Advanced Search
Search Results
234 total results found
Creating an allowed senders filter list for Forefront Protection for Exchange
Forefront Protection 2010 for Exchange Server (FPE) provides allowed senders lists so that you can maintain lists of safe e-mail addresses or e-mail domains that are not subjected to filtering. (The allowed sender lists have no effect on scanning for malware a...
Whitelist in Fortinet FortiGate
Fortinet's FortiGate web filter can be configured to allow access to CyTech's phish and landing domains. We recommend whitelisting CyTech in Fortigate's web filter if your users experience issues accessing our landing pages (upon failing a phishing test). The...
Whitelist in McAfee or MX Logic
If your organization is using McAfee or MX Logic, you will need to whitelist CyTech's IPs as "Allowed Senders" to allow our phishing and training-related emails through to your end users. You can also whitelist by our mail server hostnames in this area, althou...
Whitelist in Mimecast
If you're using Mimecast's services, you can whitelist CyTech to allow our simulated phishing test emails and training notifications through to your end users. Below you'll find instructions for several different policies you'll need to add to your Mimecast ...
Whitelist in Proofpoint
If you're using Proofpoint Essential's spam filtering or Proofpoint Enterprise's Allowlist, you can whitelist CyTech to allow our simulated phishing test emails and training notifications through to your end users. The instructions below are for third-party ...
Whitelist in SonicWall
Whitelisting in your SonicWall services will allow your users to receive phishing and training-related emails from the CyTech console. The instructions below include information from the How can I add/import email addresses to allowed or blocked List on Email...
Whitelist in Sophos
Sophos Firewalls Whitelisting in Sophos firewall allows users who've failed your phishing tests to access CyTech's landing pages. The instructions below were created for Sophos XG firewalls, so other versions of Sophos firewalls may require a different set o...
Whitelist in SpamAssassin
If you're utilizing SpamAssassin's spam filtering, you can whitelist CyTech to allow our simulated phishing test emails and training notifications through to your end users. Although there is typically not an interface for SpamAssassin, you can edit your cust...
Whitelist in MessageLabs or Symantec.cloud
To successfully whitelist our phishing and training related emails when using MessageLabs or Symantec.cloud, you should add our IP addresses to a global Approved Senders list. This will allow our phishing and training related emails through. Note: Contact Cyt...
Whitelist in Trend Micro
If you're utilizing Trend Micro's services, you can whitelist CyTech to allow our simulated phishing test emails and training notifications through to your end users. If you run into issues whitelisting CyTech in your Trend Micro services, we recommend reachin...
Whitelist in VIPRE
If your organization uses VIPRE's Email Security for spam filtering, you can whitelist CyTech to allow our simulated phishing emails and training notifications to reach your end users. You can also whitelist CyTech's phishing and landing domains in VIPRE Endpo...
Forwarding logs from rsyslog client to a remote rsyslogs server
Introduction This guide will walk you through setting up Rsyslog for log forwarding between a client and a remote server using Linux. Setup Server: The machine which will send messageClient: The machine which will receive the message Prerequisites Soft...
Palo Alto Next Generation Firewall
Configure Syslog Monitoring STEP 1 - Configure a Syslog server profile. Select Device-->Server-->Profiles-->Syslog. Click Add and enter a Name for the profile. If the firewall has more than one virtual system (vsys), select...
Cisco Meraki - Configuring a Syslog Server
Method 1: Using GUI Configure log forwarding Sign in to the Meraki Dashboard with administrator permissions. If your account is a member of multiple organizations, select the organization that you want to configure in the Organization list. In the Ne...
CyberArk PAM
Configure the Vault to Forward syslog Messages to PTA The system logger of the Vault must be configured to send logging data to the PTA machine for real-time data analysis. When PTA is configured with Vaults deployed in a distributed environment, ...
Cato Networks - Configuring Event Log Forwarding with Two Windows Servers
How to Configure Windows Event Forwarding for User Awareness Cato Networks’ User Awareness feature usually imports the audit log events directly from the Domain Controller (DC). These log events are shown in the Event Discovery window in the C...
Nutanix
How to Send Logs to a Remote Syslog Server Summary: This article briefly describes how to configure a Nutanix cluster to send logs to an rsyslog server. Description: This article briefly describes configuring a Nutanix cluster to send logs to an rsyslog se...
ManageEngine
Log Forwarder EventLog Analyzer's Syslog Forwarder transmits logs from various sources to a destination server. Logs from syslog devices are forwarded as raw logs, whereas logs from other sources are converted to specific formats such as JSON, RFC 5424, RFC 5...
Forescout
Method 1: Network logs forwarding The Network logs forwarding page ("Settings" > "System Settings" > "Network logs forwarding") allows users to enable and configure the forwarding of Network Logs to a third-party solution by means of syslog messages. The pa...
CISCO Secure Endpoint - Secure Endpoint API
Authentication The Secure Endpoint API requires access via an authenticated and authorized account. Only authorized accounts are able to submit requests to API operations. All operations must communicate over a secure HTTPS connection. To authenticate and ...