Kaspersky Security 9.0 for Microsoft Exchange Servers Security Officer's Guide

Size: px
Start display at page:

Download "Kaspersky Security 9.0 for Microsoft Exchange Servers Security Officer's Guide"

Transcription

1 Kaspersky Security 9.0 for Microsoft Exchange Servers Security Officer's Guide APPLICATION VERSION: 9.0

2 Dear User! Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding this software product. Warning! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation and by international treaties. Illegal reproduction and distribution of this document or parts hereof result in civil, administrative or criminal liability by applicable law. Any type of reproduction or distribution of any materials, including translations, is allowed only with the written permission of Kaspersky Lab. This document, and graphic images related to it, may only be used for informational, non-commercial, and personal purposes. Kaspersky Lab reserves the right to amend this document without additional notification. You can find the latest version of this document on the Kaspersky Lab website at Kaspersky Lab assumes no liability for the content, quality, relevance, or accuracy of any third-party materials used herein, or for any potential harm associated with the use of such materials. Document revision date: 10/10/ Kaspersky Lab ZAO. All Rights Reserved

3 TABLE OF CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 6 KASPERSKY SECURITY 9.0 FOR MICROSOFT EXCHANGE SERVERS... 8 About DLP categories... 8 About DLP policies About incidents About joint work of Security Officers Process of message scanning by the DLP Module About adding X-headers APPLICATION INTERFACE Main window of the Administration Console Administration Console tree Workspace STARTING AND STOPPING THE APPLICATION STATUS OF DATA LEAK PROTECTION Default status of Data Leak Protection Viewing Data Leak Protection status details CONFIGURING S OF SECURITY OFFICERS MANAGING CATEGORIES Creating and editing a table data category Example of a category of table data Creating and editing a keyword category Deleting a category MANAGING POLICIES Creating a policy Step 1. Configuring general settings Step 2. Configuring the policy scope: senders Step 3. Configuring the policy scope: recipients Step 4. Configuring actions Editing policy settings Configuring the delivery of policy violation notifications Deleting a policy Searching for policies associated with a specific user MANAGING INCIDENTS Viewing the list of incidents Selecting columns to display in the table of incidents Filtering the list of incidents Viewing incident details Changing incident status Saving a message attached to an incident to disk Sending notifications to violators

4 S E C U R I T Y O F F I C E R ' S G U I D E Adding comments to incidents Archiving incidents Restoring incidents from the archive Deleting archived incidents MANAGING REPORTS About reports on DLP Module operation Detailed report Report on users System KPI report Report on policies and incidents Creating a report generation task Detailed report generation task: Configuring settings Task to generate report on users: Configuring settings System KPI report generation task: Configuring settings Task to generate report on policies and incidents: Configuring settings Starting a report creation task Deleting report generation task Viewing a report Generating a report manually Saving reports to disk Deleting reports KASPERSKY LAB ZAO INFORMATION ABOUT THIRD-PARTY CODE TRADEMARK NOTICE

5 ABOUT THIS GUIDE This document is the Security Officer's Guide to Kaspersky Security 9.0 for Microsoft Exchange Servers (hereinafter also "Kaspersky Security"). The Guide serves the following purposes: Provide help on using the application. Serves as a quick source of information to answer questions relating to the operation of Kaspersky Security. IN THIS SECTION: In this document...5 Document conventions...6 IN THIS DOCUMENT This document includes the following sections: Kaspersky Security 9.0 for Microsoft Exchange Servers (see page 8) This section offers a brief description of application features. Application interface (see page 14) This section describes the basic elements of the graphical user interface of the application: the main window, Administration Console, the Administration Console tree, and the workspace. Starting and stopping the application (see page 15) This section contains information on starting and shutting down the application. Status of Data Leak Protection (see page 16) This section provides information on the default status of Data Leak Protection and instructions on obtaining information about the status of the DLP Module and statistics on the operation of the DLP Module. Configuring s of security officers (see page 19) This section provides instructions on configuring the addresses of Security Officers. You are advised to follow these instructions before using the application. Managing categories (see page 20) This section provides instructions on creating, editing, and deleting DLP categories. Managing policies (see page 24) This section provides instructions on creating, editing, and deleting DLP policies. 5

6 S E C U R I T Y O F F I C E R ' S G U I D E Managing incidents (see page 31) This section provides instructions on processing incidents that have been generated. Managing reports This section provides information on the DLP Module operation reports and instructions on creating, viewing, saving, and deleting reports, as well as instructions on creating, modifying, starting, and deleting report generation tasks. Kaspersky Lab ZAO (see page 54) This section provides information about Kaspersky Lab ZAO. Information about third-party code (see page 55) This section provides information about third-party code used in the application. Trademark notices (see page 56) This section lists third-party trademarks used in this document. DOCUMENT CONVENTIONS This document uses the following conventions (see table below). Table 1. Document conventions SAMPLE TEXT DOCUMENT CONVENTIONS DESCRIPTION Note that... Warnings are highlighted in red and enclosed in frames. Warnings show information about actions that may have unwanted consequences. It is recommended that you use... Example: Notes are enclosed in frames. Notes provide additional and reference information. Examples are given on a yellow background under the heading "Example".... 6

7 A B O U T T H I S G U I D E SAMPLE TEXT An update is... The Databases are outdated event occurs. Press ENTER. Press ALT+F4. Click the Enable button. To configure a task schedule, perform the following steps: Enter help in the command line The following message will appear: Specify the date in DD:MM:YY format. <User name> DOCUMENT CONVENTIONS DESCRIPTION The following elements are italicized in the text: new terms; status variations and application events. Names of keyboard keys appear in bold and are capitalized. Names of keys linked with a + (plus) sign indicate key combinations. These keys have to be pressed simultaneously. UI elements, for example, names of entry fields, menu items, buttons are in bold. Introductory phrases of instructions are printed in italics and marked with an arrow sign. The following types of text content are set off with a special font: command line text; text of program messages output on the screen; Data to be entered using the keyboard. Variables are enclosed in angle brackets. Instead of a variable, the corresponding value should be inserted, with angle brackets omitted. 7

8 KASPERSKY SECURITY 9.0 FOR MICROSOFT EXCHANGE SERVERS Kaspersky Security 9.0 for Microsoft Exchange Servers is an application designed for protection of mail servers based on Microsoft Exchange Server against viruses, Trojan software and other types of threats that may be transmitted via e- mail, as well as spam, phishing, and accidental leaks of confidential corporate data via . Kaspersky Security 9.0 for Microsoft Exchange Servers includes a data leak prevention (DLP) component the DLP Module. The DLP Module analyzes messages for any confidential information or data with specific parameters, such as credit card details, financial or personal data of company employees. On detecting such information in a message, the DLP Module saves an information security breach record (incident) in its internal log. This record helps to determine who attempted to send information and where to. The DLP Module can either block transmission of messages with confidential information or allow transmission and only reflect it in the log. The DLP Module detects information security violations on the basis of DLP categories and DLP policies. If the law in your country requires notifying individuals that their activity on data transmission networks is being monitored, you must warn users about the operation of the DLP Module in advance. Detailed information about the remaining functions is available in the Administrator's Guide for Kaspersky Security 9.0 for Microsoft Exchange Servers. IN THIS SECTION: About DLP categories...8 About DLP policies About incidents About joint work of Security Officers Process of message scanning by the DLP Module About adding X-headers ABOUT DLP CATEGORIES DLP categories (hereinafter also referred to as "categories") are templates of data according to which the DLP Module looks for data leaks in messages. Categories are divided into Kaspersky Lab categories and custom categories. Kaspersky Lab categories are created by Kaspersky Lab experts, supplied together with the application, and updated together with application databases. Custom categories can be created by the user. 8

9 K A S P E R S K Y S E C U R I T Y 9. 0 F O R M I C R O S O F T E X C H A N G E S E R V E R S Custom categories Table data category A category of this type takes the form of a digital impression of table data, such as a table with personal data of employees or customers, retrieved from CRM systems (see section "Creating and editing a table data category" on page 20). A search through this category can detect in protected data certain combinations of cells from among the specified number of rows and columns (see section "Example of a category of table data" on page 21). Keyword category A category of this type takes the form of a keyword or expression created out of keywords using special functions (see section "Creating and editing a keyword category" on page 21). A search through this category can detect in protected data certain combinations of words and expressions that match complex search criteria, such as the presence of two word combinations with a certain number of words between them. A keyword category is used to provide protection against leaks of text data containing certain marker words (such as names of new technologies or products that constitute a trade secret). New user categories and changes made in the user categories are applied to all security Servers with the DLP Module installed within 30 minutes. Kaspersky Lab categories Administrative documents (Russia) This category serves to protect the major administrative and regulatory documents used in Russian record keeping, such as orders and job descriptions. Confidential documents (Russia) This category serves to protect documents used in Russian record keeping and intended for a limited number of persons. For example, documents marked as "For internal use" or "Confidential". Financial documents (Russia) This category serves to protect standard financial documents used at Russian companies, such as invoices, tax invoices, and contracts. Medical data (Russia) This category serves to protect personal medical data of Russian citizens. Medical data (Germany) This category serves to protect personal medical data of German citizens. Medical data (UK) This category serves to protect personal medical data of UK citizens. Medical data (USA) This category serves to protect personal medical data of US citizens. Payment cards This category is designed to protect confidential data according to PCI DSS the Payment Card Industry Data Security Standard. This category helps to detect payment card details in protected data, such as payment card numbers (with or without delimiters, with or without CVV codes) or magnetic stripe dumps. The "Payment cards" category helps to protect personal data of payment card holders against unauthorized use or distribution. 9

10 S E C U R I T Y O F F I C E R ' S G U I D E Personal data (Germany) This category is designed to protect personal data according to the requirements of German law. Personal data (Russia) This category is designed to protect personal data according to the requirements of Russian law. Personal data (UK) This category is designed to protect personal data according to the requirements of UK law. Personal data (USA) This category is designed to protect personal data of individuals according to personally identifiable information protection requirements set forth in US laws. This category helps to detect information that can be used to identify an individual or his/her location, such as passport or driver's license details, information about tax returns or social security numbers. Russian Federal Law No. 152 This category is designed to protect personal data listed in Russian Federal Law No This category combines the "Personal data (Russia)" and "Medical data (Russia)" categories. U.S. Federal Law HIPAA This category is designed to protect personal healthcare data listed in the HIPPA Federal Act of the USA. The set of Kaspersky Lab categories supplied with the application may differ from the list provided above. This set may also be supplemented with new categories as the application databases are updated. ABOUT DLP POLICIES You can create DLP policies on the basis of Kaspersky Lab DLP categories and custom DLP categories (see section "Creating a policy" on page 24) (hereinafter also referred to as policies). The policy scope includes: The plurality of senders whose messages should be scanned by the application according to this policy. The plurality of recipients the messages addressed to whom should be scanned by the application according to this policy. The application applies policies to those outgoing messages that fall within the scope of policies and searches the messages for confidential data corresponding to the categories of such policies. A policy also defines actions to be taken. The application performs these actions on messages found to contain confidential data. Several policies with different scopes and different sets of actions to be taken on messages may be created on the basis of one category. New policies and changes made in the policies are applied to all security Servers with the DLP Module installed within 30 minutes. 10

11 K A S P E R S K Y S E C U R I T Y 9. 0 F O R M I C R O S O F T E X C H A N G E S E R V E R S ABOUT INCIDENTS When the message content matches the category data and all criteria specified in the policy, the DLP Module generates an incident indicating a violation of this policy. If the message violates information security according to several policies at once, the DLP Module generates several incidents matching the number of policies violated (see section "Process of message scanning by the DLP Module" on page 12). Each incident includes information about the incident object (the message that caused an information security breach), the sender and recipients of the message, the violated policy, and service information, such as the incident ID or the time when the incident was generated (see section "Viewing the list of incidents" on page 31). Each incident must be processed by a security officer. Incident processing involves recording a violation and taking the available technical and organizational measures to improve protection of confidential data. Incident status Incident status reflects the stage of incident processing. When an incident is generated, it is assigned the New status label. The security officer changes the incident status over the course of incident processing. Incident processing ends when the security officer assigns one of the Closed (<reason>) status labels to the incident. The New and In progress status labels are open status labels, and the Closed (<reason>) status labels are closed status labels. Table 2. Incident status STATUS TYPE VALUE New Open New incident. Incident processing has not started. In progress Open An incident investigation is in progress. Closed (processed) Closed The incident has been processed successfully, and the required measures have been taken. Closed (false positive) Closed A policy has been violated, but the transmission of protected data was legitimate. There is no information security violation. Policy settings may need to be revised. Closed (not an incident) Closed A policy has been violated, but the transmission of protected data was authorized by a special order. No additional action is required. Closed (other) Closed The incident has been closed for other reasons. Incident priority The incident priority reflects the urgency with which the incident has to be processed. The application assigns an incident priority upon generating the incident (Low, Medium or High). The priority is assigned based on the value specified in the settings of the policy that has been violated. Incident archives Closed incidents can be archived (see section "Archiving incidents" on page 37). Incidents placed in an archive are called archived incidents. Incidents placed in an archive are removed from the list of incidents. If necessary, you can restore incidents from the archive (see section "Restoring incidents from the archive" on page 38) and view them in the list of incidents again. An incident archive is a specially formatted file with the bak extension. You can create an unlimited number of incident archives. Archives help to periodically free up the list of incidents by removing closed incidents, thereby optimizing the use of the incident database volume without losing the history of incidents generated and processed. 11

12 S E C U R I T Y O F F I C E R ' S G U I D E Statistics and reports The application displays statistics on new incidents, incidents being processed, and closed incidents. This information helps to evaluate the status of data protection and the performance of the security officer. This information can be also used to generate reports. ABOUT JOINT WORK OF SECURITY OFFICERS The application allows the joint work of several security officers. Any user who is assigned a role of the "security officer", has access to all controls and functions of the DLP Module. All of the controls and features of DLP Module are available for any user who has been assigned the Information Security Specialist role. PROCESS OF MESSAGE SCANNING BY THE DLP MODULE The DLP Module scans messages using the following algorithm: 1. The DLP Module receives a message. 2. The DLP Module checks whether the message falls within the scope of each one of the existing policies (see section "Creating a policy" on page 24). If the message does not fall within the scope of any one of the policies, the DLP Module skips the message without scanning. If the message falls within the scope of any one of the policies, the DLP Module searches the message for data fragments corresponding to the category of this policy (see section "About DLP categories" on page 8). The search includes the message subject, message content, and all of the message attachments. 3. If the search is successful (matches to the policy category are found in the message), this means that the policy has been violated. The DLP Module generates an incident with the specified priority and takes the actions specified in the policy settings on the message (see section "Editing policy settings" on page 28): Deletes the message or allows message transmission to the user. A message copy can be attached to the incident for subsequent incident investigation. Sends a policy violation notification to the specified recipients (see section "Configuring the delivery of policy violation notifications" on page 28). Information about the action taken on the message is saved in the incident details (see section "Viewing incident details" on page 33). 4. If the search fails, the DLP Module proceeds to scan the message against the next policy. If the message violates information security according to several policies at once, the DLP Module generates several incidents matching the number of policies violated. Messages undergo such processing on all corporate mail servers where the DLP Module is installed. Incidents generated on all corporate mail servers appear in a common list of incidents. If the topology of your mail infrastructure causes the message to pass through two or more mail servers with the DLP Module installed, the message undergoes scanning for data leaks only on one of the servers. This rules out any duplicate incident records and distortion of report statistics (see section "Managing reports" on page 40). 12

13 K A S P E R S K Y S E C U R I T Y 9. 0 F O R M I C R O S O F T E X C H A N G E S E R V E R S ABOUT ADDING X-HEADERS While processing messages the DLP Module adds new X-headers to them. These X-headers make it possible to obtain information on the results of message processing by the DLP Module by analyzing the message. Table 3. X-headers of messages added by the DLP Module X-HEADER X-KSE-Dlp-Interceptor-Info X-KSE-DLP-ScanInfo VALUES license violation a license violation; the message is skipped without being scanned. protection disabled the DLP Module is disabled; the message is skipped without being scanned. fallback the DLP Module is not operational; the message is skipped without being scanned. Overloaded the queue of incoming messages is overflowing; the message is skipped without being scanned. Skipped no policies applicable to the message have been found; the message is skipped without being scanned. Clean the message falls within the scope of one or several policies, but no policy violations have been detected. Detect the message has caused a violation of one or several policies. ScanError a scan error has been encountered. 13

14 APPLICATION INTERFACE The user interface of the application is provided by the Administration Console component. The Administration Console is a dedicated isolated snap-in integrated into Microsoft Management Console (MMC). IN THIS SECTION: Main window of the Administration Console Administration Console tree Workspace MAIN WINDOW OF THE ADMINISTRATION CONSOLE Main window of the Administration Console contains the following items: Menu. Displayed in the upper part of the main window. The menu lets you manage files and windows and access the help system. Administration Console tree. Located in the left part of the main window. The Administration Console tree serves to provide access to application features and settings. Workspace. It is located in the right part of the main window. The workspace shows the contents of the node selected in the Administration Console tree. ADMINISTRATION CONSOLE TREE The console tree includes the Data Leak Protection node designed to obtain information on the status of protection against data leaks. The root node contains the following subnodes for managing the application features: Categories and policies. Configuring Data Leak Protection settings. Incidents. Processing incidents. Reports. Creating, viewing, and otherwise managing DLP Module reports. WORKSPACE The workspace provides access to the contents of the node selected in the Administration Console tree: the application settings and functions or statistics on the operation of the application. The workspace appearance depends on the node selected. 14

15 STARTING AND STOPPING THE APPLICATION To start using the application, launch Administration Console. To launch the Administration Console, In the Start menu, select Programs Kaspersky Security 9.0 for Microsoft Exchange Servers Kaspersky Security 9.0 for Microsoft Exchange Servers. After being started, Administration Console connects to the Security Server. Administration Console shows the Data Leak Protection node and the following nodes: Categories and policies. Incidents. Reports. If Administration Console is not installed on your computer or the type of Administration Console that is running differs from the one described above, contact your administrator. To finish using the application, close Administration Console. To close Administration Console, in the main menu of Administration Console, select File Exit. 15

16 STATUS OF DATA LEAK PROTECTION This section provides information on the default status of Data Leak Protection and instructions on obtaining information about the status of the DLP Module and statistics on the operation of the DLP Module. IN THIS SECTION: Default status of Data Leak Protection Viewing Data Leak Protection status details DEFAULT STATUS OF DATA LEAK PROTECTION After application installation, Data Leak Protection has the following status by default: The DLP Module is enabled. The application includes predefined categories. The application does not have any custom categories. The application does not have any policies. The application does not scan outgoing messages for data leaks and does not generate incidents. The DLP Module skips all incoming messages without modifying them. VIEWING DATA LEAK PROTECTION STATUS DETAILS Information about the status of data leak protection is displayed in the Data Leak Protection node of Administration Console. Details shown in the workspace of the Data Leak Protection node are grouped into three sections: DLP Module status. Opened incidents. Statistics. DLP Module status section The DLP Module status section provides information on the current status of the DLP Module and errors encountered during the operation of the DLP Module on Security Servers of your company. This section contains the following information: DLP Module status (Enabled; Enabled, running with errors; Disabled) Information on the following types of errors (if any): Licensing errors Errors associated with the DLP database Message scan errors Errors of connection with Security Servers with the DLP Module installed. The blocks with error details show the number and list of Security Servers where errors have occurred. 16

17 S T A T U S O F D A T A L E A K P R O T E C T I O N Opened incidents section The Opened incidents section lets you view statistics on currently existing incidents with New and In progress statuses. The following information is displayed in the upper part of the section: Violators. The number of unique senders. Incidents generated while scanning messages of these senders, which currently have New or In progress status. New incidents. The number of currently existing incidents with New status. Incidents under processing. The number of currently existing incidents with In progress status. Opened high-priority incidents. The number of opened incidents (in percentage points) to which High priority has been assigned. This setting reflects the current danger level. The danger level can have the following values: 0%-25%. Low. Highlighted in green. 25%-50%. Medium. Highlighted in yellow. 50%-75%. High. Highlighted in red. 75%-100%. Critical. Highlighted in black. Top 3 violators. A list of three senders. Messages from these senders have violated the largest number of policies, and incidents generated as a result of policy violations by these messages have New or In progress status. A chart showing the number of opened incidents with New and In progress status calculated for each category is displayed in the lower part of the section. Data belonging to all categories is included in the chart by default. You can modify the list of categories for which the chart of opened incidents is created. To modify the list of categories for which the chart of opened incidents is created: 1. Click the Select categories button. The List of categories window opens. 2. Select check boxes for the categories to be reflected in the chart. Then click OK. The chart content is refreshed according to the categories selected. Statistics section The Statistics section lets you obtain information about messages processed and scanned and on the number of incidents closed during the reporting period. The reporting period can be either 7 days or 30 days. You can choose the reporting period. To choose the reporting period, click either one of the links: 7 days or 30 days. Data in the section is refreshed according to the reporting period selected. The upper part of the section contains the following information: Messages processed. Number of messages processed by the DLP Module. Messages scanned. Number of messages that fall into the scope of policies (see section "On DLP policies" on page 10) and have been scanned by the DLP Module. 17

18 S E C U R I T Y O F F I C E R ' S G U I D E Incidents created. Number of incidents generated. Messages skipped due to timeouts. Number of messages that have not been scanned due to timeouts. Messages skipped due to errors. Number of messages that have not been scanned due to errors, including licensing errors. The lower part of the section includes a chart of closed incidents showing the number and percentage of incidents with Closed (processed), Closed (false positive), Closed (not an incident), Closed (other) status, which were generated during the selected reporting period. Incidents restored from the archive are also reflected in the chart (see section "Restoring incidents from the archive" on page 38). Incidents associated with all categories are included in the chart by default. You can modify the list of categories for which the chart of closed incidents is created. To modify the list of categories for which the chart of closed incidents is created: 1. Click the Select categories button. The List of categories window opens. 2. Select check boxes for the categories to be reflected in the chart. Then click OK. The chart content is refreshed according to the categories selected. 18

19 CONFIGURING S OF SECURITY OFFICERS Before using the DLP Module, you are advised to specify the addresses of Security Officers. The application can send notifications about the status of the DLP Module, policy violations, and reports to these addresses. This makes it possible to receive real-time information on the status of information security at the organization. To configure the addresses of security officers: 1. In the Administration Console tree, select the Data Leak Protection node. 2. In the DLP Module status section, click the Configure button. The addresses window opens. 3. In the Addresses of security officers field, enter the addresses, separating them with semicolons. 4. Click OK to save the changes. You are advised to follow this procedure every time there is a change in the staff of security officers at your organization. 19

20 MANAGING CATEGORIES This section provides instructions on creating, editing, and deleting DLP categories. IN THIS SECTION: Creating and editing a table data category Example of a category of table data Creating and editing a keyword category Deleting a category CREATING AND EDITING A TABLE DATA CATEGORY To create or edit a category of table data: 1. In the Administration Console tree, select the Categories and policies node. 2. Perform one of the following steps: To create a new category of table data, click the Add category button. Then select Table data in the dropdown list. To edit an existing category of table data, select it in the list of categories and policies and click the Edit button. A window with category settings appears. 3. Specify the category name of your choice in the Name field. 4. Click Browse and select a CSV file with data to be protected against leaks with the help of a category. The CSV file must be saved in UTF-8 encoding. Other encodings are not supported. The first row in the file is the header. This row is not imported and does not participate in creating a category. 5. In the Column separator drop-down list, select the symbol to be used in the file for separating columns. 6. In the Match level section, specify the threshold values of rows and columns (see section "Example of a category of table data" on page 21). Detailed information on threshold values of rows and columns is available via the Help on configuring the match level link in the Category settings window. 7. Specify additional information pertaining to data included in the category in the Comments field. 8. Click OK. Data from this file is imported into the category. The new / modified category of table data appears in the list of categories and policies. 20

21 M A N A G I N G C A T E G O R I E S EXAMPLE OF A CATEGORY OF TABLE DATA Suppose that the file staff.csv is used as a source of data for a category of table data. The file contains the following data (see table below): Table 4. Contents of the csv file FIRST NAME LAST NAME JOB TITLE POSTAL CODE CITY Ivan Petrov manager Moscow John Smith developer SW3 London Otto Weber tester Berlin The following parameter values are used to create the category: Threshold value of columns = 3. Threshold value of rows = 2. A policy created based on this category is violated when the text of the scanned message is found to contain values from at least three columns (value of the Threshold value of columns parameter) in the same row, and at least two rows (value of the Threshold value of rows parameter). Here, different columns can be found in each one of the rows. A policy created on the basis of this category is violated if the text of the message being scanned is found to contain the following fragments: manager Ivan Petrov and developer John Smith Moscow Ivan tester Weber Berlin A policy created on the basis of this category is not violated if the text of the message being scanned is found to contain the following fragments: Ivan Petrov manager Moscow the text includes data from one table row only. Ivan John tester Otto manager developer the text includes data from two table rows only. CREATING AND EDITING A KEYWORD CATEGORY To create or edit a category based on keywords: 1. In the Administration Console tree, select the Categories and policies node. 2. Perform one of the following steps: To create a new category of keywords, click the New category button. Then select the Keywords item in the drop-down list. To edit an existing category based on keywords, select it in the list of categories and policies and click the Edit button. The Category settings window opens. This window lets you add keywords to a category and specify the category name. 3. Specify values for the following settings: Name. Name assigned to a category. 21

22 S E C U R I T Y O F F I C E R ' S G U I D E Keyword input field. This is a field for entering the keyword or expression according to which messages will be searched for certain text content. A keyword is a word or expression that has to be recognized by the application as confidential information that requires protection against leaks. Keywords are enclosed in quotation marks. By default, the list of keywords is not case-sensitive. Use the "!" character at the start of the keyword to make it case-sensitive. Example:!Kaspersky Lab The application will detect text content in which words in the "Kaspersky Lab" word combination begin with capital letters while the other letters are lower-case. The text where the case of characters in these words differs from the example (e.g. "kaspersky Lab", "kaspersky lab", or "KASPERSKY LAB") will be skipped. A key expression is one or several keywords joined by the operators AND, OR, NEAR, ONEAR. Use the AND operator to detect two or more keywords included in the text at the same time. The order in which the keywords are enumerated does not affect the search. Example: anti-virus AND security. The application will detect text content that includes the words anti-virus and security. Text content that includes only one of these two words will be skipped. Use the OR operator to detect one of the keywords or several keywords in the text. Example: security OR computer protection. The application will detect text content that includes the key word security or the expression computer protection or both. A line break character in an expression is also recognized as the OR operator. A keyword written in a new line is connected to the previous keyword using the OR operator that is not displayed expressly in this case. The NEAR operator is used to detect several keywords separated by several other words in text. Specify the number of words separating the keywords in brackets. Example: security NEAR(6) system. The application detects text content that includes the words security and system that are separated by no more than six words. Words can be separated by blank spaces, line break characters, tab characters, and other characters that are defined in Unicode specifications as blank space characters and punctuation marks. The ONEAR operator is used to detect several keywords separated by several other words in text and appearing in the order specified in the expression. Specify the number of words separating the keywords in brackets. Example: protection ONEAR(4) privacy. The application detects text content in which the word privacy follows the word protection and is separated from it by no more than four words. Words can be separated by blank spaces, line break characters, tab characters, and other characters that are defined in Unicode specifications as blank space characters and punctuation marks. You can create complex expressions that contain several operators. Use round brackets to specify the priority of operators in an expression. Example: (( technologies OR security ) ONEAR(0)!Kaspersky ) AND The application detects text content that includes the number 2014 and the word Kaspersky that immediately follows the word technologies or the word security. 22

23 M A N A G I N G C A T E G O R I E S Such expressions as term1 NEAR(n) ( term2 AND term3 ) and term1 NEAR(n) ( term2 NEAR(m) term3 ) are not supported. The result of processing of such expressions is unknown due to uncertainty that arises when the brackets are expanded. The combined length of expressions with keywords in all categories based on keywords may not exceed 480,000 characters. Comments. Additional information related to the data in this category. 4. Click OK to save the changes. The new or modified category of key terms appears in the list of categories and policies. DELETING A CATEGORY You can delete only custom categories. Kaspersky Lab categories cannot be deleted. To delete a category: 1. In the Administration Console tree, select the Categories and policies node. 2. In the list of categories and policies, select the category that you want to delete. 3. Click the Delete button. Confirm deletion in the window that opens. The selected category is deleted. Policies associated with this category are also deleted. Incidents created according to these policies are saved (see section Viewing the list of incidents on page 31). 23

24 MANAGING POLICIES This section provides instructions on creating, editing, and deleting DLP policies. IN THIS SECTION: Creating a policy Editing policy settings Configuring the delivery of policy violation notifications Deleting a policy Searching for policies associated with a specific user CREATING A POLICY Policies can be created on the basis of existing categories. An unlimited number of policies can be created on the basis of one category (see section "About DLP policies" on page 10). To create a policy: 1. In the Administration Console tree, select the Categories and policies node. 2. In the list of categories and policies, select the category based on which you want to create a policy. 3. Click the New policy button. The Policy Wizard starts. 4. Follow the instructions of the Wizard. Use the Back and Next buttons to navigate the windows of the Wizard. IN THIS SECTION: Step 1. Configuring general settings Step 2. Configuring the policy scope: senders Step 3. Configuring the policy scope: recipients Step 4. Configuring actions STEP 1. CONFIGURING GENERAL SETTINGS At this step, configure the general policy settings: Policy name. Name assigned to a policy. The default value is <Category name> New policy. You can change this value. Policies created on the basis of one category must have unique names. Policies created on the basis of different categories may have identical names. 24

25 M A N A G I N G P O L I C I E S Activate policy right after it is created. Participation of a policy in data leak prevention in accordance with its settings. If the check box is selected, a policy is activated when the Wizard finishes. The application applies the policy to messages and monitors them for data leaks according to the settings specified in the policy. If the check box is cleared, the policy remains inactive after the Wizard finishes and does not participate in data leak prevention. The check box is selected by default. Link to guidance document. Proceed to the next step of the Wizard. A link to a document with security requirements that the policy must conform to, or to an excerpt from this document. This field is optional and may be left blank. STEP 2. CONFIGURING THE POLICY SCOPE: SENDERS At this step, specify the message senders that make up the scope of the policy. The application applies the policy to outgoing messages that have been sent by these senders. Configure the following settings: Any internal users. The policy is applied to messages sent by any user that belongs to the company. This is the default option. Selected users or groups. The policy is applied to messages sent by company users enumerated in the list below. You can user accounts and user groups to the list or remove them using the and buttons. You can add only security groups of users to the list. Distribution groups cannot be added. Contact the administrator for additional information. If the list includes a group of users, the application applies the policy to outgoing messages sent by any users belonging to that group (and also to subgroups). The list is empty by default. Exclusions. The list contains user accounts and groups of user accounts belonging to the company whose messages are excluded from the policy. You can user accounts and user groups to the list or remove them using the and buttons. You can add only security groups of users to the list. Distribution groups cannot be added. Contact the administrator for additional information. If an exclusion has been specified as a group of users, the application does not apply the policy to outgoing messages sent by any users belonging to that group (and also to subgroups). The list is empty by default. Proceed to the next step of the Wizard. STEP 3. CONFIGURING THE POLICY SCOPE: RECIPIENTS At this step, specify the message recipients that make up the scope of the policy. The application applies the policy to outgoing messages that have been sent by these senders. 25

26 S E C U R I T Y O F F I C E R ' S G U I D E Configure the following settings: Any. The policy is applied to messages that are addressed to both users within the company and external recipients. This is the default option. External only. The policy is applied to messages addressed to recipients outside the company. Exclusions. The list contains user accounts, groups of user accounts, and addresses messages addressed to which are excluded from the policy. The following buttons are used to create the list: adds the address in mailbox@domain.com format specified in the entry field to the list. You may use masks, such as *@domain.com. adds a user account or group of user accounts belonging to the company to the list. You can add only security groups of users to the list. Distribution groups cannot be added. Contact the administrator for additional information. removes the selected record from the list. If an exclusion has been specified as a group of users, the application does not apply the policy to outgoing messages addressed to any users belonging to that group (and also to subgroups). The list is empty by default. Proceed to the next step of the Wizard. STEP 4. CONFIGURING ACTIONS At this step, define the actions that the application will take on messages violating the policy and specify the recipients to which the application will send policy violation notifications. To define the actions, configure the following settings: Delete the message. Deletes the message that caused a policy violation. If the check box is selected, the application deletes the message that violated the policy. A message is deleted if any part of the message (header, content, or any attachment) violates a policy. If the check box is cleared, the application skips the message without changes. Regardless of whether or not the check box is selected, when a policy is violated the application logs the event as a possible data leak and creates an incident. The check box is cleared by default. Create incidents with priority. Assessment of the danger of a potential data leak. This drop-down list lets you select the priority that the application assigns to an incident upon policy violation: Low, Medium, High. The priority reflects the degree of danger of policy violation and the urgency with which the incident must be processed. The default value is Low. 26

27 . M A N A G I N G P O L I C I E S Attach message to incident. A message copy is attached to incident information. If the check box is selected, the application attaches a copy of the message that caused a policy violation to incident information for subsequent analysis. If the check box is cleared, the application does not attach a message copy to incident information. The check box is selected by default. Record event to Windows Event Viewer. Adding of policy violation records to Windows Event Viewer. If the check box is selected, the application records the following policy violation event in Windows Event Viewer: Level=Warning; Source=KSCM8; Event ID= The event description contains information about the sender, the recipients, the message subject, about a violated policy and the associated category. Events about a policy violation may be useful if you use automated systems for collection and analysis of security events (SIEM, Security Information and Event Management) to monitor the state of the organization's information security. Using these events you can obtain topical information on incidents that arise when you are not using the Administration Console. If the check box is cleared, events are not recorded in Windows Event Viewer. The check box is cleared by default. To specify notification recipients, configure the following settings: To security officer. A policy violation notification is sent to the addresses of security officers. If the check box is selected, upon a policy violation the application sends a violation notification to the address(es) of security officers. The address or list of addresses of security officers must be specified in advance in the Data Leakage Prevention node. If the check box is cleared, the application does not send notifications to security officers. The check box is cleared by default. To violator. Delivery of a policy violation notification to the message sender. If the check box is selected, upon a policy violation the application sends a notification to the message sender with information about the violation. If the check box is cleared, the application does not send a notification to the message sender. The check box is cleared by default. To violator's manager. Delivery of a policy violation notification to the message sender's manager. If the check box is selected, upon a policy violation the application sends a notification to the message sender's manager with information about the violation. The application retrieves the address of the sender's manager from Active Directory. If the check box is cleared, the application does not send a notification to the message sender's manager. The check box is cleared by default. Additionally. Delivery of policy violation notifications to additional addresses. If the check box is selected, upon a policy violation the application sends a violation notification to the additional addresses specified in the entry field. 27

28 S E C U R I T Y O F F I C E R ' S G U I D E If the check box is cleared, the application does not send a notification to additional addresses. The check box is cleared by default. Entry field. List of additional addresses of notification recipients. Addresses in the list must be separated with a semicolon. The field is active if the Additionally check box is selected. This entry field is blank by default. To complete the Wizard, click the Finish button. EDITING POLICY SETTINGS To edit policy settings: 1. In the Administration Console tree, select the Categories and policies node. 2. In the list of categories and policies, select the policy whose settings you want to edit and click the Settings button. The Policy settings window opens. 3. Edit the settings appearing on the window tabs. The settings on the window tabs are identical to the settings in the Policy Wizard windows (see section "Creating a policy" on page 24). 4. Click OK to save the changes. CONFIGURING THE DELIVERY OF POLICY VIOLATION NOTIFICATIONS You can configure delivery of application violation notifications for each policy. Such notifications enable you and other concerned persons (such as administrators, managers, and other security officers) to learn about data leak threats in real time. Policy violation notifications contain the following information: Name of the violated policy. The name of the category based on which the incident has been generated. Message details: subject, sender's address, and list of addresses of recipients. Incident number, the date and time of incident generation. The context of violations, i.e. fragments of message text or attached document in which protected data was detected. Information about message removal, if the message has been removed by the policy. Policy violation notifications are sent via at the time when the policy is violated. Notification delivery is disabled in policy settings by default. 28

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.0.622 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide APPLICATION VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work and will provide

More information

Kaspersky Security Center 10 Web Console. User Guide

Kaspersky Security Center 10 Web Console. User Guide Kaspersky Security Center 10 Web Console User Guide Dear User, Thank you for your trust! We hope that this document will help you in your work and will provide answers regarding this software product.

More information

Kaspersky Administration Kit 8.0 GETTING STARTED

Kaspersky Administration Kit 8.0 GETTING STARTED Kaspersky Administration Kit 8.0 GETTING STARTED APPLICATION VERSION: 8.0 CRITICAL FIX 2 Dear User! Thank you for choosing our product. We hope that this document will help you in your work and will provide

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.1.746 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide APPLICATION VERSION: 8.0 MAINTENANCE PACK 2 Dear User, Thank you for choosing our product. We hope that this documentation will help you

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

USER GUIDE KASPERSKY MOBILE SECURITY 8.0

USER GUIDE KASPERSKY MOBILE SECURITY 8.0 USER GUIDE KASPERSKY MOBILE SECURITY 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

Kaspersky Mobile Security

Kaspersky Mobile Security Kaspersky Mobile Security User Guide Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

Kaspersky Endpoint Security 8 for Smartphone Implementation guide

Kaspersky Endpoint Security 8 for Smartphone Implementation guide Kaspersky Endpoint Security 8 for Smartphone Implementation guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will

More information

Kaspersky Security Center 10

Kaspersky Security Center 10 Kaspersky Security Center 10 Implementation Guide Application version: 10 Service Pack 2, Maintenance Release 1 Dear User, Thank you for your trust! We hope that this document will help you in your work

More information

Kaspersky Endpoint Security 10 for Mac

Kaspersky Endpoint Security 10 for Mac Kaspersky Endpoint Security 10 for Mac Administrator's Guide Application version: 10 Service Pack 1 Dear User, Thank you for choosing our product. We hope that this document will help you in your work

More information

Kaspersky Internet Security User Guide

Kaspersky Internet Security User Guide Kaspersky Internet Security User Guide APPLICATION VERSION: 15.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide

More information

Kaspersky Anti-Virus User Guide

Kaspersky Anti-Virus User Guide Kaspersky Anti-Virus User Guide APPLICATION VERSION: 14.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding this software

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

Kaspersky Embedded Systems Security

Kaspersky Embedded Systems Security Kaspersky Embedded Systems Security Administrator's Guide Application version: 2.2.0.605 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server Administrator's Guide Application version: 10.1.1.746 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document

More information

Small Office Security 2. Mail Anti-Virus

Small Office Security 2. Mail Anti-Virus Small Office Security 2 Mail Anti-Virus Table of content Table of content... 1 Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/Disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus...

More information

User Guide. Trade Finance Global. For customers using Guarantees. October nordea.com/cm OR tradefinance Name of document 5/8 2015/V1

User Guide. Trade Finance Global. For customers using Guarantees. October nordea.com/cm OR tradefinance Name of document 5/8 2015/V1 User Guide Trade Finance Global For customers using Guarantees October 2015 nordea.com/cm OR tradefinance Name of document 2015/V1 5/8 Table of Contents 1 Trade Finance Global (TFG) - Introduction... 4

More information

Internet Security Mail Anti-Virus

Internet Security Mail Anti-Virus Internet Security 2012 Mail Anti-Virus Table of Contents Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus... 2 Changing Mail

More information

Kaspersky Safe Browser. User Guide

Kaspersky Safe Browser. User Guide Kaspersky Safe Browser User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.

More information

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual GFI MailSecurity 2011 for Exchange/SMTP Administration & Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and

More information

Kaspersky PURE 2.0. Mail Anti-Virus: security levels

Kaspersky PURE 2.0. Mail Anti-Virus: security levels Mail Anti-Virus: security levels Content Mail Anti-Virus. Security levels... 2 Operation algorithm of Mail Anti-Virus... 2 Security levels of Mail Anti-Virus... 2 Customizing security level... 4 Creating

More information

KYOCERA Net Viewer User Guide

KYOCERA Net Viewer User Guide KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Administrator Manual

Administrator Manual Administrator Manual CURA Technical Support Email: cura_support@mindscope.com Phone: 1.888.322.2362 x 55 Administrator Manual Page 1 Table of Contents The Setup Module... 3 Skills... 3 Adding or Modifying

More information

Enterprise SM VOLUME 1, SECTION 5.7: SECURE MANAGED SERVICE

Enterprise SM VOLUME 1, SECTION 5.7: SECURE MANAGED  SERVICE VOLUME 1, SECTION 5.7: SECURE MANAGED EMAIL SERVICE 5.7 SECURE MANAGED EMAIL SERVICE (SMES) [C.2.10.8] The Level 3 Team s (SMES) will meet or exceed the Government s requirements for SMES, as defined in

More information

KYOCERA Net Viewer 5.3 User Guide

KYOCERA Net Viewer 5.3 User Guide KYOCERA Net Viewer. User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Centralized Policy, Virus, and Outbreak Quarantines

Centralized Policy, Virus, and Outbreak Quarantines Centralized Policy, Virus, and Outbreak Quarantines This chapter contains the following sections: Overview of Centralized Quarantines, page 1 Centralizing Policy, Virus, and Outbreak Quarantines, page

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Cover Page. Oracle Report Parser System Administration Guide 10g Release 3 ( ) March 2007

Cover Page. Oracle Report Parser System Administration Guide 10g Release 3 ( ) March 2007 Cover Page Oracle Report Parser System Administration Guide 10g Release 3 (10.1.3.3.0) March 2007 Oracle Report Parser System Administration Guide, 10g Release 3 (10.1.3.3.0) Copyright 2007, Oracle. All

More information

User Guide for TASKE Contact Web Interface

User Guide for TASKE Contact Web Interface User Guide for TASKE Contact Web Interface For Avaya Communication Manager with Application Enablement Services Version: 8.9 Date: 2011-06 This document is provided to you for informational purposes only.

More information

Introduction...4. Purpose...4 Scope...4 Manitoba ehealth Incident Management...4 Icons...4

Introduction...4. Purpose...4 Scope...4 Manitoba ehealth Incident Management...4 Icons...4 Remedy Incident Management Version 3.2 Modified: 08/24/2017 TABLE OF CONTENTS Introduction...4 Purpose...4 Scope...4 Manitoba ehealth Incident Management...4 Icons...4 Incident Stages Overview...5 Identification

More information

Introduction...5. Chapter 1. Installing System Installing Server and ELMA Designer... 7

Introduction...5. Chapter 1. Installing System Installing Server and ELMA Designer... 7 Chapter 1 Contents Installing System Contents Introduction...5 Chapter 1. Installing System... 6 1.1. Installing Server and ELMA Designer... 7 1.2. Verifying ELMA Server and ELMA Designer Installation...

More information

NETWRIX PASSWORD EXPIRATION NOTIFIER

NETWRIX PASSWORD EXPIRATION NOTIFIER NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

myreports User Guide A31003-P3010-U

myreports User Guide A31003-P3010-U myreports User Guide A31003-P3010-U107-17-7619 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001 and ISO14001 standards and are certified by

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

ACH Payments. User Guide

ACH Payments. User Guide ACH Payments User Guide Table of Contents Overview... 2 Supported SEC Codes... 2 Create Batch... 2 Creating a Free Form Batch... 3 Creating a Batch from a Template... 14 Manage Batch Templates... 21 Transaction

More information

4/27/2018 Blackbaud Internet Solutions 4.5 US 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted

4/27/2018 Blackbaud Internet Solutions 4.5  US 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted Email Guide 4/27/2018 Blackbaud Internet Solutions 4.5 Email US 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic,

More information

Release 9.1 now allows you to simplify the look and feel of commonly used forms.

Release 9.1 now allows you to simplify the look and feel of commonly used forms. Release 9.1 now allows you to simplify the look and feel of commonly used forms. 1 After completing this topic, you will be able to: Demonstrate how to edit forms and assign UI templates to users Describe

More information

THE ADMINISTRATOR'S GUIDE KASPERSKY SECURITY 6.0 FOR MICROSOFT EXCHANGE SERVER 2007

THE ADMINISTRATOR'S GUIDE KASPERSKY SECURITY 6.0 FOR MICROSOFT EXCHANGE SERVER 2007 THE ADMINISTRATOR'S GUIDE KASPERSKY SECURITY 6.0 FOR MICROSOFT EXCHANGE SERVER 2007 Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and answers your

More information

Oracle Cloud Using Oracle IoT Connected Worker Cloud Service

Oracle Cloud Using Oracle IoT Connected Worker Cloud Service Oracle Cloud Using Oracle IoT Connected Worker Cloud Service 17.4.5 E84369-02 December 2017 Oracle Cloud Using Oracle IoT Connected Worker Cloud Service, 17.4.5 E84369-02 Copyright 2017, Oracle and/or

More information

CONTENT PLAYER 9.6_CA_BBP_EN_1.0

CONTENT PLAYER 9.6_CA_BBP_EN_1.0 CONTENT PLAYER 9.6_CA_BBP_EN_1.0 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names

More information

MultiSite Suite: Accounts Payable

MultiSite Suite: Accounts Payable MultiSite Suite: Accounts Payable User s Manual version 6 Copyright & Trademarks Copyright Notice and Trademarks 2010 MultiSite Systems, All rights reserved. Microsoft, Windows, Excel, and Outlook are

More information

Condition Correlation

Condition Correlation Condition Correlation User Guide Document 5175 Notice This documentation (the "Documentation") and related computer software program (the "Software") (hereinafter collectively referred to as the "Product")

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Jackson Energy Authority 731.422.7500 INTRODUCTION Jackson Energy Authority ( JEA ) has formulated this Acceptable Use Policy ( AUP ), in order to set forth terms regarding the responsible

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice

More information

Kaspersky Administration Kit 8.0 REFERENCE GUIDE

Kaspersky Administration Kit 8.0 REFERENCE GUIDE Kaspersky Administration Kit 8.0 REFERENCE GUIDE P R O G R A M V E R S I O N : 8. 0 C R I T I C A L F I X 1 Dear User! Thank you for choosing our product. We hope that this documentation will help you

More information

Solar Eclipse Trackers, Logs, and Queues. Release 9.0.4

Solar Eclipse Trackers, Logs, and Queues. Release 9.0.4 Solar Eclipse Trackers, Logs, and Queues Release 9.0.4 i Table Of Contents Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents,

More information

Product Documentation SAP Business ByDesign February Marketing

Product Documentation SAP Business ByDesign February Marketing Product Documentation PUBLIC Marketing Table Of Contents 1 Marketing.... 5 2... 6 3 Business Background... 8 3.1 Target Groups and Campaign Management... 8 3.2 Lead Processing... 13 3.3 Opportunity Processing...

More information

Microsoft Office 2016 Mail Merge

Microsoft Office 2016 Mail Merge Microsoft Office 2016 Mail Merge Mail Merge Components In order to understand how mail merge works you need to examine the elements involved in the process. In any mail merge, you'll deal with three different

More information

Using Centralized Security Reporting

Using Centralized  Security Reporting This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the

More information

FSRM (File Server Resource Management)

FSRM (File Server Resource Management) 2012 FSRM (File Server Resource Management) Prepared By: Dharak Adroja Project Guide: Prof. Heera Bamaniya Acknowledgement I take this opportunity to express my indebtedness to all those who directly helped

More information

User Scripting April 14, 2018

User Scripting April 14, 2018 April 14, 2018 Copyright 2013, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and

More information

HIPAA AND SECURITY. For Healthcare Organizations

HIPAA AND  SECURITY. For Healthcare Organizations HIPAA AND EMAIL SECURITY For Healthcare Organizations Table of content Protecting patient information 03 Who is affected by HIPAA? 06 Why should healthcare 07 providers care? Email security & HIPPA 08

More information

Cisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007

Cisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007 Cisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007 Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Small Office Security 2. Scan PC for viruses and vulnerabilities

Small Office Security 2. Scan PC for viruses and vulnerabilities Small Office Security 2 Scan PC for viruses and vulnerabilities Table of content Table of content... 1 Scan PC for viruses... 2 What is Scan... 2 Starting scan... 2 Starting scan from the main application

More information

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems. BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.

More information

MultiSite Suite: General Ledger

MultiSite Suite: General Ledger MultiSite Suite: General Ledger User s Manual version 2.2.97 Copyright & Trademarks Copyright Notice and Trademarks 2003 by Brent Lawrence, LLC. All rights reserved. Reprinted and edited by MultiSite Systems,

More information

Workflow Templates in Compliance 360 Version 2018

Workflow Templates in Compliance 360 Version 2018 Workflow Templates in Compliance 360 Version 2018 Workflow Templates 5 Workflow Elements 6 Workflow Teams 6 Workflow Template Changes 6 Create or Edit a Workflow Template 8 Import and Export Workflow Templates

More information

Oracle. Sales Cloud Integrating with Oracle Marketing Cloud. Release 13 (update 18B)

Oracle. Sales Cloud Integrating with Oracle Marketing Cloud. Release 13 (update 18B) Oracle Sales Cloud Integrating with Oracle Marketing Cloud Release 13 (update 18B) Release 13 (update 18B) Part Number E94441-01 Copyright 2011-2018, Oracle and/or its affiliates. All rights reserved.

More information

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Document ID: 13-603114 Release 2.2 July 2008 Issue No.1 2008 Avaya Inc. All Rights Reserved. Notice While reasonable

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

GlobeNewswire. GlobeNewswire, User s Guide USER S GUIDE. Version: 1.16 Issued: By: Global Corporate Services 12/06/

GlobeNewswire. GlobeNewswire, User s Guide USER S GUIDE. Version: 1.16 Issued: By: Global Corporate Services 12/06/ GlobeNewswire USER S GUIDE Version: 1.16 Issued: 2011-06-12 By: Global Corporate Services 12/06/2011 1.16 1 (31) Table of Contents 1. INTRODUCTION... 4 1.1 Document Objectives... 4 1.2 Document conventions...

More information

Interstage Business Process Manager Analytics V12.0 Studio Guide

Interstage Business Process Manager Analytics V12.0 Studio Guide Interstage Business Process Manager Analytics V12.0 Studio Guide Windows/Linux January 2012 Studio Guide Trademarks Trademarks of other companies are used in this documentation only to identify particular

More information

Cisco TEO Adapter Guide for

Cisco TEO Adapter Guide for Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part

More information

MX Control Console. Administrative User Manual

MX Control Console. Administrative User Manual MX Control Console Administrative User Manual This Software and Related Documentation are proprietary to MX Logic, Inc. Copyright 2003 MX Logic, Inc. The information contained in this document is subject

More information

IBM Notes Client V9.0.1 Reference Guide

IBM Notes Client V9.0.1 Reference Guide IBM Notes Client V9.0.1 Reference Guide Revised 05/20/2016 1 Accessing the IBM Notes Client IBM Notes Client V9.0.1 Reference Guide From your desktop, double-click the IBM Notes icon. Logging in to the

More information

IaaS Configuration for Cloud Platforms

IaaS Configuration for Cloud Platforms vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009 Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009 Privacy Policy Intent: We recognize that privacy is an important issue, so we design and operate our services with

More information

Kaspersky PURE 2.0. Exclusions

Kaspersky PURE 2.0. Exclusions Exclusions Content Exclusions... 2 Trusted zone... 2 Creating the list of trusted applications... 3 Creating exclusion rules... 5 1 10 Exclusions Trusted zone Trusted zone is a list of objects created

More information

SECTION 5 USING STUDENT

SECTION 5 USING STUDENT SECTION 5 USING STUDENT EMAIL 5. USING STUDENT EMAIL On enrolling at the University all students automatically have an email account created. Account creation depends on a student successfully enrolling

More information

Sophos Enterprise Console help. Product version: 5.5

Sophos Enterprise Console help. Product version: 5.5 Sophos Enterprise Console help Product version: 5.5 Contents 1 About Sophos Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7 2.2 Toolbar buttons...7

More information

Sophos Enterprise Console

Sophos Enterprise Console Sophos Enterprise Console Help Product Version: 5.5 Contents About Sophos Enterprise Console...1 Guide to the Enterprise Console interface... 2 User interface layout... 2 Toolbar buttons...2 Dashboard

More information

Introducing the CSC SSM

Introducing the CSC SSM CHAPTER 1 This chapter introduces the Content Security and Control (CSC) Security Services Module (SSM), and includes the following sections: Overview, page 1-1 Features and Benefits, page 1-2 Available

More information

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) All customers should read this document. You are responsible for the policy written here, and your account WILL BE DISABLED WITHOUT WARNING

More information

WebStudio User Guide. OpenL Tablets BRMS Release 5.18

WebStudio User Guide. OpenL Tablets BRMS Release 5.18 WebStudio User Guide OpenL Tablets BRMS Release 5.18 Document number: TP_OpenL_WS_UG_3.2_LSh Revised: 07-12-2017 OpenL Tablets Documentation is licensed under a Creative Commons Attribution 3.0 United

More information

P6 Professional Reporting Guide Version 18

P6 Professional Reporting Guide Version 18 P6 Professional Reporting Guide Version 18 August 2018 Contents About the P6 Professional Reporting Guide... 7 Producing Reports and Graphics... 9 Report Basics... 9 Reporting features... 9 Report Wizard...

More information

KMnet Viewer. User Guide

KMnet Viewer. User Guide KMnet Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be

More information

SLA. Service Level Agreement v1.0. Published: September 2014

SLA. Service Level Agreement v1.0. Published: September 2014 SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because

More information

Kaspersky Anti-Virus 8.0 for Linux File Server

Kaspersky Anti-Virus 8.0 for Linux File Server Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide A P P L I C A T I O N V E R S I ON : 8. 0 MP 2 C F 4 Dear User! Thank you for choosing our product. We hope that this documentation will

More information

SAFETICA INSTALLATION MANUAL

SAFETICA INSTALLATION MANUAL SAFETICA INSTALLATION MANUAL SAFETICA INSTALLATION MANUAL for Safetica version 8.0.x Author: Safetica Technologies s.r.o. Safetica was developed by Safetica Technologies s.r.o. All rights reserved. No

More information

Citi Trade Portal Guarantees. InfoTrade tel

Citi Trade Portal Guarantees. InfoTrade tel Citi Trade Portal Guarantees InfoTrade tel. 0 801 258 369 infotrade@citi.com CitiDirect Technical Assistance tel. 0 801 343 978, +48 (22) 690 15 21 Monday Friday 8.00 17.00 helpdesk.ebs@citi.com www.citihandlowy.pl

More information

Contents INDEX...83

Contents INDEX...83 Email Guide 012511 Blackbaud NetCommunity 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including

More information

Sage What s New. March 2019

Sage What s New. March 2019 Sage 100 2019 What s New March 2019 2019 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos, and Sage product and service names mentioned herein are the trademarks of The Sage Group

More information

NETWRIX GROUP POLICY CHANGE REPORTER

NETWRIX GROUP POLICY CHANGE REPORTER NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

HIPAA Compliance & Privacy What You Need to Know Now

HIPAA  Compliance & Privacy What You Need to Know Now HIPAA Email Compliance & Privacy What You Need to Know Now Introduction The Health Insurance Portability and Accountability Act of 1996 (HIPAA) places a number of requirements on the healthcare industry

More information

Citi Trade Portal Collection. InfoTrade tel

Citi Trade Portal Collection. InfoTrade tel Citi Trade Portal Collection InfoTrade tel. 0 801 258 369 infotrade@citi.com CitiDirect Technical Assistance tel. 0 801 343 978, +48 (22) 690 15 21 Monday Friday 8.00 17.00 helpdesk.ebs@citi.com Table

More information

Cisco TEO Adapter Guide for Microsoft Windows

Cisco TEO Adapter Guide for Microsoft Windows Cisco TEO Adapter Guide for Microsoft Windows Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Getting Started with the Online Backup Software... 2 Installing the Online Backup Software... 2 Configuring a Device...

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

CCRS Quick Start Guide for Program Administrators. September Bank Handlowy w Warszawie S.A.

CCRS Quick Start Guide for Program Administrators. September Bank Handlowy w Warszawie S.A. CCRS Quick Start Guide for Program Administrators September 2017 www.citihandlowy.pl Bank Handlowy w Warszawie S.A. CitiManager Quick Start Guide for Program Administrators Table of Contents Table of Contents

More information

Workflow and Approvals Guide. For Document Manager Enterprise Edition

Workflow and Approvals Guide. For Document Manager Enterprise Edition Workflow and Approvals Guide For Document Manager Enterprise Edition 16 July 2013 Trademarks Document Manager and Document Manager Administration are trademarks of Document Logistix Ltd. TokOpen, TokAdmin,

More information

Panda Security. Protection. User s Manual. Protection. Version PM & Business Development Team

Panda Security.  Protection. User s Manual.  Protection. Version PM & Business Development Team Panda Security Email Protection Email Protection PM & Business Development Team User s Manual Version 4.3.2-2 1 Table of Contents Table of Contents... 2 1. Introduction to Email Protection... 3 2. Email

More information

Lexis Advance User Guide

Lexis Advance User Guide Lexis Advance User Guide Copyright 2013 LexisNexis. All rights reserved. Contents About Lexis Advance... 1 What is Lexis Advance?... 1 Searching with Lexis Advance... 2 What is a Lexis Advance search?...

More information

Administration guide. PRISMAdirect Configuration

Administration guide. PRISMAdirect Configuration Administration guide PRISMAdirect Configuration Copyright 2016, Océ All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in any form or by any means without written

More information

Financial Statement WalkThrough

Financial Statement WalkThrough WORKPAPERS CS Financial Statement WalkThrough version 2015.x.x TL 29655 (12/21/15) Copyright Information Text copyright 2009-2015 by Thomson Reuters. All rights reserved. Video display images copyright

More information

Administration Tools User Guide. Release April 2015

Administration Tools User Guide. Release April 2015 Administration Tools User Guide Release 6.2.5 April 2015 Administration Tools User Guide Release 6.2.5 April 2015 Part Number: E62969_05 Oracle Financial Services Software, Inc. 1900 Oracle Way Reston,

More information