IC L05: Security.cloud Configuring DLP on to your flow & Applying security to your Office 365 or Google Apps deployment Hands-On Lab
|
|
|
- Dominic Douglas
- 10 years ago
- Views:
Transcription
1 IC L05: Security.cloud Configuring DLP on to your flow & Applying security to your Office 365 or Google Apps deployment Hands-On Lab Description This session is for existing customers and those interested to learn how to apply compliance-driven DLP policies on to your flow using the new templates and controls that will be launched in Security.cloud. We'll also look at how to apply enhanced security on to Office 365 and Google Apps deployments, as well as reviewing some of the latest features available in our cloud security service. At the end of this lab, you should be able to Create Data Loss Prevention.cloud policies that enforce acceptable use policies and prevent compliance breaches. Understand the various different actions that can be triggered when an DLP policy matches a particular . Test some pre-built DLP policies to understand better how the service can prevent data loss. Understand how outbound from hosted providers Microsoft Office 365 and Google Apps can now be scanned by the Security.cloud service. Notes A brief presentation will introduce this lab session and discuss key concepts. The lab will be directed and provide you with step-by-step walkthroughs of key features. Feel free to follow the lab using the instructions on the following pages. Be sure to ask your instructor any questions you may have. Thank you for coming to our lab session.
2 Lab 1 Creating some Data Loss Prevention.cloud policies In this lab exercise you will start by sending some s to test some pre-built DLP policies and then examine how outbound s from hosted deployments can be scanned by Symantec.cloud. You will then create some DLP policies that will enforce acceptable use policies and prevent compliance breaches. Your instructor will provide you with login credentials for the Symantec.cloud Management Console and Google Apps accounts for a particular cloudtrainx.com domain. Exercise 1 Sending some s to test DLP.cloud In this first exercise you are going to send some s from your personal webmail account that should be matched against some pre-built DLP policies. At the end of the Lab 2 you will examine whether the s have been matched. 1. Log in to the Client virtual machine as msmith with a password of Symc4now! 2. Open Internet Explorer and create an using your personal webmail account and add [email protected] (where X is for your allocated domain) into the To: field. Give the the subject: This contains a spoofed file and add some appropriate text to the body of the Attach the file ThisFileisSpoofed.txt that you will find in the folder C:\LabFiles. 4. Send the Create an using your personal webmail account to [email protected] (where X is for your allocated domain). Give the the subject: This contains a video file and add some appropriate text to the body of the This time attach the file video.mp4 that you will find in the folder C:\LabFiles. 7. Send the Create an using your personal webmail account to [email protected]. Give the the subject: This contains reference to a confidential document. 9. Add some appropriate text to the body of the and include the following document ID: DOC_16324_ Send the Create another using your personal webmail account to [email protected]. Give the the subject: This contains reference to another document. 12. Add some appropriate text to the body of the and include the following document ID: DOC_22435_ Send the . 2 of 12
3 Exercise 2 Examining the settings for scanning outbound s from Google Apps and Office In Internet Explorer click the Symantec.cloud Management Console button on the Favorites bar or type the URL into the address bar. 2. Log in to the Symantec.cloud Management Portal using the account given to you by your instructor, the password is Symc4now! 3. Click the Services tab, then click Services, and finally click Outbound Routes. 4. Expand the Hosted Services section. 5. Choose the Select hosted service drop down field. Note that you can choose either Google Apps or Office In addition to setting the hosted service provider within the Symantec.cloud management console you also need to configure the routing of outbound via Symantec.cloud in the management console of the hosted provider. 7. Leave the Internet Explorer window open for the next exercise. Exercise 3 Creating a DLP policy that blocks s that contain offensive language 1. In the Symantec.cloud Management Console window click the Services tab then click Data Loss Prevention. On the Policies page click the Settings button and examine the default settings that can be applied to all DLP.cloud policies. 2. In the Default sender address field type [email protected] (where X is the number for your assigned CloudtrainX.com domain), then scroll down and click Save. 3. Before creating the first policy you are going to create a list group containing all the pre-built lists of English offensive words. Click the Lists tab and then click New List Group. 3 of 12
4 4. In the Name field type English Offensive Words and in the Description field type Combination of all lists of English offensive language. 5. Change the Content type drop down field to Keywords, then make sure that the Include tab is selected and then select the seven lists that begin with EN and click Save. 6. Click on the policies tab, then click New Policy. 7. In the Name field type Block s containing offensive language. 8. In the Description field type This policy will prevent users from sending or receiving s that contain offensive words. 9. Leave the Apply to: field as Both inbound and outbound Leave the Execute if field as All rules are met. 11. From the Action drop down list choose Block and delete (take a moment to review all the actions are available). Note that Exit is checked and grayed out because the Block and delete is always, by definition, an exit action. 4 of 12
5 12. Click Add notification and uncheck Notify sender, then click Add. 13. Click Add rule and leave Execute if as All conditions are met. 14. In the Add a condition drop down field choose Content Keyword list, then click Browse for a keyword list. Select the list group called English Offensive Words and click Add. 15. Change the contains field to AT LEAST and ensure that the number is 1 (default). In the Look in section check Body, Subject and File attachments. 16. Click Save to save the policy. 5 of 12
6 17. In the Active column click Off to enable the policy. Leave the management portal open. Exercise 4 Creating a DLP policy from a policy template In this lab exercise you will create a policy using the PCI (Payment Card Industry) Template and then configure it to copy s to an administrator address. 1. Click on the policies tab, then click New Policy from Template. 2. In the Create a new policy from a template dialog box select PCI (Payment Card Industry) Template and then click Create. Notice that a policy is created with a standard name and is added to the bottom of the policy list. 3. Open the newly created policy and examine all the settings within the policy. Notice that the policy contains two different rules. Examine the lists used within the policy to determine what will trigger the policy. 6 of 12
7 4. Change the Name field to Copy s containing credit card details to administrator. 5. Change the Apply to field to Outbound only. 6. Change the Action to Copy to Administrator. 7. Uncheck Use Custom. 8. To save the policy click Save, 9. In the Active column click Off to enable the policy. Leave the Management Portal open. Exercise 5 - Creating a DLP policy that uses a custom regular expression list In this exercise you are going to create a simple custom regular expression list that is going to match confidential project documents IDs of the format ABC_nnnnn (where ABC represents any 3 capital letters and nnnnn is any 5 digit number) being sent to external recipients. 1. Before using any regular expression within the Data Loss Prevention.cloud service it is always good practice to test the regular expression using an online tool. 2. In Internet Explorer open another tab and browse to the web site 3. In the Regular expression field type ([A-Z]{3})_([0-9]{5}) then in the Input 1 field type a potential document ID using the format outlined in the introduction to the exercise and click Test. 7 of 12
8 4. Try several different tests using valid and non valid entries. Note: if you cannot get a match from a correctly formatted document ID then check the regular expression very carefully. Do not proceed until you can get a match. Leave the web browser window open. 5. Return to the tab where the Symantec.cloud Management portal is running and if necessary log in using the credentials given to you at the start of the lab. 6. Click the Services tab, and click Data Loss Prevention then click on the Lists tab. 7. Click New List and in the Create a New List dialog box type Confidential project document IDs in the Name field and in the Description field type Regular expression to match confidential project documents. 8. Change the Category drop down field to Confidential and change the Content type drop down field to Regular expressions. 9. In the Add list items field copy the regular expression from the RegexPlanet web browser window and add \b at the beginning and the end of the expression, it should look like this: \b([a-z]{3})_([0-9]{5})\b then click Add and finally click Save to create the new list. 8 of 12
9 10. Click on the policies tab, then click New Policy. 11. In the Name field type Redirect confidential s. 12. In the Description field type This policy will redirect confidential s to an administrator account. 13. Change the Apply to: field to Outbound only. 14. Leave the Execute if field as All rules are met. 15. From the Action drop down list choose Redirect to administrator. Note that the default redirection address is already populated from the settings dialog box. 16. Click Add notification and uncheck Notify recipient(s), then click Add. 17. Click Add rule and leave Execute if as All conditions are met. 9 of 12
10 18. In the Add a condition drop down field choose Content Regular Expression List, then click Browse for a regular expression list. Find and select the list Confidential project document IDs and click Add. 19. Leave the first field as contains a match for ALL of the regexes in the selected list. In the Look in section check Body, Subject and File attachments, then click Save. 20. In the Active column click Off to enable the policy. 10 of 12
11 Lab 2 Testing some Data Loss Prevention.cloud policies Since it typically takes at least 30 minutes for policy changes to propagate from the Symantec.cloud Management Portal to the thousands of scanning servers around the world you are going to test the Data Loss Prevention.cloud service using some pre-built policies. You have already sent some s so you are now going to examine the pre-built policies and test that they have matched s successfully. Exercise 1 Examining the pre-built DLP policies In this lab exercise you will examine some pre-built DLP policies. 1. Open Internet Explorer and type in the URL for the Symantec.cloud Management Portal which is: Log in to the portal using the credentials provided to you by your instructor. 2. Click the Services then click Data Loss Prevention. 3. On the Policies page click the policy called Block s containing attachments that break security policy. 4. Examine the policy settings carefully. What does the policy do? 5. Click the policy called Redirect confidential project documents. 6. Once again, examine the policy settings carefully. This policy uses a regular expression that matches document IDs of the format ABC_nnnnn_DDMMYY (where ABC is any three capital letters, nnnnn is any 5 digit number and DDMMYY is the date in UK format). Exercise 2 Testing the pre-built DLP policies In this exercise you are going to see whether the s you sent at the beginning of the lab have been matched by the pre-built DLP policies. You are going to use a tool called Track and Trace which enables you to see whether s have been matched to a particular policy. 1. Open a tab in Internet Explorer and click the Gmail button on the Favorites bar or type in the URL and log in as [email protected] (where X is your allocated domain) with a password of Symc4now! 2. You sent four s to Diana Palmer, how many have arrived? 3. Log off from Diana Palmer s Gmail account and log in as [email protected] (where X is your allocated domain) with a password of Symc4now! Have any s been delivered to the administrator account, if so why? 4. In Internet Explorer click the Symantec.cloud Management Console button on the Favorites bar or type the URL into the address bar. 5. Log in to the Symantec.cloud portal using the account given to you by your instructor, the password is Symc4now! 11 of 12
12 6. Click the Tools tab, then click Track and Trace. 7. In the Recipient field type (where X is your allocated Cloudtrain domain), then click Search. 8. You should have four results, one for each of the s you sent at the beginning of the lab. Click each result and examine the details. In the Security Scan section you should see the security service that has been triggered, the action and the reason, for Data Loss Prevention.cloud this will be the policy name. Track and Trace still shows the service as Content Control, this was the old name for the service before the upgrade to Data Loss Prevention.cloud. For each of the results compare them to the pre-built DLP policy that was triggered. 12 of 12
Document Revision Date: August 14, 2014. Create a New Data Protection Policy in the Symantec.cloud Management Portal
Document Revision Date: August 14, 2014 Create a New Data Protection Policy in the Symantec.cloud Management Portal Create a New Data Protection Policy i Contents Configure Data Protection Settings in
Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide
Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6
Cloud Services. Cloud Control Panel. Admin Guide
Cloud Services Cloud Control Panel Admin Guide 10/18/2014 CONTENTS Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control... 2 Features Summary... 3 Creating an Encryption
Email Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment
Email Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment Phil Walters Principal Learning Consultant, Technical Field Enablement Email Security.cloud
How to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
Policy Based Encryption Gateway. Administration Guide
Policy Based Encryption Gateway Administration Guide Document Revision Date: Sept. 11, 2012 Policy Based Encryption Gateway Admin Guide i Contents Description of Policy Based Encryption... 1 Policy Based
Policy Based Encryption Essentials. Administrator Guide
Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.
Baylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
SecureAnywhereTM Web Security Service
SecureAnywhereTM Web Security Service This document provides a general overview of the Webroot SecureAnywhere Web Security Service Partner Management Portal. Webroot Partners such as Managed Service Providers
Fax User Guide 07/31/2014 USER GUIDE
Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
Policy Based Encryption Gateway. Administration Guide
Policy Based Encryption Gateway Administration Guide Policy Based Encryption Gateway Admin Guide 1 Contents Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control...
Remote Desktop Web Access. Using Remote Desktop Web Access
Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
Zoom Cloud Meetings: Leader Guide
Zoom Cloud Meetings: Leader Guide Zoom is a cloud-based conferencing solution that provides both video conferencing and screen share capabilities. Zoom can be used for meetings among individuals or to
Zoho CRM and Google Apps Synchronization
Zoho CRM and Google Apps Synchronization Table of Contents End User Integration Points 1. Contacts 2. Calendar 3. Email 4. Tasks 5. Docs 3 6 8 11 12 Domain-Wide Points of Integration 1. Authentication
Core Filtering Admin Guide
Core Filtering Admin Guide 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Table of Contents Login... 3 Overview... 3 Quarantine...
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
OneSourceFax Customer Guide
OneSourceFax Customer Guide General Information Billing: OneSourceFax Plan Features Monthly Charge OneSourceFax 150 Unlimited Faxes to Numbers in your Local Calling Area $12.95 150 Nationwide Long Distance
Outlook Web Access User Guide
Table of Contents Title Page How to login...3 Create a new message/send attachment...5 Remove the reading pane...10 Calendar functions...11 Distribution lists...11 Contacts list...13 Tasks...18 Options...19
Microsoft Office 365 Portal
Microsoft Office 365 Portal Once you logon, you are placed in the Admin page if you are an adminstrator. Here you will manage permissions for SharePoint, install Office Professional for Windows users,
Email Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6
MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack
Quick Start Guide Sendio Hosted
Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START
MiVoice Integration for Salesforce
MiVoice Integration for Salesforce USER GUIDE MiVoice Integration for Salesforce User Guide, Version 1, April 2014. Part number 58014124 Mitel is a registered trademark of Mitel Networks Corporation. Salesforce
Chapter 15: Forms. User Guide. 1 P a g e
User Guide Chapter 15 Forms Engine 1 P a g e Table of Contents Introduction... 3 Form Building Basics... 4 1) About Form Templates... 4 2) About Form Instances... 4 Key Information... 4 Accessing the Form
Hubcase for Salesforce Installation and Configuration Guide
Hubcase for Salesforce Installation and Configuration Guide Note: This document is intended for system administrator, and not for end users. Installation and configuration require understanding of both
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
ICONICS Using the Azure Cloud Connector
Description: Guide to use the Azure Cloud Connector General Requirement: Valid account for Azure, including Cloud Service, SQL Azure and Azure Storage. Introduction Cloud Connector is a FrameWorX Server
User Guide BMC Remedy Support System
United Arab Emirates Federal Authority For Government Human Resources User Guide BMC Remedy Support System User Guide BMC Remedy Support System Releases: Bayanati Self-Service User Guide Version 1.0 Bayanati
NETWRIX USER ACTIVITY VIDEO REPORTER
NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant
How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup
Trustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents
1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2013 for Windows... 3 Outlook for Mac 2011... 4 Mac OS X 10.6+... 4 iphone
ProSystem fx Document
ProSystem fx Document Server Upgrade from Version 3.7 to Version 3.8 1 This Document will guide you through the upgrade of Document Version 3.7 to Version 3.8. Do not attempt to upgrade from any other
Center for Faculty Development and Support. Gmail Overview
Center for Faculty Development and Support Gmail Overview Table of Contents Gmail Overview... 1 Overview... 3 Learning Objectives... 3 Access Gmail Account... 3 Compose Mail... 4 Read and Reply Mail...
Email DLP Quick Start
1 Email DLP Quick Start TRITON - Email Security is automatically configured to work with TRITON - Data Security. The Email Security module registers with the Data Security Management Server when you install
How do I see an encrypted INCISIVE MD email for the first time?
CrossCurrent, Inc. 5331 SW Macadam Ave, Suite 216 Portland, Oregon 97239 How do I see an encrypted INCISIVE MD email for the first time? Summary With the release of INCISIVE MD 5.2, emails sent to email
MANAGED VOICE SOLUTIONS QUICK START GUIDE
MANAGED VOICE SOLUTIONS QUICK START GUIDE WELCOME Welcome to Mediacom Business Managed Voice Solutions! This guide is intended to get you up-and-running for the basic features associated with the product.
Background Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
Core Protection Suite
Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3
Mac OS X User Manual Version 2.0
Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
Tool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
8x8 Click2Pop User Guide
USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft
Bentley CONNECT Dynamic Rights Management Service
v1.0 Implementation Guide Last Updated: March 20, 2013 Table of Contents Notices...5 Chapter 1: Introduction to Management Service...7 Chapter 2: Configuring Bentley Dynamic Rights...9 Adding Role Services
Table of Contents. 1. Content Approval...1 EVALUATION COPY
Table of Contents Table of Contents 1. Content Approval...1 Enabling Content Approval...1 Content Approval Workflows...4 Exercise 1: Enabling and Using SharePoint Content Approval...9 Exercise 2: Enabling
How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)
MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE
Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab
Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Description In this hands-on session, you will learn how to turn your proxy into a security
Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
August 22, 2013 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
Spam Manager User Guide. Boundary Defense for Email Anti-Spam End User Guide
Spam Manager User Guide Boundary Defense for Email Anti-Spam End User Guide DOCUMENT REVISION DATE: Feb 2012 Spam Manager User Guide / Table of Contents Page 2 of 24 Table of Contents OVERVIEW... 3 1 ABOUT
THE COMPLETE GUIDE TO GOOGLE APPS SECURITY. Building a comprehensive Google Apps security plan
THE COMPLETE GUIDE TO GOOGLE APPS SECURITY Building a comprehensive Google Apps security plan Contents Introduction................................ 3 1. Secure the core.............................4 Google
Secure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
RSCCD REMOTE PORTAL TABLE OF CONTENTS: Technology Requirements NOTE
RSCCD REMOTE PORTAL The RSCCD Remote Portal allows employees to access their RSCCD Email (via Outlook Web Access), Department (Public) Folders, Personal (H Drive) Folder, and the District Intranet from
Policy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
RightFax Local Administrator Guide
Administrative Information Technology Services RightFax Local Administrator Guide Release: 1.2 Date: 5/14/12 Owner: Application Support group Service Description RightFax is used by the University of Illinois
AVG Business SSO Connecting to Active Directory
AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud
USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9
About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but
Getting started with OneDrive
Getting started with OneDrive What is OneDrive? OneDrive is an online storage area intended for business purposes. Your OneDrive library is managed by the University. You can use it to share documents
Web Hosting Getting Started Guide
Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload
Getting Started with University Gmail
Getting Started with University Gmail USER GUIDE V1.0 User Services IT Services University of Malta 2013 User Services IT Services University of Malta Msida MSD 2080 Malta May only be reproduced with permission
ClicktoFax Service Usage Manual
ClicktoFax Service Usage Manual 1. Log in to Fax Service 2. Configure your account 3. Send a fax 4. Receive a fax/search for Faxes/View Faxes 5. Logout 6. Additional Support 1. Log into fax service: a.
Mimecast Services for Outlook (MSO4)
Mimecast Services for Outlook (MSO4) End User Quick Start Guide for Outlook 2010/2013 Mimecast Services for Outlook (MSO 4) is a software application that integrates with your Microsoft Outlook. Once installed,
USING OUTLOOK WEB ACCESS
USING OUTLOOK WEB ACCESS 17 March 2009, Version 1.0 WHAT IS OUTLOOK WEB ACCESS? Outlook Web Access (OWA) is a webmail service of Microsoft Exchange Server. The web interface of Outlook Web Access resembles
Welcome to ncrypted Cloud!
Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the
eadvantage Certificate Enrollment Procedures
eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of
Using the Web email service
Using the Web email service This booklet describes the web based email service used by Sandwell schools. The web based email service was introduced in January 2005 to replace an earlier webmail system.
First Time On-Campus VLab Setup Windows XP Edition
First Time On-Campus VLab Setup Windows XP Edition General: This guide is a step-by-step walkthrough of downloading, installing and configuring VMware View Client for the University of Cincinnati s VLab
Transition from Pegasus Mail To Exchange/Outlook 2003
Contents: Page(s): Setup Outlook and Exchange 2 4 Prepare Pegasus Mail 5 7 Transferring Emails 7 12 Transferring Address books 13 20 Change Email Routing 21 22 SYSTEMS & TECHNOLOGY Transition from Pegasus
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
Access and Login. Single Sign On Reference. Signoff
Access and Login To access single sign on, here are the steps: Step 1: type in the URL: postone.onelogin.com Step 2: Enter your Post student email in the username field Step 3: Enter your Post student
Using Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
CRM-Bridge User Guide. Version 2.0 + Page 1 www.crm-bridge.com. 2011 B. Software Consulting, Inc. All Rights Reserved.
Version 2.0 + Page 1 Table of Contents Table of Contents... 2 Requirements... 3 Installation... 4 Running CRM-Bridge... 4 Licensing CRM-Bridge... 4 Configuration... 5 Application Settings... 5 Dial Settings...
Mobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
DocuSign Connect for Salesforce Guide
Information Guide 1 DocuSign Connect for Salesforce Guide 1 Copyright 2003-2013 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign
Store, Edit and Share your files in OneDrive for Business on Web. A. Activate OneDrive for Business (Only for First-time Users)
Store, Edit and Share your files in OneDrive for Business on Web A. Activate OneDrive for Business (Only for First-time Users) B. Create a New Document at OneDrive for Business C. Rename a Document at
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
Learn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms
Learn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms InfoPath 2013 Web Enabled (Browser) forms Creating Web Enabled
SSL VPN Setup for Windows
SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
WordCom, Inc. Secure File Transfer Web Application
WordCom, Inc. Secure File Transfer Web Application Table of Contents 1. Introduction 2. Logging into WordCom s File Transfer Web Client 3. Toolbar buttons 4. Sending a package in Enhanced Mode (If installed
Selection Manager: Quick Start Guide
VERSION 1103 01.24.12 SELECTION MANAGER GUIDE Selection Manager: Quick Start Guide PART 1: GENERAL INFORMATION Selection Manager is the hiring official s interface for USA Staffing. In Selection Manager,
Lync Online Deployment Guide. Version 1.0
Date 28/07/2014 Table of Contents 1. Provisioning Lync Online... 1 1.1 Operating System Requirements... 1 1.2 Browser Requirements Administrative Centre... 1 2. Obtaining your login Credentials & Logging
Booth Gmail Configuration
Student email is accessed via a Booth branded Gmail service. Student mailboxes will be accessed via Gmail. Configure Gmail Settings Before you connect Gmail to send and receive Booth Gmail on your mobile
Integrated Cloud Environment Google Drive User s Guide
Integrated Cloud Environment Google Drive User s Guide 2012-2015 Ricoh Americas Corporation It is the reader's responsibility when discussing the information contained this document to maintain a level
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
Tips & Tricks SSL VPN - Windows
Tips & Tricks SSL VPN - Windows What is SSL VPN 2 Signing into Meredith s SSL VPN 2 Using Webapp 4 Using File Servers 5 Downloading Files from the Server 5 Uploading Files to the Server 6 Network Connect
Biznet GIO Cloud Connecting VM via Windows Remote Desktop
Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make
CLIENT PORTAL USER GUIDE
CLIENT PORTAL USER GUIDE JULY 28, 2011 At Gelman, Rosenberg & Freedman, CPAs we take the privacy and security of your information seriously. That's why we've introduced the Client Portal for sharing your
Cloudfinder for Office 365 User Guide. November 2013
1 Contents Getting started with Cloudfinder for Office 365 1... 3 Sign up New Cloudfinder user... 3 Sign up Existing Cloudfinder user... 4 Setting the Admin Impersonation... 4 Initial backup... 7 Inside
Microsoft Entourage 2008 / Microsoft Exchange Server 2010. Installation and Configuration Instructions
Microsoft Entourage 2008 / Microsoft Exchange Server 2010 Installation and Configuration Instructions Table of Contents How to connect Microsoft Entourage 2008 EWS to the Exchange Server... 3 Important
Comodo Mobile Device Manager Software Version 1.0
Comodo Mobile Device Manager Software Version 1.0 Installation Guide Guide Version 1.0.041114 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.CMDM Setup... 3 1.1.System
Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder
Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,
Hands on Lab: Building a Virtual Machine and Uploading VM Images to the Cloud using Windows Azure Infrastructure Services
Hands on Lab: Building a Virtual Machine and Uploading VM Images to the Cloud using Windows Azure Infrastructure Services Windows Azure Infrastructure Services provides cloud based storage, virtual networks
Secure Message Center User Guide
Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account
