Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED

Size: px
Start display at page:

Download "Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED"

Transcription

1 Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware Version 3.3 Highlights 1. Custom content categories: Useful for custom content filtering. 2. NTLM support: Useful in Terminal Services/CITRIX environments 3. HTTPS filtering: SSL filtering 4. Enhanced reporting: More than 30 different types of reports Qualifying questions 1. How many computers do you have? 2. How many concurrent users do you have? 3. What kind of Internet connection do you have? (DSL, T1, etc.) 4. How many Web sites or external Internet connections do you have? Are multiple sites aggregated at a central connection? 5. What are you looking to accomplish with the Barracuda Web Filter? a. If customer says: Protect my users from spyware/virus/malware Respond: The Barracuda Web Filter provides complete spyware, virus and malware protection for your network gateway. This includes protection against drive-by installs, downloads as well as access to known spyware Web sites. It also detects and blocks spyware activity from client computers and provides a spyware removal tool without the need for any client software. b. If customer says: Block access to certain Web sites or applications like media, IM, peer-to-peer (or anything to do with content filtering and applications), Respond: Part of our Barracuda Web Filter s strength is its ability to block a wide variety of content, applications with a fine level of control. You can apply global content and application filters, and create custom policies for each user or group. If you have a quick second, let me tap you into a live Barracuda Web Filter and show you how it works. c. If customer says: Detailed reporting of what users are doing. Respond: We have a variety of reports supported in our latest release. Unlike other solutions, our reporting engine is native to the appliance and does not require additional database or software management. If you have a quick second, let me tap you into a live Barracuda Web Filter and show you how it works. Additional Qualifying Information The Barracuda Web Filter can be integrated with Active Directory or LDAP. The Barracuda Web Filter also supports NTLM. You can give different users different privileges. For example, if you only wanted your sales team to have access to ESPN.com during lunch, you can do that with the Barracuda Web Filter. If you want to give the marketing department access to only work-related Web sites, you can do that as well. Last Updated: June 2, 2008 Page 1 of 15

2 ONLINE DEMO Username: guest Password: spyware This will bring you to a live Barracuda Web Filter. Before we begin, we are logging into the Barracuda Web Filter as a guest. Feel free to explore the interface further when we are done. If you are exploring on your own and want to know exactly what you are looking at, simply hit the question mark icon on the right-hand side of the page and a popup window will appear with a detailed explanation of the tab. Introduction: Let s begin by getting an overview of how the Barracuda Web Filter protects your network. Basic Tab Status: This gives you a snapshot of the traffic flowing through a Barracuda Web Filter from within your network. Upper lefthand corner summarizes statistics on traffic to the Barracuda Web Filter. Upper righthand corner gives you the enviromental conditions, data that engineers might appreciate. In the middle of the page, you will see infection activity detected and user requests blocked by the Barracuda Web Filter. At the bottom of the page, you will see lists and graphs that show trends from traffic passing through the Barracuda Web Filter. This includes: Lists - Top Blocked Domains - Top Requested Domains - Top Domains by Bandwidth - Top Blocked Categories - Top Categories by Request - Top Categories by Bandwidth Graphs - Blocked Requests - Requests - Bandwidth Last Updated: June 2, 2008 Page 2 of 15

3 Infection Activity: This page displays all the infected clients and the threats detected on each computer. Filtering and Policy Control: The Barracuda Web Filter includes a powerful malware protection and policy management engine that allows for flexible and granular content and application filtering. Let us review this: Block/Accept Tab Content Filter: We have 58 different categories that you can either block, warn, monitor or allow. Different policies can be created for unauthenticated or authenticated users. Blocking will block access to the Web sites, Warn will issue a user configurable warning message when the site is accessed, Monitor will allow users to monitor requests and Allow will allow unrestricted access to the Web site. We support both http and https filtering. The policy control mechanisms are the same for https and http. Https filtering is available in both inline form and proxy configurations. We use DNS lookups and do not apply man-inthe-middle certificate spoofing methods. This reduces your security risk and data liability. Last Updated: June 2, 2008 Page 3 of 15

4 Additional Information: At the bottom of this page, you will see a Content Filter Lookup area. Let s say that there is a brand new Web site that just came out and you want to see if the Barracuda Web Filter is blocking that Web site. For our example, let s use Type that in and hit the Lookup button to the right. You will see that it is categorized under the Sports category. If it s not categorized, you can do one of two things or both. One, you can simply go to the domains tab and blocked list or, two, you could submit the Web site to Barracuda Central. If you submit it to Barracuda Central, we will look at that Web site and assign it to the appropriate category. Applications: This is an important page for a majority of our customers. Here you can block public IMs, streaming media and tools like Weatherbug. If there is an application that we currently do not block, simply send it to Barracuda Central and we will add it to our database. Last Updated: June 2, 2008 Page 4 of 15

5 Custom Categories: This is a very popular feature. This allows users flexibility to extend pre-defined categorization of URLs by creating custom categories and applying exceptions and other policies to these new categories. For example, URLs from two different pre-defined categories can be combined under a single custom category enabling easier policy administration. Last Updated: June 2, 2008 Page 5 of 15

6 Domains: Here the administrator can determine which domains to block or allow. If you have a specific domain that you would like to always allow or block, you would enter that information here in a allowed list or blocked list. Patterns: The Patterns page lets you create filters that block or allow access to URLs that contain specific patterns. For example, if you want to block all Web sites that contain CNN in the URL (Say or then enter CNN as a blocked pattern. You can also set up different rules based on either unauthenticated or authenticated users. MIME Blocking: The Barracuda Web Filter allows you to enter standard MIME types for blocking. Many organizations choose to block Internet radio and streaming media because they load the internal network. Executable files are also commonly blocked because they can install viruses and other malware. Web sites that are whitelisted are not subject to the MIME blocking rules you create. An extensive list of common MIME types are included to better help you identify data you would like to block. Exceptions page: This page lets you create exception policies for specific users and groups so they can override the filters that block access to applications and Web sites. For example, by default the Barracuda Web Filter applies a content filter to block access to gaming Web sites. However, if you want to allow users or groups of users to access gaming sites during non-business hours you can create an allow exception policy for the hours of 6 p.m. (18:00) to 8 a.m. (8:00) for the category Content Filter and subcategory Game Playing. Alternatively, by setting an exception policy by users, you can block everyone except the HR department from accessing Job Search and Career Development Web sites such as Monster.com or careerbuilder.com. Last Updated: June 2, 2008 Page 6 of 15

7 Browse Test page: This page is used to test any changes you make to your content filter and exception policies. Simply type in a URL and check whether the access or catergory matches your policy. (Give 2 examples to customer) Example 1 Let me show you how it works let s start with our Web site, as we can see this site is allowed. Example 2 Now let s try in this case we can see it was blocked. We can also see the customized message that your users will see. In case this block was made by mistake, this also gives the user the chance to log in (using their corporate login) and then their Web access will change to reflect their privilege level. Last Updated: June 2, 2008 Page 7 of 15

8 Additional Information (If Necessary): Block Messages: This page is used to set up the messages you want to send to your users when they are blocked from accessing a Web site. A different message can be created for each reason (i.e. spyware, viruses, content or blocked list). This page is also used to set the virus infection threshold for your users. When a computer reaches the stated threshold the user will be will prompted to use the Barracuda Spyware Removal Tool. The removal tool will only allow the user to delay running the removal once, if it is not run immediately then it will force the user to clean the computer the next time they log in. IP Block/Exempt: Exempt: On this page you can exempt certain networks or clients from content filtering, IM blocking, and all types of download blocking. You can also exempt traffic between the specified servers from being proxied and scanned. For example this can be used to exempt traffic to internal servers. Another common use is to exempt servers that require authentication because they may not allow proxied requests. Block: If you suspect that certain users are abusing their access to the Internet or to specific applications, you can use this screen to deny Internet access to those users or to block their access to the applications. For applications based on layer3 rules (hosts/ports), users can exempt/block applications by specifying the IP ranges. For example If you to stop users from playing World of War Craft (WOW) and you know the port used to access this game, then you can simply block Internet access to that port. Last Updated: June 2, 2008 Page 8 of 15

9 User Authentication: The Barracuda Web Filter allows you to create local accounts or integrates with your existing Authentication Servers through LDAP or NTLM. Users/ Group Tab Account View: This displays all the user accounts known to the Barracuda Web Filter. This page lets you view details about each account and make changes to any locally created accounts. Including user and group accounts gives you a finer level of control over your blocking policies. New users : Here you can create new users that the Barracuda Web Filter will authenticate locally from it s database. You would only need to create users if you weren t using external authentication services. User Authentication Services can be configured on the Authentication Services page. Local Groups : This page lets you create new groups that your locally created users can join. Again you would only need to create these groups if you weren t using external authentication services. Once created you can use these groups to apply exception policies by group. IP Subnets/Group : You can also build groups by specific IPs or IP ranges. Authentication Services : This page lets you specify the location of your LDAP/NTLM server so your Barracuda Web Filter can: Authenticate users using LDAP/NTLM Associate user group membership using LDAP/NTLM Allow you to assign exception policies to LDAP/NTLM users. The exceptions are created in the Block/Accept Exceptions tab NTLM Authentication is particularly useful in Terminal Services, CITRIX or NAT environments where multiple users share IP addresses. This allows users to be distinguished on credentials besides IP address. Configuration : Here you can set up session limits to disable a user s authentication based on either session length or idle time. Additional Information (If Necessary): DC Agent: Also on this page is the DC agent. It s an optional component in addition to your LDAP integration. The DC agent tracks users within your network and based on their network log-in, it extends the user Web browsing priveleges as stated in your LDAP directory. In practical terms it means that if the CEO decides to spend a week sitting in with the sales department, when he logs into a computer located in the sales department, the DC agent will map his log in with the LDAP and provide him Web access based on his priveleges and not the priveleges of the sales department. Reporting: Finally, you can generate snapshot, trends and detailed reports of user activity. The Barracuda Web Filter supports more than 30 report types that can be scheduled for automatic delivery. This includes reports that will be useful to IT, HR and other departments. Log: This screen allows you to monitor, in real-time, the Web and spyware traffic that passes through the Barracuda Web Filter and the action that was taken by the Barracuda Web Filter whether it was allowed or blocked. You can Last Updated: June 2, 2008 Page 9 of 15

10 apply filters to examine the log entries tracked by the Barracuda Web Filter. For each filter you can also apply the following sub-filters: Source IP, URL containing a specific expression, or User/Group Name. Application Log: This screen allows you to monitor any blocked applications (streaming media, IM, peer-to-peer etc.) blocked by the Barracuda Web Filter. Again, you can apply filters and sub-filters to examine the log entries. Reporting: This page allows you to create detailed reports based on requests, bandwidth, blocked content, spyware prevented and virus prevented. For example, you can find the Top 10 Users by Bandwidth and then drill down to see the websites visited by these users. Alternately, you can get detailed activity reports for ndividual user ids. Also, you can either run a one off report or schedule daily reports via . Click on the help icon to see full details of report types. Report Types (If Necessary): Top Users By Requests Top Websites By Requests Top Blocked Users Top Blocked Categories Top Warned Domains Top Monitored Users By Requests Top Monitored Domains By Requests Top Infected Users Top Blocked Spyware Infection Top Categories By Bandwidth Bandwidth By Hour Requests By Time of Day Actions By Time of Day Category Usage By Time Top Users By Bandwidth Top Websites By Bandwidth Top Blocked Domains Top Warned Users Top Warned Categories Top Monitored Users By Bandwidth Top Monitored Domains By Bandwidth Top Spyware Hits Top Categories By Requests Requests By Hour Actions By Hour Bandwidth By Time of Day Top Websites By Time Spent Requests by User Last Updated: June 2, 2008 Page 10 of 15

11 Last Updated: June 2, 2008 Page 11 of 15

12 Additional Information (If Necessary): Advanced Tab Backup: This allows you to back-up your configuration details and save to a text-based.bak file. Energize Updates: The Barracuda Energize Update service is the yearly subscription, that you pay for at the time of the Barracuda Web Filter s original purchase. The Barracuda Energize Update service provides you with hourly updates to the latest virus, spyware & content filter updates. Also included is access to our 24/7 technical phone support and access to all new firmware updates as they are released. Unlike most of our competitors, we charge a flat rate for the Barracuda Energize Update service meaning you can add additional users to the Barracuda Web Filter without increasing your annual cost. You can use this page to ensure that you are using the latest Barracuda Energize Update release, to revert back to an older version, or to change the frequency of your updates from hourly to daily or off. Last Updated: June 2, 2008 Page 12 of 15

13 Furthermore, by clicking on the release notes under the virus definitions you will find an alphabetical list of all viruses currrently covered by the Barracuda Web Filter. Let s say you hear of a new virus that has just been released to the wild. If you want to know if the Barracuda Web Filter is protecting against it, simply open the release notes and you ll find a list of every single virus that is covered at any given time. Firmware Update page: Firmware updates enable us to continue to improve the performance and features of the Barracuda Web Filter even after you have purchased it. On this page you can apply new firmware releases or revert to a previous version. Additionally you can open the View release notes and see a complete history of every fix, patch and enhancement that has been made to the product since it was first released. Linked Management: This feature allows you to cluster multiple Barracuda Web Filters together and synchronize configuration. You can setup the units in active-active or active-standby mode for redundancy. Spyware Removal Tool: As part of our award-winning approach to providing customers with a complete spyware solution, the Barracuda Web Filter also includes a desktop spyware removal tool. The spyware removal tool is accessible to users in two ways: Hosted domain: Once installed, Barracuda Web Filter users can go to and run the tool. Alternatively, the admistrator can create their own domain for users to access (i.e. Last Updated: June 2, 2008 Page 13 of 15

14 Exceeding the spyware thresold: Alternatively, under the Block/Accept Tab/Blocked messages page, the administrator can set a spyware thresold that, once exceeded, will prompt the removal tool to run. When the removal to is run, the user will be forced to either clean their computer immeditaley or within 24 hours. If the tool is not run within the 24-hour window, Internet access will be terminated to that computer until it has been cleaned. Screenshot of the Barracuda Spyware Removal Tool If you have any questions about the Barracuda Web Filter please contact the Barracuda Networks Sales Department at or via at sales@barracuda.com. Other Sales FAQs: Why not get a software based solution? Software solutions involve dedicated hardware, separate databases, operating system licenses, software installations and patches and pay per-user license charges over the life of the product. The Barracuda Web Filter combines hardware, software and subscription services with global technical support. It is easy to deploy, administer and is virtually maintenance free. It comes at a fixed price with no per-user charges. Last Updated: June 2, 2008 Page 14 of 15

15 Am I getting best-of-breed protection? Barracuda Networks offer comprehensive spyware protection by blocking access to spyware sites, spyware downloads, phone home threats and drive-by installs. Barracuda Central, a team of security experts, continuously monitors trends in spyware and virus attacks and updates the system automatically. Along with the fully integrated desktop spyware removal tool, the Barracuda Web Filter provides complete network protection in a single appliance. What if I have more than 4500 users? The model 910 can support a maximum of 4500 users. Multiple Barracuda Web Filters can be easily combined using WCCP or Load Balancing. This also provides fault tolerance. Do you filter open proxy sites? Yes. Our strength in spam filtering and installed base of more than customers helps us identify the newest open proxy sites and P2P proxy nodes. We combine this with web crawling and other technologies to protect against known and unknown open proxy threats. Do you support delegated administration? This is usually for on demand reporting or to override administrative policies. Most users actually need customized reports. The Barracuda Web Filter lets you customize and schedule delivery of reports. Also, most administrators are uncomfortable with constantly changing policy. If necessary, it can be done through Barracuda API. Last Updated: June 2, 2008 Page 15 of 15

Test Case 3 Active Directory Integration

Test Case 3 Active Directory Integration April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of

More information

Evaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000

Evaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000 800-782-3762 www.edgewave.com Welcome to EdgeWave Web Security! This short guide is intended to help administrators set up and test the iprism Web Filtering appliance for evaluation purposes. A more detailed

More information

Barracuda Load Balancer Online Demo Guide

Barracuda Load Balancer Online Demo Guide Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,

More information

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information

Active Directory Integration

Active Directory Integration January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process

More information

Capturing Barracuda Web Filter Activity in Reports

Capturing Barracuda Web Filter Activity in Reports Capturing Barracuda Web Filter Activity in Reports IT administrators require detailed information about Internet usage on the network. This helps budget computing resources and ensure adherence to corporate

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Barracuda Web Filter Administrator s Guide

Barracuda Web Filter Administrator s Guide Barracuda Web Filter Administrator s Guide Version 3.3 Barracuda Networks Inc. 3175 S. WInchester Blvd Campbell, CA 95008 http://www.barracuda.com 1 Copyright Notice Copyright 2004-2008, Barracuda Networks

More information

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Cyan Networks Secure Web vs. Websense Security Gateway Battle card URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database

More information

PineApp Surf-SeCure Quick

PineApp Surf-SeCure Quick PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.

More information

Capturing Barracuda Web Filter Activity in Reports

Capturing Barracuda Web Filter Activity in Reports Capturing Barracuda Web Filter Activity in Reports IT and HR administrators often require detailed information about the Internet usage behavior of users in the network to budget computing resources and

More information

Green House Data Spam Firewall Administrator Guide

Green House Data Spam Firewall Administrator Guide Green House Data Spam Firewall Administrator Guide Spam Firewall Administrator Guide... 2 Navigating the Web Interface... 2 How to Drill Down from the DOMAINS Page to Account Level... 2 Message Logs...

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

Barracuda IM Firewall Administrator s Guide

Barracuda IM Firewall Administrator s Guide Barracuda IM Firewall Administrator s Guide Version 3.0 Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2007, Barracuda Networks www.barracuda.com

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Barracuda Web Filter Administrator s Guide

Barracuda Web Filter Administrator s Guide Barracuda Web Filter Administrator s Guide Version 4.x Barracuda Networks Inc. 3175 S. WInchester Blvd Campbell, CA 95008 http://www.barracuda.com 1 Copyright Notice Copyright 2004-2010, Barracuda Networks

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

NETASQ ACTIVE DIRECTORY INTEGRATION

NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos

More information

Websense Web Security Gateway: What to do when a Web site does not load as expected

Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus)

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) Installation Guide 1 2 Introduction to avast! Endpoint Protection The avast! Endpoint Protection range comprises 4 products

More information

Configuration Guide. Websense Web Security Solutions Version 7.8.1

Configuration Guide. Websense Web Security Solutions Version 7.8.1 Websense Web Security Solutions Version 7.8.1 To help you make the transition to Websense Web Security or Web Security Gateway, this guide covers the basic steps involved in setting up your new solution

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014

www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Burst Technology. bt-webfilter User Guide

Burst Technology. bt-webfilter User Guide Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com

More information

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter. Collax Web Security Howto This howto describes the setup of a Web proxy server as Web content filter. Requirements Collax Business Server Collax Security Gateway Collax Platform Server including Collax

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

Barracuda Spam Firewall

Barracuda Spam Firewall Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive

More information

Feature Comparison Guide

Feature Comparison Guide Feature Comparison Guide Stay Secure Portal Autumn 2015 Contents Introduction... 3 Description on some of the new features... 5 Customer overview from partner portal... 5 Partner & customer portal linkage...

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

Exchange 2013 mailbox setup guide

Exchange 2013 mailbox setup guide Fasthosts Customer Support Exchange 2013 mailbox setup guide This article covers the setup of Exchange 2013 mailboxes in Microsoft Outlook 2013, 2010 and Outlook 2011 for Mac. Contents Exchange 2013 Mailbox

More information

Email Migration Manual (For Outlook Express 6)

Email Migration Manual (For Outlook Express 6) Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change

More information

Barracuda SSL VPN Administrator s Guide

Barracuda SSL VPN Administrator s Guide Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

Release Notes. SonicOS 6.1.2.0 is the initial release for the Dell SonicWALL NSA 2600 network security appliance.

Release Notes. SonicOS 6.1.2.0 is the initial release for the Dell SonicWALL NSA 2600 network security appliance. SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Feature Information... 2 Known Issues... 2 Resolved Issues... 4 Release Purpose

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

How To Manage Your Quarantine Email On A Blackberry.Com

How To Manage Your Quarantine Email On A Blackberry.Com Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

ProxySG TechBrief Enabling Transparent Authentication

ProxySG TechBrief Enabling Transparent Authentication ProxySG TechBrief Enabling Transparent Authentication What is Transparent Authentication? Authentication is a key factor when defining a web access policy. When the Blue Coat ProxyxSG is configured for

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

MultiSite Manager. User Guide

MultiSite Manager. User Guide MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.

More information

1. Barracuda Cloud Control - Overview... 2 1.1 Deployment Options... 2 1.1.1 Use Case Scenarios... 3 1.1.1.1 How to Aggregate Reports Across Multiple

1. Barracuda Cloud Control - Overview... 2 1.1 Deployment Options... 2 1.1.1 Use Case Scenarios... 3 1.1.1.1 How to Aggregate Reports Across Multiple 1. Barracuda Cloud Control - Overview............................................................................. 2 1.1 Deployment Options.....................................................................................

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

SonicWALL Security Dashboard

SonicWALL Security Dashboard Document Scope This document describes how to use the feature on a SonicWALL security appliance running SonicOS 3.8 firmware or later. This document contains the following sections: Overview section on

More information

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

NAS 253 Introduction to Backup Plan

NAS 253 Introduction to Backup Plan NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup

More information

PureMessage for Microsoft Exchange startup guide

PureMessage for Microsoft Exchange startup guide PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: May 2010 Contents 1 About this guide...3 2 Planning your PureMessage deployment...4 3 Installing PureMessage...6 4 Starting

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Exchange 2003 Mailboxes

Exchange 2003 Mailboxes Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Email Migration Manual (For Outlook 2010)

Email Migration Manual (For Outlook 2010) Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

Name Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall.

Name Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall. How to configure quick set up rules You can configure rules/policies using Quick setup to get the Firewall up and running in no time. To do this log in to the Firewall, browse to Firewall > Policies >

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

NetSpective Global Proxy Configuration Guide

NetSpective Global Proxy Configuration Guide NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a

More information

Weston Public Schools Virtual Desktop Access Instructions

Weston Public Schools Virtual Desktop Access Instructions Instructions for connecting to the Weston Schools Virtual Desktop Environment Notes: You will have to have administrator permission on your computer in order to install a VMWare Client application which

More information

PureMessage for Microsoft Exchange startup guide. Product version: 3.1

PureMessage for Microsoft Exchange startup guide. Product version: 3.1 PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: June 2015 Contents 1 About this guide...4 2 Planning your PureMessage deployment...5 2.1 Deploying PureMessage to Exchange

More information

DreamFactory on Microsoft SQL Azure

DreamFactory on Microsoft SQL Azure DreamFactory on Microsoft SQL Azure Account Setup and Installation Guide For general information about the Azure platform, go to http://www.microsoft.com/windowsazure/. For general information about the

More information

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet

More information

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

NetSpective Content Filter User Guide

NetSpective Content Filter User Guide NetSpective Content Filter User Guide Copyright 2002-2013 by TeleMate.Net Software, LLC. All rights reserved Although the author and publisher have made every effort to ensure that the information in this

More information

SonicWALL Global Management System Reporting Guide Standard Edition

SonicWALL Global Management System Reporting Guide Standard Edition SonicWALL Global Management System Reporting Guide Standard Edition Version 2.9.4 Copyright Information 2005 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described

More information

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11 Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda. Version 3.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2009, Barracuda Networks

More information

Professional Mailbox Email Software Setup Guide

Professional Mailbox Email Software Setup Guide Professional Mailbox Email Software Setup Guide Table of contents Download and Install Microsoft Outlook 2010 or 2011... 2 Enabling access from email software... 4 Setting up Outlook 2010... 6 Before you

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

IBM Security Access Manager, Version 8.0 Distributed Session Cache Architectural Overview and Migration Guide

IBM Security Access Manager, Version 8.0 Distributed Session Cache Architectural Overview and Migration Guide IBM Security Systems Access Management June, 2014 IBM Security Access Manager, Version 8.0 Distributed Session Cache Architectural Overview and Migration Guide Authors Jenny Wong (jenwong@au1.ibm.com)

More information

How do I use Citrix Staff Remote Desktop

How do I use Citrix Staff Remote Desktop How do I use Citrix Staff Remote Desktop September 2014 Initial Log On In order to login into the new Citrix system, you need to go to the following web address. https://remotets.tees.ac.uk/ Be sure to

More information

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser) 1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

KUMC Spam Firewall: Barracuda Instructions

KUMC Spam Firewall: Barracuda Instructions KUMC Spam Firewall: Barracuda Instructions Receiving Messages from the KUMC Spam Firewall Greeting Message The first time the KUMC Spam Firewall quarantines an email intended for you, the system sends

More information

Phish Blocker: Spyware Blocker:

Phish Blocker: Spyware Blocker: The following are included with base package of protection: Web Filter: Computer Team s Untangle Network Defender web filter (internet filter) enables administrators to enforce network usage policies and

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Getting Started with PRTG Network Monitor 2012 Paessler AG

Getting Started with PRTG Network Monitor 2012 Paessler AG Getting Started with PRTG Network Monitor 2012 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying,

More information

Managed Security Web Portal USER GUIDE

Managed Security Web Portal USER GUIDE Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1

More information

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008)

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008) KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE (Updated April 14, 2008) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium

More information

Background Deployment 3.1 (1003) Installation and Administration Guide

Background Deployment 3.1 (1003) Installation and Administration Guide Background Deployment 3.1 (1003) Installation and Administration Guide 2010 VoIP Integration March 14, 2011 Table of Contents Product Overview... 3 Personalization... 3 Key Press... 3 Requirements... 4

More information

www.nexuswebsites.co.uk Professional Mailbox Email Software Setup Guide

www.nexuswebsites.co.uk Professional Mailbox Email Software Setup Guide Professional Mailbox Email Software Setup Guide Table of contents Before you start... 2 Setting up Outlook 2010... 2 Using Autodiscover to configure Outlook 2010... 2 The Autodiscover wizard has not worked...

More information

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information