Chapter 7: Configuring ScanMail emanager
|
|
|
- Augusta Cooper
- 10 years ago
- Views:
Transcription
1 Chapter 7: Configuring ScanMail emanager Chapter 7: Configuring ScanMail emanager Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the default policy conventions used in the ScanMail emanager Configure ScanMail emanager to filter out spam Configure ScanMail emanager to filter content 2003 Trend Micro Incorporated 139
2 Trend Micro ScanMail for Exchange Student Textbook Enabling ScanMail emanager Before you can create policies and configure the spam filter and the content filter, you must enable ScanMail emanager. Open the ScanMail Management Console and click Virus Scan and then Options. Then select Enable emanager (see Figure 7-1). Figure 7-1: Scanning Options screen You can use the Real-Time Scan Monitor to ensure that ScanMail emanager is loaded and is scanning messages. The Messages Scanned section should show that ScanMail emanager is loaded (see Figure 7-2). Figure 7-2: Checking to see if ScanMail emanager is loaded You can also open the Windows NT Task Manager and ensure that the Cm_smex.exe process is loaded Trend Micro Incorporated
3 Chapter 7: Configuring ScanMail emanager Default Policy Conventions The spam and content filters in ScanMail emanager follow a set of predefined, default conventions. Exceptions to these conventions are noted later in the chapter. Case Sensitivity Keyword comparisons are not case sensitive. For example, Free Offer, Free offer, and free Offer are considered matches for free offer. To specify a case-sensitive comparison, select the Case-Sensitive Comparison check box next to the desired field. Exact Matches Keywords can match whole or partial words. For example, if free is the keyword, an occurrence of freezer would register a match. To eliminate partial-word matches, select the Exact Match check box next to the desired field. Note: Accepting partial-word matches can increase the number of false positives, or legitimate that emanager blocks. Delimiters Use commas to delimit multiple keywords entered in a single field. If you enter a phrase, it is treated as a single unit. The comma functions as the AND operator. Messages must contain all of the keywords to register a match. For example, you could enter the following keywords: free offer, music, movie In this case, only messages that contain all keywords are considered a match. The keywords can appear in any order in the message. Keywords that appear on different lines are implicitly connected by the OR operator. The text can contain any of the words from the various lines. For example, you could enter the following keywords: free offer music movie In this case, messages that contain the words free offer are a match, messages that contain the word music are a match, and messages that contain the word movie are a match Trend Micro Incorporated 141
4 Trend Micro ScanMail for Exchange Student Textbook When synonym checking is engaged, a combination of the two operators is applied. For more information, see the Synonym Checking section in this chapter. Wildcards and Punctuation The emanager spam filter supports the asterisk (*) as a wildcard character. You can configure rules that include this wildcard character for the message header fields. The emanager content filter does not support wildcard characters such as the asterisk (*) and question mark (?). If you include quotation marks, spaces, and punctuation marks in a content rule, these characters are taken literally. A match is registered only when each word, space, comma, or other punctuation mark in the phrase is found in the message. For example, if you use quotation marks to signify a phrase, the filter will match only those phrases that include quotation marks as entered in the search criteria. Archive, Delete, Quarantine emanager can take following actions on messages that match filtering criteria: Archive Delete Quarantine Messages are forwarded to the intended recipient but are also renamed and moved to the archive directory. Messages are erased from the system and are not recoverable. Messages are moved to the quarantine directory. Spam Filtering The spam filter uses the header information (including From:, To:, cc:, and Subject: lines) to evaluate messages. To filter spam, you must create rules using information such as the routing domain that identifies the origin of the spam. You can create an unlimited number of your own anti-spam rules. Trend Micro provides a rule file that contains hundreds of predefined, anti-spam rule sets. These rules block unsolicited and unwanted that originates from a number of known spam senders. The rules also block that contains popular spam subjects. The vendor-provided rule file is typically used in conjunction with the customized list of rules you develop to address specific occurrences of spam. Note: Binary attachments encoded using MIME, Unicode, or other encoding schemes are not evaluated. Non-encoded text and Word attachments are included in the evaluation Trend Micro Incorporated
5 Chapter 7: Configuring ScanMail emanager When creating spam rules, you should remember that many spam senders add false header information to their messages to make tracking back to the source difficult. The most prolific bulk ers will often reuse the same false routing domains and other header information. This makes it easier to create anti-spam rules. You can use these false domains as a signature to identify and safely block entire classes of spam rather than create rules on a one-rule/one-spam basis. Spam Filter Options When configuring spam filters, you have the following options: View and reorder the list of anti-spam rules Add, edit, or delete a rule Activate the vendor-provided rule file Configure notification messages To configure these options, click Windows Start Programs Trend Micro ScanMail for Microsoft Exchange Trend Micro ScanMail emanager ScanMail emanager Configuration. Click the Anti-Spam tab to access the Anti-Spam Configuration screen (see Figure 7-3): 2003 Trend Micro Incorporated 143
6 Trend Micro ScanMail for Exchange Student Textbook Figure 7-3: Anti-Spam configuration screen Viewing and Reordering Anti-Spam Rules The Current Rules table on the Anti-Spam configuration screen displays a list of customized rules against which inbound and outbound messages are evaluated. ScanMail evaluates Exchange traffic against the rules, starting from the first rule on the list and proceeding down the list in order to the last rule. There is no limit to the number of rules that can be created. If a message matches the criteria specified in a rule, ScanMail emanager performs the action specified within that rule (such as quarantine, archive, or delete) and notifies the appropriate people, such as the administrator. ScanMail emanager does not perform any more scanning on the message. You can configure the order in which rules are listed. You should evaluate your Exchange environment before you determine the order of rules. For example, if your company is receiving a large number of messages from a particular spam sender, you may want to list the rule for this spam first Trend Micro Incorporated
7 Chapter 7: Configuring ScanMail emanager Adding, Editing, and Deleting Rules To add a user-defined rule, click Add in the Current Rules section on the Anti-Spam configuration screen. To edit an existing user-defined rule, highlight the rule you want to edit, and click Edit in the Current Rules section on the Anti-Spam configuration screen. To delete a rule, highlight the rule and click Delete. When you click Add or Edit, the Add/Edit Rule screen appears (see Figure 7-4). Use this screen to specify the criteria by which is evaluated. Each Add/Edit page represents a separate rule. Figure 7-4: Add/Edit Rule configuration screen You can configure the following for each rule: Rule Name Use the Rule Name field to create meaningful, descriptive names for the rules you create Trend Micro Incorporated 145
8 Trend Micro ScanMail for Exchange Student Textbook Action on Unwanted Mail Messages that are found to match the filter rules can be deleted, quarantined, or archived. Messages that are deleted or quarantined are not passed to ScanMail for Exchange for virus scanning. However, messages that are copied to the archive directory are passed to ScanMail for Exchange for virus checking. All of these actions are recorded in the log file. Trend Micro recommends that you archive messages for the first few weeks after you create or modify your spam filter rules. You can then check your messages to evaluate how effective your rule is. Rule Result You can apply the designated action to all messages that match the rule by selecting Apply this rule when a message matches the following conditions option. Alternately, you can set the rule as a global exception by selecting Global exception (Do not take any action if a message matches the following conditions) option. The Global exception option tells the system to take no action if a message matches the conditions listed. By default, rules are regular, which means that the rule is applied to any message that satisfies the specific conditions of the rule. Global exception rules are applied regardless of any other rules you have configured. For example, if a message matches the global exception conditions, that message is not checked against any other rules. The message is then passed on to ScanMail for Exchange for virus scanning. Address, Sender, Copies, and Subject Fields You can configure the spam filter to filter based on information contained in any of the following fields: To:, From:, cc:, Subject: Blind carbon copies (that is, addresses appearing in the bcc: field) are not included in the header information and cannot be used as a basis for filtering spam. Note: Rules for the message header fields support the asterisk (*) as a wildcard character in the To:, From:, cc:, and Subject: fields Trend Micro Incorporated
9 Chapter 7: Configuring ScanMail emanager Message or Attachment Size Messages can be filtered according to the size of the message body or the attachment. Using the following conditions, you can filter messages according to the size in bytes: Greater than Less than Equal to Not equal to For example, you can block the body of the message or the attachment if it is greater than 100,000 bytes. To do so, select the condition (greater than) and type the number of bytes (100,000) in the Bytes field. Attachment Blocking File-attachment blocking is usually enabled during virus outbreak conditions to temporarily block all attachments that have a particular file name. To use this option, type the attachment file name in the File Name field in the Attachment Blocking section. Note: You can use the asterisk (*) as a wildcard in the file name. You can specify only one attachment file name per rule. You have the option of performing a case-sensitive comparison or an exact match comparison, but Trend Micro recommends that you not select either of these options unless it is absolutely necessary. Spam messages often use the same file name as a previous spam with a few characters added. For example, TROJ_MTX in the File Name field without exact match enabled would catch files such as the following: TROJ_MTX_II.DLL, TROJ_MTX_IlI.DLL, TROJ_MTX_II2.DLL, etc. Activating Vendor-Provided Rule File To use the vendor-provided rule file in the analysis of inbound and outbound mail, select the rule-file check box. Rules in the rule file do not appear in the Current Rules table. The vendor-provided rule file, which is encrypted, is stored in the \Program Files\Trend\SMCF\spamrule directory. The file is named Trend$RF.###, where ### represents the version number of the file. This file cannot be edited. This rule file is provided by Trend Micro and can be updated automatically Trend Micro Incorporated 147
10 Trend Micro ScanMail for Exchange Student Textbook Configuring Notification Messages You can configure separate notifications for user-defined rules and the vendor-provided rules. To configure a notification, click the Notification button in the section corresponding to the type of rule on the Anti-Spam configuration screen. The Anti-Spam Notification dialog box appears (see Figure 7-5). Figure 7-5: Anti-Spam notification Current Rules Notification To set notifications for user-defined rules, click Notification in the Current Rules section and then select any or all of the following: Notify the following administrator(s) To notify administrators, check this option and enter the addresses of the administrators in the Mail to: field. Multiple addresses should be delimited with semicolons. Enter the message text to send in the Message field. For example, you might enter the following: ScanMail emanager spam filter blocked an . Notify sender To notify the sender, check this option and enter the message text to send. Notify recipient(s) To notify the recipients, check this option and enter the message text to send. Vendor-Provided Rule File Notification To create a notification message to be sent when one of the vendor rules is met, click the Notification button in the Vendor-Provided Rule File section. Configure the vendor-rule notifications as described in the Current Rules Notification section Trend Micro Incorporated
11 Chapter 7: Configuring ScanMail emanager Note: For the spam filter, only the header information is compared against the rules defined in the Add/Edit page. Identical information appearing in the message text of a forwarded message will not register a match. To evaluate message text, you should use the content filter. Content Filtering A content-filter policy represents a group of conceptually related words and phrases that will be matched against inbound and outbound messages. ScanMail emanager evaluates the content of the message text, the To field, and the From field against the list of policies. Whenever any policy is found to match the contents of a given , the action specified in the matching policy is taken. The message can be archived, quarantined, or deleted. There is no limit to the number or type of content policies that can be created, and policies can be individually enabled or disabled. The content filter also provides a synonym-checking feature, which allows you to extend the reach of your policies. You can, for example, create policies to check for the following: Spam Profanity Racist language Sexually harassing language Hoaxes Chain mail Viruses HTML script Content Filter Options When configuring content filters, you have the following options (see Figure 7-6): View a list of policies View summary information for each policy 2003 Trend Micro Incorporated 149
12 Trend Micro ScanMail for Exchange Student Textbook Add, edit, or delete a policy Specify which actions to take when a message matches a rule Specify keywords to filter Configure notification messages Use the keyword lists that Trend Micro provides Configure global policy settings Figure 7-6: Content Filter configuration screen To configure these options, click the Content Filter tab in the ScanMail emanager Configuration screen (see Figure 7-6): Trend Micro Incorporated
13 Chapter 7: Configuring ScanMail emanager Viewing a List of Policies The Policies list displays the individual rules by which inbound and outbound messages are evaluated. ScanMail emanager evaluates the contents of the message text in addition to the header data. The evaluation of mail traffic against the policies starts from the first, or top, rule and proceeds down the list to the last, or bottom, rule. You should order policies with the broadest reach at the top of the list and those that are more narrowly defined at the bottom. Viewing a Policy Summary The Details section on the Content Filter screen provides a detailed summary of the highlighted policy. The summary shows data from the Add/Edit Policy screen and offers more information on the makeup of a given policy. To change the values that appear in the Details section, click the Edit button below the Policies list to access the Add/Edit Policy screen. Make your edits, and then click OK. (See Add/Edit Policy Options for more information.) Available fields are listed below: Mail type Action Synonym checking Import file Keyword list(s) Take NO action if message contains Inbound, outbound, or both Delete, quarantine, or archive On or off None specified or the file name Keywords that have been configured to match content Text that, if found in the message, prevents the above-named action from being taken Adding, Editing, and Deleting Policies To add a policy, click Add in the Policies section on the Content Filter screen. To edit an existing user-defined rule, highlight the policy you want to edit, and click Edit. To delete a rule, highlight the policy and click Delete. When you click Add or Edit, the Add/Edit Policy screen appears (see Figure 7-7). Use this screen to specify the criteria by which is evaluated. Each Add/Edit Policy page represents a separate policy. Each of the options is explained below Trend Micro Incorporated 151
14 Trend Micro ScanMail for Exchange Student Textbook Figure 7-7: Add-Edit Policy configuration screen Policy Name Use the Policy Name field to create meaningful, descriptive names for the policies you create. The name, which appears in the Policies list, will not be used as a keyword in the content filter. Action Messages found to match the criteria specified in a given content-filter policy can be archived, quarantined, or deleted Trend Micro Incorporated
15 Chapter 7: Configuring ScanMail emanager Trend Micros recommends that you archive messages for the first few weeks after you create or modify your content-filter policies. You can then check these messages to evaluate the efficacy of your policy. For example, if you inadvertently created a policy with the as its sole keyword, nearly every message passing through the Exchange server would match. If the action for this policy were set to Delete, each one of these messages would be deleted and would not be recoverable. If the action were set to Archive, however, the messages would be delivered even when they matched. After discovering the error, you could easily modify or delete the errant policy. Keyword Lists The content filter uses keywords and phrases to check message content. When multiple keywords are included on the same line of a policy, a match is made only when the message being evaluated contains all of the keywords on that line. For example, you can add the following keywords to the list (perform four separate adds). Example 1 sex, bare sex, nude sex, naked sex, buff Notice that in this example, four related words are used instead of just one. Basing the policy solely upon the word sex would probably not produce reliable results because sex is often used in place of the word gender. To minimize the chance of registering false positives, it is a good idea to qualify the primary word, sex, with additional words typically associated with it in a spam sex message: buff, bare, nude, and naked. Including several keyword groups will increase the reach of the filter. If the keyword list is configured like the example, messages that contain any of the keyword pairs are considered a match. Example 2 Alternatively, you could have the filter trigger an action only when all five words are encountered in a single message. To create this filter, you would include all the keywords on a single line (perform a single add). sex, bare, nude, naked, buff Obviously, the likelihood of detecting every sex message on the basis of this filter is much less than for a policy that contains several rule sets bases upon the word sex, as shown in Example 1 above Trend Micro Incorporated 153
16 Trend Micro ScanMail for Exchange Student Textbook Example 3 In the following example, a policy is constructed wherein the occurrence of any one of the related words in Example 2 triggers a match. nude sex buff bare naked This technique can be used to filter out other offensive content not every expletive in the dictionary need appear in a message to qualify as a match. Instead, you might deem the occurrence of any one of the words on your offensive list to be sufficient to warrant tracking (archive option), further investigation (quarantine option), or immediate deletion. The words listed in these examples would probably not qualify for exclusion on their own. You will need to decide which words might be offensive enough individually to warrant exclusion. The criteria you specify for content-filter policies are evaluated exactly as they are entered, including any quotes, spaces, and punctuation. Phrases are treated as a single unit. A match is registered only when each word, space, character, and so on in the phrase is found in the message. Note: Do not use quotes to signify a phrase. Use commas to delimit multiple words entered in a single field or create separate rules. Wildcards such as the asterisk (*) and question mark (?) are not supported in the content filter. If included in a rule, these characters are taken literally. Synonym Checking Synonyms are an extension of the content filter s Keyword list and can be used to broaden the reach of a keyword to include conceptually related topics. You must add synonym suggestions for a given word or phrase to the Include list. Note: Global property settings for case-sensitive comparisons and exact matches (enabled on the Content Filter tab) are also applied to synonyms. In general, keywords linked on the same line should not include more than four or five values, or they risk being overly restrictive. On the other hand, if only one keyword is included on any given line, the policy risks being too permissive few messages will be found to match. Of course, a lot depends upon what you want to filter out Trend Micro Incorporated
17 Chapter 7: Configuring ScanMail emanager The criteria you specify are evaluated exactly as they are entered, including any quotes, spaces, and punctuation. Phrases, delimited by commas, are treated as a single unit. A match will be triggered only when each word, space, etc. in the phrase is found in the message and it appears in the order entered. The following examples show how the content filter will interpret keyword lists without synonym checking and with synonym checking: Example Case 1. All three keywords appear on the same line: apple juice, pear, orange Case 2. Each keyword appears on its own line: apple juice pear orange Case 3. All three keywords appear on the same line, and synonym checking is enabled for the word orange: apple juice, pear, orange orangish red yellow The words orangish, red, and yellow are on the synonyms list for orange. In Case 1, only messages containing all items, apple juice, pear, and orange (in any order, anywhere in the message text) are considered a match. In Case 2, all messages containing the phrase apple juice are considered a match, all messages that contain the word pear are considered a match, and all messages that contain the word orange are considered a match. In Case 3, with synonym checking enabled, messages that contain the phrase apple juice and the word pear and also contain any of the words orange, orangish, red, or yellow are considered a match. Notes: Apple juice is a phrase because the words apple and juice are not delimited with a comma; even if the words apple and juice both appear somewhere in the message, no match will be registered unless they occur together, as apple juice Trend Micro Incorporated 155
18 Trend Micro ScanMail for Exchange Student Textbook The capitalization and exact-match properties of synonyms are consistent with those defined on the Content Filter screen. In other words, if the word red appears in the synonyms list, it will register a match with the word redundant only if Exact Match is not enabled. Likewise, the word red will trigger a match with the word Red in the message text only if Case-Sensitive Comparison is not enabled. Take No Action If Message Contains You can define exceptions or anti-keywords that will apply to all rule sets and override the designated action for those rules. Enter the words you want to trigger and override in the Use the Take NO Action If Message Contains field on the Add/Edit Policy configuration screen to define For example, if you want the Human Resources (HR) manager to see all inbound messages that contain her name, you enter her name in the Take NO Action If Message Contains field. Inbound messages that contain the HR manager s name will be forwarded to her regardless of the other content of the message. Even if all the values specified in a keyword list are detected in a message, no action will be taken if any of the words or phrases that appear in the exclusion field are also found. Note: You can designate only one exclusion for each policy. You cannot create multiple exclusion lists for a single policy. Example If your policy is to block Free Offer but you do not want to block that includes the option for users to take themselves off the mailing list, you could include a phrase such as To remove yourself from this list, in the Take NO Action If Message Contains field. Use a comma as a delimiter if you would like to enter multiple phrases. For example, you can create a new policy and add keywords such as the following to cover a wide range of remove phrases: remove in the subject line remove in the SUBJECT remove in the subject line remove in the subject line remove list Disable case-sensitive comparisons in the Content Filter screen so that the filter will register a match for remove, REMOVE, ReMove, and so on Trend Micro Incorporated
19 Chapter 7: Configuring ScanMail emanager Import Files You can develop import files to augment an existing content filter policy. These files might include an existing list of keywords exported from a database or spreadsheet program from the U.S. Federal Trade Commission s dirty-dozen list of the worst spam scams or from keyword lists solicited from department heads and other concerned individuals in your organization. Import Files must contain only ASCII characters. To edit an import list, you use an ASCII editor (such as Notepad) and disable any Word Wrap feature. Quotation marks should not be used. Use a comma to delimit individual words and phrases within a policy. Notifications Whenever the content filter acts upon an message, ScanMail emanager can notify the administrator and others. Content-filter notifications are policy-based to allow different people to be notified depending on which policy registers the rule violation. For example, you might want to notify your HR department whenever the Sexual Harassment or Racial Harassment policy triggers a match. Using the Keyword Lists That Trend Micro Provides Trend Micro provides special keyword lists that are designed to efficiently filter certain types of spam and other unwanted based on message content. These keyword lists go beyond the quick header checking that the spam filter performs. Instead, they filter messages based on an analysis of the actual message content. Import files, like the rule file, are updated monthly by Trend Micro and can be downloaded on demand or scheduled for automatic downloads. Editing Profanity and Discrimination Lists The Profanity list includes keywords such as four-letter words and other keywords that could be used in offensive ways. You can edit this list to suit your needs. The Racial Discrimination list is used to store words that are considered to be racist and offensive. This list contains words that are commonly considered offensive and do not have alternate meanings that are not offensive. You can add as many terms to this list as you want. The Sexual Discrimination list includes words that are considered to be sexually harassing or inappropriate. This list is intentionally brief. The keywords listed are words that generally do not have alternate meanings that are not offensive Trend Micro Incorporated 157
20 Trend Micro ScanMail for Exchange Student Textbook Editing Hoaxes and Chain Mail Policies The Hoax list contains keywords that in combination can be used to identify some of the most common hoaxes on the Internet. These warning messages often describe fantastical or impossible virus or Trojan program characteristics but appear to be real. Forwarding these hoax warnings to friends and co-workers only perpetuates the problem. Other hoaxes offer bogus free gifts or other items not appropriate for a corporate environment. The Chain Mail list contains several keyword phrases that can be used to identify chain letters. Chain letters are sometimes get rich quick schemes. A typical chain letter includes names and addresses of several individuals whom you may or may not know. You are instructed to send a certain amount of money to the person at the top of the list, and then eliminate that name and add yours to the bottom of the list. You are then instructed to mail copies of the letter to a few more individuals. Chain letters have several problems. Even when delivered on the Internet, chain letters are illegal if they request money or other items of value and promise a substantial return to the participants. Chain mail that does not request money can bog down networks and contribute to a spam mail problem. Chain mail can also be offensive and might contain threats that if you do not forward them, you will experience bad luck. You can edit the Chain mail list to add chain letter phrases that are prevalent at your organization. Editing the HTML Script Message List The HTML Script Message list contains several entries that are generally found in all HTML scripts. Some HTML scripts have been known to contain code that executes destructive commands on user computers. If HTML scripting is an important part of your company s business, be careful when using this option. Configuring Global Policy Settings Three options on the Content Filter screen are global, which means they apply to all policies: Use exact matches only Case-sensitive comparisons Enable scanning the content of attached files Note: When enabled, the global options are applied to the keyword list and any included synonyms that are defined in the Add/Edit page of every policy Trend Micro Incorporated
21 Chapter 7: Configuring ScanMail emanager Exact Matches For content filtering, the Use Exact Matches Only option applies to all policies in the Policies list. If you do not select exact matches, every keyword or phrase used in every list for every policy will be used for partial-word matches. Accepting partial-word matches can significantly increase the incidence of false positives. Trend Micro therefore recommends that you enable Use Exact Matches Only for content filtering. Case-sensitive comparisons By default, keyword comparisons are not case sensitive. To specify a case-sensitive comparison, select the Case-Sensitive Comparison check box next to the desired field. Enable Scanning the Content of Attached Files You can select Enable Scanning the Content of Attached Files to scan the text of attachments for content violations. ScanMail emanager can scan the content of non-encoded text files and Microsoft Word documents. Note: Scanning the content of attached files takes longer than scanning only the message subject and message body Trend Micro Incorporated 159
22 Trend Micro ScanMail for Exchange Student Textbook Chapter 7 Summary and Review Questions Summary ScanMail emanager allows administrators to create innumerable filters to block spam and objectionable content. Rules can be created to filter messages based on case, exact- or partial-word matches, wildcards, To: From: cc: and Subject: lines, attachment or message size, attachment type, specific words or phrases, and HTML script. For the content filter, keyword lists can be configured to filter out words or groups of words and their synonyms using proximity or frequency of use as filtering criteria. Review Questions 1. Which is NOT a default setting of the spam and content filters? a. Case sensitivity b. Partial-word matches c. No wildcard characters d. Messages that match filtering criteria can be quarantined, archived, or deleted. 2. For the spam filter, which information is compared against the rules defined on the Add/Edit page? a. header b. Message body c. Attachment information d. All of the above 3. When defining attachment-blocking rules, you can use the asterisk wildcard. a. True b. False 4. When keywords are on a single line, delimited by a comma, what is the relationship between the words? a. They are joined by AND. b. They are joined by OR. c. They are synonyms of the same word. d. They are part of the global policy. 5. Given the keywords cat, rat, dog, howling werewolf on the same line, which of the following would score a match? a. A message that contains the words cat, rat, dog, howling, and werewolf b. A message that contains cat, rat, dog, and howling werewolf c. A message that contains either cat, rat, dog, or howling werewolf d. Only a message that contains cat, rat, dog, and howling werewolf in that order Trend Micro Incorporated
Chapter 6: ScanMail emanager
Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the purpose of ScanMail emanager
http://www.trendmicro.com/download/documentation/ http://www.trendmicro.com/license Document Part No. SEEM50893/11101
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
Symantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
Symantec Hosted Mail Security. Console and Spam Quarantine User Guide
Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license
How to Use Red Condor Spam Filtering
What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies
PureMessage for Microsoft Exchange Help. Product version: 4.0
PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9
Email DLP Quick Start
1 Email DLP Quick Start TRITON - Email Security is automatically configured to work with TRITON - Data Security. The Email Security module registers with the Data Security Management Server when you install
ModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
Email Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your
Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
TREND MICRO. InterScan VirusWall 6. SMTP Configuration Guide. Integrated virus and spam protection for your Internet gateway.
TM TREND MICRO TM TM InterScan VirusWall 6 Integrated virus and spam protection for your Internet gateway for Linux TM SMTP Configuration Guide Trend Micro Incorporated reserves the right to make changes
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
Core Protection Suite
Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3
Administration Guide Revision E. SaaS Email Protection
Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
Overview. Accessing the User Interface. Logging In. Resetting your Password
Overview The message filtering service lets a company easily provide real-time spam and virus filtering, attack blocking, and email-traffic monitoring across a user deployment of any size. Users receive
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
PureMessage for Microsoft Exchange Help. Product version: 3.1
PureMessage for Microsoft Exchange Help Product version: 3.1 Document date: June 2015 Contents 1 About PureMessage for Microsoft Exchange...4 2 Key concepts...5 2.1 Key concepts overview...5 2.2 Inbound,
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
How to Access Your Private Message Center if you need more control
How to Access Your Private Message Center if you need more control If and When you log in to your message center for the first time, you will be asked to change your password. It needs to be at least six
Sophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
Word/phrase filtering with Policy Patrol
Policy Patrol 10 Technical Documentation October 28, 2014 Word/phrase filtering with Policy Patrol Policy Patrol can search emails for words and phrases by making use of word/phrase filters. For anti-spam
Core Filtering Admin Guide
Core Filtering Admin Guide 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Table of Contents Login... 3 Overview... 3 Quarantine...
MailEnable Web Mail End User Manual V 2.x
MailEnable Web Mail End User Manual V 2.x MailEnable Messaging Services for Microsoft Windows NT/2000/2003 MailEnable Pty. Ltd. 486 Neerim Road Murrumbeena VIC 3163 Australia t: +61 3 9569 0772 f: +61
No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution
A Filter inaccuracies No filter is perfect. But with your help, MailCleaner may aim at perfection. The filtering system implemented by MailCleaner relies on automated and systematic controls that cannot
How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)
MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE
Barracuda Spam & Virus Firewall User's Guide 5.x
Barracuda Spam & Virus Firewall Barracuda Spam & Virus Firewall User's Guide 5.x This guide describes how you can check your quarantined messages, classify messages as spam and not spam, manage whitelisting
Webmail Instruction Guide
Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with
How does the Excalibur Technology SPAM & Virus Protection System work?
How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being
About the Junk E-mail Filter
1 of 5 16/04/2007 11:28 AM Help and How-to Home > Help and How-to About the Junk E-mail Filter Applies to: Microsoft Office Outlook 2003 Hide All The Junk E-mail Filter in Outlook is turned on by default,
Junk Email Filtering System. User Manual. Copyright Corvigo, Inc. 2002-03. All Rights Reserved. 509-8282-00 Rev. C
Junk Email Filtering System User Manual Copyright Corvigo, Inc. 2002-03. All Rights Reserved 509-8282-00 Rev. C The Corvigo MailGate User Manual This user manual will assist you in initial configuration
novdocx (en) 11 December 2007 VIDistribution Lists, Groups, and Organizational Roles
VIDistribution Lists, Groups, and Organizational Roles Chapter 17, Understanding Distribution Lists, Groups, and Organizational Roles, on page 263 Chapter 18, Creating and Managing Distribution Lists,
Purchase College Barracuda Anti-Spam Firewall User s Guide
Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to
Using the Barracuda Spam Firewall to Filter Your Emails
Using the Barracuda Spam Firewall to Filter Your Emails This chapter describes how end users interact with the Barracuda Spam Firewall to check their quarantined messages, classify messages as spam and
How To Manage Your Spam On Graymail On Pc Or Macodeo.Com
User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
Managing Junk E-mail Folder in Outlook 2010. This document contains instructions for users on how to manage spam filters in Microsoft Outlook 2010.
Ready Reference 041013 Introduction Managing Junk E-mail Folder in Outlook 2010 This document contains instructions for users on how to manage spam filters in Microsoft Outlook 2010. Manual Filtering of
Sophos for Microsoft SharePoint Help. Product version: 2.0
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2
Email Protection for your account
User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
Administration Guide Revision A. SaaS Email Protection
Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Focus On echalk Email. Introduction. In This Guide. Contents:
Focus On echalk Email Introduction Email can be very useful in a school setting. For instance, instead of writing out a memo and delivering it to everyone s mailbox in the main office, you can simply send
Stop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
KUMC Spam Firewall: Barracuda Instructions
KUMC Spam Firewall: Barracuda Instructions Receiving Messages from the KUMC Spam Firewall Greeting Message The first time the KUMC Spam Firewall quarantines an email intended for you, the system sends
Admin Quick Start Guide Email Protection Service Anti-Virus & Anti-Spam
Admin Quick Start Guide Email Protection Service Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: January, 2010 Email Protection Admin Quick Start Guide / Table of Contents Page 2 of 17 Table of Contents
The online email environment
The online email environment These are the options for the selected application. Navigation Pane is comprised of a folders list and oneclick access to your Inbox, Calendar, Contacts, and Tasks folders
Mimecast Services for Outlook (MSO4)
Mimecast Services for Outlook (MSO4) End User Quick Start Guide for Outlook 2010/2013 Mimecast Services for Outlook (MSO 4) is a software application that integrates with your Microsoft Outlook. Once installed,
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
How To Manage Your Quarantine Email On A Blackberry.Com
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
Green House Data Spam Firewall Administrator Guide
Green House Data Spam Firewall Administrator Guide Spam Firewall Administrator Guide... 2 Navigating the Web Interface... 2 How to Drill Down from the DOMAINS Page to Account Level... 2 Message Logs...
Service Launch Guide (US Customer) SEG Filtering
Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required
Using the Barracuda to Filter Your Emails
Using the Barracuda to Filter Your Emails The following describes how end users interact with the Barracuda to check their quarantined messages, classify messages as spam and not spam, and modify their
Spam Manager User Guide. Boundary Defense for Email Anti-Spam End User Guide
Spam Manager User Guide Boundary Defense for Email Anti-Spam End User Guide DOCUMENT REVISION DATE: Feb 2012 Spam Manager User Guide / Table of Contents Page 2 of 24 Table of Contents OVERVIEW... 3 1 ABOUT
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Cloud Services. Cloud Control Panel. Admin Guide
Cloud Services Cloud Control Panel Admin Guide 10/18/2014 CONTENTS Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control... 2 Features Summary... 3 Creating an Encryption
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel Table of Contents Incoming... 1 Incoming Spam Quarantine... 2 Incoming Log Search... 4 Delivery Queue... 7 Report Non-Spam...
Filtering E-mail for Spam: PC
Filtering E-mail for Spam: PC Last Revised: April 2003 Table of Contents Introduction... 1 Objectives... 1 Filtering E-mail for Spam... 2 What Is Spam?... 2 What Is UT Doing About Spam?... 2 What Can You
Barracuda User Guide. Managing your Spam Quarantine
Managing your Spam Quarantine Barracuda User Guide Step1: Open your internet browser and go to http://myspam.datatechhosting.com this will automatically redirect you to Barracuda s email security service
Mailgate Ltd. MailGate Spam Filter User Manual
Mailgate Ltd. MailGate Spam Filter User Manual Microsoft is a registered trademark and Windows 95, Windows 98 and Windows NT are trademarks of Microsoft Corporation. Copyright 2001 Mailgate Ltd. All rights
Web Mail Classic Web Mail
April 14 Web Mail Classic Web Mail Version 2.2 Table of Contents 1 Technical Requirements... 4 2 Accessing your Web Mail... 4 3 Web Mail Features... 5 3.1 Home... 5 3.1.1 Mailbox Summary... 5 3.1.2 Announcements...
Trend Micro Hosted Email Security. Best Practice Guide
Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described
University of Mary s Spam Solution
University of Mary s Spam Solution Spam is a growing problem worldwide. Spam causes productivity loss, network traffic, vast amount of corporate resources to be consumed and valuable server space to be
Configuring Event Log Monitoring With Sentry-go Quick & Plus! monitors
Configuring Event Log Monitoring With Sentry-go Quick & Plus! monitors 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! Many server-based applications, as well as Windows
If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:
ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This
Avira Exchange Security Small Business Edition. Quick Guide
Avira Exchange Security Small Business Edition Quick Guide Table of contents Table of contents 1 Introduction...3 2 System requirements...4 3 The Avira Exchange Console...5 3.1 Virus Scanner status...6
Email Security 8.0 User Guide
Email Security 8.0 User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to
Outlook 2010 basics quick reference sheet
Outlook 2010 basics Microsoft Outlook 2010 is the world s leading personal information management and communications application. Outlook 2010 delivers complete e-mail, contact, calendar, and task functionality.
Message Archiving User Guide
Message Archiving User Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com RESTRICTION ON USE, PUBLICATION,
What browsers can I use to view my mail?
How to use webmail. This tutorial is our how-to guide for using Webmail. It does not cover every aspect of Webmail; What browsers can I use to view my mail? Webmail supports the following browsers: Microsoft
Policy Based Encryption Gateway. Administration Guide
Policy Based Encryption Gateway Administration Guide Policy Based Encryption Gateway Admin Guide 1 Contents Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control...
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
User Guide. ThreatTrack Security Product Manual
User Guide ThreatTrack Security Product Manual Copyright 2014 ThreatTrack Security, Inc. All Rights Reserved. The legal rights, license, and warranties of the software product described herein are governed
Managing Spam in E-Mail & More Introduction Spam Detector Block Sender E-Mail Filters
Managing Spam in E-Mail & More Managing Spam in E-Mail & More Introduction Spam Detector Block Sender E-Mail Filters 1 Verizon Online 2 Managing Spam in E-Mail & More Managing Spam in E-Mail & More Introduction
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.
Version 5.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2012, Barracuda Networks
Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
MX LOGIC SPAM FILTERING
MX LOGIC SPAM FILTERING 21 March 2009, Version 1.0 WHAT IS MX LOGIC? In response to the large amount of spam received on KickStart email addresses, the organization has enlisted MX Logic, a hosted filtering
AppShore Premium Edition Campaigns How to Guide. Release 2.1
AppShore Premium Edition Campaigns How to Guide Release 2.1 Table of Contents Campaigns Overview...3 How to create a Campaign Message...3 How to create a List...5 How to relate a Message to a List...6
Using Your New Webmail
Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...
Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS
Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS 03Archer.indd 71 8/4/05 9:13:59 AM Address Book 3.1 What Is the Address Book The Address Book in Outlook is actually a collection of address books
Email Migration Manual (For Outlook Express 6)
Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change
Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php
Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
Filtering Service. Secure E-Mail Gateway (SEG) Service Administrative Guides. Revised February 2013
Secure E-Mail Gateway (SEG) Service Administrative Guides Filtering Service Revised February 2013 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained
Icebox - Sendio SPAM Filter
Icebox - Sendio SPAM Filter Sendio Icebox The Navajo Department of Information Technology (DIT) installed and implemented a SPAM filter in 2008 to capture unwanted mail before it gets to your email inbox.
Email - Spam Spam Email Firewall How Does the Spam Firewall Work? Getting Started username Create New Password
Email - Spam Spam Email Firewall ODU s Information Services has implemented a Spam Firewall to help you manage spam e-mail from Internet senders. Generally defined, spam e-mail is an unsolicited mailing,
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
T E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
