W H I T E P A P E R : T E C H N I C A L. Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving
|
|
- Matthew Dalton
- 7 years ago
- Views:
Transcription
1 W H I T E P A P E R : T E C H N I C A L Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving Rob Forgione Technical Field Enablement March 2009
2 White Paper: Symantec Technical Contents Purpose... 3 Enterprise Vault Services and Tasks... 4 Exchange Server Security... 5 Enterprise Vault System Mailboxes... 5 Journal Mailboxes... 5 Client Access... 6 Access to items via Outlook... 6 Outlook on Terminal Services and Citrix... 7 Outlook 2003 Script Permissions... 7 Vault Cache security... 8 Accessing items via Enterprise Vault Outlook Web Access (OWA)... 8 Forms based Authentication Enterprise Vault Anonymous Account for OWA Configuring the Enterprise Vault Anonymous user on the Enterprise Vault server OWA 2007 and ISA OWA 2000/2003 and ISA Accessing items via RPC over HTTP Exchange 2007 RPC over HTTP and ISA Exchange 2003 RPC over HTTP and ISA Conclusion If you have any comments on this Whitepaper please EV-TFE-Feedback@Symantec.com
3 Purpose The purpose of this document is to detail how Enterprise Vault: Can securely access data to be archived Provides security surrounding end-user access Provides a means for administrators to securely manage Exchange data This document will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Exchange and Active Directory and provide insight as to how to change some of the settings to be configured in line with organizational preferences. This whitepaper assumes the reader has already read the Security Model for Enterprise Vault 8.0 and SQL server whitepaper and is familiar with the security concepts of Enterprise Vault. The Security Model series consists of: Security Model Enterprise Vault 8.0 and SQL server Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving Enterprise Vault 8.0 Security Model for Lotus Domino Archiving Enterprise Vault 8.0 Security Model for File System Archiving Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving Enterprise Vault 8.0 Security Model for SMTP Archiving Enterprise Vault 8.0 Security Model for Discovery Accelerator 8.0 Enterprise Vault 8.0 Security Model for Compliance Accelerator 8.0 Enterprise Vault 8.0 Security Model for Automatic Classification Engine 8.0 Enterprise Vault 8.0 Security Model for Secure Messaging 8.0 This whitepaper is intended to train the reader the concepts behind Enterprise Vault 8.0 security for Microsoft Exchange servers and users of Microsoft Outlook, Outlook Web Access, and RPC over HTTP. 3
4 Enterprise Vault Services and Tasks Enterprise Vault s Exchange archiving solution uses the following Enterprise Vault Tasks: Exchange Provisioning Task Exchange Mailbox Archiving Task Exchange Journaling Task Exchange Public Folder Task PST Locator Task PST Collector Task PST Migrator Task Exchange archiving tasks are run within the context of the VSA by default. If required, administrators can change the tasks to run under different accounts. This may be useful if they have different Exchange Server environments. However, the chosen account must have the following permissions: Act as part of the operating system Log on locally Log on as a service Replace a process level token 4
5 Exchange Server Security The Vault Service Account (VSA) needs to be able to access mailboxes on the Exchange Servers that Enterprise Vault is to archive. For the optimal security, Full Control permissions should be set explicitly on each Exchange Server that will be archived. If an additional Exchange Server is added to the environment at a later time, this procedure needs to be performed again on the new server to enable access to its mailboxes for the VSA. If desired, to save configuration time, permissions at the Organization or Administrative Group level can be added in the Exchange hierarchy, provided these permissions flow down to the individual Exchange servers. Microsoft Knowledge Base Article describes in more detail how to achieve this. This will enable the permissions to be propagated automatically to any new Exchange Servers added below the level at which the permissions are assigned. The VSA should not be a member of the Domain Administrators group, as Domain Admin accounts, by default, inherit specific Deny permissions which prevent the ability to archive from mailboxes. It is therefore better to assign Exchange Server permissions explicitly. Enterprise Vault System Mailboxes Enterprise Vault System Mailboxes (sometimes referred to as Service Mailboxes) are the primary mailboxes that Enterprise Vault archiving tasks use to establish MAPI connections to the target Exchange servers with. Every Exchange server that hosts mailboxes to be archived requires an EV system mailbox hosted locally on the Exchange server. If an environment has 14 Exchange server targets, the solution will require 14 EV system mailboxes. Each EV system mailbox requires an associated account in AD. This account only requires a mailbox. There are no additional AD or EV permissions needed for this account. Once the EV system mailbox has been created, it is a good idea to either log into windows using the EV system mailbox account or to send a message to the account s mailbox to activate it. This is because Enterprise Vault cannot log into the EV system mailbox until a prior MAPI connection has been established. The EV system mailbox is a dedicated mailbox for MAPI based archiving operations and cannot be enabled for archiving or journaling. It is recommended to keep these mailboxes empty and dedicated for use by Enterprise Vault and no other applications. Exchange Administrators may be tempted to hide the System mailbox from the GAL, however, this will cause EV login to fail thus breaking the archiving mechanism. Journal Mailboxes Journal Mailboxes are used specifically for Exchange to funnel copies of all of the message traffic to and from all journal enabled recipients to a specific mailbox. Enterprise Vault then archives all of these messages into a Journal archive. Organizations should feel free to grant Read permissions to the Journal archive for any accounts they feel should have access to search through all corporate . However, for organizations that take a more strict approach to access, only the Vault Service account (VSA) would require access for Enterprise Vault applications that require it, such as Compliance Accelerator or Discovery Accelerator. The Journal Mailbox should not be used as the EV system mailbox, and vice versa. As discussed previously, EV system mailboxes are used for MAPI based archiving operations and cannot be enabled for archiving. Sending all journaled s to an EV system mailbox will result in MAPI errors and degradation of the system. 5
6 Client Access Access to items via Outlook Enterprise Vault uses Microsoft Internet Information Services (IIS) and web-based security when any access to archived items is requested. The EV server verifies the requesting user by either Integrated Windows Authentication (IWA), that is, their logged on user credentials, or through a Basic authentication prompt. Upon installation of the EV server, the Enterprisevault virtual directory is configured to accept both Basic and Integrated Windows authentication. The concept of user access to archived items in Exchange mailboxes is simple. The original items have been removed and most often have (optionally) been replaced by a shortcut. This shortcut is nothing more than a custom message that contains information such as the original item s metadata and (optionally) the body and/or links to the attachment. Double clicking the shortcut runs a VB Script in the background that calls the Enterprise Vault server and requests that a copy of the original item be temporarily delivered to the requestor. The Enterprise Vault server looks at the requesting user ID variables being sent and compares them to the Vault ID security ACL. If the requesting user does not have permissions to view the item, access will be denied. For SSL communications between Client workstations and Enterprise Vault, see the section titled Client Access Security in the prerequisite Security Model for Enterprise Vault 8.0 and SQL Database Server whitepaper. 6
7 Outlook on Terminal Services and Citrix The default installation of Outlook on Terminal Services or Citrix can cause difficulty for users accessing archived items. This is due to a security feature on Terminal Server and Citrix that blocks Visual Basic Scripting Support. As stated previously, the retrieval of archived items for viewing is done with VB Scripting. Without this, the call fails and the user is presented with the contents of the shortcut in Exchange, rather than the retrieved item. Refer to this Microsoft technical article to addresses this issue: Outlook 2003 Script Permissions Similar to the Terminal Server and Citrix issue, Outlook 2003 users that have been given delegate rights or otherwise granted access to another user s mailbox or Outlook folder will not be able to access archived items if mailbox owners do not override the Outlook security setting of restricting VB Script in shared folders. The same also holds true for shortcuts in Public Folders. Figure 1 shows the necessary settings in Outlook 2003 to address this. Figure 1 Outlook 2003: Advanced Options These options can also be forcibly enabled via an Outlook setting set in the Advanced properties of the Enterprise Vault Exchange Mailbox Policy. Reference Figure 2. Figure 2 - Exchange Mailbox Policy Advanced settings for Outlook 7
8 Vault Cache security One of the benefits of the Enterprise Vault client add-in is the use of Vault Cache. Vault Cache files reside on the local user s PC or laptop which allows for access to archived items when not connected to the network, as well as a network bandwidth optimization benefit. Vault Cache security is typically left to the devices of the host operating system such as encryption methods and NTFS security on the folder (typically C:\Documents and Settings\<USER>\Local Settings). Accessing items via Enterprise Vault Outlook Web Access (OWA) The following figures will show how the Enterprise Vault works with different types of OWA deployments. Figure 3 - Enterprise Vault and OWA 2007 In Figure 3 above, the Exchange 2007 CAS server connects to the Enterprise Vault server using anonymous authentication. On the Enterprise Vault server, the Enterprise Vault Anonymous account manages the anonymous connections. When a user starts Archive Explorer or an archive search from the OWA client, the client will always try to connect directly to the Enterprise Vault Web Application on the Enterprise Vault server. If clients connect to the Exchange 2007 CAS server using Microsoft ISA Server, then the Enterprise Vault Web Access application must be published by the ISA Server in addition to the Exchange 2007 CAS server. 8
9 Figure 4 - EV and OWA 2000/2003 with a Front End Exchange server Figure 4 shows OWA 2000 and 2003 users connecting to the front-end server using basic authentication. Integrated Windows Authentication (IWA) is used for the connection between Exchange Servers. Anonymous authentication is used for the connection between the back-end Exchange Server and the Enterprise Vault server. On the Enterprise Vault server, the Enterprise Vault Anonymous account manages the anonymous connections. An Enterprise Vault Exchange Mailbox Policy setting can be used to enable OWA 2003 clients to connect directly to the Enterprise Vault server when users start Archive Explorer or an archive search from their OWA client. If clients connect to the OWA 2003 front-end server through an ISA Server, and direct connections are configured for Archive Explorer and archive search, then the OWA 2003 front-end server and the Enterprise Vault Web Access application must be published to clients. If direct connections are not configured (default for OWA 2003) then only the OWA 2003 front-end server needs to be published. 9
10 Figure 5 - EV and OWA 2000/2003 Back End only Figure 5 illustrates how users connect to one of two Back-end Exchange Servers directly. This configuration can provide more security, as it could force users to use IWA authentication instead of basic authentication when connecting to the OWA servers. Anonymous authentication is used for the connection between the Exchange Server and the Enterprise Vault server and the Enterprise Vault Anonymous account manages the anonymous connections. As in previous configurations, an Enterprise Vault Exchange Mailbox Policy setting can be used to enable OWA 2003 clients to connect directly to the Enterprise Vault server when users start Archive Explorer or an archive search from their OWA client. If clients connect to the OWA 2003 back-end server through an ISA Server, and direct connections are configured for Archive Explorer and archive search, then the OWA 2003 back-end server and the Enterprise Vault Web Access application must be published to clients. If direct connections are not configured (default for OWA 2003) then only the OWA 2003 back-end server needs to be published. 10
11 Forms based Authentication When using forms-based authentication, OWA 2003 and OWA 2007 client users are prompted to re-enter login credentials when starting the Enterprise Vault Search or Archive Explorer features in the OWA client. This is because the request accesses a different IIS virtual directory which requires different authentication. The authentication is valid for the session. The View mode setting, which can be controlled in the Advanced Exchange Mailbox Policy settings, controls what happens when a user clicks the Open the original item banner in the shortcut. If OWA is set, then the original item is rendered by OWA (and looks like an OWA message). If Enterprise Vault is set, then the item is rendered by Enterprise Vault (and looks like a Web browser page). When View mode is set to Enterprise Vault, users are prompted to re-authenticate when they first open an archived item. Enterprise Vault Anonymous Account for OWA The EV OWA Anonymous Account was created to allow OWA users the ability to access archived items without having to use clear text Basic Authentication to verify the requesting user s identity to Enterprise Vault. The EV OWA Anonymous Account in its simplest definition is an account that is leveraged by Enterprise Vault behind the scenes to request items on behalf of the user. Because the Anonymous account is only used with specific commands and tasks, and the fact that it is not able to access any network resources except the designated EV virtual directories and files, makes it technically impossible for any data to be compromised through any possible misuse of the account. Configuring the Enterprise Vault Anonymous user on the Enterprise Vault server The Anonymous user account must be created with the intention that it is only used for EV OWA access. The account must be a domain user account (a local machine account cannot be used). When the owauser.wsf script runs to configure the EV OWA Extensions, it assigns the following user rights to the Anonymous user: Access this computer from the network (SeNetworkLogonRight) Log on as a service (SeInteractiveLogonRight) Log on as a batch job (SeBatchLogonRight) Bypass traverse checking (SeChangeNotifyPrivilege) For OWA 2003/2007, owauser.wsf creates (or updates) the EVAnon virtual directory on the Enterprise Vault server. EVAnon points to the Enterprise Vault\WebApp folder and assigns anonymous access permissions to the Enterprise Vault Anonymous user. It also grants any customer specified back-end OWA servers access to EVAnon. Figure 6 shows how the script protects the EVAnon virtual directory. 11
12 Figure 6 - EVAnon virtual directory properties In Figure 6 above, the EVAnon virtual directory will only accept calls from Exchange server The EVAnon virtual directory will not accept calls from any other servers. For OWA 2000, owauser.wsf updates the IIS settings for the OWARDR.asp file in the EnterpriseVault virtual directory, so that requests for OWARDR.asp are run under the context of the EV OWA Anonymous user. Access to OWARDR.asp is only granted to specified back-end OWA servers in a fashion similar to Figure 6 above. The owauser.wsf script also creates (or updates) the following two Registry values: 12
13 AnonymousUser o Located under HKEY_CURRENT_USER\Software\KVS\Enterprise Vault o The value of this setting is the full name, including the domain, of the Anonymous user. For example, mydomain\ev_owa OwaWebAppAlias (OWA 2003 only) o Under HKEY_LOCAL_MACHINE\SOFTWARE\KVS\Enterprise Vault\Install o The value of this setting is EVAnon To complete the configuration, a restart of the Enterprise Vault Admin service and synchronization of the mailboxes is required. Restarting the Enterprise Vault Admin service loads the Enterprise Vault Anonymous User account into the EV server so EV will recognize it. Synchronizing the mailboxes reads the value of the OWAWebAppAlias registry key and loads it into the hidden settings of the mailbox so the mailbox knows how to contact the EV server when a user requests to view an item. OWA 2007 and ISA 2006 Microsoft ISA Server 2006 can be used to secure access to OWA 2007 servers by using Web publishing rules to make Exchange 2007 OWA Web site available on the Internet. Figure 7 shows how ISA Server 2006 can provide access to Enterprise Vault. Figure 7 - ISA 2006, Exchange 2007, EV 2007 In addition to publishing the OWA 2007 Web site, organizations also need to publish the Enterprise Vault Web Access application to their clients as Archive Explorer and archive search client requests attempt to connect to the Enterprise Vault server directly. Organizations should also reference technote which details a known ISA 2006 issue in which users can not open attachments via OWA 2003 and RPC client using connection set to 'Use Proxy'. 13
14 OWA 2000/2003 and ISA 2004 When configuring ISA Server 2004 for basic or forms-based authentication, the Mail Server Publishing Rule will typically reference 3 standard paths, which are the Exchange, Public and Exchweb virtual directories. For Enterprise Vault support, the extra path of EnterpriseVaultProxy needs to be added. Figure 8 shows the process of end user access via OWA using and ISA Firewall. Figure 8 - ISA 2004, Exchange 2003/2000, EV To add the EnterpriseVaultProxy path in ISA, an administrator needs to add and publish /EnterpriseVaultProxy/* to the list of paths in the ISA Firewall Policy. 14
15 Accessing items via RPC over HTTP Outlook users can access mailboxes on Exchange Server 2007 (Outlook Anywhere) and 2003 using Remote Procedure Calls (RPC) over HTTP. With this protocol, MAPI protocol is used to tunnel Outlook RPC requests inside an HTTP session. This allows remote Outlook users to connect to their Exchange Server mailbox without the requirement for Outlook Web Access (OWA) or a virtual private network (VPN) connection. The HTTP session terminates at a server running Internet Information Services (IIS) that has the Microsoft Windows Server 2003 RPC over HTTP Proxy networking component installed. This server is called an RPC proxy server. To support user access to Enterprise Vault using OWA and/or RPC over HTTP, the OWA & RPC Extensions EV component needs to be installed and configured on the Exchange and Enterprise Vault servers. The steps for configuring OWA access are different from the steps for configuring RPC over HTTP access; however, the security model does not change. The EV client will attempt to connect directly to the EV server using HTTP. If successful, the client will use that method for EV requests. If the direct connection attempt fails, then it will connect in a fashion similar to OWA in the previous section, which means that connections between RPC target Exchange Servers and Enterprise Vault servers will use EV Anonymous authentication. Exchange 2007 RPC over HTTP and ISA 2006 Microsoft ISA Server 2006 can be used to secure RPC over HTTP access to Exchange 2007 Servers by using Web publishing rules to make the RPC Web site available on the Internet. To configure the ISA 2006, organizations need to: Configure an RPC firewall policy that publishes the \rpc virtual directory on the Exchange 2007 CAS server through ISA Server Configure an Enterprise Vault firewall policy on ISA 2006 that publishes the \EnterpriseVault virtual directory on the Enterprise Vault server. Exchange 2003 RPC over HTTP and ISA 2004 Microsoft ISA Server 2004 can be used to secure access to RPC Exchange Servers by using Web publishing rules (reverse proxy), to make RPC proxy servers available on the Internet. To configure the ISA 2004, organizations need to: Configure an RPC firewall policy that publishes the \rpc virtual directory on the RPC proxy server through ISA Server Configure an Enterprise Vault firewall policy that publishes the \EnterpriseVaultProxy virtual directory on the RPC proxy server through ISA Server Procedures for configuring RPC and Enterprise Vault firewall policies for can be found in the Configuring ISA Server 2004 for Exchange Server 2003 RPC over HTTP access to Enterprise Vault section of the Setting_up_Exchange_Server_Archiving.pdf that ships with Enterprise Vault
16 Conclusion In this whitepaper we have discussed the security aspects of archiving Exchange servers with Enterprise Vault 8.0. We have discussed the necessity for an Enterprise Vault service mailbox and the security around Journal archives and Vault Cache. We discussed end-user access to archived items from Outlook, OWA, and RPC over HTTP as well as the additional security provided with the use of ISA servers. Below is a list of the other Security Model topics in this series that may be of interest. Enterprise Vault 8.0 Security Model for File System Archiving Enterprise Vault 8.0 Security Model for Microsoft Sharepoint Archiving Enterprise Vault 8.0 Security Model for SMTP Archiving Enterprise Vault 8.0 Security Model for Discovery Accelerator 8.0 Enterprise Vault 8.0 Security Model for Compliance Accelerator 8.0 Enterprise Vault 8.0 Security Model for Automatic Classification Engine 8.0 Enterprise Vault 8.0 Security Model for Secure Messaging 8.0 Enterprise Vault 8.0 Security Model for Lotus Domino Archiving 16
17 About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help businesses and consumers secure and manage their information. Headquartered in Cupertino, Calif., Symantec has operations in 40 countries. More information is available at For specific country offices and contact numbers, please visit our Web site. For product information in the U.S., call toll-free 1 (800) Symantec Corporation World Headquarters Stevens Creek Boulevard Cupertino, CA USA +1 (408) (800) Copyright 2009 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
PST Migration with Enterprise Vault 8.0: Part 1 - Solution Overview. Author: Andy Joyce, EV Technical Product Management Date: April, 2009
WHITE PAPER: TECHNICAL PST Migration with Enterprise Vault 8.0: Part 1 - Solution Overview Author: Andy Joyce, EV Technical Product Management Date: April, 2009 White Paper: Symantec Technical PST Migration
More informationPrerequisite Software for EV Installation on Windows 2003
Implementation Prerequisite Software for EV Installation on Windows 2003 Windows 2008 Server SP1, including:.net Framework 2.0 Message Queuing (no AD integration) IIS (with Active Server Pages enabled)
More informationEnterprise Vault Installing and Configuring
Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise
More informationEnterprise Vault Whitepaper
Enterprise Vault Whitepaper Enterprise Vault and Microsoft Office 365 This document outlines the integration of the offsite Office 365 email service with an on-premises Enterprise Vault solution. If you
More informationWHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview
WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE
More informationEnterprise Vault Whitepaper Move Archive Feature Overview
Enterprise Vault Whitepaper Move Archive Feature Overview This document provides an overview of the Enterprise Vault Move Archive feature This document applies to the following version(s) of :
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Setting up Exchange Server Archiving 9.0 Symantec Enterprise Vault: Setting up Exchange Server Archiving The software described in this book is furnished under a license agreement
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Setting up Exchange Server Archiving 11.0 Symantec Enterprise Vault: Setting up Exchange Server Archiving The software described in this book is furnished under a license agreement
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Setting up Exchange Server Archiving 10.0 Symantec Enterprise Vault: Setting up Exchange Server Archiving The software described in this book is furnished under a license agreement
More informationData Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Trusted and proven email archiving Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage, and
More informationAgency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
More informationEV 10.0.3 Feature Briefing
EV 10.0.3 Feature Briefing Exchange Server 2013 OWA Support This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the
More information250-310. Administration of Symantec Enterprise Vault 10.0 for Exchange. Version: Demo. Page <<1/12>>
250-310 Administration of Symantec Enterprise Vault 10.0 for Exchange Version: Demo Page 1.Enterprise Vault converts mail message attachments to text or HTML. What is a benefit of changing the
More informationProtecting Microsoft Internet Information Services Web Servers with ISA Server 2004
Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents
More informationVeritas Enterprise Vault. Setting up Exchange Server Archiving
Veritas Enterprise Vault Setting up Exchange Server Archiving 12 Veritas Enterprise Vault: Setting up Exchange Server Archiving Last updated: 2015-12-09. Legal Notice Copyright 2015 Veritas Technologies
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Setting up Domino Server Archiving 8.0 Symantec Information Foundation Symantec Enterprise Vault: Setting up Domino Server Archiving The software described in this book is furnished
More information250-308. Administration of Symantec Enterprise Vault 8.0 for Exchange Exam. http://www.examskey.com/250-308.html
SYMANTEC 250-308 Administration of Symantec Enterprise Vault 8.0 for Exchange Exam TYPE: DEMO http://www.examskey.com/250-308.html Examskey SYMANTEC 250-308 exam demo product is here for you to test the
More informationCMT for Exchange 3.7. Requirements
CMT for Exchange 3.7 Requirements May 2016 Table of Contents Section 1. Introduction... 3 Section 2. Migration Control Center and Workstation Requirements... 4 Section 3. Onsite System Administrator...
More informationData Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,
More informationMigrating Exchange Server to Office 365
Migrating Exchange Server to Office 365 By: Brien M. Posey CONTENTS Domain Verification... 3 IMAP Migration... 4 Cut Over and Staged Migration Prep Work... 5 Cut Over Migrations... 6 Staged Migration...
More informationTechnical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism
Technical Note Configuring Outlook Web Access with Secure WebMail Proxy for eprism Information in this document is subject to change without notice. This document may be distributed freely only in whole,
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only
More informationSymantec Enterprise Vault for Microsoft Exchange Server
Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy
More informationMicrosoft Terminal Server and Citrix Presentation Server Deployment Environments
Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Understanding the use of Act! in a Terminal Server or Citrix Presentation Server environment Table of Contents Introduction...
More informationSymantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
More informationSymantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1
Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement
More informationEnterprise Vault. For Microsoft Exchange Server. Installing and Configuring Version 5.0
Enterprise Vault For Microsoft Exchange Server Installing and Configuring Version 5.0 March 2005 This publication and the software it describes are the intellectual property of kvault Software Ltd (KVS).
More informationW H I T E P A P E R : T E C H N I C AL. Enterprise Vault 9.0 Archiving from Exchange Server 2010. Dan Strydom Technical Field Enablement November 2010
W H I T E P A P E R : T E C H N I C AL Enterprise Vault 9.0 Archiving from Exchange Server 2010 Dan Strydom Technical Field Enablement November 2010 White Paper: Symantec Technical Contents Introduction...
More informationHow To Export Data From Exchange To A Mailbox On A Pc Or Macintosh (For Free) With A Gpl Or Ipa (For A Free) Or Ipo (For Cheap) With An Outlook 2003 Or Outlook 2007 (For An Ub
Exchange Client Quick Start Guide GAPC Hosted Exchange Client Guide Page 1 of 12 Client Requirements Hosted Exchange requires Outlook 2003 and Windows XP for MAPI access to your hosted Exchange mailboxes,
More informationDIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
More informationData Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
More informationWHITE PAPER. Symantec Enterprise Vault and Exchange 2010. Alex Brown Product Manager
WHITE PAPER Symantec Enterprise Vault and Exchange 2010 Alex Brown Product Manager Introduction... 3 Plans for Exchange Server 2010 support and compatibility?... 3 So what is new in Exchange Server 2010?...
More informationSymantec Enterprise Vault
Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email
More informationOptimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
More informationDell Client Profile Updating Utility 5.5.6
Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System
More informationNYSeMail Office 365 Administration Guide for Agencies
NYSeMail Office 365 Administration Guide for Agencies Office 365 Overview... 34 What is included... 34 Software Requirements... 34 Message Limits... 34 Provisioning... 34 Archive and Retention Policy...
More informationSymantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
More informationThe End User Experience. Introduction to Archiving for End Users
The End User Experience Introduction to Archiving for End Users Revision: 1 Last Revised: 14 March 2013 Copyright This documentation and software described herein is copyrighted. Under copyright laws,
More informationSophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
More informationEnterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage
Enterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage This document provides background and guidance on how configure Symantec Enterprise Vault with generic Network Attached
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More informationSophos UTM Web Application Firewall for Microsoft Exchange connectivity
How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
More informationRoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
More informationSymantec Enterprise Vault Technical Note
Symantec Enterprise Vault Technical Note Configuring Internal and External WebApp URLs for OWA 2007 SP4 and later Symantec Enterprise Vault: Configuring Internal and External WebApp URLs for OWA The software
More informationConfiguration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.
Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them
More informationW H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationAgenda. How to configure
dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
More informationNote that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.
USC Marshall School of Business Academic Information Services Configuring Outlook 2010 RPC Over HTTP Protocol For Windows 7 Home Computers or Wireless Laptops The steps in this document cover how to configure
More informationOutlook Profiler 2.5 Series Instruction Manual
Outlook Profiler 2.5 Series Instruction Manual Copyright 2001-2015 GOFF Concepts LLC. All rights reserved. GOFF Concepts assumes no responsibility for errors or omissions in this document; nor does GOFF
More informationENTERPRISE VAULT 9.0 FEATURE BRIEFING
ENTERPRISE VAULT 9.0 FEATURE BRIEFING Enterprise Vault 9.0 Exchange Archiving Updates This document is for internal and partner use only. Do not distribute copies of this document to customers. If you
More informationHow to Setup and Manage LAUSD E-mail in Outlook
LAUSD ITD Service Desk How to Setup and Manage LAUSD E-mail in Outlook (08/11/08) LAUSD ITD Service Desk 333 S. Beaudry Ave. Phone 213.241.5200 Fax 213.241.5224 Table of Contents Acceptable Use Policy...2
More informationUser guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
More informationArchive One Policy V4.2 Quick Start Guide October 2005
Archive One Policy V4.2 Quick Start Guide October 2005 Archive One Policy Quick Start Guide V4.2 Page 1 of 33 CONTENTS Introduction... 3 Components...3 Before You Start...4 System Requirements...5 Prerequisites...7
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
More informationCopyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
More informationEmployee Active Directory Self-Service Quick Setup Guide
Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:
More informationDeploying the Barracuda Load Balancer with Microsoft Exchange Server 2010 Version 2.6. Introduction. Table of Contents
Deploying the Barracuda Load Balancer with Microsoft Exchange Server 2010 Version 2.6 Introduction Organizations use the Barracuda Load Balancer to distribute the load and increase the availability of
More informationSymantec Enterprise Vault for Lotus Domino
Symantec Enterprise Vault for Lotus Domino Store, Manage and Discover Critical Business Information Overview Industry-leading email archiving for Lotus Domino With the recognition that email has become
More informationConfiguration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
More informationEmail Client configuration and migration Guide Setting up Thunderbird 3.1
Email Client configuration and migration Guide Setting up Thunderbird 3.1 1. Open Mozilla Thunderbird. : 1. On the Edit menu, click Account Settings. 2. On the Account Settings page, under Account Actions,
More informationShared Hosting with Exchange 2003 (Part 1)
Shared Hosting with Exchange 2003 (Part 1) http://www.msexchange.org/tutorials/shared_hosting_exchange_2003_part1.html?printversion Page 1 of 10 Home Articles & Tutorials Exchange 2003 Articles Migration
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationSHARING FILE SYSTEM RESOURCES
1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions
More informationtechnical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
More informationApplication Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009
Application Note AN-10233 June 2009 ShoreTel 9: Active Directory Integration This application note outlines the configuration required to prepare a customer s Microsoft Active Directory environment for
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationTable of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
More informationSecure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
More informationFolder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016
Version 2.0 April 2016 Folder Proxy + OWA + ECP/EAC Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationLepide Exchange Recovery Manager
Configuration Guide Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights
More informationZimbra Connector for Microsoft Outlook User Guide 7.1
Zimbra Connector for Microsoft Outlook User Guide 7.1 March 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
More informationHosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
More informationBackup Exec 2010: Archiving Options
Backup Exec 2010: Archiving Options White Paper: Backup Exec 2010: Archiving Options Backup Exec 2010: Archiving Options Contents Introduction............................................................................................
More informationConfiguring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
More informationImplementation Guide for protecting
Implementation Guide for protecting Remote Web Workplace (RWW) Outlook Web Access (OWA) 2003 SharePoint 2003 IIS Web Sites with BlackShield ID Copyright 2010 CRYPTOCard Inc. http:// www.cryptocard.com
More informationData Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables
More informationVeritas Enterprise Vault for Microsoft Exchange Server
Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email
More informationActive Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
More informationPROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES
M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC
More informationConfiguring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
More informationHow to Configure Entourage 2008 for Email Client
How to Configure Entourage 2008 for Email Client Introduction (Revised 04/28/11) LAUSD IT Helpdesk 333 S. Beaudry Ave. 9 th Floor Phone 213.241.5200 Before you configure Microsoft Entourage 2008 E-mail
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007
INTEGRATION GUIDE DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
More informationWhat s New in Ghost Solution Suite 3.0
What s New in Ghost Solution Suite 3.0 This document highlights some of the most impactful new features of Ghost Solution Suite 3.0 For more comprehensive information, please view the Ghost Solution Suite
More informationCollaboration Technology Support Center Microsoft Collaboration Brief
Collaboration Technology Support Center Microsoft Collaboration Brief September 2005 HOW TO INTEGRATE MICROSOFT EXCHANGE SERVER INTO SAP ENTERPRISE PORTAL Authors Robert Draken, Solution Architect, Comma
More informationTS: Microsoft Exchange Server 2010, Configuring
EXAM 70-662 TS: Microsoft Exchange Server 2010, Configuring Question: 1 Your network contains an Active Directory forest. All domain controllers run Windows Server 2008. You need to ensure that you can
More informationDeployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php
Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with
More informationTitle of Presentation
Title of Presentation Hosted Messaging And Collaboration Solution Hosted Services Part 1 Name Title Organization Agenda Hosted Messaging and Collaboration Solution Hosted Services Technical Overview Hosted
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationMicrosoft Lync Server 2010
Microsoft Lync Server 2010 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: March. 2012 For the most up to date version of the Scale to a Load Balanced Enterprise Edition
More information1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010
Foundation IT Written approximately Dec 2010 1 Outlook Web Access With the new version of Exchange 2010 Outlook Anywhere has been enabled and configured with a secure socket layer (SSL) certificate from
More informationConfigure ActiveSync with a single Exchange server (Exchange sync for an iphone)
Configure ActiveSync with a single Exchange server (Exchange sync for an iphone) I recently picked up a first-generation iphone from a friend and after playing around with it for a while I decided that
More informationWHITE PAPER: ENTERPRISE SOLUTIONS. Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d Agent for Active Directory
WHITE PAPER: ENTERPRISE SOLUTIONS Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d For use with Microsoft Windows 2000 Server and Windows Server 2003 White Paper: Enterprise
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook
More informationTELSTRA BUSINESS MAIL QUICK REFERENCE GUIDE
1.1 Introduction 01 1.2 The Checklist 02 1.3 Business Mail Requirements 03 1.4 Downloading & Installing Outlook 2003 04 BEFORE YOU START 1.1 INTRODUCTION 1.1.1 Who this Guide is For 1.1.2 What s in this
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used
More information