Figure 1: Secure Exchange Reference Architecture

Size: px
Start display at page:

Download "Figure 1: Secure Exchange Reference Architecture"

Transcription

1

2 The Problem has become a vital communication tool for most businesses. Whether in the office or on the road, communicating internally or closing business with customers, users depend upon to get their jobs done. Due to the increase in popularity of as the preferred communication tool, the amount of traffic is increasing at a very rapid pace. Storing and managing this exponentially growing traffic can become a daunting task. Along with the growing traffic, the threat of virus and spam is also growing. It is extremely important to design a base messaging infrastructure that is secure, flexible and scalable to meet the availability needs of your organization while safeguarding against any security threats. What is Secure Exchange? Dell s Secure Exchange solution is a reference architecture based on industry standard components that can provide protection to businesses with the ability to scale to support the largest enterprise deployments. A Secure Exchange configuration can be tailored specifically to organizations needs and can give benefits in the following areas: Strengthen front-end security Facilitate regulatory compliance Simplify management of systems Reduce risk and complexity This approach enables organizations to pick the appropriate tools for different data center functions without being locked into proprietary technologies. Using this model, Dell has partnered with and collaborated closely with Symantec and Microsoft to provide secure, highly available, scalable Exchange messaging solutions. All the components of the reference architecture have been validated to ensure their interoperability. Figure 1: Secure Exchange Reference Architecture 1

3 Dell Dell s expertise has been relentlessly proven through millions of successful high-demand deployments. You ll get the industry s highest standard in Exchange services and mailbox management and through close collaboration with Symantec no other Exchange Server vendor can match Dell s proven, seamless integration with Symantec products. Symantec Enterprises need to keep their infrastructures operational 24x7. They need to be able to access information anytime and anywhere and that means that their critical systems must be on-line continuously. It is therefore imperative that they protect the physical systems, the operating environments, and the applications across all tiers of their infrastructure. They must protect a broad range of information types from to business documents to digital photos to audio and video files. They must also ensure that the interactions, the connections, the collaborative environments, and the movement of data while in use, are protected. An integral component of the Secure Exchange solution is the unique response infrastructure provided by Symantec. To keep ahead of the latest security and instant messaging threats, Symantec maintains threat detection and response centers located across the world. These focused and coordinated operations centers, part of Symantec Security Response, operate 24x7 and perform the following vital functions: Automatic real-time threat monitoring with the Probe Network. A key asset for Symantec Security Response is the Probe Network, an extensive array of over 2 million decoy addresses, also known as honey pots. This patented global network of accounts attracts and collects large quantities of spam and related threats tens of millions of spam messages pass through the Probe Network every day. Symantec uses these decoys to stay current with the very latest spamming tactics. Provide up-to-the-minute, round-the-clock, virus protection in the Symantec Mail Security products. Symantec employs the industry s largest team of experts who work to identify and neutralize viruses before they can enter the network and spread across the enterprise. Symantec Security Response provides swift, global response to virus outbreaks and proactive research on future threats. Enterprise Vault Awards (2007) Only leader in Gartners Magic Quadrant for Archiving 4th straight year Leader in Radicati s Archiving Vendors Market Quadrant Market Leader in IDC s Archiving Applications Symantec Mail Security (SMS) Awards and Catch Rates (2007) Leader in Gartners Magic Quadrant for Security 4th straight year InfoWorld s Technology of the Year Award for Best Antispam 3rd straight Year JupiterMedia s SeverWatch.com Product Excellence Award Anti Spam technology rated with a 97% catch rate and a 1 in 1 million critical false positive rate 2

4 Key components of Secure Exchange The key Symantec components of the Secure Exchange reference model are as follows: Symantec Enterprise Vault Symantec Enterprise Vault 2007 provides a software-based intelligent archiving platform that stores, manages, and enables discovery of corporate data from Exchange messaging systems. Enterprise Vault can use intelligent classification engines to manage and identify data, improving a company s ability to retain and protect corporate information while reducing storage costs and simplifying management. Enterprise Vault can also be used to simplify the end users management of their mailbox while eradicating.pst files and the users need to use them. Key Features Automatic Mailbox Management frees users from quota frustrations without compromising Exchange performance and reliability. Eliminates.pst headaches and removes the problems of backup, security, stability, and storage consumption inherent to these types of files. Centralized management of content ensures faster backup of Exchange servers and controlled recovery in the event of a disaster. Archiving enables the retrieval of content and corporate documents to meet legal and regulatory compliance requirements. Key Benefits Eliminate mailbox quotas and message size restrictions. Provide users with a mailbox of virtually unlimited size while controlling message storage growth. Migrate all existing.pst file data into the archive, enabling IT to effectively achieve.pst file eradication. Assist with and reduce the timescales associated with Exchange migrations by significantly reducing the size of the Exchange store by moving older messages into the archive. Speed up backup and restore times of Exchange server environments by reducing the online message store by 50 to 75 percent through archiving. Retain a copy of all messages sent and received, ensuring they are kept for the appropriate period of time to meet regulatory and legal retention requirements. 3

5 Symantec Mail Security for Microsoft Exchange Symantec Mail Security 6.0 for Microsoft Exchange provides high-performance, integrated mail protection against virus threats, spam, and security risks while enforcing internal policies on Microsoft Exchange servers. Symantec Premium Anti Spam add-on is available to provide best-of-breed spam prevention without additional on-going administration after initial setup. Key Features Advanced antivirus allows administrators to update antivirus definitions approximately every 30 minutes. Integrated content filtering with advanced policy rules and flexible user- and groupbased rules. Performance is significantly improved for faster real-time and mailbox scans and reduced load on the Exchange server. Intuitive user interface provides a consistent, high-performance administration experience. Key Benefits Defend against new and known viruses and security risks for superior virus protection that is backed by Symantec Security Response, the world s leading antivirus and Internet security research organization. Filter inappropriate content within most file formats and block files based on true file type (not just file extension) while preventing inappropriate communications. Intuitive user interface provides a consistent, high performance administration experience. Centralized management enables administrators to update settings of individual servers and groups of servers remotely. 4

6 Symantec Mail Security 8300 Appliance Symantec Mail Security 8300 Series appliances, powered by Dell hardware, feature integrated, best-of-breed antispam, antivirus, and content-filtering technologies that stop inbound and outbound -borne threats from negatively impacting productivity and compromising security. Key Features Premium Content Control add-on subscription helps organizations manage risks associated with data leakage, regulatory compliance (HIPAA, GLBA, PCI), and internal governance. Graphical message tracking enables administrators to easily determine the action taken on any processed by the appliance. Day Zero virus prevention reduces the risk of downtime by proactively detecting and quarantining suspicious attachments before official antivirus definitions become available. SMTP traffic shaping Over time, this feature evaluates sources and develops a record of their reputation for sending spam to your site. As the reputation record grows, Symantec Mail Security accepts fewer connections from those sources identified to be illegitimate, reducing the volume of spam received at your site and saving computing resources needed to filter spam messages. Firewall This early response feature improves message throughput by analyzing incoming SMTP connections, comparing them to Symantec s Reputation service data and industry-generated lists of known hostile senders and enabling you to refuse or defer connections from those hosts. Instant Messaging (IM) Protects your corporate network against external threats delivered via public IM networks, such as AIM, Yahoo and Google, from viruses, worms, and malicious URLs. Note: To protect enterprise Instant Messaging systems such as Microsoft Live Communication Server, or to archive IM conversations to Enterprise Vault, IM Manager, Symantec s market leading IM security solution should be considered. Key Benefits Provides content filtering capabilities, incident management and reporting which enable business users to easily and accurately define and implement compliance policies as well as analyze and manage violations. Allows messaging traffic to be scanned for regulatory compliance and content policy restrictions. Secures the infrastructure more effectively with zero day antivirus protection. Keeps the messaging infrastructure reliable and trouble-free by removing spam, spim, and malware before it reaches business critical servers. 5

7 Symantec Backup Exec for Windows Servers Backup Exec has supported Exchange since its introduction by Microsoft in 1996 and Windows Server operating systems since their introduction in Backup Exec delivers established experience and proven reliability in the Exchange Server market. With Backup Exec 11d and the Backup Exec Agent for Microsoft Exchange Server, Symantec is introducing two key new technologies for Exchange to address the problems with traditional Exchange backups: Granular Recovery Technology (GRT) Continuous Data Protection for Exchange Together, these technologies eliminate not only separate individual mailbox backups but also daily backups, along with Exchange protection management headaches. Symantec believes these technologies provide the fastest and most flexible way to protect and recover Exchange 2007 data. Key Benefits of Continuous Protection (Exchange) Eliminate daily backups Exchange is protected continuously Recover s, folders, and mailboxes in seconds using GRT Automatically truncate Exchange transaction logs for automated log growth control Provide complete disaster recovery of Exchange databases up to the latest transaction log Key Benefits of Granular Recovery Technology Features Recover s, folders, and mailboxes in seconds using GRT Eliminate separate, slow individual mailbox backups completely Perform fast single-pass backups of Exchange databases and still recover individual mailboxes, individual messages, and private and public folders Works with or without the need for recovery storage groups (RSGs) Cut backup time and storage in half by performing fast, single-pass Exchange database backups Reduce storage/media costs Enable granular recovery or complete database recovery of all Exchange data 6

8 Enterprise Vault Architecture The Enterprise Vault for Exchange archiving solution comprises of the following key components: Enterprise Vault Server The Enterprise Vault server provides the platform to archive data from Exchange, Store on suitable low cost media and index and respond to user action requests including search. The modular approach to Enterprise Vaults architecture means that a single EV server should be considered as a flexible building block of functionality that is easy to scale and modify at a later date should archiving requirements change Storage Array Enterprise Vault implements an open storage layer approach to virtualizing the storage medium with which it interacts meaning complete flexibility in choosing and changing the archive storage platform(s). EV can take advantage of DAS, NAS and SAN NTFS based storage as well as several native integrations with storage vendors like Dell and EMC. MS SQL Server Every item archived by Enterprise Vault is logged in a database hosted on one or more MS SQL servers. Additional metadata about the item is also stored to enable fast, efficient lookups on item location and properties. Figure 2: Enterprise Vault Architecture 7

9 Archiving Enterprise Vault uses an archiving agent (no installation required on the Exchange server) to access user mailboxes and based on an Age or Quota archiving strategy move older, less frequently accessed messages from the mailbox to the archive. Shortcuts to these messages are then left in the mailbox. The user can manipulate these shortcuts as if they were the original messages i.e. double click and the user will see the original message, reply and the original item is re-called before replying. Storage/Indexing All data archived from Exchange to Enterprise Vault is subject to compression and single instance storage to reduce the data s footprint on disk. This can often lead to greatly improved storage requirements as Enterprise Vault can maintain single instance across multiple Exchange stores and even servers. An HTML/Text conversion of the archive data is also created and stored and is used to build and maintain an AltaVista index from which the user can search and view their archive. Metadata regarding every archived item is also recorded in a SQL database to enable Enterprise Vault to locate the item at a later date. Clients User functionality is provided via a single, simple to install EV client installer (MSI). This installer extends the native Outlook functionality to provide full integration with Enterprise Vault. Opening, forwarding and replying to an archived message shortcut all result in the original message being recalled. Crucially this action of recall does not cause the original message to be restored into the users mailbox, rather the item is temporarily cached locally. Offline Vault For users accustomed to Outlook offline folders (or cached mode) Enterprise Vault provides a similar experience with its Offline Vault client module. Offline Vault gives users access to their archived content while disconnected from the network. Once connected to the network Offline Vault will initiate an intelligent synchronization with the Enterprise Vault server, keeping the offline cache up to date. Windows Desktop Search Offline Vault can be integrated to and allow Windows Desktop Search to search within its offline cache. The benefits to doing this are obvious as users can initiate a single universal search of their workstation files, Outlook messages and archived data. Archive Explorer For users who are used to browsing through messages rather than having to use a search page, Archive Explorer provides a rich explorer type view of the users archive. This structured view of the archive (similar to way Outlook presents items) allows users to browse, open, reply and forward archived messages directly from the archive. 8

10 Symantec Mail Security for Microsoft Exchange Architecture The Symantec Mail Security for Exchange solution comprises of the following key components: Symantec Mail Security Console The Mail Security console is a Windows application. The console lets you manage local and remote installations of Mail Security from a single computer. You can install and use the console on a computer on which Mail Security is not installed, this lets you manage Mail Security from a convenient location. The Symantec Mail Security for Exchange console can be configured to manage one or more Exchange servers. System administrators should use the multi-server console to manage multiple servers in the same Domain. Symantec Mail Security for Exchange Server In a typical configuration, Symantec Mail Security for Microsoft Exchange is installed on each Exchange server to scan all inbound, outbound, and internal sent to both public folders and private mailboxes. The product delivers the ability to inspect content while in transit, and while it is being accessed from the information store. Administrators can also conduct sweeps of information-store content on a scheduled or on-demand basis, using updated virus definitions. A constant background scan can also be employed to monitor the store, and proactively scan new messages and older messages that have not been scanned with the latest definitions. Figure 3: Symantec Mail Security Mail Flow 9

11 Symantec Mail Security 8300 Appliance Architecture The Symantec Mail Security 8300 appliance architecture comprises of the following key components: Symantec Mail Security Control Center The Symantec Mail Security architecture is managed by one Web-based Control Center interface. The Control Center provides information on the status of all Symantec Mail Security Scanners in your deployment, including system logs, message tracking events, and extensive customizable reports. Use the Control Center to configure both systemwide and host-specific details. The Control Center also hosts the Spam and Suspect Virus Quarantines to isolate and store spam and virus messages, respectively. End users can view their quarantined spam messages and set their preferences for language filtering and blocked and allowed senders. Alternatively, you can configure Spam Quarantine for administrator-only access. Messages which trigger content-based compliance policies are also held on the Control Center, in compliance folders. Symantec Mail Security Scanner The Symantec Mail Security Scanner operates at the outermost gateway layer and is responsible for processing incoming and outgoing and Instant Messaging traffic. To perform this function, the 8300 Series includes a powerful integrated Postfix-based Mail Transfer Agent and Instant Messaging proxy that provides the performance, security, and flexibility you need. Mail flowing through the appliance undergoes a number of processing layers. These layers include firewall checks based on the source or IP connection and reputation, antispam filtering using Symantec Brightmail technology, award-winning Symantec Antivirus protection, content compliance checks, and more. To protect against the latest and instant messaging threats, the scanner component is receiving real time automatic updates from Symantec Security Response. Figure 4: Symantec Mail Security (SMS) 8300 Architecture 10

12 Symantec Backup Exec 11d for Windows Servers Architecture Backup Exec 11d for Windows Servers comprises of the following key components: Backup Exec Media Server and Administration Console In Backup Exec, backup, restore, and utility operations, called jobs, are submitted using the Administration Console. Administrators can run the Administration Console from the media server (a Windows server with storage hardware attached) or from a remote system. After jobs are created, they are processed by the Backup Exec server components running on the media server. All interaction to the Backup Exec system, such as submitting jobs, viewing results, and performing device and media operations, can be done through the Administration Console. The media server contains media and device databases designed to simplify the process of organizing and allocating storage devices attached to your media server and to aid in preventing media from being accidentally overwritten. Through Backup Exec s device management functions, you can logically group storage devices together in device pools. Through the media management function, you can organize, track, and troubleshoot all of the media in your library. Continuous Protection Server Symantec Backup Exec Continuous Protection Server (CPS) software ensures that businesscritical data is always protected and always available. It combines proven Backup Exec data protection with replication technology and disk-based data protection to provide fast and reliable backups and restores. As a disk-based solution, data is protected in a continuous mode that provides granular restore from points in time throughout the day. It also enables simultaneous backups of multiple servers. CPS integrates with Symantec Backup Exec 11d for Windows Servers for traditional tape-based data protection, and delivers integrated management by Backup Exec SmartLink technology. Agent for Microsoft Exchange The Agent for Microsoft Exchange lets you integrate backups of Microsoft Exchange Server databases with network backups without separate administration or dedicated hardware. The Exchange Agent for Exchange 2007 installations provides the following features: Increased performance of mailbox backup and restore Continuous backup of the Exchange Server when Backup Exec Continuous Protection Server (CPS) is installed. The ability to select storage groups for backup and restore jobs The ability to recover individual databases or storage groups by using the Recovery Storage Group feature. Snapshot backup and off host backup on Exchange Server 2007 Figure 5: Exchange database backups using Symantec Backup Exec. 11

13 Using the Symantec Mail Security 8300 Appliance and Enterprise Vault to perform Intelligent Archiving This section of the document will describe how the Symantec Mail Security 8300 appliance can be used together with Enterprise Vault to help intelligently archive inbound and outbound messages and index and assign suitable retention categories based on message content or characteristics. Example Inbound messages As a sample inbound scenario, we ll assume our company, Beta, is doing some work with a third party company called Acme. There is an agreement between both companies that messages containing legal information transferred between the companies via will contain the string Legal: at the start of the subject line of the message. Our company also has a policy that any legal information sent from company Acme must be retained in the archive for a five year period rather than the default two year period. To assure these messages are retained for the correct period of time (without manual intervention) the following steps are followed: 1. A compliance policy is configured on the Symantec Mail Security (SMS) appliance to inspect incoming SMTP messages originating from users at the acme domain and containing the string Legal: in the Subject field. Any messages satisfying these requirements will have an x-header added called x-archive, with a value of Legal 2. The message gets delivered to a journaled recipient in MS Exchange. Exchange saves a copy of the message to the configured journal mailbox. 3. EV archives the message from the journal mailbox, and indexes the x-header information as part of the archiving process. An archive task filter inspects the x-header property tag called x-archive and assigns a different retention category based on the value. In this case an x-archive value of Legal means to use a legal retention category called Legal Messages (set to 5 years). 4. Administrators and Legal team members can now search Enterprise Vault for this item based on either its retention category or the value of the x-archive property as one or more of their search terms. 5. Enterprise Vault will retain and then expire the message from the archive based on the Legal Messages retention category (5 years from the date of archive). 12 Figure 6: Inbound Message Flow and Tagging

14 Example Outbound messages Our second scenario will demonstrate an outbound policy. We are going to assume that our accounting department in Acme, sends out weekly information to the bank in a file called weekly results.xls. The company wants to send a copy of these messages into a specific internal archive mailbox. When these messages are eventually archived by EV from this dedicated mailbox, we need to make sure these messages remain in the archive for a five year period rather than the default two year period. To ensure these messages are retained for the correct period of time (without manual intervention) the following steps are followed: 1. Define the Symantec Mail Security archive mailbox and host to be used when the archive action is defined in a compliance policy. 2. Populate the Classified or Restricted Premium Content Control dictionary with filenames that you may want to create content compliance policies against. In this case we will add the weekly results.xls filename to the list. 3. A compliance policy is configured on the Symantec Mail Security appliance to inspect outbound SMTP messages containing attachments listed in the Classified or Restricted Premium Content Control dictionary. The action to deliver the message normally, and archive (copy) the message adding an optional X-header with a value of bank is selected. 4. EV archives the message from the Symantec Mail Security archive mailbox, and indexes the x-header information as part of the archiving process. An archive task filter inspects the x-header property tag called x-archive and assigns a different retention category based on the value. In this case an x-archive value of bank means to use a financial legal retention category called Financial Messages (set to 5 years). 5. Administrators and Legal team members can now search Enterprise Vault for this item based on either its retention category or the value of the x-archive property as one or more of their search terms. Enterprise Vault will retain and then expire the message from the archive based on the Financial Messages retention category (5 years from the date of archive). Figure 7: Outbound Message Flow and Tagging 13

15 Hardware Sizing Enterprise Vault Sizing Sizing systems appropriately for deployment for Enterprise Vault requires careful examination of specific mailbox and journal archiving requirements and variables such as the number of messages per day per user to be archived. This is the most important variable from a sizing perspective. Other important variables include the average size of the messages and when and how often messages are archived. Often it is recommended to run Enterprise Vault archiving outside of core business (9am 5pm) to ensure impact on both the Exchange server(s) and end users is kept to a minimum. This is due to the archiving process moving data between the Exchange server(s) and Enterprise Vault requiring CPU cycles, Storage IOPS and network resources to achieve. By doing this work in the evening Symantec has found that often (due to the reduced user load outside of core hours) the Exchange server is actually less utilized than it would be during the day with no archiving occurring i.e. just user load. Evening archiving schedules hinge on there being enough of a window available for EV to do its work while not impinging on other Exchange related activities such as backup and maintenance periods. In summary the main contributing factors to understanding and sizing an Enterprise Vault solution are as follows: The amount of data that needs archiving: How much data represents the backlog? How much data will be archived from mailboxes each day? * The EV solution should provide sufficient capacity to archive these quantities of messages in a timely manner (see below). The times available to do the archiving: When is Exchange backed up? When is the maintenance period for Exchange? Does the backlog need clearing in a specific time scale? How much time would be available for archiving daily / weekly? * The EV solution should be sufficiently powerful enough to ensure the quantity of messages defined above can be archived in the defined time windows. The distribution of mailboxes across multiple Exchange servers: What version of Exchange are they running? How many mailboxes will be enabled for archiving? What is the split of mailboxes across the Exchange servers? How many of these Exchange servers are not on the LAN i.e. remote from EV? * The EV solution should cater for archiving from remote Exchange servers if necessary (hourly archiving rates may well be reduced for these remote servers due to network latency and bandwidth). 14

16 How these factors change over time: Annual increase in message volumes Annual increase in number of mailboxes * Providing an archiving solution that will scale with the needs of the customer is crucial. The solution should have sufficient capacity to allow for increases in both archiving and user load. What other EV components are on the EV servers: Mailbox, Public Folder, Journal and PST archiving? Discovery / Compliance Accelerator? * The EV solution should cater for the fact that perhaps more than one archiving module may be running concurrently. This effect can be minimized by choosing different archiving periods for the various types of archiving. Consider though, as an example, journal archiving where load is constant (and not scheduled) throughout the business day. What other 3rd party components are on the EV servers? Will EV share a server with SQL server? Anti-Virus / Backup Agents? * Any 3rd party components may place additional loads and requirements upon the EV servers. Particularly SQL server which in small implementations is fairly common to see it sharing the same server hardware as EV It should be noted that in most Enterprise Vault deployments catering for archiving for up to 2,000 users it would be unusual to require more than a single Enterprise Vault and SQL server from a hardware perspective. Additional requirements such as disaster recovery, high availability and multi sites network topologies can however change this. Recommended server specification for Enterprise Vault Dell PowerEdge x CPU 4GB RAM Local mirrored HDD (min. 70GB) Additional local or network Dell/EMC storage for storing archived data and indexes. 15

17 SMS 8300 Appliance Sizing When considering which SMS 8300 hardware to purchase some of the main factors that need to be considered are the number of messages that will be passing through the appliance daily, the percentage of the total mail volume that is spam, the number of peak messages per hour and the average message size. As a guideline, in a typical 2,000 user single site environment where 65% of the total mail volume is spam, the average message is 30 kilobytes, with an average of 9 messages per second during working hours, a peak of 14 per second, and where the average user is sending 40 messages per day and receiving 115 messages (before removal of spam) one SMS 8360 appliance acting as a Control Center and Scanner can be used to protect the environment. In a similar 1,000 user single site environment where 65% of the total mail volume is spam, the average message is 30 kilobytes, average messages per second is between 4 and 5 messages during working hours, peak messages per second is 7 messages, and where the average user is sending 40 messages per day and receiving 130 messages (before removal of spam) one SMS 8340 appliance acting as a Control Center and Scanner can be used to protect the environment. Multiple scanners are recommended for forecasting future mail usage, for instant messaging scanning, and for resiliency and load balancing purposes. A dedicated Control Centre may be required if reporting data and spam quarantine will hold information for periods longer than the defaults. 16

18 The Effect of enabling Journaling on MS Exchange Exchange journaling can be configured and enabled in such a way that it has a very minimal impact on the messaging environment. 5,500 Enterprise Vault customers can not all be wrong. Symantec can confirm that after many years of supporting Enterprise Vault they do not have a single recorded case of a customer enabling journaling and journal archiving that causes a significant or unreasonable performance degradation in their Exchange servers. Claims that enabling Exchange journaling causes between 25% and 35% additional overhead on an Exchange server are in fact a gross misrepresentation of the truth. The performance overheads are all in fact felt in disk I/O: Disk I/O The overhead journaling causes can for the most part be contributed to a potential increase in Disk I/O and not memory or CPU usage. This additional overhead in IOPS of enabling message journaling is between 4 and 8 percent when SAN storage is used for the Exchange databases and log files AND the journaling mailboxes are hosted on the same databases that are used for user mailboxes. SAN is the preferred storage platform for the majority of customers that have implemented Exchange. Load simulation tests that used storage area network (SAN) storage devices showed the following average disk I/O increases: Approximately 4 percent for database operations Approximately 8.25 percent for log file operations * These tests were performed by using the Loadsim program to simulate loads of between 1,000 users and 2,000 users. It should also be made very clear that I/O impact is only felt if the journal mailbox(es) are located on the same databases that host the user mailboxes. This is a very uncommon scenario as Microsoft best practice dictates that customers should have a dedicated database(s) or server(s) that host the journal mailboxes. This configuration means that the effect of journaling on the mailbox stores is virtually zero. The increased I/O will only be felt in the Journal store. 17

19 Enterprise Vault Best Practices Backup During an Enterprise Vault backup, a user or process must not add new data to Enterprise Vault because integrity would be lost between the databases, indexes, and vault stores. A backup (and thus restore) should represent one snapshot in the past to which you can revert or recover Enterprise Vault. To prevent any changes occurring during this backup period the user of Enterprise Vault read-only mode enables users to access archived messages from both Outlook and the search application but prevents any new data from being added. A backup of Enterprise Vault consists of a backup of the Vault Store partitions, the index partitions and all EV SQL databases (of which there will be multiple). Safety Copies The use of safety copies is highly recommended to help ensure the integrity of data being archived from users mailboxes before being removed from the Exchange information store. This feature works by marking any newly archived items in users mailboxes as Archive Pending. In this state the marked messages have been archived and can now be found in the archive but an Enterprise Vault backup has yet to occur. Once a backup run has completed, Enterprise Vault will convert each Pending message to a shortcut as defined in the mailbox archiving policy. By using the backup process as a flag to ensure data integrity Enterprise Vault can ensure that before any item is removed from the Exchange store it is safely stored and backed up within its data stores. More information on read-only mode, backing up Enterprise Vault and the use of safety copies can be found in the Enterprise Vault Administrators reference guide. Archive Timing Defining a suitable archiving schedule for Exchange user mailboxes can be a tricky business. There are many ways to approach this subject, however, listed below are 3 of the most common configurations: 1. Archive user mailboxes immediately after the Exchange backup has completed. This will most likely be out of hours and should complete before users arrive for work the following morning: Advantages Occurs out of hours and has minimal impact on users, Archiving will work at optimal speed as Exchange is in low utilization period. Disadvantages The Exchange backup and maintenance windows can often take all night leaving no room for an archiving window, A daily Enterprise Vault backup period would be required. 18

20 2. Archive mailboxes during the weekend only. The window allocated for archiving would need to be much larger however it will have very little impact on users during the business week. Advantages Occurs out of hours and has minimal impact on users, Archiving will occur at optimal speed as Exchange is in a low utilization period, Does not affect nightly Exchange backups during the week, Less Enterprise Vault backup windows required. Disadvantages Requires a much larger archive window at the weekend, User mailboxes can reach their quota limits and require archiving before the weekend. 3. Archive mailboxes during the business day but reduce the number of active archiving threads to reduce the impact of archiving on Exchange. This allows for day time archiving which can be the only option if Exchange maintenance windows take all night: Advantages Users will have their mailboxes actively maintained and archived during the day, Only option if Exchange maintenance windows take all night to complete, Leaves the overnight maintenance window for archiving other data sources such as User PST files. Disadvantages Can have an impact on Exchange particularly if the server(s) are already stretched for resource. Certification Symantec is constantly evolving the list of supported platforms, applications and service packs that work with Enterprise Vault. To ensure that the platforms and applications you wish to integrate with Enterprise Vault are supported and can be expected to function correctly, please download and view the Enterprise Vault Certification and Compatibility guide from the Symantec website. This guide is updated monthly with the latest certification and recommendations. Symantec Mail Security for Microsoft Exchange Best Practices Updating Definitions If you have Symantec AntiVirus Corporate Edition or Symantec Endpoint Protection installed on the same computer as Mail Security, as the two products can share definitions, configure the file system software to perform definition updates, and disable liveupdate from within the Mail Security for Exchange product. Also note that certain files and folders will need to be excluded from any file system antivirus scanning software. See the Microsoft for Exchange Implementation Guide for further details. Performance To enhance performance, enable background scanning of the message store during off-peak periods. 19

21 Symantec Mail Security 8300 Appliance Best Practices Deployment To get the best results from your Symantec Mail Security 8300 appliance it should be deployed directly at the gateway. This allows the appliance to obtain the physical or peer IP connection for an incoming message which is required to take advantage of the Traffic Shaping, Directory Harvest Attack, and Virus Attack Firewall technologies. Backup Regular backups of the Control Center should be taken in case of disaster. Ideally the option to back up to a remote FTP server should be used. If disaster occurs and a restore needs to be run, the Control Center needs to be running the same version of the software that was running when the backup being restored was taken. Also if a Control Center needs to be rebuilt or backed up to a different appliance, the new Control Center must be set up identically to the backed up Control Center in terms of IP address, hostname etc. Performance Retaining large amounts of quarantine, logging, and reporting data for long periods of time can affect Control Center performance: If Logging data is required for long periods of time, the option to enable remote logging to Syslog should be used. The Spam Quarantine is not designed to keep large amounts of spam for long periods of time. When planning to use the spam the quarantine an LDAP Authentication source should be setup and configured if possible so the Delete messages sent to unresolved addresses quarantine setting can be enabled. This setting will make sure spam addressed to non existent recipients is deleted before being inserted into the spam quarantine which saves valuable quarantine space. In terms of Reports, only enable extended Reporting that is required within your organization, in particular, the sender statistics usually consume a large amount of disk space. Also schedule reports regularly so report data doesn t need to be stored for long periods of time. 20

22 Enterprise Vault and Symantec Mail Security for Exchange Testing The primary focus of the yellow book testing was to determine the overall impact to Exchange server performance when either or both Symantec Enterprise Vault mailbox and journal archiving and SMS for Exchange security were deployed. The testing is aimed at showing what (if any) additional hardware requirements result from deploying the Symantec solutions. Performance testing with Microsoft LoadSim was used to simulate Exchange load similar to customer environments with between 1,000 and 2,000 mailboxes. EV and SMS were then additionally loaded and allowed to run on or against the Exchange server. The Server and Storage hardware used to conduct all of the Yellow Book tests were as follows: * All servers were running Windows 2003 server. Server Specifications Model Name: Dell PowerEdge Server PE1950 Processor: 3GHz Xeon (Dual Core) No. Processors: 2 Memory Size 8GB RAM Network Interface: Dual Embedded Gigabit NICs Internal Storage: 2 x 72GB HDD, 10K RPM Storage HBA: QLogic 2342 Dual Port 2Gb FC Model Name: Dell PowerEdge Server PE2950 Processor: 3GHz Xeon (Dual Core) No. Processors: 2 Memory Size 16GB RAM Network Interface: Dual Embedded Gigabit NICs Internal Storage: 2 x 146GB HDD, 10K RPM Storage HBA: QLogic 2342 Dual Port 2Gb FC Storage Specification Model Name: Dell/EMC CX300 SAN Disk Array No. Disks: 15 HDD: 146GB FC HDD, 10K RPM Front End Hosts 4 x 2Gb FC Ports 21

23 Network Topology The server hardware was deployed on a single Ethernet network segment each using a Gigabit NIC for network communication. The storage was provisioned over fibre to each of the servers using a dedicated fibre channel switch connected to the CX300 SAN. See Figure 8 for a high level network topology: Test Results Figure 8: Exchange, Enterprise Vault and Symantec Mail Security testing - Network Topology The results are split into 3 different testing categories: 1. Exchange baseline 2. Exchange + SMS 3. Exchange + SMS + EV Mailbox Archiving The testing for all three categories were conducted three times: once for 1,000 users, once for 1,500 users and once for 2,000 users. During each of the phases of testing the following metrics were captured from the Exchange server: Number of users CPU Utilization (Total %) Network Connection Utilization (Total MB) Disk IOPS (Store and logs combined) Disk MB/sec Disk Average Response Time (sec) Disk Maximum Response Time (sec) Disk % Reads Disk % Writes Memory Utilization (Total MB) 22

24 The following legend applies to all yellow book results: Table 1: 1,000 Exchange Mailboxes Table 2: 1,500 Exchange Mailboxes Table 3: 2,000 Exchange Mailboxes 23

25 By consolidating the results above it is possible to generate charts showing performance trends across three of the key measurements; CPU Utilization, Response Time and Disk IOPS. Chart 1: CPU Utilization during Testing Chart 2: Response Time (ms) during Testing 24 Chart 3: Disk IOPS during Testing

26 From these charts it is possible to deduce several observations: Introducing EV mailbox archiving to an Exchange server using a sensible and suitable archiving schedule e.g. archiving out side of core business hours, can have virtually no impact on Exchange performance during the day. The tests above were conducted using a full user load to simulate core hours for the Exchange baseline and Exchange + SMS tests and then during the Exchange + SMS + EV mailbox archiving a reduced user load was used to simulate a lower level of user activity i.e. typical evening (pm) server load. It is clear to see from the CPU utilization chart that with this reduced user load and SMS and Enterprise Vault mailbox archiving running on the Exchange server, for user amounts over 1,500 users, it is still not as busy as during the day (core business hours) running just user load. Enterprise Vault tends to impose a consistent load on the Exchange server regardless of the number of users. This is due to the archiving architecture it uses whereby it has a standard number of archiving threads on which to use. SMS for Exchange is slightly different in that it is designed to scan messages on demand and therefore has to be active during the day in order to maximize its value and effectively protect users. It can be seen from the charts above that even with SMS for Exchange running on the Exchange server during core hours the increase in load on the server is capped at approximately 10% (in the worst case), and is often much less (in the low single percentages). Both SMS and Enterprise Vault place an increased disk IOPS load on the Exchange server. This is to be expected as SMS must carry out extra checks on messages, quarantining items if necessary and EV will be moving hundreds of items between Exchange and the archive (depending on the archive policy) and only during its scheduled archive period. EV places the largest load on Exchange in terms of IOPS and this is mitigated by the fact it will be running out of hours and only during its scheduled archive period. SMS places much less of a load (approx. + 25%) and can therefore quite easily wok side by side with Exchange during the business day. Even with the extra load that either EV or SMS place on the number of disk IOPS the total requirement (as shown by the tables and charts) are miniscule when compared with the maximum IOPS throughput of most modern storage devices and certainly do not come close to the throughput possible from a CX300 SAN. For additional information regarding Secure Exchange or other Symantec products sold through Dell, please go to HYPERLINK \o exchange or contact your Dell Sales Representative 25

27

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email

More information

Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments

Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that

More information

Symantec Enterprise Solution Product Guide

Symantec Enterprise Solution Product Guide SOLUTION BRIEF: SYMANTEC ENTERPRISE SOLUTION PRODUCT GUIDE........................................ Symantec Enterprise Solution Product Guide Who should read this paper Businesses participating in the

More information

Continuous data protection. PowerVault DL Backup to Disk Appliance

Continuous data protection. PowerVault DL Backup to Disk Appliance Continuous data protection PowerVault DL Backup to Disk Appliance Current Situation The PowerVault DL Backup-to-Disk Appliance Powered by Symantec Backup Exec offers the industry s only fully integrated

More information

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what

More information

BraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!

BraindumpsIT.  BraindumpsIT - IT Certification Company provides Braindumps pdf! BraindumpsIT BraindumpsIT - IT Certification Company provides Braindumps pdf! Exam : 250-308 Title : Administration of Symantec Enterprise Vault 8.0 for Exchange Vendors : Symantec Version : DEMO Get Latest

More information

Dell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results

Dell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results Dell Fluid Data solutions Powerful self-optimized enterprise storage Dell Compellent Storage Center: Designed for business results The Dell difference: Efficiency designed to drive down your total cost

More information

Kunal Mahajan Microsoft Corporation

Kunal Mahajan Microsoft Corporation Kunal Mahajan Microsoft Corporation 65+ Million Customer hosted Mailboxes 30+ Million Partner hosted Mailboxes 1,800 Partners Strategic Business Challenges Our Sales teams need to connect with the right

More information

SaaS Flyer for Trend Micro

SaaS Flyer for Trend Micro SaaS Flyer for Trend Micro Prices Effective July 1, 2008 1 Internet Security 2008 Trend Micro Internet Security 2008 makes it easy to protect your home or small business network, personal identity, and

More information

Symantec Client Security. Integrated protection for network and remote clients.

Symantec Client Security. Integrated protection for network and remote clients. Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions

More information

Chapter 2 CommVault Data Management Concepts

Chapter 2 CommVault Data Management Concepts Chapter 2 CommVault Data Management Concepts 10 - CommVault Data Management Concepts The Simpana product suite offers a wide range of features and options to provide great flexibility in configuring and

More information

White Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft

White Paper. A System for  Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft White Paper Mimosa Systems, Inc. November 2007 A System for Email Archiving, Recovery, and Storage Optimization Mimosa NearPoint for Microsoft Exchange Server and EqualLogic PS Series Storage Arrays CONTENTS

More information

Product Line Guide Corporate Antimalware PLUS Network Visibility PLUS Systems Management

Product Line Guide Corporate Antimalware PLUS Network Visibility PLUS Systems Management Product Line Guide 2011 Corporate Antimalware PLUS Network Visibility PLUS Systems Management IT S YOUR BUSINESS. DEFEND IT. Today s business security solutions need to go beyond basic virus detection

More information

Executive Summary. Methodology:

Executive Summary. Methodology: Executive Summary The Data Archiving product/technology evaluation team began meeting in September 2014 and concluded work in March 2015. The team met approximately seven times during that period and compiled

More information

Symantec Multi-tier Protection

Symantec Multi-tier Protection Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,

More information

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS) Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized

More information

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

Symantec ST0-250 Exam

Symantec ST0-250 Exam Volume: 126 Questions Question No: 1 What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5? A. 80 GB B. 90 GB C. 160 GB D. 180 GB Answer: B Question

More information

QuickSpecs HP Archiving software for Microsoft Exchange 2.2

QuickSpecs HP  Archiving software for Microsoft Exchange 2.2 Overview HP Email Archiving software (EAs) for Microsoft Exchange is client software that integrates with HP Integrated Archive Platform (IAP) to help you mitigate business risks associated with legal

More information

Edge for All Business

Edge for All Business 1 Edge for All Business Datasheet Zynstra is designed and built for the edge the business-critical compute activity that takes place outside a large central datacenter, in branches, remote offices, or

More information

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today Agenda 1 Today s IT Challenges 2 Symantec s Collaborative Architecture 3 Symantec TM Endpoint Management Suite 4 Connecting Symantec Technologies Today 5 Q & A 1 Traditional Protection isn t Good Enough

More information

Dell Exchange 2007 Advisor and Representative Deployments

Dell Exchange 2007 Advisor and Representative Deployments Dell Exchange 2007 Advisor and Representative Deployments Product Group - Enterprise Dell White Paper By Farrukh Noman Bharath Vasudevan April 2007 Contents Executive Summary... 3 Introduction... 4 Dell

More information

NetVault Backup Client and Server Sizing Guide 3.0

NetVault Backup Client and Server Sizing Guide 3.0 NetVault Backup Client and Server Sizing Guide 3.0 Recommended hardware and storage configurations for NetVault Backup 12.x September 2018 Page 1 Table of Contents 1. Abstract... 3 2. Introduction... 3

More information

Overview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving

Overview of  Archiving. Cloud & IT Services for your Company. EagleMercury  Archiving EagleMercury Email Archiving Part of EagleMercury Security Collaboration Suite Assure compliance, speed ediscovery, and help protect your intellectual property Overview of Email Archiving EagleMercury

More information

Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET

Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET DATASHEET Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS Designed for disk, Symantec Backup Exec TM 10d for Windows Servers is the Gold Standard in Windows data protection. It provides comprehensive,

More information

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2

More information

NetVault Backup Client and Server Sizing Guide 2.1

NetVault Backup Client and Server Sizing Guide 2.1 NetVault Backup Client and Server Sizing Guide 2.1 Recommended hardware and storage configurations for NetVault Backup 10.x and 11.x September, 2017 Page 1 Table of Contents 1. Abstract... 3 2. Introduction...

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

EMC Backup and Recovery for Microsoft Exchange 2007 SP1. Enabled by EMC CLARiiON CX4-120, Replication Manager, and VMware ESX Server 3.

EMC Backup and Recovery for Microsoft Exchange 2007 SP1. Enabled by EMC CLARiiON CX4-120, Replication Manager, and VMware ESX Server 3. EMC Backup and Recovery for Microsoft Exchange 2007 SP1 Enabled by EMC CLARiiON CX4-120, Replication Manager, and VMware ESX Server 3.5 using iscsi Reference Architecture Copyright 2009 EMC Corporation.

More information

EXAM Administration of Symantec Enterprise Vault 10.0 for Exchange. Buy Full Product.

EXAM Administration of Symantec Enterprise Vault 10.0 for Exchange. Buy Full Product. Symantec EXAM - 250-310 Administration of Symantec Enterprise Vault 10.0 for Exchange Buy Full Product http://www.examskey.com/250-310.html Examskey Symantec 250-310 exam demo product is here for you to

More information

Content Addressed Storage (CAS)

Content Addressed Storage (CAS) Content Addressed Storage (CAS) Module 3.5 2006 EMC Corporation. All rights reserved. Content Addressed Storage (CAS) - 1 Content Addressed Storage (CAS) Upon completion of this module, you will be able

More information

QUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS

QUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS QUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS WORKING TOGETHER FOR THE COMMUNITY// F1 Solutions is committed to providing positive change in our community. That is why we offer more than a service, it

More information

EMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007

EMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007 Enterprise Solutions for Microsoft Exchange 2007 EMC CLARiiON CX3-40 Metropolitan Exchange Recovery (MER) for Exchange Server Enabled by MirrorView/S and Replication Manager Reference Architecture EMC

More information

Symantec Security.cloud

Symantec  Security.cloud Data Sheet: Messaging Security filters unwanted messages and protects mailboxes from targeted attacks. The service has selflearning capabilities and Symantec intelligence to deliver highly effective and

More information

Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage

Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage O V E R V I E W Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage Modular Hitachi Storage Delivers Enterprise-level Benefits Hitachi Adaptable Modular Storage and Hitachi Workgroup

More information

The professional IT management platform

The professional IT management platform The professional IT management platform Total Control of Your IT Infrastructure Whether you are administrating your own IT, or providing services to your clients, with ITbrain you amaze with proactivity.

More information

System Requirements - REST Professional v15.5

System Requirements - REST Professional v15.5 System Requirements - REST Professional v15.5 The following are minimum and recommended system requirements for REST Professional. Whilst the program will operate on the minimums listed, we strongly suggest

More information

EMC Business Continuity for Microsoft Applications

EMC Business Continuity for Microsoft Applications EMC Business Continuity for Microsoft Applications Enabled by EMC Celerra, EMC MirrorView/A, EMC Celerra Replicator, VMware Site Recovery Manager, and VMware vsphere 4 Copyright 2009 EMC Corporation. All

More information

Veritas Enterprise Vault 6.0 What s New

Veritas Enterprise Vault 6.0 What s New WHITE PAPER: ENTERPRISE SOLUTIONS Veritas Enterprise Vault 6.0 What s New A Review of the Latest Release of Veritas Enterprise Vault Software Now from Symantec White Paper: Symantec Enterprise Solutions

More information

Ryan KS office thesee

Ryan KS office thesee SERVERR and WORKSTATION REMOTE MANAGEMENT SERVICES Ryan Dental Systems Dental Computer Systems Support and Sales 303 2 nd Street, PO Box 194, Inland NE 68954 5506 SW 31stPh: 402-461-5575 Terrace Topeka

More information

WHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows

WHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows WHITE PAPER: ENTERPRISE SOLUTIONS Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows White Paper: Enterprise Security Disk-Based Data Protection Achieving Faster

More information

1 Quantum Corporation 1

1 Quantum Corporation 1 1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual

More information

Using Centralized Security Reporting

Using Centralized  Security Reporting This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the

More information

Don t just manage your documents. Mobilize them!

Don t just manage your documents. Mobilize them! Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.

More information

SonicWALL Security Software

SonicWALL  Security Software Email Security SonicWALL Email Security 7.2.4 Software System Compatibility SonicWALL Email Security 7.2.4 Software is supported on systems with the following: Operating Systems Windows 2003, SP2 Windows

More information

ST Symantec Enterprise Vault 8.0 Exchange (STS) Version 3.1

ST Symantec Enterprise Vault 8.0 Exchange (STS) Version 3.1 ST0-072 Symantec Enterprise Vault 8.0 Exchange (STS) Version 3.1 QUESTION NO: 1 What is an Enterprise Vault site? A. a SQL database for system-wide configuration B. a geographic configuration reference

More information

Hitachi Adaptable Modular Storage and Workgroup Modular Storage

Hitachi Adaptable Modular Storage and Workgroup Modular Storage O V E R V I E W Hitachi Adaptable Modular Storage and Workgroup Modular Storage Modular Hitachi Storage Delivers Enterprise-level Benefits Hitachi Data Systems Hitachi Adaptable Modular Storage and Workgroup

More information

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.

More information

Simplify Backups. Dell PowerVault DL2000 Family

Simplify Backups. Dell PowerVault DL2000 Family Simplify Backups Dell PowerVault DL2000 Family SIMPLIFYING I T The Dell PowerVault DL2000 family helps reduce the cost and complexity of backups and restores, freeing up valuable resources that you can

More information

12 Minute Guide to Archival Search

12 Minute Guide to  Archival Search X1 Technologies, Inc. 130 W. Union Street Pasadena, CA 91103 phone: 626.585.6900 fax: 626.535.2701 www.x1.com June 2008 Foreword Too many whitepapers spend too much time building up to the meat of the

More information

Solution Brief: Archiving with Harmonic Media Application Server and ProXplore

Solution Brief: Archiving with Harmonic Media Application Server and ProXplore Solution Brief: Archiving with Harmonic Media Application Server and ProXplore Summary Harmonic Media Application Server (MAS) provides management of content across the Harmonic server and storage infrastructure.

More information

Cisco s Appliance-based Content Security: IronPort and Web Security

Cisco s Appliance-based Content Security: IronPort  and Web Security Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.

More information

The Microsoft Large Mailbox Vision

The Microsoft Large Mailbox Vision WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes

More information

Exam : ST Title : Symantec Mail Security 8300 Series (STS) Version : Demo

Exam : ST Title : Symantec Mail Security 8300 Series (STS) Version : Demo Exam : ST0-030 Title : Symantec Mail Security 8300 Series (STS) Version : Demo 1. What is a key prerequisite for enabling the end-user Email Spam Quarantine feature? A. Selecting the 'Delete messages sent

More information

High Availability and Disaster Recovery features in Microsoft Exchange Server 2007 SP1

High Availability and Disaster Recovery features in Microsoft Exchange Server 2007 SP1 High Availability and Disaster Recovery features in Microsoft Exchange Server 2007 SP1 Product Group - Enterprise Dell White Paper By Farrukh Noman Ananda Sankaran April 2008 Contents Introduction... 3

More information

Evolved Backup and Recovery for the Enterprise

Evolved Backup and Recovery for the Enterprise Evolved Backup and Recovery for the Enterprise with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it will take a few minutes rather than

More information

EMC Integrated Infrastructure for VMware. Business Continuity

EMC Integrated Infrastructure for VMware. Business Continuity EMC Integrated Infrastructure for VMware Business Continuity Enabled by EMC Celerra and VMware vcenter Site Recovery Manager Reference Architecture Copyright 2009 EMC Corporation. All rights reserved.

More information

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations

More information

Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager

Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager White Paper Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager Author(s): Computer Associates International and Microsoft Corporation Published September 2005 Abstract

More information

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion CONTENTS 1. Introduction 2. How To Store Data 3. How To Access Data 4. Manage Data Storage 5. Benefits Of SAN 6. Conclusion 1. Introduction: A Storage Area Network (SAN) is a dedicated network that carries

More information

Office 365 Buyers Guide: Best Practices for Securing Office 365

Office 365 Buyers Guide: Best Practices for Securing Office 365 Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.

More information

EMC Virtual Infrastructure for Microsoft Exchange 2010 Enabled by EMC Symmetrix VMAX, VMware vsphere 4, and Replication Manager

EMC Virtual Infrastructure for Microsoft Exchange 2010 Enabled by EMC Symmetrix VMAX, VMware vsphere 4, and Replication Manager EMC Virtual Infrastructure for Microsoft Exchange 2010 Enabled by EMC Symmetrix VMAX, VMware vsphere 4, and Replication Manager Reference Architecture Copyright 2010 EMC Corporation. All rights reserved.

More information

Symantec Small Business Solutions

Symantec Small Business Solutions Symantec Small Business Solutions Protect All the Information That Drives Your Business Protect computers and information together with Symantec for a confident future. Full spectrum business protection

More information

Symantec Protection Suite Add-On for Hosted Security

Symantec Protection Suite Add-On for Hosted  Security Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money

More information

Enterprise Vault Overview Nedeljko Štefančić

Enterprise Vault Overview Nedeljko Štefančić Enterprise Vault Overview Nedeljko Štefančić 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered

More information

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps:// IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com Exam : ST0-250 Title : SymantecMessaging Gateway10.5Technical Assessment Version : DEMO 1 / 5 1.What is the

More information

HPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault

HPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault HPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault Solution overview and best practices for data preservation with Veritas Enterprise Vault Technical white paper Technical

More information

MESSAGING SECURITY GATEWAY. Solution overview

MESSAGING SECURITY GATEWAY. Solution overview MESSAGING SECURITY GATEWAY Solution overview April 2017 CONTENTS Executive Summary...3 The case for email protection and privacy... 3 Privacy in email communication... 3 LinkedIn Phishing Sample...4 Messaging

More information

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security

More information

VMware vsphere Clusters in Security Zones

VMware vsphere Clusters in Security Zones SOLUTION OVERVIEW VMware vsan VMware vsphere Clusters in Security Zones A security zone, also referred to as a DMZ," is a sub-network that is designed to provide tightly controlled connectivity to an organization

More information

Protecting Critical Human Services with the Symantec. security and availability solution.

Protecting Critical Human Services with the Symantec.  security and availability solution. Protecting Critical Human Services with the Symantec Email Security and Availability Solution Slowed by network downtime due to security incidents, turned to Symantec for a comprehensive email security

More information

Eight Tips for Better Archives. Eight Ways Cloudian Object Storage Benefits Archiving with Veritas Enterprise Vault

Eight Tips for Better  Archives. Eight Ways Cloudian Object Storage Benefits  Archiving with Veritas Enterprise Vault Eight Tips for Better Email Archives Eight Ways Cloudian Object Storage Benefits Email Archiving with Veritas Enterprise Vault Most organizations now manage terabytes, if not petabytes, of corporate and

More information

Symantec Exam Administration of Symantec Enterprise Vault 8.0 for Microsoft Exchange Version: 6.0 [ Total Questions: 265 ]

Symantec Exam Administration of Symantec Enterprise Vault 8.0 for Microsoft Exchange Version: 6.0 [ Total Questions: 265 ] s@lm@n Symantec Exam 250-307 Administration of Symantec Enterprise Vault 8.0 for Microsoft Exchange Version: 6.0 [ Total Questions: 265 ] Topic 1, Volume A Question No : 1 - (Topic 1) A network administrator

More information

Acronis Backup. Acronis, All rights reserved. Dual headquarters in Switzerland and Singapore. Dual headquarters in Switzerland and Singapore

Acronis Backup. Acronis, All rights reserved. Dual headquarters in Switzerland and Singapore. Dual headquarters in Switzerland and Singapore Acronis Backup 1 Acronis Backup Guards Against Modern Threats Cybercrimes will cost $6 trillion per year worldwide by 2021 50% of hard drives die within 5 years Keeps Business Running Data is growing 33

More information

IronPort X1000 Security System

IronPort X1000  Security System I r o n P o r t E M A I L S E C U R I T Y A P P L I A N C E S T H E U LT I M AT E E M A I L S E C U R I T Y S Y S T E M F O R T H E W O R L D S M O S T D E M A N D I N G N E T W O R K S. IronPort X1000

More information

Berdon Ledger Shows Net Gains in Productivity, Scalability Due to Symantec Security and Data Protection Solutions

Berdon Ledger Shows Net Gains in Productivity, Scalability Due to Symantec Security and Data Protection Solutions Berdon Ledger Shows Net Gains in Productivity, Scalability Due to Symantec Security and Data Protection Solutions With a huge volume of sensitive client information to protect, turned to Symantec to guard

More information

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary. Security Solutions Our security suite protects against email spam, viruses, web-based threats and spyware while delivering disaster recovery, giving you peace of mind so you can focus on what matters most:

More information

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information

More information

Installing Acronis Backup Advanced Edition

Installing Acronis Backup Advanced Edition 2015 Installing Acronis Backup Advanced Edition BEST PRACTISE Table of Contents Acronis Backup Advanced components... 4 Management Server... 4 Acronis Storage Node... 4 Agents / Appliance... 4 Bootable

More information

Centralized Policy, Virus, and Outbreak Quarantines

Centralized Policy, Virus, and Outbreak Quarantines Centralized Policy, Virus, and Outbreak Quarantines This chapter contains the following sections: Overview of Centralized Quarantines, page 1 Centralizing Policy, Virus, and Outbreak Quarantines, page

More information

vsan Security Zone Deployment First Published On: Last Updated On:

vsan Security Zone Deployment First Published On: Last Updated On: First Published On: 06-14-2017 Last Updated On: 11-20-2017 1 1. vsan Security Zone Deployment 1.1.Solution Overview Table of Contents 2 1. vsan Security Zone Deployment 3 1.1 Solution Overview VMware vsphere

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Backup and Recovery. Benefits. Introduction. Best-in-class offering. Easy-to-use Backup and Recovery solution

Backup and Recovery. Benefits. Introduction. Best-in-class offering. Easy-to-use Backup and Recovery solution DeltaV Distributed Control System Product Data Sheet Backup and Recovery Best-in-class offering Easy-to-use Backup and Recovery solution Data protection and disaster recovery in a single solution Scalable

More information

Exchange 2003 Archiving for Operational Efficiency

Exchange 2003 Archiving for Operational Efficiency Exchange 2003 Archiving for Operational Efficiency Enabled by EmailXtender Reference Architecture EMC Global Solutions Operations EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000

More information

Optimizing and Managing File Storage in Windows Environments

Optimizing and Managing File Storage in Windows Environments Optimizing and Managing File Storage in Windows Environments A Powerful Solution Based on Microsoft DFS and Virtual File Manager September 2006 TR-3511 Abstract The Microsoft Distributed File System (DFS)

More information

Key Features. DATA SHEET

Key Features.  DATA SHEET DATA SHEET Total Defense THREAT MANAGER r12 Overview: Total Defense Threat Manager r12 integrates anti-malware, groupware protection and network access control in one easy-touse solution, providing comprehensive

More information

Cloud Services. Introduction

Cloud Services. Introduction Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient

More information

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security

More information

Cisco Security Appliances

Cisco  Security Appliances Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate

More information

SvSAN Data Sheet - StorMagic

SvSAN Data Sheet - StorMagic SvSAN Data Sheet - StorMagic A Virtual SAN for distributed multi-site environments StorMagic SvSAN is a software storage solution that enables enterprises to eliminate downtime of business critical applications

More information

INTRODUCING VERITAS BACKUP EXEC SUITE

INTRODUCING VERITAS BACKUP EXEC SUITE INTRODUCING VERITAS BACKUP EXEC SUITE January 6, 2005 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Managing More Storage with Fewer Resources...3 VERITAS Backup Exec Suite...3 Continuous Data Protection...

More information

Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast

Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast City of Aurora Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast Fending off viruses and other malware was straining IT resources at the

More information

Table of Contents. User Guide

Table of Contents. User Guide Table of Contents Locate Laptop Laptop Tracking & Data Security 2 Feature: 2 Port Locker Stop Information & File Leaks 3 Feature 3 BitDefender Internet Security Secure Your Every Bit 3 Feature: 3 PROTEGENT

More information

Google Message Discovery

Google Message Discovery Google Message Discovery ABOUT GOOGLE APPS Google Apps is a suite of applications that includes Gmail, Google Calendar (shared calendaring), Google Talk (instant messaging and voice over IP), Google Docs

More information

Securing Data-at-Rest

Securing Data-at-Rest Securing Data-at-Rest Robert A. (Bob) Lockhart NeoScale Systems, Inc. 1655 McCarthy Blvd, Milpitas, CA 95035-7415 Phone:+1-408-473-1300 FAX: +1-408-473-1307 E-mail: rlockhart@neoscale.com Presented at

More information

What s new. James De Clercq (RealDolmen) Timothy Dewin (Veeam Software)

What s new. James De Clercq (RealDolmen) Timothy Dewin (Veeam Software) What s new James De Clercq (RealDolmen) Timothy Dewin (Veeam Software) http://teeam.eu Veeam One Veeam Management Pack Manage Manage Protect Protect Manage Veeam Protect Manage Availability Suite Veeam

More information

Microsoft Office SharePoint Server 2007

Microsoft Office SharePoint Server 2007 Microsoft Office SharePoint Server 2007 Enabled by EMC Celerra Unified Storage and Microsoft Hyper-V Reference Architecture Copyright 2010 EMC Corporation. All rights reserved. Published May, 2010 EMC

More information