mcafeesecurityforlotusdomino,v7.5 (windows) userguide · pdf filedomino...

150
McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Upload: vanminh

Post on 14-Feb-2018

228 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

McAfee Security for Lotus Domino, v7.5(Windows)User Guide

Page 2: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

COPYRIGHT

Copyright © 2009 McAfee, Inc. All Rights Reserved.

No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any formor by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.

TRADEMARK ATTRIBUTIONS

AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCEEXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN,WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red inconnection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole propertyof their respective owners.

LICENSE INFORMATION

License Agreement

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED,WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICHTYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTSTHAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET,A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOUDO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURNTHE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.

License Attributions

Refer to the product Release Notes.

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide2

Page 3: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

ContentsIntroducing McAfee Security for Lotus Domino 7.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

How McAfee Security for Lotus Domino works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

How McAfee Security protects Lotus Domino. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Features of McAfee Security for Lotus Domino. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Other areas to protect. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Content management concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Threats to your organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Policies to handle threats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Installing McAfee Security for Lotus Domino. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16

Methods of Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

What's Included with the Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

System Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Components installed by McAfee Security for Lotus Domino. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Installing McAfee Security for Lotus Domino. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Standard Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Silent Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Upgrading to McAfee Security for Lotus Domino. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Accessing the McAfee Security for Lotus Domino user interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Protecting the Domino server partitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Protecting the Domino server partitions using Protection Manager. . . . . . . . . . . . . . . . . . . . . . . . . . 32

Protecting the Domino server partitions using Referenced method. . . . . . . . . . . . . . . . . . . . . . . . . . 33

Testing your McAfee Security for Lotus Domino installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Testing the anti-virus component. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Testing the anti-spam component. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Activation tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Activating McAfee Security for Lotus Domino (Evaluation version). . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Activating McAfee Anti-Spam Add-on component (Evaluation version). . . . . . . . . . . . . . . . . . . . . . . 36

Post-installation tasks and maintenance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Modifying the McAfee Security for Lotus Domino installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Repairing the McAfee Security for Lotus Domino installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Restoring original out-of-box configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

3McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 4: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Uninstalling McAfee Security for Lotus Domino. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Uninstalling the McAfee Anti-Spam add-on component. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Uninstalling McAfee Security for Lotus Domino. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Using the McAfee Security for Lotus Domino user interface. . . . . . . . . . . . . . . . . . . . . . . . .41

Dashboards and how they work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Statistical information of detected items. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

On-Demand scan and its views. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Status Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Configuration Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Graphical Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Detected Items. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

What are the detected items?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Viewing detected items. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

Search filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

View results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Policy Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Inheritance and advanced views. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

Subpolicies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

Setting policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

Core scanners and filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Alert settings and disclaimer text. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

Creating a new alert. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Quarantine scanning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

Shared Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

Settings and Diagnostics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Server Specific Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Detected Items settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

User Interface Preferences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Diagnostics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Product Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

Import and Export Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

Site List Editor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

Integrating with ePolicy Orchestrator 3.6.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95

Prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

Installing McAfee Security for Lotus Domino using ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

Creating a new site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

Adding a computer to the site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide4

Contents

Page 5: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Adding Package files to the Repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Adding Software NAP file to the Repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Adding Reports NAP file to the Repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Deploying McAfee Security for Lotus Domino. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

Activation task using ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

Installing the activation package on client computers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

Setting policies within ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

Creating or editing policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

Enforcing policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

Scheduling tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

Creating an AutoUpdate task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

Creating an on-demand scan task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Creating a server protection task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Creating a compaction task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

Creating a purge task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

Creating a status report task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Creating a configuration report task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Configuring reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Uninstallation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Removing McAfee Security for Lotus Domino from the client computer. . . . . . . . . . . . . . . . . . . . . . 106

Removing McAfee Security for Lotus Domino from ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . 106

Integrating with ePolicy Orchestrator 4.0. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108

Prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

Installing McAfee Security for Lotus Domino using ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

Activation task using ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

Installing the activation package on client computers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

Sending an agent wake-up call. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

Setting policies within ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

Creating or editing policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

Enforcing policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

Scheduling tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Creating an AutoUpdate task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Creating an on-demand scan task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

Creating a server protection task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

Creating a compaction task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

Creating a purge task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

Creating a status report task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

5McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Contents

Page 6: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Creating a configuration report task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

Configuring reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

Uninstallation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

Removing McAfee Security for Lotus Domino from the client computer. . . . . . . . . . . . . . . . . . . . . . 118

Removing McAfee Security for Lotus Domino from ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . 119

Integrating with ePolicy Orchestrator 4.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120

Prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

Installing McAfee Security for Lotus Domino using ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

Activation task using ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122

Installing the activation package on client computers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122

Sending an agent wake-up call. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

Setting policies within ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

Creating or editing policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

Enforcing policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

Scheduling tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Creating an AutoUpdate task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Creating an on-demand scan task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126

Creating a server protection task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126

Creating a compaction task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

Creating a purge task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

Creating a status report task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

Creating a configuration report task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

Configuring reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

Uninstallation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

Removing McAfee Security for Lotus Domino from the client computer. . . . . . . . . . . . . . . . . . . . . . 130

Removing McAfee Security for Lotus Domino from ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . 131

Appendix A — Using file filtering rule and actions in a real-time scenario. . . . . . . .132

Appendix B — Error codes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137

Frequently Asked Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide6

Contents

Page 7: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

IntroducingMcAfee Security for Lotus Domino7.5

McAfee® Security for Lotus Domino 7.5 uses advanced heuristics and protects your IBM LotusDomino email server version 7.x/8.0/8.01/8.02/8.5 from viruses, unwanted content, potentiallyunwanted programs, and banned file types/messages. It also scans:

• Subject line and body of the email messages

• Email attachments (based on file type, file name, and file size)

• Text within the email attachments

Additionally, McAfee Security for Lotus Domino includes the McAfee Anti-Spam add-on componentthat protects your Lotus Domino server from spam and phishing emails.

Contents

How McAfee Security for Lotus Domino works

How McAfee Security protects Lotus Domino

Features of McAfee Security for Lotus Domino

Other areas to protect

Content management concepts

How McAfee Security for Lotus Domino worksThe McAfee Security for Lotus Domino software integrates with your Lotus Domino server 8.5and works in real-time to detect and delete virus or other harmful/unwanted code. It also helpsyou maintain a virus-free environment by scanning the databases on your Lotus Domino server.Each time, an email message is sent to or received from a source, McAfee Security for LotusDomino scans the email message comparing it with a list of known viruses and suspectedvirus-like behavior and intercepts/cleans the infected file before it spreads. It can also scancontent within the email message (and its attachments) using rules and policies defined in thesoftware.

The anti-spam, anti-virus, and the content management engines scan the email messages andprovide the result to McAfee Security for Lotus Domino 7.5 before being written to the filesystem or read by the Lotus Domino users.

The anti-virus and the anti-spam scanning engines compare the email message with all theknown signatures stored in the currently installed virus definition files (DATs) and anti-spamrules. The anti-virus engine also checks the message using selected heuristic detection methods.

The content management engine scans the email message for banned content as specified inthe content management policies running within the software. If there are no viruses,banned/unwanted content in the email message, McAfee Security for Lotus Domino passes the

7McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 8: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

information back to IBM Lotus Domino 8.5. In case of a detection, McAfee Security for LotusDomino takes actions as defined within its configuration settings.

How scanning works

Central to your McAfee Security for Lotus Domino 7.5 software are the McAfee® Securityscanning engine and the DAT files. The engine is a complex data analyzer. The DAT files containa great deal of information including thousands of different drivers; each of which containsdetailed instructions on how to identify a virus or a type of virus.

The scanning engine works with the DAT files. It identifies the type of the item being scannedand decodes the content of that object to understand what the item is. It then uses theinformation in the DAT files to search and locate known viruses. Each virus has a distinctivesignature. There is a sequence of characters unique to a virus and the engine searches for thatsignature. The engine uses a technique called heuristic analysis to search for unknown viruses.This involves analyzing the object's program code and searching for distinctive features typicallyfound in viruses.

Once the engine has confirmed the identity of a virus, it cleans the object to the extent possible.For example, it removes an infected macro from an attachment or deletes the virus code in anexecutable file.

What and when to scan?

The threat from viruses can come from many directions such as infected macros, shared programfiles, files shared across a network, email messages and attachments, floppy disks, filesdownloaded from the Internet, and so on. Individual McAfee Security anti-virus software productstarget specific areas of vulnerability. We recommend a multi-tiered approach to provide fullrange of virus detection, security, and cleaning capability that you require.

McAfee Security for Lotus Domino provides a range of options that you can further configureaccording to the demands of your system. These demands depend on when and how thecomponent parts of your system operate and how they interact with each other and with theoutside world, particularly through emails and Internet access.

You can configure or enable various actions that allow you to determine how your McAfeeSecurity for Lotus Domino software should deal with different items and what actions it shouldtake on detected or suspicious items.

How McAfee Security protects Lotus DominoIBM Lotus Domino enables your organization to communicate electronically through emails,organize and manage information, arrange meetings, and enable collaboration among teammembers. However, any system that is designed to create, transmit, store, and open emailmessages can be vulnerable to virus attacks. This is true if the email message originates froma network outside the organization.

Protecting IBM Lotus Domino server

McAfee Security for Lotus Domino uses the virus scanning interface of your Lotus Domino serverto gain full access to all email messages that are being read from, and written to the mailboxby Lotus Domino. The anti-virus scanning engine compares the email message with all theknown virus signatures stored in the DATs. The content management engine scans the emailmessage for banned content as specified in the content management policies in McAfee Securityfor Lotus Domino.

Introducing McAfee Security for Lotus Domino 7.5How McAfee Security protects Lotus Domino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide8

Page 9: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

If these checks find any virus or banned content within the email message, McAfee Securityfor Lotus Domino takes the specified action. If no items are detected, McAfee Security for LotusDomino passes the information back to the virus-scanning interface for completing the originalmessage request within Lotus Domino.

Features of McAfee Security for Lotus DominoMain features of McAfee Security for Lotus Domino include:

• Protection from virus — McAfee Security for Lotus Domino scans all email messages forviruses and protects your Lotus Domino server by intercepting/cleaning/deleting the viruses.It uses advanced heuristic methods and identifies unknown viruses or suspected virus-likeitems and blocks them.

• Protection from spam — Spam is increasingly becoming an issue within the workplace.It consumes system resources by taking up bandwidth and storage space within yourcorporate systems and distracts employees from performing their key job functions, bymaking them deal with the unwanted email message(s) within their mailboxes. McAfeeSecurity for Lotus Domino helps you save bandwidth and the storage space required by yourLotus Domino servers by assigning spam score to each email message during scanning andby taking the configured action on those messages.

• Protection from phish— McAfee Security for Lotus Domino is capable of detecting phishingemails that fraudulently tries to obtain your personal information. Typically such emailmessages may request recipients to click on a link in the email to verify or update contactdetails, credit card details, or other personal information.

• Capability to detect packers and potentially unwanted programs— McAfee Securityfor Lotus Domino is capable of detecting packers that compresses and encrypts the originalcode of an executable file. It also detects potentially unwanted programs (PUPs) that aresoftware programs written by legitimate companies to alter the security state or privacyposture of a computer.

• Content filtering — McAfee Security for Lotus Domino scans content/text in the:

• Subject line of the email message

• Body of the email message

• Email attachment

• File filtering — McAfee Security for Lotus Domino scans an email attachment dependingon the file name, file type, and the file size of the attachment. It also filters files with theencrypted, corrupted, password-protected, and digitally signed content.

• Different installation methods — McAfee Security for Lotus Domino supports standard(graphical user interface), console, and silent (command-line) installation.

• Access control mechanism— Using the access control mechanism, you can allow selectedusers to accessing the McAfee Security for Lotus Domino user interface.

• Modifying the installer settings — You can modify the installer settings by modifyingthe silent.ini plain text file.

• Integration with McAfee® ePolicy Orchestrator 3.6.1, 4.0 or 4.5 — McAfee Securityfor Lotus Domino integrates with McAfee ePolicy Orchestrator 3.6.1, 4.0 or 4.5 to provide acentralized method for rolling out, administering, and updating the McAfee Security for LotusDomino software across your Lotus Domino servers. The ability to centrally manage an

Introducing McAfee Security for Lotus Domino 7.5Features of McAfee Security for Lotus Domino

9McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 10: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

organization-wide implementation of the McAfee Security for Lotus Domino software reducesthe time required to administer and update various systems.

• Web-based user interface — McAfee Security for Lotus Domino provides a user-friendlyweb-based interface based on DHTML.

• Policy Management — The Policy Manager menu option in the product user interfacelists different policies you can set up/manage in McAfee Security for Lotus Domino. You canspecify various policies/actions that determine how different types of threats are treatedwhen detected.

• Centralized scanner, filter rules, and enhanced alert settings— Using scanners, youcan configure settings of your scanner that a policy can apply when scanning items. UsingFile Filtering rules, you can set up rules that apply to a file name, file type, and file size.You can use the alert editor to customize the text of an alert message using the Style, Font,Size, and Token menus.

• On-demand/time-based scanning and actions — McAfee Security for Lotus Dominoenables you to scan email messages at convenient times or at regular intervals. You canschedule regular scan operations when the server activities are comparatively low and/orwhen they do not interfere with your work.

• Multipurpose InternetMail Extensions (MIME) scanning— A communications standardthat enables you to transfer non-ASCII formats over protocols (such as SMTP) that supportonly 7-bit ASCII characters. McAfee Security for Lotus Domino enables you to specify howsuch MIME messages are handled.

• Quarantine Management:

• Quarantining email messages to a local database — You can specify the localdatabase to be used as a repository for quarantining infected email messages. You canalso configure maintenance settings for the local quarantine database.

• Quarantining email messages to McAfee Quarantine Manager version 6.0 —You can specify McAfee Quarantine Manager in a different server as a repository forquarantining infected email messages.

• Support for blacklisting andwhitelisting users— Global, group, and user-level blacklistand whitelist is supported through McAfee Quarantine Manager.

• Auto-update of virus definitions (V2APIDATs), extraDATs, anti-virus and anti-spamengine— McAfee Security regularly provides updated DAT files, anti-virus scanning engine,and anti-spam engine to detect and clean the latest threats.

• Support for Site List editor— Using Site List editor, you can specify a location from wherethe automatic updates must be downloaded for McAfee Security for Lotus Domino.

• Support for Protection Manager — Using Protection Manager, you can select the LotusDomino servers that you want the software to protect or unprotect.

• Detection reports — McAfee Security for Lotus Domino generates status reports andgraphical reports that enable you to view information about the detected items.

• Configuration reports — You can specify a time when your server should send theconfiguration reports to the administrator or the recipient email. The configuration reportwill have a summary of product configurations such as: server information, versioninformation, license status and type, product information, debug logging information,on-access settings, on-access policies, and gateway policies.

• Support for customized notification emails and disclaimers — You can customizethe email notification settings and disclaimers for internal and external email messages.

Introducing McAfee Security for Lotus Domino 7.5Features of McAfee Security for Lotus Domino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide10

Page 11: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Denial-of-service attacks detection — McAfee Security for Lotus Domino detectsadditional requests or attacks flooding and interrupting the regular traffic on a network. Adenial-of-service attack overwhelms its target with false connection requests, so that thetarget ignores legitimate requests.

Features unavailable

The McAfee Security for Lotus Domino software does not include the following features:

• Co-existence with any third party anti-virus software

Other areas to protectVirus creators are always looking for new ways of getting past your anti-virus solution. Protectingjust your corporate email systems cannot protect your system against virus because it can betransferred through the Internet, from computer to computer within your network, an infectedCD or disk, a handheld device, or any other device that can transfer files to a computer anddownload files to it. So we provide a multi-tiered approach to the detection of viruses to protectyour file servers and desktop computers.

By holding information on more than 270,700 known viruses, our McAfee anti-virus solutionsdetect and neutralize most viruses as soon as they enter your network. If a new virus attacks,the anti-virus system can use other methods to identify virus-like behavior providing anotherbarrier to the new virus attempting to attack your system.

As illustrated, McAfee Security products can protect the following key areas of your network aspart of your integrated virus defense solution:

• Internet gateway protection — McAfee Email and Web Security Appliances (formerlyknown as McAfee WebShield)

• Document repository protection — McAfee Security for Microsoft SharePoint (formerlyknown as McAfee PortalShield)

• Desktop and file server protection — McAfee VirusScan Enterprise

• Management solution — McAfee ePolicy Orchestrator

Introducing McAfee Security for Lotus Domino 7.5Other areas to protect

11McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 12: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Internet gateway protection — McAfee Email and Web Security Appliances

Today, the major source of virus threat to your corporate network is from Internet; throughemail messages or websites, which might contain potentially harmful code.

The McAfee® Email and Web Security Appliances product protects the gateway between yourinternal networks and the Internet. By scanning all inbound and outbound traffic between yournetwork and the Internet, it stops viruses and other unwanted/harmful programs from enteringyour network through the Internet.

By stopping viruses before they attack computers within your network, McAfee Email and WebSecurity Appliances prevents the damage and down-time that the attack can cause, saving yourorganization the costs associated with the down-time and lost/corrupted data.

Desktop and file server protection — McAfee VirusScan Enterprise

Not all viruses are transmitted via email messages. Many can be spread by reading from physicalmedia, such as diskettes or CDs. Others spread through network shares by copying themselvesfrom one computer to another across your network.

From the viewpoint of somebody trying to attack your corporate network, your file servers area good target. Because many other computers connect to each of your file servers, infectingthe file server is more likely to have serious consequences than infecting a single desktopcomputer.

The VirusScan products protect desktop computers and file servers within your network. As apart of your integrated response to virus threats, VirusScan can be viewed as your last line ofdefense, protecting each desktop computer and file server from viruses that might spread usingnetwork shares or physical media.

VirusScan is available in versions to protect Microsoft Windows and Unix computers, as well asall the leading wireless devices that might connect to your PCs and network.

McAfee Security for Mac (formerly known as Virex or VirusScan for Mac) protects Apple Macintoshcomputers.

Document repository protection — McAfee Security for Microsoft SharePoint

Using computers within the corporate environment has made it easy to create documents thatmight contain critical information. However, because of the ease with which documents can becreated and the multiple storage places on the network, it is often difficult to locate the requiredinformation when needed.

To address this issue, several software vendors produce portal servers to store, index, andcontrol your critical documents in a way that enables them to be easily located when needed.Because these portal servers are set up to store your critical information, it is important toprotect this information.

McAfee Security for Microsoft SharePoint is currently available to protect Microsoft SharePointPortal Server 2003, Microsoft SharePoint Portal Server 2007, Microsoft Windows SharePointServices 2.0, and Microsoft Windows SharePoint Services 3.0. McAfee Security for MicrosoftSharePoint integrates with the stores of these products to provide scanning of documents eachtime they are accessed or saved to the store.

When the server activities are comparatively low, it also scans the entire portal to verify thatno infected documents are held within the store.

Management solution — McAfee ePolicy Orchestrator

It is imperative that companies manage their anti-virus solution with tools that deliver aneffective means of keeping the anti-virus software up-to-date, manage and enforce anti-virus

Introducing McAfee Security for Lotus Domino 7.5Other areas to protect

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide12

Page 13: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

configurations across systems and servers comprehensively, are flexible to scale the solutionaccording to ever-changing business needs, and have an up-to-date visibility into the stabilityof your anti-virus solution.

Using McAfee ePolicy Orchestrator, you can update all your McAfee software solutions acrossyour network with the latest virus definition (DAT) files, anti-virus, anti-spam, and contentmanagement engines from a single node, ensuring that suitable policies are in place to dealwith any threats to your network.

Content management conceptsMcAfee Security for Lotus Domino uses the McAfee security content management engine withinits architecture.

In the electronic world of commerce, your organization is vulnerable to many threats that canaffect the reputation of an organization, employees, computers, and networks.

• The reputation of an organization can be affected by the loss of confidential information orthrough an abuse that can lead to legal action.

• Various electronic distractions and unrestricted use of email and Internet can affect theproductivity of employees.

• Viruses and other potentially unwanted software can damage computers making themunusable.

• Uncontrolled use of various types of files on your networks can cause performance problemsfor your entire organization.

Threats to your organizationDescriptionType of threat

An unguarded or ill-informed remark by an employee mightcause legal problems, unless it is covered by a disclaimer.

Reputation of a company

Unsolicited commercial email messages are the electronicequivalent of spam/junk emails. Often they contain

Spam (unsolicited email)

advertisements that are not expected by the recipients.Such emails are often sent in hundreds or thousands.Unless the recipient is already a customer or has askedfor the information, the email message is usuallyunwelcome. Other types of unsolicited email messagesinclude political messages, virus hoaxes, poetry, jokes,and chain letters.

Although it is more of a nuisance than a threat, spamcan degrade the performance of your network.

Email messages of large size or numerous attachmentscan slow the performance of email servers. The overall

Large email messages

message size and the number of email attachments thatusers can send and receive must be controlled.

Although they can be cleaned like any other virus, theycan spread rapidly and quickly degrade the performanceof your network.

Mass-mailer viruses

Disgruntled ex-employees and unscrupulous traders whoknow the email addresses of your employees can causedistress and distraction.

Email messages from undesired sources

Introducing McAfee Security for Lotus Domino 7.5Content management concepts

13McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 14: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

DescriptionType of threat

If most employees use emails that are not within theirorganization, such emails are likely to be forpersonal/non-business use.

Non-business use of email

This can happen if someone sends a message or documentthat contains details of unreleased products, a document

Loss of company-confidential information

that is marked as confidential, or a file such as a databaseof customer details.

Offensive words and phrases can appear in email messagessent, received, and in attachments. Besides causingoffense, they can even provoke legal action.

Offensive language

Video files like MPEG and audio files like MP3 are oftenintended for entertainment only and not for business use.

Transfer of "entertainment" files

Their large sizes might also slow your networkperformance. Some executables (.EXE and .COM files)might be games or illegally copied software.

Some files use huge memory and can be slow to transfer,but alternatives are often available. For example, GIF and

Inefficient file types

JPEG files are much smaller than their equivalent BMPfiles. PDF files are smaller than their equivalent PostScriptfiles.

The transfer of large files can slow the performance ofyour network. Such transfers must be limited to certaingroups of people.

Transfer of large files

A deliberate surge of large files can seriously affect theperformance of your network, making it unusable to itslegitimate users.

Denial-of-service attack

Usage of offensive and unpleasant terms must be avoided.Pornographic text

Viruses and other potentially unwanted software canquickly make computers and data unusable.

Viruses and other potentially unwanted software

This type of content cannot be scanned. Hence appropriatepolicies must be specified to handle it.

Corrupt content / encrypted content

Policies to handle threatsMcAfee Security for Lotus Domino helps you control the electronic threats with special sets ofrules and settings called policies that you can create to suit your organization. You can applyan existing read-only policy (known as a Master policy) to your entire organization or createother policies based on the Master policy to suit the specific needs of any part of yourorganization.

Default policies

When first installed, McAfee Security for Lotus Domino contains the following default policies:

• External Mails

• Internal Mails

• Database

• On-Demand (Remove Viruses)

• On-Demand (Remove Banned Content)

• On-Demand (Full Scan)

Introducing McAfee Security for Lotus Domino 7.5Content management concepts

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide14

Page 15: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Quarantine Scan

You can customize these policies to handle threats to your organization precisely. To learn moreabout setting policies, see the Policy Manager section.

What is a Master Policy?

By default, McAfee Security for Lotus Domino has seven Master policies mentioned in the Defaultpolicies section. These Master policies describe how items are scanned for viruses, how filesare filtered, and various other settings in different circumstances. These policies can apply tothe whole organization.

From these policies, you can create further policies as required to apply to groups of users ordomains.

As you create further policies, each one records whether any of its current settings are inheritedfrom the Master policy. A change to the Master policy (such as an increased level of anti-virusprotection or a new file filtering rule) is instantly propagated to other policies too. The Masterpolicy also indicates how many other policies have inherited its settings.

Where does a policy apply?

The Master policy applies to all users within an organization. However, you can create furtherpolicies in case you need exceptions to the Master policy to suit any geographical areas, functions,mailboxes, domains, or departments within your organization. In McAfee Security for LotusDomino, the general term for any such part is a policy group.

Introducing McAfee Security for Lotus Domino 7.5Content management concepts

15McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 16: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Installing McAfee Security for Lotus DominoThis chapter describes the process of installing McAfee Security for Lotus Domino, version 7.5on Windows. McAfee Security for Lotus Domino can be installed either through a standardinstallation or silent installation.

Contents

Methods of Installation

What's Included with the Software

System Requirements

Installing McAfee Security for Lotus Domino

Protecting the Domino server partitions

Testing your McAfee Security for Lotus Domino installation

Activation tasks

Post-installation tasks and maintenance

Uninstalling McAfee Security for Lotus Domino

Methods of InstallationMcAfee Security for Lotus Domino can be installed using any of the following methods to protectone or more Lotus Domino servers:

• Standard (or standalone) installation — Standard installation includes installing theMcAfee Security for Lotus Domino software by running the user interface installer. Duringstandard installation, a wizard appears leading the installation process through a series ofinstructions you must follow.

• Silent installation (or command-line installation)— This method of installation involvesinstalling McAfee Security for Lotus Domino locally on a computer without the need for userintervention. It is used for automated installation purposes. In this case, you can set/modifythe installer properties either by editing the silent.ini file or by passing the properties directlyto the installer using the command line.

For modifying the installer using the silent.ini file, see the Modifying the installer settingssection.

What's Included with the SoftwareMcAfee Security for Lotus Domino has the following components in its installer:

• McAfee Security for Lotus Domino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide16

Page 17: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• McAfee Anti-Spam for Lotus Domino (Evaluation)

• Entercept support via VirusScan

During installation, the McAfee Security for Lotus Domino and the Anti-Spam add-on componentis selected by default.

What's included in the package

The folders available in the McAfee Security for Lotus Domino download package are:

• SetUp — Contains the setup.exe file which is required for the standard installation andsilent.bat batch file to execute the silent installation.

• GSDomino— Contains the installer files for the McAfee Security for Lotus Domino softwareand the silent.ini file which is required for silent installation.

• AntiSpam — Contains the AntiSpamEval.exe file which is required to install the McAfeeAnti-Spam add-on component.

• Readme — Contains the Readme.txt file.

• Manuals — Contains this PDF file.

• ePO — Contains the product deployment packages and extensions for McAfee Security forLotus Domino software that is to be used in the ePolicy Orchestrator server.

• VCReditX64— Contains the Microsoft Visual C++ 2005 Redistributable Package (x64) file,which installs runtime components of Visual C++ Libraries required to run 64-bit applicationsdeveloped with Visual C++ on a computer that does not have Visual C++ 2005 installed.This file is designed for the supported 64-bit operating system.

System RequirementsTable 1: System Requirements

RequirementsItem

Operating system • Microsoft Windows 2003 Server (32-bit/64-bit)

• Microsoft Windows 2008 Server (32-bit/64-bit)

IBM Lotus Domino version 7.x, 8.0, 8.01, 8.02, or 8.5Lotus Domino server

Intel Pentium or higher and compatibles (32-bit and 64-bit chips as appropriate)Processor

Minimum: 1 GB RAM (Recommended: 2 GB RAM)Memory

Minimum: 700 MBDisk space

Twice the available physical RAMDisk swap space

10/100/1000Mbps Ethernet cardNetwork

Web browser • Microsoft Internet Explorer 6.0, 7.0 or 8.0

• Firefox 2.0 or later

1024 x 768Display

Supported McAfee Managementsoftware (if using any)

• McAfee ePolicy Orchestrator version 3.6.1

• McAfee ePolicy Orchestrator version 4.0

• McAfee ePolicy Orchestrator version 4.5

Installing McAfee Security for Lotus DominoSystem Requirements

17McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 18: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Components installed by McAfee Security for LotusDomino

McAfee Security for Lotus Domino installs a number of components onto your Lotus Dominoserver, including databases and tasks.

NOTE: Windows services run continuously for scanning activities, PostGres SQL database, anddriver manager quarantine activities.

Add-in tasks on the Lotus Domino server

• McAfeeAddinMgr — Loads Mailbox and Database scanner

• Notes.ini entries:

• ServerTasks=McAfeeAddInMgr

• ExtMgr_Addins=McAfeeEM

NOTE: McAfeeAddinMgr task does not load when domino partition is not protected.

McAfee Security for Lotus Domino configuration files

McAfee Security for Lotus Domino applications are stored in its program directory instead ofLotus Domino program directory. Product configuration is stored in .XML files. Productconfiguration is stored in McAfeeConfig.XML and cs_rules_xx.xml (xx evaluated to letteracronym for the language used; for english — cs_rules_en.xml). The database used isMcAfeeConfig.NSF which stores these XMLs to be replicated between hosts participating inreference setup. Each time you update McAfee Security for Lotus Domino configuration, the.XML file gets updated accordingly.

NOTE: McAfeeConfig.NSF database replication updates the configuration changes on thereference servers in the McAfee Security for Lotus Domino reference setups.

McAfee Security for Lotus Domino components

• McAfee Anti-Spam for Lotus Domino (Evaluation) add-on component provides spamand phish detection capabilities.

• Entercept support via VirusScan provides buffer overflow protection through hostintrusion prevention using McAfee VirusScan v8.5i.

Additional McAfee components

• McAfee Error Reporting Service is an error reporting utility that is specifically designedto track and log failures in the McAfee software on your system. The information obtainedcan be used to analyze problems. This error reporting software monitors the McAfeeapplications on your system and prompts the user when it detects a problem. It collectsdata only from the computer on which it is installed, and its operation is controlled from thiscomputer. You can submit the data it collects to McAfee technical support to assist in theopening of a support case.

NOTE: To use the error reporting software, you must have a web browser that is JavaScript-enabled, such as Microsoft Internet Explorer 4.0 and later.

• McAfee Agent version 3.6, 4.0 or 4.5 is a component distributed with ePolicy Orchestratorthat must be installed on each system in your network that you want to manage. SuperAgentsare agents that have been enabled to distribute broadcast wakeup calls. SuperAgents can

Installing McAfee Security for Lotus DominoComponents installed by McAfee Security for Lotus Domino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide18

Page 19: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

also be used as repositories to distribute products and product updates. The agent collectsand sends information among the server, update repositories, managed systems, andproducts. Systems cannot be managed without installing agent.

Installing McAfee Security for Lotus DominoYou can install McAfee Security for Lotus Domino using any of the following methods:

Tasks

Standard Installation

Silent Installation

Standard InstallationStandard installation includes installing the McAfee Security for Lotus Domino software byrunning the user interface installer. During standard installation, a wizard appears leading theinstallation process through a series of instructions you must follow.

Task

1 Using an administrative account, log on to the server running Lotus Domino.

2 QUIT the Lotus Domino server.

3 Create a temporary directory on your local drive.

4 To install, do one of the following depending on how you obtained the software:

• Insert the CD into the computer's drive and copy the installation files into the temporarydirectory you created.

• Download the MSDW75ENL.ZIP (for licensed version) or MSDW75ENE.ZIP ( forevaluation version) archive and extract it to a temporary directory.

Installing McAfee Security for Lotus DominoInstalling McAfee Security for Lotus Domino

19McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 20: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

5 Using Windows Explorer, navigate to the folder where you copied the installation files andfrom the Setup folder, double-click setup.exe. The Welcome to McAfee Security forLotus Domino installation dialog box appears.

Figure 1: McAfee Security for Lotus Domino — Welcome

6 Click Next. The Component selection dialog box appears, with the list of softwarecomponents you can install.

Figure 2: McAfee Security for Lotus Domino — Component selection

• McAfee Security for Lotus Domino— Installs the McAfee Security for Lotus Domino,version 7.5 software.

Installing McAfee Security for Lotus DominoInstalling McAfee Security for Lotus Domino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide20

Page 21: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• McAfee Anti-Spam for Lotus Domino (Evaluation)— Installs the evaluation versionof anti-spam add-on component for McAfee Security for Lotus Domino, v7.5 software.The Anti-spam and Antiphish feature is only available if you install McAfee Anti-Spamfor Lotus Domino during installation. McAfee Anti-Spam for Lotus Domino add-on requiresactivation to enable it to work in licensed mode.

• Entercept support via VirusScan — Provides buffer overflow protection throughhost intrusion prevention using McAfee VirusScan.

7 Select the software component you want to install and click Next. The McAfee End UserLicense Agreement dialog box appears.

Figure 3: McAfee Security for Lotus Domino — McAfee End User License Agreement

8 Select the License expiry type and Select location where purchased and used fromthe drop-down list.

Installing McAfee Security for Lotus DominoInstalling McAfee Security for Lotus Domino

21McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 22: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

9 Select I accept the terms in the license agreement, then click OK. TheWelcome toMcAfee Security for Lotus Domino Installation Wizard dialog box appears.

Figure 4: McAfee Security for Lotus Domino — Welcome to McAfee Security for LotusDomino Installation Wizard

10 Click Next. The Destination Folder dialog box appears.

Figure 5: McAfee Security for Lotus Domino — Destination Folder

Installing McAfee Security for Lotus DominoInstalling McAfee Security for Lotus Domino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide22

Page 23: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

11 Click Browse to select a different folder or click Next to install the software in the defaultdirectory. The Select Features dialog box appears.

Figure 6: McAfee Security for Lotus Domino — Select Features

• Server — Installs McAfee Security for Lotus Domino server components. Thesecomponents consists of framework libraries and server side functionalities.

• UI — Installs user interface related files.

• Standalone UI — Installs McAfee Security for Lotus Domino in a standalone modeon the host computer. This feature is selected by default.

• Web UI — Installs McAfee Security for Lotus Domino Web user interface feature.Select this feature, if you want to administer McAfee Security for Lotus Domino usinga web browser. This feature is not installed by default.

NOTE: Click Disk Cost to view the available disk space on different volumes of yourcomputer to install the selected features. Volumes that do not have adequate disk spaceare highlighted.

Installing McAfee Security for Lotus DominoInstalling McAfee Security for Lotus Domino

23McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 24: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

12 Select WebUI, if you want to manage McAfee Security for Lotus Domino using a webbrowser and click Next. The WebUI Configuration feature dialog box appears.

Figure 7: McAfee Security for Lotus Domino — WebUI Configuration feature

13 Select On IIS Server or On Domino HTTP to configure WebUI feature.

NOTE: You need to specify the domino partition if you select On Domino HTTP option.Domino HTTP task must be running, for you to administer McAfee Security for Lotus Dominousing a web browser.

Installing McAfee Security for Lotus DominoInstalling McAfee Security for Lotus Domino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide24

Page 25: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

14 Click Next. The Ready to Install the Application dialog box appears.

Figure 8: McAfee Security for Lotus Domino — Ready to Install the Application

15 Click Next. The Updating System dialog box appears, displaying a progress bar indicatingthe features being copied, initialized, and installed.

Figure 9: McAfee Security for Lotus Domino — Updating System

Installing McAfee Security for Lotus DominoInstalling McAfee Security for Lotus Domino

25McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 26: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

16 Click Finish to complete the McAfee Security for Lotus Domino installation process.

Figure 10: McAfee Security for Lotus Domino — Finish

NOTE: If you have selectedMcAfee Anti-Spam for Lotus Domino (Evaluation) in theComponent selection dialog box, the McAfee Add On Package installation wizarddialog box appears. Follow the on-screen instructions to complete the installation. SeeInstalling the evaluation version of the Anti-Spam add-on component section.

17 Select the required option(s), then click Finish.

Figure 11: McAfee Security for Lotus Domino — Installation complete

Installing McAfee Security for Lotus DominoInstalling McAfee Security for Lotus Domino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide26

Page 27: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

You can select:

• View ReadMe — To view the Readme.txt file.

• Update Product (DAT/Engine/Anti-Spam RENU) — To update the software withthe latest DATs, engine, and anti-spam updates.

• Launch Product Configuration UI— To launch the McAfee Security for Lotus Dominouser interface. This option is deselected by default.

• Launch Protection Manager — To launch the Protection Manager application toprotect the Domino server partition(s).

18 After installing the software, you must protect your Domino servers using ProtectionManager. See Protecting the Domino server partitions using Protection Manager section.

Upon successful installation, the following are available from the Start | Programs |McAfee | Security for Lotus Domino menu:

• Access Control Manager — to allow or deny access to the McAfee Security for LotusDomino user interface for specific users or groups.

• Product Configuration — to start the McAfee Security for Lotus Domino software.

• Protection Manager — to protect or unprotect your Domino server partition(s).

• Product Configuration (Web) — to manage McAfee Security for Lotus Dominosoftware using a web browser.

NOTE: To convert the evaluation version of McAfee Security for Lotus Domino to licensedversion, see Activating McAfee Security for Lotus Domino (Evaluation version) section.

19 Start the Lotus Domino server.

Installing the evaluation version of the Anti-Spam add-on componentSpam and Phish protection is only available if you install McAfee Anti-Spam for Lotus Dominocomponent during installation. McAfee Anti-Spam for Lotus Domino add-on requires activationto enable it to work in licensed mode. Use this task if you want to install the McAfee Anti-Spamfor Lotus Domino component separately.

Task

1 Using an administrative account, log on to the server running Lotus Domino.

2 QUIT the Lotus Domino server.

Installing McAfee Security for Lotus DominoInstalling McAfee Security for Lotus Domino

27McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 28: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

3 From the AntiSpam directory, double-click AntiSpamEval.exe. The Welcome to theMcAfee Add On Package installationwizard for McAfee Security for Lotus Dominodialog box appears.

Figure 12: McAfee Security for Lotus Domino — Welcome

4 Click Next in the Introduction window. The License Agreement window appears.

Figure 13: McAfee Security for Lotus Domino — McAfee End User License Agreement

Installing McAfee Security for Lotus DominoInstalling McAfee Security for Lotus Domino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide28

Page 29: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

5 Select I accept the terms in the license agreement, then Select location wherepurchased and used from the drop-down list and click OK.

6 When the installation completes, click Finish on the Install Complete window.

7 Start the Lotus Domino server.

To convert the evaluation version of the McAfee Anti-Spam add-on component to licensedversion, see Activating McAfee Anti-Spam Add-on component (Evaluation version) section.

Silent InstallationSilent installation (or command-line installation) involves installing McAfee Security for LotusDomino locally on a computer without the need for user intervention.

The McAfee Security for Lotus Domino installation is performed by MSI. You can set the propertiesused by the MSI, either by editing the silent.ini file or by passing the properties directly to theMSI via the command line.

To perform a silent installation, you need to define these properties. We recommend that youdo this by editing the silent.ini file which is provided with the McAfee Security for Lotus Dominoinstallation files.

Silent installation allows you to choose the most convenient time to install McAfee Security forLotus Domino on Microsoft Windows. Another advantage to a silent installation is that it requireslittle involvement, compared to a standard installation.

Before silent installation ensure that the Windows Net Logon Service is running on the Windowsserver using domain controllers.

NOTE: Silent install using CUSTOM_FILE=silent.ini option is supported. You cannot usesilent installation to add or remove components or partitions, nor to do a repair.

Task

1 Using an administrative account, log on to the server running Lotus Domino.

2 QUIT the Lotus Domino server.

3 Create a temporary directory on your local drive.

4 To install, do one of the following depending on how you obtained the software:

• Insert the CD into the computer's drive and copy the installation files into the temporarydirectory you created.

• Download the MSDW75ENL.ZIP (for licensed version) or MSDW75ENE.ZIP ( forevaluation version) archive and extract the file to the temporary directory.

NOTE: Run silent.bat, if you want to install all McAfee Security for Lotus Dominocomponents by default. To customize silent installation, modify silent.bat and silent.ini.These files contain detailed instructions on how to customize silent installation parameters.

5 From the command prompt, make sure that:

• The MSDW.MSI file is located in the temporary folder.

• All necessary parameters have been configured within the silent.ini file.

6 Type msiexec /qb /i <Path> and press Enter.

NOTE: For example if the Temporary Directory = C:\MSDW75, then the command is:msiexec /qb /i C:\MSDW75\MSDW.MSI

Installing McAfee Security for Lotus DominoInstalling McAfee Security for Lotus Domino

29McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 30: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

7 After installing the software, you must protect your Domino servers using ProtectionManager. See Protecting the Domino server partitions using Protection Manager section.

Upon successful installation, the following are available from the Start | Programs |McAfee | Security for Lotus Domino menu:

• Access Control Manager — to allow or deny access to the McAfee Security for LotusDomino user interface for specific users or groups.

• Product Configuration — to start the McAfee Security for Lotus Domino software.

• Protection Manager — to protect or unprotect your Domino server partition(s).

• Product Configuration (Web) — to manage McAfee Security for Lotus Dominosoftware using a web browser.

NOTE: To convert the evaluation version of McAfee Security for Lotus Domino to licensedversion, see Activating McAfee Security for Lotus Domino (Evaluation version) section.

8 Start the Lotus Domino server.

Upgrading to McAfee Security for Lotus DominoMcAfee Security for Lotus Domino, v7.5 on Windows supports upgrading your configurationsettings from the following product(s):

• McAfee GroupShield 7.0 Patch 1 for Lotus Domino

• McAfee GroupShield 7.0 Patch 2 for Lotus Domino

McAfee Security for Lotus Domino is policy based and stores all its configuration settings in theMcAfeeConfig.XML and CS_RULES_XX.XML (XX is for the various supported languages),hence GroupShield 7.x settings are upgraded as new child policies of the default Master policiesthat are shipped by default with McAfee Security for Lotus Domino, v7.5 software.

Task

1 During installation, McAfee Security for Lotus Domino detects the McAfee GroupShield 7.0Patch 1/Patch 2 for Lotus Domino on your computer and automatically installs McAfeeSecurity for Lotus Domino, v7.5 software.

2 Follow the steps mentioned in the Standard Installation section to complete the upgradeprocess.

Accessing the McAfee Security for Lotus Domino user interfaceWhen you start your Lotus Domino server, use this sequence to start the McAfee Security forLotus Domino software.

Task

1 QUIT the Lotus Domino server.

2 Start the Protection Manager utility to secure the domino server partition, you want toprotect using the McAfee Security for Lotus Domino software.

NOTE: Once you run the Protection Manager to protect the domino server, you neednot run this utility every time you shutdown/restart the server.

3 Start the Lotus Domino server.

Installing McAfee Security for Lotus DominoInstalling McAfee Security for Lotus Domino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide30

Page 31: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

4 From the Startmenu, click Programs |McAfee | Security for Lotus Domino | ProductConfiguration. The McAfee Security for Lotus Domino window appears.

NOTE: You can also access the user interface by double-clicking the McAfee Security forLotus Domino - Product Configuration icon on the desktop.

Using the Access Control ManagerYou can use Access Control Manager to allow or deny access to the McAfee Security forLotus Domino user interface for specific users or groups.

Task

1 From the Startmenu, click Programs |McAfee | Security for Lotus Domino | AccessControl Manager. The Permissions for access window appears.

Figure 14: McAfee Access Control Manager

2 From Group or user names, select the user you want to allow or deny access to theMcAfee Security for Lotus Domino user interface.

3 Click OK.

Protecting the Domino server partitionsThe Protection Manager helps you protect or unprotect your Domino server(s). It enablesyou to select the Domino server(s) that you want the software to protect. You can install McAfeeSecurity for Lotus Domino in a standalone or reference configuration and use a partition serverin either scenario.

Installing McAfee Security for Lotus DominoProtecting the Domino server partitions

31McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 32: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Tasks

Protecting the Domino server partitions using Protection Manager

Protecting the Domino server partitions using Referenced method

Protecting the Domino server partitions using ProtectionManager

The Protection Manager helps you protect or unprotect your Domino server(s). It enablesyou to select the servers that you want the software to protect. You can install McAfee Securityfor Lotus Domino in a standalone or reference configuration, and you can use a partition serverin either scenario.

Before you begin

Shut down all Lotus Domino server(s), before performing the protect/unprotect task usingProtectionManager. McAfee Security for Lotus Domino scans email messages only on partitionsthat are protected.

Task

1 From the Start menu, click Programs | McAfee | Security for Lotus Domino |Protection Manager. The McAfee Protection Manager window appears.

NOTE: You can also access Protection Manager by double-clicking theMcAfee ProtectionManager icon on the desktop.

2 Click Standalone in Configuration Type.

Installing McAfee Security for Lotus DominoProtecting the Domino server partitions

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide32

Page 33: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

3 Select the Lotus Domino server under Data Directory and click Protect. The Summarydialog box appears.

4 Click Yes to continue.

NOTE: The Protection status changes to Protected against the partition(s).

Click ... under Signing ID to change the signing ID location of the server.id file.

5 Start the Lotus Domino server.

Protecting the Domino server partitions using Referencedmethod

You can use the Referenced method to protect Domino server(s) on a computer while sharingconfiguration with another computer. One of the Domino servers on the computer is configuredas Local server and exchanges configuration with another Domino server (secondary server)on a different computer. The secondary Domino server can be referenced using the primaryDomino server’s IP address or fully qualified domain name.

This method allows you to have common anti-virus settings across multiple sites/servers byreplicating the settings of one server.

All partition servers on a host are managed by single instance of McAfee Security for LotusDomino, which is installed on the host. With the ProtectionManager utility, one host referencesanother host for configuration details.

Installing McAfee Security for Lotus DominoProtecting the Domino server partitions

33McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 34: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Before you begin

Configure your primary server and secondary server by following the instructions provided inthe Standard installation section.

Task

1 From the secondary server, click the Startmenu and go to Programs |McAfee | Securityfor Lotus Domino | Protection Manager. The McAfee Protection Manager windowappears.

NOTE: You can also access Protection Manager by double-clicking theMcAfee ProtectionManager icon on the desktop.

2 From Configuration Type, select Referenced, then click Add. The Referenced Settingsdialog box appears.

3 Type the IP address/hostname of the primary server under Referenced.

4 Select the local server from the Local drop-down list, then click Apply.

5 If prompted, type the password of the secondary server, then click OK.

6 Click Protect. A summary window appears with the configuration details.

7 Click Yes to continue. The Protection status changes to Protected against the partition.

Testing your McAfee Security for Lotus Dominoinstallation

When you have completed installing the McAfee Security for Lotus Domino software, werecommend that you test the installation to ensure that the software is installed properly andcan detect viruses and spam within the email messages.

Testing the anti-virus component

Testing the anti-spam component

Testing the anti-virus componentThe recommended method to test an anti-virus product is to attach an EICAR anti-virus testfile to an email message, and to send the message through the Lotus Domino server whereyou’ve just installed McAfee Security for Lotus Domino.

The EICAR standard anti-virus test file was created jointly by several anti-virus vendorsthroughout the world to implement a standard by which customers can verify their anti-virusinstallations.

NOTE: This file is not a virus. Ensure that you delete the file when you have finished testingyour installation to avoid alarming unsuspecting users.

Task

1 Start the Lotus Domino server.

2 Copy the following line into its own file, then save the file with the name EICAR.COM:X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

The file size will be 68 or 70 bytes.

Installing McAfee Security for Lotus DominoTesting your McAfee Security for Lotus Domino installation

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide34

Page 35: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

3 Send an email message through the Lotus Domino server with the EICAR test file as anattachment. When McAfee Security for Lotus Domino on Windows examines the emailmessage, it reports finding the EICAR test file, but is unable to clean or repair the EICARfile because it is a test file.

4 McAfee Security for Lotus Domino replaces the EICAR test file with an alert message.

Testing the anti-spam componentYou can test the operation of the software by running the GTUBE (General Test mail forUnsolicited Bulk Email) test. The test email message must be sent from an external email account(a different domain).

Prerequisite:You must have the McAfee Anti-Spam add-on component installed on your computer to testthis feature.

Task

1 Start the Lotus Domino server.

2 Create a new email message.

3 In the body of the message, copy the following text:XJS*C4JDBQADN1.NSBN3*2IDNEN*GTUBE-STANDARD-ANTI-UBE-TEST-EMAIL*C.34X

Ensure that you copy this with no extra spaces or line breaks.

4 From an external email address, send the new email message to a mailbox address on theserver where you have installed the McAfee Anti-Spam Add-On component. McAfeeAnti-Spam scans the message, recognizes it as a junk email message, and takes action (asspecified in the configuration settings).

NOTE: The GTUBE test overrides blacklists and whitelists. For more information on theGTUBE test file, visit http://spamassassin.apache.org/.

Activation tasksThe activation process converts the evaluation version of the McAfee Security for Lotus Dominoor the Anti-Spam add-on component to the licensed version.

Tasks

Activating McAfee Security for Lotus Domino (Evaluation version)

Activating McAfee Anti-Spam Add-on component (Evaluation version)

ActivatingMcAfee Security for Lotus Domino (Evaluation version)Use this task to convert an evaluation version of the McAfee Security for Lotus Domino 7.5software into a licensed version.

Installing McAfee Security for Lotus DominoActivation tasks

35McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 36: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Prerequisite:

To use this activation program, you must have the McAfee Security for Lotus Domino evaluationsoftware installed on your computer.

Task

For option definitions, click ? in the interface.

1 Using an administrative account, log on to the server running Lotus Domino.

2 QUIT the Lotus Domino server.

3 Create a temporary directory on your local drive.

4 To install, do one of the following depending on how you obtained the software:

• Insert the CD into the computer's drive and copy the installation files into the temporarydirectory you created.

• Download the contents of theMSDW75ENACT.ZIP archive and extract it to a temporarydirectory.

5 Using Windows Explorer, navigate to the folder where you copied the installation files anddouble-click MSDWEvalToLic.exe. The Welcome to McAfee Activation Packageinstallation wizard for McAfee Security for Lotus Domino dialog box appears.

6 Click Next. The McAfee End User License Agreement dialog box appears.

7 Select I accept the terms in the license agreement, then click OK. The InstallationComplete Wizard dialog box appears.

8 Click Finish to close the dialog box.

9 Start the Lotus Domino server.

Activating McAfee Anti-Spam Add-on component (Evaluationversion)

Use this task to convert an evaluation version of the McAfee Anti-Spam Add-on component toa licensed version.

Prerequisite:

To use this activation program, you must have the McAfee Anti-Spam Add-on componentevaluation software installed on your computer.

Task

For option definitions, click ? in the interface.

1 Using an administrative account, log on to the server running Lotus Domino.

2 QUIT the Lotus Domino server.

3 Create a temporary directory on your local drive.

4 To install, do one of the following depending on how you obtained the software:

• Insert the CD into the computer's drive and copy the installation files into the temporarydirectory you created.

• Download the contents of the MSDW75ENASACT.ZIP archive and extract it to atemporary directory.

Installing McAfee Security for Lotus DominoActivation tasks

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide36

Page 37: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

5 Using Windows Explorer, navigate to the folder where you copied the installation files anddouble-click AntiSpamEvalToLic.exe. The Welcome to McAfee Activation Packageinstallation wizard for McAfee Security for Lotus Domino dialog box appears.

6 Click Next. The McAfee End User License Agreement dialog box appears.

7 Select I accept the terms in the license agreement, then click OK. The InstallationComplete Wizard dialog box appears.

8 Click Finish to close the dialog box.

9 Start the Lotus Domino server.

Post-installation tasks and maintenanceThe McAfee Security for Lotus Domino software provides tools to help you maintain yourinstallation.

Tasks

Modifying the McAfee Security for Lotus Domino installation

Repairing the McAfee Security for Lotus Domino installation

Restoring original out-of-box configuration

Modifying the McAfee Security for Lotus Domino installationTo modify application features installed for McAfee Security for Lotus Domino, you can use theAdd or Remove Programs feature or by running the McAfee Security for Lotus Domino setupprogram.

Task

1 Using an administrative account, log on to the server running Lotus Domino.

2 QUIT the Lotus Domino server.

3 From the Start menu, click Settings | Control Panel. The Control Panel windowappears.

4 Double-click Add or Remove Programs. The Add or Remove Programs windowappears.

5 Select McAfee Security for Lotus Domino and click Change. The ApplicationMaintenance dialog box appears.

6 Select Modify and click Next. The Select Features dialog box appears.

7 Modify the required features and click Next. The Ready to Modify the Applicationdialog box appears.

8 Click Next. The Updating System dialog box appears, displaying a progress bar indicatingthe features being copied, initialized, and installed.

9 Click Finish to close the dialog box.

10 Start the Lotus Domino server.

Installing McAfee Security for Lotus DominoPost-installation tasks and maintenance

37McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 38: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Repairing the McAfee Security for Lotus Domino installationRepairing the McAfee Security for Lotus Domino installation detects the presence of an existinginstallation, replaces all binaries and configuration file settings with the original files. However,the McAfee Security for Lotus Domino database does not change.

Prerequisite

You must have the McAfee Security for Lotus Domino server installed on your computer.

1 Using an administrative account, log on to the server running Lotus Domino.

2 QUIT the Lotus Domino server.

3 From the Start menu, click Settings | Control Panel. The Control Panel windowappears.

4 Double-click Add or Remove Programs. The Add or Remove Programs windowappears.

5 Select McAfee Security for Lotus Domino and click Change. The ApplicationMaintenance dialog box appears.

6 Select Repair and click Next. The Ready to Repair the Application dialog box appears.

7 Click Next. The Updating System dialog box appears, displaying a progress bar indicatingthe features being copied, initialized, and installed.

8 Click Finish to close the dialog box.

9 Start the Lotus Domino server.

Restoring original out-of-box configurationTo restore default settings and values of the user interface, click Settings & Diagnostics |Import and Export Configuration | Restore Default. Alternatively, you can restore McAfeeSecurity for Lotus Domino to the original out-of-box configuration by performing the followingtask:

Task

1 Stop all Domino servers and McAfee Security for Lotus Domino services on the host.

2 Copy and replace McAfeeConfig.XML from:<Install_path>\Config\Default\McAfeeConfig.XML

3 Copy and replace cs_rules_en.XML from:<Install_path>\Config\Default\<0409>\cs_rules_en.XML <for English language>

4 Start McAfee Security for Lotus Domino services on the host.

5 Start Domino servers on the host.

Uninstalling McAfee Security for Lotus DominoThis section provides instructions for uninstalling the McAfee Security for Lotus Domino softwarefrom your computer.

NOTE: During the product installation, if you had selected the complete installation type (thatinstalls the Anti-Spam add-on component along with the product), uninstalling the product alsouninstalls the Anti-Spam add-on component from your computer.

Installing McAfee Security for Lotus DominoUninstalling McAfee Security for Lotus Domino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide38

Page 39: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

If you install the Anti-Spam add-on component separately, you must uninstall it separatelybefore uninstalling McAfee Security for Lotus Domino.

Tasks

Uninstalling the McAfee Anti-Spam add-on component

Uninstalling McAfee Security for Lotus Domino

Uninstalling the McAfee Anti-Spam add-on component

Task

NOTE: This section is applicable only if you had installed the McAfee Anti-Spam add-oncomponent separately.

1 Using an administrative account, log on to the server running Lotus Domino.

2 QUIT the Lotus Domino server.

3 From the AntiSpam directory, double-click AntiSpamEval.exe. The Welcome to theMcAfee Add On Package installationwizard for McAfee Security for Lotus Dominodialog box appears.

4 Click Next. The McAfee Anti_Spam for Lotus Domino Feature is Already Installeddialog box appears.

5 Select Remove the McAfee Anti_Spam for Lotus Domino feature, then click Next.

6 Click Finish to close the dialog box.

7 Start the Lotus Domino server.

Installing McAfee Security for Lotus DominoUninstalling McAfee Security for Lotus Domino

39McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 40: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Uninstalling McAfee Security for Lotus Domino

Task

1 Using an administrative account, log on to the server running Lotus Domino.

2 QUIT the Lotus Domino server.

3 From the Start menu, click Settings | Control Panel. The Control Panel windowappears.

4 Double-click Add or Remove Programs. The Add or Remove Programs windowappears.

5 Select McAfee Security for Lotus Domino and click Remove. A confirmation dialogbox appears.

6 Click Yes to uninstall the McAfee Security for Lotus Domino software.

Installing McAfee Security for Lotus DominoUninstalling McAfee Security for Lotus Domino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide40

Page 41: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Using the McAfee Security for Lotus Dominouser interface

The user interface provides critical function for Lotus Domino administrators. It is important forthe administrators to know how well their server is being protected from spam, phish, viruses,potentially unwanted programs, and unwanted content.

Contents

Dashboards and how they work

Detected Items

Policy Manager

Settings and Diagnostics

Dashboards and how they workThe McAfee Security for Lotus Domino dashboard is your interface to the McAfee Security forLotus Domino software. It provides information about statistics, performance, installed productsincluding Engine and DAT files, name, version and patch information for the product, serverprotection status, license agreement, scanned items and most popular hoaxes.

41McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 42: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

The McAfee Security for Lotus Domino dashboard is divided into two panes:

• The left pane has links to Dashboard, Detected Items, Policy Manager and Settings& Diagnostics that you can administer.

• The right pane shows information based on the item you select in the left pane.

Contents

Statistical information of detected items

On-Demand scan and its views

Status Reports

Configuration Reports

Graphical Reports

Statistical information of detected itemsThe Statistics tab provides information on the number of spam, phish, viruses, potentiallyunwanted programs, banned file/content detections in emails and documents filtered by McAfeeSecurity for Lotus Domino.

The reported numbers indicate the number of emails and documents that is triggered by anyof the detections. For example, if an email has two viruses, statistics for viruses would beincremented by one and not two. Reporting statistics are based on email messages rather thanindividual files/detections and is more intuitive in a mail server environment.

The detected items displayed are:

• Spam

• Phish

Using the McAfee Security for Lotus Domino user interfaceDashboards and how they work

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide42

Page 43: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Viruses

• Potentially Unwanted Programs

• Banned File types/Messages

• Unwanted Content

• Clean

• Total Scanned

For more information, see the Detected items section.

Detection statistics and performance countersThe Performance tab provides information on the total emails, external emails, internal emails,emails queued for scan and so on. These performance counters are designed to help McAfeeSecurity for Lotus Domino administrators to fine tune the Domino servers for better performance.The counters in the dashboard are indicative of the email throughput.

The performance counters displayed are:

• Total mails scanned per minute

• External mails scanned per minute

• Internal mails scanned per minute

• Mails queued for scanning

• Average size of the scanned mails

• Average scan time for emails

• Database updates scanned per minute

• Average size of scanned documents

Product versions and updatesThe Versions & Updates section provides information on the product version of hotfix, patch,service pack, product description, license type and expiry date, engine version, DAT version(including regular DAT, Extra.DAT).

Update Information tab

The Update Information tab provides anti-virus DAT, anti-virus engine, extra drives, anti-spamengine version, their status and when they were last updated.

McAfee Security for Lotus Domino uses McAfee update website to automatically update itsanti-virus DAT, engine and rules on a daily basis. If McAfee Security for Lotus Domino is managedby McAfee ePolicy Orchestrator, there is no need to update the product from the dashboard.You can update the anti-virus DATs, anti-virus engine, and anti-spam engine through anAutoUpdate task using the ePolicy Orchestrator server.

To schedule an AutoUpdate:

1 Click Edit Schedule. The Edit Schedule page appears, where you set the update schedulefrequency.

Using the McAfee Security for Lotus Domino user interfaceDashboards and how they work

43McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 44: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

2 Click Show Status. The Task Status page appears, where you can view the status of aupdate task. The page displays the name of the task, when it started, time required tofinish the task, when the scheduled task was completed or if the task is in progress.

NOTE: Click Update Now to update McAfee Security for Lotus Domino to the latest DAT,engine, extra drives, and anti-spam engine version immediately.

• Anti-virus DATs, engine, and extra drivers versions are always shown in the dashboard.

• If McAfee Anti-Spam add-on component is installed, version information for anti-spam rulesand engine is displayed.

Product Information tab

The Product Information tab provides information on the product name and the productversion. It provides information on service packs or hotfixes that are installed. It also providesinformation on the presence of McAfee Anti-Spam add-on component.

NOTE: You must install McAfee Anti-Spam add-on component during installation for anti-spamand antiphish functionality.

Server Protection Status tab

The Server Protection Status tab provides information on the local or referenced serversthat are protected by the software. McAfee Security for Lotus Domino allows to turn on and offprotection for Lotus Domino servers. Mailboxes and databases of the Domino servers will bescanned only if they are protected by McAfee Security for Lotus Domino. This means that McAfeeSecurity for Lotus Domino needs to be installed on the host and Domino servers, can be protectedor unprotected later.

If your Domino server partition is protected using the reference method, one server on eachhost exchanges product configuration. The participating server on this host is referred to asLocal Server and the counterpart server on the other host is referred to as Remote Server.Ensure that both the servers are always up and running for the reference method to workproperly. Any changes to Local Server and Remote Server can be made by using theProtection Manager.

NOTE: For more information, see the Protection Manager section.

Licenses tab

The Licenses tab provides information on the type of license being used for McAfee Securityfor Lotus Domino, when it expires, and the number of days for it to expire.

NOTE: It also shows license information of the McAfee Anti-Spam add-on component if youhave installed it.

Detections reportThe Reports section provides information on the scanned items, posted virus descriptions, andthe top hoaxes.

Recently Scanned Items tab

The Recently Scanned Items tab displays information about the most recently scanned itemsby McAfee Security for Lotus Domino.

— Indicates that the item is clean.

Using the McAfee Security for Lotus Domino user interfaceDashboards and how they work

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide44

Page 45: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

— Indicates that the item triggered one of the scanners or filters.

NOTE: You can rest the cursor on to see which scanner or filter was triggered. If the itemtriggered several scanners or filters, only the highest priority detection is shown.

Recently posted virus descriptions tab

The Recently posted virus descriptions tab lists the recently posted viruses by hackers.Click Description to learn more about the virus.

Top hoaxes tab

The Top hoaxes tab provides information about the latest hoaxes. Click the link to view moreinformation about the hoaxes.

On-Demand scan and its viewsMcAfee Security for Lotus Domino can perform on-demand scanning for your server databases,so that all documents in the databases are checked for unwanted content.

Document replication conflicts can occur on cluster servers if multiple scans are run at the sametime on different servers, or a scan is run while a replication event is in progress. A workaroundfor this is to ensure that replication occurs between the server both before and after anon-demand scan has run, and that only one server is nominated to run the on-demand scansfor the clustered databases.

NOTE: To reduce the risk of replication conflicts within Lotus Domino, any on-demand scansthat are run against databases and replicated across multiple servers should be run when thedatabases have low levels of usage. We recommend that you run an on-demand scan againstone replica of the databases and then replicate the scanned databases throughout the LotusDomino system as soon as the scan has finished.

If the designer document of a database is infected and cannot be cleaned, the default form ofthe database is removed. The on-access scan (during database replication) and on-demandscan schedules cannot scan the document because it cannot be opened. This occurs if thedocument is provided with a form and then opened when scanning is not being performed. Theon-demand view in the McAfee Security for Lotus Domino configuration database lists theon-demand scan schedules that have been configured for McAfee Security for Lotus Domino.

Settings and actions can be specified in on-demand policies, which can be found under PolicyManager. There are three sets of policies which can be used for an on-demand task. These are:

• On-Demand (Remove Viruses)— Policies in this set contain anti-virus settings and filters.These policies provide an easy means to check the viral content in databases.

• On-Demand (Remove Banned Content) — Policies in this set contain content scansettings. These policies are particularly useful if you want to see the effect of newlycreated/assigned content scan rules.

• On-Demand (Full Scan) — Policies in this set contain settings for all scanners and filters.These policies will be the typically used for scanning at regular intervals.

On-Demand scan views

1 Click On-Demand Scans under Dashboard. The On-Demand Scans page appearslisting the on-demand scan task that have been configured for McAfee Security for LotusDomino.

2 Click the links under Action to perform an action for the task.

Using the McAfee Security for Lotus Domino user interfaceDashboards and how they work

45McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 46: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Columns

The On-Demand Scan view contains the following columns of information for the on-demandscan schedules:

DefinitionOption

Name of the scan task.Name

Indicates whether the scan task is running or stopped.Status

Indicates when the scan was last executed.Last Run

Indicates when the scan is next scheduled to run.Next Run

The action column contains links such asModify, Delete,Run Now, Show Status, Stop that you can perform onthe selected on-demand scan.

Action

Click Modify to edit the on-demand scan task.Modify

Deletes the selected on-demand scan task.Delete

Starts the selected on-demand scan task.Run Now

Click Show Status for a running on-demand scan. TheTask Status page appears with the General tab

Show Status

displaying the progress of the task. Click Settings orDetections tab to view more details.

Stops the selected on-demand scan task that is running.Stop

For instructions on creating an on-demand scan task, see the Creating an on-demand scan tasksection.

Creating an on-demand scan task

Task

For option definitions, click ? in the interface.

1 Click On-Demand Scans under Dashboard. The On-Demand Scans page appears.

2 Click New Scan to create a new on-demand scan task. The Enter a time for the scanto run page appears.

Select from: Not scheduled, On Startup, Once, Hours, Days, Weeks, Months. Tostop the task after a specific run time, select Stop task after it has run for <duration>hour(s) <minutes> minute(s) by specifying the hours and minutes.

3 Click Next. The Choose Inclusions page appears.

Select the folder you want to include for the scan and then click the arrow button to moveit to the Selected Folders pane. Type the server name and the folder/database in theServer name and Folder/Database name fields.

NOTE: All databases, templates and folders for all protected Domino servers on the hostare listed in a tree view in the left pane. Select the folder/database/template you want toinclude for the scan, then click the arrow button to move it to the Selected Folders pane.

>>> — Adds the folder and all its subfolders

>> — Adds the selected folder

<< — Removes the selected folder

Using the McAfee Security for Lotus Domino user interfaceDashboards and how they work

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide46

Page 47: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Alternatively, you can type the name of a server and the database to scan. This is requiredin case (protecting using a reference method) you want to scan a database on a Dominoserver on another host, which is not listed in the tree view.

4 Click Next. The Choose Exclusions page appears.

• Select the folder you want to exclude from scan then click the arrow button to move itto the Selected Folders pane. Type the server name and the folder/database in theServer name and Folder/Database name fields.

5 Click Next. the Configure Settings page appears.

• Select the Type of documents to scan, you can select Data or Design or bothdepending on what you want to scan.

• Select the policy from the type of Policy to use drop-down list.

• Select Optimized based on system configuration or Specify Value for the numberof scanner threads you want to set.

• Select Resumable Scanning, if you want to resume a scan.

NOTE: If Resumable Scanning option is selected, you can start a task at any timeand resume scanning from where it last stopped. For example, when scanning multipledatabases, if the scan stops and is resumed, it resumes scanning the database fromwhere it stopped last.

• Select Off, Scan from last scanned date or Scan from date specified <specifyday and time> for Incremental Scanning.

NOTE: Incremental scanning allows you to run scans on documents that are created ormodified on or after a particular date. This option is useful if you want to run anon-demand task only on new or modified documents. This allows you to optimizescanning resources.

• Scan from last scanned date — If this option is selected, all documents createdor modified after the last scan run, are scanned.

• Scan from last date specified — If this option is selected, all documents createdor modified after the specified date, are scanned.

• Off — All documents in specified databases/folders are scanned.

6 Click Next. The Enter a name for the scan page appears. Type a name for theon-demand task.

7 Click Finish to complete the process of creating an on-demand scan task.

8 Click Apply.

Status ReportsA status report is a scheduled report sent to an administrator at a specific time. The reportcontains detection statistics within that specified time frame. You can choose a time, recipientemail address/distribution list to send the report to, and a subject for the email. Reports aresent in HTML or CSV format.

Scheduling a new status report1 Click Dashboard | Status Reports. The Status Reports page appears.

2 Click New Report. The Report page appears.

Using the McAfee Security for Lotus Domino user interfaceDashboards and how they work

47McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 48: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

3 In When to report page, choose any of these options:

• Not scheduled — Select the checkbox to set up a reporting task that you can activatelater. If you are modifying a report schedule, this option allows you to stop an existingreport task.

• Once — From the respective drop-down lists, choose a date, month, year and the timewhen a report task has to start. You can select the checkbox and specify the numberof hours and minutes after which the report task has to stop.

• Hours — Specify how frequently, the report task should take place (in hours), and athow many minutes past the hour. You can select the checkbox and specify the numberof hours and minutes after which the report task has to stop.

• Days— Specify the time how frequently, in days, the report task should take place andat what time of the day. You can select the checkbox and specify the number of hoursand minutes after which the report task has to stop.

• Weeks — Specify how frequently, in weeks, the report task should take place. You canalso specify on which days and at what time of day the task should take place. You canselect the checkbox and specify the number of hours and minutes after which the reporttask has to stop.

• Months — On either the first, second, third, fourth or a last day, select a checkbox byclicking on a desired month(s) and specify a time at which a report task has to start.You can select the checkbox and specify the number of hours and minutes after whichthe report task has to stop.

• Stop task after it has run for— Specify the maximum number of hours and minutesa task can run before it is stopped. Limiting the amount of time a report can run helpspreserve system resources. By default there is no limit on report task time.

4 Click Next. The Report Settings page appears.

5 In Recipient Email, specify the recipient’s email address to whom the report is to be sent.

6 In Subject line for report, specify the subject line in the report that is sent to the recipient.

7 In Number of Rows, specify the number of rows (n) to be included in the recipient'sstatus report. Each row in the status report displays the total number of detections for aparticular day. The report contains the detection count for the last (n) days, excluding theday when the status report is triggered. For example: If you specify two, the status reportwill contain two rows displaying detections for the last two days, excluding today.

8 In Type of Report, specify the format of the status report, which is sent to the recipient.The available options are CSV or HTML.

9 Click Next. The Please enter a task name page appears.

10 Type a meaningful name for the task.

11 Click Finish.

12 Click Apply to save the changes.

Configuration ReportsA configuration report is a scheduled report sent to an administrator at a specific time. Theconfiguration report will have a summary of product configurations such as: server information,version information, license status and type, product information, debug logging information,on-access settings, and on-access policies.

Using the McAfee Security for Lotus Domino user interfaceDashboards and how they work

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide48

Page 49: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Scheduling a new configuration report1 Click Dashboard | Configuration Reports. The Configuration Reports page appears.

2 Click New Report. The Report page appears.

3 In the When to report page, choose any of these options:

• Not scheduled — Select the checkbox to set up a reporting task that you can activatelater. If you are modifying a report schedule, this option allows you to stop an existingreport task.

• Once — From the respective drop-down lists, choose a date, month, year and the timewhen a report task has to start. You can select the checkbox and specify the numberof hours and minutes after which the report task has to stop.

• Hours — Specify how frequently, the report task should take place (in hours), and athow many minutes past the hour. You can select the checkbox and specify the numberof hours and minutes after which the report task has to stop.

• Days— Specify the time how frequently, in days, the report task should take place andat what time of the day. You can select the checkbox and specify the number of hoursand minutes after which the report task has to stop.

• Weeks — Specify how frequently, in weeks, the report task should take place. You canalso specify on which days and at what time of day the task should take place. You canselect the checkbox and specify the number of hours and minutes after which the reporttask has to stop.

• Months — On either the first, second, third, fourth or a last day, select a checkbox byclicking on a desired month(s) and specify a time at which a report task has to start.You can select the checkbox and specify the number of hours and minutes after whichthe report task has to stop.

• Stop task after it has run for— Specify the maximum number of hours and minutesa task can run before it is stopped. Limiting the amount of time a report can run helpspreserve system resources. By default there is no limit on report task time.

4 Click Next. The Who to report to page appears.

5 In Recipient Email, specify the recipient’s email address to whom the report is to be sent.

6 In Subject line for report, specify the subject line in the report that is sent to the recipient.

7 Click Next. The Please enter a task name page appears.

8 Type a meaningful name for the task.

9 Click Finish.

10 Click Apply to save the changes.

Graphical ReportsYou can use Graphical Reports to view information about items that have triggered one ormore scanners and find out how many detections match your search criteria. You can also findout what percentage of the total detections each detection represents by using a series of filtersto specify the type of detections that are of interest.

You can select the following tabs:

• Simple — When you want to use only a few search filters and view the results as a bargraph.

Using the McAfee Security for Lotus Domino user interfaceDashboards and how they work

49McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 50: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Advanced — When you want to use more complex search filters and view the results aseither a bar graph or a pie chart.

To view graphical reports, see the Viewing graphical reports section.

Viewing graphical reportsThe Graphical Reports section gives an explicit view of quarantined items in a graph. Youcan also find each detection by setting search filters to specify the types of detections that areof interest.

Tasks

Using simple search filters

Using advanced search filters

Using simple search filters

Task

For option definitions, click ? in the interface.

1 Click Dashboard | Graphical Reports. The Graphical Reports page appears with theSimple tab.

2 From Time Span, select Today to view only today's quarantined items or <Last 7 to60> days for detections made in the specified time span (including today's date).

3 From Type, select the type of quarantined item to be viewed such as spam, phish, viruses,unwanted content, or potentially unwanted programs.

4 From Filter, select any of these:

• Top 10 Viruses

• Top 10 Infected files

• Top 10 Infected attachments types

• Top 10 Virus Recipients

• Top 10 Virus Senders

• Top 10 Infected Databases

• Top 10 Unwanted Programs

• Top 10 Spam Detections

• Top 10 Spam Recipients

• Top 10 Phish Detections

• Top 10 Content and File Filter detections

• Top 10 Infected Servers

• Detections - includes all of the above detection categories

5 Click Search. The search results are shown in the View Results pane.

Using the McAfee Security for Lotus Domino user interfaceDashboards and how they work

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide50

Page 51: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Using advanced search filters

Task

For option definitions, click ? in the interface.

1 Click Dashboard | Graphical Reports. The Graphical Reports page appears.

2 Click the Advanced tab.

3 Select upto three filters from the list:

• Subject

• Recipient

• Reason

• Ticket Number

• Detection Name

• Score

NOTE: For more information about the search filters, see the Search filters section.

4 Select All Dates or a Date Range from the drop-down lists.

5 Select Bar Graph or Pie Chart as required.

6 If you select Pie Chart, select any of the following filter from the drop-down list to Queryon:

• Subject

• Recipient

• Reason

• Ticket Number

• Detection Name

• Score

7 In Maximum Results, specify the maximum number of segments you want to appear inthe pie chart. For example, if you are interested only in viewing the three most frequentlyassigned spam scores, type 3.

NOTE: Query on and Maximum Results are available only for pie chart.

8 Click Search. The search results are shown in View Results pane.

Detected ItemsYou can use Detected Items to view information about email messages that contain spam,phish, viruses, potential unwanted programs, banned file types or messages, and unwantedcontent. Use the search filters to find email messages that are of interest and view the resultsof the search operation.

What are the detected items?Detection or Detected item is something identified by security software as a potential threat,such as a virus, spam, phish, unwanted content, banned file type, fraudulent website, or anintrusion.

Using the McAfee Security for Lotus Domino user interfaceDetected Items

51McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 52: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Spam

Spam is an unwanted email message, specifically unsolicited bulk message. Spam is floodingthe Internet with many copies of the same message, in an attempt to force the message onpeople who would not otherwise select to receive it. Most spam is commercial advertising, oftenfor dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sendervery little to send -- most of the costs are paid for by the recipient or the carriers rather thanby the sender.

Phish

Phish is a method of fraudulently obtaining personal information (such as passwords, socialsecurity numbers, credit card details and so on) by sending spoofed email messages that looklike they have come from a trusted source such as legitimate companies or banks. Typically,phishing email messages request that recipients click the link in the email to verify or updatecontact details or credit card information.

Viruses

Virus is a program or code that replicates and infects other programs, boot sector, partitionsector, or document that supports macros by inserting itself or attaching itself to that medium.

Potentially Unwanted Programs

Potentially unwanted programs are the software programs written by legitimate companies thatmight alter the security state or the privacy posture of the computer on which they are installed.This software can, but does not necessarily include spyware, adware, dialers, and can bedownloaded in conjunction with a program wanted by the user.

Banned File types / Messages

Certain types of file attachments are prone to viruses. The ability to block attachments by fileextension is another layer of security for your mail system. Both internal and external emailmessages are checked for banned content.

Unwanted Content

This is any content that triggers a content scanning rule. It might include offensive, abusive,unpleasing words or even company's confidential information.

Viewing detected items

Task

For option definitions, click ? in the interface.

1 Click Detected Items | <All Items>. The <All Items> page appears.

2 Select any of the available search filters from the drop-down lists.

3 Select All Dates or a Date Range from the drop-down lists.

4 Click Search. A list of quarantined items matching your search criteria are displayed in theView Results section.

NOTE: Click Clear Filter to return to the default search filter settings.

Using the McAfee Security for Lotus Domino user interfaceDetected Items

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide52

Page 53: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Search filters

Option definitions

The available search filters are:

DefinitionOption

You can search for an item using the date and time whenit was detected.

Date/Time

A ticket number is a unique alphanumeric identifierassigned to a specific detection and delivered as a

Ticket Number

notification through email. It helps identify the associateddetection.

A ticket number that indicates the amount of potentialspam contained within an email message. The number is

Spam Score

derived when the engine applies spam score anti-spamrules to each email message it scans. To assess the riskthat an email message contains spam, the scoresassociated with each rule are added together for an overallspam score for that message. A high overall spam scoreindicates a high risk that the email message contains spam.

You can search for an item by a policy name that detectedthe item.

Policy Name

You can search for an item by the scanner name thatdetected the item.

Scanned by

You can search for an item based on a specific serverversion.

Server

You can search for an item based on the embeddedfilename.

Embedded File Name

You can search for an item that was detected on a specificdatabase.

Database

You can search for an item based on its status.State

You can search for a detected item based on its name.Detection Name

You can search for an item based on the rule that triggeredone or more scanners/filters.

Rule Name

You can search for an item based on the anti-virus DATversion with a distinctive signature.

Anti-Virus DAT

You can search for an item based on the anti-virus enginethat had a sequence of characters unique to avirus/unwanted content.

Anti-Virus Engine

You can search for an item based on the anti-spam rulesthat are updated every few minutes to catch the latestspam campaigns sent by spammers.

Anti-Spam Rule

You can search for an item based on the anti-spam enginethat scans email messages for spam and phishing attacks,using anti-spam, anti-phishing, and extra rules.

Anti-Spam Engine

You can search for an item based on the action that wastaken on it (deleted/cleaned/intercepted/quarantined andso on).

Action Taken

You can search for an item through the recipient's emailaddress.

Recipient

Using the McAfee Security for Lotus Domino user interfaceDetected Items

53McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 54: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

DefinitionOption

You can search for an item based on the reason why itwas detected.

Reason

You can search for an item based on the subject line ofthe email message.

Subject

You can search for an item based on the file type of theemail message's attachment.

File Type

You can search for an item through the sender's emailaddress.

Sender

Returns to the default filter settingsClear Filter

For instructions to view the detected items, see the Viewing detected items section.

View results

Option definitions

From the View Results pane, you can use:

DefinitionOption

To release a quarantined item. Select a record from theView Results pane and click Release. The original email

Release

message is released from the database for delivery to theintended recipient.

To download a quarantined item. Select a record from theView Results pane and click Download.

Download

To export and save records in .CSV format. Select a recordfrom the View Results pane and click Export to CSVFile.

Export to CSV File

To select additional column headers to be listed in theView Results pane.

Columns to display

To submit a quarantined item to Avert. Select a recordfrom the ViewResults pane, then click Submit to Avert.

Submit to Avert

For instructions to view the detected items, see the Viewing detected items section.

Policy ManagerPolicy Manager is a product feature that allows you to set up/manage different policies andactions in the product. It determines how different types of threats are treated when detected.

You can set up policies that determine how different types of threats are treated for differentgroups of users or databases stored on the server. Each policy specifies the settings and actionsthat are used by the policy and the actions taken when a detection is triggered for the data inDomino environment. The settings are given names and can be used by many policies at thesame time. However, the actions are specific to a particular policy. For example, you can createanti-virus policies and create multiple child policies from it. However, you can have a differentaction for each policy depending on the users or databases.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide54

Page 55: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

The different policies that you can set up are listed under the Policy Manager. Each type ofpolicy has a default Master policy. It cannot be deleted because there must always be onepolicy from which others can be created. Master policy is configured to cover most situations.However you can create subpolicies to meet specific requirements.

Types of Policies

DescriptionPolicy

Create policies for email messages that originate from adifferent domain or an external email server.

External mails

Create policies for email messages that aretransferred/received within the same domain or sameorganization.

Internal mails

Create policies which affect scanning of documents indatabases other than domino mailbox and user sent items.It also scans documents saved as drafts in user mailboxes.

Database

Create policies that are activated at set intervals to removeviruses, potentially unwanted programs (PUPs), and otherpossible threats.

On-Demand (Remove Virus)

Create policies that are activated at set intervals to identifycontent that you do not want to appear in an emailmessage.

On-Demand (Remove Banned Content)

Create full scan policies that are activated at set intervalsto scan for viruses, spams, phising emails,banned/unwanted content and other harmful codes.

On-Demand (Full Scan)

Create policies that apply when an item is released fromthe local quarantine or McAfee Quarantine Manager.

Quarantine Scan

Set up resources that can be used by more than one policy.This is more efficient than setting up the same resource

Shared Resource

separately for each policy. For more information, see theShared Resources section.

Example:Instead of creating two disclaimers; one for the Internalmail policy and another for External mail policy, you cancreate a single disclaimer that can be used by bothpolicies. The disclaimer is a resource that is shared bymore than one policy.

Inheritance and advanced views

Inheritance view

The Inheritance View enables you to view policy settings inherited from some other policies.Once you have created subpolicies, McAfee Security for Lotus Domino needs to determine whichpolicy is going to be applied for an email or a document. For this purpose, every policy isassigned a priority. For deciding a policy to be applied to the email, attributes of the email areused to evaluate rules for each policy in the order of priority. If the rules of the policy aresatisfied, that policy is applied to the email. However, if rules of policy are not satisfied, McAfeeSecurity for Lotus Domino moves on to evaluating the next priority policy. If none of thesubpolicies can be applied to the email, master policy is used to scan the email.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

55McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 56: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Using inheritance, you can create policies which inherit their settings and actions from anotherpolicy, The policy that inherits the settings is known as the subpolicy, and the policy from whichit inherits those settings is know as the parent policy.

Inheritance should not be confused with sharing of settings. An inherited policy uses the samenamed setting and action as the parent policy. If parent policy starts using a different setting,the same named setting is used by the subpolicy. Similarly any changes to the actions in theparent policy is also reflected in the subpolicies.

Upto three levels of inheritance is supported. This allows customization of product behavior fordifferent groups of users in an organization/domain.

Advanced view

The Advanced View enables you to use arrow icon within the Move column to change theorder in which the subpolicies are applied. Using Advanced View in conjunction withInheritance View allows a greater level of customization while maintaining lesser number ofsettings.

NOTE: If you apply multiple policies to a single user, you might want to prioritize which policytakes precedence.

SubpoliciesYou can create subpolicies to have specialized behavior for groups of users or databases in theDomino mail server environment. Subpolicies allow you to create customized actions for detectingitems while using shared settings.

Creating subpolicies

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a menu item for which you want to create a Sub-Policy.

2 Click Create Sub-Policy. The Create a Sub-Policy page appears.

3 In the Create a Sub-Policy - Initial Configuration page, type a Sub-policy namethat identifies the policy and what it does.

4 Type a Description for the policy. This field is optional.

5 Select the Parent policy for the subpolicy.

6 Click Next. The Create a sub-policy - Trigger Rules page appears.

7 Specify the conditions when the policy should trigger.

8 Select Any of the rules apply, All rules apply or None of the rules apply for thespecific user.

9 Click New Rule and select the required policy rule.

10 Click Add to select the trigger rule.

11 Click Next. The Create a Sub-Policy - Scanner and Filters page appears.

12 Select Inherit all settings from the parent policy to inherit all properties of the parentpolicy, else select the policy to inherit from another policy by clicking Initialize selectedsettings with values copied from another policy.

13 Click Finish.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide56

Page 57: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Setting policiesYou can set up policies that determine how different types of threats are treated for differentgroups of users or databases stored on the server. Each policy specifies the settings and actionsthat are used by the policy when a detection is triggered for the data in Domino environment.The settings are given names and can be used by many policies at the same time. However,the actions are specific to a particular policy.

Tasks

Listing all the scanners

Creating a new rule for a specific user

Listing all the scannersIn the List All Scanners tab, you can configure different types of policy settings. The type ofsettings that are available depends on which policy is selected.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click Master Policy. The Master Policy page appears.

3 In Master Policy, select the policy that you want to view and configure. You can thenuse Selection to select the type of configuration settings you want to view and configurefor the selected policy. You can configure a policy so that it only applies at specific user ordatabase.

DefinitionOption

To select the policy you want to configure.Policy

To configure the policy so that it only applies at specifictimes. For example, you can create anti-virus settingthat is applicable on weekends.

NOTE: Only some filters can be turned off. Filters thatcannot be turned off act as a prerequisite for other

Add Scanner/Filter

scanners and filters. For example, when we identify adigitally signed email, we need to decide if we shouldscan the attachments of the email or not. If settingsfor signed emails were turned off, we cannot take thisdecision.

To configure the policy for each type of scanner. Typicalcore scanner options include:

Core Scanner

• Anti-Virus Scanner

• Anti-Spam

• Content Scanning

• File Filtering

• Anti-Phishing

To configure the policy for each type of filter. Typicalfilter options include:

Filters

• Corrupt Content

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

57McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 58: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

DefinitionOption

• Protected Content

• Encrypted Content

• Signed Content

• Password Protected Files

• Mail Size Filtering

• Scanner Control

• MIME Mail Settings

• HTML Files

To configure the alert settings and disclaimer messagesfor polices. Miscellaneous options include:

Miscellaneous settings

• Alert Settings

• Notification Settings

• Disclaimer Text

Adding scanner/filter

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click Master Policy. The Master Policy page appears.

3 In Master Policy | List All Scanners, click Add Scanner/Filter.

4 From Specify the category drop-down list, select the required scanner/filter.

5 From When to use this instance section, select an existing time slot or create a newone.

6 Click Save.

Creating a new rule for a specific user

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click Master Policy. The Master Policy page appears.

3 Click the Specify Users tab to specify rules which decide which users or databases thepolicy must apply to.

4 Click New Rule.

5 In the Specify a policy rule pane, select the policy rule, and then specify the conditionfor the rule. You can also Copy rules from another policy, if policies are available.

6 Click Add to add the rule or Delete to remove the selected rule.

7 Click Save to apply the rule to the specific user.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide58

Page 59: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Core scanners and filters

Scanners

You can use the Core Scanners to configure the policy for each type of scanner. Typical corescanners include:

• Anti-Virus Scanner

• Anti-Spam

• Content Scanning

• File Filtering

• Anti-Phishing

Filters

You can use the Filters to configure the policy for each type of filter. Typical filters include:

• Corrupt Content

• Protected Content

• Encrypted Content

• Signed Content

• Password Protected Files

• Mail Size Filtering

• Scanner Control

• MIME Mail Settings

• HTML Files

Configuring scanner settingsThis section provides information on creating new set of options for scanners, then specifyingan appropriate action to be taken on the item detected by those scanners.

Configuring the anti-virus scanner settings

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item that has the anti-virus scanner. The policypage for the submenu item appears.

2 Click on a policy name, then click Anti-Virus Scanner.

3 Select Enable to activate the anti-virus scanner settings for the selected submenu item.

4 In the Options drop-down list, select <create new set of options>. The Anti-VirusScanner Settings page appears.

5 In Instance name, type a unique name for the anti-virus scanner setting instance. Thisfield is mandatory.

6 In Basic Options tab, under Specify which files to scan, select one of these options:

• Scan all files— To specify that all the files should be scanned regardless of their type.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

59McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 60: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Default file types — To specify that only the default file types should be scanned.

• Defined file types — To specify which file types should be scanned.

7 Select additional scanner option(s) available in Scanner options. You can select:

• Scan archive files (ZIP, ARJ, RAR...)

• Find unknown file viruses

• Find unknown macro viruses

• Scan all files for macros

• Find all macros and treat as infected

• Remove all macros from document files

8 In Advanced tab, under Custom malware categories, specify the items to be treatedas malware. There are two ways to select malware types:

• Select the malware types from the list of checkboxes.

• Select Specific detection names, type a malware category, then click Add.

NOTE: When typing a malware category name, you can use wildcards for patternmatching.

9 Select the Do not perform custom malware check if the object has already beencleaned option if the cleaned items must not be subjected to the custom malware check.

10 In Clean options, specify what happens to files that are reduced to zero bytes after beingcleaned. Select any one of these options:

• Keep zero byte file — To keep files that have been cleaned and is of zero bytes.

• Remove zero byte file — To remove any file that has zero bytes after being cleaned.

• Treat as a failure to clean — To treat zero byte files as if they cannot be cleaned,and apply the failure to clean action.

11 In Packers tab, use:

• Enable detection — To enable or disable the detection of packers.

• Exclude specified names — To specify which packers can be excluded from beingscanned.

• Include only specified names — To specify which packers you want the softwareto detect.

• Add — To add packer names to a list. You can use wildcards to match names.

• Delete — To remove packer names you have added.

12 In PUPs tab, use:

• Enable detection — To enable or disable the detection of PUPs. Clickthe disclaimerlink and read the disclaimer before configuring PUP detection.

• Select the program types to detect — To specify whether each type of PUP listedbelow should be detected or ignored:

• Spyware

• Adware

• Remote Administration Tools

• Dialers

• Password Crackers

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide60

Page 61: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Jokes

• Other Potentially Unwanted Programs (PUP) not included in the abovecategories

• Exclude specified names — To specify which PUPs can be excluded from beingscanned. For example, if you have enabled spyware detection, you can create a list ofspyware programs that you want the software to ignore.

• Include only specified names — To specify which PUPs you want the software todetect. For example, if you enable spyware detection and specify that only namedspyware programs should be detected, all other spyware programs are ignored.

• Add — To add PUP names to a list. You can use wildcards to match names.

• Delete — To delete PUP names that you have added.

NOTE: The McAfee website http://vil.nai.com/vil/default.aspx contains a list of PUPnames. Use the Search in Category option to select PUPs.

13 Click Save to return to the policy page.

14 In Actions to take, click Edit. In the following tabs, specify the anti-virus scanner actionsthat must be taken if a virus (or virus-like behavior) is detected:

• Cleaning

• Default Actions

• Custom Malware

• Packers

• PUPs

NOTE: You can see a preview of the alert message in the last four tabs.

15 Click Save, then Apply.

Configuring the anti-spam scanner settings

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item that has the anti-spam scanner. The policypage for the submenu item appears.

2 Click on a policy name, then click Anti-Spam.

3 Select Enable to activate the anti-spam scanner settings for the selected submenu item.

4 In the Options drop-down list, select <create new set of options>. The Anti-SpamSettings page appears.

5 In Instance name, type a unique name for the anti-spam scanner setting instance. Thisfield is mandatory.

6 In Options tab, under Scoring, type the values for:

• High score threshold — If the overall spam score is 15 or more.

• Medium score threshold — If the overall spam score is 10 or more, but less than15.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

61McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 62: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Low score threshold — If the overall spam score is 5 or more, but less than 10.

NOTE: To use the default values of spam scores, select the Use default option. Thesedefault settings have been carefully optimized to maintain the balance between a highspam detection rate and a low false positive rate. In the unlikely event that you need tochange these settings, a technical notice is available from Technical Support.

7 In Reporting, under the Spam reporting threshold is drop-down list, select High,Medium, Low or Custom to specify the point at which an email message should bemarked as spam.

8 In Custom score, type a specific spam score at which email messages should be markedas spam. This field is enabled only if you select the Custom option in step 6.

9 Select or deselect Add prefix to subject of spam messages as required.

10 From the Add a spam score indicator drop-down list, select:

• Never - Not to add a spam score indicator to the Internet header of any email message.

• To spam messages only — To add a spam score indicator to the Internet header ofspam email messages only.

• To non-spammessages only— To add a spam score indicator to the Internet headerof non-spam email messages only.

• To all messages — To add a spam score indicator to the Internet header of all emailmessages.

NOTE: Spam score indicator is a symbol used in the spam report that is added to the emailmessage's Internet headers to indicate the amount of potential spam contained in an emailmessage.

11 From the Attach a spam report drop-down menu, select:

• Never - Not to add a spam report to any email message.

• To spam messages only — To add a spam report to spam email messages only.

• To non-spam messages only — To add a spam report to non-spam email messagesonly.

• To all messages — To add a spam report to all email messages.

12 Select or deselect Verbose reporting to specify whether verbose reporting is required ornot. Verbose reporting includes the names and descriptions of the anti-spam rules thathave been triggered.

NOTE: Verbose reporting is available only if you do not select Never in step 10.

13 In Advanced tab, use:

• Maximum message size to scan (KB) — To specify the maximum size of an emailmessage (in kilobytes) that can be scanned. You can type a size up to 999,999,999kilobytes, although typical spam email messages are quite small. Default value is 250KB.

• Maximum width of spam headers (Bytes) — To specify the maximum size (inbytes) that the spam email message header can be. The minimum header width thatyou can specify is 40 characters and the maximum is 999 characters. Default value is76.

NOTE: Spammers often add extra information to headers for their own purposes.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide62

Page 63: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Maximumnumber of reported rules— To specify the maximum number of anti-spamrules that can be included in a spam report. The minimum number of rules you canspecify is 1 and the maximum is 999. Default value is 180.

• Header name — To specify a different name for the email header. You can use thisemail header and its header value (below) when tracking email messages and applyingrules to those messages. These fields are optional, and accept up to 40 characters.

• Header value — To specify a different value for the email header.

• Add header — To specify that the header should be added to none of the emailmessages, all of the email messages, only spam email messages or only to non-spamemail messages.

• Select or deselect the Use alternative header names when a mail is not spamoption as required.

• Select a required Spam profile from the drop-down list.

NOTE: A spam profile is a set of characteristics that identify a category of spam. Toenable the anti-spam software to better detect spam, users can submit examples ofspam, which enables the software to learn to recognize further spam.

14 In Mail Lists tab, under Blacklists and Whitelists, type the email addresses of theblacklisted and whitelisted senders and recipients.

NOTE: Email messages sent to or from an email address on a blacklist are treated as spam,even if they do not contain spam-like characteristics. Email messages sent to or from emailaddresses on a whitelist are not treated as spam, even if they contain spam-likecharacteristics.

Click Add to add email addresses to a list and the checkbox beside each address to specifywhether it is currently enabled or not. Click Delete to remove an email address from thelist. You cannot add the same email address more than once.

15 In Rules tab, click the Edit link of a rule to enable or disable it and to change its spamscore, then click the Save link of that corresponding rule.

NOTE: Click Reset to return to the default anti-spam settings.

16 Click Save to return to the policy page.

17 In Actions to take if spam is detected, click Edit. In the following tabs, specify theanti-spam scanner actions that must be taken if a spam is detected:

• High Score

• Medium Score

• Low Score

18 Click Save, then Apply.

Configuring the content scanner settings

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item that has the content scanner. The policypage for the submenu item appears.

2 Click on a policy name, then click Content Scanning.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

63McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 64: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

3 Select Enable to activate the content scanner settings for the selected submenu item.

4 In Options, you can use:

• Include document and database formats in content scanning — To includedocument and database formats when scanning content.

• Scan the text of all attachments — To scan the text of all attachments.

• Create — To create a new alert message when the content of an email message isreplaced due to a rule being triggered. See the Creating a new alert section forinstructions.

• View/Hide — To display or hide the preview of the alert message. If the preview ishidden, clicking this link displays it. If the preview is displayed, clicking this link hidesit.

5 In Content Scanner rules and associated actions, click Add rule. The Content Rulespage appears.

6 In Specify actions for a selection of content rules:

• Select a rule group from the Select rules group drop-down menu that will trigger anaction if one or more of its rules are broken.

• In Select rules from this group, specify if all rules or only rules with a specific severityrating should be included. The options are Severity - Low, Severity - Medium, andSeverity - High.

NOTE: Selecting the Select all option overrides all the three rules.

7 In If detected, take the following action:, select the content scanner actions that mustbe taken if some content in an email message is detected.

8 Click Save, then Apply.

Configuring the file filtering scanner settings

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item that has the file filtering scanner. The policypage for the submenu item appears.

2 Click on a policy name, then click File Filtering.

3 Select Enable to activate the file filtering scanner settings for the selected submenu item.

4 In Alert Selection, click:

• Create — To create a new alert message when the attachment (or a file) of an emailmessage is replaced due to a rule being triggered. See the Creating a new alert sectionfor instructions.

• View/Hide — To display or hide the preview of the alert message. If the preview ishidden, clicking this link displays it. If the preview is displayed, clicking this link hidesit.

5 In File filtering rules and associated actions, from the Available rules drop-downmenu, select Create new rule. The File Filtering Rule page appears.

6 Type a unique Rule name. Give the rule, a meaningful name, so that you can easily identifyit and what it does. For example, FilesOver5MB.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide64

Page 65: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

7 In Filename filtering, select Enable file name filtering to enable file filtering accordingto the file names. For example, if you type *.exe, this file filtering rule is applied to any filethat has a .exe file name extension.

8 In Take action when the file name matches, specify the names of the files that areaffected by this rule. You can use the * and ? wildcard characters to match multiplefilenames. For example, if you want to filter out executable files, type *.exe.

9 Click Add to add the file names to the filtering list or Delete to remove file names fromthe filtering list.

10 In File category filtering, select Enable file category filtering to enable file filteringaccording to their file type.

11 In Take action when the file category is, specify the type of files that are affected bythis rule.

NOTE: File types are divided into categories and subcategories.

12 In File categories, click on a file type. An asterisk symbol (*) appears next to the file typeto indicate that the selected file type will be filtered.

13 In Subcategories, click on the subcategory you want to filter.

NOTE:

• To select more than one subcategory, use Ctrl+Click or Shift+Click.

• To select all of the subcategories, click All.

• Click Clear selections to undo the last selection.

14 Select Extend this rule to unrecognized file categories to apply this rule to any otherfile categories and subcategories that are not specifically mentioned in the categories andsubcategories lists.

15 In File size filtering, select Enable file size filtering to filter files according to their filesize.

16 In Take action when the file size is, select Greater than to specify that the actionshould only be applied if the file is larger than the size specified.

17 Select Less Than to specify that the action should only be applied if the file is smaller thanthe size specified.

18 Click Save to return to the policy page.

19 Click the Change link of the rule and specify actions that must be taken when afile/attachment in an email message is detected and filtered.

20 Click Save, then Apply.

21 Send an email from your Lotus Notes with an executable file attached. The file filteringrule is triggered and the specified actions (as per step 19) take place.

Configuring the antiphish scanner settings

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item that has the antiphish scanner. The policypage for the submenu item appears.

2 Click on a policy name, then click Anti-Phishing.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

65McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 66: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

3 Select Enable to activate the antiphish scanner settings for the selected submenu item.

4 In the Options drop-down list, select<create new set of options>. The Anti-PhishingSettings page appears.

5 In Instance name, type a unique name for the antiphish scanner setting instance. Thisfield is mandatory.

6 In Reporting Options, select or deselect these options as required:

• Add prefix to subject of phishing messages — To specify that you want to addtext to the start of the subject line of any email message that probably contains phish.

• Add a phish indicator header to messages — To specify whether a phish indicatoris added to the Internet header of any email message that probably contains phish.

• Attach a phish report — To specify whether a phish report should be generated andadded to an email message.

• Verbose reporting — To specify whether the names and a detailed description of theantiphish rules that have been triggered should be included in the email message. Thisoption is available only if the Attach a phish report option is selected.

7 Click Save to return to the policy page.

8 In Actions to take, click Edit, specify the antiphish scanner actions that must be takenif a phish is detected.

9 Click Save, then Apply.

Filter settings for a policyYou can configure different types filter settings for a policy. The type of settings that are availabledepends on which policy is selected.

Configuring the corrupt content filter settingsThe content of some email messages can become corrupt, which means that the content ofthe email message cannot be scanned. Corrupt content policies specify how email messageswith corrupt content are handled when detected.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click on a policy name, then click Corrupt Content.

3 In Actions, click Edit to specify the filter actions that must be taken when corrupt contentis detected.

NOTE: If you select the Replace itemwith an alert option, you can use the default alertmessage available (with a preview) or create a new one by clicking the Create link.

4 Click Save, then Apply.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide66

Page 67: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Configuring the protected content filter settingsThe content of some email messages is protected, which means that the content of the emailmessage cannot be scanned. Protected content policies specify how email messages withprotected content are handled when detected.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click on a policy name, then click Protected Content.

3 In Actions, click Edit to specify the filter actions that must be taken when protectedcontent is detected.

NOTE: If you select the Replace itemwith an alert option, you can use the default alertmessage available (with a preview) or create a new one by clicking the Create link.

4 Click Save, then Apply.

Configuring the encrypted content filter settingsSome email messages can be encrypted, which means that the content of those email messagesare encoded so that unauthorized parties cannot access it. Encrypted content uses a "key" andencryption mathematical algorithms to decrypt it.

Encrypted content policies specify how encrypted email messages are handled when detected.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click on a policy name, then click Encrypted Content.

3 In Actions, click Edit to specify the filter actions that must be taken when encryptedcontent is detected.

NOTE: If you select the Replace itemwith an alert option, you can use the default alertmessage available (with a preview) or create a new one by clicking the Create link.

4 Click Save, then Apply.

NOTE: Encrypted content settings are applicable to:

• Encrypted attachments in internal emails

• Encrypted internet email messages

• Notes encrypted email messages and documents

Configuring the signed content filter settingsWhenever information is sent electronically, it can be accidentally or willfully altered. To overcomethis, some email software uses a digital signature — the electronic form of a handwrittensignature.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

67McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 68: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

A digital signature is extra information added to a sender’s message that identifies andauthenticates the sender and the information in the message. It is encrypted and acts like aunique summary of the data. Typically, a long string of letters and numbers appears at the endof a received email message. The email software then re-examines the information in thesender’s message, and creates a digital signature. If that signature is identical to the original,the data has not been altered.

If the email message contains a virus, bad content, or is too large, the software might clean orremove some part of the message. The email message is still valid, and can be read, but theoriginal digital signature is 'broken'. The recipient cannot rely on the contents of the emailmessage because the contents might also have been altered in other ways. Signed contentpolicies specify how email messages with digital signatures are handled.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click on a policy name, then click Signed Content.

3 In Actions, click Edit to specify the filter actions that must be taken when signed contentis detected.

NOTE: If you select the Replace itemwith an alert option, you can use the default alertmessage available (with a preview) or create a new one by clicking the Create link.

4 Click Save, then Apply.

NOTE: Signed content settings are applicable to:

• Signed internet emails

• Signed attachment

• Notes signed email and documents

Configuring the password-protected archives filter settingsYou can protect an archive with a password and sent through an email. Password-protectedarchives cannot be accessed without a password and cannot be scanned.

Password-protected archive policies specify how email messages that contain apassword-protected archive are handled.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click on a policy name, then click Password-Protected Archives.

3 In Actions, click Edit to specify the filter actions that must be taken when an email messagecontaining password-protected archive(s) is detected.

NOTE: If you select the Replace itemwith an alert option, you can use the default alertmessage available (with a preview) or create a new one by clicking the Create link.

4 Click Save, then Apply.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide68

Page 69: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Configuring the mail size filter settingsMail size filtering allows you to specify an action that will be applied to email messages basedon their size.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click on a policy name, then click Mail Size Filtering.

3 Select Enable to activate the email size filter settings for the selected submenu item.

4 In Options, you can use:

• Default Settings — To view a summary of the mail size option set that is used bydefault.

• <create new set of options> — To configure mail size filtering options. The optionsare:

• Instance name— Type a unique name for the mail size filter setting instance. Thisfield is mandatory.

• Maximum overall mail size (KB) — Specify the maximum size (in kilobytes) thatan email message can be. The recommended size is 100,000 kilobytes (10megabytes).

• Maximum attachment size (KB) — Specify the maximum size (in kilobytes) thatthe attachment(s) of an email message can be. The recommended size is 32000kilobytes.

• Maximum number of attachments — Specify the maximum number ofattachments an email message can have. The recommended size is 500 attachments(maximum).

• Edit — To edit the selected option set.

5 In Actions, click Edit. In the following tabs, specify the mail size filter actions that mustbe taken if the size of the email message/attachment and the number of email attachmentsexceed the specified number:

• Message Size

• Attachment Size

• Attachment Count

NOTE: If you select the Replace all attachments with a single alert and/or Replacethe attachment with an alert option, you can use the default alert message available(with a preview) or create a new one by clicking the Create link.

6 Click Save, then Apply.

NOTE: Mail size filtering is applicable to both inbound and outbound email messages.

Configuring the scanner control filter settingsYou can use Scanner Control Settings to limit the nesting level, file size, and scan time thatis allowed when the email messages are scanned.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

69McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 70: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click on a policy name, then click Scanner Control.

3 In Options, click <create new set of options>.

4 In Instance name, type a unique name for the scanner control filter setting instance.This field is mandatory.

5 In Maximum nesting level, specify the level to which the scanner should scan, when anattachment contains compressed files, and other compressed files within. We recommendthat you limit scanning to a depth of 100.

6 In Maximum expanded file size (MB), specify the maximum number of megabytes afile can be when expanded for scanning. We recommend a maximum size of 100 megabytes.

7 InMaximum scan time (minutes), specify the maximum number of minutes that shouldbe spent scanning any file. We recommend a maximum of 10 minutes.

8 Click Save to return to the policy page.

9 In Alert selection, you can select which alert to use when a scanner control option istriggered. You can use:

• Create — To create a new alert message for this policy.

• View/Hide — To display or hide the alert text. If the text is hidden, clicking this linkdisplays it. If the text is displayed, clicking this link hides it.

10 In Actions, click Edit to specify the filter actions that must be taken when the maximumnesting level in a zip attachment/file size/scanning time of the item exceeds and if scanningan item fails.

11 Click Save, then Apply.

Configuring the MIME mail filter settingsMultipurpose Internet Mail Extensions (MIME) is a communications standard that enables thetransfer of non-ASCII formats over protocols (such as SMTP) that supports only 7-bit ASCIIcharacters. MIME defines different ways of encoding the non-ASCII formats so that they canbe represented using characters in the 7-bit ASCII character set.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click on a policy name, then click MIME Mail Setting.

3 In Options, select <create new set of options>. The Mail Settings page appears.

4 In Instance name, type a unique name for the MIME email filter setting instance. Thisfield is mandatory.

5 In Options tab, type a Prefix to message subject.

6 In Preferred re-encoding of attachments in a MIME message, select one of thesere-encoding methods that is used when re-encoding attachments in MIME messages:

• Re-encode using the original message encoding

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide70

Page 71: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Re-encode using HTML with numeric unicode references

• Re-encode using the following character set (in this case, select a character setfrom the drop-down list).

7 In Preferred re-encoding ofmodified subject headers, select one of these re-encodingmethods that is used when re-encoding the subject headers in the MIME messages:

• Re-encode using UTF-8

• Re-encode using the original encoding scheme

• Re-encode using the following character set (in this case, select a character setfrom the drop-down list).

8 Select one of these options if the re-encoding of a subject header fails:

• Treat as an error — The MIME message is bounced.

• Fallback to UTF-8 — The MIME message is encoded into UTF-8.

NOTE: You can perform step 9 only if you select Re-encode using the original encodingscheme or Re-encode using the following character set from Preferred re-encodingof modified subject headers.

9 In Advanced tab, select one of these encoding methods to use while encoding the textpart of an email message:

• Quoted-printable, which is best suited for messages that mainly contain ASCIIcharacters, but also contains some byte values outside that range.

• Base64, which has a fixed overhead and is best suited for non-text data, and formessages that do not have a lot of ASCII text.

• 8-Bit, which is best suited for use with SMTP servers that support the 8BIT MIMEtransport SMTP extension.

10 Select or deselect Do not encode if text is 7-bit as required.

11 In Default decode character set, select a character set that should be used for decodingwhen one is not specified by the MIME headers.

12 In Maximum number of MIME parts, specify the maximum number of MIME parts thatcan be contained in a MIME message. Default value is 10000 MIME parts.

13 In Header corruption in a MIME message, select the required option:

• Treat as corrupt content and take appropriate action

• Do not treat as corrupt content

14 In NULL characters in the headers of a MIME message, select the required option:

• Treat as corrupt content and take appropriate action

• Do not treat as corrupt content

15 In MIME Types tab, specify which MIME types should be treated as text attachments andwhich, as binary attachments.

NOTE: Click Add to add the MIME types to the list or Delete to delete a MIME type froma list. Duplicate entries are not allowed.

16 In Character Sets tab, select a Character set, Alternatives, deselect the Fixedcheckbox, and click Add to specify an alternative character set mapping to the one specifiedin the MIME message.

NOTE:

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

71McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 72: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Click Edit to edit character mappings, Delete to delete character mappings and Save tosave any changes you have made to the character mappings.

The Save option is available only when you click Edit.

17 Click Save.

18 In Alert selection, you can select which alert to use when a MIME type is blocked. Youcan use:

• Create — To create a new alert message for this policy.

• View/Hide — To display or hide the alert text. If the text is hidden, clicking this linkdisplays it. If the text is displayed, clicking this link hides it.

19 In Incomplete message actions, click Edit to specify the filter actions that must betaken when a partial MIME or external MIME type is encountered.

20 Click Save then Apply.

Configuring the HTML file filter settingsHTML file filter allows you to search for elements or executables such as ActiveX, Java applets,VBScripts in HTML components. If any of this content is found in HTML, it is removed. Thisfilter works only if Content Scanner is enabled.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click on a policy name, then click Scanner Control.

3 In Options, click <create new set of options>. The HTML Files page appears.

4 In Instance name, type a unique name for the scanner control filter setting instance.This field is mandatory.

5 In Scan the following elements, select any of these option(s):

• Comments — To scan for comment elements in the HTML message. For example:<!-- comment text --!>

• Metadata — To scan for metadata elements in the HTML message. For example:< META EQUI="Expires" Content="Tue, 04 June 2007 21:29:02">

• Links URLs ("<ahref=...") — To scan for URL elements in the HTML message. Forexample:<a HREF="McAfee.htm">

• Source URLS ("<img src=...") — To scan for source URL elements in the HTMLmessage. For example:<IMG SRC="..\..\images\icons\mcafee_logo_rotating75.gif">

• JavaScript / VBScript — To scan for JavaScript or Visual Basic script in the HTMLmessage. For example:<script language="javascript" scr="mfe/mfe.js">

6 In Remove the following executable elements, select any of these option(s):

• JavaScript / VBScript — To remove JavaScript or Visual Basic script elements fromthe HTML message. For example:<script language="javascript" scr="mfe/mfe.js">

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide72

Page 73: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Java applets— To remove Java applet elements from the HTML message. For example:<APPLET code="XYZApp.class" codebase="HTML ....."></APPLET>

• ActiveX controls — To remove ActiveX control elements from the HTML message.For example:<OBJECT ID="clock" data="http://www.mcafee.com/vscan.png" type="image/png"> VirusScan Image</OBJECT>

• Macromedia Flash— To remove Macromedia Flash elements from the HTML message.This option gets enabled if you have selected ActiveX controls. For example:<EMBED SCR="somefilename.swf" width="500" height="200">

7 Click Save, then Apply.

Alert settings and disclaimer textAlert messages are used to notify a person when a particular event occurs. You can use AlertSettings to set up additional information about these alerts.

A disclaimer is a piece of text, typically a legal statement that is added to an email message.Disclaimers are applicable only to outbound email messages.

Miscellaneous settings for a policyYou can configure different types miscellaneous settings for a policy. The type of settings thatare available depends on which policy is selected.

Configuring the alert message settingsA message that is sent to the McAfee Security for Lotus Domino administrator to notify themthat a scanner has detected an issue with a scanned item.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click on a policy name, then click Alert Settings.

3 In Options, select the default alert settings available or select <create new set ofoptions> to define your alert settings. The Alert Settings page appears.

4 In Instance name, type a unique name for the alert message setting instance. This fieldis mandatory.

5 Select HTML or Plain text as the Alert format.

6 From the Character encoding drop-down menu, select a required character set.

7 In Alert filename, specify the file name for this alert, including the appropriate HTML(.htm) or plain text (.txt) file extension.

8 Select or deselect Enable alert headers to enable the use of an alert header.

9 In the Alert header text entry box, type the header for the alert.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

73McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 74: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

10 From Show, select HTML content (WYSIWYG) or HTML content (source) dependingon whether the HTML text should be shown as compiled code or source code in the Alertheader.

NOTE: The Show option is only available if you have selected HTML as the alert messageformat.

11 Select or deselect Enable alert footers to enable the use of an alert footer.

12 In the Alert footer text entry box, type the footer for the alert.

13 From Show, select HTML content (WYSIWYG) or HTML content (source) dependingon whether the HTML text should be shown as compiled code or source code in the Alertfooter.

NOTE: The Show option is only available if you have selected HTML as the alert messageformat.

14 Click Save, then Apply.

Configuring the notification email settingsMcAfee Security for Lotus Domino can send you notifications of events that occur within theDomino server.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click on a policy name, then click Notification Settings.

3 In Options, you can select Plain Text or HTML as the notification format.

4 Type the Notification subject for the message.

5 Click Createto create a new notification alert message or use the default alert available.

NOTE: ClickView/Hide to display or hide the alert text. If the text is hidden, clicking thislink displays it. If the text is displayed, clicking this link hides it.

6 Click Save, then Apply.

Configuring the disclaimer text settingsA disclaimer is a piece of text, typically a legal statement that is added to an email message.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item. The policy page for the submenu itemappears.

2 Click on a policy name, then click Disclaimer Text.

3 Select Enable to activate the disclaimer text settings for the selected submenu item.

4 In Options, select <create new set of options>. The Disclaimer Text page appears.

5 In Instance name, type a unique name for the disclaimer text setting instance. This fieldis mandatory.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide74

Page 75: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

6 In Disclaimermessage (plain text only), type the disclaimer text message in plain textformat.

7 From the Insert disclaimer drop-down menu, select Before any message text, Afterany message text or As an attachment depending on where/how the disclaimer textshould be inserted in the email message.

8 Click Save, then Apply.

NOTE: Disclaimers are applicable only to outbound email messages.

Creating a new alert

Task

For option definitions, click ? in the interface.

1 From Policy Manager, select a submenu item that has the content scanner. The policypage for the submenu item appears.

2 Click on a policy name, then click Content Scanning (or an appropriatescanner/filter/miscellaneous).

3 In Options, click Create. The Alert Editor page appears.

4 Type a meaningful Alert name.

5 In Content Scanning Alert, select the required Style, Font, Size, and Tokens fromthe respective drop-down lists.

NOTE: These options are available only if you select HTML content (WYSIWYG) fromthe Show drop-down menu.

6 Select any of these tools available in Content Scanning Alert.

• Bold — To make the selected text bold.

• Italic — To make the selected text italic.

• Underline — To underline the selected text.

• Align Left — To left align the selected paragraph.

• Center — To center the selected paragraph.

• Align Right — To right align the selected paragraph.

• Justify — To adjust the selected paragraph so that the lines within the paragraph filla given width, with straight left and right edges.

• Ordered List — To make the selected text into a numbered list.

• Unordered List — To make the selected text into a bulleted list.

• Outdent — To move the selected text a set distance to the right.

• Indent — To move the selected text a set distance to the left.

• Text Color — To change the color of the selected text.

• Background Color — To change the background color of the selected text.

• Horizontal Rule — To insert a horizontal line.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

75McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 76: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Insert Link — To insert a hyperlink where the cursor is currently positioned. In URL,type the URL. In Text, type the name of the hyperlink as you want it to appear in thealert message. If you want the link to open a new window, select Open link in newwindow, then click Insert Link.

• Insert Image— To insert an image where the cursor is currently positioned. In ImageURL, type the location of the image. In Alternative text, type the text you want touse in place of the image when images are suppressed or the alert message is displayedin a text-only browser. If you want to give the image a title, type the title name in Usethis text as the image title. Click Insert Image.

• Insert Table — To insert a table at the current cursor position. Type the values inRows, Columns, Table width, Border thickness, Cell padding, and Cell spacingto configure the table, then click Insert Table.

7 From the Show drop-down menu, specify how the alert message should be displayedwithin the user interface. You can select:

• HTML content (WYSIWYG) — To hide the underlying HTML code and display onlythe content of the alert message.

• HTML content (source) — To display the alert message with the HTML code as itappears before compilation.

• Plain-text content — To display the content as plain text.

You can use the following notification fields to include them in your alert message. Forexample, in your alert message, if you want the name of the detected item and theaction taken when it was detected, use %vrs% and %act% on the Alert Editorpage.

Table 2: Notification fields you can useDescriptionNotification field options

Date and time%dts%

Sender%sdr%

Filter%ftr%

File name%fln%

Rule name%rul%

Action taken%act%

Folder%fdr%

Detection name%vrs%

State (Train state)%trs%

Ticket number%tik%

Scanned by%idy%

Policy name%psn%

Server%svr%

Anti-virus DAT%avd%

Anti-virus engine%ave%

Recipient%rpt%

Reason%rsn%

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide76

Page 77: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

DescriptionNotification field options

Subject%sbj%

Spam score%ssc%

Anti-spam engine%ase%

Anti-spam rules%asr%

8 Click Save, then Apply.

NOTE: Click Reset to undo all changes you have made since you last saved the alertmessage.

Quarantine scanningMcAfee Security for Lotus Domino scans using the settings from one of the policies listed underQuarantine Scan for items that are released from the quarantine repository.

Shared ResourcesWhen setting up policies, you might want the same resource to be used by more than onepolicy. For example, you might want to use the same disclaimer in both internal and externalemail messages. Instead of creating two disclaimers, one for the internal mail policy, one forthe external mail policy, you can create a single disclaimer that can be used by both policies.The disclaimer can be thought of as a resource that is shared by more than one policy.

You can use Shared Resources to:

• View resource settings.

• Create new resources.

• Change resource settings, so that the changes are picked up by all policies using thoseshared resources.

• Delete shared resources that are no longer in use.

NOTE: Shared resources is explained using Anti-Virus Scanner Settings. The settings forother scanners and filters may vary, however most of them are similar.

Configuring the shared scanners, filters, and alert settingsThis section provides information on configuring/creating shared scanners, filters, and alerts.

Creating shared scanners and alerts

Task

For option definitions, click ? in the interface.

1 From Policy Manager, click Shared Resource. The Shared Resources page appears.

2 In Scanners & Alerts tab, click Create New for Scanner/Filter for a selected Categoryyou want to create a new shared resource. (For example, for the anti-virus scanner category)

3 Type the shared Instance name and specify the Basic Options for the shared resource.

• Select Scan all files to scan all files, regardless of their type.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

77McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 78: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Select Default file types to specify that only the default file types should be scanned.

• Select Defined file types to specify which file types should be scanned.

NOTE: If you select Defined file types, type a three letter file extension. Longer fileextensions are included through pattern matching so that "CLA" will match ".class" files.Click Add. All lower case extensions are converted to upper case extensions.

4 In Scanner options, select the scanner options for the shared resource.

• Scan archive files (ZIP, ARJ, RAR...) — To scan inside archive files, such as ZIPfiles.

• Find unknown file viruses — To use heuristic analysis techniques to search forunknown viruses.

• Find unknown macro viruses — To find unknown viruses in macros.

• Scan all files for macros — To scan all files for macros.

• Find all macros and treat as infected — To find macros in files and treat them asinfected items.

• Remove all macros from document files — To remove all macros from documentfiles.

5 Click Advanced tab. The Custom Malware categories page appears.

NOTE: In Custom malware categories, you can specify which items should be treatedas malware. When setting up a policy, you can specify that the selected malware items aretreated differently to viruses. For example, you might specify that an alert message is sentto an administrator whenever an infected email message is detected, but make an exceptionwhen a mass-mailer is involved. Mass-mailers spread by generating large numbers of emailmessages, and if an alert was generated for each of these email messages, the number ofalerts generated would only add to the problem.

6 Select the specific malware types from the list or type the detection names you want todetect. When typing in the detection name, you can use wildcard characters for patternmatching.

7 Specify the Clean options for the shared scanner when the cleaning is attempted andthe file is of zero bytes after cleaning. You could keep the file, remove it or treat the scanas failed.

NOTE: Cleaning an item can remove some types of malware. You can specify whetheritems that have already been successfully cleaned should be subject to the custom malwarecheck.

8 Click Packers. The Packer detection page appears.

NOTE: Executable files can be compressed with a packer that shrinks, and possibly encryptsthe original code. A packer can be used to conceal software that is a security risk. Forexample, a packed executable could contain a Trojan horse.

9 Select or deselect Enable detection to enable or disable the detection of packers.

10 Select Exclude specified names or Include only specified names to specify whichpackers can be ignored or detected.

• Click Add to add packer names to a list.

• Click Delete to remove packer names from a list.

NOTE: When specifying packer names, you can use wildcard to match multiple names.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide78

Page 79: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

11 Click PUPs, the Potentially Unwanted Programs detection page appears.

NOTE: In PUPs, you can configure detection for the following PUPs such as Spyware,Adware, Remote administration tools, Dialers, Password crackers, Joke programs and otherPUPs that are not included in the categories.

12 Click Enable detection to enable or disable the detection of PUPs.

NOTE: Click on the disclaimer link and read the disclaimer before configuring PUP detection.

13 Select each type of PUP in Program types to be detected or ignored.

14 Select Exclude specified names or Include only specified name to list by name thePUPs that you want the software to ignore or detect and then click Add.

NOTE: You can use wildcard to match names. For example, type the name of the spywareand click Add. Repeat this step until you have added the names of all the spyware programsyou want the software to ignore or detect.

15 Click Save.

16 In Alert for, click View to see the default anti-virus scanner alert or click Create Newand create a new alert message. For instructions, see the Creating a new alert section.

17 Click Apply.

Creating shared file filtering rule

Task

For option definitions, click ? in the interface.

1 From Policy Manager, click Shared Resource. The Shared Resource page appears.

2 Click the Filter Rules tab.

3 In File Filtering Rules, click Create New. The File Filtering Rule page appears.

4 Type a unique Rule name. Give the rule a meaningful name, so that you can easily identifyit and what it does. For example, FilesOver5MB.

5 In Filename filtering, select Enable file name filtering to enable file filtering accordingto the file names.

6 In Take action when the file name matches, specify the names of the files that areaffected by this rule. You can use the * and ? wildcard characters to match multiplefilenames. For example, if you want to filter any Microsoft PowerPoint files, type *.ppt.

7 In File category filtering, select Enable file category filtering to enable file filteringaccording to their file type.

8 In Take action when the file category is, specify the type of files that are affected bythis rule.

NOTE: File types are divided into categories and subcategories.

9 In File categories, click on a file type. An asterisk symbol (*) appears next to the file typeto indicate that the selected file type will be filtered.

10 In Subcategories, click on the subcategory you want to filter.

NOTE:

• To select more than one subcategory, use Ctrl+Click or Shift+Click.

• To select all of the subcategories, click All.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

79McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 80: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Click Clear selections to undo the last selection.

11 Select Extend this rule to unrecognized file categories to apply this rule to any otherfile categories and subcategories that are not specifically mentioned in the categories andsubcategories lists.

12 In File size filtering, select Enable file size filtering to filter files according to their filesize.

13 In Take action when the file size is, you can select:

• Greater than to specify that the action should only be applied if the file is larger thanthe size specified.

• Less Than to specify that the action should only be applied if the file is smaller thanthe size specified.

14 Click Save, then Apply to return to the policy page.

15 From Policy Manager, select a submenu item that has the file filtering scanner. The policypage for the submenu item appears.

16 Click on a policy name. Select the Active option for the file filtering scanner, then clickFile Filtering.

17 In File Filtering rules and associated actions, select the rule you created from theAvailable rules drop-down menu.

18 Click the Change link of the rule to specify actions that must be taken when afile/attachment in an email message is detected and filtered.

19 Click Save, then Apply.See the Appendix A — Using file filtering rule and actions in a real-time scenario sectionfor more information.

Configuring filter rules and time slotsYou can use this section to create rules that a policy can apply to the content of mails, text inattachments and set up different time slots that can be applied to policies.

Tasks

Creating shared filter rules

Creating shared time slots

Creating shared filter rules

Task

For option definitions, click ? in the interface.

1 From Policy Manager, click Shared Resource. The Shared Resources page appears.

2 Click Filter Rules tab, then click Create New for Content Scanner Rules for a selectedcategory. The New Content Scanner Rule page appears.

3 Type the Rule Name and Description for the rule.

4 UnderWord or Phrase, specify the words or phrases to look for, in The rule will triggerwhen the following word or phrase is found.

• Ignore case — If enabled, the rule is triggered for specified word or phrase in anycase.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide80

Page 81: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Starts a longer word or phrase — If enabled, the rule is triggered for specified textthat begins with the word or phrase.

• UseWildcards— If enabled, the rule is triggered for the specified word or phrase thatcontain wildcard characters. (Wildcard characters are often used in place of one or morecharacters when you do not know what the real character is or you do not want to typethe entire name).

• Ends a longer word or phrase — If enabled, the rule is triggered for specified textthat forms the last part of the word or phrase.

5 Select Specify additional contextual words or phrases, if you want to add contextualwords.

6 Select from Trigger if ALL of the phrases are present, Trigger if ANY of the phrasesare present or Trigger if NONE of the phrases are present from the drop-downmenu.

7 Selectwithin a block of to specify the number of Characters from a block to be scanned.

8 Click Add Contextual word to type additional words or phrases.

9 Specify the word or phrase in Specify words or phrases, then click Add.

10 Under File Format, select Everything to enable all the file categories and its subcategories.You can select multiple categories and file types within the selected categories to bematched. Selecting All in the subcategory selector overrides any other selections that mayhave already been made.

11 Click Clear selections to deselect any of the selected file type options.

12 Click Save, then Apply to save the new rule.

Creating shared time slotsUse this task to set up different time slots that can be applied to policies.

Task

For option definitions, click ? in the interface.

1 From Policy Manager, click Shared Resource. The Shared Resources page appears.

2 Click Time Slots tab.

3 Click Create New. The Time Slot page appears.

4 Type a unique Time slot name.

5 Under Select day and time, select the required day(s).

6 Select All day or Selected hours one wants to put into the created time slot. If you selectSelected hours, select the Start and End time from the drop-down.

7 Click Save, then Apply.

NOTE: Master policies use All the time slot. If you want a policy to be active during adifferent time slot, you must create a subpolicy and specify a different time slot.

Creating shared disclaimer textUse this section to create a single disclaimer that can be used by both policies, instead ofcreating two disclaimers; one for the Internal mail policy, one for the External mail policy. Thedisclaimer can be used as a resource that is shared by more than one policy.

Using the McAfee Security for Lotus Domino user interfacePolicy Manager

81McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 82: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Task

For option definitions, click ? in the interface.

1 From Policy Manager, click Shared Resource. The Shared Resource page appears.

2 Click Scanner & Alerts tab. Select Disclaimer Text from the Category drop-down list.

3 Click Create New to create the disclaimer text.

4 Click Save, then Apply.

5 From Policy Manager, select Internal Mails or External Mails. Click on a policy name,then click Disclaimer Text. The policy page appears listing the Disclaimer selection.

6 In Options, select the shared disclaimer for internal or external email messages.

Settings and DiagnosticsThis section describes the settings and diagnostics you can perform on McAfee Security forLotus Domino.

Contents

Server Specific Settings

Detected Items settings

User Interface Preferences

Diagnostics

Product Log

Import and Export Configuration

Site List Editor

Server Specific SettingsYou can use Server Specific Settings to:

• Enable or disable scanning the incoming and outgoing email messages and the database ofthe Lotus Domino server.

• Exclude applications from being scanned and specify how much resource will be assignedto scanning.

• Set up the email header information to be used when an email message is sent to the systemadministrator notifying them of a change in status or a potential problem.

• Specify whether the administrator is notified of the completion of an on-demand task or anautomatic update task.

Configuring server specific settingsUse this section to configure server specific settings such as configuring scanner settings forthe incoming and outgoing email messages and notification email messages.

Tasks

Specifying scanner settings

Managing email notifications

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide82

Page 83: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Specifying scanner settings

Task

For option definitions, click ? in the interface.

1 Click Settings &Diagnostics | Server Specific Settings. The Server Specific Settingspage appears.

NOTE: If you are using Domino partition servers, you can use specific servers to createemail notifications and scanner settings for Lotus Domino servers.

2 Click Specify Server, to display a list of available partitions. Select a partition, and clickAdd. You can then select that partition from the drop-down list on the top left of the screenand configure its settings.

NOTE: Specific server settings take precedence over the default All settings.

3 Select MailBox Scanning, Sent Items Scanning, Database Scanning to enable thescanning of incoming and outgoing email messages, notes, other documents in the serverdatabase. If the options are disabled, email messages, notes, and other documents arenot scanned.

4 You can specify resources that are to be assigned to Mailbox Scanner Threads orDatabase Scanner Threads.

NOTE: The default value is 5, and the maximum number of threads that can be assignedis 32. We recommend you to select the optimized option.

5 Select the Domino tasks in the Exclude Applications lists and click >> or type theapplication name, then click Add to exclude them from being scanned.

NOTE: Domino tasks include Update, McAfeeAddInMgr, AdminP, Calconn, and so on.

Managing email notifications

Task

For option definitions, click ? in the interface.

1 Click Settings &Diagnostics | Server Specific Settings. The Server Specific Settingspage appears.

2 Click Mail Notifications tab, and type the following information:

• Administrator E-mail — Type the email address of the McAfee Security for LotusDomino administrator.

• Sender E-mail — Information that appears in the email header of any message thatis sent to the McAfee Security for Lotus Domino administrator. This should be theadministrator's email address in SMTP format. If you do not type this address or if youtype an invalid email address, then the users cannot reply to any notifications.

• Notify Administrator — Select the option to send mail notifications to the McAfeeSecurity for Lotus Domino administrator about status changes, such as an on-demandscan scheduling task status change, automatic updates process status change.

• Notification mail domains — To enable a domain for notification, type the domainname in the text box.

3 Click Add, then Apply.

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

83McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 84: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Detected Items settingsWhen McAfee Security for Lotus Domino detects an item, you can specify whether you can usethe local database or McAfee Quarantine Manager for quarantining email messages. You canalso configure communication settings for McAfee Quarantine Manager and maintenance settingsfor the local quarantine database.

Configuring detected itemsThis section provides information about configuring settings when using McAfee QuarantineManager or the local quarantine database for quarantining detected items.

Tasks

Quarantining data using McAfee Quarantine Manager

Quarantining data to the local database

Quarantining data using McAfee Quarantine ManagerMcAfee Quarantine Manager (MQM) can be used as a repository for quarantining infected emailmessages. McAfee products (such as McAfee Security for Lotus Domino) uses a pre-assignedport number to send the detection information to MQM. MQM in turn uses the same port numberby default, to release or send configuration information of the detected email messages to theMcAfee product. The communication ports mentioned in McAfee Security for Lotus Domino andMcAfee Quarantine Manager user interface should be the same.

You can use McAfee Quarantine Manager to consolidate the quarantine and anti-spammanagement functionality. It gives you a central point from which you can analyze and actupon emails and files that have been quarantined. Items are quarantined because they arespam, phish, contain viruses, potentially unwanted software or other undesirable content.McAfee Quarantine Manager is particularly effective in managing unsolicited bulk email or spam.

NOTE: This guide does not provide detailed information about installing or using McAfeeQuarantine Manager software. See McAfee Quarantine Manager v6.0 Product Guide for moreinformation.

Task

1 Install McAfee Security for Lotus Domino on <server 1>.

2 Install McAfee Quarantine Manager version 6.0 on <server 2>.

3 Launch McAfee Security for Lotus Domino user interface from the <server 1>.

4 Click Settings & Diagnostics | Detected Items page.

5 In McAfee Quarantine Manager, select Enabled.

6 Type the IP address of <server 2>, where you have installed McAfee Quarantine Manager.

7 Use the default values for Port and Callback port or modify them as configured on McAfeeQuarantine Manager Server.

8 Click Apply to save the settings.

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide84

Page 85: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Quarantining data to the local database

Task

For option definitions, click ? in the interface.

1 Click Settings & Diagnostics | Detected Items. The Detected Items page appears.

2 In Local Database section, select Specify location of database, select the type ofDatabase location in the first field, then specify a location in the second field accordingly.

3 In Maximum item size (MB), specify the maximum size of an item to be stored in thedatabase.

4 In Maximum query size (records), specify the maximum number of records that canbe returned when the local quarantine database receives a query.

5 In Maximum item age (days), specify the maximum number of days an item will beheld in the local quarantine database before being marked for deletion.

6 Click Edit Schedule of Purge of old items frequency to specify how frequently the olditems marked for deletion must be removed from the database.

7 Click Edit Schedule of Optimization frequency to specify how frequently the databaseis optimized.

8 Click Apply to save the settings.

User Interface PreferencesYou can use User Interface Preferences to configure user interface refresh, report, metric,graph and chart settings.

Configuring the user interfaceYou can use User Interface Preferences to configure the dashboard settings and thegraph/chart settings of McAfee Security for Lotus Domino.

Tasks

Specifying the dashboard settings

Specifying the graph and chart settings

Specifying the dashboard settings

Task

For option definitions, click ? in the interface.

1 Click Settings & Diagnostics | User Interface Preferences. The User InterfacePreferences page appears.

2 In Dashboard Settings tab, select Automatic refresh to specify whether the informationshown on the Dashboard should be refreshed automatically.

3 In Refresh rate (seconds), specify the duration (in seconds) at which the informationon the dashboard should be refreshed.

4 Select Enable reports to enable the reports of recently scanned items, recently postedvirus descriptions, and the top hoaxes on the dashboard.

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

85McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 86: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

5 Select Show recently scanned items to specify whether the recently scanned itemsshould be included in the dashboard reports.

6 InMaximum recently scanned items, specify the maximum number of recently scanneditems that should be included in the dashboard reports.

7 In Graph scale (units), type the measurement units for the scale of the graph that mustbe generated.

8 In Number of hours to report for, type the report generation interval (in hours) togenerate a report.

9 Click Apply.

Specifying the graph and chart settings

Task

For option definitions, click ? in the interface.

1 Click Settings & Diagnostics | User Interface Preferences. The User InterfacePreferences page appears.

2 In the Graph and Chart Settings tab, select 3D to specify whether you want thedashboard graph to be displayed as a three-dimensional (3D) graph.

3 Select Draw transparent to specify whether the bars in a three-dimensional bar graphshould appear solid or transparent. A solid bar will hide part of any bar behind it. Atransparent bar allows you to look through it and see other transparent bars behind it.

4 Select Anti-alias to specify whether you want to use anti-aliasing techniques whendisplaying pie charts. If anti-aliasing is used, you will see smoother curves in pie charts. Ifanti-aliasing is not used, pie chart curves appear jagged.

5 Select Explode pie to specify whether the segments should remain within the circle ofthe pie chart or be shown with some distance between each segment.

6 In Pie angle (degrees), specify the angle to use when drawing pie charts. The defaultvalue is 45.

7 Click Apply.

DiagnosticsDiagnositics is used to collect information from the computer that can be used for debuggingproblems that are reported. This enables customers to select event logs, product logs, tracefiles, etc., which are useful to developers to troubleshoot the issue.

You can use Diagnostics to specify the level of debug logging required, the maximum size ofdebug files, and where they should be saved. You can specify which events should be capturedin the product log and event log by specifying the product log's location, name, size limits, andtime-out settings.

Configuring diagnostic settingsThis section provides information on configuring the debug log, event log and product logsettings.

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide86

Page 87: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Tasks

Specifying debug log settings

Specifying event log settings

Specifying product log settings

Specifying error reporting service settings

Specifying debug log settings

Task

For option definitions, click ? in the interface.

1 Click Settings & Diagnostics | Diagnostics. The Diagnostics page appears.

2 Click Debug Logging tab.

3 From the Level drop-down list, specify the level of information that should be captured inthe debug log. You can select:

• High — To collect large number of log entries.

• Medium — To collect medium number of log entries.

• Low — To collect low number of log entries.

• None — To disable debug logging.

4 Select Limit size of debug log files to specify if you want a size limit for the debug logfiles. In Maximum size of debug log file, specify how large (in megabytes or kilobytes)the debug log files can be.

NOTE: If the debug log file exceeds the specified file size, new log entries are added tothe file by deleting the oldest log entries.

5 Select Specify location for debug files to specify a location for debug files. Select anylocation from the drop-down list and specify the location accordingly:

• <Desktop>

• <Install Folder>

• <System Drive>

• <Program Files>

• <Windows Folder>

• (Full Path)

Avoid using debug logging indiscriminately because it fills up the hard disk space and affectsthe overall performance of the Lotus Domino server. It should be enabled for a limitedduration as advised by an authorized personnel (McAfee technical support engineer).

6 Click Apply.

Specifying event log settings

Task

For option definitions, click ? in the interface.

1 Click Settings & Diagnostics | Diagnostics. The Diagnostics page appears.

2 Click Event Logging tab.

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

87McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 88: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

3 In Product Log section, select Write information events, Write warning events,and Write error events to include these events into the product log.

4 In Event Log section, select Write information events, Write warning events, andWrite error events to include these events into the event log.

5 Click Apply.

Specifying product log settings

Task

For option definitions, click ? in the interface.

1 Click Settings & Diagnostics | Diagnostics. The Diagnostics page appears.

2 Click Product Log tab.

3 In Locations, select Specify location of database to specify whether you want to usethe default location for the product log or a different location. If deselected, the defaultlocation is used. If selected, select a location from the drop-down list and specify thelocation details accordingly:

• <Desktop>

• <Install Folder>

• <System Drive>

• <Program Files>

• <Windows Folder>

• (Full Path)

4 Select Specify filename of database to specify whether you want to use the default filename or a different name. If deselected, the default file name is used. The default Databasefilename is productlog.bin.

5 In Size Limits section:

• Select Limit database size to limit the size of the product log database.

• Type the Maximum database size of the product log database. You can specify thesize in either megabytes or kilobytes.

NOTE: If product log files exceed the specified size, the older log entries are overwrittenby newer log entries.

• Select Limit age of entries to specify a time after which you want the product logentries to be deleted.

• Type the Maximum age of entry to specify how many days an entry should remainin the database before it is deleted.

6 In Advanced section:

• Select Specify a query timeout to limit the amount of time for answering a productlog query.

• Type the Query timeout (seconds) to specify the maximum number of secondsallowed when answering a product log query.

7 Click Apply.

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide88

Page 89: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Specifying error reporting service settings

Task

For option definitions, click ? in the interface.

1 Click Settings & Diagnostics | Diagnostics. The Diagnostics page appears.

2 Click Error Reporting Service tab.

3 Select Enable to enable or disable the error reporting service.

4 Select Catch exceptions to capture information about exceptional events, such as systemcrashes.

5 Select Report exceptions to user to specify whether exceptions should be reported tothe administrator.

6 Click Apply.

Product LogYou can use Product Log to set up search filters that help you find information in the productlog and view the search results.

Using Product Log

Task

For option definitions, click ? in the interface.

1 Click Settings & Diagnostics | Product Log. The Product Log page appears.

2 From the Product Log section, select at least one of these filters:

• ID — Type the number which identifies a specific product log entry.

• Level— Select Information,Warning or Error from the drop-down list in the secondfield depending on the type of log you want to see.

• Description — Type the relevant description. For example: Service Started.

NOTE: You can select up to three search filters.

3 Click All Dates to include all entries, else click Date Range and select a date range fromthe drop-down list.

4 Click Search. A list of detected items matching your search criteria are displayed in theView Results section.

NOTE: Click Clear Filter to return to the default search filter settings and click Export toCSV File to export the list of detections in .CSV format.

5 Click Apply.

Import and Export ConfigurationYou can use Import and Export Configuration to copy the configuration of McAfee Securityfor Lotus Domino computer to a location where it can be imported by other McAfee Securityfor Lotus Domino computer. You can also apply the configuration of a different McAfee Securityfor Lotus Domino system and specify the location from which automatic updates are downloaded.

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

89McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 90: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Importing a Site ListUse this task to import a site list, if you have already created an alternative site list.

Task

For option definitions, click ? in the interface.

1 Click Settings & Diagnostics | Import and Export Configuration. The Import andExport Configurations page appears.

2 Click the Site List tab.

3 From the Import Site List section, click Browse to locate the configuration fileSiteList.xml. The following figure illustrates the default SiteList.xml file.

NOTE: The default location of SiteList.xml file is:C:\Documents and Settings\All Users\Application Data\McAfee\Common Framework

4 Click Import. The new site list overwrites the existing site list.

5 Click Apply.

Importing a configurationUse this task to import a different configuration for this McAfee Security for Lotus Dominosystem.

Task

For option definitions, click ? in the interface.

1 Click Settings & Diagnostics | Import and Export Configuration. The Import andExport Configurations page appears.

2 Click the Configuration tab.

3 From the Import Configuration section, click Browse to locate the configuration file.

4 Click Import.

Exporting the existing configurationUse this task to copy the configuration of a McAfee Security for Lotus Domino system and saveit to a location, where it can be imported by other McAfee Security for Lotus Domino computer(s).

Task

For option definitions, click ? in the interface.

1 Click Settings & Diagnostics | Import and Export Configuration. The Import andExport Configurations page appears.

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide90

Page 91: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

2 Click the Configuration tab.

3 Click Export.

4 Specify a location where to save the file.

5 Click Save. The default name of the configuration file is McAfeeConfigXML.cfg.

Site List EditorSite List specifies the location from where automatic updates (including DAT file and scanningengines) are downloaded. By default, McAfee Security for Lotus Domino uses a site list thatpoints to a McAfee site for automatic updates, but you can use a site list that points to a differentlocation. For example, you may have copied the automatic updates to a local repository andcreated a site list that points your McAfee Security for Lotus Domino systems to that localrepository.

Alternative site lists can be created using the McAfee Update Architecture software or McAfeeePolicy Orchestrator.

To access the Site List Editor:

1 Go to the McAfee Security for Lotus Domino installation directory.<Install Path>\bin\

2 Double-click EditSiteList.exe.

Figure 15: Edit AutoUpdate Repository List

Configuring repositories and proxy settingsUse these tasks to configure your repository list and proxy settings for your repository.

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

91McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 92: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Tasks

Adding a repository

Specifying proxy settings

Adding a repositoryThe Site List specifies from where automatic updates are downloaded. By default, McAfeeSecurity for Lotus Domino uses a site list that points to a McAfee site for automatic updates,but you can use a site list that points to a different location. For example, you may have copiedthe automatic updates to a local repository and created a site list that points your McAfeeSecurity for Lotus Domino systems to that local repository.

Task

For option definitions, click ? in the interface.

1 Go to the McAfee Security for Lotus Domino installation directory.<Install Path>\bin\

2 Double-click EditSiteList.exe. The Edit AutoUpdate Repository List dialog box appears.

3 Click the Repositories tab.

4 Click Add. The Repository Settings dialog box appears.

Figure 16: Repository Settings

5 You can use the following options:

• Repository Description — To give a brief description of the repository.

• Retrieve files from — To specify from which type of repository to retrieve the files.The available options are HTTP repository, FTP repository, UNC Path, and LocalPath.

• URL — To specify the URL of the repository.

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide92

Page 93: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

• Port — To specify the port number of the repository.

• Use Authentication — To enable user authentication to access the repository.

6 Specify a user name and password for authentication of the repository and confirm thepassword by typing it again.

7 Click OK to add the new repository to the Repository Description list.

8 Click OK to close the Edit AutoUpdate Repository List dialog box.

Specifying proxy settingsIf a repository must be accessed via Internet, such as the McAfee update site or an internalrepository, the McAfee Security for Lotus Domino software can use proxy settings to connectto the repository. If your organization uses proxy servers for connecting to the Internet, youcan select the Proxy settings option.

Task

For option definitions, click ? in the interface.

1 Go to the McAfee Security for Lotus Domino installation directory.<Install Path>\bin\

2 Double-click EditSiteList.exe. The Edit AutoUpdate Repository List dialog box appears.

3 Click the Proxy settings tab.

Figure 17: Proxy settings

4 Select the Use Internet Explorer proxy settings or Manually configure the proxysettings option as required.

5 Type the IP address and port number of the HTTP or FTP server.

6 You can use the following options:

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

93McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 94: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Use Authentication — To enable user authentication to access the proxy server.•

• Username — To specify a username for authentication to access the proxy server.

• Password — To specify a password.

• Confirm Password — To reconfirm the specified password.

• Exceptions— To bypass a proxy server for specific domain(s). Click Exceptions, thenselect Specify Exceptions and type the domain(s) that needs to be bypassed.

7 Click OK.

Using the McAfee Security for Lotus Domino user interfaceSettings and Diagnostics

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide94

Page 95: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Integrating with ePolicy Orchestrator 3.6.1This chapter describes how to configure McAfee Security for Lotus Domino, v7.5 (Windows)using McAfee ePolicy Orchestrator management software version 3.6.1. To use this chaptereffectively, you need to be familiar with ePolicy Orchestrator 3.6.1.

McAfee ePolicy Orchestrator 3.6.1 provides a scalable platform for centralized policy managementand enforcement on your McAfee security products and systems on which they reside. It alsoprovides comprehensive reporting and product deployment capabilities; all through a singlepoint of control.

NOTE: This guide does not provide detailed information about installing or using ePolicyOrchestrator software. See the McAfee ePolicy Orchestrator 3.6.1 - Installation/Product Guide.

Contents

Prerequisites

Installing McAfee Security for Lotus Domino using ePolicy Orchestrator

Activation task using ePolicy Orchestrator

Setting policies within ePolicy Orchestrator

Scheduling tasks

Configuring reports

Uninstallation

PrerequisitesBefore you can use the ePolicy Orchestrator 3.6.1 software to manage McAfee Security forLotus Domino:

• Check-in appropriate Network Associate Package (.NAP) files for McAfee Security for LotusDomino in the ePolicy Orchestrator software repository.

• Install the ePolicy Orchestrator agent on the client computer.

The ePolicy Orchestrator agent is a component of ePolicy Orchestrator that must be installedon each computer on the network. The agent collects and sends information between the ePolicyOrchestrator server, repositories, and manages McAfee Security for Lotus Domino installationsacross the network.

95McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 96: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Installing McAfee Security for Lotus Domino usingePolicy Orchestrator

Assumptions

• Computer 1 — ePolicy Orchestrator version 3.6.1 with the latest patches is installed andconfigured on a supported operating system.

• Computer 2 — Supported version of IBM Lotus Domino server is installed and configured asa single partition server or multi partition server.

• The client computer (Domino server) is added into the ePolicy Orchestrator's managed serverlist under the Directory branch.

• The McAfee Common Agent version installed on the ePolicy Orchestrator server should beupgraded from version 3.5 to version 3.6.0.444.

• From ePolicy Orchestrator server console, ePolicy Orchestrator agent is installed or pushedon the domino server.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Create a temporary directory on your local drive.

3 To install, do one of the following depending on how you obtained the software:

• Insert the CD into the computer's drive and copy the installation files into the temporarydirectory you created.

• Download theMSDW75ENL.ZIP (licensed version) orMSDW75ENE.ZIP (evaluationversion) archive and extract the file to a temporary directory.

Creating a new site1 Right-click Directory | New | Site. The Add Sites dialog box appears.

2 Click Add.... The New Site dialog box appears.

3 Type the Name for the new site. If the new site is a domain and you want to include allthe computers under the domain, select Domain and Include computers as childnodes.

4 Click OK to add the new site. The Add Site dialog box appears.

5 Deselect Send agent package.

6 Click OK, to add the new site <McAfee_Security_for_Lotus_Domino_75_Domain>to the left pane.

Adding a computer to the site1 Right-click Directory |<McAfee_Security_for_Lotus_Domino_75_Domino> | New

| Computer. The Add Computers dialog box appears.

2 Click Browse, to select the computer from the network and click OK. The Add Computersdialog box appears.

Integrating with ePolicy Orchestrator 3.6.1Installing McAfee Security for Lotus Domino using ePolicy Orchestrator

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide96

Page 97: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

3 Select Send agent package.

NOTE: If you deselect Suppress agent installation GUI, the agent installation userinterface will not appear on the client computer during installation.

4 In Credentials for Agent Push Installation, type the user account and password toaccess the client computer.

5 Click OK to send the agent to the new computer added.

Adding Package files to the Repository1 Click Repository. The Repository page appears.

2 Click Check in package. The Check in package dialog box appears.

3 Click Next. The Check in package, select package type dialog box appears.

4 Select Products or updates and click Next. The Check in package, browse dialog boxappears.

5 Click Browse and navigate to the temporary folder, where you have extracted theinstallation package.

6 Select the PkgCatalog.z file, click Open, then click Next, the Check in package dialogbox appears displaying the Product Name, Version, Package type and Language.

7 Click Finish, to check in the package file.

8 Click Close, once the check-in process is complete.

Adding Software NAP file to the Repository1 Click Check in NAP. The Software Repository Configuration Wizard dialog box

appears.

2 Select Add new software to be managed and click Next. The Select a softwarepackage dialog box appears.

3 Select the product NAP file (MSDWIN75.NAP) from the temporary folder and click Open.The NAP file is extracted and copied to the ePolicy Orchestrator repository. A messagedialog box appears upon successful completion.

4 Click OK to close the message dialog box.

Adding Reports NAP file to the Repository1 Click Check in NAP. The Software Repository Configuration Wizard dialog box

appears.

2 Select Add new reports and click Next. The Select a software package dialog boxappears.

3 Select the report NAP file (MSDWIN7500_Reports.NAP) from the temporary folderand click Open. The report NAP file is extracted and copied to the ePolicy Orchestratorrepository. A message dialog box appears upon successful completion.

4 Click OK to close the message dialog box.

Integrating with ePolicy Orchestrator 3.6.1Installing McAfee Security for Lotus Domino using ePolicy Orchestrator

97McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 98: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Deploying McAfee Security for Lotus Domino1 QUIT Lotus Domino server on the client computer.

2 From the ePolicy Orchestrator console, select the Site or the domino server on which youintend to install McAfee Security for Lotus Domino and click the Tasks tab. TheDeployment Task page appears.

3 Double-click the Deployment task. The ePolicy Orchestrator Scheduler dialog boxappears.

4 Deselect Inherit under the Tasks tab and select Enable (scheduled task runs atspecified time).

5 Click Settings under the Tasks tab. The Task Settings page appears.

6 Deselect Inherit. From the listed products, select Install from the list item given againstMcAfee Security for Lotus Domino 7.5.0.

7 Deselect Run this task at every policy enforcement interval, then click OK.

8 Go to Schedule tab. Deselect Inherit.

9 From the Schedule Task list item, select Run Immediately and click Apply.

10 Click OK to complete the deployment task.

11 From the ePolicy Orchestrator console, right-click the Site or the domino server on whichyou intend to install McAfee Security for Lotus Domino and click Agent Wakeup Call. TheAgent Wakeup Call dialog box appears.

12 In the Agent Wakeup Call dialog box, change the Agent randomization to 0 (zero)minutes.

13 Select Get full product properties and click OK to complete the installation.

14 Go to the computer, site or the domino server on which you are installingMcAfee Securityfor Lotus Domino.

15 Double-click the ePolicy Orchestrator Agent Monitor icon in the system tray. Themonitor should displays the status of the deployment task.

NOTE: All the Domino servers will be protected by default as a standalone server andshould not be configured for replication of product configuration settings when managedby ePolicy Orchestrator server. After scheduling protect/unprotect task from ePolicyOrchestrator server, make sure the domino servers are restarted.

Activation task using ePolicy OrchestratorIf you have installed the evaluation version of the McAfee Security for Lotus Domino or theAnti-Spam add-on component using ePolicy Orchestrator, you can convert them to the licensedversion using ePolicy Orchestrator.

Checking-in the software activation package to the ePolicy Orchestrator server

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Repository. The Repository page appears.

3 Click Check in package. The Check in package dialog box appears.

Integrating with ePolicy Orchestrator 3.6.1Activation task using ePolicy Orchestrator

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide98

Page 99: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

4 Click Next. The Check in package, select package type dialog box appears.

5 Select Products or updates and click Next. The Check in package, browse dialog boxappears.

6 Click Browse and navigate to the temporary folder, where you have extracted theinstallation package.

7 From EvaltoLic folder, select the PkgCatalog.z file, click Open, then click Next, theCheck in package dialog box appears displaying the Product Name, Version, Packagetype and Language.

8 Click Finish, to check in the package file.

9 Click Close, once the check-in process is complete.

Installing the activation package on client computers

Task

1 From the ePolicy Orchestrator console, select the Site or the domino server on which youintend to install McAfee Security for Lotus Domino and click the Tasks tab. TheDeployment Task page appears.

2 Double-click the Deployment task. The ePolicy Orchestrator Scheduler dialog boxappears.

3 Deselect Inherit under the Tasks tab and select Enable (scheduled task runs atspecified time).

4 Click Settings under the Tasks tab. The Task Settings page appears.

5 Deselect Inherit. From the listed products, select Install from the list item given againstActivation Package for McAfee Security for Lotus Domino (Windows) 7.5.

6 Deselect Run this task at every policy enforcement interval, then click OK.

7 Go to Schedule tab. Deselect Inherit.

8 From the Schedule Task list item, select Run Immediately and click Apply.

9 Click OK to complete the deployment task.

10 From the ePolicy Orchestrator console, right-click the Site or the domino server on whichyou intend to install McAfee Security for Lotus Domino and click Agent Wakeup Call. TheAgent Wakeup Call dialog box appears.

11 In the Agent Wakeup Call dialog box, change the Agent randomization to 0 (zero)minutes.

NOTE: To test your installation, click the Licenses tab on the McAfee Security for LotusDomino dashboard. The license status of the McAfee Security for Lotus Domino softwareor the Anti-Spam add-on component must be Licensed.

It might take a few minutes for the software to register the change within the user interface.You might need to refresh the page.

Setting policies within ePolicy OrchestratorThe ePolicy Orchestrator console allows you to enforce policies across groups of computers oron a single computer. These policies override configurations set on individual computers. For

Integrating with ePolicy Orchestrator 3.6.1Setting policies within ePolicy Orchestrator

99McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 100: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

information regarding policies and how they are enforced, see the McAfee ePolicy Orchestrator3.6.1 Product Guide.

Before configuring any policies, select the group of computers for which you want to modifyMcAfee Security for Lotus Domino policies. You can modify McAfee Security for Lotus Dominopolicies from the pages and tabs that are available in the details pane of the ePolicy Orchestratorconsole. These pages are nearly identical to those you can access directly from the McAfeeSecurity for Lotus Domino user interface.

After you have modified the appropriate policies and saved the changes for the intendedcomputer or group of computers, you are ready to deploy new settings via the ePolicyOrchestrator agent.

Creating or editing policies

Enforcing policies

Creating or editing policiesYou can create, edit, delete, or assign a policy to a specific group in the System Tree.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 In the console tree under ePolicy Orchestrator | <SERVER> | Directory, select thesite, group, single computer, or the entire directory to which these policies are to apply.

3 The Policies, Properties, and Tasks tabs appear in the Details pane.

4 Under McAfee Security for Lotus Domino, click McAfee Default for a Category toview the default policy settings.

5 Click the Policy Name drop-down list and select New Policy. The Create a new policydialog box appears.

NOTE: To edit a policy, click Edit for a Category in the McAfee Security for LotusDomino entry. You cannot configure the McAfee Default policy settings for a selectedCategory. To configure a selected category, you must create a new policy for the selectedCategory. For more information on policies, see the Policy Manager section.

Table 3: Policy OptionsDescriptionOption

Type the new policy name for the Category you wantto create.

New policy name

Creates a duplicate policy for the selected Category.Select the policy from the drop-down list.

Duplicate the following policy

Creates a new policy in which all the policy tab settingsare inherited.

Create a policy in which all tabs inherit

6 Configure the required options from the original policy, then click OK to create the newpolicy.

7 Click Apply to save these settings.

Enforcing policiesYou can enforce a policy to multiple managed systems within a group.

Integrating with ePolicy Orchestrator 3.6.1Setting policies within ePolicy Orchestrator

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide100

Page 101: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Edit for Enforce Policies in the McAfee Security for Lotus Domino entry.

3 Click the Policy Name drop-down list and select Yes.

4 Click Apply, to enforce the policies that you just configured.

5 Send an agent wake-up call. For instructions on sending an agent wake-up call, see Sendingan agent wake-up call section.

Scheduling tasksWhen McAfee Security for Lotus Domino scans for viruses, spam, phish, it uses information inthe DAT and Rule files to find them. Many new threats are discovered daily, and McAfee regularlycreates new DAT files to provide protection from these viruses. To ensure the best protection,you can use ePolicy Orchestrator to inform where to access the latest update files, and createschedules for replacing earlier DAT and Rule files, and running on-demand scans.

Tasks

Creating an AutoUpdate task

Creating an on-demand scan task

Creating a server protection task

Creating a compaction task

Creating a purge task

Creating a status report task

Creating a configuration report task

Creating an AutoUpdate taskYour software can only provide full protection if you keep it up-to-date with the latest anti-virusdefinitions (DATs), spam engine, and anti-virus scanning engine. We recommend that youupdate DAT files daily and regularly check the McAfee AVERT (Anti-Virus Emergency ResponseTeam) website for new DAT files. Use this task to schedule autoupdates on the Domino serverusing ePolicy Orchestrator.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 In the console tree under ePolicy Orchestrator, right-click Directory or the site, group,or host, then select Schedule Task. The Schedule Task dialog box appears.

3 Type in a New Task Name.

4 Select AutoUpdate Task (McAfee Security for Lotus Domino, v7.5 (Windows))from the Software/Task Type list.

5 Click OK to create the task.

Integrating with ePolicy Orchestrator 3.6.1Scheduling tasks

101McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 102: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Editing an AutoUpdate taskAfter you have created a new AutoUpdate task, you can configure the task as required.

Task

1 From the Tasks tab in the Details pane, right-click the task, then select Edit Task.TheePolicy Orchestrator Scheduler dialog box appears.

2 Click Settings and edit the required options in the Task and Schedule tabs. The UpdateTask page appears with message No additional settings are required for this task.

NOTE: AutoUpdate is configured to access the latest DAT/Engine from McAfee website.

Creating an on-demand scan taskUse this task to schedule an on-demand scan on the Domino server using ePolicy Orchestrator.On-demand scan task involves a scheduled scanning of your Lotus Domino server(s) to find athreat, vulnerability, or other potentially unwanted code. It can take place immediately, at ascheduled time in the future, or at regularly-scheduled intervals.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 In the console tree under ePolicy Orchestrator, right-click Directory or the site, group,or host, then select Schedule Task. The Schedule Task dialog box appears.

3 Type in a New Task Name.

4 Select OnDemand Scan (McAfee Security for Lotus Domino, v7.5 (Windows)) fromthe Software/Task Type list.

5 Click OK to create the task.

Editing an on-demand scan task1 Right-click the task and select the Edit Task option. The ePolicy Orchestrator Scheduler

appears.

2 Click Settings. The On-Demand Scan Configuration page appears where you canchoose inclusions, exclusions and configure settings for the on-demand task in the scheduledscan.

3 Deselect Inherited.

• Choose Inclusions — includes files and directories in the scan.

• Choose Exclusions — excludes files and directories from the scan.

• Configure Settings — configure general and advanced sc an options for the scan.

4 Click OK.

Creating a server protection taskUse this task to protect or unprotect your Domino servers using ePolicy Orchestrator. Serverprotection task involves protecting the selected Lotus Domino server(s) in your network. You

Integrating with ePolicy Orchestrator 3.6.1Scheduling tasks

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide102

Page 103: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

can select the required servers to be protected from a threat, vulnerability, or other potentiallyunwanted code.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 In the console tree under ePolicy Orchestrator, right-click Directory or the site, group,or host, then select Schedule Task. The Schedule Task dialog box appears.

3 Type in a New Task Name.

4 Select Server Protection Task (McAfee Security for Lotus Domino, v7.5 (Windows))from the Software/Task Type list.

5 Click OK to create the task.

Editing a server protection task1 Right-click the task and select the Edit Task option. The ePolicy Orchestrator Scheduler

appears.

2 Click Settings. The Server protection task page appears.

3 Deselect Inherited.

• Select Protect ALL servers to protect all managed servers.

• Select Unprotect ALL servers to unprotect all the managed servers.

4 From Custom configurations, you can also Specify the server names which haveto be Protected in the respective fields.

5 Click OK.

Creating a compaction taskUse this task to schedule a compaction task on the Domino server using ePolicy Orchestrator.Compaction task involves reducing the size of the McAfee Security for Lotus Domino database.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 In the console tree under ePolicy Orchestrator, right-click Directory or the site, group,or host, then select Schedule Task. The Schedule Task dialog box appears.

3 Type in a New Task Name.

4 Select Compaction Task (McAfee Security for Lotus Domino, v7.5 (Windows))from the Software/Task Type list.

5 Click OK to create the task.

Creating a purge taskUse this task to schedule a purge task on the Domino server using ePolicy Orchestrator. Purgetask allows you to delete old entries/files from the McAfee Security for Lotus Domino serverand retain the recent files.

Integrating with ePolicy Orchestrator 3.6.1Scheduling tasks

103McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 104: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 In the console tree under ePolicy Orchestrator, right-click Directory or the site, group,or host, then select Schedule Task. The Schedule Task dialog box appears.

3 Type in a New Task Name.

4 Select Purge Task (McAfee Security for Lotus Domino, v7.5 (Windows)) from theSoftware/Task Type list.

5 Click OK to create the task.

Creating a status report taskUse this task to schedule a status report which is sent to an administrator at a specific time.The report contains detection statistics within that specified time frame. You can choose a time,recipient email address/distribution list to send the report to, and a subject for the email. Reportsare sent in HTML or CSV format.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 In the console tree under ePolicy Orchestrator, right-click Directory or the site, group,or host, then select Schedule Task. The Schedule Task dialog box appears.

3 Type in a New Task Name.

4 Select Status Report Task (McAfee Security for Lotus Domino, v7.5 (Windows))from the Software/Task Type list.

5 Click OK to create the task.

Creating a configuration report taskUse this task to schedule a configuration report which is sent to an administrator at a specifictime. The configuration report will have a summary of product configurations such as: serverinformation, version information, license status and type, product information, debug logginginformation, on-access settings, and on-access policies.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 In the console tree under ePolicy Orchestrator, right-click Directory or the site, group,or host, then select Schedule Task. The Schedule Task dialog box appears.

3 Type in a New Task Name.

4 Select Configuration Report Task (McAfee Security for Lotus Domino, v7.5(Windows)) from the Software/Task Type list.

5 Click OK to create the task.

Integrating with ePolicy Orchestrator 3.6.1Scheduling tasks

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide104

Page 105: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Configuring reportsReports are pre-defined queries which query the ePolicy Orchestrator database and generatea graphical output. McAfee ePolicy Orchestrator 3.6.1 has its own querying and reportingcapabilities. McAfee includes a set of default queries on the left pane. However, you can createa new query, edit, and manage all the queries related to McAfee Security for Lotus Domino.

From the ePolicy Orchestrator console, you can view reports which show how the McAfeeSecurity for Lotus Domino installed client computers are handling infections, and you can checkthe configurations that have been set up on the hosts. You can also create reports using datasent by the agent in the selected ePolicy Orchestrator database. You can save the selectionsyou make in the Enter Report Inputs and Report Data Filter dialog boxes for future use.

ePolicy Orchestrator reports allow you to:

Set a directory filter to gather only the information that you want to view. When setting thisfilter, you can choose which part of the ePolicy Orchestrator console tree is included in thereport.

• Set a data filter, by using logical operators, to define precise filters on the data returned bythe report.

• Generate graphical reports from the information in the database, and filter the reports asdesired. You can print the reports and export them for use in other software.

• Conduct queries of computers, events, and installations.

There are several ways in which you can control what data appears on reports. You can definethe version number of virus definition files, virus scanning engines, and supported productsthat need to be installed on Macintosh client computers for them to be considered compliantbased on your company’s anti-virus and security program. You can also limit the results ofreports by selected product criteria. (For example, computer name, operating system, virusname, or action taken on infected files.) Once the results of a report appear, you can thenperform a number of tasks on the data. You can view details on required report data. (Forexample, to determine which client computers do not have a compliant version of McAfeeSecurity for Lotus Domino). Some reports even provide links to other reports, called sub-reports,that provide data related to the current report. You can also print reports or export report datainto a variety of file formats, including HTML and Microsoft Excel.

To run a report:

1 Log on to the ePolicy Orchestrator server as an administrator.

NOTE: If the pre-defined queries on the left side does not serve your purpose, ePolicyOrchestrator enables you to create your own queries.

2 Select the desired McAfee Security for Lotus Domino report under Reporting | ePODatabases | <database server> | Reports | <McAfee Security for Domino> inthe console tree.

• If the Current Protection Standards dialog box appears, specify the version of virusdefinition files or the virus scanning engine on which you want to report.

• If the Report Inputs dialog box appears, make selections on any of the tabs that mayappear: Rules, Layout, Data Grouping, Within, Saved Settings.

Integrating with ePolicy Orchestrator 3.6.1Configuring reports

105McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 106: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

3 Select the report (Agent Versions) you want to generate, then set the data filter in theReport Data Filter dialog box, then click OK.

NOTE: Tabs may vary based on which report is selected. See McAfee ePolicy Orchestrator3.6.1 Product Guide for more details on all the available settings tabs.

UninstallationThis section provides instructions to uninstall McAfee Security for Lotus Domino from the clientcomputers and remove the extensions from the ePolicy Orchestrator server.

Removing McAfee Security for Lotus Domino from the client computer

Removing McAfee Security for Lotus Domino from ePolicy Orchestrator

Removing McAfee Security for Lotus Domino from the clientcomputer

NOTE: QUIT Lotus Domino server on the client computer.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 From the ePolicy Orchestrator console, select the Site or the domino server on which youintend to remove McAfee Security for Lotus Domino and click the Tasks tab. TheDeployment Task page appears.

3 Double-click the Deployment task. The ePolicy Orchestrator Scheduler dialog boxappears.

4 Deselect Inherit under the Tasks tab and select Enable (scheduled task runs atspecified time).

5 Click Settings under the Tasks tab. The Task Settings page appears.

6 Deselect Inherit. From the listed products, select Remove from the list item given againstMcAfee Security for Lotus Domino.

7 Deselect Run this task at every policy enforcement interval, then click OK.

8 From the Schedule tab, deselect Inherit.

9 From the Schedule Task list item, select Run Immediately and click Apply.

10 Click OK, then run the Agent Wakeup Call to uninstall the software from the clientcomputer.

Removing McAfee Security for Lotus Domino from ePolicyOrchestrator

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Repository | Managed Products | Windows | McAfee Security for LotusDomino in the console tree.

Integrating with ePolicy Orchestrator 3.6.1Uninstallation

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide106

Page 107: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

3 Right-click 7.5 and select Remove to uninstall McAfee Security for Lotus DominoNAP from the ePolicy Orchestrator server .

Integrating with ePolicy Orchestrator 3.6.1Uninstallation

107McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 108: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Integrating with ePolicy Orchestrator 4.0This chapter describes how to configure McAfee Security for Lotus Domino using McAfee ePolicyOrchestrator management software version 4.0. To use this chapter effectively, you need tobe familiar with ePolicy Orchestrator 4.0.

McAfee ePolicy Orchestrator 4.0 provides a scalable platform for centralized policy managementand enforcement on your McAfee security products and systems on which they reside. It alsoprovides comprehensive reporting and product deployment capabilities; all through a singlepoint of control.

NOTE: This guide does not provide detailed information about installing or using ePolicyOrchestrator software. See the McAfee ePolicy Orchestrator 4.0 - Installation/Product Guide.

Contents

Prerequisites

Installing McAfee Security for Lotus Domino using ePolicy Orchestrator

Activation task using ePolicy Orchestrator

Sending an agent wake-up call

Setting policies within ePolicy Orchestrator

Scheduling tasks

Configuring reports

Uninstallation

PrerequisitesBefore using the ePolicy Orchestrator software to manage McAfee Security for Lotus Domino,install the McAfee Agent on the client computer running Lotus Domino. The McAfee Agentversion installed on the ePolicy Orchestrator server should be upgraded to version 4.0 Patch1.To install McAfee Agent 4.0 Patch1, refer to the Release Notes for McAfee Agent 4.0 Patch1.

McAfee Agent is a component of ePolicy Orchestrator that must be installed on each computeron the network. The Agent collects and sends information between the ePolicy Orchestratorserver, repositories, and manages McAfee Security for Lotus Domino installations across thenetwork.

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide108

Page 109: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Installing McAfee Security for Lotus Domino usingePolicy Orchestrator

Assumptions

• Computer 1 — McAfee ePolicy Orchestrator version 4.0 software is installed and configuredon a supported operating system.

• Computer 2 — Supported version of IBM Lotus Domino server is installed and configured asa single partition server or multi-partition server.

NOTE: All Lotus Domino servers will be protected by default as a standalone server and shouldnot be configured for replication of product configuration settings when managed by ePolicyOrchestrator server. QUIT Lotus Domino server on the client computer.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Create a temporary directory on your local drive.

3 To install, do one of the following depending on how you obtained the software:

• Insert the CD into the computer's drive and copy the installation files into the temporarydirectory you created.

• Download theMSDW75ENL.ZIP (licensed version) orMSDW75ENE.ZIP (evaluationversion) archive and extract the file to a temporary directory.

4 Click Software |Master Repository | Check In Package. The Package page appears.

5 Select the Package type as Product or Update (.ZIP) and browse in File path to locatemsdw-7.5.<buildnumber>-<language>-lic-depl-pkg (licensed version) ormsdw-7.5.<buildnumber>-<language>-eval-depl-pkg (evaluation version) extractedin the temporary directory.

NOTE: To check-in the Anti-Spam add-on component, add theasaddon-<buildnumber>-<language>-en-eval-depl-pkg.zip file.

6 Click Next. The Package Options page appears with the package information.

7 Select a Branch.

8 In Options, select the required option(s), then click Save.

9 Click Systems | System Tree | Client Tasks | New Task to install McAfee Security forLotus Domino on the client Lotus Domino server. The Client Task Builder page appears.

10 In Description, type a Name, Notes for the task and select the Type as ProductDeployment (McAfee Agent), then click Next.

11 In Configuration, select the Target Platforms as Windows.

12 In Products and components, select McAfee Security for Lotus Domino 7.5 fromthe drop-down list, then select the Action as Install.

NOTE: To deploy theMcAfee Anti-Spam add-on component to the Lotus Domino server,select McAfee Anti-Spam Add-on (Eval) 7.5 from the drop-down list.

13 Click Next to schedule this task immediately or as required.

14 Click Next to view a summary of the task.

15 Click Save and send an agent wake-up call. Wait for the deployment task to complete.

Integrating with ePolicy Orchestrator 4.0Installing McAfee Security for Lotus Domino using ePolicy Orchestrator

109McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 110: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

16 Click Configuration | Extensions | Install Extension to install the McAfee Security forLotus Domino policy extensions. The Install Extension dialog box appears.

17 Click Browse, select the extension file MSDW_7500_0409.ZIP, then click OK on theInstall Extension page.

18 Click Configuration | Extensions | Install Extension to install the McAfee Security forLotus Domino report extensions. The Install Extension dialog box appears.

19 Click Browse, select the extension file MSDW7REPORTS.ZIP, then click OK on theInstall Extension page.

Activation task using ePolicy OrchestratorIf you have installed the evaluation version of the McAfee Security for Lotus Domino or theAnti-Spam add-on component using ePolicy Orchestrator, you can convert them to the licensedversion using ePolicy Orchestrator.

Checking-in the software activation package to the ePolicy Orchestrator server

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Save the msdw-7.5.<build number>-<language>-actv-pkg.zip orasaddon-<buildnumber>-<language>-actv-pkg.zip ePolicy Orchestrator deploymentactivation package in a temporary location.

3 In the ePolicy Orchestrator console tree, click Software | Master Repository | CheckIn Package. The Check In Package wizard appears.

4 In Package page, select the Package type as Product or Update (.ZIP) and browseto locate and add themsdw-7.5.<build number>-<language>-actv-pkg.zip extractedin a temporary directory.

NOTE: To check-in the Anti-Spam add-on component activation package to the ePolicyOrchestrator server, check-in asaddon-7.5.<build number>-<language>-actv-pkg.zipsaved in a temporary location.

5 Click Next. The Package Options page appears with the package information.

6 Select the Branch as Current, then click Save.

Installing the activation package on client computers

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Systems | System Tree and select a required group or system(s).

3 From the Client Tasks tab, click New Task.

4 Type aName,Notes for the task and select the Type as Product Deployment (McAfeeAgent), then click Next. The Configuration page appears.

5 Select the Target Platforms as Windows to install the package.

Integrating with ePolicy Orchestrator 4.0Activation task using ePolicy Orchestrator

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide110

Page 111: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

6 In Products and Components, select Activation Package for McAfee Security forLotus Domino 7.5, select the Action as Install, then select an appropriate Languagefrom the drop-down list.

NOTE: To install the Anti-Spam add-on component on the client computer(s), selectActivation Package For McAfee Anti-Spam Add-on 7.5 in Products andComponents.

The Remove option is not supported.

7 Click Next to schedule this task immediately or as required.

8 Click Next to view a summary of the task, then click Save.

9 Send an agent wake-up call.

NOTE: To test your installation, click the Licenses tab on the McAfee Security for LotusDomino dashboard. The license status of the McAfee Security for Lotus Domino softwareor the Anti-Spam add-on component must be Licensed.

It might take a few minutes for the software to register the change within the user interface.You might need to refresh the page.

Sending an agent wake-up callAll systems in the network are managed in the Systems tab. The System Tree contains allsystems that are managed by the ePolicy Orchestrator server. It is the primary interface formanaging policies and tasks on these systems. You can organize or sort these systems intological groups in the System Tree.

MyOrganization is the root of the System Tree. It includes a Lost&Found group that storessystems whose locations cannot be determined by the server. Depending on the methods youuse to create and maintain the System Tree segments (systems), the server uses differentcharacteristics to place the systems in the System Tree.

NOTE: For information on adding a new system, refer to the McAfee ePolicy Orchestrator 4.0Product Guide.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Systems.

3 Select a group in the System Tree.

4 Select the Computer Name(s) of that group.

5 Click More Actions | Wake Up Agent. The Wake Up Agents page appears.

6 Select a Wake-up call type and a Randomization period (0-60 minutes) by which thesystem(s) respond to the wake-up call sent by the ePolicy Orchestrator server.

7 Select Get full product properties for the agent(s) to send complete properties insteadof sending only those that have changed since the last agent-to-server communication.

8 Click OK.

NOTE: Navigate to Server Task Log to see the status of the agent wake-up call.

Integrating with ePolicy Orchestrator 4.0Sending an agent wake-up call

111McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 112: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Setting policies within ePolicy OrchestratorThe ePolicy Orchestrator console allows you to enforce policies across groups of computers oron a single computer. These policies override configurations set on individual computers. Forinformation regarding policies and how they are enforced, see the McAfee ePolicy Orchestrator4.0 Product Guide.

Before configuring any policies, select the group of computers for which you want to modifyMcAfee Security for Lotus Domino policies. You can modify McAfee Security for Lotus Dominopolicies from the pages and tabs that are available in the details pane of the ePolicy Orchestratorconsole. These pages are nearly identical to those you can access directly from the McAfeeSecurity for Lotus Domino user interface.

After you have modified the appropriate policies and saved the changes for the intendedcomputer or group of computers, you are ready to deploy new settings via the ePolicyOrchestrator agent.

Creating or editing policies

Enforcing policies

Creating or editing policiesYou can create, edit, delete, or assign a policy to a specific group in the System Tree.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Systems | System Tree | Policies. The Policies page appears.

3 Select Product asMcAfee Security for Lotus Domino 7.5.x.x. A list of policies managedby McAfee Security for Lotus Domino appears in the lower pane.

4 Locate the requiired policy, and click Edit Assignment next to the policy. The policyassignment for the chosen group page appears.

5 Click Edit Policy or New Policy as required.

NOTE: If you click New Policy, the Create a new policy dialog box appears. Select thepolicy you want to duplicate from the Create a policy based on this existing policydrop-down list, type a name then click OK. The new policy wizard appears.

6 Edit the policy setting as required, then click Save.

Enforcing policiesYou can enforce a policy to multiple managed systems within a group.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Systems | System Tree and select a required group or system(s).

3 Click Assign Policy. The Assigning Policy for <n> system page appears.

4 Select the Product, Category, and Policy from the drop-down menu, then click Save.

5 Select the systems again.

Integrating with ePolicy Orchestrator 4.0Setting policies within ePolicy Orchestrator

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide112

Page 113: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

6 Send an agent wake-up call. For instructions on sending an agent wake-up call, pleaserefer to Sending an agent wake-up call section.

NOTE: You can create and enforce McAfee Security for Lotus Domino policies and viewreports only after adding the McAfee Security for Lotus Domino extension files.

Scheduling tasksThe ePolicy Orchestrator software allows you to create, schedule, and maintain client tasks thatrun on the managed systems. You can define client tasks for the entire System Tree, a specificgroup, or an individual system.

Tasks

Creating an AutoUpdate task

Creating an on-demand scan task

Creating a server protection task

Creating a compaction task

Creating a purge task

Creating a status report task

Creating a configuration report task

Creating an AutoUpdate taskYour software can only provide full protection if you keep it up-to-date with the latest anti-virusdefinitions (DATs), spam engine, and anti-virus scanning engine. We recommend that youupdate DAT files daily and regularly check the McAfee AVERT (Anti-Virus Emergency ResponseTeam) website for new DAT files. Use this task to schedule autoupdates on the Domino serverusing ePolicy Orchestrator.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Systems | System Tree and select a required group or system(s).

3 From Client Tasks, select the required group in the System Tree for which you want tocreate the AutoUpdate task.

4 Click New Task. The Client Task Builder page appears.

5 In Description, type a Name and Notes (if required) for the AutoUpdate task.

6 Select AutoUpdate Task (McAfee Security for Lotus Domino, v7.5 (Windows)) asthe Type of the task and click Next.

7 Schedule the task immediately or as required, then click Next to view the Summary ofthe autoupdate task.

8 Click Save.

9 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of an autoupdate task or Delete toremove it.

Integrating with ePolicy Orchestrator 4.0Scheduling tasks

113McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 114: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Creating an on-demand scan taskUse this task to schedule an on-demand scan on the Domino server using ePolicy Orchestrator.On-demand scan task involves a scheduled scanning of your Lotus Domino server(s) to find athreat, vulnerability, or other potentially unwanted code. It can take place immediately, at ascheduled time in the future, or at regularly-scheduled intervals.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Systems | System Tree and select a required group or system(s).

3 From Client Tasks, select the required group in the System Tree for which you want tocreate the on-demand scan task.

4 Click New Task. The Client Task Builder page appears.

5 In Description, type a Name and Notes (if required) for the on-demand scan task.

6 Select OnDemand Scan (McAfee Security for Lotus Domino, v7.5 (Windows)) asthe Type of the task, then click Next.

7 In Configuration, select a policy from the drop-down menu, then click Next.

8 Schedule the task immediately or as required, then click Next to view the Summary ofthe on-demand scan task.

9 Click Save.

10 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of an on-demand scan task or Deleteto remove it.

Creating a server protection taskUse this task to protect or unprotect your Domino servers using ePolicy Orchestrator. Serverprotection task involves protecting the selected Lotus Domino server(s) in your network. Youcan select the required servers to be protected from a threat, vulnerability, or other potentiallyunwanted code.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Systems | System Tree and select a required group or system(s).

3 From Client Tasks, select the required group in the System Tree for which you want tocreate the server protection task.

4 Click New Task. The Client Task Builder page appears.

5 In Description, type a Name and Notes (if required) for the server protection task.

6 Select Server Protection Task (McAfee Security for Lotus Domino, v7.5 (Windows))as the Type of the task, then click Next.

7 In Configuration, select a policy from the drop-down menu, then click Next.

8 Schedule the task immediately or as required, then click Next to view the Summary ofthe server protection task.

Integrating with ePolicy Orchestrator 4.0Scheduling tasks

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide114

Page 115: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

9 Click Save.

10 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of a server protection task or Deleteto remove it.

Creating a compaction taskUse this task to schedule a compaction task on the Domino server using ePolicy Orchestrator.Compaction task involves reducing the size of the McAfee Security for Lotus Domino database.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Systems | System Tree and select a required group or system(s).

3 From Client Tasks, select the required group in the System Tree for which you want tocreate the compaction task.

4 Click New Task. The Client Task Builder page appears.

5 In Description, type a Name and Notes (if required) for the compaction task.

6 Select Compaction Task (McAfee Security for Lotus Domino, v7.5 (Windows)) asthe Type of the task, then click Next.

7 In Configuration, select a policy from the drop-down menu, then click Next.

8 Schedule the task immediately or as required, then click Next to view the Summary ofthe compaction task.

9 Click Save.

10 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of a compaction task or Delete toremove it.

Creating a purge taskUse this task to schedule a purge task on the Domino server using ePolicy Orchestrator. Purgetask allows you to delete old entries/files from the McAfee Security for Lotus Domino serverand retain the recent files.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Systems | System Tree and select a required group or system(s).

3 From Client Tasks, select the required group in the System Tree for which you want tocreate the purge task.

4 Click New Task. The Client Task Builder page appears.

5 In Description, type a Name and Notes (if required) for the purge task.

Integrating with ePolicy Orchestrator 4.0Scheduling tasks

115McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 116: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

6 Select Purge Task (McAfee Security for Lotus Domino, v7.5 (Windows)) as theType of the task, then click Next.

7 In Configuration, select a policy from the drop-down menu, then click Next.

8 Schedule the task immediately or as required, then click Next to view the Summary ofthe purge task.

9 Click Save.

10 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of a purge task or Delete to removeit.

Creating a status report taskUse this task to schedule a status report which is sent to an administrator at a specific time.The report contains detection statistics within that specified time frame. You can choose a time,recipient email address/distribution list to send the report to, and a subject for the email. Reportsare sent in HTML or CSV format.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Systems | System Tree and select a required group or system(s).

3 From Client Tasks, select the required group in the System Tree for which you want tocreate the status report task.

4 Click New Task. The Client Task Builder page appears.

5 In Description, type a Name and Notes (if required) for the status report task.

6 Select Status Report Task (McAfee Security for Lotus Domino, v7.5 (Windows))as the Type of the task, then click Next.

7 In Configuration, select a policy from the drop-down menu, then click Next.

8 Schedule the task immediately or as required, then click Next to view the Summary ofthe status report task.

9 Click Save.

10 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of a status report task or Delete toremove it.

Creating a configuration report taskUse this task to schedule a configuration report which is sent to an administrator at a specifictime. The configuration report will have a summary of product configurations such as: serverinformation, version information, license status and type, product information, debug logginginformation, on-access settings, and on-access policies.

Task

For option definitions, click ? in the interface.

Integrating with ePolicy Orchestrator 4.0Scheduling tasks

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide116

Page 117: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Systems | System Tree and select a required group or system(s).

3 From Client Tasks, select the required group in the System Tree for which you want tocreate the configuration report task.

4 Click New Task. The Client Task Builder page appears.

5 In Description, type a Name and Notes (if required) for the configuration report task.

6 Select Configuration Report Task (McAfee Security for Lotus Domino, v7.5(Windows)) as the Type of the task, then click Next.

7 In Configuration, select a policy from the drop-down menu, then click Next.

8 Schedule the task immediately or as required, then click Next to view the Summary ofthe configuration report task.

9 Click Save.

10 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of a configuration report task orDelete to remove it.

Configuring reportsReports are pre-defined queries which query the ePolicy Orchestrator database and generatea graphical output. McAfee ePolicy Orchestrator 4.0 has its own querying and reportingcapabilities. McAfee includes a set of default queries on the left pane. However, you can createa new query, edit, and manage all the queries related to McAfee Security for Lotus Domino.

Running a query

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Reporting. A list of queries appear on the left pane.

3 Select a McAfee Security for Lotus Domino related query from the list.

4 Click Run. The graphical output is displayed.

Creating a new query

1 Log on to the ePolicy Orchestrator server as an administrator.

NOTE: If the pre-defined queries on the left side does not serve your purpose, ePolicyOrchestrator enables you to create your own queries.

2 Click Reporting | New Query. The Result Type page appears.

3 On the left pane, select a data type that the query should retrieve and click Next. TheChart page appears.

4 Select and accordingly configure a display chart/table and click Next. The Columns pageappears allowing you to select columns for the chart/table.

5 Select column(s) from the Available Columns pane and click Next.

6 The Filter page appears. Specify criteria by selecting properties and operators to limit thedata retrieved by the query.

7 Click Run, then Save. The Save Query page appears.

Integrating with ePolicy Orchestrator 4.0Configuring reports

117McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 118: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

8 Type a Name and Notes (if required) for the query, then click Save.

Table 4: Reporting OptionsDefinitionOption

Deletes a selected query.Delete

Launches the Query Builder page loaded with thedetails of the selected query, where you can edit thedetails of a selected query.

Edit

Moves the selected query from My Queries list to thePublic Queries list, making it available to all userswith permissions.

Make Public

Creates and saves a copy of the selected query.Duplicate

Exports the selected query to an XML file that can beimported to any ePolicy Orchestrator server.

Export

Runs the selected query and displays its result.Run

Takes you to the View Query SQL page, where youcan view and copy the SQL script of the selected query.

More Actions | View Query SQL

Launches a dialog box that allows you to browse to anexported query file. When you import a query file, theserver adds it to My Queries list.

Import Query

UninstallationThis section provides instructions to uninstall McAfee Security for Lotus Domino from the clientcomputers and remove the extensions from the ePolicy Orchestrator server.

Removing McAfee Security for Lotus Domino from the client computer

Removing McAfee Security for Lotus Domino from ePolicy Orchestrator

Removing McAfee Security for Lotus Domino from the clientcomputer

NOTE: QUIT Lotus Domino server on the client computer.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Systems | System Tree | Client Tasks | New Task. The Client Task Builderpage appears.

3 In Description, type a Name, Notes for the task and select the Type as ProductDeployment (McAfee Agent), then click Next.

4 Under Configuration, select the Target Platforms as Windows.

5 In Products and components, select McAfee Security for Lotus Domino 7.5.x.x orMcAfee AntiSpam Addon (Eval) 7.5.x.x from the drop-down menu and select theAction as Remove.

6 Click Next to schedule the task immediately or as required.

7 Click Next to view a summary of the task.

Integrating with ePolicy Orchestrator 4.0Uninstallation

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide118

Page 119: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

8 Click Save and send an agent wake-up call.

Removing McAfee Security for Lotus Domino from ePolicyOrchestrator

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Software | Master Repository.

3 Click the Delete link of McAfee Security for Lotus Domino.

4 To remove the product and reports extension, click Configuration.

5 Select the report extension file McAfee Security for Lotus Domino Reports, then clickRemove.

6 Select the product extension file McAfee Security for Lotus Domino or McAfeeAnti-Spam Add-On and click Remove.

7 Select the option Force removal, bypassing any checks or errors, then click OK.

Integrating with ePolicy Orchestrator 4.0Uninstallation

119McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 120: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Integrating with ePolicy Orchestrator 4.5This chapter describes how to configure McAfee Security for Lotus Domino using McAfee ePolicyOrchestrator management software version 4.5. To use this chapter effectively, you need tobe familiar with ePolicy Orchestrator 4.5.

McAfee ePolicy Orchestrator 4.5 provides a scalable platform for centralized policy managementand enforcement on your McAfee security products and systems on which they reside. It alsoprovides comprehensive reporting and product deployment capabilities; all through a singlepoint of control.

NOTE: This guide does not provide detailed information about installing or using ePolicyOrchestrator software. See the McAfee ePolicy Orchestrator 4.5 - Installation/Product Guide.

Contents

Prerequisites

Installing McAfee Security for Lotus Domino using ePolicy Orchestrator

Activation task using ePolicy Orchestrator

Sending an agent wake-up call

Setting policies within ePolicy Orchestrator

Scheduling tasks

Configuring reports

Uninstallation

PrerequisitesBefore using the ePolicy Orchestrator software to manage McAfee Security for Lotus Domino,install the McAfee Agent on the client computer running Lotus Domino. The McAfee Agentversion installed on the ePolicy Orchestrator server should be upgraded to version 4.0 Patch 2.To install McAfee Agent 4.0 Patch 2, refer to the Release Notes for McAfee Agent 4.0 Patch 2.

McAfee Agent is a component of ePolicy Orchestrator that must be installed on each computeron the network. The Agent collects and sends information between the ePolicy Orchestratorserver, repositories, and manages McAfee Security for Lotus Domino installations across thenetwork.

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide120

Page 121: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Installing McAfee Security for Lotus Domino usingePolicy Orchestrator

Assumptions

• Computer 1 — McAfee ePolicy Orchestrator version 4.5 software is installed and configuredon a supported operating system.

• Computer 2 — Supported version of IBM Lotus Domino server is installed and configured asa single partition server or multi-partition server.

NOTE: All Lotus Domino servers will be protected by default as a standalone server and shouldnot be configured for replication of product configuration settings when managed by ePolicyOrchestrator server. QUIT Lotus Domino server on the client computer.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Create a temporary directory on your local drive.

3 To install, do one of the following depending on how you obtained the software:

• Insert the CD into the computer's drive and copy the installation files into the temporarydirectory you created.

• Download theMSDW75ENL.ZIP (licensed version) orMSDW75ENE.ZIP (evaluationversion) archive and extract the file to a temporary directory.

4 Click Menu | Software | Master Repository. The Packages in Master Repositorypage appears.

5 Click Actions | Check In Package. The Package page appears.

6 Select the Package type as Product or Update (.ZIP) and browse in File path to locatemsdw-7.5.<buildnumber>-<language>-lic-depl-pkg (licensed version) ormsdw-7.5.<buildnumber>-<language>-eval-depl-pkg (evaluation version) extractedin the temporary directory.

NOTE: To check-in the Anti-Spam add-on component, add theasaddon-<buildnumber>-<language>-en-eval-depl-pkg.zip file.

7 Click Next. The Package Options page appears with the package information.

8 Select a Branch.

9 In Options, select the required option(s), then click Save.

10 Click Menu | Systems | System Tree | Client Tasks | Actions | New Task, to installMcAfee Security for Lotus Domino on the client Lotus Domino server. The Client TaskBuilder page appears.

11 In Description, type a Name, Notes for the task and select the Type as ProductDeployment, then click Next.

12 In Configuration, select the Target Platforms as Windows.

13 In Products and components, select McAfee Security for Lotus Domino 7.5 fromthe drop-down list, then select the Action as Install.

NOTE: To deploy theMcAfee Anti-Spam add-on component to the Lotus Domino server,select McAfee Anti-Spam Add-on (Eval) 7.5 from the drop-down list.

Integrating with ePolicy Orchestrator 4.5Installing McAfee Security for Lotus Domino using ePolicy Orchestrator

121McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 122: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

14 Click Next to schedule this task immediately or as required.

15 Click Next to view a summary of the task.

16 Click Save and send an agent wake-up call. Wait for the deployment task to complete.

17 Click Menu | Software | Extensions | Install Extension to install the McAfee Securityfor Lotus Domino policy extensions. The Install Extension dialog box appears.

18 Click Browse, select the extension file MSDW_7500_0409.ZIP, then click OK on theInstall Extension page.

19 Click Menu | Software | Extensions | Install Extension to install the McAfee Securityfor Lotus Domino report extensions. The Install Extension dialog box appears.

20 Click Browse, select the extension file MSDW7REPORTS.ZIP, then click OK on theInstall Extension page.

Activation task using ePolicy OrchestratorIf you have installed the evaluation version of the McAfee Security for Lotus Domino or theAnti-Spam add-on component using ePolicy Orchestrator, you can convert them to the licensedversion using ePolicy Orchestrator.

Checking-in the software activation package to the ePolicy Orchestrator server

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Save the msdw-7.5.<build number>-<language>-actv-pkg.zip orasaddon-<buildnumber>-<language>-actv-pkg.zip ePolicy Orchestrator deploymentactivation package in a temporary location.

3 In the ePolicy Orchestrator console tree, click Software | Master Repository | Actions| Check In Package. The Check In Package wizard appears.

4 In Package page, select the Package type as Product or Update (.ZIP) and browseto locate and add themsdw-7.5.<build number>-<language>-actv-pkg.zip extractedin a temporary directory.

NOTE: To check-in the Anti-Spam add-on component activation package to the ePolicyOrchestrator server, check-in asaddon-7.5.<build number>-<language>-actv-pkg.zipsaved in a temporary location.

5 Click Next. The Package Options page appears with the package information.

6 Select the Branch as Current, then click Save.

Installing the activation package on client computers

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Menu | Systems | System Tree and select a required group or system(s).

3 From the Client Tasks tab, click New Task.

Integrating with ePolicy Orchestrator 4.5Activation task using ePolicy Orchestrator

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide122

Page 123: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

4 Type a Name, Notes for the task and select the Type as Product Deployment, thenclick Next. The Configuration page appears.

5 Select the Target Platforms as Windows to install the package.

6 In Products and Components, select Activation Package for McAfee Security forLotus Domino 7.5, select the Action as Install, then select an appropriate Languagefrom the drop-down list.

NOTE: To install the Anti-Spam add-on component on the client computer(s), selectActivation Package For McAfee Anti-Spam Add-on 7.5 in Products andComponents.

The Remove option is not supported.

7 Click Next to schedule this task immediately or as required.

8 Click Next to view a summary of the task, then click Save.

9 Send an agent wake-up call.

NOTE: To test your installation, click the Licenses tab on the McAfee Security for LotusDomino dashboard. The license status of the McAfee Security for Lotus Domino softwareor the Anti-Spam add-on component must be Licensed.

It might take a few minutes for the software to register the change within the user interface.You might need to refresh the page.

Sending an agent wake-up callAll systems in the network are managed in the Systems tab. The System Tree contains allsystems that are managed by the ePolicy Orchestrator server. It is the primary interface formanaging policies and tasks on these systems. You can organize or sort these systems intological groups in the System Tree.

MyOrganization is the root of the System Tree. It includes a Lost&Found group that storessystems whose locations cannot be determined by the server. Depending on the methods youuse to create and maintain the System Tree segments (systems), the server uses differentcharacteristics to place the systems in the System Tree.

NOTE: For information on adding a new system, refer to the McAfee ePolicy Orchestrator 4.5Product Guide.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Menu | Systems | System Tree.

3 Select a group in the System Tree.

4 Select the Computer Name(s) of that group.

5 Click Actions | Agent | Wake Up Agents. The Wake Up Agents page appears.

6 Select a Wake-up call type and a Randomization period (0-60 minutes) by which thesystem(s) respond to the wake-up call sent by the ePolicy Orchestrator server.

7 Select Get full product properties for the agent(s) to send complete properties insteadof sending only those that have changed since the last agent-to-server communication.

Integrating with ePolicy Orchestrator 4.5Sending an agent wake-up call

123McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 124: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

8 Click OK.

NOTE: Navigate to Server Task Log to see the status of the agent wake-up call.

Setting policies within ePolicy OrchestratorThe ePolicy Orchestrator console allows you to enforce policies across groups of computers oron a single computer. These policies override configurations set on individual computers. Forinformation regarding policies and how they are enforced, see the McAfee ePolicy Orchestrator4.5 Product Guide.

Before configuring any policies, select the group of computers for which you want to modifyMcAfee Security for Lotus Domino policies. You can modify McAfee Security for Lotus Dominopolicies from the pages and tabs that are available in the details pane of the ePolicy Orchestratorconsole. These pages are nearly identical to those you can access directly from the McAfeeSecurity for Lotus Domino user interface.

After you have modified the appropriate policies and saved the changes for the intendedcomputer or group of computers, you are ready to deploy new settings via the ePolicyOrchestrator agent.

Creating or editing policies

Enforcing policies

Creating or editing policiesYou can create, edit, delete, or assign a policy to a specific group in the System Tree.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 ClickMenu | Systems | System Tree | Assigned Policies. The Policies page appears.

3 Select Product asMcAfee Security for Lotus Domino 7.5.x.x. A list of policies managedby McAfee Security for Lotus Domino appears in the lower pane.

4 Locate the requiired policy, and click Edit Assignment next to the policy. The policyassignment for the chosen group page appears.

5 Click Edit Policy or New Policy as required.

NOTE: If you click New Policy, the Create a new policy dialog box appears. Select thepolicy you want to duplicate from the Create a policy based on this existing policydrop-down list, type a name then click OK. The new policy wizard appears.

6 Edit the policy setting as required, then click Save.

Enforcing policiesYou can enforce a policy to multiple managed systems within a group.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 ClickMenu | Systems | System Tree | Systems and select a required group or system(s).

Integrating with ePolicy Orchestrator 4.5Setting policies within ePolicy Orchestrator

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide124

Page 125: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

3 Click Assign Policy. The Assigning Policy for <n> system page appears.

4 Select the Product, Category, and Policy from the drop-down menu, then click Save.

5 Select the systems again.

6 Send an agent wake-up call. For instructions on sending an agent wake-up call, pleaserefer to Sending an agent wake-up call section.

NOTE: You can create and enforce McAfee Security for Lotus Domino policies and viewreports only after adding the McAfee Security for Lotus Domino extension files.

Scheduling tasksThe ePolicy Orchestrator software allows you to create, schedule, and maintain client tasks thatrun on the managed systems. You can define client tasks for the entire System Tree, a specificgroup, or an individual system.

Tasks

Creating an AutoUpdate task

Creating an on-demand scan task

Creating a server protection task

Creating a compaction task

Creating a purge task

Creating a status report task

Creating a configuration report task

Creating an AutoUpdate taskYour software can only provide full protection if you keep it up-to-date with the latest anti-virusdefinitions (DATs), spam engine, and anti-virus scanning engine. We recommend that youupdate DAT files daily and regularly check the McAfee AVERT (Anti-Virus Emergency ResponseTeam) website for new DAT files. Use this task to schedule autoupdates on the Domino serverusing ePolicy Orchestrator.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Menu | Systems | System Tree and select a required group or system(s).

3 Click Client Task | Actions | New Task. The Client Task Builder page appears.

4 In Description, type a Name and Notes (if required) for the AutoUpdate task.

5 Select AutoUpdate Task (McAfee Security for Lotus Domino, v7.5 (Windows)) asthe Type of the task and click Next.

6 Schedule the task immediately or as required, then click Next to view the Summary ofthe autoupdate task.

7 Click Save.

Integrating with ePolicy Orchestrator 4.5Scheduling tasks

125McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 126: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

8 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of an autoupdate task or Delete toremove it.

Creating an on-demand scan taskUse this task to schedule an on-demand scan on the Domino server using ePolicy Orchestrator.On-demand scan task involves a scheduled scanning of your Lotus Domino server(s) to find athreat, vulnerability, or other potentially unwanted code. It can take place immediately, at ascheduled time in the future, or at regularly-scheduled intervals.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Menu | Systems | System Tree and select a required group or system(s).

3 Click Client Task | Actions | New Task. The Client Task Builder page appears.

4 In Description, type a Name and Notes (if required) for the on-demand scan task.

5 Select OnDemand Scan (McAfee Security for Lotus Domino, v7.5 (Windows)) asthe Type of the task, then click Next.

6 In Configuration, select a policy from the drop-down menu, then click Next.

7 Schedule the task immediately or as required, then click Next to view the Summary ofthe on-demand scan task.

8 Click Save.

9 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of an on-demand scan task or Deleteto remove it.

Creating a server protection taskUse this task to protect or unprotect your Domino servers using ePolicy Orchestrator. Serverprotection task involves protecting the selected Lotus Domino server(s) in your network. Youcan select the required servers to be protected from a threat, vulnerability, or other potentiallyunwanted code.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Menu | Systems | System Tree and select a required group or system(s).

3 Click Client Task | Actions | New Task. The Client Task Builder page appears.

4 In Description, type a Name and Notes (if required) for the server protection task.

5 Select Server Protection Task (McAfee Security for Lotus Domino, v7.5 (Windows))as the Type of the task, then click Next.

6 In Configuration, select a policy from the drop-down menu, then click Next.

Integrating with ePolicy Orchestrator 4.5Scheduling tasks

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide126

Page 127: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

7 Schedule the task immediately or as required, then click Next to view the Summary ofthe server protection task.

8 Click Save.

9 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of a server protection task or Deleteto remove it.

Creating a compaction taskUse this task to schedule a compaction task on the Domino server using ePolicy Orchestrator.Compaction task involves reducing the size of the McAfee Security for Lotus Domino database.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Menu | Systems | System Tree and select a required group or system(s).

3 Click Client Task | Actions | New Task. The Client Task Builder page appears.

4 In Description, type a Name and Notes (if required) for the compaction task.

5 Select Compaction Task (McAfee Security for Lotus Domino, v7.5 (Windows)) asthe Type of the task, then click Next.

6 In Configuration, select a policy from the drop-down menu, then click Next.

7 Schedule the task immediately or as required, then click Next to view the Summary ofthe compaction task.

8 Click Save.

9 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of a compaction task or Delete toremove it.

Creating a purge taskUse this task to schedule a purge task on the Domino server using ePolicy Orchestrator. Purgetask allows you to delete old entries/files from the McAfee Security for Lotus Domino serverand retain the recent files.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Menu | Systems | System Tree and select a required group or system(s).

3 Click Client Task | Actions | New Task. The Client Task Builder page appears.

4 In Description, type a Name and Notes (if required) for the purge task.

5 Select Purge Task (McAfee Security for Lotus Domino, v7.5 (Windows)) as theType of the task, then click Next.

6 In Configuration, select a policy from the drop-down menu, then click Next.

Integrating with ePolicy Orchestrator 4.5Scheduling tasks

127McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 128: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

7 Schedule the task immediately or as required, then click Next to view the Summary ofthe purge task.

8 Click Save.

9 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of a purge task or Delete to removeit.

Creating a status report taskUse this task to schedule a status report which is sent to an administrator at a specific time.The report contains detection statistics within that specified time frame. You can choose a time,recipient email address/distribution list to send the report to, and a subject for the email. Reportsare sent in HTML or CSV format.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Menu | Systems | System Tree and select a required group or system(s).

3 Click Client Task | Actions | New Task. The Client Task Builder page appears.

4 In Description, type a Name and Notes (if required) for the status report task.

5 Select Status Report Task (McAfee Security for Lotus Domino, v7.5 (Windows))as the Type of the task, then click Next.

6 In Configuration, select a policy from the drop-down menu, then click Next.

7 Schedule the task immediately or as required, then click Next to view the Summary ofthe status report task.

8 Click Save.

9 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of a status report task or Delete toremove it.

Creating a configuration report taskUse this task to schedule a configuration report which is sent to an administrator at a specifictime. The configuration report will have a summary of product configurations such as: serverinformation, version information, license status and type, product information, debug logginginformation, on-access settings, and on-access policies.

Task

For option definitions, click ? in the interface.

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Menu | Systems | System Tree and select a required group or system(s).

3 Click Client Task | Actions | New Task. The Client Task Builder page appears.

4 In Description, type a Name and Notes (if required) for the configuration report task.

Integrating with ePolicy Orchestrator 4.5Scheduling tasks

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide128

Page 129: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

5 Select Configuration Report Task (McAfee Security for Lotus Domino, v7.5(Windows)) as the Type of the task, then click Next.

6 In Configuration, select a policy from the drop-down menu, then click Next.

7 Schedule the task immediately or as required, then click Next to view the Summary ofthe configuration report task.

8 Click Save.

9 Send an agent wake-up call.

NOTE: Click Edit to change the description/schedule of a configuration report task orDelete to remove it.

Configuring reportsReports are pre-defined queries which query the ePolicy Orchestrator database and generatea graphical output. McAfee ePolicy Orchestrator 4.0 has its own querying and reportingcapabilities. McAfee includes a set of default queries on the left pane. However, you can createa new query, edit, and manage all the queries related to McAfee Security for Lotus Domino.

Running a query

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Menu | Reporting | Queries. A list of queries appear on the left pane.

3 Select a McAfee Security for Lotus Domino related query from the list.

4 Click Run. The graphical output is displayed.

Creating a new query

1 Log on to the ePolicy Orchestrator server as an administrator.

NOTE: If the pre-defined queries on the left side does not serve your purpose, ePolicyOrchestrator enables you to create your own queries.

2 Click Menu | Reporting | Queries | Actions | New Query. The Result Type pageappears.

3 On the left pane, select a data type that the query should retrieve and click Next. TheChart page appears.

4 Select and accordingly configure a display chart/table and click Next. The Columns pageappears allowing you to select columns for the chart/table.

5 Select column(s) from the Available Columns pane and click Next.

6 The Filter page appears. Specify criteria by selecting properties and operators to limit thedata retrieved by the query.

7 Click Run, then Save. The Save Query page appears.

8 Type a Name and Notes (if required) for the query, then click Save.

Table 5: Reporting OptionsDefinitionOption

Deletes a selected query.Delete

Integrating with ePolicy Orchestrator 4.5Configuring reports

129McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 130: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

DefinitionOption

Launches the Query Builder page loaded with thedetails of the selected query, where you can edit thedetails of a selected query.

Edit

Creates and saves a copy of the selected query.Duplicate

Exports the selected query to an XML file that can beimported to any ePolicy Orchestrator server.

Export Data

Runs the selected query and displays its result.Run

Takes you to the View Query SQL page, where youcan view and copy the SQL script of the selected query.

View Query SQL

Launches a dialog box that allows you to browse to anexported query file. When you import a query file, theserver adds it to My Queries list.

Import Query

To make personal queries public, select the desiredshared group from the Select target group menu.

Move to Different Group

Export a query to an XML file.Export Query Definition

UninstallationThis section provides instructions to uninstall McAfee Security for Lotus Domino from the clientcomputers and remove the extensions from the ePolicy Orchestrator server.

Removing McAfee Security for Lotus Domino from the client computer

Removing McAfee Security for Lotus Domino from ePolicy Orchestrator

Removing McAfee Security for Lotus Domino from the clientcomputer

NOTE: QUIT Lotus Domino server on the client computer.

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 ClickMenu | Systems | System Tree | Client Tasks | Actions | New Task. The ClientTask Builder page appears.

3 In Description, type a Name, Notes for the task and select the Type as ProductDeployment, then click Next.

4 Under Configuration, select the Target Platforms as Windows.

5 In Products and components, select McAfee Security for Lotus Domino 7.5.x.x orMcAfee AntiSpam Addon (Eval) 7.5.x.x from the drop-down menu and select theAction as Remove.

6 Click Next to schedule the task immediately or as required.

7 Click Next to view a summary of the task.

8 Click Save and send an agent wake-up call.

Integrating with ePolicy Orchestrator 4.5Uninstallation

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide130

Page 131: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Removing McAfee Security for Lotus Domino from ePolicyOrchestrator

Task

1 Log on to the ePolicy Orchestrator server as an administrator.

2 Click Software | Master Repository.

3 Click the Delete link of McAfee Security for Lotus Domino.

4 To remove the product and reports extension, click Menu | Software | Extension.

5 Select the report extension file McAfee Security for Lotus Domino Reports, then clickRemove.

6 Select the product extension fileMcAfee Security for Lotus Domino and click Remove.

NOTE: To remove the McAfee Anti-Spam for Lotus Domino product extension, selectMcAfeeAnti-Spam Add-On.

7 Select the option Force removal, bypassing any checks or errors, then click OK.

Integrating with ePolicy Orchestrator 4.5Uninstallation

131McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 132: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Appendix A — Using file filtering rule andactions in a real-time scenario

This section illustrates a real-time scenario on using the file filtering rule to delete, log, andquarantine all Microsoft PowerPoint (*.ppt) files that reach your Lotus Domino server and notifythe administrator of the detection.

Task

1 From Policy Manager, click Shared Resource. The Shared Resources page appears.

2 Click the Filter Rules tab.

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide132

Page 133: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

3 In File Filtering Rules, click Create New. The File Filtering Rule page appears.

4 Type a unique Rule name. Give the rule a meaningful name, so that you can easily identifyit and what it does. For example, PPT_Block.

5 Select Enable file name filtering to enable filtering files based on file names.

6 In Take action when the file name matches, specify the names of the files that mustbe quarantined. You can use the * and ? wildcard characters to match multiple filenames.In this case, to filter any Microsoft PowerPoint files, type *.ppt and click Add.

7 In File category filtering, select Enable file category filtering to enable file filteringaccording to their file type.

8 In Take actionwhen the file category is, specify the file types that must be quarantined.

NOTE: File types are divided into categories and subcategories.

9 In File categories, select Graphics/Presentation. An asterisk symbol (*) appears nextto the file type.

10 In Subcategories, select the following:

• Microsoft PowerPoint 2007

• Microsoft PowerPoint 2007 (Encrypted)

• Microsoft PowerPoint 97-2002

• Microsoft PowerPoint Dual 95/97

NOTE:

• To select more than one subcategory, use Ctrl+Click or Shift+Click.

• To select all of the subcategories, select All.

• Click Clear selections to undo selections in Subcategories.

Appendix A — Using file filtering rule and actions in a real-time scenario

133McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 134: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

11 Click Save, then Apply to return to the Shared Resources policy page.

12 From Policy Manager, select a submenu item that has the file filtering scanner. The policypage for the submenu item appears.

NOTE: This example uses the External Mails policy.

13 Click on a policy name. The following page appears.

14 Click the File Filtering link.

Appendix A — Using file filtering rule and actions in a real-time scenario

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide134

Page 135: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

15 In File Filtering rules and associated actions, select the rule (PPT_Block you createdin step 3) from the Available rules drop-down list.

The selected rule appears under File Filtering rules and associated actions section.

16 Click the Change link of the rule to specify actions that must be taken when an attachedPowerPoint presentation is detected in an email message. The File Filtering Actions pageappears. In this case, select the action as Delete Document and also Log, Quarantineand Notify Administrator.

Appendix A — Using file filtering rule and actions in a real-time scenario

135McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 136: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

17 Click Save, then Apply.

18 Send an email to your Lotus Domino server with Microsoft PowerPoint file attached. Thefile filtering rule is triggered and the specified actions (as per step 16) take place.

Appendix A — Using file filtering rule and actions in a real-time scenario

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide136

Page 137: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Appendix B — Error codes

This section lists some of the error codes that might appear.

Value (Hexadecimal)Error code

= 0x50000000McICOMMONBASE

= McICOMMONBASE + 0x1McINOTHINGTOSCAN

// Info codes used in NoteCodec module

= 0x50001000McINOTECODECBASE

= McINOTECODECBASE + 0x1McINOATTACHMENT

= McINOTECODECBASE + 0x2McINOOLE

= McINOTECODECBASE + 0x3McINOMIME

= McINOTECODECBASE + 0x4McINOTEXT

= McINOTECODECBASE + 0x5McINOLOTUSSCRIPT

= McINOTECODECBASE + 0x6McINOFORMULA

= McINOTECODECBASE + 0x7McIQTNFULLMIME

= McINOTECODECBASE + 0x8McIENCRYPTEDSTREAM

// ScanContext info codes

= McINOTECODECBASE + 0x9McITAKEACTIONANDSTOP

= McINOTECODECBASE + 0x10McIALLOWTHRUNOCHANGE

// Common error codes. Starts from 0x10000

= 0xA0010000McECOMMONBASE

// Lotus Notes related error codes. Starts from 0x20000

= 0xA0020000McENOTECODECBASE

= McENOTECODECBASE + 0x1McELOTUSEXCEPTION

= McENOTECODECBASE + 0x2McESESSIONINIT

= McENOTECODECBASE + 0x3McENOTELOAD

= McENOTECODECBASE + 0x4McELOADATTACHMENT

= McENOTECODECBASE + 0x5McELOADMIME

= McENOTECODECBASE + 0x6McELOADOLE

= McENOTECODECBASE + 0x7McEEMPTYSTREAM

= McENOTECODECBASE + 0x8McENOSESSION

= McENOTECODECBASE + 0x9McEFSREADPARTIALLY

= McENOTECODECBASE + 0xAMcENOTEDELETED

= McENOTECODECBASE + 0xBMcENOPERMISSIONS

= McENOTECODECBASE + 0xCMcECONCURRENTACCESS

= McENOTECODECBASE + 0xDMcEWRONGPASSWORD

137McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 138: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Value (Hexadecimal)Error code

//Error codes for Quarantine module

= McENOTECODECBASE + 101McENOTECREATE

= McENOTECODECBASE + 102McENOTEDOESNOTEXIST

= McENOTECODECBASE + 103McENOTEUPDATE

= McENOTECODECBASE + 104McEQTNINTERNAL

= McENOTECODECBASE + 105McEINVALIDSTRMTYPE

= McENOTECODECBASE + 106McEAVNOTSUPPORTED

= McENOTECODECBASE + 107McEDONOTRELEASE

= McENOTECODECBASE + 108McEQTNDOWNLOADOK

// Error codes for CommonFW

= 0xA0030000McECOMMONFWBASE

= McECOMMONFWBASE + 0x1McEQCREATION

= McECOMMONFWBASE + 0x2McEQOPEN

= McECOMMONFWBASE + 0x3McEQQUITMSG

= McECOMMONFWBASE + 0x4McEQEMPTY

= McECOMMONFWBASE + 0x5McEQUNKNOWN_GETMSG

= McECOMMONFWBASE + 0x6McEQUNREGISTERED

= McECOMMONFWBASE + 0x7McEQNOMESSAGE

= McECOMMONFWBASE + 0x9McEQFULL

//Mutex

= McECOMMONFWBASE + 101McEMTXCREATE

= McECOMMONFWBASE + 102McEMTXDOESNOTEXIST

= McECOMMONFWBASE + 103McEMTXTIMEOUT

= McECOMMONFWBASE + 104McEMTXSTARTSYNC

= McECOMMONFWBASE + 105McEMTXFINISHSYNC

= McECOMMONFWBASE + 106McEMTXGETUSRNAME

= McECOMMONFWBASE + 107McEMTXFIND

//WIP

= McECOMMONFWBASE + 201McELOTUSSHAREDHEAP

= McECOMMONFWBASE + 202McENOTEPUTONWAIT

// Shared Memory

= McECOMMONFWBASE + 301McESHAREDMEMORYINVALID

= McECOMMONFWBASE + 302McESHAREDMEMORYMAPPING

= McECOMMONFWBASE + 303McESHAREDMEMORYINVALIDARGS

= McECOMMONFWBASE + 304McEMAILMESSAGEINVALIDHNOTE

// Application specific error codes

= McECOMMONFWBASE + 0x500McEPROCESSRUNNING

= McECOMMONFWBASE + 0x501McENOLICENSE

= McECOMMONFWBASE + 0x502McEADDINMGRNOTRUNNING

Appendix B — Error codes

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide138

Page 139: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Value (Hexadecimal)Error code

// Exit codes returned by MailBoxScanner andDatabaseScanner

= 0x0const int McEEXITNORMAL

= 0x1const int McEEXITNOLICENSE

= 0x2const int McEEXITALREADYRUNNING

= 0x3const int McEEXITADDINMGRNOTRUNNING

Value (Hexadecimal)Error code

= 0x50000000McICOMMONBASE

= McICOMMONBASE + 0x1McINOTHINGTOSCAN

// Info codes used in NoteCodec module

= 0x50001000McINOTECODECBASE

= McINOTECODECBASE + 0x1McINOATTACHMENT

= McINOTECODECBASE + 0x2McINOOLE

= McINOTECODECBASE + 0x3McINOMIME

= McINOTECODECBASE + 0x4McINOTEXT

= McINOTECODECBASE + 0x5McINOLOTUSSCRIPT

= McINOTECODECBASE + 0x6McINOFORMULA

= McINOTECODECBASE + 0x7McIQTNFULLMIME

= McINOTECODECBASE + 0x8McIENCRYPTEDSTREAM

// ScanContext info codes

= McINOTECODECBASE + 0x9McITAKEACTIONANDSTOP

= McINOTECODECBASE + 0x10McIALLOWTHRUNOCHANGE

// Common error codes. Starts from 0x10000

= 0xA0010000McECOMMONBASE

// Lotus Notes related error codes. Starts from0x20000

= 0xA0020000McENOTECODECBASE

= McENOTECODECBASE + 0x1McELOTUSEXCEPTION

= McENOTECODECBASE + 0x2McESESSIONINIT

= McENOTECODECBASE + 0x3McENOTELOAD

= McENOTECODECBASE + 0x4McELOADATTACHMENT

= McENOTECODECBASE + 0x5McELOADMIME

= McENOTECODECBASE + 0x6McELOADOLE

= McENOTECODECBASE + 0x7McEEMPTYSTREAM

= McENOTECODECBASE + 0x8McENOSESSION

= McENOTECODECBASE + 0x9McEFSREADPARTIALLY

= McENOTECODECBASE + 0xAMcENOTEDELETED

= McENOTECODECBASE + 0xBMcENOPERMISSIONS

= McENOTECODECBASE + 0xCMcECONCURRENTACCESS

= McENOTECODECBASE + 0xDMcEWRONGPASSWORD

//Error codes for Quarantine module

Appendix B — Error codes

139McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 140: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Value (Hexadecimal)Error code

= McENOTECODECBASE + 101McENOTECREATE

= McENOTECODECBASE + 102McENOTEDOESNOTEXIST

= McENOTECODECBASE + 103McENOTEUPDATE

= McENOTECODECBASE + 104McEQTNINTERNAL

= McENOTECODECBASE + 105McEINVALIDSTRMTYPE

= McENOTECODECBASE + 106McEAVNOTSUPPORTED

= McENOTECODECBASE + 107McEDONOTRELEASE

= McENOTECODECBASE + 108McEQTNDOWNLOADOK

// Error codes for CommonFW

= 0xA0030000McECOMMONFWBASE

= McECOMMONFWBASE + 0x1McEQCREATION

= McECOMMONFWBASE + 0x2McEQOPEN

= McECOMMONFWBASE + 0x3McEQQUITMSG

= McECOMMONFWBASE + 0x4McEQEMPTY

= McECOMMONFWBASE + 0x5McEQUNKNOWN_GETMSG

= McECOMMONFWBASE + 0x6McEQUNREGISTERED

= McECOMMONFWBASE + 0x7McEQNOMESSAGE

= McECOMMONFWBASE + 0x9McEQFULL

//Mutex

= McECOMMONFWBASE + 101McEMTXCREATE

= McECOMMONFWBASE + 102McEMTXDOESNOTEXIST

= McECOMMONFWBASE + 103McEMTXTIMEOUT

= McECOMMONFWBASE + 104McEMTXSTARTSYNC

= McECOMMONFWBASE + 105McEMTXFINISHSYNC

= McECOMMONFWBASE + 106McEMTXGETUSRNAME

= McECOMMONFWBASE + 107McEMTXFIND

//WIP

= McECOMMONFWBASE + 201McELOTUSSHAREDHEAP

= McECOMMONFWBASE + 202McENOTEPUTONWAIT

// Shared Memory

= McECOMMONFWBASE + 301McESHAREDMEMORYINVALID

= McECOMMONFWBASE + 302McESHAREDMEMORYMAPPING

= McECOMMONFWBASE + 303McESHAREDMEMORYINVALIDARGS

= McECOMMONFWBASE + 304McEMAILMESSAGEINVALIDHNOTE

// Application specific error codes

= McECOMMONFWBASE + 0x500McEPROCESSRUNNING

= McECOMMONFWBASE + 0x501McENOLICENSE

= McECOMMONFWBASE + 0x502McEADDINMGRNOTRUNNING

// Exit codes returned by MailBoxScanner andDatabaseScanner

Appendix B — Error codes

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide140

Page 141: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Value (Hexadecimal)Error code

= 0x0const int McEEXITNORMAL

= 0x1const int McEEXITNOLICENSE

= 0x2const int McEEXITALREADYRUNNING

= 0x3const int McEEXITADDINMGRNOTRUNNING

Appendix B — Error codes

141McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 142: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Frequently Asked Questions

1. Where can I find out more about the effect of a virus?

Visit our website. See the Virus Information Library in http://vil.nai.com.

2. What should I do if I find a new virus?

If you suspect you have a file that contains a virus and the anti-virus software engine does notrecognize it, please send us a sample. For information, See WebImmune inhttps://www.webimmune.net/default.asp.

3. How do I contact Technical Support?

See http://www.mcafee.com/us/support/ for details.

Before calling the technical support, try to have the following information ready:

• The version of the operating system.

• The type of computer on which McAfee Security for Lotus Domino is installed — manufacturerand model.

• Any additional hardware that is installed.

• The browser being used and its version.

• A diagnostic report.

4. Does McAfee Security for Lotus Domino, v7.5 support Lotus Domino5.x/6.x/7.x/8.x?

McAfee Security for Lotus Domino, v7.5 supports:

• IBM Lotus Domino version 7.x, 8.0, 8.01, 8.02 and 8.5

5. Can I install McAfee Security for Lotus Domino as a reference setup on an adjacentDomino domain environment?

Yes

6. Can I access McAfee Security for Lotus Domino configurations from a user's clientcomputer?

Yes, McAfee Security for Lotus Domino configurations can be accessed from a user's clientcomputer if you have enabled the WebUI feature during installation. Using a web-browser,type:

• http://<ipaddress>/MSDW/index.html

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide142

Page 143: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

7. How do I restrict users from accessing the McAfee Security for Lotus Dominoconfiguration when it is hosted on Domino HTTP?

Only a Domino administrator can access the McAfee Security for Lotus Domino configuration.

8. Is there an MVT tool for McAfee Security for Lotus Domino?

No

9. How do I collect logs after a Domino server crash?

You must enable generation of core dumps on your server. Additionally, you can enable theproduct's debug logging that will be helpful for McAfee technical support. See the Diagnosticssection.

NOTE: Enabling debug logging will reduce the speed of your server.

Because the MailboxScanner and DatabaseScanner processes are loaded by Domino. To generatecore dumps for them, you must add Debug_Enable_core=1 in your Domino servers'NOTES.INI file.

10. How can I download DATs from a local server that has internet connection?

If you have installed the product using ePolicy Orchestrator, you can add the local server in theavailable repositories of ePolicy Orchestrator. If it is a standalone installation, you can add thelocal server as a repository using the site list editing capabilities provided within the productinterface.

NOTE: You cannot edit the site list of a ePO managed product installation through the productuser interface.

Frequently Asked Questions

143McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 144: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Index

Aaccess

user interface 30access control

manager 31Access Control Manager 31activate

evaluation version 35, 36software 35

activation packageinstall on client computers 99, 110, 122

addfilter 58new content rule 63repository 92scanner 58

add computer 96add package files

repository 97add reports NAP

repository 97add software NAP

repository 97add-on

components 16additional components

add-on 16advanced

graphical reports 51view 55

advanced search filtersuse 51

agent wake-up call 111, 123send 111, 123

alert messages 73alert settings 73anti-spam

component testing 35anti-spam add-on

install 27anti-spam scanner options 61

create 61anti-virus

component testing 34anti-virus scanner options 59

create 59antiphish scanner options 65

create 65appendix

file filter rule 132application

maintain 37areas to protect, other 11

autoupdateschedule 43

autoupdate taskconfigure 102create 101, 113, 125

availablesearch filters 53

Bbanned file types/messages 51

Ccheck-in

software activation package to ePO 98, 110, 122client computer

remove 130Columns to display button 54compaction task

create 103, 115, 127components

installed 18configuration

out-of-box 38reports 48restore 38

configuration report taskcreate 104, 116, 128

configuration reports 48configure

detected items 84diagnostic settings 86export 90filter rules 80filter settings 66import 90local quarantine database 84McAfee Quarantine Manager software 84miscellaneous settings 73proxy settings 91, 93reports 105, 117, 129repositories 91server specific settings 82shared alerts 77shared filters 77shared scanners 77time slots 80user interface 85

configure taskautoupdate 102

contacttechnical support 142

content rule 63new 63

core filters 59core scanners 59

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide144

Page 145: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

corrupt content 66manage 66

counters 43create

anti-spam scanner options 61anti-virus scanner options 59antiphish scanner options 65file filtering rule 64new alert 75new rule 58, 64new set of options 59, 61, 65new site 96on-demand scan task 46shared file filtering rule 79shared filter 77shared filter rule 80shared scanner 77shared time slots 81subpolicies 56

create new rulespecific user 58

create policiesePolicy Orchestrator 100, 112, 124

create taskautoupdate 101, 113, 125compaction 103, 115, 127configuration report 104, 116, 128on-demand scan 102, 114, 126purge 103, 115, 127server protection 102, 114, 126status report 104, 116, 128

Ddashboard 41, 85

McAfee Security for Lotus Domino software 41settings 85

dashboard settingsspecify 85

debug logsetting 87

debug log settings 87specify 87

deployMcAfee Security for Lotus Domino 98

detected items 51, 52, 54, 84search 52settings 84view 52view results 54

detectionstatistics 43

detectionsreport 44

diagnostic settingsconfigure 86

diagnostics 86setting 86

disclaimer text 73, 74manage 74

domino server partitionsprotect 32

Download button 54

Eedit policies

ePolicy Orchestrator 100, 112, 124edit task

on-demand scan 102EICAR test file 34email notifications

manage 83settings 83

encrypted content 67manage 67

enforcepolicies 100, 112, 124

enforce policiesePolicy Orchestrator 100, 112, 124

ePOprerequisites 95

ePO check-inAnti-Spam add-on component activation package 98, 110, 122McAfee Security for Lotus Domino activation package 98, 110, 122

ePolicy Orchestratorassumptions 96, 109, 121autoupdate task 101, 102, 113, 125compaction task 103, 115, 127configuration report task 104, 116, 128create policies 100, 112, 124edit policies 100, 112, 124enforce policies 100, 112, 124integrate 95, 108, 120on-demand scan task 102, 114, 126prerequisites 95purge task 103, 115, 127remove 106, 119, 131reports 105, 117, 129schedule tasks 101, 113, 125server protection task 102, 114, 126set policies 99, 112, 124status report task 104, 116, 128uninstall 106, 118, 130

error codes 137error reporting service

setting 89error reporting service settings 89

specify 89evaluation version

activate 35, 36McAfee Anti-Spam Add-on 36McAfee Security for Lotus Domino 35

event logsetting 87

event log settings 87specify 87

exportconfigure 90

export configuration 90Export to CSV File button 54

Ffaqs, frequently asked questions 142features

available 9unavailable 9

file filter ruleappendix 132

Index

145McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 146: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

file filtering rule 64create 64

filteradd 58

filter rulesconfigure 80

filter settings 66, 67, 68, 69, 70, 72configure 66corrupt content 66encrypted content 67HTML files 72mail size 69MIME mail 70password-protected archives 68protected content 67scanner control 69signed content 67

filters 53, 59detected items 53

from client computerremove 106, 118

Ggraph and chart

settings 86graph and chart settings

specify 86graphical

reports 49, 50graphical reports

advanced 51simple 50view 50

GTUBE test file 35

Hhow

dashboard works 41scanning works 7

HTML files 72manage 72

Iimport

configure 90site list 90

import and export 89import and export configuration

settings 89import configuration 90information

statistics 42inheritance

view 55install

anti-spam add-on 27McAfee Security for Lotus Domino 16, 19referenced 33silent 29software 19software on Windows 19

install on client computersactivation package 110, 122

installation 16, 19, 37, 38modify 37repair 38

installedcomponents 18

installing the software 16integrate

ePolicy Orchestrator 95, 108, 120integration with ePO

prerequisites 95, 108, 120introduction

McAfee Security for Lotus Domino 7

LLicenses tab 43list

scanners 57List All Scanners tab 57local database 85

Mmail size filter 69

manage 69maintain

application 37manage

corrupt content 66disclaimer text 74email notifications 83encrypted content 67HTML files 72mail size filter 69MIME mail 70notifications 74password-protected archives 68policy 54protected content 67scanner control 69signed content 67

management solutionePolicy Orchestrator 11

manageraccess control 31

McAfee Quarantine Manager 84McAfee Security for Lotus Domino

deploy 98features 9introducing the software 7upgrade 30

McAfee Security for Lotus Domino softwaredashboard 41use 41

MIME mail 70manage 70

miscellaneous settings 73, 74alert messages 73configure 73disclaimer text 74notifications 74

modifyinstallation 37

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide146

Index

Page 147: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

Nnew

content rule 63new alert

create 75new content rule

add 63new rule

file filtering 64new set of options

anti-spam scanner options 61anti-virus scanner options 59antiphish scanner options 65

new sitecreate 96

notification fields for alert 75notifications 74

manage 74

Oon-demand scan 45, 46

task 46views 45

on-demand scan taskcreate 46, 102, 114, 126edit 102

other areas to protect 11out-of-box

configuration 38restore 38

Ppassword-protected archives 68

manage 68performance counters 43phish 51policies

enforce 100, 112, 124setting 57types 54

policyfilter settings 66miscellaneous settings 73

policy manager 54potentially unwanted programs 51preferences

user interface 85prerequisites 17, 95

ePO 95ePolicy Orchestrator 95

productinstall 19

Product Information tab 43product installation

using ePolicy Orchestrator 96, 109, 121product log 88, 89

setting 88Product Log

settings 89product log settings 88

specify 88product version 43protect

Domino server partition 31domino server partitions 32

protected content 67manage 67

protectiondesktop and file server 11document repository 11internet gateway 11

Protection Manager 32use 32

proxysettings 93

proxy configuration 93proxy settings 91, 93

configure 91purge task

create 103, 115, 127

Qquarantine 84, 85

local database 84McAfee Quarantine Manager software 84

quarantine datausing local database 85using McAfee Quarantine Manager software 84

quarantine scanning 77query

create 105, 117, 129query, running 105, 117, 129

RRecently posted virus descriptions tab 44Recently Scanned Items tab 44referenced

install 33Release button 54remove

client computer 130from client computer 106, 118

remove, from ePolicy Orchestrator 106, 119, 131repair

installation 38report

detections 44reports

configuration 48configure 105, 117, 129graphical 49, 50status 47

repositoriesconfigure 91

repositoryadd 92add package files 97add reports NAP 97add software NAP 97

repository list 92requirements, system 17restore

default configuration 38

Sscanner

add 58scanner control 69

manage 69

Index

147McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 148: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

scanner optionssetting 59

scanner settingsspecify 83

scanners 57, 59list 57

scheduleautoupdate 43

schedule tasksePolicy Orchestrator 101, 113, 125

searchdetected items 52

search filters 53send

agent wake-up call 111, 123Server Protection Status tab 43server protection task

create 102, 114, 126server specific

settings 82server specific settings

configure 82set policies

ePolicy Orchestrator 99, 112, 124setting

debug log 87diagnostics 86error reporting service 89event log 87policies 57product log 88scanner options 59

settingsalert messages 73corrupt content 66dashboard 85detected items 84disclaimer text 74email notifications 83encrypted content 67graph and chart 86HTML files 72mail size filter 69MIME mail 70notifications 74password-protected archives 68Product Log 89protected content 67proxy 93scanner control 69server specific 82signed content 67user interface preferences 85

settings and diagnostics 82shared alerts

configure 77shared filter

create 77shared filter rule

create 80shared filters

configure 77shared resources

use 81shared respurces 77

shared scannercreate 77

shared scannersconfigure 77

shared time slotscreate 81

signed content 67manage 67

silentinstall 29

simplegraphical reports 50

simple search filtersuse 50

site list 90, 91, 92import 90

softwareuninstallation 40

software components 16spam 51specific user

create new rule 58specify

dashboard settings 85debug log settings 87error reporting service settings 89event log settings 87graph and chart settings 86product log settings 88scanner settings 83

specify users 58statistics

detection 43information 42

statusreports 47

status report taskcreate 104, 116, 128

status reports 47Submit to Avert button 54subpolicies 56

create 56system requirements

minimum 17

Ttask

on-demand scan 46testing

anti-spam 35anti-virus 34installation 34

threats, to your organization 13time slots

configure 80Top hoaxes tab 44types

policies 54

Uuninstall

anti-spam add-on 39ePolicy Orchestrator 106, 118, 130McAfee Security for Lotus Domino 38product 38

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide148

Index

Page 149: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

uninstall (continued)software 40

unwanted content 51Update Information tab 43updates 43upgrade

McAfee Security for Lotus Domino 30software 30software on Windows 30

useadvanced search filters 51local database 85McAfee Quarantine Manager software 84McAfee Security for Lotus Domino software 41product log 89Protection Manager 32shared resources 81simple search filters 50user interface 41

user interface 30, 41, 85access 30configure 85

user interface (continued)preferences 85

user interface preferences 85settings 85

Vview

detected items 52, 54graphical reports 50results 54

view results 54detected items 54

viewsadvanced 55inheritance 55on-demand scan 45

viruses 51

WWebImmune 142

Index

149McAfee Security for Lotus Domino, v7.5 (Windows) User Guide

Page 150: McAfeeSecurityforLotusDomino,v7.5 (Windows) UserGuide · PDF fileDomino McAfeeSecurityforLotusDominoinstallsanumberofcomponentsontoyourLotusDomino

McAfee Security for Lotus Domino, v7.5 (Windows) User Guide150

Index