Transitioning to McAfee SaaS Protection from Postini

Size: px
Start display at page:

Download "Transitioning to McAfee SaaS Email Protection from Postini"

Transcription

1 Technical FAQ Transitioning to McAfee SaaS Protection from Postini Frequently Asked Questions Google recently and abruptly announced that all Postini customers must either migrate to Google Apps, which includes a paralyzed version of Postini, or terminate their contract upon expiration and move to another vendor: To make matters worse, the Google Apps filter will not maintain many of the valuable features that IT departments have come to depend on. Therefore, it s no surprise that McAfee has welcomed scores of Postini customers to its award winning McAfee SaaS Protection service since the announcement. Q: Why Choose McAfee? A: There are many reasons why you should switch from Google/Postini to McAfee: As the world s largest dedicated security vendor, McAfee s primary focus will always be providing the highest level of security to our customers. When it comes to security, McAfee solutions goes beyond defending against spam, phishing, malware, and blended attacks, to also help customers secure outbound communications via integrated encryption, a robust set of pre-built compliance templates, the ability to scan 300+ attachment types, and data loss prevention technologies to safeguard data from bad actors or accidental mishaps. continuity and archiving are integrated as part of the solution. McAfee has a long-term commitment to security, demonstrated by our history of frequent product enhancements, and over 10 years of operational excellence. We understand that providing good customer service requires more than just a support web site, which is why McAfee provides 24x7 live customer support at no additional charge. McAfee recently received these important industry recognitions for security: Leader, Gartner Magic Quadrant for Secure Gateway Leader, Forrester Wave for Content Security Value Leader, EMA Radar Report for Hosted Security 5-Star Best Buy, SC Magazine Content Security Innovator: Data Protection, SC Magazine McAfee is ISO certified and serves tens of thousands of businesses and millions of end users worldwide: Console localized for end users in 18 languages Localized processing with data centers in North America, Europe, Asia, and Australia. McAfee SaaS Archiving is SEC-compliant and provides up to a 10-year retention period, guaranteed regional data storage based on your designation, and localized administrative and end-user console in 18 languages. Integration with McAfee SaaS Web Protection helps organizations optimize security for greater cost effectiveness. Q: How is McAfee SaaS Protection Different than Postini and Google Apps? A: First and foremost, McAfee keeps your safe with our defense In-depth approach to threat protection, utilizing three AV engines, zero hour protection, and most importantly, McAfee Global Threat Intelligence (GTI). GTI is McAfee s cloud-based threat identification network, drawing threat data from over 100 million global listeners and billions of transactions per day.

2 Differentiators to consider: McAfee offers Spooling options for instances when cannot be delivered to your network due to outages, including the ability for users to interact with spooled Outbound filtering including built-in DLP and integrated encryption services 60 days of audit logging versus Postini s 45 days Near-real time message audit records availability Proxy-based filtering, which minimizes disk writes and provides senders with accurate chain of custody information, as opposed to Google Apps store-and-forward model McAfee s proxy architecture won t overwhelm your system with unnecessary connections. No character limit on allow/deny list entries With convenient roles like quarantine administrator McAfee makes it easy for organizations to delegate appropriate levels of access to the corporate helpdesk Easy-to-use TLS, SPF, and DKIM functionality, supporting your ability to enforce authentication best practices Migration Process Overview In this guide, we ll show you the most common configuration tasks, but keep in mind that there is a lot more to McAfee SaaS Protection than what you ll find here! To learn more, we highly recommend attending one of our free online training classes. Setup can take anywhere from a few minutes to several days depending on your knowledge level and the complexity of your infrastructure. Tasks 1. Preparation 2. Configure inbound delivery 3. Configure inbound server failover 4. User creation 5. Configure inbound policies 6. Configure outbound policies 7. Inbound cutover 8. Outbound cutover

3 Task 1: Preparation 1. In your preferred browser, login using your administrator account to the Postini Message Center System Administration module. 2. Open a new browser tab and login using your administrator role to the McAfee SaaS Control Console. Both web sites should now be easily accessible by clicking on the respective browser tab. This will make it easier for you to transfer some of your settings from one console to the other. Postini Message Center (below) McAfee SaaS Control Console (below) Task 2: Configure inbound delivery 1. From the Postini Message Center, navigate to the Inbound Servers > Delivery Manager 2. In the McAfee Control Console, navigate to the Protection tab >Setup tab >Inbound Servers screen 3. Copy and paste each server in Postini to an SMTP Host Address field in the McAfee SaaS. Click the Add New Host button to expose additional rows.

4 4. Be sure to Test Connectivity to ensure that McAfee SaaS can connect to your network. 5. Repeat this process for each of your domains and don t forget to click the save button! Tip: McAfee SaaS always attempts to send and receive using TLS encryption regardless of your settings.

5 Task 3: Configure inbound server failover 1. Configure server failover by entering your failover server(s) into a vacant SMTP Host Address row but with a higher preference than your primary server(s). In the example below there is one primary (preference 10) and one failover (preference 20). 2. In this example, you can see how to configure two primary servers and two failover servers. Task 4: User creation There are five convenient ways for you to populate user accounts: SMTP Discovery recommended for small organizations Manual entry Batch import Active Directory (AD) Pull Sync recommended for medium-sized organizations AD Push Sync recommended for large organizations and enterprises Once created, users will automatically receive a daily spam report so that they can safely review quarantined spam messages without assistance from IT. View your user creation settings by navigating to the Setup tab >User Creation Settings link.

6 SMTP Discovery SMTP Discovery is the default user creation method and the easiest option to administer because it automatically creates your users as they receive valid . Manual Entry You can enter users manually by navigating to the Account Management tab >Users tab > Click the New button on the toolbar and select Creation Mode: Individual. Enter users one at a time. TIP: To add aliases from the user list on the Users tab, double click on the user and navigate to the Aliases tab.

7 Batch Import To batch import users from a file, follow the same process as before, but this time select Creation Mode: Batch instead of Individual then browse to the file containing a listing of your users. The online help contains additional information on the use of this feature, including the required file format. AD Pull Sync AD Pull Sync automatically imports users from your AD without any on-premises software. Access this feature by navigating to the Account Management tab >Configuration tab >Directory Integration link and select Domain from the combo list. Please refer to the online help for more information on configuring AD Pull Sync.

8 AD Push Sync AD Push Sync requires the epolicy Orchestrator-based Directory Services Connector software plugin but it has the advantage of not requiring you to expose your AD to the McAfee SaaS through your firewall. To locate this feature, navigate to the same location as before but select Logical Structure: AD Domain from the Logical Structure combo list. To learn more about this feature, please refer to the online help and the Directory Services Connector Getting Started Guide, downloadable from the Control Console (highlighted below). Task 5: Configure inbound policies The default inbound policy settings are sufficient for most organizations to get started, but there is a great deal of customization to consider. The Default Inbound policy will be applied to all users and groups not assigned to another inbound policy. You can create additional policies and assign those policies to domains or groups by navigating to the Policies tab >Inbound Policies and click the New button.

9 One policy will be applied to each user. If a user is assigned to multiple policies by virtue of their group membership, the policy with the higher priority will be applied. Assign a group to a policy by opening a policy and clicking on the Group Subscriptions tab. Spam Filtering Levels The remaining topics in this section refer to features found inside your inbound policies, which can be viewed by double clicking on any inbound policy. McAfee SaaS categorizes spam in three categories, each has unique actions: Medium likelihood default action = quarantine) High likelihood default action = deny) Graymail default action = allow) Newsletters and retail marketing from reputable sources are examples of graymail that was once desirable but have since become a distraction. The graymail filter is designed to aggressively reduce this traffic. Tuning is achieved by adding graymail senders that you want to receive mail from to your policy-level or user-level Sender Allow list. You may find that enabling the Graymail filter more closely matches the default level of filtering Postini applied to graymail senders.

10 End User Spam Report Configuration Delegating spam quarantine management to end users can be a useful cost savings measure for your IT department. End users interact with McAfee SaaS via the end user version of the Control Console or through Spam Report s, or both. McAfee SaaS simplifies end user access to the Control Console by including auto sign-on links in Spam Report s.

11 By default, your users will receive a spam report every morning, Monday through Friday, featuring new entries since the last report to reduce clutter. Spam Report settings can be found on the Reporting tab under the Spam tab. Spam Reports can be customized in a number of useful ways. Here are just a few highlights: Delivery time and frequency, up to twice per day Delegate control of various settings to end users Adjust Spam Report link settings to balance the need for easy user access to the Control Console with security best practices Define a custom message that will be included at the top of each Spam Report Understanding the End User Experience The Spam Report has a clean and efficient design to minimize the amount of time users spend reviewing their quarantines. When users click on an action link in the report, the action is carried out in the Control Console via the user s default web browser. End users don t have access to s blocked by virus, attachment, and content policies. Tip: Selected delivery times are approximate and may vary up to one hour. Any actions taken in the Spam Report are carried out in the end user version of the Control Console, which has limited functionality compared with the administrator version. The exact experience varies based on the settings you apply in the Spam Reporting tab described above. From the end user Control Console, users can perform these highlighted actions and more: View and release quarantined spam messages View and define aliases Adjust spam filter sensitivity Adjust the Allowed and Blocked Senders lists Access their personal archive (if available) The Quarantine tab allows users to recall messages quarantined up to 14 days back.

12 Policy Level Sender Allow/Deny Lists Your policy-level Sender Allow and Sender Deny lists can be populated with up to 1500 entries each, per policy. There is no character limit. These lists can be populated with domains, addresses, IP address, and CIDR-formatted IP ranges (for example: /24). Tip: The Sender Allow list includes a feature called SPF Validation that improves on the Postini IP Lock feature. When creating a new Sender Allow entry, check the Require SPF Validation box to prevent your entry from being exploited by spammers. SPF validation checks the sender s DNS SPF records to ensure that the is coming from an allowed IP address. This implementation saves you from having to know what IP addresses a sender uses now or in the future. Authentication The Authentication tab contains several mechanisms that you can use to increase the use of authentication best practices: Enforced TLS Enforced SPF Enforced DKIM For instance, the Enforced SPF feature makes it easy to block phishing attempts that mimic large financial and retail institutions, which have made a more consistent effort to utilize SPF.

13 Task 6: Configure outbound policies Outbound policies are very similar to inbound policies but you will notice some important differences, the most important of which is the inclusion of more granular content filtering and the option use of the encrypt action on content triggers. These features are package-dependent, so if these are things you are interested in, be sure to discuss them with your account representative. Content and Data Leakage Protection McAfee s DLP functionality includes these enhancements over base level content filtering: Over 100 pre-defined compliance dictionaries Ability to detect content using regular expressions Registered Documents, also known as file fingerprinting, allows you to train McAfee SaaS to detect confidential file attachments, even if they have been modified from the original Attachment content inspection for over 400 business file formats Ability to require encryption for messages that trigger content rules

14 Content Detection with Regular Expressions From any Outbound Policy, navigate to the Content tab >Custom Content Groups sub tab and click the Enable regular expressions checkbox. Enter your regular expressions strings, one per line, into the Content box and select an action like Encrypt from the Action combo list. To test your regular expressions, we ve included an easy to use validator which can be accessed by clicking on the Launch Validator button at the bottom of the screen.

15 Secure Web Delivery (SWD) Encryption McAfee SaaS SWD makes encryption effortless for end users, allowing them to send encrypted to anyone in the world without the hassle of key management or certificate exchange, by delivering S/MIME encrypted s via McAfee s secure website. Encryption is triggered automatically under these conditions: An outbound content rule with the action of encrypt matches an outbound message A user tags a message subject or body with the string [Encrypt] A user sends an using McAfee s Send Encrypted Add-in for Microsoft Outlook When a third-party recipient receives their first encrypted from your organization through McAfee SaaS, they are prompted via notification to create an account on McAfee s SWD system. Registration takes less than a minute and only has to be performed one-time. Once registered, the recipient can view the encrypted message securely in the Control Console, which uses SSL to protect the web session. The encryption version of the Control Console is feature-rich and easy to use. Recipients can even reply to the original sender (your end user) and if McAfee can establish TLS to your server, the reply will be sent directly to your user s inbox for maximum simplicity. Task 7: Inbound cutover Before switching your inbound flow from Postini to McAfee SaaS, verify that McAfee s IP space is allowed to connect through your firewall to your infrastructure over SMTP. Your firewall may have been configured to restrict inbound SMTP to Postini s IP space per their configuration instructions. MX Records and IP Space The MX records and IP space used by McAfee SaaS can be found by navigating to the Setup tab >MX Records link >Recommended MX Record Settings and Locking Down [your domain] Mail Servers.

16 You should now be ready to cutover to McAfee SaaS Protection by changing your domain s DNS MX Records. Task 8: Outbound cutover In order for McAfee SaaS to accept outbound from your network you must first list the IP ranges you will be connecting from into the Outbound Servers screen under the Setup tab, for each of your domains. Once entered, wait 30 minutes to ensure the change has fully populated through the McAfee network before setting up your server outbound mail relaying or smart hosting to the host name listed at the bottom of the Outbound Servers screen. This concludes your high level overview of McAfee SaaS Protection. Thank you for the opportunity to win your business! 2821 Mission College Boulevard Santa Clara, CA McAfee and the McAfee logo and/or other noted McAfee related products contained herein are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2013 McAfee, Inc faq_saas- _0313_fnl_ASD

Transitioning to McAfee SaaS Email Protection from Postini

Transitioning to McAfee SaaS Email Protection from Postini Technical FAQ Transitioning to McAfee SaaS Email Protection from Postini Frequently Asked Questions Google recently and abruptly announced that all Postini customers must either migrate to Google Apps,

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Service Launch Guide (US Customer) SEG Filtering

Service Launch Guide (US Customer) SEG Filtering Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required

More information

Core Protection Suite

Core Protection Suite Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3

More information

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200 800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A

More information

Symantec Hosted Mail Security Getting Started Guide

Symantec Hosted Mail Security Getting Started Guide Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

Creating a Content Group and assigning the Encrypt action to the Group.

Creating a Content Group and assigning the Encrypt action to the Group. Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Email Protection for your account

Email Protection for your account User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Important Information

Important Information June 2015 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

Email Encryption Made Simple

Email Encryption Made Simple White Paper For organizations large or small Table of Contents Who Is Reading Your Email? 3 The Three Options Explained 3 Organization-to-organization encryption 3 Secure portal or organization-to-user

More information

INLINE INGUARD E-MAIL GUARDIAN

INLINE INGUARD E-MAIL GUARDIAN INLINE INGUARD E-MAIL GUARDIAN Activation Guide December 8, 2008 600 Lakeshore Parkway, AL 35209 888.3InLine support@inline.com 1 InLine InGuard E-Mail Guardian Activation Guide The InLine InGuard E-Mail

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Administration Guide Revision A. SaaS Email Protection

Administration Guide Revision A. SaaS Email Protection Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

Email Encryption Made Simple

Email Encryption Made Simple Email Encryption Made Simple For organizations large or small Table of Contents Who Is Reading Your Email?....3 The Three Options Explained....3 Organization-to-organization encryption....3 Secure portal

More information

Administration Guide Revision E. SaaS Email Protection

Administration Guide Revision E. SaaS Email Protection Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

Core Filtering Admin Guide

Core Filtering Admin Guide Core Filtering Admin Guide 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Table of Contents Login... 3 Overview... 3 Quarantine...

More information

Email Migration Project Plan for Cisco Cloud Email Security

Email Migration Project Plan for Cisco Cloud Email Security Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide August 22, 2013 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements

Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Migration Quick Reference Guide for Administrators

Migration Quick Reference Guide for Administrators Migration Quick Reference Guide for Administrators 10 Easy Steps for Migration Maximize Performance with Easy Settings Changes Communicating with Your Users Reporting Spam Resources Page 1 10 Easy Steps

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

Administration Guide Revision E. Account Management. For SaaS Email and Web Security

Administration Guide Revision E. Account Management. For SaaS Email and Web Security Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

anomaly, thus reported to our central servers.

anomaly, thus reported to our central servers. Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity

More information

Websense Email Security Transition Guide

Websense Email Security Transition Guide Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Protect Your Enterprise With the Leader in Secure Email Boundary Services

Protect Your Enterprise With the Leader in Secure Email Boundary Services Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise

More information

Email Encryption Made Simple

Email Encryption Made Simple Email Encryption For Organizations Large or Small Table of Contents Introduction 3 Who is reading your email? 3 The Three Options Explained 3 Organization-to-organization encryption 3 Secure portal or

More information

Email Services Deployment. Administrator Guide

Email Services Deployment. Administrator Guide Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the

More information

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with

More information

Technology Blueprint. Protecting Intellectual Property in Email. Guarding against information-stealing malware and outbound data loss

Technology Blueprint. Protecting Intellectual Property in Email. Guarding against information-stealing malware and outbound data loss Technology Blueprint Protecting Intellectual Property in Email Guarding against information-stealing malware and outbound data loss LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4

More information

Symantec Hosted Mail Security. Console and Spam Quarantine User Guide

Symantec Hosted Mail Security. Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure. McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,

More information

How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)

How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes) A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365

More information

Email Getting Started Guide Unix Platform

Email Getting Started Guide Unix Platform Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange

More information

MX LOGIC SPAM FILTERING

MX LOGIC SPAM FILTERING MX LOGIC SPAM FILTERING 21 March 2009, Version 1.0 WHAT IS MX LOGIC? In response to the large amount of spam received on KickStart email addresses, the organization has enlisted MX Logic, a hosted filtering

More information

Comprehensive protection. Streamlined administration console

Comprehensive protection. Streamlined administration console Next generation of Forefront Online Protection for Exchange (FOPE) Comprehensive protection Enterprise class reliability Streamlined administration console On-premises Exchange Online Protection Office

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Dell SonicWALL Hosted Email Security. Administration Guide

Dell SonicWALL Hosted Email Security. Administration Guide Dell SonicWALL Hosted Email Security 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Top 10 Features: Clearswift SECURE Email Gateway

Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can

More information

Feature Comparison Guide

Feature Comparison Guide Feature Comparison Guide Stay Secure Portal Autumn 2015 Contents Introduction... 3 Description on some of the new features... 5 Customer overview from partner portal... 5 Partner & customer portal linkage...

More information

Email Migration Manual (For Outlook Express 6)

Email Migration Manual (For Outlook Express 6) Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change

More information

Cloud Relay Solution. Whitepaper

Cloud Relay Solution. Whitepaper Cloud Relay Solution Whitepaper Abstract Cloud-based email is an attractive solution for organizations looking to provide optimum email service for their users at predictable costs. However, cloud-based

More information

Hosted Email Security 2.0 Administrator s Guide

Hosted Email Security 2.0 Administrator s Guide Hosted Email Security 2.0 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Policy Based Encryption Essentials. Administrator Guide

Policy Based Encryption Essentials. Administrator Guide Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Barracuda User Guide. Managing your Spam Quarantine

Barracuda User Guide. Managing your Spam Quarantine Managing your Spam Quarantine Barracuda User Guide Step1: Open your internet browser and go to http://myspam.datatechhosting.com this will automatically redirect you to Barracuda s email security service

More information

FortiMail Email Filtering Course 221-v2.2 Course Overview

FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Exchange Online Protection In-Depth

Exchange Online Protection In-Depth Exchange Online Protection In-Depth Mike Crowley Baseline Technologies Session Agenda Introduction to EOP Administration DMARC, SPF & DKIM Advanced Threat Protection EOP Deployment Tips Introduction to

More information

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252

More information

Mod 08: Exchange Online FOPE

Mod 08: Exchange Online FOPE Office 365 for SMB Jump Start Mod 08: Exchange Online FOPE Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall Owner & IT Consultant District Computers 1 Jump Start Schedule

More information

Spam Filter Message Center. User Guide

Spam Filter Message Center. User Guide Spam Filter Message Center User Guide Powered by MX Resources, LLC 10573 W. Pico Blvd., #343 Los Angeles, CA 90064 (888) 556-7788 support@mxresources.com Introduction Introduction to the Postini Message

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

FTA Computer Security Workshop. Secure Email

FTA Computer Security Workshop. Secure Email FTA Computer Security Workshop Secure Email March 8, 2007 Stan Wiechert, KDOR IS Security Officer Outline of Presentation The Risks associated with Email Business Constraints Secure Email Features Some

More information

Instructions Microsoft Outlook Express Page 1

Instructions Microsoft Outlook Express Page 1 Instructions Microsoft Outlook Express Page 1 Instructions Microsoft Outlook Express This manual is written for users who already have an e-mail account configured in Outlook Express and will therefore

More information

T E C H N I C A L S A L E S S O L U T I O N

T E C H N I C A L S A L E S S O L U T I O N Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com

More information

Email Migration Manual (For Outlook 2010)

Email Migration Manual (For Outlook 2010) Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information

More information

Guardian Digital Secure Mail Suite Quick Start Guide

Guardian Digital Secure Mail Suite Quick Start Guide Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Cisco Cloud Email Security Interoperability with Microsoft Office 365

Cisco Cloud Email Security Interoperability with Microsoft Office 365 White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources

More information

eprism Email Security Suite

eprism Email Security Suite Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

Barracuda Spam Firewall Administrator s Guide

Barracuda Spam Firewall Administrator s Guide Barracuda Spam Firewall Administrator s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license.

More information

Outlook. Sharepoint. Lync. BlackBerry. McAfee. Microsoft Hosted Exchange

Outlook. Sharepoint. Lync. BlackBerry. McAfee. Microsoft Hosted Exchange Outlook Sharepoint Lync BlackBerry McAfee Microsoft Hosted Exchange Microsoft Hosted Exchange Webhosting.net provides a comprehensive Hosted Exchange solution that combines the comprehensive features of

More information

Microsoft Exchange 2003

Microsoft Exchange 2003 Microsoft Exchange 2003 Configuration Guide Microsoft Exchange 2003 Configuration Guide Page 1 Table of Contents Introduction... 2 Document and naming conventions... 2 Outbound email protection... 3 SMTP

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

Email Security 8.0 User Guide

Email Security 8.0 User Guide Email Security 8.0 User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to

More information

Service Updates and Enhancements

Service Updates and Enhancements Service Updates and Enhancements May 8, 2013 McAfee understands that providing the tools for a trusted communication environment is our primary directive. Accomplishing this goal requires listening to

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Account and User Management Training Guide

Account and User Management Training Guide Account and User Management Training Guide Table of Contents 1 Account Management Overview...1-1 2 Accessing the Control Console...2-1 2.1 Module Objectives...2-1 2.2 Obtain Control Console Login Credentials...2-1

More information

Hosting Control Panel (CP) Admin Guide

Hosting Control Panel (CP) Admin Guide Hosting Control Panel (CP) Admin Guide Document Revision Date: April 26, 2012 Hosting CP Admin Guide / TOC Page i Contents HOW TO USE THIS HOSTING CP ADMIN GUIDE... 1 GET STARTED WITH EXCHANGE... 1 Other

More information