Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018

Size: px
Start display at page:

Download "Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018"

Transcription

1 Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018

2 Symantec Endpoint Protection Mobile - Admin Guide Documentation version: 3.0 This document was last updated on: August 21, 2017 Legal Notice Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Symantec as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA Page 2

3 Contents ABOUT THIS GUIDE... 4 HOW IT WORKS?... 5 SEP MOBILE MANAGEMENT CONSOLE... 7 DASHBOARD... 7 USERS & DEVICES... 9 INSTALLATION HEATH INCIDENTS NETWORK THREATS VULNERABILITIES APPS SETTINGS App Permissions SECURITY Mobile Security Compliance policy Protection Actions Protection Resources Apps Network Threats SIEM Integration COMMUNICATION End Users Notifications Admin Notifications Design Once completed, the following indication will appear in the UI: ios Updates DEVICE MANAGEMENT INTEGRATIONS EMM Integration Selection Basic Setup Full Integration SEP MOBILE APP Verification code Noninteractive Mode Custom Information Page MANAGEMENT CONSOLE ACCESS Administrator Management Login Options TELL ME MORE TECHNICAL SUPPORT DATA COLLECTION Page 3

4 About this Guide This guide is intended for everyone who holds a direct or indirect SEP Mobile administrative role. It summarizes the overall process for configuring and managing SEP Mobile to optimize the security and protection of mobile devices and connected resources, while delivering actionable mobile intelligence information to security & risk assessment teams. Page 4

5 How it Works? The SEP Mobile solution is composed of multiple components, including cloud elements and the SEP Mobile lightweight client app running on mobile devices, that work together to detect & stop mobile threats and attacks. The SEP Mobile app can be installed from the public stores, or may be pushed to devices using existing MDM capabilities. Once a threat is detected, SEP Mobile will automatically take all available actions to maintain a seamless user experience while mitigating the attack. For example, SEP Mobile will automatically activate a secure connection if the device connects to a network which may expose, steal, or manipulate private data. In cases where manual actions are required, such as uninstalling a malicious app, the SEP Mobile solution flags the risky device as noncompliant, allowing the MDM/EMM solution or Exchange service to restrict access to corporate resources until the threat is resolved. Page 5

6 The SEP Mobile solution also includes an Alert & Notification engine which pushes notifications and warning s to Administrators and End-users based on configurable rules. Page 6

7 SEP Mobile Management Console The SEP Mobile Management Console is the primary interface for administrators and security professionals, providing both a broad and detailed view into the organization s mobile devices and overall risk profile, and also an easy-to-use interface which allow admins to perform configuration updates. Dashboard The Dashboard section provides a summary of key information, and various measures and trends of the state of mobile device security and deployment. Navigation Menu Organizes function groups into easy-to-navigate sections. User Settings & Reports Provides users access to options such as password update, direct links to other SEP Mobile systems, release notes, the State of Mobile Security report, and the Organizational Score. This score encapsulates many aspects of using a Mobile Threat Defense solution into a measurable status that tells you how well your organization is protected against mobile security threats. In addition, this section provides the Recommended Actions PDF Report. This report summarizes SEP Mobile s recommended actions for improving the state of mobile security in the organization. Page 7

8 Risk & Compliance - Displays a summary of risk across the organization s devices while highlighting the main areas which may require attention. General details - Provides a summary of the multiple protective tests performed by the SEP Mobile solution. Recent Incidents - Displays the most recent security incidents affecting the monitored devices. Threat Vectors - Provides a general view of the different threats found in the organization s devices, organized by threat vector Network Threats, Vulnerabilities and Malware. Deployment - Provides a general view into the number of devices currently enrolled and using the SEP Mobile solution and highlights the top device health issues. Page 8

9 Users & Devices The Users & Devices section provides a view into each and all mobile devices and users enrolled in the SEP Mobile solution. Devices - Displays the overall list of devices, or devices grouped per user. Users - Displays the overall list of users and details of their associated devices. Search & Export - Allows an easy way to search for devices and/or users The cog context menu ( ) in this section allows exporting to CSV the list of devices & users, and in environments where SEP Mobile is not integrated with any MDM/EMM, it also allows the admin to add new users. Device Information - General information about the selected device The cog context menu ( ) in this section allows additional actions such as deleting a device or user. Device Logs Information from event logs for the selected device. Page 9

10 Installation Heath The Installation Health section provides different views while grouping the enrolled devices based on their MDM and activation statuses. MDM Displays devices based on their MDM/EMM statuses Note that this option is not available in standalone environments not integrated with MDM/EMM. Pre-Activation - Displays devices which are registered in the SEP Mobile system, but have not finished the activation process (E.g. Users who did not install or who did install but did not open, the SEP Mobile app). Post-Activation - Displays activated devices that currently have some SEP Mobile and/or MDM health issue. Inactive Devices That have used SEP Mobile at some point and became inactive over time. For example, a user gets a new device, or if the device is retired from the MDM. Page 10

11 Page 11

12 Incidents The Incidents section provides detailed information about security incidents detected by the SEP Mobile Solution. Note: The cog context menu ( ) in this section allows admins to whitelist a specific hotspot on incidents that are classified as Suspicious hotspot. Advanced Search - Enables the admin to filter incidents based on their statuses (Open, Closed), threat vector (Network Threats, Vulnerabilities and Malware), severity (High, Medium and Low), etc. Incident Details - Displays detailed information about a selected security incident. Important Note: Please refer to the SEP Mobile Security Incidents Reference Guide to see additional details regarding specific action items for each incident type and severity. Page 12

13 Network Threats The Network Threats section provides detailed information about networks that the SEP Mobile solution detected threats on (e.g. Secure traffic decryption, Content Manipulation). Affected Devices - Displays the affected devices for each network selected Network Threat Details - Displays detailed information about each selected network and an explanation about each detection on mouse-over of the incident Map - Displays an overall view based on the network incidents geographical locations Page 13

14 Vulnerabilities The Vulnerabilities section provides detailed information about mobile device configuration and operating system vulnerabilities detected by the SEP Mobile solution. OS Displays a list of the operating system vulnerabilities detected by SEP Mobile in the organization and displays the risk score of each. Vulnerability Details - Displays detailed information about the selected vulnerability, including the relevant CVE reference. Configuration - Displays a list of the configuration vulnerabilities detected by SEP Mobile in the organization. Page 14

15 Apps The Apps section provides a list and detailed information about malicious applications that were detected by the SEP Mobile solution. On Demand Analysis Enables you with the option to submit apps for analysis by uploading their installation files (ios and Android), or by providing a link to the official app store (Android only at the moment). Each app will then be analyzed by all of SEP Mobile's engines: malware analysis, behavioral analysis, crowd wisdom, and developer reputation. Advanced Search Enables the admin to filter Malware incidents based on their status (Currently installed, Removed), platform (Android, ios), etc. Malware Details - Displays detailed information about each malicious application selected from the list. Note: The cog context menu ( ) in the Malware section allows admins to whitelist a specific application or to whitelist all applications from a specific developer. The cog context menu ( ) in the On Demand Analysis section allows admins to view the full details of the app and export the analysis report of the selected app. Page 15

16 Settings The Settings section provides a single location where the SEP Mobile configuration updates can be performed. When navigating to the Settings section the general Environment Settings will be displayed by default. Name - Displays the environment name within the SEP Mobile solution. Self-enroll Domain(s) - Displays the list of domains that are used to automatically route to your environment by the address users enter while activating the SEP Mobile app. Android APK URL - Displays a direct link to download the SEP Mobile app for Android devices (only for cases where users do not have access to Google Play Store). Page 16

17 Privacy Controls The Privacy Controls section provides admins the ability to show or not show SSIDs, BSSIDs and IPs of networks with detected network threats as well as the location. It is also where admins can choose to show all apps installed on all devices. App Permissions Different permissions are requested during the SEP Mobile app installation process in order to allow the app to run optimally. While those items can be configured as described below, we recommend keeping the default settings: Location (ios Only) The SEP Mobile app uses the device location for providing improved protection against network threats. While allowing SEP Mobile to use the device location is not mandatory, it is highly recommended. It is important to note that SEP Mobile only uses the device location when a network threat is detected by the app. At other times, the device location is not tracked. Device Admin (Android Only) This setting allows the SEP Mobile app to keep running in the background even if the end user decides to close the application. Samsung KNOX (Android Only) This setting ensures continuous operation of SEP Mobile app on several Samsung devices. VPN Protection Modules - This option will allow Administrators to silently enable all the permissions necessary for the advanced protection options SEP Mobile has to offer. for example, enforcement of noncompliant devices is planned to be turned on one month after initial roll-out. Page 17

18 Support Contact Options The Support Contact Options menu provides you with the option to customize the support contact options administrators see the SEP Mobile environment. This information is used any time there is a reference to support in the Management Console. ADMINISTRATORS SUPPORT CONTACT OPTIONS - you may use the editor to configure the support information available to administrators, or use SEP Mobile s defaults. END-USERS SUPPORT - Provides your end users with a dedicated support address. Page 18

19 Security The security menu provides relevant information about the current Mobile Security Compliance Policy, Malware Engine, Network Threats configuration, and SIEM Integration. Mobile Security Compliance policy - Provides admins the ability to configure the compliance policy on your organization. Before a new policy is applied an admin can simulate how the change will affect the compliance of the organization's devices and generate a detailed report for this simulation. Page 19

20 Protection Actions Provides you with a centralized place to manage all actions that can be taken in order to protect your sensitive corporate resources from mobile security threats. COMPLIANCE POLICY ENFORCEMENT Once the integration between SEP Mobile and another Enterprise solution is complete you can control whether enforcement, via SEP Mobile compliant / noncompliant statuses, will actually take place. MALWARE INSTALLATION BLOCK Allows you to automatically block the installation of Malware in Android devices. This blocking mechanism is defined based on the Malware severity. AUTOMATIC VPN PROTECTION WITH SEP MOBILE SEP Mobile uses various techniques to automatically protect the device and sensitive data when a network threat is detected. Tunneling the traffic through SEP Mobile s secured VPN allows the end-user to continue using the device seamlessly, even when a suspicious activity is detected. When the Secured Connection Protection is ON the SEP Mobile solution automatically lunches its VPN (or customer VPN) when a network threat is detected. When the Selective Resources Protection is ON SEP Mobile blocks access to selected corporate resources when a network threat is detected and SEP Mobile's Secured VPN Connection cannot be used In order to take advantage of this feature please navigate to the Protection Resources tab. Corporate WiFi Security is ON This will prevent connection either if the device attempts to connect automatically or if the user attempts to connect to the suspicious corporate WiFi hotspot (despite it being identified as such by SEP Mobile before the connection is actually made). Malicious Profiles Protection is ON This will protect devices when malicious profiles attempt to tunnel traffic through a VPN. Page 20

21 Protection Resources The Selective Resources Protection (SRP) settings allows grouping of different resources under the service name that they belong to. We ve also added office 365, Salesforce, and Box as preconfigured services. In addition, we have added the ability to add custom services. Apps Displays the Malware detection engines currently enabled in the environment, Unwanted Apps Policy, and whitelisted applications (see Malware section above). Note: If you wish to change any of those settings please contact Page 21

22 Network Threats Provides details and configuration options related to Network Threat detections such as Secured Connection Protection (VPN), Targeted Secured Resources and Network Whitelist. The Targeted Secured Resources allows the admin to enter specific organization domains on which the SEP Mobile solution should perform a subset of network tests e.g., The organization webmail domain (mail.company.com) The Corporate Wi Fi Security allows SEP Mobile to alert when a hotspot using one of the corporate WiFi names (SSIDs) is detected to have different properties than expected. You can now control those properties by entering some profiling information about the corporate WiFi network used in your organization. The Network Certificates Whitelist displays the list of networks on which SEP Mobile will not issue security warnings. Page 22

23 SIEM Integration SEP Mobile provides customer the option to integrate with existing Security Information and Event Management (SIEM) solutions for logging of mobile device security incidents. SIEM Settings Details which allows SEP Mobile to connect and push the SEP Mobile incidents to the customer s SIEM solution Sample File buttons Allows the customer to download sample files containing events for integration tests For further instructions regarding SIEM Integration, please visit the relevant documentation here. Page 23

24 Communication The communication settings allow the admin to configure the SEP Mobile Alerts & Notification engine to notify the end-users and administrators, via Push Notification and/or , based on conditions and rules. End Users Notifications - Define rules for sending end-users automatic alerts and notifications: Select the Incident Type e.g., any security incident is detected includes all type of incidents (Malware, Network Threat, Configuration) or device becomes noncompliant or unhealthy Select the Severity which will trigger the notification Select a notification note that in the future this item will include enforcement related options Use the button add or remove additional notifications for the defined conditions Define the Frequency on which the notification will be sent Define the Type of Notification to be sent may vary depending on the incident type (e.g. Push Notification and/or message) Admin Notifications - Define rules for sending Administrators automatic notifications: Select the Incident Type e.g., a security incident is detected includes all type of incidents (Malware, Network Threat, Configuration ) Select the Severity which will trigger the notification Select a notification Define the Frequency on which the notification will be sent Define who should receive the notification message e.g., Administrators groups or specific individual administrators Design - Design to allow you to control the design and content of s sent by SEP Mobile to endusers and administrators in your organization. Customization options include: address from which s are sent and the reply-to address When customizing the sender address for notifications generated by SEP Mobile (a practice that is highly recommended in order to increase adoption rates by employees in the organization), a manual step is required from the administrator to complete authentication with SEP Mobile's service provider. We've added an indication for the authentication status in the UI so that it is clear when the process hasn't been completed successfully. Once completed, the following indication will appear in the UI: Page 24

25 Overall design of the message, including styles, logo, headers, custom subject for end-user alerts etc. Free text to personalize system messages and ensure they best fit your company and needs Free text to add support contact information, knowledge-base references, etc. The only piece that cannot be changed is the core message automatically generated by SEP Mobile depending on the specific alert, identified by the HTML placeholder ## Core message ##. Also, if you select to change the address from which s are sent it is required to first verify the new and domain. This is done via an automatic message SEP Mobile generates to that new address. ios Updates - By default, SEP Mobile automatically notifies users when a new ios release is available. In the ios updates option you can change the default behavior and define under which specific release the users will be notified to update. In addition, you can define custom OS update alert rules for different ios device models. Page 25

26 Page 26

27 Device Management Integrations Under this section the admin can set up the SEP Mobile integration with different supported MDM/EMM solutions. EMM Integration Selection Allows the admin to select the MDM/EMM solution to be integrated with SEP Mobile. In addition, this section contains links to the relevant MDM setup guides. Note that once the selection is saved and devices enrolled, it cannot be changed from the SEP Mobile Management Console Should updates be required please contact Basic Setup This section allows the admin to perform the initial integration between SEP Mobile and the selected MDM/EMM solution - Note that there are steps to be performed on the MDM/EMM side before the credentials are entered in the SEP Mobile Management Console. Please follow the instructions found in the Full Setup Guide link at the top of the Basic Setup section: Page 27

28 Full Integration This option allows the admin to setup the relevant Complaint / Noncompliant groups which will be used in the MDM/EMM for automated actions. Note that the options under this section varies depending on the MDM/EMM in use (e.g. SEP Mobile User Invitation feature which is currently only available when integrated with AirWatch and MobileIron). Page 28

29 SEP Mobile App The SEP Mobile App options allows the admin to adjust the settings for the SEP Mobile app installed on the end-user mobile devices. The settings include activation process, permissions and other key settings. Verification code The SEP Mobile app includes a verification step to ensure the user s authenticity. The verification process includes a verification code which should be entered by the user into the SEP Mobile app once it is opened for the first time The verification code can be sent to the end-user via different channels as described below: Verification code sent via (default option) SMS Verification code sent via SMS Organization Code Generates a single verification token/code which should be shared by the admin with the end users installing SEP Mobile. For security reasons, if this option is selected the code needs to be regenerated every 30 days. Note that an activation code is not required when auto-login capabilities are leveraged via MDM/EMM app configuration for ios and Android. Page 29

30 Noninteractive Mode This option allows admins to set the SEP Mobile app into a Noninteractive mode in which no alerts will be visible to the end users from the app itself. Note that SEP Mobile security modules will still be fully operational and all the relevant security data will be available in the SEP Mobile Management Console. Custom Information Page This option provides you with the ability to customize the branded information page for the end users within the SEP Mobile app, the customizations include changing the logo and text users will be displayed within the information page in the SEP Mobile app. Page 30

31 Management Console Access This section allows the admin to control access to the SEP Mobile Management Console by managing administrators and login options. Administrator Management This option allows the admin to create and update SEP Mobile Management Console administrators. Login Options This option allows admins to define a 3 rd party as the identity provider in order to authenticate administrators into the SEP Mobile Management Console via SAML 2.0 single sign-on. While you still need to add the admins you wish to have access to the environments through the management console, their passwords will not be managed by SEP Mobile any longer but by the defined identify provider. Page 31

32 Tell me more Please let us know how we can further assist. Technical Support In case you have further questions, or if you need technical assistance, please contact SEP Mobile Enterprise Support via one of the available channels. Note that SEP Mobile 24x7 phone support option is available to Administrators and Helpdesk teams only and is not for direct end-user contact. Page 32

33 Data Collection Your use of SEP Mobile is dependent on collecting some personal data. Symantec does not analyze or save any traffic generated by devices, except for that generated by the SEP Mobile App. Such information may include, but is not restricted to: User addresses; User list of active devices; Device properties such as OS version, model, whether it is rooted; Installed applications; Security incidents to which each device was exposed; Data about networks the device connected to and the times that happened; and If approved by the user and the organization admin, locations where incidents happen. A subset of this information is also available to the organization admin via the Management Console. The admin has access to information related to security incidents. Additionally, when you register to our services, you may be asked to provide us with personal contact information, such as name, company name, address, phone number, and . You may also be required to choose a user name and password. If you acquire paid services, you may also provide additional payment and transactions related personal data. This collected data will be attributed to you in person only to the extent necessary to provide you or to the organization s administrator with our services. Transmitted Data In addition to the data saved by Symantec, in some scenarios additional user information is transmitted from the user s device to the Symantec servers. This information, listed below, is not stored on the Symantec servers and is only included in network traffic between the device and the server: In cases where the user is connected to a potentially malicious Wi Fi network that might compromise the data sent from the device, all traffic originating from the device (from any application) is routed through Symantec s VPN servers in order to restore a secure communication. This data is not stored or analyzed in any way by Symantec, and the organization s admin doesn t have access to the transmitted data. The Suspicious Networks Near You screen displays a map of suspicious networks near the user s current location and uses location information to fetch this data. For this purpose, the user s current location is sent to the Symantec server, which in turn returns the list of networks. The device s geographic location will also be used to proactively protect devices by assessing the risk level associated with the device location. Purposes of Data Processing Symantec may use personally data for the following purposes: To set up, administer and operate the services for organizations subscribed to the services with respect to mobile devices that are used by their employees and service providers; To send updates and notices and provide information related to our services; to improve the Page 33

34 administration and quality of experience of our website, products, and services; and to respond to inquiries and requests; To enforce the Terms of Service; to collect fees and debts; and to prevent fraud, misappropriation, infringements, identity theft, and any misuse of our services; To comply with applicable law and assist law enforcement agencies as required, including to prevent imminent physical harm or damage to property; To take any action in any case of dispute or legal proceeding between users and Symantec, or between you and other users or third parties with respect to, or in relation with our services. Symantec enables organizations to manage and secure employee devices from a single administrator account. The detailed Privacy Data Collection can be found at Page 34

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement

More information

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide The software described in this book is furnished

More information

Partner Information. Integration Overview. Remote Access Integration Architecture

Partner Information. Integration Overview. Remote Access Integration Architecture Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise

More information

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017 VIP Credential Development Kit Release Notes Version 2.0.8 May 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important information about the Symantec

More information

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version January 2017

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version January 2017 VIP Credential Development Kit Release Notes Version 2.0.7 January 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important and late-breaking information

More information

Symantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started

Symantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started Symantec Cloud Workload Protection on AWS Marketplace Buyer's Guide for Getting Started The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.

Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1. Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.0) Release Notes Express Security Content Update for Microsoft Windows Server 2008

More information

Partner Management Console Administrator's Guide

Partner Management Console Administrator's Guide Partner Management Console Administrator's Guide Partner Management Console Administrator's Guide Documentation version: November 17, 2017 Legal Notice Copyright 2017 Symantec Corporation. All rights reserved.

More information

Partner Information. Integration Overview Authentication Methods Supported

Partner Information. Integration Overview Authentication Methods Supported Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security

More information

Veritas Desktop and Laptop Option Mobile Application Getting Started Guide

Veritas Desktop and Laptop Option Mobile Application Getting Started Guide Veritas Desktop and Laptop Option Mobile Application Getting Started Disclaimer Contents The software described in this document is furnished under a license agreement and may be used only in accordance

More information

Symantec Ghost Solution Suite Web Console - Getting Started Guide

Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.

More information

Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3. Release Notes

Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3. Release Notes Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3 Release Notes Express Security Content Update for JBoss Enterprise Application Platform 6.3

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Deploying Lookout with IBM MaaS360

Deploying Lookout with IBM MaaS360 Lookout Mobile Endpoint Security Deploying Lookout with IBM MaaS360 February 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout,

More information

PGP NetShare FlexResponse Plug-In for Data Loss Prevention

PGP NetShare FlexResponse Plug-In for Data Loss Prevention PGP NetShare FlexResponse Plug-In for Data Loss Prevention Implementation Guide 10.2 The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Documentation version:

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Protection Center Getting Started Guide. Version 2.0

Symantec Protection Center Getting Started Guide. Version 2.0 Symantec Protection Center Getting Started Guide Version 2.0 Symantec Protection Center Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

1 Introduction Requirements Architecture Feature List... 4

1 Introduction Requirements Architecture Feature List... 4 Contents 1 Introduction... 2 1.1 Requirements... 2 1.2 Architecture... 3 1.3 Feature List... 4 1.3.1 Device Compliance status... 4 1.3.2 Auto grouping for devices... 5 1.3.3 Auto grouping for applications...

More information

Symantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App

Symantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App Symantec Validation & ID Protection Service Integration Guide for Microsoft Outlook Web App 2 Symantec VIP Integration Guide for Microsoft Outlook Web App The software described in this book is furnished

More information

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management Lookout Mobile Endpoint Security Deploying Lookout with BlackBerry Unified Endpoint Management June 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved.

More information

Enterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later

Enterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later Versions of FSA Agent and 2007 or later : Versions of FSA Agent and Last updated: 2018-04-05. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo,, Compliance

More information

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-06-18. Legal

More information

McAfee MVISION Mobile epo Extension Product Guide

McAfee MVISION Mobile epo Extension Product Guide McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Lookout Mobile Endpoint Security. AirWatch Connector Guide

Lookout Mobile Endpoint Security. AirWatch Connector Guide Lookout Mobile Endpoint Security AirWatch Connector Guide October 2017 1 Copyright and disclaimer Copyright 2017, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout, the Shield

More information

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement

More information

Lookout Mobile Endpoint Security Console Administrator s Guide

Lookout Mobile Endpoint Security Console Administrator s Guide Lookout Mobile Endpoint Security Lookout Mobile Endpoint Security Console Administrator s Guide March 2018 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved.

More information

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option: Qualification Details with Cloud Service

More information

Patch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x

Patch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x Patch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement

More information

Symantec Workflow 7.1 MP1 Release Notes

Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Patch Assessment Content Update Getting Started Guide for CCS 12.0

Patch Assessment Content Update Getting Started Guide for CCS 12.0 Patch Assessment Content Update Getting Started Guide for CCS 12.0 Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license agreement and may

More information

Message Manager Administrator Guide

Message Manager Administrator Guide Message Manager Administrator Guide Documentation version: 2.0 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered

More information

Symantec Mail Security for Microsoft Exchange 7.9 Getting Started Guide

Symantec Mail Security for Microsoft Exchange 7.9 Getting Started Guide Symantec Mail Security for Microsoft Exchange 7.9 Guide Symantec Mail Security for Microsoft Exchange Guide The software described in this book is furnished under a license agreement and may be used only

More information

Veritas SaaS Backup for Office 365

Veritas SaaS Backup for Office 365 Veritas SaaS Backup for Office 365 Documentation version: 1.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

Enterprise Vault.cloud Archive Migrator Guide. Archive Migrator versions 1.2 and 1.3

Enterprise Vault.cloud Archive Migrator Guide. Archive Migrator versions 1.2 and 1.3 Enterprise Vault.cloud Archive Migrator Guide Archive Migrator versions 1.2 and 1.3 Enterprise Vault.cloud: Archive Migrator Guide Last updated: 2018-01-09. Legal Notice Copyright 2018 Veritas Technologies

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

PGP Viewer for ios. Administrator s Guide 1.0

PGP Viewer for ios. Administrator s Guide 1.0 PGP Viewer for ios Administrator s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2.

More information

Enterprise Vault Requesting and Applying an SSL Certificate and later

Enterprise Vault Requesting and Applying an SSL Certificate and later Enterprise Vault Requesting and Applying an SSL Certificate 10.0.3 and later Enterprise Vault : Requesting and Applying an SSL Certificate Last updated: 2018-04-12. Legal Notice Copyright 2018 Veritas

More information

Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility

Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Altiris Software Management Solution 7.1 from Symantec User Guide

Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-12-03. Legal

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 11.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes The software described in this book is

More information

Symantec ServiceDesk 7.1 SP1 Implementation Guide

Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

VMware AirWatch Integration with Palo Alto Networks WildFire Integrate your application reputation service with AirWatch

VMware AirWatch Integration with Palo Alto Networks WildFire Integrate your application reputation service with AirWatch VMware AirWatch Integration with Palo Alto Networks WildFire Integrate your application reputation service with AirWatch Multiple AirWatch versions Have documentation feedback? Submit a Documentation Feedback

More information

Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.

Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5. Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.x For Windows 2000, Windows Server 2003, and Windows XP SQL

More information

Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator or later

Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator or later Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator 12.2 or later Enterprise Vault : Migrating Data Using the Microsoft Azure Blob Storage Migrator Last updated: 2018-04-12.

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software

More information

Veritas NetBackup OpsCenter Reporting Guide. Release 8.0

Veritas NetBackup OpsCenter Reporting Guide. Release 8.0 Veritas NetBackup OpsCenter Reporting Guide Release 8.0 Veritas NetBackup OpsCenter Reporting Guide Legal Notice Copyright 2016 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

Veritas SaaS Backup for Salesforce

Veritas SaaS Backup for Salesforce Veritas SaaS Backup for Salesforce Documentation version: 2.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

WHITEPAPER. Lookout Mobile Endpoint Security for App Risks

WHITEPAPER. Lookout Mobile Endpoint Security for App Risks WHITEPAPER Lookout Mobile Endpoint Security for App Risks The emerging risk around leaky and noncompliant mobile apps As organizations are increasingly embracing mobile devices in the workplace, mobile

More information

Enterprise Security Solutions by Quick Heal. Seqrite.

Enterprise Security Solutions by Quick Heal. Seqrite. Enterprise Security Solutions by Quick Heal Seqrite Infinite Devices. One Unified Solution. A simple yet powerful solution, Seqrite is a unified platform for managing and monitoring multiple mobile devices

More information

Veritas Enterprise Vault Guide for Mac OS X Users 12.2

Veritas Enterprise Vault Guide for Mac OS X Users 12.2 Veritas Enterprise Vault Guide for Mac OS X Users 12.2 Veritas Enterprise Vault: Guide for Mac OS X Users Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved.

More information

VMware AirWatch Integration with Palo Alto Networks WildFire Integrate your application reputation service with AirWatch

VMware AirWatch Integration with Palo Alto Networks WildFire Integrate your application reputation service with AirWatch VMware AirWatch Integration with Palo Alto Networks WildFire Integrate your application reputation service with AirWatch Multiple AirWatch versions Have documentation feedback? Submit a Documentation Feedback

More information

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

3CX Mobile Device Manager

3CX Mobile Device Manager 3CX Mobile Device Manager Manual 1 Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples

More information

NetBackup Self Service Release Notes

NetBackup Self Service Release Notes NetBackup Self Service Release Notes 7.7.3 Document version: 1 Veritas NetBackup Self Service Release Notes Document version: 7.7.3 Legal Notice Copyright 2016 Veritas Technologies LLC. All rights reserved.

More information

Symantec PGP Viewer for ios

Symantec PGP Viewer for ios Symantec PGP Viewer for ios User's Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.0.

More information

Message Manager Administrator Guide for ZA

Message Manager Administrator Guide for ZA Message Manager Administrator Guide for ZA Documentation version: 2.0 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or

More information

Enterprise Vault.cloud Journaling Guide

Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud: Journaling Guide Last updated: 2018-01-30. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas

More information

Veritas Access Enterprise Vault Solutions Guide

Veritas Access Enterprise Vault Solutions Guide Veritas Access Enterprise Vault Solutions Guide Linux 7.4.1 Veritas Access Enterprise Vault Solutions Guide Last updated: 2018-07-31 Document version: 7.4.1 Rev 0 Legal Notice Copyright 2018 Veritas Technologies

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

PGP Viewer for ios. User s Guide 1.0

PGP Viewer for ios. User s Guide 1.0 PGP Viewer for ios User s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2. Last updated:

More information

Veritas System Recovery 16 Management Solution Administrator's Guide

Veritas System Recovery 16 Management Solution Administrator's Guide Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark for AIX 5.3 and 6.1 The software

More information

User Guide. We protect more people from more online threats than anyone in the world.

User Guide. We protect more people from more online threats than anyone in the world. User Guide We protect more people from more online threats than anyone in the world. Care for our Environment, It's the right thing to do. Symantec has removed the cover from this manual to reduce the

More information

One Identity Starling Two-Factor Authentication. Administration Guide

One Identity Starling Two-Factor Authentication. Administration Guide One Identity Starling Two-Factor Authentication Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Compliance Manager ZENworks Mobile Management 2.7.x August 2013

Compliance Manager ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Compliance Manager ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

KACE GO Mobile App 3.1. Release Notes

KACE GO Mobile App 3.1. Release Notes KACE GO Mobile App 3.1 Release Notes Table of Contents Quest KACE GO 3.1 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance (K1000) administrators...

More information

Veritas ediscovery Platform

Veritas ediscovery Platform Veritas ediscovery Platform Release Notes 8.2 Cumulative Hotfix 3 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 8.2 CHF3 The software described in this book is furnished under a license

More information

Symantec ediscovery Platform

Symantec ediscovery Platform Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished

More information

One Identity Starling Two-Factor Authentication. Administrator Guide

One Identity Starling Two-Factor Authentication. Administrator Guide One Identity Authentication Administrator Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Sophos Mobile. startup guide. Product Version: 8.1

Sophos Mobile. startup guide. Product Version: 8.1 Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

KACE GO Mobile App 5.0. Release Notes

KACE GO Mobile App 5.0. Release Notes KACE GO Mobile App 5.0 Release Notes Table of Contents Quest KACE GO 5.0 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance administrators...

More information

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the

More information

Veritas Backup Exec Quick Installation Guide

Veritas Backup Exec Quick Installation Guide Veritas Backup Exec Quick Installation Guide Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies

More information

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes. Introducing MVISION Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls Jon Parkes McAfee 1 All information provided here is subject to non-disclosure

More information

1 Introduction Requirements Architecture Feature List... 3

1 Introduction Requirements Architecture Feature List... 3 Contents 1 Introduction... 2 1.1 Requirements... 2 1.2 Architecture... 3 1.3 Feature List... 3 1.3.1 Device Compliance status... 3 1.3.2 Auto grouping for devices... 4 1.4 Basic Deployment... 4 1.4.1 Prepare

More information

McAfee MVISION Mobile Threat Detection Android App Product Guide

McAfee MVISION Mobile Threat Detection Android App Product Guide McAfee MVISION Mobile Threat Detection Android App 1809.4.7.0 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement

More information

Veritas Enterprise Vault Setting up SharePoint Server Archiving 12.2

Veritas Enterprise Vault Setting up SharePoint Server Archiving 12.2 Veritas Enterprise Vault Setting up SharePoint Server Archiving 12.2 Veritas Enterprise Vault: Setting up SharePoint Server Archiving Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies

More information

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide The software described in this book is furnished under

More information

KACE GO Mobile App 4.0. Release Notes

KACE GO Mobile App 4.0. Release Notes KACE GO Mobile App 4.0 Release Notes Table of Contents Quest KACE GO 4.0 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance administrators...

More information

IM: Symantec Security Information Manager Patch 4 Resolved Issues

IM: Symantec Security Information Manager Patch 4 Resolved Issues IM: Symantec Security Information Manager 4.7.2 Patch 4 Resolved Symantec Security Information Manager 4.7.2 Patch 4 Resolved The software described in this book is furnished under a license agreement

More information

Sophos Mobile Control startup guide. Product version: 7

Sophos Mobile Control startup guide. Product version: 7 Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses

More information

Comodo Dome Shield - Admin Guide

Comodo Dome Shield - Admin Guide rat Comodo Dome Shield Software Version 1.12 Administrator Guide Guide Version 1.12.111717 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo Dome

More information

Veritas NetBackup Appliance Security Guide

Veritas NetBackup Appliance Security Guide Veritas NetBackup Appliance Security Guide Release 2.7.3 NetBackup 52xx and 5330 Veritas NetBackup Appliance Security Guide Document version: 2.7.3 Legal Notice Copyright 2016 Veritas Technologies LLC.

More information

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1. Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.3 Release Notes Symantec Endpoint Protection, Symantec Endpoint Protection Small

More information

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.1 Legal Notice Copyright 2015 Symantec Corporation. All rights

More information

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note FSA Reporting deployment guidelines 8.0 Symantec Information Foundation Symantec Enterprise Vault: FSA Reporting deployment guidelines The software described in

More information

Symantec Information Centric Analytics Symantec ICT Integration Guide. Version 6.5

Symantec Information Centric Analytics Symantec ICT Integration Guide. Version 6.5 Symantec Information Centric Analytics Symantec ICT Integration Guide Version 6.5 Symantec ICA Symantec ICT Integration Guide, powered by Bay Dynamics Product version 6.5 Documentation version: 1 This

More information