Symantec Mail Security for Microsoft Exchange Getting Started Guide

Size: px
Start display at page:

Download "Symantec Mail Security for Microsoft Exchange Getting Started Guide"

Transcription

1 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version Legal Notice Copyright 2011 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be "commercial computer software" and "commercial computer software documentation" as defined in FAR Sections and DFARS Section Symantec Corporation 350 Ellis Street Mountain View CA USA

2

3 Contents Getting Started... 5 Introducing Symantec Mail Security for Microsoft Exchange... 5 What's new in Mail Security... 5 Components of Mail Security Before you install System requirements Server system requirements Console system requirements Installation options Migrating to version Where to get more information about Mail Security... 20

4 4 Contents

5 Getting Started Introducing Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Serverversion (a member of the Symantec Information Foundation product family) is a complete, customizable, and scalable solution that scans that passes through or resides on the Microsoft Exchange server. Mail Security protects your Exchange server from the following: Threats (such as viruses, Trojan horses, worms, and denial-of-service attacks) Security risks (such as adware and spyware) Unwanted file attachments Unsolicited messages (spam) Mail Security also lets you manage the protection of one or more Exchange servers from a single console. The Exchange environment is only one avenue by which a threat or security risk can penetrate a network. For complete protection, ensure that every computer and workstation is protected by an antivirus solution. What's new in Mail Security Table 1 lists the new and enhanced features in Mail Security.

6 6 Getting Started What's new in Mail Security Table 1 Feature New and enhanced features Description Enhanced Premium AntiSpam for better spam protection Improved Defences Against Targeted Attacks A new antispam module applies machine learning to better target distributed low volume attacks such as 419 spam (scams) and phishing attacks. Real Time Updates New streaming architecture that lets you download antispam rule micro updates as frequently as every second, to better defend against new threats and improve overall effectiveness. Content filtering - match highlighting Symantec Protection Center 2.0 ready for Exchange Server 2007/2010 Mail Security version lets you determine the content that triggered content filtering policy. It identifies violating terms and the match lists that these violating terms belong to. It highlights them in the event log and in the Admin notification, which reports content filtering violation. Also, for files enclosed in a container, the event log and Admin notification highlights the name of the file within the container. Symantec Protection Center (SPC) is an appliance that simplifies security management by centralizing security reporting and management across Symantec and other third-party products. SPC aggregates security data from multiple products and makes this data available on a dashboard and in cross-product reports. From version onward, Symantec Mail Security for Microsoft Exchange is ready for integration with Symantec Protection Center 2.0. Mail Security version includes the Symantec Mail Security Management Service. This service remains dormant until SPC 2.0 is deployed in the Exchange environment. Once SPC 2.0 is deployed, this service is used to make Mail Security version available to integrate with SPC.

7 Getting Started What's new in Mail Security 7 Table 1 Feature New and enhanced features (continued) Description Background Scan status logs Support for in-memory scanning during transport Mail Security version provides improved logs with status of the background scan. It generates an event when background scan is either halted or is complete. In this event, it also provides the count of number of items that were scanned so far during this scan. In the background scan completion event, it provides the total time that is taken for completing the scan. Mail Security leverages in-memory scanning to accelerate scans during transport and reduce disk I/O. By default, the in-memory scanning feature is enabled. The default size of attachments or message body that can be scanned using memory-based scanning is 5 MB. You can use the registry key SharedMemBufSizeInMB to change the default size of attachments or message body for memory-based scanning. If you set the value of the registry key SharedMemBufSizeInMB to zero, the in-memory scanning feature is disabled. To specify a value for the registry key SharedMemBufSizeInMB, you must first create this registry key at the following location in the Registry Editor window: HKEY_LOCAL_MACHINE\SOFTWARE\ Wow6432Node\Symantec\SMSMSE\6.5\ Server\Components\SMTP\ Support for alert notifications for out-of-date virus definitions Mail Security sends notifications when virus definitions are older than the configured number of days. You can specify the frequency of sending notifications when old definitions are found. Yoiu can also configure the number of days an outdated virus definition can remain on the system after which a notification is sent. This configuration is done using registry settings.

8 8 Getting Started What's new in Mail Security Table 1 Feature New and enhanced features (continued) Description Support for Exchange Server 2010 Mail Security supports Exchange Server 2010 on the following roles: Edge Transport Hub Transport Mailbox Addition of a Global Group for Exchange Server 2010 Support for Manual and Scheduled Scan in Exchange Server 2010 Support for Filtering contents in Exchange Server 2010 Global Group consists of all the servers that are managed through Mail Security console. When you configure and apply Global Group settings, the changes are propagated to all the servers in all the groups. Changes that are made at the Global Group level overwrites group settings of all individual and user-defined servers. Manual scans run on-demand and scan public folders and mailboxes. Scheduled scans run unattended usually at off-peak periods. All policies apply to manual and to scheduled scans, except antispam. You can specify which file folders and mailboxes to scan during a manual or scheduled scan. You can also specify the content filtering rules that you want to enable for the manual or scheduled scan. Mail Security provides comprehensive content filtering for messages and attachment content. It supports more than 300 attachment types. Mail Security lets you create content filtering rules that apply to SMTP inbound and outbound mails and the Exchange Information Store. Content filtering rules let you filter messages for attachment names, attachment content, specific words, phrases, subject lines, and senders or recipients. It provides pre-cooked match list and let you define your own match list. You can also set content filtering rules for attachment size.

9 Getting Started What's new in Mail Security 9 Table 1 Feature New and enhanced features (continued) Description Troubleshooting installation issues with common error dialog Web links are provided in the product installer that assist and guide you to troubleshoot the failures that are encountered during installation. These links provide more information about the failure or a similar failure and the resolution steps and recommendations. Performance improvements Through AntiSpam processing Mail Security version 6.5 has a provision to reduce the processing time that is required for AntiSpam processing. The Fastpass feature conserves resources by providing a temporary exemption from spam scanning for senders with a demonstrated history of sending no spam messages. Thus senders with the best local reputation are exempted from spam scanning. Mail Security automatically collects local sender reputation data to support Fastpass determinations and regularly re-evaluates the senders that are granted a pass. By turning off performance counters for logging Mail Security version 6.5 lets you configure performance counters for logging. By default, this counter is enabled. However, to improve Mail Security's scanning performance, these performance counters for logging can be turned off by adding following registry key and setting its value to 1. Registry key for 32-bit platform: HKEY_LOCAL_MACHINE\SOFTWARE\ Symantec\SMSMSE\6.5 \Server\TurnOffPerfCounters Registry key for 64-bit platform: HKEY_LOCAL_MACHINE\SOFTWARE \Wow6432Node\Symantec\SMSMSE\6.5\ Server\TurnOffPerfCounters Restart Mail Security service after setting this registry key.

10 10 Getting Started Components of Mail Security Note: Mail Security version 6.5 does not support Windows 2000 and Exchange Server Note: By default, Mail Security version does not re-scan the items that are quarantined due to antivirus and file filtering violations, once they are released. However, if the items were quarantined due to content filtering violations, then Mail Security version scans these items only for virus policies and file filtering conditions. This behavior is configurable through registry. Components of Mail Security Table 2 lists the components of Mail Security. Table 2 Component Product components Description Location on the product CD Symantec Mail Security for Microsoft Exchange This software protects your Exchange servers from threats (such as viruses and denial-of-service attacks) and security risks (such as adware and spyware). It also detects spam messages and unwanted content. This software protects your Exchange servers from threats (such as viruses and denial-of-service attacks), security risks (such as adware and spyware). It also detects spam messages and unwanted attachments. \SMSMSE\Install\

11 Getting Started Components of Mail Security 11 Table 2 Component Product components (continued) Description Location on the product CD LiveUpdate Administration Utility Symantec Central Quarantine This utility lets you configure one or more intranet FTP, HTTP, or LAN servers to act as internal LiveUpdate servers. LiveUpdate lets Symantec products download program and definition file updates directly from Symantec or from a LiveUpdate server. For more information, see the LiveUpdate Administrator documentation on the Mail Security product CD in the following location: \DOCS\LUA\ This utility lets Mail Security forward infected messages and messages that contain certain types of violations from the local quarantine to the Central Quarantine, which acts as a central repository. For more information, see the Symantec Central Quarantine Administrator's Guide on the Mail Security product CD in the following location: \DOCS\DIS\CentQuar.pdf \ADMTOOLS\LUA\ \ADMTOOLS\DIS

12 12 Getting Started Before you install Table 2 Component Product components (continued) Description Location on the product CD Mail Security for Microsoft Exchange Management Pack This component lets you integrate Symantec Mail Security for Microsoft Exchange events with Microsoft Operations Manager 2005 (MOM). If you use Microsoft Exchange 2003, this component also lets you integrate Mail Security events with Microsoft System Center Operations Manager 2007 (SCOM). Pre-configured Computer Groups, Rule Groups/Rules, and Providers are automatically created when you import the management pack. These rules monitor specific Symantec Mail Security for Microsoft Exchange events in the Windows Event Log and the Windows Performance Monitor. \ADMTOOLS\Mgmt_Pack For more information, see the Symantec Mail Security for Microsoft Exchange Management Pack. Before you install Ensure that you meet all system requirements before you install Mail Security. Select the installation plan that best matches your organization's needs, and ensure that you have met the pre-installation requirements. See System requirements on page 14. See Installation options on page 17. Mail Security supports upgrades from Mail Security 4.6x and higher. If Mail Security detects an older version of the product on your computer, the installer

13 Getting Started Before you install 13 automatically uninstalls the prior version. The installer then continues with the installation. If you want to uninstall the previous version manually, do so before installing the current version of Mail Security. If you are installing Mail Security on an Exchange Server 2007 or Server 2010, install the product on all of the following server roles in your organization: Edge Transport servers, if available Hub Transport servers Mailbox servers You must uninstall and reinstall the product if you change the server role on which Mail Security is installed. Mail Security automatically installs custom transport agents when you install the product on Hub Transport or Edge Transport servers. The Mail Security transport agents consist of an antispam transport agent and an antivirus transport agent. By default, the Mail Security transport agents are installed with a lower priority than the Exchange transport agents. If you modify your transport agent priorities, ensure that the Mail Security transport agents remain a lower priority than the Exchange transport agents. Do the following before you install the product: If you are running Symantec Brightmail AntiSpam on the same server on which you want to install Mail Security, you must uninstall Symantec Brightmail AntiSpam before you install Mail Security. It is recommended that you not run Mail Security on the same server as Symantec Brightmail AntiSpam. If you are using the tools feature of Symantec AntiVirus Corporate Edition, you must uninstall the feature before you install Mail Security. The tools feature of Symantec AntiVirus is not compatible with Mail Security or Microsoft Exchange. If you are running any antivirus software that is on the server on which you want to install Mail Security, you must disable it before you install Mail Security. After installation but before you re-enable the antivirus protection, configure your other antivirus programs to exclude certain folders from scanning. Log on as a Windows domain administrator to install Mail Security components correctly. Modify your screen resolution to a minimum of 1024 x 768. Mail Security does not support a resolution less than 1024 x 768.

14 14 Getting Started System requirements Configure the default receive connector for the Exchange Hub Transport server to permit connections from anonymous users. Before you install Mail Security on Exchange 2010 mailbox role, you must specify a domain user account. The domain user account must fulfill the following criteria. Mail Security uses the domain user account as a service account and this account must have a mailbox. The user must be a member of Organization Management group under the Microsoft Exchange Security Groups Organizational Unit. By default, Organization Management group is a member of the local Administrators group on all the exchange servers in the organization. If not, then add the user to the local Administrators group. You may use different user account for installations of Mail Security on other Exchange 2010 mailbox servers within that domain for better performance. When the user updates the password, the same password must be provided to the Mail Security Service on all Exchange 2010 mailbox role servers. Note: While installing Mail Security on local Exchange 2010 Mailbox server, in the Logon Information screen, specify the domain user credentials in the User name and Password fields. Mail Security provides this user account Application Impersonation and Logon as service rights. Ensure that the following IIS Role Service components are installed when you install Mail Security on Windows Server 2008 for Exchange 2010 and 2007 servers. This installation is applicable for both remote installation and local installation. Application Development - ASP.NET Security - Windows Authentication Management Tools - IIS management console, IIS 6 Scripting Tools System requirements Ensure that you meet the appropriate system requirements for the type of installation that you are performing. If you do not have Internet connection on your system, then installing Mail Security may take a long time to complete. Mail Security tries to examine the certificate revocation list (CRL) to verify the code signing certificate each time that Mail Security compiles an assembly into managed code. When Mail Security

15 Getting Started System requirements 15 is not connected to the Internet, each CRL request may time out before the installation can continue and increases the installation time. To reduce installation time 1 Start Internet Explorer. 2 On the Tools menu, click Internet Options. 3 Click the Advanced tab, and then locate the Security section. 4 Uncheck Check for publisher s certificate revocation and then click OK. 5 After the installation is complete, check Check for publisher s certificate revocation. Note: The Check for publisher's certificate revocation option is set on a per-account basis. See Installation options on page 17. Server system requirements You must have domain administrator-level privileges to install Mail Security. The server system requirements are as follows: Operating system The operating system requirements for Microsoft Exchange 2010 are as follows: Windows Server 2008 with SP2 (64-bit) Standard or Enterprise Edition Windows Server 2008 R2 (64-bit) Standard or Enterprise Edition The operating system requirements for Microsoft Exchange 2007 are as follows: Windows Server 2008 with SP1or later (64-bit) Standard or Enterprise Edition Windows Server 2003 with SP2 (64-bit) Standard or Enterprise Edition Windows Server 2003 R2 (64-bit) Standard or Enterprise Edition The operating system requirements for Microsoft Exchange 2003 are as follows: Windows Server 2003 SP1/SP2/R2 Standard or Enterprise or Data Center Edition

16 16 Getting Started System requirements Exchange platform The Exchange platform requirements for Microsoft Exchange 2007/2010 are as follows: Exchange Server 2007 SP1/SP2 Exchange Server 2010 The Exchange platform requirements for Microsoft Exchange 2003 are as follows: Exchange Server 2003 SP1/SP2 Minimum system requirements Intel(TM) Pentium II 266 MHz or higher processor; recommended Intel Pentium or compatible 733MHz processor Requirement for Exchange Server 2003 only x64 architecture-based processor that supports Intel Extended Memory 64 Technology (Intel EM64T) x64 architecture-based computer with AMD 64-bit processor that supports AMD64 platform Requirement for Exchange Server 2007/Server 2010 only Only for Exchange 2007 Mailbox server role, Exchange Server MAPI client and Collaboration Data Objects Requirement for mailbox role of Exchange Server 2007 only 1 GB of memory for Mail Security besides the minimum requirements for the operating system and Exchange. Approximately 4GB or more of memory is required. 500-MB disk space is required for Mail Security. This space does not include disk space required for items such as quarantined messages and attachments, reports, and log data..net Framework version 2.0 MDAC 2.8 or higher DirectX 9 or higher Microsoft Internet Information Services (IIS) Manager Requirement for Exchange Server 2007 only Only for Exchange Server 2010, Microsoft.NET Framework 3.5 and Microsoft Windows Powershell 2.0 Ensure that the components.net Framework, MDAC, and DirectX are installed before you install Mail Security. Adobe Acrobat Reader is not a requirement to install and run Mail Security. However, it is required to view the reports that are generated in.pdf format. You can download Adobe Acrobat Reader from For more information, see the Symantec Mail Security for Microsoft Exchange Implementation Guide.

17 Getting Started Installation options 17 Console system requirements You can install the Mail Security console on a computer on which Mail Security is not installed. The console system requirements are as follows: Table 3 Console system requirements Operating system 32-bit 64-bit Minimum system requirements Windows Server 2003 Windows Server 2003 R2 32-bit processor Requirement for Exchange Server 2003 only 512 MB RAM 162 MB available disk space Windows XP Windows Vista Windows Server 2008 Windows Server 2008 R2 Windows 7 No This does not include the space required for items such as quarantined messages and attachments, reports, and log data..net Framework version 2.0 Ensure that.net Framework is installed before you install Mail Security. Microsoft Internet Information Services (IIS) Manager is required only to install Mail Security Console on a 64-bit operating system. Adobe Acrobat Reader is not a requirement to install and run the Mail Security Console. However, it is required to view the reports that are generated in.pdf format. You can download Adobe Acrobat Reader from Installation options Use any of the following installation procedures, depending on the type of installation that you want to perform: Local server You can install or upgrade Mail Security on a local computer that is running the Microsoft Exchange server. Remote server You can install Mail Security on remote servers through the product console. Console You can install the product console on a computer that is not running Mail Security. This lets you manage your servers from any computer that has access to your Exchange servers.

18 18 Getting Started Migrating to version 6.5 Silent/automated installation You can install Mail Security using automated installation tools. Microsoft cluster server You can install Mail Security in a Microsoft Cluster environment. Veritas cluster server You can install Mail Security in a Veritas cluster environment. For more information about installation procedures, see the Symantec Mail Security for Microsoft Exchange Implementation Guide. Migrating to version 6.5 Mail Security supports upgrades from Mail Security 4.6x and higher. Table 4 lists the settings that do not migrate from version 5.x to the new version. Table 4 Setting Version 5.x migration settings Description Heuristic antispam This feature is no longer supported. Enable and configure Symantec Premium AntiSpam for spam detection. Save to folder option The Save to folder option is no longer supported. If Save to folder was a disposition for a content filtering rule, the disposition is set to Log Only. The Add X-header settings associated with the Save to folder disposition has been removed. In the Symantec Premium AntiSpam settings, the Save to folder settings and the Add X-header settings associated with them have been removed. The Add X-header settings that are not associated with the Save to folder settings migrate as is. Report templates and the report database SESA Alerts Background scanning These items do not migrate. This feature is no longer supported. These settings do not migrate. Re-enable and schedule background scanning.

19 Getting Started Migrating to version Table 4 Setting Version 5.x migration settings (continued) Description Veritas Cluster Server configurations Mail Security does not support upgrades from 5.0 on Veritas Cluster Server configurations. If you are upgrading from 4.6x, the policy settings are incorporated into the applicable policy on the new installation. Mail Security 5.x and higher does not contain a separate multiserver console. Single and multiple servers are administered from the same console. Multiserver console settings do not migrate to the new version. Custom policies, heuristic antispam settings, content filtering rules, and report templates do not migrate to the new version. Table 5 lists the migrations from version 4.6x to the new version. Table 5 Setting Auto-protect Version 4.6x migration settings Description Migrates to the new version as the standard policy. Heuristic antispam This feature is no longer supported. Enable and configure Symantec Premium AntiSpam for spam detection. Macro Virus Rule Bloodhound Virus Rule Mass-Mailer Virus Rule HeartBeat Filtering subpolicy Messenger Service Alerts AMS Alerts SESA Alerts Scheduled scans Manual scans Attachment Blocking rule Outbreak settings These settings are no longer supported. These settings are no longer supported. These settings do not migrate. This feature is no longer supported. These settings do not migrate. This feature is no longer supported. This feature is no longer supported. This feature is no longer supported. These settings do not migrate. These settings do not migrate. This rule is migrated to a new rule File Name Rule. These settings do not migrate.

20 20 Getting Started Where to get more information about Mail Security Table 5 Setting Version 4.6x migration settings (continued) Description Content Dictionary Generated reports This feature is no longer supported. Reports cannot be viewed through the console. Reports that you generated in version 4.6x are copied to the following directory: <Installation directory>\server\reports\4.6 You can view a report by opening it from this directory. Report templates and the report database Background scanning These features and documents do not migrate. These settings do not migrate. Re-enable and schedule background scanning. Where to get more information about Mail Security Mail Security includes a comprehensive help system that contains conceptual, procedural, and context-sensitive information. Press F1 to access information about the page on which you are working. If you want more information about features that are associated with the page, select a More Information link in the Help page, or use the Table of Contents, Index, or Search tabs in the Help viewer to locate a topic. The Symantec Mail Security for Microsoft Exchange Implementation Guide provides information about using this product and is found on the product CD in the following location: \DOCS\SMSMSE\ You can visit the Symantec Web site for more information about your product; the following online resources are available: Provides access to the technical support Knowledge Base, newsgroups, contact information, downloads, and mailing list subscriptions Provides information about registration, frequently asked questions, how to respond to error messages, and how to contact Symantec License Administration /licensing/els/help/en/help.html Provides product news and updates

21 Getting Started Where to get more information about Mail Security 21 Provides access to the Threat Explorer, which contains information about all known threats

22 22 Getting Started Where to get more information about Mail Security

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0.2 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Getting Started Symantec Mail Security for Microsoft Exchange About Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange is a complete, customizable, and scalable

More information

Symantec Mail Security for Microsoft Exchange Server 2013

Symantec Mail Security for Microsoft Exchange Server 2013 Symantec Mail Security for Microsoft Exchange Server 2013 Implementation Guide v7.0 Symantec Mail Security for Microsoft Exchange Implementation Guide The software described in this book is furnished under

More information

How To Use Symantec Mail Security For Windows 7.2.2 (X86) And 7.0 (X64) (X32) (For Windows 7) (Windows 7) And 8.2) (Msmsm

How To Use Symantec Mail Security For Windows 7.2.2 (X86) And 7.0 (X64) (X32) (For Windows 7) (Windows 7) And 8.2) (Msmsm Symantec Mail Security for Microsoft Exchange Server 2013 Implementation Guide v7.0.1 Symantec Mail Security for Microsoft Exchange Implementation Guide The software described in this book is furnished

More information

Symantec Mail Security for Microsoft Exchange Server 2007/Server 2010

Symantec Mail Security for Microsoft Exchange Server 2007/Server 2010 Symantec Mail Security for Microsoft Exchange Server 2007/Server 2010 Implementation Guide Symantec Information Foundation Symantec Mail Security for Microsoft Exchange Implementation Guide The software

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec AntiVirus Enterprise Edition

Symantec AntiVirus Enterprise Edition Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Chapter 6: ScanMail emanager

Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the purpose of ScanMail emanager

More information

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement

More information

Symantec Protection for SharePoint Servers 6.0.4. Getting Started Guide

Symantec Protection for SharePoint Servers 6.0.4. Getting Started Guide Symantec Protection for SharePoint Servers 6.0.4 Getting Started Guide Symantec Protection for SharePoint Servers Getting Started Guide The software described in this book is furnished under a license

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Wise Package Studio 8.0 MR1 Release Notes

Wise Package Studio 8.0 MR1 Release Notes Wise Package Studio 8.0 MR1 Release Notes Wise Package Studio 8.0 MR1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the

More information

Kaspersky Security 8.0 for Microsoft Exchange Servers AD Administrator's Guide

Kaspersky Security 8.0 for Microsoft Exchange Servers AD Administrator's Guide Kaspersky Security 8.0 for Microsoft Exchange Servers AD Administrator's Guide P R O G R A M V E R S I O N : 8. 0 M A I N T E N A N C E P A C K 1 Dear User! Thank you for choosing our product. We hope

More information

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008 ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

GFI Product Manual. Version 6.0. Getting Started Guide

GFI Product Manual. Version 6.0. Getting Started Guide GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described

More information

Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide

Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide Kaspersky Security 8.0 for Microsoft Exchange Servers Installation Guide APPLICATION VERSION: 8.0 MAINTENANCE RELEASE 2 CRITICAL FIX 1 Dear User! Thank you for choosing our product. We hope that this document

More information

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions. PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows Server 2003, Windows Server 2008 5.1 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described

More information

Symantec Endpoint Protection Integration Component 7.5 Release Notes

Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

GFI Product Manual. Getting Started Guide

GFI Product Manual. Getting Started Guide GFI Product Manual Getting Started Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement and may be used

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Reporting 10.0 Symantec Enterprise Vault: Reporting The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Endpoint Protection Small Business Edition Implementation Guide

Symantec Endpoint Protection Small Business Edition Implementation Guide Symantec Endpoint Protection Small Business Edition Implementation Guide Symantec Endpoint Protection Small Business Edition Implementation Guide The software described in this book is furnished under

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Configuring Symantec AntiVirus for NetApp Storage system

Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system The software described in this book is furnished under a license agreement and may be used

More information

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and

More information

McAfee Total Protection Service Installation Guide

McAfee Total Protection Service Installation Guide McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license

More information

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment...

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment... Table of Contents Using This Guide... 9 Purpose and Intended Audience... 9 How to Use This Guide... 9 Conventions Used in This Guide... 10 Typographical Conventions... 10 Admonitions... 10 About Ad-Aware

More information

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes The software described in this book is furnished

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

Norton Small Business. Getting Started Guide

Norton Small Business. Getting Started Guide Norton Small Business Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright 2015

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only

More information

7.5 7.5. Spotlight on Messaging. Evaluator s Guide

7.5 7.5. Spotlight on Messaging. Evaluator s Guide 7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Email Services Deployment. Administrator Guide

Email Services Deployment. Administrator Guide Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the

More information

Symantec Response Assessment module Installation Guide. Version 9.0

Symantec Response Assessment module Installation Guide. Version 9.0 Symantec Response Assessment module Installation Guide Version 9.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service

Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service white paper TABLE OF CONTENTS 1. Document overview......... 1 2. References............. 1 3. Product overview..........

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes

Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes The software described in this book is furnished under a license

More information

PureMessage for Microsoft Exchange Help. Product version: 4.0

PureMessage for Microsoft Exchange Help. Product version: 4.0 PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

Symantec Endpoint Encryption Device Control Release Notes

Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control 8.2.0 www.symantec.com About Symantec Endpoint Encryption Device Control Symantec Endpoint Encryption

More information

Trend ScanMail. for Microsoft Exchange. Quick Start Guide

Trend ScanMail. for Microsoft Exchange. Quick Start Guide Trend ScanMail for Microsoft Exchange Quick Start Guide Trend ScanMail for Microsoft Exchange ScanMail for Exchange This Quick Start Guide provides a step-by-step guide to installing ScanMail for Exchange,

More information

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property

More information

Symantec Backup Exec TM 10d for Windows Servers

Symantec Backup Exec TM 10d for Windows Servers Symantec Backup Exec TM 10d for Windows Servers Quick Installation Guide N180808 September 2005 Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation

More information

Symantec System Recovery 2011 Management Solution Administrator's Guide

Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

GFI Product Manual. Administrator Guide

GFI Product Manual. Administrator Guide GFI Product Manual Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,

More information

Email Quick Reference. Administrator Guide

Email Quick Reference. Administrator Guide Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

ADMINISTRATOR'S GUIDE

ADMINISTRATOR'S GUIDE Kaspersky Security 8.0 for Microsoft Exchange Servers ADMINISTRATOR'S GUIDE P R O G R A M V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this document will help you in

More information

Client Server Messaging Security3

Client Server Messaging Security3 Client Server Messaging Security3 for Small and Medium Business Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide 13740352 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide A P P L I C A T I O N V E R S I O N : 9. 0 Dear User! Thank you for choosing our product. We hope that this document will help

More information

Symantec Protection Engine for Cloud Services Getting Started Guide

Symantec Protection Engine for Cloud Services Getting Started Guide Symantec Protection Engine for Cloud Services Getting Started Guide Symantec Protection Engine for Cloud Services Getting Started Guide The software described in this book is furnished under a license

More information