Cyberoam Anti Spam Implementation Guide Version 9



Similar documents
Cyberoam Anti Spam Configuration Guide Version 9

Cyberoam Anti Spam Implementation Guide Version 9

Radius Integration Guide Version 9

Cyberoam Anti Virus Implementation Guide Version 9

Virtual LAN Configuration Guide Version 9

High Availability Configuration Guide Version 9

ADS Integration Guide

HTTP Client Installation Guide Version 9

Cyberoam Multi link Implementation Guide Version 9

SSL VPN Client Installation Guide Version 9

IPSec VPN Client Installation Guide. Version 4

Cyberoam IPSec VPN Client Configuration Guide Version 4

CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad , INDIA

CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad , INDIA

CYBEROAM WINDOWS DOMAIN CONTROLLER INTEGRATION GUIDE VERSION:

SOFTWARE LICENSE LIMITED WARRANTY

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm

Cyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10

SSL VPN Management Guide Version 10

User Guide Version 9 Document version /03/2007

Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10

User Guide Version 9.5.8

Thin Client Solution Installation Guide Version

Version: 4.10 Build 010 Date: April, 2008

Unified Threat Management

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

Contents Firewall Monitor Overview Getting Started Setting Up Firewall Monitor Attack Alerts Viewing Firewall Monitor Attack Alerts

GFI Product Manual. Administration and Configuration Manual

Comprehensive Anti-Spam Service

How To Allow and Block s using White or Black List

MailFoundry Users Manual. MailFoundry User Manual Revision: MF Copyright 2005, Solinus Inc. All Rights Reserved

Trustwave SEG Cloud Customer Guide

Services Deployment. Administrator Guide

Configuration Information

Admin Guide Boundary Defense for Anti-Virus & Anti-Spam

Administration Guide Revision A. SaaS Protection

AntiSpam. Administrator Guide and Spam Manager Deployment Guide

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange

SSL VPN User Guide Version 10

Administration Guide Revision E. SaaS Protection

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

This document provides information to install X-Spam for Microsoft Exchange Server

Configuring, Customizing, and Troubleshooting Outlook Express

ContentCatcher. Voyant Strategies. Best Practice for Gateway Security and Enterprise-class Spam Filtering

IBM Express Managed Security Services for Security. Anti-Spam Administrator s Guide. Version 5.32

Overview. Accessing the User Interface. Logging In. Resetting your Password

Anti Spam Best Practices

eprism Security Suite

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

SonicWALL Security User Guide

Migration Manual (For Outlook Express 6)

Symantec Hosted Mail Security Getting Started Guide

Migration Manual (For Outlook 2010)

Quick Reference. Administrator Guide

SPAM FILTER Service Data Sheet

Steps for Basic Configuration

Symantec Mail Security for Domino

Hosted Service Documentation and Limited License Agreement

How to Use Red Condor Spam Filtering

Using the Barracuda Spam Firewall to Filter Your s

ESET Mobile Security Business Edition for Windows Mobile

Product Manual. Administration and Configuration Manual

Using Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education

Get Started Guide - PC Tools Internet Security

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Security. Help Documentation

Websense Security Transition Guide

Spam Manager. Quarantine Administrator Guide

KUMC Spam Firewall: Barracuda Instructions

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

formerly Help Desk Authority HDAccess Administrator Guide

VPOP3 Your post office Getting Started Guide

INLINE INGUARD GUARDIAN

TOLEDOTEL INTERNET SERVICE AGREEMENT (As of July, 2014)

POP3 Connector for Exchange - Configuration

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

A D M I N I S T R A T O R V 1. 0

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Guardian Digital Secure Mail Suite Quick Start Guide

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

Purchase College Barracuda Anti-Spam Firewall User s Guide

ADMINISTRATOR'S GUIDE

Symantec Hosted Mail Security. Console and Spam Quarantine User Guide

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

FILTERING FAQ

SaskTel Hosted Exchange Administrator Guide

Transcription:

Cyberoam Anti Spam Implementation Guide Version 9 Document version 96-1.0-12/05/2009

IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Elitecore assumes no responsibility for any errors that may appear in this document. Elitecore reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice. USER S LICENSE The Appliance described in this document is furnished under the terms of Elitecore s End User license agreement. Please read these terms and conditions carefully before using the Appliance. By using this Appliance, you agree to be bound by the terms and conditions of this license. If you do not agree with the terms of this license, promptly return the unused Appliance and manual (with proof of payment) to the place of purchase for a full refund. LIMITED WARRANTY Software: Elitecore warrants for a period of ninety (90) days from the date of shipment from Elitecore: (1) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (2) the Software substantially conforms to its published specifications except for the foregoing, the software is provided AS IS. This limited warranty extends only to the customer as the original licenses. Customers exclusive remedy and the entire liability of Elitecore and its suppliers under this warranty will be, at Elitecore or its service center s option, repair, replacement, or refund of the software if reported (or, upon, request, returned) to the party supplying the software to the customer. In no event does Elitecore warrant that the Software is error free, or that the customer will be able to operate the software without problems or interruptions. Elitecore hereby declares that the anti virus and anti spam modules are powered by Kaspersky Labs and by Commtouch respectively and the performance thereof is under warranty provided by Kaspersky Labs and by Commtouch. It is specified that Kaspersky Lab does not warrant that the Software identifies all known viruses, nor that the Software will not occasionally erroneously report a virus in a title not infected by that virus. Hardware: Elitecore warrants that the Hardware portion of the Elitecore Products excluding power supplies, fans and electrical components will be free from material defects in workmanship and materials for a period of One (1) year. Elitecore's sole obligation shall be to repair or replace the defective Hardware at no charge to the original owner. The replacement Hardware need not be new or of an identical make, model or part; Elitecore may, in its discretion, replace the defective Hardware (or any part thereof) with any reconditioned product that Elitecore reasonably determines is substantially equivalent (or superior) in all material respects to the defective Hardware. DISCLAIMER OF WARRANTY Except as specified in this warranty, all expressed or implied conditions, representations, and warranties including, without limitation, any implied warranty or merchantability, fitness for a particular purpose, non-infringement or arising from a course of dealing, usage, or trade practice, and hereby excluded to the extent allowed by applicable law. In no event will Elitecore or its supplier be liable for any lost revenue, profit, or data, or for special, indirect, consequential, incidental, or punitive damages however caused and regardless of the theory of liability arising out of the use of or inability to use the product even if Elitecore or its suppliers have been advised of the possibility of such damages. In the event shall Elitecore s or its supplier s liability to the customer, whether in contract, tort (including negligence) or otherwise, exceed the price paid by the customer. The foregoing limitations shall apply even if the above stated warranty fails of its essential purpose. In no event shall Elitecore or its supplier be liable for any indirect, special, consequential, or incidental damages, including, without limitation, lost profits or loss or damage to data arising out of the use or inability to use this manual, even if Elitecore or its suppliers have been advised of the possibility of such damages. RESTRICTED RIGHTS Copyright 1999-2009 Elitecore Technologies Ltd. All rights reserved. Cyberoam, Cyberoam logo are trademark of Elitecore Technologies Ltd. CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA Phone: +91-79-66065606 Fax: +91-79-26407640 Web site: www.elitecore.com, www.cyberoam.com 2

Contents Technical Support...4 Typographic Conventions...5 Overview...6 Spam...6 Cyberoam Gateway Anti Spam...7 Configuration...7 Spam Policy...8 Types of Policies...8 Detection of spam attributes...8 Actions...9 Global policy...10 Default policy...11 Custom policy...12 Create Custom Scan policy...12 Manage Custom Spam policy...13 Add Advanced Rules...14 Change Advanced action rules Order...17 Delete Custom Spam policy...18 Address Groups...19 Create Address Groups...19 Delete Address Groups...20 Delete individual address from Group...20 Spam Rule...22 Create Spam rule...22 Delete Spam Rule...23 Change Spam rule Order...23 Local Domains...25 Add Domains...25 Delete Domains...25 Enable Scanning...26 General Configuration...27 Bypass Reporting...31 3

Technical Support You may direct all questions, comments, or requests concerning the software you purchased, your registration status, or similar issues to Customer care/service department at the following address: Corporate Office elitecore Technologies Ltd. 904, Silicon Tower Off C.G. Road Ahmedabad 380015 Gujarat, India. Phone: +91-79-66065606 Fax: +91-79-26407640 Web site: www.elitecore.com Cyberoam contact: Technical support (Corporate Office): +91-79-26400707 Email: support@cyberoam.com Web site: www.cyberoam.com Visit www.cyberoam.com for the regional and latest contact information. 4

Typographic Conventions Material in this manual is presented in text, screen displays, or command-line notation. Item Convention Example Server Client User Username Part titles Bold and shaded font typefaces Machine where Cyberoam Software - Server component is installed Machine where Cyberoam Software - Client component is installed The end user Username uniquely identifies the user of the system Report Topic titles Shaded font typefaces Introduction Subtitles Bold & Black typefaces Notation conventions Navigation link Bold typeface Group Management Groups Create it means, to open the required page click on Group management then on Groups and finally click Create tab Name of a particular parameter / field / command button text Cross references Lowercase italic type Hyperlink in different color Enter policy name, replace policy name with the specific name of a policy Or Click Name to select where Name denotes command button text which is to be clicked refer to Customizing User database Clicking on the link will open the particular topic Notes & points to remember Prerequisites Bold typeface between the black borders Bold typefaces between the black borders Note Prerequisite Prerequisite details 5

Overview Welcome to Cyberoam s Anti Spam User guide. Cyberoam is an Identity-based UTM Appliance. Cyberoam s solution is purpose-built to meet the security needs of corporates, government organizations, and educational institutions. Cyberoam s perfect blend of best-of-breed solutions includes User based Firewall, Content filtering, Anti Virus, Anti Spam, Intrusion Prevention System (IPS), and VPN. Cyberoam provides increased LAN security by providing separate port for connecting to the publicly accessible servers like Web server, Mail server, FTP server etc. hosted in DMZ which are visible the external world and still have firewall protection. Cyberoam Anti Spam as a part of unified solution along with Anti Virus and IPS (Intrusion Prevention System) provides real time virus and spam scanning. Anti Spam module is an add-on module which needs to be subscribed before use. Spam Spam refers to electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited e-mail. Spamming is to indiscriminately send unsolicited, unwanted, irrelevant, or inappropriate messages, especially commercial advertising in mass quantities. In other words, it is an inappropriate attempt to use a mailing list, or other networked communications facility as a broadcast medium by sending the same message to a large number of people who did not ask for it. In addition to being a nuisance, it also eats up a lot of network bandwidth. Because the Internet is a public network, little can be done to prevent spam, just as it is impossible to prevent junk mail. However, the use of software filters in e-mail programs can be used to remove most spam sent through e-mail to certain extent. With the number of computer users growing and the exchange of information via the Internet and email increases in volume, spamming has become an almost everyday occurrence. Apart from network bandwidth, it also affects the employees productive as deletion of such mails is a huge task. Anti spam protection is therefore a priority for anyone who uses a computer. 6

Cyberoam Gateway Anti Spam Cyberoam Anti Spam as a part of unified solution along with Anti Virus and IPS (Intrusion Prevention System), provides real time virus scanning that protects all network nodes workstations, files servers, mail system from known and unknown attacks by worms and viruses, Trojans, spyware, adware, spam, hackers and all other cyber threats. Cyberoam detects spam mails based on: RBL (Realtime Blackhole List) for which Gateway Anti Spam module subscription is not required. But, by implementing only the RBL-based filtering might increase number of falsepositives. It can be implemented by enabling Sender IP address blacklisted by RBL from Spam policy. Mass distribution pattern using RPD (Recurrent Pattern Detection) technology for which Gateway Anti Spam module subscription is required. RPD technology responsible for proactively probing the Internet to gather information about massive spam outbreaks from the time they are launched. This technology is used to identify recurrent patterns that characterize massive spam outbreaks. Cyberoam Gateway Anti Spam provides you with powerful tools for scanning and detecting spam in the e-mail traffic. Cyberoam Gateway Anti Spam inspects all incoming emails - SMTP, POP3 and IMAP traffic - before the messages are delivered to the receiver's mail box. If spam is detected, depending on the policy and rules set, emails are processed and delivered to the recipient unaltered, reject and generate a notification on the message rejection, add or change subject or change the receiver. Cyberoam Gateway Anti Spam is fully compatible with all the mail systems and therefore can be easily integrated into the existing network. Cyberoam Anti Spam allows to: Scan email messages for spamming by protocols namely SMTP, POP3, IMAP Monitors and proactively detect recurrent patterns in spam mails and combat multi-format text, images, HTML etc. and multi-language threats Monitors mails received from Domain/IP address Detect spam mails using RBLs. If Anti Spam module is not subscribed, Cyberoam will detect spam mails based on RBL only and not on recurrent patterns in mails. Accept/Reject messages based on message size and message header Customize protection of incoming and outgoing e-mail messages by defining scan policies Set different actions for SMTP, POP and IMAP spam mails Quarantine SMTP mails and release quarantine mails Configure action for individual email address Notify receivers about spam messages Configure Digest service to notify receivers about spam messages Configuration Configuration task for implementing spam solution: 1. Create Spam policy. Optionally use global or default policy provided by Cyberoam 7

2. Create Spam rule for the policy created in step 1 i.e. create spam rule and attach policy to the rule 3. Enable scanning from firewall rule Spam Policy As soon as you register Cyberoam Gateway Anti-spam module, default spam policy is applicable to all the incoming email traffic. Default spam policy is the general policy and not fit-for-all policy and hence might allow certain spam mails while block certain required mails also. Fine tuning the policies means reducing the spam attacks and chances of loosing any important and required mails. Spam policy defines what action is to be taken if the mail is identified as a spam and to which email address the copy of mail is to be send. As network scanning rules control all the traffic passing through the Cyberoam and decide whether to scan or bypass mail, policy will be applied to that traffic only that is filtered by network scanning rule. To reduce the risk of losing the legitimate messages, Spam quarantine repository - a storage location, provides administrators a way to automatically quarantine messages that are identified as spam. This will help in managing spam and probable spam quarantined mails and can take appropriate actions on such mails. Types of Policies 1. Global Global policy is applicable to all the mail recipients i.e. Email address and Email address groups. Cyberoam provides blank corporate policy which can be customized as per the requirement. 2. Default Default policy is applicable to all the recipients i.e. Email address and Email address group except for those for whom the custom policy is defined. Default policy is applicable to all the recipients as soon as you register the Anti Spam module. 3. Custom/Personal Cyberoam allows defining custom policy for specific individual recipient or address group and is applicable to only to those specific individual recipient or address group and not all the recipients. Scanning rules defines which scanning policy is to be applied to which recipient email address i.e. maps scanning policy to the email address. Detection of spam attributes Cyberoam uses content filtering and three RBLs - Real time Black hole Lists to check for the spam attributes as well as POP3/IMAP mails: Message size Message header Premium RBL 8

Reliable RBL Standard RBL RBL is a list of IP addresses whose owners refuse to stop the proliferation of spam i.e. are responsible for spam or are hijacked for spam relay. Cyberoam will check each RBL for the connecting IP address. If the IP address matches to the one on the list then the specified action in policy is taken. Actions Accept Accepts and delivers the mail to the intended receiver. This action can be defined for both SMTP and POP/IMAP protocols. Reject Rejects the mail. This action sends the notification message to sender. This action can be defined only for SMTP protocol. Drop Drops the mail. This action does not send any notification message to sender. This action can be defined only for SMTP protocol. Change Recipient - Accepts the mail but delivers the mail to the specified receiver and not to the receiver for whom the mail was originally send. This action can be defined only for SMTP protocol only. Prefix Subject Accepts and delivers the mail to the intended receiver but after changing the subject of the mail. You can customize the subject in such a way that the receiver knows that the mail is a spam mail. This action can be defined for both SMTP and POP/IMAP protocols. 9

Global policy Cyberoam provides the blank global policy which can be customized as per your requirement. By default, global policy applies to all the users. There is no need to apply the global policy to the users using rules. Select Anti Spam Spam Policy Global policy to customize policy. Refer to Add advanced rules for more details. 10

Default policy As soon as you subscribe Cyberoam Gateway Anti Spam, default spam policy is applicable to the all incoming email traffic. Default spam policy is the general policy and not fit-for-all policy and hence might allow certain spam mails while block certain required mails also. Default policy can be customized as per your requirement. Default policy will be applied to those users only for whom custom/personal policy is not defined. As per your requirements, Cyberoam allows you to define multiple policies instead of single global policy. Fine tuning the policies means reducing the spam attacks and chances of loosing any important and required mails. Select Anti Spam Spam Policy Default policy to customize policy. Refer to Add advanced rules for more details. 11

Custom policy Custom scan policy allows you to specify the spam filtering level security i.e. action severity based on your requirement. Create Custom Scan policy Select Anti Spam Spam policy Create Custom policy to open the create page Screen - Create Custom Spam policy Screen Elements Spam Policy details Name Send copy to email address Description Specify policy name. Choose a name that best describes the policy Specify email addresses to which the mail copy is to be send. If Cyberoam detects the spam mail then it sends the spam notification to the mail receiver. Cyberoam will forward such a mail to the receiver only if configured in the Spam policy. But in case you want Administrator or any other person in the organization to know about spam and receive this spam mail then specify all the emails address to whom you want to forward the copy of such mails. More than one address can be specified using comma For example john@hotmail.com,,joe@yahoo.com Policy Description Create button Cancel button Add button This option can be applied for SMTP protocol only Specify full description of the policy Creates the policy Cancels the current operation If the policy is successfully created, create advanced scanning rules to specify what action is to be taken on mail identified as SPAM after successful creation of the policy. Refer to Manage Custom Policy for more detail for defining actions. Table Create Custom Spam policy screen elements 12

Manage Custom Spam policy Select Anti Spam Spam Policy Manage Custom policy to view the list of policies created. Click the policy to be modified. Screen Manage Custom Spam policy Screen Elements Spam Policy details Name Send copy to email address Description Displays policy name Displays email addresses to which the mail copy will be send, modify if required. More than one address can be specified using comma For example john@hotmail.com,,joe@yahoo.com Policy Description Update button Cancel button Advanced Rules Add button This option can be applied for SMTP protocol only. Displays full description of the policy, modify if required Updates and saves modifications done in any of the above fields Cancels the current operation Click to define the action to be taken on mails if the matching condition is found. Refer Add Advanced Rules for details. Table Manage Custom Spam policy screen elements 13

Add Advanced Rules Select Anti Spam Spam Policy Manage Custom policy to view the list of policies created. Click the policy to which action rules are to be added. Conditions When Cyberoam Anti Spam identifies Mail as SPAM, Cyberoam accepts and delivers the mail to the intended receiver but only after adding a prefix SPAM to the original subject of the mail. Original subject: This is a test Receiver will receive the mail with subject line as: SPAM: This is a test You can customize the subject in such a way that the receiver knows that the mail is a spam mail. To specify the contents to be prefixed to the existing subject line, select Prefix Subject as action. You can set different actions for SMTP and POP. When Cyberoam Anti Spam identifies Mail as PROBABLE SPAM, Cyberoam accepts and delivers the mail to the intended receiver but after adding a prefix PROBABLE SPAM to the original subject of the mail. 14

Original subject: This is a test Receiver will receive the mail with subject line as: PROBABLE SPAM: This is a test You can customize the subject in such a way that the receiver knows that the mail is a spam mail. To specify the contents to be prefixed to the existing subject line, select Prefix Subject as action. You can set different actions for SMTP and POP. When Cyberoam Anti Spam identifies Mail as VIRUS OUTBREAK, Cyberoam accepts and delivers the mail to the intended receiver but only after adding a prefix SPAM to the original subject of the mail. Original subject: This is a test Receiver will receive the mail with subject line as: SPAM: This is a test You can customize the subject in such a way that the receiver knows that the mail is a spam mail. To specify the contents to be prefixed to the existing subject line, select Prefix Subject as action. You can set different actions for SMTP and POP mails When Cyberoam Anti Spam identifies Mail as PROBABLE VIRUS OUTBREAK, Cyberoam accepts and delivers the mail to the intended receiver but only after adding a prefix SPAM to the original subject of the mail. Original subject: This is a test Receiver will receive the mail with subject line as: SPAM: This is a test You can customize the subject in such a way that the receiver knows that the mail is a spam mail. To specify the contents to be prefixed to the existing subject line, select Prefix Subject as action. You can set different actions for SMTP and POP mails. From Email Address/IP address Specified action will be taken if the mail sender email or IP address matches the specified email address or IP address. You can set action for SMTP only. From Email Address/IP address Specified action will be taken if the mail sender email or IP address belongs to the specified email address or IP address group. You can set action for SMTP only. Message Size - Specified action will be taken if the mail size matches the specified size. You can set different actions for SMTP and POP. Message Header - Specified action will be taken if the message header contains the specified text. You can set different actions for SMTP and POP. You can scan message header for spam in: Subject Specified action will be taken if the header contains the matching subject From - Specified action will be taken if the header contains the matching text in the From address. 15

To - Specified action will be taken if the header contains the matching text in the To address. Others Specified action will be taken if the matching text is found in the header RBL - Specified action will be taken if the sender is listed in the specified RBL Group. You can set different actions for SMTP and POP mails. Actions Following actions can be taken on the mail identified as the SPAM, Probable SPAM, VIRUS OUTBREAK or Probable VIRUS OUTBREAK Protocol Action Meaning SMTP Reject Mail is rejected and rejection notification is send to the mail sender SMTP Drop Mail is rejected but rejection notification is not send to the mail sender SMTP, POP3 Accept Mail is accepted and delivered to the intended receiver SMTP Change Recipient Mail is accepted but is not delivered to the receiver for whom the message was originally send. SMTP, POP3 Prefix Subject Mail is send to the receiver specified in the spam policy Mail is accepted and delivered to the intended receiver but after tagging the subject line. Tagging content is specified in spam policy. You can customize subject tagging in such a way that the receiver knows that the mail is a spam mail. For Example Contents to be prefixed to the original subject: Spam notification from Cyberoam Original subject: This is a test Receiver will receive mail with subject line as: Spam notification from Cyberoam - This is a test SMTP Quarantine Mail is quarantined and can be viewed or downloaded from the quarantine area. 16

Change Advanced action rules Order Advanced action rules are ordered by their priority. When the rules are applied, they are processed from the top downwards and the first suitable rule found is applied. Hence, while adding multiple rules, it is necessary to put strict rules before moderate and general rules. Select Anti Spam Manage Custom policy to view the list of policies created. Click the policy whose action rule order is to be changed. Click the rule whose order is to be changed Click Move Up button to move the selected rule one-step up Click Move Down button to move the selected rule one-step down Click Update Order button to save the order 17

Delete Custom Spam policy Prerequisite Not assigned any Rule Select Anti Spam Spam policy Manage Custom policy to view the list of policies created Screen Delete Custom Spam policy Screen Elements Del checkbox Select All checkbox Delete button Description Click against the policy to be deleted Click to select all the policies for deletion Click to delete all the selected policies Table Delete Custom Spam policy screen elements Note Default policy cannot be deleted. 18

Address Groups Scanning rule can be defined for individual or group of Email address IP address RBL (Real time black hole List) Address group is the group of email addresses, IP addresses, or RBLs. Whenever the policy is applied to the address group, policy is applied to all the addresses included in the group. RBL is a list of IP addresses whose owners refuse to stop the proliferation of spam i.e. are responsible for spam or are hijacked for spam relay. This IP addresses might also be used for spreading virus. Cyberoam will check each RBL for the connecting IP address. If the IP address matches to the one on the list then the specified action in policy is taken. Create Address Groups Select Anti Spam Configuration Address Groups to open the Address group page. Click Create to open the create page. Screen Create Email Address Group 19

Screen Elements Address Group details Name Group Description Specify group name Specify group type. You can create group of RBLs, IP address or Email address. RBL is a list of IP addresses whose owners refuse to stop the proliferation of spam i.e. are responsible for spam or are hijacked for spam relay. Description Create button Cancel button Cyberoam will check each RBL for the connecting IP address. If the IP address matches to the one on the list then the specified action in policy is taken. Specify full description Creates group and depending on the group type allows adding email address, IP addresses or RBL names Click Add Type all the email addresses to be grouped specified by comma e.g. john@yahoo.com, joe@hotmail.com Cancels the current operation Table Create Email Address Group screen elements Delete Address Groups Select Anti Spam Configuration Address Groups to view the list of groups created Screen Delete Address Group Screen Elements Del checkbox Select All checkbox Delete button Description Click against the address group to be deleted Click to select all the address group(s) for deletion Click to delete all the selected address group(s) Table Delete Address Group screen elements Delete individual address from Group Select Anti Spam Configuration Address Groups to view the list of groups created. Click the group from which the address is to be deleted 20

Screen Delete Address from Group Screen Elements Del checkbox Select All checkbox Delete button Description Click against the address to be deleted Click to select all the address (s) for deletion Click to delete all the selected address (s) Table Delete Address from Group screen elements 21

Spam Rule Scanning rules defines which scanning policy is to be applied to which recipient email address i.e. map scanning policy with the email address. A rule allows to apply: single policy for a email address or group of addresses multiple policies for a particular email address or group of addresses Create Spam rule Prerequisite Policy created Address group created (if rule is for group) Select Anti Spam Spam Rules to open the create page Screen - Create Spam Rule Screen Elements Spam Rule Details Action Item Description Select whether the rule is for individual email address or group 22

Screen Elements Recipient Address If Action Item is Recipient Email Address Address Group If Action Item is Address Group Policy Name Add button Cancel button Email Description Specify recipient email address If the rule is for the complete domain the specify as @domainname e.g. @cyberoam.com Specify address group Specify policy to be applied. According to the action specified in the policy, mails will be delivered as original or will be tagged and forwarded to the receiver. Creates rule Cancels the current operation Table Create Spam Rule screen elements Delete Spam Rule Select Anti Spam Spam Rules to view the list of rules created. Screen - Delete Spam Rule Screen Elements Description Del checkbox Click against the rule(s) to be deleted Select All checkbox Click to select all the rule(s) for deletion Delete button Click to delete all the selected rule(s) Table Delete Spam Rule screen elements Change Spam rule Order Rules are ordered by their priority. When the rules are applied, they are processed from the top downwards and the first suitable rule found is applied. Hence, while adding multiple rules, it is 23

necessary to put strict rules before moderate and general rules. Default policy order cannot be changes. Select Anti Spam Spam Rules Click the rule whose order is to be changed Click Move Up button to move the selected rule one-step up Click Move Down button to move the selected rule one-step down Click Update Order button to save the order 24

Local Domains Cyberoam also allows bypassing RBL scanning of mails for certain domains. To bypass RBL scanning of certain domains, define such domains as trusted domains Add Domains Select Anti Spam Configuration Local Domains, type Domain name or IP address and click Add button. Cyberoam will not perform RBL-based scanning for the mails from the configured domains. Delete Domains Select Anti Spam Configuration Local Domain to view the list of domains that will be bypassed from RBL scanning Screen Elements Del checkbox Select All checkbox Delete button Description Click against the domain to be deleted Click to select all the domain(s) for deletion Click to delete all the selected domain(s) 25

Enable Scanning Enable anti-spam scanning using firewall rules. While anti-spam settings can be configured for system-wide use, they can also be implemented with specific settings on a per user basis. Refer to Cyberoam User Guide, Firewall section for creating firewall rules for enabling the anti-spam scanning. You can enable anti spam scanning by creating firewall rule for: Zone User/User Group Host/Host Group By enabling scanning through firewall, you can customize levels of protection. For example, while traffic between LAN and WAN might need strict protection, traffic between trusted internal addresses might need moderate protection. Hence you can enable/disable scanning for particular combination of source and destination IP address or domain. 26

General Configuration Select Anti Spam Configuration General Configuration to open the configuration page If Anti spam module is not subscribed configuration page will display the message that module is not subscribed and Cyberoam will not detect spam mails 27

Screen Elements Description Anti Spam Engine information Anti Spam Engine Anti Spam Engine status Information - Anti Spam server is down - Anti Spam server is up Cyberoam Anti Spam Center connectivity status - Cyberoam is not connected and will not be able to detect spam mails - Cyberoam is connected with Cyberoam Anti Spam Center s server Settings Bypass Spam check for SMTP authenticated Connections Verify Sender s IP reputation Cyberoam Anti spam definition database contains currently identified spam signatures/definitions which are used for identifying spam mails. By default, database updates are automatically downloaded and installed on your computer every 30 minutes. Click Bypass Spam check for SMTP authenticated Connections checkbox to enforce RBL and RPD based spam checking. If enabled, SMTP authenticated connections are bypassed from RBL and RPD based spam checking. By default, it is enabled. Enable IP reputation, if you want to verify the reputation of the sender IP address. Cyberoam dynamically checks the sender IP address and denies SMTP connection if IP address is found to be responsible for sending spam mails or malicious contents. If both Bypass Spam check for SMTP authenticated Connections and Verify Sender s IP reputation are enabled, for the authenticated connections, spam scanning based on RBL and RPD will be given the precedence. SMTP Mails greater than size Over Sized Mail Action Feature will be available only on purchase of new license of Gateway Anti Spam module. Specify maximum file size (in KB) for scanning. Files exceeding this size received through SMTP will not be scanned. Specify the action to be taken on oversize mails. Available option Accept - All the oversize mails will be forwarded to the recipient without scanning Reject All the oversized mails are rejected and notification message is send to the mail sender. Drop All the oversized mails are dropped. By default, files exceeding 50 MB will not be scanned. 28

Screen Elements POP3/IMAP greater than size Mails Description Specify maximum size (in KB) of the file to be scanned. Files exceeding this size received through POP/IMAP will not be scanned and forwarded to the recipient without scanning. Quarantine Area Total Utilization ( Anti Virus + Anti Spam ) By default, files exceeding 10 MB will not be scanned. Displays percentage of quarantined spam and virus infected messages. Click to search or download any quarantined mail. Quarantined mails can be searched based on sender email address, receiver email address, and subject. Cyberoam reserves 5GB for Quarantine area. To maintain the total size of Quarantine area, Cyberoam removes older mails once the repository is filled by 80% i.e. once the repository level crosses 4GB, Cyberoam automatically deletes the oldest quarantined mails. Cyberoam stores Quarantined mail in Quarantine area (repository) and Log area. Log area is purged as per the days configured in the Auto Purge utility while Quarantine area is purged once the repository is filled by 80%. Due to this, there are chances of utilization of Quarantine area but no quarantined mails are available to download when you click Quarantine area. Cyberoam recommends to download the quarantine mails before they are purged from the Log area. Check the purge configuration from System>Manage Data>Configure Auto Purge Utility page Update button Click to save the configuration Header to detect recipient for POP3/IMAP Click Add to specify header which should be used for detecting the recipient s address. By default, Cyberoam uses Delivered-To and Received headers. Default headers cannot be deleted Spam Digest Spam digest is an email and contains a list of quarantined spam messages filtered by Cyberoam and held in the user quarantine area. If configured, Cyberoam mails the spam digest as per the configured frequency to the user. Digest provides a link of User My Account from where user can access his quarantined messages and take the required action. Configure Digest service Release Quarantined Spam mail Configure Digest Service Digest service can be configured globally for all the users or for individual users. Cyberoam mails the spam digest as per the configured frequency to the user. 29

The Spam Digest provides following information for each quarantined message: Date and time: Date and time when message was received Sender: Email address of the sender Recipient: Email address of the receiver Subject: Subject of the message Select Anti Spam Spam Quarantine Spam Digest Settings to open the digest configuration page Screen Elements Description Spam Quarantine Digest Settings Enable Spam Click to enable digest service for all the users Quarantine Digest Email Frequency Send Test Spam Digest button From email Address Display Name Reference MyAccount IP Configure spam digest mail frequency. Digest can be mailed every hour, every day at configured time or every week on the configured day and time. Click and specify the email address to send the test spam digest mail Specify mail address from which the mail should be send. Digest mail will be send from the configured mail address. Specify mail sender name. Digest mail will be send with the configured name. Select Interface/Port IP from the Reference MyAccount IP dropdown list. User My Account link in Digest mail will point to this IP address. User can click the link to access his quarantined messages and take the required action. The users not falling under the specified Interface will have to access the quarantine mail directly from their MyAccount. 30

Screen Elements Allow Override Apply button Change User s Spam Digest Settings button Description Click Allow user to override digest setting, if you want each user to override the digest setting i.e. user can disable the digest service so that they do not receive the spam digest. Click to save the configuration Click to change the digest setting of the individual user. It opens a new page which allows selecting group and updating the spam digest setting of group members. Release Quarantined Spam mail Either Administrator or user himself can release the quarantined spam mails. Administrator can release the quarantined spam mails from Quarantine area while user can release from his My Account. Released quarantined spam mails are delivered to the intended recipient s inbox. Administrator can access Spam Quarantine area from Anti Spam > Configuration > General Configuration while user can logon to My Account and access Spam Quarantine area from Quarantine Mails > Spam > Spam Quarantine area. If Spam Digest is configured, user will be mailed Digest which consists of all the quarantined spam mails. Bypass Reporting By default, Cyberoam Anti Spam generates reports for all the Internal Domains and Email Ids. To bypass reporting of certain domains and email ids, Administrator has to create an Exclusion domain list and email id list. All the domains and email ids included in the exclusion list will not be included in the Anti Spam reports. To define the exclusion list, select Reports Configure Local Domains or select Reports Configure Bypass Email Ids 31