Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7
|
|
- William Stafford
- 5 years ago
- Views:
Transcription
1 Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7
2 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. SYMANTEC CORPORATION PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU. Symantec Corporation 350 Ellis Street Mountain View, CA /12/2018
3 Blue Coat ProxySG First Steps Contents Solution: Create Custom Exception Pages 4 Set Services to Intercept 4 Design a Custom Exception Page 4 Install a Custom Exception Page 7 Create Policy for a Custom Exception Page 9 Test a Custom Exception Page 10 Exception Page Troubleshooting 11 Why are HTML tags displaying in my browser? 11 How can I view the exception page I created? 11 Why doesn't the content of my exception page display? 12 Why can't I delete my custom exceptions page? 12 3
4 Creating Custom Exception Pages Solution: Create Custom Exception Pages An exception page is an HTML page that appears in a user's web browser after the person has tried to access a website the company has blocked access. For example, if the company has a policy that blocks the Shopping URL category and a user attempts to go to amazon.com, an exception page displays instead of the Amazon website. The ProxySG offers built-in exception pages and allows you to create custom exception pages. The steps below are the tasks you need to perform in order to create custom exception pages. Steps 1. "Design a Custom Exception Page" below. 2. "Install a Custom Exception Page" on page "Create Policy for a Custom Exception Page" on page "Test a Custom Exception Page" on page 10. Set Services to Intercept In transparent ProxySG deployments, Internet applications aren't aware that the proxy is in the network, so the ProxySG has to monitor the ports used for their traffic. The most common ports are 80 (HTTP), 443 (HTTPS), and 1935 (RTMP). Any transparent traffic that doesn't have a proxy service set to intercept will pass through the proxy's interfaces unfiltered. For explicit proxy deployments, client browsers direct all traffic to the appliance on the same port, (typically 80 or 8080). When explicit traffic is intercepted, the appliance uses an advanced protocol detection method to identify the type of traffic (HTTP, HTTPS, RTMP, and so on) and handles it according to the standards for that traffic. Open the Proxy Services page (Configuration > Services > Proxy Services) and set the desired services to Intercept. Design a Custom Exception Page Exception pages are rendered in HTML.To design a custom exception page, you need to create an HTML page to display your customized exception message. The HTML page you design displays when users try to access content for which a blocking policy has been created. This topic discusses the process of designing your custom exception page using HTML code. 1. Copy the following HTML code. <!DOCTYPE html> <html> <head> <title>denied Access Policy </title> <meta name= "author" content = "Your Company Name Here" > <meta name="description" content = "Denied Access Policy" > <meta name="category" content = "$(exception.category)"> </head> 4
5 Blue Coat ProxySG First Steps <body> <center> <img src= " /><br> <p> <font face = "Arial, Helvetica, sans-serif" size = "4" color = "Red" ><b>you are about to access the internet from: Your Company Network </font><br> <font face= "Arial, Helvetica, sans-serif" size = "4" color = "Red">INTERNET USAGE IS MONITORED AND LOGGED.</font><br> <font face = "Arial, Helvetica, sans-serif" size = "3" color = "Red"><b>Your IP address: <!--$(client.address)--> <br>your username: Jane Smith <!-- $(user.name)--></b></font><br> <font face = "Arial, Helvetica, sans-serif" size = "4" color = "red" >YOU HAVE BEEN DENIED ACCESS TO THIS SITE. PLEASE READ OUR SECURITY POLICY AT: <front><br> <font face = "Arial, Helvetica, sans-serif" size = "4" color = "red" > This has been reported by: Your Proxy Name <!--$(proxy.name)--><font><br> For any comments <A href='mailto: YourCompany@example.com?subject=Barred web page <!--$(url)-->, IP address: <!--$(client.address)-->, User ID: <!-- $(user)-->' > Customer Service Center</a></font></a></font> </p> </center> </body> </html> Errors can occur if <Opening tags> are not followed by </Closing tags> resulting in the improper rendering of your exception page content. 2. Paste the copied HTML code into an HTML or text editor. Each tag is designed to hold a particular type of text and It's important that you use each tag according to that purpose. Below is a close up of each tag that needs to be modified to fit your exception page needs. a. Edit the title of the exception page by removing the text in between the opening and closing title tags, and replacing that text with the name of the exception page you are creating. <title> Exception Page Title </title>. b. Edit the meta data tags to represent your company name, and the name of the exception. <meta name = "author" content = "Your Company Name Here"> <meta name = "description" content = "Denied Access Policy"> c. Edit the image tag to include your company logo. <img src=" />. You can not download your company logo or other graphics on to the ProxySG. You can however, reference graphics from an externally hosted source, as shown in the above example. d. Edit the text between the opening and closing <font> tags to create your desired exception message. The font tags below display the body of your exception message. <font face = "Arial, Helvetica, sans-serif" size = "4" color = "Red" 5
6 Creating Custom Exception Pages ><b>you are about to access the Internet from the Your Company Network </font><br> <font face= "Arial, Helvetica, sans-serif" size = "4" color = "Red">INTERNET USAGE IS MONITORED AND LOGGED.</font><br> <font face = "Arial, Helvetica, sans-serif" size = "3" color = "Red"><b>Your IP address: <!--$(client.address)--> <br>your username: <!--$(user.name)--></b></font><br> <font face = "Arial, Helvetica, sans-serif" size = "4" color = "red" >YOU HAVE BEEN DENIED ACCESS TO THIS SITE. PLEASE READ OUR SECURITY POLICY AT <front><br> <font face = "Arial, Helvetica, sans-serif" size = "4" color = "red" > This has been reported by <!--$(proxy.name)-><font><br> For any comments <A href='mailto:yourcompany@example.com?subject=barred web page <!-- $(url)-->, IP address: <!--$(client.address)-->, User ID: <!--$(user)-- >' > Customer Service Center</a></font></a></font> When you encounter a variable name such as $(client.address) enclosed in a comment such as: <!--$(client.address)--> You can remove the comments so that the content displays the information contained in the variable. You can delete them if you do not intend on ever displaying the information. e. Edit the font tag itself to change the font type, size and color. For example, to change the size of the font to 7, you need to change the attribute, from size = "3" to size = "7". Each attribute s value must be surrounded in quotes otherwise the HTML does not render as desired. <font face="arial, Helvetica, sans-serif" size="3" color="red"><b> Your IP address: $(client.address) <br> Your username: $(user.name)</b> </font><br> 3. Save the file with the.html file extension. Substitution variables are predefined variables that can be included in your exception page. These variables, when referenced in your HTML code, display the values of the variables when the exception page is displayed to the user. The most commonly used substitution variables are listed below. Variable Description $(exception.category) The category of the requested URL $(user) The name of the requester $(url.host) The requested URL's host name portion $(proxy.name) The name of the ProxySG $(client.address) The IP address of the client A full list of variables can be found in the CPL guide, Appendix D. 6
7 Blue Coat ProxySG First Steps Install a Custom Exception Page Before you begin this step, be sure that you have completed the steps in the topic "Design a Custom Exception Page" on page 4. Use the command line interface to install the custom exceptions page you created. 1. Use a remote login utility (such as Putty) to access the command line interface. 2. Enter the following CLI commands: SG# enable Enable Password: SG# conf t SG#(config) exceptions SG#(config exceptions) create my_exception ok SG#(config exceptions) edit my_exception SG#(config exceptions user-defined.my_exception) inline format EOF 3. Copy the code from your HTML file and paste that code into the command line. 4. After you have pasted in the HTML code, type EOF to signal the end of your code. ok Once you have entered your CLI commands and HTML code in to the CLI, your screen should be similar to the following example. 7
8 Creating Custom Exception Pages 5. Assign an HTTP response status code to your custom exception page by entering the following command: SG#(config exceptions user-defined.my_exception) http-code <code#> ok where <code#> is one of the following HTTP status codes: 302, 307, 403. (403 is probably the most common when creating policy for blocked URL categories.) Status Code Description 302 The requested URL was temporarily changed but the same URL should be used in the future. 307 The URL was temporarily moved. The new URL should be given. 403 Access forbidden. 8
9 Blue Coat ProxySG First Steps Create Policy for a Custom Exception Page To reference the custom exceptions page you have created, you need to create policy. By creating policy, you instruct the ProxySG how to handle the exceptions being processed. 1. Log in to the ProxySG Management Console. 2. Open the Visual Policy Manager. a. Select Configuration > Policy > Visual Policy Manager. b. Click Launch. The VPM opens in a new window. 3. Select Policy > Add Web Access Layer. 4. In the Add New Layer pop-up dialog, enter a name for the Web Access layer and click OK. 5. To define the action that returns your custom exception, right-click the Action column and select Set. The Set Action Object dialog opens. 6. Select New > Return Exception from the Set Action Object dialog. The Add Return Exception Object dialog opens. 7. Select User-defined exception in the Add Return Exception Object dialog. 8. Select the custom exception you created from the User-defined exception drop-down list. 9
10 Creating Custom Exception Pages If the custom page is not on the list, you may need to log out of the ProxySG Management Console and then log back in to get the field to populate. 9. Click OK and click OK again. 10. Install the policy. 11. Close the Visual Policy Manager. Test a Custom Exception Page To test your custom exception page, go to a URL denied by your policy. For example, if the Shopping category is blocked, go to amazon.com. You should see the custom exceptions page you created. 10
11 Blue Coat ProxySG First Steps Exception Page Troubleshooting Why are HTML tags displaying in my browser? 11 How can I view the exception page I created? 11 Why doesn't the content of my exception page display? 12 Why can't I delete my custom exceptions page? 12 Why are HTML tags displaying in my browser? Problem: When I click "View Sample HTML," from the Management Console, my content displays but fragments of HTML tags mistakenly display as well. Resolution: When you code HTML, all tags and characters must have opening and closing characters to match. For example, every <opening tag> must have a matching </closing tag>. Similarly, all "" and <> need to be properly opened and closed. If you do not do this, HTML renders improperly in various ways. Colors may not display correctly, a blank page may display or images may appear broken. 1. In a text or HTML editor, open the HTML file containing your exception page code. Study the code to make sure all opening tags have matching closing tags. Look for other errors (such as typing mistakes) in your tags. correct any errors you find. 2. Log in to your CLI console using a remote log-in utility. 3. To edit the exception page, enter the following commands. SG# config SG# exceptions SG# edit name_of_exception SG# inline EOF 4. Copy the HTML code from the file you edited in step 1 above. 5. Paste the HTML code into your CLI console. 6. Type EOF and press Enter. You can test your HTML before copying it into the console by right clicking the file and opening it with your browser of choice. How can I view the exception page I created? Problem: I would like to see a preview my custom exception page. Resolution: 1. In the Management Console, select Configuration > Policy > Exceptions. 2. Select View File > Exception Configuration > View. 3. Choose the exception you would like to view from the User-Defined list. Click View Sample HTML. The custom exception page opens in a new window. 11
12 Creating Custom Exception Pages Why doesn't the content of my exception page display? Problem: When I view my HTML output in the Management Console viewer, I am only able to see the name of the exception page I created. The image below is how the browser displays my custom exception page. Resolution: When you name your custom exception page, it is not necessary to precede the name with "user-defined." If you have mistakenly preceded the name of your exception with "user-defined," you need to delete it so that you can recreate the exception. You can do that by following the procedures listed in the "Why can't I delete my custom exceptions page?" below topic. After deleting the misnamed exception, you can create a new custom exception page, with the correct name, by following the procedures in the "Solution: Create Custom Exception Pages" on page 4 Why can't I delete my custom exceptions page? Problem: I cannot delete the custom exception page I created. Resolution: Custom exception pages that are referenced by policy cannot be deleted. In order to delete your custom exception page, you must first delete the policy that references the custom exception you wish to delete. Once you have deleted the policy, you can delete the custom exception. 1. Log in to the Management Console. 2. Select Configuration > Policy > Visual Policy Manager > Launch. 3. In the VPM, right-click the tab of the policy layer you wish to delete. 4. Click Delete Layer or Rule. 5. Click Yes to confirm the deletion. 6. Close the VPM. Once the above instructions are complete, you can delete the custom exception. 1. Log in to your CLI console using a remote log-in utility. 2. Enter the following CLI commands. SG# config SG# exceptions SG# edit name_exception SG# delete name_exception ok 12
Blue Coat Security First Steps Solution for Exception Pages
Blue Coat Security First Steps Solution for Exception Pages SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationBlue Coat ProxySG First Steps Transparent Proxy Deployments SGOS 6.7
Transparent Proxy Deployments SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks
More informationBlue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7
Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the
More informationBlue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks
More informationUsing Kerberos Authentication in a Reverse Proxy Environment
Using Kerberos Authentication in a Reverse Proxy Environment Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat
More informationOffice 365 Best Practices: Protocols
Office 365 Best Practices: Email Protocols VERSION 9: 08/11/17 Office 365 Integration: Email Protocols/Page 2 Skype/Lync Integration/Page 3 Copyrights Copyright 2016 Symantec Corp. All rights reserved.
More informationMulti-Tenant Policy Deployment Guide
Multi-Tenant Policy Deployment Guide SGOS 6.6.x and later Third Party Copyright Notices Copyright 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and
More informationIPv6 Classification. PacketShaper 11.8
PacketShaper 11.8 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks
More informationMigrating to a New ProxySG Appliance. ProxySG 900/9000 to ProxySG S400/500
Migrating to a New ProxySG Appliance ProxySG 900/9000 to ProxySG S400/500 Migrating to a New Blue Coat ProxySG Appliance Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo,
More informationSGOS on KVM Deployment Guide
SGOS on KVM Deployment Guide Guide Revision: 8/18/2017 2 SGOS on KVM Deployment Guide SGOS on KVM Deployment Guide 3 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec
More informationVeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide
VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide The software described in this book is furnished
More informationPartner Information. Integration Overview. Remote Access Integration Architecture
Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise
More informationSGOS on AWS Deployment Guide
SGOS on AWS Deployment Guide Version 6.7.x Guide Revision: 4/6/2018 2 SGOS on AWS Deployment Guide SGOS on AWS Deployment Guide SGOS on AWS Deployment Guide 3 Legal Notice Copyright 2018 Symantec Corp.
More informationPartner Information. Integration Overview Authentication Methods Supported
Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security
More informationSymantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.
Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.0) Release Notes Express Security Content Update for Microsoft Windows Server 2008
More informationBlue Coat Security First Steps Solution for Streaming Media
Solution for Streaming Media Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM,
More informationBlue Coat Security First Steps Solution for Streaming Media
Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationSymantec Protection Center Getting Started Guide. Version 2.0
Symantec Protection Center Getting Started Guide Version 2.0 Symantec Protection Center Getting Started Guide The software described in this book is furnished under a license agreement and may be used
More informationSymantec Managed PKI. Integration Guide for ActiveSync
Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement
More informationSymantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide
Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Documentation version:
More informationSymantecTM Desktop and Laptop Option. Symantec DLO s Storage in Cloud (Amazon Web Services)
SymantecTM Desktop and Laptop Option Symantec DLO s Storage in Cloud (Amazon Web Services) Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation
More informationSymantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3. Release Notes
Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3 Release Notes Express Security Content Update for JBoss Enterprise Application Platform 6.3
More informationSymantec ediscovery Platform
Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished
More informationSymantecTM Desktop and Laptop Option. Symantec DLO s Storage in Cloud (Amazon Web Services)
SymantecTM Desktop and Laptop Option Symantec DLO s Storage in Cloud (Amazon Web Services) Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation
More informationSymantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started
Symantec Cloud Workload Protection on AWS Marketplace Buyer's Guide for Getting Started The software described in this book is furnished under a license agreement and may be used only in accordance with
More informationAltiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes
Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes The software described in this book is
More informationEnterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3
Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice
More informationConfiguration & Management Guide
Configuration & Management Guide Management Center v1.7.1.1 Guide Revision: September 13, 2016 2 TOC Management Center Overview 23 Web Console Overview 25 Dashboard 26 Network 26 Configuration 27 Jobs
More informationWeb Security Service. Near Real-Time Log Sync Solution Brief. Version /OCT
Web Security Service Near Real-Time Log Sync Solution Brief Version 6.10.4.1/OCT.12.2018 Symantec Web Security Service/Page 2 Page 3 Copyrights Copyright 2018 Symantec Corp. All rights reserved. Symantec,
More informationSymantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App
Symantec Validation & ID Protection Service Integration Guide for Microsoft Outlook Web App 2 Symantec VIP Integration Guide for Microsoft Outlook Web App The software described in this book is furnished
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only
More informationSymantec Workflow 7.1 MP1 Release Notes
Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationPartner Management Console Administrator's Guide
Partner Management Console Administrator's Guide Partner Management Console Administrator's Guide Documentation version: November 17, 2017 Legal Notice Copyright 2017 Symantec Corporation. All rights reserved.
More informationSymantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017
VIP Credential Development Kit Release Notes Version 2.0.8 May 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important information about the Symantec
More informationBlue Coat Security First Steps Solution for Integrating Authentication Using LDAP
Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationSymantec Ghost Solution Suite Web Console - Getting Started Guide
Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.
More informationReverse Proxy Deployment Guide
Reverse Proxy Deployment Guide PDF of the Online WebGuide SGOS 6.5.x and Later Third Party Copyright Notices Copyright 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark
More informationEnterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later
Versions of FSA Agent and 2007 or later : Versions of FSA Agent and Last updated: 2018-04-05. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo,, Compliance
More informationMessage Manager Administrator Guide
Message Manager Administrator Guide Documentation version: 2.0 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered
More informationSymantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version January 2017
VIP Credential Development Kit Release Notes Version 2.0.7 January 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important and late-breaking information
More informationNimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]
Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document
More informationSymantec Managed PKI. Integration Guide for AirWatch MDM Solution
Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement
More informationSymantec Workflow Solution 7.1 MP1 Installation and Configuration Guide
Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement
More informationVeritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)
Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option: Qualification Details with Cloud Service
More informationMessage Manager Administrator Guide for ZA
Message Manager Administrator Guide for ZA Documentation version: 2.0 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or
More informationSymantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software
More informationVeritas Desktop and Laptop Option Mac Getting Started Guide
Veritas Desktop and Laptop Option 9.3.1 Mac Getting Started Guide 20-Nov-18 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms
More informationSymantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide
Symantec Desktop and Laptop Option 8.0 SP2 Symantec Desktop Agent for Mac Getting Started Guide Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation
More informationQUICK START: SYMANTEC ENDPOINT PROTECTION FOR AMAZON EC2
QUICK START: SYMANTEC ENDPOINT PROTECTION FOR AMAZON EC2 Quick Start Guide for Using Symantec Endpoint Protection for Amazon EC2 Quick Start Guide for Using Symantec Endpoint Protection for Amazon EC2
More informationBlue Coat Security First Steps. Solution for Integrating Authentication using IWA BCAAA
Solution for Integrating Authentication using IWA BCAAA Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationEnterprise Vault Requesting and Applying an SSL Certificate and later
Enterprise Vault Requesting and Applying an SSL Certificate 10.0.3 and later Enterprise Vault : Requesting and Applying an SSL Certificate Last updated: 2018-04-12. Legal Notice Copyright 2018 Veritas
More informationSymantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark for AIX 5.3 and 6.1 The software
More informationVeritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2
Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017
More informationVeritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios
Veritas Desktop and Laptop Option 9.2 Disaster Recovery Scenarios 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used only
More informationPatch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x
Patch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license
More informationEnterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator or later
Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator 12.2 or later Enterprise Vault : Migrating Data Using the Microsoft Azure Blob Storage Migrator Last updated: 2018-04-12.
More informationPatch Assessment Content Update Getting Started Guide for CCS 12.0
Patch Assessment Content Update Getting Started Guide for CCS 12.0 Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license agreement and may
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement
More informationCreating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility
Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
More informationAdaptive Strong Authenticator Configuration Guide 10g ( ) December 2007
Adaptive Strong Authenticator Configuration Guide 10g (10.1.4.3.0) December 2007 Adaptive Strong Authenticator Configuration Guide, 10g (10.1.4.3.0) Copyright 2007, Oracle. All rights reserved. The Programs
More informationConfiguring Symantec Protection Engine for Network Attached Storage. Dell FluidFS 5.0
Configuring Symantec Protection Engine for Network Attached Storage Dell FluidFS 5.0 Contents Abstract... 2 About software component... 2 How does FluidFS antivirus protect data on FluidFS cluster... 2
More informationEnterprise Vault.cloud Journaling Guide
Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud: Journaling Guide Last updated: 2018-01-30. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas
More informationSymantec ServiceDesk 7.1 SP1 Implementation Guide
Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationVeritas ediscovery Platform
Veritas ediscovery Platform Release Notes 8.2 Cumulative Hotfix 3 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 8.2 CHF3 The software described in this book is furnished under a license
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 11.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
More informationNetBackup Copilot for Oracle Configuration Guide. Release 2.7.1
NetBackup Copilot for Oracle Configuration Guide Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.1 Legal Notice Copyright 2015 Symantec Corporation. All rights
More informationVeritas System Recovery 18 Management Solution Administrator's Guide
Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are
More informationVeritas Desktop Agent for Mac Getting Started Guide
Veritas Desktop Agent for Mac Getting Started Guide The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation
More informationProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide
2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9, DRTR, MACH5, PACKETWISE, POLICYCENTER, PROXYAV, PROXYCLIENT,
More informationSymantec NetBackup Appliance Fibre Channel Guide
Symantec NetBackup Appliance Fibre Channel Guide Release 2.6.1.2 NetBackup 52xx and 5330 Symantec NetBackup Appliance Fibre Channel Guide Documentation version: 2.6.1.2 Legal Notice Copyright 2015 Symantec
More informationVeritas NetBackup OpenStorage Solutions Guide for Disk
Veritas NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 8.0 Veritas NetBackup OpenStorage Solutions Guide for Disk Legal Notice Copyright 2016 Veritas Technologies LLC. All
More informationSecurity Content Update Release Notes for CCS 12.x
Security Content Update 2017-3 Release Notes for CCS 12.x SCU 2017-3 Release Notes for CCS 12.0 Documentation version: 1.0 Legal Notice Copyright 2018 Symantec Corporation. All rights reserved. Symantec,
More informationAltiris Software Management Solution 7.1 from Symantec User Guide
Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement
More informationSymantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.
Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.3 Release Notes Symantec Endpoint Protection, Symantec Endpoint Protection Small
More informationVeritas Desktop and Laptop Option Mobile Application Getting Started Guide
Veritas Desktop and Laptop Option Mobile Application Getting Started Disclaimer Contents The software described in this document is furnished under a license agreement and may be used only in accordance
More informationVeritas System Recovery 16 Management Solution Administrator's Guide
Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo
More informationPGP Viewer for ios. User s Guide 1.0
PGP Viewer for ios User s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2. Last updated:
More informationEnterprise Vault Troubleshooting FSA Reporting. 12 and later
Enterprise Vault Troubleshooting FSA Reporting 12 and later Enterprise Vault : Troubleshooting FSA Reporting Last updated: 2018-04-17. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved.
More informationProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide
ProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide Platform: VMware ESX or ESXi Server Platform: ESX/ESXi Server Version 6.5.x and later SGOS 6.5.x and later i ProxySG Virtual Appliance
More informationSymantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10
Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials Solaris 10 Symantec ESM Baseline Policy Manual for Security Essentials for Solaris 10 The software described in this
More informationQUICK START: VERITAS STORAGE FOUNDATION BASIC FOR AMAZON EC2
QUICK START: VERITAS STORAGE FOUNDATION BASIC FOR AMAZON EC2 Quick Start Guide for Using Symantec's Veritas Storage Foundation Basic for Amazon EC2 Quick Start Guide for Using Symantec's Veritas Storage
More informationAltiris IT Analytics Solution 7.1 from Symantec User Guide
Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may
More informationSymantec NetBackup Vault Operator's Guide
Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.6 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may
More informationSymantec Drive Encryption Evaluation Guide
Symantec Drive Encryption Evaluation Guide Getting Started Installing Symantec Encryption Management Server is the first product deployment step for any Symantec Encryption evaluation (also known as a
More informationPolycom RealPresence Resource Manager System
Upgrade Guide 8.2.0 July 2014 3725-72106-001E Polycom RealPresence Resource Manager System Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into
More informationSymantec NetBackup OpsCenter Reporting Guide. Release 7.7
Symantec NetBackup OpsCenter Reporting Guide Release 7.7 Symantec NetBackup OpsCenter Reporting Guide The software described in this book is furnished under a license agreement and may be used only in
More informationCustom Location Extension
Custom Location Extension User Guide Version 1.4.9 Custom Location Extension User Guide 2 Contents Contents Legal Notices...3 Document Information... 4 Chapter 1: Overview... 5 What is the Custom Location
More informationPGP NetShare FlexResponse Plug-In for Data Loss Prevention
PGP NetShare FlexResponse Plug-In for Data Loss Prevention Implementation Guide 10.2 The software described in this book is furnished under a license agreement and may be used only in accordance with
More informationSymantec Information Centric Analytics Symantec ICT Integration Guide. Version 6.5
Symantec Information Centric Analytics Symantec ICT Integration Guide Version 6.5 Symantec ICA Symantec ICT Integration Guide, powered by Bay Dynamics Product version 6.5 Documentation version: 1 This
More informationSymantec NetBackup for Lotus Notes Administrator's Guide. Release 7.6
Symantec NetBackup for Lotus Notes Administrator's Guide Release 7.6 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the
More informationIM: Symantec Security Information Manager Patch 4 Resolved Issues
IM: Symantec Security Information Manager 4.7.2 Patch 4 Resolved Symantec Security Information Manager 4.7.2 Patch 4 Resolved The software described in this book is furnished under a license agreement
More informationSymantec pcanywhere 12.5 SP4 Release Notes
Symantec pcanywhere 12.5 SP4 Release Notes Symantec pcanywhere 12.5 SP4 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with
More informationSymantec Endpoint Protection Integration Component User's Guide. Version 7.0
Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationPrecise for BW. User Guide. Version x
Precise for BW User Guide Version 9.8.0.x 2 Precise for BW User Guide Copyright 2018 Precise Software Solutions, Inc. All rights reserved. Precise for BW User Guide version 9.8.0.x Document release version
More informationSymantec PGP Viewer for ios
Symantec PGP Viewer for ios User's Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.0.
More informationNimsoft Monitor Server
Nimsoft Monitor Server Configuration Guide v6.00 Document Revision History Version Date Changes 1.0 10/20/2011 Initial version of Nimsoft Server Configuration Guide, containing configuration and usage
More informationConfiguring Symantec Protection Engine for Network Attached Storage. Compuverde vnas Cluster
Configuring Symantec Protection Engine for Network Attached Storage Compuverde vnas Cluster Contents Abstract... 2 About software component... 2 How does Compuverde antivirus protect data on Compuverde
More informationClearwell ediscovery Platform
Clearwell ediscovery Platform Utility Node Guide 7.1.2 Fix Pack 2 Clearwell ediscovery Platform : Utility Node Guide The software described in this book is furnished under a license agreement and may be
More informationSymantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide
Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationSymantec Enterprise Vault Technical Note
Symantec Enterprise Vault Technical Note FSA Reporting deployment guidelines 8.0 Symantec Information Foundation Symantec Enterprise Vault: FSA Reporting deployment guidelines The software described in
More information