Skip to main content

LevelBlue Named Official Cybersecurity Advisor of the PGA of America. Learn more

LevelBlue Named Official Cybersecurity Advisor of the PGA of America. Learn more

Services
Cyber Advisory
Managed Cloud Security
Data Security
Managed Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
PGA of America Partnership
Secure What's Next
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Loading...
Loading...

HOWTO: How do I install the Console or Configurator on a remote network workstation?

Expand / Collapse


This article applies to:

  • MailMarshal (SEG) 8.X
  • MailMarshal ECM/MailMarshal Exchange 7.X

Question:

How do I install the Console or Configurator on a remote network workstation?

 

Procedure:

It is possible to install and run the MailMarshal Console or Configurator user interfaces on any workstation on the network that meets the software prerequisites.

Prerequisites for the Configurator and Console are often less than server prerequisites.

For details of the prerequisites, see the User Guide for your product version. 

    Tip: SEG 8.X interfaces CAN be installed on Workstation operating systems (Windows 10 or 11).
    Current versions of the products also include a Web-based Console that allows this functionality to be used without local installation. For information about the Web Console see the User Guide.

    SEG/MailMarshal SMTP 8.X
    ECM/MailMarshal Exchange 7.X

    Console Installation:

    1. On the workstation, run the setup program.
    2. Select Custom Install.
    3. Uncheck Array Manager and Server.
    4. Ensure Console is checked.
    5. After the software is installed, run the Console and connect to the IP address of the Array Manager. 

    Console Permissions:

    The Console uses Windows authentication through the Microsoft Windows secure RPC mechanism to communicate with the MailMarshal Array Manager server. If the Array Manager is in a different domain, you can enter credentials, or set up a trust relationship.  

    Granular security can be set via the Configurator:

    1. In the Configurator, navigate to Tools | MailMarshal  (Manager) Properties | Console Security.
    2. Assign user rights to control access to Console components such as message viewing, message actions, history access etc.
    3. In the Configurator, modify the properties of Folders to control access to items quarantined in each folder.

    Configurator Installation:

    1. On the workstation, run the MailMarshal setup program.
    2. Select Custom Install.
    3. Uncheck Array Manager and Server.
    4. Ensure Configurator is checked.
    5. After the software is installed, run the Configurator and connect to the IP address of the MailMarshal Array Manager.  

    Configurator Permissions:

    To connect using the Configurator, you must use an account in the Administrators group of the Array Manager computer.

    DMZ and Firewall configuration

    Best practice is to install the Array Manager and any Configurator instances on an internal network. The Array Manager communicates with processing nodes through a single RPC port (by default port 19001). For MailMarshal SMTP in particular, this design allows processing servers in a DMZ to be managed with minimal exposure.
    Console:  The Console and Web Console connect to the Array Manager using the same port as the processing nodes. The Consoles can safely be installed in a DMZ.

    Configurator: The Configurator requires access through additional NetBios ports. LevelBlue does not recommend opening these ports to a DMZ. Remote access to the Configurator could be through RDP or a secure VPN connection.

    This article was previously published as:
    NETIQKB29131
    Marshal KB75

    To contact LevelBlue about this article or to request support:


    Rate this Article:
         

    Add Your Comments


    Comment submission is disabled for anonymous users.
    Please send feedback to Trustwave Technical Support or the Webmaster
    .