Comprehensive Anti-Spam Service

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Comprehensive Anti-Spam Service"

Transcription

1 Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive Anti-Spam Service Overview section on page 1 Setting up Comprehensive Anti-Spam Service section on page 8 Using Comprehensive Anti-Spam Service section on page 17 Comprehensive Anti-Spam Service Overview This section provides an introduction to the Comprehensive Anti-Spam Service. This section contains the following subsections: What is Comprehensive Anti-Spam Service? section on page 2 Benefits section on page 3 How Does Comprehensive Anti-Spam Service Work? section on page 3 Platforms section on page 8 1

2 What is Comprehensive Anti-Spam Service? Comprehensive Anti-Spam Service Overview The Comprehensive Anti-Spam Service feature provides a quick, efficient, and effective way to add anti-spam, anti-phishing, and anti-virus capabilities to your existing SonicWALL UTM Appliance. In a typical configuration of Comprehensive Anti-Spam Service, the administrator chooses to add Anti-Spam capabilities by selecting it in the SonicOS interface and licensing it. The SonicWALL UTM Appliance then uses the same advanced spam-filtering technology as the SonicWALL Security products to reduce the amount of junk the organization delivers to users. There are two primary ways inbound messages are analyzed by the Anti-Spam feature - Advanced IP Reputation Management and Cloud-base Message Analysis. IP Address Reputation uses the GRID Network to identify the IP addresses of known spammers, and reject any mail from those senders without even allowing a connection. GRID Network Sender IP Reputation Management checks the IP address of incoming connecting requests against a series of lists and statistics to ensure that the connection has a probability of delivering valuable . The lists are compiled using the collaborative intelligence of the SonicWALL GRID Network. Known spammers are prevented from connecting to the SonicWALL UTM server, and their junk payloads never consume system resources on the targeted systems. that does not come from known spammers is analyzed based on GRIDprints generated by SonicWALL s research laboratories and are based on data from millions of business endpoints, hundreds of millions of messages, and billions of reputation votes from the users of the GRID Network. Our Grid Network uses data from multiple SonicWALL solutions to create a collaborative intelligence network that defends against the worldwide threat landscape. GRIDprints uniquely identify messages without exposing data contained in the message. Comprehensive Anti-Spam Service determines that an fits only one of the following threats: Spam, Likely Spam, Phishing, Likely Phishing, Virus, or Likely Virus. It uses the following precedence order when evaluating threats in messages: Phishing Likely Phishing Virus Spam Likely Spam Likely Virus For example, if a message is both a virus and a spam, the message will be categorized as a virus since virus is higher in precedence than spam. If SonicWALL Security determines that the message is not any of the above threats, it is judged as good and is delivered to the destination server. 2

3 Comprehensive Anti-Spam Service Overview Benefits Adding anti-spam protection to your SonicWALL UTM Appliance increases the efficiency of your system as a whole by filtering and rejecting junk messages before users see it in their inboxes. Reduced amount of bandwidth and resources consumed by junk in your network Reduced number of incoming messages sent to the mail server Reduced threat to the organization, because users cannot accidentally infect their computers by clicking on virus spam Better protection for users from phishing attacks How Does Comprehensive Anti-Spam Service Work? This section describes the Comprehensive Anti-Spam Service feature, including the SonicWALL GRID Network, and how it interacts with SonicOS as a whole. The two points of significant connection with SonicOS are Address and Service Objects. Use the address and service objects to configure the Anti-Spam feature to function smoothly with SonicOS. For example, use the Anti-Spam Service Object to configure NAT policies to archive inbound as well as sending it through a filter. Comprehensive Anti-Spam Service analyzes messages headers and contents, and uses collaborative GRIDprinting to block spam . GRID Network Feature Overview This section describes the Comprehensive Anti-Spam Service feature GRID Connection Management with Sender IP Reputation. GRID Network Sender IP Reputation is the reputation a particular IP address has with members of the SonicWALL GRID Network. When this feature is enabled, is not accepted from IP addresses with a bad reputation. When SonicWALL Security will not accept a connection from a known bad IP address, mail from that IP address never reaches the Security server. Feature Overview section on page 3 GRID Connection Management with Sender IP Reputation and Connection Management Precedence Order section on page 4 GRID Network Sender IP Reputation checks the IP address of incoming connection requests against a series of lists and statistics to ensure that the connection has a probability of delivering valuable . The lists are compiled using the collaborative intelligence of the SonicWALL GRID Network. Known spammers are prevented from connecting to the SonicWALL UTM server, and their junk payloads never consume system resources on the targeted systems. Benefits: As much as 80 percent of junk is blocked at the connection level, before the is ever accepted into you network. Fewer resources are required to maintain your level of spam protection. Your bandwidth is not wasted on receiving junk on your servers, only to analyze and delete it. 3

4 Comprehensive Anti-Spam Service Overview A global network watches for spammers and helps legitimate users restore their IP reputations if needed. GRID Connection Management with Sender IP Reputation and Connection Management Precedence Order When a request is sent to your first-touch SonicWALL Unified Threat Monitoring server, the server evaluates the reputation of the requestor. The reputation is compiled from white lists of known-good senders, block lists of known spammers, and denial-of-service thresholds. If IP Reputation is enabled, the source IP address is checked in this order: Evaluation Allow-list Block-list Reputation-list Defer-list DoS Description If an IP address is on this list, it is allowed to pass messages through Connection Management. The messages will be analyzed by your SonicWALL Unified Threat Monitoring server as usual. This IP address is banned from connecting to the SonicWALL UTM server. If the IP address is not in the previous lists, the SonicWALL UTM server checks with the GRID Network to see if this IP address has a bad reputation. Connections from this IP address are deferred. A set interval must pass before the connection is allowed. If the IP address is not on the previous lists, the SonicWALL UTM server checks to see if the IP address has crossed the Denial of Service threshold. If it has, the server uses the existing DoS settings to take action. Only if the IP address passes all of these tests does the SonicWALL Unified Threat Monitoring server allow that server to make a connection and transfer mail. If the IP address does not pass the tests, there is a message from the SonicWALL server to the requesting server indicating that there is no SMTP server. The connection request is not accepted. Address and Service Objects The Anti-Spam feature of SonicOS introduces new Address and Service Objects to manage a customer s server(s). For an introduction to Address and Service Objects, see the SonicOS Enhanced Administrator s Guide, available at: SonicOS Enhanced 5.4 provides new Address Objects and Service Objects specific to the Anti-Spam service. These objects are used by the Anti-Spam Service for its NAT and Access Rule policies. Automatically-created rules are not editable and will be deleted if the Anti-Spam Service is disabled. When enabled, the Anti-Spam service creates NAT policies and Access Rules to control and redirect traffic. The policies and rules are visible in the Network > NAT Policies and Firewall Rules pages, but are not editable. These automatically-created policies are only available when Comprehensive Anti-Spam Service is enabled. When the Anti-Spam service is licensed and activated, the Anti-Spam > Settings page shows a single checkbox to enable Anti-Spam. Selecting the checkbox invokes the Destination Mail Server Policy Wizard if there is no existing custom access rule and NAT policy for an 4

5 Comprehensive Anti-Spam Service Overview already-deployed scenario. When you set up generated policies, the Anti-Spam service must know where the s are routed behind the SonicWALL UTM device. Specifically it needs the destination mail server IP address and its zone assignment. The Destination Mail Server Policy Wizard is launched if this data cannot be found. You will need the following information for the wizard: Destination Mail Server Public IP Address The IP address to which external MTAs will be connecting by SMTP. Destination Mail Server Private IP Address The internal IP address (behind the UTM device) of the Exchange or SMTP server. Zone Assignment Which zone the Exchange or SMTP server is assigned. Inbound Port The TCP service port number to which s will be sent to, also known as the inbound SMTP port. Policies and Address Object created by the wizard are editable and persist even if the Anti-Spam service is disabled. Objects Created When Comprehensive Anti-Spam Service Is Enabled This section provides an example of the type of Security rules and objects generated automatically as Firewall Access Rules, NAT Policies, and Service Objects. These objects are not editable and will be removed if the Comprehensive Anti-Spam Service is disabled. The Firewall > Access Rules page shows the generated rules used for Anti-Spam. Figure 1:1 Generated Access Rules The Anti-Spam Service Object is created in the Network > Services page. Figure 1:2 Generated Anti-Spam Service Object This Service Object is referenced by the generated NAT policies. 5

6 Comprehensive Anti-Spam Service Overview Figure 1:3 Generated NAT Policies Objects Created by the Wizard Policy and Object Changes Object created from an administrator s interaction with the wizard can be edited and stay in the system even if Comprehensive Anti-Spam Service is disabled. The following considerations apply to the auto-generation of policies: A system Address Group Object called the Public Mail Server Address Group is created as a default for the original destination for generated policies. This group contains the Address Object, Destination Mail Server Public IP, which takes the IP address value provided during the wizard. In the case where a SonicWALL UTM device already has existing policies for SMTP, the following procedures occur: If the existing policy s original destination is a host type Address Object, then the generated policies use the Public Mail Server Address Group object as their original destination. If the existing policy s original destination is a non-host type Address Object, the generated policies use this non-host type Address Object as their original destination. If there is more than one public IP address for SMTP, users can manually add Address Objects to the Public Mail Server Address Group. In the diag.html page, the Delete Policies and Objects button can be used to remove Anti-Spam Address and Service Objects and policies that are not deleted when the service is turned off. When this button is clicked, SonicOS attempts to remove all the automatically generated objects and policies. This operation is only allowed when the Anti-Spam service is off. Figure 1:4 Diagnostics Options The other diag.html page options relating to Anti-Spam are: Disable SYN Flood Protection for Anti-Spam related connections SYN Flood protection by default is turned on for SMTP (25) and Anti-Spam service (10025) ports. This disables the protection. 6

7 Comprehensive Anti-Spam Service Overview Use GRID IP reputation check only When selected, this overrides the probing result and simulates an Security service being unavailable (admin down). When an is sent, it still goes through both the SYN FLOOD check and GRID IP check, but other scanning is not performed. Real-Time Black List (RBL) Filter The RBL Filter configuration screen was previously located under Security Services in the left navigation pane. Now find it under the Anti-Spam menu group. When Comprehensive Anti-Spam Service is turned on, RBL Filtering is automatically disabled. 7

8 Platforms Comprehensive Anti-Spam Service is supported on all appliances that support SonicWALL SonicOS or higher. Setting up Comprehensive Anti-Spam Service This section contains the following subsections: Administrator Prerequisites section on page 8 Administrator Configuration Tasks section on page 8 Administrator Prerequisites The following deployment prerequisites are required to use the Comprehensive Anti-Spam Service feature: A licensed SonicWALL UTM appliance running or higher firmware Anti-Spam License for the UTM An Exchange or other SMTP server Administrator Configuration Tasks To configure the Comprehensive Anti-Spam Service feature, the appliance must be licensed with a sufficient Comprehensive Anti-Spam Service license. System settings and junk boxes are configured after license activation. This section contains the following subsections: Purchasing Licenses and Support section on page 8 Configuring Comprehensive Anti-Spam Service section on page 10 Using Comprehensive Anti-Spam Service section on page 17 Purchasing Licenses and Support Purchase a Comprehensive Anti-Spam Service license for the UTM appliance. This can be done directly through mysonicwall.com or through your reseller. 8

9 Note Your UTM appliance must be registered with mysonicwall.com before use. Refer to the SonicWALL UTM Getting Started Guide for further information on registering your appliance. Step 1 Step 2 Step 3 Step 4 Open a Web browser on the computer you are using to manage the SonicWALL SonicOS. Enter in the location or address field. Enter your mysonicwall.com account user name and password in the appropriate fields and click the submit button. Navigate to My Products in the left-hand navigation bar Step 5 Step 6 Step 7 Step 8 Select the UTM appliance you wish to add anti-spam capability to. Register for a Comprehensive Anti-Spam Service license. Login to your SonicWALL UTM appliance s web management interface. Navigate to the Licenses page in the navigation bar. Step 9 Step 10 In the Manage Security Services Online section, click the link to activate or renew your license. Alternately, enter your key or keyset. Enter your mysonicwall.com login information. 9

10 Activating Comprehensive Anti-Spam Service Once you have registered Comprehensive Anti-Spam Service, activate it to start your UTM appliance-level protection from spam, phishing, and virus messages. Step 1 Navigate to the Anti-Spam menu item in the navigation bar. You are directed to the Settings submenu. Step 2 Step 3 Click Enable Anti-Spam Service to activate the Comprehensive Anti-Spam Service feature. You have activated the Comprehensive Anti-Spam Service! Optionally, click the Junk Store Installer icon to install the junk store on your Exchange server. Configuring Comprehensive Anti-Spam Service Settings When Comprehensive Anti-Spam Service is activated, set your preferences. Once these are configured, your will be filtered and sorted according to your configuration The Threat Category Settings section enables administrator to set default settings for users messages. Choose default settings for messages that contain spam, phishing, and virus issues. Use the dropdown options to choose how to handle messages in each threat category. Your options are: Response Filtering off Effect Comprehensive Anti-Spam Service will not scan and filter any for this threat category, so all the messages are delivered to the recipients. 10

11 Response Tag With Store in Junk Box (default setting) Reject Mail Permanently Delete Effect The is tagged with a term in the subject line, for example, [JUNK] or [Possible Junk?]. Selecting this option allows the user to have control of the and can junk it if it is unwanted. The message is stored in the Junk Box. It can be unjunked by users and administrators with appropriate permissions. This option is the recommended setting. The message is returned to sender with a message indicating that it was not deliverable. The message is permanently deleted. CAUTION: If you select this option, your organization risks losing wanted . Comprehensive Anti-Spam Service supports up to 5 domains. If you are using more than one domain, choose the Multiple Domains option and contact SonicWALL or your SonicWALL reseller for more information. User-defined Access Lists designate which clients are allowed to connect to deliver . You can also set clients to be automatically rejected. Advanced options allow you to set the following: Setting Allow/Reject delivery of unprocessed mails when Comprehensive Anti-Spam Service is unavailable Tag and Deliver/Reject/Delete s when SonicWALL Junk Store is unavailable Probe Interval Success Count Threshold Failure Count Threshold Server Public IP Address Server Private IP Address Description If the Anti-Spam service is not enabled or unavailable for some other reason, you can choose to let all unprocessed s go through. Spam messages will be delivered to users, as well as good . If the setting is reject, no will be delivered until the Anti-Spam Service is re-enabled. If the SonicWALL Junk Store cannot accept spam messages, you can choose to delete them, reject them, or deliver them with cautionary subject lines such as [Phishing]Please renew your account Set the number of minutes between messages to the monitoring service. Set the number of successes required to report a success to the monitoring service. Set the number of failures required to report a failure to the monitoring service. The IP address of the server that is available for external connections. The IP address of the server for internal traffic. Inbound Port The port your UTM has open to receive from outside sources. 11

12 Setting Enable Subsystem Detection Description Detect other systems running in your mail stream. Installing the Junk Box on Microsoft Outlook Comprehensive Anti-Spam Service can create a Junk Store on your Microsoft Exchange Server. The Junk Store quarantines messages for end-user analysis and provides statistics. Log in to your Exchange system, then open a browser and log in to the SonicWALL Web management interface, and install the Junk Store. If you are using an Exchange server: Step 1 Step 2 1. Log in to your Exchange system, and on that system, open a web browser and log in to the SonicWALL Web Management Interface. On the Anti-Spam > Settings page, click the Junk Store Installer icon to install the Junk Store on your Exchange Server. Figure 1:5 Junk Store Installer Step 3 Step 4 Step 5 Step 6 Your browser may warn you that the Web site is trying to load the SonicWALL Security add-on. Click in the Information Bar and select Install ActiveX Control in the popup menu. On the Security Warning screen, click Install to install the ActiveX Control. On the Anti-Spam > Settings page, click the Junk Store Installer icon again. A progress bar is displayed on the page. The installer launches when it is fully downloaded. Migrating data in the Junk Store may take a long time. Wait for the data migration to complete. 12

13 Step 7 Navigate to the Anti-Spam > Status page and verify that the SonicWALL Junk Store is Operational. It typically takes about 15 minutes for the Junk Store to become operational. Statistics Junk Box Summary Use this page to view the statistics on how many messages are being blocked by your Comprehensive Anti-Spam Service feature. The type of message blocked and the number are listed. SonicWALL SonicOS sends an message to users listing all the messages that have been placed in their Junk Box. The Junk Box Summary includes: Good vs Junk count (organization) Number of blocked messages (per user) Users can unjunk items listed in the Junk Box Summary by clicking links in the . When unjunking there is an option not to add a sender to the Allowed list. To manage the Junk Box summary Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Frequency of Summaries from the drop-down box. Choose the dates and times to receive notification. Individual users can override these settings. Choose whether to include in message summary All Junk Messages or Likely Junk Only (hide definite junk). Choose Language of summary s from the drop-down list. Choose a plain or graphics rich summary. Select the name to be displayed in end user s client for the summary s. Subject Enter the subject line for the Junk Box Summary . URL for User View This text box is filled in automatically based on your server configuration and is included in the Junk Box Summary . Clicking on the link will allow users to unjunk messages. Test the link if you make any changes to ensure connectivity. If you have multiple SonicWALL Security deployments, enter the virtual host name here. 13

14 Step 7 Test this Link Users unjunk items in the Junk Box summary by clicking links in the . To test the URL, click Test this Link. If the test fails, check that the URL is correct. (Installation checklist parameters B, C, D) Click the Apply Changes button. Junk Box View On the Anti-Spam > Junk Box View page, you can view, search, and manage all messages that are currently in the Junk Store on the Exchange or SMTP server. This functionality is only available if the Junk Store is installed. This section contains the following subsections: Searching in the Junk Box View section on page 14 Managing the Junk Store in the Junk Box View section on page 15 Searching in the Junk Box View Search the Junk Store for a text string in any of the following fields: To Subject From Date Or, select one or more threat categories to search. 14

15 To search the Junk Store, perform the following steps: Step 1 Step 2 Step 3 On the Inbound tab of the Anti-Spam > Junk Box View page, type the text for which to search into the Search text box. Select the desired field in which to search from the in drop-down list. Select one or more checkboxes for the threat categories to search. Categories that are not selected will not be searched. Only messages belonging to one of the Threat Categories that are set to Store in Junk Box on the Anti-Spam > Settings page are included in the Junk Store. However, all categories are listed on this page, whether or not any messages of that type are stored in the Junk Store. Click the Go button to perform the search. The results are displayed in the bottom section of the page. Managing the Junk Store in the Junk Box View Use the buttons at the top and bottom of the search results list to perform the following Junk Store management tasks on the Anti-Spam > Junk Box View page: Check All Uncheck All Delete Unjunk Send Copy To Select the checkbox for all lines on the page. If there are more lines in the search results than are displayed on the current page, only the results on the current page are selected. Clear the checkbox for all lines on the page. If there are more lines in the search results than are displayed on the current page, only the results on the current page are cleared. Permanently delete the selected message(s) from the Junk Store Remove the selected message(s) from the Junk Store and deliver them to the user(s) to whom they are addressed. The delivery time and date will be set by the Exchange server when each message is delivered to the user mailbox. Keep the selected message(s) in the Junk Store, and send a copy of it or them to a user. Display Set the number of lines of the search results to display on the page. The choices are 10, 25, and 50 lines per page. Pagination controls are provided to navigate to the first page, previous page, next page, and last page of the results. Sort Click any of the column headings in the results list to sort the results by that field. 15

16 To manage the Junk Store: Step 1 Step 2 In the results list, select the checkbox for the messages that you want to manage. To permanently delete the selected messages from the Junk Store, click the Delete button at the top or bottom of the list. The selected messages are deleted immediately there is no confirmation dialog box before the deletion. If the deletion is successful, a green notification is displayed at the top of the page. If the deletion fails, the notification is red. Step 3 Step 4 To remove the selected messages from the Junk Store and deliver them to the users, click the Unjunk button. The selected messages are unjunked and sent immediately there is no confirmation dialog box before the action. If the action is successful, a green notification is displayed at the top of the page. If the action fails, the notification is red. To send a copy of the selected messages to a user, click the Send Copy To button. Type the address into the Send Copy To dialog box and then click Send. Real-Time Black List Filtering You can only use RBL if the Anti-Spam Service is not enabled. SMTP Real-time Black List (RBL) is a mechanism for publishing the IP addresses of SMTP spammers use. There are a number of organizations that compile this information both for free: and for profit: A well-maintained list of RBL services and their efficacy can be found at: Note SMTP RBL is an aggressive spam filtering technique that can be prone to false-positives because it is based on lists compiled from reported spam activity. The SonicOS implementation of SMTP RBL filtering provides a number of fine-tuning mechanisms to help ensure filtering accuracy. 16

17 Using Comprehensive Anti-Spam Service RBL list providers publish their lists using DNS. Blacklisted IP addresses appear in the database of the list provider's DNS domain using inverted IP notation of the SMTP server in question as a prefix to the domain name. A response code from to indicates some type of undesirability: For example, if an SMTP server with IP address has been blacklisted by RBL list provider sbl-xbl.spamhaus.org, then a DNS query to sbl-xbl.spamhaus.org will provide a response, indicating that the server is a known source of spam, and the connection will be dropped. For more information on the RBL, see the SonicOS Administrator Guide. Using Comprehensive Anti-Spam Service Once you have configured Comprehensive Anti-Spam Service, it will work automatically until you disable it. Messages are sent to the Junk Box and users unjunk them if they are wrongly categorized. Use the Status page to view the state of your licensing and monitoring. The status page also includes the Stream Diagnostics Capture section. Start the capture to create an application-formatted report on the SMTP-related traffic passing through your UTM appliance. Stop the capture at any time. Download the data to view the information in another application. This report only contains inbound traffic. To look up the MX record of an er, enter it in the Lookup name or IP: field and click Go. Comprehensive Anti-Spam Service will attempt to connect to that server and retrieve the SMTP banner. This feature allows you to verify that an sender is not spoofing an address to appear more legitimate. Document Part Number: Rev. A Last Updated: 6/24/09 17

Email Security 8.0 User Guide

Email Security 8.0 User Guide Email Security 8.0 User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to

More information

University of Mary s Spam Solution

University of Mary s Spam Solution University of Mary s Spam Solution Spam is a growing problem worldwide. Spam causes productivity loss, network traffic, vast amount of corporate resources to be consumed and valuable server space to be

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

Green House Data Spam Firewall Administrator Guide

Green House Data Spam Firewall Administrator Guide Green House Data Spam Firewall Administrator Guide Spam Firewall Administrator Guide... 2 Navigating the Web Interface... 2 How to Drill Down from the DOMAINS Page to Account Level... 2 Message Logs...

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

YSU Spam Solution Guide to Using Proofpoint

YSU Spam Solution Guide to Using Proofpoint Proofpoint Web Interface Introduction In 2006, YSU deployed the Proofpoint appliance in response to a growing number of spam messages infiltrating their way past current detection technologies into user

More information

Purchase College Barracuda Anti-Spam Firewall User s Guide

Purchase College Barracuda Anti-Spam Firewall User s Guide Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to

More information

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32 IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Barracuda Email Security Service User Guide

Barracuda Email Security Service User Guide Barracuda Email Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses,

More information

Email Migration Manual (For Outlook Express 6)

Email Migration Manual (For Outlook Express 6) Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change

More information

SonicWALL Email Security. User Guide. Version 4.6

SonicWALL Email Security. User Guide. Version 4.6 SonicWALL Email Security User Guide Version 4.6 SonicWALL, Inc. reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the

More information

Hosted Email Security Administrator s Guide

Hosted Email Security Administrator s Guide Hosted Email Security Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

How to Use Red Condor Spam Filtering

How to Use Red Condor Spam Filtering What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies

More information

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4

More information

Comodo Antispam Gateway Software Version 2.4

Comodo Antispam Gateway Software Version 2.4 Comodo Antispam Gateway Software Version 2.4 User Guide Guide Version 2.4.070715 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...

More information

Introduction. SonicWALL Email Security

Introduction. SonicWALL Email Security SonicWALL Email Security Configuration Tips Introduction SonicWALL Email Security is designed to install quickly and be easy to maintain while protecting a company from email threats. The out-of-the-box

More information

How does the Excalibur Technology SPAM & Virus Protection System work?

How does the Excalibur Technology SPAM & Virus Protection System work? How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

PureMessage for Microsoft Exchange Help. Product version: 4.0

PureMessage for Microsoft Exchange Help. Product version: 4.0 PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Manual Spamfilter Version: 1.1 Date: 20-02-2014

Manual Spamfilter Version: 1.1 Date: 20-02-2014 Manual Spamfilter Version: 1.1 Date: 20-02-2014 Table of contents Introduction... 2 Quick guide... 3 Quarantine reports...3 What to do if a message is blocked inadvertently...4 What to do if a spam has

More information

SonicWALL Email Security Appliance Administrator Guide

SonicWALL Email Security Appliance Administrator Guide SonicWALL Email Security Appliance Administrator Guide Version 7.3 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Part Number:

More information

Email Migration Manual (For Outlook 2010)

Email Migration Manual (For Outlook 2010) Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

Hosted Email Security 2.0 Administrator s Guide

Hosted Email Security 2.0 Administrator s Guide Hosted Email Security 2.0 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

Using the Barracuda Spam Firewall to Filter Your Emails

Using the Barracuda Spam Firewall to Filter Your Emails Using the Barracuda Spam Firewall to Filter Your Emails This chapter describes how end users interact with the Barracuda Spam Firewall to check their quarantined messages, classify messages as spam and

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

Personal Dashboard User Guide

Personal Dashboard User Guide Version 8.1 800-782-3762 www.edgewave.com 2001 2011 EdgeWave. All rights reserved. The Red Condor and EdgeWave logos and brands are trademarks of EdgeWave. All other trademarks and registered trademarks

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

KUMC Spam Firewall: Barracuda Instructions

KUMC Spam Firewall: Barracuda Instructions KUMC Spam Firewall: Barracuda Instructions Receiving Messages from the KUMC Spam Firewall Greeting Message The first time the KUMC Spam Firewall quarantines an email intended for you, the system sends

More information

Websense Email Security Transition Guide

Websense Email Security Transition Guide Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

eprism Email Security Suite

eprism Email Security Suite V8.4 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Symantec Hosted Mail Security Getting Started Guide

Symantec Hosted Mail Security Getting Started Guide Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration

More information

The Institute of Education Spam filter service allows you to take control of your spam filtering.

The Institute of Education Spam filter service allows you to take control of your spam filtering. CUSTOMISING THE IOE SPAM FILTER The Institute of Education Spam filter service allows you to take control of your spam filtering. The interface is very simple to access and use. Through a secure web page

More information

Core Protection Suite

Core Protection Suite Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

SonicWALL Security Dashboard

SonicWALL Security Dashboard Document Scope This document describes how to use the feature on a SonicWALL security appliance running SonicOS 3.8 firmware or later. This document contains the following sections: Overview section on

More information

SonicWALL Anti-Spam Desktop User Guide

SonicWALL Anti-Spam Desktop User Guide SonicWALL Anti-Spam Desktop User Guide Version 6.2 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Part Number: 232-001812-00

More information

WEB QUARANTINE USER GUIDE VERSION 4.3

WEB QUARANTINE USER GUIDE VERSION 4.3 WEB QUARANTINE USER GUIDE VERSION 4.3 WEB QUARANTINE USER GUIDE Version 4.3 The content of this manual is for informational use only and is subject to change without notice. Neither Norman nor anyone else

More information

Overview. Accessing the User Interface. Logging In. Resetting your Password

Overview. Accessing the User Interface. Logging In. Resetting your Password Overview The message filtering service lets a company easily provide real-time spam and virus filtering, attack blocking, and email-traffic monitoring across a user deployment of any size. Users receive

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

1 Accessing E-mail accounts on the Axxess Mail Server

1 Accessing E-mail accounts on the Axxess Mail Server 1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server

More information

About this documentation

About this documentation Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to

More information

Configuring Trend Micro Content Security

Configuring Trend Micro Content Security 9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing

More information

Mimecast Services for Outlook (MSO4)

Mimecast Services for Outlook (MSO4) Mimecast Services for Outlook (MSO4) End User Quick Start Guide for Outlook 2010/2013 Mimecast Services for Outlook (MSO 4) is a software application that integrates with your Microsoft Outlook. Once installed,

More information

Hosted Email Security Quick Start Guide

Hosted Email Security Quick Start Guide Hosted Email Security Quick Start Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

ModusMail Software Instructions.

ModusMail Software Instructions. ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account

More information

PureMessage for Microsoft Exchange Help. Product version: 3.1

PureMessage for Microsoft Exchange Help. Product version: 3.1 PureMessage for Microsoft Exchange Help Product version: 3.1 Document date: June 2015 Contents 1 About PureMessage for Microsoft Exchange...4 2 Key concepts...5 2.1 Key concepts overview...5 2.2 Inbound,

More information

Using SonicWall Anti-Spam Utility Managing your e-mail junkbox settings

Using SonicWall Anti-Spam Utility Managing your e-mail junkbox settings Using SonicWall Anti-Spam Utility Managing your e-mail junkbox settings In order to receive some expected e-mails through the campus e-mail system you may have to unjunk and adjust your anti-spam settings

More information

Western University Spam Firewall User s Guide

Western University Spam Firewall User s Guide Western University Spam Firewall User s Guide The Western University Spam Firewall sits between the Internet and the internal mail servers and is designed to filter messages for spam and viruses. Since

More information

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you.

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you. CONFIGURING THE ANTI-SPAM In this tutorial you will learn how to configure your anti-spam settings using the different options we provide like Challenge/Response, Whitelist and Blacklist. EnterGroup Anti-Spam

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0 eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably

More information

Barracuda Spam & Virus Firewall User's Guide 5.x

Barracuda Spam & Virus Firewall User's Guide 5.x Barracuda Spam & Virus Firewall Barracuda Spam & Virus Firewall User's Guide 5.x This guide describes how you can check your quarantined messages, classify messages as spam and not spam, manage whitelisting

More information

Barracuda Spam Firewall

Barracuda Spam Firewall Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive

More information

SonicWALL GMS Custom Reports

SonicWALL GMS Custom Reports SonicWALL GMS Custom Reports Document Scope This document describes how to configure and use the SonicWALL GMS 6.0 Custom Reports feature. This document contains the following sections: Feature Overview

More information

Migration Quick Reference Guide for Administrators

Migration Quick Reference Guide for Administrators Migration Quick Reference Guide for Administrators 10 Easy Steps for Migration Maximize Performance with Easy Settings Changes Communicating with Your Users Reporting Spam Resources Page 1 10 Easy Steps

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Email Security 8.0 Administrator s Guide

Email Security 8.0 Administrator s Guide Email Security 8.0 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda. Version 5.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2012, Barracuda Networks

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

MailFoundry User Manual. Page 1 of 86. Revision: MF20120621 Copyright 2007, Solinus Inc. All Rights Reserved. Page 1 of 86

MailFoundry User Manual. Page 1 of 86. Revision: MF20120621 Copyright 2007, Solinus Inc. All Rights Reserved. Page 1 of 86 MailFoundry User Manual Page 1 of 86 MailFoundry User Manual Revision: MF20120621 Copyright 2007, Solinus Inc. All Rights Reserved Page 1 of 86 Table of Contents MailFoundry User Manual Page 2 of 86 Chapter

More information

Barracuda Email Security Service

Barracuda Email Security Service Barracuda Networks Technical Documentation Barracuda Email Security Service Administrator s Guide Version 1.0 RECLAIM YOUR NETWORK Copyright Notice Copyright (c) 2004-2011, Barracuda Networks, Inc., 3175

More information

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda. Version 3.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2009, Barracuda Networks

More information

Hosted Security Integration with Microsoft Office 365

Hosted  Security Integration with Microsoft Office 365 A Trend Micro Integration Guide I July 2016 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365 customers

More information

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with

More information

Email Filtering Admin Guide. Guide to Administrative Functions of Spam and Virus Filtering Service

Email Filtering Admin Guide. Guide to Administrative Functions of Spam and Virus Filtering Service Email Filtering Admin Guide Guide to Administrative Functions of Spam and Virus Filtering Service Table of Contents Welcome Page 3 Logon Page 3 Home Page 4 Spam Page 5 Message Searching Releasing Held

More information

Dell SonicWALL Hosted Email Security. Administration Guide

Dell SonicWALL Hosted Email Security. Administration Guide Dell SonicWALL Hosted Email Security 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Using the Barracuda to Filter Your Emails

Using the Barracuda to Filter Your Emails Using the Barracuda to Filter Your Emails The following describes how end users interact with the Barracuda to check their quarantined messages, classify messages as spam and not spam, and modify their

More information

Quick Start Policy Patrol Mail Security 10

Quick Start Policy Patrol Mail Security 10 Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information

More information

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

Implementing MDaemon as an Email Security Gateway to Exchange Server

Implementing MDaemon as an Email Security Gateway to Exchange Server Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend

More information

Ans.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera

Ans.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera Faqs > Spam Monitor General Q1. What is Spam Monitor? Ans.: Spam Monitor is an easy-to-use spam filter that detects and isolates unsolicited junk mail sent to your mailbox. Designed for computer users,

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

Quick Start Guide Sendio Hosted

Quick Start Guide Sendio Hosted Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START

More information

Advanced Settings. Help Documentation

Advanced Settings. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods

More information

Email - Spam Spam Email Firewall How Does the Spam Firewall Work? Getting Started username Create New Password

Email - Spam Spam Email Firewall How Does the Spam Firewall Work? Getting Started username Create New Password Email - Spam Spam Email Firewall ODU s Information Services has implemented a Spam Firewall to help you manage spam e-mail from Internet senders. Generally defined, spam e-mail is an unsolicited mailing,

More information

ExchangeDefender. Understanding the tool that can save and secure your business

ExchangeDefender. Understanding the tool that can save and secure your business ExchangeDefender Understanding the tool that can save and secure your business OVERVIEW The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting.

More information

Hosted Email Security 2.0 Quick Start Guide

Hosted Email Security 2.0 Quick Start Guide Hosted Email Security 2.0 Quick Start Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

PROOFPOINT - EMAIL SPAM FILTER

PROOFPOINT - EMAIL SPAM FILTER 416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu support@anr.msu.edu PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...

More information

MX Control Console & Spam Quarantine Report User Guide

MX Control Console & Spam Quarantine Report User Guide MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE

More information

Email Security 7.4 Administrator s Guide

Email Security 7.4 Administrator s Guide Email Security 7.4 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Avira Managed Email Security (AMES) User Guide

Avira Managed Email Security (AMES) User Guide Avira Managed Email Security (AMES) User Guide 1 Product information... 3 1.1 Functionality... 3 1.2 Licensing AMES... 3 2 Getting started with AMES... 4 2.1 Adding a new domain to AMES... 4 2.2 Logging

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

CONFIGURING FUSEMAIL ANTI-SPAM

CONFIGURING FUSEMAIL ANTI-SPAM CONFIGURING FUSEMAIL ANTI-SPAM In this tutorial you will learn how to configure your anti-spam settings using the different options we provide like FuseFilter, Challenge/Response, Whitelist and Blacklist.

More information

FastNetSecurity SpamGuard Email Spam Filter How-To

FastNetSecurity SpamGuard Email Spam Filter How-To FastNetSecurity SpamGuard Email Spam Filter How-To Using your web browser, log on to https://spamguard.fastnetsecurity.com Tip: Add a bookmark to this page for easy access! Login credentials will incorporate

More information