Symantec Mail Security Planning Guide
|
|
|
- Junior Strickland
- 10 years ago
- Views:
Transcription
1 Symantec Mail Security Planning Guide
2 Syamantec Mail Security Planning Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Symantec, the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be "commercial computer software" and "commercial computer software documentation" as defined in FAR Sections and DFARS Section Symantec Corporation Stevens Creek Blvd. Cupertino, CA USA
3 Technical Support Contacting Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product feature and function, installation, and configuration. The Technical Support group also authors content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s maintenance offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization A telephone and web-based support that provides rapid response and up-to-the-minute information Upgrade insurance that delivers automatic software upgrade protection Global support that is available 24 hours a day, 7 days a week worldwide. Support is provided in a variety of languages for those customers that are enrolled in the Platinum Support program Advanced features, including Technical Account Management For information about Symantec s Maintenance Programs, you can visit our Web site at the following URL: Select your country or language under Global Support. The specific features that are available may vary based on the level of maintenance that was purchased and the specific product that you are using. Customers with a current maintenance agreement may access Technical Support information at the following URL: Select your region or language under Global Support. Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to recreate the problem.
4 When you contact Technical Support, please have the following information available: Product release level Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration Customer service If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: Select your region or language under Global Support, and then select the Licensing and Registration page. Customer service information is available at the following URL: Select your country or language under Global Support. Customer Service is available to assist with the following types of issues: Questions regarding product licensing or serialization Product registration updates such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade insurance and maintenance contracts Information about the Symantec Value License Program
5 Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs or manuals Maintenance agreement resources Additional Enterprise services If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: Asia-Pacific and Japan: Europe, Middle-East, and Africa: North America and Latin America: Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively. Enterprise services that are available include the following: Symantec Early Warning Solutions Managed Security Services Consulting Services Educational Services These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur. These services remove the burden of managing and monitoring security devices and events, ensuring rapid response to real threats. Symantec Consulting Services provide on-site technical expertise from Symantec and its trusted partners. Symantec Consulting Services offer a variety of prepackaged and customizable options that include assessment, design, implementation, monitoring and management capabilities, each focused on establishing and maintaining the integrity and availability of your IT resources. Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs.
6 To access more information about Enterprise services, please visit our Web site at the following URL: Select your country or language from the site index.
7 Contents Technical Support Chapter 1 Chapter 2 Chapter 3 Appendix A About Symantec Mail Security Key features... 9 New features Functional overview Architecture Where to get more information Planning your deployment General deployment considerations MTA usage Configuring Scanners Positioning with other filtering products Filtering internal deliveries LDAP services Load balancing Adjusting MX records Adjusting RAM and MySQL threads Deployment models Basic gateway deployment Multi-tier gateway deployment Post-gateway deployment Configuring message filtering Understanding filtering Deployment considerations Feature Cross-Reference About Feature Cross-Reference Changes for Symantec Mail Security for SMTP users New feature names Discontinued features Changes for Symantec Brightmail Antispam users... 29
8 8 Contents Index
9 Chapter 1 About Symantec Mail Security This chapter includes the following topics: Key features New features Functional overview Architecture Where to get more information Key features Symantec Mail Security offers enterprises an easy-to-deploy, comprehensive gateway-based security solution through the following features: Antispam technology Symantec's state-of-the-art spam filters assess and classify as it enters your site. Antivirus technology Virus definitions and engines protect your users from -borne viruses. Content Compliance These features help administrators enforce corporate policies, reduce legal liability, and ensure compliance with regulatory requirements. Group policies and filter policies An easy-to-use authoring tool lets administrators create powerful, flexible ad hoc filters for users and groups.
10 10 About Symantec Mail Security New features New features The following table lists the features that have been added to this version of Symantec Mail Security: Table 1-1 New features for Symantec Mail Security (all users) Category Threat protection features Inbound and outbound content controls Features Improved firewall Sender Authentication Improved virus protection True file type recognition for content compliance filtering Keywords filtering within attachments, keyword frequency filtering Regular expression filtering Description Protects against directory-harvest attacks, denial-of-service attacks, spam attacks, and virus attacks. Protects against phishing attacks, using the Sender Policy Framework (SPF), Sender ID, or both. Additional virus verdicts protect against suspected viruses, spyware, and adware and quarantine messages with suspicious encrypted attachments. messages that may contain viruses can be delayed in the Suspect Virus Quarantine, then refiltered, with updated virus definitions, if available. This feature tcan be effective in defeating virus attacks before conventional signatures are available. View a list of available virus-definition updates. Automatically detects file types without relying on file name extensions or MIME types. Scan within attachments to find keywords from dictionaries you create or edit. Specify a number of occurrences to look for. Use regular expressions to further customize filter conditions by searching within messages and attachments. Support for Enterprise Vault and third-party archival tools Specify conditions that result in being sent to an archival address or disk location.
11 About Symantec Mail Security New features 11 Table 1-1 New features for Symantec Mail Security (all users) (continued) Category Flexible mail management Features LDAP integration Expanded variety of actions and combinations Expanded mail controls Aliasing Description Dynamic group population via any of several supported LDAP servers More than two dozen actions that can be taken, individually or in combination, on messages SMTP connection management, including support for secure (TLS encryption, with security level depending on platform); for user-based routing and static routes; for address masquerading, invalid recipient handling, and control over delivery-queue processing Distribution lists automatically expanded, mail filtered and delivered correctly for each user Improved reporting and monitoring Extensive set of pre-built reports, scheduled reporting, and additional alert conditions More than 50 graphical reports that you can generate ad-hoc or on a scheduled basis. Reports can be exported for offline analysis and ed. Expanded administration capabilities Message tracking IP-based access control Control over Quarantine size limits View a trail of detailed information about a message, including the filtering processing applied to a message. Control which hosts and networks can access your Control Center. Specify user-based and total limits, configure automatic message deletions. Enhanced localization capabilities Support for non-ascii character sets Support for double-byte character sets. Language autodetection of messages for Quarantine and of subject encodings for message handling. Support for non-ascii LDAP source descriptions.
12 12 About Symantec Mail Security Functional overview Functional overview You can deploy Symantec Mail Security in different configurations to best suit the size of your network and your processing needs. Each Symantec Mail Security host can be deployed in the following ways: Scanner Control Center Deployed as a Scanner, a Symantec Mail Security host filters for viruses, spam, and noncompliant messages. You can deploy Scanners on exisiting or groupware server(s). Deployed as a Control Center, a Symantec Mail Security host allows you to configure and manage filtering, SMTP routing, system settings, and all other functions from a Web-based interface. Multiple Scanners can be configured and monitored from your enterprise-wide deployment of Symantec Mail Security, but only one Control Center can be deployed to administer all the Scanner hosts. The Control Center provides information on the status of all Symantec Mail Security hosts in your system, including system logs and extensive customizable reports. Use the Control Center to configure both system-wide and host-specific details. The Control Center provides the Setup Wizard, for initial configuration of all Symantec Mail Security instances at your site, and also the Add Scanner Wizard, for adding new Scanners. The Control Centrer also hosts the Spam and Suspect Virus Quarantines to isolate and store spam and virus messages, respectively. End users can view their quarantined spam messages and set their preferences for language filtering and blocked and allowed senders. Alternatively, you can configure Spam Quarantine for administrator-only access. Scanner and Control Center A single Symantec Mail Security host performs both functions. Note: Symantec Mail Security provides neither mailbox access for end users nor message storage. It is not intended for use as the only MTA in your infrastructure.
13 About Symantec Mail Security Architecture 13 Note: Symantec Mail Security does not filter messages that don't flow through the SMTP gateway. For example, when two mailboxes reside on the same MS Exchange Server, or on different MS Exchange Servers within an Exchange organization, their messages will not pass through the Symantec Mail Security filters. Architecture Figure 1-1 shows how a Symantec Mail Security installation processes an message, assuming the sample message passes through the Filtering Engine to the Transformation Engine without being rejected. Figure 1-1 Symantec Mail Security architecture Messages proceed through the installation in the following way: The incoming connection arrives at the inbound MTA via TCP/IP.
14 14 About Symantec Mail Security Where to get more information The inbound MTA accepts the connection and moves the message to its inbound queue. The Filtering Hub accepts a copy of the message for filtering. The Filtering Hub consults the LDAP SyncService directory to expand the message's distribution list. The Filtering Engine determines each recipient's filtering policies. The message is checked against Blocked/Allowed Senders Lists defined by administrators. Virus and configurable heuristic filters determine whether the message is infected. Content Compliance filters scan the message for restricted attachment types, regular exessions, or keywords as defined in configurable dictionaries. Spam filters compare message elements with current filters published by Symantec Security Response to determine whether the message is spam. At this point, the message may also be checked against end-user defined Language settings. The Transformation Engine performs actions per recipient based on filtering results and configurable Group Policies. Where to get more information The Symantec Mail Security documentation set consists of the following manuals: Symantec Mail Security Administration Guide Symantec Mail Security Planning Guide Symantec Mail Security Installation Guide Symantec Mail Security Getting Started Symantec Mail Security also includes a comprehensive help system that contains conceptual and procedural information. You can visit the Symantec Web site for more information about your product. The following online resources are available: Provides access to the technical support Knowledge Base, newsgroups, contact information, downloads, and mailing list subscriptions
15 About Symantec Mail Security Where to get more information 15 Provides information about registration, frequently asked questions, how to respond to error messages, and how to contact Symantec License Administration /licensing/els/help/en/help.html Provides product news and updates Provides access to the Virus Encyclopedia, which contains information about all known threats; information about hoaxes; and access to white papers about threats
16 16 About Symantec Mail Security Where to get more information
17 Chapter 2 Planning your deployment This chapter includes the following topics: General deployment considerations Deployment models General deployment considerations This section provides information about integrating Symantec Mail Security into your network. Note: Multiple Scanner scenarios are common for organizations with heightened system failover needs or high mail scanning throughput requirements. MTA usage Symantec Mail Security contains a Message Transfer Agent (MTA), which processes and relays messages to support filtering activities. Note: Symantec Mail Security provides neither mailbox access for end users nor message storage; it is not suitable for use as the only MTA in your infrastructure. Configuring Scanners During installation, you can use a wizard to add a Scanner. Depending on your filtering requirements and messaging environment, you may want to deploy multiple Scanners and administer them via a single Control Center. In such cases, you can dedicate Scanners to specific functions. For example, you might want one Scanner to filter inbound mail and another to filter outbound mail.
18 18 Planning your deployment General deployment considerations Positioning with other filtering products Filtering internal deliveries LDAP services In order for Symantec Mail Security's spam and Content Compliance filters to function properly, you should avoid placing the product behind other filtering products (such as content filters) or MTAs that alter or remove pre-existing message headers or modify the message body. You can force internal mail through Symantec Mail Security to avoid propagation of viruses and spam generated by mass-mailing worms that may have been picked up by individuals via Web browsing or downloading. Symantec Mail Security supports LDAP services for user authentication and synchronization. Symantec Mail Security LDAP services synchronize user, alias, and group data with LDAP server directories. These services convert the data to formats compatible with Spam Quarantine, Scanner, and Control Center data stores while minimizing impact on directory infrastructure. They include: Authentication Synchronization Replication LDAP source is used to authenticate end-user access to Spam Quarantine and resolve aliases for quarantined messages. The Control Center reads user and password data directly from the LDAP server. User, group, and distribution-list data from the LDAP source and is used to populate and update Control Center database tables for later replication to Scanners. Membership in groups and aliases is validated or otherwise resolved. New and updated entries are cached in the Control Center's database. User, group, and distribution-list data are used to expand aliases, validate message recipients, recognize directory harvest attacks, and filter messages for group policies. User, group, and distribution-list data are converted to database files that can be used to look up nested relationships among them; new and updated data are replicated to Scanners. LDAP SyncService supports the following LDAP servers: Windows 2000 Active Directory Windows 2003 Active Directory Sun Directory Server 5.2 (formerly known as the iplanet Directory Server) on Solaris 8 and 9 and on Red Hat Linux
19 Planning your deployment General deployment considerations 19 Lotus Domino LDAP Server 6.5 Exchange 5.5 other (used for authentication only) For more information on using LDAP services, see the Symantec Mail Security Administration Guide. Authentication Only one LDAP source can be used for authentication. While the same source may also be used for synchronization purposes, no other LDAP directories may be used for authentication. This is especially important with regard to Spam Quarantine. The LDAP source must authenticate end users if they are to process sent to Quarantine. Synchronization Synchronization converts data from the LDAP source and inserts them into Control Center database tables. It also resolves group and distribution-list memberships, rejecting inconsistent entries. Synchronization supports both full and change-based synchronization. In planning deployments administrators should be aware of how the two types of synchronization affect performance. Full sychronization - Symantec Mail Security employs full sychronization between an LDAP source and a Control Center whenever Control Center configuration or maintenance requires that data stores be refreshed. Because group and distribution-list memberships must be resolved for each individual entry, full synchronization can take time to process, depending on the number of members in groups and distribution lists. Symantec Mail Security reduces initial synchronization overhead by independently processing members (end users), groups, and distribution lists in parallel. Change-based synchronization Symantec Mail Security employs change-based synchronization between full synchronizations to improve performance. Change-based synchronization reduces the need to perform full synchronizations by updating only those entries that have changed since the last full synchronization. Replication This process replicates entries from the Control Center to Scanner hosts. Replication resolves nested relationships such as those used to expand distribution (or alias) lists. Replication is not change-based. In order to avoid the overhead associated with looking up each database entry (as in full synchronization), replication first converts Control Center group and alias membership data into
20 20 Planning your deployment General deployment considerations Load balancing Adjusting MX records database files that contain relationship tables. Fewer data-store lookups are thus needed to resolve nested relationships among users, groups, and distribution lists when directory data are replicated to attached and enabled Scanner hosts. Time-to-replication is comparable to change-based rather than full synchronization. Once replicated, group and alias entries can be expanded to their full member directories in response to mail events. Symantec Mail Security is not intended to be used for load balancing. Administrators can associate only one host name or IP address as the MTA to which is relayed. You must implement multiple Scanners to perform load balancing. When you implement Symantec Mail Security in front of a separate MTA that receives inbound messages, you must to change the DNS mail exchange (MX) records. The records must point incoming messages to the system. Symantec Mail Security should have a higher priority than the existing MTA. However, if you simply list Symantec Mail Security as a higher- weighted MX record in addition to the existing MX record, spammers can look up the previous MTA's MX record. This allows them to send spam directly to the old server, bypassing your spam filtering. To prevent spammers from circumventing the new spam-filtering servers, you should do one of the following: Remove the previous MTA's MX record from DNS. Block off the MTA from the Internet using a firewall. Modify the firewall's network address translation (NAT) tables to route external IP addresses to internal non-routable IP addresses. You can then map from the old server to Symantec Mail Security. When naming Symantec Mail Security, ensure that the name you choose does not imply its function. For example, antispam.yourdomain.com, symantec.yourdomain.com, or antivirus.yourdomain.com are not good choices. Adjusting RAM and MySQL threads The Control Center is a combination of Tomcat and MySQL applications. Tomcat provides the Web-based interface, and MySQL is the database storage. Their default configuration performs well in installations with a single Scanner and low volume traffic. In installations where multiple Scanners or large amounts of spam are processed, increasing the amount of RAM allocated to Tomcat and
21 Planning your deployment Deployment models 21 Deployment models increasing the number of listener and consumer threads in MySQL improves performance. You can deploy Symantec Mail Security in the following ways: Basic gateway deployment Multi-tier gateway deployment Post-gateway deployment Basic gateway deployment This is the simplest deployment model. Symantec Mail Security resides at the outermost gateway layer, processing inbound and outbound mail, providing Secure Services, and relaying mail to other relay layers or to the user-facing mail server layer. On all configured server computers, port 443 must be configured to permit outbound connections to Symantec to download content updates. Figure 2-1 shows Symantec Mail Security deployed at the gateway, behind a firewall. Figure 2-1 Basic gateway deployment Advantages The basic gateway deployment takes advantage of Symantec Mail Security's proximity to the Internet. Because spam emanates from the outside world, the gateway is the logical and effective place to deploy Symantec Mail Security.
22 22 Planning your deployment Deployment models When you deploy the system closer to the gateway, you can minimize mail processing and storage requirements as well as network bandwidth via Firewall filtering. Considerations Administrators considering the basic gateway deployment should take into account the following factors: Multi-tier gateway deployment Some organizations prefer to have secure gateways with no other services running. In these environments, all other services run behind the first gateway layer. Some smaller organizations do not have dedicated gateway servers or a gateway layer. Instead, they deploy gateway servers and internal mail servers on the same computers. Symantec Mail Security cannot be installed on the server running Exchange. Note: This model may be implemented with one or more Scanner hosts. Figure 2-2 shows Symantec Mail Security in a multi-tier gateway deployment, with multiple Scanners in the DMZ and a Control Center behind a second firewall. Figure 2-2 Multi-tier gateway deployment Advantages A multi-tier gateway deployment maximizes Symantec Mail Security's network administration capacities.
23 Planning your deployment Deployment models 23 This configuration meets a common security audit requirement in that all data stores are in the second tier, including the Control Center and Spam Quarantine databases. Inbound traffic may be load balanced across multiple scanners with this model. Compared with basic gateway deployment, this configuration eliminates a single point of failure for message scanning. This model allows administrators to take individual Scanners offline for maintenance without incurring downtime. This scenario enables load balancing of filtered mail across multiple downstream MTAs. Considerations Post-gateway deployment With its greater administrative controls, a multi-tier deployment requires higher administrative and maintenance overhead. This approach requires more administrative overhead and complex networking than a basic gateway deployment. With increased hardware and maintenance costs, this model could require a higher total cost of operation. Note: This model may be implemented with one or more SMTP gateway MTAs and one or more Scanner hosts. Figure 2-3 shows Symantec Mail Security deployed after MTAs at the firewall.
24 24 Planning your deployment Deployment models Figure 2-3 Post-Gateway deployment MTAs at the gateway layer accept unfiltered mail from the Internet then relay it to Symantec Mail Security. The system filters mail from the gateway layer and relays mail to other MTAs downstream. Advantages Your network configuration may require that you place your Scanner hosts with your SMTP gateway MTA in a "demilitarized zone" between two firewalls. If you have a customized MTA or specific business needs, then running this configuration may outweigh the extra overhead and loss of functionality. Considerations Post-gateway deployment limits the functionality of Scanners and may decrease system throughput. This configuration limits Scanner functionality as IP-based defenses are nullified. Unless the SMTP Gateway is performing filtering, all is processed by the gateway (read, stored, and forwarded) then sent to the system, which must then read, filter, and take some action based on the verdict. Such redundancy may add overhead, thereby decreasing throughput.
25 Chapter 3 Configuring message filtering This chapter includes the following topics: Understanding filtering Deployment considerations Understanding filtering Symantec Mail Security provides a wide variety of actions for filtering . It allows you to either set identical options for all users, or specify different actions for different groups of users. You can specify groups of users based on addresses or domain names. For each group, you can specify an action or group of actions to perform given a particular condition. Deployment considerations The following table lists deployment considerations for select actions. Table 3-1 Action Clean the message Deployment considerations Consideration If many messages need to be cleaned, there may be high demand on the Scanner.
26 26 Configuring message filtering Deployment considerations Table 3-1 Action Delete the message Deployment considerations (continued) Consideration This eliminates the need for spam storage, though users cannot check for misidentified messages. When you re comfortable with your deployment s low false positive rate, you may want to configure spam to be deleted. Deliver message normally Deliver the message to recipient's Spam folder This setting is useful for testing. Suspected spam is still counted as such in message statistics for reports. Symantec Mail Security supports the Symantec Spam Folder Agent for Exchange using X-header markup for Microsoft Exchange 5.5 and Exchange 2000 internal messaging systems. The Symantec Spam Folder Agent for Exchange may also be run on an Exhange 2003 host. Note that Exchange 2000 and Lotus Domino configurations require installation of lightweight agents to folder spam. Modify the message A modified message will be delivered to end-user mailboxes, unless it contains a virus or worm.
27 Appendix A Feature Cross-Reference This appendix includes the following topics: About Feature Cross-Reference Changes for Symantec Mail Security for SMTP users Changes for Symantec Brightmail Antispam users About Feature Cross-Reference All users will find significant new features in this release of Symantec Mail Security. You will also find familiar features, in many cases improved and expanded. In some cases the names of features are the same; in some cases the names have changed, and the changes are noted in this appendix. Note: By default, inbound and outbound messages containing a virus or mass-mailing worm, and unscannable messages, including malformed MIME messages, will be deleted. You may want to change the default setting for unscannable messages if you are concerned about losing important messages. Changes for Symantec Mail Security for SMTP users The following table describes new features for Symantec Mail Security for SMTP users.
28 28 Feature Cross-Reference Changes for Symantec Mail Security for SMTP users Table A-1 New features for Symantec Mail Security for SMTP users Category Features Description Flexible mail management Centralized, Web-based administration Group Policies Expanded notification capabilities Use the Control Center to manage all aspects of management and spam, virus, and content filtering across all servers with one interface. Create separate inbound and outbound policies for an unlimited number of groups of users. You can specify groups of users based on addresses, domains, LDAP groups, or IP addresses. For each category of , you can specify custom message handling for each group. Automatically send s notifying specific persons or groups when certain message conditions are encountered during message filtering. Create different notifications for different conditions or user groups. Inbound and outbound content controls Improved attachment blocking Strip attachments within container files. Search within attachments using regular expressions. Improved reporting and monitoring Expanded administration capabilities Aggregated logging and reporting Delegated administration Access logs for all messages from all servers via the Control Center. Manage reports for all servers via the Control Center. Note that many of the reporting features in Symantec Mail Security for SMTP 4.1 have been replaced in Symantec Mail Security 5.0 by the message-tracking feature. Multiple administrator roles with view only or modify access to different portions of the management interface. Group Policies introduce expanded flexibility in mail filtering and message handling. Group Policies enable you to specify groups of users, based on addresses, domains, or IP addresses, and customize mail filtering for each group. In addition, if you were using Version 4.1 without Premium AntiSpam, Version 5.0, with or without Premium AntiSpam provides much more extensive capabilities for customizing both message filtering and the actions taken on filtered messages.
29 Feature Cross-Reference Changes for Symantec Brightmail Antispam users 29 New feature names Most features in Version 5.0 have similar names to the corresponding Version 4.1 features. The following table describes the equivalents between selected Symantec Mail Security for SMTP 4.1 features and Symantec Mail Security 5.0 features that have different names. Table A-2 Version 4.1 to Version 5.0 Symantec Mail Security for SMTP 4.1 Feature Name Accounts Custom disclaimer Scan policy Routing Symantec Mail Security 5.0 Feature Name Administration Annotation Settings > Virus > Exclude Scanning tab Settings > Hosts > Edit > SMTP tab Discontinued features The following Symantec Mail Security for SMTP 4.1 features are not included in Symantec Mail Security 5.0: Auto-generated whitelist Logging of SMTP conversations Hold Queue, automatic reordering of the Slow Queue Return code support for DNS Blacklists Configurable administrator timeout for the management interface Changes for Symantec Brightmail Antispam users Although the product name has changed, if you were a Symantec Brightmail Antispam user you will find the user interface for Symantec Mail Security quite familiar. Most features are named similarly, and the organization of the user interface is quite similar. Most of the changes are new features. The following table describes additional new features for Symantec Brightmail Antispam users.
30 30 Feature Cross-Reference Changes for Symantec Brightmail Antispam users Table A-3 New features for Symantec Brightmail Antispam users Category Threat protection features Features Improved virus processing Outbound filtering Description LiveUpdate support for virus definitions, list of file types to exclude from virus scanning, expanded container limit controls Provides spam, virus, and content compliance filtering on outbound messages. Specify different outbound and inbound policies for each user group. Flexible mail management More flexible Group Policies Multiple actions Use LDAP groups to populate groups for Group Policies. Specify more than one action to take on specific categories of messages to specific groups of recipients. Inbound and outbound content controls Expanded content compliance filtering capabilities Attachment blocking Annotations Notifications Expanded set of actions available on filtered messages, support for multiple actions on the same messages Create lists of attachment types to remove. Strip attachments within container files. Automatically append or prepend text, such as legal disclaimers or marketing tag lines, to messages. Automatically send s notifying specific persons or groups when certain message conditions are encountered during message filtering. Create different notifications for different conditions or user groups. Improved reporting and monitoring Expanded virus monitoring Expanded logging Virus outbreak alerts, expanded logging of virus events Symantec Security Information Manager (SSIM) logging support Expanded administration capabilities Global reject or pause of message scanning During a virus outbreak, you can temporarily pause scanning until new virus filters are in place. While the names of features are largely the same, you will find some changes to the organization of menus. Most importantly, you will now find a Policies menu
31 Feature Cross-Reference Changes for Symantec Brightmail Antispam users 31 at the top level, breaking out Group Policies (under the Settings menu in Symantec Brightmail Antispam 6.0.3), and including other items as well.
32 32 Feature Cross-Reference Changes for Symantec Brightmail Antispam users
33 Index A architecture overview 13 B balance load 20 basic gateway deployment 21 D deployment considerations 17 gateway 21 models 21 multi-tier gateway post-gateway F features 27 discontinued from Symantec Mail Security for SMTP name changes 29 Symantec Brightmail Antispam, new or changed features from 29 Symantec Mail Security for SMTP, new or changed features 27 Filtering understanding 25 filtering intra-enterprise 18 Filtering Engine 14 Filtering Hub 14 flow of messages 13 functional overview overview 12 G gateway deployment advantages 21 gateway deployment (continued) basic 21 considerations 22 multi-tier 22 general deployment considerations 17 H help 14 K key features overview 9 L LDAP compatibility 18 supported servers 18 load balancing 20 M mail flow 13 message filtering intra-enterprise 18 MTAs using additional 17 multi-tier gateway deployment 22 advantages 22 considerations 23 MX records adjusting 20 N new features overview 10 P positioning with other filtering products 18 post-gateway deployment 23 advantages 24
34 34 Index post-gateway deployment (continued) considerations 24 S Scanners 12 configuring 17 supported LDAP servers 18 T Transformation Engine 13 U Understanding filtering 25
Symantec Mail Security Administration Guide
Symantec Mail Security Administration Guide Symantec Mail Security Administration Guide The software described in this book is furnished under a license agreement and may be used only in accordance with
Symantec Critical System Protection Agent Event Viewer Guide
Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government
Symantec Critical System Protection Configuration Monitoring Edition Release Notes
Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book
Symantec Mail Security for SMTP. Administration Guide
Symantec Mail Security for SMTP Administration Guide Symantec Mail Security for SMTP Administration Guide The software described in this book is furnished under a license agreement and may be used only
Symantec Mail Security Appliance Version 7.5 Administration Guide
Symantec Mail Security Appliance Version 7.5 Administration Guide Symantec Information Foundation 12617000 Symantec Mail Security Appliance Version 7.5 Administration Guide The software described in this
Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0
Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase
Symantec Mail Security for SMTP. Installation Guide
Symantec Mail Security for SMTP Installation Guide Symantec Mail Security for SMTP Installation Guide The software described in this book is furnished under a license agreement and may be used only in
Symantec Critical System Protection Agent Event Viewer Guide
Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance
Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide
Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under
Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference
Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement
Symantec Backup Exec System Recovery Granular Restore Option User's Guide
Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under
Symantec LiveUpdate Administrator. Getting Started Guide
Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used
Veritas Cluster Server Getting Started Guide
Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished
Symantec Messaging Gateway for Service Providers 10.5. Implementation Guide
Symantec Messaging Gateway for Service Providers 10.5 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of
Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference
Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement
Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide
Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book
Email Encryption. Administrator Guide
Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
Symantec Mobile Management for Configuration Manager
Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software
Symantec Security Information Manager - Best Practices for Selective Backup and Restore
Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in
Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4
Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is
Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc
Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described
Symantec Enterprise Security Manager Patch Policy Release Notes
Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes The software described in this book is furnished under a license agreement
Symantec Endpoint Protection Shared Insight Cache User Guide
Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and
Symantec Protection Engine for Cloud Services 7.0 Release Notes
Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and
Symantec Client Firewall Policy Migration Guide
Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance
Symantec Security Information Manager 4.8 Release Notes
Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used
Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1
Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a
Symantec Protection Center Enterprise 3.0. Release Notes
Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used
Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0
Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the
Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1
Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is
Symantec Response Assessment module Installation Guide. Version 9.0
Symantec Response Assessment module Installation Guide Version 9.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7
TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms
Symantec Security Information Manager 4.6 Administrator's Guide
Symantec Security Information Manager 4.6 Administrator's Guide Symantec Security Information Manager 4.6 Administrator's Guide The software described in this book is furnished under a license agreement
Symantec Enterprise Vault
Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used
Symantec Mail Security for Microsoft Exchange Getting Started Guide
Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide
Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished
Symantec Mobile Security Manager Administration Guide
Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager The software described in this book is furnished under a license agreement and may be used only in accordance with
Symantec Hosted Mail Security Administration Guide
Symantec Hosted Mail Security Administration Guide Symantec Hosted Mail Security Administration Guide Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software
Symantec Security Information Manager 4.5 Administrator's Guide
Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide The software described in this book is furnished under a license agreement
Symantec Messaging Gateway 10.0 Installation Guide. powered by Brightmail
Symantec Messaging Gateway 10.0 Installation Guide powered by Brightmail The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of
Symantec Enterprise Vault Technical Note
Symantec Enterprise Vault Technical Note Configuring Internal and External WebApp URLs for OWA 2007 SP4 and later Symantec Enterprise Vault: Configuring Internal and External WebApp URLs for OWA The software
Symantec Mail Security for Microsoft Exchange Server 2007/Server 2010
Symantec Mail Security for Microsoft Exchange Server 2007/Server 2010 Implementation Guide Symantec Information Foundation Symantec Mail Security for Microsoft Exchange Implementation Guide The software
Symantec NetBackup Vault Operator's Guide
Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and
Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide
Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software
Symantec Mobile Management 7.2 MR1Quick-start Guide
Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only
Symantec Virtual Machine Management 7.1 User Guide
Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in
Configuring Symantec AntiVirus for NetApp Storage system
Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system The software described in this book is furnished under a license agreement and may be used
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide
Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.5 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this
Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference
Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector for Blue Coat Proxy Quick Reference The software described in this book is furnished under a license agreement
Email Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
Symantec System Recovery 2013 Management Solution Administrator's Guide
Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a
Symantec NetBackup OpenStorage Solutions Guide for Disk
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a
Symantec Enterprise Vault
Symantec Enterprise Vault Setting up SMTP Archiving 11.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used
Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide
Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software
Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide
Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this
Symantec Secure Email Proxy Administration Guide
Symantec Secure Email Proxy Administration Guide Documentation version: 4.4 (2) Legal Notice Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo
Symantec Data Center Security: Server Advanced v6.0. Agent Guide
Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and
Symantec Endpoint Protection Small Business Edition Client Guide
Symantec Endpoint Protection Small Business Edition Client Guide Symantec Endpoint Protection Small Business Edition Client Guide The software described in this book is furnished under a license agreement
Symantec Endpoint Protection and Symantec Network Access Control Client Guide
Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished
Symantec AntiVirus Corporate Edition Administrator's Guide
Symantec AntiVirus Corporate Edition Administrator's Guide Symantec AntiVirus Corporate Edition Administrator's Guide The software described in this book is furnished under a license agreement and may
Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5
Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Email Quick Reference. Administrator Guide
Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec
PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes
PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP
Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide
Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide The software described in this book is furnished under a license
Symantec Mail Security for Microsoft Exchange
Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license
Symantec Security Information Manager 4.5 Reporting Guide
Symantec Information Manager 4.5 Reporting Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation
Symantec Event Collector 4.3 for SNARE for Windows Quick Reference
Symantec Event Collector 4.3 for SNARE for Windows Quick Reference Symantec Event Collector for SNARE for Windows Quick Reference The software described in this book is furnished under a license agreement
Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide
Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide The software described in this book is furnished
Symantec ApplicationHA agent for Internet Information Services Configuration Guide
Symantec ApplicationHA agent for Internet Information Services Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Internet Information Services Configuration Guide
Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1
Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement
Symantec AntiVirus Installation Guide
Symantec AntiVirus Installation Guide 10517969 Symantec AntiVirus Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the
Symantec System Recovery 2011 Management Solution Administrator's Guide
Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide The software described in this book is furnished under a
Symantec Enterprise Vault
Symantec Enterprise Vault Reporting 10.0 Symantec Enterprise Vault: Reporting The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
Symantec Mail Security for Microsoft Exchange
Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0.2 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license
Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1
Veritas Operations Manager Release Notes 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes The software described in this book is furnished under a license agreement and may be used only in
Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide
Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described
Symantec AntiVirus for Network Attached Storage Integration Guide
Symantec AntiVirus for Network Attached Storage Integration Guide Introducing Symantec AntiVirus for Network Attached Storage The software described in this book is furnished under a license agreement
Symantec Event Collector 4.3 for Cisco PIX Quick Reference
Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector for Cisco PIX Quick Reference The software described in this book is furnished under a license agreement and may be used
Symantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes
Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this
Symantec Endpoint Protection and Symantec Network Access Control Client Guide
Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished
Symantec NetBackup for Lotus Notes Administrator's Guide
Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished
Symantec AntiVirus Enterprise Edition
Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise
Symantec Enterprise Security Manager Modules. Release Notes
Symantec Enterprise Security Manager Modules for MS SQL Server Databases Release Notes Release 4.1 for Symantec ESM 9.0.x and 10.0 For Windows 2000/2008 and Windows Server 2003 Symantec Enterprise Security
Symantec Security Information Manager 4.5 Installation Guide
Symantec Security Information Manager 4.5 Installation Guide PN: 10912602 Symantec Security Information Manager 4.5 Installation Guide The software described in this book is furnished under a license agreement
Symantec Client Security Administrator's Guide
Symantec Client Security Administrator's Guide Symantec Client Security Administrator's Guide The software described in this book is furnished under a license agreement and may be used only in accordance
Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server
Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Windows 6.1 February 2014 Symantec Storage Foundation and High Availability Solutions
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Websense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes
Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes November 2012 Veritas Operations Manager Advanced Release Notes The software described in this book is furnished under a license agreement
