E-MAIL DEFENDER SERVICES



Similar documents
Using the Barracuda to Filter Your s

Using the Barracuda Spam Firewall to Filter Your s

KUMC Spam Firewall: Barracuda Instructions

Western University Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide

HOW TO: Use the UWITC Barracuda Spam Filter System

Barracuda Spam Firewall Users Guide. How to Download, Review and Manage Spam

How To Manage Your Quarantine On A Blackberry.Com

Barracuda Spam Firewall User s Guide

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc S. Winchester Blvd Campbell, CA

Gordon State College. Spam Firewall. User Guide

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc S. Winchester Blvd Campbell, CA

Barracuda Spam & Virus Firewall User's Guide 5.x

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User 's Guide 6.x

Purchase College Barracuda Anti-Spam Firewall User s Guide

How does the Excalibur Technology SPAM & Virus Protection System work?

Using Barracuda Spam Firewall

Barracuda Spam Firewall

TechTip #40: Controlling the new Spam filter

Barracuda Spam Firewall

Barracuda Spam Firewall User s Guide

Spam Management. Manage your FOPE Spam Quarantine

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Plesk for Windows Copyright Notice

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Quick Start Guide for End Users

FILTERING FAQ

How to Use Red Condor Spam Filtering

BARRACUDA. N e t w o r k s SPAM FIREWALL 600

IT Services page 1 of 10 Spam Filtering. Overview

Personal Spam Solution Overview

Barracuda Spam Control System

eprism Security Suite

eprism Security Suite

USER S MANUAL Cloud Firewall Cloud & Web Security

Apps4Rent Hosted Exchange Spam Management Interface Guide.

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you.

HOSTED EXCHANGE ADVANCED SECURITY. Hosted Exchange Advanced Security Feb 2013

What makes Panda Cloud Protection different? Is it secure? How messages are classified... 5

- Spam Spam Firewall How Does the Spam Firewall Work? Getting Started username Create New Password

About this documentation

PANDA CLOUD PROTECTION User Manual 1

Patented hosting technology protected by U.S.Patents 7,0909,948; 7,076,633. Patents pending in the U.S.

Plesk 7.6 For Windows User Guide

Understanding Junk filtering & Anti-Spam controls

Parallels Plesk Control Panel

Using the University s Spam and Virus Filtering Service

Junk Filtering System. User Manual. Copyright Corvigo, Inc All Rights Reserved Rev. C

Migration Manual (For Outlook Express 6)

ASAV Configuration Advanced Spam Filtering

CONFIGURING FUS ANTI-SPAM

Parallels Plesk Panel

More Details About Your Spam Digest & Dashboard

the barricademx end user interface documentation for barricademx users

Migration Manual (For Outlook 2010)

CanIt-PRO End-User s Guide Roaring Penguin Software Inc. 9 September 2005

LOGGING IN. Please take a moment to add this page to the favorites in your preferred Web Browser. (

Parallels Plesk Panel

Green House Data Spam Firewall Administrator Guide

SpamPanel Level Manual Version 1 Last update: March 21, 2014 SpamPanel

PANDA CLOUD PROTECTION / Administrator s Manual / 1

Spam Management Service Users Guide

Quick Start Policy Patrol Mail Security 9

Manual Spamfilter Version: 1.1 Date:

How to Use the KartHost Kloud Mail Service

Navigating Through SpamTitan

QUICK START GUIDE

anomaly, thus reported to our central servers.

BARRACUDA SPAM FIREWALL FAQ

1 Accessing accounts on the Axxess Mail Server

Table of Contents. I. Approver Setup Process II. Client Login and Password Functions III. Setup Notification and Alternates...

Mimecast Addin Tips and Features

Introduction. How does filtering work? What is the Quarantine? What is an End User Digest?

IBM Express Managed Security Services for Security. Anti-Spam Administrator s Guide. Version 5.32

Quick Start Policy Patrol Spam Filter 5

PineApp Daily Traffic Report

Filtering Admin Guide. Guide to Administrative Functions of Spam and Virus Filtering Service

Quarantine Central for end users: FAQs

Barracuda Spam Firewall Users Guide. Greeting Message Obtaining a new password Summary report Quarantine Inbox Preferences

Quick Start Policy Patrol Mail Security 10

Tufts Technology Services (TTS) Proofpoint Frequently Asked Questions (FAQ)

Outlook Web App McKinney ISD 5/27/2011

Comprehensive Anti-Spam Service

Anti Spam Best Practices

Encrypted Users Guide. Revised 6/8/2015

HPL Barracuda Spam/Virus Firewall

Core Essentials. Outlook Module 1. Diocese of St. Petersburg Office of Training

Help Desk Web User Guide

Stores copies of items you sent to others, by default. Stores items created offline that you want to send the next time you are online

Cloud Services. Anti-Spam. Admin Guide

Mailbox control panel. User guide

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

OUTLOOK 2010 TIPS TABLE OF CONTENTS 1. SEND A BLIND CARBON COPY MARQUETTE UNIVERSITY IT SERVICES

Personal Online Banking & Bill Pay. Guide to Getting Started

Managing Junk Mail. About the Junk Mail Filter

THE UNIVERSITY OF EAST ANGLIA S NEW SPAM TRAP SYSTEM

PROOFPOINT - SPAM FILTER

Documentation. The iq.suite Quarantine. Dealing with quarantined s. Access via Notes client

Securepoint Security Systems

Transcription:

E-MAIL DEFENDER SERVICES Email Defender User Guide 2015-02-12 What does E-Mail Defender do? Anti-Virus testing to eliminate known and suspected viruses. Blacklist services check distributed lists for fingerprints of known spam. Combined filters eliminate over 90% of known and suspected spam and virus activity. All identified spam and e-mail's containing viruses are stopped before entering your mail stream. We filter more than 450,000 messages per day, speeding through only valid communications. What happens after E-Mail Defender filters and cleans incoming e-mail? If the e-mail is "clean" and does not raise spam flags, it is passed on to the end user. If minor potential spam indicators are indentified, an e-mail will be tagged as "spam" in the subject line. o i.e.: [EmailDefender SPAM suspect] This clean, virus free e-mail is passed on to the user throughout the day. o Do not be alarmed if you do not regularly see a "spam" alert - that is how it should be! What do I need to do to make my personal E-Mail Defender functional? Nothing, unless you wish customize the E-Mail Defender default settings to enhance your service. Why might I want to look into customizing my personal E-Mail Defender? To permanently block a sender from cluttering up your e-mail box. To permanently add a sender who may normally be tagged as spam (i.e. newsletters). To allow for reviewing of tagged mail in a Pending box rather than in your normal mail stream. READ ON! Those are just a few reasons we find users interested in becoming fully interactive with their E-Mail Defender User interface. We have provided a fairly comprehensive ~ although not all inclusive ~ user guide below so that those who have an interest in fine tuning their Spam process feel comfortable doing so. User Aide for Secant E-mail Defender Version 2008 Access your E-mail Defender directly using the following link: https://emaildefender.secantnet.net/ Your user name is your corporate e-mail address Your password is the same one you use to log into your current e-mail service. o Occasionally this is not possible, in which case Secant will provide a user password. Page: 1 of 8

Managing your TRAP CONTENTS In the TRAP CONTENTS module you will find your storage for e-mail that has been stopped from entering your mail stream and a way to search, correct and review that mail. When E-mail Defender receives an e-mail for you, it scores the message for its spam probability. This score starts at 0 (definitely not spam) and increases from there based on a series of ratings and tests that are applied. Based on this score, E-mail Defender either allows, tags, or blocks the message. Secant only retains blocked e-mail incidents with a reasonable spam score (12 or less) as volume permits. After logging into the E-mail Defender User Interface, you may select the TRAP CONTENTS tab which provides 3 link options. (When making changes to the options in any section you will want to click Submit Changes before leaving the section to ensure your changes are put into place.) 1. Under PENDING you will: a) Find no entries if you have chosen the tagged method which sends suspicious e-mail directly through to your regular mail box with a suspected spam tag. THIS IS THE SECANT DEFAULT SETTING. b) Find e-mail that is classified as spam if you have chosen to use the pending messages option. I. You may click on to accept and submit to white list a. Once you accept, please allow 5-10 minutes for mail to route to your in box. II. You may click on to reject and submit to the black list 2. Under SPAM you will find a complete list of the recent mail delivered to your box that has been classified as spam. a) To Accept or Reject a specific sender for future communications: I. Click on the user e-mail address (the part before the @) under the SENDER column. Email Defender User Guide 2015-02-12 Page: 2 of 8 (rev.2)

II. Select the appropriate ACTION from the drop down list, your choices are: a. NO CHANGE allow Secant to continue filtering per normal procedures b. ALWAYS ALLOW remove from Secant spam filter process forever (=White List) c. ALWAYS REJECT block receipt of mail from this sender (=Black List) d. ALWAYS HOLD FOR APPROVAL Tag as suspected spam always e. HOLD if looks like SPAM will be placed in your pending box. f. DELETE from Table remove from the list of retained spam. III. Click Submit Changes to ensure your preference is set for that sender. Please note that when you make a selection in one screen, it may pop you to another module where the change is actually managed before sending you back to your originating area. Select how you want this person's mail handled in the future. b) To Accept or Reject a specific domain for future communications: I. click on the domain address (the part after the @) under the SENDER column II. Select the appropriate ACTION from the drop down list (just as for sender): III. Click Submit Changes to ensure your preference is set for that domain. Page: 3 of 8

c) To view the details of the communication before making a determination: I. Click on the DATE of the message to open up e-mail details on this spam. When calling Secant for assistance, please provide this "incident number". II. Click Train as spam or Train as non-spam if you would like to train the Bayesian filter. III. Click Thaw if you would like manually reject or accept the message. Once you thaw the message, it will allow the exact same message from that sender to be resent. You will want to call the sender to resend the message if you wish it to appear in your e-mail box. **If you are curious and adventurous, this is also the location of the information related to the scoring of the spam in addition to tracking notes for any actions taken to date on that particular e-mail. It will look like this: Page: 4 of 8

3. Under ADVANCED QUERY you will be able to search current archive of spam classified e-mails in a variety of ways by filling in query filters of your choosing and clicking submit. It will return you a list of items that meat your search criterion from the current stores of spam tied to your account. You may narrow your search or widen it as you choose based upon your entries. Secant will maintain an ongoing reasonable store of your blocked mail (as volume storage permits) with a Bayes score of less than 12 to allow you an opportunity to search for mail that may have tested erroneously as spam. Changing your User Preferences After logging into the E-mail Defender User Interface, you may select the PREFERENCES tab which provides 3 link options. Through these modules you may change the way your suspected spam e-mail is handled, viewed, stored and delivered. 1. Under PREFERENCES selection you may change: a. Your home page for Defender Interface b. The # of entries you see when viewing trapped mail. c. The sort type and order for messages. d. The method of selecting spam trapping action steps Page: 5 of 8

2. Under STREAM SETTING selection you may: a. Raise or lower threshold score on blocked mail (we set default at 5.1) b. Adjust whether mail is simply tagged and sent on or held in TRAP PENDING. i. Tagged mail that is suspected to be spam will be sent to your mail box with a spam tag indicating that it is possible spam. ( Yes selector) ii. Message Hold will keep tagged spam in a PENDING box. (You would retrieve this mail by logging in to the Defender site and review for release those items. No selector.) **Getting too much tagged e-mail? Lower your Spam score value number. Too much of your good mail being tagged? Raise your Spam Threshold number. 3. Under NOTIFICATION you may: a. Select the e-mail address where you want notifications of PENDING mail sent (default is your standard corporate e-mail address.) i. This section only needed if you choose PENDING notification (NO) over tagged option (YES) under the STREAM SETTINGS options. (S-1200) b. Select the type of notification received. c. Select the time of day and days you would like to be notified if there is spam in PENDING. You will only receive a notification if new pending mail exists. **Please note that Outlook 2007 does not allow for the choice Use Clickable Web Form. Page: 6 of 8

Changing your User RULES: Rules refer to the classification of specific senders to ensure proper handling of incoming mail from that source. The two types of groups classified are most commonly referred to as: White list: A list of e-mail addresses or domains from which you always wish to receive messages. **E-mail Defender will block an e-mail from a white listed sender when the message contains a virus or a disallowed attachment file extension. Black List: A list of senders from whom you never want to receive messages. E-mail Defender immediately discards messages from senders on your blacklist. These messages are not tagged or placed in pending and cannot be recovered. The sender does not receive a notice that the message was deleted, and neither do you. After logging into the E-mail Defender User Interface, you may select the RULES tab which provides 3 link options. (When making changes to the options in any section you will want to click Submit Changes before leaving the section to ensure your changes are put into place.) 1. Under SENDERS selection you may: a. Enter a senders complete e-mail address and classify it to: i. Always Allow : This mail will be checked for virus and then sent right into your box without being tagged as spam. ii. Always Reject : This mail will be rejected as spam without notification or tagging. iii. Hold if Looks Like Spam : This mail will be put through the routine process and tagged as spam if spam scores are met. Page: 7 of 8

2. Under DOMAINS selection you may: a. Enter a domain address (only the text following the @ in an e-mail address. For example: @secantcorp.com.). When entering a domain address your rules will apply to any mail received from that domain as opposed to specific communications from a specified sender. iv. Always Allow : This mail will be checked for virus and then sent right into your box without being tagged as spam. v. Always Reject : This mail will be rejected as spam without notification or tagging. vi. Hold if Looks Like Spam : This mail will be put through the routine process and tagged as spam if spam scores are met. Tips on specifying addresses If you enter a full e-mail address, such as johndoe@yahoo.com, just that user is specified. If you enter just a domain, such as yahoo.com, all users in that domain are specified. If you enter a domain such as secantcorp.com, all sub domains are also included, such as support.secantcorp.com and test.secantcorp.com. Mass mailings often come from domains that do not resemble the company s web site name. For example, you may want to receive mailings from historybookclub.com, but you find that this site sends out its mailing from the domain hbcfyi.com. Examine the from: address of an actual mailing that you are trying to white list or black list to determine what to enter. 3. Under BULK ENTRY you may: a. Enter a list of e-mail addresses or domains in a specific manner and apply one set of rules to all of them. Secant recommends that you request assistance when attempting this type of process as a technician may need to verify input to ensure functionality. Your company s network administrator may have rights to access your spam control panel and assist you with searching and releasing e-mails. Secant maintains a fully staffed service desk of professionals who may assist you with any issues you may have accessing or understanding your E-Mail Eefender. You may contact our service desk through e-mail at: helpdesk@secantcorp.com. Please insert DEFENDER as the first word in the subject line. (Telephone: 375-8996) Page: 8 of 8