?
Solved

Setup and configure Webmarshal

Posted on 2013-11-19
3
Medium Priority
?
543 Views
Last Modified: 2014-03-26
Hi All

We're setting up Webmarshal, and would like to know what is the best way of setting this up? And also be able to push out the policy to all machines of different platform (eg. Windows, MAC, Linux etc). Also whether they are joined to the domain or not.

Can anyone please advise?

Cheers
Goraek
0
Comment
Question by:goraek
  • 2
3 Comments
 
LVL 50

Accepted Solution

by:
jcimarron earned 1500 total points
ID: 39663844
goraek--
Are you aware that TrustWave.com offers a User Guide for WebMarshal?  
www.trustwave.com/downloads/WebMarshalUserGuide6_9_6.pdf

SetUp and Configuration are discussed in Chapter 3.  There are some updates in
https://www.trustwave.com/downloads/WMReleaseNotes6_10_1_7787.htm
0
 
LVL 2

Author Closing Comment

by:goraek
ID: 39955079
great info.
0
 
LVL 50

Expert Comment

by:jcimarron
ID: 39956481
goraek--
Glad to have helped.
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

807 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question