Systems Managed Service

Size: px
Start display at page:

Download "Email Systems Managed Service"

Transcription

1 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT Systems Managed Service JANUARY

2 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS Systems Systems Limited,Cart Lodge,Goodley Stock Road,Westerham,Kent,TN16 1SL,UK Tel:+44 (0) Introduction...3 Test Network...4 Test Methodology...5 Product Testing Reporting...6 Checkmark Certification...7 The Product...8 Test Report...9 Test Results...14 West Coast Labs Conclusion...15 Security Features Buyers Guide...16 West Coast Labs, William Knox House, Britannic Way, Llandarcy, Swansea, SA10 6EL, UK. Tel : , Fax :

3 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT 3 INTRODUCTION As the war for corporate inboxes intensifies, and unmonitored s disrupt effective and secure working practices, Anti-Spam solutions continue to evolve to deal with this menace. In this, the second Anti-Spam Technology Report, we examine the functionality and performance of the leading products in this market, which are aimed specifically at the SME network environments. A key objective of the testing is to replicate the installation, configuration and use of the solutions in a real-world business environment to enable readers of the White Paper prospective buyers to make a meaningful assessment of the product that is right for protecting their corporate environment. Test Engineers have evaluated how the solutions install to ensure timely and effective spam protection. Consideration has also been given to the level of security administrator expertise and technical support required to facilitate both out-of-the-box operation and thereafter product training to ensure maximum effective spam protection. This reports provides an independent assessment of effectiveness with regard to: The features and functionality of the solution. Integration into a network infrastructure. The level of user administration required to operate the product effectively. Spam detection capability and rates of detection.

4 4 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT TEST NETWORK WCL has a number of domains that collect genuine spam. These domains receive varying levels of spam and are consistent with different environments. To reflect the usage within a corporate environment, within each domain are a number of designated user accounts with a variety of practices and needs including some that are subscribed to a variety of newsgroups and mailing lists. Some user accounts actively contribute to mailing lists. The multiple domains designated for testing purposes were those that, between them, receive spam at a level consistent with the defined requirements of testing. Software solutions included in the test program were installed on servers that meet the minimum specifications required by the vendor. Appliance-based solutions were installed on the network according to the vendor's recommended placing. For hosted services, WCL testes through identified domains and changed the MX records to divert the mail stream through the hosted service.

5 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT 5 TEST METHODOLOGY WCL initially performed the testing with an out-of-the-box configuration, changing only those settings on the solution needed to ensure correct operation in line with the vendor's recommended installation and configuration procedures. Further testing was then performed following the vendor's advice for the tuning or training of the solution under test. WCL fine-tuned the solution each day of the test, spending no more than half an hour per day undertaking such work. Throughout the course of testing, a mixture of was sent to the test domains from other addresses and domains controlled by WCL to mirror genuine activity common in business, for example, requesting meetings, sending notifications to groups and non-business related social s. s were also sent from web-based accounts such as Hotmail and Google's Gmail in order to simulate external users sending non-business related social s, and home workers. Thus, during the testing period the domains received some spam, some list/newsgroup mailings and "genuine" individual s.

6 6 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT PRODUCT TEST REPORTING Product evaluation addresses three specific areas* - Management/Administration, Functionality, Performance plus Additional Feature Testing. 1. MANAGEMENT/ADMINISTRATION Ease of Setup/Installation Ease of Use Logging and reporting function Rule creation Customization Content Categories 2. FUNCTIONALITY Processing Steps Allow/Blocking of Quarantine Area Additional functionality reporting Steps to Process Block Addresses Blacklist/Whitelist Allow Addresses 3. PERFORMANCE Volume or Percentage of spam detected False positive rate Spam incorrectly passed through Legitimate mail blocked Legitimate subscription mail blocked

7 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT 7 CHECKMARK CERTIFICATION Upon completion of the testing, individual product results are analyzed, resulting in accreditation to one of the two Checkmark Certifications for Anti- Spam subject to achieving the following catch rates:- Checkmark Anti-Spam Certification - Premium - 97% and over Catch Rate. Checkmark Anti-Spam Certification - Standard - 90% and over Catch Rate.

8 8 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT THE PRODUCT SYSTEMS The Systems Managed Service is aimed at businesses of between 25-20,000 users, the service has tailored options for the finance, retail, education & legal sectors and is available in English, Dutch, Chinese, Swedish & German. SYSTEMS SAYS ABOUT THE SERVICE'S BUSINESS BENEFITS The Systems managed service package helps organisations with a broad range of communication issues which directly affect the running of their business. From redirecting business critical s and reducing the amount of time wasted with spam to reducing the risk of confidential data accidentally being distributed and protecting businesses from HR issues resulting from inappropriate content. A business continuity module ensures that s are collected even when internet access is lost. A zombie detection module ensures that businesses are alerted regarding any virus-infected machines. The system provides detailed information regarding user activity, allowing businesses to increase their resources in appropriate areas as required. SYSTEMS SAYS ABOUT THE SERVICE'S TECHNICAL BENEFITS Systems' managed service model offers a number of benefits over other solutions, whilst the company's technical excellence ensure that it's customers benefit from leading edge functionality. The service offers a virtual buffer against Denial of Service attacks, thereby significantly reducing the wastage of corporate bandwidth and wasted storage from junk in mailboxes. The system offers multi-level protection against viruses and spam and can defer the delivery of specific types to control the load on a business' internal infrastructure. Automatic updates against known spam results in zero administration with virtually zero false positives. An aggressive technology development roadmap ensures that Systems' technology will never be outdated.

9 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT 9 TEST REPORT INTRODUCTION Systems offers corporations the ability to protect themselves from the effects of spam and generally unwanted mail. While not being a part of the testing carried out for this Technology Report, the managed service also provides virus protection using three scan engines: Sophos, F-Secure, and Commtouch A/V. Outsourcing the responsibility of spam protection allows corporations to save on the cost of purchasing dedicated antispam hardware and software solutions. Using a managed service also removes the added workload of having to constantly monitor, update, and configure an in-house solution.

10 10 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT TEST REPORT INSTALLATION AND CONFIGURATION Engineers at Systems carry out a large percentage of the initial setup and configuration. This very simple and rapid setup means that corporations can very quickly begin to benefit from the protection offered by Systems. The first step comes immediately after the contracts exchange hands, when the corporation's network administrator is provided with a comprehensive Service Deployment Plan. This plan provides a stepby-step guide for the administrator to follow and describes each stage of redirecting the mail flow through the Systems service. Included within the Service Deployment Plan is a checklist designed to ensure an efficient changeover with minimal fuss. As part of the re-routing process, engineers at Systems perform scans against the corporate network to establish the current configuration of the MX records currently in use. An is then sent to the administrator explaining the network configuration that needs to take place in order for the mail to be properly routed. Also included within this is advice on which IP settings to use to further enhance security. This entire setup process takes very little time thanks to this well designed and efficient setup procedure. At all times the administrator is made aware of the current situation and the steps needed to progress, allowing for a speedy setup and minimizing the time period before the service is put to use. Once the setup procedure is complete and the administrator has access to the interface the managed service may be further configured to best suit the needs of the company. Rules may be added that perform actions on individual s should they meet a customizable set of conditions. These conditions may include s greater than a given file size, s from or to specific addresses, various attachment extensions, and messages received after an allotted time. Should any s meet one or more conditions defined by the administrator, the message may be blocked, deleted, quarantined, allowed, redirected, or deferred. These actions are the choice of the administrator and bring added depth to the control of . Alerts can be enabled should the appropriate rule come into effect, these may be sent to the administrator, sender, intended recipient, or a selection of the three. Further customization includes the setup of text and html signatures to be appended to messages. Also available are a range of fully customizable alerts to be sent in a given situation, such as the detection of -borne viruses or the triggering of a rule. A default body, containing all the necessary information, is already configured for the alert messages so that further setup time is not required.

11 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT 11 TEST REPORT INTERFACE The interface, referred to by Systems as the Management Portal, can be accessed across a secure SSL web connection. The login screen is of a simple design with fields for the username and password provided during the setup procedure. The screen displayed to the user after login is both elegant and informative with effective use of color. A concise menu of six entries runs along the top of the interface, further to the right of which are the Logout and Help links. The main area of the page contains account status information, a 28- day account analysis, and an information pane where the administrator may choose to view information relating to network status, top viruses, top recipients, or top inbound domains. Graphical information such as the pie and bar charts for the 28-day account analysis and the graph for the top recipients are interactive; by hovering the cursor over the entries within these graphs the user can get further information such as counts and percentages. This information is displayed using a Macromedia Flash applet and will require the installation of a Flash Player on any browser being used to access the Management Portal, if one is not already installed. The menu along the top of the screen consists of Home, Users, Accounts, Domains, Logs, and Reports. Selecting the Users link displays a table of fields containing information about every available user. Above the table is a sort and search feature allowing an administrator to organize the user list by a particular field or to search for specific usernames or IDs. The latter of the user fields, options, allows the administrator to edit or delete the account. Edit provides the ability to modify the user's credentials including name, username, password, contact , and contact info. Selecting the delete option displays a confirmation box before removing the account from the user list. The next entry in the menu is Accounts, which allows for the configuration of the rules and alerts described earlier in this report. Next is Domains, which is formatted similarly to that of users. When

12 12 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT TEST REPORT selecting edit from the options field for a domain, the administrator is able to change the address of the designated domain administrator and is provided with information about the mailer host IP address, domain name, and inbound IP address. Also displayed upon selecting Edit is a subcategory of options including Rules, signatures, alerts, filter settings, ISP and enduser, and done. The first three of these entries are described in the installation and configuration section of this report. The next entry is Filters Settings. From here the administrator can control, amongst others, the actions taken upon detection of spam and viruses. Options available for spam allow for the message to be blocked or allowed through with either the subject, header, or both, modified. The Help option launches a separate popup window containing index, search, glossary, and contents links. Using these tools the administrator can search and examine the database for help articles on any of the services and options provided by the Systems service. The information provided is detailed and contains illustrated examples of suggested solutions.

13 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT 13 TEST REPORT REPORTS Selecting Logs from the menu displays a list of the various types of log categories available, including mail in, virus, quarantine and spam. Much like the home page, these also make use of Flash to provide the user with a graphical view of the data. This is in the form of a chart plotting the number of each message type received on a dayto-day basis. These points are joined together with a solidly colored line, showing the user the peaks and troughs of the traffic. This chart is then intersected with a line showing the trend of traffic. Next to the chart, each page provides a search feature allowing the administrator to search by one or more of the following: date, sender, recipient, subject, or ID. The results of a search are then displayed in a table below the search feature, with each entry providing a link to examine further data relating to the message. This data includes the date the message was sent, the sender's and IP address, and the country in which the mail originated. The Reports screen provides the administrator with five options: Summary, Search, Favorites, Historic, and Groups. The summary screen, which is the page presented to the user on selecting Reports from the menu, displays a table containing a brief summary of the traffic received by the service. This traffic is broken down into spam, legitimate and total. Beneath this table are two graphs that are similar in design to those found on the Home page. The first, a pie chart, provides a visual comparison between the amount of spam and legitimate mail received while the second, a bar chart, allows the administrator to see the number of spam and legitimate messages received every six hours for the past seven days. The Search page allows for the viewing of a wide range of report types. On the left hand side of the screen there is a search function allowing the administrator to specify which fields to search for (for example, mail direction and report type). Also available is the ability to create a favorite, where the administrator may choose to save frequently selected report criteria. A table displaying each of the report types that can be selected, along with a brief description takes up the main area of the screen. In total there are seventeen report types available, ranging from domain usage and mail flow, to information on detected viruses and legitimate mail. The information is then displayed to the administrator in a graphical format, utilizing the same Flash technology as those on the Home and Summary pages.

14 14 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT TEST RESULTS Type of mail Detected as genuine Detected as SPAM GENUINE 100% 0% SPAM 1% 99% Systems' managed service performed well, delivering 100% of the genuine mail correctly and correctly classifying 99% of the spam mail. It is also worth noting that the managed service delivers a good proportion of grey and list mail as genuine. This gives an organization the flexibility and opportunity to define policies during a training period without missing mail that could potentially be business critical. West Coast Labs is pleased to award Systems the Premium Anti-Spam Checkmark.

15 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT 15 WEST COAST LABS CONCLUSION Setup of the Managed Service is made easy thanks to the information gathered by engineers at Systems, ensuring that the service can be effectively used and customized to best suit each individual organization. Systems provides a well designed and intuitive interface that is further enhanced by the ability to interact with graphical data. Reports generated are detailed and provide the administrator with an excellent viewpoint of all traffic being sent to and from the domain. Further customization of the service is possible through the use of rulesets and filter settings, including the ability to scan for infected messages or attachments. Alerts can also be customized to display as little or as much data as the administrator requires. Because of the level of customization and the detailed reporting tools, this service can be recommended to any company looking to outsource anitspam protection. West Coast Labs Disclaimer While West Coast Labs is dedicated to ensuring the highest standard of security product testing in the industry, it is not always possible within the scope of any given test to completely and exhaustively validate every variation of the security capabilities and/or functionality of any particular product tested and/or guarantee that any particular product tested is fit for any given purpose. Therefore, the test results published within any given report should not be taken and accepted in isolation. Potential customers interested in deploying any particular product tested by West Coast Labs are recommended to seek further confirmation that said product will meet their individual requirements, technical infrastructure and specific security considerations. All test results represent a snapshot of security capability at one point in time and are not a guarantee of future product effectiveness and security capability. When West Coast Labs provide test results for any particular product tested, said results are most relevant at the time of testing and within the context of the specific scope of testing and relative to the specific test hardware, software, equipment, infrastructure, configurations and tools utilized during that specific test process. West Coast Labs is unable to directly endorse or certify the overall worthiness and reliability of any particular product tested for any given situation or deployment.

16 16 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT SECURITY FEATURES BUYERS GUIDE DEVELOPMENTS IN THE SERVICE OVER THE LAST 12 MONTHS AS STATED BY SYSTEMS A number of new technologies have been developed or adopted and integrated into Systems' suite of services over the last twelve months. Specifically, the system now includes a 'Reputation Filter' at the perimeter, to challenge sender IP addresses regarding their authenticity, allowing legitimate IPs to resend whilst ensuring that illegitimate IPs - such as from a virus infected machine sending spoof s for example - will not be resent and therefore reach the intended recipient. This technology removes a significant percentage of incoming spam . A number of other Network Perimeter Pre-Filters have been developed - specifically a grey-listing module and Anti-Zombie protection, providing protection against virus infected 'zombie' machines distributing spam. A number of new spam filters have been developed, particularly a Directory Harvest Filter and Darkmail protection, each ensuring that spam intended to probe servers to find legitimate and illegitimate domains and addresses are captured and do not receive automated responses from the server. A Sender Policy Framework module has also been developed. Systems has integrated Cloudmark's best-of-breed collaborative spam engine to support the other engines. Extensive "behind-the-scenes" monitoring has been developed to track false negative and false positive trends in real time, allowing 24 x 7 engineers to react swiftly to new spam attacks and evolving attack methodologies. Systems has also adopted user validation via Microsoft Exchange, Domino & Groupwise

17 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT 17 SECURITY FEATURES BUYERS GUIDE ADDITIONAL SECURITY FEATURES Systems' managed service incorporates a broad range of security features, including Encrypted delivery (TLS), Sender validation and LDAP user authentication. The system offers zero hour virus protection via multiple anti-virus engines. A fully secure archiving service offers peace of mind and compliance. Content control allows users to block or divert certain s, whilst an image scanning module offers protection against pornographic content. Users can utilise multi-level administration via a web control panel, which also includes a message tracking and audit service, providing full details of all messages processed. Other key security features include. 1. Transport Layered Security (TLS) provides assurred encrypted delivery 2. Encrypted web portal ensures privacy and protection of sensitive information 3. IP access monitor and blocking for web access 4. Pro-active DNS monitoring for client records ensures mail security loopholes can't be introduced 5. Multiple datacenters containing redundant hardware means no single point of failure 6. Unique replicated data solution ensures that there is no risk of loss of any messages 7. Lock down of access to web portal to designated IP ranges, further protects against hacking. 8. Anti-Virus solution using multiple best of breed vendors to provide enhanced protection 9. True "Zero Hour" Anti-Virus technology based on Real Time Detection, negating risks of early stage viruses evading traditional scanners.1. End-user management system enables selected features to be accessed by end-users 10. Comprehensive image analysis tool set to protect employees & company reputation against exchange of pornographic material % audit record of every message relayed by the service accessible by administrators and end-users if required. 12. End-user management system enables selected features to be accessed by end-users 13. Directory Harvest Protection ensures that company addresses are protected from capture and exploitation

18 18 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT SECURITY FEATURES BUYERS GUIDE 14. Reputation Service contributes to spam detection and protects organizations from the risk of mass Distributed Denial of Service Attacks (DDoS). 15. High throughput, purpose built message switching technology further contibutes to the protection of extreme mail traffic brought about by DDoS attacks. 16. Comprehensive policy based content management system enables rules to be created to control who can exchange what content with whom 17. Detailed user management system, enabling access to be granted/ denied to functions within the system 18. Graphical reporting system collecting and reporting data for up to 3 years, supports investigations into policy violations or suspicious events. 19. Event log records policy violations, login attempts and changes made to the system enabling traceability and accountability. 20. Pro-active monitoring by 24 x 7 EMS Network Operations Centre ensures that any major e- mail incidents are identified, managed and alerted to the customer before they can do damage. 21. Monitoring mode for certain policies enables non-invasive introduction of system.

MXSweep Hosted Email Protection

MXSweep Hosted Email Protection ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740

More information

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. Email Systems Managed Service. www.westcoastlabs.org

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. Email Systems Managed Service. www.westcoastlabs.org ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006 Email Systems Managed Service 2 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Contents Email Systems Managed Service Test objectives and scenario...3 Test network...4

More information

SurfControl EmailFilter for SMTP

SurfControl EmailFilter for SMTP ANTI SPAM SOLUTIONS TECHNOLOGY REPORT SurfControl EmailFilter for SMTP JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS SurfControl EmailFilter for SMTP SurfControl,

More information

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. SurfControl Email Filter. www.westcoastlabs.org

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. SurfControl Email Filter. www.westcoastlabs.org ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006 SurfControl Email Filter 2 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Contents SurfControl Email Filter Test objectives and scenario...3 Test network...4

More information

GFI Mail Essentials for Exchange/SMTP

GFI Mail Essentials for Exchange/SMTP ANTI SPAM SOLUTIONS TECHNOLOGY REPORT GFI Mail Essentials for Exchange/SMTP NOVEMBER 2006 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS Mail Essentials for Exchange/SMTP GfI Software,

More information

Tumbleweed MailGate Secure Messenger

Tumbleweed MailGate Secure Messenger EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Tumbleweed MailGate Secure Messenger JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS MailGate Secure Messenger Tumbleweed

More information

Test Report September 2007. Netcore's Emergic CleanMail Service. Anti-Spam Technology Report

Test Report September 2007. Netcore's Emergic CleanMail Service. Anti-Spam Technology Report Test Report September 2007 Netcore's Emergic CleanMail Service Anti-Spam Technology Report Vendor Details Name: NetCore Solutions Pvt Ltd. Address: 402, Peninsula Chambers, Peninsula Corporate Park, Ganpat

More information

AlwaysMail. Sector 5. Cloud E-Mail

AlwaysMail. Sector 5. Cloud E-Mail AlwaysMail Sector 5 Cloud E-Mail INDEX INDEX 2 SECTOR 5 COMPANY PROFILE 3 Background Company Name & Address 3 1. SECTOR 5 HOSTED E-MAIL OFFERING 4 2. MICROSOFT HOSTED EXCHANGE 5 3. HOW WE MIGRATE COMPANIES?

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Test Report June 2007. Trend Micro Interscan Gateway Security Appliance. Anti-Spam Technology Report

Test Report June 2007. Trend Micro Interscan Gateway Security Appliance. Anti-Spam Technology Report Test Report June 2007 Trend Micro Interscan Gateway Security Appliance Anti-Spam Technology Report Vendor Details Name: Trend Micro Address: Trend Micro Inc. 10101 N. De Anza Blvd, Cupertino, CA - 95014,

More information

Websense Email Security Transition Guide

Websense Email Security Transition Guide Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011

More information

Secured email Enterprise eprivacy Suite

Secured email Enterprise eprivacy Suite EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

BUILT FOR YOU. Contents. Cloudmore Exchange

BUILT FOR YOU. Contents. Cloudmore Exchange BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Test Report October 2007. InterScan Messaging Security Suite. Anti-Spam Technology Report

Test Report October 2007. InterScan Messaging Security Suite. Anti-Spam Technology Report Test Report October 2007 InterScan Messaging Security Suite Anti-Spam Technology Report Vendor Details Name: Trend Micro Inc. Address: 10101 N. De Anza Blvd., Cupertino, CA - 95014, USA Telephone: + 1

More information

Top 10 Features: Clearswift SECURE Email Gateway

Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can

More information

PureMessage for Microsoft Exchange 2013 startup guide. Product version: 4.0

PureMessage for Microsoft Exchange 2013 startup guide. Product version: 4.0 PureMessage for Microsoft Exchange 2013 startup guide Product version: 4.0 Document date: June 2015 Contents 1 About this guide...4 2 Planning your PureMessage deployment...5 2.1 Deploying PureMessage

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200 800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...

More information

Hosting Control Panel (CP) Admin Guide

Hosting Control Panel (CP) Admin Guide Hosting Control Panel (CP) Admin Guide Document Revision Date: April 26, 2012 Hosting CP Admin Guide / TOC Page i Contents HOW TO USE THIS HOSTING CP ADMIN GUIDE... 1 GET STARTED WITH EXCHANGE... 1 Other

More information

Anti Spam Best Practices

Anti Spam Best Practices 39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing

More information

PureMessage for Microsoft Exchange Help. Product version: 4.0

PureMessage for Microsoft Exchange Help. Product version: 4.0 PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

FTA Computer Security Workshop. Secure Email

FTA Computer Security Workshop. Secure Email FTA Computer Security Workshop Secure Email March 8, 2007 Stan Wiechert, KDOR IS Security Officer Outline of Presentation The Risks associated with Email Business Constraints Secure Email Features Some

More information

Serial Deployment Quick Start Guide

Serial Deployment Quick Start Guide PaperClip em 4 11/19/2007 Serial Deployment Quick Start Guide This checklist should be completed before installing the em4 Relay. Your answers with the associated screens will enable you to install and

More information

ModusMail Software Instructions.

ModusMail Software Instructions. ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account

More information

User guide Business Internet e-mail features

User guide Business Internet e-mail features User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features

More information

Features and benefits guide for partners and their customers

Features and benefits guide for partners and their customers and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions. PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information

More information

Anti-spam Comparison Report

Anti-spam Comparison Report January 2009 Anti-spam Comparison Report www.westcoastlabs.com 1 Test Laboratory Details US Headquarters and Test Facility West Coast Labs, 16842 Von Karman Avenue, Suite 125 Irvine, CA 92606, U.S.A.,

More information

PureMessage for Microsoft Exchange Help. Product version: 3.1

PureMessage for Microsoft Exchange Help. Product version: 3.1 PureMessage for Microsoft Exchange Help Product version: 3.1 Document date: June 2015 Contents 1 About PureMessage for Microsoft Exchange...4 2 Key concepts...5 2.1 Key concepts overview...5 2.2 Inbound,

More information

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2 Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)

More information

INLINE INGUARD E-MAIL GUARDIAN

INLINE INGUARD E-MAIL GUARDIAN INLINE INGUARD E-MAIL GUARDIAN Activation Guide December 8, 2008 600 Lakeshore Parkway, AL 35209 888.3InLine support@inline.com 1 InLine InGuard E-Mail Guardian Activation Guide The InLine InGuard E-Mail

More information

Email Filtering Admin Guide. Guide to Administrative Functions of Spam and Virus Filtering Service

Email Filtering Admin Guide. Guide to Administrative Functions of Spam and Virus Filtering Service Email Filtering Admin Guide Guide to Administrative Functions of Spam and Virus Filtering Service Table of Contents Welcome Page 3 Logon Page 3 Home Page 4 Spam Page 5 Message Searching Releasing Held

More information

SPAM FILTER Service Data Sheet

SPAM FILTER Service Data Sheet Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic

More information

Symantec Hosted Mail Security Getting Started Guide

Symantec Hosted Mail Security Getting Started Guide Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration

More information

WHITE PAPER. Understanding the Costs of Email Security

WHITE PAPER. Understanding the Costs of Email Security WHITE PAPER Understanding the Costs of Email Security Table of Contents Introduction.................................................................... 3 Calculating Savings.............................................................

More information

Bizo Email Filter. Service Description

Bizo Email Filter. Service Description Bizo Email Filter Service Description Service Description Bizo Email Filter Version 2.0 All Rights Reserved 2006 Copyright 2004 Business Online Limited Bizo is the trading name for Business Online Limited.

More information

Hosting Control Panel (CP) Admin Guide

Hosting Control Panel (CP) Admin Guide Hosting Control Panel (CP) Admin Guide Document Revision Date: May 16, 2013 Hosting CP Admin Guide / TOC Page i Contents HOW TO USE THIS HOSTING CP ADMIN GUIDE... 1 GET STARTED WITH EXCHANGE... 1 Other

More information

E-Mail Security. on your terms SOFTSCAN

E-Mail Security. on your terms SOFTSCAN E-Mail Security on your terms SOFTSCAN With fraudulent and offensive emails delivered in vast quantities to businesses every day a foolproof email security system is essential. Setting the standards SoftScan

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3

More information

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and

More information

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008 ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

Preface... 4. Introduction to Proofpoint Essentials... 5

Preface... 4. Introduction to Proofpoint Essentials... 5 July 2014 Preface... 4 About this Guide... 4 Intended Audience and Prerequisite Knowledge... 4 Other Sources of Information... 4 Contacting Proofpoint Essentials Support... 4 Knowledge Base... 5 Support

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

Email Security - A Holistic Approach to SMBs

Email Security - A Holistic Approach to SMBs Implementing the latest anti-virus software and security protection systems can prevent many internal and external threats. But these security solutions have to be updated regularly to keep up with new

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0 eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably

More information

WEB QUARANTINE USER GUIDE VERSION 4.3

WEB QUARANTINE USER GUIDE VERSION 4.3 WEB QUARANTINE USER GUIDE VERSION 4.3 WEB QUARANTINE USER GUIDE Version 4.3 The content of this manual is for informational use only and is subject to change without notice. Neither Norman nor anyone else

More information

A D M I N I S T R A T O R V 1. 0

A D M I N I S T R A T O R V 1. 0 A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA

More information

Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education

Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets

More information

Sophos Email Appliance Configuration Guide

Sophos Email Appliance Configuration Guide Sophos Email Appliance Configuration Guide Sophos TOC 3 Contents Copyrights and Trademarks...4 Setup and Configuration Guide...4 Product Overview...4 Installing a Virtual Appliance...7 Initial Configuration...9

More information

PureMessage for Microsoft Exchange startup guide

PureMessage for Microsoft Exchange startup guide PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: May 2010 Contents 1 About this guide...3 2 Planning your PureMessage deployment...4 3 Installing PureMessage...6 4 Starting

More information

How to Use Red Condor Spam Filtering

How to Use Red Condor Spam Filtering What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies

More information

Dell SonicWALL Hosted Email Security. Administration Guide

Dell SonicWALL Hosted Email Security. Administration Guide Dell SonicWALL Hosted Email Security 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011 Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to

More information

Barracuda Email Security Service

Barracuda Email Security Service Barracuda Networks Technical Documentation Barracuda Email Security Service Administrator s Guide Version 1.0 RECLAIM YOUR NETWORK Copyright Notice Copyright (c) 2004-2011, Barracuda Networks, Inc., 3175

More information

Quick Start Policy Patrol Mail Security 10

Quick Start Policy Patrol Mail Security 10 Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

PureMessage for Microsoft Exchange startup guide. Product version: 3.1

PureMessage for Microsoft Exchange startup guide. Product version: 3.1 PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: June 2015 Contents 1 About this guide...4 2 Planning your PureMessage deployment...5 2.1 Deploying PureMessage to Exchange

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

Email Migration Project Plan for Cisco Cloud Email Security

Email Migration Project Plan for Cisco Cloud Email Security Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f

More information

Sophos Email Appliance Configuration Guide

Sophos Email Appliance Configuration Guide Sophos Email Appliance Configuration Guide Sophos TOC 3 Contents Copyrights and Trademarks...4 Introduction...4 Product Overview...4 Installing a Virtual Appliance...7 Initial Configuration...8 Activating

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of

More information

GETTING STARTED GUIDE Exclaimer Anti-spam

GETTING STARTED GUIDE Exclaimer Anti-spam GETTING STARTED GUIDE Exclaimer Anti-spam Getting Started Guide www.exclaimer.com Getting Started Guide - Anti-spam 01/30 Contents About This Guide...2 Anti-spam Overview...3 How does it Work?...3 What

More information

Email Services Deployment. Administrator Guide

Email Services Deployment. Administrator Guide Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the

More information

Email Security 8.0 User Guide

Email Security 8.0 User Guide Email Security 8.0 User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to

More information

Manual Spamfilter Version: 1.1 Date: 20-02-2014

Manual Spamfilter Version: 1.1 Date: 20-02-2014 Manual Spamfilter Version: 1.1 Date: 20-02-2014 Table of contents Introduction... 2 Quick guide... 3 Quarantine reports...3 What to do if a message is blocked inadvertently...4 What to do if a spam has

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Spam Filter Message Center. User Guide

Spam Filter Message Center. User Guide Spam Filter Message Center User Guide Powered by MX Resources, LLC 10573 W. Pico Blvd., #343 Los Angeles, CA 90064 (888) 556-7788 support@mxresources.com Introduction Introduction to the Postini Message

More information

How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business)

How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business) Hosted Exchange +SharePoint: Communication and Collaboration This is the next generation of affordable, reliable messaging and portal solutions with Microsoft Exchange 2010 and Microsoft SharePoint 2010.

More information

Mimecast Services for Outlook (MSO4)

Mimecast Services for Outlook (MSO4) Mimecast Services for Outlook (MSO4) End User Quick Start Guide for Outlook 2010/2013 Mimecast Services for Outlook (MSO 4) is a software application that integrates with your Microsoft Outlook. Once installed,

More information

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach 100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...

More information

1 Accessing E-mail accounts on the Axxess Mail Server

1 Accessing E-mail accounts on the Axxess Mail Server 1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server

More information

Overview. Accessing the User Interface. Logging In. Resetting your Password

Overview. Accessing the User Interface. Logging In. Resetting your Password Overview The message filtering service lets a company easily provide real-time spam and virus filtering, attack blocking, and email-traffic monitoring across a user deployment of any size. Users receive

More information

AVG AntiVirus. How does this benefit you?

AVG AntiVirus. How does this benefit you? AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to

More information

WATCHGUARD BARRACUDA KEY SALES PITCH TRUTH BEHIND THE PITCH

WATCHGUARD BARRACUDA KEY SALES PITCH TRUTH BEHIND THE PITCH KEY SALES PITCH Long time provider of email security with large customer base XCS 170, 370 and 570 appliances integrate bi directional email threat protection and data loss prevention on a single platform.

More information

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,

More information

Implementing MDaemon as an Email Security Gateway to Exchange Server

Implementing MDaemon as an Email Security Gateway to Exchange Server Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

D3 TECHNOLOGIES SPAM FILTER

D3 TECHNOLOGIES SPAM FILTER D3 TECHNOLOGIES SPAM FILTER The D3 Technologies spam filtering provides virus, attachment, and spam filtering services for email. We check all emails for viruses and malicious content, since we feel these

More information

ExchangeDefender. Understanding the tool that can save and secure your business

ExchangeDefender. Understanding the tool that can save and secure your business ExchangeDefender Understanding the tool that can save and secure your business OVERVIEW The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting.

More information

MAIL CENTRAL. Spam & Virus Protection Service for TREB Email

MAIL CENTRAL. Spam & Virus Protection Service for TREB Email MAIL CENTRAL Spam & Virus Protection Service for TREB Email July16, 2010 1 Mail Central - Spam & Virus Protection Service for TREB Email Table of Contents Introduction/Beneficial Features p.3 Compose Message

More information

Quick Start Policy Patrol Mail Security 9

Quick Start Policy Patrol Mail Security 9 Quick Start Policy Patrol Mail Security 9 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

Email Security Series

Email Security Series Email Security Series Elegantly simple, brutally effective, always affordable anti-spam protection Email spam threatens the security and productivity of today s small and mid-size organizations. Spam attacks

More information

Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?

Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest? Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.

More information

Cloud Email Firewall. 1. Introduction. a. What is Spam?

Cloud Email Firewall. 1. Introduction. a. What is Spam? Cloud Email Firewall 1. Introduction a. What is Spam? Spam are messages which are unsolicited or sent from unknown senders. Usually they are sent in large quantities (even massive) and with commercial

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information