Upgrading from VIPRE Security for Exchange to GFI MailEssentials

Size: px
Start display at page:

Download "Upgrading from VIPRE Security for Exchange to GFI MailEssentials"

Transcription

1 Upgrading from VIPRE Security for Exchange to GFI MailEssentials

2 The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical. Windows, Exchange, IIS,.NET, Internet Explorer, Outlook, SQL Server and Microsoft are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All product and company names herein may be trademarks of their respective owners. GFI MailEssentials is copyright of GFI SOFTWARE Ltd GFI Software Ltd. All rights reserved. Document Version: Last updated (month/day/year): 20/12/2012

3

4 1 Introduction 1.1 About this manual The scope of this guide is to provide you with all the required information related to upgrading VIPRE Security for Exchange to GFI MailEssentials. NOTE For more information about the commercial terms of upgrading VIPRE Security for Exchange to GFI Software Ltd refer to: Terms and conventions used in this manual Term Description Additional information and references essential for the operation of GFI MailEssentials. Important notifications and cautions regarding potential issues that are commonly encountered. > Step by step navigational instructions to access a specific function. Bold text Italics text Code Items to select such as nodes, menu options or command buttons. Parameters and values that you must replace with the applicable value, such as custom paths and file names. Indicates text values to key in, such as commands and addresses. 1.3 Pricing and Licensing Information on pricing and licensing for GFI MailEssentials is available on: For information on how GFI MailEssentials counts license use, refer to: GFI MailEssentials 1 Introduction 4

5 2 Upgrade information This topic describes: What you need to upgrade to GFI MailEssentials How your VIPRE Security for Exchange configuration is migrated to GFI MailEssentials Any limitations of this migration process. IMPORTANT It is highly recommended that this chapter is read and understood fully before upgrading VIPRE Security for Exchange to GFI MailEssentials since it contains information about settings and configurations that may not be migrated to GFI MailEssentials. IMPORTANT Quarantined s within VIPRE Security for Exchange are not moved to GFI MailEssentials. Take action on and manage all existing quarantined s before upgrading to GFI MailEssentials. IMPORTANT Rules in VIPRE Security for Exchange that have addresses with wildcards will not work when imported to GFI MailEssentials Personal Whitelist\Blocklist. Support for wildcards is planned for GFI MailEssentials Service Release 4. Topics in this chapter: 2.1 System requirements Required VIPRE Security for Exchange versions GFI MailEssentials version that VIPRE Security for Exchange is upgraded to GFI MailEssentials System requirements Hardware requirements Processor Available Memory (RAM) Free Disk Space Software requirements Antivirus and backup software Firewall port settings Upgrade Changes General information Attachment filtering Actions Direction Disclaimers Antispam 21 GFI MailEssentials 2 Upgrade information 5

6 2.1 System requirements This topic contains important information on: Which versions of VIPRE Security for Exchange can be upgraded to GFI MailEssentials Which version of GFI MailEssentials you can upgrade to What hardware and software requirements are required to upgrade your existing VIPRE Security for Exchange installation to GFI MailEssentials Required VIPRE Security for Exchange versions For VIPRE Security for Exchange, the build that must be installed to perform the upgrade is: VIPRE Security for Exchange 32bit version VIPRE Security for Exchange 64bit version If the VIPRE Security for Exchange installed build is earlier than the one above, the GFI MailEssentials installer will not allow the upgrade to continue. The builds mentioned above can be downloaded by clicking on the above links GFI MailEssentials version that VIPRE Security for Exchange is upgraded to The earliest GFI MailEssentials build that supports upgrading from VIPRE Security for Exchange to GFI MailEssentials is: GFI MailEssentials 2012 Service Release 3 (build ) GFI MailEssentials System requirements Hardware requirements The minimum hardware requirements for GFI MailEssentials are: Processor Minimum: 1Ghz Recommended: 2GHz with multiple cores Available Memory (RAM) Minimum: 1.2GB Recommended: 1.5GB Free Disk Space Minimum: 6GB Recommended: 10GB NOTE Hardware requirements depend on a range of factors including volume, and number of Anti Virus engines enabled in GFI MailEssentials. The requirements specified above are required for GFI MailEssentials only. GFI MailEssentials 2 Upgrade information 6

7 2.1.8 Software requirements Supported Operating Systems Windows Server 2003 Standard or Enterprise (x86 or x64)(including R2) or later (including Microsoft Windows Server Standard and DataCenter editions). Supported Mail Servers GFI MailEssentials can be installed on the following mail servers without any further configuration. Microsoft Exchange Server 2013 NOTE Information Store Protection (VSAPI) is not supported on Microsoft Exchange Server 2013 because VSAPI was removed from Microsoft Exchange Server 2013 by Microsoft. Microsoft Exchange Server 2010 Microsoft Exchange Server 2007 SP1 or higher Microsoft Exchange Server 2003 GFI MailEssentials can also be installed in an environment with any SMTP compliant mail server. In this case, GFI MailEssentials should be installed on the gateway/perimeter server so that spam is filtered before reaching the mail server. Supported Internet browsers GFI MailEssentials can be used with the following Internet browsers: Microsoft Internet Explorer 8 or later Google Chrome version (October 10, 2012) or later. Mozilla Firefox version (October 26, 2012) or later. Other required components Internet Information Services (IIS ) World Wide Web service Internet Information Services (IIS ) SMTP service - Except when installing on Microsoft Exchange 2007 /2010 server Microsoft.NET Framework 4 ASP.NET 4.0 Windows Authentication role and Static Content services - Required when installing on Microsoft Windows Server 2008/2008R2 MSMQ - Microsoft Messaging Queuing Service - for more information how to install MSMQ, refer to: GFI MailEssentials 2 Upgrade information 7

8 NOTE For more information on how to install pre-requisites on Microsoft Windows Server 2008 refer to: For more information on how to install pre-requisites on Microsoft Windows Server 2012 refer to: NOTE GFI MailEssentials Information Store Protection cannot be used if any other software is registered to make use of Microsoft Exchange VSAPI. NOTE GFI MailEssentials can also be installed in virtual environments such as Microsoft Hyper-V and VMWare virtualization software. Microsoft Virtual Server cluster group resource with a physical disc cluster. This is required ONLY for environments running Microsoft Exchange 2003 clusters. NOTE For more information on how to create a Resource Group for an Exchange Virtual Server in a Windows Server Cluster, refer to: Clusterresourcegrouphowto Antivirus and backup software Antivirus and backup software scanning may cause GFI MailEssentials to malfunction. This occurs when such software denies access to certain files required by GFI MailEssentials. Disable third party antivirus and backup software from scanning the following folders: 32-bit installations (x86) <..\Program Files\Common Files\GFI> <GFI MailEssentials installation path>\gfi\mailessentials\ <..\Inetpub\mailroot> - if installed on a gateway machine. 64-bit installations (x64) <..\Program Files (x86)\common Files\GFI> <..\Program Files\Exchsrvr\Mailroot> - if installed on the same machine as Microsoft Exchange 2003 <..\Program Files\Microsoft\Exchange Server\TransportRoles> - if installed on the same machine as Microsoft Exchange 2007 <..\Program Files\Microsoft\Exchange Server\V14\TransportRoles> - if installed on the same machine as Microsoft Exchange 2010 <..\Program Files\Microsoft\Exchange Server\V15\TransportRoles> - if installed on the same machine as Microsoft Exchange 2013 GFI MailEssentials 2 Upgrade information 8

9 Firewall port settings Configure your firewall to allow the ports used by GFI MailEssentials. Port Description 53 - DNS Used by the following anti-spam filters: 20 & 21 - FTP IP DNS Blocklist SpamRazer URI DNS Blocklist Used by GFI MailEssentials to connect to ftp.gfi.com and retrieve latest product version information HTTP Used by GFI MailEssentials to download product patches updates for: SpamRazer Anti-Phishing Bayesian Analysis Antivirus definition files Trojan and executable scanner Exploit engine GFI MailEssentials downloads from the following locations: *.mailshell.com *.spamrazer.gfi.com NOTE GFI MailEssentials can also be configured to download updates through a proxy server. 8013, 8015, Remoting These ports are used for inter-process communication. No firewall configuration is required to allow connections to or from the remoting ports since all the GFI MailEssentials processes run on the same server. NOTE Ensure that no other applications (except GFI MailEssentials) are listening on these ports. If other applications are using this ports, these ports can be changed. 389/636 - LDAP/LDAPS This port is used in these scenarios: Microsoft Exchange environment - Required if the server running GFI MailEssentials does not have access/cannot get list of users from Active Directory, for example, in a DMZ environment or other environments which do not use Active Directory. Lotus Domino mail server environment - Required to get addresses from Lotus Domino server. Other SMTP mail server environments - Required to get addresses from SMTP server. 2.2 Upgrade Changes This topic provides you with all the information about how your existing VIPRE Security for Exchange settings are transferred over to GFI MailEssentials upon upgrade. Topics in this chapter: GFI MailEssentials 2 Upgrade information 9

10 2.2.1 General information Attachment filtering Actions Direction Disclaimers Antispam General information VIPRE Security for Exchange provides the following settings: Global Settings Policy Settings There can be only one global setting, together with unlimited policy settings. Each setting, in turn, has one or more rules attached to it. On upgrading to GFI MailEssentials, Global setting rules are set for all users, while Policy Setting rules are set for specific users. Screenshot 1: VIPRE Security for Exchange - applying rules to users Within VIPRE Security for Exchange, rules are applied to users through the screen shown in screenshot 1, above. GFI MailEssentials 2 Upgrade information 10

11 Screenshot 2: GFI MailEssentials - applying the previous VIPRE Security for Exchange installation's rules to all users Within GFI MailEssentials, the previous VIPRE Security for Exchange global settings are applied to all users though the screen shown in screenshot 2 above. Effectively, rule will be applied to all users; if list is empty, none are excluded. GFI MailEssentials 2 Upgrade information 11

12 Screenshot 3: GFI MailEssentials - applying the previous VIPRE Security for Exchange installation's rules to specific users The Policy settings in VIPRE Security for Exchange are applied in GFI MailEssentials through the screen shown in screenshot 3 above. Effectively, rule will only apply to the listed users; whoever is not on the list is excluded Attachment filtering All rules in global settings, including Attachment filtering, are applied to all users. Screenshot 4: Attachment filtering - global settings GFI MailEssentials 2 Upgrade information 12

13 Within VIPRE Security for Exchange, all rules within the global settings are enabled if Enable attachment filtering checkbox is enabled. GFI MailEssentials will interpret this to enable or disable a rule. In VIPRE Security for Exchange, an X-Header is added if the Add X-Header option is enabled. This is not supported in GFI MailEssentials. Screenshot 5: Attachment filtering - global settings - limits group box. The limits group box checks if an attached file is processed or not. In GFI MailEssentials, settings are transposed to Content Filtering > Decompression Engine where the following options are enabled: 1. Check size of uncompressed files in archive 2. Check for amount of files in archives GFI MailEssentials 2 Upgrade information 13

14 Smart Rules Screenshot 6: Attachment filtering - smart rules Within VIPRE Security for Exchange, smart rules are a set of predefined rules built in within VIPRE Security for Exchange that could be enabled/disabled and which filter attachments according to extension type. Within GFI MailEssentials each Smart rule is converted to an Attachment filtering rule (available from Content Filtering > Attachment filtering node). GFI MailEssentials 2 Upgrade information 14

15 Regular Expression Rule Screenshot 7: Regular expression rule VIPRE Security for Exchange regular expressions are converted to Advanced Content Filtering Rules within GFI MailEssentials. These check the attachment name according to the given regex Actions Screenshot 8: VIPRE Security for Exchange Actions GFI MailEssentials 2 Upgrade information 15

16 Screenshot 9: GFI MailEssentials Actions All attachment filtering actions within VIPRE Security for Exchange have an equivalent within GFI MailEssentials. VIPRE Security for Exchange Action Delete attachment Delete entire message Quarantine attachment Quarantine entire message Allow GFI MailEssentials Action Delete Attachment Only and Send Sanitized Copy Delete Quarantine Attachment Only and Send Sanitized Copy Quarantine Do not block Direction Screenshot 10: VIPRE Security for Exchange direction GFI MailEssentials 2 Upgrade information 16

17 Screenshot 11: GFI MailEssentials direction All directions within VIPRE Security for Exchange have an equivalent within GFI MailEssentials. VIPRE Security for Exchange Direction Inbound External Inbound Internal Outbound External Outbound Internal GFI MailEssentials Direction Inbound Internal Outbound Internal Additional notes If rules contain regular expressions, these are moved to Advanced Content Filtering. Global Settings always have notifications both for administrator and local user. Global Settings are always set to Block all except list below, where the list would be empty. Policies always have notification for the administrator. User notifications depend on choice selected in VIPRE Security for Exchange. VIPRE Security for Exchange has an upper limit to the size of files that could be processed - GFI MailEssentials has a lower limit as to files that are not be blocked. Within VIPRE Security for Exchange, attachment filters are set as one rule per item. (For example, one rule for *.jpg, another rule for *.bmp). On upgrade to GFI MailEssentials this setup is retained. For each policy, there is an option to Scan within allowed archives. In GFI MailEssentials, there is a similar rule in Decompression Engine, Scan within archives which is applied to all attachments. SMART Rules are hard coded in VIPRE Security for Exchange. For example, when checking for OLE2 files, this is hard coded to check for the GUIDs of word, excel and power point. These are converted on a one-to-one basis to Attachment filtering rules in GFI MailEssentials Disclaimers Global Settings reflect a disclaimer applied to the whole domain for GFI MailEssentials. The Do not add duplicate global disclaimer checkbox does not apply for GFI MailEssentials. Also, Tokens are not supported. Within GFI MailEssentials, a similar set of disclaimers is provided. To enable a disclaimer, load the GFI MailEssentials Management console, navigate to the Disclaimers node and enable a disclaimer. GFI MailEssentials 2 Upgrade information 17

18 Screenshot 12: VIPRE Security for Exchange Sample general disclaimer Screenshot 13: Disclaimer settings The table below lists the Active Directory variables used in VIPRE Security for Exchange and their equivalent in GFI MailEssentials. GFI MailEssentials 2 Upgrade information 18

19 VIPRE Security for Exchange disclaimer values City (&ad_l%) Company (&ad_company%) Country/region (&ad_co%) Department (&ad_department%) Description (&ad_description%) Display Name (&ad_disaplyname%) (&ad_mail%) Fax (&ad_facsimiletelephonenumber%) First Name (&ad_givenname%) Home (&ad_homephone%) Initials (&ad_initials%) IP Phone (&ad_ipphone%) Last Name (&ad_sn%) Mobile (&ad_mobile%) Notes (&ad_info%) Office (&ad_physicaldeliveryofficename%) P.O. Box (&ad_postofficebox%) Pager (&ad_pager%) State/province (&ad_st%) Street (&ad_streetaddress%) Telephone number (&ad_telephonenumber%) Title (&ad_title%) Web page (&ad_wwwhomepage%) Zip/Postal Code (&ad_postalcode%) GFI MailEssentials disclaimer values [ad_city] [ad_company] [ad_country] [ad_department] [ad_description] [ad_displayname] [ad_ ] [ad_telfax] [ad_firstname] [ad_telhome] [ad_initials] [ad_telipphone] [ad_lastname] [ad_telmobile] [ad_information] [ad_office] [ad_pobox] [ad_telpager] [ad_state] [ad_street] [ad_telnumber] [ad_jobtitle] [ad_webpage] [ad_zipcode] Policy Disclaimers A policy disclaimer applies to a number of users only. In GFI MailEssentials, a policy is translated as a disclaimer for every user who has that policy. GFI MailEssentials 2 Upgrade information 19

20 Screenshot 14: VIPRE Security for Exchange Policy disclaimer. VIPRE Security for Exchange policy disclaimer Disclaimers Order Global Disclaimer only; no policy disclaimer Disclaimers Order Policy Disclaimer only; no global disclaimer Disclaimers Order Global Disclaimer applied before policy disclaimer Disclaimers Order Policy Disclaimer applied before global disclaimer GFI MailEssentials disclaimer Domain disclaimer only and no other disclaimers Disable domain disclaimer and enable user disclaimers Not supported in GFI MailEssentials Not supported in GFI MailEssentials GFI MailEssentials 2 Upgrade information 20

21 NOTE These ordering policies are not supported in GFI MailEssentials. Within GFI MailEssentials ordering is applied in the following order: 1. User Disclaimer 2. Group Disclaimer 3. Domain Disclaimer Additional Notes: In GFI MailEssentials, the top-most disclaimer is used. As such, the same happens with disclaimers that are enabled. By default, the option to Convert to Unicode (UTF-8) for both HTML and Plain Text is enabled. You can have multiple global disclaimers for different local domains. Unused template disclaimers are converted to domain disclaimers and have the domain set to sampledomain.com. Also, these are disabled Antispam IMPORTANT Both VIPRE Security for Exchange and GFI MailEssentials implement score-based anti-spam filters. The difference is however how these are implemented: In VIPRE Security for Exchange this was managed on an engine by engine basis, and administrators could modify how this score was created In GFI MailEssentials this is implemented in SpamRazer and automatically maintained by the system through updates. This is easier to manage and less prone to human error. For global settings, the Enable spam filtering check box enables/disables all rules assigned to global settings. X-Headers are not supported in GFI MailEssentials while the check to filter bounce messages does not apply to GFI MailEssentials since, by default, GFI MailEssentials scans all s. The Antispam Engines settings is not available in GFI MailEssentials since GFI MailEssentials does not have these engines. GFI MailEssentials 2 Upgrade information 21

22 Screenshot 15: VIPRE Security for Exchange Global AntiSpam Settings The table below shows how Antispam global rules in VIPRE Security for Exchange are translated to GFI MailEssentials. VIPRE Security for Exchange rule Allow Sender Blocked Sender Blocked Character Set GFI MailEssentials rule Whitelist Blocklist Header Checking The table below shows how Antispam global custom rules in VIPRE Security for Exchange are translated to GFI MailEssentials. VIPRE Security for Exchange rule From / To / CC / BCC ( address) Allow From / To / CC / BCC ( address) Block From / To / CC / BCC (regex) Allow / Block From / To (display name) Allow From / To (display name) Block From / To (display name) Allow / Block Character Set Allow / Block Character Set (regex) Allow / Block Attachment Name Body / Subject Block Words Body / Subject Allow Words Body / Subject (regex) Block Headers Header Content Type Header Reply To Header Return Path Sender IP Address Allow GFI MailEssentials rule Whitelist Blocklist Header Checking Advanced Content Filtering Rule Spam Keyword Checking Keyword Whitelist Advanced Content Filtering Rule Advanced Content Filtering Rule Advanced Content Filtering Rule Advanced Content Filtering Rule Advanced Content Filtering Rule IP Whitelist GFI MailEssentials 2 Upgrade information 22

23 VIPRE Security for Exchange rule Sender IP Address Block Sender IP Address (regex) Allow / Block GFI MailEssentials rule Antispam policy rules are only applied to selected users. In GFI MailEssentials, not all antispam policies could be applied to a particular user/users. Screenshot 16: VIPRE Security for Exchange Antispam policy settings GFI MailEssentials 2 Upgrade information 23

24 Enabling / Disabling a policy enables/disables all rules related to the policy. Policy Thresholds, Quarantine Actions, Quarantine Location and Spoofing cannot be applied to GFI MailEssentials since these rules are user based. The Personal Allowed/Blocked Sender Lists are mapped to GFI MailEssentials though the Personalised Whitelist and Blocklist. Users can login GFI MailEssentials and list all the addresses to whitelist and blocklist, as opposed to dragging and dropping s in VIPRE Security for Exchange. VIPRE Security for Exchange custom rule From - Allow From - Block To / CC / BCC ( address) Allow To / CC / BCC ( address) Block From / To / CC / BCC (regex) Allow / Block From / To (display name) Allow From / To (display name) Block From / To (display name) Allow / Block Character Set Allow / Block Character Set (regex) Allow / Block Attachment Name Body / Subject Block Words Body / Subject Allow Words Body / Subject (regex) Allow Body / Subject (regex) Block Headers Header Content Type Header Reply To Header Return Path Sender IP Address Allow Sender IP Address Block Sender IP Address (regex) Allow / Block GFI MailEssentials custom rule Personalized Whitelist Personalized Whitelist Block available in Header Checking > Languages. Advanced Content Filtering Rule Keyword Filtering Available as part of Whitelist > Keyword Whitelist. Advanced Content Filtering Rule Advanced Content Filtering Rule Advanced Content Filtering Rule Advanced Content Filtering Rule Advanced Content Filtering Rule Available as part of Whitelist > IP Whitelist GFI MailEssentials 2 Upgrade information 24

25 3 Upgrade Procedure WARNING Backup your existing VIPRE Security for Exchange settings and stores before upgrading to GFI MailEssentials. This enables you to revert back to VIPRE Security for Exchange in case of need. For more information, refer to Backing up and restoring VIPRE Security for Exchange settings (page 30). 1. Run the GFI MailEssentials setup program. 2. Select the language to use with this installation of GFI MailEssentials and click Install. NOTE Language selection is not reversible. You will need to reinstall GFI MailEssentials to change the language selected at this stage. 3. Click Next in the Welcome page. 4. Select whether to check for newer versions/builds of GFI MailEssentials and click Next. 5. Read the license agreement and click I accept the terms in the license agreement if you accept the terms and conditions. Click Next. Screenshot 17: Upgrading from VIPRE Security for Exchange to GFI MailEssentials. GFI MailEssentials 3 Upgrade Procedure 25

26 WARNING Selecting DO NOT UPGRADE, install GFI MailEssentials with default settings option, uninstalls your current VIPRE Security for Exchange installation. 6. If GFI MailEssentials detects a previous installation of VIPRE Security for Exchange, select one of the following options from the Product Migration screen. Option Upgrade to GFI MailEssentials and import configuration settings from VIPRE Security for Exchange DO NOT UPGRADE, install GFI MailEssentials with default settings Description Installs a new instance of GFI MailEssentials and uses the previous settings of VIPRE Security for Exchange as described in this guide. Installs a new instance of GFI MailEssentials with all the default settings without using your current VIPRE Security for Exchange installation settings. WARNING Selecting DO NOT UPGRADE, install GFI MailEssentials with default settings option, uninstalls your current VIPRE Security for Exchange installation. Click Next to continue setup. 7. Key in the administrator s address in the Administrator and enter License Key. Click Next. NOTE 'Evaluation' is no longer accepted as a license key. Access the GFI website customer area to upgrade your license key before starting the upgrade process. 8. Select the mode that GFI MailEssentials will use to retrieve the list of users. Option Yes, all users are available on Active Directory. Rules will be based on Active Directory users. No, I do not have Active Directory or my network does not have access to Active Directory (DMZ) Description Active Directory mode GFI MailEssentials will retrieve the list of users from Active Directory. Selecting this option means that GFI MailEssentials is being installed behind your firewall and that it has access to the Active Directory containing ALL your users. SMTP mode Select this mode if you are installing GFI MailEssentials on a machine that does not have access to the Active Directory containing the complete list of all your users. This includes machines on a DMZ or machines that are not part of the Active Directory domain. In this mode, GFI MailEssentials automatically populates the list of local users using the sender s address in outbound s. The list of users can also be managed from the GFI MailEssentials General Settings node. Click Next. 9. In the IIS Setup dialog, configure the following options: GFI MailEssentials 3 Upgrade Procedure 26

27 NOTE Default settings are typically correct for most installations. Option The website to create the GFI MailEssentials virtual directory The GFI MailEssentials Configuration virtual directory The GFI MailEssentials Quarantine RSS feeds virtual directory SMTP Server Setup Description Select the website where you want to host the GFI MailEssentials virtual directories. Specify a name for the GFI MailEssentials virtual directory. Specify a name for the GFI MailEssentials Quarantine RSS feeds virtual directory. Select the SMTP Server that GFI MailEssentials binds to. By default, GFI MailEssentials binds to your Default SMTP Virtual Server. If you have multiple SMTP virtual servers on your domain, you can bind GFI MailEssentials to any available SMTP virtual server. NOTES 1. If you are installing on a Microsoft Exchange Server 2007/2010/2013 machine this option is not shown since Microsoft Exchange has its own built-in SMTP server. 2. After installation, you can still bind GFI MailEssentials to another SMTP virtual server from the GFI MailEssentials Configuration. Click Next. 10. Select folder where to install GFI MailEssentials and click Next. NOTE When the installation is an upgrade, GFI MailEssentials installs in the same location as the previous installation. 11. Click Install to start the installation process. NOTE If you are prompted to restart the SMTP services, click Yes. 12. On completion, click Finish. 3.1 Personal Filter List Migration Tool The Personal Filter List Migration Tool enables GFI MailEssentials to import any whitelisted/blocklisted addresses that users might have configured through the VIPRE Security for Exchange folders in their individual mailboxes. GFI MailEssentials 3 Upgrade Procedure 27

28 IMPORTANT Use this tool as soon as you complete the upgrade from VIPRE Security for Exchange to GFI MailEssentials to ensure that this configuration is carried over. 1. Launch the VIPRE Security for Exchange Personal Filter List Migration tool by double-clicking PersonalSpamFilterImport.exe from: GFI MailEssentials installation path\antispam\ Figure 1: GFI MailEssentials Personal Filter List migration tool 2. Key in the username, password and domain names to use for this process. Also select a Microsoft Exchange Store type from Exchange Store Type. GFI MailEssentials 3 Upgrade Procedure 28

29 IMPORTANT The user credentials specified must have Full Mailbox Access Rights to access the mailboxes in your environment. For detailed information on the rights required to access all the mailboxes from Microsoft Exchange 2003 onwards, refer to: 3. Click Start and wait for all the mailbox processing to complete. NOTE Migration time is dependent on the number of mailboxes and network configuration/performance. GFI MailEssentials 3 Upgrade Procedure 29

30 4 Backing up and restoring VIPRE Security for Exchange settings 4.1 Backing up VIPRE Security for Exchange settings Backup your VIPRE Security for Exchange settings to enable reverting back to VIPRE Security for Exchange in case this is required. 1. Navigate to <drive>:\program Files\Sunbelt Software\VIPRE Security. 2. Make a copy of the following folders to a secure location: Data QuarantineStore Settings 4.2 Restoring a previous installation of VIPRE Security for Exchange If you backed up your VIPRE Security for Exchange settings (as described above) before uninstalling, you can restore your VIPRE Security for Exchange installation if required. Contact support for more information: Online: Fill out the support request form and follow the instructions on this page closely to submit your support request on: Phone: To obtain the correct technical support phone number for your region visit: NOTE Before contacting Technical Support, have your Customer ID available. Your Customer ID is the online account number that is assigned to you when first registering your license keys in the GFI Customer Area at: GFI MailEssentials 4 Backing up and restoring VIPRE Security for Exchange settings 30

31 5 Index A Active Directory 9, 18, 26 Antispam 21 Antivirus 8-9 B Bayesian Analysis 9 C Cluster 8 D Disclaimers 17 DMZ 26 Domain 17, 26, 28 E Blocklist 22 Direction 16 F firewall 9, 26 G gateway 7-8 H Header checking 22 P Performance 29 Personal Filter List 27 Phishing 9 Q Quarantine 16, 24, 27 R RSS Feeds 27 S SMTP Server 9, 27 SMTP Virtual Server 27 SpamRazer 9, 21 U Updates 9 Upgrade 5, 9, 25 V VIPRE Security for Exchange 1, 4-6, 9, 13, 18, 21, 25, 27, 30 Virtual directory 27 W Whitelist 5, 22 I IIS 7, 26 Internet 7 IP 19, 22 IP DNS Blocklist 9 K Keyword checking 22 L Licensing 4 Lotus Domino 9 M Microsoft Exchange 29 Migration MSMQ 7 GFI MailEssentials Index 31

32 USA, CANADA AND CENTRAL AND SOUTH AMERICA Weston Parkway, Suite 104 Cary, NC 27513, USA Telephone: +1 (888) Fax: +1 (919) ENGLAND AND IRELAND Magna House, London Road, Staines, Middlesex, TW18 4BP, UK Telephone: +44 (0) Fax: +44 (0) EUROPE, MIDDLE EAST AND AFRICA GFI House, San Andrea Street, San Gwann, SGN 1612, Malta Telephone: Fax: AUSTRALIA AND NEW ZEALAND 83 King William Road, Unley 5061, South Australia Telephone: Fax: sales@gfiap.com

GFI Product Comparison. GFI MailEssentials vs Sophos PureMessage

GFI Product Comparison. GFI MailEssentials vs Sophos PureMessage GFI Product Comparison GFI MailEssentials vs PureMessage GFI MailEssentials Integrates with Microsoft Exchange Server 2003/2007/2010/2013 Scans incoming and outgoing emails Scans internal emails within

More information

Evaluation Guide. The purpose of this document is to help evaluating users install and configure GFI EventsManager.

Evaluation Guide. The purpose of this document is to help evaluating users install and configure GFI EventsManager. Evaluation Guide The purpose of this document is to help evaluating users install and configure GFI EventsManager. Contents Introduction 3 System requirements 3 Hardware 3 Software 3 Step by step installation

More information

Evaluation guide. Online Demo Evaluation Guide

Evaluation guide. Online Demo Evaluation Guide Evaluation guide Online Demo Evaluation Guide Contents Introduction 3 Start the Online Demo 3 Archiving Method icon on the Configuration screen 3 Archive Stores icon on the Configuration screen 3 Retention

More information

The information and content in this document is provided for informational purposes only and is provided "as is" with no warranties of any kind,

The information and content in this document is provided for informational purposes only and is provided as is with no warranties of any kind, ADMINISTRATOR GUIDE Find out how you can manage and customize GFI MailEssentials. Tweak settings according to your requirements and troubleshoot any issues encountered. The information and content in this

More information

GFI Product Manual. Evaluation Guide Part 1: Quick Install

GFI Product Manual. Evaluation Guide Part 1: Quick Install GFI Product Manual Evaluation Guide Part 1: Quick Install The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,

More information

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual GFI MailSecurity 2011 for Exchange/SMTP Administration & Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and

More information

GFI Product Comparison. GFI EventsManager 2013 vs. WhatsUp EventLog Management Suite

GFI Product Comparison. GFI EventsManager 2013 vs. WhatsUp EventLog Management Suite GFI Product Comparison GFI EventsManager 2013 vs. WhatsUp EventLog Features GFI EventsManager 2013 WhatsUp Log Installs prerequisites automatically Real-time event log monitoring Real-time event log archiving

More information

User Guide. Learn how to archive items with GFI Archiver.

User Guide. Learn how to archive items with GFI Archiver. User Guide Learn how to archive items with GFI Archiver. The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either

More information

GFI FaxMaker and HIPAA compliance

GFI FaxMaker and HIPAA compliance GFI White Paper GFI FaxMaker and HIPAA compliance This document outlines the requirements of HIPAA in terms of faxing protected health information and how GFI Software s GFI FaxMaker, an easy-to-use fax

More information

GFI product comparison: GFI MailEssentials vs. McAfee Security for Servers

GFI product comparison: GFI MailEssentials vs. McAfee Security for  Servers GFI product comparison: GFI MailEssentials vs. McAfee Security for Email Servers Features GFI MailEssentials McAfee Integrates with Microsoft Exchange Server 2003/2007/2010/2013 Scans incoming and outgoing

More information

GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5

GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5 GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5 Features GFI MailEssentials Symantec Mail Security for Microsoft Exchange 7.5 Integrates with Microsoft Exchange

More information

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall Features GFI MailEssentials Barracuda Spam Firewall Integrates with Microsoft Exchange Server 2007/2010/2013 Scans incoming and outgoing

More information

GFI Product Manual. Evaluation Guide

GFI Product Manual. Evaluation Guide GFI Product Manual Evaluation Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,

More information

GFI Product Manual. Client Manual

GFI Product Manual. Client Manual GFI Product Manual Client Manual The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,

More information

GFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

GFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange Features GFI MailEssentials Trend Micro ScanMail Suite for Microsoft Exchange Integrates with Microsoft

More information

GFI Product Manual. Client Manual

GFI Product Manual. Client Manual GFI Product Manual Client Manual The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,

More information

Quick Installation Guide. Learn how to quickly set up GFI WebMonitor for trial.

Quick Installation Guide. Learn how to quickly set up GFI WebMonitor for trial. Quick Installation Guide Learn how to quickly set up GFI WebMonitor for trial. The information and content in this document is provided for informational purposes only and is provided "as is" with no warranties

More information

GFI product comparison: GFI MailEssentials vs. LogicNow - Control

GFI product comparison: GFI MailEssentials vs. LogicNow - Control GFI product comparison: GFI MailEssentials vs. LogicNow - ControlEmail Security GFI MailEssentials ControlEmail Number of Virus Engines 5 leading engines (Bitdefender, VIPRE, Avira, Kaspersky, McAfee)

More information

USER MANUAL. Learn how to use the user-side features of GFI OneConnect.

USER MANUAL. Learn how to use the user-side features of GFI OneConnect. USER MANUAL Learn how to use the user-side features of GFI OneConnect. The information and content in this document is provided for informational purposes only and is provided "as is" with no warranties

More information

Getting started guide

Getting started guide GFI MailArchiver 6 for Exchange Getting started guide By GFI Software Ltd. http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and

More information

TIBCO Slingshot User Guide. Software Release August 2015

TIBCO Slingshot User Guide. Software Release August 2015 TIBCO Slingshot User Guide Software Release 1.9.4 August 2015 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Managing security in a devicedriven Windows environment

Managing security in a devicedriven Windows environment GFI White Paper Managing security in a devicedriven Windows environment The increasing portability of computing devices, coupled with the rampant growth of mobile devices and portable storage means that

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Deployment Scanner 10.0 Symantec Enterprise Vault: Deployment Scanner The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Kaseya 2. Installation guide. Version R8. English

Kaseya 2. Installation guide. Version R8. English Kaseya 2 Kaseya Server Setup Installation guide Version R8 English October 24, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Perceptive Experience Web Scan

Perceptive Experience Web Scan Perceptive Experience Web Scan Technical Specifications Version: 2.2.x Written by: Product Knowledge, R&D Date: Wednesday, April 05, 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark

More information

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1. Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.3 Release Notes Symantec Endpoint Protection, Symantec Endpoint Protection Small

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release)

GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release) GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release) General features Scheduled scans Agent-less Agent-based Integration with Active Directory Asset tracking Installs

More information

.-----~ IPSWITCH. IMail Server. Getting Started Guide

.-----~ IPSWITCH. IMail Server. Getting Started Guide .-----~ IPSWITCH IMail Server Getting Started Guide Welcome Welcome to the Ipswitch IMail Server software. Ipswitch IMail Server v10 is packaged in three editions: IMail Server, IMail Server Plus, and

More information

Why one virus engine is not enough

Why one virus engine is not enough GFI White Paper Why one virus engine is not enough Multiple virus engines are needed to reduce time lag between virus outbreak and signature update There is no single antivirus engine on the market that

More information

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Comodo Dome Antispam MSP Software Version 2.12 Comodo Comodo Dome Antispam MSP Software Version 2.12 User Guide Guide Version 2.12.111517 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration.

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. Administrator Guide Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. The information and content in this document is provided for informational purposes

More information

GFI Product Comparison. GFI WebMonitor 2015 vs. McAfee Web Gateway

GFI Product Comparison. GFI WebMonitor 2015 vs. McAfee Web Gateway GFI Product Comparison GFI WebMonitor 2015 vs. McAfee Web Gateway Features GFI WebMonitor 2015 McAfee Web Gateway General features Platforms Windows servers and workstation OS Standalone proxy Win 7, 8,

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

Reconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7

Reconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 Reconfiguring VMware vsphere Update Manager 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Cyberoam Virtual Security Appliance - Installation Guide for VMware Player. Version 10

Cyberoam Virtual Security Appliance - Installation Guide for VMware Player. Version 10 Cyberoam Virtual Security Appliance - Installation Guide for VMware Player Version 10 Document Version 10.6.1-26/05/2014 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam

More information

ADMINISTRATOR GUIDE. Find out how to configure GFI OneConnect in different environments, and learn how to set up advanced features.

ADMINISTRATOR GUIDE. Find out how to configure GFI OneConnect in different environments, and learn how to set up advanced features. ADMINISTRATOR GUIDE Find out how to configure GFI OneConnect in different environments, and learn how to set up advanced features. The information and content in this document is provided for informational

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

AMS ARES Platform v1.4

AMS ARES Platform v1.4 AMS ARES Platform v1.4 System Guide MHM-97911, Rev 1 September 2017 System Guide Copyright 2017 by Emerson. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Kaseya 2. User Guide. Version 6.0

Kaseya 2. User Guide. Version 6.0 Kaseya 2 Kaseya Server Installation User Guide Version 6.0 June 21, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Quest Collaboration Services 3.6. Installation Guide

Quest Collaboration Services 3.6. Installation Guide Quest Collaboration Services 3.6 Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

x10data Application Platform v7.1 Installation Guide

x10data Application Platform v7.1 Installation Guide Copyright Copyright 2010 Automated Data Capture (ADC) Technologies, Incorporated. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the

More information

Installing GFI MailArchiver

Installing GFI MailArchiver Installing GFI MailArchiver Introduction This chapter highlights important points you should take into consideration before installing GFI MailArchiver on your network, so that you can make the best decisions

More information

FAX DEVICE INSTALLATION MANUAL

FAX DEVICE INSTALLATION MANUAL FAX DEVICE INSTALLATION MANUAL Discusses what fax devices or communication software works with GFI FaxMaker and shows you how to configure GFI FaxMaker to use these options. The information and content

More information

Concord Print2Fax. Complete User Guide. Table of Contents. Version 3.0. Concord Technologies

Concord Print2Fax. Complete User Guide. Table of Contents. Version 3.0. Concord Technologies Concord Print2Fax Complete User Guide Table of Contents Version 3.0 Concord Technologies 2018 1 Concord Technologies concordfax.com premiumsupport@concordfax.com Copyright 2017 CONCORD Technologies. All

More information

Proficy* Workflow. Powered by Proficy SOA GETTING STARTED

Proficy* Workflow. Powered by Proficy SOA GETTING STARTED Proficy* Workflow Powered by Proficy SOA GETTING STARTED Version 1.5 SP4 February 2012 All rights reserved. No part of this publication may be reproduced in any form or by any electronic or mechanical

More information

Upgrading MailMarshal SMTP 5.5 Installations to MailMarshal SMTP 2006

Upgrading MailMarshal SMTP 5.5 Installations to MailMarshal SMTP 2006 Upgrading MailMarshal SMTP 5.5 Installations to MailMarshal SMTP 2006 April, 2006 Contents Introduction 2 Case 1: Standalone MailMarshal SMTP Server 2 Case 2: Array of MailMarshal SMTP Servers 10 Additional

More information

AD Self Service 2.0 User Guide

AD Self Service 2.0 User Guide AD Self Service 2.0 User Guide Copyright Copyright 2008-2013 BoostSolutions Co., Ltd. All rights reserved. All materials contained in this publication are protected by Copyright. No part of this publication

More information

akkadian Global Directory 3.0 System Administration Guide

akkadian Global Directory 3.0 System Administration Guide akkadian Global Directory 3.0 System Administration Guide Updated July 19 th, 2016 Copyright and Trademarks: I. Copyright: This website and its content is copyright 2014 Akkadian Labs. All rights reserved.

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Comodo Antispam Gateway Software Version 2.11

Comodo Antispam Gateway Software Version 2.11 Comodo Antispam Gateway Software Version 2.11 User Guide Guide Version 2.11.041917 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Installation Guide. for 6.5 and all add-on modules

Installation Guide. for 6.5 and all add-on modules Kaseya Server Setup Installation Guide for 6.5 and all add-on modules February 11, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Scribe Insight Installation Guide. Version August 10, 2011

Scribe Insight Installation Guide. Version August 10, 2011 Scribe Insight Installation Guide Version 7.0.2 August 10, 2011 www.scribesoft.com Important Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form

More information

Veritas Backup Exec Quick Installation Guide

Veritas Backup Exec Quick Installation Guide Veritas Backup Exec Quick Installation Guide Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies

More information

DefendX Software Control-Audit for Hitachi Installation Guide

DefendX Software Control-Audit for Hitachi Installation Guide DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi

More information

Symantec Messaging Gateway 10.0 Getting Started Guide. powered by Brightmail

Symantec Messaging Gateway 10.0 Getting Started Guide. powered by Brightmail Symantec Messaging Gateway 10.0 Getting Started Guide powered by Brightmail The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

The information and content in this document is provided for informational purposes only and is provided "as is" with no warranties of any kind,

The information and content in this document is provided for informational purposes only and is provided as is with no warranties of any kind, ADMINISTRATOR GUIDE Find out how you can manage and customize GFI FaxMaker. Tweak settings according to your requirements and troubleshoot any issues encountered. The information and content in this document

More information

BlackBerry Enterprise Server for Lotus Domino 2.0 Service Pack 5 Readme file

BlackBerry Enterprise Server for Lotus Domino 2.0 Service Pack 5 Readme file BlackBerry Enterprise Server for Lotus Domino 2.0 Service Pack 5 Readme file PLEASE READ THE LEGAL NOTICES SET OUT AT THE END OF THIS DOCUMENT. This document provides information about BlackBerry Enterprise

More information

User Guide. We protect more people from more online threats than anyone in the world.

User Guide. We protect more people from more online threats than anyone in the world. User Guide We protect more people from more online threats than anyone in the world. Care for our Environment, It's the right thing to do. Symantec has removed the cover from this manual to reduce the

More information

Vyapin Office 365 Management Suite

Vyapin Office 365 Management Suite Vyapin Office 365 Management Suite Last Updated: December 2015 Copyright 2015 Vyapin Software Systems Private Limited. All rights reserved. This document is being furnished by Vyapin Software Systems Private

More information

Integrate Cisco IronPort Security Appliance (ESA)

Integrate Cisco IronPort  Security Appliance (ESA) Integrate Cisco IronPort Email Security Appliance (ESA) Publication Date: January 4, 2017 Abstract This guide provides instructions to configure Cisco IronPort Email Security Appliance (ESA) to send the

More information

VMware App Volumes Installation Guide. VMware App Volumes 2.13

VMware App Volumes Installation Guide. VMware App Volumes 2.13 VMware App Volumes Installation Guide VMware App Volumes 2.13 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

Symantec Workflow 7.1 MP1 Release Notes

Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Migrating Enterprise Vault to 64-bit hardware 9.0 Symantec Enterprise Vault: Migrating Enterprise Vault to 64-bit hardware The software described in this book is

More information

PrinterOn Server Install Guide

PrinterOn Server Install Guide PrinterOn Server Install Guide Table of Contents 1. Introduction 3 1.1. Architecture Overview 3 2. Before you begin 4 2.1. Account Requirements 4 2.2. Hardware Requirements 4 2.3. Software Requirements

More information

EMC SourceOne Discovery Manager Version 6.7

EMC SourceOne Discovery Manager Version 6.7 EMC SourceOne Discovery Manager Version 6.7 Installation and Administration Guide 300-012-743 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

AMS 360 In-House and Transfer Manager.NET

AMS 360 In-House and Transfer Manager.NET AMS 360 In-House and Transfer Manager.NET 07/07 Standard Disclaimer The staff of AMS Services has taken due care in preparing these instructions; however, nothing herein modifies or alters in any way the

More information

Attachment Service. Installation and Getting Started Guide

Attachment Service. Installation and Getting Started Guide Attachment Service Installation and Getting Started Guide Attachment Service Installation and Getting Started Guide Last revised: 23 October 2002 Part number: PDF-05356-001 At the time of publication,

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Bitdefender Management Server 3.6 Administrator's Guide Publication date 2013.04.30 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Altiris IT Analytics Solution 7.1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may

More information

User Manual. Admin Report Kit for Exchange Server

User Manual. Admin Report Kit for Exchange Server User Manual Admin Report Kit for Exchange Server Table of Contents 1 About ARKES-Admin Report Kit for Exchange Server 1 1.1 System requirements 2 1.2 How to activate the software? 3 1.3 ARKES Reports Primer

More information

Veritas ediscovery Platform

Veritas ediscovery Platform Veritas ediscovery Platform Release Notes 9.0.1 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 9.0.1 The software described in this book is furnished under a license agreement and may

More information

Dell SonicWALL Security 8.1.1

Dell SonicWALL  Security 8.1.1 Dell SonicWALL July 2015, updated October 2015 These release notes provide information about the Dell SonicWALL release. About Supported platforms New features Resolved issues Product licensing Upgrading

More information

Isilon InsightIQ. Version Installation Guide

Isilon InsightIQ. Version Installation Guide Isilon InsightIQ Version 4.1.0 Installation Guide Copyright 2009-2016 EMC Corporation All rights reserved. Published October 2016 Dell believes the information in this publication is accurate as of its

More information

User Guide for Accessing Cisco Unity Connection Voice Messages in an Application

User Guide for Accessing Cisco Unity Connection Voice Messages in an  Application User Guide for Accessing Cisco Unity Connection Voice Messages in an Email Application Release 9.x Published June, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Overview. Top. Welcome to SysTools MailXaminer

Overview. Top. Welcome to SysTools MailXaminer Table of Contents Overview... 2 System Requirements... 3 Installation of SysTools MailXaminer... 4 Uninstall Software... 6 Software Menu Option... 8 Software Navigation Option... 10 Complete Steps to Recover,

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH. 1 Copyright Acronis International GmbH, 2002-2015 Copyright Statement Copyright Acronis International GmbH, 2002-2015. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of

More information

Kernel for Exchange Server. Installation and Configuration Guide

Kernel for Exchange Server. Installation and Configuration Guide Kernel for Exchange Server Installation and Configuration Guide Table of Contents Table of Contents... 2 1. Introduction... 3 2. Requirements and Prerequisites... 3 2.1 Basic System Requirements... 3 2.2

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

SonicWall Security 9.0.6

SonicWall  Security 9.0.6 SonicWall Email Security 9.0.6 December 2017 These release notes provide information about the SonicWall Email Security 9.0.6 release. Topics: About Email Security Features and Enhancements Resolved Issues

More information

Reconfiguring VMware vsphere Update Manager. Update 1 VMware vsphere 6.5 vsphere Update Manager 6.5

Reconfiguring VMware vsphere Update Manager. Update 1 VMware vsphere 6.5 vsphere Update Manager 6.5 Reconfiguring VMware vsphere Update Manager Update 1 VMware vsphere 6.5 vsphere Update Manager 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

1 Introduction How fax receiving works How fax sending works 7

1 Introduction How fax receiving works How fax sending works 7 Administrator Guide Find out how you can manage and customize GFI FaxMaker. Tweak settings according to your requirements and troubleshoot any issues encountered. The information and content in this document

More information

Product Release Information

Product Release Information Product Release Information Product: Cyberoam Release Number: 9.4.1 build 2 Release Date: 20 th March, 2007 Compatible versions: 9.4.1. build 0 Upgrade: Auto Upgrade Customer Support: For more information

More information

Symantec Messaging Gateway Installation Guide. powered by Brightmail

Symantec Messaging Gateway Installation Guide. powered by Brightmail Symantec Messaging Gateway 10.6.4 Installation Guide powered by Brightmail Symantec Messaging Gateway 10.6.4 Installation Guide Documentation version: 4.3 Legal Notice Copyright 2017 Symantec Corporation.

More information

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement

More information

Nokia Intellisync Mobile Suite Client Guide. Palm OS Platform

Nokia Intellisync Mobile Suite Client Guide. Palm OS Platform Nokia Intellisync Mobile Suite Client Guide Palm OS Platform Published May 2008 COPYRIGHT Copyright 1997-2008 Nokia Corporation. All rights reserved. Nokia, Nokia Connecting People, Intellisync, and Intellisync

More information

M86 MailMarshal SMTP USER GUIDE. Software Version: 6.9.9

M86 MailMarshal SMTP USER GUIDE. Software Version: 6.9.9 M86 MailMarshal SMTP USER GUIDE Software Version: 6.9.9 M86 MAILMARSHAL SMTP USER GUIDE 2012 M86 Security All rights reserved. Published January 2012 for software release 6.9.9 No part of this Documentation

More information

Symantec ediscovery Platform

Symantec ediscovery Platform Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished

More information

Installation Guide Advanced Authentication Server. Version 6.0

Installation Guide Advanced Authentication Server. Version 6.0 Installation Guide Advanced Authentication Server Version 6.0 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Configuring Symantec. device

Configuring Symantec. device Configuring Symantec AntiVirus for Hitachi File OS device Configuring Symantec AntiVirus for Hitachi File OS device The software described in this book is furnished under a license agreement and may be

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Clearswift Gateway Installation & Getting Started Guide. Version 4.1 Document Revision 1.4

Clearswift Gateway Installation & Getting Started Guide. Version 4.1 Document Revision 1.4 Clearswift Gateway Installation & Getting Started Guide Version 4.1 Document Revision 1.4 Copyright Revision 1.4, March, 2015 Published by Clearswift Ltd. 1995 2015 Clearswift Ltd. All rights reserved.

More information

Veritas Desktop and Laptop Option 9.2

Veritas Desktop and Laptop Option 9.2 1. Veritas Desktop and Laptop Option 9.2 Quick Reference Guide for DLO Installation and Configuration 24-Jan-2018 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.

More information

Contents. Limitations. Prerequisites. Configuration

Contents. Limitations. Prerequisites. Configuration Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically

More information

Server Installation ZENworks Mobile Management 2.6.x January 2013

Server Installation ZENworks Mobile Management 2.6.x January 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.6.x January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information