Cisco IronPort Security Plug-in 7.3 Administrator Guide

Size: px
Start display at page:

Download "Cisco IronPort Email Security Plug-in 7.3 Administrator Guide"

Transcription

1 Cisco IronPort Security Plug-in 7.3 Administrator Guide May 01, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA USA Tel: NETS (6387) Fax:

2 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of DUB s public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental Cisco Systems, Inc. All rights reserved.

3 CONTENTS Getting Started with the Cisco IronPort Security Plug-in 1-1 What s New in this Release 1-1 Supported Configurations 1-2 Related Documents 1-2 How to Use This Guide 1-3 How This Book Is Organized 1-3 Where to Find More Information 1-4 Cisco IronPort Welcomes Your Comments 1-6 Cisco IronPort Security Plug-in Overview 1-7 Overview 2-1 The Cisco IronPort Security Plug-in 2-1 Installing the Plug-in 2-3 Configuration Modes 2-3 Deploying the Cisco IronPort Security Plug-in with the Cisco Registered Envelope Service (CRES) Key Server 2-5 Deploying the Cisco IronPort Security Plug-in with the IronPort Encryption Appliance (IEA) Key Server 2-6 Downloading the IEA Key Server Token 2-6 Customizing and Signing the Configuration File 2-7 Deploying the Configuration File to the End User 2-8 Configuring Settings for the Cisco IronPort Security Plug-in 2-9 i

4 Contents Performing a Mass Installation 3-1 Performing the Installation 3-1 Using Custom Configuration Files 3-15 Overview 3-16 Editing the XML Configuration Files 3-16 Mass Installation Using the BCE_Config.xml File 3-18 Deploying the Custom Configuration Files 3-20 Configuring and Using the Cisco IronPort Security Plug-in for Outlook 4-1 Cisco IronPort Security Plug-in For Outlook General Settings 4-2 Enable or Disable 4-2 Configuring Basic Settings for the Outlook Plug-in 4-3 Reporting Unwanted s-Spam, Virus, and Phishing Attacks 4-4 Using the Reporting Plug-in for Outlook 4-6 Encrypting Flag and Desktop Encryption Configuration 4-12 Launching the Security Plug-in Configuration File 4-12 Flag Encryption 4-14 Flag Encryption Options 4-15 Desktop Encryption 4-20 Desktop Encryption Options 4-21 Sending Encrypted Manage Secure Messages 4-35 Receiving Secure s 4-37 Opening Your First Encrypted Secure Message 4-42 Changing Logging Settings 4-46 Errors and Troubleshooting 4-48 Outlook Startup Errors 4-49 ii

5 Contents Message Reporting Errors 4-50 Decryption and Encryption Errors 4-51 Repairing Cisco Security Plug-in for Outlook Files 4-53 Troubleshooting Using the Diagnostic Tool 4-54 Data Collected by the Cisco IronPort Security Diagnostic Tool 4-54 Running the Cisco IronPort Security Diagnostic Tool 4-55 Uninstalling the Cisco IronPort Security Plug-in 4-57 IronPort End User License Agreement A-1 Cisco IronPort Systems, LLC Software License Agreement A-1 iii

6 Contents iv

7 CHAPTER 1 Getting Started with the Cisco IronPort Security Plug-in This chapter contains the following sections: What s New in this Release, page 1-1 Supported Configurations, page 1-2 Related Documents, page 1-2 How to Use This Guide, page 1-3 Cisco IronPort Security Plug-in Overview, page 1-7 What s New in this Release This release includes the following new features: Ability to configure Cisco Ironport Security Plug-in to use a Cisco Ironport Encryption appliance (IEA) or Cisco Registered Envelope Service (CRES) as the hosted key server. Outlook bit Support. Automatic Configuration. The Cisco Ironport Security Plug-in is automatically configured by an XML file attachment received from the administrator. Configuration Per Account. The Cisco Ironport Security Plug-in is deployed in three modes that determine the configuration per account as Decrypt Only, Flag, or Encrypt. 1-1

8 Chapter 1 Getting Started with the Cisco IronPort Security Plug-in Desktop Encryption Secure Envelope Options. Lock or unlock encrypted . The end user is able to lock or unlock encrypted . They can also set and modify the reason for locking the encrypted . Set the expiration date and time for encrypted . The end user can set or clear an expiration date and time. Supported Configurations The Cisco Encryption Compatibility Matrix lists the supported operating systems and can be accessed from the following URL: patibility_matrix.pdf Related Documents To use the Encryption plug-in, you need to have a Cisco IronPort Encryption appliance running and properly configured to work with the Encryption plug-in or have a Cisco Registered Envelope Service (CRES) account. To understand how to configure the Cisco IronPort Encryption appliance, you may want to review the following guides: IronPort Encryption Appliance Installation Guide. This guide provides instructions for installing and configuring encryption, and it may help you to understand how to configure your encryption appliance settings to work with the plug-in settings you configure. See: To better understand how Cisco IronPort Security works, you may want to review some basic information about how is classified as spam, virus, or as non-spam. For more details on these subjects, you may want to review the following guide: Cisco IronPort AsyncOS for Configuration Guide. This guide contains information on spam and virus protection. Users can improve the efficacy of the SenderBase network by employing the spam and virus plug-in. When 1-2

9 Chapter 1 Getting Started with the Cisco IronPort Security Plug-in users marks an as spam, virus, or not spam, they can train the filters to become more effective and improve the performance of all Cisco IronPort appliances. See: How to Use This Guide Use this guide as a resource to learn about the features in your Cisco IronPort Security Plug-in. The topics are organized in a logical order, but you might not need to read every chapter in the book. Review the Table of Contents and the section called How This Book Is Organized, page 1-3 to determine which chapters are relevant to your particular configuration. This guide is distributed electronically as a PDF. The electronic versions of the guide are available on the Cisco IronPort Customer Support Portal. You can also access an HTML online help tool in the appliance GUI: In Outlook 2010, go to Tools > Options > Cisco Security. Click the Help button in Outlook, then click Actions > Cisco Security. In Outlook 2003/2007, go to Tools > Options > Cisco Security > Help. How This Book Is Organized Chapter 1, Getting Started with the Cisco IronPort Security Plug-in provides an introduction to the Cisco IronPort Security plug-in and defines its key features and role in network security configurations. New features of the current release are described along with information about other resources for information and support contact information. Chapter 2, Overview introduces the Reporting Plug-in and the Encryption plug-in. This section provides an overview of each of these tools. Chapter 3, Performing a Mass Installation describes how to perform a mass installation. The instructions provide steps for running the install. 1-3

10 Chapter 1 Getting Started with the Cisco IronPort Security Plug-in Chapter 4, Configuring and Using the Cisco IronPort Security Plug-in for Outlook provides instructions for configuring the Cisco IronPort Security Plug-in for Outlook. It includes steps for installing the encryption plug-in, sending or receiving encrypted , and managing secure messages. Appendix A, Cisco IronPort Systems, LLC Software License Agreement contains detailed information about the licensing agreements for Cisco IronPort products. Where to Find More Information Cisco offers the following resources to learn more about the Cisco IronPort Security Plug-in. Security Training Services & Certification Knowledge Base Cisco Security Training Services deliver exceptional education and training for Cisco security products and solutions. Through a targeted curriculum of technical training courses, the program provides up-to-date knowledge and skills transfer to different audiences. Use one of the following methods to contact Cisco Security Training Services: Training. For question relating to registration and general training: stbu-trg@cisco.com Certifications. For questions relating to certificates and certification exams: stbu-trg@cisco.com You can access the Cisco IronPort Knowledge Base on the Cisco IronPort Customer Support site at the following URL: The Knowledge Base contains a wealth of information on topics related to Cisco IronPort products. 1-4

11 Chapter 1 Getting Started with the Cisco IronPort Security Plug-in Cisco Support Community Articles generally fall into one of the following categories: How-To. These articles explain how to do something with a Cisco IronPort product. For example, a how-to article might explain the procedures for backing up and restoring a database for an appliance. Problem-and-Solution. A problem-and-solution article addresses a particular error or issue that you might encounter when using a Cisco IronPort product. For example, a problem-and-solution article might explain what to do if a specific error message is displayed when you upgrade to a new version of the product. Reference. Reference articles typically provide lists of information, such as the error codes associated with a particular piece of hardware. Troubleshooting. Troubleshooting articles explain how to analyze and resolve common issues related to Cisco IronPort products. For example, a troubleshooting article might provide steps to follow if you are having problems with DNS. Cisco Support Community is an online forum for Cisco customers, partners, and employees. It provides a place to discuss general and web security issues, as well as technical information about specific Cisco products. You can post topics to the forum to ask questions and share information with other Cisco and Cisco IronPort users. You can access the Cisco Support Community from the following URL: 1-5

12 Chapter 1 Getting Started with the Cisco IronPort Security Plug-in Cisco Customer Support Note The level of support available to you depends upon your service level agreement. Cisco IronPort Customer Support service level agreement details are available on the Support Portal. Check this page for details about your level of support. You can request support by phone, , or online 24 hours a day, 7 days a week. You can contact Cisco Customer Support using one of the following methods: Cisco Support Portal: Phone support: Contact Cisco Technical Assistance Center (TAC) within U.S. /Canada at and at Worldwide Phone Numbers. tac@cisco.com If you purchased support through a reseller or another supplier, please contact that supplier directly with your product support issues. Cisco Content Security Welcomes Your Comments The Cisco Content Security Technical Publications team is interested in improving the product documentation. Your comments and suggestions are always welcome. You can send comments to the following address: contentsecuritydocs@cisco.com 1-6

13 Chapter 1 Getting Started with the Cisco IronPort Security Plug-in Cisco IronPort Security Plug-in Overview The Cisco IronPort Security Plug-in installs reporting and encryption menus onto Outlook . The reporting plug-in enables users to submit feedback about the type of mail they receive (for example, users can report spam, phishing, and virus s), and the encryption plug-in places an encrypt message button on the toolbar which enables users to either send encrypted from their programs or to flag the to be encrypted before it leaves their organizations. When the Cisco IronPort Security Plug-in is installed, it enables components on an Outlook mail client. This single interface allows end-users to seamlessly report s or send encrypted . End users can lock or unlock encrypted s, adding or modifying a lock reason. End users can also set an expiration date and time for the encrypted . Combining these plug-ins simplifies installation and provides a single interface for users and Administrators to install and modify. The reporting and encryption plug-ins provide a convenient interface that enables you to submit feedback and send encrypted messages by using toolbar buttons and right-click context menus. If you are using the reporting plug-in to report a message, a dialog box appears indicating that the message was submitted. The Encryption Plug-in places an Encrypt Message button in the menu bar of an message to provide an easy way for senders to encrypted messages. The Encryption plug-in requires the presence and proper configuration of a Cisco IronPort Encryption appliance or have a Cisco Registered Envelope Service (CRES) account. 1-7

14 Chapter 1 Getting Started with the Cisco IronPort Security Plug-in 1-8

15 CHAPTER 2 Overview The Cisco IronPort Security Plug-in framework supports several Cisco IronPort Security Plug-ins, including the Reporting plug-in and the Encryption plug-in. This chapter contains the following sections: The Cisco IronPort Security Plug-in, page 2-1 Installing the Plug-in, page 2-3 Configuration Modes, page 2-3 Deploying the Cisco IronPort Security Plug-in with the Cisco Registered Envelope Service (CRES) Key Server, page 2-5 Deploying the Cisco IronPort Security Plug-in with the IronPort Encryption Appliance (IEA) Key Server, page 2-6 Configuring Settings for the Cisco IronPort Security Plug-in, page 2-9 TCP/IP Services Required for the Cisco IronPort Security Plug-in, page 2-9 The Cisco IronPort Security Plug-in The Cisco IronPort Security Plug-in consists of two commonly used security plug-ins: the Reporting plug-in and the Encryption plug-in. You may deploy the Cisco IronPort Security Plug-in on your Outlook program. When you deploy the Cisco IronPort Security Plug-in, it installs one or both of the following applications: 2-1

16 Chapter 2 Overview The Reporting Plug-in The Encryption Plug-in The Reporting Plug-in. The Reporting Plug-in enables Outlook users to submit feedback to Cisco IronPort Systems about unsolicited and unwanted messages, such as spam, viruses, and phishing messages. For details, see The Reporting Plug-in, page 2-2. The Encryption Plug-in. The Encryption Plug-in places an Encrypt Message button in the menu bar of an message to provide an easy way for a sender to mark a message to be encrypted. For details, see The Encryption Plug-in, page 2-2. The Reporting Plug-in enables Outlook users to submit feedback to Cisco IronPort Systems about unsolicited and unwanted messages, such as spam, viruses, and phishing messages. Cisco IronPort uses this feedback to update its filters to stop unwanted messages from being delivered to your inbox. You can also report false positives, which are legitimate messages that are marked as spam, to IronPort Systems by using the Not Spam button. Legitimate messages are often referred to as ham. Cisco uses reports about false positives to adjust its spam filters to avoid misclassifying legitimate in the future. Any valid can be reported as Not Spam and will help to increase filter efficacy. This plug-in provides a convenient interface that enables you to submit feedback by using toolbar buttons and right-click context menus. When you report a message, a dialog box appears indicating that the message was submitted. The message data that you submit is used by automated systems to improve the Cisco IronPort filters. By submitting message data, you help to reduce the volume of unsolicited in your inbox. The Encryption Plug-in places an Encrypt Message button in the menu bar of an message to provide an easy way for senders to mark messages to be encrypted and secured before it leaves the organization. There are two types of encryption available: Flag Encryption and Desktop Encryption. The Flag Encryption option allows you to flag the for encryption, and the is encrypted by the Cisco IronPort Encryption appliance or Security appliance before the is sent out of the network. Desktop 2-2

17 Chapter 2 Overview Encryption allows you to encrypt from within your program using the Cisco IronPort encryption technology. Then, it sends the encrypted from your desktop. You may want to use Desktop Encryption if you want to ensure that mail sent within your organization is encrypted. The Encryption plug-in is designed to work with a functioning and configured Cisco IronPort Encryption appliance or a Cisco IronPort Security appliance (if you have one in your network). The configuration you use for the Encryption plug-in should be developed in conjunction with the settings on these appliances. If you do not use the same configurations for these appliances, issues may occur when sending encrypted messages. Installing the Plug-in To install the Cisco IronPort Security Plug-in for groups of users, you will likely want to perform a silent installation. A silent installation allows you to perform an installation without prompting the end user for input. For instructions on performing the silent installation, see Chapter 3, Performing a Mass Installation. Configuration Modes The Cisco IronPort Security Encryption Plug-in is deployed in three separate configuration modes. The default configuration mode is Decrypt Only. In order to enable the other configuration modes, the Outlook account is configured by an updated attachment file received from the administrator. The administrator sends a BCE_Config_signed.xml file attachment to the end user s account. The end user will receive this file as a securedoc.html file. When the end user clicks the securedoc.html attachment, the Outlook application detects the configuration information attached to the message and applies the updated configuration. Note The default envelope name is securedoc.html.the attachment name value can be changed by the administrator and the envelope will reflect the newly specified name. 2-3

18 Chapter 2 Overview The three configuration modes are: Decrypt Only Allows decrypting of secure messages received. Decrypt and Flag Allows decrypting and flagging of secure s messages. The flag option allows the end user to flag the for encryption, and the is encrypted by the Cisco IronPort Encryption appliance or Security appliance before the is sent out of the network. The server must be configured to detect the flagged messages and encrypt them at the server. Decrypt and Encrypt Allows encrypting and decrypting of secure messages. The following table specifies which features are supported in each configuration mode. Feature Decrypt Only Decrypt and Flag Decrypt and Encrypt Send encrypted message X Flag message for encryption X Open encrypted X X X Reply/Reply All/Forward Message X lock and unlock X expiration X diagnostic (Uses for Reporting and Encryption Plug-ins) X X X Read-receipt X Envelope settings X Settings X X X 2-4

19 Chapter 2 Overview Deploying the Cisco IronPort Security Plug-in with the Cisco Registered Envelope Service (CRES) Key Server Use the following instructions to deploy the Cisco IronPort Security Plug-in so that it is used directly with the Cisco Registered Service (CRES) key server. To begin, log into your CRES account: and go to the Accounts tab. Select the account from which you want to enable the Security Plug-in. Then, go to the BCE Config tab. Step 1 Step 2 Step 3 Choose the token to use with the configuration template: CRES Select if your key server is CRES. SecureCompose Do not choose this option as your CRES token. Token <Account number> Choose this option as your CRES token. Click Download Template to download the template file in order to edit it. The filename is BCE_Config.xml. Edit the configuration file. The BCE_Config.xml file contains detailed instructions for the fields you will need to edit based on your particular environment. Open the file in a text editor and follow the instructions included in the comments to make the necessary modifications. Note Step 4 For localization purposes, do not change or reword the existing Message Security labels Low, Medium, or High. Click Browse to navigate to the edited BCE_Config.xml file, and click Upload and Sign after you have located the file. Once the configuration file is signed, the signed version will be downloaded as BCE_Config_signed.xml. Save this file to your local machine. 2-5

20 Chapter 2 Overview Step 5 To deploy the configuration file to many end users at once, use the Distribute Signed Configuration to Bulk List option. To do so: a. Browse to the BCE_Config_signed.xml file created in Step 4. b. Browse to a comma separated file containing the addresses of end users. c. Change the subject as needed. d. Click Distribute Config. Note If the xml configuration file is forwarded to another end user, versus received from the administrator, the auto configuration will not work and an error is received. Note Do not send the BCE_Config_signed.xml file to a mailing list. CRES does not support mailing lists. Deploying the Cisco IronPort Security Plug-in with the IronPort Encryption Appliance (IEA) Key Server Downloading the IEA Key Server Token The IEA token is needed for use during the configuration signing process. Before signing the configuration file, download the token to your local machine. To download the token file from the IEA key server: Step 1 Log into your IEA administration console: The Administration Console displays. 2-6

21 Chapter 2 Overview Step 2 Step 3 Go to the Accounts tab. Go to the account to use with your plug-in installations. This is usually the Users account. Go to the Tokens tab. Click the Save Token icon (looks like a circle with a down arrow) to the right of the token and save it to your local machine. Customizing and Signing the Configuration File Once the IEA token file has been downloaded, the configuration file can be customized and signed. The Cisco Registered Envelope Service (CRES) is a hosted service that provides support for Cisco IronPort Encryption Technology. Because the plug-in configuration file signature verification is performed by the CRES system, customers using an IEA as their key server who want to deploy the Cisco IronPort Security Plug-in will also need an administrator account on CRES. If you need a CRES administrator account created for you, contact Cisco IronPort Customer Support at: To create a signed configuration file for use with the IEA key server: Step 1 Step 2 Step 3 Step 4 Step 5 Log into your CRES account: The Administration Console displays. Go to the Accounts tab and select the account from which you want to enable the Security Plug-in. Then, go to the BCE Config tab. Choose IEA as the token type, then upload the IEA token you previously downloaded from the IEA. Click Download Template to download the template file in order to edit it. The filename is BCE_Config.xml. Edit the configuration file. The BCE_Config.xml file contains detailed instructions for the fields you will need to edit based on your particular environment. Open the file in a text editor and follow the instructions included in the comments to make the necessary modifications. Note For localization purposes, do not change or reword the existing Message Security labels Low, Medium, or High. 2-7

22 Chapter 2 Overview Step 6 Click Browse to navigate to the edited BCE_Config.xml file, and click Upload and Sign after you have located the file. Once the configuration file is signed, the signed version will be downloaded as BCE_Config_signed.xml. Save this file to your local machine. Note Do not use Step 5 on the BCE config tab Distribute Signed Configuration File to Bulk List (optional) when using the IEA as key server. This option only applies to CRES and will be removed in a future release. Deploying the Configuration File to the End User To deploy the configuration file to end users, send the signed configuration file in an encrypted on the IEA to each end user. The message must be sent from an address that is listed as an administrator on the IEA and on the CRES account. Note If the xml configuration file is forwarded to another end user, versus received from the administrator, the auto configuration will not work and an error is received. Note Do not send the BCE_Config_signed.xml file to a mailing list. CRES does not support mailing lists. To perform a mass installation using the BCE_Config_signed.xml file, see Mass Installation Using the BCE_Config.xml File, page

23 Chapter 2 Overview Configuring Settings for the Cisco IronPort Security Plug-in After you install the Cisco IronPort Security Plug-in, you can make configuration changes from the Cisco Security tab in Outlook. In Outlook 2010, go to File > Options > Add-ins > Add-in Options > Cisco Security. In Outlook 2003/2007, go to Tools > Options > Cisco Security. You can make changes to the Reporting plug-in installation or the Encryption plug-in installation. Or, you can make changes to general options that affect both plug-in installations. For example, you can enable or disable logging for the Cisco IronPort Security Encryption Plug-in or you can modify options for a specific encryption mode. To change the method for marking for Encryption, you need to make changes to the BCE_Config.xml file and perform an auto-configuration. Any of the specified settings must be compatible with your Cisco IronPort Encryption appliance. To make configuration changes on an Outlook installation, see Chapter 4,. TCP/IP Services Required for the Cisco IronPort Security Plug-in Cisco IronPort Security Plug-in requires the use of the following TCP/IP services and their associated ports. These ports must be left available for the TCP/IP services to use. DNS (Domain Name System). The DNS service translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites. Port number: 53 (TCP/UDP) 2-9

24 Chapter 2 Overview For more information, see: Impact: High Resolution: This service must be accessible to all end users. SMTP (Simple Mail Transfer Protocol) Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail ( ) transmission across Internet Protocol (IP) networks. Port number: 25, 587, 465, 475, 2525 (TCP) For more information, see: Impact: High Resolution: This service must be accessible to all end users. DHCP (Dynamic Host Configuration Protocol) DHCP is a network protocol used to configure devices that are connected to a network (known as hosts) so they can communicate on that network using the Internet Protocol (IP) Port number: 67, 68 (TCP/UDP) For more information, see: Impact: High Resolution: This service must be accessible to all end users which obtain IP addresses automatically from DHCP server. Net BIOS over TCP/IP NetBIOS over TCP/IP (NBT, or sometimes NetBT) is a networking protocol that allows legacy computer applications relying on the NetBIOS API to be used on modern TCP/IP networks. Port number: 137(UDP) (name services), 138(UDP) (datagram services), 139(TCP) (session services) For more information, see: Impact: High Resolution: This service must be accessible to all end users. 2-10

Cisco IronPort Email Security Plug-in 7.4 Administrator Guide

Cisco IronPort Email Security Plug-in 7.4 Administrator Guide Cisco IronPort Email Security Plug-in 7.4 Administrator Guide October 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408

More information

Cisco Email Security Plug-in 7.5 Administrator Guide

Cisco Email Security Plug-in 7.5 Administrator Guide Cisco Email Security Plug-in 7.5 Administrator Guide July 9, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Release Notes for Cisco IronPort Email Security Plug-in 7.3.1

Release Notes for Cisco IronPort Email Security Plug-in 7.3.1 Release Notes for Cisco IronPort Email Security Plug-in 7.3.1 Revised: September 18, 2013 Contents These release notes contain information critical to installing and running the Cisco IronPort Email Security

More information

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1 First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

Cisco Unified Communications Self Care Portal User Guide, Release 10.5(1)

Cisco Unified Communications Self Care Portal User Guide, Release 10.5(1) Cisco Unified Communications Self Care Portal User Guide, Release 10.5(1) Unified Communications Self Care Portal 2 Unified Communications Self Care Settings 2 Phones 4 Additional Settings 12 Revised:

More information

IronPort Plug-in for Outlook VERSION 1.8 ADMINISTRATOR GUIDE

IronPort Plug-in for Outlook VERSION 1.8 ADMINISTRATOR GUIDE IronPort Plug-in for Outlook VERSION 1.8 ADMINISTRATOR GUIDE COPYRIGHT Copyright 2007 by IronPort Systems Inc. All rights reserved. Part Number: 421-0065B Revision Date: October 23, 2007 The IronPort logo,

More information

Cisco Registered Envelope Recipient Guide

Cisco Registered Envelope Recipient Guide September 8, 2008 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number:

More information

Sample Configuration: Cisco UCS, LDAP and Active Directory

Sample Configuration: Cisco UCS, LDAP and Active Directory First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Cisco Jabber for Windows 10.5 Advanced Features Guide

Cisco Jabber for Windows 10.5 Advanced Features Guide First Published: August 14, 2014 Last Modified: August 26, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1 Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1 Software Release Notes May 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation 2 New features

More information

Cisco TelePresence VCR Converter 1.0(1.8)

Cisco TelePresence VCR Converter 1.0(1.8) Cisco TelePresence VCR Converter 1.0(1.8) Software release notes D14725.02 February 2011 Contents Contents Document revision history... 3 Introduction... 4 New features in version 1.0(1.8)... 5 Convert

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0 Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0 Software Release Notes May 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation 1 New features

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server TelePresence Migrating TelePresence Management Suite (TMS) to a New Server THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

More information

Release Notes for Cisco IronPort Email Security Plug-in 7.2

Release Notes for Cisco IronPort Email Security Plug-in 7.2 Release Notes for Cisco IronPort Email Security Plug-in 7.2 Revised: October 12, 2011 Contents These release notes contain information critical to installing and running the Cisco IronPort Email Security

More information

Cisco Collaboration with Microsoft Interoperability

Cisco Collaboration with Microsoft Interoperability Cisco Collaboration with Microsoft Interoperability Infrastructure Cheatsheet First Published: June 2016 Cisco Expressway X8.8 Cisco Unified Communications Manager 10.x or later Microsoft Lync Server 2010

More information

Cisco TelePresence Management Suite Provisioning

Cisco TelePresence Management Suite Provisioning Cisco TelePresence Management Suite Provisioning Troubleshooting guide D14427.03 December 2010 Introduction Table of Contents Introduction... 3 Provisioning logs... 4 Cisco TMS provisioning directory logs...

More information

Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0

Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0 Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0 Ports 2 Virtualization Experience Media Engine 2 Virtualization Experience Client Manager 3 Cisco Jabber

More information

Cisco TelePresence VCR MSE 8220

Cisco TelePresence VCR MSE 8220 Cisco TelePresence VCR MSE 8220 Getting started 61-0008-05 Contents General information... 3 About the Cisco TelePresence VCR MSE 8220... 3 Port and LED location... 3 LED behavior... 4 Installing the VCR

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Cisco TelePresence MCU Accessing Conferences

Cisco TelePresence MCU Accessing Conferences Cisco TelePresence MCU Accessing Conferences Getting started 14523.02 Contents Introduction... 3 Calling in to conferences... 4 Dialing in using a hardware video endpoint... 4 Dialing in using a software

More information

Cisco Unified Workforce Optimization

Cisco Unified Workforce Optimization Cisco Unified Workforce Optimization Desktop Requirements Guide Version 10.5 First Published: June 18, 2014 Last Updated: March 6, 2015 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS

More information

QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000)

QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000) QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

FireSIGHT User Agent Configuration Guide

FireSIGHT User Agent Configuration Guide Version 2.2 August 20, 2015 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL

More information

Cisco TelePresence Management Suite 15.0

Cisco TelePresence Management Suite 15.0 Cisco TelePresence Management Suite 15.0 Software Release Notes July 2015 Product Documentation The following documents provide guidance on installation, initial configuration, and operation of the product:

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Accessibility Guidelines for Cisco Unified Contact Center Management Portal

Accessibility Guidelines for Cisco Unified Contact Center Management Portal Accessibility Guidelines for Cisco Unified Contact Center Management Portal Release 8.0(1) February 2010 Corporate Headquarters Cisco System s, Inc. 170 West Tasman D riv e San Jose, CA 95134-1706 USA

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.3

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.3 Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.3 Software Release Notes Revised September 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation

More information

Cisco Registered Envelope Service 4.4 Recipient Guide

Cisco Registered Envelope Service 4.4 Recipient Guide Cisco Registered Envelope Service 4.4 Recipient Guide March 21, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Cisco Registered Envelope Recipient Guide

Cisco Registered Envelope Recipient Guide February, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number:

More information

Cisco Registered Envelope Service 4.3 Recipient Guide

Cisco Registered Envelope Service 4.3 Recipient Guide Cisco Registered Envelope Service 4.3 Recipient Guide December 6, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

IBM Aspera Add-in for Microsoft Outlook 1.3.2

IBM Aspera Add-in for Microsoft Outlook 1.3.2 IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6

More information

QUICK START GUIDE. Cisco C170 Email Security Appliance

QUICK START GUIDE. Cisco C170 Email Security Appliance 1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

OUTLOOK ADDIN V1.5 ABOUT THE ADDIN

OUTLOOK ADDIN V1.5 ABOUT THE ADDIN OUTLOOK ADDIN V1.5 ABOUT THE ADDIN The SpamTitan Outlook Addin v1.5 allows reporting of SPAM and HAM messages to the SpamTitan appliance, these messages are then examined by the SpamTitan Bayesian filter

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

Replacing MCU Software with TelePresence Server Software on Cisco TelePresence MCU 5300 Series. Last Updated: February 2016

Replacing MCU Software with TelePresence Server Software on Cisco TelePresence MCU 5300 Series. Last Updated: February 2016 Replacing MCU Software with TelePresence Server Software on Cisco TelePresence MCU 5300 Series Last Updated: February 2016 Cisco Systems, Inc. www.cisco.com Preface Change History Table 1 Replacing MCU

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

User Guide for the Cisco Unity Connection Phone Interface (Release 8.x)

User Guide for the Cisco Unity Connection Phone Interface (Release 8.x) User Guide for the Cisco Unity Connection Phone Interface (Release 8.x) First Published: February 02, 2010 Last Modified: November 16, 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

IT Administrator Guide for Mass Deployment of WebEx Productivity Tools. Installation Guide for Administrators

IT Administrator Guide for Mass Deployment of WebEx Productivity Tools. Installation Guide for Administrators IT Administrator Guide for Mass Deployment of WebEx Productivity Tools Installation Guide for Administrators COPYRIGHT 1997-2015. Cisco and/or its affiliates. All rights reserved. WEBEX, CISCO, Cisco WebEx,

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Cisco IOS Flexible NetFlow Command Reference

Cisco IOS Flexible NetFlow Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Enabling Single Sign- On for Common Identity using F5

Enabling Single Sign- On for Common Identity using F5 Enabling Single Sign- On for Common Identity using F5 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Adaptive Log Exporter Users Guide

Adaptive Log Exporter Users Guide IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,

More information

CISCO TELEPRESENCE MANAGEMENT SUITE EXTENSION

CISCO TELEPRESENCE MANAGEMENT SUITE EXTENSION You can read the recommendations in the user guide, the technical guide or the installation guide for CISCO TELEPRESENCE MANAGEMENT SUITE EXTENSION 2.2. You'll find the answers to all your questions on

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

Dell Client Profile Updating Utility 5.5.6

Dell Client Profile Updating Utility 5.5.6 Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System

More information

Zimbra Connector for Outlook Administrator Guide

Zimbra Connector for Outlook Administrator Guide With the Zimbra Collaboration Suite Connector for Outlook (ZCO), users can use Microsoft Outlook 2003 and 2007 to access the Zimbra Collaboration Suite server and synchronize data with Outlook for offline

More information

IceWarp Outlook Connector 4 User Guide

IceWarp Outlook Connector 4 User Guide IceWarp Unified Communications IceWarp Outlook Connector 4 User Guide Version 10.3 Printed on 23 February, 2011 Contents IceWarp Outlook Connector 4 1 Installing IceWarp Connector... 2 Pre-Installation

More information

EMC Data Domain Management Center

EMC Data Domain Management Center EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Merak Outlook Connector User Guide

Merak Outlook Connector User Guide IceWarp Server Merak Outlook Connector User Guide Version 9.0 Printed on 21 August, 2007 i Contents Introduction 1 Installation 2 Pre-requisites... 2 Running the install... 2 Add Account Wizard... 6 Finalizing

More information

IT Administrator Guide for Mass Deployment of WebEx Productivity Tools

IT Administrator Guide for Mass Deployment of WebEx Productivity Tools IT Administrator Guide for Mass Deployment of WebEx Productivity Tools Version 2.0 COPYRIGHT 1997-2010 Cisco and/or its affiliates. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the

More information

Cisco Prime Central Managing Certificates

Cisco Prime Central Managing Certificates Cisco Prime Central Managing Certificates Version 1.0.5 September, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

GFI Product Manual. Outlook Connector User Manual

GFI Product Manual. Outlook Connector User Manual GFI Product Manual Outlook Connector User Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no

More information

Integrating CAD with Thin Client and Virtual Desktop Environments

Integrating CAD with Thin Client and Virtual Desktop Environments Integrating CAD with Thin Client and Virtual Desktop Environments CAD for Cisco Unified Contact Center Express, releases 6.2 10.5 CAD for Cisco Unified Contact Center Enterprise, releases 7.0 10.0 First

More information

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

CA Spectrum and CA Service Desk

CA Spectrum and CA Service Desk CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

Zimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0

Zimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0 Zimbra Connector for Microsoft Outlook User Guide Network Edition 7.0 February 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

Configuring, Customizing, and Troubleshooting Outlook Express

Configuring, Customizing, and Troubleshooting Outlook Express 3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

Creating a Content Group and assigning the Encrypt action to the Group.

Creating a Content Group and assigning the Encrypt action to the Group. Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

Zimbra Connector for Outlook Administrator Guide

Zimbra Connector for Outlook Administrator Guide With the Zimbra Collaboration Suite Connector for Outlook (ZCO), users can use Microsoft Outlook 2003, 2007, and 2010 (32-bit) to access the Zimbra Collaboration Suite server and synchronize data with

More information

Outlook Add-in Deployment Guide

Outlook Add-in Deployment Guide Outlook Add-in Deployment Guide Sophos TOC 3 Contents Introduction...4 Prerequisites...4 Installation...4 Downloading the Outlook Add-in...5 Installing the Add-in on a Single Workstation...5 Installing

More information

Zimbra Connector for Outlook User Guide. Release 6.0

Zimbra Connector for Outlook User Guide. Release 6.0 Zimbra Connector for Outlook User Guide Release 6.0 Network Edition August 2010 Legal Notices Copyright 2005-2010 Zimbra, Inc. All rights reserved. Zimbra and the Zimbra logo are trademarks of Zimbra.

More information

Cisco Unified Workforce Optimization

Cisco Unified Workforce Optimization Cisco Unified Workforce Optimization Workforce Management Application User Guide Version 9.0(1) First Published: June 15, 2012 Last Modified: March 7, 2013 Americas Headquarters Cisco Systems, Inc. 170

More information

Using Entrust certificates with Microsoft Office and Windows

Using Entrust certificates with Microsoft Office and Windows Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1)

Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1) Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1) First Published: June 21, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA

More information

Release Notes for Cisco IronPort Email Security Plug-in 7.1

Release Notes for Cisco IronPort Email Security Plug-in 7.1 Release Notes for Cisco IronPort Email Security Plug-in 7.1 Revised: December 10, 2010 Contents These release notes contain information critical to upgrading and running the Cisco IronPort Email Security

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

SpamTitan Outlook Addin V2.0

SpamTitan Outlook Addin V2.0 SpamTitan Outlook Addin V2.0 The SpamTitan Outlook Addin v2.0 allows users to do a varity of spam filtering management from the outlook client, including Report Spam and Ham messages to the SpamTitan Bayesian

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

www.novell.com/documentation User Guide Novell iprint 1.1 March 2015

www.novell.com/documentation User Guide Novell iprint 1.1 March 2015 www.novell.com/documentation User Guide Novell iprint 1.1 March 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Version 1.7. Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide. Last updated October 2011

Version 1.7. Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide. Last updated October 2011 Version 1.7 Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide Last updated October 2011 1 Introduction and Overview... 1 2 The Case for Email monitoring... 2 3 Installation

More information

Zimbra Connector for Microsoft Outlook User Guide 7.1

Zimbra Connector for Microsoft Outlook User Guide 7.1 Zimbra Connector for Microsoft Outlook User Guide 7.1 March 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual

More information

Cisco Expressway IP Port Usage for Firewall Traversal. Cisco Expressway X8.1 D15066.01 December 2013

Cisco Expressway IP Port Usage for Firewall Traversal. Cisco Expressway X8.1 D15066.01 December 2013 Cisco Expressway IP Port Usage for Firewall Traversal Cisco Expressway X8.1 D15066.01 December 2013 Contents: Cisco Expressway IP port usage Which IP ports are used with Cisco Expressway? Which IP ports

More information