Implementing Microsoft File Exclusions in Trend Micro OfficeScan 8.0

Size: px
Start display at page:

Download "Implementing Microsoft File Exclusions in Trend Micro OfficeScan 8.0"

Transcription

1 A Trend Micro TrendEdge Solution Advanced Technologies and Techniques to Enhance Your Product Implementing Microsoft File Exclusions in Trend Micro OfficeScan 8.0 Mike Canavan Senior Solutions Architect Solution Architecture and Validation Program Trend Micro, Inc. Steven Spadaccini Director, Senior Solutions Strategist Solution Architecture and Validation Program Trend Micro, Inc. March 2008 Trend Micro, Inc N. De Anza Blvd. Cupertino, CA T / F

2 Implementing Microsoft File Exclusions intrend Micro OfficeScan 8.0 Trend Micro, the Trend Micro t-ball logo, and OfficeScan are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice, and the information contained in this document is provided as-is. This document is for informational purposes only, and is not supported by Trend Micro or its partners. TREND MICRO MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Copyright 2008 Trend Micro Incorporated. All rights reserved. Document Part No. TE01OSCE80_080324US A Trend Micro TrendEdge Solution i

3 Contents Introduction... 1 Using the OfficeScan 8.0 Administrative Console to Exclude Files from Scanning in OfficeScan Entering Microsoft Windows General Exclusions... 2 Excluding Windows XP, Windows 2000, and Windows 2003 Update or Automatic Update Files... 2 Entering Exclusions for Microsoft Windows Server 2000/2003 Domain Controllers... 2 Windows 2000 Active Directory and Related Files... 3 Windows Server 2003 Active Directory and Related Files... 3 Defining Exclusions for Microsoft Internet Information Services... 4 Entering Exclusions for Microsoft SQL Server... 4 Directories to be Excluded... 5 File Extensions to be Excluded... 5 Setting Exclusions for Microsoft Exchange Server 2000/ Entering Exclusions for Microsoft Exchange Server Setting Up Exclusions for a Microsoft Exchange 2007 Mailbox Server... 6 Setting Up Exclusions for a Microsoft Exchange 2007 Clustered Mailbox Server... 7 Setting Up Exclusions for a Microsoft Exchange 2007 Hub Transport Server... 7 Setting Up Exclusions for a Microsoft Exchange 2007 Edge Transport Server... 8 Setting Up Exclusions for a Microsoft Exchange 2007 Client Access Server Setting Up Exclusions for a Microsoft Exchange 2007 Unified Messaging Server Entering Microsoft Exchange-specific File Name Extension Exclusions Defining Exchange-specific Application-related Extensions Defining Exchange-specific Database-related Extensions Entering Exchange Content Index-related Extensions Entering Exchange Unified Messaging-related Extensions Defining Exclusions for a Microsoft Windows Cluster (All Applications) Entering Exclusions for Microsoft Internet Security and Acceleration (ISA) Server Defining Exclusions for Microsoft SharePoint Server Entering Exclusions for Microsoft Systems Management Server (SMS) Resources Web Sites About the Authors Mike Canavan Steven Spadaccini About Trend Micro A Trend Micro TrendEdge Solution ii

4 Introduction Trend Micro OfficeScan Client/Server Edition 8.0 (OfficeScan) protects Microsoft Windows servers and clients from viruses and other malware. As we have learned over the years of working with Microsoft products, there are Microsoft files and folders that OfficeScan should not scan. These files and folders should not be scanned because: Removing or quarantining these files or folders renders the operating system non-functional and prevents the system from performing its intended task. Excluding these files and folders from scanning enhances application and operating system performance. This document: Identifies those files and folders you must exclude from scanning by OfficeScan. Organizes these file and folder exclusions by application for ease of exclusion processing. We recommend that you configure these exclusions by scan type for only the servers hosting each specified application. We do not recommend applying these exclusions to all OfficeScan clients. Note: Trend Micro provides this document as-is as a courtesy to interested parties. The accuracy of the information is solely the author s responsibility. This document is neither supported by Trend Micro nor its partners. This document consists of the following sections: Using the OfficeScan 8.0 Administrative Console to Exclude Files from Scanning in OfficeScan 8.0 Entering Microsoft Windows General Exclusions Entering Exclusions for Microsoft Windows Server 2000/2003 Domain Controllers Defining Exclusions for Microsoft Internet Information Services Entering Exclusions for Microsoft SQL Server Setting Exclusions for Microsoft Exchange Server 2000/2003 Entering Exclusions for Microsoft Exchange Server 2007 Defining Exclusions for a Microsoft Windows Cluster (All Applications) Entering Exclusions for Microsoft Internet Security and Acceleration (ISA) Server Defining Exclusions for Microsoft SharePoint Server Entering Exclusions for Microsoft Systems Management Server (SMS) Using the OfficeScan 8.0 Administrative Console to Exclude Files from Scanning in OfficeScan 8.0 The Trend Micro OfficeScan 8.0 Administrator s Guide describes the process required to exclude files and directories from scanning. For more information about this process, see: A Trend Micro TrendEdge Solution 1

5 Entering Microsoft Windows General Exclusions When using OfficeScan to scan a Microsoft Windows server, you must exclude the following files from scanning: TABLE 1. Microsoft Windows General File Exclusions Windows General Operating System File Microsoft Outlook Personal STore (PST) file ITEM(S) NAME pagefile.sys *.pst Excluding Windows XP, Windows 2000, and Windows 2003 Update or Automatic Update Files If you use OfficeScan to scan a Windows XP, Windows 2000, or Windows Server 2003 running Windows Update or Windows Automatic Update, exclude: TABLE 2. Microsoft Windows XP, Windows 2000, and Windows 2003 Update or Automatic Update File Exclusions Windows Update or Automatic Update data store Automatic Update log files DEFAULT LOCATION %windir%\software Distribution\Datastore %windir%\software Distribution\Datastore\Logs ITEM(S) NAME DataStore.edb Edb*.log (multiple files) Res1.log Res2.log Edb.chk tmp.edb hiberfil.sys pagefile.sys Entering Exclusions for Microsoft Windows Server 2000/2003 Domain Controllers If you use OfficeScan to scan a Microsoft Windows 2000 or Microsoft Windows Server 2003 domain controller, exclude the following Windows components from scanning: A Trend Micro TrendEdge Solution 2

6 Windows 2000 Active Directory and Related Files This OfficeScan exclusion only applies to systems running Windows 2000 with Active Directory enabled. TABLE 3. Windows 2000 with Active Directory File Exclusion Main Active Directory (NTDS) database files REGISTRY ENTRY DEFAULT LOCATION ITEM NAME HKLM\System\Services\NTDS\ Parameters\DSA Database File %windir%\ntds NTDS.dit Windows Server 2003 Active Directory and Related Files These OfficeScan exclusions only apply to systems running Windows Server 2003 with Active Directory enabled. TABLE 4. Windows Server 2003 with Active Directory Folder and File Exclusions Active Directory transaction log files REGISTRY ENTRY DEFAULT LOCATION ITEM NAME HKLM\System\Services\NTDS\ Parameters\Database Log Files Path %windir%\ntds Main Active Directory (NTDS) database folder HKLM\System\Services\NTDS\ Parameters\DSA WorkingDirectory SYSVOL files %windir%\sysvol %windir%\sysvol\ domain\do_not_ REMOVE_NtFrs_ PreInstall_ Directory EDB*.log (can be multiple files) RES1.log RES2.log TEMP.edb EDB.chk All files in the indicated directories. %windir%\sysvol\ staging FRS Working Directory FRS Working Directory FRS Database Log files (if registry key is not set) HKEY_LOCAL_MACHINE\System\ CurrentControlSet\Services \NtFrs\Parameters\ Working Directory HKEY_LOCAL_MACHINE\System\ CurrentControlSet\Services \NtFrs\Parameters\ Working Directory HKEY_LOCAL_MACHINE\system\ currentcontrolset\services \NtFrs\Parameters\DB Log File Directory %windir%\sysvol\ staging areas FRS Working Dir\jet\sys\ FRS Working Dir\jet\ %windir%\ntds\frs Working Dir\jet\ log EDB.chk - NTFRS.jdb - *.log *.log A Trend Micro TrendEdge Solution 3

7 TABLE 4. Windows Server 2003 with Active Directory Folder and File Exclusions FRS Database Log files (if registry key is set) FRS Replica_root files FRS Replica staging directory FRS Preinstall directory REGISTRY ENTRY DEFAULT LOCATION ITEM NAME HKEY_LOCAL_MACHINE\system\ currentcontrolset\services \NtFrs\Parameters\DB Log File Directory HKEY_LOCAL_MACHINE\system\ currentcontrolset\services \NtFrs\Parameters\ Replica Sets\GUID\Replica Set Root HKEY_LOCAL_MACHINE\system\ currentcontrolset\services \NtFrs\Parameters\ Replica Sets\GUID\Replica Set Stage <Replica_root>\DO_NOT_ REMOVE_NtFrs_PreInstall_ Directory %windir%\ntds\db Log File Directory\log\ *.log All files The entire directory The entire directory (Note: The Preinstall directory is always open exclusively when FRS is running.) Defining Exclusions for Microsoft Internet Information Services If you use OfficeScan to scan a host running Internet Information Services (IIS), exclude all files in the following directories: %System Root%\system32\logfiles\w3svc# C:\inetpub Also, exclude all temporary compressed IIS files from scanning. The default path to the directory where these files are located is: %systemroot%\iis Temporary Compressed Files This directory may have been changed to another location. To verify the compression directory: 1. Click Start > Programs > Administrative Tools > Internet Information Services (IIS) Manager. 2. In IIS Manager, right-click the Web Sites folder, and then click Properties. 3. Click the Service tab. 4. Under HTTP Compression, make sure that Compress static files is selected, and then locate the path to the temporary directory. Entering Exclusions for Microsoft SQL Server If you use OfficeScan to scan a host running Microsoft SQL Server, exclude the following directories and file extensions from scanning: A Trend Micro TrendEdge Solution 4

8 Directories to be Excluded...\Microsoft SQL Server\MSSQL\Data...\Microsoft SQL Server\MSSQL\Log...\Microsoft SQL Server\MSSQL\Backup File Extensions to be Excluded.mdf.ldf.ndf Setting Exclusions for Microsoft Exchange Server 2000/2003 If you use OfficeScan to scan a host running Microsoft Exchange Server 2000 or Microsoft Exchange Server 2003, exclude the following directories and files from scanning: TABLE 5. Microsoft Exchange Server 2000 and 2003 Folder and File Exclusions DEFAULT FOLDER LOCATION Exchange Server Exchsrvr\Mdbdata drive Ms Exchange databases and log files Exchsrvr\Mdbdata Exchange Mail Exchsrvr\Mtadata Transfer Agent (MTA) files All additional log files Exchange Virtual Exchsrvr\Mailroot Server folder The working folder \Exchsrvr\MDBData used to store temporary streaming message conversion files. The temporary Depends on the utility. folder used by offline maintenance utilities. Site Replication Service (SRS) files Microsoft Internet Information Services (IIS) system files All Internet Mail Connector Files Exchsrvr\Srsdata %SystemRoot%\System32\ Inetsrv \Exchsrvr\IMCData ADDITIONAL INFORMATION Exclude the entire drive. Exclude all databases and files. Exclude all files. For example, the Exchsrvr\ server_name.log file. Exclude the entire folder. Exclude the actual location. (You configure the location when you set up the application.) For example, the Eseutil.exe file. However, the actual location depends on the utility. Generally, this is the directory from where you launch the executable, but you configure the actual location. Exclude all files. Exclude all files. Exclude all files. A Trend Micro TrendEdge Solution 5

9 TABLE 5. Microsoft Exchange Server 2000 and 2003 Folder and File Exclusions Exchange Server folder DEFAULT FOLDER LOCATION Exchsrvr ADDITIONAL INFORMATION Exclude the entire folder. This is optional, but suggested. Checkpoint folder The folder that contains the.chk files. Miscellaneous files *.edb *.stm (Exchange 2000 Server) *.log files Note: We strongly recommends that you temporarily disable OfficeScan during operating system and Exchange upgrades. This includes both when upgrading to new versions of Exchange or the operating system, and when applying any Exchange or operating system fixes or service packs. Entering Exclusions for Microsoft Exchange Server 2007 If you use OfficeScan to scan a host running Microsoft Exchange Server 2007, exclude the following directories and files from scanning: Note: Information is provided for each server role. Setting Up Exclusions for a Microsoft Exchange 2007 Mailbox Server If you use OfficeScan to scan a Microsoft Exchange Server 2007 host operating as a mailbox server, exclude the following files and folders from scanning: TABLE 6. Microsoft Exchange Server 2007 Folder and File Exclusions for Mailbox Servers Exchange databases, checkpoint files, and log files across all storage groups Database content indexes DEFAULT FOLDER LOCATION %Program Files%\ Server\Mailbox Server\Mailbox ADDITIONAL INFORMATION You can obtain the directory location of the following files by running the these commands in the Exchange Management Shell: Transaction log and Checkpoint file Get-StorageGroup server <servername> fl *path* Mailbox database Get-MailboxDatabase server <servername> fl *path* Public folder database Get-PublicFolderDatabase server <servername> fl *path* These are located in the storage group sub-folders under the Mailbox directory. A Trend Micro TrendEdge Solution 6

10 TABLE 6. Microsoft Exchange Server 2007 Folder and File Exclusions for Mailbox Servers DEFAULT FOLDER LOCATION ADDITIONAL INFORMATION General log files, such as message tracking log files %Program Files% \ Server\TransportRoles\Logs To determine the log paths being used, run the following command in the Exchange Management Shell: Get-MailboxServer <servername> fl *path* AND Exchange Offline Address Book files Internet Information Services (IIS) system files Temporary folders used for offline maintenance utilities (for example, Eseutil.exe). Temporary OLE conversion folders Mailbox database temporary folder Exchange-aware antivirus program folders, such as those for Trend Micro ScanMail for Exchange Microsoft\ Exchange Server\ Logging Server\ExchangeOAB %SystemRoot%\System32\ Inetsrv By default, this folder is the location where you run the.exe file. Microsoft\ Exchange Server\ Working\OleConvertor Server\Mailbox\ MDBTEMP See the subfolders under the ExchangeOAB folder. You must exclude all IIS system files from scanning. You can configure the location from where you run the executable when you run the utility. These are the temporary folders that Exchange uses to perform OLE conversions These are the temporary folders that Exchange uses to perform mailbox database conversions. See the application help for assistance in determining the correct folders. Setting Up Exclusions for a Microsoft Exchange 2007 Clustered Mailbox Server If you use OfficeScan to scan a Microsoft Exchange Server 2007 host operating as a clustered mailbox server, exclude the following files and folders from scanning: All the items listed in the mailbox server role list. The quorum disk. The %Winnt%\Cluster folder. The file share witness. This is located on another server in the environment, typically a Hub transport server. Setting Up Exclusions for a Microsoft Exchange 2007 Hub Transport Server If you use OfficeScan to scan a Microsoft Exchange Server 2007 host operating as a hub transport server, exclude the following files and folders from scanning: A Trend Micro TrendEdge Solution 7

11 TABLE 7. Microsoft Exchange Server 2007 Folder and File Exclusions for Hub Transport Servers DEFAULT FOLDER LOCATION ADDITIONAL INFORMATION General log files (for example, message tracking logs) Exchange message folders Transport server: role queue database, checkpoint, and log files Transport server role Sender Reputation database, checkpoint, and log files Transport server role IP filter database, checkpoint, and log files Temporary content conversion folders Temporary OLE conversion folders Exchange-aware antivirus program folders, such as those for Trend Micro ScanMail for Exchange Server\TransportRoles\ Logs Server\TransportRoles Server\TransportRoles\ Data\Queue Server\TransportRoles\ Data\SenderReputation Server\TransportRoles\ Data\IpFilter The server s TMP file Microsoft\ Exchange Server\ Working\OleConvertor These files are located in subfolders under the Logs folder. To determine the log paths you are using, run the following command in the Exchange Management Shell: Get-TransportServer <servername> fl *logpath*,*tracingpath* These files are located in subfolders under the TransportRoles folder. To determine the log paths you are using, run the following command in the Exchange Management Shell: Get-TransportServer <servername> fl *dir*path* Exclude all relevant files. Exclude all relevant files. Exclude all relevant files. These are temporary folders that Exchange uses to perform content conversions. These are temporary folders that Exchange uses to perform OLE conversions. See the application help for assistance in determining the correct folders. The temporary folders that are used to perform conversions: Content conversions performed in the server s TMP folder. OLE conversions performed in Server\Working\OleConvertor folder. Any Exchange-aware antivirus program folders, including Trend Micro ScanMail for Exchange. Setting Up Exclusions for a Microsoft Exchange 2007 Edge Transport Server If you use OfficeScan to scan a Microsoft Exchange Server 2007 host operating as an edge transport server, exclude the following files and folders from scanning: A Trend Micro TrendEdge Solution 8

12 TABLE 8. Microsoft Exchange Server 2007 Folder and File Exclusions for Edge Transport Servers DEFAULT FOLDER LOCATION ADDITIONAL INFORMATION Active Directory Application Mode (ADAM) database and log files General log files (for example, message tracking logs) Exchange message folders Transport server role queue database, checkpoint, and log files Transport server role Sender Reputation database, checkpoint, and log files Transport server role IP filter database, checkpoint, and log files Temporary content conversion folder Temporary OLE conversion folders Exchange-aware antivirus program folders, such as those for Trend Micro ScanMail for Exchange %ProgramFiles%\ Server\TransportRoles\ Data\Adam Server\TransportRoles\ Logs Server\TransportRoles Server\TransportRoles\ Data\Queue Server\TransportRoles\ Data\SenderReputation Server\TransportRoles\ Data\IpFilter The server s TMP file Microsoft\ Exchange Server\ Working\OleConvertor Exclude all relevant files. These files are located in subfolders under the Logs folder. To determine the log paths you are using, run the following command in the Exchange Management Shell: Get-TransportServer <servername> fl *logpath*,*tracingpath* These files are located in subfolders under the TransportRoles folder. To determine the log paths you are using, run the following command in the Exchange Management Shell: Get-TransportServer <servername> fl *dir*path* Exclude all relevant files. Exclude all relevant files. Exclude all relevant files. These are temporary folders that Exchange uses to perform content conversions. These are temporary folders that Exchange uses to perform OLE conversions. See the application help for assistance in determining the correct folders. A Trend Micro TrendEdge Solution 9

13 Setting Up Exclusions for a Microsoft Exchange 2007 Client Access Server If you use OfficeScan to scan a Microsoft Exchange Server 2007 host operating as a client access server, exclude the following files and folders from scanning: The Internet Information Services (IIS) 6.0 compression folder that is used with Microsoft Outlook Web Access. By default, the compression folder in IIS 6.0 is located at %systemroot%\iis Temporary Compressed Files. IIS system files in the %SystemRoot%\System32\Inetsrv folder. The Internet-related files that are stored in the sub-folders of the %Program Files%\ Server\ClientAccess folder The temporary folder that is used to perform content conversion. By default, this is the server s TMP folder. Setting Up Exclusions for a Microsoft Exchange 2007 Unified Messaging Server If you use OfficeScan to scan a Microsoft Exchange Server 2007 host operating as a unified messaging server, exclude the following files and folders from scanning: The grammar files that are stored in the subfolders in the Server\UnifiedMessaging\grammars folder The voice prompts that are stored in the subfolders in the Server\UnifiedMessaging\Prompts folder The voic files that are stored in the Server\UnifiedMessaging\voic folder The bad voic files that are stored in the Server\UnifiedMessaging\badvoic folder Entering Microsoft Exchange-specific File Name Extension Exclusions In addition to excluding specific directories and processes, as a secondary measure, in case directory exclusions fail or files are moved, you should exclude the following Exchange-specific file extensions. Defining Exchange-specific Application-related Extensions.config.dia.wsb Defining Exchange-specific Database-related Extensions.chk.log.edb.jrs A Trend Micro TrendEdge Solution 10

14 .que Offline Address Book-related extensions:.lzx Entering Exchange Content Index-related Extensions.ci.dir.wid Entering Exchange Unified Messaging-related Extensions.cfg.grxml Defining Exclusions for a Microsoft Windows Cluster (All Applications) If you use OfficeScan to scan a Microsoft cluster, exclude the following from scanning: Q:\(Quorum Drive) \Windows\Cluster Entering Exclusions for Microsoft Internet Security and Acceleration (ISA) Server If you use OfficeScan to scan a Microsoft ISA server, exclude the following folders from scanning: In Proxy Mode, exclude the Default Cache folder. \Microsoft ISA Server\ISALogs folder. Defining Exclusions for Microsoft SharePoint Server If you use OfficeScan to scan a Microsoft SharePoint server, exclude the following files from scanning: \SharePoint Portal Server\ \Program Files\Common Files\Microsoft Shared\Web Storage System\ If you use Microsoft SharePoint Portal Server 2003 and you apply Service Pack 1 (SP1), you must exclude the following folder from antivirus scans: \Windows\Temp\Frontpagetempdir\ A Trend Micro TrendEdge Solution 11

15 Entering Exclusions for Microsoft Systems Management Server (SMS) If you use OfficeScan to scan a Microsoft SMS, exclude the following folders from scanning: \SMS\Inboxes\SMS_Executive Thread Name\ \SMS_CCM\ServiceData A Trend Micro TrendEdge Solution 12

16 Resources Web Sites http: // com/us A Trend Micro TrendEdge Solution 13

17 About the Authors Mike Canavan Mike has been with Trend Micro for over 3 years and is currently a Senior Solutions Architect. Prior to this current role, Mike served as a Senior Presales Engineer and has over 5 years of experience in network security and system administration. Prior to working for Trend Micro, Mike worked for CDW Presales Engineering with a focus in security. Steven Spadaccini Steven Spadaccini has been with Trend Micro for over 5 years and is currently the Director and Senior Solutions Strategist for the Solution Architecture and Validation Program. Prior to these roles, Steven worked as a Senior Security Engineer at Trend Micro and has over 12 years experience in network security. Before working for Trend Micro, Steven worked for Sun Microsystems Enterprise Server Products. A Trend Micro TrendEdge Solution 14

18 A Trend Micro TrendEdge Solution 15

19 About Trend Micro Trend Micro Incorporated is a pioneer in secure content and threat management. Founded in 1988, Trend Micro provides individuals and organizations of all sizes with award-winning security software, hardware, and services. With headquarters in Tokyo and operations in more than 30 countries, Trend Micro solutions are sold through corporate and value-added resellers and service providers worldwide. For additional information and evaluation copies of Trend Micro products and services, visit our Web site at A Trend Micro TrendEdge Solution 16

File-Level Antivirus Scanning on Exchange 2007

File-Level Antivirus Scanning on Exchange 2007 File-Level Antivirus Scanning on Exchange 2007: Exchange 2007 Help 1 of 6 2009 Microsoft Corporation. All rights reserved. File-Level Antivirus Scanning on Exchange 2007 Applies to: Exchange Server 2007

More information

BitDefender Security for File Servers RECOMMENDED CONFIGURATION

BitDefender Security for File Servers RECOMMENDED CONFIGURATION BitDefender Security for File Servers RECOMMENDED CONFIGURATION Summary Computers running Windows Server 2003, Windows 2000 or Windows XP... 3 Computers Running Windows Server 2003 and Windows 2000 Domain

More information

Kaspersky Lab Scan Exclusions by Application

Kaspersky Lab Scan Exclusions by Application Kaspersky Lab Scan Exclusions by Application One of the first steps in the implementation of antivirus protection is creation of antivirus policies. On a product by product basis, software vendors generally

More information

How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)

How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes) A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365

More information

T E C H N I C A L S A L E S S O L U T I O N

T E C H N I C A L S A L E S S O L U T I O N Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com

More information

For computers that are running Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 2000, Windows XP, or Windows Vista

For computers that are running Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 2000, Windows XP, or Windows Vista Article ID: 822158 - Last Review: September 4, 2009 - Revision: 11.0 Virus scanning recommendations for computers that are running Windows Server 2008 Windows Server 2008, Windows Server 2003, Windows

More information

Lepide Exchange Recovery Manager

Lepide Exchange Recovery Manager Configuration Guide Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Lesson Plans Configuring Exchange Server 2007

Lesson Plans Configuring Exchange Server 2007 Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

McAfee VirusScan Enterprise 8.8 Best Practices Guide

McAfee VirusScan Enterprise 8.8 Best Practices Guide Best Practices Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into

More information

SAM 8.0 Backup and Restore Guide. SafeNet Integration Guide

SAM 8.0 Backup and Restore Guide. SafeNet Integration Guide SAM 8.0 Backup and Restore Guide SafeNet Integration Guide Revision A November 2012 SAM 8.0 Backup and Restore Guide - SafeNet Integration Guide Introduction Copyright 2012 SafeNet, Inc. All rights reserved.

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

NTP Software File Auditor for NAS, EMC Edition

NTP Software File Auditor for NAS, EMC Edition NTP Software File Auditor for NAS, EMC Edition Installation Guide June 2012 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for NAS,

More information

Installing Microsoft Exchange Integration for LifeSize Control

Installing Microsoft Exchange Integration for LifeSize Control Installing Microsoft Exchange Integration for LifeSize Control September 2005 Part Number 132-00002-001, Version 1.1 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize

More information

High Availability for Exchange Server 5.5 Using Double-Take

High Availability for Exchange Server 5.5 Using Double-Take High Availability for Exchange Server 5.5 Using Double-Take High Availability for Exchange Server 5.5 Using Double-Take Revision 3.2.0 published August 2004 Double-Take, GeoCluster and NSI are registered

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1

MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1 MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1 Course Number: 5047B Course Length: 3 Days Certification Exam This course will help you prepare for the following Microsoft

More information

EAsE and Integrated Archive Platform (IAP)

EAsE and Integrated Archive Platform (IAP) EAsE and Integrated Archive Platform (IAP) HP Outlook Web Access (OWA) Extension on Exchange 2007 Table of Contents Overview... 2 Microsoft Outlook Web Access 2007 (OWA 2007)... 2 HP Outlook Web Access

More information

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement

More information

StarWind iscsi SAN & NAS: Configuring HA File Server on Windows Server 2012 for SMB NAS January 2013

StarWind iscsi SAN & NAS: Configuring HA File Server on Windows Server 2012 for SMB NAS January 2013 StarWind iscsi SAN & NAS: Configuring HA File Server on Windows Server 2012 for SMB NAS January 2013 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks

More information

Deploying Exchange Server 2007 SP1 on Windows Server 2008

Deploying Exchange Server 2007 SP1 on Windows Server 2008 Deploying Exchange Server 2007 SP1 on Windows Server 2008 Product Group - Enterprise Dell White Paper By Ananda Sankaran Andrew Bachler April 2008 Contents Introduction... 3 Deployment Considerations...

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

File Auditor for NAS, Net App Edition

File Auditor for NAS, Net App Edition File Auditor for NAS, Net App Edition Installation Guide Revision 1.2 - July 2015 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for

More information

Microsoft Exchange 2003 Disaster Recovery Operations Guide

Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Corporation Published: December 12, 2006 Author: Exchange Server Documentation Team Abstract This guide provides installation and deployment

More information

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252

More information

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up Exchange Server Archiving 10.0 Symantec Enterprise Vault: Setting up Exchange Server Archiving The software described in this book is furnished under a license agreement

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Trend ScanMail. for Microsoft Exchange. Quick Start Guide

Trend ScanMail. for Microsoft Exchange. Quick Start Guide Trend ScanMail for Microsoft Exchange Quick Start Guide Trend ScanMail for Microsoft Exchange ScanMail for Exchange This Quick Start Guide provides a step-by-step guide to installing ScanMail for Exchange,

More information

EXAM - 70-662. TS: Microsoft Exchange Server 2010, Configuring. Buy Full Product. http://www.examskey.com/70-662.html

EXAM - 70-662. TS: Microsoft Exchange Server 2010, Configuring. Buy Full Product. http://www.examskey.com/70-662.html Microsoft EXAM - 70-662 TS: Microsoft Exchange Server 2010, Configuring Buy Full Product http://www.examskey.com/70-662.html Examskey Microsoft 70-662 exam demo product is here for you to test the quality

More information

Installation Manual UC for Business Unified Messaging for Exchange 2010

Installation Manual UC for Business Unified Messaging for Exchange 2010 Installation Manual UC for Business Unified Messaging for Exchange 2010 NEC Corporation nec.com Unified Messaging for Exchange Installation Manual - Exchange 2010 Edition Table of Contents About this Manual...

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

A Transend Corporation White Paper Preparing Microsoft Exchange Server for Migration

A Transend Corporation White Paper Preparing Microsoft Exchange Server for Migration A Transend Corporation White Paper Preparing Microsoft Exchange Server for Migration Copyright December 2012 by Transend Corporation Table of Contents Section 1: Introduction... 1 Section 2: Basic Requirements...

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0.2 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

StarWind iscsi SAN & NAS: Configuring HA Shared Storage for Scale- Out File Servers in Windows Server 2012 January 2013

StarWind iscsi SAN & NAS: Configuring HA Shared Storage for Scale- Out File Servers in Windows Server 2012 January 2013 StarWind iscsi SAN & NAS: Configuring HA Shared Storage for Scale- Out File Servers in Windows Server 2012 January 2013 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software

More information

StarWind Virtual SAN Installing & Configuring a SQL Server 2012 Failover Cluster

StarWind Virtual SAN Installing & Configuring a SQL Server 2012 Failover Cluster #1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Installing & Configuring a SQL Server 2012 Failover JANUARY 2015 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business OfficeScan TM Client/Server Edition 8 for Enterprise and Medium Business TM TM for Windows Vista Installation and Deployment Guide es Endpoint Security Trend Micro Incorporated reserves the right to make

More information

StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008

StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008 StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008 www.starwindsoftware.com Copyright 2008-2012. All rights reserved. COPYRIGHT Copyright 2008-2012. All rights reserved.

More information

Technical Notes TECHNICAL NOTES. Release number 8.2 Service Pack 1 302-001-239 REV 01. January, 2015

Technical Notes TECHNICAL NOTES. Release number 8.2 Service Pack 1 302-001-239 REV 01. January, 2015 EMC NetWorker Module for Microsoft: Exchange Server Granular Level Recovery (GLR) using EMC NetWorker Module for Microsoft with Ontrack PowerControls Release number 8.2 Service Pack 1 TECHNICAL NOTES 302-001-239

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Basic Exchange Setup Guide

Basic Exchange Setup Guide Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided

More information

Getting Started Guide

Getting Started Guide GFI MailArchiver for Exchange Getting Started Guide By GFI Software Ltd. http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and

More information

NTP Software QFS for NAS, NetApp Edition Installation Guide

NTP Software QFS for NAS, NetApp Edition Installation Guide NTP Software QFS for NAS, NetApp Edition Installation Guide This Installation Guide applies to all NTP Software QFS for NAS, NetApp filer editions. Abstract This guide provides a short introduction to

More information

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent Version 6.3.1 Fix Pack 2.

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent Version 6.3.1 Fix Pack 2. IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:

More information

Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide

Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide APPLICATION VERSION: 8.0 MAINTENANCE RELEASE 2 CRITICAL FIX 1 Dear User! Thank you for choosing our product. We hope that this document

More information

Unity Error Message: Your voicemail box is almost full

Unity Error Message: Your voicemail box is almost full Unity Error Message: Your voicemail box is almost full Document ID: 111781 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solution Delete Voice Mail Messages from

More information

Metalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015

Metalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015 Metalogix Replicator Quick Start Guide Publication Date: May 14, 2015 Copyright Metalogix International GmbH, 2002-2015. All Rights Reserved. This software is protected by copyright law and international

More information

StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012

StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012 StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

MailMarshal Exchange in a Windows Server Active/Passive Cluster

MailMarshal Exchange in a Windows Server Active/Passive Cluster MailMarshal Exchange in a Windows Server Active/Passive Cluster November, 2006 Contents Introduction 2 Preparation 3 Generic Resource Creation 4 Cluster MailMarshal Install 4 Antivirus Software 8 Known

More information

Data Collection Agent for Active Directory

Data Collection Agent for Active Directory Data Collection Agent for Active Directory Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for the installation of Data Collection Agent Active Directory, from an

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End

More information

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business OfficeScan TM Client/Server Edition 8 for Enterprise and Medium Business TM TM for Windows Vista Installation and Deployment Guide es Endpoint Security Trend Micro Incorporated reserves the right to make

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up Exchange Server Archiving 9.0 Symantec Enterprise Vault: Setting up Exchange Server Archiving The software described in this book is furnished under a license agreement

More information

How to Configure Double-Take on Microsoft Exchange Server

How to Configure Double-Take on Microsoft Exchange Server High Availability for Exchange Server 5.0 and 5.5 Using Double-Take 4.x High Availability for Exchange Server 5.0 and 5.5 Using Double-Take 4.x published August 2002 NSI and Double-Take are registered

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

GFI FAXmaker 14.3 for Exchange/Lotus/SMTP. Manual. By GFI Software Ltd

GFI FAXmaker 14.3 for Exchange/Lotus/SMTP. Manual. By GFI Software Ltd GFI FAXmaker 14.3 for Exchange/Lotus/SMTP Manual By GFI Software Ltd http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data

More information

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

escan SBS 2008 Installation Guide

escan SBS 2008 Installation Guide escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.

More information

SAM Backup and Restore Guide. SafeNet Integration Guide

SAM Backup and Restore Guide. SafeNet Integration Guide SAM Backup and Restore Guide SafeNet Integration Guide April 2011 Introduction Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete

More information

Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step

Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Guide Microsoft Corporation Published: July 2009 Updated: September 2009 Abstract Remote Desktop Web Access (RD Web

More information

StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012

StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012 StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which

More information

10135A: Configuring, Managing, and Troubleshooting Microsoft Exchange Server 2010

10135A: Configuring, Managing, and Troubleshooting Microsoft Exchange Server 2010 10135A: Configuring, Managing, and Troubleshooting Microsoft Exchange Server 2010 Course Number: 10135A Course Length: 5 Day Course Overview This instructor-led course will provide you with the knowledge

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

Basic Exchange Setup Guide

Basic Exchange Setup Guide Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Enterprise Vault Whitepaper Move Archive Feature Overview

Enterprise Vault Whitepaper Move Archive Feature Overview Enterprise Vault Whitepaper Move Archive Feature Overview This document provides an overview of the Enterprise Vault Move Archive feature This document applies to the following version(s) of :

More information

Data Collection Agent for NAS EMC Isilon Edition

Data Collection Agent for NAS EMC Isilon Edition Data Collection Agent for NAS EMC Isilon Edition Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for the installation of Data Collection Agent for NAS, EMC Isilon

More information

Compatibility with Encryption Products

Compatibility with Encryption Products Technical Brief Compatibility with Encryption Products Overview The purpose of this document is to describe the integration between Persystent Suite 4.5 and disk encryption products such as McAfee Endpoint

More information

CYAN SECURE WEB APPLIANCE. User interface manual

CYAN SECURE WEB APPLIANCE. User interface manual CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network

More information

CA DLP. Stored Data Integration Guide. Release 14.0. 3rd Edition

CA DLP. Stored Data Integration Guide. Release 14.0. 3rd Edition CA DLP Stored Data Integration Guide Release 14.0 3rd Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

Installing and Configuring a. SQL Server 2012 Failover Cluster

Installing and Configuring a. SQL Server 2012 Failover Cluster Installing and Configuring a SQL Server 2012 Failover Cluster Edwin M Sarmiento Applies to: SQL Server 2012 SQL Server 2014 P a g e 1 Copyright This document is provided as-is. Information and views expressed

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ).

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). I. Service Definition. Exchange My Mail will provide Hosted Exchange and other Application Services

More information

Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server

Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server Windows Server 2003, Windows Server 2008 5.1 Veritas Cluster Server Application Note: Disaster Recovery for Microsoft

More information

Sage HRMS 2012 Sage Employee Self Service. Technical Installation Guide for Windows Server 2003 and Windows Server 2008

Sage HRMS 2012 Sage Employee Self Service. Technical Installation Guide for Windows Server 2003 and Windows Server 2008 Sage HRMS 2012 Sage Employee Self Service Technical Installation Guide for Windows Server 2003 and Windows Server 2008 2011 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

Technical Note. Performing Exchange Server Granular Level Recovery by using the EMC Avamar 7.1 Plug-in for Exchange VSS with Ontrack PowerControls

Technical Note. Performing Exchange Server Granular Level Recovery by using the EMC Avamar 7.1 Plug-in for Exchange VSS with Ontrack PowerControls Performing Exchange Server Granular Level Recovery by using the EMC Avamar 7.1 Plug-in for Exchange VSS with Ontrack PowerControls Technical Note 302-001-437 REV 01 December, 2014 This technical note describes

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information