Symantec Hosted Mail Security. Console and Spam Quarantine User Guide
|
|
|
- Randolf McBride
- 10 years ago
- Views:
Transcription
1 Symantec Hosted Mail Security Console and Spam Quarantine User Guide
2 Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright notice Copyright 2006 Symantec Corporation. All rights reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, Stevens Creek Blvd., Cupertino, CA Trademarks Symantec, the Symantec logo, Symantec TurnTide and Norton AntiVirus are U.S. registered trademarks of Symantec Corporation. LiveUpdate, LiveUpdate Administration Utility, Symantec AntiVirus, and Symantec Security Response are trademarks of Symantec Corporation. Other brands and product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America
3 Contents Chapter 1 Chapter 2 Chapter 3 Introduction How Symantec Hosted Mail Security works... 5 About filtering... 6 Types of Actions... 7 False positives and missed spam... 7 Reporting missed spam to Symantec... 8 Reporting false positives to Symantec... 8 The Spam Quarantine Report About the Spam Quarantine Report About the Spam Quarantine Summary Using the console Overview of the Symantec Hosted Mail Security Console Setting or changing your password Requesting a password Resetting your password Changing your password Logging into the Symantec Hosted Mail Security Console Managing your personal Message Quarantine Selecting which addresses to include Reviewing a single quarantined Releasing multiple s Deleting multiple s Adding senders to an Allow list from the Message Quarantine Adding senders to a Deny list from the Message Quarantine Maintaining Allow and Deny lists Adding a single sender to an allow or deny list Adding multiple senders to an Allow or Deny list Removing senders from an Allow or Deny list Saving an Allow or Deny list to a file Configuring your preferences Turning spam filtering on or off Selecting spam actions Selecting Spam Quarantine Report frequency... 28
4 4 Contents Selecting Spam Quarantine Report content Setting the time zone for your processing Choosing language filtering options Maintaining your alias addresses When you add an alias address Converting a primary address to an alias address Deleting associated addresses Accessing the User Aliases settings Selecting which address is primary Adding an alias address Deleting an alias address... 35
5 Chapter 1 Introduction This chapter includes the following topics: How Symantec Hosted Mail Security works About filtering How Symantec Hosted Mail Security works Symantec Hosted Mail Security lets you manage your personal Message Quarantine for spam messages. Symantec Hosted Mail Security quarantines s that are suspected to be spam in a safe location. Depending on the configuration of your hosted mail service, you will receive Spam Quarantine Reports or a text-based message via on a regular basis notifying you that you have quarantined . You can manage your quarantined using the Symantec Hosted Mail Security Console. You can log into the Symantec Hosted Mail Security Console using a Web browser or you can click a link in the Spam Quarantine Report or Spam Quarantine Summary. Depending on your system s configuration, you can perform any of the following tasks: Create or change your password for the Symantec Hosted Mail Security Console ( Logging into the Symantec Hosted Mail Security Console on page 19) Log into the Symantec Hosted Mail Security Console ( Logging into the Symantec Hosted Mail Security Console on page 19) Manage the s in your quarantine area ( Managing your personal Message Quarantine on page 19) Manage your personal Allow Sender and Deny Sender lists ( Maintaining Allow and Deny lists on page 23)
6 6 Introduction About filtering Configure additional addresses to be included in your Spam Quarantine Report ( Maintaining your alias addresses on page 30) Configure settings controlling your Spam Quarantine Report and spam filtering ( The alias address is deleted immediately. on page 35) From the Spam Quarantine Report, you can perform most of the same actions that are available in the Symantec Hosted Mail Security Console ( The Spam Quarantine Report on page 11). Note: The administrator for your organization determines which features are available for you to use. This guide assumes that all the features are available and enabled. If you see a feature described in this manual that you cannot access, contact your administrator. About filtering The administrator for your organization has configured the types of filtering and resultant actions that will be applied to your . Depending on the configurations, Symantec Hosted Mail Security will typically perform the following filtering: Virus and Worm Scanning Symantec Hosted Mail Security determines whether an s attachment contains any known viruses or worms and if it does, performs the configured action on the . Spam Blocking Symantec Hosted Mail Security analyzes the to see if it is likely spam and, depending on the likelihood level, performs the configured action on the . Content Filtering Symantec Hosted Mail Security analyzes the to see if it violates configured content policies (for example, contains profanity, HTML links to images, or certain languages) and if it does, performs the configured action on the . Attachment Filtering Symantec Hosted Mail Security analyzes the s attachment to see if it violates configured attachment policies (for example, exceeds a specified file size or is an executable program) and if it does, performs the configured action on the . Additional filtering Symantec Hosted Mail Security performs any other filtering as configured by the administrator (for example, filter clickthroughs on hyperlinks in s, use domain-level Allow Sender and Deny Sender lists, etc.).
7 Introduction About filtering 7 Types of Actions Based on the defined policy configuration, each that violated the specified policy can have any of the following actions taken: False positives and missed spam Do Nothing or Allow Delivery The is forwarded to your address with no processing applied. Quarantine The is added to the respective quarantine area and is not sent to your address. If the violated a spam policy, the is reported in your Spam Quarantine Report. Quarantined s can be viewed, deleted, and/or released to be sent to your address. Be aware that you can manage only s that were quarantined because of spam. You cannot access s that were quarantined because of viruses, attachments, or content. Only the administrator can view and manage those s. Tag The subject line of the has a descriptive phrase (for example, [SPAM] ) added to the beginning of the subject text and the is sent to your address. Deny Delivery The is blocked automatically. Depending on the sending system s configuration, you or the sender may or may not be notified. Strip Attachment If the had an attachment that violated attachment policies, this action causes that attachment to be removed from the and the is be sent to your address. Text is inserted into the notifying you that an attachment has been stripped. Only the attachment that violated the attachment policy is stripped. Clean If the had an attachment that contained a virus or worm, this action attempts to remove the virus or worm and preserve the attachment. If the clean is successful, text is inserted into the notifying you that an attachment had contained a virus and was cleaned. If you have received that you feel should have been filtered, do the following 1 Check that the sending address was not added to an Allow Sender list by either you or your administrator. 2 Confirm that you did not designate that your s are not filtered for spam.
8 8 Introduction About filtering 3 Confirm with your administrator that the policy settings in Symantec Hosted Mail Security have not been changed to allow these s to bypass filtering (for example, the sender address has been added to the global Allow list, or the spam filtering feature has been turned off at the domain level). Reporting missed spam to Symantec You can submit spam or suspected spam messages that were not detected by the hosted mail security service to Symantec Security Response. Symantec engineers will analyze the message for spam characteristics and will issue updates to the spam filtering rules as needed. You should submit the missed spam within 24 hours of when you received the message to ensure timely updates and to avoid analyzing messages for which updated rules have already been issued. You can submit the missed spam to one of the following addresses: North America [email protected] Europe, Middle East, Africa [email protected] Japan, Asia, Pacific Rim [email protected] Note: These addresses are for missed spam messages only. You must submit the message as an RFC-822 MIME-encoded attachment. You should include all header information, content, and attachments. Reporting false positives to Symantec You can submit messages that were incorrectly tagged as spam to Symantec Security Response. Symantec engineers will analyze the message and issue updates to the spam filtering rules as needed. You can submit false positives to one of the following addresses: North America [email protected]
9 Introduction About filtering 9 Europe, Middle East, Africa [email protected] Japan, Asia, Pacific Rim [email protected] Note: These addresses are for false-positive messages only. You must send the message as an RFC-822 MIME-encoded attachment. You should include all header information, content, and attachments.
10 10 Introduction About filtering
11 Chapter 2 The Spam Quarantine Report This chapter includes the following topics: About the Spam Quarantine Report About the Spam Quarantine Summary About the Spam Quarantine Report The Spam Quarantine Report is an automatically generated report that is sent to your primary address. It lists the messages that have been filtered because of potential spam content. The Spam Quarantine Report includes that was quarantined for your primary address and any associated alias addresses ( Maintaining your alias addresses on page 30). If you or your administrator has configured your user account to receive textbased notifications of quarantined spam s, you will receive a Spam Quarantine Summary instead of a Spam Quarantine report ( About the Spam Quarantine Summary on page 14). If your administrator has enabled this feature, the Spam Quarantine Report contains hyperlink commands that let you manage your quarantined and change your configuration settings. After you click a command, you are automatically logged into the Symantec Hosted Mail Security Console and the appropriate page is displayed. Depending on the selected command, you will see the results of the command action or you can continue with the desired action in the Symantec Hosted Mail Security Console.
12 12 The Spam Quarantine Report About the Spam Quarantine Report In addition to the hyperlink commands, your Spam Quarantine Report contains the following information: All addresses whose quarantined s are included in the report Date, time, and time zone when an was quarantined Sender address of the quarantined Subject line of the quarantined Spam score of the quarantined A score of 90-99% indicates a medium likelihood that the is spam. A score of % indicates a high likelihood that the is spam. File size, including all attachments, of the quarantined Warning: If you provide your Spam Quarantine Report to someone else (for example, by forwarding it in your application), that person can log in to the Symantec Hosted Mail Security console as you using the links in the , and has complete access to your configuration settings and your quarantined messages. Your administrator may have designated that the commands in the Spam Quarantine Report expire after a set period of time. If you click a command that has expired, you will be prompted to log on to the console by using your user name and password. The following list provides information about each command in the Spam Quarantine Report and the correlating page or option in the Symantec Hosted Mail Security Console. The commands in Table 2-1 are available in the Spam Quarantine Report only if your administrator has configured the Spam Quarantine Reports to include them. Also, some commands may not be available in the console if your administrator has disabled those features in Symantec Hosted Mail Security. Table 2-1 Cross-reference of Features Between Spam Quarantine Report and Symantec Hosted Mail Security Console Action Description Spam Quarantine Report Symantec Hosted Mail Security Console Manage primary and alias addresses Manage My Addresses command User Aliases page ( Maintaining your alias addresses on page 30)
13 The Spam Quarantine Report About the Spam Quarantine Report 13 Table 2-1 Cross-reference of Features Between Spam Quarantine Report and Symantec Hosted Mail Security Console Action Description Spam Quarantine Report Symantec Hosted Mail Security Console View s quarantined on a specified date View contents Release an for delivery Add sender address to allow list and release the for delivery Add sender address to deny list (if enabled) and delete the Display a page to view quarantine for this day command Subject command in the desired Release command next to the desired Always Allow command next to the desired Deny command next to the desired Message Quarantine page with a specific date selected ( Managing your personal Message Quarantine on page 19) Subject command on the Message Quarantine page ( Reviewing a single quarantined on page 20) Release button on the Safe Message View page ( Reviewing a single quarantined on page 20) Allow/Deny Sender Lists page ( Adding a single sender to an allow or deny list on page 23) Allow/Deny Sender Lists page ( Adding a single sender to an allow or deny list on page 23) Delete all the quarantined Delete All Messages command Note: Only those messages listed in the current report will be deleted. If there are more s in your spam quarantine that are not listed, you must log into the Symantec Hosted Mail Security Console to delete all the messages in your spam quarantine area. Select All checkbox and delete button on the Message Quarantine page ( Deleting multiple s on page 21) Set your preferences for Spam Quarantine Reports and spam filtering. The click here command in the To change your spam report settings, click here at the bottom of the Spam Quarantine Report. Preferences page ( The alias address is deleted immediately. on page 35)
14 14 The Spam Quarantine Report About the Spam Quarantine Summary About the Spam Quarantine Summary You will receive the Spam Quarantine Summary if you or your administrator has configured your user account to receive text-based notifications of quarantined spam s instead of the Spam Quarantine Report. Usually, this option is designated if your application does not support HTML content, which the Spam Quarantine Report contains. The Spam Quarantine Summary indicates how many new s have been quarantined as spam since the last Summary and the total number of quarantined spam s in your spam quarantine. You can click the hyperlink in the to log into the Symantec Hosted Mail Security Console or you can copy the entire hyperlink into the Address field of your Web browser. Once you are logged into the Symantec Hosted Mail Security Console, the Message Quarantine page is displayed (see Managing your personal Message Quarantine on page 19 for more information).
15 Chapter 3 Using the console This chapter includes the following topics: Overview of the Symantec Hosted Mail Security Console Setting or changing your password Logging into the Symantec Hosted Mail Security Console Managing your personal Message Quarantine Maintaining Allow and Deny lists Configuring your preferences Maintaining your alias addresses
16 16 Using the console Overview of the Symantec Hosted Mail Security Console Overview of the Symantec Hosted Mail Security Console The Symantec Hosted Mail Security Console contains options for you to use to navigate through the available pages: Quarantine displays the Message Quarantine page, where you manage your quarantined messages (potential spam). Allow / Deny displays the Allow/Deny Sender Lists page ( Maintaining Allow and Deny lists on page 23) where you manage your personal allow and deny lists. Setup displays the Configuration page where you can change your password ( Logging into the Symantec Hosted Mail Security Console on page 19), set your preferences ( The alias address is deleted immediately. on page 35) or maintain your alias addresses ( Maintaining your alias addresses on page 30). Logout logs you out of the Symantec Hosted Mail Security Console. Setting or changing your password Requesting a password The first time you use the Symantec Hosted Mail Security Console, you must set a password that you will use thereafter to login. After you have logged into the Symantec Hosted Mail Security Console, you can change your password at any time. Your password must be at least 6 characters long and cannot contain spaces. Passwords are case-sensitive. For security reasons, avoid using simple passwords t hat can easily be discovered. If you do not have a password or have forgotten it, you can access the Console from your Spam Quarantine Report, if you have received one. If you have forgotten your password and you have not received a Spam Quarantine Report, see Requesting a password on page 16. If you do not have a password or have forgotten it, you can request a new password. An message will be sent to your address that contains a hyperlink that lets you reset your password. You can request a password through the Symantec Hosted Mail Security Console or through your Spam Quarantine Report
17 Using the console Setting or changing your password 17 Resetting your password To request a password using the console log on page 1 In your Web browser, go to the Symantec Hosted Mail Security portal at: 2 On the Login page, click the hypertext link that is contained in the following line: If you can t remember your password or if you are having problems logging in, please click here. 3 Type your address in the Address box and click Submit. After Symantec Hosted Mail Security validates the address, you will receive an message that contains a hyperlink that lets you reset your password. The hyperlink is active for only a limited time after the is sent (typically, 60 minutes). To request a password using your Spam Quarantine Report 1 At the bottom of your Spam Quarantine Report, click the hyperlink that is contained in the following line: To set a Hosted Mail Security Console password enabling you to login to your message quarantine, click here. Your default Web browser opens and you are automatically logged on to the Symantec Hosted Mail Security Console and the Configuration > Password Change page is displayed. 2 Click the here hyperlink that is contained in the following text: If you have not yet set a password or have forgotten your existing password, click here and an will be sent to your mailbox allowing you to set a new password. After Symantec Hosted Mail Security validates the address, you will receive an message that contains a hyperlink that lets you reset your password. The hyperlink is active for only a limited time after the is sent (typically, 60 minutes). Use this procedure to reset your password after you receive the message from Symantec Hosted Mail Security that contains the instructions and hyperlink for resetting your password. To reset your password 1 In the message from Symantec Hosted Mail Security, click the hyperlink that is contained in the message to display the Configuration > Set Password page. The Set Password page is displayed.
18 18 Using the console Setting or changing your password 2 In the New Password field, type the password you want to use. The typed text appears as dots for security reasons. 3 In the Retype New Password field, retype the password you want to use, exactly as you typed it in step 2. 4 Click Continue. If the password change was successful, a confirmation is displayed. 5 Click OK to continue. Your password is set. Changing your password Perform this procedure to change your existing password. To change your password 1 Do one of the following: Click the click here command in the following text at the bottom of the Spam Quarantine Report that you received: To set a Symantec Hosted Mail Security Console password enabling you to login to your message quarantine, click here. Your default Web browser opens and you are automatically logged on to the Symantec Hosted Mail Security Console and the Configuration > Password Change page is displayed. If you already have a password, log into the Symantec Hosted Mail Security Console and click Setup. The Password Change page is displayed. 2 In the Old Password field, type your existing password. This step validates that you are authorized to change the password for the designated address. 3 In the New Password field, type the new password you want to use. The typed text appears as dots for security reasons. 4 In the Retype New Password field, retype the password you want to use, exactly as you typed it in step 3. 5 Click Continue. Your password is set.
19 Using the console Logging into the Symantec Hosted Mail Security Console 19 Logging into the Symantec Hosted Mail Security Console You can log on to the Symantec Hosted Mail Security Console using any of the following methods: Click a command in your Spam Quarantine Report or Spam Summary Report. Your Spam Quarantine Report contains multiple commands that automatically log you on to the Symantec Hosted Mail Security Console. Log on directly to the Symantec Hosted Mail Security Console. Your address and password must be registered in Symantec Hosted Mail Security to log on to the console directly. If you do not have a user account, contact your administrator. If the Symantec Hosted Mail Security Console detects that no activity has taken place for a specific time interval (typically, 3 hours), it automatically logs you out. To log on to the Symantec Hosted Mail Security Console 1 In your Web browser, go to the Symantec Hosted Mail Security portal at: 2 On the Symantec Hosted Mail Security Console Login page, in the Address field, type the full address of the primary or alias account that you want to use. 3 In the Password field, type your password. Passwords are case-sensitive. 4 If desired, choose an alternate language from the Language drop-down list. This preference will be saved for you the next time you log in. 5 Click Login. This opens the Symantec Hosted Mail Security Console and displays the Message Quarantine page. Managing your personal Message Quarantine The Message Quarantine contains messages that were quarantined because of potential spam content as defined by the policies set by your administrator.
20 20 Using the console Managing your personal Message Quarantine You can do the following from the Message Quarantine page: View the contents of quarantined messages (See Reviewing a single quarantined on page 20). Delete unwanted messages (See Deleting multiple s on page 21). Release messages, which removes them from the quarantine and sends them to your primary address (See Releasing multiple s on page 21). Select the addresses that you want to include in the report, if you have alias addresses that are associated with your primary address (See Maintaining your alias addresses on page 30). Select specific sender (from) addresses from which will always be received or denied (See Maintaining Allow and Deny lists on page 23). The Message Quarantine opens by default when you first log on to the console. You can sort the information in the Message Quarantine page by column headings. You can view all of the messages that are in your quarantine or filter by dates. Selecting which addresses to include You can select which of your associated addresses to view on the Message Quarantine page. For example, you can view all your addresses, only your primary address, or any of your alias addresses. If you have no alias addresses associated with this primary address, this option is not available. See Maintaining your alias addresses on page 30 for more information about primary and alias addresses. To select which addresses to include 1 From the Symantec Hosted Mail Security Console, click Quarantine. 2 On the Message Quarantine page, in the Sent To list, select the address option that you want to use. Reviewing a single quarantined You can view the contents of a single and then delete or release it. The is opened on a safe page in the Symantec Hosted Mail Security Console for your review.
21 Using the console Managing your personal Message Quarantine 21 To review a single quarantined 1 From the Symantec Hosted Mail Security Console, click Quarantine. 2 On the Message Quarantine page, under the Subject column, click the link to the message that you want to view. The contents open on a Safe Message View page. 3 Do one of the following: Releasing multiple s Deleting multiple s To add the from address to your Allow list, click Always Allow (See Maintaining Allow and Deny lists on page 23). The address is added to the Allow list on the Allow/Deny Sender Lists page. To add the from address to your Deny list, click Always Deny (See Maintaining Allow and Deny lists on page 23). This feature is optional and may be unavailable if your administrator disabled it. The address is added to the Deny list on the Allow/Deny Sender Lists page. To accept the and have it forwarded to your primary address, click Release on the bottom of the Safe Message View page. If the was original sent to an alias address, the is released to the primary address. To delete the , click Delete. 4 To return to the Message Quarantine page, click Quarantine Index. You can release one or more s from the Message Quarantine at the same time. Released s are sent to your primary address. To release multiple s 1 On the Message Quarantine page, select the checkbox in front of each that you want to release, or check the All checkbox to select all of the messages in the list. 2 Click Release to release the selected messages immediately to your primary address. If the message was originally sent to an alias address, the is released to the primary address. You can delete one or more messages at the same time.
22 22 Using the console Managing your personal Message Quarantine To delete multiple messages 1 From the Symantec Hosted Mail Security Console, click Quarantine. 2 On the Message Quarantine page, select the checkbox in front of each that you want to delete, or check the All checkbox to select all of the messages in the list. 3 Click Delete to delete the selected messages immediately. Adding senders to an Allow list from the Message Quarantine You can add the senders of one or more messages in your Message Quarantine to your Allow list. Thereafter, all messages that are received from these addresses will be accepted without filtering for spam content. Messages are always scanned for viruses. To add multiple senders to an Allow list 1 From the Symantec Hosted Mail Security Console, click Quarantine. 2 On the Message Quarantine page, select the checkbox in front of each that you want to delete, or check the All checkbox to select all of the messages in the list. 3 Click Always Allow to add the addresses to your Allow list. Adding senders to a Deny list from the Message Quarantine You can add the senders of one or more messages in your Message Quarantine to your Deny list. Thereafter, all s from these addresses always be denied delivery. To add multiple senders to a Deny list 1 From the Symantec Hosted Mail Security Console, click Quarantine. 2 On the Message Quarantine page, select the checkbox in front of each that you want to delete, or check the All checkbox to select all of the messages in the list. 3 Click Always Deny to add the addresses to your Deny list. This feature is optional and may be unavailable if your administrator disabled it.
23 Using the console Maintaining Allow and Deny lists 23 Maintaining Allow and Deny lists You can define lists of senders whose addresses either will always be accepted without spam filtering (Allow list) or will never be accepted for delivery (Deny list). You can add senders to these lists from the Message Quarantine page or from the Allow/Deny Sender Lists page. Note: A common technique of spammers is to change their sender address often. A deny list may not prevent spam messages from these senders. The deny list primarily is used to block messages from unwanted senders that you know or that have stable addresses. There are two basic definitions of spam that may help you determine whether a sender address should be added to your Deny list: The first type of spam includes unwanted message that are received from recognized senders. For example, a salesperson for a company may be sending you unwanted messages. In this scenario, it is unlikely that the sender address will be changed often, so this type of address would be a good candidate to be added to Deny list. The second type of spam includes unwanted messages that contain malicious, questionable, or offensive content. These types of messages are usually sent from spammers who deliberately attempt to bypass blacklisting and content filtering rules. For example, you may receive messages from a sender with a fraudulent money-making offer or messages that contain offensive sexual content. In this scenario, the spammers often change their addresses and use techniques to evade blacklist filtering. This type of address is not a good candidate to be added to the Deny list because it is effective for only a brief time. Adding a single sender to an allow or deny list You can add a sender address or domain to the designated list. For example, you can do any of the following: Designate a single address (for example, [email protected] ) to force the s received from just that address to be always or never delivered Designate an entire domain (for example, abc.com ) to force the s received from all addresses from that domain to be always or never delivered.
24 24 Using the console Maintaining Allow and Deny lists Use wildcards to enter a range of address (for example, j*@abc.com) to force the s received from all addresses starting with j from that domain to be always or never delivered. The same address cannot be added multiple times in the same list or added to both the Allow and Deny lists. The Allow list overrides the Deny list. For example, if you designate a range of addresses (for example, by designating an entire domain) in the Deny list, but then designate a single address from that domain in the Allow list, the from that single address will be always accepted while the from any other address in the domain in the Deny list will be always denied. Note: Your administrator can also define Allow and Deny lists. In this case, the settings made by the Administrator are applied before your settings. To add a single sender to an allow or deny sender list 1 From the Symantec Hosted Mail Security Console, click Allow/Deny. 2 On the Allow/Deny Sender Lists page, in the appropriate Add Entry box, type the sender address that you want to add to the list 3 Click Add. The address appears in the list box. Adding multiple senders to an Allow or Deny list You can add a predefined list of addresses or domain names to your Allow Sender list or your Deny Sender list. The predefined list must be a text file in the following format: One entry per line (domain name or address) File must be available for your browser to access Each entry in the list can include any of the following: A single address (for example, [email protected] ) to force the s received from just that address to be always or never delivered An entire domain (for example, abc.com ) to force the s received from all addresses from that domain to be always or never delivered Wildcards to enter a range of address (for example, j*@abc.com) to force the s received from all addresses starting with j from that domain to be always or never delivered.
25 Using the console Maintaining Allow and Deny lists 25 Note: The same address cannot be added multiple times in the same list or added to both the Allow and Deny lists. Any duplicate or invalid address or domain names are discarded automatically. The Allow list overrides the Deny list. For example, if you designate a range of addresses (for example, by designating an entire domain) in the Deny list, but then designate a single address from that domain in the Allow list, the from that single address will be always accepted while the from any other address in the domain in the Deny list will be always denied. To add multiple senders to an Allow or Deny list 1 From the Symantec Hosted Mail Security Console, click Allow/Deny. 2 On the Allow/Deny Sender Lists page, in the Upload Allow List or Upload Deny List field, type the full path and file name of the file that contains the list of addresses that you want to add. Optionally, you can browse to the location of the file. 3 Click the appropriate Upload File button. The addresses from the file appear in the appropriate list. Removing senders from an Allow or Deny list. You can remove sender addresses from your Allow or Deny list. To remove senders from an Allow or Deny List 1 On the Symantec Hosted Mail Security Console, click Allow/Deny. 2 On the Allow/Deny Sender Lists page, click to select the sender address in the appropriate list box. 3 Click Remove next to the list box where the sender addresses are selected. Saving an Allow or Deny list to a file You can save the contents of your Allow or Deny list to a file. To save an Allow or Deny list to a file 1 On the Symantec Hosted Mail Security Console, click Allow/Deny. 2 On the Allow/Deny Sender Lists page, click Download List in the appropriate area. 3 Click Save to save the list to a file.
26 26 Using the console Configuring your preferences 4 Type the file name that you want to use and the location in which you want to save the file, and then click Save. Configuring your preferences You specify settings that control your Spam Quarantine Reports and whether your is filtered for spam. Note: This page is only available if your Administrator has enabled spam filtering for your domain or has not disabled your ability to change these settings. You can configure the following preferences: Select whether your is filtered for spam. This feature is optional and may be unavailable if your Symantec Hosted Mail Security Administrator disabled it. Select what action will be taken if an is likely spam. This feature is optional and may be unavailable if your Symantec Hosted Mail Security Administrator disabled it. Select how often you receive Spam Quarantine Reports. This feature is optional and may be unavailable if your Symantec Hosted Mail Security Administrator disabled it. Select which s to include in your Spam Quarantine Report. This feature is optional and may be unavailable if your Symantec Hosted Mail Security Administrator disabled it. Select the time zone used to process your s and Spam Quarantine Reports. This feature is optional and may be unavailable if your Symantec Hosted Mail Security Administrator disabled it. Select what language or languages in which you wish to receive . This feature is set to All Languages by default. To open the Preferences page Do one of the following: On the Message Quarantine page, click the click here link at the bottom of the page. On the Symantec Hosted Mail Security Console, click Setup.
27 Using the console Configuring your preferences 27 Turning spam filtering on or off You can select whether your messages will be filtered for spam content. This feature is optional and may be unavailable if your administrator disabled it. Note: This feature affects all of your associated addresses, including your primary address and all alias addresses. 1 On the Configuration > Preferences page, click to check or uncheck the Do not filter my messages checkbox. 2 Click the Update button below the checkbox description. If you turn off spam filtering, the following occurs: All messages in your spam quarantine are released to your primary address. The Please me a quarantine report every field is set to Never and becomes unavailable. Your is not filtered for spam thereafter. If you activate spam filtering, the following occurs: The Please me a quarantine report every field becomes available. To receive Spam Quarantine Reports, you must change this field to a value other than Never. Your is filtered for spam thereafter. Selecting spam actions You can designate what action will be taken if an is determined to be likely spam. As the Symantec Hosted Mail Security analyzes your , it assigns a likelihood to each that it is spam. If an is determined to have a medium or high likelihood of being spam, the designated action is performed on the . You can choose to use the default actions defined by your Administrator or you can choose different actions. The following actions are available: Quarantine the message: The is added to your Spam Quarantined Messages area and is not sent to you. The is reported in your Spam Quarantine Report. Prepend [SPAM] to message subject: The subject line of the has the phrase [SPAM] ) added to the beginning of the subject text and the is sent to you.
28 28 Using the console Configuring your preferences Deny Delivery: The is blocked automatically. Depending on the sending system s configuration, the sender may or may not be notified. Do Nothing: The is forwarded to you with no processing applied. This feature is optional and may be unavailable if your administrator disabled it. This feature is unavailable if you have turned off spam filtering (see Turning spam filtering on or off on page 27. To select spam actions 1 On the Setup > Configuration > Preferences page, click to check or uncheck the Use Group Actions checkbox. If you checked Use Group Actions, go to step 2. If you unchecked Use Group Actions, select the action to use if your is likely spam. Select the desired action for medium likelihood spam in the Medium Spam Action drop-down list. Select the desired action for high likelihood spam in the High Spam Action drop-down list. 2 Click Update below the Preferences area. Selecting Spam Quarantine Report frequency You can select how often you want to receive your Spam Quarantine Report. This feature is optional and may be unavailable if your administrator disabled it. To select spam quarantine report frequency 1 On the Setup > Configuration > Preferences page, select the desired frequency in the Please me a quarantine report every field: Default: The frequency is set to the default configured by your Symantec Hosted Mail Security Administrator. Every Day: The Spam Quarantine Reports are sent daily. Every Weekday: The Spam Quarantine Reports are sent daily from Monday through Friday. Every Monday: The Spam Quarantine Reports are sent each Monday. Monday & Friday: The Spam Quarantine Reports are sent each Monday and Friday. Monday, Wednesday, & Friday: The Spam Quarantine Reports are sent each Monday, Wednesday, and Friday. 2 Click Update below the Preferences area.
29 Using the console Configuring your preferences 29 Selecting Spam Quarantine Report content You can select what content you want included in your Spam Quarantine Report. This feature is optional and may be unavailable if your Administrator disabled it. To select Spam Quarantine Report content 1 On the Setup > Configuration > Preferences page, select the desired content in the Include the following items in my report field: Default: The content will be set to the default configured by your administrator. All Quarantined Messages: All your quarantined s will be listed. New Items Since Last Report: Only those quarantined s that were received since your previous Spam Quarantine Report will be listed. Text-only Summary: A text message will be sent to your primary address notifying you that you have s in your spam quarantine area, with a link that will automatically log you into the Message Quarantine when clicked (see About the Spam Quarantine Summary on page 14). 2 Click Update. Setting the time zone for your processing You can specify the time zone that will be used to designate your local time zone used when you log on to the Symantec Hosted Mail Security Console. The time and date of your Spam Quarantine Reports and the processed s will be controlled by the time zone designated by the data center where the Symantec Hosted Mail Security is running. If the time zone that you designate in this procedure differs from the data center, you may have to select a date different from your current local date in the Symantec Hosted Mail Security Console to view the data. For example, if your local time zone is 7 hours behind of the time zone of the data center, you may have to select the next day ( tomorrow ) in the calendar to view additional s that may be in your Message Quarantine. Alternatively, you can select to view all the s and thus see all quarantined s in the Message Quarantine. To set the time zone for your processing 1 On the Setup> Configuration > Preferences page, select the desired time zone in the Time Zone drop-down list.
30 30 Using the console Maintaining your alias addresses The listed time zones show the time offset from Greenwich Mean Time (for example, (GMT -8:00) indicates the time zone that is 8 hours behind GMT, also known as Mountain Standard Time). 2 Click Update. Choosing language filtering options Symantec Hosted Mail Security can identify what language an is written in, and filter based on this information. You can choose to allow Symantec Hosted Mail Security to only deliver in certain languages, or you can allow all languages, which is the default setting. To specify language(s) for your processing 1 On the Setup > Configuration > Preferences page, choose the radio button for the Language Identification option you want. 2 If you want to restrict the languages in which you receive , select the appropriate radio button and check the box or boxes for the language(s) you want. 3 Click Update. Maintaining your alias addresses You must have a primary address defined in Symantec Hosted Mail Security to log on to the Symantec Hosted Mail Security Console, to have filtered, and to receive a Spam Quarantine Report. Your primary address may have been defined by your administrator or Symantec Hosted Mail Security may have defined one for you automatically when it received messages for your address. You may have multiple primary addresses, depending on whether you have been using multiple addresses in the Symantec Hosted Mail Security. In this case, you would have multiple quarantine areas that you must log on to and manage, and you would receive multiple Spam Quarantine Reports (one for each primary address). Instead of having multiple primary addresses, you can associate multiple addresses to one primary address. The associated addresses are called alias addresses. The maximum allowed number of alias addresses is configured by your administrator. Each address, primary and alias, must be unique within each domain. Each address must be a valid address and configured on the server at your company site.
31 Using the console Maintaining your alias addresses 31 Unless an is quarantined, each is sent to its designated recipient address (that is, an with a recipient address that is an alias address is sent to that address, not to the primary address). If your administrator has defined alias domain names for your domain, you may see additional addresses for those alias domain names in your address list. An alias domain name provides the same type of consolidation as an alias address. When an alias domain name was defined for your domain, Symantec Hosted Mail Security automatically created the appropriate alias addresses based on your primary address in the alias domain. These addresses are listed for your information and are automatically aliased to your primary address. You cannot set one of these automatically aliased addresses to be your primary address. By using an alias address, you would have one quarantine area to manage for each set of associated addresses. You would receive one Spam Quarantine Report that includes the information for each primary address and all its associated alias addresses. The Spam Quarantine Report is sent to the primary address. All messages that are released from the quarantine area are sent to the primary address. All the associated addresses, primary and aliases, are controlled by the configuration settings for the primary address. When you add an alias address If you add an alias address on the User Aliases page in the Symantec Hosted Mail Security Console, the following occurs: An is sent to the added alias address. The contains a hyperlink command that the recipient must click to authorize the use of the alias address. Once the command is clicked, the alias address is authorized and associated with the primary address. If the alias address had previously been a primary address, its user configurations are discarded, depending on the requirements specified in Converting a primary address to an alias address on page 32. Thereafter, the quarantine information for the alias address will be combined with the quarantine for the primary address and it will be controlled by the user configuration for the primary address.
32 32 Using the console Maintaining your alias addresses If you add an alias address using the Manage My Addresses command in the Spam Quarantine Report, the following occurs: If the address that received the Spam Quarantine Report already has alias addresses associated to it, the Symantec Hosted Mail Security Console is opened to thesetup> Configuration > Aliases page in your local browser. You can then perform your alias address management. If the address that received the Spam Quarantine Report does not already have alias addresses associated to it, the Symantec Hosted Mail Security Console is opened to a page that prompts you for your primary address (the address to which you want to associate alias addresses). An is sent to that primary address. The contains a hyperlink command that the recipient (most likely you) must click to confirm that you are authorized to change its use. Once the recipient clicks the authorization command in the in the local application, the Symantec Hosted Mail Security Console is opened to the Setup > Configuration > Aliases page. The recipient can then perform the alias address management. Converting a primary address to an alias address You can convert a primary address into an alias address by doing one of the following: Within a set of a primary addresses and its associated alias addresses, you can switch between the addresses to designate which is the primary address. You can add an existing primary address to be an alias to another primary address. In this case, the user configuration (for example, allow and deny lists) for the newly aliased address is deleted from the system after the aliasing is completed. You cannot add a primary address that already has associated alias addresses to be an alias address to another primary address (for example, nested alias address). In this case, you must first delete all the alias addresses associated to the primary address being aliased. Deleting associated addresses You can delete alias addresses, but you cannot delete a primary address. Only the Symantec Hosted Mail Security Administrator can delete primary addresses.
33 Using the console Maintaining your alias addresses 33 If the primary address is associated to alias addresses, you can designate that one of the alias addresses be set to be the primary address. This causes the old primary address to become an alias address to the new primary address. Then you can delete the old primary address. If you delete an alias address, its association with the primary address is removed and it will no longer be controlled by the primary address user configuration (for example, allow and deny lists). If you continue to receive to the deleted address, Symantec Hosted Mail Security may automatically recreate the address as a primary address for you with default user configurations, depending on system configurations. Accessing the User Aliases settings The Setup> Configuration > Aliases page is the location where you manage your alias addresses. You can do the following: Select which of your associated addresses is your primary address Delete an alias address Add a new alias address to your primary address To access the User Aliases page Do one of the following: Log into the Symantec Hosted Mail Security Console and click Setup. On the Configuration page, click Aliases. Selecting which address is primary In the Spam Quarantine Report, click Manage My Addresses. If you currently have alias addresses defined, the Setup Configuration > Aliases page is displayed. If you do not have alias addresses defined, you are prompted for your primary address. Type your address and click Submit. An authorization is sent automatically to the entered address requesting authorization for the change. After you receive the message, click the hyperlink command that is contained in the message. This sends an authorization to the hosted mail security service, which then opens the Console in your default Web browser. If you already have alias addresses associated with your primary address, this procedure lets you select which of the listed addresses is your
34 34 Using the console Maintaining your alias addresses primary address. The user configuration settings (for example, allow and deny lists) are transferred to the selected primary address. The Spam Quarantine Report and any s released from quarantine will be sent to the primary address. The primary address always is first in the list of addresses and has the text Primary in the Type column. The alias addresses have the text User Alias in the Type column and the command [Delete] after them. If your Administrator has defined alias domain names for your domain, an alias address was automatically created for your primary address using the alias domain name. This type of alias address is shown with the text Domain Alias in the Type column and is not available for selection as a primary address. To select which address is primary On the Setup > Configuration > Aliases page, select the radio button in front of the address that you want to select as your primary address. The selected address is set immediately to be your primary address. Adding an alias address You can add an alias address to the shown primary address. If the added alias address had been used as a primary address, its user configuration will be deleted after the addition is authorized, and it will be controlled by the user configuration of the primary address. Authorization s will be sent to the added alias addresses to confirm that you have the authority to change their use. To add an alias address 1 On the Setup > Configuration > Aliases page, in the Add an Alias Address for {primary address} box, type the address to be added as an alias address, where {primary address} is the current primary address. If necessary, select a domain in the Domain drop-down list to the right of character. This list appears only if your domain has alias domain names associated with it. 2 Click Add. An authorization is sent automatically to the added address requesting authorization for the change.
35 Using the console Maintaining your alias addresses 35 3 The recipient of the (most likely you) must click the hyperlink command in the authorization to continue the alias addition. 4 Immediately after Symantec Hosted Mail Security receives the authorization, the address is added as an alias address to the listed primary address. Deleting an alias address You can delete an alias address, which removes its association with the primary address. If you continue to receive to the deleted address, Symantec Hosted Mail Security may recreate the address as a primary address with default user configurations, depending on system configurations. You cannot delete a primary address (see Deleting associated addresses on page 32). To delete an alias address 1 If the address that you want to delete is the primary address, you must convert the primary address to an alias address. 2 On the Setup > Configuration > Aliases page, click Delete next to the alias address that you want to delete. The alias address is deleted immediately.
36 36 Using the console Maintaining your alias addresses
How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)
MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE
Email Protection for your account
User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
How To Manage Your Spam On Graymail On Pc Or Macodeo.Com
User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
Admin Quick Start Guide Email Protection Service Anti-Virus & Anti-Spam
Admin Quick Start Guide Email Protection Service Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: January, 2010 Email Protection Admin Quick Start Guide / Table of Contents Page 2 of 17 Table of Contents
MX LOGIC SPAM FILTERING
MX LOGIC SPAM FILTERING 21 March 2009, Version 1.0 WHAT IS MX LOGIC? In response to the large amount of spam received on KickStart email addresses, the organization has enlisted MX Logic, a hosted filtering
Symantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
Spam Manager. User Guide
Spam Manager User Guide Spam Manager User Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
Email Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
Quarantine Central for end users: FAQs
Quarantine Central for end users: FAQs About is a leading hosted email services company. Founded in 1994, was one of the first companies to offer hosted email security services to the North American market.
The Institute of Education Spam filter service allows you to take control of your spam filtering.
CUSTOMISING THE IOE SPAM FILTER The Institute of Education Spam filter service allows you to take control of your spam filtering. The interface is very simple to access and use. Through a secure web page
Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.
Version 5.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2012, Barracuda Networks
Administration Guide Revision A. SaaS Email Protection
Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
How To Manage Your Quarantine Email On A Blackberry.Com
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.
Version 3.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2009, Barracuda Networks
Administration Guide Revision E. SaaS Email Protection
Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
Spam Manager User Guide. Boundary Defense for Email Anti-Spam End User Guide
Spam Manager User Guide Boundary Defense for Email Anti-Spam End User Guide DOCUMENT REVISION DATE: Feb 2012 Spam Manager User Guide / Table of Contents Page 2 of 24 Table of Contents OVERVIEW... 3 1 ABOUT
How does the Excalibur Technology SPAM & Virus Protection System work?
How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being
Tufts Technology Services (TTS) Proofpoint Frequently Asked Questions (FAQ)
Tufts Technology Services (TTS) Proofpoint Frequently Asked Questions (FAQ) What is Proofpoint?... 2 What is an End User Digest?... 2 In my End User Digest I see an email that is not spam. What are my
Symantec Hosted Mail Security Administration Guide
Symantec Hosted Mail Security Administration Guide Symantec Hosted Mail Security Administration Guide Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software
eprism Email Security Suite
V8.4 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
Roaring Penguin User Guide
Roaring Penguin User Guide Emails and Spam Training 2-3 The Quarantine Summary 4-5 Logging in to the Roaring Penguin Web Interface 6-8 Roaring Penguin Home Screen 9-10 Opting out of Spam Scanning 11-12
Overview. Accessing the User Interface. Logging In. Resetting your Password
Overview The message filtering service lets a company easily provide real-time spam and virus filtering, attack blocking, and email-traffic monitoring across a user deployment of any size. Users receive
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished
Using the Barracuda Spam Firewall to Filter Your Emails
Using the Barracuda Spam Firewall to Filter Your Emails This chapter describes how end users interact with the Barracuda Spam Firewall to check their quarantined messages, classify messages as spam and
Managing Spam in E-Mail & More Introduction Spam Detector Block Sender E-Mail Filters
Managing Spam in E-Mail & More Managing Spam in E-Mail & More Introduction Spam Detector Block Sender E-Mail Filters 1 Verizon Online 2 Managing Spam in E-Mail & More Managing Spam in E-Mail & More Introduction
IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
Avira Exchange Security Small Business Edition. Quick Guide
Avira Exchange Security Small Business Edition Quick Guide Table of contents Table of contents 1 Introduction...3 2 System requirements...4 3 The Avira Exchange Console...5 3.1 Virus Scanner status...6
Title: Spam Filter Active / Spam Filter Active : CAB Page 1 of 5
Friday, April 18, 2008 11:24:8 AM Title: Spam Filter Active / Spam Filter Active : CAB Page 1 of 5 Name: Author: Subject: Spam Filter Active CAB Administrator Spam Filter Active Keywords: Category: The
KUMC Spam Firewall: Barracuda Instructions
KUMC Spam Firewall: Barracuda Instructions Receiving Messages from the KUMC Spam Firewall Greeting Message The first time the KUMC Spam Firewall quarantines an email intended for you, the system sends
PROOFPOINT - EMAIL SPAM FILTER
416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu [email protected] PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...
Barracuda Spam Firewall
Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished
Using the Barracuda to Filter Your Emails
Using the Barracuda to Filter Your Emails The following describes how end users interact with the Barracuda to check their quarantined messages, classify messages as spam and not spam, and modify their
Green House Data Spam Firewall Administrator Guide
Green House Data Spam Firewall Administrator Guide Spam Firewall Administrator Guide... 2 Navigating the Web Interface... 2 How to Drill Down from the DOMAINS Page to Account Level... 2 Message Logs...
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
Email Migration Manual (For Outlook Express 6)
Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change
ModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Distributor Control Center Private Label/Channel Administrators
March 13, 2014 Distributor Control Center Private Label/Channel Administrators Version 2.6.3 Everyone.net Table of Contents Distributor Control Center... 1 1 The Distributor Control Center... 4 1.1 Introduction...
Plesk for Windows Copyright Notice
2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.
Email - Spam Spam Email Firewall How Does the Spam Firewall Work? Getting Started username Create New Password
Email - Spam Spam Email Firewall ODU s Information Services has implemented a Spam Firewall to help you manage spam e-mail from Internet senders. Generally defined, spam e-mail is an unsolicited mailing,
Barracuda Spam Firewall User s Guide
Barracuda Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
the barricademx end user interface documentation for barricademx users
the barricademx end user interface documentation for barricademx users BarricadeMX Plus The End User Interface This short document will show you how to use the end user web interface for the BarricadeMX
Premium Anti Spam User s Guide. Table of Contents
Premium Anti-Spam End User s Guide / Table of Contents Page 1 of 10 Premium Anti Spam User s Guide Table of Contents Quarantine Report... 2 Links within the Quarantine Report... 3 Login to the Premium
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
EasyMail Setup. User Guide. Issue 3 September 2012. Welcome to AT&T Website Solutions
Issue 3 September 2012 EasyMail Setup User Guide Welcome to AT&T Website Solutions We are focused on providing you the very best web hosting service including all the tools necessary to establish and maintain
Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
Barracuda Spam & Virus Firewall User's Guide 5.x
Barracuda Spam & Virus Firewall Barracuda Spam & Virus Firewall User's Guide 5.x This guide describes how you can check your quarantined messages, classify messages as spam and not spam, manage whitelisting
Purchase College Barracuda Anti-Spam Firewall User s Guide
Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
Spam Manager. Quarantine Administrator Guide
Spam Manager Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
Policy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
HOSTED EXCHANGE ADVANCED SECURITY. Hosted Exchange Advanced Security Feb 2013
HOSTED EXCHANGE ADVANCED SECURITY Hosted Exchange Advanced Security Contents Activating Advanced Security n Advanced Security Portal... p2-3 n Spam... p4-5 n Spam Filter Level... p6 n Filter Rules... p7
Creating a Content Group and assigning the Encrypt action to the Group.
Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
Message Archiving User Guide
Message Archiving User Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com RESTRICTION ON USE, PUBLICATION,
Email Getting Started Guide Unix Platform
Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses
Quick Start Guide for Email End Users
Quick Start Guide for Email End Users Requesting a message report The TRITON AP-EMAIL cloud service allows you to view quarantined messages and take action on them. To do this, first request a message
eprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
Symantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
Parallels Plesk Control Panel
Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
How to Use Red Condor Spam Filtering
What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies
More Details About Your Spam Digest & Dashboard
TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How
Filtering Service. Secure E-Mail Gateway (SEG) Service Administrative Guides. Revised February 2013
Secure E-Mail Gateway (SEG) Service Administrative Guides Filtering Service Revised February 2013 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained
Patented hosting technology protected by U.S.Patents 7,0909,948; 7,076,633. Patents pending in the U.S.
Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd. All rights reserved
Hosting Control Panel (CP) Admin Guide
Hosting Control Panel (CP) Admin Guide Document Revision Date: May 16, 2013 Hosting CP Admin Guide / TOC Page i Contents HOW TO USE THIS HOSTING CP ADMIN GUIDE... 1 GET STARTED WITH EXCHANGE... 1 Other
MySpam email filtering service Protection against spam, viruses and phishing attacks
MySpam email filtering service Protection against spam, viruses and phishing attacks 1. Introduction This MySpam guide describes the new service and changes to the University s current spam handling procedures.
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
Using Barracuda Spam Firewall
Using Barracuda Spam Firewall Creating your Barracuda account Your Barracuda account has been created for you if you are a current Hartwick College student, staff or faculty member. Setting Your Password.
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Using Your New Webmail
Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...
ITS Spam Filtering Service Quick Guide 2: Using the Quarantine
ITS Spam Filtering Service Quick Guide 2: Using the Quarantine The quarantine is where suspected spam messages are held on the ITS Spam Filtering server. In the graphic below, the quarantine window displays
Encrypted Email Users Guide. Revised 6/8/2015
Encrypted Email Users Guide Revised 6/8/2015 Contents Encrypted email service overview Registering, activating and maintaining an account Online Help Accessing the encrypted email portal screens Downloading
Email Migration Manual (For Outlook 2010)
Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change
Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
About Email Archiving for Microsoft Exchange Server
Setup Guide Revision A McAfee SaaS Email Archiving Service Configuring Microsoft Exchange Server 2013 About Email Archiving for Microsoft Exchange Server The McAfee SaaS Email Archiving service stores
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
D3 TECHNOLOGIES SPAM FILTER
D3 TECHNOLOGIES SPAM FILTER The D3 Technologies spam filtering provides virus, attachment, and spam filtering services for email. We check all emails for viruses and malicious content, since we feel these
Using Your New Webmail
1 Using Your New Webmail Contents Compose a New Message... 3 Add an Attachment... 5 Insert a Hyperlink... 6 Forward an Email... 7 Search Email... 8 Download Email from an existing POP3 Account... 9 Move
EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you.
CONFIGURING THE ANTI-SPAM In this tutorial you will learn how to configure your anti-spam settings using the different options we provide like Challenge/Response, Whitelist and Blacklist. EnterGroup Anti-Spam
TIBCO Slingshot User Guide
TIBCO Slingshot User Guide v1.8.1 Copyright 2008-2010 TIBCO Software Inc. ALL RIGHTS RESERVED. Page 1 September 2, 2011 Documentation Information Slingshot Outlook Plug-in Important Information SOME TIBCO
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Barracuda Email Security Service User Guide
Barracuda Email Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses,
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.
