M86 MailMarshal Exchange USER GUIDE. Software Version: 7.1

Size: px
Start display at page:

Download "M86 MailMarshal Exchange USER GUIDE. Software Version: 7.1"

Transcription

1 M86 MailMarshal Exchange USER GUIDE Software Version: 7.1

2 M86 MAILMARSHAL EXCHANGE USER GUIDE 2011 M86 Security All rights reserved. Published November 2011 for software release 7.1 No part of this Documentation may be reproduced or transmitted in any form or by any means, including but without derogation of the foregoing, electronic or mechanical means, photocopying, recording or any information storage and retrieval system, without the prior permission in writing of M86 Security. This Documentation is provided as is and there are no warranties or representations made by M86 Security, either express, implied, or statutory, with respect to it, including warranties or conditions of title, quality, non-infringement, merchantability, quality or fitness for a particular purpose, nor are there any warranties created by course of dealing, course of performance, or trade usage. M86 Security does not warrant that this Documentation will meet your needs or be free from errors. In no event will M86 Security be liable for any form of loss or damage of whatsoever kind (whether arising in contract, tort, by statute or otherwise), including, but without limiting the generality of the foregoing, direct, damages at common law, repudiatory damages indirect, special, idiosyncratic or consequential damages or loss, loss of anticipated profits, loss of business opportunity or loss of contracts by you or any third party or claims or demands against you by any third party or other like economic loss in connection with or arising out of your use and/or possession of this Documentation. M86 MailMarshal Exchange is the registered trademark of M86 Security. Other product names mentioned in this Documentation may be trademarks or registered trademarks of their respective companies. II M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

3 Contents About This Book and the Library... xi Technical Support and Resources... xi Conventions... xii Chapter 1 Introduction... 1 What Is MailMarshal Exchange?...1 What Does MailMarshal Exchange Provide?...2 How MailMarshal Exchange Helps You...3 How MailMarshal Exchange Works...3 Understanding What MailMarshal Exchange Does...4 Configuring MailMarshal Exchange...5 Monitoring and Reporting...5 MailMarshal Exchange and MailMarshal SEG...6 Chapter 2 Planning Your MailMarshal Exchange Installation... 9 Planning Checklist...9 Understanding MailMarshal Exchange Components...11 MailMarshal Exchange Components...12 Other Software and Services...13 Understanding Installation Scenarios...14 Standalone Installation...14 Array Installation...15 Hardware and Software Requirements...16 Standalone Installation Requirements...16 Array Installation Requirements...18 Web Components Requirements...21 Configurator or Console User Interface Requirements...22 M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE III

4 CONTENTS Database Software Considerations...23 Understanding MailMarshal Exchange Folder Locations...25 Supported Antivirus Software...26 Collecting Information for Installation...28 Chapter 3 Installing and Configuring MailMarshal Exchange Installation Checklist...31 Installing Prerequisite Software...32 Installing MailMarshal Exchange on a Standalone Server...33 Installing MailMarshal Exchange as an Array...36 Installing a MailMarshal Exchange Array Manager...36 Installing a MailMarshal Exchange Server...39 Running the Configuration Wizard...43 Creating Directory Connectors...46 Configuring Antivirus Scanning...50 Excluding Working Folders From Virus Scanning...50 Configuring MailMarshal Exchange to Use an Antivirus Product...52 Installing and Customizing Web Components...54 Installing the MailMarshal Exchange Web Components...55 Customizing the Web Components...59 Installing Additional User Interfaces...60 Upgrading MailMarshal Exchange...61 Upgrading from MailMarshal Exchange Version Upgrading from MailMarshal Exchange Version 5.X...65 Uninstalling MailMarshal Exchange...65 IV M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

5 Chapter 4 Understanding MailMarshal Exchange Interfaces Understanding the Configurator...70 Working With the Getting Started and Common Tasks Pages...71 Working With Menu and Detail Items...72 Working With Properties Configuration...72 Committing Configuration...73 Understanding the Console...73 Understanding the Web Console...75 Understanding the Quarantine Management Website...76 Understanding Other Tools...77 Chapter 5 Implementing Your Content Security Policy Configuring Content Security...79 Stopping Viruses...80 How MailMarshal Exchange Uses Virus Scanners...80 Virus and Threats Policy and Rules...82 Best Practices...83 Viewing Virus Scanner Properties...84 Filtering Messages and Attachments...84 Chapter 6 Understanding Policy, Policy Groups, and Rules Understanding Policy Types...87 Content Analysis Policy...88 Dead Letter Policy...88 Understanding Policy Groups...88 Understanding Rules...89 Creating Rules...90 Understanding User Matching...92 M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE V

6 CONTENTS Understanding Rule Conditions...94 Rule Conditions for Content Analysis Policy Rules...94 Rule Conditions for Dead Letter Policy Rules Understanding Rule Actions Rule Actions for Content Analysis Policy Rules Rule Actions for Dead Letter Policy Rules Understanding the Order of Evaluation Adjusting the Order of Evaluation of Policy Groups Adjusting the Order of Evaluation of Rules Viewing Policy Chapter 7 Understanding Policy Elements Configuring Connectors Configuring User Groups Creating and Populating User Groups Moving and Copying Users and Groups Identifying Text Content Using TextCensor Scripts Creating Scripts Editing Scripts Duplicating Scripts Script and Item Weighting Item Syntax Importing Scripts Exporting Scripts TextCensor Best Practices Testing Scripts VI M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

7 Notifying Users with Message Templates and Message Stamps Message Templates Creating a Message Template Creating Digest Templates Editing Templates Duplicating Templates Deleting Templates Working with Message Stamps Using Variables Date Formatting Using Virus Scanning Using Folders and Message Classifications Working with Message Classifications Working with Folders Creating Folders Editing Folders Header Matching and Rewriting Using Rules to Find Headers Using Rules to Change Headers Using the Header Rewrite Wizard Extending Functionality Using External Commands M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE VII

8 CONTENTS Chapter 8 Monitoring Flow Using the MailMarshal Exchange Console Connecting to MailMarshal Exchange Using the Console Connecting to MailMarshal Exchange Using the Web Console Viewing Server Statistics Viewing Folders and Folder Contents Working With Messages Viewing History Searching Folders and History Viewing Alert History Setting Console Security Viewing Event History Finding Events Viewing News From M86 Security Using Windows Tools Event Log Performance Monitor Using MailMarshal Exchange Text Logs Chapter 9 Managing MailMarshal Exchange Configuration Managing Your MailMarshal Exchange Licenses Reviewing Installed Licenses Requesting a New License Key Entering a License Key Backing Up and Restoring the Configuration Backing Up the Configuration Restoring the Configuration Configuring Local Domains Changing Local Domains Information Configuring Manager Security VIII M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

9 Configuring Automatic Updates Managing Array Nodes Managing Node Services Adding and Deleting Nodes Joining a Node to an Array Customizing Settings for Nodes Setting Advanced Options Working with Array Communications Changing Folder Locations Using the Group File Import Tool Using the Configuration Export Tool Using the Quarantine Synchronization Tool Chapter 10 Delegating Quarantine Management Setting Up Console Access Setting Up Quarantine Management Features Quarantine Management Windows Setting Up Folders and Templates Setting Up Message Digests Setting Up Rules Chapter 11 Reporting on MailMarshal Exchange Activity Data Retention and Grouping Configuring Data Retention Configuring Reporting Groups Appendix A Wildcards and Regular Expressions 241 Wildcard Characters M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE IX

10 CONTENTS Regular Expressions Shortcuts Reserved Characters Examples Map Files Appendix B Third Party Extensions 249 Image Analyzer Why Would I Use Image Analyzer? What Results Can I Expect From Image Analyzer? How Does Image Analyzer Address the Issues? Virus Scanning Software Glossary 253 Index 259 X M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

11 ABOUT THIS BOOK AND THE LIBRARY The User Guide provides conceptual information about MailMarshal Exchange. This book defines terminology and various related concepts. Intended Audience This book provides information for individuals responsible for understanding MailMarshal Exchange concepts and for individuals managing MailMarshal Exchange installations. Other Information in the Library The library provides the following information resources: User Guide Provides conceptual information and detailed planning and installation information about MailMarshal Exchange. This book also provides an overview of the MailMarshal Exchange user interfaces and the Help. Help Provides context-sensitive information and step-by-step guidance for common tasks, as well as definitions for each field on each window. TECHNICAL SUPPORT AND RESOURCES For technical assistance please visit This website provides: Access to additional self-service resources such as a Knowledge Base and customer forum Software updates Information about how to contact Technical Support staff. M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE XI

12 CONVENTIONS The library uses consistent conventions to help you identify items throughout the documentation. The following table summarizes these conventions. Convention Bold Italics Fixed Font Brackets, such as [value] Braces, such as {value} Logical OR, such as value1 value2 Use Window and menu items Technical terms, when introduced Book and CD-ROM titles Variable names and values Emphasized words File and folder names Commands and code examples Text you must type Text (output) displayed in the command-line interface Optional parameters of a command Required parameters of a command Exclusive parameters. Choose one parameter. XII M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

13 Chapter 1 Introduction is an essential communication tool, but it also creates serious productivity and security issues. offers an entry point in your network for spam and other undesired non-business content, such as malicious code, large file attachments that consume valuable disk space, phishing attempts, information and identity theft attacks, and other damaging content and activity. In addition, can become a conduit for proprietary data and confidential information to leave the company. Spam, viruses, malicious code, liability issues, and declining employee productivity are all risks associated with . viruses, Trojan horses, and other malicious files can cause millions of dollars in damage in just a matter of hours. Reports of companies forced into legal action because of staff misuse of are becoming commonplace. remains the lifeblood of modern business communication, but the damages can cause become more costly each year. WHAT IS MAILMARSHAL EXCHANGE? MailMarshal Exchange is an filtering solution for Microsoft Exchange Server that helps organizations to provide a safe environment for employees, free from harassment and objectionable material. It also improves productivity levels by managing non-business content and attachments. Many organizations today have created policies and guidelines for the appropriate use of , and employee education programs to deal with the torrent of spam and viruses. MailMarshal Exchange complements a gateway filtering solution such as MailMarshal SEG, and can help your company to apply policy and security automatically to internal messages. M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE 1

14 CHAPTER 1: INTRODUCTION WHAT DOES MAILMARSHAL EXCHANGE PROVIDE? As a content security solution for internal , MailMarshal Exchange protects your network and your organization. MailMarshal Exchange enforces your Acceptable Use Policy to protect against viruses and other undesirable consequences of using . MailMarshal Exchange scans the content of internal, inbound and outbound messages, including the headers, message body, and attachments. MailMarshal can detect many conditions, such as: Presence of a virus (using one or more supported virus scanners) Presence of particular phrases in header, message, or attachment Size or type of attachments The product can also respond to messages that violate your Acceptable Use Policy, by taking actions such as: Quarantining a message for later review by administrators or users Deleting a message Redirecting a message Archiving a message for future reference MailMarshal Exchange provides administrators with granular control of policies and the ability to delegate monitoring and control to other personnel. MailMarshal Exchange provides the following user interfaces to meet the needs of a variety of administrators and your recipients: Configurator For security administrators to configure the product and establish policy. 2 M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

15 CHAPTER 1: INTRODUCTION Console For administrators and helpdesk personnel to monitor and control product activity. Also available as a Web based application. Quarantine Management Website For recipients to verify quarantined for their own addresses. HOW MAILMARSHAL EXCHANGE HELPS YOU Unmonitored presents both financial and legal dangers to a company. For example, virus infection and malicious code can be costly in employee time, repair time, and lost data. Inappropriate and offensive content wastes time and is a potential liability. Using MailMarshal Exchange, your company can earn a significant ROI as you secure your network, protect corporate assets, reduce the potential for corporate liability, and improve workplace productivity. HOW MAILMARSHAL EXCHANGE WORKS MailMarshal Exchange is installed with the Exchange Server computer. It complements and is compatible with traditional Internet firewalls, SMTP mail servers, antivirus scanners, and other security applications. The MailMarshal Server software integrates with an Exchange Server Hub Transport server using the Transport Agent architecture. processed by Exchange is filtered by MailMarshal. M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE 3

16 CHAPTER 1: INTRODUCTION MailMarshal Exchange includes several components including the Array Manager, one or more processing server installations (Transport Agent and Engine on an Exchange Server), a Microsoft SQL Server database, and optional management websites. Small organizations can install the components on a single computer. Large organizations can install the components across several computers. Enterprises can manage a distributed array of processing servers with a single Array Manager computer. MailMarshal Exchange provides a number of user interfaces, including the Configurator, Console, Web Console, and Quarantine Management site. The Configurator lets security policy administrators set policy for the entire organization from a central console. You can install additional user interfaces on other computers throughout the network as needed. Understanding What MailMarshal Exchange Does The MailMarshal Exchange installation plugs in to the Exchange Server through the Transport Agent, and extracts that is queued for processing. The MailMarshal Engine unpacks each , expanding any attached archive or compressed files. The Engine then checks each component against the policy (rules) you have enabled, including XML Category scripts, TextCensor scripts, and any other rules you have enabled. You can alter the effects of MailMarshal Exchange rules by changing the rule order and by changing specific characteristics of the rule. MailMarshal Exchange also scans for viruses using antivirus scanning software. MailMarshal Exchange supports several scanners with highthroughput interfaces. 4 M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

17 CHAPTER 1: INTRODUCTION After the MailMarshal Engine evaluates each component against the rules, it determines whether to accept, modify, or quarantine the . Accepted is passed to Exchange Server, which then delivers it to the appropriate recipients. Modified can be delivered to recipients with attachments removed. Virus-laden , or other that violates policy restrictions, is quarantined. MailMarshal Exchange can also notify administrators of specific actions or notify end-users of quarantined . You can associate the appropriate rule action when you create or modify rules. Configuring MailMarshal Exchange You configure MailMarshal Exchange rules and settings using the Configurator interface, connected to the MailMarshal Array Manager. The Array Manager coordinates the activity of all other MailMarshal Servers in the array and connects with the user interfaces, optional Web server, and the database. You can enforce a wide variety of Acceptable Usage Policies by customizing the way MailMarshal Exchange processes content and attachments. Monitoring and Reporting MailMarshal Exchange provides additional user interfaces for monitoring and daily administration. The Console features the Dashboard to summarize MailMarshal Exchange activity and server health at a glance. Using the Console, administrators can review processing history for a message and view and release any quarantined message. M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE 5

18 CHAPTER 1: INTRODUCTION The administrator can grant other users access to specific Console functions or specific quarantine folders. Using this feature, the administrator can delegate basic tasks to help desk or departmental personnel. MailMarshal Exchange also offers a Web version of the Console to allow remote access to the Console capabilities. users can review and manage quarantined using daily digests and the Quarantine Management Web-based console. This console is a Web application you can easily deploy on your intranet Web server running Microsoft Internet Information Services (IIS). Administrators and managers can generate reports on MailMarshal Exchange activity using Marshal Reporting Console. Marshal Reporting Console uses SQL Server Reporting Services to product reports. This is a server application with a website interface. Marshal Reporting Console can deliver reports by web view, , FTP, or local network files, and can schedule automatic delivery of reports. Marshal Reporting Console is provided as a separate package from M86 Security. This application is available to all MailMarshal Exchange customers. MAILMARSHAL EXCHANGE AND MAILMARSHAL SEG MailMarshal Exchange provides content security for sent or received internally when you use Microsoft Exchange as your server. MailMarshal Exchange lets you scan internal and apply your internal Acceptable Use Policy. MailMarshal SEG (formerly known as MailMarshal SMTP) is a gateway solution that applies content security for inbound from or outbound to the Internet. MailMarshal SEG provides industry leading anti-spam performance with a variety of proprietary technologies. 6 M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

19 CHAPTER 1: INTRODUCTION If you require both internal and external content security, you can use both products. For more information about MailMarshal SEG, see the User Guide for MailMarshal SEG. M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE 7

20 CHAPTER 1: INTRODUCTION 8 M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

21 Chapter 2 Planning Your MailMarshal Exchange Installation When planning to install MailMarshal Exchange, you should understand how MailMarshal Exchange manages and the recommended installation scenarios based on your needs. This chapter provides information about these concepts and provides hardware requirements, software requirements, and planning checklists to help you through the planning process. PLANNING CHECKLIST Plan your MailMarshal Exchange installation by reading the following sections and completing the following checklist: Step See Section 1. Learn about important MailMarshal Exchange concepts. 2. Choose a standalone or array installation. 3. If you selected a standalone installation, choose the appropriate configuration for your environment. Understanding MailMarshal Exchange Components on page 11. Understanding Installation Scenarios on page 14. Standalone Installation on page 14. M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE 9

22 CHAPTER 2: PLANNING YOUR MAILMARSHAL EXCHANGE INSTALLATION Step See Section 4. If you selected an array installation, determine the number and location for the MailMarshal Exchange Servers and Array Manager components. 5. Ensure the computers meet the hardware and software requirements. 6. Determine whether to use Microsoft SQL Server or SQL Express. 7. Decide where to install the MailMarshal Exchange folders. 8. Choose the antivirus software to use with MailMarshal Exchange. 9. Collect installation information about your environment. Array Installation on page 15. Standalone Installation Requirements on page 16 or Array Installation Requirements on page 18 Database Software Considerations on page 23. Understanding MailMarshal Exchange Folder Locations on page 25. Supported Antivirus Software on page 26. Collecting Information for Installation on page M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

23 CHAPTER 2: PLANNING YOUR MAILMARSHAL EXCHANGE INSTALLATION UNDERSTANDING MAILMARSHAL EXCHANGE COMPONENTS MailMarshal Exchange consists of several software components, which you can install on different computers in your network. These components can be installed in a variety of configurations to suit any size organization from small businesses to distributed enterprises. While the components are shown on separate computers in the following figure, in lower volume scenarios you can install all components on a single computer. Exchange Servers with MailMarshal Agent MailMarshal Array Manager MailMarshal User Interfaces Configurator MailMarshal Database (Microsoft SQL Server or SQL Express) Console MailMarshal Web Components and MRC (Microsoft IIS Server) Report Console Directory Server Web Console Quarantine Management M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE 11

24 CHAPTER 2: PLANNING YOUR MAILMARSHAL EXCHANGE INSTALLATION MailMarshal Exchange Components MailMarshal Exchange includes the following components: Server Retrieves from Exchange Server (Exchange Agent), applies policy in the form of rules (Engine), and returns to Exchange Server for delivery (Exchange Agent)). You can install the MailMarshal Exchange Server components on one or more Exchange Servers in your installation. Array Manager Manages an array of MailMarshal Exchange processing servers. The Array Manager connects to the processing servers and to the database, hosted using Microsoft SQL Server or SQL Express. For more information, see Other Software and Services on page 13. Configurator User interface allowing policy Administrators to define policy (rules) and configure MailMarshal Exchange. Console User interface allowing Administrators to manage and monitor undelivered or filtered . Web Console Web based interface used by roaming Administrators just as they would use the Console. Quarantine Management Website Web based interface used by users to view and manage quarantined . Marshal Reporting Console Optional Web based interface used to generate traffic and management reports based on MailMarshal Exchange activity. 12 M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

25 CHAPTER 2: PLANNING YOUR MAILMARSHAL EXCHANGE INSTALLATION To operate properly, MailMarshal Exchange requires an Array Manager, at least one processing Server, a database, a Configurator, and a Console. You can optionally install Web Components and the Marshal Reporting Console if you plan to use the additional features these components offer. Other Software and Services In addition, MailMarshal Exchange may require the following software and network services: Microsoft SQL Server or SQL Express The MailMarshal Exchange database stores configuration data and log information. If your volume permits, you can use the free SQL Express. If your volume is higher, use Microsoft SQL Server. If possible, install the database software and the MailMarshal Exchange Array Manager on the same computer. To use Marshal Reporting Console, you must install SQL Express Advanced Edition or SQL Server Reporting Services. For more information, see Array Installation Requirements on page 18 and Database Software Considerations on page 23. Directory Server If you want to import existing users and groups from your directory service for use in applying Acceptable Use Policy, the MailMarshal Exchange Array Manager must be able to connect with your directory server. MailMarshal Exchange can connect with Microsoft Active Directory and most LDAP compliant directories. Microsoft Internet Information Services (Microsoft IIS) If you want to offer the Web Console and end-user Quarantine Management Website, install the MailMarshal Exchange Web Components. If you want to use Marshal Reporting Console, install this component. All web components require a server with Microsoft IIS and ASP.NET 4.0 installed. M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE 13

26 CHAPTER 2: PLANNING YOUR MAILMARSHAL EXCHANGE INSTALLATION UNDERSTANDING INSTALLATION SCENARIOS You can choose between two installation scenarios, based on the number of Exchange Servers: Standalone, or basic installation Array installation The standalone installation scenario is appropriate for small organizations with a lower volume of . This option allows smaller organizations to gain all the benefits of using MailMarshal Exchange with Exchange Server or Microsoft SBS. The array installation is appropriate for larger organizations where volume is high. This option provides all the security and efficiency options larger organizations require. For more information about determining your configuration needs, contact your Technical Support or Sales Engineering representative. Standalone Installation For small organizations, a standalone installation provides convenience and value. In a standalone installation, you install all the MailMarshal Exchange components on a single Exchange Server. You may also be able to install the SQL Express database on the same single computer. You can install the MailMarshal Exchange Configurator and Console user interfaces on one or more computers in the local network. To use the MailMarshal Exchange Web Console, Quarantine Management Website, or Marshal Reporting Console, install these components on a Microsoft IIS Server. 14 M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

27 CHAPTER 2: PLANNING YOUR MAILMARSHAL EXCHANGE INSTALLATION Array Installation You can install MailMarshal Exchange as an array where your environment includes more than one Exchange Server in the Hub Transport role. Install the MailMarshal Exchange Array Manager, and the database if possible, on a dedicated computer. The location of the Array Manager can affect the performance of the administration and configuration tools used in MailMarshal Exchange but does not affect processing performance. For best results, install the MailMarshal Exchange Array Manager component in one of the following locations, listed from most-preferred to least-preferred: On the same server as the Microsoft SQL Server hosting the database. Since the Array Manager is the only MailMarshal Exchange component that communicates directly with the database, installing the Array Manager on the computer that hosts Microsoft SQL Server or SQL Express results in the most efficient operation. On another computer in the network close to the computer hosting the database over a high-speed network connection. On an Active Directory Global Catalog or other Directory Server. The Array Manager communicates regularly to the Global Catalog if you are running Active directory, or through LDAP to another existing Directory Server. You can install the MailMarshal Exchange Configurator and Console on one or more computers in the local network. To use the MailMarshal Exchange Web Console, Quarantine Management Website, or Marshal Reporting Console, install these components on a Microsoft IIS server domain member inside the network. M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE 15

28 CHAPTER 2: PLANNING YOUR MAILMARSHAL EXCHANGE INSTALLATION HARDWARE AND SOFTWARE REQUIREMENTS Depending on the installation scenario you select and your estimated volume, the specification for computers on which you install MailMarshal Exchange components can vary. The following sections specify the recommended hardware and software for various computers where you may be installing MailMarshal Exchange components. Consider all the requirements before mapping your MailMarshal Exchange installation. The MailMarshal Exchange product installation package includes many prerequisite software updates, including SQL Express and ASP.NET Framework. If you install MailMarshal Exchange from a Web download, you may have to download software you need from the vendor sites. To avoid a system restart during product installation, install any prerequisite software on your computers before you start installing MailMarshal Exchange. For more information about the latest requirements and supported environments, see the M86 Security Knowledge Base. Standalone Installation Requirements The following table lists system requirements for installing the MailMarshal Exchange Server, Array Manager, and selected database on a single Exchange Server. MailMarshal Exchange supports use of SQL Express or Microsoft SQL Server as host database. Note: SQL Server 2008 or SQL Express 2008 has additional prerequisites, including.net 3.5 SP1 and Windows Installer M86 SECURITY, MAILMARSHAL EXCHANGE USER GUIDE

Trustwave ECM (MailMarshal Exchange) User Guide

Trustwave ECM (MailMarshal Exchange) User Guide Trustwave ECM (MailMarshal Exchange) User Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying,

More information

M86 MailMarshal SMTP USER GUIDE. Software Version: 6.8.4

M86 MailMarshal SMTP USER GUIDE. Software Version: 6.8.4 M86 MailMarshal SMTP USER GUIDE Software Version: 6.8.4 M86 MAILMARSHAL SMTP USER GUIDE 2010 M86 Security All rights reserved. Published October 2010 for software release 6.8.4 No part of this Documentation

More information

User Guide. MailMarshal SMTP. Version 6.0

User Guide. MailMarshal SMTP. Version 6.0 User Guide MailMarshal SMTP Version 6.0 THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT.

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

WebMarshal User Guide

WebMarshal User Guide WebMarshal User Guide Legal Notice Copyright 2014 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

MARSHAL REPORTING CONSOLE VERSION 2.5 INSTALLATION GUIDE

MARSHAL REPORTING CONSOLE VERSION 2.5 INSTALLATION GUIDE .trust MARSHAL REPORTING CONSOLE VERSION 2.5 INSTALLATION GUIDE wave.com Updated October 9, 2007 Table of Contents About This Document 2 1 Introduction 3 2 Supported Installation Types 3 2.1 Standalone

More information

GFI Product Manual. Administrator Guide

GFI Product Manual. Administrator Guide GFI Product Manual Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,

More information

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide A P P L I C A T I O N V E R S I O N : 9. 0 Dear User! Thank you for choosing our product. We hope that this document will help

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

GFI Product Manual. Getting Started Guide

GFI Product Manual. Getting Started Guide GFI Product Manual Getting Started Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work

More information

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide APPLICATION VERSION: 9.0 MAINTENANCE RELEASE 1 Dear User! Thank you for choosing our product. We hope that this document will

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Kaspersky Security 8.0 for Microsoft Exchange Servers AD Administrator's Guide

Kaspersky Security 8.0 for Microsoft Exchange Servers AD Administrator's Guide Kaspersky Security 8.0 for Microsoft Exchange Servers AD Administrator's Guide P R O G R A M V E R S I O N : 8. 0 M A I N T E N A N C E P A C K 1 Dear User! Thank you for choosing our product. We hope

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0.2 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Installation and Configuration Guide. NetIQ Security and Compliance Dashboard

Installation and Configuration Guide. NetIQ Security and Compliance Dashboard Installation and Configuration Guide NetIQ Security and Compliance Dashboard June 2011 Legal Notice NetIQ Secure Configuration Manager is covered by United States Patent No(s): 5829001, 7093251. THIS DOCUMENT

More information

Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide

Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide APPLICATION VERSION: 8.0 MAINTENANCE RELEASE 2 CRITICAL FIX 1 Dear User! Thank you for choosing our product. We hope that this document

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

SAFETICA INSIGHT INSTALLATION MANUAL

SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

GFI MailArchiver for Exchange 4. Manual. By GFI Software

GFI MailArchiver for Exchange 4. Manual. By GFI Software GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as

More information

GFI Product Manual. Getting Started Guide

GFI Product Manual. Getting Started Guide GFI Product Manual Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

CA ARCserve Backup Patch Manager for Windows

CA ARCserve Backup Patch Manager for Windows CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Sophos for Microsoft SharePoint Help. Product version: 2.0

Sophos for Microsoft SharePoint Help. Product version: 2.0 Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

MailMarshal Exchange in a Windows Server Active/Passive Cluster

MailMarshal Exchange in a Windows Server Active/Passive Cluster MailMarshal Exchange in a Windows Server Active/Passive Cluster November, 2006 Contents Introduction 2 Preparation 3 Generic Resource Creation 4 Cluster MailMarshal Install 4 Antivirus Software 8 Known

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from

More information

Virtual Web Appliance Setup Guide

Virtual Web Appliance Setup Guide Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

GFI Product Manual. ReportPack Manual

GFI Product Manual. ReportPack Manual GFI Product Manual ReportPack Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008 ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12

1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12 Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied, including but

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

Understanding and Configuring Password Manager for Maximum Benefits

Understanding and Configuring Password Manager for Maximum Benefits Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password

More information

Kaspersky Security Center 10 Getting Started

Kaspersky Security Center 10 Getting Started Kaspersky Security Center 10 Getting Started A P P L I C A T I O N V E R S I O N : 1 0 M A I N T E N A N C E R E L E A S E 1 Dear User, Thank you for choosing our product. We hope that this document will

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation

More information

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment...

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment... Table of Contents Using This Guide... 9 Purpose and Intended Audience... 9 How to Use This Guide... 9 Conventions Used in This Guide... 10 Typographical Conventions... 10 Admonitions... 10 About Ad-Aware

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information

E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company

E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company E-mail Filter SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company CONTENTS CONTENTS INTRODUCTION About This Document...2 Product

More information

Getting Started Guide

Getting Started Guide GFI MailArchiver for Exchange Getting Started Guide By GFI Software Ltd. http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and

More information

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net All rights reserved. Redistribution

More information

ADMINISTRATOR'S GUIDE

ADMINISTRATOR'S GUIDE Kaspersky Security 8.0 for Microsoft Exchange Servers ADMINISTRATOR'S GUIDE P R O G R A M V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this document will help you in

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

MobileStatus Server Installation and Configuration Guide

MobileStatus Server Installation and Configuration Guide MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Administrator's Guide

Administrator's Guide Administrator's Guide BitDefender Management Server 3.6 Administrator's Guide Publication date 2014.09.12 Copyright 2014 BitDefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions. PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information

More information

Virtual Managment Appliance Setup Guide

Virtual Managment Appliance Setup Guide Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

PureMessage for Microsoft Exchange 2013 startup guide. Product version: 4.0

PureMessage for Microsoft Exchange 2013 startup guide. Product version: 4.0 PureMessage for Microsoft Exchange 2013 startup guide Product version: 4.0 Document date: June 2015 Contents 1 About this guide...4 2 Planning your PureMessage deployment...5 2.1 Deploying PureMessage

More information

Metalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015

Metalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015 Metalogix Replicator Quick Start Guide Publication Date: May 14, 2015 Copyright Metalogix International GmbH, 2002-2015. All Rights Reserved. This software is protected by copyright law and international

More information

AD Self-Service Suite for Active Directory

AD Self-Service Suite for Active Directory The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.

More information