Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED
|
|
- Britney Hamilton
- 8 years ago
- Views:
Transcription
1 Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware Version 3.3 Highlights 1. Custom content categories: Useful for custom content filtering. 2. NTLM support: Useful in Terminal Services/CITRIX environments 3. HTTPS filtering: SSL filtering 4. Enhanced reporting: More than 30 different types of reports Qualifying questions 1. How many computers do you have? 2. How many concurrent users do you have? 3. What kind of Internet connection do you have? (DSL, T1, etc.) 4. How many Web sites or external Internet connections do you have? Are multiple sites aggregated at a central connection? 5. What are you looking to accomplish with the Barracuda Web Filter? a. If customer says: Protect my users from spyware/virus/malware Respond: The Barracuda Web Filter provides complete spyware, virus and malware protection for your network gateway. This includes protection against drive-by installs, downloads as well as access to known spyware Web sites. It also detects and blocks spyware activity from client computers and provides a spyware removal tool without the need for any client software. b. If customer says: Block access to certain Web sites or applications like media, IM, peer-to-peer (or anything to do with content filtering and applications), Respond: Part of our Barracuda Web Filter s strength is its ability to block a wide variety of content, applications with a fine level of control. You can apply global content and application filters, and create custom policies for each user or group. If you have a quick second, let me tap you into a live Barracuda Web Filter and show you how it works. c. If customer says: Detailed reporting of what users are doing. Respond: We have a variety of reports supported in our latest release. Unlike other solutions, our reporting engine is native to the appliance and does not require additional database or software management. If you have a quick second, let me tap you into a live Barracuda Web Filter and show you how it works. Additional Qualifying Information The Barracuda Web Filter can be integrated with Active Directory or LDAP. The Barracuda Web Filter also supports NTLM. You can give different users different privileges. For example, if you only wanted your sales team to have access to ESPN.com during lunch, you can do that with the Barracuda Web Filter. If you want to give the marketing department access to only work-related Web sites, you can do that as well. Last Updated: June 2, 2008 Page 1 of 15
2 ONLINE DEMO Username: guest Password: spyware This will bring you to a live Barracuda Web Filter. Before we begin, we are logging into the Barracuda Web Filter as a guest. Feel free to explore the interface further when we are done. If you are exploring on your own and want to know exactly what you are looking at, simply hit the question mark icon on the right-hand side of the page and a popup window will appear with a detailed explanation of the tab. Introduction: Let s begin by getting an overview of how the Barracuda Web Filter protects your network. Basic Tab Status: This gives you a snapshot of the traffic flowing through a Barracuda Web Filter from within your network. Upper lefthand corner summarizes statistics on traffic to the Barracuda Web Filter. Upper righthand corner gives you the enviromental conditions, data that engineers might appreciate. In the middle of the page, you will see infection activity detected and user requests blocked by the Barracuda Web Filter. At the bottom of the page, you will see lists and graphs that show trends from traffic passing through the Barracuda Web Filter. This includes: Lists - Top Blocked Domains - Top Requested Domains - Top Domains by Bandwidth - Top Blocked Categories - Top Categories by Request - Top Categories by Bandwidth Graphs - Blocked Requests - Requests - Bandwidth Last Updated: June 2, 2008 Page 2 of 15
3 Infection Activity: This page displays all the infected clients and the threats detected on each computer. Filtering and Policy Control: The Barracuda Web Filter includes a powerful malware protection and policy management engine that allows for flexible and granular content and application filtering. Let us review this: Block/Accept Tab Content Filter: We have 58 different categories that you can either block, warn, monitor or allow. Different policies can be created for unauthenticated or authenticated users. Blocking will block access to the Web sites, Warn will issue a user configurable warning message when the site is accessed, Monitor will allow users to monitor requests and Allow will allow unrestricted access to the Web site. We support both http and https filtering. The policy control mechanisms are the same for https and http. Https filtering is available in both inline form and proxy configurations. We use DNS lookups and do not apply man-inthe-middle certificate spoofing methods. This reduces your security risk and data liability. Last Updated: June 2, 2008 Page 3 of 15
4 Additional Information: At the bottom of this page, you will see a Content Filter Lookup area. Let s say that there is a brand new Web site that just came out and you want to see if the Barracuda Web Filter is blocking that Web site. For our example, let s use Type that in and hit the Lookup button to the right. You will see that it is categorized under the Sports category. If it s not categorized, you can do one of two things or both. One, you can simply go to the domains tab and blocked list or, two, you could submit the Web site to Barracuda Central. If you submit it to Barracuda Central, we will look at that Web site and assign it to the appropriate category. Applications: This is an important page for a majority of our customers. Here you can block public IMs, streaming media and tools like Weatherbug. If there is an application that we currently do not block, simply send it to Barracuda Central and we will add it to our database. Last Updated: June 2, 2008 Page 4 of 15
5 Custom Categories: This is a very popular feature. This allows users flexibility to extend pre-defined categorization of URLs by creating custom categories and applying exceptions and other policies to these new categories. For example, URLs from two different pre-defined categories can be combined under a single custom category enabling easier policy administration. Last Updated: June 2, 2008 Page 5 of 15
6 Domains: Here the administrator can determine which domains to block or allow. If you have a specific domain that you would like to always allow or block, you would enter that information here in a allowed list or blocked list. Patterns: The Patterns page lets you create filters that block or allow access to URLs that contain specific patterns. For example, if you want to block all Web sites that contain CNN in the URL (Say or then enter CNN as a blocked pattern. You can also set up different rules based on either unauthenticated or authenticated users. MIME Blocking: The Barracuda Web Filter allows you to enter standard MIME types for blocking. Many organizations choose to block Internet radio and streaming media because they load the internal network. Executable files are also commonly blocked because they can install viruses and other malware. Web sites that are whitelisted are not subject to the MIME blocking rules you create. An extensive list of common MIME types are included to better help you identify data you would like to block. Exceptions page: This page lets you create exception policies for specific users and groups so they can override the filters that block access to applications and Web sites. For example, by default the Barracuda Web Filter applies a content filter to block access to gaming Web sites. However, if you want to allow users or groups of users to access gaming sites during non-business hours you can create an allow exception policy for the hours of 6 p.m. (18:00) to 8 a.m. (8:00) for the category Content Filter and subcategory Game Playing. Alternatively, by setting an exception policy by users, you can block everyone except the HR department from accessing Job Search and Career Development Web sites such as Monster.com or careerbuilder.com. Last Updated: June 2, 2008 Page 6 of 15
7 Browse Test page: This page is used to test any changes you make to your content filter and exception policies. Simply type in a URL and check whether the access or catergory matches your policy. (Give 2 examples to customer) Example 1 Let me show you how it works let s start with our Web site, as we can see this site is allowed. Example 2 Now let s try in this case we can see it was blocked. We can also see the customized message that your users will see. In case this block was made by mistake, this also gives the user the chance to log in (using their corporate login) and then their Web access will change to reflect their privilege level. Last Updated: June 2, 2008 Page 7 of 15
8 Additional Information (If Necessary): Block Messages: This page is used to set up the messages you want to send to your users when they are blocked from accessing a Web site. A different message can be created for each reason (i.e. spyware, viruses, content or blocked list). This page is also used to set the virus infection threshold for your users. When a computer reaches the stated threshold the user will be will prompted to use the Barracuda Spyware Removal Tool. The removal tool will only allow the user to delay running the removal once, if it is not run immediately then it will force the user to clean the computer the next time they log in. IP Block/Exempt: Exempt: On this page you can exempt certain networks or clients from content filtering, IM blocking, and all types of download blocking. You can also exempt traffic between the specified servers from being proxied and scanned. For example this can be used to exempt traffic to internal servers. Another common use is to exempt servers that require authentication because they may not allow proxied requests. Block: If you suspect that certain users are abusing their access to the Internet or to specific applications, you can use this screen to deny Internet access to those users or to block their access to the applications. For applications based on layer3 rules (hosts/ports), users can exempt/block applications by specifying the IP ranges. For example If you to stop users from playing World of War Craft (WOW) and you know the port used to access this game, then you can simply block Internet access to that port. Last Updated: June 2, 2008 Page 8 of 15
9 User Authentication: The Barracuda Web Filter allows you to create local accounts or integrates with your existing Authentication Servers through LDAP or NTLM. Users/ Group Tab Account View: This displays all the user accounts known to the Barracuda Web Filter. This page lets you view details about each account and make changes to any locally created accounts. Including user and group accounts gives you a finer level of control over your blocking policies. New users : Here you can create new users that the Barracuda Web Filter will authenticate locally from it s database. You would only need to create users if you weren t using external authentication services. User Authentication Services can be configured on the Authentication Services page. Local Groups : This page lets you create new groups that your locally created users can join. Again you would only need to create these groups if you weren t using external authentication services. Once created you can use these groups to apply exception policies by group. IP Subnets/Group : You can also build groups by specific IPs or IP ranges. Authentication Services : This page lets you specify the location of your LDAP/NTLM server so your Barracuda Web Filter can: Authenticate users using LDAP/NTLM Associate user group membership using LDAP/NTLM Allow you to assign exception policies to LDAP/NTLM users. The exceptions are created in the Block/Accept Exceptions tab NTLM Authentication is particularly useful in Terminal Services, CITRIX or NAT environments where multiple users share IP addresses. This allows users to be distinguished on credentials besides IP address. Configuration : Here you can set up session limits to disable a user s authentication based on either session length or idle time. Additional Information (If Necessary): DC Agent: Also on this page is the DC agent. It s an optional component in addition to your LDAP integration. The DC agent tracks users within your network and based on their network log-in, it extends the user Web browsing priveleges as stated in your LDAP directory. In practical terms it means that if the CEO decides to spend a week sitting in with the sales department, when he logs into a computer located in the sales department, the DC agent will map his log in with the LDAP and provide him Web access based on his priveleges and not the priveleges of the sales department. Reporting: Finally, you can generate snapshot, trends and detailed reports of user activity. The Barracuda Web Filter supports more than 30 report types that can be scheduled for automatic delivery. This includes reports that will be useful to IT, HR and other departments. Log: This screen allows you to monitor, in real-time, the Web and spyware traffic that passes through the Barracuda Web Filter and the action that was taken by the Barracuda Web Filter whether it was allowed or blocked. You can Last Updated: June 2, 2008 Page 9 of 15
10 apply filters to examine the log entries tracked by the Barracuda Web Filter. For each filter you can also apply the following sub-filters: Source IP, URL containing a specific expression, or User/Group Name. Application Log: This screen allows you to monitor any blocked applications (streaming media, IM, peer-to-peer etc.) blocked by the Barracuda Web Filter. Again, you can apply filters and sub-filters to examine the log entries. Reporting: This page allows you to create detailed reports based on requests, bandwidth, blocked content, spyware prevented and virus prevented. For example, you can find the Top 10 Users by Bandwidth and then drill down to see the websites visited by these users. Alternately, you can get detailed activity reports for ndividual user ids. Also, you can either run a one off report or schedule daily reports via . Click on the help icon to see full details of report types. Report Types (If Necessary): Top Users By Requests Top Websites By Requests Top Blocked Users Top Blocked Categories Top Warned Domains Top Monitored Users By Requests Top Monitored Domains By Requests Top Infected Users Top Blocked Spyware Infection Top Categories By Bandwidth Bandwidth By Hour Requests By Time of Day Actions By Time of Day Category Usage By Time Top Users By Bandwidth Top Websites By Bandwidth Top Blocked Domains Top Warned Users Top Warned Categories Top Monitored Users By Bandwidth Top Monitored Domains By Bandwidth Top Spyware Hits Top Categories By Requests Requests By Hour Actions By Hour Bandwidth By Time of Day Top Websites By Time Spent Requests by User Last Updated: June 2, 2008 Page 10 of 15
11 Last Updated: June 2, 2008 Page 11 of 15
12 Additional Information (If Necessary): Advanced Tab Backup: This allows you to back-up your configuration details and save to a text-based.bak file. Energize Updates: The Barracuda Energize Update service is the yearly subscription, that you pay for at the time of the Barracuda Web Filter s original purchase. The Barracuda Energize Update service provides you with hourly updates to the latest virus, spyware & content filter updates. Also included is access to our 24/7 technical phone support and access to all new firmware updates as they are released. Unlike most of our competitors, we charge a flat rate for the Barracuda Energize Update service meaning you can add additional users to the Barracuda Web Filter without increasing your annual cost. You can use this page to ensure that you are using the latest Barracuda Energize Update release, to revert back to an older version, or to change the frequency of your updates from hourly to daily or off. Last Updated: June 2, 2008 Page 12 of 15
13 Furthermore, by clicking on the release notes under the virus definitions you will find an alphabetical list of all viruses currrently covered by the Barracuda Web Filter. Let s say you hear of a new virus that has just been released to the wild. If you want to know if the Barracuda Web Filter is protecting against it, simply open the release notes and you ll find a list of every single virus that is covered at any given time. Firmware Update page: Firmware updates enable us to continue to improve the performance and features of the Barracuda Web Filter even after you have purchased it. On this page you can apply new firmware releases or revert to a previous version. Additionally you can open the View release notes and see a complete history of every fix, patch and enhancement that has been made to the product since it was first released. Linked Management: This feature allows you to cluster multiple Barracuda Web Filters together and synchronize configuration. You can setup the units in active-active or active-standby mode for redundancy. Spyware Removal Tool: As part of our award-winning approach to providing customers with a complete spyware solution, the Barracuda Web Filter also includes a desktop spyware removal tool. The spyware removal tool is accessible to users in two ways: Hosted domain: Once installed, Barracuda Web Filter users can go to and run the tool. Alternatively, the admistrator can create their own domain for users to access (i.e. Last Updated: June 2, 2008 Page 13 of 15
14 Exceeding the spyware thresold: Alternatively, under the Block/Accept Tab/Blocked messages page, the administrator can set a spyware thresold that, once exceeded, will prompt the removal tool to run. When the removal to is run, the user will be forced to either clean their computer immeditaley or within 24 hours. If the tool is not run within the 24-hour window, Internet access will be terminated to that computer until it has been cleaned. Screenshot of the Barracuda Spyware Removal Tool If you have any questions about the Barracuda Web Filter please contact the Barracuda Networks Sales Department at or via at sales@barracuda.com. Other Sales FAQs: Why not get a software based solution? Software solutions involve dedicated hardware, separate databases, operating system licenses, software installations and patches and pay per-user license charges over the life of the product. The Barracuda Web Filter combines hardware, software and subscription services with global technical support. It is easy to deploy, administer and is virtually maintenance free. It comes at a fixed price with no per-user charges. Last Updated: June 2, 2008 Page 14 of 15
15 Am I getting best-of-breed protection? Barracuda Networks offer comprehensive spyware protection by blocking access to spyware sites, spyware downloads, phone home threats and drive-by installs. Barracuda Central, a team of security experts, continuously monitors trends in spyware and virus attacks and updates the system automatically. Along with the fully integrated desktop spyware removal tool, the Barracuda Web Filter provides complete network protection in a single appliance. What if I have more than 4500 users? The model 910 can support a maximum of 4500 users. Multiple Barracuda Web Filters can be easily combined using WCCP or Load Balancing. This also provides fault tolerance. Do you filter open proxy sites? Yes. Our strength in spam filtering and installed base of more than customers helps us identify the newest open proxy sites and P2P proxy nodes. We combine this with web crawling and other technologies to protect against known and unknown open proxy threats. Do you support delegated administration? This is usually for on demand reporting or to override administrative policies. Most users actually need customized reports. The Barracuda Web Filter lets you customize and schedule delivery of reports. Also, most administrators are uncomfortable with constantly changing policy. If necessary, it can be done through Barracuda API. Last Updated: June 2, 2008 Page 15 of 15
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
More informationEvaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000
800-782-3762 www.edgewave.com Welcome to EdgeWave Web Security! This short guide is intended to help administrators set up and test the iprism Web Filtering appliance for evaluation purposes. A more detailed
More informationBarracuda Load Balancer Online Demo Guide
Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,
More informationControlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
More informationVirtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
More informationActive Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
More informationCapturing Barracuda Web Filter Activity in Reports
Capturing Barracuda Web Filter Activity in Reports IT administrators require detailed information about Internet usage on the network. This helps budget computing resources and ensure adherence to corporate
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationBarracuda Web Filter Administrator s Guide
Barracuda Web Filter Administrator s Guide Version 3.3 Barracuda Networks Inc. 3175 S. WInchester Blvd Campbell, CA 95008 http://www.barracuda.com 1 Copyright Notice Copyright 2004-2008, Barracuda Networks
More informationCyan Networks Secure Web vs. Websense Security Gateway Battle card
URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database
More informationPineApp Surf-SeCure Quick
PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.
More informationCapturing Barracuda Web Filter Activity in Reports
Capturing Barracuda Web Filter Activity in Reports IT and HR administrators often require detailed information about the Internet usage behavior of users in the network to budget computing resources and
More informationGreen House Data Spam Firewall Administrator Guide
Green House Data Spam Firewall Administrator Guide Spam Firewall Administrator Guide... 2 Navigating the Web Interface... 2 How to Drill Down from the DOMAINS Page to Account Level... 2 Message Logs...
More informationUser Guide Online Backup
User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading
More informationBarracuda IM Firewall Administrator s Guide
Barracuda IM Firewall Administrator s Guide Version 3.0 Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2007, Barracuda Networks www.barracuda.com
More informationConfiguration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
More informationBarracuda Web Filter Administrator s Guide
Barracuda Web Filter Administrator s Guide Version 4.x Barracuda Networks Inc. 3175 S. WInchester Blvd Campbell, CA 95008 http://www.barracuda.com 1 Copyright Notice Copyright 2004-2010, Barracuda Networks
More informationBarracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
More informationNETASQ ACTIVE DIRECTORY INTEGRATION
NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos
More informationWebsense Web Security Gateway: What to do when a Web site does not load as expected
Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.
More informationF-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationavast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus)
avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) Installation Guide 1 2 Introduction to avast! Endpoint Protection The avast! Endpoint Protection range comprises 4 products
More informationConfiguration Guide. Websense Web Security Solutions Version 7.8.1
Websense Web Security Solutions Version 7.8.1 To help you make the transition to Websense Web Security or Web Security Gateway, this guide covers the basic steps involved in setting up your new solution
More informationBarracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
More informationConfiguring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
More informationVirtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationwww.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014
www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationBurst Technology. bt-webfilter User Guide
Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com
More informationCollax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.
Collax Web Security Howto This howto describes the setup of a Web proxy server as Web content filter. Requirements Collax Business Server Collax Security Gateway Collax Platform Server including Collax
More informationSecure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationUser Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
More informationBarracuda Spam Firewall
Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive
More informationFeature Comparison Guide
Feature Comparison Guide Stay Secure Portal Autumn 2015 Contents Introduction... 3 Description on some of the new features... 5 Customer overview from partner portal... 5 Partner & customer portal linkage...
More informationDelegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
More informationExchange 2013 mailbox setup guide
Fasthosts Customer Support Exchange 2013 mailbox setup guide This article covers the setup of Exchange 2013 mailboxes in Microsoft Outlook 2013, 2010 and Outlook 2011 for Mac. Contents Exchange 2013 Mailbox
More informationEmail Migration Manual (For Outlook Express 6)
Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change
More informationBarracuda SSL VPN Administrator s Guide
Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,
More informationWebsense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationConfiguring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
More informationRelease Notes. SonicOS 6.1.2.0 is the initial release for the Dell SonicWALL NSA 2600 network security appliance.
SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Feature Information... 2 Known Issues... 2 Resolved Issues... 4 Release Purpose
More informationComodo Endpoint Security Manager SME Software Version 2.1
Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick
More informationHow To Manage Your Quarantine Email On A Blackberry.Com
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
More informationSonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
More informationDecryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationProxySG TechBrief Enabling Transparent Authentication
ProxySG TechBrief Enabling Transparent Authentication What is Transparent Authentication? Authentication is a key factor when defining a web access policy. When the Blue Coat ProxyxSG is configured for
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationMultiSite Manager. User Guide
MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.
More information1. Barracuda Cloud Control - Overview... 2 1.1 Deployment Options... 2 1.1.1 Use Case Scenarios... 3 1.1.1.1 How to Aggregate Reports Across Multiple
1. Barracuda Cloud Control - Overview............................................................................. 2 1.1 Deployment Options.....................................................................................
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More informationSophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
More informationSonicWALL Security Dashboard
Document Scope This document describes how to use the feature on a SonicWALL security appliance running SonicOS 3.8 firmware or later. This document contains the following sections: Overview section on
More informationBarracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK
Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationBarracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
More informationChapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
More informationNAS 253 Introduction to Backup Plan
NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup
More informationPureMessage for Microsoft Exchange startup guide
PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: May 2010 Contents 1 About this guide...3 2 Planning your PureMessage deployment...4 3 Installing PureMessage...6 4 Starting
More informationActive Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
More informationExchange 2003 Mailboxes
Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationEmail Migration Manual (For Outlook 2010)
Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change
More informationManaging Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
More informationName Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall.
How to configure quick set up rules You can configure rules/policies using Quick setup to get the Firewall up and running in no time. To do this log in to the Firewall, browse to Firewall > Policies >
More informationWhen your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationNetSpective Global Proxy Configuration Guide
NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a
More informationWeston Public Schools Virtual Desktop Access Instructions
Instructions for connecting to the Weston Schools Virtual Desktop Environment Notes: You will have to have administrator permission on your computer in order to install a VMWare Client application which
More informationPureMessage for Microsoft Exchange startup guide. Product version: 3.1
PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: June 2015 Contents 1 About this guide...4 2 Planning your PureMessage deployment...5 2.1 Deploying PureMessage to Exchange
More informationDreamFactory on Microsoft SQL Azure
DreamFactory on Microsoft SQL Azure Account Setup and Installation Guide For general information about the Azure platform, go to http://www.microsoft.com/windowsazure/. For general information about the
More informationVirtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
More informationSophos UTM Web Application Firewall for Microsoft Exchange connectivity
How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services
More informationWildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
More informationNetSpective Content Filter User Guide
NetSpective Content Filter User Guide Copyright 2002-2013 by TeleMate.Net Software, LLC. All rights reserved Although the author and publisher have made every effort to ensure that the information in this
More informationSonicWALL Global Management System Reporting Guide Standard Edition
SonicWALL Global Management System Reporting Guide Standard Edition Version 2.9.4 Copyright Information 2005 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described
More informationInvestment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
More informationSecret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
More informationSophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
More informationRoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
More informationVersion 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.
Version 3.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2009, Barracuda Networks
More informationProfessional Mailbox Email Software Setup Guide
Professional Mailbox Email Software Setup Guide Table of contents Download and Install Microsoft Outlook 2010 or 2011... 2 Enabling access from email software... 4 Setting up Outlook 2010... 6 Before you
More informationClick Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationIBM Security Access Manager, Version 8.0 Distributed Session Cache Architectural Overview and Migration Guide
IBM Security Systems Access Management June, 2014 IBM Security Access Manager, Version 8.0 Distributed Session Cache Architectural Overview and Migration Guide Authors Jenny Wong (jenwong@au1.ibm.com)
More informationHow do I use Citrix Staff Remote Desktop
How do I use Citrix Staff Remote Desktop September 2014 Initial Log On In order to login into the new Citrix system, you need to go to the following web address. https://remotets.tees.ac.uk/ Be sure to
More informationHow To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
More informationWeb Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
More informationKUMC Spam Firewall: Barracuda Instructions
KUMC Spam Firewall: Barracuda Instructions Receiving Messages from the KUMC Spam Firewall Greeting Message The first time the KUMC Spam Firewall quarantines an email intended for you, the system sends
More informationPhish Blocker: Spyware Blocker:
The following are included with base package of protection: Web Filter: Computer Team s Untangle Network Defender web filter (internet filter) enables administrators to enforce network usage policies and
More informationA Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
More informationGetting Started with PRTG Network Monitor 2012 Paessler AG
Getting Started with PRTG Network Monitor 2012 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying,
More informationManaged Security Web Portal USER GUIDE
Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1
More informationKERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008)
KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE (Updated April 14, 2008) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium
More informationBackground Deployment 3.1 (1003) Installation and Administration Guide
Background Deployment 3.1 (1003) Installation and Administration Guide 2010 VoIP Integration March 14, 2011 Table of Contents Product Overview... 3 Personalization... 3 Key Press... 3 Requirements... 4
More informationwww.nexuswebsites.co.uk Professional Mailbox Email Software Setup Guide
Professional Mailbox Email Software Setup Guide Table of contents Before you start... 2 Setting up Outlook 2010... 2 Using Autodiscover to configure Outlook 2010... 2 The Autodiscover wizard has not worked...
More informationTRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE
TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks
More information74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
More information