Secure Web Service - Hybrid. Policy Server Setup. Release Manual Version 1.01

Size: px
Start display at page:

Download "Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01"

Transcription

1 Secure Web Service - Hybrid Policy Server Setup Release Manual Version 1.01

2 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version 1.01, published May 2010 for software release This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior written consent from M86 Security. Every effort has been made to ensure the accuracy of this document. However, M86 Security makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. M86 Security shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. Due to future enhancements and modifications of this product, the information described in this documentation is subject to change without notice. Trademarks Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are the sole property of their respective manufacturers. Part# ER5-SUG_v II M86 SECURITY, Policy Server Setup

3 POLICY SERVER CONFIGURATION When using the Secure Web Service Hybrid (SWSH), all web traffic initiated by the remote worker computer is redirected to an M86 scanner securely hosted in the cloud. SWSH then scans the traffic, according to the user policy profile, and, if allowed, redirects it to the internet. Navigate to the Secure Web Gateway Management Console and login to M86 SWG: Figure 1-1: SWG Login Screen Accessing the tabs used for all Cloud Management tasks is available by either of the following: Navigating to Administration-Cloud-Cloud Configuration Clicking on the main toolbar of the Management Console screen, which directs you to the M86 SWS Getting Started screen of Cloud Security. This console page provides a localized option for all procedures required in configuring M86 Secure Web Service Hybrid computing. The Getting Started Guide screen provides links to perform the following actions: Open an Amazon Web Service Account Add an M86 Security Scanner Instance Provision Remote Worker s Computers via Policy Server Connect M86 Scanner Instance to Policy Server Configure SWS-H Cloud Certification Settings M86 SECURITY, SWS-H POLICY SERVER CONFIGURATION

4 Connect M86 Scanner Instance to Policy Server Once the AWS configurations are complete and an EC2 instance has been successfully launched, it must be connected to the Policy Server configurations, which ensure that the Policy Server is properly set up and that the scanners are running in accordance with customer requirements. Add New Device and Scanner Elastic IP NOTE: SWS-H and SWG support different anti-virus software solutions. Therefore, transaction logs created in the Cloud will be converted to the equivalent field names of the enterprise AV license. To join the SWS scanner to the Policy Server: 1.) Navigate in the Management Console to Administration - System Settings - M86 Devices. 2.) Right-click Devices and Add Device. 3.) Select Cloud Scanning Server in the Type dropdown menu. 4.) In the Device IP field, enter Cloud Scanner Elastic IP. (M86 recommends using elastic IPs; however, static IPs are acceptable in this field.) 5.) Click Save. Click to commit changes. 6.) Wait for policy distribution to complete NOTE: The initial connection may take up to minutes. 2 M86 SECURITY, ENTERPRISE REPORTER EVALUATION GUIDE

5 Figure 1-2: Connecting Cloud Instance to Policy Server Configure Server Settings The Settings screen refers to the Simple Mail Transfer Protocol (SMTP) Server information, which controls sending of s for the following: system events, application events, software updates, and Cloud provisioning s. NOTE: User and settings must be configured before provisioning can be initiated. Access the Enable Sending screen by navigating to Administration - System Settings - Mail Server or by clicking and the Server Settings link in the SWS Getting Started Guide screen. The following table provides a description of the fields in the Server Settings screen: Field Name Enable Sending Hostname/IP Port User Name Description Enables s to be sent This is the IP address of the SMTP Server you are using (e.g., mail.m86.com). Defines the port that the SMTP Server uses; this is usually Port 25. User name for SMTP Authentication (e.g. VS_NG. This is optional - depending on your SMTP requirements.) M86 SECURITY, SWS-H POLICY SERVER CONFIGURATION

6 Field Name Description Password Password for SMTP Authentication (optional - depending on your SMTP requirements) Originating Domain The alerts originate from this pre-defined user and domain name, using the machine name in the alias name (e.g. CustomerDomain.com). Test Recipient This is a test address to validate that the messages are being received. For example, sunshine@m86.com 1. Click Edit. 2. Check the Enable Sending checkbox. 3. Hostname and Originating domain are mandatory fields. Enter the relevant Hostname (either IP or address) and the Originating Domain (machine name). 4. Click Test and check the intended address to ensure that s are sent properly. 5. Click Save and then to commit changes. NOTE: Configuration of server settings is both necessary and important. Without this step, the client will be unable to receive the Agent Installation package, certificate management, and any other SWS-H notification s. Figure 1-3: Enable Sending Configure SWS-H Cloud Certification Settings Once settings have been enabled, configure the Web Service Certification settings, the Client Routing Settings, and enable the Auto Provisioning checkbox. 4 M86 SECURITY, ENTERPRISE REPORTER EVALUATION GUIDE

7 The Cloud Configuration screen includes the following tabs: CA Management Proxies Provisioning Agent Enforcement Bypass NOTE: The CA Management and Proxies tabs must be configured before any others in the configuration process. CA Management Large organizations that employ their own CA that is already trusted by end-users can generate a Certificate Signing Request (CSR). After the generation of the CSR, the system administrator can export the request (which is signed by SWG s private key) and send it to the Certificate Authority. The CA will then generate a certificate, which will be imported into the SWG. This procedure makes the process of exporting the certificate to end-users unnecessary. NOTE: As an external option, M86 Security provides a solution for the distribution of the SWS-H Agent and Certificates (p12) via the organizations Active Directory Group Policy Objects (GPO). This solution is a silent installation and distribution of digital certificates as a unique identifier for end-users of the M86 SWS-H Cloud solution. For more information, please refer to the AD Distribution document found in the Documentation / Download section of the M86 website. Figure 1-4: CA Management Tab M86 SECURITY, SWS-H POLICY SERVER CONFIGURATION

8 The CA Management tab is split into two sections. The first section includes nine different information fields, with only the Common Name field mandatory. (Subsequent field information is for informational purposes only and is therefore left to the discretion of the administrator) The second section includes the CA Generation option. The tab includes the following: Field Common Name Country Name State or Province City or Locality Organization Organization Unit Expiration Date Issuer Description Generally refers to global company name but may also reference a smaller group Generally refers to company headquarters, or the country in which the physical server sits Company details Company details Company details A unit within the company, for example, specific departments such as IT or Finance of the system administrator. Expiration date of the certificate issued Either self-signed authority or external Certificate Authorization The CA Generation section is split into three separate certificate options: Generate Self-Signed CA Import CA: Certificate is imported Import CSR-based CA: Import an SWG generated certificate The CA Generation options include the following Certificate Management Description CA Generation Options: Generate a certificate authority to sign SWG and mobile worker s certificates Generate Self-signed CA The system administrator serves as the authority and self-signs the certificate. The administrator considers this sufficiently secure. 6 M86 SECURITY, ENTERPRISE REPORTER EVALUATION GUIDE

9 Certificate Management Description Import CA The system administrator imports the certificate, together with the private key, into the system via an external Certificate Authority. Import CSR-based CA: A private and public key pair is created and saved directly to the system. Generate CSR Prior to importing the CSR-based CA, generate a digital certificate and have it signed by an external Certificate Authority. Import CSR-based CA Import a certificate signed by the CA after a CSR was generated by SWG. Generate Self-Signed CA Use a self-signed Certificate Authority to sign SWG and mobile worker s certificates. To generate self-signed CA: 1.) Navigate in the Management Console to Administration - Cloud - Cloud Configuration - CA Management tab. 2.) Click Edit and then click the Generate Self-Signed CA button. 3.) In the Cloud Configuration screen, enter the Common Name field (for example, M86 Security). All other fields in this screen are optional. Click OK. 4.) Certificate information is stored internally in the database. The original Cloud Configuration screen shows the certificate details. 5.) Click Save and then click to commit changes and complete certificate generation. Import CA The Secure Web Gateway system allows you to import new certificates, and supports two types of certificates: The Root CA option allows system administrators to import the certificate into the system together with the private key. This root certificate is uploaded and displayed to users browsing HTTPS sites and is created globally for all scanning servers. To import a digital certificate for the sender's root CA: 1.) Navigate in the Management Console to Administration - Cloud - Cloud Configuration - CA Management tab. 2.) Click Edit. Click the Import CA button. M86 SECURITY, SWS-H POLICY SERVER CONFIGURATION

10 3.) In the following Cloud Configuration screen, copy the certificate, private key, and password information. (This certificate information is received through an external Certificate Authority prior to this configuration. NOTE: Certificate information must be copied precisely. This includes beginning and ending information such as spaces and dashes. 4.) Click Save and then click to commit changes and complete certificate generation. Import CSR-based CA Figure 1-5: Import Root CA The CSR-based CA option allows you to import a certificate signed by the CA after a CSR (Certificate Signing Request) is generated by the Secure Web Gateway. To import CSR-based CA: 1. Navigate in the Management Console to Administration - Cloud - Cloud Configuration - CA Management tab. 2. Click Edit. Click the Generate CSR link within the description. 3. In the following Cloud Configuration screen, enter the Common Name (for example, M86 Security). All other fields in this screen are optional. 4. Click OK. The Generate CSR Based CA window is displayed. 8 M86 SECURITY, ENTERPRISE REPORTER EVALUATION GUIDE

11 Figure 1-6: Generate CSR Based CA 5. Copy the contents of the Generated Request pane to the clipboard. Click OK. 6. Paste and send this certificate information to an external CA for signing. 7. Return to the original Cloud Configuration screen. Click the Import CSR-based CA button. 8. Paste the externally signed certificate information in the certificate field. Click OK. 9. If the signee is not trusted by the system, a pop-up message will appear alerting you as much. NOTE: Certificate information must be copied precisely. This includes beginning and ending information such as spaces and dashes. 5.) Click Save and then click to commit changes and complete certificate generation. Proxies 6.) The Proxies tab includes the following fields: Protocol Cloud proxy Local proxy Corporate Hostname Internal Hostname IP Resolve IP Port Cloud scanners Corporate proxies Corporate address ( IP of corporate hostname Verification that corporate hostname and Internal hostname IP correspond Cloud Proxy: The Cloud proxy field defines the Cloud scanner or Load Balancer used for browsing. It includes the proxy port, region, IP, and the Local Port to browse via SWS-H. M86 SECURITY, SWS-H POLICY SERVER CONFIGURATION

12 The following are the ports to which the agent connects when attempting to access the Cloud scanner/load Balancer: Proxy Port: This port is used for the tunneling of HTTP transactions performed by the browser. Proxy HTTPS Port: This port is used for the tunneling of HTTPS transactions performed by the browser. Address: ports that the browser uses to connect to the agent within the enduser client. Address will be a hostname or an IP. Local Proxy: Add the local proxy. The PAC file will include instruction to use the local proxy, if resolvable, as it recognizes you are within the local network. If the corporate hostname is not resolvable, it will use the nearest (region) Cloud proxy available. = Implicit: The local proxy can be left empty in a situation in which the administrator determines for users which proxy to use. = Explicit: Implies that the administrator has entered IP information into the Local proxy field. Corporate Hostname: The administrator must ensure that the corporate hostname is resolvable with the Internal hostname IP. When the user is outside of the corporate network, the corporate hostname should be resolvable to a different IP. Internal Hostname IP: The corresponding address for the corporate hostname. For example, the IP address for m86security.com. Resolve IP: For local proxy usage, the agent must determine that the user is indeed at corporate headquarters. Entering the DNS/hostname in the corporate hostname field and clicking Resolve IP allows the system to verify that the IP address and the corporate hostname correspond. The result is displayed in the Internal Hostname IP field. Figure 1-7: Proxies Tab 10 M86 SECURITY, ENTERPRISE REPORTER EVALUATION GUIDE

13 Bypass The Bypass tab includes the following fields: Non-Routable Networks: This table shows all networks or domains (IPs) to bypass while browsing in Cloud proxy or local proxy. Trusted URLs: Choose URLs that you want the Cloud proxy to bypass. Allow the organization to bypass certain URLs that the administrator deems safe (for example, Microsoft update, Mozilla...). Figure 1-8: Bypass Tab Provisioning A remote client can be provisioned by a Provisioned . Configure the Policy Server to automatically send a provisioning to target cloud users with a link to the agent installation and with the target user certificate. (This option is suitable for the integration phase or for small rollout of to up to a few hundred users.) NOTE: You can also choose to use the Policy Server to automatically or manually send the target user an with the client agent installation instructions and/or the target user certificate. The Provisioning tab includes the following: Protocol Agent Installer URL Automatically send an with provision instructions to new Cloud members checkbox Port Address, chosen by the administrator, where the Agent Installation Package is saved Sends an to new Cloud users with provisioning instructions. M86 SECURITY, SWS-H POLICY SERVER CONFIGURATION

14 Protocol Send an update upon configuration changes Download PAC File Download Agent Installer Port Sends an to existing Cloud users once changes have been committed Click the Download PAC File button and save the created file. Button to download Agent Installer once all information is configured in Policy Server NOTE: s will only be sent after configuration, after a new certificate is issued, and after changes have been committed. Enabling the Automatically send an with provision instructions to new Cloud members checkbox ensures that update s are sent to users. Each time a new user receives new Cloud certification or a configuration change has occurred, an update is sent. Enabling the Send an update upon configuration changes is for existing users if changes have been made in the configuration. Figure 1-9: Remote Client Provisioning Before downloading PAC files and the Agent Installation package, the proxies and CA management information/configurations must be completed. To proceed with this tab, refer to the Proxies and CA Management tabs. Download buttons are disabled until all relevant information is input. Build PAC files The PAC file defines how browsers can automatically choose the appropriate proxy server for retrieving a given URL. PAC files contain a "FindProxyForURL(url, host)" function that returns a string with one or more access method specifications. These specifications cause the user to use a particular proxy server or to connect directly. 12 M86 SECURITY, ENTERPRISE REPORTER EVALUATION GUIDE

15 Pre-configured M86 PAC files can be created within the management console, or a customer s proprietary PAC file may also be used. However, customers using a proprietary PAC file must ensure that the local host proxy within the PAC file belongs to M86. Prepare PAC files pointing to SWS-H scanners: 1. Navigate in the Management Console to Administration - Cloud Configuration- Provisioning tab. 2. Click Edit. 3. Click the Download PAC file button and Save. 4. The PAC file is eventually included in the Agent Installation Package. Define and Download Agent Installation Package Agents are installed for remote worker laptop computers or in situations in which the LAN desktop, whether at headquarters or a branch office, is not a domain member and the user is not authenticated with the domain. An Agent can also be installed in a branch office scenario as an alternative network solution to route the traffic to the cloud scanners. The SWS-H Agent has two main rules: ü Routing: Routing the traffic to the nearest scanner, cloud, or on-premise scanner. ü Authentication: Establish mutual certificate authentication between the logged-on user and the target cloud scanner. The following steps are required to create the SWS Agent installation package: ü Proxies and CA Management configuration ü Agent setting configurations ü Client provisioning Agent Enforcement The Agent Enforcement tab includes two checkboxes, both of which are enabled by default: Prevent user from disabling agent: Enabling this checkbox ensures that the user cannot disable the agent in the browser, thereby allowing surfing through an M86 agent only. Enforce PAC file usage via the Secure Web Service Agent: Enabling this checkbox assures that the PAC file being used is an M86 PAC file. Administrators should keep this box unchecked if a proprietary PAC file is used. M86 SECURITY, SWS-H POLICY SERVER CONFIGURATION

16 Figure 1-10: Agent Enforcement Tab NOTE: The Enforce PAC file usage via Vital Cloud Agent works only with Internet Explorer. For Firefox users, if this option is enabled, you will be unable to make any changes after the initial installation and after changes have been committed. Group Member Certification Authentication Directories The Authentication directories step is necessary to define the users or user groups who will browse via M86 SWS-H. Enabling the checkbox in this screen allows users or user groups to receive provisioning and update s, certificates, and installation instructions. Navigate to the Authentication Directories (LDAP) menu or to the Users menu to enable the Issue Vital Cloud Certificate for Group Member checkbox. NOTE: This section relies on previously configured domain users. For more information on domain users and local users, refer to the Management Console Reference Guide on Adding Domain Users. To issue Cloud certificates for domain users: 1. In the Management Console, navigate to Users Authentication Directory LDAP. (Alternatively, click the Domain Users link in the Cloud Getting Started Guide screen) 2. Right-click the LDAP directory and select the required LDAP group. 3. Click Edit and then enable the checkbox in the screen Issue Cloud certificates per User: See the <cross reference>users chapter for instructions on the Issue Vital Cloud Certificate for Group Member checkbox in the <cross reference>user Group Details Screen and <cross reference>creating a New User Group sections. This task defines the users or user groups who will browse via M86 Secure Web Service Hybrid. Enabling this checkbox allows users or user groups to receive provisioning and update s, certificates, and installation instructions. NOTE: Use the Group Policy to auto-provision clients with Secure Web Service Agent. 14 M86 SECURITY, ENTERPRISE REPORTER EVALUATION GUIDE

17 Template The Secure Web Gateway provides an template to automatically provision Cloud users via .the provisioning templates are used if the administrator wants to edit the mail before sending. Otherwise, the default provisioning will be used. To setup the provisioning 1. Navigate in the Management Console to Administration Cloud Template. 2. Click Edit. Select from the Provisioning Template dropdown menu the template you want to use. 3. The menu consists of the following templates: Certificate Management Select Type Standard Template Standard Template for Reinstallation Template with Agent Template with Agent for Reinstallation Description Select type with editing capabilities. is sent with the certificate attached. is sent to inform user that a certificate was issued anew. Follow instructions. arrives with both a certificate and link to the Agent installation. arrives with both a certificate and link to the Agent installation after certificate has been re-issued or with a new Agent added. 4. The template is activated for modification. Figure 1-11: Template You can modify the contents of the From, Subject, and Message fields (or accept the default settings). Add placeholder lists are provided for modifying the From and Message fields. M86 SECURITY, SWS-H POLICY SERVER CONFIGURATION

18 The placeholder menu includes: SWS-H Agent URL, Username, etc...) You can click HTML View to view the message contents in HTML. 5. Click Save and then click to commit changes. 16 M86 SECURITY, ENTERPRISE REPORTER EVALUATION GUIDE

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12 M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.

More information

.trustwave.com Updated October 9, 2007. Secure Web Gateway Version 11.0 Hybrid Deployment Guide

.trustwave.com Updated October 9, 2007. Secure Web Gateway Version 11.0 Hybrid Deployment Guide .trustwave.com Updated October 9, 2007 Secure Web Gateway Version 11.0 Hybrid Deployment Guide Legal Notice Copyright 2012 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright

More information

Secure Web Gateway Version 11.0 User Guide

Secure Web Gateway Version 11.0 User Guide Secure Web Gateway Version 11.0 User Guide Legal Notice Copyright 2013 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying,

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as

More information

User Identification and Authentication

User Identification and Authentication User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included

More information

Request Manager Installation and Configuration Guide

Request Manager Installation and Configuration Guide Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Installation Guide. SafeNet Authentication Service

Installation Guide. SafeNet Authentication Service SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

.Trustwave.com Updated October 9, 2007. Secure Web Gateway Version 11.0 Amazon EC2 Platform Set-up Guide

.Trustwave.com Updated October 9, 2007. Secure Web Gateway Version 11.0 Amazon EC2 Platform Set-up Guide .Trustwave.com Updated October 9, 2007 Secure Web Gateway Version 11.0 Amazon EC2 Platform Set-up Guide Legal Notice Copyright 2012 Trustwave Holdings, Inc. All rights reserved. This document is protected

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Integrated SSL Scanning

Integrated SSL Scanning Version 9.2 SSL Enhancements Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services

More information

Releasing blocked email in Data Security

Releasing blocked email in Data Security Releasing blocked email in Data Security IN-TopicInfo:Topic 41101/ Updated: 02-May-2011 Applies To: Websense Data Security v7.1.x Websense Data Security v7.5.x Websense Data Security v7.6.x - v7.8x SMTP

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

JetAdvice Manager Data Collector v. 2.1. Date: 2014-06-30

JetAdvice Manager Data Collector v. 2.1. Date: 2014-06-30 JetAdvice Manager Data Collector v. 2.1 Date: 2014-06-30 NOTE The information contained in this document is subject to change without notice. EuroForm makes no warranty of any kind with regard to this

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] Cox Managed CPE Services RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] September, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

App Orchestration 2.5

App Orchestration 2.5 Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Configuration Guide for Email Gateway emailgtw v2.7 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as

More information

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net All rights reserved. Redistribution

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

Web Security Service

Web Security Service Webroot Web Security Service Desktop Web Proxy Configuration Guide Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Desktop Web Proxy Configuration Guide September

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Clearswift Information Governance

Clearswift Information Governance Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

TRITON Unified Security Center Help

TRITON Unified Security Center Help TRITON Unified Security Center Help Websense TRITON Unified Security Center v7.7 2011-2012, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2012 Printed

More information

RMFT Web Client User Guide

RMFT Web Client User Guide RMFT Web Client User Guide Software Version 2.5 Supported Browsers: Browser Internet Explorer Firefox Safari Google Chrome Version 7.0 and above 3 and above 3.2 and above 1.0 and above August 7, 2011 RepliWeb,

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Sophos Mobile Control Installation guide

Sophos Mobile Control Installation guide Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Smart Connect. Deployment Guide

Smart Connect. Deployment Guide Smart Connect Deployment Guide Smart Connect Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Integrated SSL Scanning

Integrated SSL Scanning Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

Exchange 2010 PKI Configuration Guide

Exchange 2010 PKI Configuration Guide Exchange 2010 PKI Configuration Guide Overview 1. Summary 2. Environment 3. Configuration a) Active Directory Configuration b) CA Configuration c) Exchange Server IIS Configuration d) Exchange Configuration

More information

AD Self-Service Suite for Active Directory

AD Self-Service Suite for Active Directory The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

Certificate Management

Certificate Management www.novell.com/documentation Certificate Management ZENworks Mobile Management 3.1.x August 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

VMware vcenter Support Assistant 5.1.1

VMware vcenter Support Assistant 5.1.1 VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following

More information

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

CRM to Exchange Synchronization

CRM to Exchange Synchronization CRM to Exchange Synchronization Product Registration Instructions VERSION 2.0 DATE PREPARED: 1/1/2013 DEVELOPMENT: BRITE GLOBAL, INC. 2012 Brite Global, Incorporated. All rights reserved. The information

More information

CRM to Exchange Synchronization

CRM to Exchange Synchronization CRM to Exchange Synchronization Installation, Configuration and End-User Instructions VERSION 1.0 DATE PREPARED: 9/1/2012 DEVELOPMENT: BRITE GLOBAL, INC. 2012 Brite Global, Incorporated. All rights reserved.

More information

If you have questions or find errors in the guide, please, contact us under the following e-mail address:

If you have questions or find errors in the guide, please, contact us under the following e-mail address: 1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration

More information

AG MacOS Standalone Array Client Administration Guide

AG MacOS Standalone Array Client Administration Guide AG MacOS Standalone Array Client Administration Guide Copyright Statement Copyright Statement Copyright 2015 Array Networks, Inc., 1371 McCarthy Blvd, Milpitas, California 95035, USA. All rights reserved.

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Foglight Experience Monitor and Foglight Experience Viewer

Foglight Experience Monitor and Foglight Experience Viewer Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Avaya Solution & Interoperability Test Lab Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Abstract These Application Notes describe the

More information

The cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL.

The cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL. GO-Global Cloud 4.1 QUICK START SETTING UP A WINDOWS CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

GUIDE. for Authentication. Model: ProxyBlocker. Release 1.0.00 / Version No.: 1.01

GUIDE. for Authentication. Model: ProxyBlocker. Release 1.0.00 / Version No.: 1.01 R 8e6 ProxyBlocker USER GUIDE for Authentication Model: ProxyBlocker Release 1.0.00 / Version No.: 1.01 ii 8E6 TECHNOLOGIES, PROXYBLOCKER AUTHENTICATION USER GUIDE 8E6 PROXYBLOCKER AUTHENTICATION USER

More information

www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014

www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,

More information

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

uh6 efolder BDR Guide for Veeam Page 1 of 36

uh6 efolder BDR Guide for Veeam Page 1 of 36 efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder

More information

Transparent Identification of Users

Transparent Identification of Users Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

v6.1 Websense Enterprise Reporting Administrator s Guide

v6.1 Websense Enterprise Reporting Administrator s Guide v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,

More information