eprism Enterprise Tech Notes
|
|
|
- Stewart Knight
- 9 years ago
- Views:
Transcription
1 eprism Enterprise Tech Notes Utilizing Microsoft Active Directory for eprism s Directory Services Context eprism can integrate with an existing LDAP (Lightweight Directory Access Protocol) directory for user and group information. This tech note will explain how to utilize Active Directory (AD) for personal whitelists, user spam quarantine, policy management, directory authentication and to reject incoming s with non-existent recipients in AD. Requirements eprism model M1000 or higher eprism version 5.0 Microsoft Active Directory or ADAM (Active Directory Application Mode) Prerequisite Results Limit Active Directory has a default limit of 1000 entries that can be returned from a single LDAP query. With large queries, the results may be truncated. It is recommended that you modify the default maximum page size to ensure that LDAP group and user imports will work successfully. For more information, please read the LDAP Overview section on Chapter 4 of the eprism User Guide. Use the following procedures to modify the default maximum page size limit in Active Directory: 1. Log in to the Active Directory server as an administrator. 2. Open a command prompt window by going to Start -> Run, typing cmd and clicking OK. 3. Enter the following commands (in bold text): C:\>ntdsutil.exe ntdsutil: Ldap policies ldap policy: connections server connections: connect to server localhost Binding to localhost Connected to localhost using credentials of locally logged on user server connections: quit ldap policy: set MaxPageSize to ldap policy: commit changes ldap policy: quit ntdsutil: quit 4. Close the command prompt window by typing exit and pressing Enter. Configuration Directory Servers Any directory service feature on the eprism requires at least one directory server entry. Follow the instructions below for creating an entry under the directory server page. 1. Go to Basic Config -> Directory Services -> Directory Servers. 2. Click Add. 3. Enter the appropriate information for your Active Directory. For an example, see screenshot below.
2 4. Click Apply when finished. Your directory server entry should now be displayed on the page. 5. To test your settings, click the Edit button next to the entry. 6. Click Test to bring up the LDAP query test page. 7. Use the same Bind DN and Password as your directory server entry and click Submit LDAP Query. The results should look something like the example below. If not, please see the FAQ section at the end of this tech note. # extended LDIF # # LDAPv3 # base with scope sub # filter: (objectclass=*) # requesting: ALL # domain.com dn: DC=domain,DC=com objectclass: top objectclass: domain objectclass: domaindns distinguishedname: DC=domain,DC=com instancetype: 5 whencreated: Z whenchanged: Z subrefs: DC=ForestDnsZones,DC= domain,dc=com subrefs: DC=DomainDnsZones,DC= domain,dc=com subrefs: CN=Configuration,DC= domain,dc=com usncreated: 4098 usnchanged: name: domain objectguid:: McgtHFiZCEWw1+xucWw5nQ==
3 creationtime: forcelogoff: lockoutduration: lockoutobservationwindow: lockoutthreshold: 0 maxpwdage: minpwdage: minpwdlength: 7 modifiedcountatlastprom: 0 nextrid: 1003 pwdproperties: 1 pwdhistorylength: 24 objectsid:: AQQAAAAAAAUVAAAA/6vP6b2KZf1EEYC+ serverstate: 1 uascompat: 1 modifiedcount: Click Done and Cancel when finished testing. Directory Users Once you have the directory server configured, you can import the user and group information from Active Directory. For importing user information, you will need to create an entry under the directory user page using the instructions below. 1. Go to Basic Config -> Directory Services -> Directory Users. 2. Click Add. 3. Select the directory server entry that you have configured in the previous section. 4. The default values should work with most implementations of AD. When finished reviewing the values, click Apply.
4 5. Your directory user entry should now appear on the page along with some new buttons. These buttons will allow eprism to import the user information from AD. 6. Click the Import Settings button. 7. Enable the checkbox next to Import User Data to allow automatic scheduling of the import process. 8. Modify the frequency and start time to suit your needs. If you frequently make changes to the user information, select a quicker frequency setting such as hourly. 9. If you are going to utilize the user spam quarantine feature, enable the Mirror Accounts checkbox as well. 10. Click Apply to save the changes and get back to the previous page. 11. Then click Import Now to perform an initial import of the user data. Directory Groups Directory groups are used in conjunction with policy-based controls. It allows the importing of groups from an AD server to determine group memberships for the policies. If you are not using policy management, please skip this section. 1. Go to Basic Config -> Directory Services -> Directory Groups. 2. Click Add. 3. Select your directory server entry from the drop-down list. The default values will work in most Active Directory implementations.
5 4. Click Apply. 5. Just like with directory users, eprism will need to import the group information from your directory. Click the Import Settings button. 6. Enable the Import Group Data checkbox and specify a frequency and start time. 7. Click Apply when done. 8. Then click Import Now to perform an initial import of the group data. Reject on Unknown Recipient eprism has the ability to verify the existence of the intended recipients on inbound s prior to delivering the s to the mail server. Reject on Unknown Recipient utilizes the imported data from directory users to determine if the recipient addresses are valid. To utilize the Reject on Unknown Recipient feature, follow the instructions below: 1. Ensure that you have imported the user data from Active Directory either by manually clicking on the Import Now button under Basic Config -> Directory Services -> Directory Users or waiting until the automatic schedule had a chance to run the import process. 2. Then go to Mail Delivery -> Anti-Spam -> Anti-Spam. 3. Enable the checkbox next to Reject on unknown recipient and click Apply.
6 4. Go to the Activity page and stop then restart the mail process. Remote Authentication Remote authentication allows users to log in to the eprism without having a local account. eprism can utilize the existing account information on your Active Directory to allow authentication for the trusted sender feature, user spam quarantine and even for the Outlook Web Access proxy. 1. Go to User Accounts -> Remote Auth. 2. Under the LDAP Sources section, click New. 3. Select your directory server entry from the drop-down list and click Apply. 4. While still on the User Accounts -> Remote Auth page, scroll down to the Default LDAP/RADIUS User Profile section and make sure that the checkbox for This eprism Security Appliance is enabled. This will allow remote authentication to work properly with the trusted sender feature and spam quarantine.
7 5. Click Apply when finished. 6. Then go to Basic Config -> Network. 7. Scroll down to the network interface sections. 8. Enable the eprism mail client checkbox under the network interface that the users will be connecting to for their trusted sender list or spam quarantine. 9. Click Apply when completed. Any changes to this page will require a reboot. Trusted Senders The trusted sender feature allows users to create their own personal whitelists based on the sender s address. For more information, please read the Trusted Senders section on Chapter 6 of the eprism User Guide. To use directory services with trusted senders: 1. Configure directory users as specified in the previous sections. 2. Enable the remote authentication. 3. Go to Mail Delivery -> Anti-Spam -> Trusted Senders. 4. Click the Enable checkbox. 5. Type in the domain name and click Apply. The domain is the part after symbol (ex: domain.com for [email protected]).
8 6. Then go to User Accounts -> Secure WebMail. 7. Under the Access Types section, enable the checkbox next to Trusted Senders. 8. Click Apply. To add entries to the trusted sender list, users must log in to the eprism secure webmail using the instructions below: 1. Open a browser and bring up the eprism login page by entering (ex: 2. Enter the user s Windows account name and password and then click Login. 3. Use the navigation icons on the left and click Trusted Senders. 4. To whitelist an , enter an address in the textbox and click Add. 5. Click Logout when finished.
9 User Spam Quarantine The user spam quarantine is used to redirect spam mail into a local storage area for each individual user. Users will be able to log in to the eprism and manage their own quarantined spam. Those quarantined messages can then be released, deleted or even added to their trusted sender list. To configure user spam quarantine with Active Directory: 1. Ensure that the LDAP users are imported and mirrored properly by going to User Accounts -> Mirror Accounts. 2. Then go to Mail Delivery -> Anti-Spam -> Spam Quarantine. 3. Click the Enable Spam Quarantine checkbox. The default settings should suffice but you can modify them as necessary. 4. Click Apply when done. 5. Go to User Accounts -> Secure WebMail. 6. Under the Access Types section, enable the checkbox for Personal Quarantine Controls and click Apply.
10 Once the user spam quarantine has been set up, the anti-spam controls will have to be configured to utilize the spam quarantine. Use the following instructions to have each anti-spam control move the spam mail into the individual quarantine areas: 1. For Pattern Based Message Filtering, go to Mail Delivery -> Anti-Spam -> PBMF. 2. Click Preferences. 3. Change the action to Redirect to and type in the eprism s fully-qualified domain name (FQDN) in the action data textbox. If you do not know the FQDN, use the hostname and domain name under Basic Config -> Network (ex: myeprism.domain.com). 4. Click Apply on the PBMF preference page to save your changes. Any PBMF entry with an action of spam will now be moved to the user spam quarantine. 5. For the Real-Time Blackhole List, go to Mail Delivery -> Anti-Spam -> RBL. 6. Change the action to Redirect to 7. On the action data textbox, enter the same FQDN as before and click Apply. 8. For the Distributed Checksum Clearinghouse, go to Mail Delivery -> Anti-Spam -> DCC. 9. Use the Redirect to action along with eprism s FQDN and click Apply. 10. For the Statistical Token Analysis, go to Mail Delivery -> Anti-Spam -> STA 11. On the upper threshold, change the action to Redirect to and enter eprism s FQDN in the action data. The STA mode needs to be set to Scanning and Training for the upper threshold to quarantine spam properly. However, make sure that you have at least a week s worth of s before switching the STA mode from Training Only. 12. Click Apply when finished. Spam mail will now be redirected to the individual spam quarantine. To view the quarantined spam: 1. Open a browser and bring up the eprism login page by entering (ex: 2. Enter the user s Windows account name and password and then click Login. 3. Use the navigation icons on the left and click Spam Quarantine. You will be then be able to view, delete, release or whitelist any quarantined spam from this screen. 4. Click Logout when finished.
11 Policy Management eprism s policy controls allow different settings to be applied to users based on their group membership. Policy management can integrate with LDAP to use your existing AD security and distribution groups. The settings that can be customized include: Annotations Inbound Attachment Control Outbound Attachment Control Anti-Virus Distributed Checksum Clearinghouse (DCC) Statistical Token Analysis (STA) To integrate policy management with LDAP, follow the procedures below: 1. Ensure that you have imported the group information from Active Directory either by manually clicking on the Import Now button under Basic Config -> Directory Services -> Directory Groups or waiting until the automatic schedule had a chance to run the import process. 2. Go to Mail Delivery -> Policy. 3. Click the Default Policy entry from the list to configure the default settings first. 4. Click Apply when finished. 5. Click the Add Groups button. 6. Select the group(s) that you would like to have customized policy settings and click Add. Each group that you selected should now have an entry listed on the page. 7. Go through each entry and customize the settings for your group(s) as shown from the example below. 8. Click Apply when finished. 9. After each group has been customized, enable the policy management feature by clicking on the Enable Policy button from the Mail Delivery -> Policy page.
12 FAQs Question 1: What is ADAM? Answer 1: Microsoft ADAM or Active Directory Application Mode is a LDAP directory that runs as a user service rather than a system service. ADAM uses the same core Microsoft directory technologies as Active Directory but does not require domain controllers, forests, domains, etc. You can also run multiple instances of ADAM on the same system and even install it on non-server operating systems like Windows XP. For more information about ADAM, please see Question 2: When I run the LDAP query test, I get an error: Could not create LDAP session handle (5): Compare False Answer 2: Your URI entry is incorrectly formatted. It should look like ldap://ipaddressorhostname or ldaps://ipaddressorhostname for LDAP over SSL (LDAPS). Do not capitalize the ldap:// portion as it is casesensitive. Question 3: The URI is properly formatted but now I get the following error message when running the LDAP query test: ldap_bind: Can t contact LDAP server (81) Answer 3: Verify that eprism can query your AD server properly by checking the following items: Check if the IP address or hostname for the AD server is correct. You can test if the hostname is resolving to the proper IP address by going to Status/Reporting -> Status & Utility -> Hostname Lookup. Make sure that eprism can actually connect to your AD server. Try pinging the server from Status/Reporting -> Status & Utility -> Ping menu. If the pings are failing, check if ICMP echo requests and echo replies are allowed or if there are any network routing or connectivity issues. LDAP uses port 389/TCP for client-to-server communications. Check for any firewalls, filtering devices, or IPSEC policies preventing the eprism from connecting to port 389/TCP (or 636/TCP for LDAPS) on the AD server. If there is a NAT device between the eprism and the AD server, ensure that the source and destination addresses are getting translated correctly. Question 4: Importing the directory user or group information keeps failing. I tried using the LDAP query test to verify my configuration when I got this error message: ldap_bind: Invalid credentials (49) additional info: : LdapErr: DSID-0C090334, comment: AcceptSecurityContext error, data 52e, vece Answer 4: Invalid credential messages indicate that either the bind DN or the bind password is incorrect. Verify that both the password and the bind DN are correct. If you are unsure on what exactly the bind DN should be, use any LDAP utility like LDP from the Windows 2000 Support Tools to verify your entry. For more
13 information on using LDP, please see Microsoft KB article at Question 5: How do I use the new LDAP recipient feature with Reject on Unknown Recipient? Answer 5: The LDAP recipient feature currently requires Active Directory to allow anonymous binds and that all the user accounts be placed in one container. These limitations are removed in the next update so we recommend not using it until the update has been released. Reject on Unknown Recipient can still use the locally-cached data that was imported from directory users regardless of the LDAP recipient feature. Question 6: We have more than one domain for our organization. How do I enter additional internal domains for trusted senders? Answer 6: The trusted sender feature currently supports only one internal domain. Question 7: Is there a way to whitelist an entire domain under trusted senders? Answer 7: Only full addresses can be whitelisted under the trusted sender list. To whitelist an entire domain, use PBMF filters located under Mail Delivery -> Anti-Spam -> PBMF. Please refer to Chapter 6 of the eprism User Guide for more information on PBMF. Question 8: Can I use Outlook to retrieve my quarantined spam messages? Answer 8: Yes. eprism supports IMAP and IMAPS for accessing the user spam quarantine. To enable and configure IMAP/IMAPS access, please refer to Chapter 7 of the User Guide. Question 9: We have multiple domains in our Active Directory forest. How can I configure eprism to query the global catalog server? Answer 9: Global catalog servers contain the AD information for objects within its own domain plus a replica of the AD information for objects in other domains in the forest. In order to perform queries against the global catalog server, modify your directory server entry to point to the global catalog server and use TCP port 3268 instead (ex. ldap:// :3268). For secured LDAP queries over SSL, use ldaps:// in the URI and TCP port 3269 (ex. ldaps:// :3269). Contact Information Technical Support - USA, Canada, Pacific Rim and Latin America: Hours of Support - Pacific Time 7:00 am 4:00 pm, Excluding Holidays Tel: Fax: [email protected] Technical Support - Europe, Middle East, Africa: Hours of Support - UTC 08:30 17:30, Excluding Holidays Tel: Fax: [email protected]
Training Guide eprism Email Security Appliance 4.0
Training Guide eprism Email Security Appliance 4.0 2 Lesson 1 Email Security and eprism Contents LESSON 1...5 EMAIL SECURITY AND EPRISM...5 Mail Delivery Process...6 eprism Overview...7 LESSON 2...9 INSTALLING
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
escan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.
Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
D3 TECHNOLOGIES SPAM FILTER
D3 TECHNOLOGIES SPAM FILTER The D3 Technologies spam filtering provides virus, attachment, and spam filtering services for email. We check all emails for viruses and malicious content, since we feel these
Email Migration Manual (For Outlook 2010)
Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change
CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
M1000, M2000, M3000. eprism User Guide
M1000, M2000, M3000 eprism User Guide Preface 5 CHAPTER 1 eprism Overview 7 What s New in eprism 5.0 8 eprism Overview 10 eprism Deployment 17 How Messages are Processed by eprism 19 CHAPTER 2 Administering
Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism
Technical Note Configuring Outlook Web Access with Secure WebMail Proxy for eprism Information in this document is subject to change without notice. This document may be distributed freely only in whole,
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.
Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page
1 You will need the following items to get started:
QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide
BlackShield ID. QUICKStart Guide. Integrating Active Directory Lightweight Services
QUICKStart Guide Integrating Active Directory Lightweight Services 2010 CRYPTOCard Corp. All rights reserved. http://www.cryptocard.com Trademarks CRYPTOCard, CRYPTO Server, CRYPTO Web, CRYPTO Kit, CRYPTO
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
PineApp Surf-SeCure Quick
PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.
Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Cloud Email & Web Security. Administrator Quick Start Guide
Administrator Quick Start Guide - Index 1. Cloud Email Firewall Introduction 2. Licensing model 3. Initial Cloud Email Firewall configuration 3.1 Cloud Email Firewall Inbound email filtering 3.1.1 Domain
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Sophos UTM Web Application Firewall for Microsoft Exchange connectivity
How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services
Email Migration Manual (For Outlook Express 6)
Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
Important Information
June 2015 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com
How To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network
Authenticating SSL VPN users using LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user
Administrator Quick Start Guide
Administrator Quick Start Guide - Index 1. Cloud Email Firewall Introduction 2. Licensing model 3. Initial Cloud Email Firewall configuration 3.1 Cloud Email Firewall Inbound email filtering 3.1.1 Domain
LDAP User Guide PowerSchool Premier 5.1 Student Information System
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
HOW WILL I KNOW THAT I SHOULD USE THE IAS EMAIL CONTINUITY SERVICE? https://web.ias.edu/updateme/
WHEN DO I NEED TO ACCESS THE IAS EMAIL CONTINUITY SERVICE? This service is provided to address the following actions during periods where the IAS email servers are offline: 1. If you need to check for
Green House Data Spam Firewall Administrator Guide
Green House Data Spam Firewall Administrator Guide Spam Firewall Administrator Guide... 2 Navigating the Web Interface... 2 How to Drill Down from the DOMAINS Page to Account Level... 2 Message Logs...
Guardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
Frequently Asked Questions
Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange
Configuring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
eprism Email Security Suite
Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered
Configuration Guide for Exchange 2003, 2007 and 2010
Configuration Guide for Exchange 2003, 2007 and 2010 Table of Contents Exchange 2013... 2 Configuring Outbound Smart Host... 2 Configure Access Restriction to Prevent DoS Attacks... 2 Exchange 2007/2010...
Troubleshooting IMAP Clients and ViewMail for Outlook in Cisco Unity Connection 8.x
CHAPTER 17 Troubleshooting IMAP Clients and ViewMail for Outlook in Cisco Unity Connection 8.x See the following sections for problems that can occur in IMAP clients and in Cisco Unity Connection ViewMail
Summary. How-To: Active Directory Integration. April, 2006
How-To How-To Integrate CanIt-PRO with Active Directory: April, 2006 Summary Several organizations use Active Directory to manage their user accounts. This paper describes how to integrate CanIt-PRO with
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
LDaemon. This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients.
LDaemon This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients. LDaemon... 1 What you should know before installing LDaemon:... 2 ACTIVE DIRECTORY... 2
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
Mondopad v1.6. Quick Start 009-1489-00
Mondopad v1.6 Quick Start 009-1489-00 Contents Hardware Setup... 3 Windows Setup & Registration Process... 3 Microsoft Windows Setup... 3 Register the Mondopad Software... 4 Microsoft Office Activation...
Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder
Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
Installing Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
Deployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2010, Parallels, Inc.
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
Basic Exchange Setup Guide
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
Using MailStore to Archive MDaemon Email
Using MailStore to Archive MDaemon Email This guide details how to archive all inbound and outbound email using MailStore, as well as archiving any emails currently found in the users accounts in MDaemon.
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Merak Outlook Connector User Guide
IceWarp Server Merak Outlook Connector User Guide Version 9.0 Printed on 21 August, 2007 i Contents Introduction 1 Installation 2 Pre-requisites... 2 Running the install... 2 Add Account Wizard... 6 Finalizing
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
Quick Scan Features Setup Guide
Xerox WorkCentre 7132 Quick Scan Features Setup Guide 701P45042 This guide includes instructions for: Scan to Email on page 1 Scan to Mailbox Setup (Optional) on page 5 Network Scanning Setup (Optional)
Kaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Immotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
NETASQ ACTIVE DIRECTORY INTEGRATION
NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos
Using Avaya Aura Messaging
Using Avaya Aura Messaging Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting Started... 4 Messaging overview... 4 Prerequisites... 4 Accessing your mailbox from any phone... 4 Accessing the
Icebox - Sendio SPAM Filter
Icebox - Sendio SPAM Filter Sendio Icebox The Navajo Department of Information Technology (DIT) installed and implemented a SPAM filter in 2008 to capture unwanted mail before it gets to your email inbox.
Borderware MXtreme. Secure Email Gateway QuickStart Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved
Borderware MXtreme Secure Email Gateway QuickStart Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview MXtreme is a hardened appliance with a highly robust
Icebox - Sendio SPAM Filter
Icebox - Sendio SPAM Filter Sendio Icebox The Navajo Department of Information Technology (DIT) installed and implemented a SPAM filter in 2008 to capture unwanted mail before it gets to your email inbox.
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Steps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
How to Logon with Domain Credentials to a Server in a Workgroup
How to Logon with Domain Credentials to a Server in a Workgroup Johan Loos [email protected] Version 1.0 Authentication Overview Basically when you logon to a Windows Server you can logon locally using
Configuring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
CYAN SECURE WEB HOWTO. NTLM Authentication
CYAN SECURE WEB HOWTO June 2008 Applies to: CYAN Secure Web 1.4 and above NTLM helps to transparently synchronize user names and passwords of an Active Directory Domain and use them for authentication.
PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents
1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2013 for Windows... 3 Outlook for Mac 2011... 4 Mac OS X 10.6+... 4 iphone
Configuring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] User Identification Overview User Identification allows you to create security policies based
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
How does the Excalibur Technology SPAM & Virus Protection System work?
How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being
CipherMail Gateway Quick Setup Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members
AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members Last updated: 27/06/2014 Contents 1 Introduction... 2 1.1 What is ARMS?... 2 1.2 Glossary Terms... 2 2 Setting up your ARMS configuration
Set Up E-mail Setup with Microsoft Outlook 2007 using POP3
Page 1 of 14 Help Center Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Learn how to configure Outlook 2007 for use with your 1&1 e-mail account using POP3. Before you begin, you will need
Plesk for Windows Copyright Notice
2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.
Configuring MDaemon for Centralized Spam Blocking and Filtering
Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 (817) 525-2005 http://www.altn.com July 26, 2004 Contents A Centralized
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Basic Exchange Setup Guide
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0
AXIGEN Mail Server Quick Installation and Configuration Guide Product version: 6.1 Document version: 1.0 Last Updated on: May 28, 2008 Chapter 1: Introduction... 3 Welcome... 3 Purpose of this document...
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Pentagon Message Exchange Setup Guide: All Devices
Pentagon Message Exchange Setup Guide: All Devices This guide has been sent to you to help you set up Pentagon Message Exchange on your equipment. In this guide, you will find the details required for
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Enterprise Toolbar User s Guide. Revised March 2015
Revised March 2015 Copyright Notice Trademarks Copyright 2007 DSCI, LLC All rights reserved. Any technical documentation that is made available by DSCI, LLC is proprietary and confidential and is considered
GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
