Managing the Microsoft Outlook Web Access 2003 SP1/SP2 application in IAG SP2

Applies To: Intelligent Application Gateway (IAG)

Application-specific settings

For organizations that use Everywhere Networks’ SecureView for OWA Enterprise 3.0, Whale Communications Intelligent Application Gateway (IAG) 2007 provides a dedicated endpoint policy for secure handling of attachments via SecureView on Microsoft Outlook Web Access 2003 SP1 and SP2. The SecureView for OWA2003 SP1 policy defines the security level that is required on the client endpoint in order to enable full functionality of the application. When an endpoint does not comply with the requirements of the policy, the following functionality is disabled when the user handles attachments in Microsoft Outlook Web Access 2003 SP1 or SP2:

  • Attachments open in a browser with a "view only" display- the menu bar, toolbar, address bar, and status bar are not displayed.

  • When an attachment is open, the user cannot:

    • Right-click the attachment

    • Use the Ctrl+C keyboard combination in Internet Explorer

    • Use the "Print Version" option in Navigation View

  • When a user right-clicks an attachment link, the following options are disabled:

    • Save Target As

    • Print View

By default, the value of the policy is as follows:

  • The value of the Windows platform-specific policy is "any_anti_virus", and the functionality is allowed from endpoint computers running an anti virus program on Windows operating systems.

  • The value of the MAC OS, Linux, and Other platform-specific policies is "Never", and the functionality is blocked from endpoint computers running operating systems other than Windows, or computers running Windows operating systems with no anti virus program.

If required, you can modify the default definition of the policy, to change the security level that is required on the endpoint computer.

To modify the "SecureView for OWA2003 SP1" policy

  1. In the Configuration program, access either the General tab of Application Properties dialog box or the Session tab of the Advanced Trunk Configuration window, and click Manage Policies.

  2. To define the prerequisites that endpoint computers must meet in order to enable the operations that are described in this topic, remove the default value from the relevant platforms, and add the appropriate variables to the platform-specific policies. For more information, see Managing IAG client endpoint policies.

  3. On the toolbar of the Configuration console, click the Activate Configuration icon, and then on the Activate Configuration dialog box, click Activate.

    When the configuration is activated, the message "IAG configuration activated successfully" appears.

    The security level for access from on endpoint computers will depend on their compliance with the security policy that you define here.