for Exchange/SMTP for Exchange/SMTP for Exchange for Exchange/SMTP Network Security Scanner Security Event Log Monitor for ISA Server

Size: px
Start display at page:

Download "for Exchange/SMTP for Exchange/SMTP for Exchange for Exchange/SMTP Network Security Scanner Security Event Log Monitor for ISA Server"

Transcription

1 for Exchange/SMTP for Exchange/SMTP for Exchange for Exchange/SMTP Network Security Scanner Security Event Log Monitor for ISA Server

2 Overview of GFI products Anti-spam for Exchange, anti-phishing and management GFI MailEssentials for Exchange/SMTP offers spam and phishing protection and management at server level. GFI MailEssentials offers a fast set-up and a high spam detection rate using Bayesian analysis and other methods - no configuration required, very low false positives through its automatic whitelist, and the ability to automatically adapt to your environment to constantly tune and improve spam detection. GFI MailEssentials also adds management tools to your mail server: disclaimers, archiving and monitoring, Internet mail reporting, list server, server-based auto replies and POP3 downloading. anti-virus, content policies, exploit detection and anti-trojan GFI MailSecurity for Exchange/SMTP is an content policies, exploit detection, threats analysis and anti-virus solution that removes all types of -borne threats before they can affect your users. GFI MailSecurity's key features include multiple virus engines, to guarantee higher detection rate and faster response to new viruses; content and attachment checking, to quarantine dangerous attachments and content; an exploit shield, to protect against present and future viruses based on exploits (e.g., Nimda, Bugbear); an HTML Sanitizer, to disable HTML scripts; a Trojan & Executable Scanner, to detect malicious executables; and more. archiving of internal and external GFI MailArchiver for Exchange provides easy-to-use corporate archiving, enabling you to archive all internal and external mail into one or multiple SQL databases, heavily reducing reliance on PST files. This allows you to provide users with easy, centralized access to past s via a web-based search interface and the ability to quickly restore s through a OneClick Restore process. GFI MailArchiver also aids you to easily fulfill regulatory storage requirements (such as the Sarbanes-Oxley Act). GFI MailArchiver for Exchange leverages the journaling feature of Exchange Server 2000/2003 and therefore provides unparalleled scalability and reliability at a competitive cost. Network fax server for Exchange/SMTP GFI FAXmaker for Exchange/SMTP is the leading network fax server. It integrates with Exchange Server, Lotus Notes and popular SMTP servers, allowing users to send and receive faxes and SMS/text messages directly from their client. By leveraging your infrastructure and Active Directory, GFI FAXmaker achieves unparalleled scalability, reliability and hassle-free administration. GFI FAXmaker has won the Windows IT Pro Magazine (formerly Windows &.NET) Readers' Choice Award for 3 years running. Network security scanner, port scanner and patch management GFI LANguard Network Security Scanner (N.S.S.) checks your network for possible security vulnerabilities by scanning your entire network for missing security patches, service packs, open shares, open ports, unused user accounts and more. With this information (displayed in customizable reports), you can easily lock down your network against hackers. GFI LANguard N.S.S. can also remotely deploy missing patches and service packs in applications and OS. GFI LANguard N.S.S. is the leading Windows security scanner and very competitively priced.

3 Network-wide event log monitoring GFI LANguard Security Event Log Monitor (S.E.L.M.) performs event log based intrusion detection and network-wide event log management. GFI LANguard S.E.L.M. archives and analyzes the event logs of all network machines and alerts you in real time to security issues, attacks and other critical events. GFI LANguard S.E.L.M.'s intelligent analysis means you do not need to be an 'Event Guru' to be able to: Monitor users attempting to access secured shares and confidential files; Monitor critical servers and create alerts for specific events and conditions occurring on your network; Back up and clear event logs automatically on remote machines; Detect attacks using local user accounts; and much more! Network-wide control of portable storage, media and consumer electronic devices GFI EndPointSecurity offers you network-wide control of data flow via portable storage devices, allowing you to prevent users from taking confidential data or introducing viruses and Trojans to your network. GFI EndPointSecurity allows you to actively manage user access to media players (including ipod and Creative Zen), USB sticks, CompactFlash, memory cards, PDAs, Blackberries, mobile phones, CDs, floppies and more. Network monitoring GFI Network Server Monitor automatically monitors your network and servers for failures and allows administrators to fix and identify issues before users report them. Alerts can be sent by , pager or SMS. Actions, such as rebooting a machine, restarting a service or running a script, can be done automatically. Real-time HTTP/FTP monitoring, anti-virus & access control GFI WebMonitor is a utility for Microsoft ISA Server that allows you to monitor the sites users are browsing and what files they are downloading in REAL TIME. In addition it can block access to adult sites as well as performing anti-virus scanning on all downloads. GFI WebMonitor is the perfect solution to transparently exercise a degree of access control over users browsing habits and ensure legal compliance in a manner that will not alienate your network users!

4 for Exchange/SMTP Anti-spam for Exchange, anti-phishing and management With fraudulent, inappropriate and offensive s being delivered in vast quantities to businesses every day, anti-spam software is a vital component of your network security strategy. Spam wastes network users time and network resources, and can also be dangerous. GFI MailEssentials offers anti spam for Exchange server and other servers and eliminates the need to install and update anti-spam software on each desktop. GFI MailEssentials offers a fast set-up and a high spam detection rate using Bayesian filtering and other methods no configuration required, very low false positives through its automatic whitelist, and the ability to automatically adapt to your environment to constantly tune and improve spam detection. GFI MailEssentials will eliminate over 98% of the spam from your network! GFI MailEssentials also detects and blocks phishing s through a system of Uniform Resource Identifier (URI) and keyword checks. In addition to anti-spam filtering and anti-phishing protection, GFI MailEssentials also adds management tools to your mail server: disclaimers, mail monitoring, Internet mail reporting, list server, server-based auto replies and POP3 downloading. Server-based anti-spam and anti-phishing GFI MailEssentials is server-based and installs on the mail server or at the Gateway, eliminating the deployment and administration hassle of desktop-based anti-spam and anti-phishing products. Desktop-based software involves training your users to create anti-spam rule sets, and subsequently users have to spend time updating these rules. Besides, this system does not prevent your server message stores from filling up with spam. Features & benefits Highest spam detection rate (98%) because of its Bayesian filtering technology Lowest false positives through its patent pending auto whitelist feature Server-based install, no client software required Allows users to review marked as spam from junk mail folder #1 server anti-spam unbeatable pricing: USD 450 (25), USD 1195 (100), USD 5000 (1000) mailboxes. Bayesian filtering technology Bayesian filtering is widely acknowledged by leading experts and publications as the best way to catch spam. A Bayesian filter uses a mathematical approach based on known spam and ham (valid ). This gives it a tremendous advantage over other spam solutions that just check for keywords or rely on downloading signatures of known spam. GFI s Bayesian filter uses an advanced mathematical formula and a dataset which is custom-created for your installation: The spam data is continuously updated by GFI and is automatically downloaded by GFI MailEssentials, whereas the ham data is automatically collected from your own outbound mail. This means that the Bayesian filter is constantly learning new spam tricks, and spammers cannot circumvent the dataset used. This results in a 98+% spam detection rate, after the required two-week learning period. In short, Bayesian filtering has the following advantages: Looks at the whole spam message, not just keywords or known spam signatures Learns from your outbound (ham) and therefore greatly reduces false positives Adapts itself over time by learning about new spam and new valid Dataset is unique to your company, making it impossible to bypass Multilingual and international. Downloads updates to spam profile database GFI MailEssentials can download updates to the Bayesian spam profile database from the GFI site, ensuring that it recognizes the latest spam and spamming techniques. GFI maintains the spam profile database by working with a number of spam collection organizations that continually supply spam samples.

5 GFI MailEssentials configuration Protect your users against the menace of phishing s GFI MailEssentials provides the ability to detect and block threats posed by phishing s through its Phishing URI Realtime Blocklist (PURBL). The GFI MailEssentials PURBL detects phishing s by comparing Uniform Resource Identifiers (URIs) present in the to a database of URIs which are known to be used in phishing attacks, and also by looking for typical phishing keywords in the URIs. Sort spam to users' junk mail folders GFI MailEssentials gives you the flexibility to choose what to do with spam. You can delete it, move it to a folder, forward the spam mail to a public address or folder, or send it to individual customizable folders (for example, a junk mail folder) in the end-users inboxes. This allows users to easily review mail that has been flagged as spam. Users can review spam List server for newsletter lists and discussion lists A list server is the best method for distributing company newsletters, since it automates the process of allowing users to subscribe and unsubscribe (required by anti-spam regulations). However, until now, list servers have been expensive and difficult to administer and they did not integrate with Exchange Server. GFI MailEssentials integrates with Exchange and can use Microsoft Access or Microsoft SQL Server as the backend. Both newsletter lists and discussion lists are supported. Easy tuning of the Bayesian engine via public folders Administrators can easily tune the Bayesian engine by dragging and dropping spam or ham to the appropriate public folder. GFI MailEssentials learns from the spam and ham that it picks up from these folders and further improves its spam detection rate. Administrators can control access to this feature through the use of Public Folder security. Newsletter list options Allow users to whitelist or blacklist via public folders GFI MailEssentials allows users to whitelist or blacklist senders simply by dragging and dropping the appropriate mail to a public folder. This gives users more control and reduces administration. Administrators can control access to this feature through the use of Public Folder security. header analysis & keyword checking GFI MailEssentials intelligently analyzes the header and identifies spam based on message field information. It detects forged headers, encoded IPs, spam mutation, spam sent from invalid domains, and more. It also enables you to configure keywords to check for spam using keyword checking. 3rd party DNS blacklists (DNSBL) checking GFI MailEssentials supports DNS blacklists (real time black hole lists), which are databases of known spammers. If the sending mail server is on one of those lists, it marks the as spam. GFI MailEssentials supports popular third party blacklists such as ORDB, SpamHaus, Spamcop and also enables administrators to configure custom RBL servers. Search archive from anywhere via the web-based interface Check headers for spam practices Support for multiple 3rd party SURBL servers GFI MailEssentials checks content against SURBL servers. Administrators can configure multiple SURBL servers, add their own and also define the priority of which server should be checked first. More information on SURBL can be found at Automatic whitelist management reduces false positives Whitelists enable you to ensure that from particular senders or domains are never flagged as spam, permitting more stringent anti-spam rules. GFI MailEssentials includes a patent-pending automatic whitelist management tool, which automatically adds outgoing mail recipients to your whitelist. This greatly reduces false positives, without any need for additional administration. Whitelists can also be built based on domain names, addresses and keywords. Instant view of s from new senders The New Senders feature provides users with an instant view of s sent from people they never had previous contact with, thereby helping users to better organize s in their client. If an is not found to be spam by the GFI MailEssentials anti-spam modules and is also not on the whitelist, then the New Senders module has the ability to move the to a user's subfolder, for example, Inbox\NewSenders.

6 Eliminates directory harvesting Spammers often try to guess recipient addresses by generating multiple random addresses at a domain; they then send their spam mail to all those addresses. GFI MailEssentials checks the validity of ALL the addresses included in the mail sent, either via a query to Active Directory or through support for LDAP, and if they are not all valid, marks the mail as spam. Reports on spam filtering and usage The database-driven reporting engine allows you to create advanced reports on your inbound and outbound . You can report on the amount of spam filtered and on rules which caught most spam. You can also generate reports on user, domain and mail server usage. Support for SPF - the Sender Policy Framework As most of today s spammers spoof addresses, it is important to be able to check whether an is genuine or if it has been sent from a forged sending address. This can be done via the Sender Policy Framework (SPF), which allows users to test whether a particular originates from its claimed source. GFI MailEssentials is one of the first commercial anti-spam solutions to support this framework. Its SPF module automatically checks whether the mail from a particular company was actually sent by its registered mail servers. For more on SPF, visit Set priorities for each anti-spam module You can configure which method of capturing spam is to be given priority, and create your own hierarchical list. For example, the administrator can select that the whitelisting anti-spam feature must be applied first to all incoming mail, then Bayesian scanning, and so on. monitoring The monitoring feature enables you to keep a central store of the communications of a particular person or department. By configuring the mail to be copied to an address, all can be stored in an Exchange or Outlook store, making searching for or content easy. archiving to a SQL database GFI MailEssentials can archive all inbound and outbound mail to a Microsoft SQL Server database. You can search for a particular or an entire thread via the included web interface. Mail archiving is essential for back-up and search reasons. For a complete archiving solution, please check out GFI MailArchiver for Exchange. Seamless integration with Exchange Server 2000/2003 & 5.5 GFI MailEssentials integrates seamlessly with Microsoft Exchange 2000/2003: It installs on the Exchange SMTP service and does not require gateway configuration. Via the SMTP protocol, it also works with Exchange 5.5, Lotus Notes and other popular SMTP/POP3 servers. Content checking, anti-virus & anti-trojan Get anti-virus, content checking and anti-trojan protection for your mail server with the GFI MailEssentials & GFI MailSecurity Suite. GFI MailSecurity for Exchange/SMTP is an content checking, exploit detection, threats analysis and anti-virus solution that removes all types of -borne threats before they can affect your users. Company-wide disclaimer/footer/header text GFI MailEssentials enables you to add disclaimers to the top or bottom of an . Text and HTML formats are supported. You can include fields/variables to personalize the disclaimer. You can also create multiple disclaimers and associate them with a user, group or domain. Reviews System requirements Windows Server 2003 certification for GFI MailEssentials GFI MailEssentials for Exchange/SMTP has achieved the Windows Server 2003 certification from Microsoft Corp through VeriTest. This certification is based on an established technical standard to identify software applications that are secure and manageable, and that run reliably on the Microsoft Windows family of operating systems. GFI MailEssentials met these rigorous requirements after being tested by VeriTest: This certification through VeriTest provides GFI customers added confidence in their purchase of GFI MailEssentials, said Katrina Teague, Vice President of Marketing and Solutions at VeriTest. Windows 2000/ Pro, Server or Advanced Server or Windows XP Professional. IIS5 SMTP service installed and running as an SMTP relay to your mail server. Microsoft Exchange server 2000, 2003, 4, 5 or 5.5, Lotus Notes 4.5 and up, or an SMTP/POP3 mail server. For the list server feature, Microsoft Message Queueing Services is required. - VeriTest, July 2005 Download your evaluation version from

7 for Exchange/SMTP anti-virus, content policies, exploit detection and anti-trojan The need to monitor messages for dangerous, offensive or confidential content has never been more evident. The most deadly viruses, able to cripple your server and corporate network in minutes, are being distributed worldwide via in a matter of hours. Products that perform single vendor anti-virus scanning do not provide sufficient protection. Worse still, has become the means for installing backdoors (trojans) and other harmful programs to help potential intruders break into your network. Products restricted to a single anti-virus engine will not protect against exploits and attacks of this kind. Your only defense is to install comprehensive granular user-based content policy and anti-virus software to safeguard your mail server and network. GFI MailSecurity acts as an firewall and provides mail security by protecting you from viruses, exploits and threats, as well as attacks targeted at your organization. GFI MailSecurity may be deployed in Gateway or VS API mode. The gateway version should be deployed at the perimeter of the network as an relay server and scans inbound and outbound mail. The VS API version integrates seamlessly with Exchange Server 2000/2003 and scans the Exchange information stores. Virus checking with multiple virus scanning engines GFI MailSecurity uses multiple virus scanners to scan inbound . Using multiple scanners drastically reduces the average time to obtain virus signatures which combat the latest threats, and therefore greatly reduces the chances of an infection. The reason for this is that a single anti-virus company can never ALWAYS be the quickest to respond. For each outbreak, virus companies have varying response times to a virus, depending on where the virus was discovered, etc. By using multiple virus engines, you have a much better chance of having at least one of your virus engines up-to-date and able to protect against the latest virus. In addition, since each engine has its own heuristics and methods, one virus engine is likely to be better at detecting a particular virus and its variants, while another virus engine would be stronger at detecting a different virus. Overall, more virus engines means better protection. Note: Independent research showed that brand names are no guarantee for faster response times; in fact some of the big brand names were found to be among the slowest. Features & benefits Multiple virus engines guarantee higher detection rate and faster response Unique Trojan & Executable Scanner detects malicious executables without need for virus updates MyDoom was detected immediately! Exploit Engine and HTML Sanitizer disable exploits & HTML scripts Unbeatable price: USD 500 (25), USD 1650 (100) and USD 7500 (1000) mailboxes. Scan against trojans and executables The GFI MailSecurity Trojan & Executable Scanner detects unknown malicious executables (for example, trojans) by analyzing what an executable does. Trojans are dangerous as they can enter a victim s computer undetected, granting an attacker unrestricted access to the data stored on that computer. Anti-virus software will NOT catch unknown trojans because it is signature-based. The Trojan & Executable Scanner takes a different approach by using built-in intelligence to rate an executable's risk level. It does this by disassembling the executable, detecting in real time what it might do, and comparing its actions to a database of malicious actions. The scanner then quarantines any executables that perform suspicious activities, such as accessing a modem, making network connections or accessing the address book. Norman Virus Control & BitDefender virus engines are included GFI MailSecurity is bundled with Norman Virus Control and BitDefender. Norman Virus Control is an industrial strength virus engine that has received the 100% Virus Bulletin award 32 times running. It also has ICSA and Checkmark certification. BitDefender is a very fast and flexible virus engine that excels in the number of formats it can recognize and scan. BitDefender is ICSA certified and has won the 100% Virus Bulletin award and the European Information Technologies Prize GFI MailSecurity automatically checks and updates the Norman Virus Control and BitDefender definition files as they become available. The GFI MailSecurity price includes updates for one year.

8 Kaspersky, McAfee and AVG virus engines (optional) To achieve even greater security, users can add the Kaspersky, McAfee and/or AVG anti-virus engines as a third, fourth or fifth anti-virus engine or as a replacement to one of the other engines. Kaspersky Anti-Virus is ICSA-certified and is well known for the unsurpassed depth of its object scanning, the high rate at which new virus signatures are released and its unique heuristic technology that effectively neutralizes unknown viruses. The McAfee virus engine is particularly strong at detecting non-virus attacks such as rogue ActiveX controls. With 15 years of experience in the anti-virus industry, GRISOFT employs some of world's leading experts in anti-virus software, specifically in the areas of virus analysis and detection. GFI MailSecurity configuration Automatic removal of HTML scripts The advent of HTML has made it possible for hackers/virus writers to trigger commands by embedding them in HTML . GFI MailSecurity checks for script code in the message body and disables these commands before sending the "cleaned" HTML to the recipient. GFI MailSecurity is the only product to protect you from potentially malicious HTML using a GFI patented process, safeguarding you from HTML viruses and attacks launched via HTML . Configure attachment checking exploit detection engine GFI's Exploit Engine builds on GFI's leading research on exploits, and safeguards you from future viruses and attacks that use known application or operating system exploits. For example, GFI MailSecurity would have protected you against the Nimda and Klez viruses when they first emerged without needing any updates, because these viruses use known exploits. GFI SecurityLabs regularly finds new exploits, and these are automatically downloaded by GFI MailSecurity. GFI MailSecurity is the only security product to detect exploits. Spyware detection GFI MailSecurity's Trojan & Executable Scanner can recognize malicious files including spyware and adware. GFI MailSecurity can also detect spyware transmitted by via the Kaspersky virus engine (optional) which incorporates a dedicated spyware and adware definition file that has an extensive database of known spyware, trojans and adware. Exploit engine quarantines s with OS application exploits Quarantine Store Attachment checking GFI MailSecurity's attachment checking rules enable administrators to quarantine attachments based on user and file type. For example, all executable attachments can be quarantined for administrator review before they are distributed to the user. GFI MailSecurity can also scan for information leaks, for example, an employee ing a database. You can also choose to delete attachments like.mp3 or.mpg files. Granular user-based content policies/filtering Using GFI MailSecurity's powerful content policies rules engine, you can configure rule sets based on user and keywords that allow you to quarantine potentially dangerous content for administrator approval. In this way, GFI MailSecurity can also scan for offensive content. Custom quarantine filters GFI MailSecurity enables you to configure a series of search folders (similar to MS Outlook Search Folders) within the Quarantine Store, permitting you to manage quarantined s better and faster. For example, you can set up a folder for s that were quarantined by virus checking and another for s quarantined by attachment checking for a particular user, allowing you to prioritize which folders you check first: It may be more important to examine the attachment checking folder first as it is more likely to contain s that need to be approved and forwarded to users. The McAfee anti-virus engine Enable easy quarantine folder monitoring through RSS feeds GFI MailSecurity takes advantage of the power of RSS (Really Simple Syndication) feeds to simplify your work as an administrator in keeping an eye on your quarantine store. Through RSS feeds, you will be informed of all new quarantined objects, avoiding the need to log onto the quarantine store to check for new updates manually.

9 Web-based configuration enables remote management from any location The product s web-based configuration allows you to configure and monitor the product and manage quarantined s remotely from any computer that is equipped with a browser. This means that you can monitor and manage GFI MailSecurity from anywhere in the world. Approve/reject quarantined using the moderator client, client or web-based moderator GFI MailSecurity provides several options for moderating quarantined . The moderator client gives you a familiar Windows interface for approving/rejecting . The web-based moderator allows you to approve/reject s from anywhere on your network. Alternatively, GFI MailSecurity can also forward quarantined s to an address, enabling you to use a public folder to distribute the quarantined items to multiple administrators. Searching within quarantined s It is possible to conduct searches within all s that GFI MailSecurity quarantines. Such searches can be performed among inbound or outbound s to or from a particular user, for instance. Searches can also be carried out based on sender, recipient and also quarantine reason, freeing the administrator from the need to go through all quarantined s one by one. Reviews Full threat reporting for quarantined s When an is quarantined, GFI MailSecurity gives a full threat report, detailing all threats identified per . Server-based anti-spam GFI MailSecurity's companion product, GFI MailEssentials for Exchange/SMTP offers spam protection at server level and eliminates the need to install and update anti-spam software on each desktop. GFI MailEssentials includes a number of effective methods to virtually eliminate spam from your network. It also provides disclaimers, Internet reporting, server-based auto replies and POP3 downloading. GFI MailEssentials integrates seamlessly with GFI MailSecurity and both are available as a suite. Other features: Automatic quarantining of Microsoft Office documents with macros Detects attachment extension hiding & renaming User-based, flexible rules configuration Scans embedded s Lexical analysis. You're in good company... Many leading companies have chosen GFI MailSecurity for Exchange/SMTP. Here are just a few: NASA, European Central Bank, MG Rover Group, Caterpillar, PerotSystems, Port Of Tilbury London Ltd, Mexx International BV (Netherlands) and many more. System requirements GFI MailSecurity continues to meet Checkmark standards - GFI MailSecurity has been awarded Anti-Virus Checkmark Level 1 certification from West Coast Labs. The certification ensures that GFI MailSecurity meets the Checkmark program's rigorous standards which are continuously being developed to ensure that they are an accurate reflection of real-world situations and changing technology advances. - West Coast Labs, April 2005 Windows 2000 Server/Advanced Server (Service Pack 1 or higher) or Windows 2003 Server/Advanced Server or Windows XP. Note: Since Windows XP has some speed limitations, installing GFI MailSecurity on a machine running Windows XP could affect its performance. Microsoft Exchange server 2000 (SP1), 2003, 4, 5 or 5.5, Lotus Notes 4.5 and up, or any SMTP/POP3 mail server. When using Small Business Server, ensure you have installed SP 2 for Exchange Server 2000 and SP1 for Exchange Server Microsoft.NET Framework 1.1/2.0. Earns top spot in review of security solutions - InfoWorld reviewer Dan Morton has selected GFI MailSecurity for Exchange/SMTP as the best scanner out of the six solutions he tested, including products by Gordano, Network Associates, Sophos, Symantec, and Trend Micro. GFI MailSecurity got a 'Very Good' rating and was awarded the top score of 8.3 points for its performance. "The differences in score reflect the extra features and overall maturity of some products," wrote the reviewer. "The inclusion of multiple scanning engines and the ability to act as either a server-side or gateway solution, however, are what earned GFI MailSecurity the top spot." MSMQ Microsoft Messaging Queuing Service. Internet Information Services (IIS) SMTP service & World Wide Web service. Microsoft Data Access Components (MDAC) InfoWorld, June 2003 Download your evaluation version from

10 for Exchange archiving of internal and external GFI MailArchiver for Exchange provides easy-to-use corporate archiving, enabling you to centrally archive all internal and external . GFI MailArchiver allows you to archive past, present and future s into one or multiple Microsoft SQL databases, providing both the network administrator and employees with a number of benefits. Network administrators can now avoid the pains of PST file management and: Eliminate corrupted PST files and the lengthy troublesome process of fixing them Overcome the risk of PST loss in the case of hardware failure on the employees workstations Free yourself from complex backup plans to copy PST files from each employee s workstation. GFI MailArchiver allows employees to perform the following actions without needing the assistance of a network administrator: Use their browser to easily locate and access all their s from anywhere in the world Quickly restore s back to their mailbox through a OneClick Restore process, avoiding the cumbersome process of retrieving an from a backup tape or disk, saving the network administrator s time. In addition, GFI MailArchiver also aids in fulfilling regulatory storage requirements (such as the Sarbanes-Oxley Act). Features for the administrator No changes to Exchange mail system GFI MailArchiver for Exchange leverages the journaling feature of Exchange Server, providing unparalleled scalability and reliability. Other mail archiving solutions actually replace the mail with a link to their database this can be a point of failure and can bring down your entire system. GFI MailArchiver works in parallel and does not touch the way Exchange works. Reduce administration by storing in a standard SQL database Because is stored in a standard SQL database, it is easy to backup and restore; no special Exchange backup tools are required. Features & benefits Reduce reliance on cumbersome PST files prone to corruption, loss through hardware failure and requiring complex backup plans Provide end-users with a single, web-based location in which to search and restore past s through a OneClick Restore Significantly reduce storage requirements for by up to 80% Increase Exchange performance and ease backup and restoration Helps comply with Sarbanes-Oxley, SEC and other regulations. Multiple database support and automatic database management support It is possible to archive s in multiple databases this overrides the problem of having one large database that becomes slow and requires more maintenance. GFI MailArchiver allows you to automatically archive s to a new database after a specified time, for example, every month or quarter. Reduce storage requirements GFI MailArchiver compresses and decompresses attachments on the fly, which results in considerable savings in terms of storage when compared to storing attachments in the Exchange stores. In addition, storing in SQL Server is up to 80% more space efficient than storing in PST files. Furthermore, there are more compression and backup features and tools available for SQL Server than for Exchange. An added advantage is that GFI MailArchiver archives only one copy of attachments sent to multiple recipients. Increase Exchange performance by reducing the mail stored on the Exchange Server If you are storing all your company mail on the Exchange Server, performance will start to decline over time. Moving old s into a MS SQL Server will keep your Exchange stores compact and your Exchange performance high. Archive all s to MS SQL Server GFI MailArchiver provides the possibility of centralizing archiving to one physical location by polling s from multiple locations. For example, an office that operates in the US, UK and Australia may want to archive of all offices centrally in one location the US office.

11 Viewing permissions by Active Directory Groups GFI MailArchiver allows you to grant a user viewing rights to all relating to a specific Active Directory Group, for example, the Sales Manager would be able to view all s sent or received by his team. Easy enforcement of company policies Having a central store of , enables you to easily search corporate for particular text and enforce any company policies you may have in place. Searching for an Browsing s Viewing an thread Support for other servers GFI MailArchiver can be used with Exchange as well as other servers with the capability of polling s from a mail server which supports IMAP and Active Directory. End PST hell Using GFI MailArchiver for Exchange eliminates the need for users to archive their mail in PST files on local hard disks. These PST files end up being very large and are difficult to backup and search. Many users do not know how to organize their PST files properly. With GFI MailArchiver, users can browse to the web search interface and retrieve past from the SQL database, rather than having to dig through a store of PST files on disk to find a particular mail. Helps comply with Sarbanes-Oxley Act Under the Sarbanes-Oxley Act 2002 and Security and Exchange Commission (SEC) rules, public companies must prove that their internal controls and audit trails are sound and that their processes are capable of producing certifiably correct data. Companies must retain all correspondence created, sent, or received "in connection with an audit or review" of a public company for a period of seven years, during which time these records must be non-erasable and non-rewritable. This includes any "electronic records" such as , particularly relating to subjects, departments or individuals involved in auditing procedures. Failure to comply is a crime, punishable by up to 10 years in jail. Helps to comply to other acts and regulations GFI MailArchiver is also a valuable tool that aids compliance with the following: E-Comm Act 2000, BS7799-2:2002, Enterprise Act 2002, Decreto del Presidente del Consiglio dei Ministri (8 febbraio 1999) and more. Optionally exclude from particular users If required, you can instruct GFI MailArchiver for Exchange to ignore to and from particular users. Viewing database statistics Features for the user Access s from any location through a browser GFI MailArchiver allows users to access their s from anywhere in the world by using a browser. s that had been deleted may also be seen (and restored). OneClick Restore a single to a mailbox By simply clicking on a button, the user or the administrator can restore an to a user s inbox in its original format. GFI MailArchiver restores any archived (even deleted ) and these are resent to the user as an attachment. The backend database Support for multilingual user interfaces GFI MailArchiver provides support for multilingual user interfaces including English, Dutch, French, German, Italian, Russian and Spanish. Other features: Printer-friendly support for printing s

12 Reviews System requirements GFI MailArchiver wins Archiving Solution Readers Choice Award Windows IT Pro readers voted GFI MailArchiver for Exchange as the winner in the Archiving Solution category of the 2005 Windows IT Pro Readers Choice Awards. The Windows IT Pro Readers Choice Awards are highly coveted in the IT industry because our readers, who are the buyers and users of these products, are the ones who choose the winners, said Kim Paulsen, group publisher of Penton Media s Windows IT Pro Group. These awards are the ultimate acclamation an IT company can earn from its peers in the IT community. Read the full review (PDF format) Windows 2000 Professional/Server/Advanced Server (Service Pack 1 or higher) or Windows 2003 Server/Advanced Server. Microsoft.NET Framework 1.1. Internet Information Services (IIS) World Wide Web service. Microsoft SQL Server 2000 with SP3. - Windows IT Pro, September 2005 GFI MailArchiver wins Exchange Backup award Leading Microsoft Exchange Server resource site, MSExchange.org, announced that GFI MailArchiver was selected a first runner-up in the Exchange Backup category of the MSExchange.org Readers Choice Awards. GFI MailArchiver is considered among the very best in this category. - MSExchange, February 2005 An effective tool for storage and compliance - In an article for Document Manager Magazine, GFI MailArchiver is described as a useful product which saves on storage space and which allows users to comply with legislative storing regulations. The reviewer states that GFI MailArchiver "can help to relieve many of the headaches caused by modern business' reliance on as a primary form of communication". The reviewer also finds the product offers good value for money: "Costed against potential storage savings alone, GFI MailArchiver represents good value to any corporation." In conclusion the reviewer's verdict is: "In an age of almost daily legislative changes, GFI MailArchiver has a clear role to play and looks to be a very effective tool. The way that it works in parallel with Exchange Server offers an efficient and non-intrusive way of storing and retrieving s and attachments." Read the full review (PDF format) - Document Manager Magazine, January/February 2005 GFI MailArchiver wins gold award - Reviewer Dan Nicolo gave GFI MailArchiver the Gold Award with a rating of 4.5 out of a possible 5 points in a review for MSExchange.org. The reviewer recommends using GFI MailArchiver "whether you're looking to ensure that your company's Exchange organization complies with regulatory requirements, or just as a way to quickly retrieve messages from the dark ages". The reviewer also loves the fact that "it does nothing to impact the smooth operation of your Exchange Servers, and requires only one SQL server database". The reviewer concludes by stating: "Quite simply, if you need a simple, fast, and effective way to manage archived Exchange messages, GFI MailArchiver is the answer." - MSExchange, February 2005 Download your evaluation version from

13 for Exchange/SMTP Network fax server for Exchange/SMTP Faxing manually is out of date. A professional fax server grants substantial savings on cost and improves customer service and image: The process of sending a fax is much shorter and incoming faxes are automatically integrated with today s -based workflow. With over 100,000 fax servers shipped since its launch, and numerous prestigious industry awards to its name, GFI FAXmaker is the leading enterprise quality fax server when it comes to reliability, ease of use and administration, and price. GFI FAXmaker for Exchange/SMTP excels in its seamless integration with your mail server. This allows users to send and receive faxes and SMS/text messages directly from their client, making GFI FAXmaker easy to use and learn. Leveraging your infrastructure and Active Directory also allows for unparalleled scalability, reliability and hassle-free administration. Active Directory integration reduces administration GFI FAXmaker for Exchange/SMTP was designed from the ground up to minimize its administration. It integrates with Active Directory and therefore does not require the administration of a separate fax user database. User-related settings can be applied to Windows users or groups directly. Supports Microsoft Exchange 2000/2003/5.5 GFI FAXmaker integrates with Exchange Server 2000/2003 via a standard Exchange SMTP connector. There are no schema updates to Active Directory. This makes GFI FAXmaker scalable and indifferent to new Exchange service packs and versions. Microsoft Exchange 5.5 is supported by creating a routing rule on the Exchange 5.5 SMTP connector. GFI FAXmaker can be installed on the Exchange server (if using 2000/2003), or on a separate machine, in which case no software has to be installed on the Exchange server itself! Features & benefits Best fax integration available for your mail server Minimal administration and user training required The most popular fax server, voted #1 by Windows IT Pro readers 3 years running Unbeatable pricing: USD 1250 for 25, USD 1995 for 50, USD 5995 for unlimited users. Fax over IP (FOIP) support GFI FAXmaker offers Fax over IP (FOIP) functionality enabling you to send faxes over the Internet whilst easily integrating with the existing IP infrastructure, such as IP-enabled PABXs. GFI FAXmaker's FOIP may also be used to implement Least Cost Routing (LCR); this results in cost-effectiveness that is achieved through a reduction in international calls dialed since calls are translated into a local call at the recipient s country. FOIP may only be employed if the appropriate FOIP-enabled software or devices are installed. Supports Lotus Notes & SMTP/POP3 servers GFI FAXmaker integrates via the SMTP/POP3 protocol with Lotus Notes and any SMTP/POP3 server. It can be installed on the mail server itself or on a separate machine. In the case of Lotus addressing is supported. Automated fax delivery/inbound fax routing GFI FAXmaker can automatically route incoming faxes to the user's mailbox or to a particular printer based on a DID/DDI/DTMF number or the line on which the fax was received. Faxes can also be forwarded to a public folder or assigned to a network printer per installed fax port. SMS/texting gateway allows users to send SMS/text messages from their desktop GFI FAXmaker's SMS gateway enables network users to send SMS messages from their desktop; this allows them to easily contact business colleagues and associates who are on the road or away from their desk. Using the SMS gateway rather than a mobile phone is faster (no need to use the phone pad) and saves users the cost of the SMS message. SMS messages can either be sent via an Internet-based SMS service or through a mobile phone or PCMCIA mobile card. The SMS gateway can also be used for administrative alerts, for example, to notify an administrator of critical system outages or application problems. Any -enabled application can send SMS messages via the GFI FAXmaker SMS gateway. A central log of SMS messages permits the control of SMS use.

14 GFI FAXmaker configuration Supports multiple mail servers & clustering Because of its flexible infrastructure, GFI FAXmaker can send and receive faxes for users on different mail servers. It can also support a mix of Exchange 5.5, Exchange 2000/2003 servers or even SMTP/POP3 servers. Active and passive clustering is fully supported because GFI FAXmaker does not require any software to be installed on the mail server itself; simply configure both mail servers in the cluster to be able to send and receive faxes via GFI FAXmaker. Robust & scalable multi-line fax server GFI FAXmaker includes a robust fax server, which can scale up to 32 lines per fax server using fax boards or active ISDN cards. For smaller installations, Fax modems can be used as well. GFI FAXmaker also supports the use of the Windows 2000/XP/2003 fax drivers for wider hardware support. The GFI FAXmaker server monitor Native ISDN support GFI FAXmaker natively supports ISDN, allowing you to use inexpensive active ISDN cards and get multi-line faxing and inbound routing at a fraction of the price of using multi-line fax boards. Archive faxes to GFI MailArchiver, to SQL, or other archiving solution GFI FAXmaker allows you to archive all faxes to GFI MailArchiver, a SQL database or to an address. GFI MailArchiver is an archiving solution that stores all mails in a SQL database and allows users to easily search for past s and faxes. GFI FAXmaker can be configured to forward all faxes to GFI MailArchiver, allowing users to search for past faxes in the same way as s. With the OCR module, faxes can also be searched based on what text they contained. Monitor fax queue Optional OCR reading & routing module The optional OCR module can be used to convert all incoming faxes to a readable text format using Optical Character Recognition (OCR) technology and then route the fax to the correct user by finding keywords related to a recipient, for example his first name, last name or job function. If GFI FAXmaker cannot match a recipient, it will route the fax to the default recipient/router. This feature is also especially handy if you plan to archive all faxes, since it makes searching for a particular fax much easier. Junk fax filter GFI FAXmaker includes a junk fax filter that can auto-delete spam faxes on the basis of sender number. Easy application integration using NetPrintQueue2FAX Send faxes from any application To send a fax, users print from their word processor to the GFI FAXmaker printer, or create a new message in their client (e.g., Outlook or Outlook Web Access). The user then selects the recipient(s) of the fax from the Outlook Contacts list (address book) or enters the fax number directly. After clicking on the "Send" button, the fax is sent and the user receives a transmission report in his/her inbox. Receive faxes in your client in fax or PDF format GFI FAXmaker delivers faxes to the user s inbox in TIF fax format or Adobe PDF format. This enables users to check faxes from anywhere in the world, using either a normal desktop client (for example, Outlook) or a web-based client (for example, Outlook Web Access). Receiving faxes in PDF format means the fax can be forwarded to anybody, and it also allows for easy integration with document archiving systems or workflow software/procedures. Supports Brooktrout and ISDN fax cards and modems Allows you to send/receive faxes via your handheld or mobile Via GFI FAXmaker's 2Fax Gateway, the clients of handhelds like the Blackberry and Pocket PC (2003 upwards) can be used to send faxes. The Blackberry and Pocket PC clients can also receive faxes and fax reports as s. The Blackberry devices have built-in PDF viewer that seamlessly integrate with GFI FAXmaker's PDF capabilities; most Pocket PC 2003 also ship with built-in PDF viewers. As long as they have image-viewing capabilities to view received faxes, GPRS mobile (cell) phones that are -compliant can use GFI FAXmaker in the same way as handhelds.

15 Supports Outlook Contacts There is no need to keep a separate fax address book just select the recipient's "Business Fax" entry from the Outlook Contacts list or the Global Address Book: No need to duplicate address entries. Attach Office documents, PDF, HTML and other files Users can attach Microsoft Office, PDF, HTML and other files to their fax. These are rendered to fax format on the fax server. The Send to Mail Recipient command, available in Microsoft Office and other applications, can therefore also be used to quickly send a document as a fax. Automatic application integration & mail merges with NetPrintQueue2FAX GFI FAXmaker's NetPrintQueue2FAX feature allows you to embed a fax number in a document and 'print to fax' from almost any application, from anywhere in the network - without having to enter the fax number separately. This feature is especially handy for accounting applications; an invoice can be faxed simply by embedding the fax number in the document. No application integration or development is required. Reviews Fax broadcasting using Microsoft Office mail merge Using the mail merge facility of Microsoft Word/Office, you can send personalized fax broadcasts. Because Microsoft Office supports ODBC, the recipient list can be retrieved from any data source, including Microsoft SQL Server, Microsoft Access and many more. Support for Citrix The GFI FAXmaker client can run on a Citrix terminal server. That way Citrix users can send faxes when logged on Citrix. Other features: Real time fax over IP using Brooktrout TR1034 cards HP Digital Sender support: Easily fax paper documents via GFI FAXmaker Fax annotation Automatically print transmission reports including miniatures of the fax Preview a fax Text API allows for easy application integration Supports rendering of HTML format messages No schema updates Auto-print faxes on different network printers based on routing rules Call accounting: Analyze fax costs using Microsoft Excel Routing of faxes to other FAXmaker server for least cost routing (LCR) by means of SMTP Support for Windows 2000/XP/2003 fax drivers Design coversheets in HTML or in RTF (Microsoft Word) format Remote fax server monitoring. System requirements GFI FAXmaker wins Readers' Choice Award as Best Fax Server - Windows &.NET Magazine readers voted for GFI FAXmaker for Exchange as the Best Fax Server in the Windows &.NET Magazine Readers' Choice Awards for the second consecutive year. - Windows &.NET Magazine, September 2003 GFI FAXmaker voted Readers' Choice as Best Communication/Collaboration Solution -.NET Magazine readers selected GFI FAXmaker for Exchange as the Best Communication/Collaboration Solution in the publications' first ever Reader s Choice Awards. Windows 2000/2003/XP server machine with at least 256 MB of RAM and an 800 MHz processor. A professional fax device: For a complete list go to If you are installing GFI FAXmaker on a separate machine, the IIS SMTP service will need to be installed. If using Windows 2000, ensure you have Service Pack 3 or later installed. For more detailed system requirements please see the manual. -.NET Magazine, June 2003 Download your evaluation version from

16 Network Security Scanner Network security scanner, port scanner and patch management GFI LANguard Network Security Scanner (N.S.S.) checks your network for all potential methods that a hacker might use to attack it. By analyzing the operating system and the applications running on your network, GFI LANguard N.S.S. identifies possible security holes. In other words, it plays the devil's advocate and alerts you to weaknesses before a hacker can find them, enabling you to deal with these issues before a hacker can exploit them. GFI LANguard N.S.S. scans your entire network, IP by IP, and provides information such as service pack level of the machine, missing security patches, wireless access points, USB devices, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Scan results can easily be analyzed using filters and reports, enabling you to proactively secure your network for example, by shutting down unnecessary ports, closing shares, installing service packs and hotfixes, etc. GFI LANguard N.S.S. is also a complete patch management solution. After it has scanned your network and determined missing patches and service packs both in the operating system and in the applications you can use GFI LANguard N.S.S. to deploy those service packs and patches network-wide and also deploy custom software. Identifies security vulnerabilities and recommends action (or solutions) Once GFI LANguard N.S.S. has completed scanning a computer, it categorises security vulnerabilities and recommends a course of action (or solutions). Wherever possible, further information or a web link is included regarding the security issue, for example a BugTraq ID or a Microsoft Knowledge Base article ID. Network-wide patch and service pack management You can deploy missing service packs and patches network-wide, without user intervention. GFI LANguard N.S.S. is the ideal tool to monitor that Microsoft SUS is doing its job properly and it performs tasks SUS cannot do such as; deploying Microsoft Office patches and custom software patches, patch reporting and immediate deployment of high alert patches. Fast TCP/UDP port scanning and service fingerprint identification GFI LANguard N.S.S. includes a fast TCP/IP and UDP port scanning engine, allowing you to scan your network for unnecessary open ports. While identifying key open ports (such as www, FTP, Telnet, SMTP) through banner processing, GFI LANguard N.S.S. will also query the service running behind the detected open ports to ensure that no port hijacking took place. Patching support for multilingual operating systems GFI LANguard N.S.S. supports detection of missing Microsoft security updates and their deployment on both English and also on non-english Windows operating systems. Features & benefits Audit your network for security vulnerabilities (Windows and Linux) Detect unnecessary shares, open ports and unused user accounts on workstations Check for and deploy missing security patches and service packs in OS and Office Wireless node/link detection and USB device scanning #1 Windows security scanner (voted by NMAP users and 200,000+ sold). Automatically downloads security patches and vulnerability information Through its auto-update system, GFI LANguard N.S.S. is always kept updated with information about newly released Microsoft security updates as well as new vulnerability checks issued by GFI. Automatically alerts you of new security holes GFI LANguard N.S.S. can perform scheduled scans (for instance daily or weekly) and can automatically compare the results to previous scans. Any new security holes or changes appearing on your network are ed to you for analysis. This enables you to quickly identify newly created shares, installed services, installed applications, added users, newly opened ports and more. Ensures that third party security applications such as anti-virus and anti-spam offer optimum protection It is possible to check that supported security applications such as anti-virus and anti-spyware software are updated with the latest definition files and are functioning correctly. For example, you may ensure that supported security applications have all key features (such as real-time scanning) enabled.

17 GFI LANguard Network Security Scanner GFI LANguard Network Security Scanner main screen Multiply the value of GFI LANguard N.S.S. with powerful reporting Reports designed to satisfy the requirements of both management and technical staff deliver a graphical view of the security health status of your network. From trend reports for management (ROI) to daily drill-down reports for technical staff; the GFI LANguard N.S.S. ReportPack provides you with the easy-to-view information you need, to fully understand the ever-changing security environment of your network. Full automation and custom scheduling allow you true install-and-forget functionality! Extensive, industrial-strength vulnerabilities database GFI LANguard N.S.S. ships with a complete vulnerabilities database, which also includes top SANS issues, as well as Linux and CGI vulnerabilities. This vulnerabilities database is regularly updated with issues reported to BugTraq, SANS, CVE and other sources. New vulnerabilities can be downloaded automatically from the GFI website. Easily creates different types of scans and vulnerability tests Administrators can configure scans for different types of information; such as open shares on workstations, security audit/password policies and machines missing a particular patch or service pack. Different types of vulnerabilities can be scanned for, and the scan can also be performed using different identities. Indicates vulnerabilities found Enables easy filtering of scan results Easily analyze the scan results by clicking on one of the default filter nodes to show, for example, machines with high security vulnerabilities or machines that are missing a particular service pack. Custom filters can be easily created from scratch and it is also simple to customize existing filters. You can also export scan results data to XML. Finds unused local users and groups GFI LANguard N.S.S. enumerates all local users and groups, and identifies user accounts that are no longer being used. You may then remove or disable these accounts, which could present a security risk to your network. Extensive HTML security reports Deploy Microsoft patches node Finds all shares on your network GFI LANguard N.S.S. enumerates all shares on your network, including administrative and printer shares (C$, D$, ADMIN$) and shows you who has access to the share. Use this feature to: Check if permissions of shares are set correctly Check whether a user is sharing his/her whole drive with other users Prevent anonymous access to shares Ensure that startup folders or similar system files are not shared as this could allow less privileged users to execute code on target machines. Lists and detects blacklisted applications With GFI LANguard N.S.S. you can enumerate all the applications that are currently installed on the target computers. You may also identify unauthorized or dangerous software by specifying the list of blacklisted applications that you want to locate and associate with a high security vulnerability alert. GFI LANguard N.S.S. ReportPack add-on Configuring the vulnerabilities to scan GFI LANguard Network Security Scanner ReportPack Quick Reference Guide The GFI LANguard N.S.S. ReportPack is a full-fledged reporting companion to GFI LANguard N.S.S. This reporting package can be scheduled to automatically generate graphical IT-level and management reports based on the data collected during your security scans.

18 Detects wireless nodes and links GFI LANguard N.S.S. can detect machines or devices which are connected to your network via a wireless link. Wireless links are a tremendous security risk if they are not secured properly. Allows you to predefine authentication details GFI LANguard N.S.S. allows you to store separate authentication details for every target computer on your network, avoiding the need to specify authentication credentials prior to every scan. In a single scanning session, it is possible to audit all the targets in your network, even if they require different authentication details/methods. Enables creation of custom vulnerabilities Using scripts and conditions, you can add your own vulnerability checks using conditions, such as checking for particular registry entries and values. You can also write complex vulnerability checks using the GFI LANguard N.S.S. VBScript-compatible script engine. GFI LANguard N.S.S. includes a script editor and debugger to help with script development. Checks if security auditing is enabled network-wide GFI LANguard N.S.S. checks if each NT/2000/XP machine has security auditing enabled. If not, GFI LANguard N.S.S. alerts you and allows you to enable auditing remotely. Security event auditing is highly recommended it allows you to detect intruders in real time. GFI LANguard N.S.S.'s companion product GFI LANguard Security Event Log Monitor (S.E.L.M.) automates network-wide, real time analysis of security events. Deploys custom/3rd party software and patches network-wide Besides deploying patches and service packs, GFI LANguard N.S.S. allows you to easily deploy 3rd party software or patches network-wide. Use this feature to deploy client software, update custom or non-microsoft software, virus updates and more. The custom software deployment feature obsoletes the need for Microsoft SMS, which is too complex and expensive for small to medium sized networks. Reviews Scans for dangerous USB devices USB devices can be a potential security problem since almost any device can be connected. This creates a potential security risk and as an administrator you have little control. GFI LANguard N.S.S. scans all devices connected to the USB hub, filters authorized USB devices (such as the mouse) and only alerts you to dangerous or unknown USB devices. Reports NTFS and share permissions GFI LANguard N.S.S. will display both share and NTFS permissions for all shares in your network, allowing you to easily check and lock down your shares. Scans and retrieves OS data from Linux systems It is possible to remotely extract OS data from Linux-based systems and scan results are presented in the same way as for Windows. This means that both Linux and Windows-based target computers can be investigated in a single scanning session! GFI LANguard N.S.S. includes numerous Linux security checks including rootkit detection. Authentication to Linux targets through SSH Private Keys GFI LANguard N.S.S. can use SSH Private Key files instead of the conventional password string credentials to authenticate to Linux-based target computers. Checks status of GFI EndPointSecurity GFI LANguard N.S.S. can also check that the portable storage control service is active. GFI EndPointSecurity gives you network-wide control of portable storage devices: Control which users can use a USB stick, MP3 player, IPOD, floppies and more. Silent installation support You can perform an unattended default installation of GFI LANguard N.S.S. on multiple computers in the background without any user interaction or intervention. Customization of the deployment parameters is also possible through the creation of Microsoft Transform (MST) Files. System requirements GFI LANguard N.S.S. gains the highest trust of customers worldwide - GFI Software announced today that Info Security Products Guide has named GFI LANguard Network Security Scanner a winner of the Global Excellence in Network Security Solution Customer Trust 2006 Award. This customer trust honor is the greatest endorsement to the fact that GFI LANguard N.S.S. is ahead of the curve when it comes to the best-of-the-best products that can provide the highest network security. Windows 2000 (SP4) / XP (SP2) / 2003 operating system. Internet Explorer 5.1 or higher. Client for Microsoft Networks component this is included by default in Windows 95 or higher. Secure Shell (SSH) this is included by default in every Linux OS distribution pack. - Info Security Products Guide, June 2006 Download your evaluation version from

19 Security Event Log Monitor Network-wide event log monitoring Many companies mistakenly assume that unauthorized access is only attempted by external parties. Actually, the majority of corporate security threats stem from internal sources, against which a firewall offers no protection. GFI LANguard S.E.L.M. monitors the security event logs of all your Windows NT/2000/XP/2003 servers and workstations and alerts you to possible intrusions/attacks in real time, giving you peace of mind. GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred (outside or during operating hours), role of computer (workstation, member server or domain controller) and its operation system. Based on this information, GFI LANguard S.E.L.M. can decide whether the security event is critical, high, medium or low. Now you can quickly respond to important security events without being an event log guru and knowing the ins and outs of each Windows event. Besides analyzing security event logs, GFI LANguard S.E.L.M. can analyze application, system and other event logs too. You can back up and clear event logs on all remote machines in your network automatically; and view, report and filter events network-wide, instead of just per machine. GFI LANguard S.E.L.M. collects all events in one central database, making it easy to create network-wide reports and custom filters. Using the custom rules, you can create your own event alerts based on event ID, condition and event contents. GFI LANguard S.E.L.M. is the only event log management product that can analyze the contents of the event properties. In addition, GFI LANguard S.E.L.M. enables you to create reports to get a more in-depth understanding of your network. Network-wide analysis of event logs made easy Translates the often cryptic event descriptions to clear, concise explanations and suggestions for action Removes noise events that make up a large ratio of all security events Solves the problem of security log files being tampered with Provides real-time monitoring and notification Solves fragmented audit trails by consolidating all security events into a single database. Features & benefits Monitor for critical security events network-wide detect attacks & malicious network users Receive alerts about critical events on Exchange, ISA, SQL and IIS Servers Back up and clear event logs network-wide, and archive to a central database No client software/agents required. Monitor IIS, Exchange, ISA & SQL Server Using GFI LANguard S.E.L.M., you can proactively monitor your mission-critical servers. You can also monitor events generated by Microsoft ISA Server, Exchange Server, SQL Server and IIS and prevent network disasters from occurring. For example, you can monitor queues, SMTP gateways, MAPI availability, bad hard disk blocks, disk space, and more. View reports on key security information happening on your network GFI LANguard S.E.L.M. s reporter enables you to identify security trends. Use its standard reports which you can customize or create custom reports from scratch. The standard reports include: All failed logons Users who failed to logon due to an invalid username or an incorrect password All account lockouts for a time period Initial daily logon time for each user over a time period Which computers users log into Possible security log tampering for a time period Failed object access events (e.g., to secured files) High security events of the past day, week or month.

20 Real-time alerts GFI LANguard S.E.L.M. can send you alerts when key events or intrusions are detected. You can alert one or more people by , and send SMS or pager alerts via an -to-sms gateway or service. Critical events are also shown in the intrusion monitor. GFI LANguard S.E.L.M.'s configuration Advanced filtering of events using the GFI LANguard S.E.L.M. Event Viewer The Windows standard event viewer has limited features, and can only view one computer at a time. GFI LANguard s Event Viewer provides a single view of all events on all your machines, and also offers advanced filtering capabilities. For example, you can filter based on user, computer, PC security level, and contents of the event description/property. It also includes a condition builder to enable you to make advanced filters on a combination of these variables. Detect intruders and security breaches: Intrusion detection the right way! GFI LANguard S.E.L.M. acts as a host-based intrusion detection system by analyzing security events in real-time. This way you can detect intruders and security breaches without having to install a network-based intrusion detection system (IDS). Network-based IDS products are expensive and difficult to deploy. View reports on key security information happening on your network Scalable to support WANs and LANs GFI LANguard S.E.L.M. has a very efficient event log collector agent, allowing real-time collection of security events without impacting network performance. For very large networks or WANS, scanning of events can be distributed over multiple GFI LANguard S.E.L.M. installations, which can be connected via the WAN connector. In this way, each GFI LANguard S.E.L.M. installation will monitor a specific part of the LAN or WAN and retrieve critical/important events for this "section". The connector then forwards these critical events to a central GFI LANguard S.E.L.M. database. This reduces network traffic, bandwidth and storage use, but still allows you to monitor tens of thousands of workstations and servers, even across WAN links. Advanced filtering of security events using the GFI LANguard S.E.L.M. Event Viewer Rules-based event log management GFI LANguard S.E.L.M. includes a powerful rules interface, which allows you to easily set up event rules based on the ID, condition and content of an event property. For example, be notified immediately if a particular user tries to log in more than x number of times, or attempts to access a particular file. You can also use the rules wizard to monitor custom or third party applications. Intrusion & event collection status monitor Monitor access to important files By auditing failed access to important files you can check who is attempting to access those files. This enables you to preempt more extensive network attacks or hacking attempts based on social engineering. GFI LANguard also allows you to audit successful access to files, meaning you can record who accessed the files and when. You can also monitor for certain processes being launched. Other features: Intrusion and event collection status monitor Supports Access, SQL Server and MSDE as backend Real-time and scheduled monitoring Detect web server intrusions Detect changes to important files on workstations and servers. Immediate notification of critical events via intrusion monitor Quickly locate events based on event properties and content You're in good company... Many leading companies have chosen GFI LANguard S.E.L.M. Here are just a few: Primerica, Pepsico France, Royal & Sunalliance USA Inc., ATP, Ceridian Canada and many more.

21 Reviews System requirements GFI LANguard S.E.L.M. selected as the winner - GFI LANguard Security Event Log Monitor took top honors in the closely contested Best Security Auditing category in the annual 2006 Redmond magazine Readers Choice Awards. Windows 2000 Pro or Server, Windows XP or Windows Servers and clients to monitor must be running Windows NT, 2000, XP or Redmond magazine, May 2006 Redmond magazine readers choose GFI LANguard S.E.L.M. - Readers of Redmond magazine have named GFI LANguard Security Event Log Monitor as the "Best Security Auditing Product" in the publication's annual Redmond Reader Survey Awards, published in the "Best of the Best" issue. All products chosen are "solid, innovative, and essential", according to editor-in-chief, Doug Barney: "All of our winners are truly outstanding." Over 2,000 readers voted for the products that they use to help them get their jobs done. - Redmond magazine, January 2005 GFI LANguard S.E.L.M identifies and prevents network intrusions - CRN technology editor Frank J. Ohlhorst was impressed with GFI LANguard Security Event Log Monitor, referring to it as "a comprehensive security package" that can help administrators detect and respond immediately to internal and external attacks. Describing the product's key benefits, the reviewer highlighted the tool's straightforward installation process and said that GFI LANguard S.E.L.M is a security must-have for any company. The product scored 4 out of 5 for technical merit as well as for GFI's channel program and was awarded the CRN Test Center Recommended logo. Read the complete review! - CRN, January 2004 MCP Magazine readers choose GFI LANguard S.E.L.M. - Readers of Microsoft Certified Professional Magazine have named GFI LANguard Security Event Log Monitor as the best product for "Determining Who's Accessing What" category in the publication's "Products You Love" Awards. MCP Magazine reported that "GFI LANguard S.E.L.M. beat out software from the multi-billion dollar behemoth Computer Associates to win the security auditing category": Readers were impressed by GFI LANguard S.E.L.M.'s real time reporting capabilities and the fact that it "protects networks from creeps inside...the firewall - you know, the hacker-wanna-be in the mailroom or the disgruntled IT employee who'll stop at nothing to get revenge". - Microsoft Certified Professional Magazine, December 2003 GFI LANguard S.E.L.M. named "Best of 2002" GFI LANguard Security Event Log Monitor has won SC Magazine's Best of 2002 award. - Secure Computing Magazine, December 2002 GFI LANguard S.E.L.M. awarded NSS Approved logo - The NSS Group has reviewed GFI LANguard Security Event Log Monitor and awarded it the NSS Approved logo that is granted only to products that the group is happy to recommend. In a detailed review, the NSS Group found that GFI LANguard S.E.L.M. enables administrators to perform detailed analysis of Windows security event logs, providing them with real-time security alerts. - The NSS Group, October 2001 Download your evaluation version from

22 Network-wide control of portable storage, media and consumer electronic devices You have invested in network anti-virus software, firewalls, and web content security to protect against external threats. Yet any user can come into the office, plug in a USB stick the size of the average keychain and take in/out over 32 GB of data. This poses a tremendous threat: Users can take confidential data or they can unknowingly introduce viruses, trojans, illegal software and more actions that can affect your network and company severely. Yet, as an administrator you have no way to control this! Group policy offers no control. According to a 2005 FBI Computer Crime Survey, 44% of organizations have reported network intrusions from within their own organizations. Technology analyst Gartner warns that portable devices containing a USB or FireWire connection are a serious new threat to businesses. In their report, Gartner named removable media devices as a significant security risk in the workplace and advised that these can be used both to download confidential data, and also to introduce a virus into the company network. GFI EndPointSecurity allows administrators to actively manage user access and log the activity of: Media players, including ipod, Creative Zen and others USB sticks, CompactFlash, memory cards, CDs, floppies & other storage devices PDAs, BlackBerry handhelds, mobile phone and similar communication devices Network cards, laptops and other network connections. How it works To control access, GFI EndPointSecurity installs a small footprint agent on the machine. This agent is only 1.2 MB in size the user will never know it is there. GFI EndPointSecurity includes a remote deployment tool based on GFI LANguard technology, allowing you to deploy the agent to hundreds of machines with just a few clicks. After installation, the agent queries Active Directory when the user logs on and sets permissions to the different nodes accordingly. If the user is not a member of a group that allows him/her access, then access to the device is blocked. Features & benefits Blocks insider data theft by fully controlling access to portable storage devices like memory cards, CDs and more Prevents the introduction of viruses and unauthorized software by controlling all endpoint connectable devices such as PDAs, laptops and more Supports all types of connectable devices through USB/FireWire such as wireless cards, cameras, ipods, PDAs and more Provides full network-wide control through unique group-based protection. Control user access and log the activity of portable storage media like USB memory sticks, SD cards and more USB sticks are one of the main threats as they are small, easily hidden and can store up to 4 GB of data. GFI EndPointSecurity recognizes USB storage sticks in addition to any device that can be mounted as a hard disk (whether accessed via USB, FireWire, etc.). For example, plugging a digital camera into a USB port gives users access to storage on an SD card; SD cards are available in several sizes including 2 GB and over. Control access to CDs and floppies You can centrally disable users from accessing CD/DVD drives as well as from reading or writing data to and from floppy disks. This way, you can block normal users from bringing in data that could be harmful to your network, such as viruses, trojans and other malware. Although you can switch off CD and/or floppy access from the BIOS, in reality this solution is impractical: You would have to physically visit the machine to temporarily switch off protection and install software. In addition, advanced users can hack the BIOS. Protect your network against the threats posed by non-removable media devices GFI EndPointSecurity protects your network against non-removable media devices by allowing you to lock down a machine to a specific hardware level, guaranteeing protection against Bluetooth devices, network cards and more.

23 GFI EndPointSecurity GFI EndPointSecurity configuration Easily configure group-based protection control via Active Directory You can configure and categorize computers into different protection groups: For each group you may specify different levels of protection and devices to allow or disallow access to. You can also leverage the power of groups and make an entire department a member of the group and easily change the settings for the entire group. Configuration of GFI EndPointSecurity is effortless and leverages the power of Active Directory and does not require the administrator to remember and keep track of which policies were deployed to which computers. Other storage control software requires cumbersome per-machine administration, forcing you to make the changes on a per-machine basis and update the configuration on each machine before the settings can take effect. Granular access control GFI EndPointSecurity enables you to allow or deny access to a device as well as to assign read only or full access privileges (where applicable) over every supported device (such as PDAs) on a user by user basis. Log device-related user activity With GFI EndPointSecurity you can log device-related user activity to both the event log and a central SQL Server. A list of files accessed to/from the device is recorded whenever users plug in devices both successfully and unsuccessfully. Allow/deny access to Active Directory groups Easy network-wide deployment of agents Get full reports on device usage with the GFI ReportPack add-on - FREE! The GFI EndPointSecurity ReportPack is a full-fledged reporting add-on to GFI EndPointSecurity. This reporting package can be scheduled to automatically generate graphical IT-level and management reports based on data collected by GFI EndPointSecurity, giving you the ability to report on devices connected to the network, device usage trends, files copied to and from devices (including actual names of files copied!) and much more. Purchase before September 30, to receive FREE ReportPack with every GFI EndPointSecurity 3 offer worth up to USD 2,500! Includes remote deployment tool The GFI EndPointSecurity remote deployment tool can deploy the agent network-wide in a few minutes. You can configure to deploy domain-wide, per computer or to a list of computers. Centralized control facilitates temporary access Because you can easily add/remove a user to a group in Active Directory, it is simple to grant temporary access to a removable media, floppy or CD. Temporary access may be occasionally required, but should not mean that you cannot control access the rest of the time. Configure which devices you wish to control GFI EndPointSecurity ReportPack add-on The ReportPack is a full-fledged reporting add-on to GFI EndPointSecurity which can be scheduled to automatically report on such items as devices connected to the network, device usage trends per user, files copied to and from devices (including actual names of files copied!) and much more.special offer: FREE ReportPack with every GFI EndPointSecurity 3 purchased before September 30, 2006 worth up to USD 2,500! Adding a new user/group Deployment status GFI EndPointSecurity ReportPack

24 Other features: Support for operating Unicode-compliant language systems in any Reviews You're in good company... Many leading companies have chosen GFI EndPointSecurity. Here are just a few: Best Western Sterling Inn, Fair Trades Ltd, Central Highlands Water, Aurum Funds and many more. System requirements An effective way at limiting exposure risks - In a review for Windows IT Pro, reviewer John Green awards GFI LANguard Portable Storage Control (now GFI EndPointSecurity) 4 points out of a possible 5. The reviewer found the product "easy to install and administer", stating: "The agent installed quickly and painlessly in my testing." The reviewer concludes by noting GFI LANguard P.S.C. is "an effective way to restrict user access to portable storage devices". Windows 2000/2003 or Windows XP Pro. - Windows IT Pro, March 2005 GFI LANguard P.S.C. plugs important security hole - In an article entitled "Corporate archives on users keychains", reviewer Michael Osterman, writing for NewtworkWorldFusion, discusses the significant dangers posed by USB sticks to corporate messaging systems. The two possible dangers discussed are the theft of "large amounts of sensitive data", and the "introduction of viruses and malware from a home PC to the corporate network". The reviewer sees GFI LANguard P.S.C. (now GFI EndPointSecurity) as a possible solution to this growing security threat. "GFI s new tool plugs an important security hole that exists in many networks, making messaging data and other content just a bit more secure." - NetworkWorldFusion, October 2004 Silver award for GFI LANguard Portable Storage Control - Reviewer Deb Shinder writing for WindowSecurity.com, awarded GFI LANguard Portable Storage Control (now GFI EndPointSecurity) the silver prize, rating it 4/5. The reviewer describes GFI LANguard P.S.C. as an essential tool for administrators to technologically control the use of portable storage devices. The reviewer found the software easy to install and use. She notes that the interface is simple, and she particularly liked the program included links to a support center and KnowledgeBase within the management console. The reviewer concludes by stating that there is a definite need for a program like GFI LANguard P.S.C. "Administrators are sure to sleep easier at night, knowing they have a way to keep rogue USB drives and other removable media from threatening the integrity of their networks." - WindowSecurity.com, September 2004 Download your evaluation version from

25 Automatically sends alerts and corrects network & server issues GFI Network Server Monitor is a network monitor that enables administrators to scan the network for failures or irregularities automatically. With GFI Network Server Monitor, you can identify issues and fix unexpected conditions before your users (or managers) report them to you! GFI Network Server Monitor maximizes network availability by monitoring all aspects of your Windows and Linux servers, workstations and devices (routers, etc). When a failure is detected, GFI's network monitor can alert you by , pager or SMS, as well as taking corrective action by, for example, rebooting the machine, restarting the service or running a script. GFI Network Server Monitor actually tests the status of a service, rather than deducing a service status from generated events (as other products do), which is the only real way to ensure server uptime! GFI Network Server Monitor is easy to set up and use, and is competitively priced. Enterprise class architecture GFI Network Server Monitor consists of a network monitoring service and a separate management interface. No agent software needs to be installed on the machines you wish to monitor. The Network Monitor Engine is multi-threaded and can run 40 checks at a time. This software architecture allows for high reliability and scalability to monitor both large and small networks. Includes checks for Exchange 2000/2003, ISA server, IIS and others Via the Quickstart wizard, you can quickly create a series of checks which monitor all the important services on your network, including Exchange Server, IIS and others. Critical Exchange services and performance counters (Information Store, mailboxes, SMTP service, etc) are monitored. Features & benefits Monitor your network and servers for software and hardware failures Out-of-the-box monitoring of Exchange, ISA, SQL and Web servers Monitor disk space, services, processes, etc. on servers and workstations Easy to learn/use and easy to deploy no client component/agent. Monitors terminal servers by actually logging in GFI Network Server Monitor can check the status of a terminal server by actually performing a complete login and checking if the session is established correctly. This monitoring method is superior to relying on the events that the terminal server generates (as Microsoft MOM does). Monitor your database servers (SQL/ODBC) GFI Network Server Monitor can check the availability of all leading database applications. Out of the box, it can monitor Microsoft SQL Server via ADO. Other databases such as Access, FoxPro, Paradox, SyBase, Informix, IBM DB2 and many more can be monitored via ODBC. Monitor Linux servers GFI Network Server Monitor includes extensive checks for monitoring Linux servers. You can monitor CPU usage, printer availability, file existence, process running, folder size, file size, users and groups membership, disk partition check and disk space. In addition, administrators can create any check by creating an SSH script. Performs administrative steps to ensure that a service is running GFI has developed specialized checks which mimic administrator operations to verify that services offered by various applications are running, for example, logon to a service, perform a task and logoff the service without the need for any administrative intervention! The monitoring functions that make use of such methodologies include: IMAP, POP3, SMTP Server and the route check. Through the active use of such services one can guarantee that all aspects of these services are running and functioning. Takes corrective action automatically After an unexpected condition has occurred, GFI Network Server Monitor can automatically correct the problem by restarting a service (or multiple services) upon failure; rebooting a server upon failure; or launching an executable, batch job or VBScript.

26 The GFI Network Server Monitor manager Detailed network resource availability report Monitor SMTP server function Monitor HTTP server function Reboot or restart service upon failure detection Built-in computer monitor functions CPU usage function Ensure that a processor s usage does not go beyond a certain level Performance counter Monitor any internal operating system counter, including counters used by SQL Server and MSMQ Directory size function Ensure that a particular directory (for example, a user s home directory) does not take up more than x amount of drive space Disk drive function Monitor the physical status of the disk Disk space function Check if sufficient disk space is available File existence function Monitor the existence of a particular file, for example, results of scheduled batch jobs File size function Monitor the size of particular files, for example, critical log files. Built in Internet service functions HTTP function Checks availability of HTTP and HTTPS sites; passes credentials if required Website content checking Checks website content by specifying a text pattern FTP function Checks availability of an FTP server/site ICMP ping function Checks a remote host for availability IMAP server function Checks that the IMAP service is functioning by logging into the service and checking the count of the s contained in a specific folder on the IMAP server DNS server function Checks DNS server by reading an 'A' record and verifying the result SMTP server function Checks mail server by establishing a connection and handshaking to verify SMTP protocol is working correctly POP3 server function Checks POP3 servers by establishing a connection and handshaking NNTP news server function Checks connection and does a handshake SNMP function Monitors specific variables on remote machines or devices via the SNMP GET message TCP port function Checks if a port is responding and checks its response UDP function Monitors UDP ports NTP timeserver function Monitors status of timeservers route function Checks the health of services by actually sending test s and verifying their delivery at destination. This check is also useful for verifying performance of your mailing systems Daemon function SSH-based check that verifies if particular daemons are running on target Linux/Unix computer/s. Alert notification via , pager or SMS When it detects a failure, GFI Network Server Monitor can send alerts via SMS, pager, or a network message. SMS (text) messages are sent either through an SMS service provider (SMSC), directly through a connected GSM phone/modem; it is also possible to use the GFI FAXmaker -to-sms gateway service, Clickatell s web -to-sms online gateway service or any third party -to-sms gateway. All notifications can be customized using variables. Recipients can be configured globally for all rules. Support for SQL Server/MS Access as a database backend GFI Network Server Monitor allows you to store monitoring data to either an SQL Server or MS Access database backend. SQL Server is more appropriate for users with higher monitoring level requirements as well as those who need to centralize the monitoring results of multiple GFI Network Server Monitor installations in one place (such as backups, remote accessing as well as report generation by third party tools such as Crystal Reports or MS Reporting Services). View network status from anywhere in the world You can check rule status from any location using GFI Network Server Monitor's remote web monitor. The remote web monitor includes two types of web page views: One for a normal web browser and one optimized for viewing from a mobile phone or handheld device such as a BlackBerry or a Palm. A small footprint web server is included, although the feature can also be operated in conjunction with IIS.

27 Monitor remote event logs GFI Network Server Monitor can scan Windows event logs on local or remote computers and look for specific event sources, categories, event IDs and patterns in the description of the event. In addition, it can look for multiple events occurring in a specific time interval, for example, a McAfee or Norton virus alert posted in the last 30 minutes. Monitor processes, services performance and CPU usage GFI Network Server Monitor enables you to check critical processes and services on local and remote computers. You can also monitor the CPU usage of a machine and any performance counter accessible through perfmon.msc. This way, you can ensure that virtually any application is running properly. Custom network monitoring using VBScript and SSH Although GFI Network Server Monitor includes an extensive set of default monitoring functions, you can build your own custom checks by writing a VBScript (Windows) or an SSH shell script (Linux). From VBScript, you can use both WMI and ADSI. WMI is an interface to a broad range of hardware/software/os-related properties of a computer, allowing you to perform almost any check. Using ADSI, you can interface to Active Directory. Monitor users, groups and other Active Directory information Use GFI Network Server Monitor to monitor directory information. For example, monitor group membership of the domain admins group. You can also check user accounts (locked out, disabled, etc.), computer accounts, groups, group membership, organizational units, and so on. Reviews Competitively priced Network monitoring/management products are traditionally rather expensive. By contrast, GFI Network Server Monitor costs just USD 1,275 to monitor up to 50 IPs and USD 495 to monitor up to 10 IPs. Nested folder support It is possible to organize folders in a nested folder format - this provides support for more complex monitoring needs such as that of consultants or enterprises with more granular server distribution. Other features Configure maintenance periods to avoid alerts being sent during scheduled maintenance Advanced logging options to text file or event log Configure dependencies to avoid multiple alerts for error conditions dependent on each other Monitor network printer status Reporting includes reports that detail the availability of your network resources; alternatively, use Crystal Reports to access the database and create your own reports Monitoring checks wizard that easily configures new checks for your present systems Accommodates employee shifts: GFI Network Server Monitor can notify different people depending on the time at which the check triggered. You're in good company... Many leading companies have chosen GFI Network Server Monitor. Here are just a few: Manx Telecom Limited, ABC Fine Wine & Spirits, Satel 2000, The CBORD Group, Inc., and many more. System requirements GFI Network Server Monitor named People's Choice Awards 2005 winner - MSD2D, a resource for the Microsoft Exchange, SharePoint,.NET and Security communities, has announced that GFI Network Server Monitor was selected as the 2005 winner in the Security Server monitoring category of the MSD2D People s Choice Awards. The award was announced at Microsoft's TechEd Fair 2005 in Orlando, Florida. The fourth Annual People's Choice Awards recognizes the best products and companies in our industry. Visitors to our website cast their vote for the products they view as the very best in their respective category, said Jackie Nguyen, Vice President of Sales. MSD2D readers are professionals interested in learning more about various solutions for Security in the Server Monitoring category. Their vote serves as a solid peer-to-peer recommendation of the winning product. Windows 2000 (SP4 or higher), 2003 or XP Pro operating systems. Windows Script Host 5.5 or higher (included in Internet Explorer 6 and in Service Pack 2 of Internet Explorer 5.5; you can download it separately from Framework MSD2D.com, June 2005 Download your evaluation version from

28 for ISA Server Real-time HTTP/FTP monitoring, anti-virus & access control Companies must exercise some control over users web browsing habits not only to ensure productive use of the Internet but also to safeguard users from adult sites and to ensure that downloads are virus free. The traditional full-blown web proxy filters are cumbersome to install/administer and expensive to buy, while log file analyzers are awkward to use and do not allow for real-time monitoring and blocking. GFI WebMonitor is a utility for Microsoft ISA Server that allows you to monitor the sites users are browsing and what files they are downloading in REAL TIME. In addition it can block access to adult sites as well as performing anti-virus scanning on all downloads. GFI WebMonitor is the perfect solution to transparently exercise a degree of access control over users browsing habits and ensure legal compliance in a manner that will not alienate your network users! Internet access control made easy and affordable With GFI WebMonitor, administrators can review current and recent website access and downloads right from their browser. They can type in to see a list of websites accessed by users and files downloaded. GFI WebMonitor costs a fraction of the price of other Internet access control, monitoring and anti-virus products. For networks of up to 50 users, the cost is USD 695, for networks of up to 100 users, the cost is USD 1195 and for networks of up to 500 users, the cost is USD Because the product runs on ISA Server, no dedicated machine or network re-configuration is required. Multiple anti-virus protection through Norman Virus Control and BitDefender GFI WebMonitor is bundled with Norman Virus Control and BitDefender. Norman Virus Control is an industrial strength virus engine that has received the 100% Virus Bulletin award 16 times running. It also has ICSA and Checkmark certification. BitDefender is a very fast and flexible virus engine that excels in the number of formats it can recognize and scan. BitDefender is ICSA certified and has won the 100% Virus Bulletin award and the European Information Technologies Prize GFI WebMonitor automatically checks and updates the Norman Virus Control and BitDefender definition files as they become available. The GFI WebMonitor price includes updates for one year. Features & benefits Monitors web browsing and FTP downloading in real time Blocks access to adult sites (via ISA Server Destination/URL Sets) Runs anti-virus scan on all user downloads Enables you to check traffic that jams your bandwidth and stop it on the fly Provides website rating support. Malware (Trojans, spyware, etc) blocking via Kaspersky optional To achieve even greater security and benefit from scanning via multiple virus engines, users can add the Kaspersky SuperSecure anti-virus engine, available as an optional add-on. The Kaspersky SuperSecure database includes support for the detection of malicious software that can perform remote administration, keyboard espionage, password detection, automatic dial-up to paid sites, automatic downloads of files containing explicit materials and more. GFI WebMonitor automatically checks and updates the Kaspersky definition files as they become available. Blocking of adult websites based on Yahoo! s SafeSearch GFI WebMonitor allows you to block adult websites depending on their content classification by Yahoo! SafeSearch. Rather than using a custom local categorization database, which will invariably fast become out-of-date with the hundreds of new adult content sites being introduced daily. Through GFI WebMonitor, you need not manually update filter lists, which is both time-consuming and expensive. When a user requests access to a particular site, GFI WebMonitor queries the Yahoo! SafeSearch service to see whether the site contains adult content. If it does, the site is added on the fly to ISA Server Adult Destination set. An ISA administrator can block this URL set by creating a common access blocking rule on the server. It is also possible to further configure this GFI WebMonitor feature by editing a script to use different websites for site-checking, such as Google; however, these sites' terms and conditions apply. Real filetype signature checks Dangerous files (such as Trojan downloader programs) often attempt to penetrate a system masked as innocuous files. GFI WebMonitor uses its built-in file signature scanner to analyze and detect the REAL filetype signatures of downloaded HTTP/FTP files.

29 Real-time view of web access in progress Clear and concise view of Internet activity GFI WebMonitor offers a complete and compact overview of Internet activity through: URL history view Groups all accesses to a particular website and lists them according to popularity, displaying the number of hits, bytes sent/received, real filetypes accessed from each URL, URL category and the users/ips who accessed the site. Users history view Lists all network users and all the websites they accessed, together with the number of hits, bytes sent/received and the daily time distribution of their web browsing. Active connections view Shows all ongoing web accesses in detail; enables blocking of unwanted/bandwidth jamming traffic. Last web access view Shows last completed 200 URLs requests in detail. Blocks a download or connection in real time Administrators can block or cancel a current download or browsing session simply by clicking on the block connection icon. For example, you may decide to interrupt the download of a large file that a user is downloading. Active Internet connections may also be disconnected if required. Lists all users and what websites they visited View sites visited by a particular user View all users who visited a particular website Web-based configuration Protects against legal threats Without the ability to exercise some form of control over what your users are browsing, you might be open to legal threats. Employees can sue you if you have not shown due diligence in providing a work environment that is free of harassment. To provide this, you must install tools that allow you to block, or at least monitor, access to pornographic websites, for example. This remains a necessity: in August 2004, for example, over 200 British civil servants were disciplined for downloading pornographic images at work; while a June 2004 study by a US research firm showed that porn sites get three times more visits than the top web search engines. Easily blocks a website add sites from websites access view directly to ISA blocking rule s URL sets When a user browses a website that you wish to block, use GFI WebMonitor to add this site to an ISA Server 2004 URL Set used by access blocking rule. All the rule properties of a standard ISA Server 2004 rule can be applied (including the ability to exclude certain users, time restrictions etc). Note that this feature is only available for ISA Server Can block/check applications' hidden downloads Some software applications automatically connect to their home pages to download updates using HTTP tunnelling. Although this can reduce administration, it can also present a security risk because unknown applications or Trojans can use the same technique to download malicious files onto a user's PC, without the user knowing, including spyware, adware and pornware. GFI WebMonitor allows you to control which sites are allowed to distribute updates (for example: Microsoft). Controlled access to the configuration and monitoring interfaces GFI WebMonitor allows you to select which users can access its configuration and monitoring interfaces. You can assign such rights based on either the IP of the computer from which access is being made or by the domain-authenticated username of the client trying to load the configuration. Only users in GFI WebMonitor s authorized users/ip list of will be given access. Other features Web-based interface Microsoft ISA 2000/2004 integration. Detailed view of recent web access

30 Reviews System requirements GFI WebMonitor wins Access Control Readers Choice Award - ISAserver.org readers voted GFI WebMonitor for ISA Server as the winner in the Access Control category of the ISAserver.org Readers Choice Awards. The awards draw a huge response per category and are based entirely on the visitors votes. - ISAserver.org, April 2006 Slick and easy to configure - GFI WebMonitor for ISA Server received the Silver Award from popular resource site ISAserver.org. In a review about the importance of increasing protection against exploits that take place over the web, reviewer Thomas Schinder described GFI WebMonitor for ISA Server as "one of the slickest and easiest to configure and manage solutions". The review praises the product's "useful web access and monitoring features", which include the ability to "monitor user activity in real-time", "quickly view a URL history", "block access to adult web sites/domains" and "check all web and web proxy mediated FTP downloads". Microsoft Windows 2000 (SP 3) or 2003 Server. Microsoft ISA server 2000 (not firewall only mode) OR Microsoft ISA server 2004 (Standard or Enterprise). Microsoft Internet explorer to access GFI WebMonitor. Microsoft.NET Framework version MB free hard disk space. Note: It is not possible to run GFI WebMonitor 3 concurrently with GFI DownloadSecurity; GFI DownloadSecurity must be disabled from ISA Server while GFI WebMonitor 3 is running. - ISAserver.org, January 2006 A must have add-on for every ISA 2000/2004 installation - GFI WebMonitor 2 for ISA Server was described by reviewer Thomas Shinder as a dream come true for ISA firewall administrators since it fills an important gap in the ISA Server 2000/2004 firewall feature set. GFI WebMonitor 2 provides a way to view in real time what users are accessing on the web. The reviewer also points out that slow Internet performance that arises from users who download large files can be stopped because the product allows for an easy way to disconnect users who are downloading giant sized files without having to go through the ISA 2004 real time log monitor and additional steps. - ISAserver.org, July star rating for GFI WebMonitor for ISA Server Softforall.com, a site providing high quality shareware and freeware, awarded GFI WebMonitor for ISA Server the highest possible rating of five stars. - Softforall.com, October 2003 Download your evaluation version from

31 GFI Software Ltd UK Unit 2, St Johns Mews St Johns Road Hampton Wick Kingston upon Thames Surrey KT1 4AN UK Tel +44 (0) Fax +44 (0) GFI ( is a leading provider of Windows-based network security, content security and GFI Software USA, Inc. messaging software. Key products include the GFI Weston Parkway Suite FAXmaker fax connector for Exchange/SMTP; GFI 104 MailSecurity Cary, NC content/exploit checking and anti-virus software; GFI MailEssentials server-based anti-spam software; GFI LANguard Network Security Scanner (N.S.S.), security scanning and patch USA Tel +1 (888) Fax +1 (919) [email protected] management software; GFI LANguard Security Event Log Monitor (S.E.L.M.) that performs event log based intrusion detection management; and and GFI network-wide event EndPointSecurity log for GFI Software GmbH Bargkoppelweg 72 network-wide control of portable storage devices. Clients Hamburg include Microsoft, Telstra, Time Warner Cable, NASA, Germany DHL, Caterpillar, BMW, the US IRS, and the USAF. GFI Tel +49(0) has offices in the US, the UK, Germany, Cyprus, Romania, Australia and Malta, and operates though a Fax +49(0) [email protected] worldwide network of distributors. GFI is a Microsoft Gold Certified Partner and has won the Microsoft Fusion (GEM) Packaged Application Partner of the Year award. GFI Asia Pacific Pty Ltd 83 King William Road Unley 5061 South Australia Tel Fax [email protected] GFI Software Ltd GFI House San Andrea Street San Gwann SGN 05 Malta Tel Fax [email protected] 2006 GFI Software Ltd. - Windows XP/2000/NT are trademarks of Microsoft Corporation. GFI MailEssentials for Exchange/SMTP is a registered trademark, and GFI and the GFI logo are trademarks of GFI Software Ltd. in Germany, USA, the United Kingdom and other countries.

for Exchange/SMTP for Exchange/SMTP for Exchange for Exchange/SMTP Network Security Scanner for ISA Server

for Exchange/SMTP for Exchange/SMTP for Exchange for Exchange/SMTP Network Security Scanner for ISA Server for Exchange/SMTP for Exchange/SMTP for Exchange for Exchange/SMTP Network Security Scanner for ISA Server Overview of GFI products Anti-spam for Exchange, anti-phishing and email management GFI MailEssentials

More information

GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI Product Comparison GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI MailEssentials Trend Micro ScanMail Suite Microsoft Exchange Server 2003/2007/2010/2013 Integration Option

More information

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with

More information

GFI White Paper: GFI FaxMaker and HIPAA compliance

GFI White Paper: GFI FaxMaker and HIPAA compliance GFI White Paper: GFI FaxMaker and HIPAA compliance This document outlines the requirements of HIPAA in terms of faxing protected health information and how GFI Software s GFI FaxMaker, an easy-to-use fax

More information

Why Bayesian filtering is the most effective anti-spam technology

Why Bayesian filtering is the most effective anti-spam technology Why Bayesian filtering is the most effective anti-spam technology Achieving a 98%+ spam detection rate using a mathematical approach This white paper describes how Bayesian filtering works and explains

More information

GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options

GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options An overview of how GFI FAXmaker works, and how to deploy it This white paper describes the different ways in

More information

GFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0

GFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0 GFI Product Comparison GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0 GFI MailEssentials Symantec Mail Security for Microsoft Exchange 7.0 Supports Microsoft Exchange Server 2003

More information

How to keep spam off your network

How to keep spam off your network What features to look for in anti-spam technology A buyers guide to anti-spam software, this white paper highlights the key features to look for in anti-spam software and why. GFI Software www.gfi.com

More information

GFI FAXmaker 14.3 for Exchange/Lotus/SMTP. Manual. By GFI Software Ltd

GFI FAXmaker 14.3 for Exchange/Lotus/SMTP. Manual. By GFI Software Ltd GFI FAXmaker 14.3 for Exchange/Lotus/SMTP Manual By GFI Software Ltd http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data

More information

GFI MailSecurity 10.1 for Exchange/SMTP User Guide

GFI MailSecurity 10.1 for Exchange/SMTP User Guide GFI MailSecurity 10.1 for Exchange/SMTP User Guide http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Installing GFI FAXmaker version 12

Installing GFI FAXmaker version 12 Installing GFI FAXmaker version 12 How to install GFI FAXmaker version 12 on the same machine as the SMTP server (non-exchange 2000/2003) This white paper explains how to install GFI FAXmaker for Exchange/SMTP

More information

Installing GFI FAXmaker

Installing GFI FAXmaker Installing GFI FAXmaker System Requirements Before you install GFI FAXmaker, please ensure that the following requirements are met. GFI FAXmaker FAX Server: A Windows 2000, 2003, 2008 server or Windows

More information

GFI FAXmaker for Exchange/SMTP 12. Manual. By GFI Software Ltd.

GFI FAXmaker for Exchange/SMTP 12. Manual. By GFI Software Ltd. GFI FAXmaker for Exchange/SMTP 12 Manual By GFI Software Ltd. This manual was produced by GFI SOFTWARE Ltd. GFI SOFTWARE Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"

More information

GFI MailEssentials 11. Manual. By GFI Software Ltd.

GFI MailEssentials 11. Manual. By GFI Software Ltd. GFI MailEssentials 11 Manual By GFI Software Ltd. http://www.gfi.com Email: [email protected] This manual was produced by GFI Software Ltd. Information in this document is subject to change without notice.

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

GFI MailEssentials 2012 Upgrade Guide A guide to upgrading from previous versions of GFI MailEssentials and GFI MailSecurity Applies to GFI

GFI MailEssentials 2012 Upgrade Guide A guide to upgrading from previous versions of GFI MailEssentials and GFI MailSecurity Applies to GFI GFI MailEssentials 2012 Upgrade Guide A guide to upgrading from previous versions of GFI MailEssentials and GFI MailSecurity Applies to GFI MailEssentials 2012 Service Release 4 The information and content

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation

More information

GFI Product Manual. GFI MailEssentials Administrator Guide

GFI Product Manual. GFI MailEssentials Administrator Guide GFI Product Manual GFI MailEssentials Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,

More information

Patch management with GFI LANguard and Microsoft WSUS

Patch management with GFI LANguard and Microsoft WSUS A cost-effective and easy solution for network-wide patch management This white paper provides an overview of how to use GFI LANguard and Microsoft Windows Software Update Services (WSUS) to keep your

More information

AVG AntiVirus. How does this benefit you?

AVG AntiVirus. How does this benefit you? AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to

More information

GFI Mail Essentials for Exchange/SMTP

GFI Mail Essentials for Exchange/SMTP ANTI SPAM SOLUTIONS TECHNOLOGY REPORT GFI Mail Essentials for Exchange/SMTP NOVEMBER 2006 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS Mail Essentials for Exchange/SMTP GfI Software,

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in

More information

1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12

1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12 Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied, including but

More information

How to keep spam off your network

How to keep spam off your network GFI White Paper How to keep spam off your network What features to look for in anti-spam technology A buyer s guide to anti-spam software, this white paper highlights the key features to look for in anti-spam

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"

More information

How To Set Up A Fax Server

How To Set Up A Fax Server APPLICATION N0TE ST-0117 March 2, 2006 Product: ShoreTel System System version: ShoreTel5 Release 2 Adding a Fax Server to the ShoreTel System The fax server is an important part of your unified messaging

More information

Patch management with GFI LANguard N.S.S. & Microsoft WSUS

Patch management with GFI LANguard N.S.S. & Microsoft WSUS Patch management with GFI LANguard N.S.S. & Microsoft WSUS A cost-effective and easy solution for network-wide patch management This white paper provides an overview of how to use GFI LANguard Network

More information

1 Introduction 10 1.1 About this manual 10 1.2 Terms and conventions used in this manual 11

1 Introduction 10 1.1 About this manual 10 1.2 Terms and conventions used in this manual 11 Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied, including but

More information

GFI Product Manual. Getting Started Guide

GFI Product Manual. Getting Started Guide GFI Product Manual Getting Started Guide http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty

More information

1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12

1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12 Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranties of any kind, either express or implied, including

More information

How To Use Network Integrated Faxing

How To Use Network Integrated Faxing Integrated network faxing key to improved productivity and information security Network faxing reduces labor costs and increases information security With an integrated network faxing solution, you can

More information

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions. PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information

More information

How to detect hackers on your web server

How to detect hackers on your web server How to detect hackers on your web server Catch hackers red handed through real-time security event log monitoring A discussion of the methods used by hackers to attack IIS web servers, and how you can

More information

Installing GFI FAXmaker

Installing GFI FAXmaker UTH Installing GFI FAXmaker System Requirements Before you install GFI FAXmaker, please ensure that you meet all the following requirements. GFI FAXmaker FAX Server: A Windows 2000 or 2003 server machine

More information

GFI MailEssentials 12. Manual. By GFI Software

GFI MailEssentials 12. Manual. By GFI Software GFI MailEssentials 12 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein

More information

MDaemon Vs. Microsoft Exchange Server 2013 Standard

MDaemon Vs. Microsoft Exchange Server 2013 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow

Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow Reliable & Secure Email Professional, Dependable, Complete Easy to Learn, Use and Grow About this Presentation Summarizes primary purposes of email, plus the needs of email providers and users. Introduces

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Anti-SPAM Solutions as a Component of Digital Communications Management

Anti-SPAM Solutions as a Component of Digital Communications Management Anti-SPAM Solutions as a Component of Digital Communications Management Ron Shuck CISSP, GCIA, CCSE Agenda What is Spam & what can you do? What is the cost of Spam E-mail E to organizations? How do we

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

1 Introduction 10 1.1 About 10 1.2 How GFI FaxMaker works - Sending faxes 11 1.3 How GFI FaxMaker works - Receiving faxes 12

1 Introduction 10 1.1 About 10 1.2 How GFI FaxMaker works - Sending faxes 11 1.3 How GFI FaxMaker works - Receiving faxes 12 Administrator Guide Find out how you can manage and customize GFI FaxMaker. Tweak settings according to your requirements and troubleshoot any issues encountered. The information and content in this document

More information

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0 eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

How To Block Ndr Spam

How To Block Ndr Spam How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR

More information

Enterprise Email Archive Managed Archiving & ediscovery Services User Manual

Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Copyright (C) 2012 MessageSolution Inc. All Rights Reserved Table of Contents Chapter 1: Introduction... 3 1.1 About MessageSolution

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options

GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options An overview of how GFI FAXmaker works, and how to deploy it This white paper describes the different ways in

More information

Email Security Solutions

Email Security Solutions TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS

More information

Antispam Security Best Practices

Antispam Security Best Practices Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers

More information

BUILT FOR YOU. Contents. Cloudmore Exchange

BUILT FOR YOU. Contents. Cloudmore Exchange BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering

More information

E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company

E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company E-mail Filter SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company CONTENTS CONTENTS INTRODUCTION About This Document...2 Product

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

English Translation of SecurityGateway for Exchange/SMTP Servers

English Translation of SecurityGateway for Exchange/SMTP Servers Testing: Alt N Technologies SecurityGateway by Sandra Lucifora Administrators spend a considerable amount of their time on the job on eliminating unwanted messages. Viruses, Phishing, and Spoofing pose

More information

BitDefender Client Security Workstation Security and Management

BitDefender Client Security Workstation Security and Management BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from

More information

Quick Start Policy Patrol Mail Security 9

Quick Start Policy Patrol Mail Security 9 Quick Start Policy Patrol Mail Security 9 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

E-Mail Security. on your terms SOFTSCAN

E-Mail Security. on your terms SOFTSCAN E-Mail Security on your terms SOFTSCAN With fraudulent and offensive emails delivered in vast quantities to businesses every day a foolproof email security system is essential. Setting the standards SoftScan

More information

Getting Started Guide. Review system requirements and follow the easy steps in this guide to successfully deploy and test GFI FaxMaker.

Getting Started Guide. Review system requirements and follow the easy steps in this guide to successfully deploy and test GFI FaxMaker. Getting Started Guide Review system requirements and follow the easy steps in this guide to successfully deploy and test GFI FaxMaker. The information and content in this document is provided for informational

More information

Symantec Hosted Mail Security Getting Started Guide

Symantec Hosted Mail Security Getting Started Guide Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration

More information

FortiMail Email Filtering Course 221-v2.2 Course Overview

FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,

More information

Aloaha Mail and Archive

Aloaha Mail and Archive Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally

More information

Quick Start Policy Patrol Mail Security 10

Quick Start Policy Patrol Mail Security 10 Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. SurfControl Email Filter. www.westcoastlabs.org

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. SurfControl Email Filter. www.westcoastlabs.org ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006 SurfControl Email Filter 2 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Contents SurfControl Email Filter Test objectives and scenario...3 Test network...4

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation

More information

Secure at all times. Protection systems are continuously updated so you have complete peace of mind.

Secure at all times. Protection systems are continuously updated so you have complete peace of mind. The Powerdial MBS appliance is multi-functional server engineered to deliver a wide range of services including; Internet Security, Email Security, Email & Groupware Server, File Server, Web Filtering,

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008 ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning

More information

Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services

Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services Sagari Ltd Service Catalogue and Service Level Agreement For Outsource IT Services Managed Services Service Level Agreement 1 Introduction This Service Catalogue and Service Level Agreement (SLA) constitutes

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

GFI Product Manual. GFI MailArchiver Evaluation Guide

GFI Product Manual. GFI MailArchiver Evaluation Guide GFI Product Manual GFI MailArchiver Evaluation Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either

More information

Anti Spam Best Practices

Anti Spam Best Practices 39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing

More information

Deploying GFI LANguard S.E.L.M.

Deploying GFI LANguard S.E.L.M. Deploying GFI LANguard S.E.L.M. Design overview & deployment strategies This white paper gives an overview of how GFI LANguard S.E.L.M. works and discusses installation and deployment issues, enabling

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business is an easyto-use, all-in-one suite that secures your critical business assets and information against today s complex

More information

AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution

AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution The present document offers a comprehensive analysis of the ways to secure corporate email systems. It provides an expert opinion on

More information

Quick Start Policy Patrol Spam Filter 5

Quick Start Policy Patrol Spam Filter 5 Quick Start Policy Patrol Spam Filter 5 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg. STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication

More information

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS)

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) This document is designed to provide a quick installation and configuration guide for MDaemon along

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

GFI Product Comparison. GFI MailArchiver 6.0 vs Quest Software Archive Manager

GFI Product Comparison. GFI MailArchiver 6.0 vs Quest Software Archive Manager GFI Product Comparison GFI MailArchiver 6.0 vs Quest Software Archive Manager General features GFI MailArchiver 6.0 Quest Software Archive Manager Supports Microsoft Exchange 2000, 2003 and 2007 Supports

More information