I want to add a file request link to my Outlook signature


Add a File Request Link to Your Outlook Signature

1. Open a New Outlook Email Message.

2. Click the Request Files button, then Use Custom Settings.

  • Configure the options to your liking, designate your preferred uploading destination, and don’t forget to adjust your expiration settings! Click OK to generate the link.
User-added image

3. Highlight the newly generated Request a File link, right-click and select Copy.

User-added image

4. Click Signature in the ribbon and edit the Signature you wish to add the link to. Paste the Request a File link into the signature.

User-added image

5. Click OK to save the changes to your signature.

Related:

  • No Related Posts

Error while login page for ShareFile

Un-reconcile and reconcile the user account in the App Controller admin UI.

  1. Login to the admin UI at https://appc:4443/admin. Select the view as Manage users.

  2. Click Apps tab.

  3. Click Active Directory.

  4. Search for the user.

  5. Click the red arrows under un-reconcile. The browser prompts you to confirm that you want to un-reconcile the user. Click OK.

  6. Find the affected user account.

  7. Click the green arrows under Reconcile to reconcile the account.

  8. Search for the user.

  9. Click the green arrows to reconcile the account. The browser will confirm that you want to reconcile the account. Click OK.

Manually Sync active directory in App Controller

  1. Login at the appc control point https://appc:4443/ControlPoint.

  2. Click Settings.

  3. Click Active Directory on the left.

  4. Click Sync button under the Actions column.

Manually Sync Sharefile

  1. Click Apps and Docs tab.

  2. Click ShareFile under the Docs section on the left.

  3. Click Sync next to Sharefile Configuration.

When all the preceding steps are completed, if the user experiences the error message after logging into the session, wait until the automatic sync of App Controller and Sharefile.

Note: The automatic sync of App Controller and Sharefile occurs at 2 am daily.

Related:

  • No Related Posts

How to Backdate Virus Definitions in Symantec Endpoint Protection Manager

I do not need a solution (just sharing information)

***Taken From Symantec Support TECH102935 ***

You suspect that the virus definitions currently in use by Symantec Endpoint Protection (SEP) clients are corrupt, and would like to roll back to a previous virus definition set. These clients are managed by a Symantec Endpoint Protection Manager (SEPM).  You wish to configure or control the content revisions that clients use.

Please note:

the example below shows reverting AntiVirus definitions to an earlier version.  The procedure works with other SEP components as well (reverting to an earlier release of IPS definitions, etc)

To rollback definitions, the [LiveUpdate Settings] policy -> Server settings -> [Use default management server] must be enabled.

The method described below can also be used to circumvent a confirmed False Positive (FP) until definitions are available that remove the detection.  In the case of False Positives, though, creating a specific exclusion or awaiting new Rapid Release definitions is the recommended approach.  As each set of new definitions includes protection against new threats, reverting to an older revision will always introduce security risk into an organization.

SOLUTION:

Follow the steps below to roll back virus definitions in Symantec Endpoint Protection Manager:

  1. Click Policies
  2. Select View Policies
  3. Click LiveUpdate.
  4. Double-click your current LiveUpdate Content Policy Under the “LiveUpdate Content” tab. The LiveUpdate Content Policy Overview dialog box appears.
  5. From the “LiveUpdate Content” section, click Security Definitions.
  6. Enable the Select a revision option located in the “AntiVirus and AntiSpyware definitions” section,
  7. Click the Edit button. The Select Revision – Antivirus and AntiSpyware definitions dialog box appears.
  8. Expand the drop-down list and browse to the appropriate (32-bit or 64-bit) definition set.
  9. Click the desired rollback definition date.
  10. Click OK.
  11. Click OK to close the “Security Definitions” dialog box and return to the “Policies” tab.

Note: Remember to later return to your LiveUpdate Content Policy and change back to the Use latest available option.  Definitions on all endpoints must be kept current in order to protect against the latest threats in circulation. 

Click HERE to go to original TECH article

0

Related:

Trying to buy SEP 15

I do not need a solution (just sharing information)

Is it just me or is Symantec TRYING to be the most frustrating company to deal with?

I wanted to buy SEP15 for my premises, the th web site says it’s only cloud, so i click on BUY – and it takes me to buy SEP14

I find another path, click on SEP 15  click on Upgrade and it takes me to a link that explains I have to select TRIAL and then after the Trial is initiated I can UPGRADE.

So then I select Trial, I have to become a “tenant” whatever that means … and then when I fill out this preposterous form that asks information that really is well and truly NONE  of their business ….   I get a page telling me that my request is being processed and i will receive an email when I am approved.

?? This is more steps than it takes to buy a gun in 27 states ??

Is there any reason it needs to be THIS difficult?

0

Related:

Advisory: Sophos Email Appliance – Time-of-Click (ToC) incorrectly quarantining emails

Sophos is investigating an issue related to Time-of-Click incorrectly quarantining emails. This issue is caused when an encoded URL is larger then the max 990 character limit of ToC, the message is then placed into quarantine with the reason “TimeOfClick”.

Applies to the following Sophos product(s) and version(s)

Sophos Email Appliance

This issue potentially affects Sophos Email Appliance customers on v4.5.1.0.

Users are not aware that their message has been quarantined, and only the administrator can view and release them.

This issue will be resolved with the scheduled hotfix release of SEA v4.5.1.1:

  • First Customer Shipment: 30 Apr 2019
  • General Availability: 7 May 2019

Please follow this article for the latest updates.

Customers experiencing issues may temporarily disable ToC in the meantime.

If you’ve spotted an error or would like to provide feedback on this article, please use the section below to rate and comment on the article.

This is invaluable to us to ensure that we continually strive to give our customers the best information possible.

Related:

Advisory: How to block JavaScript cryptominers

Sophos Web Control can be used to block users from accessing websites categorized as hacking, thus web-based cryptominers are blocked. This feature is both available on the Sophos endpoint and network security products.

This article provides instructions on how to ensure protection against JavaScript cryptominers hosted on a website, such as Coinhive.

Note: This affects the websites that users can visit. It is recommended to test the policy first before deploying them.

The following sections are covered:

Applies to the following Sophos products and versions

Sophos UTM

Sophos Web Appliance

Sophos Firewall

Sophos Endpoint Security

Sophos Central Admin

Sophos Home

Sophos Central Admin

Sophos Enterprise Console managed endpoints and servers

  1. Open Sophos Enterprise Console.
  2. Navigate to Policies > Web Control.
  3. Right-click on the web control policy that is to be changed and select View/Edit Policy
  4. From the General tab, select Enable web control.
  5. Make sure Hacking is set to Block.
  6. Click OK and confirm the changes within the policy.

Sophos Central managed endpoints and servers

  1. Log in to Sophos Central.
  2. Navigate to Endpoint Protection or Server Protection.

  3. Go to Policies > Web Control then select the policy you want to change.

  4. Select the Settings tab and make sure Web Control is enabled.

  5. Under Acceptable Web Usage, click View Details and find Adult and potentially inappropriate categories.

  6. Click View More and make sure Hacking is set to Block.

Sophos Home

  1. Log in to Sophos Home
  2. On the dashboard, select the computer to where the settings will be applied.

  3. Go to Web Filtering tab and in the Adult & Potentially Inappropriate section ensure that Hacking it set to Block.

Sophos XG Firewall

  1. Navigate to Protect > Web > Policies > then expand the policy you need to modify.

  2. Click on the + symbol then select Add Rule Above.

  3. Click on the corresponding item under Activities column then click Add New Item.

  4. Select Show Only > Web Category.

  5. Untick ALLWebTraffic, if it is ticked.

  6. Scroll down to locate and select Hacking > click on Apply 1 selected items.

  7. Ensure that the status of the rule is set to Block HTTP and is enabled.

Sophos UTM

  1. Navigate to Web Protection > Web Filtering > Policies.
  2. Select Default content filter action.

  3. On the Categories tab, set the Criminal Activities category to Block > click Save.

Note: The Category of Criminal Activities contains multiple web categories inside it, including the Hacking category needed to block cryptominers.To edit these categories, select Web Protection > Filtering Options > Categories.

Sophos Web Appliance

  1. Navigate to Configuration > Group Policy > Default Policy.
  2. Set the Hacking category to Block.

  3. Click Apply.

For instances that you want to block hacking websites but authorize cryptominers, follow the steps on how to authorize JavaScript Cryptominers. To understand more about cryptominers and why Sophos blocks them, see Web based cryptominers are malware.

If you’ve spotted an error or would like to provide feedback on this article, please use the section below to rate and comment on the article.

This is invaluable to us to ensure that we continually strive to give our customers the best information possible.

Related:

How to Collect Diagnostic Bundle Files from a NetScaler Appliance

Complete the following procedure for MPX and VPX appliances:

Complete the following procedure for SDX appliances:

Running the Collector Script in NetScaler Software Release 9.2 and Later

To obtain the collector file by using the NetScaler GUI, complete the following procedure:

Note: In NetScaler software release 9.2 and later, you can run the showtechsupport script from the Graphical User Interface (GUI) and the Command Line Interface (CLI).

  1. Open the Configuration Utility with the NetScaler Management IP address from a web browser.

  2. Expand the System node.

  3. Select the Diagnostics node.

  4. Click the GenerateSupportFile link under the Technical Support Tools section.

To obtain the collector file by using the NetScaler CLI, complete the following procedure:

Download the file from the appliance using a Secure FTP (SFTP) or Secure Copy (SCP) utility, such as WinSCP, and upload it to Citrix Insight Services for analysis.

Note: In NetScaler software release earlier than 9.0, the collector script must be downloaded separately and executed.

Note: In case of Netscaler in Cluster deployment please use the following CLI command to generate the collector file:

> show techsupport -scope CLUSTER

This will collect show techsupport information from all nodes in the cluster and compress the files into a single archive.

In order to generate the collector file from Graphical User Interface (GUI) please select “Partition” option from the Scope

  • Click Run and wait for the script to generate the collector archive.

  • After the appliance generates the collector archive, download and save the file on your local computer before uploading it to Citrix Insight Services.

    1. To obtain the collector file by using the CLI, run the following command:

      show techsupport

      After the appliance generates the collector archive the location of the file is displayed as shown in the following screen shot:

      User-added image

      The file is stored in /var/tmp/support and you can verify this by logging in to NetScaler and running the following command from a shell prompt:

      root@NS# cd /var/tmp/support/

      root@NS# ls -l

      total 2drwxr-xr-x 7 root wheel 512 Sep 25 15:38 collector_P_10.10.1.1_25Sep2014_15_38root@NS#

Uploading and Running the Collector Script on a NetScaler Appliance

To upload and run the updated collector script on a NetScaler appliance, complete the following procedure:

  1. Copy the updated collector script showtechsupport.pl (attached with this article) to the /nsconfig directory of the NetScaler appliance. Use an SFTP or SCP utility, such as WinSCP, to copy the file to the NetScaler appliance.

  2. Run the following commands from the CLI of the appliance:

    > shell

    # cd /nsconfig

    # chmod +x showtechsupport.pl

    # ./showtechsupport.pl

  3. Switch to the CLI of the appliance.

  4. Run the following command to create log files for analysis:

    > show techsupport

    The collector_<NSIP>_<P/S>_<DateTime>.tgz file is created in the /var/tmp/support directory of the appliance.

    Note: You must then upload the .tgz file to Citrix Insight Services for analysis.

  5. If you must uninstall this script, run the following commands from the CLI of the appliance:

    > shell

    rm /nsconfig/showtechsupport.pl

Collecting a Full Diagnostics Bundle from NetScaler SDX

  1. Open the NetScaler SDX Configuration Utility with the NetScaler SDX Management IP address from a web browser.

  2. Expand the Diagnostics node.

  3. Select the Technical Support node.

  4. Click Generate Technical Support File.

  5. Select Appliance (Including Instances) from the drop-down menu.

  6. Click Add.

  7. Select one or more instances to add in.

  8. Click OK. Wait for the process to complete.

  9. Select the bundle name that was generated and then click Download.

  10. Upload the bundle file to Citrix Insight Services.

For information on collecting/deleting NetScaler SDX support bundle using CLI/serial console refer to Citrix Documentation.

Related:

How to Convert PFX Certificate to PEM Format for Use with NetScaler

Complete one of the following procedure to convert PFX certificate to PEM format for use with NetScaler:

NetScaler Wizard

Complete the following procedure to convert a PFX certificate to PEM format using NetScaler Wizard:

  1. Navigate to Traffic Management, Select the SSL node.

  2. Click the Import PKCS#12 link.

    User-added image

  3. Specify a file name you want for the PEM certificate in the Output File Name field.

  4. Click Browse and select the PFX certificate that you want to convert to PEM format. Some users prefer to upload the certificate to /ncsonfig/SSL directory and use it from there. If PFX certificate is stored on NetScaler then choose option Appliance and if it stored on your workstation then use Local.

    User-added image

  5. Specify the Import Password.

  6. Click OK.

    User-added image

  7. If the file is encoded, then select DES or 3DES as the Encoding Format:

    User-added image

  8. Specify the PEM Passphrase and the Verify PEM Passphrase.

  9. Click the Manage Certificates / Keys / CSRs link to view the converted PEM certificate files.

    User-added image

  10. You can view the uploaded PFX file with the converted PEM file.

    User-added image

  11. Expand the SSL node.

  12. Select the Certificates node.

  13. Click Install.

  14. Specify a Certificate-Key Pair Name in the Install Certificate wizard.

  15. Browse to the PEM file for both the Certificate File Name and Private Key File Name.

  16. Specify the Password.

  17. Click Install.

    User-added image

  18. Bind the certificate key pair to an SSL load balancing virtual server or NetScaler Gateway virtual server.

OpenSSL Utility

If you have requested and installed a certificate onto a Windows server using the Internet Information Service (IIS) certificate wizard, you can export that certificate with its private key to a Personal Information Exchange (PFX) file. To import this certificate onto the NetScaler Gateway, you must convert the PFX file to unencrypted PEM format.

You can use the open source utility OpenSSL to perform the conversion from PFX to PEM. Download a Win32 distribution of OpenSSL from Win32 OpenSSL.

You might also need C++ redistributable files if you want to use OpenSSL. Download this from Microsoft Visual C++ 2008 Redistributable Package (x86).

To convert a PFX file to a PEM file, complete the following steps on a Windows machine:

  1. Download and install the Win32 OpenSSL package from Win32 OpenSSL.

  2. Create a folder c:certs and copy the file yourcert.pfx into the c:certs folder.

  3. Open command prompt and change into the OpenSSLbin directory:

    cd %homedrive%OpenSSLbin

  4. Run the following command to convert the PFX file to an unencrypted PEM file (all in one line):

    openssl pkcs12 -in c:certsyourcert.pfx -out c:certscag.pem –nodes

    User-added image

  5. When prompted for the import password, enter the password you used when exporting the certificate to a PFX file. You should receive a message that says MAC verified OK.

    User-added image

  6. Point a browser to the NetScaler Gateway administration portal or HTTPS port 9001: https://netscaler-gateway-server:9001.

  7. Log on as root. The default password is rootadmin.

  8. Click the Maintenance link at the top of the page.

  9. Click the Browse button next to the Upload Private Key+Certificate (.pem) field. Browse to the c:certscag.pem file and click Upload.

  10. Restart NetScaler Gateway for the new SSL certificate to be applied.

Related:

  • No Related Posts