Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Sophos UTM Web Application Firewall for Microsoft Exchange connectivity"

Transcription

1 How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services through the Web Application Firewall. Configuring your Exchange server is outside the scope of this guide; This article assumes you ve already setup your Microsoft Exchange environment for remote connectivity by enabling Basic authentication (as the primary or additional authentication method) for OWA, ECP, Outlook Anywhere, OAB, EWS and Autodiscover and that you have copies of your public SSL certificates available in PFX format. Please note: This guide assumes passthrough authentication is going to be used for the Exchange servers. Should you wish to authenticate to the Exchange servers directly, please make sure you disable all authentication methods other than Basic Authentication on the Exchange servers. Failure to do so will result in authentication problems that might cause logged in users to lose their sessions, authentication to fail or session management errors. Known to apply to the following Sophos product(s) and version(s) Sophos UTM 9.2 Operating systems Microsoft Windows Server , Microsoft Exchange

2 What To Do A. Import the required certificates 1. Go to the Webserver Protection menu in the UTM Web admin console and select Certificate Management 2. Click New Certificate and select Upload in the Method: dropdown box 3. Fill in a name, the required password and a comment (if needed) 4. Click the folder next to the upload field to select the PFX file you wish to import 5. Click save to upload the PFX and complete the import B. Optional: Import the root Certificate In case your PFX file does not include the root certificate you need to manually import it in order for the UTM to be able to use it. 1. Go to certificate management and navigate to the Certificate Authority tab. 2. Click the Import CA button and fill in the name, description and type (this should usually be Verification CA ) 3. Click the folder next to the upload field to select the certificate to upload (both PFX and CER format are supported) 4. Click save to upload the certificate and complete the import

3 C. (Optional) Configure Active Directory and Exchange IIS Depending on your preference regarding user logon (either using their username and password, their UPN and password or their address and password) one might need to configure some additional settings in either AD or the IIS on the Exchange backend(s). Username + Password style Sophos UTM assumes the default domain name is known to the backend server when using AD integrated authentication. As a result it will delegate just the username and password to the backend systems, where Exchange expects a login to contain a domain\username format. In a single-domain environment, this limitation can be worked around by setting the default domain on IIS, which will then prefix all logins with this domain name. 1. Login to your Exchange server(s) using remote desktop 2. Open the Internet Information Server (IIS) console 3. Navigate to the website that currently hosts your Exchange services and select the first virtual directory used by Exchange (this is normally Autodiscover ) 4. Open the Authentication applet in the IIS section 5. Select Basic Authentication from the list and click Edit in the right-hand Actions pane 6. Fill in the desired default domain name in the Default domain: filed and click OK to save 7. Repeat the above steps for every Exchange service in IIS and for every Exchange CAS server in your organization.

4 D. (Optional) Configuring authentication services Depending on the desired style of authentication, one has to either create at least one Active Directory authentication server (for the username + password style) or one LDAP authentication server (for UPN based authentication) in UTM. Active Directory (Username + password style) 1. Go to the Users & Definitions menu in the UTM Web admin console and select Authentication Services 2. Navigate to the Servers tab and click the New Authentication Server button 3. Select Active Directory from the Backend dropdown 4. If you have multiple backend of a similar type, use the Position dropdown menu to determine the place in the availability hierarchy (if the server in position 1 is unavailable UTM will automatically failover to the server in position2 and so forth) 5. Next select the backend server by either clicking the folder icon and clicking and dragging the relevant server into the Server: field, or by clicking the + icon to define a new host. 6. (Optional) Tick the SSL checkbox to enable SSL connectivity to your AD server 7. (Optional) The Port: field will be automatically filled out with the relevant default TCP port, but if needed this can be customized by entering the actual port in the Port: field 8. Enter the name of the (service) account the UTM may use to connect to Active Directory in the Bind DN: field. Both the domain\username and the LDAP object (CN=username,DC=domain,DC=local) are supported here, though the latter can reduce the amount of DNS and AD queries in high-load environments. 9. Enter the relevant password for the account in the Password: field 10. (Optional) Click the Test button to verify whether UTM can reach the backend server and if the supplied user and credentials are accepted by AD. 11. (Optional) Fill out the Base DN: field to define at which level UTM should start querying AD (for example CN=Users,DC=domain,DC=local). It is recommended to set this value to reduce query length, duration and recursion to improve lookup times. 12. Click Save to store the configured backend server and continue

5 LDAP (UPN + password style) 1. Go to the Users & Definitions menu in the UTM Web admin console and select Authentication Services 2. Navigate to the Servers tab and click the New Authentication Server button 3. Select LDAP from the Backend dropdown 4. If you have multiple backend of a similar type, use the Position dropdown menu to determine the place in the availability hierarchy (if the server in position 1 is unavailable UTM will automatically failover to the server in position2 and so forth) 5. Next select the backend server by either clicking the folder icon and clicking and dragging the relevant server into the Server: field, or by clicking the + icon to define a new host. 6. (Optional) Tick the SSL checkbox to enable SSL connectivity to your LDAP server 7. (Optional) The Port field will be automatically filled out with the relevant default TCP port, but if needed this can be customized by entering the actual port in the Port: field 8. Enter the name of the (service) account the UTM may use to connect to Active Directory in the Bind DN: field. Both the domain\username and the LDAP object (CN=username,DC=domain,DC=local) are supported here, though the latter can reduce the amount of DNS and AD queries in high-load environments. 9. Enter the relevant password for the account in the Password: field 10. (Optional) Click the Test button to verify whether UTM can reach the backend server and if the supplied user and credentials are accepted by AD. 11. Select > from the User Attribute: dropdown menu to authenticate based on a custom attribute 12. Enter userprincipalname (case sensitive) in the Custom: field to enable UTM to authenticate based on UPN 13. (Optional) Fill out the Base DN: field to define at which level UTM should start querying AD (for example CN=Users,DC=domain,DC=local). It is recommended to set this value to reduce query length, duration and recursion to improve lookup times. 14. Click Save to store the configured backend server and continue

6 LDAP ( address + password style) 1. Go to the Users & Definitions menu in the UTM Web admin console and select Authentication Services 2. Navigate to the Servers tab and click the New Authentication Server button 3. Select LDAP from the Backend dropdown 4. If you have multiple backend of a similar type, use the Position dropdown menu to determine the place in the availability hierarchy (if the server in position 1 is unavailable UTM will automatically failover to the server in position2 and so forth) 5. Next select the backend server by either clicking the folder icon and clicking and dragging the relevant server into the Server: field, or by clicking the + icon to define a new host. 6. (Optional) Tick the SSL checkbox to enable SSL connectivity to your LDAP server 7. (Optional) The Port field will be automatically filled out with the relevant default TCP port, but if needed this can be customized by entering the actual port in the Port: field 8. Enter the name of the (service) account the UTM may use to connect to Active Directory in the Bind DN: field. Both the domain\username and the LDAP object (CN=username,DC=domain,DC=local) are supported here, though the latter can reduce the amount of DNS and AD queries in high-load environments. 9. Enter the relevant password for the account in the Password: field 10. (Optional) Click the Test button to verify whether UTM can reach the backend server and if the supplied user and credentials are accepted by AD. 11. Select > from the User Attribute: dropdown menu to authenticate based on a custom attribute

7 12. Enter mail (case sensitive) in the Custom: field to enable UTM to authenticate based on the user s primary address 13. (Optional) Fill out the Base DN: field to define at which level UTM should start querying AD (for example CN=Users,DC=domain,DC=local). It is recommended to set this value to reduce query length, duration and recursion to improve lookup times. 14. Click Save to store the configured backend server and continue

8 E. (Optional) Creating the Reverse authentication profiles As mentioned in the introduction, this guide assumes reverse authentication with passthrough is going to be used for all published services. If you should not wish to do so, please skip this section. Since Exchange uses two distinct modes of authentication (Forms-based logon and HTTP 401 authentication messages) for improved user experience (user-facing services such as OWA use a form, application-facing services such as Outlook Anywhere use HTTP 401) we ll need to create two separate Reverse authentication profiles to match this desired authentication scheme. Basic authentication with passthrough This is the profile that will be used to supplant all HTTP 401 authentication interfaces used by Exchange. 1. Go to the Webserver Protection menu in the UTM Web admin console and select Reverse Authentication 2. Click the New Authentication Profile button on the Profiles tab 3. Fill in a Name for the new Authentication profile in the Name: field 4. Select Basic from the Frontend mode: dropdown menu and set a relevant name for the HTTP 401 popup box in the Frontend realm: field 5. Set the backend mode to Basic to enable authentication passthrough 6. Click the folder icon in the Users/Groups box to select existing users/groups by dragging and dropping them into the textbox, or click the New User or New Group icon to define new groups allowed to access resources protected by this profile. Please note: Selecting AD users and groups will enable username/password style logins, selecting LDAP users and groups will enable UPN logins or logins depending on your configuration.

9 Forms-based authentication with passthrough This is the profile that will be used to protect the user-facing services where having a logon form is desirable over a regular HTTP 401 popup. 1. Go to the Webserver Protection menu in the UTM Web admin console and select Reverse Authentication 2. Click the New Authentication Profile button on the Profiles tab 3. Fill in a Name for the new Authentication profile in the Name: field 4. Select Form from the Frontend mode: dropdown menu and set a unique URL value for the location of the login page in the Frontend realm: field Please note: If the URL used for the form is not unique, backend resources will become unreachable! 5. Select an Form template from the Form template: dropdown menu 6. Set the backend mode to Basic to enable authentication passthrough 7. Click the folder icon in the Users/Groups box to select existing users/groups by dragging and dropping them into the textbox, or click the New User or New Group icon to define new groups allowed to access resources protected by this profile. Please note: Selecting AD users and groups will enable username/password style logins, selecting LDAP users and groups will enable UPN logins or logins depending on your configuration.

10 F. Creating the Real Webserver(s) The next step in setting up the WAF is configuring the Real Webserver(s) which represent the Exchange CAS backend servers to the WAF setup. 1. Go to the Webserver Protection menu in the UTM Web admin console and select Web Application Firewall 2. Navigate to the Real Webservers tab and click the New Real Webserver button 3. Fill in a Name for the new Real Webserver and select either a pre-existing Host object by clicking the folder icon or create one by clicking the + button 4. Set the Real Webserver connection type by selecting either HTTP or HTTPS from the Type dropdown menu. 5. (Optional) After selecting the appropriate connection type the UTM will automatically fill in the associated port, should you however need to use a non-standard port you can enter it in the Port field. 6. Click Save to store the real server and continue Repeat the above procedure for every Exchange server in your farm. For the rest of this guide we are going to assume a minimum of two servers, but aside from the amount of available backend servers, the setup for a single server is similar. G. Configuring the firewall profiles Exchange contains several web services (Outlook Anywhere, Outlook Web App (OWA), Exchange ActiveSync, Autodiscover, etc) which require different levels of protection and different WAF settings to function correctly. As a result of this, we will configure three separate profiles; One for Outlook Anywhere, one for Autodiscover and one for all other Exchange services. The profile options configured below are based on our recommended settings and the items marked (Optional) should be treated as our personal suggestions. Exchange Autodiscover 1. Go to the Webserver Protection menu in the UTM Web admin console and select Web Application Firewall 2. Navigate to the Firewall Profiles tab and click the New Firewall Profile button 3. Fill in a Name for the profile and select the appropriate firewall action (Monitor or Reject) from the Mode: dropdown menu

11 4. Enable the Common Threats Filter and Rigid Filtering 5. Add a Skip Filter rule by clicking the + icon of the textbox 6. Enter (without quotation marks) and click apply 7. Enable URL Hardening and enter /autodiscover and /Autodiscover as entry points by clicking the + icon in the top right corner of the textbox 8. Enable Form Hardening 9. (Optional) Enable antivirus scanning, select the engine mode (Single or Dual engine) and Scan mode (Upload, Download or Upload and Download) from the dropdown menus 10. (Optional) Block suspect hosts by enabling the Block clients with bad reputation feature 11. Expand the Threat Filter Categories by clicking the - icon to the left and untick SQL Injection Attacks 12. Click Save to store the profile and continue The following screenshot displays our recommended settings:

12 Outlook Anywhere 1. Go to the Webserver Protection menu in the UTM Web admin console and select Web Application Firewall 2. Navigate to the Firewall Profiles tab and click the New Firewall Profile button 3. Fill in a Name for the profile and enable the Pass Outlook Anywhere option 4. Select the appropriate firewall action (Reject or Monitor) from the Mode: dropdown menu 5. Enable URL Hardening and enter /rpc and /RPC as entry points by clicking the + icon in the top right corner of the textbox. 6. (Optional) Block suspect hosts by enabling the Block clients with bad reputation feature 7. Click Save to store the profile and continue The following screenshot displays our recommended settings:

13 All other Exchange services 1. Go to the Webserver Protection menu in the UTM Web admin console and select Web Application Firewall 2. Navigate to the Firewall Profiles tab and click the New Firewall Profile button 3. Fill in a Name for the profile and select the appropriate firewall action (Reject or Monitor) from the Mode: dropdown menu 4. Enable the Common Threats Filter and Rigid Filtering 5. Add the following Skip Filter rules by clicking the + icon on the top of the textbox 6. Add , , , and (without quotation marks) and click Apply on each line to confirm 7. Enable URL Hardening and enter /owa, /OWA, /ews, /EWS, /oab, /OAB, /ecp, /ECP and /Microsoft-Server-ActiveSync as entry points by clicking the + icon in the top right corner of the textbox. 8. (Optional) Enable antivirus scanning, select the engine mode (Single or Dual engine) and Scan mode (Upload, Download or Upload and Download) from the dropdown menus 9. (Optional) Block suspect hosts by enabling the Block clients with bad reputation feature 10. Expand the Threat Filter Categories by clicking the - icon to the left and untick SQL Injection Attacks, XSS Attacks and Outbound 11. Click Save to store the profile and continue The following screenshot displays our recommended settings:

14 H. Creating the Virtual Webservers Since we intend to use different firewall profiles for different Exchange services (as previously discussed) we will need to configure a matching amount of Virtual Webservers to which these profiles should apply. Exchange Autodiscover Please note that, as part of Microsoft s best practices, Sophos recommends running the Autodiscover service on a separate hostname. This hostname should normally be autodiscover.<domain>.<tld>, as demonstrated below. 1. Go to the Webserver Protection menu in the UTM Web admin console and select Web Application Firewall 2. Navigate to the Virtual Webservers tab and click the New Virtual Webserver button 3. Fill in a Name for the Virtual server 4. Select the interface on which this Virtual Webserver should be created from the Interface dropdown menu, along with the protocol the end-users should use to connect to this server from the Type menu. For the intents and purposes of this article securely enabling remote access to your Exchange environment) we will set this to HTTPS. 5. (Optional) The UTM will automatically fill in the standard port associated to the HTTPS protocol, but you can set an alternate port in the Port: field. 6. (Optional) Tick the Redirect HTTP to HTTPS checkbox to enable automatic forwarding of HTTP to HTTPS traffic for requests matching the configured hostname 7. Select the applicable certificate from the Certificate: dropdown menu 8. Select either the desired domain name from the Domains: list, or (when using a wildcard certificate) enter your desired hostname by clicking the + button in the top right corner. (Sophos advises you to use a SAN certificate here, as wildcard certificates are incompatible with multi-site High Availability (HA) Exchange setups and require extra configuration on the Exchange server(s)) 9. Select the Firewall Profile you ve created for the Exchange Autodiscover from the Firewall Profile dropdown menu 10. Enable the Pass Host Header option (this is very important as your Exchange server needs the actual host header to determine the location (inside/outside the organization) of the client, on which many Exchange services rely) 11. Click the Save button to store the configuration and continue The following screenshot displays our recommended settings:

15 Outlook Anywhere 1. Go to the Webserver Protection menu in the UTM Web admin console and select Web Application Firewall 2. Navigate to the Virtual Webservers tab and click the New Virtual Webserver button 3. Fill in a Name for the Virtual server 4. Select the interface on which this Virtual Webserver should be created from the Interface dropdown menu, along with the protocol the end-users should use to connect to this server from the Type menu. For the intents and purposes of this article securely enabling remote access to your Exchange environment) we will set this to HTTPS. 5. (Optional) The UTM will automatically fill in the standard port associated to the HTTPS protocol, but you can set an alternate port in the Port: field. 6. (Optional) Tick the Redirect HTTP to HTTPS checkbox to enable automatic forwarding of HTTP 7. Select the applicable certificate from the Certificate: dropdown menu 8. Select either the desired domain name from the Domains: list, or (when using a wildcard certificate) enter your desired hostname by clicking the + button in the top right corner. 9. Select the Firewall Profile you ve created for Outlook Anywhere from the Firewall Profile dropdown menu 10. Enable the Pass Host Header option (failure to set this option will break automatic configuration for all Exchange ActiveSync and Outlook Anywhere clients, as well as automatic failover in HA scenario s) 11. Click the Save button to store the configuration and continue The following screenshot displays our recommended settings:

16 All other Exchange services 1. Go to the Webserver Protection menu in the UTM Web admin console and select Web Application Firewall 2. Navigate to the Virtual Webservers tab and click the New Virtual Webserver button 3. Fill in a Name for the Virtual server 4. Select the interface on which this Virtual Webserver should be created from the Interface dropdown menu, along with the protocol the end-users should use to connect to this server from the Type menu. For the intents and purposes of this article securely enabling remote access to your Exchange environment) we will set this to HTTPS. 5. (Optional) The UTM will automatically fill in the standard port associated to the HTTPS protocol, but you can set an alternate port in the Port: field. 6. (Optional) Tick the Redirect HTTP to HTTPS checkbox to enable automatic forwarding of HTTP 7. Select the applicable certificate from the Certificate: dropdown menu 8. Select either the desired domain name from the Domains: list, or (when using a wildcard certificate) enter your desired hostname by clicking the + button in the top right corner. 9. Select the Firewall Profile you ve created for the other Exchange services from the Firewall Profile dropdown menu 10. Enable the Pass Host Header option (Exchange determines the applicable automatic configuration (received through Autodiscover) based on the host header used to connect to ActiveSync and EWS for example, this option is therefore very important) 11. Click the Save button to store the configuration and continue

17 The following screenshot displays our recommended settings: H. Configuring Exceptions Since the URL Filtering feature in UTM is very strict, it will currently not allow clients to open any URL other than the ones we ve configured. This means that webmail.example.com/owa is allowed, but webmail.example.com/owa/auth/login.aspx or webmail.example.com/owa/directory/anything will be dropped. To enable the clients to access these virtual directories, you need to create an Exception to allow for a little less stringent filtering. Exchange Autodiscover 1. Navigate to the Exceptions tab and click the New Exception button 2. Set a Name for the exception and (if needed) write a description in the Comment: field 3. Enable the URL Hardening option in the Skip these checks menu 4. Select your Exchange Autodiscover Virtual Webserver in the Virtual servers checkbox

18 5. Set the For all requests dropdown menu to Web requests matching this path 6. Click the + button in the top right corner to create a new excepted path and enter /autodiscover/* 7. Repeat the above steps for /Autodiscover/* 8. Open the Advanced settings by clicking the - icon and tick the Never change HTML during URL hardening or Form Hardening to enable script content to pass unaltered 9. Click the Save button to store the configuration and continue. The following screenshot displays our recommended settings for the exception: Outlook Anywhere 1. Navigate to the Exceptions tab and click the New Exception button 2. Set a Name for the exception and (if needed) write a description in the Comment: field 3. Enable the URL Hardening option in the Skip these checks menu 4. Select your Outlook Anywhere Virtual Webserver from the On the virtual server dropdown menu 5. Set the For all requests dropdown menu to Web requests matching this path 6. Click the + button in the top right corner to create the a new excepted path and enter /rpc/* 7. Repeat the previous steps for /RPC/* 8. Click the Save button to store the configuration and finish this guide. The following screenshot displays our recommended settings for the exception:

19 All other Exchange services For Exchange to work, we need two exceptions: One for URL filtering, and one for AV scanning (this enables Exchange Notifications to work properly).

20 URL filtering exception 1. Navigate to the Exceptions tab and click the New Exception button 2. Set a Name for the exception and (if needed) write a description in the Comment: field 3. Enable the URL Hardening option in the Skip these checks menu 4. Select your Outlook Anywhere Virtual Webserver from the On the virtual server dropdown menu 5. Set the For all requests dropdown menu to Web requests matching this path 6. Click the + button in the top right corner to create the a new excepted path and enter /owa/* 7. Repeat the previous steps for /OWA/*, /ecp/*, /ECP/*, /ews/*, /EWS/*, /oab/*, /OAB/* and /Microsoft-Server-ActiveSync* Please note: Since Microsoft-Server-ActiveSync is not a virtual directory but a URL, there should be no slash between the name and the asterisk 8. Open the Advanced settings by clicking the - icon and tick the Never change HTML during URL hardening or Form Hardening to enable script content to pass unaltered 9. Click the Save button to store the configuration and finish this guide. The following screenshot displays our recommended settings for the exception:

21 AV exception 1. Navigate to the Exceptions tab and click the New Exception button 2. Set a Name for the exception and (if needed) write a description in the Comment: field 3. Enable the Antivirus option in the Skip these checks menu 4. Select your Outlook Anywhere Virtual Webserver from the On the virtual server dropdown menu 5. Set the For all requests dropdown menu to Web requests matching this path 6. Click the + button in the top right corner to create the a new excepted path and enter /owa/ev.owa* 7. Click the Save button to store the configuration and finish this guide. The following screenshot displays our recommended settings for the exception:

22 I. (Optional) Configuring Site Path routing Sophos UTM applies authentication on a per site-path basis, as this allows flexibility when setting up authentication for a website (for example you don t want authentication to occur on /public, but you do wish to authenticate those visiting /private ). Configuring which paths require (which type of) authentication is therefore performed through the Site Path routing configuration. Exchange Autodiscover 1. Navigate to the Site Path Routing tab and click the New Site Path Route button 2. Set a Name for the route and (if needed) write a description in the Comment: field 3. Select your Exchange Autodiscover Virtual Webserver from the Virtual Webserver: dropdown menu 4. Enter /autodiscover/ in the Path: field 5. Select the basic authentication profile previously created from the Reverse Authentication: dropdown menu 6. Tick the checkboxes on all associated Real Webservers in the Real Webservers menu 7. Click Save to continue and repeat step 1-6 for /Autodiscover/ The following screenshot displays our recommended settings for this route: 8. (Optional) Remove the default / Site Path Route for the Exchange Autodiscover Virtual Webserver to improve security

23 Outlook Anywhere 1. Navigate to the Site Path Routing tab and click the New Site Path Route button 2. Set a Name for the route and (if needed) write a description in the Comment: field 3. Select your Outlook Anywhere Virtual Webserver from the Virtual Webserver: dropdown menu 4. Enter /rpc/ in the Path: field 5. Select the basic authentication profile previously created from the Reverse Authentication: dropdown menu 6. Tick the checkboxes on all associated Real Webservers in the Real Webservers menu 7. Click Save to continue and repeat step 1-6 for /RPC/ The following screenshot displays our recommended settings for this route: 8. (Optional) Remove the default / Site Path Route for the Outlook Anywhere Virtual Webserver to improve security

24 OWA and ECP 1. Navigate to the Site Path Routing tab and click the New Site Path Route button 2. Set a Name for the route and (if needed) write a description in the Comment: field 3. Select your Exchange Virtual Webserver from the Virtual Webserver: dropdown menu 4. Enter /owa/ in the Path: field 5. Select the Form authentication profile previously created from the Reverse Authentication: dropdown menu 6. Tick the checkboxes on all associated Real Webservers in the Real Webservers menu 7. Click Save to continue and repeat step 1-6 for /OWA/, /ecp/ and /ECP/ The following screenshot displays our recommended settings for this route:

25 All other Exchange services 1. Navigate to the Site Path Routing tab and click the Edit button for the / default site path route for the Exchange Virtual Webserver site path route 2. Select the basic authentication profile previously created from the Reverse Authentication: dropdown menu 3. Click Save to continue The following screenshot displays our recommended settings for this route:

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG)

How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG) How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG) Introduction Understanding Forefront Threat Management Gateway (TMG) Network Topology Understanding Forefront Threat Management

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

Siteminder Integration Guide

Siteminder Integration Guide Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with

More information

Hosted Microsoft Exchange 2013 Service. Getting Started Guide

Hosted Microsoft Exchange 2013 Service. Getting Started Guide Hosted Microsoft Exchange 2013 Service Getting Started Guide Welcome to IEDGE. Thank you for choosing IEDGE as your email service provider! We re glad you ve decided to join our community, and we re excited

More information

Microsoft Exchange Client Access Servers

Microsoft Exchange Client Access Servers F5 Deployment Guide Microsoft Exchange Client Access Servers Welcome to the F5 and Microsoft Exchange 2010 and 2013 Client Access Server deployment guide. Use this document for guidance on configuring

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone

More information

Citrix Access on SonicWALL SSL VPN

Citrix Access on SonicWALL SSL VPN Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring

More information

Use FortiWeb to Publish Applications

Use FortiWeb to Publish Applications Tech Brief Use FortiWeb to Publish Applications Replacing Microsoft TMG with a FortiWeb Web Application Firewall Version 0.2, 27 June 2014 FortiWeb Release 5.2.0 Introduction This document is intended

More information

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.

More information

Connecting to Delta College Exchange services off-campus

Connecting to Delta College Exchange services off-campus Connecting to Delta College Exchange services off-campus The following instructions are provided to document the client configuration used to connect to Microsoft Exchange services at Delta College from

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Load Balancing Exchange 2007 Client Access Servers using Windows Network Load- Balancing Technology

Load Balancing Exchange 2007 Client Access Servers using Windows Network Load- Balancing Technology Load Balancing Exchange 2007 Client Access Servers using Windows Network Load- Balancing Technology In this article I will show you how you can load-balance Exchange 2007 Client Access Servers (CAS) using

More information

Sophos Mobile Control Installation guide. Product version: 5.1

Sophos Mobile Control Installation guide. Product version: 5.1 Sophos Mobile Control Installation guide Product version: 5.1 Document date: July 2015 Contents 1 Introduction...3 1.1 Sophos Mobile Control licenses...3 2 Integration...5 2.1 Ports and protocols...10

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

Quick Start Guide v4.0 Client Outlook Connection

Quick Start Guide v4.0 Client Outlook Connection Quick Start Guide v4.0 Client Outlook Connection Contents Chapter 1 Outlook Anywhere - Outlook Anywhere 3 - Setting up Outlook Anywhere for PC 4 - Setting up Outlook for Mac 9 CLIENT OUTLOOK CONNECTION

More information

Plesk 12 Manual. Fasthosts Customer Support

Plesk 12 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 12 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 12 control panel. Contents Introduction... 3 Before you begin...

More information

Exchange Integration DME 4.4 Microsoft Exchange 2007, 2010, 2013

Exchange Integration DME 4.4 Microsoft Exchange 2007, 2010, 2013 Exchange Integration DME 4.4 Microsoft Exchange 2007, 2010, 2013 Document version 1.1 Published 09-07-2015 Integration with Microsoft Exchange 2007/2010/2013 Contents Integration with Microsoft Exchange

More information

USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4

USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4 USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4 March 2014 TABLE OF CONTENTS Chapter 1 Welcome... 4 Introducing WWPass Security for Email (Outlook)... 5 Supported Outlook Products...

More information

Dynamic DNS How-To Guide

Dynamic DNS How-To Guide Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol

More information

Email client configuration guide. Business Email

Email client configuration guide. Business Email Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server

More information

Technical Brief ActiveSync Configuration for WatchGuard SSL 100

Technical Brief ActiveSync Configuration for WatchGuard SSL 100 Introduction Technical Brief ActiveSync Configuration for WatchGuard SSL 100 October 2009 With ActiveSync, users get push functionality to keep email, calendar, tasks, and contacts up to date on a mobile

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG Webserver Load Balancing Abstract In this article I will show you how

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

AvePoint Meetings 3.2.2 for SharePoint On-Premises. Installation and Configuration Guide

AvePoint Meetings 3.2.2 for SharePoint On-Premises. Installation and Configuration Guide AvePoint Meetings 3.2.2 for SharePoint On-Premises Installation and Configuration Guide Issued August 2015 Table of Contents About AvePoint Meetings for SharePoint... 4 System Requirements... 5 2 System

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

Web Manual: Email October 2015

Web Manual: Email October 2015 Table of Contents Getting Started... 3 How to change your password... 3 How to Access Division Email... 4 Outlook Web App (Webmail)... 4 iphone... 4 Android... 4 Blackberry... 4 Outlook Anywhere (MS Outlook)

More information

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

Web Manual: Email September 2014

Web Manual: Email September 2014 Table of Contents Getting Started... 3 How to change your password... 3 How to Access Division Email... 4 Outlook Web App (Webmail)... 4 iphone... 4 Android... 4 Blackberry... 4 Outlook Anywhere (MS Outlook)

More information

How to Logon with Domain Credentials to a Server in a Workgroup

How to Logon with Domain Credentials to a Server in a Workgroup How to Logon with Domain Credentials to a Server in a Workgroup Johan Loos johan@accessdenied.be Version 1.0 Authentication Overview Basically when you logon to a Windows Server you can logon locally using

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication

Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication Authentication is about security and user experience and balancing the two goals. This document describes the authentication

More information

Dell SonicWALL SRA 7.5 Citrix Access

Dell SonicWALL SRA 7.5 Citrix Access Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about

More information

Improving Microsoft Exchange 2013 performance with NetScaler Hands-on Lab Exercise Guide. Johnathan Campos

Improving Microsoft Exchange 2013 performance with NetScaler Hands-on Lab Exercise Guide. Johnathan Campos Improving Microsoft Exchange 2013 performance with NetScaler Hands-on Lab Exercise Guide Johnathan Campos Contents Contents... 1 Overview... 2 Scenario... 6 Exercise 1 - Initial Configuration... 7 Exercise

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

PineApp Surf-SeCure Quick

PineApp Surf-SeCure Quick PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.

More information

Load Balancing. Outlook Web Access. Web Mail Using Equalizer

Load Balancing. Outlook Web Access. Web Mail Using Equalizer Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems

More information

Certificate Management

Certificate Management Certificate Management This guide provides information on...... Configuring the GO!Enterprise MDM server to use a Microsoft Active Directory Certificate Authority... Using Certificates from Outside Sources...

More information

www.nexuswebsites.co.uk Professional Mailbox Email Software Setup Guide

www.nexuswebsites.co.uk Professional Mailbox Email Software Setup Guide Professional Mailbox Email Software Setup Guide Table of contents Before you start... 2 Setting up Outlook 2010... 2 Using Autodiscover to configure Outlook 2010... 2 The Autodiscover wizard has not worked...

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...

More information

BEST PRACTICES EMAIL ARCHIVE in contentaccess version 2.5

BEST PRACTICES EMAIL ARCHIVE in contentaccess version 2.5 BEST PRACTICES EMAIL ARCHIVE in contentaccess version 2.5 Use case: Email Archive configuration for companies with up to 2,000 mailboxes This document gives you an overview how to configure email archive

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

App Orchestration 2.5

App Orchestration 2.5 Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load

More information

Exchange 2010 PKI Configuration Guide

Exchange 2010 PKI Configuration Guide Exchange 2010 PKI Configuration Guide Overview 1. Summary 2. Environment 3. Configuration a) Active Directory Configuration b) CA Configuration c) Exchange Server IIS Configuration d) Exchange Configuration

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc. Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Table of Contents. This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync.

Table of Contents. This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync. This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync. Table of Contents Overview... 2 Evaluating Exchange ActiveSync for MailEnable...

More information

Resonate Central Dispatch

Resonate Central Dispatch Resonate Central Dispatch Microsoft Exchange 2010 Resonate, Inc. Tel. + 1.408.545.5535 Fax + 1.408.545.5502 www.resonate.com Copyright 2013 Resonate, Inc. All rights reserved. Resonate Incorporated and

More information

Configuring User Identification via Active Directory

Configuring User Identification via Active Directory Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based

More information

OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010

OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010 OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010 CONTENTS What is Outlook Anywhere? Before you begin How do I configure Outlook Anywhere with Outlook 2010? How do I use Outlook Anywhere? I already

More information

Implementing PCoIP Proxy as a Security Server/Access Point Alternative

Implementing PCoIP Proxy as a Security Server/Access Point Alternative Implementing PCoIP Proxy as a Security Server/Access Point Alternative Overview VMware s Horizon Security Server and Access Point provides secure access to sessions over an unsecured WAN and/or Internet

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

Single Sign On for ShareFile with NetScaler. Deployment Guide

Single Sign On for ShareFile with NetScaler. Deployment Guide Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

Exchange 2013 mailbox setup guide

Exchange 2013 mailbox setup guide Fasthosts Customer Support Exchange 2013 mailbox setup guide This article covers the setup of Exchange 2013 mailboxes in Microsoft Outlook 2013, 2010 and Outlook 2011 for Mac. Contents Exchange 2013 Mailbox

More information

Microsoft Exchange Server

Microsoft Exchange Server Deployment Guide Document Version: 4.9.2 Deploying the BIG-IP System v10 with Microsoft Welcome to the F5 and Microsoft Exchange 2010 deployment guide. This document contains guidance on configuring the

More information

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016 Version 2.0 April 2016 Folder Proxy + OWA + ECP/EAC Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

User Identification and Authentication

User Identification and Authentication User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included

More information

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,

More information

AX Series with Microsoft Exchange Server 2010

AX Series with Microsoft Exchange Server 2010 Deployment Guide AX Series with Microsoft Exchange Server 2010 v.1.2 DG_0512.1 DEPLOYMENT GUIDE AX Series with Microsoft Exchange Server 2010 Table of Contents 1. Introduction... 4 1.1 Prerequisites and

More information

Quick Start Guide Sendio Hosted

Quick Start Guide Sendio Hosted Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START

More information

Apple Mail Exchange Configuration. Microsoft Exchange 2007 and Mac OS X 10.6 Snow Leopard. MailStreet Live Support: 866-461-0851

Apple Mail Exchange Configuration. Microsoft Exchange 2007 and Mac OS X 10.6 Snow Leopard. MailStreet Live Support: 866-461-0851 Apple Mail Exchange Configuration Microsoft Exchange 2007 and Mac OS X 10.6 Snow Leopard MailStreet Live Support: 866-461-0851 Apple Mail is a licensed product of Apple, Inc. MailStreet makes no claims,

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Professional Mailbox Email Software Setup Guide

Professional Mailbox Email Software Setup Guide Professional Mailbox Email Software Setup Guide Table of contents Download and Install Microsoft Outlook 2010 or 2011... 2 Enabling access from email software... 4 Setting up Outlook 2010... 6 Before you

More information

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Office of Information Technology Connecting to Microsoft Exchange User Guide

Office of Information Technology Connecting to Microsoft Exchange User Guide OVERVIEW The Office of Information Technology is migrating its messaging infrastructure from Microsoft Exchange 2003 to Microsoft Exchange 2010. Moving to the latest technology will provide many enhancements

More information

ALOHA Load-Balancer. Microsoft Exchange 2010 deployment guide. Document version: v1.4. ALOHA version concerned: v4.2 and above

ALOHA Load-Balancer. Microsoft Exchange 2010 deployment guide. Document version: v1.4. ALOHA version concerned: v4.2 and above ALOHA Load-Balancer Microsoft Exchange 2010 deployment guide Document version: v1.4 ALOHA version concerned: Microsoft Exchange Server: v4.2 and above 2010 RTM, SP1, SP2, SP3 Last update date: November

More information

Email: support@apps4rent.com Toll Free: 1-866-716-2040 International: 1-646-506-9354

Email: support@apps4rent.com Toll Free: 1-866-716-2040 International: 1-646-506-9354 1. Check your Welcome e-mail for login credentials for the control panel. 2. Using the login details in the welcome e-mail; login at https://cp.hostallapps.com Adding Domain: 1. On the Home Page of the

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Norman Email Protection

Norman Email Protection Quick Install Guide Norman Email Protection version 5.51 Features Email relay gateway with antivirus Email relay with antivirus and antispam Web application Table of Contents Overview... 3 System Requirements...

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS)

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) This document provides an installation and configuration guide for MDaemon Messaging Server along with

More information

HTTP Server Setup for McAfee Endpoint Encryption (Formerly SafeBoot) Table of Contents

HTTP Server Setup for McAfee Endpoint Encryption (Formerly SafeBoot) Table of Contents Table of Contents Introduction... 1 Setting Up Endpoint Encryption s HTTP Server...2 How to trust Control Break as an CA... 20 Start Endpoint Encryption s HTTP Server service... 23 Verify Endpoint Encryption

More information

Configuration Manual

Configuration Manual Configuration Manual Page 1 of 20 Table of Contents Chronicall Setup...3 Standard Installation...3 Non-standard Installation (Recording Library on Separate machine)...8 Configuring Call Recording through

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager) Installation guide for securing the authentication to your F5 Big-IP APM solution with Nordic Edge One Time Password Server, delivering strong authetication via SMS to your mobile phone. 1 Summary This

More information

PC Monitor Enterprise Server. Setup Guide

PC Monitor Enterprise Server. Setup Guide PC Monitor Enterprise Server Setup Guide Prerequisites Server Requirements - Microsoft Windows Server 2008 R2 or 2012-2GB RAM - IIS 7.5 or IIS 8.0 (with ASP.NET 4.0 installed) - Microsoft SQL Server 2008

More information

Evoko Room Manager. System Administrator s Guide and Manual

Evoko Room Manager. System Administrator s Guide and Manual Evoko Room Manager System Administrator s Guide and Manual 1 1. Contents 1. Contents... 2 2. Read this first! Introduction to this Guide... 6 3. User Guide... 6 4. System Architecture Overview... 8 ----

More information

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...

More information