Cyberoam Certificate Installation Guide

     Cyberoam Certificate Installation Guide

When SSL content inspection for HTTPS traffic is enabled on Cyberoam, the web browsers prompt a warning message if the Certificate Authority (CA) for the certificate used by the Cyberoam SSL inspection is not known by the browser. For this, you need to import Cyberoam SSL Proxy certificate in Internet Explorer and Firefox Mozilla for decryption on SSL Inspection.
All Cyberoam appliances are shipped with a unique SSL CA Certificate which is used in HTTPS Deep Scan Inspection. This article describes how you can download Cyberoam’s SSL CA Certificate and install it in your local browser and machine

Note:

Cyberoam also provides an option to regenerate the CA Certificate when required.

Configuration

To download and install the Certificate in your browser and local machine, follow the steps given below.

Step 1: Download the Certificate to your local machine

Go to System > Certificate > Certificate Authority and click on the download icon Download icon   under Manage column to download the Certificate, as shown below. Save it in your local machine.

Cyberoam Certificate

Step 2: Install Certificate in Trusted Certification List in your Browser

 

Internet Explorer

  • On the Menu Bar, click Tools > Internet Options to display the Internet Options window.
  • Switch to Content tab and, under Certificates section, click Certificates to display Certificates Window.
  • Switch to Trusted Root Certification Authorities tab and click the Import button to start Certificate Import Wizard.
  • Import the Certificate downloaded in step 1 using this wizard.

 

Firefox

  • On the Menu Bar, click Tools > Options to display the Options window.
  • Switch to Advanced tab under which select Encryption tab.
  • Click View Certificate to display the Certificate Manager window.
  • Switch to Authorities tab and click Import.
  • Select the Certificate downloaded in step 1 and click Open.
  • In the Downloading Certificate window, select Trust this CA to identify websites and click OK.

 

Google Chrome

  • On the right corner of the Address Bar, click on Chrome Tools button and click Settings.
  • Click Show advanced settings… and scroll down to HTTPS/SSL.
  • Click Manage Certificates… to display the Certificates window.
  • Switch to Trusted Root Certification Authorities tab and click the Import button to start Certificate Import Wizard.
  • Import the Certificate downloaded in step 1 using this wizard.

 

Safari

  • Download the SSL CA Certificate as shown in step 1.
  • Once downloaded, double-click the Certificate. This launches Keychain Access and displays Certificate Not Trusted Warning.
  • Click Always Trust to import the certificate into login keychain.

 

Opera

  • Click the Opera button on the top left corner of the screen and click Settings.
  • Switch to Privacy & Security tab.
  • Under HTTPS/SSL, click Manage Certificates…to display the Certificates window.
  • Switch to Trusted Root Certification Authorities band click the Import button to start Certificate Import Wizard.
  • Import the Certificate downloaded in step 1 using this wizard.
Step 3: Install Certificate in Local Machine’s Trusted Root Authority Container
Windows
  • Open the Microsoft Management Console by typing “MMC” in the run box.
  • Add the certificates Snap-in by selecting FILE à ADD/REMOVE SNAP-IN…
  • Select Certificates from the list and click Add to display Certificates Snap-in window.
  • Select the Computer Account and click Next.
  • Click Finish and close the list of snap-ins.
  • Click OK to add the certificates snap-in, which should now be visible in the Add/Remove Snap-ins window.
  • Expand the list of certificate containers, right click Trusted Root Authorities and choose All Tasks à Import to start Certificate Import Wizard.
  • Import the Certificate downloaded in step 2 using this wizard.

Macintosh

  • Download the SSL CA Certificate as shown in step 1.
  • Once downloaded, double-click the Certificate. This launches Key chain Access and displays Certificate Not Trusted Warning.
  • Click Always Trust to import the certificate into login key chain.

 

 

Symantec Encryption Family

Symantec’s encryption portfolio includes endpoint, file and folder and email encryption. Integration with Symantec Data Loss Prevention automatically encrypts sensitive data being moved onto removable media devices or residing in emails and files. Robust management features include individual and group key management, automated policy controls, and out-of-the-box, compliance-based reporting.
The number of data breaches is on the rise. There was a 23% increase in data breaches last year over the previous year. The average number of identities exposed per breach is 1.1 million.

 

Protect your sensitive information with Symantec  

Where is your data being stored and how is it being used-Symantec Encryption

Symantec Encryption

 

How to make shoppers feel safe online and boost your sales at the same time

Methods of Safe Online Shopping

Safe Online Shopping

No wonder consumers still get a shiver of anxiety when they shop
online.In fact, people abandon more than two-thirds of online
purchases due to lack of trust.

This white paper explains the reason behind consumer anxiety and
best practices on how you earn their trust.

EV SSL working

top

 

ev ssl

bottom most ev -sslbottom_ev ssl

 

 

 

Protect Google and Google Apps Accounts with Password Alert

Protect Google and Google Apps Accounts, Today Google launching Password Alert, an open-source Chrome extension that helps protect Google and Google Apps Accounts from phishing attacks and encourages people to use different passwords for different sites, a security best practice.

When an employee with Password Alert installed enters their Google password into any site other than an authentic Google sign-in page (accounts.google.com), that employee will receive an email notifying them to change their password.

In addition, Google Apps admins can choose to deploy an App Engine App that allows for, among other things, auditing and notifications to admins when employees enter their passwords into non-Google websites, and the ability to force those employees to change their passwords after doing so.

As an admin, you can install the Password Alert Chrome extension for all or some members of your domain. To get started with Password Alert, check out the Help Center and FAQ linked below. The Help Center includes a useful Deployment Guide, which outlines the options and requirements for enabling Password Alert for your domain.

Release track:
Rapid release and Scheduled release

Reference by  www.google.com

 

Symantec PGP End Point Encryption Solution

What is Endpoint Encryption?

 

When it comes to encrypting data, there are various encryption strategies.

Disk encryption protects a hard drive in the event of theft or accidental loss by encrypting the entire disk including swap files, system files,

and hibernation files. If an encrypted disk is lost, stolen, or placed into another computer, the encrypted state of the drive remains

unchanged, ensuring only an authorized user can access its contents.

Some endpoint encryption solutions (like Symantec™ Endpoint Encryption) also include support to encrypt files stored on or copied to

removable media devices. As with disk encryption, removable media encryption helps prevent unauthorized access to information on lost or

stolen devices (in this case the devices are USB flash drives, external hard drives (USB, FireWire, and eSATA), SD cards, and compact flash

cards). In this way, organizations can benefit from the productivity gains associated from collaboration using removable storage without

putting data at risk.

How Disk Encryption Works

During the startup process of an operating system, a boot sequence is executed. The boot system is the initial set of operations that the

computer performs when it is switched on. A boot loader (or a bootstrap loader) is a short computer program that loads the main operating

system for the computer. The boot loader first looks at a boot record or partition table, which is the logical area “zero” (or starting point) of

the disk drive.

Disk encryption modifies the boot sector. For example, a computer protected with Symantec™ Endpoint Encryption presents a modified preboot

environment for the user to authenticate to the computer.

This modified pre-boot screen prompts the user for authentication credentials in the form of a passphrase (typically a longer password, often

resembling a sentence). At this point, the computer may ask for additional credentials such as a smart card, token, or other two-factor

authentication.

After the user enters valid authentication credentials, the operating system continues to load as normal and the user can access the

computer.

Most disk encryption software operates in conjunction with the file system architecture. It filters I/O operations for one or more file systems

or file system volumes.

When a drive is encrypted for the first time, it converts unencrypted drive blocks into encrypted blocks one at a time. Disk encryption allows

users to continue working as normal during this initial encryption process by varying the amount CPU power assigned to the initial encryption

process.

When a user accesses a file, disk encryption decrypts the data in memory before it is presented for viewing. If the user makes any changes to

the file, the data is encrypted in memory and written back to the relevant disk drive block just as it would be without encryption. Decrypted

data is never available on the disk. The encryption/decryption process happens at such a speed that it appears completely transparent to the

User.

How Removable Media Encryption Works

Removable media encryption software provides the ability to encrypt files on removable storage devices.

When a user copies files of a system onto a removable storage device, each file is encrypted to a password, a shared key or a certificate. At

the same time, utilities for Windows or Mac systems can be copied (if permitted by policy) allowing authorized access to data without the

endpoint client installed on a machine.

This file encryption can be governed by policy, user action, or Symantec DLP. In the case of Symantec DLP, the Endpoint Prevent software

monitors users’ machines and understands when a person is moving a sensitive file off his computer. With the integration of Symantec DLP

and Symantec Endpoint Encryption, administrators can ensure files with sensitive information that are moving to removable media are

encrypted rather than blocked, allowing business processes to continue in a secure manner.

To access the information, when the user inserts a removable media device like a USB drive with encrypted files into a computer system, the

removable media encryption software will prompt for passphrase, and upon successful authentication, the user can access the file.

Key Features

  • Built PGP Strong – High performing, strong encryption, built with PGP Hybrid Cryptographic Optimizer (HCO) technology and leveraging AES-NI hardware optimization for even faster encryption speeds.
  • Robust Reporting – Administrators can take advantage of out-of-the-box compliance reports or customize their own reports to help ease the burden of proof to auditors and key stakeholders.
  • Active Directory Support – Individual and group policies and keys can be synchronized with Active Directory to help speed deployments and reduce administration burdens.
  • Key Recovery – Multiple recovery options allow organizations to determine the right solution for them to minimize potential lockouts and reduce HelpDesk calls.
  • Single-Sign-On – SSO means fewer passwords for users to remember.

Key Benefits

 
  • User-Friendly – Installation and registration is completely transparent to users, while CPU utilization during initial encryption is minimized to ensure that users can continue being productive while encryption happens in the background.
  • Flexible – Support multi-user deployments in both Active Directory and non-Active Directory environments.
  • Collaborative – Users can access encrypted data on removable media safely even on systems without Symantec Endpoint Encryption installed.
  • Scalable – Scalable management architecture easily adapts to small and large enterprise environments.
  • Stronger Protection – Symantec’s market leading Data Loss Prevention (DLP) software integrates with removable media encryption to analyze data before it’s transferred and automatically encrypt sensitive outgoing data.

Protect Google and Google Apps Accounts with Password Alert

Today we’re launching Password Alert, an open-source Chrome extension that helps protect Google and Google Apps Accounts from phishing attacks and encourages people to use different passwords for different sites, a security best practice.

When an employee with Password Alert installed enters their Google password into any site other than an authentic Google sign-in page (accounts.google.com), that employee will receive an email notifying them to change their password.

In addition, Google Apps admins can choose to deploy an App Engine App that allows for, among other things, auditing and notifications to admins when employees enter their passwords into non-Google websites, and the ability to force those employees to change their passwords after doing so.

As an admin, you can install the Password Alert Chrome extension for all or some members of your domain. To get started with Password Alert, check out the Help Center and FAQ linked below. The Help Center includes a useful Deployment Guide, which outlines the options and requirements for enabling Password Alert for your domain.

Release track:
Rapid release and Scheduled release

Animation improvements in Google Slides

Improvements in Google Slides

Animations are an easy way to make your presentations look more dynamic in Google Slides.  Starting today, you can improve your Slides presentations with two new animations: Appear and Disappear. You can also now set the direction (to and from left, right, top, and bottom) of two previously existing animations: Fly in and Fly out.
Animation-improvements-in-Google-Slides

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Release track:
Rapid release and Scheduled release

More information:
Help Center

Reference by www.google.com

New ways to work together in Classroom

Google Classroom allows teachers to spend less time on paperwork and more time with their students. Starting today, multiple teachers can work and collaborate in a single Classroom class. With the exception of deleting the class altogether, additional teachers can perform all of the same functions as the primary teacher, including:

  • Creating assignments and announcements
  • Viewing and grading submissions
  • Participating in comments on the class’ “stream”
  • Inviting students to the class
  • Receiving email notifications related to the class

 

Teachers can also prep for their classes in advance, saving announcements and assignments as “drafts” and waiting to send them until they’re ready. Like in Gmail, once a new announcement or assignment is created, it will be automatically saved as a draft. Those drafts can then be accessed by multiple teachers, making it simple to collaborate on prep work.

Finally, in response to teacher feedback, we’ve made two additional changes that will make Classroom easier to use:

  • Autosaving grades – Grades will now be autosaved as they’re entered, meaning teachers can grade assignments over multiple sessions but still return those assignments to students all at one time.
  • Improved notifications – Teachers and students will now receive email notifications when private messages are left on assignments.

Release track:  
Rapid release and Scheduled release

More information:
Help Center: Invite teachers to a class

Reference by Google

You will soon have access to Office 2016 desktop applications

Office16_NewOffice

 

The brand new Office 2016 desktop apps are here, included in your organisation’s Office 365 subscription. There is no immediate action needed, but you can now discover what’s new in Office 2016 and learn more about your deployment options.

See what’s new in Office 2016

Office16_feature_CoffeeShopPhone_194x194The most secure Office
Office 2016 now supports Multi-Factor Authentication, which allows secure access to content outside of the corporate network. Data Loss Prevention gives you tools to centrally create, manage and enforce policies. 

 

Flexible click to run options
Deferred updates and simplified activation management give you more control over your deployment options

 Office16_feature_WriteboardReview

Office16_featureManWorking  New Internet-friendly MAPI-HTTP protocol enhances Exchange/Outlook connectivity. Users benefit from reduced time to download messages and new settings to better manage

Reference by Microsoft