How-To Configure Mailbox Auto Remediation for Office 365 on Cisco Security
|
|
- Alisha Lester
- 6 years ago
- Views:
Transcription
1 How-To Configure Mailbox Auto Remediation for Office 365 on Cisco Security Beginning with AsyncOS Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved.
2 Contents About This Document 3 Introduction to Office 365 Mailbox Auto Remediation 3 Verifying Feature Keys in Cloud Security 4 Building a Public and Private Certificate and Key Pair 5 Register Your CES Cluster as an Application in Azure 6 Modify the Manifest to Reference the RSA Certificate 8 Upload Private Key and Other Certificate Parameters to the CES Cluster 10 Configuring Remedial Actions on Delivered Messages 11 Troubleshooting Mailbox Remediation 12 2
3 About This Document Microsoft Exchange has become the standard system used by midsize to large-scale organizations globally. With the rise of cloud applications, Microsoft has introduced Office 365. Cisco Security has been protecting Exchange from spam, phishing attacks and viruses for over a decade and recently has enhanced malware protection with Advanced Malware Protection (AMP). While the security portfolio encompasses other protections, this guide explains how Microsoft Office 365 customers can protect their mailboxes from malicious zeroday attacks such as ransomware. It steps the reader through the details of setting up Office 365 Mailbox Auto Remediation integrated with AMP. This document is for Cisco engineers and customers who will deploy Cisco Cloud Security using AsyncOS 10.0 or higher. This document covers: Overview of Office 365 Mailbox Auto Remediation Creating a certificate Registering Cisco Cloud Security (CES) as an Azure app Troubleshooting Note: The graphics present the most recent version of the Azure Active Directory user interface. As that changes over time, customers will need to consult Microsoft tech articles to supplement the tasks described here. However, other details need to be considered that address how Cisco CES gains access to a user s Office 365 mailbox to remediate the message. Cisco CES uses Azure Active Directory to gain access to the Office 365 mailboxes. After CES receives the retrospective update about the malicious file (Figure 1), it requests an access token from Azure. If communication is secured between CES and Azure, and CES is granted permission to access the Office 365 application, then an access token is provided (Figure 2). At that point the remediation action is allowed to proceed as indicated in step 5 of Figures 1 and 2. This guide is to cover how to integrated ESA/CES with O365 for auto remediation only. The reader of this guide is required to know how to setup AMP on Security. For more details, see the chalk-talk Cisco Security Malware Auto-Remediation for Office 365 or reference the How-to Guide Protect Against File-Based Attacks. Additionally, this link will direct you to the Security Chalk Talk Cisco Security Malware Auto-Remediation for Office 365. Figure 1. Retrospection Mailbox Auto Remediation in Action ACME.com AMP Threat Grid Introduction to Office 365 Mailbox Auto Remediation Overview of Operation 2 Files Reputation? A file can turn malicious anytime, even after it has reached a user s mailbox. Cisco Advanced Malware Protection (AMP) can identify this development as new information emerges and will push retrospective alerts to an on-premises appliance or Cisco Cloud Security (CES) cluster. With AsyncOS, you get more than just alerting. If your organization is using Office 365 to manage mailboxes, you can configure CES to perform auto-remediation actions on the messages in a user s mailbox when the threat verdict changes. This process is briefly illustrated in Figure 1 below. 1 Cisco Cloud Security SMA ESA Cluster DLP, A/V, A/S, Encryption 3 4 Good Reputation A later update: Bad Reputation 5 Remediate Microsoft Office 365 3
4 Figure 2. Remediation Requesting Access to O365 Mailbox Authenticating Access with Azure Microsoft Azure Access Token AMP Threat Grid Step Modify the manifest to reference your RSA certificate Purpose Configures Azure to recognize the public key sent from the CES cluster when it requests Office 365 permissions. Certificate-topublic-key references are put in manifest. The modified manifest is uploaded to Azure. Upload the private key and other certificate parameters to the CES cluster The private key is uploaded to CES. Configures client ID, tenant ID, and thumbprint. ESA Cluster Cisco Cloud Security DLP, A/V, A/S, Encryption Access Token 5 Remediate Message Microsoft Office 365 Verifying Feature Keys in Cloud Security 1. Log in to your Cloud Security account. 2. Click: System Administration > Feature Keys. 3. Verify that File Reputation and File Analysis are active. This document addresses setting up the Azure service as follows: Figure 3. Verifying Feature Keys Step Verify feature keys for Cisco AMP analysis and AMP reputation Create a certificate and a key pair Register your CES cluster as an application on Azure Active Directory Purpose Mailbox Auto Remediation relies on AMP s intelligence for making a remediation. Secures communication between Azure and CES. Specifies the permissions that CES has in Office 365 mailboxes. Permissions carried in token (Figure 2). Manifest is downloaded. 4
5 Building a Public and Private Certificate and Key Pair 1. Download the Certificate and Key generating tool. We are using a tool called XCA Note: If you already have an x509 certificate and private key pair, then skip to the section. Register Your CES cluster as an Application in Azure in this guide. 2. Create a certificate and private key pair. 3. As shown in Figure 4, fill out the Distinguished name fields. 4. Click the Extensions tab. 5. In the section called X509v3 Basic Constraints, specify the certificate type as Certification Authority. 6. Also on the Extensions tab (not shown), specify the time range for which the certificate is valid. 7. Select Local time for the time zone that the Cisco CES cluster is hosted in. 8. Click: Apply. 9. Click the Key usage tab. 10. As shown in Figure 5, on the Key usage tab, choose the following three options: Digital Signature Key Encipherment Protection 11. Click: OK. Your certificate and private key pair will be created. Figure 5. Choosing Key Usage Options Figure 4. Filling Out the Distinguished Name Fields 12. Click the Certificate tab and highlight the certificate name (Figure 6). 13. Click: Export. Download the certificate to a directory that is convenient to access with Microsoft PowerShell. Note: Avoid long directory paths to make PowerShell use easier. 14. Click the Private Keys tab, highlight the private key name, and click: Export. 15. Download the private key to the same directory. 5
6 Cisco Security How to Guide Figure 6. Downloading the Certificate and Private Key Register Your CES Cluster as an Application in Azure 1. Access the Azure user interface: 2. Click: More Services > App Registrations (Figure 8). Figure 8. Accessing the Registration Form 16. Using WordPad, verify that the structure of the certificate and private key pair as shown in Figure 7. Figure 7. Verifying the Certificate and Private Key Pair Structure 3. Click: +Add (Figure 9). 4. Specify the App Name. 5. For application type: Web app/api. 6. Sign-on URL in the form: Note: This is the URL where users can sign in and use your appliance. 6
7 Figure 9. Adding the Application Figure 11. Selecting Permissions 7. Click: Create. 8. Under API Access, click: Required permissions (Figure 10). 9. In the API listing, select Office 365 Exchange Online. 10. At the bottom of the page click: Select. Figure 12. Delegating Permissions Figure 10. Selecting the API 11. As shown in Figure 11, for Application Permissions select: Use Exchange Web Services with full access to Send Mail as any user Read mail in all mailboxes Read and write mail in all mailboxes 12. As shown in Figure 12, for Delegated Permissions select: Send mail as a user Read and write user mail Read user mail Access mailboxes as the signed-in user via Exchange Web Services 7
8 13. After completing the creation of the API with its Delegated Permissions return to the top of the API panel and select Grant Permissions. Acknowledge the permissions popup, to grant the permissions. Figure 13. Downloading the Manifest 14. Click: Select. 15. Click: Done. 16. Download the Manifest (Figure 13). a. In the tool bar beneath the app name, click: Manifest. b. In the Edit Manifest menu click: Download. c. Save the manifest to the directory containing your certificate. Modify the Manifest to Reference the RSA Certificate Note: Additional references to these steps are in Chapter 21 of the User Guide, Automatically Remediating Messages in Office 365 Mailboxes ( ESA_10-0_User_Guide.pdf). 1. Secure the communication between the Office 365 services and the CES cluster by updating the application manifest with the key credentials from the public key certificate. As shown in line 12 of Figure 14, the parameter keycredentials must be updated to include the JSON shown below: JSON (referenced from Chapter 21 of the User Guide) 12 keycredentials : [ { customkeyidentifier : $base64thumbprint _from_step_2, keyid : $keyid_from_step2, type : AsymmetricX509Cert, usage : Verify, value : $base64value_from_step2 } ], Do this by opening the manifest in WordPad and copying the JSON as described above. Figure 15. Updating the Key Credentials Figure 14. Downloading the Manifest 8
9 2. Derive keycredentials from your RSA certificate by using PowerShell. When they are derived, retrieve them by using PowerShell commands. a. Log in to PowerShell and change to the directory that contains your certificate and private key pair. 3. Derive keycredentials by running the following commands: $cer = New-Object System.Security.Cryptography. X509Certificates.X509Certificate2 $cer.import( C:\Users\kbfloyd\Cert_Demo\bce-acme.crt ) $bin = $cer.getrawcertdata() $base64value = [System.Convert]::ToBase64String($bin) $bin = $cer.getcerthash() $base64thumbprint = [System. Convert]::ToBase64String($bin) $keyid = [System.Guid]::NewGuid().ToString() Note that the parameter for $cer.import points to the directory in our example. (See Figure 15.) Figure 16. $cer.import Figure 17. Retrieving the Key Credentials 4. Copy the key credentials into your manifest. Note: Remove any automatic carriage returns that may be included when pasting the $base64 value. 5. Upload the manifest to your Azure account (Figure 17). If you get an error on upload, check for carriage returns as described in the previous step. Figure 18. Uploading the Manifest b) Retrieve the key credentials by running the following in PowerShell (Figure 16): $base64thumbprint $keyid $base64value Note: Copy the $base64thumbprint value to WordPad for later reference. 9
10 Upload Private Key and Other Certificate Parameters to the CES Cluster 1. Retrieve the Client ID from your account. This value is stored as the Application ID in the Azure Active Directory. Click: App Registrations > App_Name > Settings Copy the Client ID as shown in Figure 18. In our example Client ID = 1c5f70b9-a305-48a8-98aa-ede69edcb2e6 Figure 19. Retrieving the Client ID Figure 20. Retrieving the Tenant ID 3. Gather these three values together to be uploaded to your CES cluster: Client ID: 1c5f70b9-a305-48a8-98aa-ede69edcb2e6 Tenant ID: 688a9cf0-b d-168fc921d268 Thumbprint: 1kRRZsGNn8NlGEZhX11zrHphcE7= 4. Log in to your cluster. Click: System Administration > Mailbox Settings > Edit Settings. Enter the Client ID, Tenant ID, and Thumbprint (Figure 20). 2. Retrieve the Tenant ID. Click: App Registrations > Endpoints. Under Federation Metadata Document, any of the URLs can be copied. (See Figure 19.) The number string needs to be copied from the full URL string. In our example: 5. Upload your Certificate Private Key. 6. Click: Submit and Commit Changes. 7. You should be prompted with: Certificate Private Key Successfully Uploaded fc921d268/federationmetadata/ /federationmetadata.xml Tenant ID = 688a9cf0-b d-168fc921d268 10
11 Figure 21. Entering the Client ID, Tenant ID, and Thumbprint Configuring Remedial Actions on Delivered Messages 1. On the ESA or CES portal, log in with the correct credentials and select Mail Policies > Incoming Mail Policies. 2. For the Policy required, edit the Advanced Malware Protection (AMP) section as shown in Figure 22 Figure 23. Incoming Mail Policies Figure 22. Verifying Auto Remediation Functionality 3. Click the link in the Advanced Malware Protection column of the mail policy to modify. 4. Scroll to the bottom of the configuration options and select Enable Mailbox Auto Remediation. 5. As shown in Figure 23, choose the Action to be taken on message(s) in user s mailbox : Forward to Delete Forward to and Delete (Recommended) Figure 24. Configuring Remedial Actions 8. Office 365 Mailbox Auto Remediation should be functional at this time. Verify this by: Clicking: Check Connection Enter a valid Office 365 mailbox address Click: Test Connection Your results should be the same as in Figure
12 Monitoring Mailbox Remediation Results 1. You can view the details of the mailbox remediation results using the Mailbox Auto Remediation report page. a. Log in to your CES Security Management Appliance b. Click: > Reporting > Mailbox Auto Remediation as shown in Figure 24. From here you can view details such as: A list of recipients for whom the mailbox remediation was successful or unsuccessful Remedial actions taken on messages The filenames associated with a SHA-256 hash Figure 25. Viewing the Results Troubleshooting Mailbox Remediation Problem While trying to check the connection between your appliance and Office 365 services on the Mailbox Settings page (System Administration > Mailbox Settings), you receive an error message: Connection Unsuccessful. Solution Depending on the response from the server, do one of the following: Error Message The SMTP address has no mailbox associated with it. Reason and Solution You have entered an address that is not part of the Office 365 domain. Enter a valid address and check the connection again. Application with identifier <client_id> was not found in the directory <tenant_id>. No service namespace named <tenant_id> was found in the data store. Error validating credentials. Credential validation failed. You have entered an invalid Client ID. Modify the Client ID on the Mailbox Settings page and check the connection again. You have entered an invalid Tenant ID. Modify the Tenant ID on the Mailbox Settings page and check the connection again. You have entered an invalid certificate thumbprint. Modify the certificate thumbprint on the Mailbox Settings page and check the connection again. 12
13 Error Message Error validating credentials. Client assertion contains an invalid signature. Reason and Solution You have entered an incorrect certificate thumbprint or you have uploaded an invalid or incorrect certificate private key. Verify that: You have entered the correct thumbprint. You have uploaded the correct certificate private key. The certificate private key is not expired. The time zone of your appliance matches the time zone in the certificate private key. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) C /17
Automatically Remediating Messages in Office 365 Mailboxes
Automatically Remediating Messages in Office 365 Mailboxes This chapter contains the following sections: Performing Remedial Actions on Messages Delivered to End Users When the Threat Verdict Changes to
More informationAzure AD Configuration Script for Cisco Security
Azure AD Configuration Script for Cisco Email Security Contents Introduction Prerequisites Requirements Components Used Azure AD Configuration Script for Cisco Email Security Related Information Introduction
More informationEnabling AMP on Content Security Products (ESA/WSA) November 2016 Version 2.0. Bill Yazji
Enabling AMP on Content Security Products (ESA/WSA) November 2016 Version 2.0 Bill Yazji byazji@cisco.com C O N T E N T S E C U R I T Y A M P B E S T P R A C T I C E S Overview: The vast majority of threats,
More informationFile Reputation Filtering and File Analysis
This chapter contains the following sections: Overview of, page 1 Configuring File Reputation and Analysis Features, page 5 File Reputation and File Analysis Reporting and Tracking, page 14 Taking Action
More informationBest Practices: Enabling AMP on Content Security Products (ESA/WSA) March 2017 Version 2.3. Bill Yazji
Best Practices: Enabling AMP on Content Security Products (ESA/WSA) March 2017 Version 2.3 Bill Yazji byazji@cisco.com C O N T E N T S E C U R I T Y A M P B E S T P R A C T I C E S Overview: The vast majority
More informationComprehensive Setup Guide for TLS on ESA
Comprehensive Setup Guide for TLS on ESA Contents Introduction Prerequisites Requirements Components Used Background Information Functional Overview and Requirements Bring Your Own Certificate Update a
More informationOffice 365 Buyers Guide: Best Practices for Securing Office 365
Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.
More informationIssued March FLY for Dropbox Installation and Configuration Guide
FLY for Dropbox Installation and Configuration Guide Issued March 2018 FLY for Dropbox Installation and Configuration Guide 1 Table of Contents About This Guide... 3 Uninstalling FLY for Dropbox... 4 Installing
More informationConfigure WSA to Upload Log Files to CTA System
Configure WSA to Upload Log Files to CTA System Last updated: April 19, 2018 Conventions Introduction Prerequisites Requirements Components Used Configure Configure the Proxy Connect to Active Directory
More informationIntegrate Microsoft Office 365. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: March 5, 2017 Abstract This guide provides instructions to configure Office 365 to generate logs for critical events. Once EventTracker is configured to collect
More informationConfigure WSA to Upload Log Files to CTA System
Configure WSA to Upload Log Files to CTA System Last updated: January 30, 2018 Contents Conventions Introduction Prerequisites Requirements Components Used Configure Configure the Proxy Connect to Active
More informationUsing Centralized Security Reporting
This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the
More informationEnhanced Threat Detection, Investigation, and Response
Enhanced Threat Detection, Investigation, and Response What s new in Cisco Stealthwatch Enterprise Release 6.10.2 Cisco Stealthwatch Enterprise is a comprehensive visibility and security analytics solution
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationCustomer Online Support Demonstration. 1
Customer Online Support Demonstration 1 Introduction SATHYA is committed to simplifying and improving your support experience. As we launch our enhanced online case management capabilities, you will see
More informationMission Guide: Office 365 OneDrive
Mission Guide: Office 365 OneDrive Your Mission: Use F-Response to collect Office365 Onedrive data Using F-Response to connect to Office365 Onedrive and collect its contents Important Note Disclaimer:
More informationEntrust PartnerLink Login Instructions
Entrust PartnerLink Login Instructions Contents Introduction... 4 Purpose 4 Overview 4 Prerequisites 4 Instructions... 5 Entrust is a registered trademark of Entrust, Inc. in the United States and certain
More informationTracking Messages
This chapter contains the following sections: Tracking Service Overview, page 1 Setting Up Centralized Message Tracking, page 2 Checking Message Tracking Data Availability, page 4 Searching for Email Messages,
More informationNimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]
Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document
More informationQualys SAML & Microsoft Active Directory Federation Services Integration
Qualys SAML & Microsoft Active Directory Federation Services Integration Microsoft Active Directory Federation Services (ADFS) is currently supported for authentication. The Qualys ADFS integration must
More informationHow-To Configure Message Routing Between Cisco Cloud Security and Office 365
How-To Configure Message Routing Between Cisco Cloud Email Security and Office 365 Beginning with AsyncOS 10.0 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights
More informationWorkspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810
Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationCloud Access Manager Configuration Guide
Cloud Access Manager 8.1.3 Configuration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationAvanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.
Avanan for G Suite Technical Overview Contents Intro 1 How Avanan Works 2 Email Security for Gmail 3 Data Security for Google Drive 4 Policy Automation 5 Workflows and Notifications 6 Authentication 7
More informationFive9 Plus Adapter for Agent Desktop Toolkit
Cloud Contact Center Software Five9 Plus Adapter for Agent Desktop Toolkit Administrator s Guide September 2017 The Five9 Plus Adapter for Agent Desktop Toolkit integrates the Five9 Cloud Contact Center
More informationSAFARI Montage v6.5.28
Microsoft Office 365 Integration Instructions SAFARI Montage v6.5.28 NOTE: The Microsoft Office 365 integration must be configured by an Administrator. SAFARI Montage now offers a powerful new integration
More informationAzure Archival Installation Guide
Azure Archival Installation Guide Page 1 of 23 Table of Contents 1. Add Dynamics CRM Active Directory into Azure... 3 2. Add Application in Azure Directory... 5 2.1 Create application for application user...
More informationSetting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationSetting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationAdministering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1
Administering Workspace ONE in VMware Identity Manager Services with AirWatch VMware AirWatch 9.1.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationSingle Sign-On for PCF. User's Guide
Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans
More informationComodo SecureBox Management Console Software Version 1.9
6. Comodo SecureBox Management Console Software Version 1.9 Quick Start Guide Guide Version 1.9.041918 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo SecureBox Management Console
More informationLicensing the System
The following topics explain how to license the Firepower Threat Defense device. Smart Licensing for the Firepower System, page 1 Managing Smart Licenses, page 3 Smart Licensing for the Firepower System
More informationIntegration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)
Integration Guide PingFederate SAML Integration Guide (SP-Initiated Workflow) Copyright Information 2018. SecureAuth is a registered trademark of SecureAuth Corporation. SecureAuth s IdP software, appliances,
More informationOctober J. Polycom Cloud Services Portal
October 2018 3725-42461-001J Polycom Cloud Services Portal Copyright 2018, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or
More informationHow-To Configure Message Routing Between Cisco Security in the Cloud and Microsoft Office 365
How-To Configure Message Routing Between Cisco Email Security in the Cloud and Microsoft Office 365 About This Document 3 ACME s Migration to the Cloud 3 Cisco Email Security to Office 365 Configuration
More informationVision deliver a fast, easy to deploy and operate, economical solution that can provide high availability solution for exchange server
Exchange server 2010 Interview Questions High Availability Filed under: Exchange Server 2010 exchange2k10 @ 5:04 pm 1. What are the vision and Goals of Exchange Server 2010 high availability? Vision deliver
More informationColligo Console. Administrator Guide
Colligo Console Administrator Guide Contents About this guide... 6 Audience... 6 Requirements... 6 Colligo Technical Support... 6 Introduction... 7 Colligo Console Overview... 8 Colligo Console Home Page...
More informationWorkspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810
Workspace ONE UEM Integration with RSA PKI VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationUnified Communications Manager Version 10.5 SAML SSO Configuration Example
Unified Communications Manager Version 10.5 SAML SSO Configuration Example Contents Introduction Prerequisites Requirements Network Time Protocol (NTP) Setup Domain Name Server (DNS) Setup Components Used
More informationCisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017
Cisco Security Advanced Malware Protection Guillermo González Security Systems Engineer Octubre 2017 The New Security Model Attack Continuum Before During After Before Discover During Detect After Scope
More informationLibelium Cloud Hive. Technical Guide
Libelium Cloud Hive Technical Guide Index Document version: v7.0-12/2018 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General and information... 4 1.1. Introduction...4 1.1.1. Overview...4 1.2. Data
More informationTECHNICAL GUIDE SSO SAML Azure AD
1 TECHNICAL GUIDE SSO SAML Azure AD At 360Learning, we don t make promises about technical solutions, we make commitments. This technical guide is part of our Technical Documentation. Version 1.0 2 360Learning
More informationSetup Guide for AD FS 3.0 on the Apprenda Platform
Setup Guide for AD FS 3.0 on the Apprenda Platform Last Updated for Apprenda 6.5.2 The Apprenda Platform leverages Active Directory Federation Services (AD FS) to support identity federation. AD FS and
More informationCentralized Policy, Virus, and Outbreak Quarantines
Centralized Policy, Virus, and Outbreak Quarantines This chapter contains the following sections: Overview of Centralized Quarantines, page 1 Centralizing Policy, Virus, and Outbreak Quarantines, page
More informationLicensing the Firepower System
The following topics explain how to license the Firepower System. About Firepower Feature Licenses, page 1 Service Subscriptions for Firepower Features, page 1 Classic Licensing for the Firepower System,
More informationSetting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager
Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) You can find the most up-to-date technical documentation
More informationLicensing the Firepower System
The following topics explain how to license the Firepower System. About Firepower Feature Licenses, page 1 Service Subscriptions for Firepower Features, page 2 Smart Licensing for the Firepower System,
More informationRSA NetWitness Platform
RSA NetWitness Platform Event Source Log Configuration Guide Microsoft Office 365 Last Modified: Thursday, June 7, 2018 Event Source Product Information: Vendor: Microsoft Event Source: Office 365 Versions:
More informationOffice : Enabling and Managing Office 365. Upcoming Dates. Course Description. Course Outline
Office 365 20347: Enabling and Managing Office 365 Learn how to evaluate, plan, deploy and operate Microsoft Office 365 Cloud-Based Services in this 5-day class. Your instructor will focus on real world
More informationIntegrating with Microsoft Intune to Enforce Compliance on Mac Computers Managed by Jamf Pro
Integrating with Microsoft Intune to Enforce Compliance on Mac Computers Managed by Jamf Pro Technical Paper Jamf Pro 10.9.0 or Later 29 January 2019 copyright 2002-2019 Jamf. All rights reserved. Jamf
More informationSetting Up Resources in VMware Identity Manager 3.1 (On Premises) Modified JUL 2018 VMware Identity Manager 3.1
Setting Up Resources in VMware Identity Manager 3.1 (On Premises) Modified JUL 2018 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationUsing Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide
Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure Deployment Guide v1.0 May 2018 Introduction This document describes how to set up Pulse Connect Secure for SP-initiated
More informationSetting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1
Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date
More informationConfiguring Gmail (G Suite) with Cisco Cloud Security
Configuring Gmail (G Suite) with Cisco Cloud Email Security This document covers the steps required to integrate Cisco Cloud Email Security with Google G Suite for inbound and outbound email delivery.
More informationCisco Security Appliances
Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate
More informationBLACKBERRY SPARK COMMUNICATIONS PLATFORM. Getting Started Workbook
1 BLACKBERRY SPARK COMMUNICATIONS PLATFORM Getting Started Workbook 2 2018 BlackBerry. All rights reserved. BlackBerry and related trademarks, names and logos are the property of BlackBerry
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationConfiguring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: May 2015
Configuring Claims-based Authentication for Microsoft Dynamics CRM Server Last updated: May 2015 This document is provided "as-is". Information and views expressed in this document, including URL and other
More informationCisco Systems, Inc IronPort
IronPort RSA Secured Implementation Guide for RSA DLP Network Partner Information Last Modified: December 5 th, 2012 Product Information Partner Name Cisco Systems, Inc Web Site www.cisco.com Product Name
More informationIntegration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate
SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationConfiguring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: June 2014
Configuring Claims-based Authentication for Microsoft Dynamics CRM Server Last updated: June 2014 This document is provided "as-is". Information and views expressed in this document, including URL and
More informationUsing Trustwave SEG Cloud with Cloud-Based Solutions
.trust Using Trustwave SEG Cloud with Cloud-Based Email Solutions Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Cloud-Based Email Solutions 2 2 Networking and DNS
More informationSymantec & Blue Coat Technical Update Webinar 29. Juni 2017
Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication
More informationCisco Security Enterprise License Agreement
Cisco Security Enterprise License Agreement Deploy Software and Technology more easily The Cisco Security Enterprise Licensing Agreement (ELA) gives you a simpler way to manage your licenses. And it saves
More informationCentrify for Dropbox Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of
More informationFive9 Plus Adapter for Microsoft Dynamics CRM
Cloud Contact Center Software Five9 Plus Adapter for Microsoft Dynamics CRM Administrator s Guide September 2017 This guide describes how to install and configure the Five9 Plus Adapter for Microsoft Dynamics
More informationVMware AirWatch Integration with RSA PKI Guide
VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationWorkspace ONE UEM Notification Service. VMware Workspace ONE UEM 1811
Workspace ONE UEM Email Notification Service VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationDeploying Lookout with IBM MaaS360
Lookout Mobile Endpoint Security Deploying Lookout with IBM MaaS360 February 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout,
More informationInstallation Guide Revision B. McAfee Cloud Workload Security 5.0.0
Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationUSM Anywhere AlienApps Guide
USM Anywhere AlienApps Guide Updated April 23, 2018 Copyright 2018 AlienVault. All rights reserved. AlienVault, AlienApp, AlienApps, AlienVault OSSIM, Open Threat Exchange, OTX, Unified Security Management,
More informationBest Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate
White Paper PlateSpin Transformation Manager PlateSpin Migrate Best Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate Updated for PlateSpin Transformation Manager 1.1 and PlateSpin
More informationCisco Threat Intelligence Director (TID)
The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Requirements for Threat Intelligence Director, page 4 How To Set Up, page 6 Analyze TID Incident
More informationRelease Notes for Cisco IronPort AsyncOS 7.7 for Security Management
Release Notes for Cisco IronPort AsyncOS 7.7 for Security Management Published: February 15, 2012 Revised: April 9, 2012 Contents This document contains information for Cisco IronPort AsyncOS 7.7 for Security
More informationConfiguring Alfresco Cloud with ADFS 3.0
Configuring Alfresco Cloud with ADFS 3.0 Prerequisites: You have a working domain on your Windows Server 2012 and successfully installed ADFS. For these instructions, I created: alfresco.me as a domain
More informationAvePoint Cloud Governance. Release Notes
AvePoint Cloud Governance Release Notes January 2018 New Features and Improvements AvePoint Cloud Governance now includes a My Groups report, which shows users a list of Office 365 groups they own or are
More informationCisco Security: Advanced Threat Defense for Microsoft Office 365
Cisco Email Security: Advanced Threat Defense for Microsoft Office 365 Microsoft Office 365 has become the standard productivity platform in organizations large and small around the world. It is a cost-effective
More informationHands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1
Hands-On Lab Windows Azure Virtual Machine Roles Lab version: 2.0.0 Last updated: 12/14/2010 Page 1 CONTENTS OVERVIEW... 3 EXERCISE 1: CREATING AND DEPLOYING A VIRTUAL MACHINE ROLE IN WINDOWS AZURE...
More informationRED IM Integration with Bomgar Privileged Access
RED IM Integration with Bomgar Privileged Access 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the
More informationHave documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer Workspace ONE UEM v9.4 Have documentation feedback?
More informationNotification Template Limitations. Bridge Limitations
Oracle Cloud Known Issues for Oracle Identity Cloud Service Release 18.1.2 E55915-17 February 2018 Notification Template Limitations Note the following limitations with Oracle Identity Cloud Service notification
More informationTracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections:
This chapter contains the following sections: Message Tracking Overview, page 1 Enabling Message Tracking, page 1 Searching for Messages, page 2 Working with Message Tracking Search Results, page 4 Checking
More informationVMware Identity Manager Integration with Office 365
VMware Identity Manager Integration with Office 365 VMware Identity Manager O C T O B E R 2 0 1 7 V 7 Table of Contents Overview... 3 Configuring Single Sign-on to Office 365... 4 Authentication Profiles
More informationRelease Notes for Cisco IronPort AsyncOS for Security Management AR
Release Notes for Cisco IronPort AsyncOS 7.7.0 for Security Management AR Published: June 27, 2013 This release ships on certain hardware. Contents What s New in This Release, page 2 Upgrade Paths, page
More informationThis section includes troubleshooting topics about single sign-on (SSO) issues.
This section includes troubleshooting topics about single sign-on (SSO) issues. SSO Fails After Completing Disaster Recovery Operation, page 1 SSO Protocol Error, page 1 SSO Redirection Has Failed, page
More informationGSX 365 Usage Reports & Security Audit
GSX 365 Usage Reports & Security Audit With you, everywhere, for more than 20 years Founded in 1996, Headquartered in Switzerland London Geneva Offices in USA, UK, France, Switzerland, Singapore and Bangalore
More informationFedLine Web Certificate Retrieval Procedures
Version 2.0 Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures... 3 Installing the Federal Reserve Banks Certificate Authority
More informationSage Construction Central Setup Guide (Version 18.1)
Sage 300 Construction and Real Estate Sage Construction Central Setup Guide (Version 18.1) Certified course curriculum Important Notice The course materials provided are the product of Sage. Please do
More informationLicensing the Firepower System
The following topics explain how to license the Firepower System. About Firepower Feature Licenses, on page 1 Service Subscriptions for Firepower Features, on page 2 Smart Licensing for the Firepower System,
More informationNotifyMDM Device Application User Guide Installation and Configuration for Android
NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions
More informationIntegrating with Microsoft Intune to Enforce Compliance on Macs Managed by Jamf Pro. Technical Paper Jamf Pro or Later 14 December 2017
Integrating with Microsoft Intune to Enforce Compliance on Macs Managed by Jamf Pro Technical Paper Jamf Pro 10.1.0 or Later 14 December 2017 copyright 2002-2017 Jamf. All rights reserved. Jamf has made
More informationIntegrating YuJa Active Learning into ADFS via SAML
Integrating YuJa Active Learning into ADFS via SAML 1. Overview This document is intended to guide users on how to setup a secure connection between YuJa (the Service Provider, or SP) and ADFS (the Identity
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for RadiantOne Cloud Federation Service (CFS) All information herein is either public information
More informationManaging Microsoft 365 Identity and Access
Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential
More informationSecurity, Internet Access, and Communication Ports
Security, Internet Access, and Communication Ports The following topics provide information on system security, internet access, and communication ports: About Security, Internet Access, and Communication
More informationCourse 10997A: Office 365 Administration and Troubleshooting
Skip to main content Course 10997A: Office 365 Administration and Troubleshooting - Course details Course Outline Module 1: Office 365 services overview This module describes Office 365 services, licensing,
More informationMicrosoft Official Curriculum Enabling and Managing Office 365 (5 Days - English) Programme détaillé
Module 1: Planning and provisioning Microsoft Office 365 This module reviews the features of Office 365 and identifies recent improvements to the service. Also it describes how to configure an Office 365
More informationCisco s Appliance-based Content Security: IronPort and Web Security
Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.
More information