McAfee Email Gateway Version 7.0 Appliances Installation Guide

1y ago
17 Views
2 Downloads
1.35 MB
69 Pages
Last View : 1d ago
Last Download : 5m ago
Upload by : Aarya Seiber
Transcription

Draft only - 9.13.11Installation GuideMcAfee Email Gateway 7.0 Appliances

Draft only - 9.13.11COPYRIGHTCopyright 2011 McAfee, Inc. All Rights Reserved.No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or byany means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.TRADEMARK ATTRIBUTIONSAVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE),MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registeredtrademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive ofMcAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.LICENSE INFORMATIONLicense AgreementNOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETSFORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOUHAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOURSOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR AFILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SETFORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OFPURCHASE FOR A FULL REFUND.2McAfee Email Gateway 7.0 Appliances Installation Guide

Draft only - 9.13.11Contents1PrefaceAbout this guide . . . . . . .Audience . . . . . . .Conventions . . . . . .How to use this guide . .Finding product documentation .15.Preparing to install555679What's in the box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Plan the installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Inappropriate use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Operating conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Positioning the appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Considerations about network modes . . . . . . . . . . . . . . . . . . . . . . . . . 11Transparent bridge mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Transparent router mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 12Explicit proxy mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Deployment strategies for using the device in a DMZ . . . . . . . . . . . . . . . . . . . 14SMTP configuration in a DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . 15Workload management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162Installing the McAfee Email Gateway applianceInstallation quick reference table . . . . . . . . . . . . . . . . . .Ports and connections . . . . . . . . . . . . . . . . . . . . . . .Physically installing the appliance . . . . . . . . . . . . . . . . . .Mounting the appliance in a rack . . . . . . . . . . . . . . .Connect to the network . . . . . . . . . . . . . . . . . . . . . .Port numbers . . . . . . . . . . . . . . . . . . . . . . .Using Copper LAN connections . . . . . . . . . . . . . . . .Using Fiber LAN connections . . . . . . . . . . . . . . . . .Monitor, mouse and keyboard . . . . . . . . . . . . . . . .Supplying power to the appliance . . . . . . . . . . . . . . . . . .Overview task — Installing the software . . . . . . . . . . . . . . .Task — Downloading the installation software . . . . . . . . . .Task — Creating a CD from the installation software image . . . . .Using the Configuration Console . . . . . . . . . . . . . . . . . . .Welcome . . . . . . . . . . . . . . . . . . . . . . . . .Performing a Standard Setup . . . . . . . . . . . . . . . . .Performing a Custom Setup . . . . . . . . . . . . . . . . .Restoring from a file . . . . . . . . . . . . . . . . . . . .ePO Managed Setup . . . . . . . . . . . . . . . . . . . .Encryption Only Setup . . . . . . . . . . . . . . . . . . .317.A tour of the 53Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53McAfee Email Gateway 7.0 Appliances Installation Guide3

ContentsDraft only - 9.13.11Benefits of using the Dashboard . . . . . . . . . . . . . . . . . . . . . . . . 53Dashboard portlets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544Testing the configurationTaskTaskTaskTask5————Test connectivity . . . . . . . . . .Update the DAT files . . . . . . . .Test mail traffic and virus detection . .Testing spam detection . . . . . . .57. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57. . 57. . 58. . 58Exploring the appliance featuresIntroduction to policies . . . . . . . . . . . . . . . . . . . .Encryption . . . . . . . . . . . . . . . . . . . . . .Task — Identify quarantined email messages . . . . . . . . .Compliance Settings . . . . . . . . . . . . . . . . . .Data Loss Prevention settings . . . . . . . . . . . . . .Index4.McAfee Email Gateway 7.0 Appliances Installation Guide59. . . . . . . . . . . . . . . . . . . . . 59. 5961. 62. 6567

Draft only - 9.13.11PrefaceContentsAbout this guideFinding product documentationAbout this guideThis information describes the guide's target audience, the typographical conventions and icons usedin this guide, and how the guide is organized.AudienceMcAfee documentation is carefully researched and written for the target audience.The information in this guide is intended primarily for: Administrators — People who implement and enforce the company's security program.ConventionsThis guide uses the following typographical conventions and icons.Book title or Emphasis Title of a book, chapter, or topic; introduction of a new term; emphasis.BoldText that is strongly emphasized.User input or PathCommands and other text that the user types; the path of a folder or program.CodeA code sample.User interfaceWords in the user interface including options, menus, buttons, and dialogboxes.Hypertext blueA live link to a topic or to a website.Note: Additional information, like an alternate method of accessing an option.Tip: Suggestions and recommendations.Important/Caution: Valuable advice to protect your computer system,software installation, network, business, or data.Warning: Critical advice to prevent bodily harm when using a hardwareproduct.McAfee Email Gateway 7.0 Appliances Installation Guide5

Draft only - 9.13.11PrefaceAbout this guideGraphical conventionsUse this information to understand the graphical symbols used within this document.ApplianceInternet or external networksMail ServerOther servers (such as DNSservers)User or client computerRouterSwitchFirewallNetwork zone (DMZ or VLAN)NetworkActual data pathPerceived data pathDefinition of terms used in this guideUse this information to understand some of the key terms used in this document.TermDefinitiondemilitarized zone A computer host or small network inserted as a buffer between a private network(DMZ)and the outside public network to prevent direct access from outside users toresources on the private network.DAT filesDetection definition (DAT) files, also called signature files, containing thedefinitions that identify, detect, and repair viruses, Trojan horses, spyware,adware, and other potentially unwanted programs (PUPs).operational modeThree operating modes for the product: explicit proxy mode, transparent bridgemode, and transparent router mode.policyA collection of security criteria, such as configuration settings, benchmarks, andnetwork access specifications, that defines the level of compliance required forusers, devices, and systems that can be assessed or enforced by a McAfeesecurity application.ReputationService checkPart of sender authentication. If a sender fails the Reputation Service check, theappliance is set to close the connection and deny the message. The sender's IPaddress is added to a list of blocked connections and is automatically blocked infuture at the kernel level.How to use this guideThis topic gives a brief summary of the information contained within this document.This guide helps you to:6 Plan and perform your installation. Become familiar with the interface.McAfee Email Gateway 7.0 Appliances Installation Guide

Draft only - 9.13.11PrefaceFinding product documentation Test that the product functions correctly. Apply the latest detection definition files. Explore some scanning policies, create reports, and get status information. Troubleshoot basic issues.You can find additional information about the product's scanning features in the online help within theproduct and the McAfee Email Gateway 7.0 Administrators Guide.Finding product documentationMcAfee provides the information you need during each phase of product implementation, frominstallation to daily use and troubleshooting. After a product is released, information about the productis entered into the McAfee online KnowledgeBase.Task1Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com.2Under Self Service, access the type of information you need:To access.Do this.User documentation1 Click Product Documentation.2 Select a product, then select a version.3 Select a product document.KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version.McAfee Email Gateway 7.0 Appliances Installation Guide7

PrefaceFinding product documentation8Draft only - 9.13.11McAfee Email Gateway 7.0 Appliances Installation Guide

Draft only - 9.13.111Preparing to installTo ensure the safe operation of McAfee Email Gateway 7.0, consider the following before you beginthe installation. Familiarize yourself with its operational modes and capabilities. It is important that you choose avalid configuration. Decide how to integrate the appliance into your network and determine what information you needbefore you start. For example, the name and IP address for the device. Unpack the product as close to its intended location as possible. Remove the product from any protective packaging and place it on a flat surface. Observe all provided safety warnings.Review and be familiar with all provided safety information.ContentsWhat's in the boxPlan the installationInappropriate useOperating conditionsPositioning the applianceConsiderations about network modesDeployment strategies for using the device in a DMZWhat's in the boxUse this information to ensure that you have a complete shipment for your product.To check that all components are present, refer to the packing list supplied with your product.Generally, you should have: An appliance McAfee Email Gateway installation and recovery CD Power cords Linux source code CD Network cables Documentaiton CDIf an item is missing or damaged, contact your supplier.McAfee Email Gateway 7.0 Appliances Installation Guide9

1Draft only - 9.13.11Preparing to installPlan the installationPlan the installationUse this information when planning the installation of your device.Before unpacking your McAfee Email Gateway, it is important to plan the installation and deployment.Consider the following: Environmental requirements.Information on environmental site requirements, including temperature, airflow, and spacerequirements. Power requirements and considerations.Power requirements and electrical factors that must be considered before installation. Hardware specifications and requirements. Configuration scenarios. Preparing for installation.Inappropriate useUse this information to avoid using this product inappropriately.McAfee Email Gateway is: Not a firewall. — You must use it within your organization behind a correctly configured firewall. Not a server for storing extra software and files. — Do not install any software on the deviceor add any extra files to it unless instructed by the product documentation or your supportrepresentative.The device cannot handle all types of traffic. If you use explicit proxy mode, only protocols that are tobe scanned should be sent to the device.Operating conditionsUse this information to understand the environmental conditions needed for your McAfee EmailGateway.Temperature10 to 35 C (50 to 95 F).Relative humidity20% to 80% (non-condensing) with a maximum humidity gradient of 10% perhour.Maximum vibration 0.25 G at 3–200 Hz for 15 minutes.10Maximum shockOne shock pulse in the positive z axis (one pulse on each side of the unit) of 31G for up to 2.6 ms.Altitude-16 to 3,048 m (-50 to 10,000 ft.).McAfee Email Gateway 7.0 Appliances Installation Guide

Draft only - 9.13.111Preparing to installPositioning the appliancePositioning the applianceUse this information to understand where the McAfee Email Gateway should be placed before settingup and using it.Select the final position for the appliance and install it so that it meets the operating conditions, sothat you can control physical access to the appliance, and so that you can access all ports andconnections on both the front and the rear panels.A rack-mounting kit is supplied with the appliance, allowing you to install the appliance in a 19-inch rack.Considerations about network modesUse this information to gain an understanding of the operational (or network) modes in which thedevice can operate.Before you install and configure your McAfee Email Gateway, you must decide which network mode touse. The mode you choose determines how you physically connect your appliance to your network.You can choose from the following network modes: Transparent bridge mode — The device acts as an Ethernet bridge. Transparent router mode — The device acts as a router. Explicit proxy mode — The device acts as a proxy server and a mail relay.If you are still unsure about the mode to use after reading this and the following sections, consult yournetwork expert.Architectural considerations about network modesThe main considerations regarding the network modes are: Whether communicating devices are aware of the existence of the device. That is, if the device isoperating in one of the transparent modes. How the device physically connects to your network. The configuration needed to incorporate the device into your network. Where the configuration takes place in the network.Considerations before changing network modesIn explicit proxy and transparent router modes, you can set up the device to sit on more than onenetwork by setting up multiple IP addresses for the LAN1 and LAN2 ports.If you change to transparent bridge mode from explicit proxy or transparent router mode, only theenabled IP addresses for each port are carried over.After you select a network mode, McAfee recommends not changing it unless you move the device orrestructure your network.Transparent bridge modeUse this information to better understand Transparent bridge mode on your McAfee Email Gateway.In transparent bridge mode, the communicating servers are unaware of the device — the device’soperation is transparent to the servers.McAfee Email Gateway 7.0 Appliances Installation Guide11

1Draft only - 9.13.11Preparing to installConsiderations about network modesIn the figure, the external mail server (A) sends email messages to the internal mail server (C). Theexternal mail server is unaware that the email message is intercepted and scanned by the device (B).The external mail server seems to communicate directly with the internal mail server — the path isshown as a dotted line. In reality, traffic might pass through several network devices and beintercepted and scanned by the device before reaching the internal mail server.What the device does in transparent bridge modeIn transparent bridge mode, the device connects to your network using the LAN1 and LAN2 ports. Thedevice scans the traffic it receives, and acts as a bridge connecting two network segments, but treatsthem as a single logical network.Configuration in transparent bridge modeTransparent bridge mode requires less configuration than transparent router and explicit proxy modes.You do not need to reconfigure all your clients, default gateway, MX records, Firewall NAT or mailservers to send traffic to the device. Because the device is not a router in this mode, you do not needto update a routing table.Where to place the device when using transparent bridge modeFor security reasons, you must use the device inside your organization, behind a firewall.In transparent bridge mode, position the device between the firewall and your router, as shown.In this mode, you physically connect two network segments to the device, and the device treats themas one logical network. Because the devices — firewall, device, and router — are on the same logicalnetwork, they must all have compatible IP addresses on the same subnet.Devices on one side of the bridge (such as a router) that communicate with devices on the other sideof the bridge (such as a firewall) are unaware of the bridge. They are unaware that traffic isintercepted and scanned, therefore the device is said to operate as a transparent bridge.Transparent router modeUse this information to better understand Transparent router mode on your McAfee Email Gateway.In transparent router mode, the device scans email traffic between two networks. The device has oneIP address for outgoing scanned traffic, and must have one IP address for incoming traffic.The communicating network servers are unaware of the intervention of the device — the device’soperation is transparent to the devices.What the device does in transparent router modeIn transparent router mode, the device connects to your networks using the LAN1 and LAN2 ports.The device scans the traffic it receives on one network, and forwards it to the next network device ona different network. The device acts as a router, routing the traffic between networks, based on theinformation held in its routing tables.12McAfee Email Gateway 7.0 Appliances Installation Guide

Draft only - 9.13.111Preparing to installConsiderations about network modesConfiguration in transparent router modeUsing transparent router mode, you do not need to explicitly reconfigure your network devices to sendtraffic to the device. You need only configure the routing table for the device, and modify some routinginformation for the network devices on either side of it (the devices connected to its LAN1 and LAN2ports). For example, you might need to make the device your default gateway.In transparent router mode, the device must join two networks. The device must be positioned insideyour organization, behind a firewall.Transparent router mode does not support Multicast IP traffic or non-IP protocols, such as NETBEUI andIPX.Firewall rulesIn transparent router mode, the firewall connects to the physical IP address for the LAN1/LAN2connection to the management blade.Where to place the deviceUse the device in transparent router mode to replace an existing router on your network.If you use transparent router mode and you do not replace an existing router, you must reconfigure partof your network to route traffic correctly through the device.You need to: Configure your client devices to point to the default gateway. Configure the device to use the Internet gateway as its default gateway. Ensure your client devices can deliver email messages to the mail servers within your organization.Explicit proxy modeUse this information to better understand explicit proxy mode on your McAfee Email Gateway.In explicit proxy mode, some network devices must be set up explicitly to send traffic to the device.The device then works as a proxy or relay, processing traffic on behalf of the devices.Explicit proxy mode is best suited to networks where client devices connect to the device through asingle upstream and downstream device.This might not be the best option if several network devices must be reconfigured to send traffic to thedevice.Network and device configurationIf the device is set to explicit proxy mode, you must explicitly configure your internal mail server torelay email traffic to the device. The device scans the email traffic before forwarding it, on behalf ofthe sender, to the external mail server. The external mail server then forwards the email message tothe recipient.In a similar way, the network must be configured so that incoming email messages from the Internetare delivered to the device, not the internal mail server.The device scans the traffic before forwarding it, on behalf of the sender, to the internal mail server fordelivery, as shown.McAfee Email Gateway 7.0 Appliances Installation Guide13

1Draft only - 9.13.11Preparing to installDeployment strategies for using the device in a DMZFor example, an external mail server can communicate directly with the device, although traffic mightpass through several network servers before reaching the device. The perceived path is from theexternal mail server to the device.ProtocolsTo scan a supported protocol, you must configure your other network servers or client computers toroute that protocol through the device, so that no traffic bypasses the device.Firewall rulesExplicit proxy mode invalidates any firewall rules set up for client access to the Internet. The firewallsees only the IP address information for the device, not the IP addresses of the clients, so the firewallcannot apply its Internet access rules to the clients.Where to place the deviceConfigure the network devices so that traffic needing to be scanned is sent to the device. This is moreimportant than the location of the device.The router must allow all users to connect to the device.The device must be positioned inside your organization, behind a firewall, as shown in Figure 6:Explicit proxy configuration.Typically, the firewall is configured to block traffic that does not come directly from the device. If youare unsure about your network’s topology and how to integrate the device, consult your network expert.Use this configuration if: The device is operating in explicit proxy mode. You are using email (SMTP).For this configuration, you must: Configure the external Domain Name System (DNS) servers or Network Address Translation (NAT)on the firewall so that the external mail server delivers mail to the device, not to the internal mailserver. Configure the internal mail servers to send email messages to the device. That is, the internal mailservers must use the device as a smart host. Ensure that your client devices can deliver emailmessages to the mail servers within your organization. Ensure that your firewall rules are updated. The firewall must accept traffic from the device, butmust not accept traffic that comes directly from the client devices. Set up rules to preventunwanted traffic entering your organization.Deployment strategies for using the device in a DMZUse this information to understand about demilitarized zones within your network, and how to usethem to protect your email servers.A demilitarized zone (DMZ) is a network separated by a firewall from all other networks, including theInternet and other internal networks. The typical goal behind the implementation of a DMZ is to lockdown access to servers that provide services to the Internet, such as email.Hackers often gain access to networks by identifying the TCP/UDP ports on which applications arelistening for requests, then exploiting known vulnerabilities in applications. Firewalls dramaticallyreduce the risk of such exploits by controlling access to specific ports on specific servers.14McAfee Email Gateway 7.0 Appliances Installation Guide

Draft only - 9.13.11Preparing to installDeployment strategies for using the device in a DMZ1The device can be added easily to a DMZ configuration. The way you use the device in a DMZ dependson the protocols you intend to scan.SMTP configuration in a DMZUse this information to understand how to configure SMTP devices within a demilitarized zone on yournetwork.The DMZ is a good location for encrypting mail. By the time the mail traffic reaches the firewall for thesecond time (on its way from the DMZ to the Internet), it has been encrypted.Devices which scan SMTP traffic in a DMZ are usually configured in explicit proxy mode.Configuration changes need only be made to the MX records for the mail servers.NOTE: You can use transparent bridge mode when scanning SMTP within a DMZ. However, if you do notcontrol the flow of traffic correctly, the device scans every message twice, once in each direction. Forthis reason, explicit proxy mode is usually used for SMTP scanning.Mail relayIf you have a mail relay already set up in your DMZ, you can replace the relay with the device.To use your existing firewall policies, give the device the same IP address as the mail relay.Mail gatewaySMTP does not provide methods to encrypt mail messages — you can use Transport Layer Security(TLS) to encrypt the link, but not the mail messages. As a result, some companies do not allow suchtraffic on their internal network. To overcome this, they often use a proprietary mail gateway, such asLotus Notes or Microsoft Exchange, to encrypt the mail traffic before it reaches the Internet.To implement a DMZ configuration using a proprietary mail gateway, add the scanning device to theDMZ on the SMTP side of the gateway.In this situation, configure: The public MX records to instruct external mail servers to send all inbound mail to the device(instead of the gateway). The device to forward all inbound mail to the mail gateway, and deliver all outbound mail usingDNS or an external relay. The mail gateway to forward all inbound mail to the internal mail servers and all other (outbound)mail to the device. The firewall to allow inbound mail that is destined for the device only.Firewalls configured to use Network Address Translation (NAT), and that redirect inbound mail tointernal mail servers, do not need their public MX records reconfigured. This is because they aredirecting traffic to the firewall rather than the mail gateway itself. In this case, the firewall must insteadbe reconfigured to direct inbound mail requests to the device.McAfee Email Gateway 7.0 Appliances Installation Guide15

1Draft only - 9.13.11Preparing to installDeployment strategies for using the device in a DMZFirewall rules specific to Lotus NotesUse this information to identify specific considerations when protecting Lotus Notes systems.By default, Lotus Notes servers communicate over TCP port 1352. The firewall rules typically used tosecure Notes servers in a DMZ allow the following through the firewall: Inbound SMTP requests (TCP port 25) originating from the Internet and destined for the device TCP port 1352 requests originating from the Notes gateway and destined for an internal Notes server TCP port 1352 requests originating from an internal Notes server and destined for the Notes gateway SMTP requests originating from the device and destined for the InternetAll other SMTP and TCP port 1352 requests are denied.Firewall rules specific to Microsoft ExchangeUse this information to identify specific considerations when protecting Microsoft Exchange systems.A Microsoft Exchange-based mail system requires a significant workaround.When Exchange servers communicate with each other, they send their initial packets using the RPCprotocol (TCP port 135). However, once the initial communication is established, two ports are chosendynamically and used to send all subsequent packets for the remainder of the communication. Youcannot configure a firewall to recognize these dynamically-chosen ports. Therefore, the firewall doesnot pass the packets.The workaround is to modify the registry on each of the Exchange servers communicating across thefirewall to always use the same two “dynamic” ports, then open TCP 135 and these two ports on thefirewall.We mention this workaround to provide a comprehensive explanation, but we do not recommend it.The RPC protocol is widespread on Microsoft networks — opening TCP 135 inbound is a red flag tomost security professionals.If you intend to use this workaround, details can be found in the following Knowledge Base article onthe Microsoft rkload managementUse this information to learn about the workload management features of McAfee Email Gateway.The appliances includes its own internal workload management, distributing the scanning load evenlybetween all appliances configured to work together.You do not need to deploy an external load balancer.16McAfee Email Gateway 7.0 Appliances Installation Guide

Draft only - 9.13.112Installing the McAfee Email GatewayapplianceUse this information to understand the recommended process to install, connect and configure yourMcAfee Email Gateway.McAfee recommends that you consider installing the McAfee Email Gateway in the following order:1Unpack the McAfee Email Gateway and confirm no parts are missing (check against parts lists inthe box)2Rack-mount the McAfee Email Gateway3Connect the peripherals and power (monitor, keyboard).4Connect the McAfee Email Gateway to the network, noting deployment scenarios and intendednetwork mode.5Install the software onto the McAfee Email Gateway6U

An appliance McAfee Email Gateway installation and recovery CD Power cords Linux source code CD Network cables Documentaiton CD If an item is missing or damaged, contact your supplier. McAfee Email Gateway 7.0 Appliances Installation Guide 9 Draft only - 9.13.11

Related Documents:

McAfee Management of Native Encryption (MNE) 4.1.1 McAfee Policy Auditor 6.2.2 McAfee Risk Advisor 2.7.2 McAfee Rogue System Detection (RSD) 5.0.4 and 5.0.5 McAfee SiteAdvisor Enterprise 3.5.5 McAfee Virtual Technician 8.1.0 McAfee VirusScan Enterprise 8.8 Patch 8 and Patch 9 McA

McAfee Web Gateway WG5000 and WG5500 Appliances deliver comprehensive security for all aspects of Web 2.0 traffic. A front view of the Model WG5000 and WG5500 is shown in Figure 1 below. Figure 1 - McAfee Web Gateway WG5000 (top) and WG5500 (bottom) The McAfee Web Gateway ensures comprehensive web security for networks. It protects networks .

McAfee Firewall Enterprise Control Center Release Notes, version 5.3.1 McAfee Firewall Enterprise Control Center Product Guide, version 5.3.1 McAfee Firewall Enterprise McAfee Firewall Enterprise on CloudShield Installation Guide, version 8.3.0 McAfee Network Integrity Agent Product Guide, version 1.0.0.0

McAfee Email Gateway delivers comprehensive, enterprise-class protection against email threats in an . Encryption The McAfee Email Gateway includes several encryption methodologies: Server-to-server encryption Secure Web Mail Pull delivery . feedback service in your product, you will help us improve McAfee Global Threat

If you purchase the McAfee Email Gateway after this evaluation, McAfee can either supply the relevant hardware and other items that accompany an appliance, or you can access the software using a virtual appliance. Supported platforms McAfee Email Gateway Appliance (VMtrial) works on the following virtual platforms: VMware vSphere (ESX) 4.x .

Web Gateway is part of a solution known as McAfee Web Protection. Within this solution, Web Gateway protects your network against threats that arise when on-premise users access the web from inside your network. McAfee Web Gateway Cloud Service (McAfee WGCS) is the part of the solution that protects web usage by cloud users, who

4 From McAfee.com, copy the McAfee ePO software to the virtual McAfee ePO server. 5 From the McAfee ePO server, run the setup utility. 6 Using a remote browser, log on to McAfee

Agile software development therefore has a focus on: . Scrum is one of the most popular agile development methodologies. Scrum is a lightweight framework designed to help small, close-knit teams of people to create complex software products. The key features of the scrum methodology are as follows: Scrum team: A team of people using this methodology are called a “scrum”. Scrums usually .