How-To Configure Mailbox Auto Remediation for Office 365 on Cisco Security

Size: px
Start display at page:

Download "How-To Configure Mailbox Auto Remediation for Office 365 on Cisco Security"

Transcription

1 How-To Configure Mailbox Auto Remediation for Office 365 on Cisco Security Beginning with AsyncOS Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved.

2 Contents About This Document 3 Introduction to Office 365 Mailbox Auto Remediation 3 Verifying Feature Keys in Cloud Security 4 Building a Public and Private Certificate and Key Pair 5 Register Your CES Cluster as an Application in Azure 6 Modify the Manifest to Reference the RSA Certificate 8 Upload Private Key and Other Certificate Parameters to the CES Cluster 10 Configuring Remedial Actions on Delivered Messages 11 Troubleshooting Mailbox Remediation 12 2

3 About This Document Microsoft Exchange has become the standard system used by midsize to large-scale organizations globally. With the rise of cloud applications, Microsoft has introduced Office 365. Cisco Security has been protecting Exchange from spam, phishing attacks and viruses for over a decade and recently has enhanced malware protection with Advanced Malware Protection (AMP). While the security portfolio encompasses other protections, this guide explains how Microsoft Office 365 customers can protect their mailboxes from malicious zeroday attacks such as ransomware. It steps the reader through the details of setting up Office 365 Mailbox Auto Remediation integrated with AMP. This document is for Cisco engineers and customers who will deploy Cisco Cloud Security using AsyncOS 10.0 or higher. This document covers: Overview of Office 365 Mailbox Auto Remediation Creating a certificate Registering Cisco Cloud Security (CES) as an Azure app Troubleshooting Note: The graphics present the most recent version of the Azure Active Directory user interface. As that changes over time, customers will need to consult Microsoft tech articles to supplement the tasks described here. However, other details need to be considered that address how Cisco CES gains access to a user s Office 365 mailbox to remediate the message. Cisco CES uses Azure Active Directory to gain access to the Office 365 mailboxes. After CES receives the retrospective update about the malicious file (Figure 1), it requests an access token from Azure. If communication is secured between CES and Azure, and CES is granted permission to access the Office 365 application, then an access token is provided (Figure 2). At that point the remediation action is allowed to proceed as indicated in step 5 of Figures 1 and 2. This guide is to cover how to integrated ESA/CES with O365 for auto remediation only. The reader of this guide is required to know how to setup AMP on Security. For more details, see the chalk-talk Cisco Security Malware Auto-Remediation for Office 365 or reference the How-to Guide Protect Against File-Based Attacks. Additionally, this link will direct you to the Security Chalk Talk Cisco Security Malware Auto-Remediation for Office 365. Figure 1. Retrospection Mailbox Auto Remediation in Action ACME.com AMP Threat Grid Introduction to Office 365 Mailbox Auto Remediation Overview of Operation 2 Files Reputation? A file can turn malicious anytime, even after it has reached a user s mailbox. Cisco Advanced Malware Protection (AMP) can identify this development as new information emerges and will push retrospective alerts to an on-premises appliance or Cisco Cloud Security (CES) cluster. With AsyncOS, you get more than just alerting. If your organization is using Office 365 to manage mailboxes, you can configure CES to perform auto-remediation actions on the messages in a user s mailbox when the threat verdict changes. This process is briefly illustrated in Figure 1 below. 1 Cisco Cloud Security SMA ESA Cluster DLP, A/V, A/S, Encryption 3 4 Good Reputation A later update: Bad Reputation 5 Remediate Microsoft Office 365 3

4 Figure 2. Remediation Requesting Access to O365 Mailbox Authenticating Access with Azure Microsoft Azure Access Token AMP Threat Grid Step Modify the manifest to reference your RSA certificate Purpose Configures Azure to recognize the public key sent from the CES cluster when it requests Office 365 permissions. Certificate-topublic-key references are put in manifest. The modified manifest is uploaded to Azure. Upload the private key and other certificate parameters to the CES cluster The private key is uploaded to CES. Configures client ID, tenant ID, and thumbprint. ESA Cluster Cisco Cloud Security DLP, A/V, A/S, Encryption Access Token 5 Remediate Message Microsoft Office 365 Verifying Feature Keys in Cloud Security 1. Log in to your Cloud Security account. 2. Click: System Administration > Feature Keys. 3. Verify that File Reputation and File Analysis are active. This document addresses setting up the Azure service as follows: Figure 3. Verifying Feature Keys Step Verify feature keys for Cisco AMP analysis and AMP reputation Create a certificate and a key pair Register your CES cluster as an application on Azure Active Directory Purpose Mailbox Auto Remediation relies on AMP s intelligence for making a remediation. Secures communication between Azure and CES. Specifies the permissions that CES has in Office 365 mailboxes. Permissions carried in token (Figure 2). Manifest is downloaded. 4

5 Building a Public and Private Certificate and Key Pair 1. Download the Certificate and Key generating tool. We are using a tool called XCA Note: If you already have an x509 certificate and private key pair, then skip to the section. Register Your CES cluster as an Application in Azure in this guide. 2. Create a certificate and private key pair. 3. As shown in Figure 4, fill out the Distinguished name fields. 4. Click the Extensions tab. 5. In the section called X509v3 Basic Constraints, specify the certificate type as Certification Authority. 6. Also on the Extensions tab (not shown), specify the time range for which the certificate is valid. 7. Select Local time for the time zone that the Cisco CES cluster is hosted in. 8. Click: Apply. 9. Click the Key usage tab. 10. As shown in Figure 5, on the Key usage tab, choose the following three options: Digital Signature Key Encipherment Protection 11. Click: OK. Your certificate and private key pair will be created. Figure 5. Choosing Key Usage Options Figure 4. Filling Out the Distinguished Name Fields 12. Click the Certificate tab and highlight the certificate name (Figure 6). 13. Click: Export. Download the certificate to a directory that is convenient to access with Microsoft PowerShell. Note: Avoid long directory paths to make PowerShell use easier. 14. Click the Private Keys tab, highlight the private key name, and click: Export. 15. Download the private key to the same directory. 5

6 Cisco Security How to Guide Figure 6. Downloading the Certificate and Private Key Register Your CES Cluster as an Application in Azure 1. Access the Azure user interface: 2. Click: More Services > App Registrations (Figure 8). Figure 8. Accessing the Registration Form 16. Using WordPad, verify that the structure of the certificate and private key pair as shown in Figure 7. Figure 7. Verifying the Certificate and Private Key Pair Structure 3. Click: +Add (Figure 9). 4. Specify the App Name. 5. For application type: Web app/api. 6. Sign-on URL in the form: Note: This is the URL where users can sign in and use your appliance. 6

7 Figure 9. Adding the Application Figure 11. Selecting Permissions 7. Click: Create. 8. Under API Access, click: Required permissions (Figure 10). 9. In the API listing, select Office 365 Exchange Online. 10. At the bottom of the page click: Select. Figure 12. Delegating Permissions Figure 10. Selecting the API 11. As shown in Figure 11, for Application Permissions select: Use Exchange Web Services with full access to Send Mail as any user Read mail in all mailboxes Read and write mail in all mailboxes 12. As shown in Figure 12, for Delegated Permissions select: Send mail as a user Read and write user mail Read user mail Access mailboxes as the signed-in user via Exchange Web Services 7

8 13. After completing the creation of the API with its Delegated Permissions return to the top of the API panel and select Grant Permissions. Acknowledge the permissions popup, to grant the permissions. Figure 13. Downloading the Manifest 14. Click: Select. 15. Click: Done. 16. Download the Manifest (Figure 13). a. In the tool bar beneath the app name, click: Manifest. b. In the Edit Manifest menu click: Download. c. Save the manifest to the directory containing your certificate. Modify the Manifest to Reference the RSA Certificate Note: Additional references to these steps are in Chapter 21 of the User Guide, Automatically Remediating Messages in Office 365 Mailboxes ( ESA_10-0_User_Guide.pdf). 1. Secure the communication between the Office 365 services and the CES cluster by updating the application manifest with the key credentials from the public key certificate. As shown in line 12 of Figure 14, the parameter keycredentials must be updated to include the JSON shown below: JSON (referenced from Chapter 21 of the User Guide) 12 keycredentials : [ { customkeyidentifier : $base64thumbprint _from_step_2, keyid : $keyid_from_step2, type : AsymmetricX509Cert, usage : Verify, value : $base64value_from_step2 } ], Do this by opening the manifest in WordPad and copying the JSON as described above. Figure 15. Updating the Key Credentials Figure 14. Downloading the Manifest 8

9 2. Derive keycredentials from your RSA certificate by using PowerShell. When they are derived, retrieve them by using PowerShell commands. a. Log in to PowerShell and change to the directory that contains your certificate and private key pair. 3. Derive keycredentials by running the following commands: $cer = New-Object System.Security.Cryptography. X509Certificates.X509Certificate2 $cer.import( C:\Users\kbfloyd\Cert_Demo\bce-acme.crt ) $bin = $cer.getrawcertdata() $base64value = [System.Convert]::ToBase64String($bin) $bin = $cer.getcerthash() $base64thumbprint = [System. Convert]::ToBase64String($bin) $keyid = [System.Guid]::NewGuid().ToString() Note that the parameter for $cer.import points to the directory in our example. (See Figure 15.) Figure 16. $cer.import Figure 17. Retrieving the Key Credentials 4. Copy the key credentials into your manifest. Note: Remove any automatic carriage returns that may be included when pasting the $base64 value. 5. Upload the manifest to your Azure account (Figure 17). If you get an error on upload, check for carriage returns as described in the previous step. Figure 18. Uploading the Manifest b) Retrieve the key credentials by running the following in PowerShell (Figure 16): $base64thumbprint $keyid $base64value Note: Copy the $base64thumbprint value to WordPad for later reference. 9

10 Upload Private Key and Other Certificate Parameters to the CES Cluster 1. Retrieve the Client ID from your account. This value is stored as the Application ID in the Azure Active Directory. Click: App Registrations > App_Name > Settings Copy the Client ID as shown in Figure 18. In our example Client ID = 1c5f70b9-a305-48a8-98aa-ede69edcb2e6 Figure 19. Retrieving the Client ID Figure 20. Retrieving the Tenant ID 3. Gather these three values together to be uploaded to your CES cluster: Client ID: 1c5f70b9-a305-48a8-98aa-ede69edcb2e6 Tenant ID: 688a9cf0-b d-168fc921d268 Thumbprint: 1kRRZsGNn8NlGEZhX11zrHphcE7= 4. Log in to your cluster. Click: System Administration > Mailbox Settings > Edit Settings. Enter the Client ID, Tenant ID, and Thumbprint (Figure 20). 2. Retrieve the Tenant ID. Click: App Registrations > Endpoints. Under Federation Metadata Document, any of the URLs can be copied. (See Figure 19.) The number string needs to be copied from the full URL string. In our example: 5. Upload your Certificate Private Key. 6. Click: Submit and Commit Changes. 7. You should be prompted with: Certificate Private Key Successfully Uploaded fc921d268/federationmetadata/ /federationmetadata.xml Tenant ID = 688a9cf0-b d-168fc921d268 10

11 Figure 21. Entering the Client ID, Tenant ID, and Thumbprint Configuring Remedial Actions on Delivered Messages 1. On the ESA or CES portal, log in with the correct credentials and select Mail Policies > Incoming Mail Policies. 2. For the Policy required, edit the Advanced Malware Protection (AMP) section as shown in Figure 22 Figure 23. Incoming Mail Policies Figure 22. Verifying Auto Remediation Functionality 3. Click the link in the Advanced Malware Protection column of the mail policy to modify. 4. Scroll to the bottom of the configuration options and select Enable Mailbox Auto Remediation. 5. As shown in Figure 23, choose the Action to be taken on message(s) in user s mailbox : Forward to Delete Forward to and Delete (Recommended) Figure 24. Configuring Remedial Actions 8. Office 365 Mailbox Auto Remediation should be functional at this time. Verify this by: Clicking: Check Connection Enter a valid Office 365 mailbox address Click: Test Connection Your results should be the same as in Figure

12 Monitoring Mailbox Remediation Results 1. You can view the details of the mailbox remediation results using the Mailbox Auto Remediation report page. a. Log in to your CES Security Management Appliance b. Click: > Reporting > Mailbox Auto Remediation as shown in Figure 24. From here you can view details such as: A list of recipients for whom the mailbox remediation was successful or unsuccessful Remedial actions taken on messages The filenames associated with a SHA-256 hash Figure 25. Viewing the Results Troubleshooting Mailbox Remediation Problem While trying to check the connection between your appliance and Office 365 services on the Mailbox Settings page (System Administration > Mailbox Settings), you receive an error message: Connection Unsuccessful. Solution Depending on the response from the server, do one of the following: Error Message The SMTP address has no mailbox associated with it. Reason and Solution You have entered an address that is not part of the Office 365 domain. Enter a valid address and check the connection again. Application with identifier <client_id> was not found in the directory <tenant_id>. No service namespace named <tenant_id> was found in the data store. Error validating credentials. Credential validation failed. You have entered an invalid Client ID. Modify the Client ID on the Mailbox Settings page and check the connection again. You have entered an invalid Tenant ID. Modify the Tenant ID on the Mailbox Settings page and check the connection again. You have entered an invalid certificate thumbprint. Modify the certificate thumbprint on the Mailbox Settings page and check the connection again. 12

13 Error Message Error validating credentials. Client assertion contains an invalid signature. Reason and Solution You have entered an incorrect certificate thumbprint or you have uploaded an invalid or incorrect certificate private key. Verify that: You have entered the correct thumbprint. You have uploaded the correct certificate private key. The certificate private key is not expired. The time zone of your appliance matches the time zone in the certificate private key. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) C /17

Automatically Remediating Messages in Office 365 Mailboxes

Automatically Remediating Messages in Office 365 Mailboxes Automatically Remediating Messages in Office 365 Mailboxes This chapter contains the following sections: Performing Remedial Actions on Messages Delivered to End Users When the Threat Verdict Changes to

More information

Azure AD Configuration Script for Cisco Security

Azure AD Configuration Script for Cisco  Security Azure AD Configuration Script for Cisco Email Security Contents Introduction Prerequisites Requirements Components Used Azure AD Configuration Script for Cisco Email Security Related Information Introduction

More information

Enabling AMP on Content Security Products (ESA/WSA) November 2016 Version 2.0. Bill Yazji

Enabling AMP on Content Security Products (ESA/WSA) November 2016 Version 2.0. Bill Yazji Enabling AMP on Content Security Products (ESA/WSA) November 2016 Version 2.0 Bill Yazji byazji@cisco.com C O N T E N T S E C U R I T Y A M P B E S T P R A C T I C E S Overview: The vast majority of threats,

More information

File Reputation Filtering and File Analysis

File Reputation Filtering and File Analysis This chapter contains the following sections: Overview of, page 1 Configuring File Reputation and Analysis Features, page 5 File Reputation and File Analysis Reporting and Tracking, page 14 Taking Action

More information

Best Practices: Enabling AMP on Content Security Products (ESA/WSA) March 2017 Version 2.3. Bill Yazji

Best Practices: Enabling AMP on Content Security Products (ESA/WSA) March 2017 Version 2.3. Bill Yazji Best Practices: Enabling AMP on Content Security Products (ESA/WSA) March 2017 Version 2.3 Bill Yazji byazji@cisco.com C O N T E N T S E C U R I T Y A M P B E S T P R A C T I C E S Overview: The vast majority

More information

Comprehensive Setup Guide for TLS on ESA

Comprehensive Setup Guide for TLS on ESA Comprehensive Setup Guide for TLS on ESA Contents Introduction Prerequisites Requirements Components Used Background Information Functional Overview and Requirements Bring Your Own Certificate Update a

More information

Office 365 Buyers Guide: Best Practices for Securing Office 365

Office 365 Buyers Guide: Best Practices for Securing Office 365 Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.

More information

Issued March FLY for Dropbox Installation and Configuration Guide

Issued March FLY for Dropbox Installation and Configuration Guide FLY for Dropbox Installation and Configuration Guide Issued March 2018 FLY for Dropbox Installation and Configuration Guide 1 Table of Contents About This Guide... 3 Uninstalling FLY for Dropbox... 4 Installing

More information

Configure WSA to Upload Log Files to CTA System

Configure WSA to Upload Log Files to CTA System Configure WSA to Upload Log Files to CTA System Last updated: April 19, 2018 Conventions Introduction Prerequisites Requirements Components Used Configure Configure the Proxy Connect to Active Directory

More information

Integrate Microsoft Office 365. EventTracker v8.x and above

Integrate Microsoft Office 365. EventTracker v8.x and above EventTracker v8.x and above Publication Date: March 5, 2017 Abstract This guide provides instructions to configure Office 365 to generate logs for critical events. Once EventTracker is configured to collect

More information

Configure WSA to Upload Log Files to CTA System

Configure WSA to Upload Log Files to CTA System Configure WSA to Upload Log Files to CTA System Last updated: January 30, 2018 Contents Conventions Introduction Prerequisites Requirements Components Used Configure Configure the Proxy Connect to Active

More information

Using Centralized Security Reporting

Using Centralized  Security Reporting This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the

More information

Enhanced Threat Detection, Investigation, and Response

Enhanced Threat Detection, Investigation, and Response Enhanced Threat Detection, Investigation, and Response What s new in Cisco Stealthwatch Enterprise Release 6.10.2 Cisco Stealthwatch Enterprise is a comprehensive visibility and security analytics solution

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Customer Online Support Demonstration. 1

Customer Online Support Demonstration.  1 Customer Online Support Demonstration 1 Introduction SATHYA is committed to simplifying and improving your support experience. As we launch our enhanced online case management capabilities, you will see

More information

Mission Guide: Office 365 OneDrive

Mission Guide: Office 365 OneDrive Mission Guide: Office 365 OneDrive Your Mission: Use F-Response to collect Office365 Onedrive data Using F-Response to connect to Office365 Onedrive and collect its contents Important Note Disclaimer:

More information

Entrust PartnerLink Login Instructions

Entrust PartnerLink Login Instructions Entrust PartnerLink Login Instructions Contents Introduction... 4 Purpose 4 Overview 4 Prerequisites 4 Instructions... 5 Entrust is a registered trademark of Entrust, Inc. in the United States and certain

More information

Tracking Messages

Tracking  Messages This chapter contains the following sections: Tracking Service Overview, page 1 Setting Up Centralized Message Tracking, page 2 Checking Message Tracking Data Availability, page 4 Searching for Email Messages,

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

Qualys SAML & Microsoft Active Directory Federation Services Integration

Qualys SAML & Microsoft Active Directory Federation Services Integration Qualys SAML & Microsoft Active Directory Federation Services Integration Microsoft Active Directory Federation Services (ADFS) is currently supported for authentication. The Qualys ADFS integration must

More information

How-To Configure Message Routing Between Cisco Cloud Security and Office 365

How-To Configure Message Routing Between Cisco Cloud  Security and Office 365 How-To Configure Message Routing Between Cisco Cloud Email Security and Office 365 Beginning with AsyncOS 10.0 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Cloud Access Manager Configuration Guide

Cloud Access Manager Configuration Guide Cloud Access Manager 8.1.3 Configuration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved. Avanan for G Suite Technical Overview Contents Intro 1 How Avanan Works 2 Email Security for Gmail 3 Data Security for Google Drive 4 Policy Automation 5 Workflows and Notifications 6 Authentication 7

More information

Five9 Plus Adapter for Agent Desktop Toolkit

Five9 Plus Adapter for Agent Desktop Toolkit Cloud Contact Center Software Five9 Plus Adapter for Agent Desktop Toolkit Administrator s Guide September 2017 The Five9 Plus Adapter for Agent Desktop Toolkit integrates the Five9 Cloud Contact Center

More information

SAFARI Montage v6.5.28

SAFARI Montage v6.5.28 Microsoft Office 365 Integration Instructions SAFARI Montage v6.5.28 NOTE: The Microsoft Office 365 integration must be configured by an Administrator. SAFARI Montage now offers a powerful new integration

More information

Azure Archival Installation Guide

Azure Archival Installation Guide Azure Archival Installation Guide Page 1 of 23 Table of Contents 1. Add Dynamics CRM Active Directory into Azure... 3 2. Add Application in Azure Directory... 5 2.1 Create application for application user...

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8 Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1 Administering Workspace ONE in VMware Identity Manager Services with AirWatch VMware AirWatch 9.1.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Single Sign-On for PCF. User's Guide

Single Sign-On for PCF. User's Guide Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans

More information

Comodo SecureBox Management Console Software Version 1.9

Comodo SecureBox Management Console Software Version 1.9 6. Comodo SecureBox Management Console Software Version 1.9 Quick Start Guide Guide Version 1.9.041918 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo SecureBox Management Console

More information

Licensing the System

Licensing the System The following topics explain how to license the Firepower Threat Defense device. Smart Licensing for the Firepower System, page 1 Managing Smart Licenses, page 3 Smart Licensing for the Firepower System

More information

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow) Integration Guide PingFederate SAML Integration Guide (SP-Initiated Workflow) Copyright Information 2018. SecureAuth is a registered trademark of SecureAuth Corporation. SecureAuth s IdP software, appliances,

More information

October J. Polycom Cloud Services Portal

October J. Polycom Cloud Services Portal October 2018 3725-42461-001J Polycom Cloud Services Portal Copyright 2018, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or

More information

How-To Configure Message Routing Between Cisco Security in the Cloud and Microsoft Office 365

How-To Configure Message Routing Between Cisco  Security in the Cloud and Microsoft Office 365 How-To Configure Message Routing Between Cisco Email Security in the Cloud and Microsoft Office 365 About This Document 3 ACME s Migration to the Cloud 3 Cisco Email Security to Office 365 Configuration

More information

Vision deliver a fast, easy to deploy and operate, economical solution that can provide high availability solution for exchange server

Vision deliver a fast, easy to deploy and operate, economical solution that can provide high availability solution for exchange server Exchange server 2010 Interview Questions High Availability Filed under: Exchange Server 2010 exchange2k10 @ 5:04 pm 1. What are the vision and Goals of Exchange Server 2010 high availability? Vision deliver

More information

Colligo Console. Administrator Guide

Colligo Console. Administrator Guide Colligo Console Administrator Guide Contents About this guide... 6 Audience... 6 Requirements... 6 Colligo Technical Support... 6 Introduction... 7 Colligo Console Overview... 8 Colligo Console Home Page...

More information

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810 Workspace ONE UEM Integration with RSA PKI VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Unified Communications Manager Version 10.5 SAML SSO Configuration Example

Unified Communications Manager Version 10.5 SAML SSO Configuration Example Unified Communications Manager Version 10.5 SAML SSO Configuration Example Contents Introduction Prerequisites Requirements Network Time Protocol (NTP) Setup Domain Name Server (DNS) Setup Components Used

More information

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017 Cisco Security Advanced Malware Protection Guillermo González Security Systems Engineer Octubre 2017 The New Security Model Attack Continuum Before During After Before Discover During Detect After Scope

More information

Libelium Cloud Hive. Technical Guide

Libelium Cloud Hive. Technical Guide Libelium Cloud Hive Technical Guide Index Document version: v7.0-12/2018 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General and information... 4 1.1. Introduction...4 1.1.1. Overview...4 1.2. Data

More information

TECHNICAL GUIDE SSO SAML Azure AD

TECHNICAL GUIDE SSO SAML Azure AD 1 TECHNICAL GUIDE SSO SAML Azure AD At 360Learning, we don t make promises about technical solutions, we make commitments. This technical guide is part of our Technical Documentation. Version 1.0 2 360Learning

More information

Setup Guide for AD FS 3.0 on the Apprenda Platform

Setup Guide for AD FS 3.0 on the Apprenda Platform Setup Guide for AD FS 3.0 on the Apprenda Platform Last Updated for Apprenda 6.5.2 The Apprenda Platform leverages Active Directory Federation Services (AD FS) to support identity federation. AD FS and

More information

Centralized Policy, Virus, and Outbreak Quarantines

Centralized Policy, Virus, and Outbreak Quarantines Centralized Policy, Virus, and Outbreak Quarantines This chapter contains the following sections: Overview of Centralized Quarantines, page 1 Centralizing Policy, Virus, and Outbreak Quarantines, page

More information

Licensing the Firepower System

Licensing the Firepower System The following topics explain how to license the Firepower System. About Firepower Feature Licenses, page 1 Service Subscriptions for Firepower Features, page 1 Classic Licensing for the Firepower System,

More information

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) You can find the most up-to-date technical documentation

More information

Licensing the Firepower System

Licensing the Firepower System The following topics explain how to license the Firepower System. About Firepower Feature Licenses, page 1 Service Subscriptions for Firepower Features, page 2 Smart Licensing for the Firepower System,

More information

RSA NetWitness Platform

RSA NetWitness Platform RSA NetWitness Platform Event Source Log Configuration Guide Microsoft Office 365 Last Modified: Thursday, June 7, 2018 Event Source Product Information: Vendor: Microsoft Event Source: Office 365 Versions:

More information

Office : Enabling and Managing Office 365. Upcoming Dates. Course Description. Course Outline

Office : Enabling and Managing Office 365. Upcoming Dates. Course Description. Course Outline Office 365 20347: Enabling and Managing Office 365 Learn how to evaluate, plan, deploy and operate Microsoft Office 365 Cloud-Based Services in this 5-day class. Your instructor will focus on real world

More information

Integrating with Microsoft Intune to Enforce Compliance on Mac Computers Managed by Jamf Pro

Integrating with Microsoft Intune to Enforce Compliance on Mac Computers Managed by Jamf Pro Integrating with Microsoft Intune to Enforce Compliance on Mac Computers Managed by Jamf Pro Technical Paper Jamf Pro 10.9.0 or Later 29 January 2019 copyright 2002-2019 Jamf. All rights reserved. Jamf

More information

Setting Up Resources in VMware Identity Manager 3.1 (On Premises) Modified JUL 2018 VMware Identity Manager 3.1

Setting Up Resources in VMware Identity Manager 3.1 (On Premises) Modified JUL 2018 VMware Identity Manager 3.1 Setting Up Resources in VMware Identity Manager 3.1 (On Premises) Modified JUL 2018 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide

Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure Deployment Guide v1.0 May 2018 Introduction This document describes how to set up Pulse Connect Secure for SP-initiated

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

Configuring Gmail (G Suite) with Cisco Cloud Security

Configuring Gmail (G Suite) with Cisco Cloud  Security Configuring Gmail (G Suite) with Cisco Cloud Email Security This document covers the steps required to integrate Cisco Cloud Email Security with Google G Suite for inbound and outbound email delivery.

More information

Cisco Security Appliances

Cisco  Security Appliances Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate

More information

BLACKBERRY SPARK COMMUNICATIONS PLATFORM. Getting Started Workbook

BLACKBERRY SPARK COMMUNICATIONS PLATFORM. Getting Started Workbook 1 BLACKBERRY SPARK COMMUNICATIONS PLATFORM Getting Started Workbook 2 2018 BlackBerry. All rights reserved. BlackBerry and related trademarks, names and logos are the property of BlackBerry

More information

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1 CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/

More information

Configuring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: May 2015

Configuring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: May 2015 Configuring Claims-based Authentication for Microsoft Dynamics CRM Server Last updated: May 2015 This document is provided "as-is". Information and views expressed in this document, including URL and other

More information

Cisco Systems, Inc IronPort

Cisco Systems, Inc IronPort IronPort RSA Secured Implementation Guide for RSA DLP Network Partner Information Last Modified: December 5 th, 2012 Product Information Partner Name Cisco Systems, Inc Web Site www.cisco.com Product Name

More information

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Configuring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: June 2014

Configuring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: June 2014 Configuring Claims-based Authentication for Microsoft Dynamics CRM Server Last updated: June 2014 This document is provided "as-is". Information and views expressed in this document, including URL and

More information

Using Trustwave SEG Cloud with Cloud-Based Solutions

Using Trustwave SEG Cloud with Cloud-Based  Solutions .trust Using Trustwave SEG Cloud with Cloud-Based Email Solutions Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Cloud-Based Email Solutions 2 2 Networking and DNS

More information

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017 Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication

More information

Cisco Security Enterprise License Agreement

Cisco Security Enterprise License Agreement Cisco Security Enterprise License Agreement Deploy Software and Technology more easily The Cisco Security Enterprise Licensing Agreement (ELA) gives you a simpler way to manage your licenses. And it saves

More information

Centrify for Dropbox Deployment Guide

Centrify for Dropbox Deployment Guide CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of

More information

Five9 Plus Adapter for Microsoft Dynamics CRM

Five9 Plus Adapter for Microsoft Dynamics CRM Cloud Contact Center Software Five9 Plus Adapter for Microsoft Dynamics CRM Administrator s Guide September 2017 This guide describes how to install and configure the Five9 Plus Adapter for Microsoft Dynamics

More information

VMware AirWatch Integration with RSA PKI Guide

VMware AirWatch Integration with RSA PKI Guide VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Workspace ONE UEM Notification Service. VMware Workspace ONE UEM 1811

Workspace ONE UEM  Notification Service. VMware Workspace ONE UEM 1811 Workspace ONE UEM Email Notification Service VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Deploying Lookout with IBM MaaS360

Deploying Lookout with IBM MaaS360 Lookout Mobile Endpoint Security Deploying Lookout with IBM MaaS360 February 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout,

More information

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0 Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

USM Anywhere AlienApps Guide

USM Anywhere AlienApps Guide USM Anywhere AlienApps Guide Updated April 23, 2018 Copyright 2018 AlienVault. All rights reserved. AlienVault, AlienApp, AlienApps, AlienVault OSSIM, Open Threat Exchange, OTX, Unified Security Management,

More information

Best Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate

Best Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate White Paper PlateSpin Transformation Manager PlateSpin Migrate Best Practices for Migrating Servers to Microsoft Azure with PlateSpin Migrate Updated for PlateSpin Transformation Manager 1.1 and PlateSpin

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Requirements for Threat Intelligence Director, page 4 How To Set Up, page 6 Analyze TID Incident

More information

Release Notes for Cisco IronPort AsyncOS 7.7 for Security Management

Release Notes for Cisco IronPort AsyncOS 7.7 for Security Management Release Notes for Cisco IronPort AsyncOS 7.7 for Security Management Published: February 15, 2012 Revised: April 9, 2012 Contents This document contains information for Cisco IronPort AsyncOS 7.7 for Security

More information

Configuring Alfresco Cloud with ADFS 3.0

Configuring Alfresco Cloud with ADFS 3.0 Configuring Alfresco Cloud with ADFS 3.0 Prerequisites: You have a working domain on your Windows Server 2012 and successfully installed ADFS. For these instructions, I created: alfresco.me as a domain

More information

AvePoint Cloud Governance. Release Notes

AvePoint Cloud Governance. Release Notes AvePoint Cloud Governance Release Notes January 2018 New Features and Improvements AvePoint Cloud Governance now includes a My Groups report, which shows users a list of Office 365 groups they own or are

More information

Cisco Security: Advanced Threat Defense for Microsoft Office 365

Cisco  Security: Advanced Threat Defense for Microsoft Office 365 Cisco Email Security: Advanced Threat Defense for Microsoft Office 365 Microsoft Office 365 has become the standard productivity platform in organizations large and small around the world. It is a cost-effective

More information

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1 Hands-On Lab Windows Azure Virtual Machine Roles Lab version: 2.0.0 Last updated: 12/14/2010 Page 1 CONTENTS OVERVIEW... 3 EXERCISE 1: CREATING AND DEPLOYING A VIRTUAL MACHINE ROLE IN WINDOWS AZURE...

More information

RED IM Integration with Bomgar Privileged Access

RED IM Integration with Bomgar Privileged Access RED IM Integration with Bomgar Privileged Access 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the

More information

Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer Workspace ONE UEM v9.4 Have documentation feedback?

More information

Notification Template Limitations. Bridge Limitations

Notification Template Limitations. Bridge Limitations Oracle Cloud Known Issues for Oracle Identity Cloud Service Release 18.1.2 E55915-17 February 2018 Notification Template Limitations Note the following limitations with Oracle Identity Cloud Service notification

More information

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections:

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections: This chapter contains the following sections: Message Tracking Overview, page 1 Enabling Message Tracking, page 1 Searching for Messages, page 2 Working with Message Tracking Search Results, page 4 Checking

More information

VMware Identity Manager Integration with Office 365

VMware Identity Manager Integration with Office 365 VMware Identity Manager Integration with Office 365 VMware Identity Manager O C T O B E R 2 0 1 7 V 7 Table of Contents Overview... 3 Configuring Single Sign-on to Office 365... 4 Authentication Profiles

More information

Release Notes for Cisco IronPort AsyncOS for Security Management AR

Release Notes for Cisco IronPort AsyncOS for Security Management AR Release Notes for Cisco IronPort AsyncOS 7.7.0 for Security Management AR Published: June 27, 2013 This release ships on certain hardware. Contents What s New in This Release, page 2 Upgrade Paths, page

More information

This section includes troubleshooting topics about single sign-on (SSO) issues.

This section includes troubleshooting topics about single sign-on (SSO) issues. This section includes troubleshooting topics about single sign-on (SSO) issues. SSO Fails After Completing Disaster Recovery Operation, page 1 SSO Protocol Error, page 1 SSO Redirection Has Failed, page

More information

GSX 365 Usage Reports & Security Audit

GSX 365 Usage Reports & Security Audit GSX 365 Usage Reports & Security Audit With you, everywhere, for more than 20 years Founded in 1996, Headquartered in Switzerland London Geneva Offices in USA, UK, France, Switzerland, Singapore and Bangalore

More information

FedLine Web Certificate Retrieval Procedures

FedLine Web Certificate Retrieval Procedures Version 2.0 Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures... 3 Installing the Federal Reserve Banks Certificate Authority

More information

Sage Construction Central Setup Guide (Version 18.1)

Sage Construction Central Setup Guide (Version 18.1) Sage 300 Construction and Real Estate Sage Construction Central Setup Guide (Version 18.1) Certified course curriculum Important Notice The course materials provided are the product of Sage. Please do

More information

Licensing the Firepower System

Licensing the Firepower System The following topics explain how to license the Firepower System. About Firepower Feature Licenses, on page 1 Service Subscriptions for Firepower Features, on page 2 Smart Licensing for the Firepower System,

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

Integrating with Microsoft Intune to Enforce Compliance on Macs Managed by Jamf Pro. Technical Paper Jamf Pro or Later 14 December 2017

Integrating with Microsoft Intune to Enforce Compliance on Macs Managed by Jamf Pro. Technical Paper Jamf Pro or Later 14 December 2017 Integrating with Microsoft Intune to Enforce Compliance on Macs Managed by Jamf Pro Technical Paper Jamf Pro 10.1.0 or Later 14 December 2017 copyright 2002-2017 Jamf. All rights reserved. Jamf has made

More information

Integrating YuJa Active Learning into ADFS via SAML

Integrating YuJa Active Learning into ADFS via SAML Integrating YuJa Active Learning into ADFS via SAML 1. Overview This document is intended to guide users on how to setup a secure connection between YuJa (the Service Provider, or SP) and ADFS (the Identity

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for RadiantOne Cloud Federation Service (CFS) All information herein is either public information

More information

Managing Microsoft 365 Identity and Access

Managing Microsoft 365 Identity and Access Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential

More information

Security, Internet Access, and Communication Ports

Security, Internet Access, and Communication Ports Security, Internet Access, and Communication Ports The following topics provide information on system security, internet access, and communication ports: About Security, Internet Access, and Communication

More information

Course 10997A: Office 365 Administration and Troubleshooting

Course 10997A: Office 365 Administration and Troubleshooting Skip to main content Course 10997A: Office 365 Administration and Troubleshooting - Course details Course Outline Module 1: Office 365 services overview This module describes Office 365 services, licensing,

More information

Microsoft Official Curriculum Enabling and Managing Office 365 (5 Days - English) Programme détaillé

Microsoft Official Curriculum Enabling and Managing Office 365 (5 Days - English) Programme détaillé Module 1: Planning and provisioning Microsoft Office 365 This module reviews the features of Office 365 and identifies recent improvements to the service. Also it describes how to configure an Office 365

More information

Cisco s Appliance-based Content Security: IronPort and Web Security

Cisco s Appliance-based Content Security: IronPort  and Web Security Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.

More information