Cyberoam Anti Spam Implementation Guide Version 9
|
|
- Madlyn Cameron
- 8 years ago
- Views:
Transcription
1 Cyberoam Anti Spam Implementation Guide Version 9 Document version /10/2006
2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Elitecore assumes no responsibility for any errors that may appear in this document. Elitecore reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice. USER S LICENSE The Appliance described in this document is furnished under the terms of Elitecore s End User license agreement. Please read these terms and conditions carefully before using the Appliance. By using this Appliance, you agree to be bound by the terms and conditions of this license. If you do not agree with the terms of this license, promptly return the unused Appliance and manual (with proof of payment) to the place of purchase for a full refund. LIMITED WARRANTY Software: Elitecore warrants for a period of ninety (90) days from the date of shipment from Elitecore: (1) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (2) the Software substantially conforms to its published specifications except for the foregoing, the software is provided AS IS. This limited warranty extends only to the customer as the original licenses. Customers exclusive remedy and the entire liability of Elitecore and its suppliers under this warranty will be, at Elitecore or its service center s option, repair, replacement, or refund of the software if reported (or, upon, request, returned) to the party supplying the software to the customer. In no event does Elitecore warrant that the Software is error free, or that the customer will be able to operate the software without problems or interruptions. Elitecore hereby declares that the anti virus and anti spam modules are powered by Kaspersky Labs and the performance thereof is under warranty provided by Kaspersky Labs. It is specified that Kaspersky Lab does not warrant that the Software identifies all known viruses, nor that the Software will not occasionally erroneously report a virus in a title not infected by that virus. Hardware: Elitecore warrants that the Hardware portion of the Elitecore Products excluding power supplies, fans and electrical components will be free from material defects in workmanship and materials for a period of One (1) year. Elitecore's sole obligation shall be to repair or replace the defective Hardware at no charge to the original owner. The replacement Hardware need not be new or of an identical make, model or part; Elitecore may, in its discretion, replace the defective Hardware (or any part thereof) with any reconditioned product that Elitecore reasonably determines is substantially equivalent (or superior) in all material respects to the defective Hardware. DISCLAIMER OF WARRANTY Except as specified in this warranty, all expressed or implied conditions, representations, and warranties including, without limitation, any implied warranty or merchantability, fitness for a particular purpose, non-infringement or arising from a course of dealing, usage, or trade practice, and hereby excluded to the extent allowed by applicable law. In no event will Elitecore or its supplier be liable for any lost revenue, profit, or data, or for special, indirect, consequential, incidental, or punitive damages however caused and regardless of the theory of liability arising out of the use of or inability to use the product even if Elitecore or its suppliers have been advised of the possibility of such damages. In the event shall Elitecore s or its supplier s liability to the customer, whether in contract, tort (including negligence) or otherwise, exceed the price paid by the customer. The foregoing limitations shall apply even if the above stated warranty fails of its essential purpose. In no event shall Elitecore or its supplier be liable for any indirect, special, consequential, or incidental damages, including, without limitation, lost profits or loss or damage to data arising out of the use or inability to use this manual, even if Elitecore or its suppliers have been advised of the possibility of such damages. RESTRICTED RIGHTS Copyright 2000 Elitecore Technologies Ltd. All rights reserved. Cyberoam, Cyberoam logo are trademark of Elitecore Technologies Ltd. Information supplies by Elitecore Technologies Ltd. Is believed to be accurate and reliable at the time of printing, but Elitecore Technologies assumes no responsibility for any errors that may appear in this documents. Elitecore Technologies reserves the right, without notice, to make changes in product design or specifications. Information is subject to change without notice CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad , INDIA Phone: Fax: Web site:
3 Contents Guide Sets...4 Technical Support...5 Typographic Conventions...6 Overview...7 Spam...7 Cyberoam Gateway Anti Spam...8 Enable Scanning...9 Spam Policy...9 Types of Policies...9 Detection of spam attributes...10 Actions...10 Global policy...11 Default policy...11 Custom policy...12 Create Custom Scan policy...12 Manage Custom Spam policy...13 Add Advanced Rules...14 Change Advanced action rules Order...18 Delete Custom Spam policy...19 Address Groups...20 Create Address Groups...20 Delete Address Groups...21 Delete individual address from Group...22 Spam Rule...23 Create Spam rule...23 Delete Spam Rule...24 Change Spam rule Order...25 Local Domains...26 Add Domains...26 Delete Domains...26 General Configuration...27 Bypass Reporting
4 Guide Sets Guide User Guide Console Guide Windows Client Guide Linux Client Guide HTTP Client Guide Analytical Tool Guide LDAP Integration Guide ADS Integration Guide PDC Integration Guide RADIUS Integration Guide High Availability Configuration Guide Multi Link Manager User Guide VPN Management Cyberoam IDP Implementation Guide Cyberoam Anti Virus Implementation Guide Cyberoam Anti Spam Implementation Guide Describes Console Management Installation & configuration of Cyberoam Windows Client Installation & configuration of Cyberoam Linux Client Installation & configuration of Cyberoam HTTP Client Using the Analytical tool for diagnosing and troubleshooting common problems Configuration for integrating LDAP with Cyberoam for external authentication Configuration for integrating ADS with Cyberoam for external authentication Configuration for integrating PDC with Cyberoam for external authentication Configuration for integrating RADIUS with Cyberoam for external authentication Configuration of High Availability (HA) Configuration of Multiple Gateways, load balancing and failover Implementing and managing VPN Configuring, implementing and managing Intrusion Detection and Prevention Configuring and implementing anti virus solution Configuring and implementing anti spam solution 4
5 Technical Support You may direct all questions, comments, or requests concerning the software you purchased, your registration status, or similar issues to Customer care/service department at the following address: Corporate Office elitecore Technologies Ltd. 904, Silicon Tower Off C.G. Road Ahmedabad Gujarat, India. Phone: Fax: Web site: Cyberoam contact: Technical support (Corporate Office): Web site: Visit for the regional and latest contact information. 5
6 Typographic Conventions Material in this manual is presented in text, screen displays, or command-line notation. Item Convention Example Server Client User Username Part titles Bold and shaded font typefaces Machine where Cyberoam Software - Server component is installed Machine where Cyberoam Software - Client component is installed The end user Username uniquely identifies the user of the system Report Topic titles Shaded font typefaces Introduction Subtitles Bold & Black typefaces Notation conventions Navigation link Bold typeface Group Management Groups Create it means, to open the required page click on Group management then on Groups and finally click Create tab Name of a particular parameter / field / command button text Cross references Lowercase italic type Hyperlink in different color Enter policy name, replace policy name with the specific name of a policy Or Click Name to select where Name denotes command button text which is to be clicked refer to Customizing User database Clicking on the link will open the particular topic Notes & points to remember Prerequisites Bold typeface between the black borders Bold typefaces between the black borders Note Prerequisite Prerequisite details 6
7 Overview Welcome to Cyberoam s Anti Spam User guide. Cyberoam is an Identity-based UTM Appliance. Cyberoam s solution is purpose-built to meet the security needs of corporates, government organizations, and educational institutions. Cyberoam s perfect blend of best-of-breed solutions includes User based Firewall, Content filtering, Anti Virus, Anti Spam, Intrusion Detection and Prevention (IDP), and VPN. Cyberoam provides increased LAN security by providing separate port for connecting to the publicly accessible servers like Web server, Mail server, FTP server etc. hosted in DMZ which are visible the external world and still have firewall protection. Cyberoam Anti Spam as a part of unified solution along with Anti Virus and IDP (Intrusion Detection and Prevention), provides real time virus and spam scanning. Anti Spam module is an add-on module which needs to be subscribed before use. Refer to Licensing section for details on registration. Spam Spam refers to electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited . Spamming is to indiscriminately send unsolicited, unwanted, irrelevant, or inappropriate messages, especially commercial advertising in mass quantities. In other words, it is an inappropriate attempt to use a mailing list, or other networked communications facility as a broadcast medium by sending the same message to a large number of people who did not ask for it. In addition to being a nuisance, it also eats up a lot of network bandwidth. Because the Internet is a public network, little can be done to prevent spam, just as it is impossible to prevent junk mail. However, the use of software filters in programs can be used to remove most spam sent through to certain extent. With the number of computer users growing and the exchange of information via the Internet and increases in volume, spamming has become an almost everyday occurrence. Apart from network bandwidth, it also affects the employees productive as deletion of such mails is a huge task. Anti spam protection is therefore a priority for anyone who uses a computer. 7
8 Cyberoam Gateway Anti Spam Cyberoam Gateway Anti Spam provides you with powerful tools for scanning and detecting spam in the traffic. Cyberoam Gateway Anti Spam inspects all incoming s - SMTP, POP3 and IMAP traffic - before the messages are delivered to the receiver's mail box. If spam is detected, depending on the policy and rules set, s are processed and delivered to the recipient unaltered, reject and generate a notification on the message rejection, add or change subject or change the receiver. Cyberoam Gateway Anti Spam is fully compatible with all the mail systems and therefore can be easily integrated into the existing network. Cyberoam Anti Spam allows to: Scan messages for spamming by protocols namely SMTP, POP3, IMAP Monitors mails received from Domain/IP address Detect spam mails using RBLs Accept/Reject messages based on message size and message header Customize protection of incoming and outgoing messages by defining scan policies Set different actions for SMTP, POP and IMAP spam mails Configure action for individual address Notify receivers about spam messages 8
9 Enable Scanning Enable anti-spam scanning using firewall rules. While anti-spam settings can be configured for system-wide use, they can also be implemented with specific settings on a per user basis. Refer to Cyberoam User Guide, Firewall section for creating firewall rules for enabling the anti-spam scanning. You can enable anti spam scanning by creating firewall rule for: Zone User/User Group Host/Host Group By enabling scanning through firewall, you can customize levels of protection. For example, while traffic between LAN and WAN might need strict protection, traffic between trusted internal addresses might need moderate protection. Hence you can enable/disable scanning for particular combination of source and destination IP address or domain. Spam Policy As soon as you register Cyberoam Gateway Anti-spam module, default spam policy is applicable to all the incoming traffic. Default spam policy is the general policy and not fit-for-all policy and hence might allow certain spam mails while block certain required mails also. Fine tuning the policies means reducing the spam attacks and chances of loosing any important and required mails. Spam policy defines what action is to be taken if the mail is identified as a spam and to which address the copy of mail is to be send. As network scanning rules control all the traffic passing through the Cyberoam and decide whether to scan or bypass mail, policy will be applied to that traffic only that is filtered by network scanning rule. Types of Policies 1. Global Global policy is applicable to all the users. Cyberoam provides blank corporate policy which can be customized as per the requirement. 2. Default Default policy is applicable to all the users except for those users for whom the personal policy is defined. Default policy is applicable to all the users as soon as you register the Anti Spam module. 3. Custom/Personal Cyberoam allows defining custom policy as per the individual user requirement. Custom user policy is applicable to only that user for whom the policy is created. Scanning rules defines which scanning policy is to be applied to which recipient address i.e. maps scanning policy to the address. 9
10 Detection of spam attributes Cyberoam uses content filtering and three RBLs - Real time Black hole Lists to check for the spam attributes: Message size Message header Premium RBL Reliable RBL Standard RBL RBL is a list of IP addresses whose owners refuse to stop the proliferation of spam i.e. are responsible for spam or are hijacked for spam relay. Cyberoam will check each RBL for the connecting IP address. If the IP address matches to the one on the list then the specified action in policy is taken. Actions Accept Accepts and delivers the mail to the intended receiver. This action can be defined for both SMTP and POP/IMAP protocols. Reject Rejects the mail. This action sends the notification message to sender. This action can be defined only for SMTP protocol. Drop Drops the mail. This action does not send any notification message to sender. This action can be defined only for SMTP protocol. Change Recipient - Accepts the mail but delivers the mail to the specified receiver and not to the receiver for whom the mail was originally send. This action can be defined only for SMTP protocol only. Prefix Subject Accepts and delivers the mail to the intended receiver but after changing the subject of the mail. You can customize the subject in such a way that the receiver knows that the mail is a spam mail. This action can be defined for both SMTP and POP/IMAP protocols. 10
11 Global policy Cyberoam provides the blank global policy which can be customized as per your requirement. By default, global policy applies to all the users. There is no need to apply the global policy to the users using rules. Select Anti Spam Spam Policy Global policy to customize policy. Refer to Add advanced rules for more details. Default policy Cyberoam provides a blank default policy which can be customized as per your requirement. Default policy will be applied to those users only for whom custom/personal policy is not defined. Select Anti Spam Spam Policy Default policy to customize policy. Refer to Add advanced rules for more details. 11
12 Custom policy Custom scan policy allows you to specify the spam filtering level security i.e. action severity based on your requirement. Create Custom Scan policy Select Anti Spam Spam policy Create Custom policy to open the create page Screen - Create Custom Spam policy Screen Elements Spam Policy details Name Policy Description Send copy to address Create button Cancel button Add button Description Specify policy name. Choose a name that best describes the policy Specify full description of the policy Specify addresses to which the mail copy is to be send. More than one address can be specified using comma For example john@hotmail.com,,joe@yahoo.com This option can be applied for SMTP protocol only Creates the policy. Cancels the current operation If the policy is successfully created, create advanced scanning rules to specify what action is to be taken on mail identified as SPAM after successful creation of the policy. Refer to Manage Custom Policy for more detail for defining actions. Table Create Custom Spam policy screen elements 12
13 Manage Custom Spam policy Select Anti Spam Spam Policy Manage Custom policy to view the list of policies created. Click the policy to be modified. Screen Manage Custom Spam policy Screen Elements Spam Policy details Name Policy Description Send copy to address Description Displays policy name Displays full description of the policy, modify if required Displays addresses to which the mail copy will be send, modify if required. More than one address can be specified using comma For example Update button Cancel button Advanced Rules Advanced Rules This option can be applied for SMTP protocol only. Updates and saves modifications done in any of the above fields Cancels the current operation 13
14 Screen Elements Add button Delete button Create button Cancel button Description Click to define the action to be taken on mails if the matching condition is found. Refer Add Advanced Rules for details. Allows to delete the condition Select the condition to be deleted and click delete Saves the action rule Cancels the current operation Table Manage Custom Spam policy screen elements Add Advanced Rules Select Anti Spam Spam Policy Manage Custom policy to view the list of policies created. Click the policy to which action rules are to be added. 14
15 Conditions When Cyberoam Anti Spam identifies Mail as SPAM, Cyberoam accepts and delivers the mail to the intended receiver but only after adding a prefix SPAM to the original subject of the mail. Original subject: This is a test Receiver will receive the mail with subject line as: SPAM: This is a test You can customize the subject in such a way that the receiver knows that the mail is a spam mail. To specify the contents to be prefixed to the existing subject line, select Prefix Subject as action. You can set different actions for SMTP and POP. When Cyberoam Anti Spam identifies Mail as PROBABLE SPAM, Cyberoam accepts and delivers the mail to the intended receiver but after adding a prefix PROBABLE SPAM to the original subject of the mail. Original subject: This is a test Receiver will receive the mail with subject line as: PROBABLE SPAM: This is a test You can customize the subject in such a way that the receiver knows that the mail is a spam mail. To specify the contents to be prefixed to the existing subject line, select Prefix Subject as action. You can set different actions for SMTP and POP. From Address/IP address Specified action will be taken if the mail sender or IP address matches the specified address or IP address. You can set action for SMTP only. From Address/IP address Specified action will be taken if the mail sender or IP address belongs to the specified address or IP address group. You can set action for SMTP only. 15
16 Message Size - Specified action will be taken if the mail size matches the specified size. You can set different actions for SMTP and POP. Message Header - Specified action will be taken if the message header contains the specified text. You can set different actions for SMTP and POP. You can scan message header for spam in: Subject Specified action will be taken if the header contains the matching subject From - Specified action will be taken if the header contains the matching text in the From address. To - Specified action will be taken if the header contains the matching text in the To address. X-Mailer X-Mailer identifies the software that created the message i.e. client. Header section of message contains X-Mailer information. This allows you to scan and detect spam based on client and specify action for a particular client. For example, if you want to scan and reject messages created using Outlook Express then specify X-Mailer as Microsoft Outlook Express and action as Reject X-Spam Test Method X-Spam Test Method displays the method name which is used for spam identification. Anti spam solutions use various methods to detect spam and after scanning add the X Spam Test Method tag along with the method name in the mail header. This scanning method can be used only if Cyberoam receives the tagged mail which is already scanned by some other anti spam solution and you know the method name. X-Spam Test Categories - X-Spam Test Categories displays the category name under which the mail is detected as SPAM. If Anti Spam solution uses content filtering method to detect spam then it added X Spam Test Categories tag along with the category name under which the mail is detected as spam in the mail header. This scanning method can be used only if Cyberoam receives the tagged mail which is already scanned by some other anti spam solution and you know the category name. Others Specified action will be taken if the matching text is found in the header RBL - Specified action will be taken if the sender is listed in the specified RBL Group Actions Following actions can be taken on the mail identified as the SPAM Reject Cyberoam will reject the message and send the rejection notification to the mail sender. This action can be applied to SMTP protocol only. Drop Cyberoam will reject the message but no notification will be send. This action can be applied to SMTP protocol only. Accept Cyberoam will accept and deliver the message to the intended receiver Change Recipient Cyberoam will accept the message but will not deliver to the receiver for whom the message was originally send. Message will be send to the specified receiver. This action can be applied to SMTP protocol only. Prefix Subject Cyberoam will accept and deliver the message to the intended receiver but only after changing the subject of the message. You can customize the subject in such a way 16
17 that the receiver knows that the mail is a spam mail. Specify the contents to be prefixed to the existing subject line. For Example Contents to be prefixed to the original subject: Spam notification from Cyberoam Original subject: This is a test Receiver will receive the mail with subject line as: Spam notification from Cyberoam - This is a test 17
18 Change Advanced action rules Order Advanced action rules are ordered by their priority. When the rules are applied, they are processed from the top downwards and the first suitable rule found is applied. Hence, while adding multiple rules, it is necessary to put strict rules before moderate and general rules. Select Anti Spam Manage Custom policy to view the list of policies created. Click the policy whose action rule order is to be changed. Click the rule whose order is to be changed Click Move Up to move the selected rule one-step up Click Move Down to move the selected rule one-step down Click Update Order to save the order 18
19 Delete Custom Spam policy Prerequisite Not assigned any Rule Select Anti Spam Spam policy Manage Custom policy to view the list of policies created Screen Delete Custom Spam policy Screen Elements Del Description Select policy for deletion Click Del to select Select All Delete button More than one policy can also be selected Select all the policies for deletion Click Select All to select all the policies Deletes all the selected policy/policies Table Delete Custom Spam policy screen elements Note Default policy cannot be deleted. 19
20 Address Groups Scanning rule can be defined for individual or group of address IP address RBL (Real time black hole List) Address group is the group of addresses, IP addresses, or RBLs. Whenever the policy is applied to the address group, policy is applied to all the addresses included in the group. RBL is a list of IP addresses whose owners refuse to stop the proliferation of spam i.e. are responsible for spam or are hijacked for spam relay. This IP addresses might also be used for spreading virus. Cyberoam will check each RBL for the connecting IP address. If the IP address matches to the one on the list then the specified action in policy is taken. Create Address Groups Select Anti Spam Configuration Address Groups to open the Address group page. Click Create to open the create page. Screen Create Address Group 20
21 Screen Elements Address Group details Name Group Description Specify group name Can be any combination of A Z, a z, _, 0-9 Specify group type. You can create group of RBLs, IP address or address. RBL is a list of IP addresses whose owners refuse to stop the proliferation of spam i.e. are responsible for spam or are hijacked for spam relay. Description Create button Cyberoam will check each RBL for the connecting IP address. If the IP address matches to the one on the list then the specified action in policy is taken. Specify full description Allows maximum of 255 characters Can be any combination of A Z, a z, _, 0-9 Creates group and depending on the group type allows adding address, IP addresses or RBL names Click Add Type all the addresses to be grouped specified by comma e.g. Cancel button john@yahoo.com, joe@hotmail.com Cancels the current operation Table Create Address Group screen elements Delete Address Groups Select Anti Spam Configuration Address Groups to view the list of groups created Screen Delete Address Group Screen Elements Del Description Select address group for deletion Click Del to select 21
22 Select All Delete button More than one address group can also be selected Select all the address group for deletion Click Select All to select all the address groups Deletes all the selected address groups Table Delete Address Group screen elements Delete individual address from Group Select Anti Spam Configuration Address Groups to view the list of groups created. Click the group from which the address is to be deleted Screen Delete Address from Group Screen Elements Delete Description Select address for deletion Click Delete to select Select All Delete button More than one address can also be selected Select all the address for deletion Click Select All to select all the address Deletes all the selected address Table Delete Address from Group screen elements 22
23 Spam Rule Scanning rules defines which scanning policy is to be applied to which recipient address i.e. map scanning policy with the address. A rule allows to apply: single policy for a address or group of addresses multiple policies for a particular address or group of addresses Create Spam rule Prerequisite Policy created Address group created (if rule is for group) Select Anti Spam Spam Rules to open the create page Screen - Create Spam Rule Screen Elements Spam Rule Details Action Item Description Select whether the rule is for individual address or group Specify address or select the Address Group 23
24 Screen Elements Description Recipient Address Address Group Policy Name Add button Cancel button Specify recipient address If the rule is for the complete domain the specify Specify address group Specify policy to be applied. According to the action specified in the policy, mails will be delivered as original or will be tagged and forwarded to the receiver. Creates rule Cancels the current operation Table Create Spam Rule screen elements Delete Spam Rule Select Anti Spam Spam Rules to view the list of rules created. Screen - Delete Spam Rule Screen Elements Del Description Select rule for deletion Click Del to select Select All More than one rule can also be selected Select all the rules for deletion Click Select All to select all the rules Delete button Deletes all the selected rules Table Delete Spam Rule screen elements 24
25 Change Spam rule Order Rules are ordered by their priority. When the rules are applied, they are processed from the top downwards and the first suitable rule found is applied. Hence, while adding multiple rules, it is necessary to put strict rules before moderate and general rules. Default policy order cannot be changes. Select Anti Spam Spam Rules Click the rule whose order is to be changed Click Move Up to move the selected rule one-step up Click Move Down to move the selected rule one-step down Click Update to save the order 25
26 Local Domains Cyberoam also allows bypassing RBL scanning of mails for certain domains. For this, you have to define the domains as the trusted domains. Add Domains Select Anti Spam Configuration Local Domains Type Domain name or IP address Click Add Mails from the specified domains will not be scanned for RBLs. Delete Domains Select Anti Spam Configuration Local Domain to view the list of domains that will be bypassed from RBL scanning Screen Elements Del Description Select domain for deletion Click Del to select Select All Delete button More than one domain can also be selected Select all the domains for deletion Click Select All to select all the domains Deletes all the selected domains 26
27 General Configuration Select Anti Spam Configuration General Configuration to open the configuration page Screen Elements Description Anti Spam Engine information Displays the Anti Spam Engine and Anti Spam Definitions data base version installed and being used. It also displays when it was last updated. Cyberoam detects spam using the anti spam definition database which contains currently identified spam signatures/definitions. It is extremely important to update your anti-spam definition database periodically. By default, database updates are automatically downloaded and installed on your computer every 30 minutes. File size restriction SMTP Mails greater than size SMTP Mails greater than size You can update database manually also. Specify file size for scanning. The SMTP mails greater then the specified size will not be scanned. Specify maximum file size for delivery. The SMTP mails greater then the specified size will not be delivered. 27
28 Screen Elements Description POP3/IMAP Mails Specify file size for scanning. greater than size The POP/IMAP mails greater then the specified size will not be scanned. Header to detect recipient for POP3/IMAP Click Add to specify header which should be used for detecting the recipient s address. By default, Cyberoam uses Delivered-To and Received headers. Default headers cannot be deleted 28
29 Bypass Reporting By default, Cyberoam Anti Spam generates reports for all the Internal Domains and Ids. To bypass reporting of certain domains and ids, Administrator has to create an Exclusion domain list and id list. All the domains and ids included in the exclusion list will not be included in the Anti Spam reports. To define the exclusion list, select Reports Configure Local Domains or select Reports Configure Bypass Ids Refer to Reports Guide for the details. 29
Cyberoam Anti Spam Configuration Guide Version 9
Cyberoam Anti Spam Configuration Guide Version 9 Document version 95466-1.0-25/06/2008 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationRadius Integration Guide Version 9
Radius Integration Guide Version 9 Document version 9402-1.0-18/10/2006 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but
More informationCyberoam Anti Spam Implementation Guide Version 9
Cyberoam Anti Spam Implementation Guide Version 9 Document version 96-1.0-12/05/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationCyberoam Anti Virus Implementation Guide Version 9
Cyberoam Anti Virus Implementation Guide Version 9 Document version 9402-1.0-18/10/2006 2 Cyberoam Anti Virus Implementation Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it
More informationHigh Availability Configuration Guide Version 9
High Availability Configuration Guide Version 9 Document version 9402-1.0-08/11/2006 2 HA Configuration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable
More informationADS Integration Guide
ADS Integration Guide Document version 9402-1.0-18/10/2006 Cyberoam ADS Integration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of
More informationHTTP Client Installation Guide Version 9
HTTP Client Installation Guide Version 9 Document version 7300-1.0-9/13/2006 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but
More informationVirtual LAN Configuration Guide Version 9
Virtual LAN Configuration Guide Version 9 Document version 96-1.0-12/05/2009 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationCyberoam Multi link Implementation Guide Version 9
Cyberoam Multi link Implementation Guide Version 9 Document version 96-1.0-12/05/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationCORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com
CYBEROAM LDAP INTEGRATION GUIDE VERSION: 7 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of
More informationCYBEROAM WINDOWS DOMAIN CONTROLLER INTEGRATION GUIDE VERSION:
7300-1.0-9/20/2005 1 CYBEROAM WINDOWS DOMAIN CONTROLLER INTEGRATION GUIDE VERSION: 7 7300-1.0-9/20/2005 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable
More informationSSL VPN Client Installation Guide Version 9
SSL VPN Client Installation Guide Version 9 Document version 96060-1.0-08/10/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationIPSec VPN Client Installation Guide. Version 4
IPSec VPN Client Installation Guide Version 4 Document version - 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationCyberoam IPSec VPN Client Configuration Guide Version 4
Cyberoam IPSec VPN Client Configuration Guide Version 4 Document version 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time
More informationCORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com 7300-1.
CYBEROAM - ADS INTEGRATION GUIDE VERSION: 7 7300-1.0-9/20/2005 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented
More informationSOFTWARE LICENSE LIMITED WARRANTY
CYBEROAM INSTALLATION GUIDE VERSION: 6..0..0..0 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty
More informationCyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Document Version:2.0-12/07/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be
More informationUser Guide Version 9 Document version 9412-1.0-01/03/2007
User Guide Version 9 Document version 9412-1.0-01/03/2007 2 Cyberoam User Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationCyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10
Cyberoam Virtual Security Appliance - Installation Guide for XenServer Version 10 Document Version 10.6.1-01/07/2014 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam Virtual
More informationProduct Release Information
Product Release Information Product: Cyberoam Release Number: 7.4.1 build 0 Compatible versions: 7.4.0 build 2 Release Date: February 7, 2006 Customer Support: For more information or support, please visit
More informationSSL VPN Management Guide Version 10
SSL VPN Management Guide Version 10 Document version 10.00.0302-1.0-09/08/2010 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationUser Guide Version 9.5.8
User Guide Version 9.5.8 Document version 95838-1.0-24/20/2008 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented
More informationSOFTWARE LICENSE LIMITED WARRANTY DISCLAIMER OF WARRANTY RESTRICTED RIGHTS. Corporate Headquarters
CYBEROAM REPORTS VERSION: 6.0.0.0 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind,
More informationVersion: 4.10 Build 010 Date: April, 2008
Version: 4.10 Build 010 Date: April, 2008 Contents Download Client...2 Operating Systems supported...2 Introduction...2 Release 4.10 build 010...2...2 Release 4.10 build 009...2...2 Enhancements...2...2
More informationCyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10
Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi Version 10 Document Version 10.6.2-16/04/2015 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam
More informationThin Client Solution Installation Guide Version 2.0.0.9
Thin Client Solution Installation Guide Version 2.0.0.9 Version 7 Document Version 2.0.0.9-1.0-20/02/2013 Version 7 Version 7 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information
More informationUnified Threat Management
Unified Threat Management QUICK START GUIDE CR35iNG Appliance Document Version: PL QSG 35iNG/96000-10.04.5.0.007/250121014 DEFAULTS Default IP addresses Ethernet Port IP Address Zone A 172.16.16.16/255.255.255.0
More informationDeploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10
Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it
More informationGFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"
More informationContents Firewall Monitor Overview Getting Started Setting Up Firewall Monitor Attack Alerts Viewing Firewall Monitor Attack Alerts
Firewall Monitor Contents Firewall Monitor Overview...1 Getting Started...1 Setting Up Firewall Monitor Attack Alerts...2 Configuring/Editing Attack Alerts...3 Enabling Attack Notification...4 Configuring
More informationPOP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
More informationTrustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
More informationHow To Allow and Block Emails using White or Black List
How To Allow and Block Emails using White or Black List Applicable Version: 10.00 onwards Overview Cyberoam s Anti Spam detects Spam mails by checking IP addresses, Domain, Email addresses or RBL (Real-time
More informationSSL VPN User Guide Version 10
SSL VPN User Guide Version 10 Version 7 Document Version 10.04.5.0007-30/11/2013 Document Version 10.04.4.0028-08/10/2013 Version 7 Version 7 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied
More informationRelease Notes. Release Notes Information. Release Information. Release Date: 22nd September, 2011
Release Notes Release Date: 22nd September, 2011 Release Notes Information Released Firmware Versions: Home Appliance 1000088-20110902-NG11EH SOHO Appliance 200041B-20110902-NG11EO Applicable Versions:
More informationThis document provides information to install X-Spam for Microsoft Exchange Server 2000-2003
This document provides information to install X-Spam for Microsoft Exchange Server 2000-2003 X-Spam for Microsoft Exchange Server 2000-2003 Installation Guide Installation Guide X-Spam for Microsoft Exchange
More informationaxsguard Gatekeeper Internet Redundancy How To v1.2
axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH
More informationCITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING
More informationApplication Note. Intelligent Application Gateway with SA server using AD password and OTP
Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
More informationSonicWALL Email Security User Guide
SonicWALL Email Security User Guide Version 7.2 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Part Number: 232-001701-00
More informationHosted Service Documentation and Limited License Agreement
GETTING STARTED In your web browser go to the link provided by T&T Software. This is a unique link for your organization. For example http://www.i-volunteeronline.com/yourorganization.asp. When you successfully
More informationVCCC Appliance VMware Server Installation Guide
VCCC Appliance VMware Server Installation Guide Content Preface... 4 System Requirements... 4 Installation Procedure... 4 CCC Virtual Machine Installation... 5 CCC Virtual Machine Management... 12 Resource
More informationSelf Help Guides. Create a New User in a Domain
Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,
More informationEmail Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
More informationEmail AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
More informationQuest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering
Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful
More informationTOLEDOTEL INTERNET SERVICE AGREEMENT (As of July, 2014)
TOLEDOTEL INTERNET SERVICE AGREEMENT (As of July, 2014) This agreement sets forth the terms and conditions under which ToledoTel will provide Internet service to you at your home or business. 1. The Service
More informationHP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
More informationWebsite Hosting Agreement
Website Hosting Agreement 6 oak grove avenue This Hosting Contract governs your purchase and use, in any manner, of all Web site hosting services, including the Shared Hosting Services, (collectively,
More informationUsing email over FleetBroadband
Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
More informationDEDICATED SERVER TERMS AND CONDITIONS
01Llink Network Services Limited ("Provider" or "Company") agrees to provide services to the Subscriber ("Client" or "You" or "Customer") subject to the following Terms of Service. 1. Services. 01LINK.NET
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationSonicWALL Email Security User s Guide. Version 7.0
SonicWALL Email Security User s Guide Version 7.0 SonicWALL, Inc. 1143 Borregas Avenue Sunnyvale, CA 94089-1306 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Copyright Notice 2008
More informationHP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
More informationUsing SMTP over BGAN
Using SMTP over BGAN Version 02 10 April 2008 inmarsat.com/bgan Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure its accuracy, Inmarsat
More informationEmail Quick Reference. Administrator Guide
Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationWebsense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
More informationAzure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note
KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies
More informationBlackBerry Mobile Conferencing
BlackBerry Mobile Conferencing BlackBerry Device Software 5.0 User Guide Version: 3.0 SWD-1908281-0130021643-001 Contents Conference call basics... 2 About BlackBerry Mobile Conferencing... 2 Join a conference
More informationMDM Zinc 3.0 End User License Agreement (EULA)
MDM Zinc 3.0 End User License Agreement (EULA) THIS AGREEMENT (or "EULA") IS A LEGAL AGREEMENT BETWEEN THE PERSON, COMPANY, OR ORGANIZATION THAT HAS LICENSED THIS SOFTWARE ("YOU" OR "CUSTOMER") AND MULTIDMEDIA
More informationVPOP3 Your email post office Getting Started Guide
VPOP3 Your email post office Getting Started Guide VPOP3 Getting Started Guide, version 2.1 1 Copyright Statement This manual is proprietary information of Paul Smith Computer Services and is not to be
More informationMailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
More informationSetting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
More informationQuick Start Policy Patrol Mail Security 10
Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
More informationConfiguring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc
Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described
More informationA D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
More informationEmail Gateways Using MDaemon 6.0
Email Gateways Using MDaemon 6.0 Alt-N Technologies, Ltd 1179 Corporate Drive West, #103 Arlington, TX 76006 Tel: (817) 652-0204 2002 Alt-N Technologies. All rights reserved. Product and company names
More informationConfiguring, Customizing, and Troubleshooting Outlook Express
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
More informationCopy Tool For Dynamics CRM 2013
Copy Tool For Dynamics CRM 2013 Page 1 of 15 Copy Tool 2013 Copyright Warranty disclaimer Limitation of liability License agreement Copyright 2013 Dynamics Professional Solutions. All rights reserved.
More informationEmail Encryption. Administrator Guide
Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationComprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
More informationF-Secure Internet Gatekeeper
F-Secure Internet Gatekeeper TOC F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper...5 1.1 Features...6 Chapter 2: Deployment...8 2.1 System requirements...9 2.2
More informationQuest Collaboration Services 3.5. How it Works Guide
Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationCopyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
More informationFAX-TO-EMAIL END-USER LICENSE AGREEMENT
FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company
More informationPolicy Patrol 7 Upgrade Guide
Policy Patrol 7 technical documentation September 4, 2012 www.policypatrol.com If you have Policy Patrol 4, 5 or 6 installed you can upgrade to version 7 and keep your existing configuration. Please follow
More informationSage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
More informationInternet Redundancy How To. Version 8.0.0
Internet Redundancy How To Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. 1.2. 1.3. 1.4. About this Document... Examples used in this Guide... Documentation Sources... About the AXS GUARD...
More informationformerly Help Desk Authority 9.1.3 HDAccess Administrator Guide
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656
More informationEmail Migration Manual (For Outlook Express 6)
Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change
More informationGuardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
More informationHow To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface
How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Configure load sharing and redirect mail server traffic over preferred Gateway
More informationSetting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
More informationTerms and Conditions. Wisconsin Department of Safety and Professional Services Application Hosting Agreement
Terms and Conditions Wisconsin Department of Safety and Professional Services Application Hosting Agreement IMPORTANT READ CAREFULLY: This Terms and Conditions ( Agreement ) is a legal agreement between
More informationEmail Migration Manual (For Outlook 2010)
Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change
More informationAchieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
More informationWebsite & Email Hosting Terms & Conditions
Website & Email Hosting Terms & Conditions 1-PARTIES Web Hosting Services are provided by TimeForCake Creative Media, Inc. ("TimeForCake") to Client conditional on the terms and conditions set forth below
More informationAnti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
More informationTerms and Conditions- OnAER Remote Monitoring Service
Terms and Conditions- OnAER Remote Monitoring Service TERMS OF SERVICE Please read these terms of user ( Agreement or Terms of Service ) carefully before using the services offered by AERCO International,
More informationBarracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
More informationSelf Help Guides. Setup Exchange Email with Outlook
Self Help Guides Setup Exchange Email with Outlook Setting up Exchange Email Connection This document is to be used as a guide to setting up an Exchange Email connection with Outlook; 1. Microsoft Outlook
More informationDefender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationTNote125 Student Locator Framework Email Notification Diagnostics
Technical Note 125 September 25, 2006 TNote125 Student Locator Framework Email Notification Diagnostics The Student Locator Agent uses standard Internet email to notify designated administrators when a
More informationINLINE INGUARD E-MAIL GUARDIAN
INLINE INGUARD E-MAIL GUARDIAN Activation Guide December 8, 2008 600 Lakeshore Parkway, AL 35209 888.3InLine support@inline.com 1 InLine InGuard E-Mail Guardian Activation Guide The InLine InGuard E-Mail
More informationService Launch Guide (US Customer) SEG Filtering
Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required
More informationSonicWALL Email Security Solutions SonicWALL Email Security
SonicWALL Email Security Solutions EMAIL SECURITY SonicWALL Email Security SonicWALL Email Security 6.0 Administrator's Guide Appliance Edition SonicWALL Email Security Administrator s Guide Version 6.0
More informationWeb Hosting Getting Started Guide
Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload
More informationIBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
More information