Contents. Limitations. Prerequisites. Configuration

Similar documents
Installing and Configuring vcenter Support Assistant

Version 2.3 User Guide

VMware ESX ESXi and vsphere. Installation Guide

Quick Start Guide ViPR Controller & ViPR SolutionPack

Sophos Virtual Appliance. setup guide

Installing Cisco Virtual Switch Update Manager

HiveManager Virtual Appliance QuickStart

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline 1.4

UDP Director Virtual Edition Installation and Configuration Guide (for Stealthwatch System v6.9.0)

Install and Configure FindIT Network Manager and FindIT Network Probe on a VMware Virtual Machine

Hands-on Lab Manual. Introduction. Dell Storage Hands-on Lab Instructions. Estimated Completion Time: 30 minutes. Audience. What we will be doing

ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi)

Installing and Upgrading Cisco Network Registrar Virtual Appliance

ITCorporation HOW DO I INSTALL A FRESH INSTANCE OF ANALYZER? DESCRIPTION RESOLUTION. Knowledge Database KNOWLEDGE DATABASE

on VMware Deployment Guide November 2018 Deployment Guide for Unitrends Free on VMware Release 10.3 Version Provide feedback

Platform Compatibility... 1 Known Issues... 1 Resolved Issues... 2 Deploying the SRA Virtual Appliance... 3 Related Technical Documentation...

Quick Start Guide ViPR Controller & ViPR SolutionPack

Proofpoint Threat Response

VMware vfabric Data Director Installation Guide

SRA Virtual Appliance Getting Started Guide

Archiware Pure Quick Start Guide

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline Collector 2.0

Gnostice StarDocs On-Premises API Virtual Appliance

UDP Director Virtual Edition

Threat Response Auto Pull (TRAP) - Installation Guide

Free Download: Quick Start Guide

VMware vfabric Data Director Installation Guide

Stealthwatch Flow Sensor Virtual Edition Installation and Configuration Guide (for Stealthwatch System v6.9.0)

Deployment Guide for Unitrends Backup on VMware

Using a Virtual Machine for Cisco IPICS on a Cisco UCS C-Series Server

Deploying the Cisco ASA 1000V

Deploy the ExtraHop Discover Appliance with VMware

System Administration Guide

Installing the Cisco Nexus 1000V Software Using ISO or OVA Files

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

QUICK SETUP GUIDE VIRTUAL APPLIANCE - VMWARE, XEN, HYPERV CommandCenter Secure Gateway

dctrack Quick Setup Guide (Recommended) Obtain a dctrack Support Website Username and Password

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager


Installing VMware vsphere 5.1 Components

Installation of Cisco Business Edition 6000H/M

Global Management System (GMS) Virtual Appliance 6.0 Getting Started Guide

KEMP360 Central - VMware vsphere. KEMP360 Central using VMware vsphere. Installation Guide

Installing Your System Using Manual Deployment

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Scrutinizer Virtual Appliance Deployment Guide Page i. Scrutinizer Virtual Appliance Deployment Guide. plixer

Symantec Brightmail Gateway 9.0 Getting Started

Online Help StruxureWare Central

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

OneSign Virtual Appliance Guide

Connectra Virtual Appliance Evaluation Guide

Deploy the ExtraHop Discover Appliance with VMware

Deploying the Cisco Tetration Analytics Virtual

Resiliency Replication Appliance Installation Guide Version 7.2

Double-Take AVAILABILITY. Version 7.0 Double-Take Availability for vsphere User's Guide

Archiware Pure User Manual

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3

RecoverPoint for Virtual Machines

MaaS360.com. MaaS360 On-Premises. Database Virtual Appliance Setup Guide

Deploy the ExtraHop Trace Appliance with VMware

Getting Started Guide

Product Version 1.1 Document Version 1.0-A

Dell Storage Compellent Integration Tools for VMware

vapp Deployment and Configuration Guide

DSI Optimized Backup & Deduplication for VTL Installation & User Guide

akkadian Provisioning Manager Express

Storage Manager 2018 R1. Installation Guide

System Administration Guide

Sophos Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1

Online Help StruxureWare Data Center Expert

Deployment of FireSIGHT Management Center on VMware ESXi

Installing Cisco CMX in a VMware Virtual Machine

VMware vrealize Log Insight Getting Started Guide

EventTracker: Virtual Appliance

Basic Configuration Installation Guide

HP LeftHand SAN Solutions

EventTracker: Virtual Appliance

akkadian Global Directory 3.0 System Administration Guide

Forcepoint Sidewinder Control Center, Virtual Appliance. Installation Guide 5.3.x. Revision A

Install ISE on a VMware Virtual Machine

Cyberoam Virtual Security Appliance - Installation Guide for VMware Player. Version 10

Videoscape Distribution Suite Software Installation Guide

vrealize Network Insight Installation Guide

Dell Storage Integration Tools for VMware

System Administration Guide

Installing vrealize Network Insight. VMware vrealize Network Insight 3.3

Installing or Upgrading ANM Virtual Appliance

Cisco Business Edition 7000 Installation Guide, Release 10.6

Double-Take AVAILABILITY. Version 7.0 Double-Take Availability for vsphere User's Guide

vrealize Network Insight Installation Guide

Easy Setup Guide. Cisco FindIT Network Probe. You can easily set up your FindIT Network Probe in this step-by-step guide.

Installing vrealize Network Insight

PlateSpin Transformation Manager Appliance Guide. June 2018

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi

Basic Configuration Installation Guide

Getting Started with ESXi Embedded

Install ISE on a VMware Virtual Machine

VMware vsphere: Install, Configure, and Manage v6.5 Pod. Installation and Configuration Guide

Transcription:

Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically triggered to deliver mail either to your inbox or quarantine based on pre-configured policies. You can also modify existing policies or create new ones to suit your organization s needs. The Executive Reports feature allows administrators to receive reports containing statistics about Netmail Secure s effectiveness at trapping unwanted mail, while the Quarantine Reports feature sends end users notifications when any of their mail is quarantined. The Netmail Secure Quarantine application can then be used to view and manage quarantined messages. Contents Welcome to your Netmail Secure trial... 1 Limitations... 1 Prerequisites... 1 Configuration... 1 System Setup... 2 Deploying Netmail Secure VMF... 2 Performing the Bootstrapping Sequence... 7 Launching the Netmail Secure Wizard... 14 Accessing & Using Netmail Secure... 17 Quarantine Access... 22 Limitations The Netmail Secure free trial includes a 50-user license. Also, please note that the following features are not available with the trial version of Netmail Secure: Encryption Attachment stripping Prerequisites Before you begin, ensure that the following resources are allocated to each node that will be deployed: Node Server: Dual CPU 4 GB of RAM recommended; 3 GB is the absolute minimum permissible 100 GB available on local disk (in the VM) Configuration Netmail Secure is delivered as a fully configured soft appliance that can be deployed on any x86 hardware. As such, you ll need VMware ESXi or ESX 3.x or higher to deploy Netmail Secure, and you must install VMware Tools prior to installing Netmail Secure.

2 The following login credentials will be required during the installation of Netmail Secure: User Login: admin User Password: m3ss4g1ng After you have clicked the download link on the Messaging Architects web site, you ll need to extract the contents of the compressed file and import the content into your VMware ESX infrastructure (importing directly through an FTP link is also supported). Note: This OVF won't work on VMware Workstation for PC or VMware Fusion for Mac. If you re running it in these environments, you ll need to download and run VMware's OVF Tool to convert it into VMX/VMDK format. System Setup The installation and configuration of Netmail Secure is quite straightforward. The setup sequence consists of deploying the virtual machine, running through a bootstrapping sequence, and then using the Netmail Secure Wizard to deploy a Netmail Secure node. Deploying Netmail Secure VMF This section describes how to deploy the Netmail Secure Virtual Messaging Firewall (VMF) from a virtual machine image onto a machine running ESX Server or ESXi Server. 1. Unpack the compressed file. 2. Using a VMware vcenter or Virtual Infrastructure Client, select File > Deploy OVF Template. Figure 1: VMware vcenter Client

3 3. Click Browse to browse to the location of your.ovf file. Click Next to continue. Figure 2: Source 4. Review the OVF template details onscreen, and then click Next to continue. Figure 3: OVF Template Details

5. Under Name, enter a name for your virtual appliance, and under Inventory Location, specify where in the inventory you want your virtual appliance to reside. Click Next. 4 Figure 4: Name and Location 6. Select 32bit as the host for the Netmail Secure virtual appliance, and then click Next. Figure 5: Host/Cluster

5 7. Select a datastore where you want to store the files for the virtual appliance. Click Next. Figure 6: Datastore 8. Select a format in which you want to store the virtual disks. Thin provisioned format allocates storage space for data on an as-needed basis, while Thick provisioned format immediately allocates all available storage space. Click Next to continue. Figure 7: Disk Format

6 9. Select a network(s) that the deployed OVF template should use, and then click Next to continue. Figure 8: Network Mapping 10. Review the virtual appliance details onscreen, and then click Finish to start the deployment. Figure 9: Ready to Complete It will take a few minutes to create the virtual machine. Once the virtual machine has been created, power up the machine and go through the bootstrapping sequence.

Performing the Bootstrapping Sequence The bootstrapping process allows you to provide the information needed to connect your system to the Netmail Secure virtual machine. 1. In the VMware VCenter or Virtual Infrastructure Client, select your Netmail Secure virtual machine in the tree menu on the left-hand side of the screen, and then start the virtual machine. Use your keyboard to navigate through the bootstrapping sequence. 7 2. Wait a few seconds, or select Netmail Secure 5.1 RC [VMX], and then press Enter to load the boot sequence. The screen will remain blank for a few moments while the boot sequence loads. Figure 10: Select Virtual Machine

8 3. On the Languages screen, choose your preferred language, and then select Next. Figure 11: Languages 4. On the Network Configuration screen, select Use Following Configuration, and then select Next. Figure 12: Network Interfaces

9 5. On the Keyboard Configuration screen, select your preferred keyboard layout. Select Next. Figure 13: Keyboard Configuration 6. On the Hostname and Domain Name screen, enter the Hostname of your Netmail Secure virtual machine and the Domain Name. Select Assign Hostname to Loopback IP. Select Next to continue. Figure 14: Hostname and Domain Name

10 7. On the Network Settings screen, select the Overview heading, and then choose Edit. Figure 15: Network Settings Overview 8. On the Network Card Setup screen, select the Address heading to configure the IP address. Select the Statically assigned IP Address option. Enter the network IP Address and Subnet Mask, and then choose Next to continue. Figure 16: Network Card Setup

9. Back on the Network Settings screen, select the Hostname/DNS heading. Enter the IP address(es) of your DNS name server(s). 11 Figure 17: Network Settings Hostname/DNS 10. On the Network Settings screen, select the Routing heading. Enter the IP address of the Default Gateway, and then select OK. Figure 18: Network Settings Routing

11. On the Network Configuration screen, verify the configuration settings you have entered, and then select Next to continue. 12 Figure 19: Network Configuration Your network configuration settings will be saved. It will take a few moments for the settings to be saved. Figure 20: Saving Network Configuration

13 12. On the Clock and Time Zone screen, choose your Region, Time Zone, and Date and Time. Select Next to continue. Figure 21: Clock and Time Zone Your system now restarts. Once the system has restarted, the bootstrapping process is complete. You are now ready to launch the Netmail Secure Wizard.

Launching the Netmail Secure Wizard With the Netmail Secure Wizard, you can easily configure and deploy a single Netmail Secure node. To launch the Netmail Secure Wizard, configure a machine on your network with access to the newly deployed Netmail Secure Virtual Messaging Firewall by opening a web browser and navigating to https://the.ip.you.assigned. To deploy a Netmail Secure node, follow these steps: 1. On the Welcome screen, agree to the terms and conditions of the End User License Agreement. Select New to deploy a new Netmail Secure system. Click Next to continue. 14 Figure 22: Welcome

2. On the New Node Setup screen, select New System from the available options. Enter the default administrator password m3ss4g1ng in the Administrator password field, and enter a Cluster Name of your choice. Click Next to continue. 15 Figure 23: New Node Setup 3. On the Domain Configuration screen, a default License File is already selected for you. The license is valid for up to 50 users. Complete the other available fields: Under Domain Name, enter the name of your domain. Under Authentication Source, select the authentication type, and enter the required information. You will have a different set of fields to complete depending on your choice. Select the SMTP option (do not choose local delivery). Under Relay Address, enter the IP address where you want Netmail Secure to deliver email that it has processed. Under Postmaster Address, enter the email address of the postmaster where notifications should be sent. Under Abuse Address, enter an email address to which abuse reports (filed by end users through the Quarantine application) should be sent. Under Default Time Zone, use the dropdown list to select your preferred time zone.

16 Click Finish to complete the installation and exit the wizard. Note: If you have not clicked Test to test your relay address, you ll be prompted to do so before completing the installation. Figure 24: Domain Configuration

Accessing & Using Netmail Secure To access the Netmail Administration Console, open a standard web browser and enter the IP address of the server where you installed Netmail Secure. The Netmail Administration Console can be accessed from any workstation with access to this IP address. Note: Netmail Secure supports Internet Explorer 8 and higher, Mozilla Firefox, and Chrome. On the Netmail Administration Console login screen, enter admin and m3ss4g1ng (these authentication credentials are for a Netmail directory service user account which has administrative privileges to the Netmail Secure objects that were created during installation). Click Log In. 17 Figure 25: Netmail Administration Console Login

Once you re logged in, select the Netmail Platform > Diagnostics tab. The Diagnostics tab allows you to specify the email address to which you want the sample mail feed to deliver messages. 18 Figure 26: Diagnostics Tab Click Test to validate the email address. The Job Status window opens, showing a status report of the validation test. Figure 27: Test Validation Status

Once the email address is validated, the sample messages will be automatically placed in the queue and delivered to either your mailbox or quarantine, according to pre-configured policies in Netmail Secure. The following pre-configured policies will be triggered by the automatic mail feed: Anti-spam Anti-virus Attachment Blocking Content Filter/Social Security Number Content Filter/Credit Card Executive Report Quarantine Report Quarantine Actions The mail feed contains at least one sample message per policy type. For example, the Anti-spam policy will quarantine a message according to the Anti-spam policy settings, the Credit Card policy will quarantine another message according to its policy settings, the Quarantine Report policy will deliver a Quarantine Report to your inbox, etc. Clean messages that aren t caught by any of Netmail Secure s policies are delivered to your inbox. 19

If messages are quarantined, Netmail Secure will automatically send you a Quarantine Report with details about the messages that have been sent to your quarantine. Typically, Quarantine Reports are sent daily, however you will only receive a Quarantine Report if you have email messages in quarantine at the time Netmail Secure generates the reports. 20 Figure 28: Quarantine Report There are several message actions that you can perform directly from the Quarantine Report by clicking the available links within the report: Delete all spam incoming: Deletes all quarantined email messages. Release: Releases the email message to your Inbox. Report: Sends a copy of the message to your system administrator for review. Allow: Add the email address to your Allow List. Delete: Delete the email from your quarantine. Allow Domain: Add the domain to your Allow List. Block: Add the email address to your Block List. Block Domain: Add the domain to your Block List. You can also use the Click here to manage your quarantine link if you want to log in to Netmail Secure s Quarantine application to safely view and manage your quarantined messages from there.

With Netmail Secure s Quarantine Reports feature, you ll be able to create policies that will automatically send customized Quarantine Reports to your end users. For information about configuring a Quarantine Reports policy, refer to the Quarantine Reports Policy section of the Netmail Secure Administration Guide. As an administrator, you can also receive Executive Reports that show how many email messages containing viruses, spam, blocked attachments, or other filtered email are being trapped by Netmail Secure, and how effective Netmail Secure is at protecting your organization s messaging and collaboration system. 21 Figure 29: Executive Report

Quarantine Access Netmail Secure provides both Global Quarantine and End-User Access to administrators. With Global Quarantine, administrators have access to a mailbox on the mail server specifically created to receive all quarantined mail. Through the Quarantine application, system administrators have system-wide access to any end user quarantine through the Switch User option. The Switch User option is a completely transparent process that allows administrators to review the contents of any end user quarantine within the organization as well as review the Allow and Block lists configured by the end user. This option also lets administrators view or modify the rights and permissions granted to each end user directly from the Quarantine application. Simple and Advanced Filter options are also available to allow administrators and end users to filter items in quarantine by subject, body contents, date range, sender, recipient, attachment name, and message type (spam, virus, content, and attachment). To access the Global Quarantine, select the Quarantine tab of the Secure object in the Netmail Administration Console. For more information about the Global Quarantine, see the Quarantine Access section of the Netmail Secure Administration Guide. 22 Figure 30: Global Quarantine End users may also access their own personal quarantine by clicking the appropriate link within the body of their Quarantine Report or by entering a URL link provided by their administrator directly in their Web browser. Users will be prompted for their login credentials (same ones as those for their email client) in order to access the Quarantine application. For more information about the end-user version of the Quarantine application, refer to the Netmail Secure Quarantine User Guide.