SPAM FILTER Service Data Sheet
|
|
|
- Clara Hart
- 10 years ago
- Views:
Transcription
1 Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming traffic protection Mail traffic rerouting Processing steps Preliminary steps Active analysis Infomail handling buffers/caches 3.3 Virus protection 3.4 Outbound security 3.5 Attachment filter/content filter
2 1 Spam Detection Problem? 1.1 What is spam? Wikipedia defines spam as the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately. This definition reflects the experience of most people who have been bothered by spam. Unfortunately, technical application of the definition is difficult: How does a system know that an is unsolicited, and that the recipient has not in fact given permission for it to be sent? Unsolicited does not necessarily mean unwanted - it is quite possible for an unsolicited to be welcome, e.g. an enquiry from a new customer. What exactly is advertising? Because of this, it is unsurprising that different people have different opinions as to whether a Particular is legitimate or spam. In fact, it is not uncommon for one person to class a message as spam on one occasion and as a legitimate on another. So how can a technical system deliver the required result with a high degree of reliability? 1.2 How is spam detected? Due to the difficulty of technically implementing the correct definition of spam, many spam filter manufacturers use another definition, the mass mail criterion. According to this, an is classed as spam if it is sent to a large number of different addressees within a short space of time, possibly also by various senders. Unfortunately, this also includes certain types of legitimate such as newsletters. On the other hand, individual or low volume s with clearly abusive content are not detected via the mass mail criterion. In light of the different definitions of spam, details of detection rates and false classification rates are difficult to compare. At most, they can be accurately predicted on an individual basis, i.e. for each individual user. For this reason, every user must ultimately decide for themselves which s they want to receive and which they do not, and transmit this information to the spam filter. The spam filter must then reproduce this decision in the best possible way. However, a spam filter must also produce good results for the user even in its basic configuration, otherwise the effort required to train the filter would be shifted to individual users, which defeats the point of an automatic system. As spam is constantly changing, ongoing filter updates are also very important; the best filter is useless if it is supplied with outdated information. Spam often comes in waves. These spam waves typically last between a few minutes and a couple of hours. A filter update after the wave has finished
3 would have no effect, and a large volume of unwanted s would pass through and reach users inboxes. A fast and tiered response is therefore important in the event of a spam wave. First, automatic measures take effect, and then in a second step, new rules that are specially designed for the new type of spam are created and activated. As spam messages also change constantly during a wave, often this process must be repeated multiple times in the course of a wave. 2 Info mail The majority of spam s are very clearly identifiable as spam, but there is a grey area where it is not easy to determine whether the recipient would want to receive an or not. This grey area covers many newsletters, for instance. Newsletters sent by are legitimate provided that legal requirements are met. In these cases, it cannot be assumed that the s are unsolicited. The same is true for initial contact by ; although in such cases the received is unsolicited, it cannot automatically be assumed that it is undesirable. EveryCloud defines info mail as s that users do not consider undesirable but which disrupt the day-to-day workflow and distract from more important s. Separate info mail handling is therefore a useful and cost saving feature of the EveryCloud spam filter. 3 EveryCloud spam filter features 3.1 Cloud architecture EveryCloud uses the principle of the public cloud to protect its customers systems and networks against attacks from the Internet. To do this, EveryCloud systems are set up outside the customer s internal network, like the outworks of a fortress. EveryCloud forms the gateway for conveying s from the Internet into the customer s internal network. This offers significant benefits: Extremely redundant and distributed overall system layout, making it more powerful and more resilient against attacks than individual installations Defence against attacks, malware, etc. outside the customer s infrastructure, reducing strain and threats to the infrastructure Simplification of protection systems at the perimeter of the customer s network, making them more resilient and cost effective, and significantly reducing the administrative load 24/7 system monitoring by security experts, ensuring security even outside the working hours of the customer s own IT staff
4 EveryCloud solutions offer full multi-client capability, and have tiered user permissions. Data is stored hierarchically, ensuring that users are only able to access the relevant hierarchy level at all times. EveryCloud systems are run from several distributed and secure data centres. 3.2 Incoming traffic protection Mail traffic rerouting EveryCloud systems are set up as a firewall between the Internet and the customer s IT infrastructure. For incoming traffic, it is therefore important to ensure that s sent to the customer from the Internet are routed via EveryCloud systems and not directly to the customer s infrastructure. On the Internet, the mail exchanger record (MX record) in the domain name service (DNS) specifies which server is responsible for receiving a domain s s. To reroute the incoming traffic, the MX record for the customer s domain is changed so that it points to the EveryCloud mail gateway. s to this domain are then automatically transmitted without further intervention from the sender s mail server to the EveryCloud infrastructure, where they are checked and forwarded to the customer s server (Figure). Figure 1: rerouting via EveryCloud infrastructure The customer s firewall is also set up so that only s from EveryCloud networks pass through the firewall. This is necessary as malicious s could otherwise be sent directly to the mail server, bypassing the MX record and therefore bypassing EveryCloud protection. After changing the firewall, any direct delivery attempt will fail, and the customer s systems are definitively safe from spam.
5 The new setting also ensures that denial of service (DoS) attacks on the customer s mail infrastructure are considerably more difficult. The aim of these attacks is to completely prevent network traffic by flooding lines and systems with extremely high numbers of data packets. If these attacks do not target the EveryCloud infrastructure but the customer s infrastructure by bypassing the MX record, they are now easily blocked by the firewall and not allowed through to the mail server Processing steps By altering the MX record, wanted and unwanted s to the customer s domain are sent to the EveryCloud gateway systems. There, s are processed in two stages: Preliminary gateway analysis (blocking) and active analysis with final virus check (Figure). Figure 2: route through EveryCloud systems and analysis stages Preliminary gateway analysis (blocking) The primary goal in the preliminary analysis stage is to detect known senders of unwanted s (spam) and malicious content before the message is finally transmitted. Detection should take place in this very early stage if possible so as not to use unnecessary bandwidth or processing resources. While the connection is established by the forwarding mail server, information about the sending server, such as its unique Internet IP address, is received and analysed by the EveryCloud systems. Using this information and extensive, carefully maintained databases, EveryCloud can detect definitely known spammers and prevent transmission. This process is frequently referred to as IP
6 black listing. Similar mechanisms are used to monitor the number of connection attempts by the sending server and to limit them if necessary, thus providing protection against denial of service or flooding. If analysis during connection does not produce a negative result, further examination of the data will begin. Checks during transmission of header information establish whether this is an attempt to deliver unwanted s or even to transmit computer viruses, worms and links to hijacked and infected websites. The following detection mechanisms are used in the first stage: Monitoring the number of connection attempts Blocking specific IP addresses that are definitely known to be spammers Checking the existence of the recipient, e.g. SMTP pass-through check Checking header and subject information Compliance with traffic transmission standards Detecting clear spam patterns The sender does not receive positive acknowledgement that the has been received unless all stages of the preliminary analysis in the EveryCloud spam filter are successfully completed without detecting known spam, computer viruses or other unwanted or potentially harmful content. If the is classified as spam during the preliminary analysis, the connection is terminated and an error message returned instead of an acknowledgement. A special feature is the SMTP pass-through check. This feature can be adjusted for a domain by the administrator, and ensures that the destination server is checked to determine whether the can be delivered before it is accepted by the EveryCloud gateway. This ensures at an early stage that s to non-existent addresses or recipients with full inboxes for example are not transmitted. In the event of an error message from the destination server, this exact error message is forwarded to the sending server and the is rejected. Statistically, 95% of spam delivery attempts are currently detected and rejected during preliminary gateway analysis (as of October 2012). Nonetheless, the preliminary analysis is deliberately set up to allow s through in case of doubt. The primary goal here is to avoid false positives, i.e. incorrect classification - and therefore rejection - of legitimate s as spam. If an is incorrectly rejected during preliminary analysis, which is statistically extremely rare, the content of the error message is used by the sending mail server to inform the sender of the rejection. The sender can then contact the EveryCloud support team via a neutral website, and
7 inform them of the incorrect rejection. The EveryCloud support team will immediately check the message and take the necessary steps to prevent this from being repeated. The sender will be informed of the measures taken. Administrators and users also have a complete overview of all accepted and rejected s at all times in the EveryCloud control panel. Details such as the sender and recipient addresses, date and time, subject, IP address of the sending server and the status message of the receiving mail server are displayed and used as search criteria. Because the message ID is also displayed, this can also help when searching for a particular message on the mail server Active analysis If an has passed the preliminary analysis processes, the sending mail server will receive confirmation of successful transmission. By contrast, in the event of a negative preliminary analysis, acknowledgement of receipt is denied and an appropriate error message is transmitted to the sending server instead. Users of the EveryCloud spam filter service can control the next processes. Selective white listing allows receipt to be specifically and individually permitted for particular domains and recipients, while blacklisting similarly allows s from particular senders to be marked as spam. Very powerful further options for handling messages are available by entering rules in the EveryCloud spam filter compliance module. Various aspects of the received are checked during active analysis. By using highly specialised algorithms developed by EveryCloud, content is systematically analysed depending on the content. Content is evaluated structurally, syntactically, semantically and heuristically. As well as text content, image information and text in images are also analysed. To do this, real time optical character recognition (OCR) is also used if necessary to detect spam messages sent as images. External content or links to websites are compared with known spam patterns. Figure shows an overview of the process. In addition to this, all s undergo a final computer virus check before delivery to the recipient. Known and detected viruses are completely blocked and not delivered to the user. New and previously unknown viruses are detected by the early warning system using outbreak detection. s are also checked for phishing links and URLs to malicious code or websites that pose a security risk. More information on the virus defence methods used can be found in section called Virus Protection.
8 The following detection mechanisms are used in the second stage: Heuristic filter Bayesian filter Content analysis Optical character recognition (OCR) Domain and user-specific black lists and white lists Virus check Figure 3: Overview of the spam detection stages used by EveryCloud The EveryCloud content filter works downstream of spam detection. During this stage, s with undesirable attachments are blocked or have their attachments removed according to adjustable criteria.
9 The is not delivered to the recipient until it has passed the checks in all of the processes. If an is identified as unwanted during one of these checks, the is logged and moved to quarantine, and the recipient is informed via a status (Figure). The status frequency is configurable. Access to s in quarantine is also possible via the EveryCloud control panel (Figure). Due to the high detection rate during preliminary analysis, comparatively few spam s are filtered out in the second stage, which keeps quarantine small and manageable. Need an ECT quarantine screen shot here Figure 4: Spam report (digest) with newly quarantined Using comprehensive, specialist content-dependent algorithms, EveryCloud can contractually guarantee a spam detection rate of 99.9% for the spam filter service. A rate of over 99.99% is consistently achieved in practice. The contractually guaranteed false positive rate is below %. Need a screen shot of ECT Control Panel Workspace Figure 5: Complete overview of traffic in the EveryCloud control panel Info mail handling s that users do not generally consider undesirable but which disrupt the day-to-day workflow and distract from more important s, e.g. user-requested newsletters, are classed as info mail by EveryCloud. Because these messages are not spam in the strict sense, they are handled separate- Administrators can activate the info mail filter for their entire domain in the control panel. It is also possible to configure whether users can activate or deactivate info mail handling themselves, regardless of the domain settings. When the info mail filter is activated, info mails and newsletters are filtered out and placed in quarantine like spam s. These s are separately marked as info mail in both the spam report and control panel. This provides users with an overview of the info mails they receive, and allows them to deliver individual info mails with a click (Figure6).
10 Need a ECT Spam report with Info Mail Figure 6: Spam report with info mail buffers/caches If the SMTP pass-through check is activated and the server is temporarily not accepting incoming s, EveryCloud will forward this information to the sending mail server in incoming traffic. Normally, the sending mail server will then take over buffering. If this is not the case, or if the buffer time in the sending mail server is too short, the will normally be reported to the sender as undeliverable by the sending mail server. If an SMTP pass-through check is not activated, EveryCloud will buffer incoming s for seven days as standard if the recipient server is unreachable or if delivery is temporarily impossible for other reasons. For technical reasons and to improve filter effectiveness, EveryCloud does not recommend deactivating the SMTP pass-through check without good reason. However, in the event of long downtime for a mail server with SMTP pass-through check activated, EveryCloud recommends that customers contact EveryCloud support. They can temporarily deactivate the SMTP pass-through and activate the buffer. The contents of cached s are deleted from EveryCloud systems after complete transmission, unless the customer uses the continuity service or archive service. 3.3 Virus protection For incoming traffic, all s undergo a final computer virus check before delivery to the recipient. The check consists of a series of mechanisms. The following processes are used to protect against viruses: Modified ClamAV scanner The signature-based ClamAV is used for known viruses. EveryCloud modifies and expands the available virus signatures to achieve their required standards for detection capability, speed and false positive prevention. Signatures are updated at least every half hour. EveryCloud virus scanner
11 The EveryCloud virus scanner uses signatures that are specially developed and optimised for viruses spread by . Signature updates every 60 seconds allow very fast, more flexible and more comprehensive detection than with a generic scanner such as ClamAV. EveryCloud phishing filter The phishing filter analyses links/urls in s to detect downloadable malicious code. For this purpose, the filter detects downloadable malicious script commands, etc. This allows phishing s and malicious drive-by downloads to be detected. EveryCloud outbreak engine EveryCloud constantly analyses incoming s for unusual attachments, links, senders or content using honeypot accounts ( addresses with only one purpose, receiving spam). Signatures are derived from this analysis within an extremely short time (typically < 5 minutes). G DATA signature exchange data EveryCloud works with G DATA to detect and successfully filter out new viruses and phishing variants at an early stage. To do this, data with potentially malicious code are continuously exchanged, analysed and the results of the analysis used to detect subsequent transmission of the malicious code. Archives (e.g. ZIP files) are scanned for viruses up to the eighth level. This means that viruses are also found in archives that are in turn stored in archives. Archives with more than eight levels are treated as virus-infected s. Password-protected (encrypted) archives are the exception to this; these are not scanned for viruses. All s that are identified as malicious by the mechanisms above are marked and treated as virus-infected s in quarantine (Figure 7). Only administrators, and not users, can deliver s after they are classified as virus-infected. It is possible to configure in the control panel whether users are informed of virus-infected s in quarantine.
12 Figure 7: s classed as virus-infected in the control panel EveryCloud guarantees an traffic virus detection rate of 99.99% in relation to the total number of incoming transmission attempts. 3.4 Outbound security The EveryCloud relay service is included in the EveryCloud spam filter service. The relay service increases security in outgoing traffic. To use the relay service, the EveryCloud mail relay is entered as a smart host or relay on the customer s mail server. Outgoing s are then sent by the customer s mail server to the EveryCloud mail relay, where they are checked and forwarded to the destination address on the Internet. The following checks are carried out in the relay: Check for known viruses Check for compliance with policies regarding attachments (content filter) Basic check for spam distribution Check for unusual traffic (active bots in customer network) It is also sensible to close the firewall for outgoing traffic, so that s from the internal network (SMTP port) can only be sent to EveryCloud relays. This will make it considerably more difficult for any potentially active bots in the internal network to send out spam.
13 Sending outgoing s via the EveryCloud relays also activates a further feature, EveryCloud bounce management. Bounce s are messages generated automatically by mail servers to provide information about a user s absence or an delivery delay, for example. Genuine bounces are desirable; the problem is bounces that are received by a user due to fake sender addresses. Spammers frequently use fake sender addresses to send their messages. For example, if spam is addressed to non-existent addresses, this frequently creates bounce s that are sent to the supposed sender s address. In extreme cases, bounce attacks generated in this way can have a serious adverse effect on the innocent supposed sender s mail systems. EveryCloud bounce management ensures that only genuine bounces in incoming traffic are sent to the recipient, and bounces in response to spam with fake sender addresses are reliably filtered out. All that is required for this is for to be sent via the EveryCloud relay. When sending via the EveryCloud relay, a group-based configurable footer/disclaimer can also be attached, automatically, to outgoing s. This can be used for marketing purposes, for instance, or to ensure that legally required details are included on business correspondence. Use of the EveryCloud relay is also a requirement for revision-proof archiving of outgoing if the EveryCloud archive service is used. 3.5 Attachment filter/content filter Many companies have guidelines for sending or receiving attachments. This is intended to limit the volume of data sent by , and to prevent users from sending undesirable formats (e.g. only PDFs transmitted, but not Office files) or receiving data that poses a potential risk to system security (e.g. executable files). The EveryCloud spam filter service allows guidelines for sending and receiving attachments to be set specifically by user, group or domain (Figure). s with forbidden attachments in outgoing traffic are rejected. s with forbidden attachments in incoming traffic are either rejected or delivered without the forbidden attachment, depending on settings. In the latter case, the complete is cached in quarantine. s that have been quarantined due to a forbidden attachment can be delivered in full to the recipient s inbox by administrators at the click of a button.
14 Figure 8: Setting attachment guidelines in the EveryCloud control panel
English Translation of SecurityGateway for Exchange/SMTP Servers
Testing: Alt N Technologies SecurityGateway by Sandra Lucifora Administrators spend a considerable amount of their time on the job on eliminating unwanted messages. Viruses, Phishing, and Spoofing pose
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 [email protected]
Contents Reduce Spam & Viruses... 2 Start a free 14 day free trial to separate the wheat from the chaff... 2 Emails with Viruses... 2 Spam Bourne Emails... 3 Legitimate Emails... 3 Filtering Options...
Service Launch Guide (US Customer) SEG Filtering
Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Avira Managed Email Security AMES FAQ. www.avira.com
Avira Managed Email Security AMES FAQ www.avira.com Can AMES be used immediately after an account for our organization has been set up in the MyAccount user portal? Using your account requires a change
Thexyz Premium Webmail
Webmail Access all the benefits of a desktop program without being tied to the desktop. Log into Thexyz Email from your desktop, laptop, or mobile phone, and get instant access to email, calendars, contacts,
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Email Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
Symantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
Avira Managed Email Security (AMES) User Guide
Avira Managed Email Security (AMES) User Guide 1 Product information... 3 1.1 Functionality... 3 1.2 Licensing AMES... 3 2 Getting started with AMES... 4 2.1 Adding a new domain to AMES... 4 2.2 Logging
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering
Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Core Protection Suite
Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3
CipherMail Gateway Quick Setup Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................
Secure Messaging Service
Secure Messaging Service Powered by Trend Micro Email Security Platform for Service Providers Service Provider s Guide Trend Micro Incorporated reserves the right to make changes to this document and
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
Do you need to... Do you need to...
TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce
PART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Migration Quick Reference Guide for Administrators
Migration Quick Reference Guide for Administrators 10 Easy Steps for Migration Maximize Performance with Easy Settings Changes Communicating with Your Users Reporting Spam Resources Page 1 10 Easy Steps
Kaspersky Anti-Spam 3.0
Kaspersky Anti-Spam 3.0 Whitepaper Collecting spam samples The Linguistic Laboratory Updates to antispam databases Spam filtration servers Spam filtration is more than simply a software program. It is
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
How to Use Red Condor Spam Filtering
What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies
AntiSpam QuickStart Guide
IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...
Serial Deployment Quick Start Guide
PaperClip em 4 11/19/2007 Serial Deployment Quick Start Guide This checklist should be completed before installing the em4 Relay. Your answers with the associated screens will enable you to install and
Email Migration Manual (For Outlook 2010)
Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4
Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External
How To Set Up Comendo.Comendo.Org For A Spammer To Send E-Mail To Your Domain Name From Your Domain From Yourdomain.Com Or Yourdomain From Yourmail.Com To Yourdomain (For A Domain Name)
Get started with 1 mailfence + spamfence E-mails sent to yourdomain.com 2 DNS requests for yourdomain.com MX-records MX-records answers: - gw1.security.comendo.com - gw2.security.comendo.com - gw3.security.comendo.com
Overview. Accessing the User Interface. Logging In. Resetting your Password
Overview The message filtering service lets a company easily provide real-time spam and virus filtering, attack blocking, and email-traffic monitoring across a user deployment of any size. Users receive
The benefits of using a perimeter-based managed service
W H I T E P A P E R Ensuring Email Security The benefits of using a perimeter-based managed service Ensuring Email Security page 1 Executive Overview With unsolicited email costing businesses millions
eprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution
A Filter inaccuracies No filter is perfect. But with your help, MailCleaner may aim at perfection. The filtering system implemented by MailCleaner relies on automated and systematic controls that cannot
Trend Micro Hosted Email Security. Best Practice Guide
Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011
Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel Table of Contents Incoming... 1 Incoming Spam Quarantine... 2 Incoming Log Search... 4 Delivery Queue... 7 Report Non-Spam...
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
Feature Comparison Guide
Feature Comparison Guide Stay Secure Portal Autumn 2015 Contents Introduction... 3 Description on some of the new features... 5 Customer overview from partner portal... 5 Partner & customer portal linkage...
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
Guardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
Email Migration Manual (For Outlook Express 6)
Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam
Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...
USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security
USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.
The Network Box Anti-Spam Solution
NETWORK BOX TECHNICAL WHITE PAPER The Network Box Anti-Spam Solution Background More than 2,000 years ago, Sun Tzu wrote if you know yourself but not the enemy, for every victory gained you will also suffer
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Microsoft Exchange 2003
Microsoft Exchange 2003 Configuration Guide Microsoft Exchange 2003 Configuration Guide Page 1 Table of Contents Introduction... 2 Document and naming conventions... 2 Outbound email protection... 3 SMTP
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science
Trustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008
ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning
PineApp Anti IP Blacklisting
PineApp Anti IP Blacklisting Whitepaper 2011 Overview ISPs outbound SMTP Services Individual SMTP relay, not server based (no specific protection solutions are stated between the sender and the ISP backbone)
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Avira Managed Email Security (AMES) User Guide
Avira Managed Email Security (AMES) User Guide Table of Contents Table of Contents 1. Product information... 4 1.1 Functionality................................................................4 1.2 Licensing
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Spam Testing Methodology Opus One, Inc. March, 2007
Spam Testing Methodology Opus One, Inc. March, 2007 This document describes Opus One s testing methodology for anti-spam products. This methodology has been used, largely unchanged, for four tests published
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
Frequently Asked Questions
Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange
Barracuda Email Security Service User Guide
Barracuda Email Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses,
How does the Excalibur Technology SPAM & Virus Protection System work?
How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
Setting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information
Security perimeter white paper. Configuring a security perimeter around JEP(S) with IIS SMTP
Security perimeter white paper Configuring a security perimeter around JEP(S) with IIS SMTP Document control Document name: JEP(S) Security perimeter Author: Proxmea, Proxmea Last update: March 23, 2008
PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1
PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Enhanced Spam Defence
Enhanced Spam Defence An approach to making SMTP connect time blocking a reliable method for e-mail filtering By John Jensen, Topsec Technology Ltd. As the spam problem keeps growing and the associated
Premium Anti Spam User s Guide. Table of Contents
Premium Anti-Spam End User s Guide / Table of Contents Page 1 of 10 Premium Anti Spam User s Guide Table of Contents Quarantine Report... 2 Links within the Quarantine Report... 3 Login to the Premium
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
Comprehensive Email Filtering. Whitepaper
Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses
