Symantec Hosted Mail Security Administration Guide

Size: px
Start display at page:

Download "Symantec Hosted Mail Security Administration Guide"

Transcription

1 Symantec Hosted Mail Security Administration Guide

2 Symantec Hosted Mail Security Administration Guide Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Symantec, the Symantec logo, and Norton AntiVirus are U.S. registered trademarks of Symantec Corporation. LiveUpdate, Symantec AntiVirus, Symantec Enterprise Security Architecture, and Symantec Security Response are trademarks or registered trademarks of Symantec Corporation in the United States and certain other countries. pages is a trademark of Microsoft Corporation. Additional company and product names may be trademarks or registered trademarks of the individual companies and are respectfully acknowledged. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THIS DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON- INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID, SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. Symantec Corporation Stevens Creek Blvd. Cupertino, CA Printed in the United States of America

3 Technical Support Contacting Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product feature and function, installation, and configuration. The Technical Support group also authors content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s maintenance offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and Web-based support that provides rapid response and up-tothe-minute information Upgrade insurance that delivers automatic software upgrade protection Global support that is available 24 hours a day, 7 days a week worldwide. Support is provided in a variety of languages for those customers that are enrolled in the Platinum Support program Advanced features, including Technical Account Management For information about Symantec s Maintenance Programs, you can visit our Web site at the following URL: Select your country or language under Global Support. The specific features that are available may vary based on the level of maintenance that was purchased and the specific product that you use. Customers with a current maintenance agreement may access Technical Support information at the following URL: Select your region or language under Global Support. Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to recreate the problem.

4 When you contact Technical Support, please have the following information available: Product release level Hardware information Available memory, disk space, NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration Customer service If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: Select your region or language under Global Support, and then select the Licensing and Registration page. Customer service information is available at the following URL: Select your country or language under Global Support. Customer Service is available to assist with the following types of issues: Questions regarding product licensing or serialization Product registration updates such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade insurance and maintenance contracts Information about Symantec Value License Program Advice about Symantec's technical support options

5 5 Nontechnical presales questions Issues that are related to CD-ROMs or manuals Maintenance agreement resources Additional enterprise services If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: Asia-Pacific and Japan: Europe, Middle-East, and Africa: North America and Latin America: Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively. Additional services that are available include the following: Symantec Early Warning Solutions Managed Security Services Consulting services Educational Services These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur. These services remove the burden of managing and monitoring security devices and events, ensuring rapid response to real threats. Symantec Consulting Services provide on-site technical expertise from Symantec and its trusted partners. Symantec Consulting Services offer a variety of prepackaged and customizable options that include assessment, design, implementation, monitoring and management capabilities, each focused on establishing and maintaining the integrity and availability of your IT resources. These services provide a full array of technical training, security education, security certification, and awareness communication programs. To access more information about Enterprise Services, please visit our Web site at the following URL: Select your country or language from the site index.

6 6

7 Contents Chapter 1 Chapter 2 Introducing Symantec Hosted Mail Security About Symantec Hosted Mail Security How Symantec Hosted Mail Security works How Symantec Hosted Mail Security protects against virus threats What happens during a virus scan If a virus is detected How Symantec Hosted Mail Security protects against spam About automatic spam filters About customized allow and deny lists How Symantec Hosted Mail Security protects against undesirable content 20 How content filtering dictionaries work About URL click-through protection About spam beacon blocking About language identification blocking Where to find more information about Symantec Hosted Mail Security Contacting Technical Support Contacting Customer Service Reporting missed spam to Symantec Reporting false positives to Symantec Configuring Symantec Hosted Mail Security About the Symantec Hosted Mail Security Console Redirecting your inbound MX records Setting up your outbound server Understanding hierarchy levels and user roles Managing domain accounts Searching for a domain or alias domain Viewing domain configuration information Adding alias domain names Deleting alias domain names Managing user accounts Designating how user accounts are created or deleted Creating user accounts manually Manually deleting user accounts Adding user accounts automatically through SMTP Discovery... 41

8 8 Contents Deleting user accounts automatically through SMTP Discovery About access rights for the User role Using alias addresses to manage user accounts Preventing users from adding their own aliases Limiting the number of aliases per user Adding alias addresses Deleting addresses Converting primary addresses to aliases Viewing information about user configuration Editing user accounts About user authentication methods Selecting password authentication Selecting LDAP authentication Selecting POP3 authentication Selecting IMAP authentication About groups and group policy sets Chapter 3 Chapter 4 Managing domain and user policies About domain policies Editing domain policies Working with Sender Allow and Deny lists About the Recipient Shield list Working with antivirus policies Specifying actions for antivirus classification Configuring antivirus notifications About antispam filtering policies Specifying actions for antispam classifications Specifying actions for antispam content groups Configuring Spam Quarantine reporting About content policies Editing and creating content groups Specifying HTML Shield polices Specifying ClickProtect policies Specifying language policies Configuring file attachment policies Specifying notification policies Viewing and editing notification options About user-level policy configurations About distribution lists About Fail Safe protection Working with message quarantines

9 Contents 9 Viruses Quarantine Spam Quarantine Attachments Quarantine Content Quarantine Safe Message View Chapter 5 Chapter 6 Glossary Reports and logs About reports and logs Traffic Overview report Threats Overview report Virus Threats report Spam Threats report Content Threats report Attachments Threats report ClickProtect Overview report ClickProtect Log report Quarantine Release Overview report Quarantine Release Log report User Activity report Event Log report Audit Trail report Inbound Server Connections report FailSafe Overview report FailSafe Event Log report Troubleshooting and frequently asked questions Index

10 10 Contents

11 Chapter 1 Introducing Symantec Hosted Mail Security This chapter includes the following topics: About Symantec Hosted Mail Security How Symantec Hosted Mail Security works How Symantec Hosted Mail Security protects against virus threats How Symantec Hosted Mail Security protects against spam How Symantec Hosted Mail Security protects against undesirable content Where to find more information about Symantec Hosted Mail Security Contacting Technical Support

12 12 Introducing Symantec Hosted Mail Security About Symantec Hosted Mail Security About Symantec Hosted Mail Security Symantec Hosted Mail Security provides comprehensive protection from viruses, spam, unwanted message content, and other threats that spread through . It protects your mail servers and internal network by scanning and filtering your incoming Internet traffic before it enters your mail system. It lets you scan and filter your outgoing Internet traffic to prevent the spread of malicious or inappropriate content and to enforce mail security policies. You set and manage your mail security policies, access quarantined mail, and view reports through a secure Web portal. You can configure Symantec Hosted Mail Security to protect your network perimeter from the following types of threats: Computer viruses, worms, Trojan horses, and mass-mailers Denial-of-service attacks and messages that overload the system Directory harvesting attacks and other -based attacks Unsolicited bulk messages (spam), fraud, and other spam threats Inappropriate or malicious message content How Symantec Hosted Mail Security works Symantec Hosted Mail Security is a protective filter that scans all of your incoming Internet traffic before it enters your mail system. You can also configure it to scan all of your outgoing Internet traffic to prevent the spread of malicious or inappropriate content and to enforce mail security policies. Symantec Hosted Mail Security resides outside your firewall, which reduces the processing burden on your mail servers and reduces your network s exposure to vulnerabilities and attacks. Symantec Hosted Mail Security creates a proxy gateway for your inbound and outbound Internet traffic. Messages are filtered in real-time as they pass to and from the Symantec Hosted Mail Security gateway and your mail servers. Symantec Hosted Mail Security handles the filtering processes in its cache. Only messages that are quarantined for virus, spam, or content filtering violations are stored on disk. Symantec Hosted Mail Security uses multiple levels of dynamic filtering technology to determine whether a message may contain malicious or inappropriate content or attachments. It scans all parts of the message, including the message header, message body, and attachments. Depending on

13 Introducing Symantec Hosted Mail Security How Symantec Hosted Mail Security protects against virus threats 13 your configuration, it scans first for viruses or virus behavior, then for spam, and then for content filtering rules. When a violation is detected or if a scan error occurs, Symantec Hosted Mail Security stops scanning and handles the message based on the filtering policy settings that you have configured. Figure 1-1 Figure 1: Traffic Flow How Symantec Hosted Mail Security protects against virus threats Symantec Hosted Mail Security includes all of the virus scanning technologies that are available in Symantec antivirus products. It protects against viruses, worms, and Trojan horses in all major file types, including compressed files and archive file formats. It also protects against mobile code (for example, ActiveX or JavaScript ) and script-based threats. Symantec Hosted Mail Security protects your mail system from messages and attachments that overload the system and cause denial-of-service. This includes container files that are overly large, that contain large numbers of embedded

14 14 Introducing Symantec Hosted Mail Security How Symantec Hosted Mail Security protects against virus threats compressed files, or that are otherwise designed to maliciously use resources and degrade performance. Symantec Hosted Mail Security provides the following types of protection from virus threats that spread through Automatic scanning for virus signatures Symantec engineers continually track reported outbreaks of computer viruses and threats. When a new virus or other threat is identified, information about that virus (a signature) is stored in a virus definitions file. The virus definitions file contains the necessary information to detect and eliminate the virus. Symantec Hosted Mail Security updates its virus definitions every 5 minutes. Updates are handled automatically without having to restart services or redeploy software. This ensures no interruption in scanning services during the updates. Automatic scanning for virus-like characteristics using advanced heuristics Heuristic methods of virus detection are designed to detect viruses for which no known definitions exist. Advanced heuristics analyze a program s structure, behavior, and other attributes for virus-like characteristics, such as self-replication. Symantec Hosted Mail Security uses advanced heuristics to analyze a file if it detects certain behaviors in the file that warrant further analysis. Automatic protection from messages and attachments that can cause denial of service Symantec Hosted Mail Security includes maximum size and scanning depth levels to reduce exposure to denial-of-service attacks. Blocking by subject line You can configure Symantec Hosted Mail Security to block messages by the subject line. This lets you handle emerging threats for which a virus definition has not been created. Note: Internet is only one avenue by which a virus or threat can infiltrate your network. For comprehensive protection, you should ensure that every server and workstation at your site is protected by a server or desktop antivirus solution. What happens during a virus scan When Symantec Hosted Mail Security scans a file, it first decodes and decompresses it. It then looks for known viruses by comparing segments of the file to the sample code inside of a virus definitions file. The virus definitions file

15 Introducing Symantec Hosted Mail Security How Symantec Hosted Mail Security protects against virus threats 15 If a virus is detected contains nonmalicious bits of code, or virus definitions, for thousands of viruses. If Symantec Hosted Mail Security finds a match, the file is considered infected, and it is handled according to your configuration settings. Advanced heuristics, which includes Symantec Bloodhound technology, help detect viruses for which no known definitions exist. Symantec Hosted Mail Security uses advanced heuristics to analyze a file if it detects certain behaviors in the file that warrant further analysis. During a heuristics scan, the file is copied into a self-contained virtual computer that emulates the operating system environment. The antivirus scanner then runs the file and probes for and assesses suspicious behavior, such as whether the file replicates itself a number of times in a specified time frame. In most cases, the antivirus scanner can determine in milliseconds whether a file is likely to be infected by a virus. If it considers the file likely to be infected, it handles the file according to the settings that you have configured for handling infected files. If Symantec Hosted Mail Security encounters a file that it cannot scan or it encounters a file attachment that violates a scanning rule, it logs the error and handles the file according to your configuration settings. You can configure Symantec Hosted Mail Security to handle infected files in the following ways: Table 1-1 Action Clean the message Actions for infected files Result Attempts to remove the virus and preserve the attachment. If the file is successfully repaired, text is added to the message to notify recipients that a virus was detected and that the file was cleaned. Quarantine the message after attachment is stripped Removes the infected attachment from the message and sends the message to the quarantine for administrator review. Strip Attachment Deny Delivery Do Nothing or Allow Delivery Removes the infected attachment from the message and delivers the rest of the message. Text is added to the message to notify recipients that a virus was detected in the attachment and that the attachment was removed. Blocks delivery of the message and its attachments. Delivers the message and its attachments with no filtering or notification.

16 16 Introducing Symantec Hosted Mail Security How Symantec Hosted Mail Security protects against spam How Symantec Hosted Mail Security protects against spam About automatic spam filters Symantec Hosted Mail Security lets you handle spam in the following ways: Spam filters are continuously and automatically updated to protect against new and emerging spam threats. Symantec Hosted Mail Security uses multiple filtering technologies to maximize spam detection and minimize false positives. You can define specific addresses, DNS names, and IP addresses from which is always accepted or always denied. Symantec Hosted Mail Security provides multiple layers of filtering technology to protect your network environment from spam. As incoming messages pass through these filters, they are scored and classified as spam, potential spam, or legitimate messages. Legitimate messages are sent to the recipient. Based on how you configure Symantec Hosted Mail Security, spam and potential spam messages can be rejected, quarantined, or copied to another recipient, for example, an administrator. Symantec maintains a global network of over 2 million decoy addresses and domains that attracts and collects the latest spam. Tens of millions of messages pass through the Symantec Probe Network each month. These messages are sent to Symantec Security Response for analysis to identify new spamming techniques and threats. Symantec technicians continuously finetune existing filters and develop new filters to respond to new and evolving threats. These filters are automatically updated every 10 minutes to ensure that your environment stays protected. Table 1-2 provides information about the types of spam filtering technology that is used in Symantec Hosted Mail Security.

17 Introducing Symantec Hosted Mail Security How Symantec Hosted Mail Security protects against spam 17 Table 1-2 Spam Filtering Technologies Filter type Protection type Reputation Service Symantec monitors sources from around the world to determine how much of the messages that are sent from those sources are legitimate. from those sources can then be blocked or allowed based on the reputation value of the source as determined by Symantec. Protects against high-volume spam sources and messages from open or unsecured relays. Protects against false positives by allowing traffic from sources that are contained on the safe list. The Reputation Service is a dynamic database of IP addresses that is continuously compiled and updated. It consists of the following lists: Open proxy list: A list of IP addresses of identity-masking relays that are used by spammers. This includes proxy servers with open or unsecured ports. Safe list: A list of IP addresses from which virtually no outgoing is spam. Suspect list: A list of IP addresses from which virtually all outgoing is spam. Heuristic filters Heuristic filters scan all parts of a message to test for characteristics that are usually inherent in spam, such as opt-out links, specific phrases, and forged headers. The filters assign an overall score to the message that is based on the number of spam characteristics that are found. If the message exceeds the spam threshold, it is considered spam. Protects against spam that is too new to be detected by other types of filters.

18 18 Introducing Symantec Hosted Mail Security How Symantec Hosted Mail Security protects against spam Filter type Protection type Language filters MIME attachment signature filters Language filters can detect whether a message is written in one of 11 supported languages and then apply only the heuristic filters that were created for that language. This helps improve performance. The supported languages include Chinese, Dutch, English, French, German, Italian, Japanese, Korean, Portuguese, Russian, and Spanish. Attachment signatures target specific types of MIME attachments, such as ZIP files, for objectionable or malicious content. Symantec Hosted Mail Security treats any message as spam if any MIME attachment in the message matches a Symantec MIME filter. Protects global network environments from spam that is written in a language other than English. Protects against embedded images and executables in MIME attachments that contain objectionable or malicious content. Signature filters Messages that flow into Symantec Security Response (SSR) are analyzed for unique signatures and variations of signatures that are characteristic of a spam attack. Using this signature, Symantec can group and match seemingly random messages that originated from a single attack. Symantec continuously updates its database of known spam based on these signatures. Protects against highly randomized, HTML-based spam attacks. Protects against HTML-based evasion techniques that are used by spammers. URL filters URL filters scan messages bodies for embedded URLs. The filters compare the URLs to the known-spammer list. The filters can identify and remove special characters that have been added to the URL link to conceal the Web address. Symantec builds its known-spammer list based on URLs that are collected by the Symantec Probe Network and trusted third-party spam URL lists. Protects against spam messages that direct recipients to inappropriate Web sites, such as pornographic sites. Protects against spam messages that direct recipients to fraudulent Web sites. Protects against tactics that spammers use to evade spam filters, such as disguised URLs and extreme randomization.

19 Introducing Symantec Hosted Mail Security How Symantec Hosted Mail Security protects against spam 19 About customized allow and deny lists You can define specific addresses, DNS names, and IP addresses from which is always accepted or always denied. addresses that you add to the deny list are always blocked. Deny lists are better suited for handling unwanted messages from senders that you know, such as an individual or company whose sender address is unlikely to change frequently. Spammers use a variety of techniques to evade detection, such as changing or masking their sender addresses. Deny lists are not an effective tool against this type of threat. addresses that you add to the allow list bypass the spam filters in Symantec Hosted Mail Security. This feature can help minimize the risk of a legitimate message being handled as spam. However, bypassing the spam filters can pose a security risk. Spammers who send fraudulent or malicious content often use techniques in which they spoof or hijack an address or domain so that the message appears to be sent from a legitimate and trusted sender. Note: The Allow List only applies to spam and content filtering. Messages are scanned for viruses and worms.

20 20 Introducing Symantec Hosted Mail Security How Symantec Hosted Mail Security protects against undesirable content How Symantec Hosted Mail Security protects against undesirable content Symantec Hosted Mail Security lets you monitor incoming and outgoing messages and attachments for inappropriate content to enforce corporate mail policies, reduce legal liability, and ensure compliance with regulatory requirements. The content filtering features in Symantec Hosted Mail Security can detect and remove malicious HTML tags, scripting objects, and certain types of embedded images to protect your network from -based threats. You can configure whether messages that violate content or attachment policies are quarantined, rejected, stripped of the file attachment, or copied to another recipient, for example, an administrator. Table 1-3 describes content compliance and security features provided by Symantec Hosted Mail Security. Table 1-3 Feature Content compliance and security features Predefined content keyword categories Lets you filter content by keywords and phrases that are contained in the Symantec-provided content dictionary. The content dictionary consists of the following categories: Profanity Sexual Overtones Racially Insensitive Customized content keyword categories Spam-specific keyword categories URL click-through protection Lets you add custom categories to the content dictionary and add your own keywords and phrases to satisfy your own security and business needs. Lets you define customized lists of keywords that are used to filter for spam. Lets you enable or disable a user s ability to follow a URL or other Web hyperlink that is contained in the body of an message. You can also monitor information about the Web sites that users are visiting and other statistics. Spam beacon blocking Removes certain types of embedded images from messages that are used to send information about the user the source of the message. Spammers embed these images to gather information about the system and to verify that the recipient s address is a valid address. Language identification blocking Lets you specify languages in which you will allow messages.

21 Introducing Symantec Hosted Mail Security How Symantec Hosted Mail Security protects against undesirable content 21 How content filtering dictionaries work The content dictionary that is provided by Symantec contains commonly filtered words and phrases that are grouped by categories. You can select the categories that you want to use to filter content. You can also define your own custom categories and keywords to use for filtering. When you enable content filtering, Symantec Hosted Mail Security matches the individual words that are contained in an message to the words that are contained in the content filtering categories that you have selected for filtering. As the filtering process continues, the content filtering scanner builds a word chain so that it can examine the context. For example, if the word cancer succeeds the word breast in a word chain, it is likely that the message is about a medical condition and is not inappropriate. The content filtering scanner scores a message based on the number of matches that are found and adjusts the score based on the context of the words. If the score exceeds the built-in threshold, the message is considered to be a content filtering violation, and it is handled according to the configuration settings. About URL click-through protection About spam beacon blocking You can enable or disable a user s ability to follow a URL or other Web hyperlink that is contained in the body of an message. This lets you enforce security policies, reduce legal liabilities, and protect your network environment from security risks. Symantec Hosted Mail Security maintains information about the hyperlinks that were followed, who visited the sites, who sent the message, and other statistical information so that you can monitor activities. You can configure whether a site is automatically blocked, whether the user must respond to a confirmation prompt before proceeding, and whether the user receives a notification message. You can also create an allow list of URLs that you want to exclude from click-through protection. Spam beacons or Web bugs are small graphics that are embedded in HTML content that can gather and send information about your system to the source (usually a URL). They typically are transparent, 1x1 pixel graphics and are nearly invisible. Web bugs are often used on Web sites to monitor surfing behavior. However, spammers can also hide them in their mass mailings as spam beacons. When the recipient opens the message, the spam beacon sends a signal back to the spammer s URL that confirms that the recipient s address is valid.

22 22 Introducing Symantec Hosted Mail Security Where to find more information about Symantec Hosted Mail Security You can configure Symantec Hosted Mail Security to automatically remove these types of images from HTML content that is contained in incoming Internet messages. About language identification blocking Symantec Hosted Mail Security can identify what language an is written in, and filter based on this information. You can choose to allow Symantec Hosted Mail Security to only deliver in certain languages, or you can allow all languages, which is the default setting. The default policy is to allow in all languages. Where to find more information about Symantec Hosted Mail Security The following documentation is available to assist you with using and configuring Symantec Hosted Mail Security: Symantec Hosted Mail Security Console and Spam Quarantine User s Guide If you are connected to the Symantec Hosted Mail Security Console, the console contains embedded help to assist you with using and configuring Symantec Hosted Mail Security. What s This links provide information about each option. If you are connected to the Internet, the following online resources are available on the Symantec Web site: Symantec.com/techsupp/ent/enterprise.html: Provides access to the technical support Knowledge Base, newsgroups, contact information, downloads, and mailing list subscriptions Securityresponse.symantec.com: Provides access to the Virus Encyclopedia, which contains information about all known viruses; information about virus hoaxes; and access to white papers about virus threats

23 Introducing Symantec Hosted Mail Security Contacting Technical Support 23 Contacting Technical Support Contacting Customer Service Customers with a current support agreement may contact the Technical Support group via phone or online at When contacting the Technical Support group, please have the following: The page where you were working and details of the particular function you were trying to perform The exact wording of any messages that appeared in the message box or in the status line Any software or hardware behavior that seemed unusual A description of how you tried to solve the problem The version of the product you were using To contact Enterprise Customer Service online, go to select the appropriate Global Site for your country, and then choose Service and Support. Customer Service is available to assist with the following types of issues: Questions regarding product licensing or serialization Product registration updates such as address or name changes General product information (features, language availability, local dealers) Latest information on product updates and upgrades Information on upgrade insurance and maintenance contracts Information on Symantec Value License Program Advice on Symantec technical support options Nontechnical presales questions Missing or defective CD-ROMs or manuals Reporting missed spam to Symantec You can submit spam or suspected spam messages that were not detected by Symantec Hosted Mail Security to the Symantec Brightmail Logistics and Operations Center (BLOC). Symantec engineers will analyze the message for spam characteristics and will issue updates to the spam filtering rules as needed.

24 24 Introducing Symantec Hosted Mail Security Contacting Technical Support You should submit the missed spam within 24 hours of when you received the message to ensure timely updates and to avoid analyzing messages for which updated rules have already been issued. You can submit the missed spam to one of the following addresses: North America Europe, Middle East, Africa Japan, Asia, Pacific Rim Note: These addresses are for missed spam messages only. You must submit the message as an RFC-822 MIME-encoded attachment. Reporting false positives to Symantec You can submit messages that were incorrectly tagged as spam to the Symantec Brightmail Logistics and Operations Center (BLOC). Symantec engineers will analyze the message and issue updates to the spam filtering rules as needed. You can submit false positives to one of the following addresses: North America Europe, Middle East, Africa Japan, Asia, Pacific Rim Note: These addresses are for false-positive messages only. You must send the message as an RFC-822 MIME-encoded attachment.

25 Chapter 2 Configuring Symantec Hosted Mail Security This chapter includes the following topics: About the Symantec Hosted Mail Security Console Redirecting your inbound MX records Setting up your outbound server Understanding hierarchy levels and user roles Managing domain accounts Managing user accounts About user authentication methods About groups and group policy sets

26 26 Configuring Symantec Hosted Mail Security About the Symantec Hosted Mail Security Console About the Symantec Hosted Mail Security Console The Symantec Hosted Mail Security Console is a browser-based interface. You access the console through a secure Web portal at the following URL: When you subscribe to Symantec Hosted Mail Security, you will receive a welcome kit that includes your initial log on name and password. You can change this password. For more information about requesting a new password, setting passwords, and changing passwords and for more information about working in the console, see the Symantec Hosted Mail Security Console and Spam Quarantine Report User s Guide. You can do the following configuration tasks from the Symantec Hosted Mail Security Console: Configure the inbound and outbound server settings Set domain-level and user-level policies Create groups of users and assign policies to them Add and configure alias domain accounts Add and configure user accounts and aliases Configure the authentication settings for user logons When you log on to the console as an Administrator, the Overview page is displayed by default. The Overview page provides high-level information about the traffic to your domains over the previous 24 hours. Customer Administrators will see the information for all the domains that have been defined for the customer. Domain Administrators will see the information for only the domain in which the user role was defined. You can configure Symantec Hosted Mail Security so that users can access their spam message quarantines through their Spam Quarantine Reports. The reports contain links that take them directly to their spam quarantine without having to log on through the console. Note: Some of the settings in the Symantec Hosted Mail Security Console are determined by your level of user rights. Some of the options that are described in this manual may not be available.

27 Configuring Symantec Hosted Mail Security Redirecting your inbound MX records 27 Redirecting your inbound MX records Symantec Hosted Mail Security creates a proxy gateway for your inbound and outbound Internet traffic. Messages are filtered in real-time as they pass to and from the Symantec Hosted Mail Security gateway and your mail servers. Before you can enable scanning of your incoming or outgoing Internet , you must change the Mail Exchange (MX) records on your Internet-facing mail server or with your Internet Service Provider (ISP) to direct your traffic to Symantec. When you subscribe to Symantec Hosted Mail Security, Symantec sends you instructions that are specific to your organization on how to configure the Mail Exchange (MX) records for your domain name server (DNS) to direct your inbound and outbound traffic to Symantec. Table 2-1 provides general information about the settings for inbound traffic: Table 2-1 MX settings for inbound MX record Preference level <domain_name>.inbound10.symantecmail.com 10 <domain_name>.inbound10.symantecmail.net 10 <domain_name>.inbound20.symantecmail.com 20 <domain_name>.inbound20.symantecmail.net 20 <domain_name>.inbound30.symantecmail.com 30 <domain_name>.inbound30.symantecmail.net 30 You should remove all previous listings of your mail server. Additional domains should be redirected in the same manner. To ensure that all inbound traffic is filtered and protected by Symantec Hosted Mail Security, you must restrict all IP access to your mail servers with the exception of the following Symantec subnets: / /26 You must also configure your inbound server information on the console. You must have Administrator rights to perform this task on the console.

28 28 Configuring Symantec Hosted Mail Security Redirecting your inbound MX records Note: It may take several days for your MX record redirect to propagate to all the servers that may be sending to your server. During that time, your server may still receive directly from those servers until they are updated with your latest MX record information. To configure your inbound server settings 1 On the Symantec Hosted Mail Security Console, on the console toolbar, click Setup. 2 On the Configuration toolbar, click Inbound Servers. 3 On the Inbound Servers Setup page, in the SMTP Host Address field, type the fully qualified IP address or DNS address of your SMTP host server. 4 In the Port field, type the port number on your SMTP host server to which the Symantec Hosted Mail Security service should connect. The default port number is In the Preference field, type a number to indicate the order of connection preference if you are configuring multiple servers. The Symantec Hosted Mail Security service will attempt to connect to the server that has the lowest preference number first. If you assign the same preference number to multiple servers, Symantec Hosted Mail Security will balance the delivery. 6 If the server is immediately available to accept connections, check the Active checkbox. You must check this checkbox to allow Symantec Hosted Mail Security to connect to the server. 7 Click Save Changes.

29 Configuring Symantec Hosted Mail Security Setting up your outbound server 29 Setting up your outbound server To enable outbound filtering, you must configure the outbound configuration settings on the security console to include the IP addresses that are associated with the outbound service on your mail server. You must also establish a relay to send outbound traffic to the appropriate outbound domains. Table 2-2 provides general information about the settings for outbound traffic. Table 2-2 Settings for outbound Domain Preference level <domain_name>.outbound10.symantecmail.com 10 <domain_name>.outbound10.symantecmail.net 10 <domain_name>.outbound20.symantecmail.com 20 <domain_name>.outbound20.symantecmail.net 20 <domain_name>.outbound30.symantecmail.com 30 <domain_name>.outbound30.symantecmail.net 30 You must also configure your outbound server information on the console. You must have Administrator rights to perform this task on the console. To set up your outbound server 1 On the Symantec Hosted Mail Security Console, on the console toolbar, click Setup. 2 On the Configuration toolbar, click Outbound Servers. 3 On the Outbound Server page, in the Server IP Address Range field, type the fully qualified IP address of the outbound SMTP host server. 4 Click Add New Address. 5 Click Save.

30 30 Configuring Symantec Hosted Mail Security Understanding hierarchy levels and user roles Understanding hierarchy levels and user roles Symantec Hosted Mail Security uses a hierarchical architecture to control data and security. User roles are assigned for each level in the hierarchy. Table 2-3 describes user roles and hierarchy levels. Table 2-3 User role Customer Domain User accounts Roles and hierarchy levels Contains one or more domain entries. For example, you can group all of the domain names that are used by your company or division within a company. Symantec sets up this account information for you when you purchase your license. Contains the primary and alias domains that your organization uses for its addresses. The domain is the part of the address that follows the at (@) symbol. For example, in the address user@mycompany.com, the domain is mycompany.com. You must own the rights to these domain names and your mail transfer agent (MTA) must be configured to receive for these domains. Primary domain accounts can only be added by Symantec. Users with Customer Administrator rights can add alias domains. Contains the complete addresses ( accounts) in your organization that can receive . The complete address (user@mycompany.com) is considered the primary account. You can also add alias accounts. You can add user accounts manually or automatically through the SMTP discovery feature. User account entries can only be added by users with Domain Administrator rights or higher. You must define at least one entity for each hierarchy level. Depending on the hierarchy level, an entity may be a full domain name, domain name, or a user s address. The name of each entity within a hierarchy level must be unique. For example, the same domain name cannot be defined in multiple customer entities. Administrator and user roles define the level of access that a user has within the Symantec Hosted Mail Security console.

31 Configuring Symantec Hosted Mail Security Understanding hierarchy levels and user roles 31 Table 2-4 describes administrator and user roles. Table 2-4 Role Administrator and user roles Customer Administrator Domain Administrator Quarantine Manager The Customer Administrator can do the following: Add, edit, and delete alias domains, user accounts, and user aliases Configure global and domain-level filtering policies for incoming and outgoing Add, edit, or delete mail server hosts View and manage all quarantine areas for each domain View reports and statistical information that is generated for each domain The Domain Administrator can do the following: Add, edit, and delete user information for a specific domain Configure domain-level filtering policies for incoming and outgoing messages Add, edit, or delete mail server hosts at the domain level View and manage all quarantine areas for the domain View reports and statistical information that is generated for the domain The Quarantine Manager can do the following: View all quarantine areas for the primary and alias domains to which they are assigned View reports and statistical information Quarantine Managers cannot cross boundaries between primary domains and cannot change filtering policies. Reports Manager Reports Managers can view reports and statistical information for the primary and alias domains to which they are assigned. Reports Managers cannot cross boundaries between primary domains and cannot change filtering policies. User Users who are assigned to the User role have limited rights within the security console. They can view their spam quarantine and adjust personal spam policy settings. They cannot change virus or content filtering policy settings and cannot view messages or attachments that have been quarantined for virus or content filtering violations.

32 32 Configuring Symantec Hosted Mail Security Managing domain accounts Users who are assigned to the Domain Administrator, Quarantine Manager, or Reports Manager roles can perform any of the functions of their role and any role that has a lower level of rights. Managing domain accounts When you subscribe to Symantec Hosted Mail Security, Symantec sets up a domain account for your company on the Symantec Hosted Mail Security Console. Symantec uses the fully qualified name of your domain name server (DNS) for this account. You must own the rights to this domain name. Primary domain accounts can only be added or deleted by Symantec. However, you can add alias domains to map to your primary domain to manage your user and domain configurations. Searching for a domain or alias domain The Search Domains feature lets you search for a specific primary domain or alias domain or for a range of domain names, for example, all domain names that begin with a specific letter. To search for a domain or alias domain 1 On the Symantec Hosted Mail Security Console, on the console toolbar, click Setup. 2 On the Configuration toolbar, click Domains. 3 On the Configuration page, click Search. 4 In the Domain list, select one of the following search criteria: starts with is contains Searches for domain names that start with the characters that you type in the text field. Searches for the exact characters that you type in the text field. The text that you type must exactly match the domain name. Searches for domain names that include the characters that you type in the text field. 5 In the text field, type the text for which you want to search. 6 Click Search. The domain names that match the search criteria are listed in the Domain list. To include alias domains in the list, check Show Domain Aliases.

33 Configuring Symantec Hosted Mail Security Managing domain accounts 33 Viewing domain configuration information You can view basic configuration information about your primary domain and alias domain accounts. Table 2-5 describes information you can view about the account. Table 2-5 Domain account Domain Created Contact Existing Users Qty Inbound Package Outbound Package Quarantine Period User Aliasing Domain Aliases Domain configuration Indicates the name of the domain whose information is being displayed. Indicates the date and time when the domain was added to Symantec Hosted Mail Security. Indicates the address that is used to contact a representative for the domain. Indicates the total number of user accounts ( addresses) defined in the domain. Specifies whether Symantec Hosted Mail Security is being used to filter inbound mail. Specifies whether Symantec Hosted Mail Security is being used to filter outbound mail. Indicates the number of days that data for quarantined s are stored before being automatically deleted. Indicates whether users can define and manage alias addresses associated to their primary addresses and, if enabled, how many alias addresses can be defined per primary address. Indicates any alias domain names that have been defined for the domain and whether the Customer Administrator can define alias domain names for the Domain. To view domain configuration information 1 On the Symantec Hosted Mail Security Console, on the console toolbar, click Setup. 2 On the Configuration toolbar, click Domains. 3 On the Configuration page, under Domain, click the name of the domain for which you want to view configuration information. The Domain Details field shows the basic configuration information about the domain that you selected.

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license

More information

Symantec Hosted Mail Security. Console and Spam Quarantine User Guide

Symantec Hosted Mail Security. Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement

More information

Email Encryption. Administrator Guide

Email Encryption. Administrator Guide Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Symantec Response Assessment module Installation Guide. Version 9.0

Symantec Response Assessment module Installation Guide. Version 9.0 Symantec Response Assessment module Installation Guide Version 9.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Hosted Mail Security Getting Started Guide

Symantec Hosted Mail Security Getting Started Guide Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration

More information

Symantec Enterprise Security Manager Patch Policy Release Notes

Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes The software described in this book is furnished under a license agreement

More information

Symantec Mail Security for Microsoft Exchange Server 2007/Server 2010

Symantec Mail Security for Microsoft Exchange Server 2007/Server 2010 Symantec Mail Security for Microsoft Exchange Server 2007/Server 2010 Implementation Guide Symantec Information Foundation Symantec Mail Security for Microsoft Exchange Implementation Guide The software

More information

Configuring Symantec AntiVirus for NetApp Storage system

Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system The software described in this book is furnished under a license agreement and may be used

More information

Symantec Security Information Manager 4.6 Administrator's Guide

Symantec Security Information Manager 4.6 Administrator's Guide Symantec Security Information Manager 4.6 Administrator's Guide Symantec Security Information Manager 4.6 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Symantec Client Firewall Policy Migration Guide

Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is

More information

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Symantec Mobile Security Manager Administration Guide

Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Email Services Deployment. Administrator Guide

Email Services Deployment. Administrator Guide Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the

More information

Symantec Security Information Manager 4.5 Administrator's Guide

Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Endpoint Protection Shared Insight Cache User Guide

Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and

More information

Spam Manager. User Guide

Spam Manager. User Guide Spam Manager User Guide Spam Manager User Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Symantec Mobile Management 7.2 MR1Quick-start Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only

More information

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Application Note: High Availability

More information

Filtering Service. Secure E-Mail Gateway (SEG) Service Administrative Guides. Revised February 2013

Filtering Service. Secure E-Mail Gateway (SEG) Service Administrative Guides. Revised February 2013 Secure E-Mail Gateway (SEG) Service Administrative Guides Filtering Service Revised February 2013 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained

More information

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7 TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in

More information

Symantec System Recovery 2013 Management Solution Administrator's Guide

Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec

More information

Symantec Messaging Gateway for Service Providers 10.5. Implementation Guide

Symantec Messaging Gateway for Service Providers 10.5. Implementation Guide Symantec Messaging Gateway for Service Providers 10.5 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of

More information

Symantec Endpoint Protection and Symantec Network Access Control Client Guide

Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described

More information

Symantec Mail Security Planning Guide

Symantec Mail Security Planning Guide Symantec Mail Security Planning Guide Syamantec Mail Security Planning Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Mail Security Appliance Version 7.5 Administration Guide

Symantec Mail Security Appliance Version 7.5 Administration Guide Symantec Mail Security Appliance Version 7.5 Administration Guide Symantec Information Foundation 12617000 Symantec Mail Security Appliance Version 7.5 Administration Guide The software described in this

More information

Symantec Endpoint Protection Small Business Edition Client Guide

Symantec Endpoint Protection Small Business Edition Client Guide Symantec Endpoint Protection Small Business Edition Client Guide Symantec Endpoint Protection Small Business Edition Client Guide The software described in this book is furnished under a license agreement

More information

Symantec Endpoint Protection and Symantec Network Access Control Client Guide

Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished

More information

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP. The software

More information

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector for Blue Coat Proxy Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Virtual Machine Management 7.1 User Guide

Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a

More information

Email Quick Reference. Administrator Guide

Email Quick Reference. Administrator Guide Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Symantec Security Information Manager 4.8 Release Notes

Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Symantec Event Collector 4.3 for SNARE for Windows Quick Reference

Symantec Event Collector 4.3 for SNARE for Windows Quick Reference Symantec Event Collector 4.3 for SNARE for Windows Quick Reference Symantec Event Collector for SNARE for Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Symantec Event Collector 4.3 for Cisco PIX Quick Reference

Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector for Cisco PIX Quick Reference The software described in this book is furnished under a license agreement and may be used

More information

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

Symantec Data Center Security: Server Advanced v6.0. Agent Guide Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and

More information

Symantec AntiVirus Corporate Edition Administrator's Guide

Symantec AntiVirus Corporate Edition Administrator's Guide Symantec AntiVirus Corporate Edition Administrator's Guide Symantec AntiVirus Corporate Edition Administrator's Guide The software described in this book is furnished under a license agreement and may

More information

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

Symantec AntiVirus for Network Attached Storage Integration Guide

Symantec AntiVirus for Network Attached Storage Integration Guide Symantec AntiVirus for Network Attached Storage Integration Guide Introducing Symantec AntiVirus for Network Attached Storage The software described in this book is furnished under a license agreement

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Symantec Endpoint Protection Small Business Edition Implementation Guide

Symantec Endpoint Protection Small Business Edition Implementation Guide Symantec Endpoint Protection Small Business Edition Implementation Guide Symantec Endpoint Protection Small Business Edition Implementation Guide The software described in this book is furnished under

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Symantec Security Information Manager 4.5 Installation Guide

Symantec Security Information Manager 4.5 Installation Guide Symantec Security Information Manager 4.5 Installation Guide PN: 10912602 Symantec Security Information Manager 4.5 Installation Guide The software described in this book is furnished under a license agreement

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this

More information

Symantec Mail Security for Microsoft Exchange Server 2013

Symantec Mail Security for Microsoft Exchange Server 2013 Symantec Mail Security for Microsoft Exchange Server 2013 Implementation Guide v7.0 Symantec Mail Security for Microsoft Exchange Implementation Guide The software described in this book is furnished under

More information

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is

More information

INLINE INGUARD E-MAIL GUARDIAN

INLINE INGUARD E-MAIL GUARDIAN INLINE INGUARD E-MAIL GUARDIAN Activation Guide December 8, 2008 600 Lakeshore Parkway, AL 35209 888.3InLine support@inline.com 1 InLine InGuard E-Mail Guardian Activation Guide The InLine InGuard E-Mail

More information

Symantec AntiVirus Installation Guide

Symantec AntiVirus Installation Guide Symantec AntiVirus Installation Guide 10517969 Symantec AntiVirus Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the

More information

Symantec System Recovery 2011 Management Solution Administrator's Guide

Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Symantec Security Information Manager 4.5 Reporting Guide

Symantec Security Information Manager 4.5 Reporting Guide Symantec Information Manager 4.5 Reporting Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation

More information

Symantec Endpoint Protection Integration Component 7.5 Release Notes

Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.

More information

Symantec Mail Security Administration Guide

Symantec Mail Security Administration Guide Symantec Mail Security Administration Guide Symantec Mail Security Administration Guide The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Configuring Internal and External WebApp URLs for OWA 2007 SP4 and later Symantec Enterprise Vault: Configuring Internal and External WebApp URLs for OWA The software

More information

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

Email Filtering Service

Email Filtering Service Secure E-Mail Gateway (SEG) Service Administrative Guides Email Filtering Service Email Quarantine End User Guide Introduction The email administrator for your organization has configured the types of

More information

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Spam Manager. Quarantine Administrator Guide

Spam Manager. Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

Symantec Mail Security for SMTP. Administration Guide

Symantec Mail Security for SMTP. Administration Guide Symantec Mail Security for SMTP Administration Guide Symantec Mail Security for SMTP Administration Guide The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Client Security Administrator's Guide

Symantec Client Security Administrator's Guide Symantec Client Security Administrator's Guide Symantec Client Security Administrator's Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide

Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide The software described in this book is furnished under a license

More information

Email Protection for your account

Email Protection for your account User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

How To Use Symantec Mail Security For Windows 7.2.2 (X86) And 7.0 (X64) (X32) (For Windows 7) (Windows 7) And 8.2) (Msmsm

How To Use Symantec Mail Security For Windows 7.2.2 (X86) And 7.0 (X64) (X32) (For Windows 7) (Windows 7) And 8.2) (Msmsm Symantec Mail Security for Microsoft Exchange Server 2013 Implementation Guide v7.0.1 Symantec Mail Security for Microsoft Exchange Implementation Guide The software described in this book is furnished

More information

Symantec Messaging Gateway 10.0 Installation Guide. powered by Brightmail

Symantec Messaging Gateway 10.0 Installation Guide. powered by Brightmail Symantec Messaging Gateway 10.0 Installation Guide powered by Brightmail The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of

More information

Symantec AntiVirus /Filtering for Domino for AIX Implementation Guide

Symantec AntiVirus /Filtering for Domino for AIX Implementation Guide Symantec AntiVirus /Filtering for Domino for AIX Implementation Guide Symantec AntiVirus /Filtering for Domino for AIX Implementation Guide The software described in this book is furnished under a license

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

Symantec Enterprise Security Manager Modules. Release Notes

Symantec Enterprise Security Manager Modules. Release Notes Symantec Enterprise Security Manager Modules for MS SQL Server Databases Release Notes Release 4.1 for Symantec ESM 9.0.x and 10.0 For Windows 2000/2008 and Windows Server 2003 Symantec Enterprise Security

More information