Address Registration. Administrator Guide
|
|
- Alexander McGee
- 8 years ago
- Views:
Transcription
1 Address Registration Administrator Guide
2 Address Registration Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo and are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. Symantec Corporation 350 Ellis Street Mountain View, CA Clients are advised to seek specialist advice to ensure that they use the Symantec services in accordance with relevant legislation and regulations. Depending on jurisdiction, this may include (but is not limited to) data protection law, privacy law, telecommunications regulations, and employment law. In many jurisdictions, it is a requirement that users of the service are informed of or required to give consent to their being monitored or intercepted for the purpose of receiving the security services that are offered by Symantec. Due to local legislation, some features that are described in this documentation are not available in some countries. Configuration of the Services remains your responsibility and entirely in your control. In certain countries it may be necessary to obtain the consent of individual personnel. Symantec advises you to always check local legislation prior to deploying a Symantec service. You should understand your company s requirements around electronic messaging policy and any regulatory obligations applicable to your industry and jurisdiction. Symantec can accept no liability for any civil or criminal liability that may be incurred by you as a result of the operation of the Service or the implementation of any advice that is provided hereto. The documentation is provided "as is" and all express or implied conditions, representations, and warranties, including any implied warranty of merchantability, fitness for a particular purpose or non-infringement, are disclaimed, except to the extent that such disclaimers are held to be legally invalid. Symantec Corporation shall not be liable for incidental or consequential damages in connection with the furnishing, performance, or use of this documentation. The information that is contained in this documentation is subject to change without notice. Symantec may at its sole option vary these conditions of use by posting such revised terms to the website.
3 Technical support If you need help on an aspect of the security services that is not covered by the online Help or administrator guides, contact your IT administrator or Support team. To find your Support team's contact details in the portal, click Support > Contact us.
4
5 Address Registration This document includes the following topics: About Address Registration Registering addresses step-by-step Locating address registration in the portal Creating an address list in a spreadsheet or text editor Managing registered addresses manually Extracting addresses with the synchronization tool Extracting the address list from a mail server Reviewing an address list Uploading addresses to the infrastructure using the portal Uploading addresses to the infrastructure using the synchronization tool Maintaining an address list Merging or replacing an existing address list Automatic outbound address harvesting Activating Address Registration About Address Registration Address Registration operates at the perimeter of the services infrastructure alongside other protective and validation technologies such as traffic shaping and connection management.
6 6 Address Registration Registering addresses step-by-step Address Registration is used to reject any sent to an address in your domains that does not appear in a database of known valid addresses. Any sent to an unregistered address is not accepted and gives rise to an SMTP 550 error. This error indicates to the sending mail server that the address is invalid. The process involved in using Address Registration is first to define a list of valid addresses, then to upload the addresses to the services infrastructure. You can then review the addresses in the portal. By using Address Registration, you should see a significant drop in detected spam. Warning: You must provide one address list for each domain or subdomain that is provisioned to use the Services. Registering addresses step-by-step The following table provides an overview of the process for registering the lists of valid addresses for your organization's domains. Table 1-1 Step Further Information Define list(s) of the valid addresses for each of your domains and subdomains. You can generate the list(s) by the following methods: Enter the addresses manually through the portal. See Managing registered addresses manually on page 9. Create the list manually using a spreadsheet or text editor. See Creating an address list in a spreadsheet or text editor on page 8. Extract the user list using the Address Synchronization Tool. See Extracting addresses with the synchronization tool on page 10. Extract the list directly from your mail server. See Extracting the address list from a mail server on page 11.
7 Address Registration Locating address registration in the portal 7 Table 1-1 (continued) Step Upload the list(s) to the services infrastructure. Review the list(s) in the portal Activate Address Registration. Maintain your list of addresses. Further Information Use one of the following methods: Use the upload facility in the portal See Uploading addresses to the infrastructure using the portal on page 16. Use the Address Synchronization Tool See Uploading addresses to the infrastructure using the synchronization tool on page 17. See Reviewing an address list on page 15. See Activating Address Registration on page 20. Several options are available to maintain valid address lists: Adding and deleting addresses manually See Managing registered addresses manually on page 9. Using the upload functionality in the portal to merge or replace an existing list See Merging or replacing an existing address list on page 18. Keeping your addresses synchronized using the Address Synchronization Tool See Uploading addresses to the infrastructure using the synchronization tool on page 17. Automatic outbound address harvesting See Automatic outbound address harvesting on page 19. Locating address registration in the portal You configure and apply Address Registration settings per domain.
8 8 Address Registration Creating an address list in a spreadsheet or text editor To locate the address registration pages in the portal 1 Click Services > Services > Platform > Address Registration. 2 A summary of the state of Address Registration protection is shown for each of your domains. 3 To see details of the addresses registered for a domain, first locate the domain in the summary list. Then click the domain name, or select the domain from the drop-down list. Creating an address list in a spreadsheet or text editor To use Address Registration, you first need to create a full list of your organization s valid addresses in a.csv file or.txt file. Each of your organization s registered domains and subdomains must have its own list of valid addresses. When compiling your lists of valid addresses, include any alias addresses and externally visible group addresses; for example, sales@domain.com. However, if addresses exist on subdomains (for example, user@sub.domain.com), these addresses should not be included in the valid address list for domain.com. A list of registered addresses must be provided for each domain and subdomain. You can create the lists manually either as a.txt file or.csv file in either a spreadsheet application or text editor. Enter each address on a separate row or line. Wildcard symbols such as ^& %$* are not valid in an address. The only acceptable symbols in an address are: underscore _ hyphen - dot. You can create your address list in several ways: Enter the addresses manually through the portal. Create the list manually using a spreadsheet or text editor. Extract the user list using the Address Synchronization Tool. Extract the list directly from your mail server. See Managing registered addresses manually on page 9. See Extracting addresses with the synchronization tool on page 10.
9 Address Registration Managing registered addresses manually 9 See Extracting the address list from a mail server on page 11. Managing registered addresses manually You can add and delete registered addresses manually in the portal. You can define a list of addresses to delete from the Address Registration service (such as recent staff leavers) and upload the list into the portal for deletion. The list must be defined in a.csv file. To enter an address 1 Click Services > Services > Platform > Address Registration. 2 Select the required domain from the Summary list or from the domains drop-down list. 3 Click New Address. 4 Enter the address to register. 5 Click Add. The address appears in the list of registered addresses. To delete a registered address 1 Click Services > Services > Platform > Address Registration. 2 Select the required domain from the Summary list or from the domains drop-down list. 3 Locate the address to delete and tick the box to the left of it. Note: In the Search Address field, you can use the * wildcard for partial matching. 4 Click Delete Selected. A confirmation message is displayed. To delete a list of registered addresses 1 Click Services > Services > Platform > Address Registration. 2 Select the required domain from the Summary list or from the domains drop-down list. 3 Click Delete Multiple Addresses.
10 10 Address Registration Extracting addresses with the synchronization tool 4 Enter the file name of the.csv file or click Browse to locate it. 5 Click Upload. The upload-and-delete operation may take some time to complete depending on the size of the list. A confirmation message is displayed. See Creating an address list in a spreadsheet or text editor on page 8. Extracting addresses with the synchronization tool The Synchronization Tool enables you to extract and maintain a list of valid addresses in use in your organization. The address list is required for Address Registration. Synchronized addresses can be used in Content Control rules. If you have a license for the Synchronization tool, you can extract your valid addresses directly to the services infrastructure. If you do not have a license, you can save the addresses to a file. To use the synchronization tool with a license 1 In the Data repository section of the configuration process, in the Configure data repository window, select Symantec.cloud as the Repository Type. 2 Click Next. You can now continue with the User setup and the Domain setup. See the Online Help: Creating a configuration profile - process overview. To use the synchronization tool without a license 1 In the Data repository section of the configuration process, in the Configure data repository window, select File as the Repository Type. 2 Click Next. 3 In the Repository file configuration window, in the File Name field, enter the path and file name for the output. The Additions and Deletions fields are entered automatically. 4 Click Next.You can now continue on to the Filters section of the configuration. See the Online Help: Creating a configuration profile - process overview. See also Online Help on the Synchronization Tool.
11 Address Registration Extracting the address list from a mail server 11 Extracting the address list from a mail server We provide procedures to extract a list of your organization's valid addresses from the following mail environment networks: Exchange 2000 and 2003 GroupWise imail Lotus Notes V7 MDaemon To extract user data from your mail server, you must have administrative rights for the domain or subdomain for which you are producing the list. The user data that is extracted by following these instructions may include more information than only the required valid addresses. You need to remove any extra data before uploading the list to the services infrastructure. You can do so by importing the data into a spreadsheet. To remove extra user data from an address list 1 Import the data into Microsoft Excel or another spreadsheet application. 2 Sort on the column that contains the addresses, and delete all entries without an address. 3 Delete all columns except the one containing the addresses. 4 Save the file as a.csv file or copy the addresses to a.txt file. 5 You may also need to separate the data further, to provide one list for each of your domains or subdomains. Note: If you have questions on extracting your address lists directly from your mail server, contact your IT department or IT consultant. See Producing an address list from Microsoft Exchange on page 12. See Producing an address list from GroupWise 7 on page 12. See Producing an address list from imail on page 13. See Producing an address list from Lotus Notes 7 on page 14. See Producing an address list from MDaemon on page 15.
12 12 Address Registration Extracting the address list from a mail server Producing an address list from Microsoft Exchange There are two versions of the command that extracts user data from the Exchange server. One produces a list of addresses from one domain and all of its subdomains. The other enables you to select domains and subdomains from which to produce the list. To produce an address list from a single high level Active Directory domain and all of its subdomains From a command prompt, enter the following command: ldifde -f filename.txt -l proxyaddresses -r "(proxyaddresses=*smtp:*@*)" A text file called filename.txt containing your valid addresses is produced. To produce an address list from a specific Active Directory location From a command prompt, enter the following command: ldifde -f filename.txt -d "dc=subsub,dc=sub,dc=domain,dc=com" -l proxyaddresses -r "(proxyaddresses=*smtp:*@*)" This command contains the information that you must supply in italics; for example, the name of the.txt file that is produced (filename.txt). The dc= values identify the required location in the Active Directory. Use as many of the dc= values as are required. For example, the command above produces a user list from the subsub.sub.domain.com Active Directory domain structure. Note: The *smtp: *@* filter in the command above ensures that only current valid addresses are produced. You can amend this filter to your requirements, if necessary. See Extracting the address list from a mail server on page 11. Producing an address list from GroupWise 7 You need to be familiar with NWAdmin and GroupWise Utilities before performing this procedure.
13 Address Registration Extracting the address list from a mail server 13 To produce an address list from GroupWise 7 1 Log on to NWAdmin and select the edirectory tree that contains the users to export. 2 Select Tools > GroupWise Utilities > Export. An NDS query tool is displayed. 3 Click NDS/GroupWise Class and select User from the drop-down list to the right of it. 4 Under Attributes, select the object name (logon name), last name, given name, and NGW: File ID. 5 Enter a text file export name (for example, GW-FID.TXT). 6 Under Starting Context, click [Root]. 7 Check Export from subordinate contexts. This option causes objects in subordinate contexts to be exported. 8 Check Put the attribute names in first line. This option directs the export to put the attribute names as a comment in the first line of the export file. 9 Click Run. A comma-delimited text file of your users is produced. See Extracting the address list from a mail server on page 11. Producing an address list from imail Extracting a list of your user's addresses can only be achieved on a single domain basis. If you have more than one domain, repeat these steps for each domain. To extract addresses from imail 1 Navigate to the imail Administrator. 2 Expand the tree under your server name or domain. 3 Click Users. 4 Click Export Users to File. The \imail\users.txt file is created. See Extracting the address list from a mail server on page 11.
14 14 Address Registration Extracting the address list from a mail server Producing an address list from Lotus Notes 7 To produce an address list from Lotus Notes 7 1 From the Notes client, open the Name and Address book (names.nsf) on the Domino server. 2 Open the People view in the names.nsf database and create views to list the Internet addresses for each Person document in your domain: Select Create > View. Update the Create View window Select Save and Customize. Delete all column headings in the new private view. To delete all headings at once, highlight the first heading, click Control, and select the last heading to select them all. Use the Delete key to delete all headings. Click Yes to confirm the deletion Right click on the empty heading bar and select Insert New Column... Select Field as the Display type. Scroll down to the InternetAddress field and select it. On the File menu, click Save to save the private view. 3 Close the view design tab by pressing the Esc key. 4 In the names.nsf left navigation view is the InternetAddressList view. One column in the view lists the Internet addresses of all users who are listed in the People view. To export the list of Internet addresses to a text file, select File > Export. 5 Update the Export window. 6 Select Export. 7 Update the Tabular Text Export window. 8 To export the view, select OK. 9 Repeat these steps for the other Views/Fields that contain valid Internet addresses if necessary. For example include the people view ShortName field (for Internet ID aliases), Group/InternetAddress (for external group distribution lists), and Mail-in databases/internetaddress (for external Mail-in databases). See Extracting the address list from a mail server on page 11.
15 Address Registration Reviewing an address list 15 Producing an address list from MDaemon To produce an address list from MDaemon 1 Navigate to the Message Router. 2 Click Accounts > Exporting > Export accounts to a comma delimited text file. 3 Specify the required path and file name. 4 Click OK. See Extracting the address list from a mail server on page 11. Reviewing an address list When your address lists are uploaded to the services infrastructure, review the addresses that are registered for each domain in the portal before activating Address Registration. Reviewing your list is imperative when your addresses are uploaded initially. Thereafter, it is good practice to review the list when any changes are made. If a list has uploaded incorrectly or if any addresses are missing, you may experience temporary mail loss. The Summary page lists your domains and shows the state of each. You can download a CSV file of this summary. To review a summary of your address registration settings 1 Click Services > Services > Platform > Address Registration. 2 Ensure that Summary is selected in the domains drop-down list at the top of the page. Your domains are listed with the following information: Domain name: If the domain is enabled for Address Registration, click on the domain name to view and edit its address list Status: On Address Registration is protecting your organization from receiving s to addresses not registered for this domain Off Create and check your list of registered addresses, and click this link to turn on the protection
16 16 Address Registration Uploading addresses to the infrastructure using the portal Do not set the Address Registration protection to On until you are satisfied that your list of registered addresses is accurate and correct. Otherwise to valid addresses may be rejected. Service not enabled for viewing Contact Support to have this domain provisioned for Address Registration. Click Support > Contact Us for details. Upload/Download: Use the links to download an existing address list as a CSV file so that you can make changes to it and upload the edited file back to the portal. See Uploading addresses to the infrastructure using the portal on page 16. To review the address list for a domain 1 Click Services > Services > Platform > Address Registration. 2 Select the required domain from the Summary list or from the drop-down domains list. The list of registered addresses is displayed. You can download the list as a CSV file. 3 Repeat for any other domains to review. Uploading addresses to the infrastructure using the portal You can create or edit a list of your registered addresses offline in a.csv file or.txt file and upload the list to the portal. The following options are available for uploading lists into the portal: Delete existing addresses and replace with uploaded addresses By selecting this option the uploaded list replaces the existing list. Any entries in the existing list that are not in the uploaded list are lost. Merge existing addresses with uploaded addresses By selecting this option the uploaded list merges into the existing list. This is a useful way to add new entries to an existing list. During a merge, if duplicate addresses exist within both the uploaded and existing lists, the portal does the following: highlights the number of duplicates, and gives you the option to overwrite the entries in the existing list (and to change their description, if required) or to cancel the list merge process.
17 Address Registration Uploading addresses to the infrastructure using the synchronization tool 17 To upload a list of addresses for a domain 1 Click Services > Services > Platform > Address Registration. 2 Do one of the following: Select the domain from the Summary list, and click Upload Select the domain from the domains drop-down list, and click Upload Multiple Addresses 3 Enter the file name of the.csv file or click Browse to locate it. 4 In the On upload area, select the appropriate option depending on whether the new addresses should replace or be merged with any existing addresses (duplicate entries are ignored). 5 Click Upload. The upload operation may take some time to complete depending on the size of the list. Confirmation of that the file was uploaded successfully is displayed. 6 Click OK. The list entries are displayed in the Address Registration page. Uploading addresses to the infrastructure using the synchronization tool If you have a license for the Synchronization tool, you can extract your valid addresses directly to the services infrastructure. See Extracting addresses with the synchronization tool on page 10. Maintaining an address list The purpose of registering your valid addresses is to allow the services to reject mail to unrecognized addresses. Therefore, it is important that an up-to-date list is maintained. You have several options for keeping the lists up-to-date: Periodic refresh of the complete list Achieved by uploading the address list and choosing Delete existing addresses and replace with uploaded addresses. It is recommended that you perform this refresh at regular intervals to implement all address additions and removals. See Uploading addresses to the infrastructure using the portal on page 16.
18 18 Address Registration Merging or replacing an existing address list Incremental additions Achieved by uploading the harvested list and choosing Merge existing addresses with uploaded addresses. This action can be used to augment the address harvesting operation, particularly where new addresses may not be captured when outbound messages are sent. See Uploading addresses to the infrastructure using the portal on page 16. Ad-hoc edits Achieved by adding and deleting addresses individually. This action can be used in between your routine list update cycle. See Managing registered addresses manually on page 9. Automated synchronization Address harvesting Use the Address Synchronization Tool to synchronize your address list automatically. An automatic process by which all addresses that send mail out of your organization s domains are harvested by the services infrastructure and added to your list of registered addresses. See Automatic outbound address harvesting on page 19. It may be advisable to combine the process of adding new addresses and deleting old addresses with your existing process for handling staff leavers and joiners. You may also want to perform address maintenance tasks when you create distribution lists. See Merging or replacing an existing address list on page 18. See Automatic outbound address harvesting on page 19. Merging or replacing an existing address list You can download the current list from the portal and edit it offline before uploading it back to the portal. When saving the list, ensure that it is saved as a CSV (comma delimited) or TXT file. To download the current address list 1 Navigate to the Address Registration page. 2 Click Download Addresses. A dialog box asks you whether to open or save the file. The CSV file is named RegisteredUser.csv. The download operation may take some time to complete depending on the size of the list. See Uploading addresses to the infrastructure using the portal on page 16. See Uploading addresses to the infrastructure using the synchronization tool on page 17.
19 Address Registration Automatic outbound address harvesting 19 See Maintaining an address list on page 17. Automatic outbound address harvesting Outbound address harvesting is an automatic process. The Services infrastructure harvests all addresses that send mail out by your registered outbound IP addresses. These addresses are added to your list of registered addresses. Outbound address harvesting does not automatically detect aliases. For example, is the primary address for new user John Smith. However, the mail server environment may also hold and allow aliases such as and These alias addresses are not harvested automatically when John Smith s first outbound message is sent out of your mail server environment. For all aliases to be harvested, an must be sent out by each alias. Therefore, it may be appropriate to combine outbound address harvesting and manual addition or deletion through the portal as maintenance options. You must use the services infrastructure as your outbound mail relay in order for address harvesting to work. To ensure that an address is harvested, you can send an from the address to harvest@smtpsink.messagelabs.net. The goes through the services infrastructure and the address is harvested. The is then deleted. It may take up to one hour for the infrastructure to process a harvested address. We keep a record of addresses that have been deleted. addresses that you have deleted from your list are not harvested in future. The address is not harvested again. In line with relevant data protection legislation and industry best practice, the system does not harvest recipient addresses in the s that your users send. Also, the system does not harvest addresses from the s that are sent to your users. See Maintaining an address list on page 17. See Merging or replacing an existing address list on page 18.
20 20 Address Registration Activating Address Registration Activating Address Registration Note: Address Registration may already have been activated when your account was provisioned to use the Services. Once you are sure that you have a valid list of your organization s valid addresses uploaded to the services infrastructure, you can then turn on Address Registration for your domains. When the setting for a domain is set to On, any that is sent to an unregistered address is not accepted and gives rise to an SMTP 550 error. This error indicates to the sending mail server that the address is invalid. You should see a significant drop in detected spam. There should be no need to switch off Address Registration. If you want to do so, contact Support. Click Support > Contact Us for details. Warning: Do not set the Address Registration protection to On until you are satisfied that your list of registered addresses is accurate and correct. Otherwise to valid addresses may be rejected. To turn on Address Registration 1 Click Services > Services > Platform > Address Registration. 2 Locate the required domain in the Summary list or from the domains drop-down list. 3 Click the Off link. The Registered Address Settings window is displayed. 4 Click On. 5 Click Update. The Address Registration page now indicates that Address Registration protection for the domain is On. See Reviewing an address list on page 15.
Email Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
More informationEmail Track and Trace. Administration Guide
Administration Guide Track and Trace Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the
More informationEmail Image Control. Administrator Guide
Email Image Control Administrator Guide Image Control Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationSpam Manager. User Guide
Spam Manager User Guide Spam Manager User Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
More informationPortal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationIBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
More informationEmail Quick Reference. Administrator Guide
Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationBoundary Encryption.cloud Deployment Process Overview
Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Documentation version: 1.0 Legal Notice Legal Notice Copyright 2011 Symantec Corporation. All
More informationEmail AntiVirus. Administrator Guide
Email AntiVirus Administrator Guide Email AntiVirus Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationWeb Security Firewall Setup. Administrator Guide
Web Security Firewall Setup Administrator Guide Web Security Firewall Setup Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
More informationSynchronization Tool. Administrator Guide
Synchronization Tool Administrator Guide Synchronization Tool Administrator Guide Documentation version: 1.5 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationSpam Manager. Quarantine Administrator Guide
Spam Manager Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
More informationEmail Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
More informationPolicy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationEmail Encryption. Administrator Guide
Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book is furnished under a
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only
More informationEmail AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationPolicy Based Encryption Essentials. Administrator Guide
Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.
More informationTrustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
More informationSymantec Data Center Security: Server Advanced v6.0. Agent Guide
Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and
More informationEnterprise Vault.cloud. Microsoft Exchange Managed Folder Archiving Guide
Enterprise Vault.cloud Microsoft Exchange Managed Folder Archiving Guide Enterprise Vault.cloud: Microsoft Exchange Managed Folder Archiving Guide The software described in this book is furnished under
More informationSymantec Backup Exec Management Plug-in for VMware User's Guide
Symantec Backup Exec Management Plug-in for VMware User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationCreating a Participants Mailing and/or Contact List:
Creating a Participants Mailing and/or Contact List: The Limited Query function allows a staff member to retrieve (query) certain information from the Mediated Services system. This information is from
More informationSmart Connect. Deployment Guide
Smart Connect Deployment Guide Smart Connect Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationPureMessage for Microsoft Exchange Help. Product version: 4.0
PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9
More informationChapter 10 Encryption Service
Chapter 10 Encryption Service The Encryption Service feature works in tandem with Dell SonicWALL Email Security as a Software-as-a-Service (SaaS), which provides secure data mail delivery solutions. The
More informationWEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM
WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create
More informationSymantec Mail Security for Microsoft Exchange Management Pack Integration Guide
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished
More informationSymantec Backup Exec System Recovery Granular Restore Option User's Guide
Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under
More informationUser Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration
User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves
More informationSecurity Explorer 9.5. User Guide
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationSymantec Managed PKI. Integration Guide for ActiveSync
Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement and may be used
More informationImportant Information
June 2015 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com
More informationCaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud
CaseWare Time CaseWare Cloud Integration Guide For Time 2015 and CaseWare Cloud Copyright and Trademark Notice Copyright. 2015 CaseWare International Inc. ( CWI ). All Rights Reserved. Use, duplication,
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationScribe Online Integration Services (IS) Tutorial
Scribe Online Integration Services (IS) Tutorial 7/6/2015 Important Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, photocopying,
More informationSymantec Mobile Management for Configuration Manager
Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software
More informationEnabling Windows Management Instrumentation Guide
Enabling Windows Management Instrumentation Guide Enabling Windows Management Instrumentation Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used
More informationAltiris Patch Management Solution for Windows 7.1 from Symantec Release Notes
Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes The software described in this book is furnished
More informationSymantec Endpoint Encryption Device Control Release Notes
Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control 8.2.0 www.symantec.com About Symantec Endpoint Encryption Device Control Symantec Endpoint Encryption
More informationAvaya Network Configuration Manager User Guide
Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information
More informationSymantec Mail Security for Microsoft Exchange Management Pack Integration Guide
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished
More informationFOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More informationVeritas Cluster Server Database Agent for Microsoft SQL Configuration Guide
Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright
More informationWebmail Instruction Guide
Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with
More informationSymantec Critical System Protection Agent Event Viewer Guide
Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance
More informationSymantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows
Symantec Enterprise Vault Technical Note Administering the Monitoring database Windows December 2006 Symantec Enterprise Vault Administering the Monitoring database Copyright 2006 Symantec Corporation.
More informationSymantec Security Information Manager - Best Practices for Selective Backup and Restore
Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in
More informationAddress Synchronization Tool Administrator Guide
Address Synchronization Tool Administrator Guide This guide is for systems administrators configuring the Address Synchronization Tool to update the information used by MessageLabs in the provision of
More informationSynchronization Tool Administrator Guide
Synchronization Tool Administrator Guide Synchronization Tool Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2011 Symantec Corporation. All rights reserved. Symantec
More informationSymantec Hosted Mail Security. Console and Spam Quarantine User Guide
Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license
More informationSymantec Backup Exec System Recovery Exchange Retrieve Option User's Guide
Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under
More informationVeritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server
Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server Windows Server 2003, Windows Server 2008 5.1 Veritas Cluster Server Application Note: Disaster Recovery for Microsoft
More informationSymantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5
Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished
More informationBackup Exec 15. Quick Installation Guide
Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
More informationPureMessage for Microsoft Exchange Help. Product version: 3.1
PureMessage for Microsoft Exchange Help Product version: 3.1 Document date: June 2015 Contents 1 About PureMessage for Microsoft Exchange...4 2 Key concepts...5 2.1 Key concepts overview...5 2.2 Inbound,
More informationWebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
More information4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
More informationNetBak Replicator 4.0 User Manual Version 1.0
NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...
More informationSymantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
More informationSymantec Endpoint Encryption Full Disk
Symantec Endpoint Encryption Full Disk Policy Administrator Guide Version 8.0.1 Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks
More informationSymantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationBackup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0
Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the
More informationHow To Set Up Total Recall Web On A Microsoft Memorybook 2.5.2.2 (For A Microtron)
Total Recall Web Web Module Manual and Customer Quick Reference Guides COPYRIGHT NOTICE Copyright 1994-2009 by DHS Associates, Inc. All Rights Reserved. All TOTAL RECALL, TOTAL RECALL SQL, TOTAL RECALL
More informationJanuary 23, 2010 McAfee SaaS Email Continuity User Guide
January 23, 2010 McAfee SaaS Email Continuity User Guide COPYRIGHT Copyright 2001 2010 McAfee, Inc. All Rights Reserved. This document contains proprietary information of McAfee Inc. and is subject to
More informationHow To Archive A Mail From A Mailbox On A Server On A Password Protected (Smtp) On A Pc Or Mac (Mailbox) On An Ipa (For A Password Safemail) On Your Pc Or Ipa On A Mac
Symantec Enterprise Vault Setting up SMTP Archiving 11.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used
More informationSolarWinds Migrating SolarWinds NPM Technical Reference
SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,
More informationSymantec NetBackup for Lotus Notes Administrator's Guide
Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished
More informationSymantec Enterprise Vault Technical Note. Troubleshooting the Monitoring database and agents. Windows
Symantec Enterprise Vault Technical Note Troubleshooting the Monitoring database and agents Windows December 2006 Symantec Enterprise Vault Troubleshooting the Monitoring database and agents Copyright
More informationv.5 Use Shelby to Communicate Electronically
v.5 Use Shelby to Communicate Electronically Presented by: Mark Fisher, Shelby Consultant 2013 Shelby Systems, Inc. Other brand and product names are trademarks or registered trademarks of the respective
More informationNetBackup Backup, Archive, and Restore Getting Started Guide
NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.
More informationSage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationXMailer Reference Guide
XMailer Reference Guide Version 7.00 Wizcon Systems SAS Information in this document is subject to change without notice. SyTech assumes no responsibility for any errors or omissions that may be in this
More informationIBM Lotus Protector for Mail Encryption
IBM Lotus Protector for Mail Encryption Server Upgrade Guide 2.1.1 Version Information Lotus Protector for Mail Encryption Server Upgrade Guide. Lotus Protector for Mail Encryption Server Version 2.1.1.
More informationDell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationQuick Start Program Advanced Manual ContactWise 9.0
Quick Start Program Advanced Manual ContactWise 9.0 Copyright 2010 GroupLink Corporation. All Rights Reserved. ContactWise is a registered trademark of GroupLink Corporation. All other trademarks are the
More informationAdministrator Operations Guide
Administrator Operations Guide 1 What You Can Do with Remote Communication Gate S 2 Login and Logout 3 Settings 4 Printer Management 5 Log Management 6 Firmware Management 7 Installation Support 8 Maintenance
More informationEnterprise Vault Installing and Configuring
Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise
More informationHow To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)
CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationAbout Recovery Manager for Active
Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System
More informationDell Statistica Document Management System (SDMS) Installation Instructions
Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationSymantec Critical System Protection 5.2.9 Agent Guide
Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection Agent Guide The software described in this book is furnished under a license agreement and may be used only in
More informationExchange 2010 Journaling Guide
Websense Email Security Solutions v7.3 Websense Advanced Email Encryption Copyright 1996-2011 Websense, Inc. All rights reserved. This document contains proprietary and confidential information of Websense,
More informationMicrosoft Dynamics GP. Audit Trails
Microsoft Dynamics GP Audit Trails Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
More informationDell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationVeritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1
Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is
More information