Skip to main content

Message Security for Google Apps launches Message Log Search


Message Security for Google Apps, powered by Postini, now provides Message Log Search. This provides administrators with visibility into how messages are processed, filtered and delivered, and insight in the traffic patterns for the domain.

Use Message Log Search to:
- Run searches on message log data using a variety of criteria and queries.
- View search results and details about groups or individual messages.
- Track what happened to an inbound or outbound message -- whether it was delivered, quarantined, archived, encrypted, or other disposition -- and see if the message triggered a specific filter.
- Track all messages for a specific sender, recipient, domain, or IP address.
Editions included:
Premier and qualifying Education Editions

Languages included:
English Only

How to access what's new:
- Log in to the Message Security Administration Console, and click the Log Search tab.
- From the Log Search page, you can run queries and view results.

For more information:
Message Security for Google Apps Administration Guide

Get these product update alerts by email
Subscribe to the RSS feed of these updates

Posted: 05 Feb 2010 01:43 AM PST

New mobile device management capabilities have been released that allow administrators to:

- Remotely wipe all data from lost or stolen mobile devices.
- Lock idle devices after a period of inactivity.
- Require a device password on each phone.
- Set minimum lengths for more secure passwords.
- Require passwords to include letters, numbers and punctuation.

Editions included:
Premier and Education Editions

Languages included:
US English Only

How to access what's new:
- In the Google Apps Administrator Control Panel, go to 'Service Settings', then 'Mobile' to access the new options.
- Once your users start synching their devices with Google Apps, you can view, manage, or delete the device data remotely (remote wipe) from the user account page in the Control Panel.

For more information:
http://googleenterprise.blogspot.com/2010/02/google-apps-adds-enterprise-admin_03.html
http://www.google.com/support/a/bin/answer.py?hl=en&answer=138651

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp