Introduction. SonicWALL Security

Size: px
Start display at page:

Download "Introduction. SonicWALL Email Security"

Transcription

1 SonicWALL Security Configuration Tips Introduction SonicWALL Security is designed to install quickly and be easy to maintain while protecting a company from threats. The out-of-the-box effectiveness rate in blocking threats is excellent, but given that every organization is different optimal effectiveness can vary from organization to organization. This document identifies those product settings where it is possible to configure SonicWALL Security to optimize effectiveness for a given organization. Select a topic from the list below, each topic is on a separate page. 1. Product Version Are you using the latest version of the product? 2. Product Licensing Are all of your subscriptions up to date? 3. MX Records Are all of your MX Records configured correctly? 4. SMART Network Updates Are you receiving regular protection updates? 5. Directory Harvest Attacks (DHA) Is DHA protection enabled? 6. Likely Spam Are you letting Likely Spam through to your users? 7. Policy Overrides Do you use policies to give a Free Pass? 8. Aggressiveness Is anti-spam aggressiveness right for your organization? 9. Is your CORPORATE address book allowing bad ? 10. Are your USER address books allowing bad ? 11. Language Blocking Are you blocking or allowing foreign languages? 12. RBLs Have you added RBL lists that are slowing down throughput?

2 1. Product Version Are you using the latest version of the product? What to Check As of June 19th, 2007 the latest version is 6.0. How to Check Login to SonicWALL Security as Admin. If you require an update you will receive a notification that a new version is available and instructions on how to download and install the update. If you are unsure if you have the correct version you can click the About link at the bottom of every page. The About window will tell you the current version of the Security system. Why does this matter? SonicWALL continually adds new functionality to its products. Staying current with product updates allows an organization access to this new functionality and ensures that the system has the latest protection strategies included. 2

3 2. Product Licensing Are all of your subscriptions up to date? How to Check The registered administrator of a system will receive notifications ( s and phone calls) prior to the expiration of their subscriptions. Regardless of these notifications, you can always check on your Security subscriptions. First, log in to the SonicWALL Security system as Admin. Review your product licenses by going to Server Configuration > License Management as shown in Figure 1. FIGURE 1 Why does this matter? Sometimes the administrator of the SonicWALL Security system will leave an organization and the subscription notification notices are not forwarded. If you miss the expiration notifications and subsequently the product subscriptions expire, the product will stop filtering your for spam, phishing, and other threats. 3

4 3. MX Records Are all of your MX Records configured correctly? What to Check Check that all of your company s MX records are pointing the SonicWALL Security system (appliance or software). Any records not pointing to the system will NOT be filtered by the system. How to Check Login to SonicWALL Security as Admin. Check Server Configuration > Network Architecture for path information of your MX Record(s). If the MX Record points to a firewall, ensure the firewall correctly routes all to the SonicWALL Security system, an example is shown in Figure 2. FIGURE 2 Why does this matter? Some companies have multiple MX Records, a primary which accepts all and a secondary which is used as a backup. They point the primary to the SonicWALL Security system, but route the secondary MX Record directly to their server. Spammers learn this and send spam directly to the secondary MX Record bypassing the filter but showing up in user s inboxes. Advanced Topic You can determine if your is flowing through the SonicWALL Security system by reviewing the Received: header of an message looking for X-Mlf-Threat for any received from an external source. If external does NOT have this string, it was NOT processed by the SonicWALL Security system. 4

5 4. SMART Network Updates Are you receiving regular protection updates? How to Check Login to SonicWALL Security as Admin. Check Server Configuration > Updates page. SonicWALL HIGHLY recommends that the Check for spam, phishing, and virus blocking updates: pull down be set to 5 minutes. See Figure 3. FIGURE 3 Why does this matter? Spammers are constantly creating and sending out new attacks. The SMART Network senses these attacks, validates that they are real threats and automatically begins blocking these attacks. By downloading new attack signatures every 5 minutes you are always current in fighting late-breaking spam attacks and other threats. 5

6 5. Directory Harvest Attacks (DHA) Is DHA protection enabled? How to Check Login to SonicWALL Security as Admin. For versions 4.8 or below, see the Server Configuration > Directory Protection page. For 5.0 and above, see the Server Configuration > Connection Management page shown in Figure 4. Consider selecting the option to Permanently Delete DHA messages. FIGURE 4 Why does this matter? On average DHA-based accounts for 60% of incoming . These messages are typically short and friendly (for example Hi John ) and can sometimes be missed by spam filters. They also clog systems with millions of s, bog down processing, and can bring an Server to its knees. 6

7 6. Likely Spam Are you letting Likely Spam through to your Users? How to Check Login to SonicWALL Security as Admin. Go to the Anti-Spam Anti- Phishing > Default Spam Management page. See the Actions for messages marked Likely Spam in Figure 5 below. Check to see if this is set to Store in Junk Box, this is the suggested setting. FIGURE 5 Why does this matter? SonicWALL uses the concept of Likely Spam because everyone has a slightly different definition of spam. Newsletters, Stock Market reports, and even some casual or personal (jokes, chain letters, etc) would be spam to one person, but acceptable communication to another. The best course of action to minimize user complaints is to send Likely Spam to the user s Junk Box. Once there, the system has the opportunity to learn about each user s personnel preferences without bothering IT. The user can view and even unjunk Likely Spam messages that they want to receive. This action also lets the system know not to Junk similar messages from the same sender in the future. What about Likely Phishing and Likely Virus? For Likely Phishing and Likely Virus you should ensure that Store in Junk Box is selected for each. The only question is whether or not you want the user to view or view and unjunk these messages. We recommend you allow users to view these messages, but NOT be able to unjunk them. When a user views the message it is displayed in text mode and no images or attachments are shown. If there is a good business reason for the message to be unjunked and it is safe (no viruses attached for example), then the user can ask IT to unjunk the message. 7

8 7. Policy Overrides Do you use policies to give a Free Pass? How to Check Login to SonicWALL Security as Admin. Go to the Policy & Compliance > Filters page. This will display a list of all of the Policy Rules your organization is using. Check all the rules for logic errors which would let bypass spam processing. This is especially true for those Policy Rules which have an Action of Deliver and Skip Spam and Phishing analysis. Why does this matter? The Policy & Compliance filters are very powerful. Improper set-up of a Policy rule can lead to unexpected results. This can cause increases in spam, but more often leads to increases in False Positives stopping good . One area of trouble is the use of multiple conditions in a single Policy rule. Do you want ALL or ANY of the conditions to be true for the policy rule to operate? For example, you want to block all messages with attachments that have EXE or PIF extensions. If you set-up two separate conditions, one for the EXE extension and a second for the PIF extension, you would need to use the match ANY conditions selection. Using AND would never be true unless a single message had both types of files attached. 8

9 8. Aggressiveness Is anti-spam aggressiveness right for your organization? How to Check Login to SonicWALL Security as Admin. Go to Anti-spam > Anti-Spam Aggressiveness page. On this page, shown in Figure 6, are a number of slider bars to adjust the sensitivity of certain message categories for your organization. The default is 3. To be more aggressive in blocking spam you can move a given slider to the right (4 or 5). To be less aggressive in blocking spam you can move a given slider to the left (1 or 2). FIGURE 6 Why does this matter? Every company has different types of it wants to receive. For example a Doctor s office may need to see s containing medical terms and drug names, while most other organizations don t care. The slider bars allow you to adjust your organization s sensitivity to certain types of . Having this setting low (1 or 2) will allow more in that category to pass through the filter potentially allowing more spam. Having this setting high (4 or 5) will block more in that category, potentially creating false positives. CORPORATE versus USER settings The Corporate settings that are selected by the Administrator affect everyone in the organization who receives filtered by SonicWALL Security. Individual users can be allowed to adjust their own settings to be more aggressive. The User Settings page is similar to that shown in Figure 6, except that the User allowed to Unjunk entries are not present. If a spam / false positive issue seems specific to a given user, the user s User Settings are a good place to look. 9

10 9. Is your CORPORATE address book allowing bad ? How to Check Login to SonicWALL Security as Admin. Go to Anti-spam and Anti- Phishing Techniques page. There are three different address books that can be maintained for the company: People, Company, and Lists. People - addresses on the People "Allowed" list get free passes. This means Security will deliver these messages to the end user even if we have judged the message to be spam. For the Corporate People-Allowed list, it would be unusual to have many people, perhaps only key individuals. Remember, every received from an address be delivered to the recipient (unless it is judged as a virus). FIGURE 7 Company The Company Allowed / Blocks lists contains domain names. For every domain on the Company "Allowed" list, all senders using that domain in their address will receive a free pass and all received from this domain will be delivered even if we judge the as spam. Use Company-Allowed lists sparingly. NOTE: You should not have your own company's domain name in this list. A very common trick of spammers is to send to a company and use that company s domain as the FROM address. If your company s domain is listed on the Company- Allowed list the spammers can get a free pass past the spam filter. FIGURE 7 Lists - addresses on the Lists "Allowed" list get free passes. This means Security will deliver the to the recipient even if we judge it to be spam. For the Corporate List- Allowed list, it would be unusual to have many lists, perhaps only a few key list names. Remember, each address on this list will get a free-pass and will be delivered to the recipient. 10

11 Advanced Topic You can determine if an message has received an Allowed list free-pass through the SonicWALL Security system by examining the Received: header of an message. messages that are on Allowed lists will have list_addrbk_sender" or "list_addrbk_domain" in the X-Mlf-Threat-Detailed header. 11

12 10. Are your USER address books allowing bad ? What to Check Each user who receives processed through SonicWALL Security can be allowed to own and manage their own address books for People, Companies, and Lists. These lists apply only to the given user and can not over ride Corporate settings. For example, if the Administrator blocks the domain (company) of adultxxx.com at the Corporate level, a user can not Allow this domain (Company) by adding it to their Company-Allowed list. How to Check Have the user login to SonicWALL Security as themselves, this is best done via a Junk Box Summary. Go to the Anti-spam Techniques page. There are three different address books that can be maintained for the user: People, Company, and Lists. People - addresses on the People "Allowed" list get free passes. This means Security will deliver all from that address to the recipient, even if we judge the to be spam. Virus s are always blocked regardless. FIGURE 8 Company The Company Allowed / Blocks list contains domain names. For every domain on the Company "Allowed" list, all senders using that domain in their address will receive a free pass and all received from this domain will be delivered to the recipient even if we judge it to be spam. This list must be updated manually by the user. Sometimes users will add domains without understanding the consequences. For example, they will add yahoo.com because they have a few friends who use the Yahoo service and they want to make sure they receive their . The trouble is that yahoo.com is often used by spammers to send spam messages which will get a free pass through the spam filter and be delivered to that user. NOTE: Users should NOT add their own company's domain name in this list. A very common trick of spammers is to send to a company and use that company s domain as the FROM address. If the company s domain is listed on the Users Company-Allowed list the spammers can get a free pass past the spam filter. Lists - addresses on the Lists "Allowed" list get free passes. This means Security will deliver all from that list even if we judge it to be spam. Advanced Topic You can determine if an message has received an Allowed list free-pass through the SonicWALL Security system by examining the Received: header of an message. messages that are on Allowed lists will have list_addrbk_sender" or "list_addrbk_domain" in the X-Mlf-Threat-Detailed header. 12

13 11. Language Blocking Are you blocking or allowing foreign languages? What to Check SonicWall Security can process depending on the declared language (character set) of the . The list of languages is shown in Figure 9. Each language has one of 3 states Allow All, Block All, or No Opinion. These are defined as follows: Block All ALL in that language is not sent to the receiver. Allow All ALL in that language is not processed by the spam filter. No Opinion ALL in that language is processed normally. How to Check Login to SonicWALL Security as Admin. Go to Anti-spam and Anti- Phishing Techniques > Foreign Language page. Review the setting to how messages received in a given language are processed. FIGURE 9 Why does this matter? Choosing Block All for a given language can lead to False Positives (Good blocked as Spam). A Corporate decision to Block all Chinese will create problems with a user who is dealing with a Chinese company and exchanging in Chinese. Choosing Allow All creates the opposite problem allowing all in a language to get a free pass for spam filtering. USER Language Blocking Individual users also can use language to allow or block s for their own inbox. The same rules apply for the User as it relates the different options for each language. Users can Block languages that Corporate Allow, but they can not Allow languages Corporate has blocked. Advanced Topic SonicWALL Security usually determines the language of an based on the declared charset in the message header. For example, charset=gb2312" is Chinese. 13

14 12. RBLs Have you added RBL lists that are slowing down throughput? What to Check Administrators can add RBLs (Real-time Block-hole Lists) to SonicWALL Security. Sometimes these RBLs can slow-down throughput. How to Check Login to SonicWALL Security as Admin. Go to Anti-spam and Anti- Phishing Techniques > Blocked List Services page. This will show which RBLs have been added and which are being used as shown in Figure 10. For each RBL listed and enabled, check with the provider to ensure it is operational and performing as specified. FIGURE 10 Why does this matter? The responsiveness of the RBL list could slow down the throughput of through the SonicWALL Security system. This includes RBLs which are no longer in operation. Many RBL lists do not have defined levels of service (i.e. return a judgment in less than.001 second). When an RBL list is enabled, SonicWALL Security will make a request to the RBL provider, and then wait a short period of time for an answer. If the RBL response is delayed throughput will slow down. What does SonicWALL think of RBLs? RBLs can be valuable if they are properly checked before being used as part of judging an as a threat. At the SonicWALL datacenters, we take input from multiple RBL lists and in real-time combine this information with input from our Smart Network. We then deliver the validated RBL information to every customer as part of our Smart Network updates every 5 minutes. This allows us to achieve the benefits provided by an RBL list without sacrificing the throughput in processing . 14

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

SonicWALL Anti-Spam Desktop User Guide

SonicWALL Anti-Spam Desktop User Guide SonicWALL Anti-Spam Desktop User Guide Version 6.2 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Part Number: 232-001812-00

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.

More information

SonicWALL Email Security. User Guide. Version 4.6

SonicWALL Email Security. User Guide. Version 4.6 SonicWALL Email Security User Guide Version 4.6 SonicWALL, Inc. reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the

More information

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.

More information

Barracuda Spam Firewall

Barracuda Spam Firewall Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive

More information

University of Mary s Spam Solution

University of Mary s Spam Solution University of Mary s Spam Solution Spam is a growing problem worldwide. Spam causes productivity loss, network traffic, vast amount of corporate resources to be consumed and valuable server space to be

More information

Core Protection Suite

Core Protection Suite Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3

More information

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection

More information

Premium Anti Spam User s Guide. Table of Contents

Premium Anti Spam User s Guide. Table of Contents Premium Anti-Spam End User s Guide / Table of Contents Page 1 of 10 Premium Anti Spam User s Guide Table of Contents Quarantine Report... 2 Links within the Quarantine Report... 3 Login to the Premium

More information

Purchase College Barracuda Anti-Spam Firewall User s Guide

Purchase College Barracuda Anti-Spam Firewall User s Guide Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to

More information

Using SonicWall Anti-Spam Utility Managing your e-mail junkbox settings

Using SonicWall Anti-Spam Utility Managing your e-mail junkbox settings Using SonicWall Anti-Spam Utility Managing your e-mail junkbox settings In order to receive some expected e-mails through the campus e-mail system you may have to unjunk and adjust your anti-spam settings

More information

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32 IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How

More information

Email Security 8.0 User Guide

Email Security 8.0 User Guide Email Security 8.0 User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to

More information

MXSweep Hosted Email Protection

MXSweep Hosted Email Protection ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

Dealing with spam mail

Dealing with spam mail Vodafone Hosted Services Dealing with spam mail User guide Welcome. This guide will help you to set up anti-spam measures on your email accounts and domains. The main principle behind dealing with spam

More information

Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?

Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest? Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.

More information

Spam Filter Message Center. User Guide

Spam Filter Message Center. User Guide Spam Filter Message Center User Guide Powered by MX Resources, LLC 10573 W. Pico Blvd., #343 Los Angeles, CA 90064 (888) 556-7788 support@mxresources.com Introduction Introduction to the Postini Message

More information

AntiSpam QuickStart Guide

AntiSpam QuickStart Guide IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...

More information

PROOFPOINT - EMAIL SPAM FILTER

PROOFPOINT - EMAIL SPAM FILTER 416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu support@anr.msu.edu PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...

More information

Chapter 10 Encryption Service

Chapter 10 Encryption Service Chapter 10 Encryption Service The Encryption Service feature works in tandem with Dell SonicWALL Email Security as a Software-as-a-Service (SaaS), which provides secure data mail delivery solutions. The

More information

Do you need to... Do you need to...

Do you need to... Do you need to... TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce

More information

How To Filter Spam On Gcu.Com

How To Filter Spam On Gcu.Com A Beginner s Guide to Postini and Spam Filtering Spam (unsolicited e-mail) has become a significant issue for those who use and provide e-mail services. These messages take up a large amount of space on

More information

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,

More information

Anti Spam Best Practices

Anti Spam Best Practices 39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing

More information

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages

More information

Hosted Email Security Administrator s Guide

Hosted Email Security Administrator s Guide Hosted Email Security Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

FastNetSecurity SpamGuard Email Spam Filter How-To

FastNetSecurity SpamGuard Email Spam Filter How-To FastNetSecurity SpamGuard Email Spam Filter How-To Using your web browser, log on to https://spamguard.fastnetsecurity.com Tip: Add a bookmark to this page for easy access! Login credentials will incorporate

More information

Tufts Technology Services (TTS) Proofpoint Frequently Asked Questions (FAQ)

Tufts Technology Services (TTS) Proofpoint Frequently Asked Questions (FAQ) Tufts Technology Services (TTS) Proofpoint Frequently Asked Questions (FAQ) What is Proofpoint?... 2 What is an End User Digest?... 2 In my End User Digest I see an email that is not spam. What are my

More information

SonicWALL Email Security User Guide

SonicWALL Email Security User Guide SonicWALL Email Security User Guide Version 7.2 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Part Number: 232-001701-00

More information

Email Security 7.4 Administrator s Guide

Email Security 7.4 Administrator s Guide Email Security 7.4 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Avira Managed Email Security (AMES) User Guide

Avira Managed Email Security (AMES) User Guide Avira Managed Email Security (AMES) User Guide 1 Product information... 3 1.1 Functionality... 3 1.2 Licensing AMES... 3 2 Getting started with AMES... 4 2.1 Adding a new domain to AMES... 4 2.2 Logging

More information

Frequently Asked Questions

Frequently Asked Questions Questions and Answers Questions About Platform, Requirements, and Capabilities What is the difference between a SonicWALL Appliance and Software SonicWALL Email Security? The hardware version is a Linux

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Overview. Accessing the User Interface. Logging In. Resetting your Password

Overview. Accessing the User Interface. Logging In. Resetting your Password Overview The message filtering service lets a company easily provide real-time spam and virus filtering, attack blocking, and email-traffic monitoring across a user deployment of any size. Users receive

More information

Quarantine Central for end users: FAQs

Quarantine Central for end users: FAQs Quarantine Central for end users: FAQs About is a leading hosted email services company. Founded in 1994, was one of the first companies to offer hosted email security services to the North American market.

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

Email Security 8.0 Administrator s Guide

Email Security 8.0 Administrator s Guide Email Security 8.0 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Email Filtering Admin Guide. Guide to Administrative Functions of Spam and Virus Filtering Service

Email Filtering Admin Guide. Guide to Administrative Functions of Spam and Virus Filtering Service Email Filtering Admin Guide Guide to Administrative Functions of Spam and Virus Filtering Service Table of Contents Welcome Page 3 Logon Page 3 Home Page 4 Spam Page 5 Message Searching Releasing Held

More information

EEndPoint. SonicWALL Anti-Spam Desktop. Endpoint Security. SonicWALL Anti-Spam Desktop 5.0. User s Guide

EEndPoint. SonicWALL Anti-Spam Desktop. Endpoint Security. SonicWALL Anti-Spam Desktop 5.0. User s Guide EEndPoint Endpoint Security SonicWALL Anti-Spam Desktop SonicWALL Anti-Spam Desktop 5.0 User s Guide SonicWALL Anti-Spam Desktop User s Guide Version 5.0 SonicWALL, Inc. 1143 Borregas Avenue Sunnyvale,

More information

SonicWALL Email Security Appliance Administrator Guide

SonicWALL Email Security Appliance Administrator Guide SonicWALL Email Security Appliance Administrator Guide Version 7.3 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Part Number:

More information

Barracuda Email Security Service User Guide

Barracuda Email Security Service User Guide Barracuda Email Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses,

More information

Managing Junk Email Company: VanDeMark Chemical Inc. Authors: Jeffrey Marshal & Mark Thompson Date Created: May 2013 Date Last Updated: August 2013

Managing Junk Email Company: VanDeMark Chemical Inc. Authors: Jeffrey Marshal & Mark Thompson Date Created: May 2013 Date Last Updated: August 2013 Managing Junk Email Company: VanDeMark Chemical Inc. Authors: Jeffrey Marshall & Mark Thompson Date Created: May 2013 Date Last Updated: August 2013 Table of Contents 1. General... 3 2. Sonicwall Managing

More information

SonicWALL Email Security User s Guide. Version 7.0

SonicWALL Email Security User s Guide. Version 7.0 SonicWALL Email Security User s Guide Version 7.0 SonicWALL, Inc. 1143 Borregas Avenue Sunnyvale, CA 94089-1306 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Copyright Notice 2008

More information

FortiMail Email Filtering Course 221-v2.2 Course Overview

FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,

More information

Security. Help Documentation

Security. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Security Antivirus Administration SmarterMail is equipped with

More information

Click Home > Junk > Not Junk.

Click Home > Junk > Not Junk. Office 365 (Outlook 2013) Overview of the Junk Email Filter No one likes spam or junk email. The Outlook 2013 Junk Email Filter doesn t stop delivery of junk email messages, but does the next best thing

More information

ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering

ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful

More information

Anglia IT Solutions Managed Anti-SPAM

Anglia IT Solutions Managed Anti-SPAM By Appointment to Her Majesty The Queen Supplier of IT Products and Support Anglia IT Solutions Limited Swaffham Anglia IT Solutions Managed Anti-SPAM A Simple Guide All Rights Reserved. This document

More information

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0 eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

Core Filtering Admin Guide

Core Filtering Admin Guide Core Filtering Admin Guide 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Table of Contents Login... 3 Overview... 3 Quarantine...

More information

Hosted Email Security 2.0 Administrator s Guide

Hosted Email Security 2.0 Administrator s Guide Hosted Email Security 2.0 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Outlook Safe Sender s Filtering

Outlook Safe Sender s Filtering Outlook Safe Sender s Filtering User s Guide Also Guide to Making Internet Explorer More Secure By: Gregg Sterner Trellix Engineering Corp. Table of Contents Introduction... 1 This Manual... 3 Junk E-mail

More information

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents 1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2013 for Windows... 3 Outlook for Mac 2011... 4 Mac OS X 10.6+... 4 iphone

More information

Green House Data Spam Firewall Administrator Guide

Green House Data Spam Firewall Administrator Guide Green House Data Spam Firewall Administrator Guide Spam Firewall Administrator Guide... 2 Navigating the Web Interface... 2 How to Drill Down from the DOMAINS Page to Account Level... 2 Message Logs...

More information

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved

MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4

More information

Websense Email Security Transition Guide

Websense Email Security Transition Guide Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Managing your Quarantine Inbox This chapter describes how you can check your quarantine messages, classify messages as spam and not spam, and modify your user preferences

More information

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Virus What is a virus? It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It can also be defined as a set of codes written to cause

More information

Barracuda Spam & Virus Firewall User's Guide 5.x

Barracuda Spam & Virus Firewall User's Guide 5.x Barracuda Spam & Virus Firewall Barracuda Spam & Virus Firewall User's Guide 5.x This guide describes how you can check your quarantined messages, classify messages as spam and not spam, manage whitelisting

More information

SPAM ARREST WORKS! Quick Start Enterprise Administrators. Take Control of Your Inbox. Protecting mailboxes since 2001

SPAM ARREST WORKS! Quick Start Enterprise Administrators. Take Control of Your Inbox. Protecting mailboxes since 2001 Page 1 of 6 Quick Start Enterprise Administrators Welcome to the Quick Start Guide (QSG) for Enterprise Account Customers. The aim and purpose of this guide is to provide a quick overview of what you need

More information

Email Filter User Guide

Email Filter User Guide Table of Contents Subject Page Getting Started 2 Logging into the system 2 Your Home Page 2 Manage your Account 3 Account Settings 3 Change your password 3 Junk Mail Digests 4 Digest Scheduling 4 Using

More information

How to Use Red Condor Spam Filtering

How to Use Red Condor Spam Filtering What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

INLINE INGUARD E-MAIL GUARDIAN

INLINE INGUARD E-MAIL GUARDIAN INLINE INGUARD E-MAIL GUARDIAN Activation Guide December 8, 2008 600 Lakeshore Parkway, AL 35209 888.3InLine support@inline.com 1 InLine InGuard E-Mail Guardian Activation Guide The InLine InGuard E-Mail

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

BULLGUARD SPAMFILTER

BULLGUARD SPAMFILTER BULLGUARD SPAMFILTER GUIDE Introduction 1.1 Spam emails annoyance and security risk If you are a user of web-based email addresses, then you probably do not need antispam protection as that is already

More information

ExchangeDefender. Understanding the tool that can save and secure your business

ExchangeDefender. Understanding the tool that can save and secure your business ExchangeDefender Understanding the tool that can save and secure your business OVERVIEW The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting.

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

How to Manage Spam and Junk Email

How to Manage Spam and Junk Email How to Manage Spam and Junk Email SLOCOE uses several technologies in an attempt to control spam. Due to the nature of how Spam is created and sent it is always a case of being one step behind. Nevertheless,

More information

User guide Business Internet e-mail features

User guide Business Internet e-mail features User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features

More information

Symantec Hosted Mail Security Getting Started Guide

Symantec Hosted Mail Security Getting Started Guide Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration

More information

Avira Exchange Security Small Business Edition. Quick Guide

Avira Exchange Security Small Business Edition. Quick Guide Avira Exchange Security Small Business Edition Quick Guide Table of contents Table of contents 1 Introduction...3 2 System requirements...4 3 The Avira Exchange Console...5 3.1 Virus Scanner status...6

More information

NoSpam Anti-Spam Service End User Guide

NoSpam Anti-Spam Service End User Guide Table of Contents Subject Page Getting Started 2 Logging into the system 2 Your Home Page 2 Manage your Account 3 Account Settings 3 Change your password 3 Junk Mail Digests 4 Digest Scheduling 4 Using

More information

How to make sure you receive all emails from the University of Edinburgh

How to make sure you receive all emails from the University of Edinburgh How to make sure you receive all emails from the University of Edinburgh To ensure that any email from The University of Edinburgh - or any address you choose - is not automatically sent to your junk or

More information

Hosting Control Panel (CP) Admin Guide

Hosting Control Panel (CP) Admin Guide Hosting Control Panel (CP) Admin Guide Document Revision Date: May 16, 2013 Hosting CP Admin Guide / TOC Page i Contents HOW TO USE THIS HOSTING CP ADMIN GUIDE... 1 GET STARTED WITH EXCHANGE... 1 Other

More information

No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution

No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution A Filter inaccuracies No filter is perfect. But with your help, MailCleaner may aim at perfection. The filtering system implemented by MailCleaner relies on automated and systematic controls that cannot

More information

Barracuda Spam Firewall User 's Guide 6.x

Barracuda Spam Firewall User 's Guide 6.x Barracuda Spam Firewall User 's Guide 6.x Last update: Thursday, 6. Mar 2014 This guide describes how you can use the Barracuda Spam Firewall web interface to: Check your quarantined messages Classify

More information

Configuring MDaemon for Centralized Spam Blocking and Filtering

Configuring MDaemon for Centralized Spam Blocking and Filtering Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 (817) 525-2005 http://www.altn.com July 26, 2004 Contents A Centralized

More information

M+ Guardian Email Firewall. 1. Introduction

M+ Guardian Email Firewall. 1. Introduction M+ Guardian Email Firewall 1. Introduction This information is designed to help you efficiently and effectively manage unsolicited e mail sent to your e mail account, otherwise known as spam. MCCC now

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda. Version 5.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2012, Barracuda Networks

More information

ModusMail Software Instructions.

ModusMail Software Instructions. ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account

More information

Using the Barracuda Spam Firewall to Filter Your Emails

Using the Barracuda Spam Firewall to Filter Your Emails Using the Barracuda Spam Firewall to Filter Your Emails This chapter describes how end users interact with the Barracuda Spam Firewall to check their quarantined messages, classify messages as spam and

More information

Email Security Series

Email Security Series Email Security Series Elegantly simple, brutally effective, always affordable anti-spam protection Email spam threatens the security and productivity of today s small and mid-size organizations. Spam attacks

More information

Configuring Email-to-Feed in MangoApps

Configuring Email-to-Feed in MangoApps Configuring Email-to-Feed in MangoApps Collaborate in Teams with Distribution Groups The Concept of Email-to-Feed Email-to-Feed allows you to continue to correspond over email while capturing the communications

More information

About the Junk E-mail Filter

About the Junk E-mail Filter 1 of 5 16/04/2007 11:28 AM Help and How-to Home > Help and How-to About the Junk E-mail Filter Applies to: Microsoft Office Outlook 2003 Hide All The Junk E-mail Filter in Outlook is turned on by default,

More information

More Details About Your Spam Digest & Dashboard

More Details About Your Spam Digest & Dashboard TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How

More information

700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com. Webmail System User Guide

700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com. Webmail System User Guide 700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com Webmail System User Guide Last Updated November 14, 2013 -2- Table of Contents Welcome

More information

Barracuda Spam Firewall Users Guide. How to Download, Review and Manage Spam

Barracuda Spam Firewall Users Guide. How to Download, Review and Manage Spam Barracuda Spam Firewall Users Guide How to Download, Review and Manage Spam By: Terence Peak July, 2007 1 Contents Reviewing Barracuda Messages... 3 Managing the Barracuda Quarantine Interface... 4 Preferences...4

More information

10 Sneaky Things a Spammer Will Do. Just when you thought your inbox was safe

10 Sneaky Things a Spammer Will Do. Just when you thought your inbox was safe 10 Sneaky Things a Spammer Will Do Just when you thought your inbox was safe Table of Contents The Never Ending Growth of Email Spam 1 A Reason for Spam and a Reason for More Spam 2 10 Sneaky Things 1

More information

About this documentation

About this documentation Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information