Clearswift SECURE Gateway
|
|
|
- Samantha Holmes
- 10 years ago
- Views:
Transcription
1 Clearswift SECURE Gateway Version 3.2 Evaluation Guide Revision 1.0 1
2 Introduction Thank you for taking the time to evaluate Clearswift SECURE Gateway. Modern business simply couldn t function without . However, both incoming and outgoing messages can pose significant risks to the security of company networks and confidentiality. It is therefore vital that an organisation s gateway is able to mitigate spam, neutralise viruses and prevent data leaks without hindering the free flow of messages. The Clearswift SECURE Gateway is a trusted gateway security solution that gets the balance right. This evaluation guide explores and explains some of the many benefits of the SECURE Gateway. Rather than overwhelm you with an indepth analysis of every feature our intention is to present the essential information that will allow you to continue to explore and evaluate of SECURE Web Gateway at your own pace. Note that this guide assumes that you have already followed the Clearswift SECURE Gateway Getting Started Guide. As such, you should have completed the Initial Setup Wizard and be able to log in to SECURE Gateway. If this is not the case then the Getting Started Guide can be found on the Technical Guides area of the Clearswift website please read it before proceeding. We ll start with a brief overview of what you can expect to see the user interface. As that s a bit of a mouthful, we ll call it the UI from hereon. Here s an overview of what we ll cover: Defining an anti-spam policy for your organisation Tailoring anti-spam policy for specific groups or departments Blocking unauthorised attachments while allowing the free flow of information Performing keyword searches across messages and their attachments Safely encrypting sent to external organisations Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision 1.0 2
3 The UI When you first log in you will be presented with this Home page: The Home page is the starting point for managing SECURE Gateway s features and for implementing and maintaining an effective spam policy for your organisation. It is supported by a further six pages, or Management Centers, displayed as tabs across the top of the GUI Policy, Message, Report, System, Health and Users. Let s take a closer look at these... The Home page presents an overview of SECURE Gateway. It is the first page displayed each time you log in. The Policy Center lets you define and maintain an Acceptable Usage Policy (AUP) for your organisation. This involves creating rules to manage information flowing in to and out of your organisation. Use the Policy Center to create rules and routes that determine which addresses and domains are allowed or blocked and who is allowed to send and receive messages. The Message Center manages held, or quarantined, messages. It also offers the ability to run the message-tracking tools, allowing you to trace the paths of any passing through the SECURE Gateway. The Report Center provides access to the monitoring capabilities of SECURE Gateway. It collates and presents information on the activities of users, including the most popular domains, the busiest users and the types of attachments sent and received. It can also generate detailed reports on incoming spam and detected viruses. 3
4 The System Center is used to manage some of the more technical aspects of SECURE Gateway. The most important settings will have been configured during the Initial Setup Wizard, so there s not too much to worry about with this Center. However, they can be edited from here at any time. The Health Center is the place to view real-time usage information for SECURE Gateway. Key metrics available here include such as the spam and virus profiles, SMTP connections, processor usage, system update information and the volume of encrypted/decrypted messages that have been processed. The Users Center control access to the aforementioned management Centers. Use it to create new administrative users, allowing access to all or selected Management Centers. This evaluation guide will focus on the most important Management Centers, offering simple guidelines on making the most of them. Policy Center We ll start by exploring the Policy Center. It is likely that the majority of your of time will be spent here, creating and managing the rules that define the policy. The good news is that the SECURE Gateway comes with a default policy that can be fine-tuned quickly and easily to meet your organisation s specific needs. The policy is defined in SECURE Gateway using a combination of content rules, policy routes and Clearswift s TRUSTmanager and SpamLogic technologies to identify and filter 99.5% of spam and prevent malware infections. In simple terms, content rules examine every message passing through the SECURE Gateway, performing a variety of security checks. These rules can be created and reused multiple times to enable the administrator to manage even complex policies with ease. A plain-english example of a content rule could be written like this: Detect confidential material in outbound messages and inform IT security personnel. To view current content rules simply click the Content Tools link These content rules become part of policy routes. So, again in plain English, a route might be thought of along these lines: Outbound messages from the sales department. As such, messages can be subjected to different sets of rules dependent on the route through which they re flowing. Click Mail Policy Routes to see the default settings. As well, Clearswift s SpamLogic technology allows for a global spam policy for each SECURE Gateway. You might, for example, configure SpamLogic to reject all messages that come from known spam sources. For flexibility it is also possible to create a special Spam Content Rule for a particular group of recipients. To explore these options, just click SpamLogic Settings. Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision 1.0 4
5 Click Mail Zero Hour Malware, meanwhile, to determine how the SECURE Gateway will react to attachment-laden messages containing confirmed or suspected malware. It s worth noting at this point that these checks are run early in the sequence of message examination. As such, messages may be rejected or quarantined before the SECURE Gateway anti-virus engine is run. Content Rules As noted, Clearswift SECURE Gateway uses content rules in conjunction with routes to manage the free flow of information via . This table describes the available content rule types: CONTENT RULE DESCRIPTION USES CAN CAUSE MESSAGE QUARANTING Add Disclaimer Places annotation at the top or bottom of the message body (e.g. Company Disclaimer ) Message Annotations No Add Disclaimer Conditionally Places annotation at the top or bottom of the message body (e.g. Company Disclaimer ) based on specified conditions, such as a particular word or phrase being present in or absent from the message Message Annotations Lexical Expressions No Detect filenames Checks the message for attached files and then checks if they match the names from a defined list Filenames Yes Detect Lexical expression Checks the message for specific words, phrases or patterns against a defined dictionary Lexical Expressions Yes Detect Spam Overrides the global spam policy for this particular direction of traffic Yes Detect Virus Defines the behaviour when a message with a virus is detected. For example, a message subject to this rule may be held or deleted Yes Digital Signature Validation If the message has been digitally signed, this rule checks to see if all or some of the signatures are valid Yes Encryption or Decryption Fails Defines how to process the if there is a failure when trying to either encrypt or decrypt a message Yes Message Modification Fails Defines how to process the if there is a failure when trying to modify the message (when adding a disclaimer, for example) Yes Message Processing Fails Defines how to process the if there is a failure when trying to process the message (when parts of the message are corrupt, for example) Yes Message Size Restriction Defined the behaviour when messages which is over a certain size is processed Yes All traffic Special rule to force the disposal of a message based purely on who is sending or receiving the message Disposal actions Yes Detect unacceptable images Checks message to see if they contain images that have either been dynamically classified as unacceptable or whether the System Administrator has preclassified them as acceptable or unacceptable Pre-classified images defined in Policy > ImageLogic Yes 5
6 Content rules are constructed using items from the content reference sections in order to define the detailed part of the security check that is being performed on that message. uses Modified with generates Defines what the content rule has to look for Defines notifications and what happens to messages (held, relayed or deleted) Defines how messages are modified These base rules can be re-used throughout the policy. It is advisable when creating the rules to use sensible names as it will make the Acceptable Use Policy self-documenting. Policy Routes When a message is received by the SECURE Gateway it is processed against the security policy in the following order: 1. [optional] Global spam policy 2. [optional] Global anti-malware checks 3. Identify most appropriate policy route based on sender and recipient of that message. Then a. Process message using each content rule in that policy route b. Determine the outcome for the message dependent on the triggered rules Policy routes are listed in a table format, which the SECURE Gateway processes from top to bottom. The first route that provides a match for the sender and recipient addresses will be evaluated. If no route is matched, a final catch-all route is used to define the default actions for the message. Spam and Malware Policy Default action for all messages Address Lists based on manual and LDAP entries defined in the Addresses in the Policy Center Catch-all route. If messages are processed here, then it is likely that you have incorrectly configured the policy routes Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision 1.0 6
7 Ordering of policy routes is important. Explicit rules should be placed at the top of the list, with less-specific rules below them. Why? Well, consider this following example routing table: ROUTE NUMBER FROM TO 1 *@clearswift.com *@hotmail.com 2 *@clearswift.com [email protected] 3 [email protected] [email protected] Remember, routes are process from top to bottom. So, if the SECURE Gateway was evaluating messages using this routing table then s sent from [email protected] to [email protected] would match Route 1 right away, and be processed accordingly. In other words, even though Route 3 provides an explicit match it would never be reached because the message would ve already been picked up by Route 1. But reverse the order of the table (from to 3-2-1) and the explicit route would be able to do whatever job is required. Remember, too, that each route has a specific series of rules to be performed against the messages. The order of these rules is similarly important, as they are evaluated from left to right. Consider this example: At a casual glance, this may seem like an effective route. However, the order of these rules isn t terribly sensible. The Detect Confidential Material rule performs a keyword search on the message body, looking for sensitive words and phrases. But, there is little point performing such a search if the message contains a virus. Messages carrying viruses are likely to be deleted, so performing the keyword search first is a waste of time and resources. By the same token, it is more sensible to add legal disclaimers after all the other rules have been processed. Here, then, is a more efficient order for this particular set of rules: 1. Drop messages containing a virus 2. Detect Confidential Material 3. Detect Credit Card Lexical Expression 4. Add Legal Disclaimer 7
8 Message Center The Message Center is the place to manage held, or quarantined, messages. As detailed earlier when discussing the SECURE Gateway GUI, the Message Center also offers the ability to run the message-tracking tools and identify messages that are pending delivery. Batch operations allow for mass operations (delete, release etc.) on messages that match a specific search query Query the tracking history to identify when and how a message was processed Messages areas with count and total size for that particular area. If this SECURE Gateway is peered it will show a consoildated view of all messages areas across all peers Messages that are waiting to be processed, waiting for delivery and waiting for a retry event if the initial delivery attempt was unsuccessful It is possible to create administrator accounts that have privileges sufficient only to manage a subset of the quarantine areas. Similarly, it is access to the SECURE Gateway s message-tracking feature can be restricted. Note that the security for these sections is managed in conjunction with the User Center. The maximum size of the message areas is dictated only by the amount of free disk space available to the system. The actual number of quarantine areas is also unrestricted. However, it s worth noting that SECURE Gateway is not designed as a message archive. As such, we wouldn t recommend long-term archival of messages. Drilling down into a particular area exposes all the messages in that area. To do this, just click the plus ( + ) symbol alongside an area. Here, we ve drilled down into the Confidential area: Available message handling Page length Page controls It s possible to drill down still further, to view information about a particular message. To do this, simply double-click the message: Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision 1.0 8
9 This panel explains which set of policy rules were applied to this message and triggered content rule Explanation to show where in the message the violation occurred Clearswift SECURE Gateway offers a very powerful messagetracking feature, allowing authorised administrators to be able to search the message-processing logs. This is useful for tracking what has happened to a particular message. When you start Message Tracking you can define you search criteria based on numerous fields such as sender, recipient, subject, sending host, received date and on which gateways the search is to run Flexible search criteria allow for generic or precise reporting on messages that have been accepted or rejected on this SECURE Gateway or one of its peers. Here s an example search results: As before, it is possible to drill down to a particular message just double-click: Next hop delivery with timestamp 9
10 Report Center Clearswift SECURE Gateway includes versatile management and reporting facilities, all controlled from a simple web-based interface. Dozens of ready-made report templates are included and new ones can be created quickly and simply. Better still, SECURE Gateway s reports are interactive: drill down on the fly to get to the data you need quickly and avoid producing useless reports. Here s what it looks like: Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision
11 Obvious, most relevant report groups will depend on your organisation. However, here are a few pointers for useful reports that will provide a good place to start your exploration of SECURE Gateway s Report Center: Top Addresses. Use this group of reports to find the biggest senders of message in your organisation. Note that it s possible to view reports both on volumes of messages flowing in and out. Threats Summary. This report, which you ll find in the Threats group, gives an overall view of the number of messages that have been detected with viruses, spam or other content check. Message Processing Rates. These reports, found in the General Processing group, can provide an at-a-glance view of peak sending/receiving times. Reports can be run by selecting the report and pressing View, or by simply double-clicking the report name. The provided reports display user activity for all users. It is likely, though, that you ll want reports to focus on specific user groups or individuals over a specific time periods. Moreover, it is useful to schedule reports for automatic delivery, rather than executing them on a manual basis. As such, we d advise tweaking some of the reportfiltering parameters to create reports tailored for your organisation s needs. Here, for example, are the parameters for the provided Average Message Processing Lag Per Day report: Parameters for that report Changing a report s filters is easy. First click to highlight the report that is the closest match for your reporting requirements. Now click Copy to create a copy of the report that can be edited as necessary. To change any of the filter parameters, just click the appropriate tab: The filter parameters and their meaning should be self-explanatory. Note that in order to generate reports based on domains or address routes; these will obviously need to be created prior to customising a report. When creating a report notice that its icon changes to include a blue person. Create a report with a schedule and a little clock icon is added, too. 11
12 SECURE Gateway s reports are interactive. As such, it is possible to drill down on data to receive a more detailed report. For example, after running the Top Virus Names report, clicking on the virus name will run another report to show the list of senders of that particular virus. Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision
13 System Center The System Center provides access to settings that define how the SECURE Gateway operates and how it interacts with components in your existing environment. Here s what it looks like: Tools for diagnosing connectivity issues The System Center is split into three sections - Monitoring & Control, Configuration and Appliance Version & License. Let s explore these in more depth. Monitoring and Control The Logs & Alarms section allows the administrator to be able to view the logs that been generated by the SECURE Gateway. Each log is automatically rolled over at the end of the day and held for 30 days. If you require a longer retention periods, then use the Backup & Restore feature in the System Center or create scripts to move the files off the SECURE Gateway installation as and when required. Options to view whole log in browser window or mail to yourself Log data is exposed in the GUI and doesn t require administrators to access operating system 13
14 As well, you can use this section to modify how SECURE Gateway handles triggered alerts. By default alerts will be displayed in the GUI. If desired, use the relevant option to send an alarm by or SNMP. The Service Control section offers administrators with sufficient privileges the ability to gracefully shut down individual services or the entire SECURE Gateway. Shutdown option. Available to administrators with shutdown access rights Configuration The majority of the options found in the System Settings section will have already been defined in the Initial Setup Wizard. Should adjustments need to be made when moving the SECURE Gateway from a test to a live deployment, though, they will most likely be enacted here: IP Address, Subnet, Default Gateway and hostname defined here This section needs to completed for HTTP access via a proxy SSH is off by default, but can be enabled for a subset of IP addresses Access control to the management interface is defined here Time settings such as NTP server are defined here Perhaps obviously, SECURE Gateway SMTP configuration is managed in the SMTP Settings section of the product lets you define the SMTP configuration of the product. Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision
15 Add routing information for your internal domains here The PMM Settings section is the place to configure SECURE Gateway s Personal Message Management (PMM) feature. It s possible, for instance, to specify the format of the message such as text and company logo and how frequently the users will receive messages showing messages held for them. The administrator can afford end users control over the delivery of certain s. Messages identified as spam, for example, could be released if the user determines that the is in fact legitimate. Alternatively, certain staff may be given the right to release outbound messages that would otherwise be blocked by the SECURE Gateway. These PMM features can be enabled on an individual, group or company-wide level. To do this click the Policy tab followed by Manage Disposal Actions. Enable for PMM Define the IP addresses of internal hosts who are permitted to the gateway Control what users will be able to self release messages 15
16 The PMM notifications are sent to users according to a schedule. To view or edit this, click the System tab followed by PMM Settings then PMM Service Settings. Here s what you ll see: The pink cells indicate a Full Distribution. At these times, SECURE Gateway will send notifications to all users showing all held messages. The green cells indicate a Partial Distribution : this generates notifications only for users for whom new messages have been held since the last full distribution. SECURE Gateway also offers the ability for users to add addresses (including full domains) to a whitelist, to prevent these messages being held. These options are also managed from this part of the UI. Clearswift knows that many organisations will deploy more than one SECURE Gateway. This affords common policy, common message management and common reporting but the Gateways must first be peered together. This is a straightforward process. Simply enter the IP address and user credentials of an additional peer in the Peer Appliances section. Clearswift SECURE Web Gateway devices can also be added to the peer group, allowing policy to be shared and simple administration from a unified interface. Here is what the Peer Appliances section looks like you d just click New to add a peer: The SECURE Gateway product is of course very reliable. However, the Backup & Restore section provides a simple way to schedule an automatic backup of policy, system settings and the auditing database to an FTP server. Here s a typical view: Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision
17 The SECURE Gateway stores the last 20 configurations online, each is tagged with the reason why the configuration was made, by whom and from where. Previous copies of policy cab easily be made into the live version, if a change made needed to be reverted. Previous policy configurations that be restored or backed up Change history, who, what, where from and when 17
18 Appliance Version & License SECURE Gateway is able to automatically update its antivirus and anti-spam defences, without administrator intervention. Similarly, updates to the SECURE Gateway itself are also downloaded automatically. However, it is important to understand that these product updates are NOT applied without action from the administrator. This is where the Appliance Version & Upgrades section comes in. The administrator is notified of new releases, via GUI alerts and optional SNMP or SMTP alerts, and then must decide what action to take. This screenshot shows the Appliance Version & Upgrades section on a SECURE Gateway that has had some upgrades applied: Self-testing the SECURE Gateway One of the SECURE Gateway s strengths is its comprehensive collection of self-test features. These save time wasted on needless support calls, allowing you to detect and resolve issues quickly and easily. Click the System tab to return to the System Center s home page and you ll see these options displayed in the left-hand control panel: It is impossible to consider all possible permutations of situations that may lead to problems but a good first step would be the Connectivity Test just click the link. This provides confirmation that the SECURE Gateway is connected and able to communicate before deciding which areas should be the focus of subsequent troubleshooting steps. And be reassured that when expert help is needed, Clearswift can be contacted 24 hours a day, 7 days a week. Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision
19 SpamLogic Settings Clearswift s long experience in managing spam has shown us that customers demand both high-performance spam detection and simple controls over the behaviour of the anti-spam measures. As well, some customers choose to reject as many identified messages as possible, while others want spam quarantined for later review just in case. The Clearswift SECURE Gateway s granular controls can be configured to deal with spam in just the way you want. We call this SpamLogic. These filters are coupled with the Clearswift TRUSTmanager. This is a cloud-based IP-reputation service that contains the standing of over 50 million IP addresses. These are gathered from a number of trusted sources, including other SECURE Gateways around the world. So, as Clearswift continues to grow, so too does our virtual map of good and bad senders of . This first-class information means that Clearswift SECURE Gateways are able to reject connections from known bad senders at the SMTP connection, saving valuable network bandwidth. In most environments the SECURE Gateway is able to block around 90% of spam using this technique and it uses other filtering technology to bring the total spam detection rate up to a genuine 99%+ In order to get the best out of TRUSTmanager it is important that your organisation s firewalls are correctly configured. This table lists the relevant information: PORT PROTOCOL SERVICE 53 DNS 80 HTTP CURBL used for checking URLs within Messages Spam signatures checked against a highly scalable cloud-based service 8007 UDP TRUSTmanager look-ups 19
20 The effectiveness of SECURE Gateway s anti-spam measures can be checked by using the various reports or the real-time graphs in the Health Center. In this demonstration SECURE Gateway we are detecting spam by the content, not by the connection. Here, 94.9% of mail is spam, while 4.9% of messages are good If Suspicious is the only reputation being reported, then your TRUSTmanager configuration is not correctly set 64% of incoming messages are considered Bad. We could therefore discard 42m messages (64% of 65m) during the SMTP connection If the SECURE Gateway is deployed behind other message-transfer agents (MTAs) in your environment you can still use TRUSTmanager just enter the IP address or hostname of these hosts: Occasionally, the SECURE Gateway may need to process differently for a specific sender. For example, it s possible that for whatever reason the sender s MTA has wrongly ended up on a realtime block list whitelist. Another common example is where a specific staff members or groups cannot risk an inaccurate identification of messages as spam a falsepositive but still want any spam marked on the subject line. Here s how to deal with this: 1. Create an address list for the special group of recipients Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision
21 2. Create a new Detect Spam content rule 3. Create a new Detect Spam content rule 4. Add any other content rules to that route 21
22 Blocking Files Most organisations will want to stop certain file types from being sent or received. When it comes to inbound messages, the obvious candidates include any file type that could potentially carry a virus, oversized messages and frivolous attachments, such as MP3s, MPEGs and AVIs. For messages leaving your organisation concerns include leakage of sensitive data, any comments or materials that could damage the company brand or reputation, profanity and embarrassing content. Fortunately, managing these issues while still allowing staff to communicate freely is easy with the SECURE Gateway. We ll consider the Detect Media Type content rule can help weed out those time-wasting attachments. The advantage of the Detect Media Type content rule is that it uses binary recognition of the data to determine the file type. So, even if a file is renamed it will still be detected. Here s what it looks like: By selecting this grouping, all executable filetypes can be blocked, or click on the + and select the individual formats that can be blocked Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision
23 Determine what to look for and then define what to do in the event that the file type was detected in a message. The options available in particular content rule are: Drop the message Non-deliver the whole message Hold in a <particular> message area Relay to a specific mail server Deliver the message Strip the attachment Add a message header Annotate the message Generate an alert Trigger the message to be encrypted Obviously, some of these can only be used once like Drop the message. However, in most cases it is possible to have the SECURE Gateway perform multiple actions based on the detection criteria. You could, for example, strip the attachment but still deliver the message. This new rule would be added to the appropriate route of to achieve the desired goal. Controlling content by keyword One of the most powerful and popular features of SECURE Gateway is the ability to block or reroute messages based upon words or phrases found either in any of the following locations: SMTP headers Subject lines Message bodies Attachments In terms of attachments, the SECURE Gateway is able to extract and analyse documents and files from many common business applications. These include all versions Microsoft Office, OpenOffice and Adobe PDF files, as well as HTML. What s more, SECURE Gateway can even separate where in the document the content was detected, be it the body, the headers and footers or even the metadata. When it comes to search strings and patterns, SECURE Gateway gives customers the freedom to create their own lists of words, phrases and regular expressions. However, the product includes various readymade lists. As well, the SECURE Gateway can access a special set of Managed Lists : these are built and managed remotely by Clearswift, and are regularly updated with new words and phrases. These lists of lexical expressions are defined within the References section of the SECURE Gateway. They can be used in multiple instances of the Text Analysis content rule. 23
24 Defining the list The lexical expression lists are essentially collections of words, phrases, common expressions, operators and special tokens. Each entry in the list carries an expression value, from 1 to 10; there is also a special instant trigger value. By associating different values to each phrase we can ensure that a degree of sensitivity is achieved. Credit card numbers provide a good example of the usefulness of special tokens. Obviously, every credit card number is different, so SECURE Gateway can employ a credit card token as a patternmatching tool. In other words, the credit card token looks for a sequence of numbers that match the known credit card. The token looks for strings of digits between 13 and 18 characters in length and prefixes commonly used by the major credit card providers. A checksum formula is also applied to ensure that the match is accurate. Simple phrases, Tokens and Regular expressions can be mixed to provde the flexibilty required for detecting content violations Date regular expression If the credit card token is assigned the aforementioned instant value, then as soon as the SECURE Gateway detects a message containing credit card number a trigger event will take place: the message could be quarantined, for instance. However, to allow for the free flow of information the expression value can be altered. Change the credit card token s expression value to 3, say and set a threshold of 10 in the content rule and users would be able to send messages containing up to three credit card numbers. Attempting to send four credit card numbers, though, would trigger an event. Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision
25 Creating the content rule A new Detect Lexical Expression content rule can be created and configured for use. Whilst creating this particular policy rule you can define where in the message you want to check, what the necessary threshold will be to trigger a violation, what the scoring algorithm will be and also what to do when a violation does occur. Once this has been created it should be added to the appropriate Policy Routes and the configuration needs to be committed. 25
26 Managing Encryption Clearswift SECURE Gateway supports multiple methods to encrypt data from one organisation to another, including TLS, S/MIME and PGP. There s also an ad-hoc method of encryption, for password-protecting messages sent to external organisations and people. This wide choice of different techniques allows an organisation to engage in secure communications to a wide range of receiving systems. This table of typical uses provides a guide to the various types of encryption offered by the SECURE Gateway: USE CASE All messages to particular domain must be encrypted Messages sent to a domain must be secured over the internet but do not need to be secured to the desktop Messages sent to a domain must be secured over the internet but only to a group of named individuals Messages sent to recipients who are familiar with encryption software on their system and must receive the message in a secure fashion Messages encrypted at the desktop, content checked at the corporate gateway and delivered to the recipient s desktop in an encrypted format Messages sent to recipients who have no desire for any encryption software on their system and must receive the message in a secured fashion Messages sent to recipients that should only be encrypted based on the presence of certain content, such as credit card numbers METHOD TLS TLS, S/MIME, PGP S/MIME, PGP S/MIME, PGP S/MIME, PGP Ad-hoc S/MIME, PGP, Ad-hoc Encrypting a message Encrypting an requires appropriate keys or pass phrases that can be used to convert the unsecured data into a secure format. Both S/MIME and PGP employ a public/private keys format (S/MIME keys are also known as certificates), while the ad-hoc method relies on a single pass phrase. The special keys required for S/MIME or PGP can be generated automatically by the SECURE Gateway, a key generator tool (such as GnuPG) or by using a third-party service such as Verisign, Thawte or GlobalSign. These keys can be separated out into a private part, which must not be disclosed to anyone else, and a public part that can be distributed to anyone. First, though, S/MIME and PGP keys must be imported into the SECURE Gateway s Certificate Store. To do this, click the System tab followed by Certificate Store then Partners like this: Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision
27 It is possible to import the S/MIME and PGP certificates in the following key formats: PEM, ASC, B64, CER and P7B. With the keys loaded into the Certificate Store, it is possible to create encryption endpoints which define the certificates and encryption method to use for particular recipients. Here, we ll consider an example recipient called Bob Smith, whose PGP key has already been loaded into the Certificate Store: We re going to create an encryption endpoint for any messages sent to him via the SECURE Gateway. Click New in the Mail Encryption Endpoints and follow the screen options. It would look like this: Select the key to use for this endpoint or select password to use the ad-hoc method Click Save and this new endpoint will be listed in the Encryption Endpoints section of the Systems Center, here: 27
28 As such, we are now able to enforce an encryption policy for sent to To do this, we would create an policy for messages sent to this address. Then, every sent from your organisation to abc.com will be encrypted using his key. This is achieved by creating a new policy route, in the Policy Center: Address List entry for Bob Smith. This could be a generic address list for all recipients of encrypted Enable encryption So, assuming the message is processed and does not get quarantined, it will be encrypted using Bob s certificate details and sent to him. The SECURE Gateway can also force encryption based on triggering of a particular content rule. You might, for example, employ the Detect Lexical Expression rule to check for sensitive words or phrases by referencing the Confidential Material expression list and, if found, encrypt the message automatically. Here s how to do it: Threshold value to trigger on Keyword list to search against Where in the message to scan for keywords To make encryption even simpler, it is possible to create an endpoint that uses password protection. The password can be a phrase defined by and known to both sender and recipient, or it can be generated automatically by the SECURE Gateway. When this option is selected, the sender receives an acknowledgement of the password via , like this: Clearswift SECURE Gateway / Version 3.2 / Evaluation Guide / Revision
29 It s also possible to configure the SECURE Gateway to encrypt based on the type of files sent. For example, the act of sending an Excel spreadsheet could trigger an encryption event, either for all messages or to particular recipients only (like an external accounting firm, say). Decrypting Messages Finally for this guide we will cover decrypting messages. This is straightforward in the SECURE Gateway. Simply save the message recipient s private key in the Corporate tab of the Certificate Store and set it as a default key. You should see that the envelope icon will be highlighted for that key. Then, configure a policy route that will apply decryption using the key. We hope that this brief guide has given you a head start in your evaluation of Clearswift SECURE Gateway. Of course, there s plenty more to explore. For more help or guidance either follow the links below or simply give us a call we d love to hear from you. For further information Technical Guides: Clearswift knowledge base: Technical Support: Clearswift user discussion forums: 29
30 Contact Clearswift UK - International HQ Clearswift Limited 1310 Waterside Arlington Business Park Theale Reading Berkshire RG7 4SA UK Tel : +44 (0) Fax : +44 (0) Sales: +44 (0) Technical Support: +44 (0) [email protected] Australia Clearswift 5th Floor 165 Walker Street North Sydney New South Wales, 2060 AUSTRALIA Tel : Fax : [email protected] Germany Clearswift GmbH Amsinckstrasse Hamburg GERMANY Tel : Fax : [email protected] Japan Clearswift K.K 7F Hanai Bldg Shibakouen, Minato-ku, Tokyo JAPAN Tel : +81 (3) Fax : +81 (3) [email protected] Spain Clearswift España S.L. Cerro de los Gamos 1, Edif Pozuelo de Alarcón Madrid SPAIN Tel : / Fax : [email protected] United States Clearswift Corporation 161 Gaither Drive Centerpointe Suite 101 Mt. Laurel, NJ UNITED STATES Tel : Fax : [email protected]
Top 10 Features: Clearswift SECURE Email Gateway
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
Clearswift SECURE Web Gateway Evaluation Guide
Clearswift SECURE Web Gateway Evaluation Guide Revision 1.1 Introduction Thank you for taking the time to evaluate the Clearswift SECURE Web Gateway. Balancing the requirement for strong network security
Securing Microsoft Office 365
Securing Microsoft Office 365 Critical Information Protection for Hosted Email Services Microsoft Office 365 has captured the corporate imagination, but can you be sure that its security features are delivering
SECURE Web Gateway Sizing Guide
Technical Guide Version 02 26/02/2015 Contents Introduction... 3 Overview... 3 Example one... 4 Example two... 4 Maximum throughput... 4 Gateway Reporter... 4 Gateway Reporter server specification... 5
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Symantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
Essential Steps to Web Security. A Clearswift Best Practice Guide
Essential Steps to Web Security A Clearswift Best Practice Guide Introduction Web 2.0 brings Threat 2.0 The web is a highly interactive, sophisticated and increasingly mission-critical platform. As online
SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6.
Technical note Version 1.0 23/12/13 Product Information Partner Name Web Site Product Name Blue Coat Systems, Inc. www.bluecoat.com ProxySG Version & Platform SGOS 6.5 Product Description Blue Coat ProxySG
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
PureMessage for Microsoft Exchange Help. Product version: 3.1
PureMessage for Microsoft Exchange Help Product version: 3.1 Document date: June 2015 Contents 1 About PureMessage for Microsoft Exchange...4 2 Key concepts...5 2.1 Key concepts overview...5 2.2 Inbound,
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
Quick Start Policy Patrol Mail Security 10
Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
Clearswift SECURE Email Gateway V3.*
Clearswift SECURE Email Gateway V3.* Ports and Protocols Issue 3.12 July 2015 Copyright Version 1.1, July, 2015 Published by Clearswift Ltd. 1995 2015 Clearswift Ltd. All rights reserved. The materials
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
T E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
PureMessage for Microsoft Exchange Help. Product version: 4.0
PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9
Clearswift SECURE File Gateway
Security solutions for a changing world You wouldn t leave your front door unlocked if you were going out for the day, so why do the same with your business? In today s rapidly evolving business environment,
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Quick Start Policy Patrol Mail Security 9
Quick Start Policy Patrol Mail Security 9 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
1 You will need the following items to get started:
QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide
Sophos for Microsoft SharePoint Help. Product version: 2.0
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2
QUICK START GUIDE. Cisco C170 Email Security Appliance
1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance
Email Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
provides several new features and enhancements, and resolves several issues reported by WatchGuard customers.
WatchGuard XCS v10.0 Update 1 Release Notes WatchGuard XCS Build 140312 Revision Date 11 November, 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard XCS v10.0 Update 1. This
Feature Comparison Guide
Feature Comparison Guide Stay Secure Portal Autumn 2015 Contents Introduction... 3 Description on some of the new features... 5 Customer overview from partner portal... 5 Partner & customer portal linkage...
Websense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation
Sophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing Encryption on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 4 2 Encryption Options... 5 3 Basics of Encryption... 7 3.1 Public Key... 7 3.2 Private
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
F-Secure Internet Gatekeeper
F-Secure Internet Gatekeeper TOC F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper...5 1.1 Features...6 Chapter 2: Deployment...8 2.1 System requirements...9 2.2
How To Secure Mail Delivery
FortiMail Identity Based Encryption A Business Enabler WHITE PAPER FORTINET FortiMail Identity Based Encryption - A Business Enabler PAGE 2 Contents Business Need Secure Mail Delivery... 3 Challenges with
Clearswift SECURE Email Gateway V4.2
Clearswift SECURE Email Gateway V4.2 Ports and Protocols Issue 1.1 July 2015 Copyright Version 1.1, July, 2015 Published by Clearswift Ltd. 1995 2015 Clearswift Ltd. All rights reserved. The materials
Policy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Frequently Asked Questions (FAQ)
Frequently Asked Questions (FAQ) Clearswift SECURE Email Gateway 4.2 Issue 1.0 July 2015 Copyright Version 1.0, July, 2015 Published by Clearswift Ltd. 1995 2015 Clearswift Ltd. All rights reserved. The
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper
CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
Trustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
PureMessage for Microsoft Exchange 2013 startup guide. Product version: 4.0
PureMessage for Microsoft Exchange 2013 startup guide Product version: 4.0 Document date: June 2015 Contents 1 About this guide...4 2 Planning your PureMessage deployment...5 2.1 Deploying PureMessage
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information
DJIGZO EMAIL ENCRYPTION. Djigzo white paper
DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Clearswift SECURE Gateways
Clearswift SECURE Gateways Essential Components in an Information Governance Strategy Clearswift is a business with over fifteen years of experience. Its content-aware, policy-based solutions are used
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in
QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance
1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation
Do you need to... Do you need to...
TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce
INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS)
Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) This document provides an installation and configuration guide for MDaemon Messaging Server along with
Djigzo email encryption. Djigzo white paper
Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
E-Mail Security. on your terms SOFTSCAN
E-Mail Security on your terms SOFTSCAN With fraudulent and offensive emails delivered in vast quantities to businesses every day a foolproof email security system is essential. Setting the standards SoftScan
Email DLP Quick Start
1 Email DLP Quick Start TRITON - Email Security is automatically configured to work with TRITON - Data Security. The Email Security module registers with the Data Security Management Server when you install
CLEARSWIFT SECURE Web Gateway HTTPS/SSL decryption
CLEARSWIFT SECURE Web Gateway HTTPS/SSL decryption Introduction This Technical FAQ explains the functionality of the optional HTTPS/SSL scanning and inspection module available for the Web Gateway and
PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1
PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1 Contents 1 INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 5 1.1 WHAT IS PANDA CLOUD EMAIL PROTECTION?... 5 1.2 FUNCTIONALITIES... 5 2 PANDA
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Policy Based Encryption Gateway. Administration Guide
Policy Based Encryption Gateway Administration Guide Document Revision Date: Sept. 11, 2012 Policy Based Encryption Gateway Admin Guide i Contents Description of Policy Based Encryption... 1 Policy Based
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Aloaha Mail and Archive
Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
Single Product Review - Bitdefender Security for Virtualized Environments - November 2012
Single Product Review Bitdefender Security for Virtualized Environments Language: English November 2012 Last Revision: 1 st December 2012 Review commissioned by Bitdefender - 1 - Bitdefender Security for
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
ESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
Service Launch Guide (US Customer) SEG Filtering
Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required
Configuration Guide. Websense Web Security Solutions Version 7.8.1
Websense Web Security Solutions Version 7.8.1 To help you make the transition to Websense Web Security or Web Security Gateway, this guide covers the basic steps involved in setting up your new solution
SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2
Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
How To Configure Forefront Threat Management Gateway (Forefront) For An Email Server
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management
Mimecast Email Security
DATA SHEET Mimecast Email Security A fully integrated email security, continuity and archiving cloud based solution that delivers total end-to-end control of your email, mitigating email risks and reducing
Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2
Technical Note ISP Protection against BlackListing FORTIMAIL Deployment for Outbound Spam Filtering Rev 2.2 April 14, 2009 Table of Contents 1 Objective IP address protection... 3 1.1 Context... 3 1.2
Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network
MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how
Microsoft Exchange 2003
Microsoft Exchange 2003 Configuration Guide Microsoft Exchange 2003 Configuration Guide Page 1 Table of Contents Introduction... 2 Document and naming conventions... 2 Outbound email protection... 3 SMTP
Cloud Services. Cloud Control Panel. Admin Guide
Cloud Services Cloud Control Panel Admin Guide 10/18/2014 CONTENTS Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control... 2 Features Summary... 3 Creating an Encryption
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS)
Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) This document is designed to provide a quick installation and configuration guide for MDaemon along
Quick Start Policy Patrol Spam Filter 9
Quick Start Policy Patrol Spam Filter 9 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.
Customer Control Panel Manual
Customer Control Panel Manual Contents Introduction... 2 Before you begin... 2 Logging in to the Control Panel... 2 Resetting your Control Panel password.... 3 Managing FTP... 4 FTP details for your website...
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
How To Manage Your Quarantine Email On A Blackberry.Com
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
Sophos Email Appliance Configuration Guide
Sophos Email Appliance Configuration Guide Sophos TOC 3 Contents Copyrights and Trademarks...4 Setup and Configuration Guide...4 Product Overview...4 Installing a Virtual Appliance...7 Initial Configuration...9
