Firewall XG / SFOS v16 Beta

Size: px
Start display at page:

Download "Firewall XG / SFOS v16 Beta"

Transcription

1 Firewall XG / SFOS v16 Beta Partner Beta Program Name: Company:

2 Table of Content Welcome... 3 Look & Feel... 4 Base: SFOS migration and performance... 5 Base: HA with dynamic link... 6 Network: Policy base routing... 7 Heartbeat: Purpose based application filter policy... 8 Heartbeat: Heartbeat deployment... 9 Authentication: On appliance and third party OTP server for user authentication...10 RED: Red Site-2-Site RED: Red 15w Web Proxy: User / Group filters in policy Web Proxy: Creative Commons filter safe search with image licensing...14 Web Proxy: Policy warning Web Proxy: Google Apps Domain Web Proxy: Third-Party URL list Mail Proxy: MTA mode deployments Mail Proxy: SPX reply portal Page 2 of 18

3 Welcome Dear Beta-Tester, Welcome to our Beta program for Sophos XG Firewall SFOS v16! We are glad to have you on board, because your feedback will help us to make the new release simply better. Your experiences with the Sophos XG Firewall itself and with many different customer installations in the field will be a real benefit on our way to create a reliable SFOS v16 with useful new features! This document offers descriptions of new and exciting functionalities and a check list with ideas of useful test scenarios. Please feel free to add your own test ideas you know exactly what your customers are looking for and how they like to use our solution. Both would be interesting for us: Does the new feature work as expected what is not working? Do you think that the feature is complete what are you missing how would you design it? During the Beta phase we are offering several options how to get in touch with us depending on the type of information or help we have to share: A feature is not working as expected? You have found a bug? Please go to the Beta forum via and post the issue in the Beta forum with a detailed description and - if possible - with some details how our team can reproduce the behavior. Our engineering teams are checking the forum on a regular base. You have a question or a comment related to the Beta phase itself? Please send an to sfv16@sophos.com Thank you very much in advance for your effort and your cooperation! Page 3 of 18

4 Look & Feel Questions & Answers How hard was it for you to find the items in the navigation structure? Do you think that your common tasks are spread out to too many screens? Are you struggeling with missing features? How hard was it for you to understand the content of the screens? How hard was it for you to use the screens (even if you understand the content well)? Which are the most used and most important 3 tasks in your daily routine? How high is the chance that you roll back because of an unexpected huge difference to Cyberoam/ UTM? (if so pls. Let us know which differences caused it) If you rolled back, do you plan to give the product another chance in the future? Place your own feedback. Page 4 of 18

5 Base: HA with dynamic link Provides the dynamic interfaces (DHCP/PPPoE) support in HA Active/Passive mode. Note: Cellular WAN interface is not supported yet. Use dynamic uplink with your HA installation. Does the communication work with the remote device? If the communication does not work, which remote device do you use? Page 5 of 18

6 Network: Policy base routing SFOS supports advanced routing scenarios: The gateway can now be configured on non WAN zone type of interfaces, too. The gateway reachability can be monitored using health check probing. The policy routing allows various traffic criteria like incoming interface, source network, destination network, layer 4 services, DiffServ code points to route through configured gateway. The policy route has the highest precedence followed by VPN routes followed by static routes. It can be changed from CLI console. The security policy can still override policy routing decision if the primary and/or backup gateway is configured. The admin can achieve various MPLS/VPN fail-over / fail-back scenario using this feature. Note: Cellular WAN interface is not supported yet. MPLS link should be in the WAN zone to support MPLS/VPN failover/failback. Test the several routing scenarios How simple is it to configure the policies? Are all configuration options available, if not what are you missing? Page 6 of 18

7 Firewall: Purpose based application filter policy Based on the generic requirement a few more application filter templates are added in system which will be useful for the admin to configure more meaningful application grouping for firewall policy. Below templates are added for the application filter policy can be used in security policy. Block generally unwanted applications (p2p, risk 4&5 file sharing, proxy tunnel, loss of productivity) Block highest risk applications (risk 5) Block high risk application (4&5) Block filter avoidance applications (proxy, can bypass firewall policy) Configure firewall rule with the templates Are these templates matching your required scenarios? Page 7 of 18

8 Heartbeat: Heartbeat deployment The firewall will maintain the Heartbeat status for the destination server and based on the destination Heartbeat policy traffic will be served. Deploy Heartbeat on several endpoints How do you rate the overall performance? The firewall can detect the missing Heartbeat from the endpoint and drop traffic. Such endpoint system gateway traffic can be filtered by policy rule. Do you experience any issues? Page 8 of 18

9 Authentication: On appliance and third party OTP server for user authentication One time password (OTP) authentication support has been provided from SFOS v16. A one time password - also called two-factor or multi-factor authentication - is a password that is valid for only one login session or transaction and includes a static component (your primary password) as well as a time dependent or temporary (one time use) passcode. It allows users to configure and use OTP codes to authenticate via different facilities against Sophos XG Firewall. Note: OTP is not supported for admin & support user Soft token: Install the SOPHOS authenticator on a mobile device Activate OTP feature with auto-created tokens Check if the logon is working for defined facilities Hard token Define a token in OTP feature and assign to a user Check if the user is able to logon with OTP Note: SFOS supports TOTP RFC compliance hardware/software tokens Do you think the OTP feature is easy to use? Would you offer/recommend this feature for your customers? For what facilities? Third party OTP server: Integrate SFOS with Radius server supporting OTP server like RSA or Free Radius Page 9 of 18

10 RED: RED Site-2-Site With this feature two SFOS firewalls can establish a layer 2 (RED) tunnel and can communicate with each other. RED uses a layer 2 tunnel with virtual interface so it is very easy for the admin to define networks which can be accessed across the tunnel using static routes. "Firewall Red Server" and "Firewall Red Client" types are added in the Add RED tunnel interface configuration. The admin can configure one of the end point (a static IP is recommended) as RED server and other (dynamic IP) as RED client to establish a host-to-host layer 2 tunnel with configurable virtual IP. Note: RED Site-2-Site Tunnel is supported only with SFOS. Create a RED Site-2-Site tunnel on the SFOS v16 installations Define static/policy based routing to route traffic via RED Site-2-site tunnel Create a firewall rule to allow site-2-site tunnel traffic Are all configuration functions easy to find? Does your set up work? Page 10 of 18

11 RED: RED15w SFOS v16 is supporting RED15w with integrated a/b/g/n WiFi. RED15w is added in type selection list in "Add RED interface" page and admin can configure the parameters and manage the RED appliance from SFOS. The RED15w wireless AP will be discovered under pending access point once the tunnel is up and the admin can manage his AP from the wireless menu configuration option. Add it to your regular RED and use WLAN on as many as possible devices (PC & mobile devices) Did you find all configuration options and how easy was to setup the conncetion? Did you connect all wireless devices successfully? Which devices did you use? Page 11 of 18

12 Web Proxy: User / Group filters in policy With the SFOS v16 a web policy can provide an additional layer of filters based on users and group. This allows to create simple firewall rules that use a single web policy for an entire network, while still providing different levels of web access for different groups of users. Configure a policy, for example, if one user needs to get access to a category of websites that is blocked for other users, the administrator just creates a rule in the web policy allowing that category and selecting only that user. No need to clone whole policies or create multiple firewall rules. How easy was it to define and configure a new rule in the web policy? Are all required options covered? Page 12 of 18

13 Web Proxy: Creative Commons filter safe search with image licensing Creative Commons filter is a new feature which restricts image search results returned by Google, Bing and Yahoo. With Creative Commons filter enabled, the search engines would only return images which have been explicitly marked for sharing, thus filtering out many potentially inappropriate results. Enable Creative Commons filter and search for images on Google, Yahoo and Bing. When enabled, did you see any inappropriate images when doing image searches on Google, Bing & Yahoo? Note: If accessing search engines using SSL, HTTPS scanning will need to be enabled for Creative Commons filter to work properly. Page 13 of 18

14 Web Proxy: Policy warning Currently in SFOS, a web category, URL group or file type can be either blocked or allowed. With policy warning, administrators now have a 3rd option to control access. When an user requests a website or file which is marked as Warn in policy, the user is presented with a warning page. The user can then click on the proceed button (without any administrator intervention) on that page to get access to the site or file for the next 30 minutes. After 30 minutes has expired, the user will get presented with a warning page again for that site or file. Enable the warn action in your web policy Customize the warn page Did you have any problem proceeding to sites after the warning page? Administrators can customize the warning page (just like for the block page) to show a customized message to their users if desired. Note: Dynamic categories do not support the warn action. Page 14 of 18

15 Web Proxy: Google Apps Domain Google Apps Domain is a feature which restricts logins to Google services to use specific domains only (e.g. the company's domain). This allows an organization to prevent their users from logging into their own personal Google accounts, thus helping to prevent information from leaking outside the organization. Enable Google Apps Domain and input your organization's domain in your web policy. Is it easy to implement? Note: If accessing Google using SSL, HTTPS scanning will need to be enabled for Google Apps Domain to work properly. Page 15 of 18

16 Web Proxy: Third-Party URL list In SFOS, administrators can create custom web categories by inputting URLs or keywords manually. Third Party URL List is a feature which allows SFOS to retrieve the list of URLs within a custom web category from an external source dynamically (e.g. an URL list maintained by a 3rd party or government organization). Create a small list of URLs, host it on a web server and add it to a custom web category Did the custom category update properly when the list of URLs changed in the file hosted on the external web server? To use this feature, the list of URLs must be listed in a file (supported file formats include.tar,.gz,.bz,.bz2, and.txt) hosted on an external web server. SFOS will update this list every 2 hours. Page 16 of 18

17 Mail Proxy: MTA mode deployments SFOS can now act as a Mail Transfer Agent (MTA). The MTA mode in SFOS facilitates more control over traffic in terms of traffic restrictions, routing and filtering. SFOS accepts s as per configured policies (those are IP Reputation settings, relay permissions and size restrictions). The device stores the s on disk, which can be viewed in the mail spool (Protect > > Mail Spool). scanning policies are then applied on the s to scan for spam and malware, and to apply file type filter, data protection and encryption. Depending upon the policies, s are blocked, quarantined, modified (subject) or forwarded. Use Case 1: Server Fallback Requirement: SMTP routing with multiple mail servers for single domain. Use Case 2: Server Down Requirement: Cache mails when mail server is down. Use Case 3: Multiple Domains on Single public IP Requirement: The admin could have more than one domains on the same public IP to protect. Use Case 4: Invalid HELO/RDNS Requirement: Reject incoming SMTP connections with invalid SMTP HELO message or those coming from hosts with no RDNS entries. Use Case 5: Strict Scanning Requirement: The admin wants SFOS to rigorously scan each inbound and outbound . Is SFOS MTA easy to configure? Does the MTA mode offer all functionality you expect, if not what are you missing? Page 17 of 18

18 Mail Proxy: SPX reply portal The users can now send secure replies to the SPXencrypted s they receive. This is possible by enabling Enable Secure Reply Portal and View Original Body into Reply with the required SPX template. The admin can SPX-encrypt outbound s by configuring appropriate SMTP policies. When an is SPX-encrypted, the recipient receives an encrypted PDF containing the original mail data along with attachments. With the introduction of the SPX reply portal, the recipient can opt to reply by clicking the reply button in secure PDF. On clicking the button, an https link opens in browser where a draft of the reply can be created. On clicking the Send button, the mail will be accepted by MTA and queued for delivery. If the recipient wishes to do so, another reply can be send out by using the same link multiple times. Use Case 1: Reply portal with different SPX password types Requirement: SPX reply portal is supported by all SPX password types in SPX templates. Use Case 2: View original mail in reply portal Requirement: Original mail body should be displayed in SPX reply portal. Use Case 3: Multiple language Requirement: Reply portal supports multiple languages like Hindi, German, Chinese, etc. in replies. How does the SPX reply portal feature meet your expectations? Does the Reply Portal offers all improvements / features you expect, if not what are you missing? Comment Page 18 of 18

Getting Started Guide

Getting Started Guide Getting Started Guide Sophos XG Firewall Virtual Appliance Document Date: August 2017 Version: 21082017AHM Page 1 of 18 Contents Change Log...3 Copyright Notice...4 Preface...5 Minimum Hardware Requirement...5

More information

XG Firewall. What s New in v17. Setup, Control Center and Navigation. Initial Setup Wizard. Synchronized App Control Widget.

XG Firewall. What s New in v17. Setup, Control Center and Navigation. Initial Setup Wizard. Synchronized App Control Widget. XG Firewall What s New in v17 Setup, Control Center and Navigation Initial Setup Wizard Introduced in a Maintenance Release, a new initial setup wizard enables quick and easy out-of-the-box setup. In addition

More information

Migration Guide. Cyberoam to Sophos Firewall. For Customers with Cyberoam Appliances Document Date: October October 2016 Page 1 of 21

Migration Guide. Cyberoam to Sophos Firewall. For Customers with Cyberoam Appliances Document Date: October October 2016 Page 1 of 21 Migration Guide Cyberoam to Sophos Firewall For Customers with Cyberoam Appliances Document Date: October 2016 October 2016 Page 1 of 21 Contents Change Log... 3 Supported Cyberoam Appliances... 5 Points

More information

SonicOS Release Notes

SonicOS Release Notes SonicOS Contents Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 5 Related Technical Documentation... 10 Platform Compatibility The SonicOS

More information

Document Date: January Version: AHM Page 1 of 20

Document Date: January Version: AHM Page 1 of 20 Sophos XG Firewall Virtual Appliance Document Date: January 2018 Microsoft Hyper-V Version: 05012018AHM Page 1 of 20 Contents Preface...4 Base Configuration...4 Prerequisites...4 Installation Procedure...4

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

Sophos Central Partner. help

Sophos Central Partner. help help Contents About help...1 About...2 Dashboard... 3 Alerts...4 Logs... 5 Audit Logs...5 Sophos Central...7 Sophos Central customers...7 Sophos Central Licenses... 7 Managed Customer Usage... 9 Trial

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

Synchronized Security In Action

Synchronized Security In Action Synchronized Security In Action 99% Reduction in incident response time Firewall Web Wireless Email Sophos Central Server Encryption Mobile Endpoint ~5K Firewalls w/ Security Heartbeat 2 Avg. firewalls

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

Synchronized Security

Synchronized Security Synchronized Security Revolutionizing Advanced Threat Protection Per Söderqvist Sales Engineer Nordics and Baltics 1 A Proven Market Leader Endpoint Encryption Leader UTM Unified Threat Management EPP

More information

Sophos Firewall Configuring SSL VPN for Remote Access

Sophos Firewall Configuring SSL VPN for Remote Access Sophos Firewall Configuring SSL VPN for Remote Access Product Version: 1 Document date: October 2014 Contents 1 Introduction 3 2 Configuring Sophos Firewall 4 2.1 Defining a User Account 4 2.2 Configuring

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Sophos Firewall Software Appliance Document Date: August 2017 August 2017 Page 1 of 13 Contents Change Log...3 Copyright Notice...4 Preface...5 Minimum Hardware Requirement...5 Recommended

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Sophos XG Firewall Virtual Appliance Document Date: July 2016 Version: 06072016AHM Page 1 of 22 Contents Preface...4 Minimum Hardware Requirement...5 Installation Procedure...5 Configuring

More information

For example, if a message is both a virus and spam, the message is categorized as a virus as virus is higher in precedence than spam.

For example, if a message is both a virus and spam, the message is categorized as a virus as virus is higher in precedence than spam. About Anti-Spam NOTE: Anti-Spam is a separate, licensed feature that provides a quick, efficient, and effective way to add anti-spam, anti-phishing, and anti-virus capabilities to your existing firewall.

More information

Using Trustwave SEG Cloud with Cloud-Based Solutions

Using Trustwave SEG Cloud with Cloud-Based  Solutions .trust Using Trustwave SEG Cloud with Cloud-Based Email Solutions Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Cloud-Based Email Solutions 2 2 Networking and DNS

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Echidna Concepts Guide

Echidna Concepts Guide Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this

More information

Sophos Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017

Sophos  Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017 Sophos Email Appliance Configuration Guide Product Version 4.3 Sophos Limited 2017 ii Contents Sophos Email Appliance Contents 1 Copyrights and Trademarks...4 2 Setup and Configuration Guide...5 3 Product

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 6.5 Copyright 2012. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

Enabling and Activating Anti-Spam

Enabling and Activating Anti-Spam Enabling and Activating Anti-Spam NOTE: Anti-Spam does not apply to the SuperMassive 9800. The Anti-Spam > Base Setup page allows you to activate the Anti-Spam feature, configure email threat categories,

More information

Sophos Migration Assistant. migration guide

Sophos Migration Assistant. migration guide Sophos Migration Assistant migration guide Contents Preface... 1 Prerequisites... 2 Convert SG/UTM configuration to Sophos XG Firewall-compatible configuration... 3 Reimaging and applying configuration...8

More information

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version: Microsoft 70-351 Microsoft 70-351 TS: MS Internet Security & Acceleration Server 2006, Configuring Practice Test Version: 2.2 QUESTION NO: 1 Your network consists of a single Active Directory domain named

More information

Sophos Mobile Control SaaS startup guide. Product version: 6.1

Sophos Mobile Control SaaS startup guide. Product version: 6.1 Sophos Mobile Control SaaS startup guide Product version: 6.1 Document date: September 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your

More information

Cisco Encryption

Cisco  Encryption This chapter contains the following sections: Overview of, page 1 How to Encrypt Messages with a Local Key Server, page 2 Encrypting Messages using the Email Security Appliance, page 3 Determining Which

More information

Using Trustwave SEG Cloud with Exchange Online

Using Trustwave SEG Cloud with Exchange Online .trust Using Trustwave SEG Cloud with Exchange Online Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Exchange Online 2 2 Networking and DNS Setup 2 3 Provisioning Trustwave

More information

High Availability Synchronization PAN-OS 5.0.3

High Availability Synchronization PAN-OS 5.0.3 High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215

More information

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table

More information

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access SafeNet Authentication Manager Integration Guide SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright

More information

VMware Workspace ONE UEM VMware AirWatch Cloud Connector

VMware Workspace ONE UEM VMware AirWatch Cloud Connector VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

Sophos Virtual Appliance. setup guide

Sophos Virtual  Appliance. setup guide Sophos Virtual Email Appliance setup guide Contents Installing a virtual appliance...1 Prerequisites...3 Enabling Port Access...4 Downloading Virtual Appliance Files... 7 Determining Disk Space and Memory

More information

Sophos XG Firewall v Release Notes. Sophos Firewall Manager - Group Level Web Interface Reference and Admin Guide v1605

Sophos XG Firewall v Release Notes. Sophos Firewall Manager - Group Level Web Interface Reference and Admin Guide v1605 Sophos XG Firewall v 15.01.0 Release Notes Sophos Firewall Manager - Group Level Web Interface Reference and Admin Guide v1605 For Sophos Customers Document Date: June 2017 Contents Device Configuration...

More information

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

VMware AirWatch Cloud Connector Guide ACC Installation and Integration VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Sophos XG Firewall Virtual Appliance. Document Date: January Version: AHM Page 1 of 17

Sophos XG Firewall Virtual Appliance. Document Date: January Version: AHM Page 1 of 17 Sophos XG Firewall Virtual Appliance Document Date: January 2018 XenApp Version: 05012018AHM Page 1 of 17 Contents Change Log...3 Preface...4 Base Configuration...4 Pre-requisite...4 Installation Procedure...4

More information

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Contents. Limitations. Prerequisites. Configuration

Contents. Limitations. Prerequisites. Configuration Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically

More information

Microsoft Unified Access Gateway 2010

Microsoft Unified Access Gateway 2010 RSA SecurID Ready Implementation Guide Partner Information Last Modified: March 26, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description Microsoft www.microsoft.com

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

FortiNAC. Aerohive Wireless Access Point Integration. Version 8.x 8/28/2018. Rev: E

FortiNAC. Aerohive Wireless Access Point Integration. Version 8.x 8/28/2018. Rev: E FortiNAC Aerohive Wireless Access Point Integration Version 8.x 8/28/2018 Rev: E FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE BASE

More information

Sophos Mobile SaaS startup guide. Product version: 7.1

Sophos Mobile SaaS startup guide. Product version: 7.1 Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8

More information

"Charting the Course... MOC A Planning, Deploying and Managing Microsoft Forefront TMG Course Summary

Charting the Course... MOC A Planning, Deploying and Managing Microsoft Forefront TMG Course Summary Description Course Summary The goal of this three-day instructor-led course is to provide students with the knowledge and skills necessary to effectively plan, deploy and manage Microsoft Forefront Threat

More information

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? WHAT IS FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? While firewalls started life simply protecting networks from outside hacks and attacks, the role of the firewall has greatly evolved to take

More information

How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity

How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Remote Desktop Gateway

More information

Installation on Windows Server 2008

Installation on Windows Server 2008 USER GUIDE MADCAP PULSE 4 Installation on Windows Server 2008 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Important Information

Important Information May 2014 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

SONICWALL SECURITY HEALTH CHECK PSO 2017

SONICWALL SECURITY HEALTH CHECK PSO 2017 SONICWALL SECURITY HEALTH CHECK PSO 2017 Get help in fully utilizing your investment to protect your network Overview SonicWALL Security Health Check provides a customer with a comprehensive review of

More information

SONICWALL SECURITY HEALTH CHECK SERVICE

SONICWALL SECURITY HEALTH CHECK SERVICE SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service

More information

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Technical Note. FortiMail Best Practices Version 3.0 MR4.

Technical Note. FortiMail Best Practices Version 3.0 MR4. Technical Note FortiMail Best Practices Version 3.0 MR4 www.fortinet.com FortiMail Best Practices Technical Note Version 3.0 MR4 October 29, 2008 06-30004-0392-20081029 Copyright 2007 Fortinet, Inc. All

More information

Silver Peak EC-V and Microsoft Azure Deployment Guide

Silver Peak EC-V and Microsoft Azure Deployment Guide Silver Peak EC-V and Microsoft Azure Deployment Guide How to deploy an EC-V in Microsoft Azure 201422-001 Rev. A September 2018 2 Table of Contents Table of Contents 3 Copyright and Trademarks 5 Support

More information

Next Generation Firewall

Next Generation Firewall Next Generation Firewall Release Notes 5.10.10 Revision A Contents About this release on page 2 Lifecycle model on page 2 System requirements on page 3 Build version on page 6 Compatibility on page 7 New

More information

SONICWALL SECURITY HEALTH CHECK SERVICE

SONICWALL SECURITY HEALTH CHECK SERVICE SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

Symantec ST0-250 Exam

Symantec ST0-250 Exam Volume: 126 Questions Question No: 1 What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5? A. 80 GB B. 90 GB C. 160 GB D. 180 GB Answer: B Question

More information

Dell SonicWALL NSA 3600 vpn v

Dell SonicWALL NSA 3600 vpn v RSA SECURID ACCESS Standard Agent Implementation Guide Dell SonicWALL NSA 3600 vpn v6.2.2.1 FAL RSA Partner Engineering Last Modified: 10/12/16 Solution Summary Dell SonicWALL

More information

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................

More information

Centralized Policy, Virus, and Outbreak Quarantines

Centralized Policy, Virus, and Outbreak Quarantines Centralized Policy, Virus, and Outbreak Quarantines This chapter contains the following sections: Overview of Centralized Quarantines, page 1 Centralizing Policy, Virus, and Outbreak Quarantines, page

More information

Test Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version

Test Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version Test Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version ACE Exam Question 1 of 50. Which of the following statements is NOT True regarding a Decryption Mirror interface? Supports SSL outbound

More information

NETWRIX GROUP POLICY CHANGE REPORTER

NETWRIX GROUP POLICY CHANGE REPORTER NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

All-in one security for large and medium-sized businesses.

All-in one security for large and medium-sized businesses. All-in one security for large and medium-sized businesses www.entensys.com sales@entensys.com Overview UserGate UTM provides firewall, intrusion detection, anti-malware, spam and content filtering, and

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 USER GUIDE MADCAP PULSE 4 Installation Guide for Pulse on Windows Server 2012 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The

More information

Module 9. Configuring IPsec. Contents:

Module 9. Configuring IPsec. Contents: Configuring IPsec 9-1 Module 9 Configuring IPsec Contents: Lesson 1: Overview of IPsec 9-3 Lesson 2: Configuring Connection Security Rules 9-11 Lesson 3: Configuring IPsec NAP Enforcement 9-21 Lab: Configuring

More information

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter

More information

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO PineApp Mail Secure SOLUTION OVERVIEW David Feldman, CEO PineApp Mail Secure INTRODUCTION ABOUT CYBONET CORE EXPERIENCE PRODUCT LINES FACTS & FIGURES Leader Product Company Servicing Multiple Vertical

More information

New Features and Functionality

New Features and Functionality This section describes the new and updated features and functionality included in Version 6.2.1. Note that only the Firepower 2100 series devices support Version 6.2.1, so new features deployed to devices

More information

DOCUMENTATION. UVM Appliance Azure. Quick Start Guide

DOCUMENTATION. UVM Appliance Azure. Quick Start Guide DOCUMENTATION Quick Start Guide Table of Contents Introduction... 3 Prerequisites... 3 License Keys... 3 UVM Instances... 3 Running an Azure Virtual Machine... 3 In Azure... 3 Configuring Security Firewall...

More information

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client.

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client. Introduction: Intended Audience The StrideLinx Remote Access Solution is designed to offer safe and secure remote access to industrial equipment worldwide for efficient remote troubleshooting, programming

More information

BIG-IP Access Policy Manager : Implementations. Version 12.1

BIG-IP Access Policy Manager : Implementations. Version 12.1 BIG-IP Access Policy Manager : Implementations Version 12.1 Table of Contents Table of Contents Web Access Management...11 Overview: Configuring APM for web access management...11 About ways to time out

More information

Version: Date: 14 th October, 2015

Version: Date: 14 th October, 2015 Version: 10.6.3 Date: 14 th October, 2015 Release Notes Release Date Version 10.6.3; 14 th October, 2015 Release Information Release Type: Major Feature Release Applicable to CyberoamOS Version V 10.01.0XXX

More information

EdgeXOS Platform QuickStart Guide

EdgeXOS Platform QuickStart Guide EdgeXOS Platform QuickStart Guide EdgeXOS Functionality Overview The EdgeXOS platform is a Unified Bandwidth Management device, meaning that it has the ability to support multiple bandwidth management

More information

Cisco Passguide Exam Questions & Answers

Cisco Passguide Exam Questions & Answers Cisco Passguide 642-648 Exam Questions & Answers Number: 642-648 Passing Score: 800 Time Limit: 120 min File Version: 61.8 http://www.gratisexam.com/ Cisco 642-648 Exam Questions & Answers Exam Name: Deploying

More information

Sophos Mobile Control startup guide. Product version: 7

Sophos Mobile Control startup guide. Product version: 7 Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Integrating AirWatch and VMware Identity Manager

Integrating AirWatch and VMware Identity Manager Integrating AirWatch and VMware Identity Manager VMware AirWatch 9.1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

========================================================================= Symantec Messaging Gateway (formerly Symantec Brightmail Gateway) version

========================================================================= Symantec Messaging Gateway (formerly Symantec Brightmail Gateway) version ========================================================================= Symantec Messaging Gateway (formerly Symantec Brightmail Gateway) version 9.5.1 software update notes =========================================================================

More information

SonicOS Enhanced Release Notes

SonicOS Enhanced Release Notes SonicOS Contents Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 5 Upgrading SonicOS Enhanced Image Procedures... 8 Related Technical Documentation... 13 Platform Compatibility The SonicOS

More information

Citrix SSO for ios. Page 1 18

Citrix SSO for ios. Page 1 18 Citrix SSO for ios Page 1 18 Contents OVERVIEW... 3 WHAT'S NEW... 3 KNOWN ISSUES AND FIXED ISSUES... 4 FEATURE COMPARISON BETWEEN CITRIX VPN AND CITRIX SSO... 5 COMPATIBILITY WITH MDM PRODUCTS... 6 CONFIGURE

More information

Parallels Remote Application Server

Parallels Remote Application Server Parallels Remote Application Server Parallels Client for Mac User's Guide v16 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright

More information

Enterprise Protection for the Administrator

Enterprise Protection for the Administrator Enterprise Protection for the Administrator Overview The Proofpoint Protection course covers the protection tools that are available as part of the Proofpoint Suite, including our newest module, Targeted

More information

Sophos Central Admin. help

Sophos Central Admin. help help Contents About Sophos Central... 1 Activate Your License...2 Overview... 3 Dashboard...3 Alerts...4 Logs & Reports... 10 People... 25 Devices... 34 Global Settings...50 Protect Devices...78 Endpoint

More information

SOLUTION MANAGEMENT GROUP

SOLUTION MANAGEMENT GROUP InterScan Messaging Security Virtual Appliance 8.0 Reviewer s Guide February 2011 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com

More information

WeCloud Security. Administrator's Guide

WeCloud  Security. Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security provides a variety of useful features within a user-friendly web console to manage the functions including

More information

Step 1 - Set Up Essentials for Office 365

Step 1 - Set Up Essentials for Office 365 For each Barracuda Cloud Control account, you can have either a linked Barracuda Email Security Gateway appliance or a Barracuda Email Security Service subscription. You cannot use a single Barracuda Cloud

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

EdgeConnect for Amazon Web Services (AWS)

EdgeConnect for Amazon Web Services (AWS) Silver Peak Systems EdgeConnect for Amazon Web Services (AWS) Dinesh Fernando 2-22-2018 Contents EdgeConnect for Amazon Web Services (AWS) Overview... 1 Deploying EC-V Router Mode... 2 Topology... 2 Assumptions

More information

Sophos Mobile. server deployment guide. Product Version: 8.1

Sophos Mobile. server deployment guide. Product Version: 8.1 Sophos Mobile server deployment guide Product Version: 8.1 Contents About this guide... 1 Sizing considerations... 2 Architecture examples...6 Ports and protocols... 9 Usage scenarios for the standalone

More information

Sophos Mobile. installation guide. Product Version: 8.5

Sophos Mobile. installation guide. Product Version: 8.5 installation guide Product Version: 8.5 Contents About this guide... 1 About Sophos Mobile...2 Sophos Mobile licenses... 3 Trial licenses...3 Upgrade trial licenses to full licenses... 3 Update licenses...

More information

Risk Intelligence. Quick Start Guide - Data Breach Risk

Risk Intelligence. Quick Start Guide - Data Breach Risk Risk Intelligence Quick Start Guide - Data Breach Risk Last Updated: 19 September 2018 --------------------------- 2018 CONTENTS Introduction 1 Data Breach Prevention Lifecycle 2 Choosing a Scan Deployment

More information

Sophos Mobile Control SaaS startup guide. Product version: 7

Sophos Mobile Control SaaS startup guide. Product version: 7 Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login

More information

You can find more information about the service at

You can find more information about the service at Introduction The purpose of this guide is to familiarize you with ExchangeDefender and walk you through the configuration, management and deployment of the service. ExchangeDefender is a transparent, cloud-based

More information

FortiNAC Motorola Wireless Controllers Integration

FortiNAC Motorola Wireless Controllers Integration FortiNAC Motorola Wireless Controllers Integration Version: 8.x Date: 8/29/2018 Rev: B FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE

More information

HOB HOB RD VPN. RSA SecurID Ready Implementation Guide. Partner Information. Product Information Partner Name. Last Modified: March 3, 2014 HOB

HOB HOB RD VPN. RSA SecurID Ready Implementation Guide. Partner Information. Product Information Partner Name. Last Modified: March 3, 2014 HOB RSA SecurID Ready Implementation Guide Last Modified: March 3, 2014 Partner Information Product Information Partner Name HOB Web Site www.hobsoft.com Product Name Version & Platform 2.1 Product Description

More information

Wireless-G Router User s Guide

Wireless-G Router User s Guide Wireless-G Router User s Guide 1 Table of Contents Chapter 1: Introduction Installing Your Router System Requirements Installation Instructions Chapter 2: Preparing Your Network Preparing Your Network

More information

How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT

How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT Table of Contents TABLE OF CONTENTS 1 BACKGROUND 2 WINDOWS SERVER CONFIGURATION STEPS 2 CONFIGURING USER AUTHENTICATION 3 ACTIVE DIRECTORY

More information

Exam : Implementing Microsoft Azure Infrastructure Solutions

Exam : Implementing Microsoft Azure Infrastructure Solutions Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service

More information