CAMELOT Configuration Overview Step-by-Step

Size: px
Start display at page:

Download "CAMELOT Configuration Overview Step-by-Step"

Transcription

1 General Mode of Operation Page: 1 CAMELOT Configuration Overview Step-by-Step 1. General Mode of Operation CAMELOT consists basically of three analytic processes running in a row before the reaches the actual SMTP server. CAMELOT behaves like as an SMTP gateway that is visible as a gate to the outside world. It receives like a regular SMTP service, however, there is no immediate delivery of into a user's account. The SMTP gateway first checks the parameters of the current connection during the transaction and prevents the delivery to the mail server from messages sent by unwanted or undesired servers or addresses. The incoming traffic is then transferred directly to the CAMELOT security processor. Messages and attachments are then analyzed based on the pre-set rules in CAMELOT. This contains extensive verifications to identify unwanted and dangerous elements in the message such as computer viruses, unwanted text contents, worms, etc. The delivery to the actual mail server takes place only after the messages have passed a successful examination or analysis. This is handled by the CAMELOT SMTP Forwarder on the basis of pre set CAMELOT profiles. With CAMELOT each domain has the ability to have its own individual configurations. It does not matter if the mail server is sitting on the same machine as CAMELOT or somewhere else on a different machine within the WAN/Internet. CAMELOT Anti-Spam Firewall System Internet SMTP Gateway an Port 25 Security Service Anlagen-Filter Text-Filter Text-Classifier Virus-Scanner HTML-Cleaner Backup Disclaimer SMTP-Forwarder an Port 2525 SMTP Server an Port 2525 Another major feature is the CAMELOT POP3-Collector. This feature can retrieve from external POP3 servers and introduce them into the regular verification process of CAMELOT. accounts that reside on external servers (e.g., with an Internet provider) are easily integrated with CAMELOT and the local mail server system.

2 Installation Page: 2 2. Installation The CAMELOT installation wizard will install the software automatically on your system. All the necessary settings are pre-set and set-up automatically. The installed version is designed to account for a traditional mail server environment within a local network segment. Once the automatic installation is complete, in most cases, very few changes are required in order for CAMELOT to function correctly. The following descriptions below will attempt to identify the various CAMELOT components in more detail.

3 The Forwarders Page: 3 3. Forwarders A forward profile is used to forward the received messages to the actual mail server. The picture above shows that this feature is located at the end of the process chain. To integrate CAMELOT into a existing environment, a view from the back is much more useful. To setup a forward profile, please select the Forward dialog in the CAMELOT Configuration Utility and click on Add. The settings on this page are not very complicated. The most important things are Hostname/IP address and Port. Enter here the hostname or IP address of your mail server. The port filed must contain the port number used by your mail server to accept messages. Note: Normally the standard SMTP port is set to 25. But if CAMELOT is installed on the same machine (IP address) as the mail server, the value for the SMTP port must be changed. This is required because it is not possible to run multiple services on the same IP address and same port. Since CAMELOT is receiving all incoming mail, the port number 25 is assigned to the CAMELOT SMTP gateway and cannot longer be used by the mail server. So, you need to change the inbound port of your SMTP server to another value than 25 (e.g. 2525). You can use any port of choice, but remember to make the changes in you CAMELOT profiles too. The remaining settings for the forward profile contain additional rules for delivery and undeliverable messages, as well as login information to access the destination system. These functions are described in detail in the on-line help CAMELOT.

4 The Forwarders Page: 4 Usually only one forward profile is needed. If you use multiple mail servers for different domains, you need to setup a separate forward profile for each domain. Please note that one of these profiles must be the default profile. This is used when no assignment to a special profile is possible.

5 The Policies Page: 5 4. Policies All security rules in CAMELOT are defined by Policy Profiles. A policy profile describes exactly what kind of transactions are forbidden or allowed. The definition of multiple policy profiles allows the usage of different rules for different network segments or domains. A policy profile consists on the one hand of basic options to check transaction parameters and address lists (e.g. black and white lists) with unwanted and wanted host and addresses. On the other hand, it is defined by a number of content processors for detailed examinations of the message contents. The first step to a secure system is a secure SMTP connection. Not only message contents are part of the security concept, but also the addresses of originator and the sending host. A long year experience has shown that in the most cases of spam also the originator address is bad. Also spam sending mail systems work with wrong names. The dialog tab Envelope contains several options, to check the parameters of a SMTP transaction. A very important thing here are the settings for host and originator address. These options define the most effective way against SPAM, because the transaction will be canceled immediately when a bad parameter is detected. In this case, no data transaction will be done. The CAMELOT Setup Wizard automatically creates a default environment with two policy profiles. One of them is optimized for the local network and the other one for the rest of the world. The settings of these profiles are very different regarding the envelope set-

6 The Policies Page: 6 tings, because the parameters inside the local network are mostly correct. With additional features like authentication a kind of manipulation could be nearly ruled out. The setting at this point can be very different. Everyone needs to set the options regarding his own requirements. The options itself are described in detail in the CAMELOT Online Help. Note: The combination of these options can cause very different results. So, the settings are very different for each environment. All settings must be adjusted to your environment. Wrong settings can stop the whole traffic. Another solution to check server and originator addresses is the Address Lookup feature. With the help of black lists and white lists, special host names and addresses, as well as addresses can be denied or allowed explicitly. The management of these address lists is handled by data stores. The configuration of data stores is described in chapter 7. Data Stores. On the dialog tab Address Lookup, you can select a data store for each list category. The different areas differentiate between lists containing allowed and forbidden addresses. The data stores for host and addresses can be selected separately. Another difference is area of validity, global or user dependent. Global address lists are valid for the whole system. These list are usually managed by the administrator. User dependent lists are different for each user. These lists are managed by the user itself. This separation allows each user to set its own allowed or forbidden addresses.

7 The Policies Page: 7 The usage of lists with allowed addresses (while lists) can be very critical and must be handled with care. The addresses defined on white list have full access to the system. Messages received from such addresses will be handled with low security. If a address was found on a white list, no more examination will be processed. The usage of while lists is very reasonable to detect trusted mail systems and remove them from the default examination process. A inconsiderate usage of white list can cause a big hole in your security system. The dialog tab Content contains a list of defined processors for examination of message contents. You can select different components here to process after another in the process chain. The particular components work independent from each other. If one of the defined content processors detects a invalid message, it will automatically continue with its corresponding action. This allows you to define different action for different kinds of infections. A message containing a virus must handled in another way as a message with a unwanted word in the message text. The particular content processor features are described as follows:

8 Die Viren-Scanner Seite: Virus Scanner The Virus Scanner feature is a interface to a external Virus Scanner. The message will be separated into its parts and forwarded to the virus scanner application. Besides the simple command line scanners, it supports main stream third party products of well named vendors. If a virus infection is detected, the action defined on the dialog tab Action will be executed. Several kinds of further processing are available here. The message can be delivered on the regular way or deleted completely. Also the infected part can be remove and a hint for the recipient inserted in the message text. A detailed description about the other options can be found in the CAMELOT Online Help. The configuration for different actions is described in chapter 4.10 Actions as Result of Content Processing.

9 Der Anlagen-Filter Seite: Attachment Filter The most dangerous things in s are located mostly in attachments. Attachments contains often binary data like executable files or scripts. These files are not always detected by virus scanners, because many of them are no real viruses. Because of this reason, it is very important to remove dangerous attachments and store them on a safe place. This would also protect you against new or unknown viruses. The dialog tab Attachments contains a list with forbidden or allowed file masks. Also a maximum file size can be specified. This options allows to limit the filter processor to files with maximum size. All message bigger than the given value will be handled as invalid. The dialog tab Action contains the same options as virus scanner profile. Some actions here will also affect the whole message and some of them only the invalid parts. The definition of multiple attachments filters for different file types allows you to perform different actions for each file type. In this way, attachments with executable files can be stored in a different Quarantine Area as passive documents.

10 Der HTML-Cleaner Seite: HTML Cleaner The unwanted execution of dangerous program code on workstations is one of the biggest risks, caused by messages. Scripts in HTML messages or references to external internet pages are the most frequent reasons for that. The CAMELOT HTML Cleaner can detect such components in messages and remove them. The dialog tab HTML Settings offers a set of options to define how such messages should be handled. The corresponding action options for invalid messages are identical with the other filters from above and is described in detail in chapter 4.10 Actions as Result of Content Processing. Normally, it is not useful to delete the whole message in this case. Cleaning the found scripts or references is much more effective.

11 Der Textmuster Analysator Seite: Text Pattern Analyzer The Text Pattern Analyzer searches the messages text for known words and phrases to identify unwanted contents. Even advertising can be detected very often by special words. In the dialog Edit Text Pattern Analyzer, you can select the data stores to use with that filter. The data stores for global and user dependent data handling can be selected separately. The data stores contain tables with known text pattern, used to analyze the message text. The table data inside that data stores can be edited with the Edit Data Store feature. More information about data stores is available in chapter 7. Data Stores. The value for the number of matching conditions defines when the message is declared as invalid. The message is invalid when the given number of forbidden words or pharses was found in the message text. In this case, the predefined action will be executed. The action settings are similar to other components described before. Detailed information about action are available in chapter 4.10 Actions as result of Content Processing.

12 Die Bayes sche Text Klassifikation Seite: Bayesian Text classification Bayesian text classification is another feature to examine textual contents. The message text will be classified using the Bayesian Theorem for Conditional Probability. This feature is also based on existing data. However, the big advantage is the ability to learn. If a messages is declared as SPAM using the training feature, all other messages containing the same or similar contents can be also detected. In the Bayesian text classification dialog, you can select the data store to use. The dialog contains also feature to train existing message as SPAM or NOT SPAM. The Bayesian Data Manager Utility offers additional features to control the class data stores. This utility is very useful to keep the data stores clean and expand them with usable message data. Another way to train the Bayesian system given by special addresses for training. These addresses are defined in the domain section and can be set for each domain separately. A detailed description about Bayesian classification is available in the CAMELOT Online Help. Please read also the Understanding Bayesian Class Data guide. Note: The results of a Bayesian classification are never 100% unique. It describes only the probability for a special case. The result of a text pattern filter is always 100%, but it works only with known text patterns. The Bayesian classification also returns usable results for unknown contents.

13 Die Bayes sche Text Klassifikation Seite: 13 You should always use a text pattern analyzer first. This returns a exact result for all known words and phrases. The power of Bayesian classification is rather the processing of unknown contents..

14 Der Disclaimer Seite: Disclaimer The Disclaimer component does not filter anything. With the help of the feature, you can expand the message text with commercial or legal hints (Disclaimer). This hint text can be defined in the dialog Edit Disclaimer. Normally, CAMELOT uses special templates to generate this text, but you can also use regular text files. The usage of a disclaimer not reasonable for incoming messages, but for outgoing mails. A disclaimer item in the policy profile outgoing messages is a guarantee that all outgoing messages contain the disclaimer text. This is required by law in some countries. Detailed information about templates and other disclaimer options are available in the CAMELOT Online Help.

15 Weitere Leistungsmerkmale zur Inhalts-Verarbeitung Seite: Pornographic Image Analyzer The pornographic Image Analyzer searches for pornographic contents in images, using the skin tone method. This method detects shapes with skin like colors and rates them. The recognition of naked skin work quite reliable, but close-ups of faces can also end in a hit. The dialog tab Image Filter contains a list of file masks to handle by the processor. The Validation section contains additional options to set die minimum picture size or the minimum deviation of the detected skin tones. A bigger value causes more hits, but works less exactly. The minimum allowed score defines when the file must be rated invalid. The options on the dialog tab Action are identical with the components above. Some of the actions affect the whole message and some of them only the infected part.

16 Weitere Leistungsmerkmale zur Inhalts-Verarbeitung Seite: RFC822 Header Field Filter The header information of a message consist of fields defined RFC822. The RFC822 Header Field Filter checks the contents of these fields and executes the defined action if the filter condition matches with the fields contents. This feature allows you to manipulate the message delivery, because of special header information. All available header information can be checked with this filter, also custom field names. The different filter condition can be combined by AND and OR operations and arranged in hierarchic levels. The options for the corresponding action are described in earlier chapters. A detailed description of the particular options are available in the CAMELOT Online Help.

17 Weitere Leistungsmerkmale zur Inhalts-Verarbeitung Seite: Other Content Processing Features The Executable feature allows you to integrate external command line application into the CAMELOT process chain. CAMELOT calls the given application at the right place and continues the message handling based on its return values. CAMELOT also contains features for automatic backup and auto responders for predefined message responses. These features are also described in the CAMELOT Online Help.

18 Aktionen aufgrund der Inhalts-Überprüfung Seite: Actions as Result of Content Processing The performed action for invalid messages can be set on the dialog tab Action of the corresponding content processor profile. This allows to define different actions depending on the results of different content processors. The action Continue with regular message delivery does not change anything on the message itself. The message will be delivered in the same ways as valid messages are delivered. This feature is usable e.g. for HTML cleaner profiles. These profile do clean the message from unwanted contents. So, it can be forwarded on the regular way. The additional option Add the following prefix to subject line tags the message with the given word. So, if the subject line starts e.g. with the word [Spam], you can see in your mail client that the message was detected as a invalid message. Many mail client support filters to detect this and forward the messages to special folders. This guarantees a additional availability on the recipient side. The option Forward message to quarantine area stops the message delivery process. The message will be stored in the selected quarantine area and is available on the server side for the time as defined in the quarantine profile. More information about quarantine management can be found in the CAMELOT Online Help. Select the Delete whole message option, if you want to delete the whole message. Message delivery will not continue in this case. The message will no longer available. The action Delete invalid message part deletes only the parts from the message where invalid contents were found. This is very useful with attachment filters. The forbidden attachments will be removed from the message, but the message text will saved. If the Insert Annotation option is set, the system will put a special hint for the recipient into the message text that the part was removed. The different actions are available for all content processors described above, but the signification is very different. Deleting message parts is very useful for attachment filter or virus scanner profiles. With text patterns analyzer or Bayesian class profiles, the usage quarantine areas would be more reasonable. After the execution of a HTML clean, the regular delivery should be possible solution. The dialog tab Action offers also additional notification options. If a invalid message was found, the originator as well as the administrator can be notified automatically. If a fake undeliverable report will be sent to the originator, the originator thinks that the recipient address does no exist. This feature is useful to prevent mass mailing. Many spam mailers recognize such undeliverable reports and don not send messages to this address again. All return message and hint texts are defined by special templates. The available options for templates are described in detail in the CAMELOT Online Help.

19 Die Domänen Seite: Network Profiles Network Profiles are used to defined the different network segments, where incoming connections can originate from. Usually, there are at least two different network segments, the local area network and the rest of the world. Since the security policies for these areas are very different, the address range if each areas must be defined in a network profile. To create a network profile, please open the Network dialog. The Add button will create a new profile. The first network profile must describe the address range of the local area network. Here you must enter the network address and subnet mask of the local network segment into the Address/Subnet field. The permission must be set to Access allowed. The Access denied option ins only useful, if a special network area needs to be blocked explicit. On the second dialog tab Security, you can select the security policy to use. This policy (e.g. Local) defines all rules to be used for that network area. The rest of the options are described in detail in the CAMELOT Online Help.

20 Die Domänen Seite: 20 If your local network consists of multiple network segments, you need to define one network profile for each network area. This is also necessary for other trusted networks outside our local network, if special security rules are needed for these areas. The last profile must be the profile for the Rest of the world. This profile defines all network addresses not defined in other profiles. In this case, the Address/Subnet field needs to be set to All IP Addresses and the permission also must be Access allowed. The Policy must be set to the policy profile to use with that network profile. This is usually the default profile. Note: The processing of network profiles takes place from top down. Please take care that the profile for the rest of the world is always the last in the list. Otherwise, the other profiles cannot be assigned correctly.

21 Die Domänen Seite: Domains The handling of local domains is very different from external domains. If the originator and recipient domain is external, we have a case of Relaying. This case is usually not wanted, because nobody is interested in to provide external user with services. Because the system needs to detect that difference, all local domains must be defined. Open the Domain dialog and click on Add to create a new domain. The most important item here is the domain name itself. This makes the responsibility for the domain clear. If you have defined more than one Forwarder profiles for different domains, you can select here which forwarder should be used to deliver messages for the domain. Usually the default forwarder options works fine here.

22 Die Domänen Seite: 22 Furthermore, you can define here what policy profile should be used for that domain. By default, the policy does not change during the whole operation. So, the system will keep the same policy profile as already selected by the network profile. But, if this domain should be handled by special rules, you can select here the policy you want to use for this domain. The second dialog tab Network shows the available network profiles. Select here the network areas where the domain is allowed to sent messages from. If a domain sends messages from one of these network areas, no authentication is needed. If the domain send a message from any other area, the system will no accept it without successful authentication. The list of allowed aliases on the dialog tab Aliases contains all accepted aliases for this domain. This alias list is a extended security feature. All message addressed to aliases not on the list will be denied. This prevents unnecessary data transfer. Is the list id empty, all aliases will be accepted.

23 Die Domänen Seite: 23 A additional list with trusted aliases is located on the Exceptions tab. Incoming messages addressed to aliases on that list will not be processed by the security system. These messages will be forwarded immediately to the destination mail system. Since this feature can cause increased security risk, you should use it only in exceptional cases. The rest of the options are described in detail in the CAMELOT Online Help.

24 Die Datenpools Seite: Data Stores CAMELOT uses special profiles to access data lists (e.g. back host lists). These profiles define exactly where database is located and what type and origin the data has. Such a profile is named as Data Store. The usage of data stores allows you to integrate existing data sources into the CAMELOT security system. Since the system does not interact with the data source itself, you can edit the data store settings without to change any of the corresponding profiles (e.g. Policies). The data store profile differentiates basically between four data types, Hsot names and addresses, addresses, text patterns and Bayesian class data. All of these types can be global or user depended. Global data stores contain system wide data, handled independent from any user addresses. Also the type of data source is defined here and where the physical data source is located. This can be a simple file or a SQL database. The CAMELOT Setup Wizard creates all needed Profiles automatically. If you want to integrate existing data in CAMELOT,you need adapt the profiles to your personal needs. The usage of data stores is described in detail in the CAMELOT Online Help. Further information about the used database can be found in the documentation of the database system.

25 Die POP3-Profile Seite: POP3 Collectors The category POP3 Collectors is used to manage external POP3 accounts. These accounts are located on remote POP servers and can be queried automatically by the CAMELOT POP3 Collector. Messages received on this way will be forwarded to the regular message queue examination and will be forwarded by SMTP to the destination mail system after successful examination. With the help of a POP3 collector profile, messages can be collected from personal user accounts and forwarded to the corresponding user account on the local system. The actual advantage of the feature is the handling of shared POP2 accounts (Catch-All- Accounts). These accounts contain normally messages addresses to different recipients. The POP3 collector is forwarding these messages automatically to the respective recipient on the local system based on information of the message header. Click on the Add button on the Collectors dialog to create a new POP3 collector profile. The dialog tab Settings contains all the important information about the POP3 server. The hostname/ip address field, as well as the login name and password fields, define exactly where the messages should be collected from and how to authenticate at the remote system.

26 Die POP3-Profile Seite: 26 On the dialog tab Rules, you can set when the profile should be executed. A recurring interval is very useful here, but it should not be too short to prevent unnecessary traffic. The Policy option defines the security rules to use with messages collected by this POP3 profile. The Delivery option on the Options tab is used to set the kind of delivery inside the local system. If the collector profile works for a personal user account, you can specify here the destination address where all messages should be delivered too. If a shared POP3 account is used, you select here what header fields are used to determine the destination address automatically.

27 Die POP3-Profile Seite: 27 Note: Please note that the header fields To: and Cc. do not always contain usable information. These fields are not used for the delivery itself, but rather as information for the recipient. Even in redirected messages is this information not usable. Many mail system save the original envelope information in special header fields like X- Envelope-To. Please ask your administrator or ISP for the right fields to use. Wrong settings at this place can cause lost messages or multiple delivery.

28 Allgemeine Einstellungen Seite: Common Settings The Settings page in the CAMELOT Configuration Utility contains all basic application parameters. Some of the CAMELOT security features are based on DNS requests. This purpose requires a valid DNS server. Please enter this value into the Nameserver field on the SMTP Settings tab. In this area, you need also to specify the hostname of the local system. Please enter here the official name of the host, as defined in the DNS (e.g. mail.atrium-software.com). This name is used by the CAMELOT SMTP gateway to introduce itself against other mail systems. Since the CAMELOT SMTP Gateway acts as the official mail server, the name must be the same as the name of your actual mail server. On other settings pages, you can setup quarantine areas, templates, etc. A detailed description can be found in the CAMELOT Online Help.

Usage Guide to Handling of Bayesian Class Data

Usage Guide to Handling of Bayesian Class Data CAMELOT Security 2005 Page: 1 Usage Guide to Handling of Bayesian Class Data 1. Basics Classification of textual data became much more importance in the actual time. Reason for that is the strong increase

More information

Grapevine web hosting user manual. 12 August 2005

Grapevine web hosting user manual. 12 August 2005 Grapevine web hosting user manual 12 August 2005 Grapevine web hosting user manual 2 Contents Contents... 2 Introduction... 4 System features... 4 How it looks... 5 Main navigation... 5 Reports... 6 Web

More information

Ethical Hacking and. Version 6. Spamming

Ethical Hacking and. Version 6. Spamming Ethical Hacking and Countermeasures Version 6 Module XL Spamming News Source: http://www.nzherald.co.nz/ Module Objective This module will familiarize you with: Spamming Techniques used by Spammers How

More information

Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.

Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials. Email Defense Admin Panel Managing Spam The admin panel enables you to configure spam settings for messages. Tuning your spam settings can help you reduce the number of spam messages that get through to

More information

Franzes Francisco Manila IBM Domino Server Crash and Messaging

Franzes Francisco Manila IBM Domino Server Crash and Messaging Franzes Francisco Manila IBM Domino Server Crash and Messaging Topics to be discussed What is SPAM / email Spoofing? How to identify one? Anti-SPAM / Anti-email spoofing basic techniques Domino configurations

More information

Admin Guide Defense With Continuity

Admin Guide  Defense With Continuity Admin Guide Email Defense With Continuity DOCUMENT REVISION DATE: April, 2010 Email Defense with Continuity--Admin Guide / Table of Contents Page 2 of 41 Table of Contents QUICK STAR T CHECKLIST... 3 USE

More information

Web Mail and e-scout Instructions

Web Mail and e-scout Instructions Web Mail and e-scout Instructions To log into e-scout: visit our home page at www.greenhills.net, click on web mail at the top of the page OR click on the customer center tab and then the webmail button,

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

Comendo mail- & spamfence

Comendo mail- & spamfence Upgrade Guide Resellers Comendo mail- & spamfence VERSION 10-05-2016 TABLE OF CONTENTS INTRODUCTION... 3 OVERVIEW... 4 1. Preparation... 4 2. Provisioning... 4 3. Upgrade... 4 4. Finalisation... 4 COMPARISON...

More information

Understanding the Pipeline

Understanding the  Pipeline This chapter contains the following sections: Overview of the Email Pipeline, page 1 Email Pipeline Flows, page 2 Incoming / Receiving, page 4 Work Queue / Routing, page 6 Delivery, page 10 Overview of

More information

Protection Blocking. Inspection. Web-Based

Protection Blocking. Inspection. Web-Based Protection Blocking Inspection Web-Based Anti-Virus & removal of dangerous attachments. Prevent your server from being used as open-relay. Stop mail-loops. Blocks open relay sources. Isolate known spam

More information

How to Configure Office 365 for Inbound and Outbound Mail

How to Configure Office 365 for Inbound and Outbound Mail How to Configure Office 365 for Inbound and Outbound Mail You can configure Microsoft Office 365 with the Barracuda Email Security Service as your inbound and/or outbound mail gateway. If you make setting

More information

Tracking Messages

Tracking  Messages This chapter contains the following sections: Tracking Service Overview, page 1 Setting Up Centralized Message Tracking, page 2 Checking Message Tracking Data Availability, page 4 Searching for Email Messages,

More information

USER GUIDE. Accessing the User Interface. Login Page https://www.contentcatcher.com. Resetting your Password. Logging In

USER GUIDE. Accessing the User Interface. Login Page https://www.contentcatcher.com. Resetting your Password. Logging In USER GUIDE This guide walks through the user interface of ContentCatcher, and the features and parameters contained therein. Accessing the User Interface The ContentCatcher user interface is a secure web-based

More information

Contents. Limitations. Prerequisites. Configuration

Contents. Limitations. Prerequisites. Configuration Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically

More information

This manual is for administrative users of NetIntelligence MailFilter. The following two sections of this guide describe:

This manual is for administrative users of NetIntelligence MailFilter. The following two sections of this guide describe: Contents Contents... 2 1 Introduction... 3 1.1 About This Manual... 3 1.2 Technical Requirements... 3 2 Getting Started... 4 2.1 Logging in to the MailFilter Control Centre... 4 2.2 Layout of the Control

More information

Step 2 - Deploy Advanced Security for Exchange Server

Step 2 - Deploy Advanced  Security for Exchange Server Step 2 - Deploy Advanced Email Security for Exchange Server Step 1. Ensure Connectivity and Redundancy Open your firewall ports to allow the IP address ranges based on your Barracuda Email Security Service

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

Handling unwanted . What are the main sources of junk ?

Handling unwanted  . What are the main sources of junk  ? Handling unwanted email Philip Hazel Almost entirely based on a presentation by Brian Candler What are the main sources of junk email? Spam Unsolicited, bulk email Often fraudulent penis enlargement, lottery

More information

Symantec Hosted Mail Security Console and Spam Quarantine User s Guide

Symantec Hosted Mail Security Console and Spam Quarantine User s Guide Symantec Hosted Mail Security Console and Spam Quarantine User s Guide Copyright 2005 Symantec Corporation and/or its thirdparty licensors. All Rights Reserved. Document Version: RESTRICTION ON USE, PUBLICATION,

More information

Barracuda Security Gateway User 's Guide 6 and Above

Barracuda  Security Gateway User 's Guide 6 and Above Barracuda Email Security Gateway User 's Guide 6 and Above This guide describes how you can use the Barracuda Email Security Gateway web interface to: Check your quarantined messages Classify messages

More information

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections:

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections: This chapter contains the following sections: Message Tracking Overview, page 1 Enabling Message Tracking, page 1 Searching for Messages, page 2 Working with Message Tracking Search Results, page 4 Checking

More information

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO PineApp Mail Secure SOLUTION OVERVIEW David Feldman, CEO PineApp Mail Secure INTRODUCTION ABOUT CYBONET CORE EXPERIENCE PRODUCT LINES FACTS & FIGURES Leader Product Company Servicing Multiple Vertical

More information

Unit 7: Working with

Unit 7: Working with Unit 7: Working with Email Questions Covered What kinds of inbound and outbound email are possible in Agiloft? How do we configure the system to send outbound email and receive inbound email? Why set up

More information

Configuration Section

Configuration Section 8 Configuration Section MailCleaner can be easily customized to fit your needs and your working style. The Configuration menu contains six sections: Interface, Address groups, Address settings, Quarantine

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Internet Security Mail Anti-Virus

Internet Security Mail Anti-Virus Internet Security 2012 Mail Anti-Virus Table of Contents Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus... 2 Changing Mail

More information

FRISK Software International F-Prot AVES Managed Security Service

FRISK Software International F-Prot AVES Managed  Security Service FRISK Software International F-Prot AVES Managed E-mail Security Service WHITE PAPER Table of Contents 1. INTRODUCTION...1 2. WHY DEVELOP F-PROT AVES?...1 3. PRODUCT DESCRIPTION AND ANALYSIS...2 3.1. How

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define

More information

Using Centralized Security Reporting

Using Centralized  Security Reporting This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the

More information

Choic Anti-Spam Quick Start Guide

Choic Anti-Spam Quick Start Guide ChoiceMail Anti-Spam Quick Start Guide 2005 Version 3.x Welcome to ChoiceMail Welcome to ChoiceMail Enterprise, the most effective anti-spam protection available. This guide will show you how to set up

More information

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual GFI MailSecurity 2011 for Exchange/SMTP Administration & Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and

More information

Small Office Security 2. Mail Anti-Virus

Small Office Security 2. Mail Anti-Virus Small Office Security 2 Mail Anti-Virus Table of content Table of content... 1 Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/Disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus...

More information

How to Configure ATP in the HTTP Proxy

How to Configure ATP in the HTTP Proxy Configure when and which types of files are uploaded to the Barracuda ATP Cloud for traffic passing through the HTTP proxy service. Users will receive downloaded files immediately. When files with a risk

More information

You can find more information about the service at

You can find more information about the service at Introduction The purpose of this guide is to familiarize you with ExchangeDefender and walk you through the configuration, management and deployment of the service. ExchangeDefender is a transparent, cloud-based

More information

Comodo Unknown File Hunter Software Version 2.1

Comodo Unknown File Hunter Software Version 2.1 rat Comodo Unknown File Hunter Software Version 2.1 Administrator Guide Guide Version 2.1.061118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo

More information

Office 365 Standalone Security

Office 365 Standalone  Security The standalone Email Security option is available for purchase only through the Barracuda Self-Service Gateway or Barracuda MSP. Once you complete the Essentials for Office 365 Wizard, the Essentials page

More information

Introduction. Logging in. WebMail User Guide

Introduction. Logging in. WebMail User Guide Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks

More information

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Comodo Dome Antispam MSP Software Version 2.12 Comodo Comodo Dome Antispam MSP Software Version 2.12 User Guide Guide Version 2.12.111517 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

Barracuda Spam Firewall User's Guide 5.x

Barracuda Spam Firewall User's Guide 5.x This guide describes how you can check your quarantined messages, classify messages as spam and not spam, manage whitelisting and blocklisting email addresses, and modify your user preferences using the

More information

Binarytech Digital Education Karta Allahabad ( Notes)

Binarytech Digital Education Karta Allahabad ( Notes) Email Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people. E-Mail

More information

SMTP Scanner Creation

SMTP Scanner Creation SMTP Scanner Creation GWAVA4 Copyright 2009. GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com SMTP Scanner SMTP scanners allow the incoming and outgoing

More information

Eftel s Anti-Spam Manual

Eftel s Anti-Spam Manual Eftel s Anti-Spam Manual Page Table of contents 1 How to switch Eftel Anti-Spam and Anti-Virus service on.1 How to switch Eftel Anti-Spam and Anti-Virus service off 2 How to access the Anti-Spam Interface.2

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.

More information

Technical Note. FortiMail Best Practices Version 3.0 MR4.

Technical Note. FortiMail Best Practices Version 3.0 MR4. Technical Note FortiMail Best Practices Version 3.0 MR4 www.fortinet.com FortiMail Best Practices Technical Note Version 3.0 MR4 October 29, 2008 06-30004-0392-20081029 Copyright 2007 Fortinet, Inc. All

More information

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Adobe Marketing Using FTP and sftp with the Adobe Marketing Contents Using FTP and sftp with the Adobe Marketing...3 Setting Up FTP Accounts Hosted by Adobe...3 Classifications...3 Data Sources...4 Data

More information

DawnMailer Troubleshooting

DawnMailer Troubleshooting DawnMailer Troubleshooting DawnMailer Troubleshooting... 1 Setting Up DawnMailer: checklist... 2 Run-time Error 380 invalid property value.... 5 Error: -2146697210, the system cannot locate the object

More information

inetquery 2005 User Guide

inetquery 2005 User Guide User Guide Table of Contents Page: 2 Introduction... 4 License Agreement... 5 LICENSE AGREEMENT...5 LICENSE... 5 OTHER RESTRICTIONS... 5 LIMITED WARRANTY...5 DISCLAIMER OF DAMAGES... 5 System Requirements...

More information

IBM Express Managed Security Services for Security. Anti-Virus Administrator s Guide. Version 5.31

IBM Express Managed Security Services for  Security. Anti-Virus Administrator s Guide. Version 5.31 IBM Express Managed Security Services for Email Security Anti-Virus Administrator s Guide Version 5.31 Table of Contents 1. Service overview...3 1.1 Welcome... 3 1.2 Anti-Virus (AV) features... 3 1.3 How

More information

ISOCNET Quarantine. User s Guide

ISOCNET Quarantine. User s Guide ISOCNET Quarantine User s Guide Contents Logging in... 2 Password... 3 Successful Login... 3 1-Check Mail, Block Address/Domain, and Trust Address... 4 Check Mail... 4 Blocked Senders List... 4 Trusted

More information

Installation guide for Choic . Enterprise Edition. When Installing On The Same Server As: Microsoft s Exchange 2000 & 2003 Mail Servers

Installation guide for Choic . Enterprise Edition. When Installing On The Same Server As: Microsoft s Exchange 2000 & 2003 Mail Servers Installation guide for ChoiceMail Enterprise Edition When Installing On The Same Server As: Microsoft s Exchange 2000 & 2003 Mail Servers May, 2004 Version 2.5.2 Table of Contents Page Downloading and

More information

Dataprise Managed Anti-Spam Console

Dataprise Managed Anti-Spam Console Dataprise Managed Anti-Spam Console The easy-to-use solution for managing junk and virus-infected email. Use this guide to get started using your personal dashboard. # WinningWithIT What is the Personal

More information

Questionnaire 4.0 Setup Guide 2006/4/14

Questionnaire 4.0 Setup Guide 2006/4/14 Email Questionnaire 4.0 Setup Guide 2006/4/14 Introduction Email Questionnaire is an interactive email survey system. Unlike other on-line questionnaire systems that need a web server to construct, distribute

More information

The Multi Domain Administrator account can operate with Domain Administrator privileges on all associated Domain Administrator users.

The Multi Domain Administrator account can operate with Domain Administrator privileges on all associated Domain Administrator users. User Management Libra Esva users can manage and access the system. With Libra Esva you can enable per-user quarantine and the system will create user accounts to enable access to quarantine settings and

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

How does the Excalibur Technology SPAM & Virus Protection System work?

How does the Excalibur Technology SPAM & Virus Protection System work? How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

MOVE AntiVirus page-level reference

MOVE AntiVirus page-level reference McAfee MOVE AntiVirus 4.7.0 Interface Reference Guide (McAfee epolicy Orchestrator) MOVE AntiVirus page-level reference General page (Configuration tab) Allows you to configure your McAfee epo details,

More information

Configuring the Botnet Traffic Filter

Configuring the Botnet Traffic Filter CHAPTER 46 Malware is malicious software that is installed on an unknowing host. Malware that attempts network activity such as sending private data (passwords, credit card numbers, key strokes, or proprietary

More information

MX Control Console. Administrative User Manual

MX Control Console. Administrative User Manual MX Control Console Administrative User Manual This Software and Related Documentation are proprietary to MX Logic, Inc. Copyright 2003 MX Logic, Inc. The information contained in this document is subject

More information

Installation Guide For Choic . Enterprise Edition. When Installing On The Same Server As: Microsoft s Exchange 5.5 Mail Server

Installation Guide For Choic . Enterprise Edition. When Installing On The Same Server As: Microsoft s Exchange 5.5 Mail Server Installation Guide For ChoiceMail Enterprise Edition When Installing On The Same Server As: Microsoft s Exchange 5.5 Mail Server May, 2004 Version 2.5.2 Table of Contents Page Downloading and Running the

More information

Electronic Mail Paradigm

Electronic Mail Paradigm Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.

More information

Comodo APT Assessment Tool

Comodo APT Assessment Tool rat Comodo APT Assessment Tool Software Version 1.1 Administrator Guide Guide Version 1.1.102815 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo

More information

On the Surface. Security Datasheet. Security Datasheet

On the Surface.  Security Datasheet.  Security Datasheet Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

CUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING &

CUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING & Table of Contents CUSTOMER CONTROL PANEL... 2 LOGGING IN... 2 RESET YOUR PASSWORD... 2 DASHBOARD... 3 HOSTING & EMAIL... 4 WEB FORWARDING... 4 WEBSITE... 5 Usage... 5 Subdomains... 5 SSH Access... 6 File

More information

PineApp Mail Secure 5.1 User Manual

PineApp Mail Secure 5.1 User Manual PineApp Mail Secure 5.1 User Manual January 20, 2016 The information in this guide is furnished for informational use only, is subject to change without notice and should not be construed as a commitment

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2017 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

You should not have any other MX records for your domain name (subdomain MX records are OK).

You should not have any other MX records for your domain name (subdomain MX records are OK). Network Configuration In order to properly deploy ExchangeDefender, you need to make several changes on your network. First, you have to change your MX record to point all of your inbound mail to ExchangeDefender.

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.6.051117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...

More information

Malware, , Database Security

Malware,  , Database Security Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)

More information

Untitled Page. Help Documentation

Untitled Page. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Antispam Administration SmarterMail comes equipped with a number

More information

WEBSENSE PERSONAL MANAGER

WEBSENSE PERSONAL  MANAGER WEBSENSE PERSONAL EMAIL MANAGER Personal Email Manager is a facility for managing email that has been blocked by Websense Email Security. Websense Email Security filters email to protect you and your organization

More information

Internet Security: Firewall

Internet Security: Firewall Internet Security: Firewall What is a Firewall firewall = wall to protect against fire propagation More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits

More information

WebAdmin IceWarp WebAdmin Manual

WebAdmin IceWarp WebAdmin Manual WebAdmin IceWarp WebAdmin Manual WWW.ICEWARP.COM 1 WebClient WebAdmin User Manual Guide Contents About IceWarp WebAdmin Manual 3 1/ Login Page 4 2/ 4 Control bar 5 User Account Menu 5 Main Windows 6 Dashboard

More information

Introducing the CSC SSM

Introducing the CSC SSM CHAPTER 1 This chapter introduces the Content Security and Control (CSC) Security Services Module (SSM), and includes the following sections: Overview, page 1-1 Features and Benefits, page 1-2 Available

More information

WorldSecure/Mail Getting Started Guide

WorldSecure/Mail Getting Started Guide WorldSecure/Mail Getting Started Guide Release 4.3 012-0068-43 The software described in this document is furnished under license and may be used or copied only according to the terms of such license.

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 6.5 Copyright 2012. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

Comodo Antispam Gateway Software Version 2.11

Comodo Antispam Gateway Software Version 2.11 Comodo Antispam Gateway Software Version 2.11 User Guide Guide Version 2.11.041917 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Installing Cisco Unified CallConnector for Microsoft Dynamics CRM 3.0

Installing Cisco Unified CallConnector for Microsoft Dynamics CRM 3.0 Installing Cisco Unified CallConnector for Microsoft Dynamics CRM 3.0 This chapter describes how to install the Cisco Unified CallConnector for Microsoft Dynamics CRM 3.0 with the following software: Cisco

More information

Installation Manual. and User Guide

Installation Manual. and User Guide Installation Manual and User Guide ESET Mobile Antivirus For Windows Mobile Copyright 2009 by ESET, spol. s r. o. ESET Mobile Antivirus For Windows Mobile was developed by ESET, spol. s r.o. For more information

More information

Sophos Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017

Sophos  Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017 Sophos Email Appliance Configuration Guide Product Version 4.3 Sophos Limited 2017 ii Contents Sophos Email Appliance Contents 1 Copyrights and Trademarks...4 2 Setup and Configuration Guide...5 3 Product

More information

How to Configure ATP in the Firewall

How to Configure ATP in the Firewall Configure when and which types of files are uploaded to the Barracuda ATP Cloud. Files with a size is limited by the Large File Watermark of the virus scanner and the 8 MB upload limit for the ATP cloud,

More information

Kaspersky PURE 2.0. Mail Anti-Virus: security levels

Kaspersky PURE 2.0. Mail Anti-Virus: security levels Mail Anti-Virus: security levels Content Mail Anti-Virus. Security levels... 2 Operation algorithm of Mail Anti-Virus... 2 Security levels of Mail Anti-Virus... 2 Customizing security level... 4 Creating

More information

Admin Guide Boundary Defense for Anti-Virus & Anti-Spam

Admin Guide Boundary Defense for   Anti-Virus & Anti-Spam Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Release Date: March 16, 2007 This guide provides detailed description on configuration of the local network which

More information

FTP Service Reference

FTP Service Reference IceWarp Unified Communications Reference Version 11.4 Published on 2/9/2016 Contents... 3 About... 4 Reference... 5 General Tab... 5 Dialog... 6 FTP Site... 6 Users... 7 Groups... 11 Options... 14 Access...

More information

Features & Highlights

Features & Highlights Features & Highlights Easy handling. No training, no training, no manuals required. Online documentation available. Personalized emails. No mass shipments to hidden recipients, emails are sent individually.

More information

Table of Contents Control Panel Access... 1 Incoming... 6 Outgoing Archive Protection Report Whitelist / Blacklist...

Table of Contents Control Panel Access... 1 Incoming... 6 Outgoing Archive Protection Report Whitelist / Blacklist... User Guide Table of Contents Control Panel Access... 1 Access MxVault Control Panel... 2 Incoming... 6 Incoming Spam Quarantine... 7 Incoming Log Search... 9 Delivery Queue... 12 Report Non-Spam... 16

More information

How to Configure Esva for Office365

How to Configure Esva for Office365 How to Configure Esva for Office365 This article addresses configuring Office 365 with Libra Esva as your inbound and/or outbound mail gateway. You can specify the appliance as an inbound mail gateway

More information

Centralized Policy, Virus, and Outbreak Quarantines

Centralized Policy, Virus, and Outbreak Quarantines Centralized Policy, Virus, and Outbreak Quarantines This chapter contains the following sections: Overview of Centralized Quarantines, page 1 Centralizing Policy, Virus, and Outbreak Quarantines, page

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2006 Kerio Technologies. All Rights Reserved. Printing Date: May 3, 2006 This guide provides detailed description on configuration of the local network

More information

Installation Guide for 3.1.x

Installation Guide for 3.1.x CARETEND BI Installation Guide for 3.1.x TABLE OF CONTENTS DOCUMENT PURPOSE... 2 OVERVIEW... 2 PLATFORM COMPONENTS... 3 Rock-Pond BI Server... 3 CareTend BI Client Application... 3 ABOUT INSTANCES... 3

More information

Univention Corporate Server. Cyrus mail server

Univention Corporate Server. Cyrus mail server Univention Corporate Server Cyrus mail server 2 Table of Contents 1. Introduction... 4 2. Installation... 5 3. Management of the mail server data... 6 3.1. Management of mail domains... 6 3.2. Assignment

More information

Account Customer Portal Manual

Account Customer Portal Manual Account Customer Portal Manual Table of Contents Introduction Dashboard Section Reporting Section My Settings Section My Account Section Billing Section Help Section 2 4 7 15 20 25 27 1 Introduction SMTP

More information

WeCloud Security. Administrator's Guide

WeCloud  Security. Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security provides a variety of useful features within a user-friendly web console to manage the functions including

More information

Renovating our security management: New ways to protect your infrastructure

Renovating our security management: New ways to protect your infrastructure Renovating our security management: New ways to protect your infrastructure Suguru Yamaguchi Nara Institute of Science and Technology Japan Feb. 25th, 2004 APRICOT@KL, MY 1 Overview Discuss 2 topics about

More information

Symantec ST0-250 Exam

Symantec ST0-250 Exam Volume: 126 Questions Question No: 1 What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5? A. 80 GB B. 90 GB C. 160 GB D. 180 GB Answer: B Question

More information

Barracuda Security Service User Guide

Barracuda  Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses, worms, phishing, and denial of service attacks.

More information