Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Is it possible to create either an Identity or Access Policy scoped to a group of AD computer objects? We currently restrict a group of workstations by adding their IPs to an identity. This is cumbersome, as the IPs need to be reserved ahead of time ...
Gmail now has a new feature where you can set options for an email to "expire". The content of the email is basically a link back to Google. The domain you are taken to, confidential-mail.google.com is classified by the AVC scanner is WebMail where t...
Hello,
Can someone tell me what the mechanism is for the WSA to update new information from the CDA? For example, if there was no IP-user mapping and we re-auth'd the user and verified a mapping was created, when would the WSA get this info. Also, i...
We are currently looking to move to virtual appliances and in the process simplify our design a bit. In our current layout (explicit forward), we have P1 on the internal network and P2 in the DMZ. We don't like giving our virtual infrastructure acces...
Hello,
I'm looking for some guidance on best practices around attachment blocking. In our old SMTP gateway firewall, we had an attachment blocking policy that blocked certain filetypes and sent a notification to the recipient. Users could request the...
Thanks Ken, Confirms what I'm seeing and means that the WSA cannot do what I had hoped. I would think others may benefit from that feature so maybe an enhancement down the road?Tim
I have tried that in the past and it doesn't seem to work. To be clear, I'm talking about adding Computer objects to the group, not user objects. The WSA only seems to be able to look at the logged in user. The computer name never shows up anywhere i...
So now that macro detection is built in to the ESAs, do we know what the differences are? Is it more/less effective than these solutions? I'm using one of these with success but always looking to improve detection where possible. Even if just for the...
How long do you have the maximum retention set for? I'm just a little scared solely relying on the VOF in case it releases an attachment automatically that turns out to be malicious.