eTrust Secure Content Manager Implementation Guide r8

Transcription

eTrust Secure Content Manager Implementation Guide r8
eTrust Secure Content Manager
Implementation Guide
r8
This documentation and related computer software program (hereinafter referred to as the "Documentation") is for
the end user's informational purposes only and is subject to change or withdrawal by Computer Associates
International, Inc. ("CA") at any time.
This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part,
without the prior written consent of CA. This documentation is proprietary information of CA and protected by the
copyright laws of the United States and international treaties.
Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for
their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy.
Only authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of
the license for the software are permitted to have access to such copies.
This right to print copies is limited to the period during which the license for the product remains in full force and
effect. Should the license terminate for any reason, it shall be the user's responsibility to return to CA the
reproduced copies or to certify to CA that same have been destroyed.
To the extent permitted by applicable law, CA provides this documentation "as is" without warranty of any kind,
including without limitation, any implied warranties of merchantability, fitness for a particular purpose or
noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or
indirect, from the use of this documentation, including without limitation, lost profits, business interruption,
goodwill, or lost data, even if CA is expressly advised of such loss or damage.
The use of any product referenced in this documentation and this documentation is governed by the end user's
applicable license agreement.
The manufacturer of this documentation is Computer Associates International, Inc.
Provided with "Restricted Rights" as set forth in 48 C.F.R. Section 12.212, 48 C.F.R. Sections 52.227-19(c)(1) and
(2) or DFARS Section 252.227-7013(c)(1)(ii) or applicable successor provisions.
© 2005 Computer Associates International, Inc.
All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
Contents
Chapter 1: Introduction
7
Distinctive Features and Functionality ...................................................................................... 8
Comprehensive Protection................................................................................................. 8
Email Anti-Spam and Content Security Filtering ................................................................... 8
Web Content Security and URL Filtering .............................................................................. 8
Phishing and Spyware Prevention....................................................................................... 9
Antivirus Protection.......................................................................................................... 9
Data Confidentiality Monitoring .......................................................................................... 9
Malicious Mobile Code Defense ........................................................................................ 10
Easy Administration ....................................................................................................... 10
Real-time User Self-Management ..................................................................................... 10
Comprehensive Reporting ............................................................................................... 10
Extensive Automated Actions and Alerts............................................................................ 11
Complete Content Management ............................................................................................ 11
Email Content Management............................................................................................. 11
Web Content Management .............................................................................................. 13
The Purpose of This Guide .................................................................................................... 13
Related Documentation ........................................................................................................ 14
Chapter 2: Implementation Planning
15
Security Considerations ....................................................................................................... 15
Establishing Security Guidelines....................................................................................... 15
Establishing an Incident Response Plan ............................................................................. 17
Assessing Your Security Level.......................................................................................... 17
Email and Email Server Considerations................................................................................... 18
Email Delivery............................................................................................................... 18
Email Traffic Direction Rules ............................................................................................ 20
Domain Route List ......................................................................................................... 20
Web Considerations............................................................................................................. 24
DNS Considerations ....................................................................................................... 25
Chaining Proxy Servers .................................................................................................. 26
Firewall Considerations ........................................................................................................ 26
Installing on the Intranet Side ......................................................................................... 27
Installing on the Internet Side ......................................................................................... 28
Network Considerations ....................................................................................................... 29
Content Filtering and Network Load ....................................................................................... 30
Authentication Method Considerations .................................................................................... 30
Contents iii
NTLM Basics ................................................................................................................. 31
How NTLM Works .......................................................................................................... 32
NTLM Considerations and Recommendations...................................................................... 33
Completing the Pre-installation Checklist ................................................................................ 37
Pre-installation Checklist................................................................................................. 39
Determine an Installation Scenario................................................................................... 39
Upgrading from a Previous Release........................................................................................ 42
Known Upgrade Issues ................................................................................................... 43
Chapter 3: Installing eTrust SCM
45
Installation Steps ................................................................................................................ 45
Choose a Language, Read the Terms and Conditions, and Provide User, Drive, and Location
Information .................................................................................................................. 48
Option 1 - The SMB Scenario........................................................................................... 53
Option 2 - Enterprise Scenario......................................................................................... 53
HTTP / SMTP Server Ports ............................................................................................... 56
Email Notification .......................................................................................................... 57
SMTP Relay Configuration ............................................................................................... 58
Fully Qualified Domain.................................................................................................... 62
Traffic Direction Classification .......................................................................................... 63
Select Database ............................................................................................................ 64
eTrust Embedded IAM Server .......................................................................................... 67
Complete the Installation................................................................................................ 68
Licensing and Registering eTrust SCM .................................................................................... 69
Testing the Installation ........................................................................................................ 73
Installing Individual Components Only ................................................................................... 74
Chapter 4: Configuring Your Implementation
75
The Manager Console .......................................................................................................... 75
Starting the Manager Console.......................................................................................... 77
Checking and Adjusting Manager Console Settings ............................................................. 78
Configuring Initial Filtering Settings ....................................................................................... 78
Local Settings ............................................................................................................... 79
Enterprise Settings ........................................................................................................ 87
Configuring eTrust Embedded IAM ......................................................................................... 96
Starting the Embedded IAM Utility ................................................................................... 97
Setting Global Users and Global Group Settings ................................................................. 97
Managing Roles Using eTrust Embedded Identity and Access Management ............................. 98
Configuring eTrust SCM With Your Email Server......................................................................106
Installation on a Dedicated Computer ..............................................................................106
How to Configure eTrust SCM on a Dedicated Computer .....................................................107
iv Implementation Guide
Installing on the Mail Server Computer ............................................................................113
Configuring the Browser Proxy .............................................................................................122
Configuring a Browser for Manual Proxy ...........................................................................123
Chapter 5: Implementation Modes
133
Phase 1 - Alert Mode ..........................................................................................................133
Phase 2 - Notification Mode .................................................................................................134
Phase 3 - User Self Management Mode..................................................................................134
Phase 4 - Blocking Mode .....................................................................................................135
Chapter 6: Troubleshooting the eTrust SCM Installation
137
Correct an Incomplete DNS Configuration ..............................................................................137
Prevent Loop-back Problems................................................................................................139
Manager Console or Quarantine Manager Terminates Suddenly.................................................140
Verify Firewall Ports Are Open ..............................................................................................140
eTrust InoculateIT or eTrust Antivirus Conflicts with Antivirus Realtime Scanner..........................141
Outgoing SMTP Rules Are Also Applied to Incoming Emails .......................................................142
Unblock a Website..............................................................................................................142
Appendix A: ADCP Authentication
143
The ADCP Agent ................................................................................................................144
ADCP DSA ...................................................................................................................144
ADCP RAS/RRAS Universal Source Agent..........................................................................144
ADCP USA ...................................................................................................................144
Installing the ADCP Agent ..............................................................................................145
The ADCP Distributed Source Client ......................................................................................153
Adding DistClient.exe As a Logon Script ...........................................................................155
Adding DistClient.exe As a Logoff Script ...........................................................................157
Installing the ADCP Distributed Source Client....................................................................158
Appendix B: Installing and Configuring Microsoft SQL Server
163
Prerequisites .....................................................................................................................163
Creating the Quarantine and Reports Databases .....................................................................164
Creating an SQL User and Associating It with the Databases ....................................................170
Contents v
Glossary
175
Index
181
vi Implementation Guide
Chapter 1: Introduction
The scope and complexity of IT security has greatly increased in recent years.
Global organizations now depend heavily upon the Internet, intranets and their
network infrastructures to effectively conduct business, so maintaining the
security and integrity of the data shared across these environments is crucial.
The proliferation and diversity of the content entering the workplace, however,
is changing today's enterprise security requirements. Unfortunately, it is now
easier than ever for spam, spyware, phishing attacks, viruses, and malicious
mobile code to plague and potentially cause harm to an enterprise.
eTrust™ Secure Content Manager (eTrust SCM) from Computer Associates
International, Inc. (CA) is the first truly multifaceted solution for enterprise
security, geared to the content revolution. It is a highly scalable, businessdriven, integrated solution that ties content management and security
functions together to resolve and manage virtually every security issue facing
an enterprise today. It addresses the increasing complexity of the content
security challenge, as well as the emergence of new threats such as spyware
and phishing attacks, which requires a more comprehensive security solution.
eTrust SCM builds on the strengths of CA's award-winning antivirus technology
while taking content security to the next level - offering the best all-around
protection for corporate networks.
eTrust SCM provides enterprise policy-based, content security filtering of
Simple Mail Transfer Protocol (SMTP), Hypertext Transfer Protocol (HTTP), and
File Transfer Protocol (FTP) content. eTrust SCM helps prevent virus infections,
spam, browsing of inappropriate or non-productive sites, access to spyware or
phish websites, confidentiality breaches, mobile code threats and computer
resource abuse. In the event of a policy violation, eTrust SCM can respond
automatically with a wide range of customized actions.
In the event of a policy violation, eTrust SCM can respond automatically with a
wide range of customized actions:
„
Conventional content management actions such as logging, blocking,
alerting, and curing
„
Actions that work together with other applications such as eTrust Security
Command Center and Unicenter.
„
Spam prevention actions such as quarantining, parking (to perhaps delay
emailing large messages until off-peak hours), denying, user management
of quarantined email and adding disclaimers to email for protection against
legal liability
The integrated Log Viewer and Reporter tools provide a sophisticated level of
real-time statistics analysis of email and web traffic.
Introduction 7
Distinctive Features and Functionality
Distinctive Features and Functionality
eTrust SCM provides a rich set of tools and functionality to provide
comprehensive security for your enterprise.
Comprehensive Protection
eTrust SCM provides intelligent, customizable, policy-driven email (SMTP) and
Web (HTTP, FTP) traffic scanning to meet your business needs and address
virtually every content threat.
„
Integrated Management Console. Enables you to monitor all content
threats, whether from email or the Web.
Email Anti-Spam and Content Security Filtering
eTrust SCM protects against unwanted, unsolicited, and inappropriate email,
increasing business productivity and network bandwidth.
„
Comprehensive Email Filtering. eTrust SCM uses a multilayered
approach to differentiate between spam and valid email, providing a high
spam detection rate and a low rate of email falsely identified as spam.
The solution includes sender reputation, Bayesian analysis, embedded URL
filtering, and malformed email detection that help protect you from
unwanted email, while improving business productivity.
„
Automatic Spam Updates. To protect you against the latest threats,
eTrust SCM provides automatic spam updates.
„
Incoming and Outgoing Email Traffic Filtering. All email is scanned
using the policies and rules you define to match your business
requirements.
Web Content Security and URL Filtering
eTrust SCM screens outgoing traffic and URL addresses for businessappropriate websites based on the business rules your company defines.
„
Reduced Liabilities. Policy-based URL filtering reduces the risk of legal
liability should an employee visit an inappropriate website.
„
Reduced Costs. eTrust SCM improves business productivity and increases
network bandwidth by minimizing non-productive web surfing and file
downloads during business hours.
8 Implementation Guide
Distinctive Features and Functionality
Phishing and Spyware Prevention
eTrust SCM provides an added layer of security by preventing employees from
unknowingly accessing known phishing or spyware sites.
„
Reduced Risks. eTrust SCM provides proactive protection against
phishing and spyware-infested Web sites, ensuring that your confidential
business information stays private and your systems run efficiently.
„
Reduced Costs. Spyware programs can clog your PCs and slow down
your network, resulting in increased help desk calls. eTrust SCM, protects
against spyware, enabling your IT department to focus on strategic
business initiatives.
Antivirus Protection
eTrust SCM builds on and includes CA's award-winning perimeter antivirus
protection.
„
Reduced Costs. eTrust SCM scans for viruses at the gateway before they
can enter your network and cause costly damage and downtime.
„
Easy Administration. Automated signature downloads for the gateway
complement your existing desktop antivirus protection and provide
another layer of security.
Data Confidentiality Monitoring
eTrust SCM screens outgoing email according to your policies and rules in
order to help prevent loss of confidential data.
„
Reduced Information Leaks. eTrust SCM helps safeguard against the
transmission of proprietary, controlled or company-confidential information
outside your organization. In addition to email, you can filter content in
Microsoft Word and Adobe PDF attachments.
„
Improved Regulatory Compliance. eTrust SCM helps you comply with
government laws and regulations, such as the Child Internet Protection Act
(CIPA), Health Insurance Portability and Accountability Act (HIPAA),
Gramm-Leach-Bliley Act (GLBA) and California's SB 1386, which mandates
that certain pieces of personal information be proactively protected from
misuse or even suspected compromise.
„
Reduced Penalties and Reputation Safeguarded. eTrust SCM helps
reduce the risk of costly penalties and possible consumer lawsuits for
failure to implement the necessary protections and policies. In addition, it
safeguards against serious damage to your organization's reputation and
profitability.
Introduction 9
Distinctive Features and Functionality
Malicious Mobile Code Defense
eTrust SCM intelligently screens incoming traffic to proactively protect users
against malicious mobile code.
„
Proactive Protection. eTrust SCM protects against both known and
unknown threats as well as a variety of active code attacks, such as those
based on Java, ActiveX and VBScript, that can automatically execute when
visiting certain websites or using email.
„
Easy Implementation. eTrust SCM Gateway scans for malicious active
code using predefined threat levels (low, medium and high) - simplifying
administration.
Easy Administration
eTrust SCM is an integrated, comprehensive content solution that enables you
to address all email and Web content threats and manage them remotely, for
complete control over your content protection, enterprise-wide.
„
Easy Implementation. Implementing one, integrated, solution to
address all email and Web content threats instead of implementing
multiple point solutions considerably eases the workload required.
„
Flexible Deployment. eTrust SCM is a fully integrated, yet completely
modular solution, enabling you to select the right level of security to meet
your organization's unique business requirements.
„
Reduces Management Overhead. eTrust SCM provides central policy
management which allows you to write a keyword policy for an email filter
and to reuse it in a filter for website content.
Real-time User Self-Management
This function allows your users to access their quarantined email via a Webbased interface and add senders to their personal allow or deny lists.
„
False Positive Reduction. eTrust SCM helps reduce the incidence of false
positive matches on spam by allowing end users to manage their
quarantined email.
Comprehensive Reporting
eTrust SCM provides over 30 predefined reports on email and Web filtering
activities, and custom reports can be created from them and saved.
10 Implementation Guide
Complete Content Management
Extensive Automated Actions and Alerts
Automated, customizable actions, such as block and quarantine, can be
defined for each policy so that there is an immediate response when an object
matches the policy criteria.
If you attempt to access an inappropriate website, the URL can be immediately
blocked and an email can be automatically generated to the network
administrator.
Complete Content Management
eTrust SCM provides comprehensive email content management and web
content management as described in the topics that follow.
Email Content Management
The SMTP Content Filtering engine includes the following features:
„
Spam prevention based on eTrust SCM's Advanced Spam Filter
„
Spam prevention based on Realtime Blackhole List (RBL) providers
„
Spam prevention based on embedded web links (URL Filtering)
„
Aggressive RBL checking where the engine looks for spam servers in the
email header
„
Spam prevention based on regular expression string search in the email
body, header, and attachments
„
Spam prevention based on an internal deny list for mail servers, relays,
email users and domains for a configurable time
„
Spam prevention based on a pre-defined spam dictionary
„
Allow lists for trusted mail servers, relays, email users and domains for a
configurable time
„
Profanity prevention
„
User self management for users to manage and control their personal
quarantine folder and for tuning private email lists
„
An Industrial strength antivirus scanning engine with the ability to cure
and strip infected attachments
Introduction 11
Complete Content Management
„
Hoax virus detection based on a keyword regular-expression dictionary
„
Extraction of compressed attachments
„
Email logging activities and content
„
Attachment type recognition based on attachment extension or content
„
Attachment size identification with larger, smaller, between, exact settings
„
Attachment file type identification
„
Attachment ID number identification
„
Attachment file name identification
„
Attachment keyword scan for MS Word and Adobe PDF
„
Attachment scan for binary patterns
„
Partial message detection
„
PGP and S\Mime encrypted message detection
„
Disclaimer message additions
„
Large message delay or parking until off-peak hours
„
Email quarantines
„
DOS prevention for compressed attachments and nested emails
„
A wide range of actions, including adding to a deny list, fax, pager, and
email
„
Long subject or attachment detection and prevention
„
Spam detection and prevention based on LDAP for avoiding the acceptance
of incoming emails intended for invalid recipients and limiting the number
of invalid recipients on a single SMTP session
12 Implementation Guide
The Purpose of This Guide
Web Content Management
The HTTP/FTP content filtering engine and the categories URL filtering feature
include the following web content filtering capabilities:
„
URL Categories detection with more than 60 predefined categories and 10
user defined categories
„
Match URL detection
„
Dynamic mobile code engine for threat prevention and digital certificate
verification of signed objects
„
Industrial strength antivirus scanning engine
„
Integration with the ADCP module
„
NTLM Authentication support
„
Download logging and logging of other activities
„
File type recognition based on file extension or file content
„
Regular expression keyword search in the HTML body, title, and downloads
„
Compressed type extraction
„
File size identification with larger, smaller, between, exact settings
„
File type identification
„
File name identification
„
DOS prevention for compressed types
„
Token based customizable notification of HTML pages upon rule violation
„
A wide range of actions including fax, pager, and email
„
Automatic detection of proxy settings (using a PAC file)
The Purpose of This Guide
This guide describes how to implement eTrust SCM. It is designed to help you
plan, install, and make post-installation configuration changes to eTrust SCM
to meet your needs.
Introduction 13
Related Documentation
Related Documentation
For more information, see the following related documentation:
„
The eTrust SCM Administrator Guide provides information about
maintaining eTrust SCM in your enterprise.
„
The eTrust SCM online help system provides useful task-related
information for using eTrust SCM.
14 Implementation Guide
Chapter 2: Implementation Planning
eTrust SCM provides content security filtering for SMTP and HTTP/FTP data.
eTrust SCM also provides central management of SMTP policies, HTTP/FTP
policies, and remote management of eTrust SCM servers. Before you start
planning the implementation, thoroughly review the concepts and other useful
information in this chapter.
Security Considerations
Planning an eTrust SCM installation requires a review of your organization's
structure, policies and procedures, and security goals.
Establishing Security Guidelines
A security policy is a living document. You will revise it as necessary due to
changes in applicable laws, regulatory requirements, industry guidelines, and
company practices.
The steps for establishing a security policy include:
1.
Determine expectations. Clearly document your expectations for
appropriate and authorized use in a concise and understandable fashion.
2.
Review acceptable risks. Evaluate what are your most important assets
to protect and what are the costs involved.
3.
Study the existing infrastructure. Study your infrastructure to
determine the type of policies you need in place and create an Incident
Response Plan.
4.
Document the procedure and the policy. Acceptable Use Policies (AUP)
are one of the many basic and easily understood standardized policies that
must be in effect in your organization for audit and enforcement purposes.
5.
Test the procedure and the policy. After you have determined the
components of your company’s security policy, you must test the policy in
an Incident Response Plan. One of the most effective methods for testing a
network is to violate the security policy to determine if the network is
protected.
Implementation Planning 15
Security Considerations
6.
Secure host servers. Secure all host servers in order to secure the
perimeter of your network.
7.
Enforce the security policy. Enforce the security policy by clearly
defining your strategy. Consider setting up a response team and
determining the responsibilities of each member of the team. Also, define
which members should be notified when security is breached. As a
precaution, deploy technology to aid in compliance and the detection of
violations. You should also create guidelines on how to act on noncompliance and/or violations.
8.
Inform your staff. Create awareness of any new and existing policies for
all levels of employees. Employees need to be aware of your company's
Acceptable Use Policy. Security awareness is an important part of
enforcing the policy.
When training employees on spam avoidance, ensure that they know the
following:
„
„
„
Never reply to spam. If you reply to spam, you are validating your email address to the spammer and they may pass it on to other
spammers.
Avoid placing your e-mail address on public websites. One of the ways
that spammers gather e-mail addresses is by going through message
boards, chatrooms, and online directories.
Do not purchase any product from a spammer. Doing so supports their
business and makes them profitable.
Note: Depending on your organization type, other laws may govern
your business practices (such as CIPA, HIPAA, or ISO17799). Consult
your legal department when creating your Acceptable Use Policy.
16 Implementation Guide
Security Considerations
Establishing an Incident Response Plan
An incident response plan provides your organization with detailed guidelines
and escalation procedures to follow if an adverse security event or policy
breach occurs.
The plan also identifies response team members and roles and establishes a
chain-of-command for communication with law enforcement, the public, and
the media.
You can categorize incidents according to business operation impact and/or
reputation damage using these severity levels:
Low
Incident impact is minimal.
Medium
Incident significantly impacts business activity. It may, for example, delay
the ability of the enterprise to perform critical functions or provide data.
High
Incident severely impacts the enterprise. It may, for example, disrupt
business processes or compromise the integrity of proprietary or
confidential data.
Assessing Your Security Level
Organizations in highly regulated industries such as the financial and
healthcare fields should establish secure IT environments. In addition to
security guidelines, policies, and procedures, you should also define a basic
level of security for your network environment. You need to continually update
this security baseline as you identify new threats or introduce new technology.
Security assessment tools allow you to determine where you are now and
what steps you need to take to comply with either the regulations that govern
your industry or ensure that you are in line with your guidelines and policies
and procedures. Audits frequently require proof of forward progression toward
protecting your environment and data.
Implementation Planning 17
Email and Email Server Considerations
Email and Email Server Considerations
Effectively manage and defend your network by establishing a security policy
that provides parameters for legitimate email use. Afterward, use eTrust SCM
to apply and enforce your security policies.
CA recommends that eTrust SCM and the mail server be installed on separate
computers. This allows the eTrust SCM SMTP filtering engine to review and
forward all acceptable e-mails to the mail server without requiring any
modification to the mail server configuration. For the mail server to forward
inbound traffic to eTrust SCM, you might need to modify the DNS MX records.
Changes must be made to the mail server. You must also modify the mail
server so that it can forward outbound traffic to eTrust SCM.
If you are running eTrust SCM and the mail server on the same computer, a
Denial of Service (DoS) attack on the mail system may affect external mail
and internal mail as well. When eTrust SCM and the mail server are located on
the same machine, you must modify the mail server configuration so that it
does not listen to the default port of 25 on the TCP/IP address that the eTrust
SCM is using.
Email Delivery
Email messages are routed between your organization's computers and the
Internet using the Domain Name System (DNS). The DNS is a dynamic
database for mapping the host name of a computer on the TCP/IP network to
the computer's IP address.
To apply content filtering on outgoing email before delivering the email,
configure your local mail servers to forward all outgoing email to the eTrust
SCM SMTP computer. See your mail server documentation for more
information on how to do this.
18 Implementation Guide
Email and Email Server Considerations
Using MX Records for Fail-Over and Load Balancing
Each entry in the DNS table stores a relationship between MX records and host
names and IP addresses. MX records are DNS entries that contain the names
of the mail servers in a given domain.
You can set priorities for multiple mail servers in a domain by using MX record
preference settings: the lower the number, the higher the priority. Two MX
records with the same priority number share email workload equally. A server
with a higher priority number is contacted only when servers with lower
numbers are unavailable. This allows the administrator to build redundancy so
that email can flow automatically through backup systems if primary systems
are unavailable.
Configure your MX records on your local DNS server to point to the eTrust SCM
computer rather than to your local mail servers. This ensures that incoming
email is first delivered to the eTrust SCM computer and then scanned for SMTP
Content Filtering before the mail is delivered to local mail servers.
Using MX Records with Multiple Computers
When installing multiple eTrust SCM computers, you can create or change MX
records to provide a fail-over covering system and basic load balancing
functionality.
For example, you can apply a high numeric MX number to an eTrust SCM
backup computer and apply low numeric MX numbers to all other eTrust SCM
computers. During normal operation, the backup computer processes a
minimal amount of email, and the other computers process most of the email.
When other computers are unavailable, the backup computer processes most
of the email.
You can use the same concept to tune your environment for load balancing.
Simply split the network traffic across several eTrust SCM computers and use
a different MX record for each computer.
Implementation Planning 19
Email and Email Server Considerations
Email Traffic Direction Rules
eTrust SCM classifies SMTP rules according to the following email traffic
directions. You can find the configuration menu for this function under
Manager Console, Filtering, Content Manager Rules, SMTP. These rules for
email traffic direction include the following:
„
Inbound rules specify content filtering for inbound email traffic. These
rules apply to email that originates outside your organization.
„
Outbound rules specify content filtering for outbound email. These rules
apply to email sent from your organization to addresses outside your
organization.
„
Internal checking rules apply to email sent to and from users within your
organization. All email that originates from your configured subnets is
processed as outgoing traffic even if the destination is internal.
Domain Route List
eTrust SCM provides an email routing schema that distinguishes between
incoming and outgoing email routing based on email address domains. This is
comparable to nslookup MX logic.
For incoming and outgoing email, you can define domain-specific email servers
or email servers for all domains or other domains not explicitly defined. You
can define one or more email (relay) servers for each domain:
20 Implementation Guide
Email and Email Server Considerations
If you specify more than one relay server, eTrust SCM processes the list in the
specified order until relaying to a server succeeds.
The following example shows the list of available relay servers defined for the
outgoing domain ca.com:
Email Delivery
Email delivery starts by attempting to connect to email servers defined in the
list. eTrust SCM processes connection attempts in the specified order. When
eTrust SCM establishes a connection to one of the listed servers, the relay
server lookup process is treated as successful and communication continues
according to the SMTP protocol.
The relay list entry MX functions in a different way - instead of connecting to a
specific email server, eTrust SCM tries to determine the actual relay list by MX
lookup and starts to connect to the appropriate servers after the check.
Implementation Planning 21
Email and Email Server Considerations
Retry or Return to Sender
Use the Retry check box in the SMTP Relay Configuration dialog to specify how
to handle email that is not delivered in the first attempt.
If you enable retry, eTrust SCM starts additional delivery attempts using TBD
(to be delivered) logic. Instead of using global settings for the retry interval
and number of attempts, you can specify values for each domain. Email that
eTrust SCM cannot deliver based on the retry interval and attempt settings is
sent back to sender.
If you disable retry, eTrust SCM does not start any additional delivery
attempts and immediately sends the email back to the sender. Email that
eTrust SCM cannot return to the sender is placed in the deadmail queue.
Relay Control and Open Relay Prevention
You should not use eTrust SCM as an open relay. If eTrust SCM is accessible
from outside your organization, spammers can use it as a transport server for
spam email. As a result, your organization could be put on Real-time Blackhole
Lists (RBL) as a spam source.
To protect against becoming a spam transport server, define the domains to
which eTrust SCM can route incoming emails so that any incoming emails not
intended for these domains are rejected. This can be done during installation
or post installation. Post installation from the Manager Console, navigate to
Filtering, Settings, <Engine>, SMTP Engine, Relay Servers Configuration.
You can establish open relay protection by not specifying a domain (*) entry
for incoming email. The incoming domain list should contain only domains
belonging to the intranet with appropriate relay servers or MX entries in the
relay list.
22 Implementation Guide
Email and Email Server Considerations
The following example shows a typical open relay protected intranet with the
domain ca.com:
In this configuration, relay control blocks all incoming email for domains other
than email from ca.com.
The following example shows an open relay configuration, which is not
recommended:
Implementation Planning 23
Web Considerations
Multiple Email Recipients
eTrust SCM processes multiple recipient email using the following logic:
1.
eTrust SCM groups recipients by domain.
2.
eTrust SCM then sends a copy of the original email to each recipient
group. In other words, each email is duplicated as necessary for further
processing if recipients belong to more than one domain.
3.
If eTrust SCM cannot deliver these duplicated emails, the retry logic
described in Retry or Return to Sender (see page 22) is activated.
Web Considerations
When planning your implementation, carefully consider a variety of DNS,
proxy server, and firewall issues.
24 Implementation Guide
Web Considerations
DNS Considerations
Good DNS security is paramount to a secure network. Use the following to
address DNS-related security concerns:
Cache Poisoning
This occurs when a name server makes a recursive query and caches
false/forged data for a domain name. This can result in a Denial of Service
(DoS) attack. To prevent this vulnerability, modify DNS server properties
by enabling the Secure cache against pollution option.
Disabling Recursive Queries
By default, a Windows DNS server performs recursive queries. However, a
recursion can be used as a DoS attack that is used to shut down a name
server to make it inaccessible to users. A recursive query requires that the
queried host attempt and exhaust all means of acquiring the information
being asked of it, until the name query fails.
In contrast, an iterative query asks a server for an answer. If the server
has the answer in its cache, it replies or else provides a referral, which is a
name of another server that may have the answer.
Set local DNS servers to perform iterative requests. In the Command
Prompt, use the following command to disable recursion:
dnscmd <server name> /Config NoRecursion 1
Using a Single Interface
By default, DNS listens and responds to ports on all of the configured
interfaces. If a server is multihomed (multiple NICs), a security breach
might occur on several IP addresses. This also increases the complexity of
your access control lists on your routers and switches.
Configure the DNS server to listen to only one IP address by modifying
your network interface settings according to your OS guidelines. Ensure
that you are only allowing TCP/UDP port 53 traffic to and from your DNS
server.
Implementation Planning 25
Firewall Considerations
Chaining Proxy Servers
eTrust SCM is installed as a proxy server. It traps web requests before they
are sent to the remote server. It also traps web content before sending it to
the local end user.
If a proxy server is deployed on your network, you can chain it to the eTrust
SCM proxy server. The most common ways to chain proxies are the Upstream
and Downstream proxy methods:
„
In the Upstream proxy configuration, eTrust SCM is chained to another
proxy server. This configuration uses the chained proxy as a caching
server. We recommend this implementation. eTrust SCM enforces the
content filtering policies on cached or non-cached content.
„
In the Downstream proxy configuration, the Downstream proxy server is
chained to the eTrust SCM proxy server. This method is not recommended
because cached objects can be sent directly to the user without having the
content filtering policies applied to them. However, if you use a
Downstream proxy, we recommend that you disable Downstream proxy
caching.
Firewall Considerations
eTrust SCM must communicate through the firewalls deployed on your
network. The perimeter firewall typically performs a static Network Address
Translation (NAT) that associates the eTrust SCM private address with a live
Internet IP address. Depending on the DNS MX method that you use, the
firewall administrator may need to move the static NAT from the corporate
mail system to eTrust SCM.
You must also allow some TCP ports through the firewall to enable
communication between clients to eTrust SCM and between eTrust SCM and its
components.
„
Port 1882 is used for CA common services
„
Port 445 is used for Active Directory file sharing
Lock down these ports to the specific machines that need them. Configure
firewall rules for egress filtering to prevent internal users from bypassing
eTrust SCM scanning.
26 Implementation Guide
Firewall Considerations
Installing on the Intranet Side
For optimal security, CA recommends that you install eTrust SCM on the
intranet side of your firewall according to your security policies and your
network architecture as shown in the following illustration:
Implementation Planning 27
Firewall Considerations
Installing on the Internet Side
If you deploy eTrust SCM on the Internet side of your firewall, you can
configure your firewall to direct the traffic directly to eTrust SCM, as shown in
the following illustration. With this configuration, users do not need to
configure their browser to use an eTrust SCM proxy.
Important! CA does not recommend this implementation because it exposes
the eTrust SCM proxy server to external threats from the Internet.
28 Implementation Guide
Network Considerations
Network Considerations
eTrust SCM requires one network interface card (NIC) on the computer on
which it is installed.
eTrust SCM does not need to be a default gateway or a physical buffer
between the external and internal network. eTrust SCM acts as an HTTP and
FTP proxy and is actually a relay server for SMTP. You can install eTrust SCM
on any computer in your organization as long as the computer can access the
following:
„
DNS for MX queries
„
Company SMTP mail server
„
Internet for mail access
„
User's proxy connections
„
Antivirus signature updates and all subscription updates (for example URL
filtering and dictionaries)
Note: To enable web updates, your firewall must allow an FTP connection from
the eTrust SCM computer to the Internet to obtain antivirus signature updates
and an HTTPS connection from the eTrust SCM computer to the Internet to
obtain URL filtering updates.
For network connections between eTrust SCM components, consider the
following:
„
When there is firewall buffering between different components of eTrust
SCM, verify that each eTrust SCM component has access to TCP/IP port
1882. eTrust SCM components use this port for internal communication.
„
For eTrust SCM components installed on different computers, make sure
that all eTrust SCM computers have a valid reverse name resolution, which
is necessary for internal communication between eTrust SCM components.
This capability is used in a network configuration in which some
components are installed on the DMZ and other components are installed
on your local network.
Implementation Planning 29
Content Filtering and Network Load
Content Filtering and Network Load
You typically configure your web content and request filtering using the
settings in your browser. However, when using eTrust SCM as a proxy server,
eTrust SCM traps web requests before forwarding the requests to the remote
server. Likewise, eTrust SCM traps web content before forwarding the content
to the local end user.
Consider the following about content filtering and network load:
„
Determine the type of content you want to filter and estimate the network
load for each protocol type.
„
The installation requests a valid mail server address and a valid email user
account on the server. This account is used by the engine as a transport
layer when eTrust SCM invokes the email action.
„
Install the web content filtering engine to control web content.
„
Install the Central Reporter option, to generate reports. You should also
install a printer, which can be a dummy printer, on the computer for the
reporter to work properly. You can then generate reports in text or HTML
format. To generate reports in Microsoft Word or Excel format, install
Microsoft Office.
If you are using several content filtering servers, consider the following:
„
Install Central Quarantine Manager and Central Reporter on a dedicated
computer to better handle the entire organization's quarantine objects and
reports.
„
The Manager Console connects to the Control Center which allows creating
Content Filtering rules, and distributing them to multiple engines (local
and remote). The real time status of each remote content filtering engine
is also presented in the Manager Console which is connected to the Control
Center.
Authentication Method Considerations
Rule processing for specific users or user groups is part of content filtering
functionality in eTrust SCM. There are two optional methods for filtering by
users: Windows NT standard NTLM (NT LAN Manager) technology or eTrust
Authentication Device Communication Protocol (ADCP). The following sections
provide information that you should consider when implementing NTLM
authentication. Appendix A covers the ADCP method, which is less commonly
used.
30 Implementation Guide
Authentication Method Considerations
NTLM Basics
NTLM uses an encrypted challenge/response protocol to authenticate a user
without sending the user's password over the wire. Instead, the system
requesting authentication must perform a calculation that proves it has access
to the secured NTLM credentials.
A challenge-response mechanism consists of three messages, commonly
referred to as Type 1 (negotiation), Type 2 (challenge) and Type 3
(authentication response).
Here is a summary of the NTLM process:
1.
The client sends a Type 1 message to the server. The message contains
the domain and host name and a list of features supported by the client.
2.
The server responds with a Type 2 message that contains a 16-byte
random number, known as a challenge.
3.
The client encrypts the user's password using server challenge, known as
a response. The client replies with a Type 3 message that contains a
calculated response and several pieces of information about the client,
which includes the domain name and username.
4.
The server sends the user name, server challenge, and client response to
the domain controller.
The domain controller uses the same calculation to decrypt the password. If
the decoded password matches the password obtained from the Security
Account Manager (SAM) database, the client is authenticated.
Implementation Planning 31
Authentication Method Considerations
How NTLM Works
With Integrated Windows authentication, NTLM authentication does not initially
prompt for a user name and password. Instead, Integrated Windows
authentication uses the information for the user currently logged onto the
client computer.
Note: If necessary, you can configure Microsoft Internet Explorer versions 4.0,
5.0, and 6.0 to initially prompt for user information. For more information, see
the Internet Explorer Help.
If the authentication exchange initially fails to identify the user, the browser
prompts the user for a Windows account user name and password, which it
processes using Integrated Windows authentication.
The browser displays prompts until you enter a valid user name and password
or close the prompt dialog.
When configured for NTLM Authentication, eTrust SCM uses the NTLM
authentication method and this protocol for gathering user names and their
domains. eTrust SCM associates the user names and domains to
corresponding Content Filter NTLM rules for the users.
To use NTLM proxy based authentication follow these steps:
1.
Open the Manager Console and select Proxy Server Settings.
The Proxy Server Settings dialog appears.
2.
Select Use NTLM authentication.
NTLM authentication becomes enabled.
3.
Configure a rule that will use a network object based on NTLM. Follow
these steps:
„
Select Client, Workstation User, NTLM (or ANY)
„
Click Select or manually provide a user name and domain.
For example:
Type = Any
Domain = My Domain
Name = My User Name
Note: To use an NT User token, add the NT User Name token to the rule
action.
32 Implementation Guide
Authentication Method Considerations
NTLM Considerations and Recommendations
Consider the following when implementing NTLM as an authentication method.
Compatibility
Only Microsoft Internet Explorer, Mozilla version 1.4 and higher, Mozilla Firefox
support NTLM.
Mixed Mode Domains
When implementing NTLM, never use mixed mode domains. Windows NT 4.x
domain controllers are not aware of Windows 2000 transitive trusts and will
not authenticate across transitive trusts in a mixed mode Windows 2000
domain.
Upstream Web Proxy
You cannot use the SCM proxy NTLM when SCM is chained to an upstream
proxy which is configured to require integrated authentication NTLM.
Incorrect Configuration
Browser --> SCM (with NTLM) --> Proxy (with NTLM) --> Internet
Correct Configuration
Browser --> SCM (with an NTLM request) --> Proxy --> Internet
„
Upstream proxy NTLM authentication:
Configuration:
Browser --> SCM --> Proxy (with an NTLM request) --> Internet
To receive the NT username from a chained upstream proxy that requires
NTLM authentication (e.g. euproxy.ca.com), you need to add to a new
entry to the server.ini file in the HTTP section:
CHAINED_PROXY_MONITOR_AUTH=1
Note: For a situation in which the proxy authenticates using the token
described above, the NT username is not used for applying rules. It is used
only for logging alerts and reporting because of an NTLM protocol
limitation in which the first GET request doesn't contain the NT user
name).
Implementation Planning 33
Authentication Method Considerations
„
There is a known issue with the web browser when an ISA Server 2000 Is
chained to an upstream web proxy server as described in the following
configuration:
User Browser --> ISA (with NTLM authentication) --> SCM --> Internet
From the Microsoft knowledge base: If the Internet Security and
Acceleration (ISA) Server 2000 is chained to an upstream web proxy
server, you may experience unexpected delays, incomplete pages, random
authentication warning messages, and so forth, when you browse the
Web.
eTrust SCM and Users on Different Domains
„
When end users and eTrust SCM are logged into different Active Directory
Server (ADS) domains, a trust can be created between the domains.
Trusts between the domains could be established through a Point-to-Point
Tunneling Protocol (PPTP) tunnel, which limits the number of ports that the
firewall needs to open.
Ports that need to be opened for PPTP would be:
Client Ports
1024-65535/TCP
Server Ports
1723/TCP
Protocol
PPTP
You also need to enable IP Protocol 47 (GRE).
„
34 Implementation Guide
When the client sends an authentication request to SCM, SCM queries its
domain. Since a trust is created between both of the domains, the user is
authenticated successfully. As a result, only the following four ports are
kept open on the firewall:
„
53 (DNS)
„
1723 (PPTP)
„
47 (GRE)
„
135 (msrpc)
Authentication Method Considerations
NTLM Authentication Across a Firewall
Following is the list ports required to be opened on firewall:
„
DNS port 53
„
PPTP port 1723
„
GRE port 47
„
HTTP PROXY 8080
„
HTTP 80 (depending upon HTTP access required through the firewall)
Performing NTLM Authentication Across a Firewall Through SCM
To perform NTLM authentication across a firewall and through SCM, follow
these steps:
1.
Configure two separate Windows domain controllers (for example,
inetrust1.com and inetrust2.com) on two separate servers with each
server on a different network.
Note: This step depends upon the network configuration on the user's
side.
2.
Establish a trust relationship between these two domains and validate the
domain relationships before continuing.
Note: The network configuration required determines the type of trust
relationship used between the domain controllers.
3.
Start Routing and Remote Access service on one of the servers.
The PPTP tunnel between the two domains configured earlier is set up.
4.
Start Routing and Remote Access service on the server. This provides
more security according to the user’s network configuration.
5.
Switch to the other domain controller.
6.
Open the Network Connections window from the Control Panel.
7.
Double click New network connection.
8.
Begin creating a PPTP connection between the two domain controllers.
9.
Click Next. Select the Connect to the network at my workplace radio
button.
Implementation Planning 35
Authentication Method Considerations
10. Click Next. Enter your organization's name or the name of a connection.
11. Click Next. Enter a domain name, host name, or the IP address of another
domain controller.
12. Click Next. Finish creating the PPTP connection.
13. Right click on the newly created connection. Select Properties.
14. Select the Networking tab. Select PPTP VPN from the type of VPN drop
down.
15. Configure other network settings according to the Routing and Remote
Access service on the other domain controller.
16. Double-click on the newly created connection. Enter your user Name and
password and domain name, if required.
17. Click Connect. Confirm that a proper tunnel is established between the two
domains. If you do not confirm this information, the trusts between the
two domain controllers can be affected.
18. The PPTP connection between two domain controllers is now established.
Note: PPTP also requires the GRE port 47 to be opened on the firewall.
36 Implementation Guide
Completing the Pre-installation Checklist
Completing the Pre-installation Checklist
This section provides a pre-installation checklist that you can use for guidance
when completing the pre-installation checklist for your eTrust SCM installation.
eTrust SCM provides data analysis engines and management services. The
component architecture is flexible and can accommodate small and medium
size businesses (SMB) and large enterprise installations. You can install all
data analysis engines and management services on one server (SMB) or
distribute the management services and analysis engine installations on as
many servers as necessary (for example, in a large enterprise with high
volumes of data).
The main components of eTrust SCM are as follows:
HTTP/FTP Content Engine
Performs analysis of Web content, FTP over the HTTP proxy, and URL
filtering.
SMTP Content Engine
Performs analysis of SMTP content and spam filtering.
Control Center
The main management service which concentrates data, distributes
policies, and provides connectivity between all SCM components. Typically,
there should be a single instance of the Control Center in an environment.
Quarantine Manager
A tool and service which manage messages that were quarantined based
on the SMTP Content Engine's analysis. There should be a single instance
of the Quarantine Manager in an environment.
Central Reporter
A tool and service which provide over time reporting based on data
collected by the Content Engines. There should be a single instance of the
Central Reporter in an environment.
Manager Console
The main management user interface, which connects to the Control
Center and allows policy and environment settings to be configured on the
Content Engines, and real time monitoring of Engines and Enterprise
activities.
Implementation Planning 37
Completing the Pre-installation Checklist
Some of these components depend on additional components which eTrust
SCM either installs automatically or with additional manual input. These
components are the following:
eTrust Embedded IAM (EIAM)
A tool used by the Control Center to connect to an Active Directory, and
associate logged on users to their role-based privileges.
iGateway
Part of the EIAM package. Is used as the web server powering the Self
Managed Quarantine Manager.
Ingres Database
A relational database that is required when installing the Quarantine
Manager, Reporter, and/or eTrust Embedded IAM.
Microsoft SQL Database
A relational database that is required when installing the Quarantine
Manager and/or Reporter in large scale environments.
38 Implementation Guide
Completing the Pre-installation Checklist
Pre-installation Checklist
You should identify a scenario which is as similar as possible to your
environment and install eTrust SCM similarly according to the examples
provided in this manual. It is very important that you identify all of the
following environment items before installing eTrust SCM:
„
Mail Servers
„
HTTP Proxies (if available)
„
DNS MX settings, and the process of adjusting them in your organization
„
Servers that you will use to install eTrust SCM
„
Individual eTrust SCM components that you will install on each server
„
Active Directory (AD) in your organization. You must have an AD for the
features that use eTrust Embedded IAM (eTrust SCM Rules, Quarantine
Manager, Role Based Administration) to function properly
„
LDAP access parameters. LDAP is used through AD for email account
management
„
NTLM availability. You can create HTTP rules using NTLM user/groups
„
Networking structure, including the location of the existing servers and
where you will locate the eTrust SCM Servers be located.
„
Database to use for the Quarantine Manager and the Reporter. You select
use Ingres or Microsoft SQL Server. For sites with more than 500 users,
use MS-SQL Server as the database.
The sections that follow address these two typical installation scenarios:
„
SMB Installation
„
Enterprise Installation
Determine an Installation Scenario
When completing the checklist, determine whether you are installing eTrust
SCM as a Small to Medium Business (SMB) installation or as an Enterprise
installation. An SMB installation is designed to fit smaller scale installations.
SMB Installation Scenario
In this scenario, the following components are installed on the same computer.
SMTP Content Engine, HTTP/FTP Content Engine, Central Reporter, Quarantine
Manager, Control Center, and the Manager Console. This computer should be a
dedicated computer, but if necessary, you can install eTrust SCM on the same
computer as the company's mail server. If you do this, be sure to chain the
eTrust SCM server to the local mail server.
Implementation Planning 39
Completing the Pre-installation Checklist
The following illustration shows a typical SMB installation:
You should use this scenario in any of the following situations:
„
1,000 or less users and you are performing mail (SMTP) and Web
(HTTP/FTP) filtering
„
1,000 or less users and you are performing only Web (HTTP/FTP) filtering
„
10,000 or less users, you are performing mail (SMTP) filtering only, and do
not have a very high volume of email
Enterprise Installation Scenario
In this scenario, you distribute the eTrust SCM installation across two or more
servers. For example, all of the management components (the Control Center,
Quarantine Manager, and the Reporter) on one server and the Data Analysis
engines on one or more servers. The number of servers that you use depends
on the amount of traffic and the size of your organization.
40 Implementation Guide
Completing the Pre-installation Checklist
The following illustration shows a typical Enterprise installation where the
engine components are distributed on separate servers:
You should use this scenario in any of the following situations:
„
1,000 or more users and you are performing mail (SMTP) and Web
(HTTP/FTP) filtering
„
Over 5,000 users and you are performing mail filtering for a high traffic
volume
Note: Separating the Management components and Content Engines onto
different machines is always recommended, even in the SMB scenario. This
approach results in the best performance, though in the SMB scenario it is not
mandatory.
Implementation Planning 41
Upgrading from a Previous Release
Upgrading from a Previous Release
This section explains how to use the BackupRestore utility to upgrade from an
earlier eTrust SCM 1.0 or 1.1 to eTrust SCM r8.
1.
Insert the eTrust SCM r8 installation CD into the computer on which eSCM
1.x is installed.
2.
Navigate to \Support\10_11_BackupRestore. This folder contains 2 files:
„
BackupRestore10.exe for SCM r1.0
„
BackupRestore11.exe for SCM r1.1
3.
Copy the appropriate utility based on the installed version into the Bin
folder in the directory in which eSCM 1.x is installed. This directory should
be c:\Program Files\CA\eTrust SCM\Bin.
4.
From the Windows menu bar, select Start, Run.
5.
On the command line, type BackupRestore10 -b, or BackupRestore11 - b,
depending on the installed version.
A success message appears when the process completes. The
BackRestore.exe utility creates an eTrust SCM Backup folder.
6.
Uninstall eSCM 1.x from the computer.
7.
There are two ways to restore and import data from eTrust SCM 1.x into
eTrust SCM r8:
During the SCM r8 Control Center installation
When you install eSCM r8. If the installer finds backup data, you are
provided with an option to restore the data. If you answer yes, the
installer runs the BackupRestore utility.
Note: The restore should be done on the eTrust SCM server running
the Control Center. If there are multiple eTrust SCM computers, only
the Control Center should be upgraded. eTrust SCM distributes the
restored databases later to all eTrust SCM engines.
Manually
After you install eSCM r8 you can run the BackupRestore utility with
the parameter -r. The utility is located in the Bin folder in the directory
in which you installed eSCM r8. The utility displays a success message
when the restore completes successfully. Confirm that the Manager
Console is not running when you perform the restore.
Note: You must perform the backup from eTrust SCM r1.x and and the
restore to eTrust SCM r8 on the same computer.
42 Implementation Guide
Upgrading from a Previous Release
Known Upgrade Issues
Be aware of the following upgrade issues:
Adding content filters that did not exist in r1.0/1.1
eTrust SCM r8 contains predefined content filters for some of the new
filtering technologies. For instance, you may select using the predefined
content filters for Malformed Content for SMTP, Popup Blocking Filter for
HTTP URL filtering, and others.
The restore utility restores the existing policies, and makes them
operational, but does not add the new filters added. To use these new
capabilities, you need to manually create new Content Filters for the
desired filtering technology, post upgrade, and tie them to the Policy filters
of your choice.
Implementation Planning 43
Chapter 3: Installing eTrust SCM
This section explains how to install eTrust SCM. See Installing Individual
Components Only (see page 74) for issues to be aware of when installing only
individual eTrust SCM components.
Note: If you are plan to use Microsoft SQL Server as the database for the
Quarantine and Reporter, you must install and configure MS-SQL Server
databases before starting the eTrust SCM installation. See Installing and
Configuring Microsoft SQL Server and Configuring (see page 163),and then
continue with the steps described in this chapter.
Installation Steps
To begin the installation, follow these steps:
1.
Log onto your computer using administrator or domain administrator
privileges.
2.
Insert the eTrust SCM product CD into your CD-ROM drive.
If autorun is enabled on your computer, the installation procedure begins
automatically and the product installation browser appears.
Note: If autorun is not enabled on your computer, the installation does
not begin automatically. You can start the installation manually by
browsing the CD's root directory and double-clicking the Launch.exe file.
Installing eTrust SCM 45
Installation Steps
The first link leads to a complete eTrust SCM installation. When you select
this option, all eTrust SCM options appear in the next step.
The second link provides the capability to install the eTrust SCM ADCP and
Netload accessories. You can use Netload, which is a utility and not a
product option, for scaling the installation. You should install ADCP if you
eTrust SCM installation uses ADCP-based rules, rather than NTLM rules.
3.
Click Install eTrust Secure Content Manager.
The following menu appears:
46 Implementation Guide
Installation Steps
4.
Select Install eTrust SCM (full product).
eTrust SCM provides the following installation options:
eTrust SCM (Full Product)
This is the default installation package. Use this option for most SMB
or Enterprise scenario installations. This package includes all eTrust
SCM management components and all analysis engines.
If you did not purchase the full eTrust SCM gateway solution, or plan
to use only certain analysis engines, select one of the following
packages. These packages include all management components, but
only one of the analysis engines.
eTrust SCM Antivirus Gateway
Includes all management components, the Antivirus Gateway analysis
engine, and mobile code defense.
eTrust SCM Anti-Spam
Includes all management components, SMTP analysis, and Antivirus
Gateway engine.
eTrust SCM Web Filter
Includes all management components, Web URL Filtering, HTTP
Filtering, and Antivirus Gateway engine.
Installing eTrust SCM 47
Installation Steps
Choose a Language, Read the Terms and Conditions, and Provide User, Drive,
and Location Information
After you select Install eTrust SCM (Full Gateway Product), the Choose Setup
Language dialog appears. Continue the installation by following these steps:
1.
Select the language for the installation and then click OK.
The InstallShield Wizard starts. The eTrust SCM Installer Welcome dialog
appears:
2.
Click Next.
A terms and conditions dialog appears.
3.
48 Implementation Guide
Use the scroll bar to read the agreement, and then click I Agree.
Installation Steps
The Customer Information dialog appears:
4.
Enter your information and click Next.
Installing eTrust SCM 49
Installation Steps
The Installation Drive dialog appears suggesting a drive for the installation
based on available disk space. CA recommends using this drive.
5.
Do one of the following:
„
Click Yes to accept the drive and continue.
„
Click No and then select an alternate drive.
The Choose Destination Location dialog appears:
6.
Use this dialog to specify the location in which to install the eTrust SCM
components. Do one of the following:
„
„
50 Implementation Guide
Click Next to accept the default destination folder.
Click Browse, navigate to and select a different folder, click OK, and
then click Next.
Installation Steps
A workspace location dialog appears:
The Workspace is the location in which eTrust SCM stores data files
created while eTrust SCM is in use.
7.
Do one of the following:
„
„
Click Next to accept the default destination folder.
Click Browse, navigate to and select a different folder, click OK, and
then click Next.
Installing eTrust SCM 51
Installation Steps
The Select Components dialog appears:
This dialog lets you to install eTrust SCM's main components. These are
the same components that you could have specified to install individually
at the beginning of the installation process.
8.
Before proceeding, confirm that you know how you plan to install the
components as follows:
Option 1 - The SMB Installation Scenario - All Components
Installed on One Computer
In an SMB installation scenario, you install all components on the
same computer. Proceed to Option 1 - SMB Installation Scenario (see
page 53), and continue the installation.
Option 2 - Enterprise Installation Scenario - Components
Distributed Across Several Computers
In an Enterprise installation scenario, you can install components
across different computers. Before proceeding, confirm which types of
components you will install on the current computer - management
services or data analysis engines. Proceed to Option 2 - Enterprise
Installation Scenario (see page 53), and continue the installation.
Note: Be sure to determine a scenario and have a clear installation plan in
place before continuing.
52 Implementation Guide
Installation Steps
Option 1 - The SMB Scenario
To continue with an SMB installation scenario and install all components on the
same computer, follow these steps:
1.
Check the box for both the HTTP/FTP and SMTP scanning engines.
2.
Check the Install Locally checkboxes for all of the management services.
3.
Click Next.
4.
Proceed to HTTP / SMTP Server Ports (see page 56), and continue the
installation.
Option 2 - Enterprise Scenario
Enterprise installations provide several options. You can install all of the
components as many times as necessary and install as many analysis engines
as you need on multiple computers. You can also install the management
components Central Reporter, Quarantine Manager, and Control Center) on
separate servers.
The following example installs management services on one server and data
analysis services on another server.
First Server
In this step, install all management services on the first server, 10.10.10.1.
1.
Leave the HTTP/FTP and SMTP checkboxes unchecked.
2.
Check the Install Locally checkboxes for all three management services.
Installing eTrust SCM 53
Installation Steps
The Select Components dialog should look as follows:
3.
54 Implementation Guide
Proceed to HTTP / SMTP Server Ports (see page 56), and continue the
installation on the first server.
Installation Steps
Second Server
After you finish installing on the first server, begin a new installation on the
second server as follows:
1.
Check the checkboxes for the HTTP/FTP and SMTP services.
2.
For each of the three management services, check the Remote IP Address
checkbox and type in the 10.10.10.1 IP address to point to the first server.
The Select Components dialog should look as follows:
3.
Proceed to HTTP / SMTP Server Ports (see page 56), and continue the
installation on the second server.
Installing eTrust SCM 55
Installation Steps
HTTP / SMTP Server Ports
After you select the components to install on one or more servers, the
HTTP/SMTP Server Ports dialog appears:
Use this dialog to specify the ports on which SCM listens for the two main
services, HTTP and SMTP.
1.
Use the default ports provided or modify the port numbers.
2.
Click Next.
56 Implementation Guide
Installation Steps
Email Notification
After you specify HTTP / SMTP server ports, the Email Notification dialog
appears:
Use this dialog to specify the SMTP server that transports email notifications
and the email address to which to send the email notifications. eTrust SCM
sends notifications when eTrust SCM rules concerning such matters as
inappropriate user activity or spam detection are met.
1.
Enter the SMTP server name.
2.
Enter the Email Account name.
3.
Click Next.
Installing eTrust SCM 57
Installation Steps
SMTP Relay Configuration
After you specify email notification information, the SMTP Relay Configuration
dialog appears:
Configure these settings to specify incoming and outgoing email parameters.
Relay configuration settings are also applied to the Quarantine Manager for
notifications and report delivery.
Important! Configure these options carefully to ensure proper mail
communication between eTrust SCM and your organization's mail server. By
default, eTrust SCM provides the Any object which indicates any domain. CA
does not recommend using Any as it allows the email for any domain to be
relayed through eTrust SCM. This condition exposes the eTrust SCM server to
open relay status and might overload eTrust SCM.
58 Implementation Guide
Installation Steps
If you choose to use Any, eTrust SCM displays the following warning message:
The proper way to configure mail routing is to configure the settings for each
domain in your company. Any domain not in the list is not allowed to relay
email through eTrust SCM. This is called open relay prevention.
Installing eTrust SCM 59
Installation Steps
Configure Incoming Email
To configure incoming email, follow these steps:
1.
Click Add.
The New Domain dialog appears.
2.
Type the name of the domain and configure the email relay servers the
domain will use.
Note: You can also select to use MX as the relay method. If you use a
combination of servers and MX, eTrust SCM tries the servers in the list in
order. If the first server does not respond, SCM tries the second server,
then the third.
60 Implementation Guide
Installation Steps
Configure Outgoing Email
To configure outgoing email, follow these steps:
1.
Click Add.
The New Domain dialog appears.
2.
Type the name of the domain and configure the mail relay servers the
domain will use.
Note: You can also select to use MX as the relay method. If you use a
combination of servers and MX, eTrust SCM tries the servers in the list in
order. If the first server does not respond, SCM tries the second server,
then the third.
Adjust Retry Settings
You can adjust mail delivery retry settings if necessary. By default a
message expires if eTrust SCM cannot deliver the message within 24
hours.
Note: After installing and properly configuring email routing settings, you
should modify the DNS MX listing to allow routing of external email to the
eTrust SCM server, rather than to your main mail server. In addition, you
should configure your mail server to forward outgoing email to eTrust
SCM.
When you are finished configuring the mail relay settings, click OK.
Installing eTrust SCM 61
Installation Steps
Fully Qualified Domain
After you specify relay configuration settings, the Fully Qualified Domain dialog
appears:
To provide a fully-qualified domain name, follow these steps:
1.
Enter the DNS name of this computer, as it is known on the network.
2.
Click Next.
62 Implementation Guide
Installation Steps
Traffic Direction Classification
After you specify the DNS name for the computer, the Traffic Direction
Classification dialog appears:
To the right, eTrust SCM displays a listing of subnets found on the computer.
Selecting subnets that are part of the environment handled by eTrust SCM
allows eTrust SCM to distinguish between internal and external
communications.
To configure traffic direction, follow these steps:
1.
Click a subnet on the left side of the dialog, and then click Add.
eTrust SCM adds the subnets to the list of subnets that determine traffic
location.
2.
Repeat step 1 for all subnets that you want to add.
3.
Click Next.
Installing eTrust SCM 63
Installation Steps
Select Database
Select the database to use with the Quarantine and Reporter.
Note: If you prefer to use Ingres, select Ingres Server, click Next, and
proceed to the next installation step, eTrust Embedded IAM Server.
1.
If using MS-SQL Server, select Microsoft SQL Server, and click Next.
Note: If you have selected this option, you are prompted to use the
databases you have created in the pre installation steps.
64 Implementation Guide
Installation Steps
2.
The SQL Quarantine Server dialog appears:
3.
Enter the following information for the Quarantine database, and click
Next:
Server
Enter the name of the machine on which the SQL Server resides.
Alternatively, you can use the browse option to view all available SQL
Servers. When SQL resides on the same machine on which you are
installing SCM, select (local).
Username
Enter the database user name you have configured in the SQL
Enterprise Manager.
Password
Enter the password you have configured for the user above, in the SQL
Enterprise Manager.
Database
Enter the database name, or click Browse to select the database from
the server you have defined above. This is the database you have
defined in the SQL Enterprise Manager for usage with the Quarantine.
If connection is successful, the installation wizard prepares the SQL Server
for use with Quarantine.
Installing eTrust SCM 65
Installation Steps
The SQL Reporter Server dialog appears:
4.
Enter the information for the Reporter Database. All fields are similar to
those described for the Quarantine Manager, except for the Database. You
should select the Database you have created for the Reports.
The installation wizard connects to the SQL Server and prepares the
database for use with the Reporter.
66 Implementation Guide
Installation Steps
eTrust Embedded IAM Server
After you specify database information, the eTrust Embedded IAM Server
dialog appears:
Embedded IAM is required for the eTrust SCM's Role Based Management and
the eTrust SCM Self-Admininistration Web Quarantine features. If you are not
planning to use these features you do not need to install EIAM.
If you choose to install EIAM, continue with the next step. Otherwise, select
Do not use the EIAM Server and continue with the Complete the Installation
step.
To install eTrust Embedded IAM, follow these steps:
1.
Install eTrust Embedded IAM locally, or point to a location on which EIAM
is already installed, and then click Next.
Installing eTrust SCM 67
Installation Steps
The eTrust Embedded IAM Password dialog appears:
2.
Enter a new password for the eTrust Embedded IAM administrator or
provide the password for the eTrust Embedded IAM that is already
installed, and then click Next.
eTrust SCM installs the components you have selected. The installation
displays installation progress and messages about the components being
installed. The duration of the process varies by the components selected
for installation:
Note: Because the database installs silently, you do not need to configure
any database settings after the installation.
Complete the Installation
1.
When prompted, license and register the software as described in
Licensing and Registering eTrust SCM (see page 69). You can also perform
these steps post-installation within 30 days.
2.
When prompted, restart the computer. The computer will not function
properly if not restarted.
68 Implementation Guide
Licensing and Registering eTrust SCM
Licensing and Registering eTrust SCM
For eTrust SCM to function properly, you must license and register eTrust SCM
either during installation or within 30 days following installation.
There are two ways to license and register eTrust SCM:
„
During installation, using the Licensing and Registration dialogs.
„
After Installation, using one of these methods:
„
„
Run the Licensing utility by selecting Start, Programs, Computer
Associates, eTrust, eTrust SCM, Licensing.
Run the Registration utility by selecting Start, Programs, Computer
Associates, eTrust, eTrust SCM, Registration.
Licensing and Registering During or Post-Installation
License and register eTrust SCM using the License and Registration dialogs.
These dialogs display near the end of the eTrust SCM installation process, and
you can also launch then post-installation.
License Type Dialog
CA products offer the following types of licensing. Depending on how you
purchased the software, a different license type is required. When prompted,
select the type of license you were supplied with:
Installing eTrust SCM 69
Licensing and Registering eTrust SCM
If this is a trial installation, or if you have purchased but did not receive a
license yet, select Live Trial. This permits 30 days of functionality. At the end
of the 30 days you must license the product, or functionality ceases.
If you select ALP Certificate, you are directed to CA's support site for
downloading and installing the license.
License Verification Dialog
If you select a 25 character key, the following dialog appears:
eTrust SCM provides several license types, depending on the features you
have purchased. These licenses are keycodes that you need to enter into the
Licensing utility. The keycodes are then applied to the software.
70 Implementation Guide
Licensing and Registering eTrust SCM
Product component options that are each controlled by a separate license
code:
eTrust Secure Content Manager r8
The fully featured product that includes AV Gateway, Anti-Spam, Web URL
filtering and Malicious Mobile Code Defense
eTrust Secure Content Manager Antivirus Gateway Option
AV Gateway and Malicious Mobile Code Defense
eTrust Secure Content Manager Anti-Spam Option
Anti-Virus Gateway and Anti-Spam features
eTrust Secure Content Manager Web Filtering Option
Web URL Filtering, HTTP filtering, and Anti-Virus Gateway
The following subscription update options require separate license codes:
eTrust Secure Content Manager Antivirus Subscription
eTrust Secure Content Manager Spam Subscription
eTrust Secure Content Manager URL Subscription
Installing eTrust SCM 71
Licensing and Registering eTrust SCM
Registration Dialog
Next, you are prompted to register your software with CA Registration dialog:
Enter your identification information, and click Register.
72 Implementation Guide
Testing the Installation
Testing the Installation
Test the installation by opening up the eTrust SCM Manager Console after the
computer on which the Manager Console is installed finishes restarting.
1.
Click the Start, Programs, Computer Associates, eTrust, eTrust SCM,
Manager Console.
The Manager Console Login dialog appears:
2.
Enter Admin into the User Name field.
3.
Enter Admin into the Password field.
Note: By default, eTrust SCM provides Admin as both the user name and
password.
4.
Enter the IP address of the computer on which you are working into the
eTrust SCM Control Center field, and click OK.
Note: This IP address is usually the same as the address in the Local
Machine IP field.
Installing eTrust SCM 73
Installing Individual Components Only
The Manager Console appears:
If the Manager Console appears, the installation has completed successfully. If
not, see Troubleshoot the eTrust SCM Installation (see page 137).
Installing Individual Components Only
The beginning of this chapter explained how to install a full version of eTrust
SCM on one server (SMB installation) and on multiple servers (enterprise
installation). This section highlights the activities required when installing only
individual eTrust SCM components.
Installing Only the Spam or Web Options
When you install only the Spam option, you cannot select the HTTP option.
When you install the Web option, you cannot select the SMTP option.
Installing Only the eTrust SCM Manager Console Viewer
You can install the eTrust SCM Manager Console Viewer on any computer.
When you install, you are prompted to identify the location of the Control
Center.
74 Implementation Guide
Chapter 4: Configuring Your
Implementation
This section explains how to begin using the Manager Console to specify
parameters for your enterprise. Before running eTrust SCM in production,
ensure that all required settings are configured to allow eTrust SCM to
properly handle your network content
The Manager Console
The Manager Console is the main eTrust SCM GUI and it provides central
access to the content management databases and tools (the Central
Quarantine Manager and the Central Reporter). It allows you to locally view
the analysis of content filtering events, receive real-time alerts, and determine
how the content management engines will run. You can also configure the
local content filtering settings such as spam, URL filtering, and automatic
updates from the Internet.
The settings affect the workload on the engines and, as a result, analysis time.
The optimal settings for your system depend on a number of parameters,
including traffic load, number of rules, type of content filtering, depth of
analysis, and processing power of your computer.
Configuring Your Implementation 75
The Manager Console
The Manager Console handles the content rules and filters, as well as
distributes policies to local and remote machines. The Manager Console lets
you view for Last/Average/Minimum/Maximum statistics for main functionality
points of each analysis engine, including the following:
HTTP
„
Inbound/Outbound/Internal Files Processed/Min
„
Total Inbound/Outbound/Internal Files Processed
„
Inbound/Outbound/Internal Files Blocked
„
Inbound/Outbound/Internal Viruses Detected
„
URLs Blocked
„
URLs Checked and Reported
SMTP
„
Inbound/Outbound/Internal Messages Processed/Min
„
Total SMTP Inbound/Outbound/Internal Messages Processed
„
Inbound/Outbound/Internal Queue Size
„
Inbound/Outbound Viruses Cured
„
Total SMTP Messages Infected/Quarantined/Parked/Blocked by RBL
Service
76 Implementation Guide
The Manager Console
Starting the Manager Console
To start the Manager Console, click Start/Programs/Computer
Associates/eTrust/eTrust SCM/Manager Console.
The Manager Console appears:
Configuring Your Implementation 77
Configuring Initial Filtering Settings
The Manager Console provides four kinds of information:
Engine Protocol Tree (Left Pane)
Displays the name and IP address of the computer running eTrust SCM
and the available content filtering engine protocols. Clicking a protocol
displays realtime protocol statistics in the right pane.
Engine Protocol Status/Statistics (Right Pane)
Displays the statistics for the engine protocol selected in the left pane. If
there is no engine protocol selected in the left pane, the eTrust SCM status
displays in the pane. Engine statistics display in real time.
Realtime Alerts (Bottom Pane)
Displays policy violation incidents as they occur. The HTTP/FTP, URL, and
SMTP rules that you define and activate trigger policy violations. The
violations display in real time.
Realtime Enterprise Activity (Bottom Pane)
Displays a running log of significant activities performed by the user
currently logged into the Manager Console.
Checking and Adjusting Manager Console Settings
After installation, review and modify some of the default settings to meet your
needs. There are two types of settings:
Local Engine Settings
Settings that are specific to one analysis Engine (SMTP or HTTP)
Enterprise Settings
Global settings that are applied to all analysis engines in the eTrust SCM
environment
Configuring Initial Filtering Settings
The topics that follow describe the steps you must modify before you put
eTrust SCM into production.
For more information about the options in any of the dialogs in this chapter,
use the Manager Console to navigate to the dialog and click the Help button.
78 Implementation Guide
Configuring Initial Filtering Settings
Local Settings
To modify local settings, follow these steps:
1.
Select Filtering, Settings.
The settings dialog appears:
2.
From the drop-down at the top of the dialog, select the IP address of the
local computer for which you would like to modify settings.
Gateway Settings
If you have selected to use the optional ADCP Agent for User Authentication,
select the Gateway node to define parameters for the ADCP Agents.
For details on how to configure to add ADCP Agents to the list, see ADCP
Authentication (see page 143).
HTTP Engine Settings
Use the HTTP node to define parameters for the HTTP content filtering. If you
want to modify the default settings for General, File Settings, or Advanced, see
the online help for each of the options in the HTTP Engine node.
Configuring Your Implementation 79
Configuring Initial Filtering Settings
Proxy Settings
When working with eTrust SCM as an HTTP proxy, you must configure some
settings depending on your implementation. For instance, If you are chaining
eTrust SCM to another proxy (upstream or downstream), you must configure
the chained proxy location and port.
To define proxy server settings, follow these steps:
1.
Click HTTP Engine, Proxy Settings, Proxy Server.
The Proxy Server settings dialog appears:
2.
Modify the default values as appropriate.
Proxy Port
Specify the eTrust SCM Proxy Server listening port. Typically, accept
the default port 8080.
Chained Proxy
To chain one proxy server to another, check Chained Proxy box and
enter the chained proxy's name or IP address and the proxy port.
80 Implementation Guide
Configuring Initial Filtering Settings
Authentication
Check the Integrated Windows Authentication (NTLM) box if you want
the HTTP Proxy to perform NTLM (NT-LAN Manager) authentication.
NTLM is a shared secret user challenge-response authentication
protocol that supports pass-through authentication to a domain
controller in the server's domain, or in a domain trusted by the current
domain's domain controller.
When configured to use NTLM authentication, eTrust SCM uses the
NTLM authentication method and this protocol for gathering user
names and their domains. It associates them to corresponding content
filter NTLM rules based (if any are defined) on these specific users.
3.
Click OK to save the proxy server parameters and close the dialog.
LDAP Settings
Use the LDAP (Lightweight Directory Access Protocol) settings to specify all
parameters for identifying and managing LDAP servers for use in SMTP
filtering and quarantined email.
Important! Ensure that all of the following settings are correctly configured.
Test the connection when you are finished.
To define LDAP settings, click LDAP. The LDAP server settings appear:
Configuring Your Implementation 81
Configuring Initial Filtering Settings
LDAP Server Settings
To define specific settings for a local engine rather than use the eTrust SCM
default settings defined in the LDAP node of the Enterprise Settings, uncheck
the Use LDAP-Default settings box and then provide LDAP server settings as
appropriate. The settings you provide are set only for this local engine.
Login Account and Password
Enter your login account and password for the LDAP server. Note the
following:
„
„
You must provide a valid login account and password. eTrust SCM does
not support Anonymous logins.
Active Directory LDAP server supports the Domain\User format rather
than a full user name.
Note: If you do not uncheck the Use LDAP-Default settings option, eTrust
SCM uses the LDAP settings defined in the LDAP Enterprise Settings.
Testing LDAP Settings
LDAP settings should be tested to verify that all settings are properly defined.
To test the LDAP settings, follow these steps:
1.
Click Test
The LDAP Test page appears:
82 Implementation Guide
Configuring Initial Filtering Settings
2.
Enter either a single person email address, or a distribution list email
address.
3.
Click Send Query.
In a few moments the query results appear.
4.
Review the information in the Result pane. If the configuration is correct,
the test was successful. If the results show a failure, repeat the previous
configuration steps and check for any errors.
Subscription Settings
You can request a CA subscription to update subscription lists from the web on
a regular basis. When you subscribe to an update, you receive a license code
that enables the subscriptions.
Subscription settings let you configure automatic updates for subscriptions.
The time and version of the last successful update appears at the top of the
settings for each subscription item.
You can configure subscription updates for the following:
Antivirus
Use these settings to specify how to obtain automatic updates for antivirus
signature files. These files are used by a powerful antivirus engine that
scans both HTTP and SMTP traffic for viruses.
Spam Rules
Use these settings to specify how to obtain automatic updates for spam
rules. Spam rules are used by the SMTP engine to determine whether or
not incoming email contains spam.
URL Filtering
Use these settings to specify how to obtain automatic updates for URL
categories. With URL filtering by category and regular expressions, you
can designate URLs that users should not visit. For example, you can
designate URLs dealing with pornography, gambling, online sales or
merchandising, and so on.
To define subscription settings, click Subscriptions. The Anti-Virus Subscription
settings appear.
Configuring Your Implementation 83
Configuring Initial Filtering Settings
Antivirus Settings
Use these settings to define how to handle antivirus rule updates on the local
eTrust SCM computer.
To modify antivirus settings, follow these steps:
1.
Click Antivirus.
The Antivirus settings display:
2.
The only parameters you should change are the proxy settings, if your
traffic passes through a proxy:
Use Proxy Server
Check the Use Proxy Server box if your web traffic passes through a
proxy server and then provide the following information:
3.
a.
Enter the proxy server name or IP address and the port.
b.
If your proxy requires authentication (for example, a user name
and a password are required by the proxy server to grant web
access), check the Authentication box and enter the authentication
user name and password.
Click OK to save the parameters and close the dialog.
If the Distribute Changes command is enabled, a dialog displays for
distributing these parameter settings to other eTrust SCM computers on
your network enterprise.
84 Implementation Guide
Configuring Initial Filtering Settings
Spam Rules Settings
Use these settings to define how to handle spam rule updates on the local
eTrust SCM computer.
To modify spam rule settings, follow these steps:
1.
Click Spam Rules.
The Spam Rules settings appear:
2.
The only parameters you should change are the proxy settings, if your
traffic passes through a proxy:
Use Proxy Server
By default, eTrust SCM uses the proxy server provided at installation.
Specify an alternate spam server name if necessary.
Port
Specify the port number for the spam server.
Authentication
Enter authentication information for the server.
Name and Password
By default, eTrust SCM uses the user name and password provided at
installation. Enter an alternate user name or password if necessary.
3.
Click OK to save the parameters and close the dialog.
Configuring Your Implementation 85
Configuring Initial Filtering Settings
URL Filtering Settings
Use these settings to define how to handle Web URL updates on the local
eTrust SCM computer.
To modify Web URL update settings, follow these steps:
1.
Click URL Filtering.
The URL Filtering settings display:
2.
The only parameters you should change are the proxy settings, if your
traffic passes through a proxy:
Use Proxy Server
By default, eTrust SCM uses the proxy server provided at installation.
Specify an alternate spam server name if necessary.
Port
Specify the port number for the spam server.
Authentication
Enter authentication information for the server.
Name and Password
By default, eTrust SCM uses the user name and password provided at
installation. Enter an alternate user name or password if necessary.
3.
86 Implementation Guide
Click OK to save the parameters and close the dialog.
Configuring Initial Filtering Settings
Enterprise Settings
To modify enterprise settings, follow these steps:
1.
Select Filtering, Settings.
2.
Select Enterprise Settings from the drop down box.
The Enterprise Settings dialog appears:
When you modify these settings, an option appears for you to distribute the
settings to other eTrust SCM computers in your enterprise.
Configuring Your Implementation 87
Configuring Initial Filtering Settings
Loop-back Settings
Use these general settings to prevent loop-back scenarios. You should add all
local and remote computers on which eTrust SCM is installed and also include
any firewall or any other network devices.
To define Loop-back settings, follow these steps:
1.
Click Loop-back settings.
The Loop-back settings appear:
To add a computer, firewall, or other network device, follow these steps:
1.
Click Add.
The Server Properties dialog appears.
2.
Enter a server or device name and its port.
3.
Click OK.
88 Implementation Guide
Configuring Initial Filtering Settings
Enterprise LDAP Settings
Use the LDAP (Lightweight Directory Access Protocol) Options to set up all
parameters for identifying and managing LDAP servers for use in SMTP
filtering and quarantined email.
Important! Correct LDAP configuration is a key factor for SCM functionality,
you should make sure that all the following settings are configured, and that
the connection is tested.
To define LDAP settings, click LDAP. The LDAP General Settings appear.
Enterprise LDAP General Settings
The settings you provide here will be set for all Enterprise SCM engines. If you
would like to define specific settings for a certain engine, you need to modify
the LDAP settings for the local engine. See Local Engine Settings (see
page 79) for more information.
To define LDAP general settings, follow these steps:
1.
Click General.
The LDAP General Settings appear:
Configuring Your Implementation 89
Configuring Initial Filtering Settings
2.
Modify the default values as appropriate.
Automatically detect LDAP Servers
Select this option to allow eTrust SCM to auto detect LDAP servers in
your network.
Note: This option works only with Microsoft LDAP servers (Microsoft
Exchange or Microsoft Active Directory).
Port
The port that SCM will use to auto detect LDAP servers.
Server List
Use this list to explicitly define the LDAP server you would like to use:
90 Implementation Guide
Configuring Initial Filtering Settings
Enter the LDAP server name and port value. The LDAP server is
usually the MS Exchange computer or an MS Active directory enabled
Domain Controller. For a Microsoft Active directory, set the LDAP
server name to the network domain controller Global Catalog server.
The port number value for a normal domain controller is 389. For the
Global Catalog server, set the port value to 3268.
To allow high availability of LDAP, you may define more than one LDAP
server in the list. eTrust SCM will use the servers in the list from top to
bottom. If the first server is unavailable, eTrust SCM will continue
trying using the second server, and so on.
Requires a Secure Connection (SSL)
Check the Requires a Secure Connection (SSL) check box if you want
to ensure that you connect only through a secure connection.
Login Account and Password
Enter your login account and password for the LDAP server(s). For
Exchange, use one of the account names prefixed with CN=. For
example, CN=admin. You can enter your login account directly without
any prefix.
Configuring Your Implementation 91
Configuring Initial Filtering Settings
Enterprise LDAP Dictionary Settings
You can define or update the predefined settings for the LDAP server. The
default settings are for the MS Exchange server.
To define LDAP dictionary settings, follow these steps:
1.
Click Dictionary.
The LDAP Dictionary settings appear:
92 Implementation Guide
Configuring Initial Filtering Settings
2.
Modify the default values as appropriate. If the LDAP server definitions
vary from the default values, review the LDAP schema and correct the
values accordingly.
Base DN
The Active Directory server requires a specific company base
distinguished name (base DN). Modify the Base DN field by entering
the base DN name to reflect your company domain. Examples include
the following:
„
linux.org usually has a base DN equal to dc=linux,cd=org
„
ca.com has a base DN equal to dc=ca,dc=com
Exchange
Use an account name prefixed with CN=. For example, CN=admin.
Other LDAP servers
Other LDAP servers usually require a complete distinguished name
(DN). Examples include the following:
„
CN=eTrust Content Control
„
OU=Groups
„
OU=Europe Middle East Africa
„
DC=ca
„
DC=com
3.
Click Test when you are finished to verify that all settings are correct. You
can test using both a single email address and a distribution list.
4.
Click Load Default Values to specify whether to use Microsoft Exchange or
Microsoft Active Directory (AD) as the LDAP server.
5.
Click OK to save the parameters and close the dialog.
Configuring Your Implementation 93
Configuring Initial Filtering Settings
Enterprise LDAP Advanced Settings
Use LDAP advanced settings to fine tune the SMTP engine filter and
Quarantine Manager settings.
To define LDAP advanced settings, follow these steps:
1.
Click Advanced.
The LDAP Dictionary settings appear:
94 Implementation Guide
Configuring Initial Filtering Settings
2.
Modify the default values as appropriate.
SMTP Engine Filter
To block spam attacks on multiple recipients, configure the threshold
value for the number of invalid recipients.
If the LDAP server(s) is not available, configure the SMTP filter engine
to block all sessions. The default allow value ensures email traffic is
treated as if no LDAP server were configured.
Quarantine Manager
Check the Primary Account box to have Quarantine Manager channel
email from senders with multiple accounts into one primary account.
Check the Distribution List Management by Owner box to have
Quarantine Manager channel email meant for a distribution list to only
the list owner.
Cache
To avoid a costly LDAP query, eTrust SCM uses a cache mechanism.
CA recommends using a cache size and expiration time that can
manage double the expected total user account traffic.
3.
Click OK to save the parameters and close the dialog.
Configuring Your Implementation 95
Configuring eTrust Embedded IAM
Testing LDAP Settings
LDAP settings should be tested to verify that all settings are properly defined.
To test the LDAP settings, follow these steps:
1.
Click Test.
The LDAP Test page appears:
2.
Enter either a single person email address, or a distribution list email
address.
3.
Click Send Query.
In a few moments the query results appear.
4.
Review the information in the Result pane. If the configuration is correct,
the test was successful. If the results show a failure, repeat the previous
configuration steps and check for any errors.
Configuring eTrust Embedded IAM
The following functionality requires connecting to the Active Directory through
EIAM:
„
Quarantine Manager self administration authentication
„
Role based management
You must adjust the following settings to connect EIAM to the Active Directory.
96 Implementation Guide
Configuring eTrust Embedded IAM
Starting the Embedded IAM Utility
To start eTrust Embedded IAM, follow these steps:
1.
Select Start, Programs, Computer Associates, eTrust, eTrust SCM,
Embedded IAM UI.
The eTrust Embedded Identity and Access Management login web page
appears.
2.
Select the eTrust SCM application from the drop down menu.
3.
Enter the password that you defined when you installed eTrust SCM and
click Login.
The eTrust Embedded Identity and Access Management utility opens.
Setting Global Users and Global Group Settings
To use Embedded IAM with your organization's Active Directory, follow these
steps:
1.
Select the Embedded IAM server link from the Configure tab.
2.
Select Global Users/Global Groups.
3.
Select Reference from an external directory.
4.
Configure the Active Directory properties. The following shows sample
settings for Microsoft Active Directory:
5.
Save your changes, using the Save button, and verify that a green
checkbox status is highlighted next to both Status checks.
Configuring Your Implementation 97
Configuring eTrust Embedded IAM
Managing Roles Using eTrust Embedded Identity and Access Management
You can use eTrust Embedded Identity and Access Management (Embedded
IAM) to add Active Directory users to an Embedded IAM database, define
users, and assign eTrust SCM access permissions to fit user roles within your
organization.
Create the Embedded IAM Database
You need to create the Embedded IAM database before you can add users and
assign user permissions.
To create the Embedded IAM Database
1.
Open the eTrust SCM Manager Console.
2.
Select Tools, eTrust Embedded IAM, Database Actions.
The eTrust Embedded IAM Database Actions dialog appears:
98 Implementation Guide
Configuring eTrust Embedded IAM
3.
Enter the Embedded IAM password and Embedded IAM server location that
you defined when you installed eTrust SCM.
4.
Select the Action drop down and select Create Role based database.
5.
Click Execute.
eTrust SCM creates the database. When the process completes, a success
or failure execution status appears in the Result field.
6.
Click Close to complete the process.
Configuring Your Implementation 99
Configuring eTrust Embedded IAM
Define Users in the Embedded IAM Database
To enable an Active Directory user to log onto the eTrust SCM Manager
Console, you need to define the user in the Embedded IAM database.
Note: Embedded IAM must be able to connect with Active Directory before
you can add an eTrust SCM user. See the eTrust SCM Implementation Guide
r8 for more information on connecting to the Embedded IAM with Active
Directory.
To add Active Directory users to the Embedded IAM database
1.
Select Start, Programs, Computer Associates, eTrust, eTrust SCM,
Embedded IAM UI.
The eTrust Embedded Identity and Access Management logon dialog
appears.
2.
Select Application, eTrust SCM.
3.
Enter the Embedded IAM user name and password that you specified when
installing eTrust SCM, and then click Log In.
The Embedded IAM web interface appears:
100 Implementation Guide
Configuring eTrust Embedded IAM
4.
Select Manage Identities, Users.
The Manage Identities, Users sub tab appears.
5.
Select a search attribute from the Attribute drop down and enter a
matching value in the Value field. For example, to search by last name,
select Last Name and then enter the user's last name in the Value field.
Note: User Name is the Active Directory UserID, not a combination of a
user's first and last name.
6.
Select an appropriate operator.
7.
Click Go.
The user appears in the Users panel:
8.
Assign permission levels to the user (see page 102) and then click Save.
The user is added to the Active Directory database and the user is ready
for eTrust SCM access.
Note: A user can log onto eTrust SCM with an Active Directory user id only
after you have defined the user in Embedded IAM and have logged out of
the Embedded IAM web interface. eTrust SCM uses Embedded IAM to
validate the user on the domain controller. If authentication is successful,
the user can log onto the Manager Console with the assigned permission
level.
Configuring Your Implementation 101
Configuring eTrust Embedded IAM
Assign User Permission Levels
To assign a permission level to a user, you add the user to an appropriate
group.
Because eTrust SCM data can be confidential, we recommend defining users
and passwords to grant access to specific Manager Console capabilities.
Administrator permissions provide unlimited access to eTrust SCM for viewing
data, creating rules, and changing parameters.
There are three types of users, each with specific access levels:
User/
Permissions
Configure
Settings
Read
Settings
View
Data
Administrator
Yes
Yes
Yes
Power User
No
Yes
Yes
Standard User
No
No
Yes
To assign a permission level to a user
1.
Click the user name in the Users tree view.
2.
Click Add Application User Details in the right pane.
3.
Click an available user group to which to add the user, then click the right
pointing arrow.
The group is added to the user's list of selected user groups.
4.
Click Save.
The process is complete.
102 Implementation Guide
Configuring eTrust Embedded IAM
Change User Permission Levels
To change the permission levels for a user, you can remove the user from an
appropriate group or add the user to different groups.
To change the permission levels for a user
1.
Click the user name in the Users tree.
2.
Add or remove the user to or from groups:
„
„
Click or Ctrl-click one or more selected user groups from which to
remove the user, then click the left pointing arrow.
Click or Ctrl-click one or more available user groups to which to add
the user, then click the right pointing arrow.
The user is added or removed from the selected groups.
3.
Click Save.
The process is complete.
Remove All Permission Levels From a User
To remove all permission levels for a user, effectively removing all of the
user's access rights, you remove the user from all groups.
To remove all permission levels for a user
1.
Click the user name in the Users tree.
2.
Ctrl-click all of the selected user groups, then click the left pointing arrow.
The user is removed from all groups.
3.
Click Save.
The process is complete.
Configuring Your Implementation 103
Configuring eTrust Embedded IAM
Maintain the Embedded IAM Database
You can maintain the Embedded IAM database by purging and rebuilding the
database or by exporting the database for use in another Embedded IAM
installation.
1.
Open the eTrust SCM Manager Console.
2.
Select Tools, eTrust Embedded IAM, Database Actions.
The eTrust Embedded IAM Database Actions dialog appears:
104 Implementation Guide
Configuring eTrust Embedded IAM
3.
Enter the EIAM password and server location defined during installation.
4.
Select one of the following actions:
Export Role-based database
Exports the Embedded IAM database so you can use it with another
eTrust SCM or Embedded IAM installation.
Import Role-based database
Imports an exported Embedded IAM database.
Delete Role-based database
Permanently deletes the currently installed Embedded IAM database.
Important! Once you delete a database, you cannot recover it.
Create Role-based database
Creates a new empty database if you have deleted the existing
database.
5.
Click Execute.
When the process completes, a success or failure execution status appears
in the Result field:
6.
Click Close to complete the process.
Configuring Your Implementation 105
Configuring eTrust SCM With Your Email Server
Configuring eTrust SCM With Your Email Server
You can install and configure eTrust SCM with your mail server in two
locations:
„
On a computer other than your mail server computer
„
On your mail server computer
The most direct way to configure eTrust SCM is to install it on a computer
other than the mail server. This configuration does not require any
modification to your mail server, although you must modify your DNS
information.
With this configuration, the eTrust SCM SMTP filtering engine receives your
emails, checks them according to rule filters, and forwards them to your mail
server. Users on the Internet connect to your eTrust SCM computer, so the
location of your mail server remains unknown. If you are using a firewall to
route incoming emails to your local mail server, you have to configure your
firewall to forward the incoming emails to the eTrust SCM computer rather
than to your local mail server. With a firewall, you can further protect your
mail server by disallowing any outside connections except to the eTrust SCM
computer.
Installing eTrust SCM and your mail server on the same computer requires
that you modify your mail server configuration so that it does not listen to port
25 on the TCP/IP address that eTrust SCM uses. Your mail server must listen
on a different TCP/IP port so that eTrust SCM can forward email to its port.
Installation on a Dedicated Computer
When installing eTrust SCM on a dedicated computer other than your mail
server, configure eTrust SCM to receive email at the eTrust SCM computer and
configure the mail server to forward outgoing emails to eTrust SCM.
Note: CA recommends that, until you understand your organization's email
traffic patterns, you use only the eTrust SCM default rule filters and alerting
actions.
106 Implementation Guide
Configuring eTrust SCM With Your Email Server
How to Configure eTrust SCM on a Dedicated Computer
To configure eTrust SCM on a dedicated computer, perform the following steps
for your specific mail server:
For Exchange 5.5
1.
Install eTrust SCM to forward email to the Exchange computer.
2.
Set connectors in Exchange to forward all email to eTrust SCM.
3.
Forward outgoing emails in Exchange 5.5 to eTrust SCM.
For Exchange 2000
1.
Install eTrust SCM to forward email to the Exchange computer.
2.
Set connectors in Exchange to forward all email to eTrust SCM.
3.
Forward outgoing emails in Exchange 2000 to eTrust SCM.
For Domino 6.x
1.
Install eTrust SCM to forward email to the Lotus Domino computer.
2.
Forward outgoing emails in Lotus Domino to eTrust SCM.
Installing eTrust SCM on a Dedicated Computer
This procedure shows how to receive email on your eTrust SCM computer.
To install eTrust SCM on a computer other than your mail server, follow these
steps:
1.
Start the eTrust SCM installation on a dedicated computer that forwards
email to the mail server computer.
During the installation, the Mail Relay Settings dialog appears.
2.
Define relay settings as described in Domain Route List (see page 20).
3.
Change the DNS name for your host so that email for your domains is sent
to your eTrust SCM computer. For example, if your domain name is
company.com and your mail server name is mail.company.com, your
existing DNS entry is probably as follows:
company.com. IN MX mail.company.com
4.
Add an A-record for your eTrust SCM computer that defines the IP address
of the computer on which eTrust SCM is installed. For example:
eTrust SCM.company.com. IN A 10.1.1.5
5.
Change the MX record for your domain from using mail.company.com to
use eTrust SCM.company.com. For example:
company.com. IN MX eTrust SCM.company.com
Configuring Your Implementation 107
Configuring eTrust SCM With Your Email Server
Forward Email in Exchange 5.5
When eTrust SCM is installed on a computer other than your mail server, you
must forward outgoing email to eTrust SCM. To configure Exchange 5.5 to
forward outgoing email to eTrust SCM, follow these steps:
1.
On the Microsoft Exchange Server, run Microsoft Exchange Administrator.
2.
Select Configuration, Connections, Internet Mail Service.
The Internet Mail Service (STREAM) Properties dialog appears:
3.
Click the Connections tab.
4.
Under Message Delivery, select Forward all messages to host and enter
the IP address of your eTrust SCM server. For example, enter 10.10.10.1.
5.
Click OK.
6.
From the Services Manager in the Control Panel, stop and start the
Microsoft Exchange Internet Mail Service.
108 Implementation Guide
Configuring eTrust SCM With Your Email Server
Forward Email in Exchange 2000
When eTrust SCM is installed on a computer other than your mail server, you
must forward outgoing email to eTrust SCM. To configure Exchange 2000 to
forward outgoing email to eTrust SCM, follow these steps:
1.
Open the Exchange System Manager.
2.
Select Servers, Server Name, Protocols, SMTP.
3.
Right-click Virtual Server and choose Properties.
The Default SMTP Virtual Server Properties dialog appears.
4.
Click the Delivery tab and click the Advanced button.
The Advanced Delivery dialog appears:
5.
In the Smart Host field, enter in brackets the IP address of the eTrust SCM
server (for example [10.10.10.1] ).
6.
Uncheck the Attempt direct delivery before sending to smart host
checkbox.
7.
Click OK on both dialogs.
Configuring Your Implementation 109
Configuring eTrust SCM With Your Email Server
Set Connectors in Exchange
If your site uses SMTP Exchange connectors, you must configure the
connectors to forward email to the eTrust SCM server. To do this, follow these
steps:
1.
110 Implementation Guide
Open the Exchange System Manager and select Connectors, SMTP
Connector.
Configuring eTrust SCM With Your Email Server
The eTrust SCM Properties dialog appears:
2.
On the General tab, select Forward all mail through this connector to the
following smart hosts.
3.
Enter, within brackets, the IP address of the eTrust SCM server (for
example: [10.10.10.1]), and click OK.
Forward Email in Lotus Domino
When eTrust SCM is installed on a computer other than your mail server, you
must forward outgoing email to eTrust SCM. To configure Lotus Domino r6 to
forward outgoing email to eTrust SCM, follow these steps:
1.
Open the Notes Administrator.
2.
Click the Configuration tab.
3.
Select Messaging, Messaging Settings, Message settings, Basis.
Configuring Your Implementation 111
Configuring eTrust SCM With Your Email Server
4.
Specify the IP address of the eTrust SCM machine in Relay Host for
messages leaving the local internet domain:
Note: The next two steps cause the changes to take effect by stopping
and restarting the Domino SMTP service. Instead of performing the next
two steps to restart, you can use a remote session from the Domino
Administrator.
5.
From the Domino server console, enter:
Tell SMTP quit
6.
When the SMTP service stops, enter:
load SMTP
7.
To check the SMTP listening port enter:
sh tasks
112 Implementation Guide
Configuring eTrust SCM With Your Email Server
Installing on the Mail Server Computer
Most mail servers can be configured to run with eTrust SCM SMTP on the same
computer. However, CA recommends that you install eTrust SCM and your
mail server on different computers. If that is not possible, try at least to
separate the eTrust SCM HTTP/FTP engine, the eTrust SCM quarantine server,
and the report server for installation on a different computer by using the
eTrust SCM distributed management capabilities.
Running eTrust SCM and your mail server on the same computer can be an
easy way to start if you have enough capacity on your mail server. This
configuration only requires one computer and does not require that you modify
your MX information. In an SMB environment, this configuration can work well.
You do not need to change the port number that the mail server listens to,
however.
How to Configure eTrust SCM on Your Email Server
By default, eTrust SCM uses the same port for SMTP email as Microsoft
Exchange and Lotus Domino. To configure eTrust SCM to run on the same
computer as Microsoft Exchange or Lotus Domino, perform the following steps
for your specific mail server:
For Exchange 5.5
1.
Forward outgoing email in Exchange 5.5 to eTrust SCM.
2.
Change the port number in the Exchange 5.5 services file.
3.
Set connectors in Exchange to forward all email to eTrust SCM.
4.
Install eTrust SCM to forward email to the Exchange computer.
For Exchange 2000
1.
Change the port number in Exchange 2000.
2.
Forward outgoing email in Exchange 2000 to eTrust SCM.
3.
Set connectors in Exchange to forward all email to eTrust SCM.
4.
Install eTrust SCM to forward email to the Exchange computer.
For Domino 6.x
1.
Change the port number in Lotus Domino.
2.
Forward outgoing email in Lotus Domino to eTrust SCM.
3.
Install eTrust SCM to forward email to the Exchange/Domino computer.
Configuring Your Implementation 113
Configuring eTrust SCM With Your Email Server
Forward Email in Exchange 5.5
To configure Exchange 5.5 to forward outgoing emails to eTrust SCM when it is
on the same server as Exchange, follow these steps:
1.
On the Microsoft Exchange Server, run Microsoft Exchange Administrator.
2.
Select Configuration, Connections, Internet Mail Service.
The Internet Mail Service (STREAM) Properties dialog appears:
3.
Click the Connections tab.
4.
Under Message Delivery, select Forward all messages to host and enter
the fully-qualified domain name of the local host or an IP address (do not
use 127.0.0.1).
5.
Click OK.
6.
From the Services Manager in the Control Panel, stop and start the
Microsoft Exchange Internet Mail Service.
114 Implementation Guide
Configuring eTrust SCM With Your Email Server
Change the Port in the Exchange 5.5 Services File
This procedure changes the default port that Exchange 5.5 uses to listen for
inbound SMTP email. You change the port number in the Windows NT services
file.
To edit the services file and change the default port, follow these steps:
1.
With a text editor (such as notepad) open this file:
Winnt\system32\drivers\etc\services
2.
Locate the following line:
smtp 25/tcp
3.
mail
Change the port number. For example:
smtp 2525/tcp
mail
Note: Be sure that the port number you choose does not conflict with
another service on the same computer.
4.
Save the services file.
5.
From the Services Control Panel, stop and start the Microsoft Exchange
Internet Mail Service.
Change the Port in Exchange 2000
When eTrust SCM is on the same computer as your mail server, you must
change the default port that Exchange 2000 listens to. To change the default
port number, follow these steps:
1.
Open the Exchange System Manager.
2.
Select Servers, Server Name, Protocols, SMTP.
3.
Right-click Virtual Server and choose Properties.
4.
Click the General tab and click the Advanced button.
Configuring Your Implementation 115
Configuring eTrust SCM With Your Email Server
The Advanced dialog appears:
5.
Click Edit and change the TCP port to any available port on the local
computer except port 25.
6.
Click OK on both dialogs.
116 Implementation Guide
Configuring eTrust SCM With Your Email Server
Forward Email in Exchange 2000
When eTrust SCM is on the same computer as your mail server, you must
forward outgoing email to eTrust SCM in Exchange 2000.
To forward outgoing email, follow these steps:
1.
Open the Exchange System Manager.
2.
Select Servers, Server Name, Protocols, SMTP.
3.
Right-click Virtual Server and choose Properties.
4.
Click the Delivery tab and click the Advanced button.
The Advanced Delivery dialog appears.
5.
In the Smart Host field, enter the fully-qualified domain name of the local
host or a unique IP address in brackets (do not use [127.0.0.1]).
6.
Clear this option: Attempt direct delivery before sending to smart host.
7.
Click OK on both dialogs.
Configuring Your Implementation 117
Configuring eTrust SCM With Your Email Server
Set Connectors in Exchange
If your site uses SMTP Exchange connectors, you must configure the
connectors to forward all email to the eTrust SCM server. To do this, follow
these steps:
1.
Open the Exchange System Manager and select Connectors, SMTP
Connector.
The eTrust SCM Properties dialog appears:
2.
On the General tab, select Forward all mail through this connector to the
following smart hosts.
3.
Enter, within brackets, the fully-qualified domain name of the local host or
a unique IP address. Do not use [127.0.0.1].
118 Implementation Guide
Configuring eTrust SCM With Your Email Server
Change the Port in Lotus Domino
When eTrust SCM is on the same computer as your mail server, you must
change the default port that Lotus Domino listens to. To change the default
port number, follow these steps:
1.
Open the Domino Server Administrator.
2.
Select a Domino server.
3.
Click the Configuration tab.
4.
Select Server, Current Server Document.
5.
Click the Ports tab, the Internet Ports tab, and the Mail tab.
6.
Change the Mail SMTP Inbound port to 2525.
Note: The next two steps cause the changes to take effect by stopping
and restarting the Domino SMTP service. Instead of performing the next
two steps to restart, you can use a remote session from the Domino
Administrator.
7.
From the Domino server console, enter:
Tell SMTP quit
8.
When the SMTP service stops, enter:
load SMTP
9.
To check the SMTP listening port enter:
sh tasks or Telnet <IP ADDRESS> 2525
Configuring Your Implementation 119
Configuring eTrust SCM With Your Email Server
Forward Email in Lotus Domino
When you install eTrust SCM on the same computer as your mail server, you
must forward outgoing email to eTrust SCM in Lotus Domino. To forward
outgoing email, follow these steps:
1.
Open the Notes Administrator.
2.
Click the Configuration tab.
3.
Select Messaging, Messaging Settings, Message settings, Basis.
4.
Specify the IP address of the eTrust SCM machine, in Relay Host for
messages leaving the local internet domain.
Note: The next two steps cause the changes to take effect by stopping
and restarting the Domino SMTP service. Instead of performing the next
two steps to restart, you can use a remote session from the Domino
Administrator.
5.
From the Domino server console, enter:
Tell SMTP quit
6.
When the SMTP service stops, enter:
load SMTP
7.
To check the SMTP listening port enter:
sh tasks
120 Implementation Guide
Configuring eTrust SCM With Your Email Server
Install eTrust SCM
1.
Start the eTrust SCM installation on the same computer on which your
mail server is running.
During the installation, the Mail Relay Settings dialog appears.
2.
Configure the mail relay settings as explained in Domain Route List (see
page 20). The Mail Server address is the physical machine’s address, but
you should specify the new port you have defined for your mail server.
(eTrust SCM uses port 25.)
3.
Enter the physical IP address and the port number of your mail server. You
can use any port number except 25, which is the default SMTP port.
4.
Finish the installation wizard.
Configuring Your Implementation 121
Configuring the Browser Proxy
Configuring the Browser Proxy
To enable eTrust SCM proxy web filtering administrators must instruct the
client browser to run through an eTrust SCM HTTP/FTP proxy server. This
chapter describes various approaches to configuring and distributing client
browser configurations to match updated proxy configurations in your network
environment.
You can configure web browsers to use a web cache in the following ways:
Name
With manual configuration, each browser is configured to route Internet
traffic through the proxy. The proxy hostname/IP and port settings are
entered explicitly for each protocol, with any exclusion for sites that can
always be accessed directly. This option is available with all but the very
early browsers that predated web proxy use and cache servers.
Proxy Automatic Configuration Script
With automatic proxy configuration, an administrator can control browser
settings on client computers from one central location. You can configure a
single URL that identifies a configuration script that tells the browser which
proxy to use for each request; the choice can potentially vary by request
URL. eTrust SCM executes the auto-configuration script file whenever a
network request is made. Within the script, an administrator can configure
multiple proxy servers for each protocol type; if a proxy server connection
fails, the browser automatically attempts to connect to another proxy
server that you have specified. Note that because this functionality
requires browser JavaScript support, very early web browser versions may
not support it.
Automatically Proxy Detection
The automatic detection feature enables automatic configuration and
automatic proxy when a user connects to a network for the first time. With
automatic detection turned on, the browser is automatically configured
when it is started, even if you did not customize the browser. Automatic
detection of browser settings is based on Web Proxy Auto-Discovery
protocol (WPAD) and is supported by both Dynamic Host Configuration
Protocol (DHCP) and Domain Name System (DNS). Microsoft Internet
Explorer 5.0 and 6.0 for Windows are the only widely-used browsers that
support WPAD; as a draft Internet standard, however, WPAD is likely to
become more widely available over time.
122 Implementation Guide
Configuring the Browser Proxy
Configuring a Browser for Manual Proxy
To specify eTrust SCM proxy server and proxy bypass settings using Internet
Explorer 5.0 or 6.0, follow these steps:
1.
Open Internet Explorer.
2.
From the Internet Explorer menu bar, select Tools, Internet Options.
The Internet Options dialog appears:
3.
Click the Connections tab, and then click LAN Settings.
Configuring Your Implementation 123
Configuring the Browser Proxy
The LAN Settings dialog appears:
4.
In the Proxy server area, select the Use a proxy server... check box.
5.
Type the Proxy IP Address and Port number for your proxy server:
6.
Click OK and then click OK again.
124 Implementation Guide
Configuring the Browser Proxy
To use Netscape 7.0 to specify eTrust SCM proxy server and proxy bypass
settings, follow these steps:
1.
Open Netscape.
2.
Select Edit and then click Preferences.
The Navigator Preferences dialog appears:
Configuring Your Implementation 125
Configuring the Browser Proxy
3.
Double click Advanced (at the bottom of the choice list at far left), and
then select Proxies.
The Proxies dialog appears:
4.
126 Implementation Guide
Select Manual Proxy Configuration and type the proxy IP Address and port
number for each protocol (HTTP, FTP, SSL).
Configuring the Browser Proxy
Configuring Your Browser for Proxy Automatic Configuration (PAC)
The Proxy Automatic Configuration (PAC) method enables web clients to use
automatic configuration script settings with Netscape and Internet Explorer
browsers. Automatic proxy configuration support provides a form of
transparency so that clients can configure a browser to point to a proxy
automatic configuration (PAC) file rather than to a specific proxy server. As a
result, the system administrator can modify the configuration with little impact
to clients, who update their automatic configuration files and are automatically
directed to the new configuration.
Server administrators can use this capability to reroute requests when servers
are down, to balance workload, to send requests for specific URLs to specific
proxies, or other reasons specific to their installation. Note that new PAC files
are reloaded only when a browser is restarted.
PAC is a browser function that enables dynamic server selection. The PAC file
is a JavaScript file that includes functions that the client browser calls before
retrieving a URL. The functions return values indicating whether a proxy
server, SOCKS server, or a direct connection is used to service the request.
The file can also redirect the request if the initial connection to be used is
down. When a client's browser is set to auto-proxy, it calls the JavaScript PAC
file each time a URL is requested by the user.
The Proxy Auto-Configuration page lets you create a PAC file that contains
some basic functions.
To configure your browser using PAC options, follow these steps:
1.
Create a standard PAC file using WordPad.
2.
Implement the JavaScript function FindProxyForURL (URL, host). You can
use the PAC files in the examples provided below. For more information
about PAC file format, visit
http://wp.netscape.com/eng/mozilla/2.0/relnotes/demo/proxy-live.html.
3.
Store the file in the document root directory of your web server under a
meaningful name (for example, myfile.pac).
4.
Confirm that a URL such as http://www.mywebsrv.com/myfile.pac displays
the script text in the browser window.
5.
Configure your client browser.
Configuring Your Implementation 127
Configuring the Browser Proxy
When using Internet Explorer 5.0 or 6.0, follow these steps:
1.
Select Tools, Internet Options.
The Internet Options dialog appears.
2.
Click the Connections tab, and then click LAN Settings.
The LAN Settings dialog appears:
3.
128 Implementation Guide
In the Automatic configuration area, select the Use automatic
configuration script checkbox and type your proxy auto-configuration file
URL.
Configuring the Browser Proxy
When using Netscape 7.0, follow these steps:
1.
Select Edit and then click Preferences.
The Preferences dialog appears.
2.
Double click the Advanced item and then select Proxies.
The Proxies dialog appears:
3.
Select Automatic proxy configuration URL and type your proxy autoconfiguration file URL.
Note: You can use the eTrust SCM proxy engine directory instead of the web
server.
When using the eTrust SCM proxy engine directory be sure to do the following:
„
Store the configuration file in the engine directory of the eTrust SCM HTTP
proxy (for example, C:\Program Files\CA\Common\ScanGateway) under
the name proxy.pac.
„
Configure your browser with the auto-configuration URL http://< eTrust
SCM HTTP proxy IP>:< eTrust SCM HTTP proxy port>/proxy.pac.
Configuring Your Implementation 129
Configuring the Browser Proxy
PAC Files Examples
//All clients through one proxy server for http/ftp requests:
function FindProxyForURL(url, host)
{
//go through the eTrust SCM proxy
if (
url.substring (0, 5) == "http:" ||
url.substring (0, 4) == "ftp:" ||
url.substring (0, 6) == "https:" )
return "<eTrust SCM HTTP/FTP proxy IP>:<proxy port>";
// Otherwise, go directly to the origin server
return "DIRECT";
}
//Some clients through one proxy server for http/ftp requests:
function FindProxyForURL(url, host)
{
// Make 130.119.*.* stations go through eTrust SCM proxy
if (
(url.substring (0, 5) == "http:" ||
url.substring (0, 4) == "ftp:" ||
url.substring (0, 6) == "https:" ) &&
isInNet(myIpAddress(), "130.119.0.0", "255.255.0.0")
)
return "<eTrust SCM HTTP/FTP proxy IP>:<proxy port>";
// Otherwise, go go through another proxy
return "PROXY euproxy.ca.com:80; DIRECT";
}
Configuring Your Browser for Web Proxy Automatic Discovery (WPAD)
Web Proxy Auto-Discovery (WPAD) enables web clients to automatically detect
proxy settings without user intervention. The algorithm used by WPAD
appends the hostname wpad to the fully-qualified domain name and
progressively removes sub domains until it either finds a WPAD server
answering the hostname, or reaches the third-level domain.
For example, web clients in the domain a.b.mydomain.com would query
wpad.a.b.mydomain.com, wpad.b.mydomain.com, and then
wpad.mydomain.com.
130 Implementation Guide
Configuring the Browser Proxy
To configure your browser for WPAD, follow these steps:
1.
Create a standard PAC file.
2.
Store the file in the document root directory of your web server as
wpad.dat. You should be able to use an HTTP redirect if you want to store
the wpad.dat file in another location.
3.
Ensure that a URL address such as http://www.mydomain.name/wpad.dat
displays the script text in your browser window.
4.
Create, install, or implement a DNS record so that wpad.mydomain.name
resolves to the host above where you have a functioning auto
configuration script running. You can use a Hosts file at your computer to
create mapping, for example, wpad.mydomain.name <IP-address your
web-server>.
5.
Open Internet Explorer and select Tools, Internet Options.
The Internet Options dialog appears:
6.
Click the Connections tab, and then click LAN Settings.
Configuring Your Implementation 131
Configuring the Browser Proxy
The LAN Settings dialog appears:
7.
To test your WPAD settings in the Automatic configuration area, select the
Use automatic configuration script check box and type your WPAD URL, for
example, http://www.mydomain.name/wpad.dat.Verify all working
properly.
8.
As shown in the Local Area network (LAN) Settings dialog, on the
Automatic configuration area, uncheck the Use automatic configuration
script check box and confirm that the Automatically detect settings check
box is the only box checked.
Note: To force proxy configuration settings for individual client browsers,
the administrator can push the browser settings in the login script. To
distribute registry modifications across the network, you can use one of
three methods: imported registration (.reg) files, regini.exe, or group or
system policies. In the registration method, you determine the proper
registry key for your version of IE, export the settings to a .REG file, and
then use REGEDIT in the login script to push the settings to the PC.
For example, create a setprx.reg file that contains the following:
regedit
KEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
AutoConfigURL"=http://www.mywebsrv.com/wpad.dat
MigrateProxy"=dword:00000001
"ProxyEnable"=dword:00000001
132 Implementation Guide
Chapter 5: Implementation Modes
eTrust SCM is installed with real-time network alerts and email recipient
notification enabled. These settings provide you with the information you need
to learn about content threats identified by eTrust SCM. As you become more
familiar with eTrust SCM, you need to migrate your implementation from Alert,
to Notification, and then to User Self-Management mode. You control the
modes by modifying the default rules, creating new rules, and by specifying
actions in these rules.
The eTrust Secure Content Manager Administrator Guide provides procedures
on how to work with rules. As you get started, you should understand the
following modes and the process of increasing the security level.
Phase 1 - Alert Mode
In Alert mode, eTrust SCM identifies spam and allows it to be delivered to the
user. An alert is displayed on the Manager Console so that you can analyze the
possible content threat. It does not block the content.
The network content alerts are displayed in real time. You can analyze network
activities such as spam email rates, detected viruses, and statistical counters.
Use this mode to learn about your enterprise network activities without
blocking content.
Note: Because the RBL and Spam Filter engines are not run under a restrictive
mode, you may encounter some false-negative alerts.
For websites, eTrust SCM displays an alert on the Manager Console when a
user tries to access a URL that triggers one of the content rules. By monitoring
the alerts, you can decide which URLs to block.
Implementation Modes 133
Phase 2 - Notification Mode
Phase 2 - Notification Mode
In Notification mode, eTrust SCM identifies the spam, and automatically
notifies email users about spam detection. The Disclaimer action positions a
custom message in the top of the email, at the bottom of the email, or as a
new email with the original email "wrapped" as an attachment. You can also
use the text areas to specify a disclaimer message to display as either plain
text or as HTML.
Notification mode lets you receive feedback from email users and tune the
allow list, deny list, RBL provider list, weights and Advanced Spam Filter
accordingly, accordingly. Notifying email users about content detection lets
them know that eTrust SCM is filtering their email.
Notification mode does not apply to websites.
Phase 3 - User Self Management Mode
In User Self Management mode, email recipients have control over
quarantined emails instead of the administrator alone. In this mode, the
Centralized Quarantine Manager controls emails suspected of being spam. At a
configured time, or when the number of quarantined items for an email
recipient exceeds a threshold value, the Centralized Quarantine Manager sends
an email report back to the original email recipient. Depending on the
administrator's preference, the email user can access quarantined email
through a web interface or manage the quarantined email directly from within
the self managed notification message.
If you decide to allow users to manage quarantined email using the web
interface (recommended), they can review email, including the entire content
and attachment, before deciding whether to release the email or delete it.
Users can also manage their allow and deny lists and configure personal
quarantine notification parameters.
134 Implementation Guide
Phase 4 - Blocking Mode
For self managed reports, users can configure certain settings (for example,
release, delete, leave, and not spam for RBL quarantine) or refine their private
allow lists and submit the settings. The only limitation is that they cannot
review the messages. This basic email report format consists of a sender
address, subject, reason for quarantine, and expiration date, all followed by an
eTrust SCM action.
When the not spam setting is chosen, the email user's private allow list is
updated. This ensures that future email from the same email sender is not
detected as spam by the RBL engine, which is stored in the Centralized
Quarantine Manager. The not spam setting also instructs the Centralized
Quarantine Manager to release the message to the email user.
Note: CA recommends notifying email end users before operating eTrust SCM
in either of the two self management modes. CA recommends that you tune
the advanced spam filter and RBL thresholds in this mode so the engine
becomes more responsive in detecting spam detection.
User Self Management mode does not apply to websites.
Phase 4 - Blocking Mode
After eTrust SCM has been operating in user self management mode and all
email users have had an opportunity to refine and personalize their private
allow lists, you can consider configuring eTrust SCM to block spam emails. This
capability is useful if you prefer that end users not control the release of spam
emails. You do this by specifying a block action in the rule. However, if the
spam filters are not properly tuned, eTrust SCM may block valid emails.
Similarly, a block action for a URL displays a notification that the website has
been blocked and prevents the user from accessing the site.
Implementation Modes 135
Chapter 6: Troubleshooting the eTrust
SCM Installation
The topics in this section provide procedures to resolve issues when installing
and configuring eTrust SCM.
Correct an Incomplete DNS Configuration
Issues can arise with TCP/IP computer name configuration. For example,
emails can bounce back with an error message indicating an invalid host or
eTrust SCM may be unable to connect to your DNS and SMTP servers even
though you have verified that the servers are up and running.
Issues can arise with TCP/IP computer name configuration. For example,
emails can bounce back with an error message indicating an invalid host or
eTrust SCM may be unable to connect to your DNS and SMTP servers even
though you have verified that the servers are up and running.
An incomplete DNS configuration is usually the cause. For eTrust SCM to relay
emails using MX, the TCP/IP host name on your computer must exist on your
DNS server. Also, the TCP/IP addresses that your computer uses must
themselves have names. This means that you need both forward and reverse
DNS lookups installed on your system.
To correct an incomplete DNS configuration, follow these steps:
1.
Check the host name/domain name that is set in your TCP/IP
configuration. Verify that you can ping this full name, both from your
computer and from another computer. You must have a DNS entry for
your computer on your DNS server.
2.
If you have multiple TCP/IP addresses, make sure that the first TCP/IP
address on your system has a DNS name entry.
Using the program nslookup.exe (nslookup on UNIX computers), check if
the DNS entries are set up correctly. For example, if your computer is
named mail.company.com, enter the following:
nslookup mail.company.com
The nslookup should respond as follows:
Server: imdns.company.com (This is your DNS server name.)
Address: 194.90.1.5 (This is your DNS server address.)
Name: mail.company.com (This is your host name.)
Address: 194.90.18.5 (This is your TCP/IP address.)
Troubleshooting the eTrust SCM Installation 137
Correct an Incomplete DNS Configuration
If your DNS is not set up correctly, nslookup may respond as follows:
*** imdns.company.com can't find mail.company.com: Non-existent host/domain
or nslookup may respond as follows:
Server: imdns.company.com
Address: 194.90.1.5
DNS request timed out.
timeout was 2 seconds.
*** Request to imdns.company.com timed-out
3.
If the DNS problem still occurs and you did not receive an error message,
invoke a reverse lookup action by entering the TCP/IP address of your
computer. For example, if the TCP/IP address of your computer is
194.90.18.5, enter the following:
nslookup 194.90.18.5
If your DNS is not set up correctly, reverse lookup may respond as
follows:
*** imdns.company.com can't find 194.90.18.5: Non-existent host/domain
or nslookup may respond as follows:
Server: imdns.company.com
Address: 194.90.1.5
DNS request timed out.
timeout was 2 seconds.
*** Request to imdns.company.com timed-out
4.
138 Implementation Guide
If you have a DNS problem, contact the system administrator or your ISP
provider responsible for your DNS.
Prevent Loop-back Problems
Prevent Loop-back Problems
A loop-back situation can occur when eTrust SCM resolves an IP address
through MX lookup. This can occur when network address translation (NAT)
points back to the same eTrust SCM computer or when MX lookup produces an
address that points back to the same or another eTrust SCM for SMTP
computer.
Here are some possible scenarios:
„
eTrust SCM is installed at IP address 10.0.0.2 and SomeDomain.com has
only one MX record. This record, Mail.SomeDomain.com, has an A record
that points to 1.2.3.4. The firewall translates 1.2.3.4 back to 10.0.0.2,
which is the eTrust SCM computer address.
„
eTrust SCM is installed at IP address 10.0.0.0 and is listening on port 25.
It tries to deliver a message, but the mail server rejects the message. This
can happen for two reasons: The eTrust SCM that is running on 10.0.0.0
performs an MX lookup that produces an IP address of 10.0.0.0, or it
produces an address for a remote eTrust SCM SMTP computer (10.0.0.1,
port 25) that eventually causes a loopback.
To prevent loop-back problems, follow these steps:
1.
Open the Manager Console on the Control Center.
2.
Select Filtering, Settings, Enterprise Settings, Loop-back Settings, General.
The Loop-back Prevention pane appears.
3.
Click Add.
A Server Properties dialog appears.
4.
Enter the IP address and corresponding port of an eTrust SCM computer to
use as the SMTP computer.
5.
Repeat the previous step, adding all local and remote eTrust SCM
computers to use as SMTP computers. You can also enter NAT devices that
point to eTrust SCM computers.
For the examples above, add the following:
1.2.3.4, Port 25
10.0.0.0, Port 25
10.0.0.1, Port 25
Troubleshooting the eTrust SCM Installation 139
Manager Console or Quarantine Manager Terminates Suddenly
Manager Console or Quarantine Manager Terminates
Suddenly
The product is probably not licensed. Look for an entry in the Manager Console
or Quarantine Manager log that specifies that the eTrust SCM is not licensed.
To license the eTrust SCM, see Licensing and Registering eTrust SCM (see
page 69).
Verify Firewall Ports Are Open
The following firewall ports must be open during installation:
„
TCP/IP port 1882 between eTrust SCM modules.
„
The FTP port and HTTP/HTTPS ports (required for web updates) from
eTrust SCM towards the Internet.
„
TCP/IP port 8080 from end users toward the Quarantine Manager
computer. If eSCM HTTP is already installed on a port other than 8080,
use the port it is installed on.
„
(If using ADCP) TCP/IP port 7779 from eTrust SCM toward the domain
controller computer.
140 Implementation Guide
eTrust InoculateIT or eTrust Antivirus Conflicts with Antivirus Realtime Scanner
eTrust InoculateIT or eTrust Antivirus Conflicts with Antivirus
Realtime Scanner
Installing eTrust InoculateIT or eTrust Antivirus prior to installing eTrust SCM
causes the Antivirus Realtime Scanner to act on data before eTrust SCM can
analyze or use the data. This may interfere with Content Manager Engine
functionality.
To avoid operational conflicts between eTrust Antivirus and eTrust SCM, be
sure to identify the eTrust SCM processes that are running and add the
processes to the eTrust Antivirus exclusions list.
Use the Windows Task Manager to locate the process names. Add the
processes to the eTrust Antivirus exclusions list by following these steps:
1.
Right click the eTrust Antivirus icon in the Windows task tray.
2.
Select Realtime Options, Filters tab, and then click Process.
3.
Enter the process name and add the name to the exclusions list.
The following list shows all possible eTrust SCM processes that could be
running for your eTrust SCM installation.
Note: The exact list of processes depends upon the options installed when you
installed eTrust SCM.
„
icihttp.exe
„
icismtp.exe
„
DCollSrv.exe
„
QmgrSrv.exe
„
CRepSrv.exe
„
ECSQDMN.exe
„
ECSSAFMGR.exe
„
eCCCleaner.exe
„
QMgr.exe
Troubleshooting the eTrust SCM Installation 141
Outgoing SMTP Rules Are Also Applied to Incoming Emails
Outgoing SMTP Rules Are Also Applied to Incoming Emails
If outgoing SMTP rules are inadvertently being applied to incoming emails, you
must configure the intranet subnet list to exclude the IP address of the firewall
or router which receives incoming email.
You can modify these settings in Subnets by navigating to Filtering , Settings,
<local engine>, Subnets.
Unblock a Website
To unblock a website, follow these steps:
1.
Navigate to Filtering, Settings, Enterprise Settings, URL Customization.
2.
Click Add.
3.
Type in the web address the site being blocked and click OK.
4.
Uncheck the default url category for the site in the Categories assigned to
the URL list.
5.
Scroll down and check <User Defined 1> and click OK.
6.
Click Yes to distribute the changes.
7.
Navigate to the URL rule that contains the blocking action you are trying to
remedy.
8.
Confirm that in the URL rule <User Defined 1> is not checked.
142 Implementation Guide
Appendix A: ADCP Authentication
The eTrust Authentication Device Communication Protocol (ADCP) provides a
way to link user names with the IP and MAC addresses of the computer they
are currently logged onto. This provides a way to track network activity and
establish policies by users and groups. The ADCP system works with Active
Directory, mixed-mode, and NT domains. It can also provide logon information
from remote access servers (RASs) and routing and remote access servers
(RRASs). Installation and configuration vary by the type of domain model
used. This is an optional enhancement that is not required for the proper
functioning of eTrust SCM.
This section explains how to install and configure eTrust ADCP. There are two
types of ADCP installations:
ADCP Agents
These are agents that collect the authenticated user and computer
information and send it to the eTrust SCM Engines. This communication is
encrypted and uses a secure handshake to ensure the integrity of the
communication and content.
„
„
„
The ADCP Distributed Source Agent (DSA) is recommended for all
domain types. It is required for Active Directory domains and provides
the best information across WAN links and large multi-domain
environments. The DSA receives the user and computer information
from the DSCs directly, avoiding directory propagation delays.
The ADCP Universal Source Agent (USA) is an older mechanism still
used in smaller NT or mixed-mode domains in which running a client
on the workstations is not preferred.
The Universal Source NT/2000 RAS Agent is installed on RAS/RRAS
servers to provide user information from remote users.
The ADCP Agent Distributed Source Client
You can run this client on the workstation or using a login script. The client
sends the user and computer information to the DSA. You can also run it as a
logoff script to insure that logoff information reaches the eTrust SCM Engines
in a timely fashion.
ADCP Authentication 143
The ADCP Agent
The ADCP Agent
As an optional identification enhancement, eTrust SCM includes an
Authentication Device Communication Protocol (ADCP) agent. The ADCP agent
ties information about the authenticated user (using one of the authenticated
devices) with the address of the host computer, which the authenticated user
uses.
ADCP DSA
The DSA can reside on any computer that has permissions to read the user
directory. You do not need to install it on all of the PDCs and BDCs as the USA
is. If there are many hundreds of users, and especially if they tend to logon to
the domain at roughly the same time of day, we recommend that several
DSAs be installed on dedicated workstations or servers to handle the traffic.
The DSA can connect to the clients in one of two ways. In smaller networks or
WANs where DSAs are installed at each remote site, UDP broadcasts on port
7781 can be used by the DSCs to discover the DSAs. The first DSA to reply is
discovered by the DSC, which will then send the authentication information to
that IP address. This provides a rudimentary form of load balancing and can
also be used to provide some redundancy. A DSC is required in each broadcast
domain. For networks where UDP broadcast is not desired each client can be
configured with the IP address of the DSA it should use and TCP port 7781 is
utilized for the exchange of information.
ADCP RAS/RRAS Universal Source Agent
Install this Agent on all of the RAS/RRAS servers in the organization. It
provides authentication information for remote users.
ADCP USA
Install the USA on every PDC and BDC in the domain. It requires a restart of
the Domain Controller(s), so careful planning is recommended for deployment
and upgrading. The USA does not require the DSC on workstations.
144 Implementation Guide
The ADCP Agent
Installing the ADCP Agent
To install the ADCP Agent, perform the following procedure:
1.
Log on with administrator or domain administrator privileges.
2.
Exit any other programs that are running on your computer.
3.
To install the ADCP Agent, insert the distribution CD into the CD ROM
drive.
„
„
If autorun is enabled on Windows, the product installation browser
appears.
If autorun is not enabled, perform these steps to display the browser:
„
On the taskbar, select Start, Run.
„
On the Run dialog, click Browse.
„
On the Browse dialog, navigate to your CD-ROM drive and the
Launch.exe file; then click Open.
„
On the Run dialog, click OK.
The eTrust SCM Product Installation Browser appears:
4.
Click Install eTrust SCM Accessories.
The eTrust Accessories Installation menu appears.
5.
Click Install eTrust ADCP Options.
Installation and documentation options appear.
6.
Click Install eTrust ADCP Agent.
ADCP Authentication 145
The ADCP Agent
The system displays installation messages and then a welcome dialog
appears:
7.
Click Next.
8.
The ADCP Installer license agreement appears.
9.
Read the agreement, scroll to the bottom, and click I Agree.
The Customer Information dialog appears:
146 Implementation Guide
The ADCP Agent
10. Enter your user name and company name and then click Next.
The Choose Destination Location dialog appears:
11. Perform one of the following actions:
„
„
To accept the default destination folder, click Next.
To select a different destination folder, click Browse, navigate to it,
and click OK; then click Next.
The Select Program Folder dialog appears:
ADCP Authentication 147
The ADCP Agent
12. In the Program Folders field, enter the default folder name, ADCP Agent;
then click Next.
The wizard program loads and the first Install ADCP Agent dialog appears:
13. Click Next.
The second Install ADCP Agent dialog appears:
14. Select the type of agent to install, and then click Next.
The program copies files to your computer, and the Setup Complete dialog
appears.
15. Select Yes, I want to restart my computer now; then click Finish.
Your computer restarts.
148 Implementation Guide
The ADCP Agent
Configuring the ADCP Agent
By default the ADCP Agent installs with TCP port 7779 (for communication
with the eTrust SCM Engines and encryption) disabled for speed and ease of
troubleshooting connections. We recommend that encryption be enabled for
production systems.
1.
Confirm that the service is running.
2.
Open the Start menu and navigate to and select ADCP Agent
Configuration.
The ADCP Agent Configuration dialog appears:
3.
Click Preferences.
The Agent Preferences dialog appears:
4.
Enter TCP port, check the Enforce Encryption checkbox, and click OK.
The port must match the eTrust SCM Engine settings for communication to
be enabled.
ADCP Authentication 149
The ADCP Agent
Configuring a Windows NT Domain Controller to Catch Events
If you installed an ADCP agent in the source server agent mode on a Windows
NT domain controller, you can perform the following procedure to configure a
PDC to enable the catching of network events.
1.
On the Windows taskbar, select Start, Programs, Administrative Tools,
User Manager for Domains.
The User Manager for Domains dialog appears.
2.
Select Policies, Audit.
The Audit dialog appears.
3.
Select Audit these events.
4.
Select Success next to the logon and logoff option.
Reconfiguring the TCP Port for an ADCP Agent
To change the configuration of a TCP port for an ADCP Agent, perform the
following procedure.
1.
Select Start, Programs, ADCP Agent, Configure.
The ADCP Agent Configuration dialog appears and displays the list of
authentication devices that are operational on the ADCP Agent:
2.
150 Implementation Guide
Click Preferences.
The ADCP Agent
The Agent Preferences dialog appears.
3.
Enter a TCP port number and click OK.
Note: The port number must match the port number used to configure
eTrust SCM to work with the ADCP agent.
Configuring eTrust SCM to Use an ADCP Agent
To configure eTrust SCM to use an ADCP Agent, perform the following
procedure to define each domain controller.
1.
From the Manager Console main window menu select Settings, <local
engine>, Gateway, ADCP Agents
The Define ADCP Agents dialog appears:
ADCP Authentication 151
The ADCP Agent
2.
To add agents, follow these steps:
a.
Click Add.
b.
Enter the domain controller name, or server name on which ADCP is
installed or browse to search for it.
c.
Enter the server port, making sure it matches the port number entered
when configuring the ADCP Agent, and then click OK.
The program adds the name of the controller to the list of Agents
shown under ADCP Agent. The icon indicates whether the Agent is
connected or not.
152 Implementation Guide
The ADCP Distributed Source Client
If There is a Problem with the ADCP Agent Installation
eTrust SCM uses ADCP version 2.0. This version does not allow installation on
a computer on which the Terminal Service is installed. If there is a problem
with the installation, the ADCP Agent's installer may be looking for the
following registry key to confirm that the terminal service is installed:
HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Terminal
Server\"TSEnabled\"=dword:00000001
To work around this conflict, set the TSEnabled value to 0 and then try the
installation again. If the installation is successful, set the value back to 1 when
the installation is complete.
The ADCP Distributed Source Client
The ADCP DSC can be installed on each workstation or executed in logon and
logoff scripts. Use of scripts is recommended, as the IP address of the DSA(s)
can be easily modified or assigned by groups and the client cannot be disabled
by users with Administrator privileges as it runs before they have access to the
computer settings.
ADCP Distributed Source Client (DSC) is a new source type that obtains
information about interactive users from software that runs on each station.
The DSC must run at least once under the interactive user account on every
workstation that ADCP monitors. When using DSC, the ADCP Agent can run on
almost any computer on the network.
When running, the DSC gathers all the information ADCP needs. It discovers
the IP address of any ADCP Agent and sends data to it. The discovery process
works by using UDP broadcast on port 7781. Any ADCP Agent that is in
distributed mode answers the broadcast. The first reply read by the DSC
discovers the IP address where the ADCP Agent sends information. This
provides a rudimentary form of load balancing.
After discovering the ADCP Agent location, the DSC connects to the distributed
mode ADCP Agent using TCP port 7781 and sends the usual information to it
(for example, user name, domain, IP, MAC). This information is fully believed
by ADCP. ADCP assumes that the user sent by the DSC is the only user on the
computer that the request came from, therefore no unknown username
situations appear.
ADCP Authentication 153
The ADCP Distributed Source Client
You can use DSC in one of these modes:
„
As a standalone executable, installed on each client computer, that runs
whenever an interactive user logs on. It uses the following registry key:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
„
As a logon script that resides on a domain controller
You can use TCP/IP with the Distributed Client rather than UDP. In the logon
script, instead of sending the path to the distclient, send the path, followed by
the ADCP Agent’s IP address, as shown here:
\\ADCP_AGENT_PC\Distclient\DistClient.exe -a<IP address>
<IP address> can be either the computer name or the IP address.
For example:
\\ADCP1\Distclient\DistClient.exe -a172.24.123.12
154 Implementation Guide
The ADCP Distributed Source Client
Adding DistClient.exe As a Logon Script
Use this procedure to add distclient.exe as a script that runs when you log in.
The script runs using the Group Policy console. To set up a logon script:
1.
Open the Active Directory Users And Computers Microsoft Management
Console by choosing Start, Programs, Administrative Tools, Active
Directory, Users And Computers. Right-click the domain object, click
Properties, and then click Group Policy. The Group Property dialog
appears.
2.
On the Group Policy dialog, select Default Domain Policy from the tree,
and then click Edit. The Group Policy snap-in appears on the tree.
3.
In the Group Policy snap-in, open User Configuration, open Windows
Settings, and then select Scripts (Logon/Logoff). Logon and Logoff appear
in the right pane.
ADCP Authentication 155
The ADCP Distributed Source Client
4.
In the right pane, double-click Logon. The Logon Properties dialog
appears.
„
„
„
„
„
5.
The Logon Properties dialog displays the list of scripts that run when
users log on. This is an ordered list; the script that runs first appears
at the top of the list. You can change the order by selecting a script
and then using the Up and Down buttons to move it.
Click Show Files. The location of the logon scripts for this policy
appears. Copy DistClient.exe to this folder to have it available to all
computers that execute it.
To add DistClient.exe to the logon scripts, click Add. The Add a Script
dialog appears. You can accept the DistClient.exe located in the
current Group Policy Object (GPO) or use Browse to select another
location for this GPO. The DistClient.exe file must be accessible to the
user at logon (by means of execute permissions) or it does not launch.
In Script Parameters, enter the -a<IP address> switch with the IP
address of the computer on which the ADCP Agent with the Distributed
Source Server is installed.
Click OK to close the Add a Script dialog, and then click OK again to
close the Logon Properties dialog.
Log on from a client workstation that has a user in that domain and verify
that DistClient.exe runs correctly. Look at \Winnt\System32\DistClient.log
(a hidden file) on the client to see if there are any special error messages.
Typical log entries should look like this:
Wed May 28 19:11:16 2003
DistClient Executable Started
Platform is NT
User: JohnDoe
Domain: CompanyDomain
IP 172.24.184.67
Computer COMP1234
MAC 00:b0:d0:ec:5e:cb
DistClient Executable Stopped
Wed May 28 19:11:17 2003
156 Implementation Guide
The ADCP Distributed Source Client
Adding DistClient.exe As a Logoff Script
Use the same procedure outlined in the previous section to set up scripts that
run when a user logs off. There are two differences:
„
For logoff scripts, double-click Logoff on the right pane.
„
In Script Parameters, enter the -f and the -a<IP address> switches.
The -f switch causes the DistClient.exe to send the same information (for
example, Platform, domain, IP, MAC) to the ADCP Agent. However, this time
the user name is NOUSER.
ADCP Authentication 157
The ADCP Distributed Source Client
Installing the ADCP Distributed Source Client
The ADCP DS client can be installed either on each workstation or executed in
logon and logoff scripts. CA recommends using scripts , as you can easily
modify DS agent IP addresses or assign them by groups. The client cannot be
disabled by users with Administrator privileges as it runs before users have
access to the computer settings.
Note: The following procedure is for use only with ADCP distributed source
mode.
To install the ADCP DS client, perform the following procedure:
1.
Log on with administrator or domain administrator privileges.
2.
Exit any other programs that are running on your computer.
3.
Insert the product CD into your CD-ROM drive.
If autorun is enabled on Windows, the product installation browser
appears.
If autorun is not enabled, perform these steps to display the browser:
„
On the taskbar, select Start, Run.
„
On the Run dialog, click Browse.
„
„
On the Browse dialog, navigate to your CD-ROM drive and the
Launcher.exe file; then click Open.
On the Run dialog, click OK.
The eTrust SCM Product Installation Browser appears:
4.
158 Implementation Guide
Click Install eTrust SCM Accessories.
The ADCP Distributed Source Client
The eTrust Accessories Installation menu appears:
5.
Click Install eTrust ADCP Options.
The ADCP options installation menu appears:
6.
Click Install eTrust ADCP Distributed Source Client.
ADCP Authentication 159
The ADCP Distributed Source Client
The system briefly displays installation messages and then displays the
ADCP Distributed Source Client Installer dialog:
7.
Click Next.
The ADCP source client disclaimer appears.
8.
Read the disclaimer, scroll to the bottom of the dialog, and click I Agree.
The ADCP user and company name dialog appears:
9.
160 Implementation Guide
Enter your user and company name and then click Next.
The ADCP Distributed Source Client
The Setup Type dialog appears:
10. To set up the client to run automatically on client computers, select Client.
To set up the client to run from a user's logon script, select Server and
click Next.
The Choose Destination Location dialog appears:
ADCP Authentication 161
The ADCP Distributed Source Client
11. Perform one of the following actions:
„
„
To accept the default destination folder, click Next.
To select a different destination folder, click Browse, navigate to the
destination, and click OK. Then click Next.
The Setup Status dialog appears.
12. When the installation completes, click Finish.
162 Implementation Guide
Appendix B: Installing and Configuring
Microsoft SQL Server
The eTrust SCM Quarantine Manager and Reporter can use MS-SQL Server as
the database layer.
According to your needs, you can install a dedicated SQL Server on a remote
machine, or install SQL Server on the same machine as the Quarantine
Manager and/or Reporter.
Prerequisites
Perform the following installations and checks before installing eTrust SCM:
„
Install Microsoft SQL Server according to the product's documentation.
Important! Microsoft SQL Server must be installed before you install
eTrust SCM.
„
Confirm that SQL Server and Windows authentication is enabled in the
SQL Enterprise Manager. To confirm this setting, do the following:
„
Open the SQL Enterprise Manager.
„
Right click on the local database, and click the Security tab.
„
Confirm that the Authentication, SQL Server and Windows radio button
is selected.
Install eTrust SCM after you have confirmed that these prerequisites have
been met.
Installing and Configuring Microsoft SQL Server 163
Creating the Quarantine and Reports Databases
Creating the Quarantine and Reports Databases
To create the quarantine and reports databases, follow these steps:
Create the Quarantine Database
Perform the following steps to create the Quarantine database:
1.
164 Implementation Guide
Open the SQL Enterprise Manager Snap-in and browse to the Database
level:
Creating the Quarantine and Reports Databases
2.
Choose Database.
The default database appears in the right pane:
Installing and Configuring Microsoft SQL Server 165
Creating the Quarantine and Reports Databases
3.
Right-click the right pane and select New Database.
The Database Properties dialog appears:
166 Implementation Guide
Creating the Quarantine and Reports Databases
4.
On the Database Properties dialog, enter a name for the container on the
General tab, for example: eSCM_Quarantine_DB.
Installing and Configuring Microsoft SQL Server 167
Creating the Quarantine and Reports Databases
5.
168 Implementation Guide
On the Data Files tab of the Database Properties dialog, adjust the default
parameters if this is a heavily-used database. The defaults are fine for
testing purposes. Click OK.
Creating the Quarantine and Reports Databases
Create the Reports Database
To create the Reports database, repeat the steps in Create the Quarantine
Database, with the exception of the database name:
1.
On the Database Properties dialog, enter a unique name for the container
on the General tab, for example: eSCM_Reports_DB.
2.
On the Data Files tab of the Database Properties dialog, adjust the default
parameters if this is a heavily-used database. The defaults are fine for
testing purposes. Click OK.
Installing and Configuring Microsoft SQL Server 169
Creating an SQL User and Associating It with the Databases
Creating an SQL User and Associating It with the Databases
To create an SQL user and associate it with the databases, follow these steps:
1.
Open the SQL Enterprise Manager Snap-in, browse to the Security level,
and select Logins.
2.
Right-click and select New Login.
170 Implementation Guide
Creating an SQL User and Associating It with the Databases
The SQL Server Login Properties - New Login dialog appears:
3.
Create a new user using the SQL Server Authentication option. This user
does not require administrative privileges anywhere except than for the
Quarantine and Reports databases.
Installing and Configuring Microsoft SQL Server 171
Creating an SQL User and Associating It with the Databases
4.
172 Implementation Guide
Click the Database Access tab, and select the databases to be accessed by
this login as follows:
a.
Select the eSCM_Quarantine_DB and specify the roles for the new
database. In the Database roles, both public and db_owner should be
selected, as this user must be the db_owner to create the tables
properly.
b.
Select the eSCM_Reports_DB and specify the roles for the new
database. In the Database roles, both public and db_owner should be
selected, as this user must be the db_owner to create the tables
properly.
c.
Click OK.
Creating an SQL User and Associating It with the Databases
The Confirm Password dialog appears:
5.
Enter the password you specified in the General tab again, to confirm it.
Click OK.
You are now set up to use SQL Server with the Quarantine Manager and/or
Reporter. Write down the database names, user and password you have
created, as they will be required during the installation of eTrust SCM.
Notes:
There is no need to tune additional database parameters, create any tables, or
set any ODBC settings. The eTrust SCM installer will do so during the
installation.
If you change the SQL database credentials after the eTrust SCM installation,
use the Manager Console to configure the new credentials. To do so, from the
Manager Console's menu select Settings, Engine settings, Microsoft SQL Tab.
Installing and Configuring Microsoft SQL Server 173
Glossary
ADCP
Authentication Device Communication Protocol. eTrust SCM includes an ADCP
engine that tracks the company domain controller for user activities and
maintains a local, real-time cache table used by the engine to associate the
user IP address to a specific user name.
ADS
Active Directory Server.
Applet
An applet is similar to an application but does not run in standalone mode. It
complies with a set of conventions that allow it to run within a Java-compatible
browser.
Application
An application is a standalone program. It can be executed independently of
any other program.
DMZ
The DMZ is a computer or small subnetwork that sits between a trusted
internal network, such as a corporate private LAN, and an untrusted external
network, such as the public Internet. Typically, the DMZ contains devices
accessible to Internet traffic, such as web (HTTP) servers, FTP servers, SMTP
(email) servers, and DNS servers.
DNS
The Domain Name System is an Internet service that translates domain names
into IP addresses. Because domain names are alphabetic, they are easier to
remember. The Internet, however, is based on IP addresses. Every time you
use a domain name, a DNS service translates the name into its IP address. For
example, the domain name www.example.com might translate to
198.105.232.4. The DNS is its own network. If one DNS server cannot
translate a domain name, it queries other DNS servers to resolve the correct
IP address.
Downloadable
A downloadable is a file that is transmitted into an organization’s computer
system. Downloadables may originate from the Internet, other locations in an
organization’s intranet, or an extranet.
EIAM
eTrust Embedded Identity Access Management
Glossary 175
Executable
A file that contains programs. This is a particular kind of file that is capable of
being executed or run as a program in the computer. In a DOS or Windows
operating system, an executable file usually has a file name extension of .bat,
.com, or .exe.
These types of executables, if downloaded, are executed automatically, often
without the knowledge of the user. The only warning the user may receive is
the regular browser warning that a package is about to be downloaded.
Extranet
A communication network of selected private companies, such as
communications networks shared among banking organizations.
Firewall
A firewall is a set of related programs located at a network gateway server,
which protects the resources of a private network from users in other
networks. (The term also implies the security policy that is used with the
programs.) An enterprise with an intranet that allows its workers access to the
wider Internet installs a firewall to prevent outsiders from accessing its own
private data resources and for controlling what outside resources its own users
have access to.
Basically, a firewall working closely with a router program filters all network
packets to determine whether to forward them toward their destination.
A firewall may also include or work with a device that makes network requests
on behalf of workstation users. A firewall is often installed in a specially
designated computer separate from the rest of the network so that no
incoming request can get directly at private network resources.
FTP
File Transfer Protocol
Gateway
A gateway is a network point that acts as an entrance to another network. On
the Internet, in terms of routing, the network consists of gateway nodes and
host nodes. The computers of network users and the computers that serve
content (such as Web pages) are host nodes. The computers that control
traffic within your company’s network or at your local Internet service provider
(ISP) are gateway nodes.
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
Hub
A hub is a hardware device that connects two separate LANs. A hub does not
filter traffic moving between the two LANs.
176 Implementation Guide
Internet
The global computer communications network that connects independent
networks. The Internet is accessed through a service provider.
Intranet
An intranet is a private network inside a company or organization that uses
the same kinds of software as on the public Internet (for example, private
LANs and WANs). It is only for internal use.
IP Address
An internet protocol (IP) address is a 32-bit number that identifies each sender
or receiver of information that is sent in packets across the Internet.
When you request an HTML page or send email, the IP part of TCP/IP includes
your IP address in the message and sends it to the IP address that is obtained
by looking up the domain name in the URL you requested or in the email
address you're sending a note to. At the other end, the recipient can see the
IP address of the Web page requester or the email sender and can respond by
sending another message using the IP address it received.
ISA
Microsoft Internet Security and Acceleration Server.
LDAP
Lightweight Directory Access Protocol.
Mail Exchange (MX) Record
A mail exchange record is an entry in a DNS database that identifies the mail
server that handles emails for that domain name. When more than one MX
record exists for any single domain name that is using more than one mail
server, the MX record has a preference number that indicates the order in
which to use the mail servers. This enables the use of primary and backup
mail servers.
Message digest algorithm
Digital signatures and other applications, which need unique and unforgettable
identifiers for digital data, frequently make use of digital fingerprints or
message digests. These are produced using cryptographically secure message
digest algorithms, also known as one-way hash algorithms.
A message digest algorithm is a function, which takes arbitrary-sized input
data (the message) and generates a fixed-sized output, known as a digest or
hash.
MIME
Multipurpose Internet Mail Extensions
NIC
Network Interface Card.
Glossary 177
NTLM
Is an abbreviation for Windows NT LAN Manager. NTLM is an authentication
protocol used in various Microsoft network protocol implementations. NTLM
uses a challenge-response mechanism for authentication, in which clients
prove their identities without sending a password to the server.
POP3
Post Office Protocol version 3. A protocol frequently used by email clients to
receive emails that have been received and stored on a mail server.
PPTP
Point to Point Tunneling.
Proxy Server
A proxy server is a server that acts as an intermediary between a workstation
user and the Internet so that the enterprise can ensure security,
administrative control, and caching service. A proxy server is associated with
or part of a gateway server that separates the enterprise network from the
outside network and a firewall server that protects the enterprise network
from outside intrusion.
The proxy server receives a request for an Internet service (such as a Web
page request) from a user. If it passes filtering requirements, the proxy
server, assuming it is also a cache server, looks in its local cache of previously
downloaded Web pages. If it finds the page, it returns it to the user without
forwarding the request to the Internet. If the page is not in the cache, the
proxy server, acting as a client on behalf of the user, uses one of its own IP
addresses to request the page from the server on the Internet. When the page
is returned, the proxy server relates it to the original request and forwards it
to the user.
eTrust SCM acts as a Proxy Server, though it does not have its own cache.
RBL
Real-Time Black-Hole List. The RBL, is a list of TCP/IP addresses that have
sent spam. The RBL bans email sent from a range of TCP/IP addresses.
Relay Server
A relay server uses SMTP to send email messages between mail servers. The
messages can then be retrieved with an email client using POP or IMAP from
the mail management server such as Exchange Mail Server or Lotus Mail
Server.
Router
A router is a hardware item that transfers packets from one network to
another. Every packet has a destination address stored in a header, and the
router filters packets according to the destination address.
SMB
Small to Medium-sized business.
178 Implementation Guide
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
Subnet Mask
The subnet mask is the part of the IP address that distinguishes other
computers on the same LAN from computers in other departments or outside
of the organization. The subnet mask for your computer network is in the
Network Protocols window under TCP/IP protocol properties.
TCP
Transmission Control Protocol (TCP) works with Internet Protocol (IP) to send
data in the form of message units between computers over the Internet. While
IP handles the delivery of the data, TCP keeps track of the individual units of
data (called packets) that a message is divided into for efficient routing
through the Internet.
URL
A uniform resource locator (URL) is the address of a file (resource) accessible
on the Internet. The type of resource depends on the Internet application
protocol. The URL contains the name of the protocol required to access the
resource, a domain name that identifies a specific computer on the Internet,
and a hierarchical description of a file location on the computer.
ZIP
ZIP is probably the most common archive format for distributing and storing
files. One or more files may be archived in a ZIP file and compressed to save
space and download time. After downloading or receiving a zip file, you can
extract and uncompress the original files.
Glossary 179
Index
A
ADCP • 175
ADCP Authentication • 143
ADCP DSA • 144
ADCP RAS/RRAS Universal Source Agent • 144
ADCP USA • 144
Adding DistClient.exe As a Logoff Script • 157
Adding DistClient.exe As a Logon Script • 155
ADS • 175
Antivirus Protection • 9
Antivirus Settings • 84
Applet • 175
Application • 175
Assessing Your Security Level • 17
Assign User Permission Levels • 102
Authentication Method Considerations • 30
C
Chaining Proxy Servers • 26
Change the Port in Exchange 2000 • 115
Change the Port in Lotus Domino • 119
Change the Port in the Exchange 5.5 Services
File • 115
Change User Permission Levels • 103
Checking and Adjusting Manager Console
Settings • 78
Choose a Language, Read the Terms and
Conditions, and Provide User, Drive, and
Location Information • 48
Compatibility • 33
Complete Content Management • 11
Complete the Installation • 68
Completing the Pre-installation Checklist • 37
Comprehensive Protection • 8
Comprehensive Reporting • 10
Configuring a Browser for Manual Proxy • 123
Configuring a Windows NT Domain Controller
to Catch Events • 150
Configuring eTrust Embedded IAM • 96
Configuring eTrust SCM to Use an ADCP Agent
• 151
Configuring eTrust SCM With Your Email Server
• 106
Configuring Initial Filtering Settings • 78
Configuring the ADCP Agent • 149
Configuring the Browser Proxy • 122
Configuring Your Browser for Proxy Automatic
Configuration (PAC) • 127
Configuring Your Browser for Web Proxy
Automatic Discovery (WPAD) • 130
Configuring Your Implementation • 75
Content Filtering and Network Load • 30
Correct an Incomplete DNS Configuration •
137
Create the Embedded IAM Database • 98
Creating an SQL User and Associating It with
the Databases • 170
Creating the Quarantine and Reports
Databases • 164
D
Data Confidentiality Monitoring • 9
Define Users in the Embedded IAM Database •
100
Determine an Installation Scenario • 39
Distinctive Features and Functionality • 8
DMZ • 175
DNS • 175
DNS Considerations • 25
Domain Route List • 20
Downloadable • 175
E
Easy Administration • 10
EIAM • 175
Email and Email Server Considerations • 18
Email Anti-Spam and Content Security Filtering
•8
Email Content Management • 11
Email Delivery • 18, 21
Email Notification • 57
Email Traffic Direction Rules • 20
Enterprise Installation Scenario • 40
Enterprise LDAP Advanced Settings • 94
Enterprise LDAP Dictionary Settings • 92
Enterprise LDAP General Settings • 89
Enterprise LDAP Settings • 89
Enterprise Settings • 87
Establishing an Incident Response Plan • 17
Index 181
Establishing Security Guidelines • 15
eTrust Embedded IAM Server • 67
eTrust InoculateIT or eTrust Antivirus Conflicts
with Antivirus Realtime Scanner • 141
eTrust SCM and Users on Different Domains •
34
Executable • 176
Extensive Automated Actions and Alerts • 11
Extranet • 176
F
Firewall • 176
Firewall Considerations • 26
Forward Email in Exchange 2000 • 109, 117
Forward Email in Exchange 5.5 • 108, 114
Forward Email in Lotus Domino • 111, 120
FTP • 176
Fully Qualified Domain • 62
Installing on the Internet Side • 28
Installing on the Intranet Side • 27
Installing on the Mail Server Computer • 113
Installing the ADCP Agent • 145
Installing the ADCP Distributed Source Client •
158
Internet • 177
Intranet • 177
Introduction • 7
IP Address • 177
ISA • 177
K
Known Upgrade Issues • 43
L
Gateway • 176
Gateway Settings • 79
LDAP • 177
LDAP Server Settings • 82
LDAP Settings • 81
Licensing and Registering eTrust SCM • 69
Local Settings • 79
Loop-back Settings • 88
H
M
How NTLM Works • 32
How to Configure eTrust SCM on a Dedicated
Computer • 107
How to Configure eTrust SCM on Your Email
Server • 113
HTTP • 176
HTTP / SMTP Server Ports • 56
HTTP Engine Settings • 79
HTTPS • 176
Hub • 176
Mail Exchange (MX) Record • 177
Maintain the Embedded IAM Database • 104
Malicious Mobile Code Defense • 10
Manager Console or Quarantine Manager
Terminates Suddenly • 140
Managing Roles Using eTrust Embedded
Identity and Access Management • 98
Message digest algorithm • 177
MIME • 177
Mixed Mode Domains • 33
Multiple Email Recipients • 24
G
I
If There is a Problem with the ADCP Agent
Installation • 153
Implementation Modes • 133
Implementation Planning • 15
Install eTrust SCM • 121
Installation on a Dedicated Computer • 106
Installation Steps • 45
Installing and Configuring Microsoft SQL Server
• 163
Installing eTrust SCM • 45
Installing eTrust SCM on a Dedicated Computer
• 107
Installing Individual Components Only • 74
182 Implementation Guide
N
Network Considerations • 29
NIC • 177
NTLM • 178
NTLM Authentication Across a Firewall • 35
NTLM Basics • 31
NTLM Considerations and Recommendations •
33
O
Option 1 - The SMB Scenario • 53
Option 2 - Enterprise Scenario • 53
Outgoing SMTP Rules Are Also Applied to
Incoming Emails • 142
P
PAC Files Examples • 130
Performing NTLM Authentication Across a
Firewall Through SCM • 35
Phase 1 - Alert Mode • 133
Phase 2 - Notification Mode • 134
Phase 3 - User Self Management Mode • 134
Phase 4 - Blocking Mode • 135
Phishing and Spyware Prevention • 9
POP3 • 178
PPTP • 178
Pre-installation Checklist • 39
Prerequisites • 163
Prevent Loop-back Problems • 139
Proxy Server • 178
Proxy Settings • 80
R
RBL • 178
Real-time User Self-Management • 10
Reconfiguring the TCP Port for an ADCP Agent
• 150
Related Documentation • 14
Relay Control and Open Relay Prevention • 22
Relay Server • 178
Remove All Permission Levels From a User •
103
Retry or Return to Sender • 22
Router • 178
S
T
TCP • 179
Testing LDAP Settings • 82, 96
Testing the Installation • 73
The ADCP Agent • 144
The ADCP Distributed Source Client • 153
The Manager Console • 75
The Purpose of This Guide • 13
Traffic Direction Classification • 63
Troubleshooting the eTrust SCM Installation •
137
U
Unblock a Website • 142
Upgrading from a Previous Release • 42
Upstream Web Proxy • 33
URL • 179
URL Filtering Settings • 86
Using MX Records for Fail-Over and Load
Balancing • 19
Using MX Records with Multiple Computers •
19
V
Verify Firewall Ports Are Open • 140
W
Web Considerations • 24
Web Content Management • 13
Web Content Security and URL Filtering • 8
Z
ZIP • 179
Security Considerations • 15
Select Database • 64
Set Connectors in Exchange • 110, 118
Setting Global Users and Global Group Settings
• 97
SMB • 178
SMB Installation Scenario • 39
SMTP • 179
SMTP Relay Configuration • 58
SNMP • 179
Spam Rules Settings • 85
Starting the Embedded IAM Utility • 97
Starting the Manager Console • 77
Subnet Mask • 179
Subscription Settings • 83
Index 183