Best Practices Revision A. McAfee Gateway 7.x Appliances

Save this PDF as:

Size: px
Start display at page:

Download "Best Practices Revision A. McAfee Email Gateway 7.x Appliances"

Transcription

1 Best Practices Revision A McAfee Gateway 7.x Appliances

2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Enterprise Mobility Management, Foundscore, Foundstone, McAfee NetPrism, McAfee Policy Enforcer, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, SmartFilter, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure, WormTraq are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Gateway 7.x Appliances Best Practices

3 Contents Preface 5 About this guide Audience Conventions What's in this guide Find product documentation Introduction 7 How to use this guide Using the McAfee Gateway 7.x troubleshooting tree Installation and initial configuration considerations 9 Pre-installation considerations Considerations for operating modes Considerations for cluster installations Considerations for blade server installations Considerations for virtual appliances Migrating from other products or versions Initial installation and setup considerations Initial configuration considerations Securing the appliance 21 Physically secure the hardware Setting up users and user roles Defining password policy Restricting remote access Securing the Mail Transfer Agent (MTA) Policy best practices 25 About policies Policy order Scanning order Configuration options Configuring policies Designing inbound and outbound policies Create user groups for inbound and outbound policies Setting Protocol presets for inbound messages Configuring LDAP for use with inbound mail Anti-virus considerations Anti-spam considerations Data Loss Prevention considerations Compliance dictionary considerations Encryption best practices 33 Server-to-server encryption McAfee Gateway 7.x Appliances Best Practices 3

4 Contents 6 System logging best practices 35 System logging best practices Using McAfee Gateway with other McAfee products 37 Using McAfee Gateway with McAfee epolicy Orchestrator Using McAfee Gateway with McAfee Quarantine Manager Index 39 4 McAfee Gateway 7.x Appliances Best Practices

5 Preface This guide provides you with information about best practices for setting up and configuring your McAfee Gateway appliance. Contents About this guide Find product documentation About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Security officers People who determine sensitive and confidential data, and define the corporate policy that protects the company's intellectual property. Conventions This guide uses the following typographical conventions and icons. Book title or Emphasis Title of a book, chapter, or topic; introduction of a new term; emphasis. Bold User input or Path Code Text that is strongly emphasized. Commands and other text that the user types; the path of a folder or program. A code sample. User interface Hypertext blue Words in the user interface including options, menus, buttons, and dialog boxes. A live link to a topic or to a website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. McAfee Gateway 7.x Appliances Best Practices 5

6 Preface Find product documentation Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. What's in this guide This guide is organized to help you find the information you need. This guide contains the following sections: Introduction Installation and initial configuration considerations Securing the appliance Policy considerations Encryption best practices Reporting and system logging best practices Using McAfee Gateway with other McAfee products Find product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. Task 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 6 McAfee Gateway 7.x Appliances Best Practices

7 1 1 Introduction This guide contains a collection of information, tips and techniques that can be considered "best practice" in relation to McAfee Gateway. The information is targeted at McAfee Gateway 7.0 and later. Some of the information contained within this guide does not apply to McAfee Gateway 6.7, and should not be applied to these systems. Contents How to use this guide Using the McAfee Gateway 7.x troubleshooting tree How to use this guide This guide is divided into chapters and topics around specific stages of installation and configuration, or around individual features or functions within McAfee Gateway. These chapters and topics deal with specific recommendations, and so may not necessarily be applicable in all cases. You should consider each suggestion in relation to your own requirements, networks, systems and configurations before implementing any changes to your McAfee Gateway. Using the McAfee Gateway 7.x troubleshooting tree McAfee support has published a troubleshooting tree to assist you in resolving issues that you might experience with your McAfee Gateway. Download the McAfee Gateway 7.x troubleshooting tree from KnowledgeBase article PD McAfee Gateway 7.x Appliances Best Practices 7

8 1 Introduction Using the McAfee Gateway 7.x troubleshooting tree 8 McAfee Gateway 7.x Appliances Best Practices

9 2 Installation 2 and initial configuration considerations Find best practice information relating to processes, configuration and tasks that you are likely to need during the installation and initial configuration stages of setting up your McAfee Gateway appliances. Contents Pre-installation considerations Initial installation and setup considerations Initial configuration considerations Pre-installation considerations Give consideration to the following areas before you start installing McAfee Gateway. Although some decisions that you make during the installation of your McAfee Gateway can be easily changed or adapted post installation, others may require significant or fundamental changes. It is best to understand the impact of some these significant changes before installing your McAfee Gateway. Before installing your McAfee Gateway, it is important to plan the installation and deployment. Consider the following: General guidelines to prepare your site. Overviews of general site requirements to prepare your computer room for the McAfee Gateway. This should include how you intend controlling the physical security of the McAfee Gateway, including access to the hardware on which the McAfee Gateway is running. Environmental requirements. Information on environmental site requirements, including temperature, airflow, and space requirements Power requirements and considerations. Power requirements and electrical factors that must be considered before installation Operating modes. How the McAfee Gateway connects into your network. Considerations for operating modes McAfee Gateway can be configured to work in one of several operating, or network modes. Before you install and configure your McAfee Gateway, you must decide which network mode to use. The mode you choose determines how you physically connect your appliance to your network. McAfee Gateway 7.x Appliances Best Practices 9

10 2 Installation and initial configuration considerations Pre-installation considerations You can choose from the following network modes: Transparent bridge mode The device acts as an Ethernet bridge. Transparent router mode The device acts as a router. Explicit proxy mode The device acts as a proxy server and a mail relay. Architectural considerations about network modes The main considerations regarding the network modes are: Whether communicating devices are aware of the existence of the device. That is, if the device is operating in one of the transparent modes. How the device physically connects to your network. The configuration needed to incorporate the device into your network. Where the configuration takes place in the network. Considerations before changing network modes In explicit proxy and transparent router modes, you can set up the device to sit on more than one network by setting up multiple IP addresses for the LAN1 and LAN2 ports. If you change to transparent bridge mode from explicit proxy or transparent router mode, only the enabled IP addresses for each port are carried over. After you select a network mode, McAfee recommends not changing it unless you move the device or restructure your network. Transparent bridge mode Use this information to better understand Transparent bridge mode on your McAfee Gateway. In transparent bridge mode, the communicating servers are unaware of the device the device s operation is transparent to the servers. Figure 2-1 Transparent bridge mode apparent data path In the figure, the external mail server (A) sends messages to the internal mail server (C). The external mail server is unaware that the message is intercepted and scanned by the device (B). The external mail server seems to communicate directly with the internal mail server the path is shown as a dotted line. In reality, traffic might pass through several network devices and be intercepted and scanned by the device before reaching the internal mail server. What the device does in transparent bridge mode In transparent bridge mode, the device connects to your network using the LAN1 and LAN2 ports. The device scans the traffic it receives, and acts as a bridge connecting two network segments, but treats them as a single logical network. 10 McAfee Gateway 7.x Appliances Best Practices

11 Installation and initial configuration considerations Pre-installation considerations 2 Configuration in transparent bridge mode Transparent bridge mode requires less configuration than transparent router and explicit proxy modes. You do not need to reconfigure all your clients, default gateway, MX records, Firewall NAT or mail servers to send traffic to the device. Because the device is not a router in this mode, you do not need to update a routing table. Where to place the device when using transparent bridge mode For security reasons, you must use the device inside your organization, behind a firewall. Figure 2-2 Positioning in Transparent bridge mode In transparent bridge mode, position the device between the firewall and your router, as shown. In this mode, you physically connect two network segments to the device, and the device treats them as one logical network. Because the devices firewall, device, and router are on the same logical network, they must all have compatible IP addresses on the same subnet. Devices on one side of the bridge (such as a router) that communicate with devices on the other side of the bridge (such as a firewall) are unaware of the bridge. They are unaware that traffic is intercepted and scanned, therefore the device is said to operate as a transparent bridge. Figure 2-3 Network structure Transparent bridge mode McAfee Gateway 7.x Appliances Best Practices 11

12 2 Installation and initial configuration considerations Pre-installation considerations Transparent router mode Use this information to better understand Transparent router mode on your McAfee Gateway. In transparent router mode, the device scans traffic between two networks. The device has one IP address for outgoing scanned traffic, and must have one IP address for incoming traffic. The communicating network servers are unaware of the intervention of the device the device s operation is transparent to the devices. What the device does in transparent router mode In transparent router mode, the device connects to your networks using the LAN1 and LAN2 ports. The device scans the traffic it receives on one network, and forwards it to the next network device on a different network. The device acts as a router, routing the traffic between networks, based on the information held in its routing tables. Configuration in transparent router mode Using transparent router mode, you do not need to explicitly reconfigure your network devices to send traffic to the device. You need only configure the routing table for the device, and modify some routing information for the network devices on either side of it (the devices connected to its LAN1 and LAN2 ports). For example, you might need to make the device your default gateway. In transparent router mode, the device must join two networks. The device must be positioned inside your organization, behind a firewall. Transparent router mode does not support Multicast IP traffic or non IP protocols, such as NETBEUI and IPX. Firewall rules In transparent router mode, the firewall connects to the physical IP address for the LAN1/LAN2 connection to the management blade. 12 McAfee Gateway 7.x Appliances Best Practices

13 Installation and initial configuration considerations Pre-installation considerations 2 Where to place the device Use the device in transparent router mode to replace an existing router on your network. If you use transparent router mode and you do not replace an existing router, you must reconfigure part of your network to route traffic correctly through the device. Figure 2-4 Network structure Transparent bridge mode You need to: Configure your client devices to point to the default gateway. Configure the device to use the Internet gateway as its default gateway. Ensure your client devices can deliver messages to the mail servers within your organization. Explicit proxy mode Use this information to better understand explicit proxy mode on your McAfee Gateway. In explicit proxy mode, some network devices must be set up explicitly to send traffic to the device. The device then works as a proxy or relay, processing traffic on behalf of the devices. Figure 2-5 Explicit proxy mode apparent data path Explicit proxy mode is best suited to networks where client devices connect to the device through a single upstream and downstream device. This might not be the best option if several network devices must be reconfigured to send traffic to the device. McAfee Gateway 7.x Appliances Best Practices 13

14 2 Installation and initial configuration considerations Pre-installation considerations Network and device configuration If the device is set to explicit proxy mode, you must explicitly configure your internal mail server to relay traffic to the device. The device scans the traffic before forwarding it, on behalf of the sender, to the external mail server. The external mail server then forwards the message to the recipient. In a similar way, the network must be configured so that incoming messages from the Internet are delivered to the device, not the internal mail server. The device scans the traffic before forwarding it, on behalf of the sender, to the internal mail server for delivery, as shown. For example, an external mail server can communicate directly with the device, although traffic might pass through several network servers before reaching the device. The perceived path is from the external mail server to the device. Protocols To scan a supported protocol, SMTP, POP3 or McAfee Secure Web Mail, you must configure your other network servers or client computers to route that protocol through the device, so that no traffic bypasses the device. Firewall rules Explicit proxy mode invalidates any firewall rules set up for client access to the Internet. The firewall sees only the physical IP address information for the device, not the IP addresses of the clients, so the firewall cannot apply its Internet access rules to the clients. Ensure that your firewall rules are updated. The firewall must accept traffic from McAfee Gateway, but must not accept traffic that comes directly from the client devices. Set up firewall rules to prevent unwanted traffic entering your organization. Where to place the device Configure the network devices so that traffic needing to be scanned is sent to the McAfee Gateway. This is more important than the location of the McAfee Gateway. The router must allow all users to connect to the McAfee Gateway. Figure 2-6 Positioning in Explicit proxy mode The McAfee Gateway must be positioned inside your organization, behind a firewall, as shown in Figure 6: Explicit proxy configuration. 14 McAfee Gateway 7.x Appliances Best Practices

15 Installation and initial configuration considerations Pre-installation considerations 2 Typically, the firewall is configured to block traffic that does not come directly from the device. If you are unsure about your network s topology and how to integrate the device, consult your network expert. Use this configuration if: The device is operating in explicit proxy mode. You are using (SMTP). For this configuration, you must: Configure the external Domain Name System (DNS) servers or Network Address Translation (NAT) on the firewall so that the external mail server delivers mail to the device, not to the internal mail server. Configure the internal mail servers to send messages to the device. That is, the internal mail servers must use the device as a smart host. Ensure that your client devices can deliver messages to the mail servers within your organization. Ensure that your firewall rules are updated. The firewall must accept traffic from the device, but must not accept traffic that comes directly from the client devices. Set up rules to prevent unwanted traffic entering your organization. Considerations for cluster installations Setting up and configuring clusters of McAfee Gateway appliances requires some special considerations. What is a cluster? McAfee Gateway can be configured so that several appliances can function as a single scanning system. This can be used to increase capacity, and can also provide improved redundancy in the event of hardware failure. Configuring a group of appliances as a cluster When configuring a group of appliances as a cluster, you need an IP address for each appliance, as well as a "virtual" address that is used to communicate with the currently active master appliance. Once operational, you should use the virtual IP address to communicate with the cluster. Configure all appliances within the cluster to use the same Cluster Identifier. If you are setting up multiple clusters on the same subnet, use the Cluster Identifier to specify the appliances within each cluster. Patch and hotfix versions for cluster installations All McAfee Gateway appliances within a cluster must be maintained with the same software, patch and hotfix versions. Apply updates to the failover master appliance, then the master appliance, and then to each scanning appliance in turn. Configuring master and failover master appliances to scan traffic If you have more than three McAfee Gateway appliances configured within a cluster of appliances, McAfee recommends that you disable scanning on the master appliances. McAfee Gateway 7.x Appliances Best Practices 15

16 2 Installation and initial configuration considerations Pre-installation considerations Considerations for blade server installations Setting up and configuring McAfee Content Security Blade Server requires some special considerations. The McAfee Gateway software can be installed onto a blade server system, to provide increased scanning capacity and redundancy or High Availability (HA) capabilities. When configuring a blade server, you will need an IP address for the master and the failover master blades, as well as a "virtual" address that is used by the currently active master blade. Once operational, you should use the virtual IP address to communicate with the blade server. Blade Server DHCP The scanning blades must all receive their IP addresses from the DHCP server within the blade server. Lock down the DHCP server within the blade chassis so that it only issues IP addresses to scanning blades with specified MAC addresses. To prevent any DHCP servers on your network from issuing IP addresses for the scanning blades, within the blade server, configure an Access Control List (ACL255) that drops all DHCP packets leaving the blade server. To prevent the on board DHCP server from issuing IP addresses to devices outside of the blade server, configure a second ACL (ACL256) to drop all DHCP packets entering the blade server. Set up the Access Control Lists by logging into the web interface for the blade server interconnect modules. Placement of blades within the blade server enclosure When installing blades into the blade server enclosure, the master management blade must be installed in slot 1, and the failover management blade must be installed in slot 2. When installing the scanning blades into the blade server enclosure, they should be placed in order, using first slot 3, then slot 4 and slot 5 until all your scanning blades are installed. Considerations for virtual appliances Setting up and configuring virtual instances of McAfee Gateway requires some special considerations. When considering the installation of virtual versions of McAfee Gateway, be aware of the following: McAfee Gateway Virtual Appliance works in the following virtual environments: VMware vsphere 4.x VMware vsphere Hypervisor (ESXi) 4.x VMware vsphere Hypervisor 5.x Ensure that your hardware meets the minimum specifications for running your virtual environment. See the VMware Knowledge Base article available from to get the minimum system requirements for VMware vsphere or VMware vsphere Hypervisor 4.x. You need a computer that has a 64 bit x86 CPU. 16 McAfee Gateway 7.x Appliances Best Practices

17 Installation and initial configuration considerations Pre-installation considerations 2 Ensure that the virtual machine for each McAfee Gateway Virtual Appliance meets the following minimum specification. Item Processor Available virtual memory Free hard disk space Specification Two virtual processors 2 GB 80 GB Ensure you have sufficient physical network interfaces for your chosen operating mode. These connections should be dedicated for use by the McAfee Gateway Virtual Appliance. Migrating from other products or versions You can migrate settings from McAfee and Web Security appliances version 5.6 and from McAfee Gateway version 6.7.x. Migration paths are available, allowing you to migrate from either McAfee and Web Security appliances version 5.6 or from McAfee Gateway version 6.7.x software, to McAfee Gateway version 7.x. Migrating from McAfee and Web Security appliances version 5.6 There are several supported methods that you can choose from to manage the process in the way that is best suited to your organization: From a McAfee Gateway 7.0 installation CD, perform a new installation and restore a configuration file from a previous version. From a McAfee Gateway 7.0 installation CD, perform an upgrade from a previous version retaining configuration and log files. To perform the upgrade from another location, obtain the McAfee Gateway 7.0 ISO image and upload it on to an McAfee and Web Security Appliance 5.6 using the Rescue Image feature (System System Administration Rescue Image.) Ensure you have the latest McAfee and Web Security Appliance 5.6 patch installed before migrating to McAfee Gateway 7.0. Migrating from McAfee Gateway 6.7.x Refer to McAfee Gateway to Migration Guide for detailed information about migrating from McAfee Gateway version 6.7.x. Differences between products View a brief summary of the differences between the products. Some of the major differences between McAfee and Web Security appliances, McAfee Gateway version 6.7.x and McAfee Gateway version 7.x are summarized in the following table: McAfee and Web Security appliances version 5.6 and web scanning capabilities McAfee Gateway version 6.7.x Dedicated scanning McAfee Gateway version 7.x Dedicated scanning No secure web mail Secure Web Mail available Secure Web Mail available Basic McAfee epo support Basic McAfee epo support Enhanced McAfee epo support Blade server support No blade server support Blade server support McAfee Gateway 7.x Appliances Best Practices 17

18 2 Installation and initial configuration considerations Initial installation and setup considerations McAfee and Web Security appliances version 5.6 No server to sever S/MIME and PGP encryption No 2nd AV engine McAfee Gateway version 6.7.x Server to sever S/MIME and PGP encryption 2nd AV engine is a purchasable option McAfee Gateway version 7.x Server to sever S/MIME and PGP encryption No 2nd AV engine available in McAfee Gateway 7.0 Initial installation and setup considerations Consider the physical installation requirements relating to McAfee Gateway. Depending on the choices made at the time McAfee Gateway was ordered, you might need to install physical hardware appliances, a blade server, or simply install a virtual McAfee Gateway appliance within your existing virtualized server environment. If you are installing physical hardware, observe all safety warnings and local and company procedures regarding the lifting of heavy equipment. Ensure that you secure access to any physical hardware that is used to host the McAfee Gateway software. Update the software McAfee Gateway hardware has the software pre installed on the machine. However, the software may not be up to date. McAfee recommends that you download the latest version of the McAfee Gateway software and install this on the appliance before you start configuring your system and policies. Setup wizard The initial setup is either carried out by logging into the user interface, or by running through the console from the monitor and keyboard attached to the appliance. Both methods provide you with the same options and choices. Select the most relevant setup path. The available options are: Standard Setup configures your McAfee Gateway in Transparent Bridge mode, selecting the most used options for you. Custom Setup provides you with additional options, such as selecting the required operating mode. Restore from a File you can export a configuration file from an existing McAfee Gateway appliance and use it as the basis for a new installation. epo Managed Setup configure your McAfee Gateway appliance to be managed by McAfee epolicy Orchestrator (McAfee epo ). Encryption Only Setup configure a McAfee Gateway appliance to act as an encryption server for other McAfee Gateway appliances. On the Password page of the setup wizard, make sure that you change the password from its default value. 18 McAfee Gateway 7.x Appliances Best Practices

19 Installation and initial configuration considerations Initial configuration considerations 2 Initial configuration considerations After you have installed your appliance and completed the initial setup steps, either from the console or within the setup wizard, ensure that you give consideration to the following initial configuration settings. Reverse lookup of the sender IP address By default, McAfee Gateway has the option to carry out the reverse lookup of the sender IP addresses disabled. Although enabling the reverse lookup of sender IP addresses can assist in confirming the identity of the message, carrying out this lookup introduces delays as McAfee Gateway queries the Domain Name Service (DNS) server to establish the sender IP address. If you encounter performance issues with your McAfee Gateway, ensure that reverse lookup of the sender IP address is disabled. The reverse lookup settings are found at: Configuration Receiving Permit and Deny Lists. Do not allow null senders, as valid senders usually have a genuine MAIL FROM: address To block messages that do not contain any sender information, go to Configuration Protocol Configuration Protocol Settings (SMTP). Deselect Allow null senders. Be aware that bounced messages might be rejected because they potentially have a null sender address. Do not scan messages that come from blacklisted IP addresses Enabling real time blackhole list (RBL) checks prevents messages that originate from blacklisted IP addresses from being scanned. McAfee recommends that you Reject, close and deny (Block) any messages that fail the RBL checks. The RBL settings are found at: Policies Spam Sender Authentication RBL Configuration. Third party real time blackhole lists You can configure your McAfee Gateway to use real time blackhole lists provided by third parties. However, be careful of using multiple RBL lists, as it will slow the performance as each address is checked against all of your configured RBL lists in turn. The RBL settings are found at: Policies Spam Sender Authentication RBL Configuration. Configuring Permit and Deny Lists If you configure long lists of permitted and blocked connections and senders, the time that the McAfee Gateway takes to resolve all the listed domain names and also carry out RBL checks on the client IP addresses will increase. If this time causes to great a delay, disable Resolve permitted / blocked hostnames to IP addresses from within Permitted and blocked senders. Permit and Deny lists are found at: Configuration Receiving Permit and Deny Lists McAfee Gateway 7.x Appliances Best Practices 19

20 2 Installation and initial configuration considerations Initial configuration considerations 20 McAfee Gateway 7.x Appliances Best Practices

21 3 3 Securing the appliance As the role of your McAfee Gateway is to secure your traffic, it makes sense that you must first secure the McAfee Gateway to protect it. Contents Physically secure the hardware Setting up users and user roles Defining password policy Restricting remote access Securing the Mail Transfer Agent (MTA) Physically secure the hardware Before turning your attention to securing access to the user interface for McAfee Gateway, ensure that you have secured access to the hardware. You should lock down access to the hardware that is used to run McAfee Gateway. This applies whether you are using a physical hardware appliance, a blade server, or if you are using a virtualized environment to run a McAfee Gateway Virtual Appliance. This can be achieved by locating the hardware in access controlled server rooms, or by locating it in cabinets that have doors on both the front and rear of the units that are kept locked. Setting up users and user roles Configure user and role access to the McAfee Gateway user interface. To secure access to the McAfee Gateway user interface, the software provides role based access control. This is achieved by defining required user roles, and then applying these user roles to individual users. Users and User Roles are managed from System Users Users and Roles. McAfee Gateway 7.x Appliances Best Practices 21

22 3 Securing the appliance Defining password policy User roles McAfee Gateway includes the following administrator roles by default: Super Administrator The Super Administrator role has access to all areas and settings within the McAfee Gateway user interface. Administrator The Administrator can access areas of the McAfee Gateway user interface concerned with based settings and queues. By default, Administrators can see the Dashboard, Reports, and Troubleshoot tabs within the user interface. Reports Administrator The Reports Administrator role only has access to areas of the user interface that allow the definition and running of reports. By default, the Reports Administrator can only see the Dashboard and Reports tabs within the user interface. You can create additional administrator roles, and can define the access rights for each new role. Users McAfee Gateway includes an admin user account. This default user account has full Super Administrator rights. McAfee recommends that you create additional Users, with access restricted to specific areas of functionality within McAfee Gateway. At a minimum, create an Administrator user, and a Reports Administrator user, using the default user roles. You can create additional Users and User Roles as required within your organization. Defining password policy Configure the required level of password complexity and change control when accessing McAfee Gateway. Many organizations have standards for the required levels of password complexity and requirements for changing passwords on a regular basis for critical infrastructure systems. McAfee Gateway enables you to define the required levels of password complexity and how often passwords are changed for the appliance. These password complexity and change control settings are found at Management. System Users Password Configure these settings in line with your own corporate policies. Restricting remote access Lock down how administrators access the McAfee Gateway user interface. In addition to creating Users and User Roles to restrict access to different areas of the McAfee Gateway user interface, McAfee also recommends that you restrict how administrators remotely access the appliance. Settings relating to restricting remote access are found at Access. System Appliance Management Remote 22 McAfee Gateway 7.x Appliances Best Practices

23 Securing the appliance Securing the Mail Transfer Agent (MTA) 3 Using Secure Shell (SSH) You can specify that administrators must use a Secure Shell client to access McAfee Gateway. In addition, you can either allow SSH access from all hosts or networks, or to restrict access to specific hosts or networks. Using User interface access configuration restrictions By default, access to McAfee Gateway is restricted to a management port, by default 10443, from any host or network that can reach the appliance. You can configure access so that only specific hosts or networks can be used to access McAfee Gateway. Using out of band (OOB) management If your organization uses a separate management network to manage and control security devices, you can configure out of band management. In this configuration, the management of McAfee Gateway is carried out on a separate network to the ones used to carry traffic to be scanned by the appliance. Before you enable out of band management, ensure that you have connected your McAfee Gateway to the management network using either the dedicated out of band Network Interface on the appliance (if applicable) or via a USB Ethernet adaptor. Failure to connect the appliance to the defined management network could result in you being unable to access the McAfee Gateway user interface. Securing the Mail Transfer Agent (MTA) McAfee Gateway includes an inbuilt Mail Transfer Agent (MTA). Take steps to secure the MTA to prevent the appliance being used to send out spam messages. Configure anti relay Configure the anti relay settings for your McAfee Gateway to prevent your appliance from being used as an open relay by third parties to send spam messages. Anti relay settings are found at Configuration Receiving Anti Relay Settings. Ensure that you define your local domains, as well as the domains from which you want to permit relaying, and that you want to deny relaying. Defining a domain as a Permitted domain ensures that traffic from that domain is always allowed to be relayed. Defining a domain as a Denied domain ensures that traffic from that domain is not allowed to be relayed, unless overridden by the Permitted connections list. Defining a domain as a Local domain ensures that traffic from that domain is always allowed to be relayed, unless overridden by the Denied connections list. McAfee Gateway 7.x Appliances Best Practices 23

24 3 Securing the appliance Securing the Mail Transfer Agent (MTA) 24 McAfee Gateway 7.x Appliances Best Practices

25 4 Policy 4 best practices Find best practice information relating to configuring policies within McAfee Gateway. Contents About policies Scanning order Configuration options Configuring policies About policies McAfee Gateway uses policies to enable you to define your scanning requirements. Two classes of policy are used within McAfee Gateway: Scanning policies Protocol presets Scanning policies use both connection attributes and conversation attributes, whereas protocol presets only use connection attributes to match against. About scanning polices You can create multiple scanning policies, which are applied in a top down order until a match is found against either connection or conversation attributes of the message being scanned. When a match is found, the actions configured within the matching policy are applied. If no match is found, the message then passes to the next listed policy. If no other policies match, the actions configured within the default policy are applied. Like protocol presets, scanning policies are initially determined at connection. However, scanning policies are then re evaluated at points during the SMTP conversation, including the MAIL FROM, RCPT TO and DATA phases of the conversation. When the McAfee Gateway receives and message that is being sent to multiple recipients within the organization, the appliance checks the policies that apply to each recipient. If different policies apply to different recipients, the message is split, so that the correct policies are applied to the message for each recipient. About protocol presets Protocol presets enable you to create policies against the connection attributes for each message. These policies are useful for creating rules for particular offices or groups within your organization. For example, they allow you to configure one policy for your marketing department, and a different policy for your sales team. McAfee Gateway 7.x Appliances Best Practices 25

26 4 Policy best practices Scanning order Using protocol presets, you can create individual settings for coming to or from different domains, IP addresses or other connection criteria. For example, you can configure address masquerading and aliases, based on the domain or IP address. Policy order The order in which the scanning policies appear within the McAfee Gateway user interface dictates the order that they are used to scan messages. McAfee Gateway uses a "top down" approach when scanning messages; policy attributes are evaluated, starting at the top most policy and working down the policy list until a complete match is found. The settings for the matching policy are then applied. You should order your policies so that the most specific policies are listed at the top of the page, and then reduce down to the default policy, which is the least specific. You cannot change the position of the default policy in the policy list. Scanning order To get the most from your McAfee Gateway, it helps to understand the order in which scanning happens. To get maximum performance from your McAfee Gateway, it's important to block as many messages as possible before the scanning phase. Resource intensive checks like anti virus scanning, content scanning and anti spam scanning all occur at later stages in the scanning process. There are a number of options that you can set to reduce the number of messages that are passed for scanning. Figure 4-1 Order of phases and checks performed before scanning takes place Using all these checks provides optimum protection and usage of the appliance's resources because most of the bad content and messages are dropped or blocked before the scanning phase. 26 McAfee Gateway 7.x Appliances Best Practices

27 Policy best practices Configuration options 4 Configuration options McAfee Gateway provides many options for configuring settings. These are grouped into Protocol Configuration options, Receiving options and Sending options. Protocol Configuration Timeouts Usually, you do not need to change any of the values for the Timeouts settings. However, if, for example, you find that you experience issues with messages timing out when being sent from a remote office, or from a home worker that has a slow internet connection, you can create a protocol preset based on the IP address (or range of IP addresses) used by that office, and can then increase the timeout values for messages coming from the specified connections. Prevent connections to the firewall being blocked In some network layouts, it is possible that the connection between McAfee Gateway and your firewall can be blocked. To prevent this issue, navigate to: Configuration Receiving Permit and Deny Lists. Add the IP address for your firewall to the Permitted connections list. Define the Non Delivery Report (NDR) period By default, the NDR period configured within McAfee Gateway is 108 hours (4.5 days.) To change this NDR period, navigate to Configuration Sending Queued delivery. Adjust Time before an NDR is issued to an appropriate interval to suit your requirements. Configuring policies When setting up the scanning policies for McAfee Gateway, give consideration to what you are trying to achieve. Where possible, keep your policies simple. Use the optional Description fields to document the reasons and objectives for creating each policy; this helps when trying to diagnose problems with policies not working as you expect. McAfee Gateway enables you to create policies for Inbound and Outbound messages. You can create multiple policies of each type, and then order them so that the most specific policies appear at the top of the list of policies, and the least specific (the Default policy) appears at the bottom of the list. See also How McAfee Gateway processes mail traffic through your network on page 29 McAfee Gateway 7.x Appliances Best Practices 27

28 4 Policy best practices Configuring policies Designing inbound and outbound policies Create policies to protect both your inbound and outgoing messages. Inbound policy connections When designing policies to protect your inbound messages, depending on your network and McAfee Gateway configurations, you base them on the following connections: Source IP address Incoming network connection Destination IP address Outgoing network connection Sender address Source host name Masqueraded sender address Destination host name Recipient address Source network group Recipient address list Destination network group Aliased recipient address User group Aliased recipient address list LDAP Query VLAN identifier Policy rules Not all of these options make sense when creating general purpose policies, but may be useful when dealing with, for example, specific types of unsolicited bulk (spam) messages. Outbound policy connections When designing policies to protect your outgoing messages, you typically have different concerns than when designing inbound policies. You are less likely to be concerned about outgoing spam messages, but may be worried about important company documents being sent outside of your organization without the relevant approval. You can configure policies for Data Loss Prevention (DLP) to stop this happening. You have a similar list of connection types to those you use for your inbound connections. 28 McAfee Gateway 7.x Appliances Best Practices

29 Policy best practices Configuring policies 4 How McAfee Gateway processes mail traffic through your network This information describes how McAfee Gateway processes mail traffic through your internal and external networks. Mail traffic flow Within McAfee Gateway, all messages originating from outside of your organization are considered Inbound, and all messages leaving your organization are considered to be Outbound. Figure 4-2 flow into and out of your organization Create user groups for inbound and outbound policies You create users groups within McAfee Gateway that can be applied to your policies. Creating user groups is a simple way of providing input information to your policies. By creating different user groups, you can then create policies that can be tailored to the requirements of each group. For example, for outbound policies, you could decide to create user groups for specific teams or functions within your organization. You may have a group for your marketing team, another group for your sales team, and further groups for your Customer Support and Purchasing teams. Once you have defined your user groups, you can then create policies for each. McAfee Gateway 7.x Appliances Best Practices 29

30 4 Policy best practices Configuring policies User groups can be created from within the Policies Add Policy... dialog box, or from Group Management Senders and Recipients. You can define your user groups by Sender Address, Recipient Address or, if configured, by LDAP Query. In addition to basing your user groups of these criteria, you can choose from several different types of match logic. These include: is is not is like is not like Using the "not" values allow you create exception rules; rules that apply to users not included in other groups. Setting Protocol presets for inbound messages Using protocol presets for your inbound traffic allows you to tailor your recipient authentication for specific inbound connection types. Protocol presets are a special type of policy that is only concerned with information relating to the connection settings of incoming messages, not their content or other information. Protocol presets can be configured from Authentication. Configuration Receiving Recipient Depending on the configuration of your McAfee Gateway and your network, the following connection types are available for you to use to define protocol presets: Source IP address Source host name Destination IP address Destination host name VLAN Identifier Source network group Incoming network connection Destination network group Outgoing network connection Policy rules Configuring LDAP for use with inbound mail By querying a Lightweight Directory Access Protocol (LDAP) server, you can configure policies to ensure that you only receive inbound for genuine users within your organization. Use the Directory Service wizard to set up a connection between the appliance and an LDAP server so that the attributes in the LDAP server define behavior in your flow. You can therefore define policies, and update your LDAP to change behavior. You can modify the following features in the appliance to work with LDAP: Recipient Authentication Address Masquerading Policy selection Delivery routes 30 McAfee Gateway 7.x Appliances Best Practices

31 Policy best practices Configuring policies 4 Custom queries can be created for use in policy selection using the Add Query option in the Add Directory Service wizard. Configure the LDAP servers to be queried by your McAfee Gateway from Management Directory Services Group Anti-virus considerations For most applications, keeping the majority of the anti virus settings at their default values will give the best security and performance balance. McAfee carefully tune the anti virus settings on all their products to give the best balance between security and performance. McAfee recommends that you do not change these settings unless advised by your McAfee support representative. Anti-spam considerations Anti spam settings can be tuned to better suit your specific requirements within your own environment. Apply the following best practices when configuring your anti spam settings. Track spam messages using spam score indicators Add spam score indicator to all messages, and attach a spam report to all messages. They help track messages and determine your action against spam messages. Drop spam messages Drop items with a spam score of 10 or higher. Such items are almost certainly spam messages. Limit the spam scores when quarantining messages If you want to quarantine items, limit the spam score to no more than 10. Spam scores over 10 are almost certainly spam messages, and quarantining them increases the disk usage needed by the quarantine database. Do not change the default maximum message size parameters Keep the default maximum message size for scanning. Increasing the maximum message size increases the scanning resources used by McAfee Gateway, decreasing the overall system performance. Data Loss Prevention considerations Follow the suggestions when configuring and using Data Loss Prevention (DLP). Apply the following best practices when configuring your Data Loss Prevention settings. DLP and Compliance Regularly back up your configuration When using Data Loss Prevention within yourmcafee Gateway, ensure that you regularly back up your McAfee Gateway. Ensure that you include the DLP database in your backups. McAfee Gateway 7.x Appliances Best Practices 31

32 4 Policy best practices Configuring policies Configure DLP for outbound policies DLP is concerned with preventing important or confidential information from leaving your corporate environment. Only configure the DLP settings within outbound policies. Configure multiple policies When using DLP, it is easier to create separate policies for each user group, than it is to design a single policy that caters for the needs of several groups of users. Tune the Document match percentage You can specify the percentage of the original registered document which must be seen in order to trigger DLP. For example, if the Document match percentage is set to 80% (the default setting), a 100 page document will need to match at least 80 pages before it is detected as a match. Using the same setting, a 10 page document needs to match eight pages to be detected as a match. If the Document match percentage is set too low, you increase the number of detections made, and also increase the number of false positive detections. Over a period of time, you should tune the Document match percentage so that you achieve an acceptable balance between the number of genuine detections and the number of false positive detections being made. Tune the number of consecutive signatures needed to trigger a detection By configuring the number of consecutive signatures within the Data Loss Prevention settings, you can tune how McAfee Gateway detects small sections of original content, regardless of the size of the documents. The algorithms used in DLP involve text normalization, common word removal, and signature generation. An approximate guide is that one signature represents eight words of text after common words have been removed. These figures offer a guideline only. By default, this is disabled. Compliance dictionary considerations McAfee Gateway includes a number of compliance dictionaries that assist you in enforcing regulatory compliance. Use compliance scanning to assist with conformance to regulatory compliance and corporate operating compliance. You can choose from a library of predefined compliance dictionaries, or create your own dictionaries and rules specific to your organization. When searching the default set of compliance dictionaries, you can use the Language drop down list to sort the list into your preferred language. This causes any compliance dictionaries that are language specific to be sorted into that language order. It does not add or remove dictionaries that appear in different languages. Before creating your own dictionaries and rules, check that suitable dictionaries do not already exist within McAfee Gateway. 32 McAfee Gateway 7.x Appliances Best Practices

33 5 Encryption 5 best practices McAfee Gateway includes several forms of encryption. Configure the options most suited to your corporate requirements. McAfee Gateway can be configured to provide server to server encryption using Transport Layer Security (TLS). It can also be configured to encrypt the content of messages using Secure Multipurpose Internet Mail Extensions (S/MIME), PGP, and Secure Web Mail using either Push or Pull encryption. Most forms of encryption require the exchanging of certificates to enable both parties to encrypt/ decrypt either the server to server communications, or the messages themselves. Encryption only McAfee Gateway If you require all of your outgoing traffic to be encrypted, consider setting up a McAfee Gateway as an encryption only appliance. In this configuration, you direct the output of all your scanning appliances to the encryption only appliance. This has the benefit of removing the load of both encryption and scanning from a single appliance. Server-to-server encryption Use TLS to secure your server to server communications. McAfee Gateway uses SMTP over TLS to secure the communication layer between servers. Transport Layer Security works by communicating a set of parameters known as the handshake at the start of the connection process. Once these parameters have been defined, the communications that follow within that session are secure, in that they cannot be decoded by servers that did not partake in the handshake. The process includes steps to discuss the ciphers to be used during the communications, and also authentication steps to prove the identity of the servers taking part in the communications. The handshake process includes the following main steps: The McAfee Gateway requests a secure connection to the receiving server and presents a list of cipher suites to the receiving server. The receiving server then selects the strongest supported cipher from that list, and then notifies the McAfee Gateway of the chosen cipher. The servers then use Public Key Infrastructure (PKI) to establish their authenticity. This is achieved by the exchanging of digital certificates. On occasions, these digital certificates may be validated against the Certificate Authority (CA) that issued the certificates. McAfee Gateway 7.x Appliances Best Practices 33

34 5 Encryption best practices Server-to-server encryption Using the server's public key, McAfee Gateway generates a random number as a session key, and sends it to the receiving server. The receiving server then decrypts this session key using its private key. Both the McAfee Gateway and the receiving server then use this encrypted session key to set up communications, completing the handshake process. Once the handshake has been completed, the secure connection is used to transfer the messages. The connection remains secure until the connection is closed. Configuring TLS Encryption TLS When configuring communications between servers that you know to use TLS, select Always from the Use TLS dropdown list. This will typically be used between different servers within your own organization, or with customers, partners or suppliers that you have regular contact with. To set up TLS, you must exchange TLS certificates and import them into McAfee Gateway. 34 McAfee Gateway 7.x Appliances Best Practices

35 6 System 6 logging best practices System logging enables you to monitor your McAfee Gateway, so that you can take any required remedial actions to ensure that optimal performance is maintained. System logging best practices Understand the benefits and limitations of system logging on McAfee Gateway. Logging system events is a useful way of ensuring that your McAfee Gateway is performing at optimal levels. It is also useful when diagnosing and rectifying issues with your McAfee Gateway. Use an off box syslog server McAfee Gateway can be configured to hold system logs of a limited size on its own hard disk drives. Due to these size limits, the appliance only holds a relatively small amount of log information before it starts overwriting the oldest data. Configuring the McAfee Gateway to use an off box system logging server enables you to hold more detailed information covering longer time periods. Also, this information can be easily analyzed by third party system monitoring software. Configure off box logging from: System Logging, Alerting and SNMP System Log Settings What events to log You should configure your logging so that you can monitor the basic functioning of your McAfee Gateway. McAfee recommends you log high severity protocol and communication events under normal circumstances. Then, if you suspect that your McAfee Gateway is performing at less than its optimal level, you should enable more detailed logging to assist you in identifying and correcting any issues that may occur. Depending on your circumstances, you can increase the logging levels to either middle and high severity protocol and communication events or all protocol and communication events. Lowering the level of logging displays a notification warning you that increasing the number of events being logged could have a negative impact on system performance. Select the events to log at: System Logging, Alerting and SNMP Logging Configuration McAfee Gateway 7.x Appliances Best Practices 35

Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances

Installation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances Installation Guide Revision B McAfee Email Gateway 7.x Virtual Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances

Administrators Guide Revision A. McAfee Email Gateway 7.5.0 Appliances Administrators Guide Revision A McAfee Email Gateway 7.5.0 Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee SaaS Email Archiving

McAfee SaaS Email Archiving User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee SiteAdvisor Enterprise 3.5 Patch 2

McAfee SiteAdvisor Enterprise 3.5 Patch 2 Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide

McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee MOVE AntiVirus 2.6.0

McAfee MOVE AntiVirus 2.6.0 Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Data Loss Prevention 9.3.0

McAfee Data Loss Prevention 9.3.0 Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2007

Setup Guide. Email Archiving for Microsoft Exchange Server 2007 Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6 Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2010

Setup Guide. Email Archiving for Microsoft Exchange Server 2010 Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Product Guide Revision A. McAfee Web Reporter 5.2.1

Product Guide Revision A. McAfee Web Reporter 5.2.1 Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Endpoint Encryption for Files and Folders 4.2

McAfee Endpoint Encryption for Files and Folders 4.2 Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee(R) Email and Web Security Virtual Appliance 5.6 Installation Guide

McAfee(R) Email and Web Security Virtual Appliance 5.6 Installation Guide McAfee(R) Email and Web Security Virtual Appliance 5.6 Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Migration Guide Revision A. McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x

Migration Guide Revision A. McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x Migration Guide Revision A McAfee Email and Web Security 5.6 - McAfee Web Gateway 7.x COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Email Gateway 7.6.400 VMtrial Appliances

McAfee Email Gateway 7.6.400 VMtrial Appliances Installation Guide Revision D McAfee Email Gateway 7.6.400 VMtrial Appliances COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0 Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

McAfee Client Proxy 1.0.0 Software

McAfee Client Proxy 1.0.0 Software Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Content Security Reporter 1.0.0 Software

McAfee Content Security Reporter 1.0.0 Software Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

Virtualization Guide. McAfee Vulnerability Manager Virtualization

Virtualization Guide. McAfee Vulnerability Manager Virtualization Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0

Product Guide Revision A. McAfee Data Loss Prevention Endpoint 9.3.0 Product Guide Revision A McAfee Data Loss Prevention Endpoint 9.3.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software

Installation Guide. McAfee epolicy Orchestrator 5.0.0 Software Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee MOVE AntiVirus (Agentless) 3.6.0

McAfee MOVE AntiVirus (Agentless) 3.6.0 Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee SaaS Endpoint Protection 6.0

Installation Guide. McAfee SaaS Endpoint Protection 6.0 Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2 Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Setup Guide Revision A. WDS Connector

Setup Guide Revision A. WDS Connector Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee

More information

CipherMail Gateway Quick Setup Guide

CipherMail Gateway Quick Setup Guide CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Symantec Messaging Gateway 10.0 Installation Guide. powered by Brightmail

Symantec Messaging Gateway 10.0 Installation Guide. powered by Brightmail Symantec Messaging Gateway 10.0 Installation Guide powered by Brightmail The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of

More information

Administration Guide Revision A. SaaS Email Protection

Administration Guide Revision A. SaaS Email Protection Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Product Guide. McAfee Security for Microsoft Exchange 8.0.0

Product Guide. McAfee Security for Microsoft Exchange 8.0.0 Product Guide McAfee Security for Microsoft Exchange 8.0.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course The McAfee Firewall Enterprise System Administration course from McAfee University is a fast-paced,

More information

McAfee VirusScan Enterprise for Storage 1.1.0

McAfee VirusScan Enterprise for Storage 1.1.0 Product Guide McAfee VirusScan Enterprise for Storage 1.1.0 For use with epolicy Orchestrator 4.5.7, 4.6.x, 5.0.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Installation Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

Installation Guide. McAfee Vulnerability Manager 7.5

Installation Guide. McAfee Vulnerability Manager 7.5 Installation Guide McAfee Vulnerability Manager 7.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism,

More information

McAfee Endpoint Encryption 7.0

McAfee Endpoint Encryption 7.0 Product Guide McAfee Endpoint Encryption 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee

More information

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4

More information

Administration Guide Revision E. SaaS Email Protection

Administration Guide Revision E. SaaS Email Protection Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Installation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Installation Guide. McAfee SaaS Endpoint Protection

Installation Guide. McAfee SaaS Endpoint Protection Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Client Proxy 2.0

McAfee Client Proxy 2.0 Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

CYAN SECURE WEB APPLIANCE. User interface manual

CYAN SECURE WEB APPLIANCE. User interface manual CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network

More information

Administration Guide Revision E. Account Management. For SaaS Email and Web Security

Administration Guide Revision E. Account Management. For SaaS Email and Web Security Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software Product Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee EETech for Mac 6.2 User Guide

McAfee EETech for Mac 6.2 User Guide McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

epolicy Orchestrator Log Files

epolicy Orchestrator Log Files Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes Email Security SonicWALL Email Security 7.3.2 Appliance Release Notes System Compatibility SonicWALL Email Security 7.3.2 is supported on the following SonicWALL Email Security appliances: SonicWALL Email

More information

Installation Guide Revision A. McAfee Web Gateway 7.4.0

Installation Guide Revision A. McAfee Web Gateway 7.4.0 Installation Guide Revision A McAfee Web Gateway 7.4.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with

More information

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software

Product Guide. McAfee epolicy Orchestrator 5.0.0 Software Product Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Network Security Platform 7.5

Network Security Platform 7.5 M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document

More information

McAfee Email Gateway 7.0 Appliances

McAfee Email Gateway 7.0 Appliances Installation Guide McAfee Email Gateway 7.0 Appliances COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Guardian Digital Secure Mail Suite Quick Start Guide

Guardian Digital Secure Mail Suite Quick Start Guide Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Product Guide. McAfee SaaS Endpoint Protection 5.2.0

Product Guide. McAfee SaaS Endpoint Protection 5.2.0 Product Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

McAfee Policy Auditor 6.2.0 software Installation Guide

McAfee Policy Auditor 6.2.0 software Installation Guide McAfee Policy Auditor 6.2.0 software Installation Guide COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in

More information

QUICK START GUIDE. Cisco C170 Email Security Appliance

QUICK START GUIDE. Cisco C170 Email Security Appliance 1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance

More information

Email Security 7.4 Administrator s Guide

Email Security 7.4 Administrator s Guide Email Security 7.4 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

SonicWALL Email Security Appliance Administrator Guide

SonicWALL Email Security Appliance Administrator Guide SonicWALL Email Security Appliance Administrator Guide Version 7.3 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Part Number:

More information

Trend Micro Email Encryption Gateway 5

Trend Micro Email Encryption Gateway 5 Trend Micro Email Encryption Gateway 5 Secured by Private Post Quick Installation Guide m Messaging Security Trend Micro Incorporated reserves the right to make changes to this document and to the products

More information