SonicWALL Comprehensive Anti-Spam Service FAQ

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "SonicWALL Comprehensive Anti-Spam Service FAQ"

Transcription

1 Product Question: 1. Can I configure customizable aggressiveness settings like in your dedicated products? Answer: This feature is available in the dedicated Security appliance and server software solutions from 2. Can I configure whitelists / blacklists? Yes, whitelists & blacklists are available by IP address on the UTM. Whitelist & blacklists by address or domain names are available in the dedicated Security appliance and server software solutions from 3. How do I configure outbound protection? This feature is available in the dedicated Security appliance and server software solutions from 4. What does outbound protection mean? Outbound protection provides outbound threat prevention (against viruses, spam, & bots) and outbound compliance management for regulatory compliance and data leakage prevention. This feature is available in the dedicated Security appliance and server software solutions from See SonicWALL Security product pages for more details. 5. What happens when the service goes down? Do you store / spool messages? SonicWALL has built in multiple levels of physical, hardware, and virtual redundancy into our cloud-based systems for guaranteed uptime. In the very rare event of the cloud-based service being unavailable, the system behavior is configurable by the administrator from within the product. In the event that the recipient mail server goes down, SonicWALL leverages the standards-based SMTP delivery protocol to automatically resend messages when the destination mail server is unavailable. 6. What do I do about false positives? False positives are extremely rare for the Comprehensive Anti-Spam Service. In the event that you experience a false positive: If the sender is a business partner, vendor, or organization that you frequently receive from, you can add their IP address to the UTM whitelist to ensure delivery of their mail traffic. If an individual is caught as a false positive, you can add that sender s IP address to the whitelist on the UTM. If the problem persists, then please open a case with SonicWALL Support. Support can analyze the message and provide feedback to the customer. Please see the SonicWALL Support webpage for your local contact details. 7. What should I do if too much spam is getting through? 8. Why did you make the allow and deny lists based on host addresses rather than fully qualified domain names? SonicWALL has tuned the Comprehensive Anti-Spam Service to specifically prevent spam. However in the event of a rapid new Spam outbreak, SonicWALL s GRID Network takes inputs from millions of sensor worldwide and will quickly learn the new Spam pattern. It makes updates to the GRID Network in real-time. These updates are immediately available to the Comprehensive Anti-Spam Service to mitigate a new spam threat. Initially whitelist and blacklist are by host IP address only. Whitelist & blacklists by address or by fully qualified domain names are available in the dedicated Security appliance and server

2 9. Do I need to manually allow / deny using mailrelated address objects? software solutions from Initially whitelist and blacklist are by host IP address only. Whitelist & blacklists by address or by fully qualified domain names are available in the dedicated Security appliance and server software solutions from 10. What about GEN 4? There are no plans to release the service on GEN 4 platforms at this time. 11. What about POP3? There are no plans for POP3 support at this time. POP3 support is available via SonicWALL s Anti-Spam Desktop product. 12. When will you add defense against DHA? This feature is available in the dedicated Security appliance and server software solutions from 13. Is there an option for a junk store on something No, not at this time. SonicWALL is investigating this as a other than the mail server? potential capability for the future. 14. How does this compare to what Postini does? If you can click a box, you can set it up Postini involves at least 25 steps, including changing MX records, and could take days Enable SonicWALL Comprehensive Anti-Spam Service with literally one mouse click 15. How does this compare to what Fortinet / WatchGuard does? As moves from an annoyance to a security threat Our firewall can filter , but anti-spam products can t filter security threats We scan EVERY protocol and EVERY packet How protected do you want to be? SonicWALL offers Day Zero Antivirus Postini has a lapse of a few hours between a new threat and the antidote Ever receive large mail? Postini maximum size defaults to 200MB (300MB max) over that limit? REJECTED! SonicWALL can scan ANY message size Technical support? Postini offers small businesses online support only How much spam do you want? SonicWALL s 98% vs. Postini s 95% effectiveness Value your time? Like simplicity? ONE user interface to manage, ONE place to get reports, ONE place to get alerts Comprehensive Anti-Spam Service is a full featured service with over a 98% effectiveness rate, built on the same technology as our Enterprise-class solutions. This cannot be compared to a basic Real Time Blacklist (RBL) based service. 16. Why don t you just do a fully-hosted service? SonicWALL has no plans to offer a fully hosted service at this time. 17. How does it work?

3 18. Why is the RBL disabled during the anti-spam configuration? 19. How is the SonicWALL IP Reputation different from the traditional RBLs? 20. How and where can I check whether an IP address is bad (spammy) or not and also its rating? 1 SMTP traffic arrives at the SonicWALL network security appliance 2 Junk is rejected based on Sender IP reputation using Advanced Reputation Management (ARM) service. 3 Remaining is evaluated using cloud-based Advanced Content Management (ACM) service to determine if it is good or junk 4 Good is delivered to the server 5 Optionally, junk can be delivered to SonicWALL Junk Boxes on the server and Junk Box Summaries can be delivered as s to each user. RBL s are just one of many inputs to the Comprehensive Anti-Spam Service. Therefore it would be redundant to apply this filtering twice message traffic. Comprehensive Anti-Spam Service is a full featured service with over a 98% effectiveness rate, built on the same technology as our Enterprise-class solutions. This cannot be compared to a basic Real Time Blacklist (RBL) based service. RBL filtering is not always effective, can be slow to update, and can often be out of date. Look for an upcoming SonicWALL whitepaper shortly on the advantages of CASS over basic RBL-based services. SonicWALL will soon be releasing an Threat Center, which will include the ability to look up specific IP addresses against the GRID Network s IP reputation database. 21. How is SonicWALL IP reputation compared to Iron IronPort only stops 93% to 95% of Spam using IP Port? reputation. SonicWALL stops over 98% of all Spam, using multiple techniques, including IP reputation. IronPort provides no visibility into messages that were blocked using their IP Reputation service. SonicWALL provides much greater visibility. SonicWALL always logs any connections that were blocked by IP reputation, providing transparency for administrators. 22. The anti-spam data sheet shows the IP reputation SonicWALL provides detailed stats and reporting via the will block up to 80% of spam how can I UTM management console. These statistics are readily validate this number? available for the Comprehensive Anti-Spam Service. 23. Will using the cloud-based service for Only slightly. traffic makes up only a small increase my traffic? percentage of total traffic (usually less that 10%). For the typical customer, they would only see a 2% increase in this traffic relative to total traffic. 24. Will enabling the anti-spam service reduce the No, it will not have any effect on any other services.

4 performance of my other services? 25. What is the total performance hit by enabling the anti-spam service? 26. After enabling the anti-spam service my UTM appliance shows more connections why? 27. What is the impact on the UTM with this and other services all enabled? 28. I m not receiving some s and the logs don t show any s dropped, how can I troubleshoot this issue? 29. Is there any limit to the size of the attachments that can be scanned? 30. I m currently using another Brand X security solution. Can I still use the SonicWALL anti-spam service on our UTM appliance as an additional layer of protection? If so, how do I configure the service? 31. Can the Comprehensive Anti-Spam Service be used in conjunction with SonicWALL s Security products? No impact. There will only be a slight increase in the number of concurrent connections on the UTM. For the vast majority of customers, the impact is negligible. A: Yes, the anti-spam service uses connections to connect to the cloud-based service. This will result in a slight increase in the number of connections on the UTM. A: Almost no performance hit for Comprehensive Anti- Spam Service on the UTM, since it is mostly cloud-based. The Anti-Spam service can be configured to tag spam traffic, rather than deleting or moving to the junk store. This is the recommended first step to troubleshoot issues. A: No, there is not size limit on the size of attachments that can be scanned. While the service is effective enough to run as your primary anti-spam service, it can also co-exist with your current anti-spam solution. The anti-spam service can be configured to merely tag spam traffic and then pass it on to a secondary anti-spam solution. Yes, the Comprehensive Anti-Spam Service works with any downstream SonicWALL Security appliance or software. It can be a great combination the service removes spam right at the connection level, then you can use your existing anti-spam product to provide additional inbound policies, per-user capabilities, outbound threat management, compliance, etc. 32. How are NAT policies and access rules created? NAT Policies and access rules are created automatically for the service. Usually there is absolutely no admin intervention required. 33. What happens to the existing SMTP NAT policies and access rules if I activate this service? 34. If I want to deploy multiple exchange servers for redundancy, how do I configure the NAT policies and access rules? 35. Can you show me how to configure dual WAN load balancing / failover scenarios? All existing SMTP NAT policies and access rules are automatically backed-up when the service is activated. The anti-spam service does not support this configuration. Currently, the anti-spam service does not support this configuration. However this configuration is expected to be enabled in a future version. 36. What do I do if I lost an ? 1. If installed, check your User Junk Box Summary. 2. Check the host IP address against the log of IP addresses blocked due to GRID IP Reputation. 3. Add the host IP address to the whitelist on the service, if required. 4. If the above actions do not resolve the issue, then please open a case with SonicWALL Support. Please see the SonicWALL Support webpage for your local contact details. 37. Can you help me troubleshoot my stats? Please refer to the following resources to troubleshoot stats: 1. Comprehensive Anti-Spam section of your UTM s Administrator Guide. 2. Release Notes for your firmware release. 3. SonicWALL Technical Support s Knowledge Base 38. What type of diagnostic tools do you offer? SonicWALL provides a variety of diagnostic tools, such as detailed reports and diagnostics within the product via the UTM management console. SonicWALL also offers

5 39. How do I use the stream diagnostics capture? 40. Is the Junk Store required? Are the Junk Box Summaries required? 41. What languages are supported for presentation of the Junk Box Summaries? Licensing Question: 42. Does Comprehensive Anti-Spam Service require a license on the UTM? an IP address reverse-dns lookup utility to troubleshoot logs. Finally, SonicWALL will shortly offer IP reputation lookup on the Security Threat Center. Please consult the Comprehensive Anti-Spam section of your UTM s Administrator Guide for a description of how to use the stream diagnostic capture. No, the Junk Store is completely optional for customers who are using an exchange server. The junk store allows end users to receive personal junk box summaries. The Junk Box Summaries can be presented in any of the EFIGS (English, French, Italian, German, Spanish) and Chinese (Traditional & Simplified), Japanese, etc. languages. Answer: Yes, the Comprehensive Anti-Spam Service is licensed by user bands, 10, 25, 50, 100 & 250. Customers can protect any number of users up to and including the number of users for which the product is licensed. 43. What if I have 101 users? The Comprehensive Anti-Spam service is licensed by user bands, 10, 25, 50, 100 & 250. Customers can protect any number of users up to and including the number of users for which the product is licensed. [For example: For 100 users, this would require the 100 user license. For 101 users, this would require the 250 user license.] 44. What if I grow out of my user band? Licensed user count need only to be adjusted at the time of renewal. If you grow out of your current user band, then all of your users, regardless of count, will be protected until the expiration date of the service. At that time, you will need to purchase the correct user count for your organization. 45. Can I stack subscriptions? No, there is no need to stack subscriptions. Simply select the user band that covers your number of users: Up to 10, 25, 50, 100 or Fortinet does it a different way I only want to pay SonicWALL does not offer per firewall licensing for the a flat fee per firewall Comprehensive Anita-Spam Service. 47. Does SonicWALL enforce user counts? SonicWALL reserves the right to enforce user counts at its sole discretion. SonicWALL will alert customers if they grossly exceed their licensed user count. 48. Where can I check how many user licenses are being used, and what happens if I exceed the licensed user count? Will the service still scan these additional users? The user licenses are available in the licenses section of the management console of the UTM. This information is also available on Mycom 49. I am a partner and I want monthly billing when SonicWALL has no plans to introduce monthly billing at will you have that? this time. 50. I am a customer and I want to pay monthly when SonicWALL has no plans to introduce monthly billing at will you have that? this time. 51. Why do I want to purchase a dedicated solution? There are many advantages to both solutions. The following is a list of some of the key benefits of a dedicated appliance or software solution: Dedicated Security solutions add complete outbound protection. Outbound Threat Management detects botnets / zombies and prevents them from launching threats Compliance Defense Management for corporate governance and regulatory compliance Integrates data leakage prevention, compliance

6 52. I just purchased this service a few months ago, but decided I now want a dedicated solution. How do I upgrade? 53. The data sheet shows that will be scanned for viruses. Do I still need to purchase the GAV service? 54. If for any reason my license is lost on the UTM appliance, will the anti-spam service still scan my ? 55. For HA deployments, do I need to purchase the anti-spam service for both primary and backup appliances or only for the primary appliance (like with other security services)? 56. Does SonicWALL have any plans to combine the anti-spam service with the CGSS bundle? routing, approval boxes, encryption and archiving Third-party Anti-Virus Protection Adds McAfee and/or Kaspersky Anti-Virus Contact your SonicWALL Sales representative. Comprehensive Anti-Spam Service scans traffic for spam, phishing, and virus-laden messages. However it does not protect against viruses in non- traffic. SonicWALL recommends our Gateway Anti-Virus Service to protect all types of traffic against viruses. SonicWALL provides redundancy of licensee information on Mycom. In the event of a loss of the license on the UTM, the licenses can be restored from My If the service will not function if it is not licensed on the UTM. Comprehensive Anti-Spam Service, like other services, needs only to be purchased once for the primary appliance and will automatically cover the backup appliance in the event of a failover. The anti-spam service is not part of the CGSS bundle. SonicWALL had no plans to combine the anti-spam service with the CGSS bundle. 57. I have more than 250 users what do I do? SonicWALL recommends our dedicated Security appliance and software solutions for customer with greater than 250 users. Prepared by Allen Schoonmaker Version 1.2 Date: July 22 th, 2009

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

Frequently Asked Questions

Frequently Asked Questions Questions and Answers Questions About Platform, Requirements, and Capabilities What is the difference between a SonicWALL Appliance and Software SonicWALL Email Security? The hardware version is a Linux

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

Cisco Cloud Email Security Interoperability with Microsoft Office 365

Cisco Cloud Email Security Interoperability with Microsoft Office 365 White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Introduction. SonicWALL Email Security

Introduction. SonicWALL Email Security SonicWALL Email Security Configuration Tips Introduction SonicWALL Email Security is designed to install quickly and be easy to maintain while protecting a company from email threats. The out-of-the-box

More information

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,

More information

FortiMail Email Filtering Course 221-v2.2 Course Overview

FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,

More information

Securing the Small Business Network. Keeping up with the changing threat landscape

Securing the Small Business Network. Keeping up with the changing threat landscape Securing the Small Business Network Keeping up with the changing threat landscape Table of Contents Securing the Small Business Network 1 UTM: Keeping up with the Changing 2 Threat Landscape RFDPI: Not

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Anti Spam Best Practices

Anti Spam Best Practices 39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Protect Your Enterprise With the Leader in Secure Email Boundary Services

Protect Your Enterprise With the Leader in Secure Email Boundary Services Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise

More information

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

Cisco Email Security Appliances

Cisco Email Security Appliances Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate

More information

SonicWALL Email Security 7.2.1 Appliance

SonicWALL Email Security 7.2.1 Appliance Email Security SonicWALL Email Security 7.2.1 Appliance System Compatibility SonicWALL Email Security 7.2.1 is supported on the following SonicWALL Email Security appliances: SonicWALL Email Security 200

More information

Email Security Series

Email Security Series Email Security Series Elegantly simple, brutally effective, always affordable anti-spam protection Email spam threatens the security and productivity of today s small and mid-size organizations. Spam attacks

More information

Best Practices Revision A. McAfee Email Gateway 7.x Appliances

Best Practices Revision A. McAfee Email Gateway 7.x Appliances Best Practices Revision A McAfee Email Gateway 7.x Appliances COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

MXSweep Hosted Email Protection

MXSweep Hosted Email Protection ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740

More information

anomaly, thus reported to our central servers.

anomaly, thus reported to our central servers. Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview

FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Barracuda Spam Firewall Administrator s Guide

Barracuda Spam Firewall Administrator s Guide Barracuda Spam Firewall Administrator s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license.

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86% Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity

More information

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes Email Security SonicWALL Email Security 7.3.2 Appliance Release Notes System Compatibility SonicWALL Email Security 7.3.2 is supported on the following SonicWALL Email Security appliances: SonicWALL Email

More information

WATCHGUARD IRONPORT KEY SALES PITCH TRUTH BEHIND THE PITCH

WATCHGUARD IRONPORT KEY SALES PITCH TRUTH BEHIND THE PITCH KEY SALES PITCH First and only true unified security provider for protection bidirectional threats and data loss prevention across email and web in a single solution. XCS leverages ReputationAuthority

More information

PineApp Anti IP Blacklisting

PineApp Anti IP Blacklisting PineApp Anti IP Blacklisting Whitepaper 2011 Overview ISPs outbound SMTP Services Individual SMTP relay, not server based (no specific protection solutions are stated between the sender and the ISP backbone)

More information

Configuring Trend Micro Content Security

Configuring Trend Micro Content Security 9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing

More information

MANAGED FIREWALL SERVICE. Service definition

MANAGED FIREWALL SERVICE. Service definition MANAGED FIREWALL SERVICE Service definition Page 1 of 4 Version 1.2 (03/02/2015) NSMS Managed Firewalls Service Definition Understanding of a firewall service The function of any firewall service is to

More information

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2 Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)

More information

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4

More information

Mod 08: Exchange Online FOPE

Mod 08: Exchange Online FOPE Office 365 for SMB Jump Start Mod 08: Exchange Online FOPE Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall Owner & IT Consultant District Computers 1 Jump Start Schedule

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information

More information

Barracuda Spam Firewall

Barracuda Spam Firewall Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive

More information

Zscaler Internet Security Frequently Asked Questions

Zscaler Internet Security Frequently Asked Questions Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices

More information

Version. Barracuda Spam Firewall Administrator s Guide

Version. Barracuda Spam Firewall Administrator s Guide Version Barracuda Spam Firewall Administrator s Guide Barracuda Networks Inc. 385 Ravendale Drive Mountain View, CA 94043 http://www.barracudanetworks.com 1 Copyright Notice Copyright 2005, Barracuda Networks

More information

Features and benefits guide for partners and their customers

Features and benefits guide for partners and their customers and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus

More information

Web. Anti- Spam. Disk. Mail DNS. Server. Backup

Web. Anti- Spam. Disk. Mail DNS. Server. Backup Email Server Appliance N ew generation of Server Appliance, AirLive, is designed for the SMB or enterprise that needs to install an easy maintained and fully functional mail server. It not only preserves

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional

More information

FortiMail Email Filtering. Course 221 (for FortiMail v4.2) Course Overview

FortiMail Email Filtering. Course 221 (for FortiMail v4.2) Course Overview FortiMail Email Filtering Course 221 (for FortiMail v4.2) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed

More information

Configuration Example

Configuration Example Configuration Example Use Public IP Addresses Behind an XTM Device Example configuration files created with WSM v11.7.2 Revised 3/22/2013 Use Case There are several reasons to use publicly routable IP

More information

Hosted Email Security 2.0 Administrator s Guide

Hosted Email Security 2.0 Administrator s Guide Hosted Email Security 2.0 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0 eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably

More information

Funkwerk UTM Release Notes (english)

Funkwerk UTM Release Notes (english) Funkwerk UTM Release Notes (english) General Hints Please create a backup of your UTM system's configuration (Maintenance > Configuration > Manual Backup) before you start to install the software update.

More information

Email Security 8.0 Administrator s Guide

Email Security 8.0 Administrator s Guide Email Security 8.0 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

How To Allow and Block Emails using White or Black List

How To Allow and Block Emails using White or Black List How To Allow and Block Emails using White or Black List Applicable Version: 10.00 onwards Overview Cyberoam s Anti Spam detects Spam mails by checking IP addresses, Domain, Email addresses or RBL (Real-time

More information

Email Security 7.4 Administrator s Guide

Email Security 7.4 Administrator s Guide Email Security 7.4 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Solution Brief FortiMail for Service Providers. Nathalie Rivat

Solution Brief FortiMail for Service Providers. Nathalie Rivat Solution Brief FortiMail for Service Providers Nathalie Rivat Agenda FortiMail for Internet Service Providers Outbound antispam to prevent blacklisting MMS routing for Mobile Operators Inbound antispam

More information

The Leading Email Security Suites

The Leading Email Security Suites The Leading Email Security Suites What is SpamSniper? The Leading Email Security Suites for Your Secure Messaging SpamSniper is the leading email security solution which locates in front of mail server

More information

Hosted Email Managed by Email Specialists

Hosted Email Managed by Email Specialists Hosted Email Managed by Email Specialists The Mailtrust email system is the premium hosted email platform that provides your business with powerful, secure, and reliable email with absolutely no maintenance

More information

Hosted Security Integration with Microsoft Office 365

Hosted  Security Integration with Microsoft Office 365 A Trend Micro Integration Guide I July 2016 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365 customers

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity

More information

Email Migration Project Plan for Cisco Cloud Email Security

Email Migration Project Plan for Cisco Cloud Email Security Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f

More information

Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education

Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets

More information

Comprehensive Filtering. White Paper

Comprehensive  Filtering. White Paper Comprehensive Email Filtering White Paper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses

More information

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2

More information

Overview and Deployment Guide. Sophos UTM on AWS

Overview and Deployment Guide. Sophos UTM on AWS Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2

More information

Comprehensive Email Filtering: Barracuda Spam Firewall Safeguards Legitimate Email

Comprehensive Email Filtering: Barracuda Spam Firewall Safeguards Legitimate Email : Barracuda Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email

More information

Websense Email Security Transition Guide

Websense Email Security Transition Guide Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011

More information

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Configure load sharing and redirect mail server traffic over preferred Gateway

More information

Guardian Digital Secure Mail Suite Quick Start Guide

Guardian Digital Secure Mail Suite Quick Start Guide Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................

More information

Comprehensive Email Filtering. Whitepaper

Comprehensive Email Filtering. Whitepaper Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses

More information

Core Protection Suite

Core Protection Suite Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3

More information

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with

More information

FortiMail Email Filtering. Course 221 - for FortiMail v4.0. Course Overview

FortiMail Email Filtering. Course 221 - for FortiMail v4.0. Course Overview FortiMail Email Filtering Course 221 - for FortiMail v4.0 Course Overview FortiMail Email Filtering is a 3-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed

More information

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach 100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200 800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A

More information

Strategic Anti-malware Monitoring with Nessus, PVS, & LCE

Strategic Anti-malware Monitoring with Nessus, PVS, & LCE Strategic Anti-malware Monitoring with Nessus, PVS, & LCE August 2, 2012 (Revision 2) Copyright 2002-2012 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered

More information

Service Launch Guide (US Customer) SEG Filtering

Service Launch Guide (US Customer) SEG Filtering Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required

More information

Powerful and reliable virus and spam protection for your GMS installation

Powerful and reliable virus and spam protection for your GMS installation Introducing integrated, Enterprise-grade malware protection for GMS on-premise deployments Malware protection from Gordano Messaging Services provides powerful anti-virus and anti-spam for all on-premise

More information

MDaemon Vs. Microsoft Exchange Server 2013 Standard

MDaemon Vs. Microsoft Exchange Server 2013 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

How ISP ihouseweb Inc eradicated spam with SpamTitan

How ISP ihouseweb Inc eradicated spam with SpamTitan How ISP ihouseweb Inc eradicated spam with SpamTitan we over are now blocking 90% of email as spam. SpamTitan has helped save the organization tens of thousands of dollars per month in unnecessary service

More information

10135A: Configuring, Managing, and Troubleshooting Microsoft Exchange Server 2010

10135A: Configuring, Managing, and Troubleshooting Microsoft Exchange Server 2010 10135A: Configuring, Managing, and Troubleshooting Microsoft Exchange Server 2010 Course Number: 10135A Course Length: 5 Day Course Overview This instructor-led course will provide you with the knowledge

More information

Anti Spam Best Practices

Anti Spam Best Practices 53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:

More information

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com CYBEROAM UTM s Outbound Spam Protection Subscription for Service Providers Our Products Unified Threat Management Agenda of Presentation What is Outbound Spam? Consequences of Outbound Spam Why current

More information

Figure 1: SPAM Filtering

Figure 1: SPAM Filtering Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management

More information

Feature Comparison Guide

Feature Comparison Guide Feature Comparison Guide Stay Secure Portal Autumn 2015 Contents Introduction... 3 Description on some of the new features... 5 Customer overview from partner portal... 5 Partner & customer portal linkage...

More information

Cisco Small Business ISA500 Series Integrated Security Appliances

Cisco Small Business ISA500 Series Integrated Security Appliances Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated

More information

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

T E C H N I C A L S A L E S S O L U T I O N

T E C H N I C A L S A L E S S O L U T I O N Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com

More information

Panda Cloud Email Protection

Panda Cloud Email Protection Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)

More information

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.

More information

Hosted Email Security Administrator s Guide

Hosted Email Security Administrator s Guide Hosted Email Security Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2

Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2 Technical Note ISP Protection against BlackListing FORTIMAIL Deployment for Outbound Spam Filtering Rev 2.2 April 14, 2009 Table of Contents 1 Objective IP address protection... 3 1.1 Context... 3 1.2

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

Check Point Security Administrator R70

Check Point Security Administrator R70 Page 1 of 6 Check Point Security Administrator R70 Check Point Security Administration R70 Length Prerequisites 5 days* (recommended) Basic networking knowledge, knowledge of Windows Server and/or UNIX,

More information

When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper

When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level

More information