
www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationv6.1 Websense Enterprise Reporting Administrator s Guide
v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,
More informationTSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
More informationGFI Product Manual. ReportPack Manual
GFI Product Manual ReportPack Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNetwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
More informationMicrosoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
More informationTrustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
More informationMcAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
More informationOmniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
More informationTRITON - Web Security Help
TRITON - Web Security Help Websense Web Security Websense Web Filter v7.5 1996 2015, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2015 Printed in the
More informationAdministrator Operations Guide
Administrator Operations Guide 1 What You Can Do with Remote Communication Gate S 2 Login and Logout 3 Settings 4 Printer Management 5 Log Management 6 Firmware Management 7 Installation Support 8 Maintenance
More informationHow To Use Websense
Deployment and Installation Guide Websense Data Security v7.5.3 1996 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published February 23, 2011 Printed in
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationManagement Center. Installation and Upgrade Guide. Version 8 FR4
Management Center Installation and Upgrade Guide Version 8 FR4 APPSENSE MANAGEMENT CENTER INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2012 All rights reserved. part of this document may be produced
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationNetwrix Auditor for Windows Server
Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationMicrosoft Office 365 from Vodafone. Administrator s Guide for Midsize Businesses and Enterprises
Microsoft Office 365 from Vodafone Administrator s Guide for Midsize Businesses and Enterprises Contents Footer bar Return to contents page Go to next of section Return to start of section Previous page
More informationProduct Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with
More informationEnterprise Vault Installing and Configuring
Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise
More informationInstallation Guide. Websense TRITON APX. v8.1.x
Installation Guide Websense TRITON APX v8.1.x 1996 2015, Websense, Inc. All rights reserved. 10900 Stonelake Blvd, 3rd Floor, Austin, TX 78759, USA Published 2015 Printed in the United States and Ireland
More informationSophos for Microsoft SharePoint Help. Product version: 2.0
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2
More informationBackup and Restore FAQ
Backup and Restore FAQ Topic 50210 Backup and Restore Web, Data, and Email Security Solutions 11-Mar-2014 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
More informationDell One Identity Manager 7.0. Help Desk Module Administration Guide
Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure
More informationSOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012
SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse
More informationCTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
More informationEmail Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
More informationA Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
More informationCTERA Agent for Linux
User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationWebsense Web Security Gateway Anywhere
Websense Web Security Gateway Anywhere Getting Started Guide v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published September 8, 2010 Printed in
More informationViRobot Desktop 5.5. User s Guide
ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationInstalling Websense Data Security
3 Installing Websense Data Security The following procedures describe how to install Websense Data Security. The installation process and results depend on which components and which agents you choose
More informationWebsense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration
Websense Data Security Suite and Cyber-Ark Inter-Business Vault The Power of Integration Websense Data Security Suite Websense Data Security Suite is a leading solution to prevent information leaks; be
More informationAudit Management Reference
www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationExchange 2003 Standard Journaling Guide
Exchange 2003 Standard Journaling Guide Websense Email Security Solutions v7.3 Websense Advanced Email Encryption Copyright 1996-2011 Websense, Inc. All rights reserved. This document contains proprietary
More informationSymantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationComodo MyDLP Software Version 2.0. Administration Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Administration Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo MyDLP... 5 2.Getting
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationVeeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
More informationPresentation Reporting Quick Start
Presentation Reporting Quick Start Topic 50430 Presentation Reporting Quick Start Websense Web Security Solutions Updated 19-Sep-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationSynchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
More informationHow To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
More informationMultiSite Manager. User Guide
MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.
More informationNetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant
How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup
More informationCTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationTIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual
TIBCO Spotfire Automation Services 6.5 Installation and Deployment Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
More informationHP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
More informationNETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationInstallation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationIBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationUser Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More informationManual POLICY PATROL SECURE FILE TRANSFER
Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
More information