?
Solved

Setup and configure Webmarshal

Posted on 2013-11-19
3
Medium Priority
?
532 Views
Last Modified: 2014-03-26
Hi All

We're setting up Webmarshal, and would like to know what is the best way of setting this up? And also be able to push out the policy to all machines of different platform (eg. Windows, MAC, Linux etc). Also whether they are joined to the domain or not.

Can anyone please advise?

Cheers
Goraek
0
Comment
Question by:goraek
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 50

Accepted Solution

by:
jcimarron earned 1500 total points
ID: 39663844
goraek--
Are you aware that TrustWave.com offers a User Guide for WebMarshal?  
www.trustwave.com/downloads/WebMarshalUserGuide6_9_6.pdf

SetUp and Configuration are discussed in Chapter 3.  There are some updates in
https://www.trustwave.com/downloads/WMReleaseNotes6_10_1_7787.htm
0
 
LVL 2

Author Closing Comment

by:goraek
ID: 39955079
great info.
0
 
LVL 50

Expert Comment

by:jcimarron
ID: 39956481
goraek--
Glad to have helped.
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses
Course of the Month12 days, 15 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question