Get access to immediate incident response assistance.
Eliminate active threats with 24/7 threat detection, investigation, and response.
Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.
Advance your cybersecurity program and get expert guidance where you need it most.
Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.
Prevent unauthorized access and exceed compliance requirements.
Stop email threats others miss and secure your organization against the #1 ransomware attack vector.
Prepare for the inevitable with 24/7 global breach response in-region and available on-site.
Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.
Warning: Using the Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Trustwave cannot guarantee that problems resulting from the incorrect use of Registry Editor can be resolved. Make sure that you back up your Registry prior to making any changes.
You can only set the authentication mode for the Spam Quarantine Management Web site once. This restriction is intended to ensure consistency if you use more than one Web server to host this site. If you have selected the incorrect authentication mode and wish to change it, you can delete the authentication information. Users will lose all logins, delegation settings, and personal blocked and safe lists.
Note: The procedure differs by product and version. Be sure to follow the correct sections below.
Regedit
HKEY_LOCAL_MACHINE\SOFTWARE\Trustwave\Secure Email Gateway\Manager
SSMAuthMode
Note: When changing the settings, you must perform these steps on each web server. (However, a new server will retrieve the default settings from the Array Manager.)
C:\Program Files\Microsoft SQL Server
osql -S <servername\instancename> -d <database> –U <username>
<servername\instancename>
<database>
<username>
osql -S VM-EXAMPLE40\SQLEXPRESS -d MailMarshal –U sa
-S VM-EXAMPLE40\SQLEXPRESS
1> delete UserList 2> delete UserDelegate 3> delete UserAlias 4> delete [User] 5> go
The result should be:
(n rows affected) (n rows affected) (n rows affected) (n rows affected)
Then enter:
1> quit
To contact Trustwave about this article or to request support: