IC L05: Security.cloud Configuring DLP on to your flow & Applying security to your Office 365 or Google Apps deployment Hands-On Lab

Size: px
Start display at page:

Download "IC L05: Email Security.cloud Configuring DLP on to your email flow & Applying security to your Office 365 or Google Apps email deployment Hands-On Lab"

Transcription

1 IC L05: Security.cloud Configuring DLP on to your flow & Applying security to your Office 365 or Google Apps deployment Hands-On Lab Description This session is for existing customers and those interested to learn how to apply compliance-driven DLP policies on to your flow using the new templates and controls that will be launched in Security.cloud. We'll also look at how to apply enhanced security on to Office 365 and Google Apps deployments, as well as reviewing some of the latest features available in our cloud security service. At the end of this lab, you should be able to Create Data Loss Prevention.cloud policies that enforce acceptable use policies and prevent compliance breaches. Understand the various different actions that can be triggered when an DLP policy matches a particular . Test some pre-built DLP policies to understand better how the service can prevent data loss. Understand how outbound from hosted providers Microsoft Office 365 and Google Apps can now be scanned by the Security.cloud service. Notes A brief presentation will introduce this lab session and discuss key concepts. The lab will be directed and provide you with step-by-step walkthroughs of key features. Feel free to follow the lab using the instructions on the following pages. Be sure to ask your instructor any questions you may have. Thank you for coming to our lab session.

2 Lab 1 Creating some Data Loss Prevention.cloud policies In this lab exercise you will start by sending some s to test some pre-built DLP policies and then examine how outbound s from hosted deployments can be scanned by Symantec.cloud. You will then create some DLP policies that will enforce acceptable use policies and prevent compliance breaches. Your instructor will provide you with login credentials for the Symantec.cloud Management Console and Google Apps accounts for a particular cloudtrainx.com domain. Exercise 1 Sending some s to test DLP.cloud In this first exercise you are going to send some s from your personal webmail account that should be matched against some pre-built DLP policies. At the end of the Lab 2 you will examine whether the s have been matched. 1. Log in to the Client virtual machine as msmith with a password of Symc4now! 2. Open Internet Explorer and create an using your personal webmail account and add [email protected] (where X is for your allocated domain) into the To: field. Give the the subject: This contains a spoofed file and add some appropriate text to the body of the Attach the file ThisFileisSpoofed.txt that you will find in the folder C:\LabFiles. 4. Send the Create an using your personal webmail account to [email protected] (where X is for your allocated domain). Give the the subject: This contains a video file and add some appropriate text to the body of the This time attach the file video.mp4 that you will find in the folder C:\LabFiles. 7. Send the Create an using your personal webmail account to [email protected]. Give the the subject: This contains reference to a confidential document. 9. Add some appropriate text to the body of the and include the following document ID: DOC_16324_ Send the Create another using your personal webmail account to [email protected]. Give the the subject: This contains reference to another document. 12. Add some appropriate text to the body of the and include the following document ID: DOC_22435_ Send the . 2 of 12

3 Exercise 2 Examining the settings for scanning outbound s from Google Apps and Office In Internet Explorer click the Symantec.cloud Management Console button on the Favorites bar or type the URL into the address bar. 2. Log in to the Symantec.cloud Management Portal using the account given to you by your instructor, the password is Symc4now! 3. Click the Services tab, then click Services, and finally click Outbound Routes. 4. Expand the Hosted Services section. 5. Choose the Select hosted service drop down field. Note that you can choose either Google Apps or Office In addition to setting the hosted service provider within the Symantec.cloud management console you also need to configure the routing of outbound via Symantec.cloud in the management console of the hosted provider. 7. Leave the Internet Explorer window open for the next exercise. Exercise 3 Creating a DLP policy that blocks s that contain offensive language 1. In the Symantec.cloud Management Console window click the Services tab then click Data Loss Prevention. On the Policies page click the Settings button and examine the default settings that can be applied to all DLP.cloud policies. 2. In the Default sender address field type [email protected] (where X is the number for your assigned CloudtrainX.com domain), then scroll down and click Save. 3. Before creating the first policy you are going to create a list group containing all the pre-built lists of English offensive words. Click the Lists tab and then click New List Group. 3 of 12

4 4. In the Name field type English Offensive Words and in the Description field type Combination of all lists of English offensive language. 5. Change the Content type drop down field to Keywords, then make sure that the Include tab is selected and then select the seven lists that begin with EN and click Save. 6. Click on the policies tab, then click New Policy. 7. In the Name field type Block s containing offensive language. 8. In the Description field type This policy will prevent users from sending or receiving s that contain offensive words. 9. Leave the Apply to: field as Both inbound and outbound Leave the Execute if field as All rules are met. 11. From the Action drop down list choose Block and delete (take a moment to review all the actions are available). Note that Exit is checked and grayed out because the Block and delete is always, by definition, an exit action. 4 of 12

5 12. Click Add notification and uncheck Notify sender, then click Add. 13. Click Add rule and leave Execute if as All conditions are met. 14. In the Add a condition drop down field choose Content Keyword list, then click Browse for a keyword list. Select the list group called English Offensive Words and click Add. 15. Change the contains field to AT LEAST and ensure that the number is 1 (default). In the Look in section check Body, Subject and File attachments. 16. Click Save to save the policy. 5 of 12

6 17. In the Active column click Off to enable the policy. Leave the management portal open. Exercise 4 Creating a DLP policy from a policy template In this lab exercise you will create a policy using the PCI (Payment Card Industry) Template and then configure it to copy s to an administrator address. 1. Click on the policies tab, then click New Policy from Template. 2. In the Create a new policy from a template dialog box select PCI (Payment Card Industry) Template and then click Create. Notice that a policy is created with a standard name and is added to the bottom of the policy list. 3. Open the newly created policy and examine all the settings within the policy. Notice that the policy contains two different rules. Examine the lists used within the policy to determine what will trigger the policy. 6 of 12

7 4. Change the Name field to Copy s containing credit card details to administrator. 5. Change the Apply to field to Outbound only. 6. Change the Action to Copy to Administrator. 7. Uncheck Use Custom. 8. To save the policy click Save, 9. In the Active column click Off to enable the policy. Leave the Management Portal open. Exercise 5 - Creating a DLP policy that uses a custom regular expression list In this exercise you are going to create a simple custom regular expression list that is going to match confidential project documents IDs of the format ABC_nnnnn (where ABC represents any 3 capital letters and nnnnn is any 5 digit number) being sent to external recipients. 1. Before using any regular expression within the Data Loss Prevention.cloud service it is always good practice to test the regular expression using an online tool. 2. In Internet Explorer open another tab and browse to the web site 3. In the Regular expression field type ([A-Z]{3})_([0-9]{5}) then in the Input 1 field type a potential document ID using the format outlined in the introduction to the exercise and click Test. 7 of 12

8 4. Try several different tests using valid and non valid entries. Note: if you cannot get a match from a correctly formatted document ID then check the regular expression very carefully. Do not proceed until you can get a match. Leave the web browser window open. 5. Return to the tab where the Symantec.cloud Management portal is running and if necessary log in using the credentials given to you at the start of the lab. 6. Click the Services tab, and click Data Loss Prevention then click on the Lists tab. 7. Click New List and in the Create a New List dialog box type Confidential project document IDs in the Name field and in the Description field type Regular expression to match confidential project documents. 8. Change the Category drop down field to Confidential and change the Content type drop down field to Regular expressions. 9. In the Add list items field copy the regular expression from the RegexPlanet web browser window and add \b at the beginning and the end of the expression, it should look like this: \b([a-z]{3})_([0-9]{5})\b then click Add and finally click Save to create the new list. 8 of 12

9 10. Click on the policies tab, then click New Policy. 11. In the Name field type Redirect confidential s. 12. In the Description field type This policy will redirect confidential s to an administrator account. 13. Change the Apply to: field to Outbound only. 14. Leave the Execute if field as All rules are met. 15. From the Action drop down list choose Redirect to administrator. Note that the default redirection address is already populated from the settings dialog box. 16. Click Add notification and uncheck Notify recipient(s), then click Add. 17. Click Add rule and leave Execute if as All conditions are met. 9 of 12

10 18. In the Add a condition drop down field choose Content Regular Expression List, then click Browse for a regular expression list. Find and select the list Confidential project document IDs and click Add. 19. Leave the first field as contains a match for ALL of the regexes in the selected list. In the Look in section check Body, Subject and File attachments, then click Save. 20. In the Active column click Off to enable the policy. 10 of 12

11 Lab 2 Testing some Data Loss Prevention.cloud policies Since it typically takes at least 30 minutes for policy changes to propagate from the Symantec.cloud Management Portal to the thousands of scanning servers around the world you are going to test the Data Loss Prevention.cloud service using some pre-built policies. You have already sent some s so you are now going to examine the pre-built policies and test that they have matched s successfully. Exercise 1 Examining the pre-built DLP policies In this lab exercise you will examine some pre-built DLP policies. 1. Open Internet Explorer and type in the URL for the Symantec.cloud Management Portal which is: Log in to the portal using the credentials provided to you by your instructor. 2. Click the Services then click Data Loss Prevention. 3. On the Policies page click the policy called Block s containing attachments that break security policy. 4. Examine the policy settings carefully. What does the policy do? 5. Click the policy called Redirect confidential project documents. 6. Once again, examine the policy settings carefully. This policy uses a regular expression that matches document IDs of the format ABC_nnnnn_DDMMYY (where ABC is any three capital letters, nnnnn is any 5 digit number and DDMMYY is the date in UK format). Exercise 2 Testing the pre-built DLP policies In this exercise you are going to see whether the s you sent at the beginning of the lab have been matched by the pre-built DLP policies. You are going to use a tool called Track and Trace which enables you to see whether s have been matched to a particular policy. 1. Open a tab in Internet Explorer and click the Gmail button on the Favorites bar or type in the URL and log in as [email protected] (where X is your allocated domain) with a password of Symc4now! 2. You sent four s to Diana Palmer, how many have arrived? 3. Log off from Diana Palmer s Gmail account and log in as [email protected] (where X is your allocated domain) with a password of Symc4now! Have any s been delivered to the administrator account, if so why? 4. In Internet Explorer click the Symantec.cloud Management Console button on the Favorites bar or type the URL into the address bar. 5. Log in to the Symantec.cloud portal using the account given to you by your instructor, the password is Symc4now! 11 of 12

12 6. Click the Tools tab, then click Track and Trace. 7. In the Recipient field type (where X is your allocated Cloudtrain domain), then click Search. 8. You should have four results, one for each of the s you sent at the beginning of the lab. Click each result and examine the details. In the Security Scan section you should see the security service that has been triggered, the action and the reason, for Data Loss Prevention.cloud this will be the policy name. Track and Trace still shows the service as Content Control, this was the old name for the service before the upgrade to Data Loss Prevention.cloud. For each of the results compare them to the pre-built DLP policy that was triggered. 12 of 12

Document Revision Date: August 14, 2014. Create a New Data Protection Policy in the Symantec.cloud Management Portal

Document Revision Date: August 14, 2014. Create a New Data Protection Policy in the Symantec.cloud Management Portal Document Revision Date: August 14, 2014 Create a New Data Protection Policy in the Symantec.cloud Management Portal Create a New Data Protection Policy i Contents Configure Data Protection Settings in

More information

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6

More information

Cloud Services. Cloud Control Panel. Admin Guide

Cloud Services. Cloud Control Panel. Admin Guide Cloud Services Cloud Control Panel Admin Guide 10/18/2014 CONTENTS Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control... 2 Features Summary... 3 Creating an Encryption

More information

Email Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment

Email Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment Email Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment Phil Walters Principal Learning Consultant, Technical Field Enablement Email Security.cloud

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Policy Based Encryption Gateway. Administration Guide

Policy Based Encryption Gateway. Administration Guide Policy Based Encryption Gateway Administration Guide Document Revision Date: Sept. 11, 2012 Policy Based Encryption Gateway Admin Guide i Contents Description of Policy Based Encryption... 1 Policy Based

More information

Policy Based Encryption Essentials. Administrator Guide

Policy Based Encryption Essentials. Administrator Guide Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

SecureAnywhereTM Web Security Service

SecureAnywhereTM Web Security Service SecureAnywhereTM Web Security Service This document provides a general overview of the Webroot SecureAnywhere Web Security Service Partner Management Portal. Webroot Partners such as Managed Service Providers

More information

Fax User Guide 07/31/2014 USER GUIDE

Fax User Guide 07/31/2014 USER GUIDE Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Policy Based Encryption Gateway. Administration Guide

Policy Based Encryption Gateway. Administration Guide Policy Based Encryption Gateway Administration Guide Policy Based Encryption Gateway Admin Guide 1 Contents Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control...

More information

Remote Desktop Web Access. Using Remote Desktop Web Access

Remote Desktop Web Access. Using Remote Desktop Web Access Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

Zoom Cloud Meetings: Leader Guide

Zoom Cloud Meetings: Leader Guide Zoom Cloud Meetings: Leader Guide Zoom is a cloud-based conferencing solution that provides both video conferencing and screen share capabilities. Zoom can be used for meetings among individuals or to

More information

Zoho CRM and Google Apps Synchronization

Zoho CRM and Google Apps Synchronization Zoho CRM and Google Apps Synchronization Table of Contents End User Integration Points 1. Contacts 2. Calendar 3. Email 4. Tasks 5. Docs 3 6 8 11 12 Domain-Wide Points of Integration 1. Authentication

More information

Core Filtering Admin Guide

Core Filtering Admin Guide Core Filtering Admin Guide 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Table of Contents Login... 3 Overview... 3 Quarantine...

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

OneSourceFax Customer Guide

OneSourceFax Customer Guide OneSourceFax Customer Guide General Information Billing: OneSourceFax Plan Features Monthly Charge OneSourceFax 150 Unlimited Faxes to Numbers in your Local Calling Area $12.95 150 Nationwide Long Distance

More information

Outlook Web Access User Guide

Outlook Web Access User Guide Table of Contents Title Page How to login...3 Create a new message/send attachment...5 Remove the reading pane...10 Calendar functions...11 Distribution lists...11 Contacts list...13 Tasks...18 Options...19

More information

Microsoft Office 365 Portal

Microsoft Office 365 Portal Microsoft Office 365 Portal Once you logon, you are placed in the Admin page if you are an adminstrator. Here you will manage permissions for SharePoint, install Office Professional for Windows users,

More information

Email Data Protection. Administrator Guide

Email Data Protection. Administrator Guide Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,

More information

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6 MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack

More information

Quick Start Guide Sendio Hosted

Quick Start Guide Sendio Hosted Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START

More information

MiVoice Integration for Salesforce

MiVoice Integration for Salesforce MiVoice Integration for Salesforce USER GUIDE MiVoice Integration for Salesforce User Guide, Version 1, April 2014. Part number 58014124 Mitel is a registered trademark of Mitel Networks Corporation. Salesforce

More information

Chapter 15: Forms. User Guide. 1 P a g e

Chapter 15: Forms. User Guide. 1 P a g e User Guide Chapter 15 Forms Engine 1 P a g e Table of Contents Introduction... 3 Form Building Basics... 4 1) About Form Templates... 4 2) About Form Instances... 4 Key Information... 4 Accessing the Form

More information

Hubcase for Salesforce Installation and Configuration Guide

Hubcase for Salesforce Installation and Configuration Guide Hubcase for Salesforce Installation and Configuration Guide Note: This document is intended for system administrator, and not for end users. Installation and configuration require understanding of both

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

ICONICS Using the Azure Cloud Connector

ICONICS Using the Azure Cloud Connector Description: Guide to use the Azure Cloud Connector General Requirement: Valid account for Azure, including Cloud Service, SQL Azure and Azure Storage. Introduction Cloud Connector is a FrameWorX Server

More information

User Guide BMC Remedy Support System

User Guide BMC Remedy Support System United Arab Emirates Federal Authority For Government Human Resources User Guide BMC Remedy Support System User Guide BMC Remedy Support System Releases: Bayanati Self-Service User Guide Version 1.0 Bayanati

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents 1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2013 for Windows... 3 Outlook for Mac 2011... 4 Mac OS X 10.6+... 4 iphone

More information

ProSystem fx Document

ProSystem fx Document ProSystem fx Document Server Upgrade from Version 3.7 to Version 3.8 1 This Document will guide you through the upgrade of Document Version 3.7 to Version 3.8. Do not attempt to upgrade from any other

More information

Center for Faculty Development and Support. Gmail Overview

Center for Faculty Development and Support. Gmail Overview Center for Faculty Development and Support Gmail Overview Table of Contents Gmail Overview... 1 Overview... 3 Learning Objectives... 3 Access Gmail Account... 3 Compose Mail... 4 Read and Reply Mail...

More information

Email DLP Quick Start

Email DLP Quick Start 1 Email DLP Quick Start TRITON - Email Security is automatically configured to work with TRITON - Data Security. The Email Security module registers with the Data Security Management Server when you install

More information

How do I see an encrypted INCISIVE MD email for the first time?

How do I see an encrypted INCISIVE MD email for the first time? CrossCurrent, Inc. 5331 SW Macadam Ave, Suite 216 Portland, Oregon 97239 How do I see an encrypted INCISIVE MD email for the first time? Summary With the release of INCISIVE MD 5.2, emails sent to email

More information

MANAGED VOICE SOLUTIONS QUICK START GUIDE

MANAGED VOICE SOLUTIONS QUICK START GUIDE MANAGED VOICE SOLUTIONS QUICK START GUIDE WELCOME Welcome to Mediacom Business Managed Voice Solutions! This guide is intended to get you up-and-running for the basic features associated with the product.

More information

Background Information

Background Information User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system

More information

Core Protection Suite

Core Protection Suite Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3

More information

Mac OS X User Manual Version 2.0

Mac OS X User Manual Version 2.0 Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

8x8 Click2Pop User Guide

8x8 Click2Pop User Guide USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft

More information

Bentley CONNECT Dynamic Rights Management Service

Bentley CONNECT Dynamic Rights Management Service v1.0 Implementation Guide Last Updated: March 20, 2013 Table of Contents Notices...5 Chapter 1: Introduction to Management Service...7 Chapter 2: Configuring Bentley Dynamic Rights...9 Adding Role Services

More information

Table of Contents. 1. Content Approval...1 EVALUATION COPY

Table of Contents. 1. Content Approval...1 EVALUATION COPY Table of Contents Table of Contents 1. Content Approval...1 Enabling Content Approval...1 Content Approval Workflows...4 Exercise 1: Enabling and Using SharePoint Content Approval...9 Exercise 2: Enabling

More information

How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)

How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook) MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE

More information

Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab

Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Description In this hands-on session, you will learn how to turn your proxy into a security

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide August 22, 2013 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

Spam Manager User Guide. Boundary Defense for Email Anti-Spam End User Guide

Spam Manager User Guide. Boundary Defense for Email Anti-Spam End User Guide Spam Manager User Guide Boundary Defense for Email Anti-Spam End User Guide DOCUMENT REVISION DATE: Feb 2012 Spam Manager User Guide / Table of Contents Page 2 of 24 Table of Contents OVERVIEW... 3 1 ABOUT

More information

THE COMPLETE GUIDE TO GOOGLE APPS SECURITY. Building a comprehensive Google Apps security plan

THE COMPLETE GUIDE TO GOOGLE APPS SECURITY. Building a comprehensive Google Apps security plan THE COMPLETE GUIDE TO GOOGLE APPS SECURITY Building a comprehensive Google Apps security plan Contents Introduction................................ 3 1. Secure the core.............................4 Google

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

RSCCD REMOTE PORTAL TABLE OF CONTENTS: Technology Requirements NOTE

RSCCD REMOTE PORTAL TABLE OF CONTENTS: Technology Requirements NOTE RSCCD REMOTE PORTAL The RSCCD Remote Portal allows employees to access their RSCCD Email (via Outlook Web Access), Department (Public) Folders, Personal (H Drive) Folder, and the District Intranet from

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

RightFax Local Administrator Guide

RightFax Local Administrator Guide Administrative Information Technology Services RightFax Local Administrator Guide Release: 1.2 Date: 5/14/12 Owner: Application Support group Service Description RightFax is used by the University of Illinois

More information

AVG Business SSO Connecting to Active Directory

AVG Business SSO Connecting to Active Directory AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud

More information

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9 About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but

More information

Getting started with OneDrive

Getting started with OneDrive Getting started with OneDrive What is OneDrive? OneDrive is an online storage area intended for business purposes. Your OneDrive library is managed by the University. You can use it to share documents

More information

Web Hosting Getting Started Guide

Web Hosting Getting Started Guide Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload

More information

Getting Started with University Gmail

Getting Started with University Gmail Getting Started with University Gmail USER GUIDE V1.0 User Services IT Services University of Malta 2013 User Services IT Services University of Malta Msida MSD 2080 Malta May only be reproduced with permission

More information

ClicktoFax Service Usage Manual

ClicktoFax Service Usage Manual ClicktoFax Service Usage Manual 1. Log in to Fax Service 2. Configure your account 3. Send a fax 4. Receive a fax/search for Faxes/View Faxes 5. Logout 6. Additional Support 1. Log into fax service: a.

More information

Mimecast Services for Outlook (MSO4)

Mimecast Services for Outlook (MSO4) Mimecast Services for Outlook (MSO4) End User Quick Start Guide for Outlook 2010/2013 Mimecast Services for Outlook (MSO 4) is a software application that integrates with your Microsoft Outlook. Once installed,

More information

USING OUTLOOK WEB ACCESS

USING OUTLOOK WEB ACCESS USING OUTLOOK WEB ACCESS 17 March 2009, Version 1.0 WHAT IS OUTLOOK WEB ACCESS? Outlook Web Access (OWA) is a webmail service of Microsoft Exchange Server. The web interface of Outlook Web Access resembles

More information

Welcome to ncrypted Cloud!

Welcome to ncrypted Cloud! Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the

More information

eadvantage Certificate Enrollment Procedures

eadvantage Certificate Enrollment Procedures eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of

More information

Using the Web email service

Using the Web email service Using the Web email service This booklet describes the web based email service used by Sandwell schools. The web based email service was introduced in January 2005 to replace an earlier webmail system.

More information

First Time On-Campus VLab Setup Windows XP Edition

First Time On-Campus VLab Setup Windows XP Edition First Time On-Campus VLab Setup Windows XP Edition General: This guide is a step-by-step walkthrough of downloading, installing and configuring VMware View Client for the University of Cincinnati s VLab

More information

Transition from Pegasus Mail To Exchange/Outlook 2003

Transition from Pegasus Mail To Exchange/Outlook 2003 Contents: Page(s): Setup Outlook and Exchange 2 4 Prepare Pegasus Mail 5 7 Transferring Emails 7 12 Transferring Address books 13 20 Change Email Routing 21 22 SYSTEMS & TECHNOLOGY Transition from Pegasus

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

Access and Login. Single Sign On Reference. Signoff

Access and Login. Single Sign On Reference. Signoff Access and Login To access single sign on, here are the steps: Step 1: type in the URL: postone.onelogin.com Step 2: Enter your Post student email in the username field Step 3: Enter your Post student

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

CRM-Bridge User Guide. Version 2.0 + Page 1 www.crm-bridge.com. 2011 B. Software Consulting, Inc. All Rights Reserved.

CRM-Bridge User Guide. Version 2.0 + Page 1 www.crm-bridge.com. 2011 B. Software Consulting, Inc. All Rights Reserved. Version 2.0 + Page 1 Table of Contents Table of Contents... 2 Requirements... 3 Installation... 4 Running CRM-Bridge... 4 Licensing CRM-Bridge... 4 Configuration... 5 Application Settings... 5 Dial Settings...

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

DocuSign Connect for Salesforce Guide

DocuSign Connect for Salesforce Guide Information Guide 1 DocuSign Connect for Salesforce Guide 1 Copyright 2003-2013 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign

More information

Store, Edit and Share your files in OneDrive for Business on Web. A. Activate OneDrive for Business (Only for First-time Users)

Store, Edit and Share your files in OneDrive for Business on Web. A. Activate OneDrive for Business (Only for First-time Users) Store, Edit and Share your files in OneDrive for Business on Web A. Activate OneDrive for Business (Only for First-time Users) B. Create a New Document at OneDrive for Business C. Rename a Document at

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Learn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms

Learn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms Learn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms InfoPath 2013 Web Enabled (Browser) forms Creating Web Enabled

More information

SSL VPN Setup for Windows

SSL VPN Setup for Windows SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names

More information

WordCom, Inc. Secure File Transfer Web Application

WordCom, Inc. Secure File Transfer Web Application WordCom, Inc. Secure File Transfer Web Application Table of Contents 1. Introduction 2. Logging into WordCom s File Transfer Web Client 3. Toolbar buttons 4. Sending a package in Enhanced Mode (If installed

More information

Selection Manager: Quick Start Guide

Selection Manager: Quick Start Guide VERSION 1103 01.24.12 SELECTION MANAGER GUIDE Selection Manager: Quick Start Guide PART 1: GENERAL INFORMATION Selection Manager is the hiring official s interface for USA Staffing. In Selection Manager,

More information

Lync Online Deployment Guide. Version 1.0

Lync Online Deployment Guide. Version 1.0 Date 28/07/2014 Table of Contents 1. Provisioning Lync Online... 1 1.1 Operating System Requirements... 1 1.2 Browser Requirements Administrative Centre... 1 2. Obtaining your login Credentials & Logging

More information

Booth Gmail Configuration

Booth Gmail Configuration Student email is accessed via a Booth branded Gmail service. Student mailboxes will be accessed via Gmail. Configure Gmail Settings Before you connect Gmail to send and receive Booth Gmail on your mobile

More information

Integrated Cloud Environment Google Drive User s Guide

Integrated Cloud Environment Google Drive User s Guide Integrated Cloud Environment Google Drive User s Guide 2012-2015 Ricoh Americas Corporation It is the reader's responsibility when discussing the information contained this document to maintain a level

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Tips & Tricks SSL VPN - Windows

Tips & Tricks SSL VPN - Windows Tips & Tricks SSL VPN - Windows What is SSL VPN 2 Signing into Meredith s SSL VPN 2 Using Webapp 4 Using File Servers 5 Downloading Files from the Server 5 Uploading Files to the Server 6 Network Connect

More information

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Biznet GIO Cloud Connecting VM via Windows Remote Desktop Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make

More information

CLIENT PORTAL USER GUIDE

CLIENT PORTAL USER GUIDE CLIENT PORTAL USER GUIDE JULY 28, 2011 At Gelman, Rosenberg & Freedman, CPAs we take the privacy and security of your information seriously. That's why we've introduced the Client Portal for sharing your

More information

Cloudfinder for Office 365 User Guide. November 2013

Cloudfinder for Office 365 User Guide. November 2013 1 Contents Getting started with Cloudfinder for Office 365 1... 3 Sign up New Cloudfinder user... 3 Sign up Existing Cloudfinder user... 4 Setting the Admin Impersonation... 4 Initial backup... 7 Inside

More information

Microsoft Entourage 2008 / Microsoft Exchange Server 2010. Installation and Configuration Instructions

Microsoft Entourage 2008 / Microsoft Exchange Server 2010. Installation and Configuration Instructions Microsoft Entourage 2008 / Microsoft Exchange Server 2010 Installation and Configuration Instructions Table of Contents How to connect Microsoft Entourage 2008 EWS to the Exchange Server... 3 Important

More information

Comodo Mobile Device Manager Software Version 1.0

Comodo Mobile Device Manager Software Version 1.0 Comodo Mobile Device Manager Software Version 1.0 Installation Guide Guide Version 1.0.041114 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.CMDM Setup... 3 1.1.System

More information

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,

More information

Hands on Lab: Building a Virtual Machine and Uploading VM Images to the Cloud using Windows Azure Infrastructure Services

Hands on Lab: Building a Virtual Machine and Uploading VM Images to the Cloud using Windows Azure Infrastructure Services Hands on Lab: Building a Virtual Machine and Uploading VM Images to the Cloud using Windows Azure Infrastructure Services Windows Azure Infrastructure Services provides cloud based storage, virtual networks

More information

Secure Message Center User Guide

Secure Message Center User Guide Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account

More information