McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Size: px
Start display at page:

Download "McAfee Security for Lotus Domino, v7.5 (Windows) User Guide"

Transcription

1 McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

2 COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. License Attributions Refer to the product Release Notes. 2

3 Contents Introducing McAfee Security for Lotus Domino How McAfee Security for Lotus Domino works How McAfee Security protects Lotus Domino Features of McAfee Security for Lotus Domino Other areas to protect Content management concepts Threats to your organization Policies to handle threats Installing McAfee Security for Lotus Domino Methods of Installation What's Included with the Software System Requirements Components installed by McAfee Security for Lotus Domino Installing McAfee Security for Lotus Domino Standard Installation Silent Installation Upgrading to McAfee Security for Lotus Domino Accessing the McAfee Security for Lotus Domino user interface Protecting the Domino server partitions Protecting the Domino server partitions using Protection Manager Protecting the Domino server partitions using Referenced method Testing your McAfee Security for Lotus Domino installation Testing the anti-virus component Testing the anti-spam component Activation tasks Activating McAfee Security for Lotus Domino (Evaluation version) Activating McAfee Anti-Spam Add-on component (Evaluation version) Post-installation tasks and maintenance Modifying the McAfee Security for Lotus Domino installation Repairing the McAfee Security for Lotus Domino installation Restoring original out-of-box configuration

4 Contents Uninstalling McAfee Security for Lotus Domino Uninstalling the McAfee Anti-Spam add-on component Uninstalling McAfee Security for Lotus Domino Using the McAfee Security for Lotus Domino user interface Dashboards and how they work Statistical information of detected items On-Demand scan and its views Status Reports Configuration Reports Graphical Reports Detected Items What are the detected items? Viewing detected items Search filters View results Policy Manager Inheritance and advanced views Subpolicies Setting policies Core scanners and filters Alert settings and disclaimer text Creating a new alert Quarantine scanning Shared Resources Settings and Diagnostics Server Specific Settings Detected Items settings User Interface Preferences Diagnostics Product Log Import and Export Configuration Site List Editor Integrating with epolicy Orchestrator Prerequisites Installing McAfee Security for Lotus Domino using epolicy Orchestrator Creating a new site Adding a computer to the site

5 Contents Adding Package files to the Repository Adding Software NAP file to the Repository Adding Reports NAP file to the Repository Deploying McAfee Security for Lotus Domino Activation task using epolicy Orchestrator Installing the activation package on client computers Setting policies within epolicy Orchestrator Creating or editing policies Enforcing policies Scheduling tasks Creating an AutoUpdate task Creating an on-demand scan task Creating a server protection task Creating a compaction task Creating a purge task Creating a status report task Creating a configuration report task Configuring reports Uninstallation Removing McAfee Security for Lotus Domino from the client computer Removing McAfee Security for Lotus Domino from epolicy Orchestrator Integrating with epolicy Orchestrator Prerequisites Installing McAfee Security for Lotus Domino using epolicy Orchestrator Activation task using epolicy Orchestrator Installing the activation package on client computers Sending an agent wake-up call Setting policies within epolicy Orchestrator Creating or editing policies Enforcing policies Scheduling tasks Creating an AutoUpdate task Creating an on-demand scan task Creating a server protection task Creating a compaction task Creating a purge task Creating a status report task

6 Contents Creating a configuration report task Configuring reports Uninstallation Removing McAfee Security for Lotus Domino from the client computer Removing McAfee Security for Lotus Domino from epolicy Orchestrator Integrating with epolicy Orchestrator Prerequisites Installing McAfee Security for Lotus Domino using epolicy Orchestrator Activation task using epolicy Orchestrator Installing the activation package on client computers Sending an agent wake-up call Setting policies within epolicy Orchestrator Creating or editing policies Enforcing policies Scheduling tasks Creating an AutoUpdate task Creating an on-demand scan task Creating a server protection task Creating a compaction task Creating a purge task Creating a status report task Creating a configuration report task Configuring reports Uninstallation Removing McAfee Security for Lotus Domino from the client computer Removing McAfee Security for Lotus Domino from epolicy Orchestrator Appendix A Using file filtering rule and actions in a real-time scenario Appendix B Error codes Frequently Asked Questions

7 Introducing McAfee Security for Lotus Domino 7.5 McAfee Security for Lotus Domino 7.5 uses advanced heuristics and protects your IBM Lotus Domino server version 7.x/8.0/8.01/8.02/8.5 from viruses, unwanted content, potentially unwanted programs, and banned file types/messages. It also scans: Subject line and body of the messages attachments (based on file type, file name, and file size) Text within the attachments Additionally, McAfee Security for Lotus Domino includes the McAfee Anti-Spam add-on component that protects your Lotus Domino server from spam and phishing s. Contents How McAfee Security for Lotus Domino works How McAfee Security protects Lotus Domino Features of McAfee Security for Lotus Domino Other areas to protect Content management concepts How McAfee Security for Lotus Domino works The McAfee Security for Lotus Domino software integrates with your Lotus Domino server 8.5 and works in real-time to detect and delete virus or other harmful/unwanted code. It also helps you maintain a virus-free environment by scanning the databases on your Lotus Domino server. Each time, an message is sent to or received from a source, McAfee Security for Lotus Domino scans the message comparing it with a list of known viruses and suspected virus-like behavior and intercepts/cleans the infected file before it spreads. It can also scan content within the message (and its attachments) using rules and policies defined in the software. The anti-spam, anti-virus, and the content management engines scan the messages and provide the result to McAfee Security for Lotus Domino 7.5 before being written to the file system or read by the Lotus Domino users. The anti-virus and the anti-spam scanning engines compare the message with all the known signatures stored in the currently installed virus definition files (DATs) and anti-spam rules. The anti-virus engine also checks the message using selected heuristic detection methods. The content management engine scans the message for banned content as specified in the content management policies running within the software. If there are no viruses, banned/unwanted content in the message, McAfee Security for Lotus Domino passes the 7

8 Introducing McAfee Security for Lotus Domino 7.5 How McAfee Security protects Lotus Domino information back to IBM Lotus Domino 8.5. In case of a detection, McAfee Security for Lotus Domino takes actions as defined within its configuration settings. How scanning works Central to your McAfee Security for Lotus Domino 7.5 software are the McAfee Security scanning engine and the DAT files. The engine is a complex data analyzer. The DAT files contain a great deal of information including thousands of different drivers; each of which contains detailed instructions on how to identify a virus or a type of virus. The scanning engine works with the DAT files. It identifies the type of the item being scanned and decodes the content of that object to understand what the item is. It then uses the information in the DAT files to search and locate known viruses. Each virus has a distinctive signature. There is a sequence of characters unique to a virus and the engine searches for that signature. The engine uses a technique called heuristic analysis to search for unknown viruses. This involves analyzing the object's program code and searching for distinctive features typically found in viruses. Once the engine has confirmed the identity of a virus, it cleans the object to the extent possible. For example, it removes an infected macro from an attachment or deletes the virus code in an executable file. What and when to scan? The threat from viruses can come from many directions such as infected macros, shared program files, files shared across a network, messages and attachments, floppy disks, files downloaded from the Internet, and so on. Individual McAfee Security anti-virus software products target specific areas of vulnerability. We recommend a multi-tiered approach to provide full range of virus detection, security, and cleaning capability that you require. McAfee Security for Lotus Domino provides a range of options that you can further configure according to the demands of your system. These demands depend on when and how the component parts of your system operate and how they interact with each other and with the outside world, particularly through s and Internet access. You can configure or enable various actions that allow you to determine how your McAfee Security for Lotus Domino software should deal with different items and what actions it should take on detected or suspicious items. How McAfee Security protects Lotus Domino IBM Lotus Domino enables your organization to communicate electronically through s, organize and manage information, arrange meetings, and enable collaboration among team members. However, any system that is designed to create, transmit, store, and open messages can be vulnerable to virus attacks. This is true if the message originates from a network outside the organization. Protecting IBM Lotus Domino server McAfee Security for Lotus Domino uses the virus scanning interface of your Lotus Domino server to gain full access to all messages that are being read from, and written to the mailbox by Lotus Domino. The anti-virus scanning engine compares the message with all the known virus signatures stored in the DATs. The content management engine scans the message for banned content as specified in the content management policies in McAfee Security for Lotus Domino. 8

9 Introducing McAfee Security for Lotus Domino 7.5 Features of McAfee Security for Lotus Domino If these checks find any virus or banned content within the message, McAfee Security for Lotus Domino takes the specified action. If no items are detected, McAfee Security for Lotus Domino passes the information back to the virus-scanning interface for completing the original message request within Lotus Domino. Features of McAfee Security for Lotus Domino Main features of McAfee Security for Lotus Domino include: Protection from virus McAfee Security for Lotus Domino scans all messages for viruses and protects your Lotus Domino server by intercepting/cleaning/deleting the viruses. It uses advanced heuristic methods and identifies unknown viruses or suspected virus-like items and blocks them. Protection from spam Spam is increasingly becoming an issue within the workplace. It consumes system resources by taking up bandwidth and storage space within your corporate systems and distracts employees from performing their key job functions, by making them deal with the unwanted message(s) within their mailboxes. McAfee Security for Lotus Domino helps you save bandwidth and the storage space required by your Lotus Domino servers by assigning spam score to each message during scanning and by taking the configured action on those messages. Protection from phish McAfee Security for Lotus Domino is capable of detecting phishing s that fraudulently tries to obtain your personal information. Typically such messages may request recipients to click on a link in the to verify or update contact details, credit card details, or other personal information. Capability to detect packers and potentially unwanted programs McAfee Security for Lotus Domino is capable of detecting packers that compresses and encrypts the original code of an executable file. It also detects potentially unwanted programs (PUPs) that are software programs written by legitimate companies to alter the security state or privacy posture of a computer. Content filtering McAfee Security for Lotus Domino scans content/text in the: Subject line of the message Body of the message attachment File filtering McAfee Security for Lotus Domino scans an attachment depending on the file name, file type, and the file size of the attachment. It also filters files with the encrypted, corrupted, password-protected, and digitally signed content. Different installation methods McAfee Security for Lotus Domino supports standard (graphical user interface), console, and silent (command-line) installation. Access control mechanism Using the access control mechanism, you can allow selected users to accessing the McAfee Security for Lotus Domino user interface. Modifying the installer settings You can modify the installer settings by modifying the silent.ini plain text file. Integration with McAfee epolicy Orchestrator 3.6.1, 4.0 or 4.5 McAfee Security for Lotus Domino integrates with McAfee epolicy Orchestrator 3.6.1, 4.0 or 4.5 to provide a centralized method for rolling out, administering, and updating the McAfee Security for Lotus Domino software across your Lotus Domino servers. The ability to centrally manage an 9

10 Introducing McAfee Security for Lotus Domino 7.5 Features of McAfee Security for Lotus Domino organization-wide implementation of the McAfee Security for Lotus Domino software reduces the time required to administer and update various systems. Web-based user interface McAfee Security for Lotus Domino provides a user-friendly web-based interface based on DHTML. Policy Management The Policy Manager menu option in the product user interface lists different policies you can set up/manage in McAfee Security for Lotus Domino. You can specify various policies/actions that determine how different types of threats are treated when detected. Centralized scanner, filter rules, and enhanced alert settings Using scanners, you can configure settings of your scanner that a policy can apply when scanning items. Using File Filtering rules, you can set up rules that apply to a file name, file type, and file size. You can use the alert editor to customize the text of an alert message using the Style, Font, Size, and Token menus. On-demand/time-based scanning and actions McAfee Security for Lotus Domino enables you to scan messages at convenient times or at regular intervals. You can schedule regular scan operations when the server activities are comparatively low and/or when they do not interfere with your work. Multipurpose Internet Mail Extensions (MIME) scanning A communications standard that enables you to transfer non-ascii formats over protocols (such as SMTP) that support only 7-bit ASCII characters. McAfee Security for Lotus Domino enables you to specify how such MIME messages are handled. Quarantine Management: Quarantining messages to a local database You can specify the local database to be used as a repository for quarantining infected messages. You can also configure maintenance settings for the local quarantine database. Quarantining messages to McAfee Quarantine Manager version 6.0 You can specify McAfee Quarantine Manager in a different server as a repository for quarantining infected messages. Support for blacklisting and whitelisting users Global, group, and user-level blacklist and whitelist is supported through McAfee Quarantine Manager. Auto-update of virus definitions (V2API DATs), extradats, anti-virus and anti-spam engine McAfee Security regularly provides updated DAT files, anti-virus scanning engine, and anti-spam engine to detect and clean the latest threats. Support for Site List editor Using Site List editor, you can specify a location from where the automatic updates must be downloaded for McAfee Security for Lotus Domino. Support for Protection Manager Using Protection Manager, you can select the Lotus Domino servers that you want the software to protect or unprotect. Detection reports McAfee Security for Lotus Domino generates status reports and graphical reports that enable you to view information about the detected items. Configuration reports You can specify a time when your server should send the configuration reports to the administrator or the recipient . The configuration report will have a summary of product configurations such as: server information, version information, license status and type, product information, debug logging information, on-access settings, on-access policies, and gateway policies. Support for customized notification s and disclaimers You can customize the notification settings and disclaimers for internal and external messages. 10

11 Introducing McAfee Security for Lotus Domino 7.5 Other areas to protect Denial-of-service attacks detection McAfee Security for Lotus Domino detects additional requests or attacks flooding and interrupting the regular traffic on a network. A denial-of-service attack overwhelms its target with false connection requests, so that the target ignores legitimate requests. Features unavailable The McAfee Security for Lotus Domino software does not include the following features: Co-existence with any third party anti-virus software Other areas to protect Virus creators are always looking for new ways of getting past your anti-virus solution. Protecting just your corporate systems cannot protect your system against virus because it can be transferred through the Internet, from computer to computer within your network, an infected CD or disk, a handheld device, or any other device that can transfer files to a computer and download files to it. So we provide a multi-tiered approach to the detection of viruses to protect your file servers and desktop computers. By holding information on more than 270,700 known viruses, our McAfee anti-virus solutions detect and neutralize most viruses as soon as they enter your network. If a new virus attacks, the anti-virus system can use other methods to identify virus-like behavior providing another barrier to the new virus attempting to attack your system. As illustrated, McAfee Security products can protect the following key areas of your network as part of your integrated virus defense solution: Internet gateway protection McAfee and Web Security Appliances (formerly known as McAfee WebShield) Document repository protection McAfee Security for Microsoft SharePoint (formerly known as McAfee PortalShield) Desktop and file server protection McAfee VirusScan Enterprise Management solution McAfee epolicy Orchestrator 11

12 Introducing McAfee Security for Lotus Domino 7.5 Other areas to protect Internet gateway protection McAfee and Web Security Appliances Today, the major source of virus threat to your corporate network is from Internet; through messages or websites, which might contain potentially harmful code. The McAfee and Web Security Appliances product protects the gateway between your internal networks and the Internet. By scanning all inbound and outbound traffic between your network and the Internet, it stops viruses and other unwanted/harmful programs from entering your network through the Internet. By stopping viruses before they attack computers within your network, McAfee and Web Security Appliances prevents the damage and down-time that the attack can cause, saving your organization the costs associated with the down-time and lost/corrupted data. Desktop and file server protection McAfee VirusScan Enterprise Not all viruses are transmitted via messages. Many can be spread by reading from physical media, such as diskettes or CDs. Others spread through network shares by copying themselves from one computer to another across your network. From the viewpoint of somebody trying to attack your corporate network, your file servers are a good target. Because many other computers connect to each of your file servers, infecting the file server is more likely to have serious consequences than infecting a single desktop computer. The VirusScan products protect desktop computers and file servers within your network. As a part of your integrated response to virus threats, VirusScan can be viewed as your last line of defense, protecting each desktop computer and file server from viruses that might spread using network shares or physical media. VirusScan is available in versions to protect Microsoft Windows and Unix computers, as well as all the leading wireless devices that might connect to your PCs and network. McAfee Security for Mac (formerly known as Virex or VirusScan for Mac) protects Apple Macintosh computers. Document repository protection McAfee Security for Microsoft SharePoint Using computers within the corporate environment has made it easy to create documents that might contain critical information. However, because of the ease with which documents can be created and the multiple storage places on the network, it is often difficult to locate the required information when needed. To address this issue, several software vendors produce portal servers to store, index, and control your critical documents in a way that enables them to be easily located when needed. Because these portal servers are set up to store your critical information, it is important to protect this information. McAfee Security for Microsoft SharePoint is currently available to protect Microsoft SharePoint Portal Server 2003, Microsoft SharePoint Portal Server 2007, Microsoft Windows SharePoint Services 2.0, and Microsoft Windows SharePoint Services 3.0. McAfee Security for Microsoft SharePoint integrates with the stores of these products to provide scanning of documents each time they are accessed or saved to the store. When the server activities are comparatively low, it also scans the entire portal to verify that no infected documents are held within the store. Management solution McAfee epolicy Orchestrator It is imperative that companies manage their anti-virus solution with tools that deliver an effective means of keeping the anti-virus software up-to-date, manage and enforce anti-virus 12

13 Introducing McAfee Security for Lotus Domino 7.5 Content management concepts configurations across systems and servers comprehensively, are flexible to scale the solution according to ever-changing business needs, and have an up-to-date visibility into the stability of your anti-virus solution. Using McAfee epolicy Orchestrator, you can update all your McAfee software solutions across your network with the latest virus definition (DAT) files, anti-virus, anti-spam, and content management engines from a single node, ensuring that suitable policies are in place to deal with any threats to your network. Content management concepts McAfee Security for Lotus Domino uses the McAfee security content management engine within its architecture. In the electronic world of commerce, your organization is vulnerable to many threats that can affect the reputation of an organization, employees, computers, and networks. The reputation of an organization can be affected by the loss of confidential information or through an abuse that can lead to legal action. Various electronic distractions and unrestricted use of and Internet can affect the productivity of employees. Viruses and other potentially unwanted software can damage computers making them unusable. Uncontrolled use of various types of files on your networks can cause performance problems for your entire organization. Threats to your organization Type of threat Reputation of a company Spam (unsolicited ) Large messages Mass-mailer viruses messages from undesired sources Description An unguarded or ill-informed remark by an employee might cause legal problems, unless it is covered by a disclaimer. Unsolicited commercial messages are the electronic equivalent of spam/junk s. Often they contain advertisements that are not expected by the recipients. Such s are often sent in hundreds or thousands. Unless the recipient is already a customer or has asked for the information, the message is usually unwelcome. Other types of unsolicited messages include political messages, virus hoaxes, poetry, jokes, and chain letters. Although it is more of a nuisance than a threat, spam can degrade the performance of your network. messages of large size or numerous attachments can slow the performance of servers. The overall message size and the number of attachments that users can send and receive must be controlled. Although they can be cleaned like any other virus, they can spread rapidly and quickly degrade the performance of your network. Disgruntled ex-employees and unscrupulous traders who know the addresses of your employees can cause distress and distraction. 13

14 Introducing McAfee Security for Lotus Domino 7.5 Content management concepts Type of threat Non-business use of Loss of company-confidential information Offensive language Transfer of "entertainment" files Inefficient file types Transfer of large files Denial-of-service attack Pornographic text Viruses and other potentially unwanted software Corrupt content / encrypted content Description If most employees use s that are not within their organization, such s are likely to be for personal/non-business use. This can happen if someone sends a message or document that contains details of unreleased products, a document that is marked as confidential, or a file such as a database of customer details. Offensive words and phrases can appear in messages sent, received, and in attachments. Besides causing offense, they can even provoke legal action. Video files like MPEG and audio files like MP3 are often intended for entertainment only and not for business use. Their large sizes might also slow your network performance. Some executables (.EXE and.com files) might be games or illegally copied software. Some files use huge memory and can be slow to transfer, but alternatives are often available. For example, GIF and JPEG files are much smaller than their equivalent BMP files. PDF files are smaller than their equivalent PostScript files. The transfer of large files can slow the performance of your network. Such transfers must be limited to certain groups of people. A deliberate surge of large files can seriously affect the performance of your network, making it unusable to its legitimate users. Usage of offensive and unpleasant terms must be avoided. Viruses and other potentially unwanted software can quickly make computers and data unusable. This type of content cannot be scanned. Hence appropriate policies must be specified to handle it. Policies to handle threats McAfee Security for Lotus Domino helps you control the electronic threats with special sets of rules and settings called policies that you can create to suit your organization. You can apply an existing read-only policy (known as a Master policy) to your entire organization or create other policies based on the Master policy to suit the specific needs of any part of your organization. Default policies When first installed, McAfee Security for Lotus Domino contains the following default policies: External Mails Internal Mails Database On-Demand (Remove Viruses) On-Demand (Remove Banned Content) On-Demand (Full Scan) 14

15 Introducing McAfee Security for Lotus Domino 7.5 Content management concepts Quarantine Scan You can customize these policies to handle threats to your organization precisely. To learn more about setting policies, see the Policy Manager section. What is a Master Policy? By default, McAfee Security for Lotus Domino has seven Master policies mentioned in the Default policies section. These Master policies describe how items are scanned for viruses, how files are filtered, and various other settings in different circumstances. These policies can apply to the whole organization. From these policies, you can create further policies as required to apply to groups of users or domains. As you create further policies, each one records whether any of its current settings are inherited from the Master policy. A change to the Master policy (such as an increased level of anti-virus protection or a new file filtering rule) is instantly propagated to other policies too. The Master policy also indicates how many other policies have inherited its settings. Where does a policy apply? The Master policy applies to all users within an organization. However, you can create further policies in case you need exceptions to the Master policy to suit any geographical areas, functions, mailboxes, domains, or departments within your organization. In McAfee Security for Lotus Domino, the general term for any such part is a policy group. 15

16 Installing McAfee Security for Lotus Domino This chapter describes the process of installing McAfee Security for Lotus Domino, version 7.5 on Windows. McAfee Security for Lotus Domino can be installed either through a standard installation or silent installation. Contents Methods of Installation What's Included with the Software System Requirements Installing McAfee Security for Lotus Domino Protecting the Domino server partitions Testing your McAfee Security for Lotus Domino installation Activation tasks Post-installation tasks and maintenance Uninstalling McAfee Security for Lotus Domino Methods of Installation McAfee Security for Lotus Domino can be installed using any of the following methods to protect one or more Lotus Domino servers: Standard (or standalone) installation Standard installation includes installing the McAfee Security for Lotus Domino software by running the user interface installer. During standard installation, a wizard appears leading the installation process through a series of instructions you must follow. Silent installation (or command-line installation) This method of installation involves installing McAfee Security for Lotus Domino locally on a computer without the need for user intervention. It is used for automated installation purposes. In this case, you can set/modify the installer properties either by editing the silent.ini file or by passing the properties directly to the installer using the command line. For modifying the installer using the silent.ini file, see the Modifying the installer settings section. What's Included with the Software McAfee Security for Lotus Domino has the following components in its installer: McAfee Security for Lotus Domino 16

17 Installing McAfee Security for Lotus Domino System Requirements McAfee Anti-Spam for Lotus Domino (Evaluation) Entercept support via VirusScan During installation, the McAfee Security for Lotus Domino and the Anti-Spam add-on component is selected by default. What's included in the package The folders available in the McAfee Security for Lotus Domino download package are: SetUp Contains the setup.exe file which is required for the standard installation and silent.bat batch file to execute the silent installation. GSDomino Contains the installer files for the McAfee Security for Lotus Domino software and the silent.ini file which is required for silent installation. AntiSpam Contains the AntiSpamEval.exe file which is required to install the McAfee Anti-Spam add-on component. Readme Contains the Readme.txt file. Manuals Contains this PDF file. epo Contains the product deployment packages and extensions for McAfee Security for Lotus Domino software that is to be used in the epolicy Orchestrator server. VCReditX64 Contains the Microsoft Visual C Redistributable Package (x64) file, which installs runtime components of Visual C++ Libraries required to run 64-bit applications developed with Visual C++ on a computer that does not have Visual C installed. This file is designed for the supported 64-bit operating system. System Requirements Table 1: System Requirements Item Requirements Operating system Microsoft Windows 2003 Server (32-bit/64-bit) Microsoft Windows 2008 Server (32-bit/64-bit) Lotus Domino server Processor Memory Disk space Disk swap space Network IBM Lotus Domino version 7.x, 8.0, 8.01, 8.02, or 8.5 Intel Pentium or higher and compatibles (32-bit and 64-bit chips as appropriate) Minimum: 1 GB RAM (Recommended: 2 GB RAM) Minimum: 700 MB Twice the available physical RAM 10/100/1000Mbps Ethernet card Web browser Microsoft Internet Explorer 6.0, 7.0 or 8.0 Firefox 2.0 or later Display Supported McAfee Management software (if using any) 1024 x 768 McAfee epolicy Orchestrator version McAfee epolicy Orchestrator version 4.0 McAfee epolicy Orchestrator version

18 Installing McAfee Security for Lotus Domino Components installed by McAfee Security for Lotus Domino Components installed by McAfee Security for Lotus Domino McAfee Security for Lotus Domino installs a number of components onto your Lotus Domino server, including databases and tasks. NOTE: Windows services run continuously for scanning activities, PostGres SQL database, and driver manager quarantine activities. Add-in tasks on the Lotus Domino server McAfeeAddinMgr Loads Mailbox and Database scanner Notes.ini entries: Servers=McAfeeAddInMgr ExtMgr_Addins=McAfeeEM NOTE: McAfeeAddinMgr task does not load when domino partition is not protected. McAfee Security for Lotus Domino configuration files McAfee Security for Lotus Domino applications are stored in its program directory instead of Lotus Domino program directory. Product configuration is stored in.xml files. Product configuration is stored in McAfeeConfig.XML and cs_rules_xx.xml (xx evaluated to letter acronym for the language used; for english cs_rules_en.xml). The database used is McAfeeConfig.NSF which stores these XMLs to be replicated between hosts participating in reference setup. Each time you update McAfee Security for Lotus Domino configuration, the.xml file gets updated accordingly. NOTE: McAfeeConfig.NSF database replication updates the configuration changes on the reference servers in the McAfee Security for Lotus Domino reference setups. McAfee Security for Lotus Domino components McAfee Anti-Spam for Lotus Domino (Evaluation) add-on component provides spam and phish detection capabilities. Entercept support via VirusScan provides buffer overflow protection through host intrusion prevention using McAfee VirusScan v8.5i. Additional McAfee components McAfee Error Reporting Service is an error reporting utility that is specifically designed to track and log failures in the McAfee software on your system. The information obtained can be used to analyze problems. This error reporting software monitors the McAfee applications on your system and prompts the user when it detects a problem. It collects data only from the computer on which it is installed, and its operation is controlled from this computer. You can submit the data it collects to McAfee technical support to assist in the opening of a support case. NOTE: To use the error reporting software, you must have a web browser that is Java Script-enabled, such as Microsoft Internet Explorer 4.0 and later. McAfee Agent version 3.6, 4.0 or 4.5 is a component distributed with epolicy Orchestrator that must be installed on each system in your network that you want to manage. SuperAgents are agents that have been enabled to distribute broadcast wakeup calls. SuperAgents can 18

19 Installing McAfee Security for Lotus Domino Installing McAfee Security for Lotus Domino also be used as repositories to distribute products and product updates. The agent collects and sends information among the server, update repositories, managed systems, and products. Systems cannot be managed without installing agent. Installing McAfee Security for Lotus Domino You can install McAfee Security for Lotus Domino using any of the following methods: s Standard Installation Silent Installation Standard Installation Standard installation includes installing the McAfee Security for Lotus Domino software by running the user interface installer. During standard installation, a wizard appears leading the installation process through a series of instructions you must follow. 1 Using an administrative account, log on to the server running Lotus Domino. 2 QUIT the Lotus Domino server. 3 Create a temporary directory on your local drive. 4 To install, do one of the following depending on how you obtained the software: Insert the CD into the computer's drive and copy the installation files into the temporary directory you created. Download the MSDW75ENL.ZIP (for licensed version) or MSDW75ENE.ZIP ( for evaluation version) archive and extract it to a temporary directory. 19

20 Installing McAfee Security for Lotus Domino Installing McAfee Security for Lotus Domino 5 Using Windows Explorer, navigate to the folder where you copied the installation files and from the Setup folder, double-click setup.exe. The Welcome to McAfee Security for Lotus Domino installation dialog box appears. Figure 1: McAfee Security for Lotus Domino Welcome 6 Click Next. The Component selection dialog box appears, with the list of software components you can install. Figure 2: McAfee Security for Lotus Domino Component selection McAfee Security for Lotus Domino Installs the McAfee Security for Lotus Domino, version 7.5 software. 20

21 Installing McAfee Security for Lotus Domino Installing McAfee Security for Lotus Domino McAfee Anti-Spam for Lotus Domino (Evaluation) Installs the evaluation version of anti-spam add-on component for McAfee Security for Lotus Domino, v7.5 software. The Anti-spam and Antiphish feature is only available if you install McAfee Anti-Spam for Lotus Domino during installation. McAfee Anti-Spam for Lotus Domino add-on requires activation to enable it to work in licensed mode. Entercept support via VirusScan Provides buffer overflow protection through host intrusion prevention using McAfee VirusScan. 7 Select the software component you want to install and click Next. The McAfee End User License Agreement dialog box appears. Figure 3: McAfee Security for Lotus Domino McAfee End User License Agreement 8 Select the License expiry type and Select location where purchased and used from the drop-down list. 21

22 Installing McAfee Security for Lotus Domino Installing McAfee Security for Lotus Domino 9 Select I accept the terms in the license agreement, then click OK. The Welcome to McAfee Security for Lotus Domino Installation Wizard dialog box appears. Figure 4: McAfee Security for Lotus Domino Welcome to McAfee Security for Lotus Domino Installation Wizard 10 Click Next. The Destination Folder dialog box appears. Figure 5: McAfee Security for Lotus Domino Destination Folder 22

23 Installing McAfee Security for Lotus Domino Installing McAfee Security for Lotus Domino 11 Click Browse to select a different folder or click Next to install the software in the default directory. The Select Features dialog box appears. Figure 6: McAfee Security for Lotus Domino Select Features Server Installs McAfee Security for Lotus Domino server components. These components consists of framework libraries and server side functionalities. UI Installs user interface related files. Standalone UI Installs McAfee Security for Lotus Domino in a standalone mode on the host computer. This feature is selected by default. Web UI Installs McAfee Security for Lotus Domino Web user interface feature. Select this feature, if you want to administer McAfee Security for Lotus Domino using a web browser. This feature is not installed by default. NOTE: Click Disk Cost to view the available disk space on different volumes of your computer to install the selected features. Volumes that do not have adequate disk space are highlighted. 23

24 Installing McAfee Security for Lotus Domino Installing McAfee Security for Lotus Domino 12 Select WebUI, if you want to manage McAfee Security for Lotus Domino using a web browser and click Next. The WebUI Configuration feature dialog box appears. Figure 7: McAfee Security for Lotus Domino WebUI Configuration feature 13 Select On IIS Server or On Domino HTTP to configure WebUI feature. NOTE: You need to specify the domino partition if you select On Domino HTTP option. Domino HTTP task must be running, for you to administer McAfee Security for Lotus Domino using a web browser. 24

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Total Protection Service

Total Protection Service User Help McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software

Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying

More information

Product Guide. McAfee Security for Microsoft Exchange 8.0.0

Product Guide. McAfee Security for Microsoft Exchange 8.0.0 Product Guide McAfee Security for Microsoft Exchange 8.0.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Security for Microsoft SharePoint 2.5.0 User Guide

McAfee Security for Microsoft SharePoint 2.5.0 User Guide McAfee Security for Microsoft SharePoint 2.5.0 User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

McAfee Email Gateway 7.x Encryption and IronPort Integration Guide

McAfee Email Gateway 7.x Encryption and IronPort Integration Guide Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Product Guide. McAfee Security for Microsoft Exchange 8.5.0

Product Guide. McAfee Security for Microsoft Exchange 8.5.0 Product Guide McAfee Security for Microsoft Exchange 8.5.0 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Best Practices Guide. McAfee Security for Microsoft Exchange 7.6.0 Software

Best Practices Guide. McAfee Security for Microsoft Exchange 7.6.0 Software Best Practices Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee Optimized Virtual Environments for Servers. Installation Guide McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

Anti-Spyware Enterprise Module software

Anti-Spyware Enterprise Module software Anti-Spyware Enterprise Module software version 8.0 Guide What is the Anti-Spyware Enterprise Module? The McAfee Anti-Spyware Enterprise Module is an add-on to the VirusScan Enterprise 8.0i product that

More information

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Product Guide. McAfee Security for Microsoft SharePoint 3.0.0

Product Guide. McAfee Security for Microsoft SharePoint 3.0.0 Product Guide McAfee Security for Microsoft SharePoint 3.0.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Verizon Internet Security Suite Powered by McAfee User Guide

Verizon Internet Security Suite Powered by McAfee User Guide Verizon Internet Security Suite Powered by McAfee User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

McAfee Total Protection Service Installation Guide

McAfee Total Protection Service Installation Guide McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Release Notes for McAfee VirusScan Enterprise for Storage 1.0

Release Notes for McAfee VirusScan Enterprise for Storage 1.0 Release Notes for McAfee VirusScan Enterprise for Storage 1.0 About this document New features Known issues Where to find McAfee enterprise product information License attributions About this document

More information

McAfee Risk Advisor 2.7

McAfee Risk Advisor 2.7 Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

epolicy Orchestrator Log Files

epolicy Orchestrator Log Files Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Release Notes for McAfee epolicy Orchestrator 4.5

Release Notes for McAfee epolicy Orchestrator 4.5 Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator

More information

McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices

McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service

Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service Application Note Configuring McAfee Firewall Enterprise for McAfee Web Protection Service This document explains how to configure McAfee Firewall Enterprise (Sidewinder ) to redirect all web traffic to

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Solidcore Change Reconciliation and Ticket-based Enforcement

McAfee Solidcore Change Reconciliation and Ticket-based Enforcement Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

McAfee VirusScan Enterprise 8.8 software Product Guide

McAfee VirusScan Enterprise 8.8 software Product Guide McAfee VirusScan Enterprise 8.8 software Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

McAfee Agent Handler

McAfee Agent Handler McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into

More information

Implementing McAfee Device Control Security

Implementing McAfee Device Control Security Implementing McAfee Device Control Security COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS

Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS Release Notes for McAfee(R) GroupShield(TM) version 7.0.1 Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS - About this Document - About this Release - Purpose

More information

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0 Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

McAfee VirusScan Enterprise for Storage 1.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x

McAfee VirusScan Enterprise for Storage 1.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x McAfee VirusScan Enterprise for Storage.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x COPYRIGHT Copyright 200 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

McAfee Solidcore 5.1.0 Product Guide

McAfee Solidcore 5.1.0 Product Guide McAfee Solidcore 5.1.0 Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or

More information

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work

More information

Product Guide. McAfee SaaS Endpoint Protection 5.2.0

Product Guide. McAfee SaaS Endpoint Protection 5.2.0 Product Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Release Notes for Host Intrusion Prevention 8.0

Release Notes for Host Intrusion Prevention 8.0 Release Notes for Host Intrusion Prevention 8.0 About this document New features Known issues Finding product documentation About this document Thank you for choosing this McAfee product. This document

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software

Product Guide. McAfee epolicy Orchestrator 4.6.0 Software Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software

Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

McAfee VirusScan and epolicy Orchestrator Administration Course

McAfee VirusScan and epolicy Orchestrator Administration Course McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software

Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0 Best Practices Guide McAfee Endpoint Protection for Mac 1.1.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0

Product Guide. McAfee Endpoint Security for Mac Threat Prevention 10.1.0 Product Guide McAfee Endpoint Security for Mac Threat Prevention 10.1.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

For a list of supported environments for VirusScan Enterprise 8.7i on Microsoft Windows, see (McAfee) KnowledgeBase article KB51111.

For a list of supported environments for VirusScan Enterprise 8.7i on Microsoft Windows, see (McAfee) KnowledgeBase article KB51111. McAfee VirusScan Enterprise 8.7i Repost Patch 5 Release Notes Thank you for using McAfee software. This document contains important information about the current release. We strongly recommend that you

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

PGP Universal Satellite Version 2.7 for Windows Release Notes

PGP Universal Satellite Version 2.7 for Windows Release Notes PGP Universal Satellite Version 2.7 for Windows Release Notes Thank you for using this PGP Corporation product. These Release Notes contain important information regarding this release of PGP Universal

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee VirusScan Enterprise 8.8 software Installation Guide

McAfee VirusScan Enterprise 8.8 software Installation Guide McAfee VirusScan Enterprise 8.8 software Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

McAfee Security for Microsoft SharePoint 3.5.0

McAfee Security for Microsoft SharePoint 3.5.0 Product Guide McAfee Security for Microsoft SharePoint 3.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

McAfee GTI Proxy 1.0.0 Administration Guide

McAfee GTI Proxy 1.0.0 Administration Guide McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

McAfee Certified Product Specialist McAfee epolicy Orchestrator

McAfee Certified Product Specialist McAfee epolicy Orchestrator McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives

More information

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved.

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved. Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version 1.9.0 Copyright (C) 2014 McAfee, Inc. All Rights Reserved. Release date: August 28, 2014 This build was developed and tested on: -

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

Sophos for Microsoft SharePoint Help. Product version: 2.0

Sophos for Microsoft SharePoint Help. Product version: 2.0 Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee epolicy Orchestrator

McAfee epolicy Orchestrator Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide Avira Small Business Security Suite Avira Endpoint Security Quick Guide Table of Contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode...3 2.2 Scope of services...3 2.3 Optimum protection.

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

Total Protection for Enterprise-Advanced

Total Protection for Enterprise-Advanced System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)

More information

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions. PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

SPAMfighter Mail Gateway

SPAMfighter Mail Gateway SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4

More information

Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise

Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise Application Note Configuring Department of Defense Common Access Card Authentication on McAfee Firewall Enterprise McAfee Firewall Enterprise version 7.x and 8.x This application note describes how to

More information

Recommended Recommended for all environments. Apply this update at the earliest convenience.

Recommended Recommended for all environments. Apply this update at the earliest convenience. Release Notes McAfee Enterprise Mobility Management 11.0 Patch 4 About this document About this release Bug fixes and enhancement Installation instructions Files affected by patch Troubleshooting installation

More information

Sophos for Microsoft SharePoint Help

Sophos for Microsoft SharePoint Help Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28

More information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec

More information

Vector Asset Management User Manual

Vector Asset Management User Manual Vector Asset Management User Manual This manual describes how to set up Vector Asset Management 6.0. It describes how to use the: Vector AM Console Vector AM Client Hardware Inventory Software Inventory

More information

ESET SMART SECURITY 6

ESET SMART SECURITY 6 ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment...

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment... Table of Contents Using This Guide... 9 Purpose and Intended Audience... 9 How to Use This Guide... 9 Conventions Used in This Guide... 10 Typographical Conventions... 10 Admonitions... 10 About Ad-Aware

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

User Guide revision 1.0. McAfee GroupShield. version 7.0. For Microsoft Exchange

User Guide revision 1.0. McAfee GroupShield. version 7.0. For Microsoft Exchange McAfee GroupShield version 7.0 For Microsoft Exchange User Guide revision 1.0 COPYRIGHT Copyright 2007 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee SiteAdvisor Enterprise 3.5.0

McAfee SiteAdvisor Enterprise 3.5.0 Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Stellar Phoenix Exchange Server Backup

Stellar Phoenix Exchange Server Backup Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server)

How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server) Avira Small Business Security Suite HowTo Table of Contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode...3 2.2 Scope of services...3 2.3 Optimum protection. Fast updates. Efficient

More information