Setup Guide Revision A. WDS Connector
|
|
- Mary McBride
- 8 years ago
- Views:
Transcription
1 Setup Guide Revision A WDS Connector
2 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundscore, Foundstone, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. Product and feature names and descriptions are subject to change without notice. Please visit mcafee.com for the most current products and features. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 WDS Connector Setup Guide
3 Contents 1 Introduction 5 Requirements Download the WDS Connector Steps to setup WDS Connector Setup Users for the WDS Connector Reinstall WDS Connector 11 Steps to reinstall WDS Connector Change WDS Connector settings using AD Config Editor 13 4 Uninstall the WDS Connector 15 5 Manage WDS Connector logs 17 Turn on the WDS Connector logs View the WDS Connector logs Enable NTLM on Windows Client 19 7 Troubleshooting 21 Determine Embedded Communications WDS Connector Setup Guide 3
4 Contents 4 WDS Connector Setup Guide
5 1 1 Introduction The WDS Connector SM, which is an enhancement to the Web Protection Service, allows users to access the web through Web Protection using existing local network domain credentials. This capability, known as transparent authentication, eliminates the need for Web Protection to authenticate a user each time the user opens a browser. Instead, Web Protection validates users automatically whenever they open a browser. Administrators of the Web Protection service can continue to apply group policies to users, as well as track individual web usage, threats, and more. Contents Requirements Download the WDS Connector Steps to setup WDS Connector Setup Users for the WDS Connector WDS Connector Setup Guide 5
6 1 Introduction Requirements Requirements Before you install WDS Connector, ensure that the following requirements are met: Table 1-1 Checklist for WDS Connector Installation Review the following list before installing WDS Connector: Web Protection service must be enabled. A Domain Controller must reside within the customer's Intranet and must be running Active Directory. You need the DNS name or IP address of this controller. Each user that WDS Connector authenticates must have an account in Active Directory. That account must contain the same address that the Web Protection Control Console contains. You must have Customer Administrator or higher privileges on the Web Protection Control Console. The local intranet must contain a Microsoft Windows server that can run the WDS Connector software and serve as a proxy server. This server must meet the following requirements: The server must be running Microsoft Windows Server 2003 or higher software and Microsoft Management Console (MMC) Services snap in. All available updates for the server's version of Microsoft Windows must also be installed. The firewall on the proxy server must allow access by user clients. Specifically, port 3128 tcp must be open outbound to the Internet. The proxy settings in Microsoft Internet Explorer on the proxy server must be turned off for installation. The time clock of the proxy server must be reasonably accurate, at least within one hour of the actual time within its time zone. It is recommended that your LAN use a network time server to ensure this synchronization. The proxy server must be running.net 2.0 or higher. If the server is not running.net 2.0 or higher, the installer notifies you during the initial setup and installs.net for you. NTLM enabled browser (FF or IE on Windows) NTLM information must be passed from the client machine. See Section 6 Although the installer installs.net 2.0, if the server also is running an earlier version of.net, the earlier version of.net can continue running normally. It is recommended that you implement the Directory Integration feature within Account Management before using WDS Connector. In this way, you greatly increase the likelihood that user addresses in Active Directory match the addresses in the Web Protection Control Console. Download the WDS Connector You must download the WDS Connector Setup from your Web Protection Control Console. Steps to setup WDS Connector To download the WDS Connector Setup, complete the following steps: Before you begin Ensure that the proxy settings in Internet Explorer on the proxy server are turned off. 6 WDS Connector Setup Guide
7 Introduction Steps to setup WDS Connector 1 Task 1 Log in to the Web Protection Control Console. The Web Protection Control Console appears. 2 Click the Setup tab. The Web Protection Setup window appears. 3 Click the Download WDS Connector link A Run window appears and asks if you want to Run or Save the installation program. 4 Depending on the computer from which you accessed the Web Protection Control Console, perform the steps for one of the following two scenarios: If you accessed the Web Protection Control Console from the Microsoft Windows server that will be the proxy server, do the following: 1 Select Run. The installer checks for Windows updates and the presence of.net 2.0. If.NET 2.0 is not installed, the installer installs it. The installer redisplays a Run screen. If all applicable Windows updates are not installed, the installation fails. 2 Select Run again. The WDS Connector Setup opens. 3 Continue with the Run the WDS Connector Setup section. If you accessed the Web Protection Control Console from a computer other than the proxy server, save the files on a portable media and transfer them to the proxy server. 4 On the proxy server, locate the file you downloaded and double click to run it. A Run screen appears, asking if you want to Run or Save the installation files. 5 Select Run. The installer checks for Windows updates and the presence of.net 2.0. If.NET 2.0 is not installed, the installer performs an installation of.net. The installer redisplays a Run screen. If all applicable Windows updates are not installed, the installation fails. WDS Connector Setup Guide 7
8 1 Introduction Steps to setup WDS Connector 6 Select Run again. The WDS Connector Setup opens. 7 Continue with the Run the WDS Connector Setup section. If your system receives the following error message during the Web Protection Setup, it means Short File Names are disabled. Continue with the following steps to enable this information. 5 Click OK. The following WDS Connector Install screen displays. 6 Click OK. The WDS Connector Installation screen displays. 7 Click Close to exit your installer. Restart your system to continue the Web Protection installer setup. After completing these steps you have to restart your system and begin to install the WDS Connector from the start. 8 After restarting your system, enter the username and password you normally use to access the Web Protection Admin Console, and click Next. The Setting Active Directory Connection Information window appears. Table 1-2 Setting Active Directory Connection Field AD Hostname FQDN Description Enter the fully qualified domain name (FQDN) of the Active Director AD Hostname FQDN domain controller in the local intranet. Although an FQDN is preferred because it minimizes network requests, a non FQDN domain name is also allowed in this field. Domain\Username Enter a user name for the domain controller, using standard Windows domain user name format. Standard Windows user name format includes the domain name, followed by a backslash (\), followed by the username (for example, (acme domain\johndoe). 9 Enter a password for the user name in the Password field. 10 Click Next. A confirmation information screen displays. The Test button can be used to validate your AD settings. For more information regarding this functionality. The Account setup screen appears. 11 Select Local System account or enter a User name and password for a unique WDS Connector account. If you set up a unique account for WDS Connector, you must also administer the account on the Active Directory domain controller. 12 Click Next. 8 WDS Connector Setup Guide
9 Introduction Setup Users for the WDS Connector 1 13 Click Close. 14 To verify that WDS Connector is running, access your Windows services window. Go to Start All Programs Administrative Tools Component Services. For most Microsoft Windows systems, access the Microsoft Windows services screen through the Windows Control Panel. Check the screen to verify that the WDS Connector has started. Setup Users for the WDS Connector The browser settings on each user s personal computer must be administered for the new proxy server. These settings must include port 3128 as the browser s access port on the proxy server. For example, to manually set the Windows Internet Explorer browser for an individual P.C., you access the Local Area Network (LAN) Settings screen in Internet Explorer and administer the Proxy Server section for the following: WDS Connector Setup Guide 9
10 1 Introduction Setup Users for the WDS Connector The use of a proxy server by the browser The IP address or host name of the proxy server Port 3128 for the proxy server connection Contact your local support Web site or local support personnel for information on various methods of configuring browser proxy settings to point to the WDS Connector. For the WDS Connector to authenticate a user, the user must already have an account in Active Directory (AD), and the AD account must include an address that matches an address in the Web Protection Control Console. If Microsoft Exchange is installed and running on the AD server and the user already has an Exchange account, the user s address is automatically populated in AD when the user s AD account is created. However, when Exchange isn't already running on the proxy server, or when Exchange is running on a different server, the user s must be added manually into the user s AD account. 10 WDS Connector Setup Guide
11 2 2 Reinstall WDS Connector If you must reinstall the WDS Connector, the installation software checks that the WDS Connector is not running before the installation software resumes the installation. Steps to reinstall WDS Connector To reinstall WDS Connector, complete the following: Before you begin During the reinstallation sequence, you might see the following screen: If this is the case, do the following steps: Task 1 Click No. A number of screens may appear and disappear as the WDS Connector shuts down. Then, the following screen appears. 2 Select the default Repair WDS Connector option, and click Cancel. The wizard prompts for confirmation on exit. 3 Click No. The Welcome screen appears again. 4 Click Finish. Continue with the installation as in the Run the WDS Connector Setup Wizard section of this document. WDS Connector Setup Guide 11
12 2 Reinstall WDS Connector Steps to reinstall WDS Connector 12 WDS Connector Setup Guide
13 3 Change 3 WDS Connector settings using AD Config Editor You can use the AD Config Editor to edit or update change settings for Web Protection. Before you begin To edit your change settings for Web Protection including the: Host Name Domain Password Task 1 From the Start menu, select All Programs WDS Connector AD Config Editor. The Edit Active Directory Connection screen displays. 2 Type the changes you want to make. 3 Click Test A Success Information window displays. 4 Click OK and then Click Save. 5 Restart your Connector: From the Start menu select All Programs Administrative Tools Component Services. WDS Connector Setup Guide 13
14 3 Change WDS Connector settings using AD Config Editor In the event that your AD Hostname is invalid, the following Failure Information pop up displays to alert you to one of these issues: This is an invalid AD Hostname The AD Hostname is not visible to this machine The AD is not running on that machine The AD Hostname machine is down. 6 Click OK to edit your information. 7 Click Test and if successful, Click OK and Save. A Success Information window displays. 8 Restart your Connector: From the Start menu select All Programs Administrative Tools Component Services. If the user name or password is invalid, the following failure Information pop up displays. 9 Click OK to edit your information. 10 Click Test and if successful, Click OK and Save. 11 Restart your Connector: From the Start menu select All Programs Administrative Tools Component Services. 14 WDS Connector Setup Guide
15 4 4 Uninstall the WDS Connector If needed, you can uninstall the WDS Connector. Task 1 From the Start menu, select All Programs WDS Connector WDS Connector Uninstall. A confirmation page appears 2 Click Yes The WDS Connector is removed from your server. WDS Connector Setup Guide 15
16 4 Uninstall the WDS Connector 16 WDS Connector Setup Guide
17 5 Manage 5 WDS Connector logs The WDS Connector can generate logs of activity. These logs are turned off by default, but for troubleshooting purposes in conjunction with support personnel, you might want to turn the logs on. The logs can generate a lot of data. You should only turn on the WDS Connector logs for troubleshooting purposes. Otherwise, the logs quickly begin to take up disk space. Contents Turn on the WDS Connector logs View the WDS Connector logs Turn on the WDS Connector logs To turn on the WDS Connector logs, perform the following steps: Task 1 From the Start button on the Windows Task Bar, select All Programs. The list of programs appears. 2 Select WDS Connector from the list. Then select WDS Connector Configuration Manager from the pop up menu. The WDS Connector Configuration Manager page displays. 3 Click Turn Logging On. The button changes to Turn Logging Off. WDS Connector Setup Guide 17
18 5 Manage WDS Connector logs View the WDS Connector logs WDS Connector is ready to send data to its logs. View the WDS Connector logs To view the WDS Connector logs, perform the following steps: Task 1 In your Windows Explorer, locate the directory in which you installed WDS Connector. The default location is within the Program Files directory at C:\Program Files\ WDS Connector. 2 From the WDS Connector directory, access the following path: WDS Connector Proxy\var\logs. The logs directory appears. 3 Double click any file name to view its contents. The individual log file displays. 18 WDS Connector Setup Guide
19 6 Enable 6 NTLM on Windows Client The WDS Connector requires NTLM information and the client must be configured to use NTLM. Unfortunately, newer versions of Windows operating systems (Vista and beyond) do not inherently provide NTLM information when used in conjunction with newer versions of Windows Server (2008 and beyond). To use McAfee SaaS Web Protection Service with the WDS Connector installed on a Microsoft Windows Server 2008 with a Windows Vista/Windows 7 system, complete the following: On the Windows 7 or Vista PC follow these steps: 1 From the Start menu, select Control Panel. 2 Change the view to small icons. 3 Click Administrative Tools. 4 Select Local security policies Local Policies. 5 Select Security options. 6 Find the Network Security: Lan Manager authentication level. Click on it and change the setting from undefined to Send LM & NTLM responses. If the previous steps are incomplete, continue to enable NTLM on a Windows client by adding the following entry to the Windows registry: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] "LmCompatibilityLevel"=dword: This can be automated by using a login script to add the entry to the client machines upon logon. A.reg file must be created and then called from a batch file. In the script folder of the Windows Domain Controller machine, create a new text file and call it something like WDS_Connector_Fix.reg for convenience. This file should contain the following text (the blank line is necessary): Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] "LmCompatibilityLevel"=dword: An associated batch file must contain the line similar to the one below (replace the Domain Controller Host and script share to include a valid UNC path to the script folder): regedit /s \\<Domain Controller host>\<script share>\wds_controller_fix.reg WDS Connector Setup Guide 19
20 6 Enable NTLM on Windows Client This batch file also needs to be added to the appropriate domain in the Group Policy Editor. McAfee recommends using caution when editing the registry on any computer. While the change suggested is relatively low risk, please note that changing the Windows Registry may have unexpected consequences. Be sure to back up all work prior to executing any changes. 20 WDS Connector Setup Guide
21 7 Troubleshooting 7 The WDS Connector requires NTLM session information in order to authentication requests. Some embedded applications (media players, Java applets, etc.) will access the proxy settings in the browser, but do not inherently support either NTLM session handling or any mechanism to provide authentication credentials to the system. The only way to allow these applications to connect to the internet is to bypass the WDS Connector. The effect of this issue is that the application will appear to hang or, potentially display an error or connection timeout. Instructions for finding the problematic request are listed below. Determine Embedded Communications The only way to handled embedded applications that themselves are not NTLM enabled is to bypass those sites. Most embedded Java applications pick up the browser proxy settings, but do not send NTLM data. The easiest way to bypass is to add the IPs or hosts of the Java request, etc. to the exception or bypass list of the mechanism used to set the proxy. Exceptions can be added to the manual browser proxy configuration, to a Proxy Auto Configuration (PAC) file, or to the exception list in the Windows registry view GPO or.reg file. Please reference the Web Protection Services Setup Guide for instructions on adding exceptions. The following are recommended steps to configure Java Applications: 1 Open the Control panel. 4 In Network Settings select Direct connection. 2 Open the Java application. 5 Click OK. 3 In the general tab select Network Settings. If these steps are incomplete, continue with the embedded issues exemptions. To find embedded issues: Examine the source HTML see where the player or applet is being called from and, more importantly, what the source of the stream is. Most media players will have this exposed in the source as a parameter to the embed or object, but it may be in an included.js file. Examine the request and response headers. Using a tool like iehttpheaders.html (IE) or (Firefox) to view headers, or a more comprehensive debug tool like Firebug ( for Firefox) that lets you look at the requests and responses. A 407 error or response code is an authentication request, but often the resulting effect can be seen as well. WDS Connector Setup Guide 21
22 7 Troubleshooting Determine Embedded Communications Use a debugging proxy to look at the requests and results. Charles Debugging Proxy ( or Fiddler ( are options that are available. Use a packet capture tool like Wireshark ( to look at the network traffic In the request header from the browser, you should see the NTLM Authentication information as listed in the following: HTTP/ Proxy Authentication Required Server: squid/2.6.stable18 Date: Wed, 09 Mar :38:00 GMT Content Type: text/html Content Length: 1373 Expires: Wed, 09 Mar :38:00 GMT X Squid Error: ERR_CACHE_ACCESS_DENIED 0 Proxy Authenticate: NTLM TlRMTVNTUAACAAAAHgAeADgAAAAFwomitx/ Ml9yhb9UgrZMAAAAAANYA1gBWAAAABQLODgAAAA9XAEQAUwAyADAAMAAzAEUAWABDAEgAMgAwADAANwACAB 4AVwBEAFMAMgAwADAAMwBFAFgAQwBIADIAMAAwADcAAQWAEUAWABDAEgAMgAwADAANwAtADYANAAEACYAdw BkAHMAMgAwADAAMwBlAHgAYwBoADIAMAAwADcALgBjAG8AbQADAD4AZQB4AGMAaAAyADAAMAA3AC0ANgA0A C4AdwkAHMAMgAwADAAMwBlAHgAYwBoADIAMAAwADcALgBjAG8AbQAFACYAdwBkAHMAMgAwADAAMwBlAHgAY wboadiamaawadcalgbjag8abqaaaaaa X Cache: MISS from exch wds2003exch2007.com X Cache Lookup: NONE from exch wds2003exch2007.com:3128 Via: 1.0 exch wds2003exch2007.com:3128 (squid/2.6.stable18) Proxy Connection: keep alive Notice the header labeled Proxy Authentication followed by NTLM and a bunch of data. This is what is expected (although the content of the data will change, it should look similar in nature). If the NTLM information is missing, this is an indication that the requesting component does not provide support. Add the requested URL or host into the bypass list. Tools listed in this section are third party utilities not developed nor supported by McAfee. This information is provided for your convenience only and is not an endorsement or recommendation. 22 WDS Connector Setup Guide
23 Index WDS Connector Setup Guide 23
24 A00
McAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Directory Services Connector extension
Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.
More informationMcAfee Asset Manager Console
Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationUpgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2
Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2003
Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationMcAfee SaaS Email Archiving
User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2010
Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationSetup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010
Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationSetup Guide. Email Archiving for Microsoft Exchange Server 2007
Setup Guide Email Archiving for Microsoft Exchange Server 2007 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationMcAfee Endpoint Security 10.0.0 Software
Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without
More informationSetup Guide Revision C. McAfee SaaS Web Protection Service
Setup Guide Revision C McAfee SaaS Web Protection Service COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee Content Security Reporter 1.0.0 Software
Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationData Center Connector 3.0.0 for OpenStack
Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationInstallation Guide. McAfee SaaS Endpoint Protection 6.0
Installation Guide McAfee SaaS Endpoint Protection 6.0 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationProduct Guide. McAfee Endpoint Security 10
Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationAdministration Guide Revision E. Account Management. For SaaS Email and Web Security
Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
More informationProduct Guide Revision A. McAfee Web Reporter 5.2.1
Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Client Proxy 1.0.0 Software
Product Guide McAfee Client Proxy 1.0.0 Software For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the
More informationInstallation Guide. McAfee SaaS Endpoint Protection
Installation Guide McAfee SaaS Endpoint Protection COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationProduct Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationWhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationMcAfee EETech for Mac 6.2 User Guide
McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
More informationMcAfee SiteAdvisor Enterprise 3.5 Patch 2
Installation Guide McAfee SiteAdvisor Enterprise 3.5 Patch 2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationInstallation Guide. McAfee epolicy Orchestrator 5.0.0 Software
Installation Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationMcAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationHow To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
More informationWhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationHELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE
HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationMcAfee Total Protection Service Installation Guide
McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationInstallation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationXStream Remote Control: Configuring DCOM Connectivity
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
More informationMcAfee Enterprise Mobility Management 11.0 Software
Installation Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationWindows XP Exchange Client Installation Instructions
WINDOWS XP with Outlook 2003 or Outlook 2007 1. Click the Start button and select Control Panel: 2. If your control panel looks like this: Click Switch to Classic View. 3. Double click Mail. 4. Click show
More informationMcAfee Enterprise Mobility Management 11.0 Software
Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
More informationJive Connects for Microsoft SharePoint: Troubleshooting Tips
Jive Connects for Microsoft SharePoint: Troubleshooting Tips Contents Troubleshooting Tips... 3 Generic Troubleshooting... 3 SharePoint logs...3 IIS Logs...3 Advanced Network Monitoring... 4 List Widget
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationMcAfee Database Activity Monitoring 5.0.0
Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationProduct Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationHow To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4
Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationAspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
More informationSELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationAventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
More informationNovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
More informationDesktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
More informationMcAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationKaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationWeb-Access Security Solution
WavecrestCyBlock Client Version 2.1.13 Web-Access Security Solution UserGuide www.wavecrest.net Copyright Copyright 1996-2014, Wavecrest Computing, Inc. All rights reserved. Use of this product and this
More informationRemote Console Installation & Setup Guide. November 2009
Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission
More informationCitrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
More informationHow To Upgrade A Websense Log Server On A Windows 7.6 On A Powerbook (Windows) On A Thumbdrive Or Ipad (Windows 7.5) On An Ubuntu 7.3.2 (Windows 8) Or Windows
Websense v7.6 Install or Upgrade Checklist Greetings from Websense Technical Support. Most Websense upgrades complete successfully, and from my years of troubleshooting, I have learned a number of steps
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationHow To Install The Snow Active Directory Discovery Service On Windows 7.5.1 (Windows) (Windows 7) (Powerbook) (For Windows) (Amd64) (Apple) (Macintosh) (Netbook) And (Windows
USER GUIDE Product Snow Active Directory Discovery Version 1.0 Release date 2014-04-29 Document date 2015-02-09 CONTENT ABOUT THIS DOCUMENT... 3 SNOW ACTIVE DIRECTORY DISCOVERY... 3 PREREQUISITES... 4
More informationSetting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
More informationilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
More informationHow to configure your Windows PC post migrating to Microsoft Office 365
How to configure your Windows PC post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 4 Several different Microsoft Office 365
More informationSnow Active Directory Discovery
Product Snow Active Directory Discovery Version 1.0 Release date 2014-04-29 Document date 2014-04-29 Snow Active Directory Discovery Installation & Configuration Guide Page 2 of 9 This document describes
More informationInstallation Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Installation Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationINSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX
INSTALL AND CONFIGURATION GUIDE Atlas 5.1 for Microsoft Dynamics AX COPYRIGHT NOTICE Copyright 2012, Globe Software Pty Ltd, All rights reserved. Trademarks Dynamics AX, IntelliMorph, and X++ have been
More informationSuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
More informationRLP Citrix Setup Guide
RLP Citrix Setup Guide M Version 2.1 Trademarks IBM is a registered trademark of International Business Machines Corporation. The following are trademarks of International Business Machines Corporation
More informationInstallation Guide Revision B. McAfee Email Gateway 7.x Virtual Appliances
Installation Guide Revision B McAfee Email Gateway 7.x Virtual Appliances COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationOneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
More informationSMART Vantage. Installation guide
SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the
More informationIntegration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6
Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationMcAfee epolicy Orchestrator 4.5 Cluster Installation Guide
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationInstallation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
More informationTANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
More informationTECHNICAL SUPPORT GUIDE
TECHNICAL SUPPORT GUIDE INTRODUCTION This document has been developed to provide a guideline for assisting our clients and their technicians with a standard Console Gateway Live configuration. IS THIS
More informationWhen your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
More informationDesktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationCLEO NED Active Directory Integration. Version 1.2.0
CLEO NED Active Directory Integration Version 1.2.0 CLEO NED Active Directory Integration Manual v1.2.0 Copyright c 2010 Lancaster University Network Services Limited. All rights reserved. Microsoft, Windows,
More informationSTEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System
STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System Abstract The intention of this document is to ensure successful installation of 3rd-Party software required for
More informationConnection and Printer Setup Guide
Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4
More informationInstallation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
More informationQuick Start Guide for the SupportDesk Web Interface
Quick Start Guide for the SupportDesk Web Interface Introduction Welcome to the Richmond SupportDesk Web Interface upgrade guide. This document should be used by the person(s) who will be performing the
More informationInstalling and Configuring WhatsUp Gold
Installing and Configuring WhatsUp Gold This guide provides information about installing and configuring WhatsUp Gold v14.2, including instructions on how to run the WhatsUp web interface through an Internet
More informationSage 200 Web Time & Expenses Guide
Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than
More informationCyclope Internet Filtering Proxy
Cyclope Internet Filtering Proxy - Installation Guide - Cyclope-Series - 2010 - Table of contents 1. Overview - 3-2. Installation - 4-2.1. System requirements - 4-2.2. Cyclope Internet Filtering Proxy
More informationLepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
More informationInstallation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
More informationWECCNET MESSAGING SYSTEM CLIENT DOCUMENTATION
TABLE OF CONTENTS WECCNET Messaging System Client Documentation WECCNET MESSAGING SYSTEM CLIENT DOCUMENTATION March 3 rd, 2015 SUPPORT CONTACTS... 2 CLIENT REQUIREMENTS... 2 CLIENT PRECONFIGURATION...
More information800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410
800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment
More informationAVG Business SSO Connecting to Active Directory
AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud
More informationHow To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
More informationUser Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
More informationNet Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationRelease Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
More informationVirtualization Guide. McAfee Vulnerability Manager Virtualization
Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Directory Services Connector extension
Setup Guide Revision B McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 and later COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More information