How To Install & Use Metascan With Policy Patrol

Similar documents
Quick Start Policy Patrol Mail Security 10

Policy Patrol 7 Upgrade Guide

Releasing blocked in Data Security

Sophos for Microsoft SharePoint startup guide

AV Management Dashboard

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

Sophos Anti-Virus for NetApp Storage Systems startup guide

Kaseya Server Instal ation User Guide June 6, 2008

Manual POLICY PATROL SPAM FILTER

Practice Fusion API Client Installation Guide for Windows

Installing Policy Patrol with Lotus Domino

Quick Start Policy Patrol Mail Security 9

How to install and use the File Sharing Outlook Plugin

Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager

Manual POLICY PATROL MAIL SECURITY

GE Intelligent Platforms. Activating Licenses Online Using a Local License Server

ECA IIS Instructions. January 2005

management with Policy Patrol

Organizer db Browser Manual

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Envelope (SMTP) Journaling for Microsoft Exchange 2007 and 2010

Sophos Computer Security Scan startup guide

SonicWALL Security Quick Start Guide. Version 4.6

IIS, FTP Server and Windows

AliOffice 2.0 Installation Guide

Avaya Modular Messaging Microsoft Outlook Client Release 5.2

Integrating Trend Micro OfficeScan 10 EventTracker v7.x

Manual POLICY PATROL SECURE FILE TRANSFER

Install and Configure RelayFax

8.7. NET SatisFAXtion Gateway Installation Guide. For NET SatisFAXtion 8.7. Contents

Millennium Drive. Installation Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

Malwarebytes Anti-Malware 1.42

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows

Quick Scan Features Setup Guide. Scan to Setup. See also: System Administration Guide: Contains details about setup.

NETWRIX USER ACTIVITY VIDEO REPORTER

Install MS SQL Server 2012 Express Edition

MultiSite Manager. User Guide

NETWRIX EVENT LOG MANAGER

How to add your Weebly website to a TotalCloud hosted Server

Configuration Guide. Remote Backups How-To Guide. Overview

HTTP Server Setup for McAfee Endpoint Encryption (Formerly SafeBoot) Table of Contents

NETWRIX EVENT LOG MANAGER

Fiery EX4112/4127. Printing from Windows

This document details the following four steps in setting up a Web Server (aka Internet Information Services -IIS) on Windows XP:

SecuraLive ULTIMATE SECURITY

Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling

Using Microsoft Expression Web to Upload Your Site

NSi Mobile Installation Guide. Version 6.2

Bentley CONNECT Dynamic Rights Management Service

Installing Policy Patrol in a cluster

Version /10. Xerox ColorQube 9301/9302/9303 Internet Services

Backup Tab. User Guide

MANUAL. Policy Patrol . Disclaimers. Version 7

POLICY PATROL MFT. Manual

TM Online Storage: StorageSync

ELM Server Exchange Edition Virtual Archive Mailbox version 5.5

GE Measurement & Control. Remote Comms System. Installation and User Reference Guide

ACTIVE DIRECTORY DEPLOYMENT

Transition from Pegasus Mail To Exchange/Outlook 2003

Envelope (SMTP) Journaling for Microsoft Exchange 2007 and 2010

Quick Start Policy Patrol Spam Filter 9

Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

Installing Policy Patrol on a separate machine

INSTALLATION GUIDE Datapolis Process System v

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

Backup Tab. User Guide

Sophos Anti-Virus for Mac OS X Help

Kaseya 2. Installation guide. Version 7.0. English

CODESOFT Installation Scenarios

Erado Archiving & Setup Instruction Microsoft Exchange 2010 Push Journaling

Configuring Network Load Balancing with Cerberus FTP Server

Bitrix Site Manager ASP.NET. Installation Guide

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Wavecrest Certificate

Novell ZENworks Asset Management 7.5

Trend Micro Hosted Security. Best Practice Guide

Quick Scan Features Setup Guide

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

Installing NetSupport School for use with the NetSupport School Student extension for Google Chrome

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Quick Setup Guide. FaxGwise Version 6.0. SKyPRO AG, Gewerbestrasse 7, 6330 Cham Switzerland, SKyPRO USA,

4.0 SP2 ( ) May P Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2

User guide. Business

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

AXIS 70U - Using Scan-to-File

K7 Business Lite User Manual

Kaspersky Lab Mobile Device Management Deployment Guide

Sophos Anti-Virus for Mac OS X: Home Edition Help

Quick Start : i-fax User Guide

Avira Endpoint and Security. HowTo

Immotec Systems, Inc. SQL Server 2005 Installation Document

etoken Enterprise For: SSL SSL with etoken

Comprehensive Anti-Spam Service

Transcription:

Policy Patrol 9 technical documentation June 16, 2014 How To Install & Use Metascan With Policy Patrol No antivirus engine is perfect. With over 220,000 new threats emerging daily, it would be impossible for any single antivirus product to provide guaranteed detection 100% of the time. Using Metascan technology, Policy Patrol can quickly scan email attachments with multiple anti-malware engines to detect and block advanced threats. By using multiple anti-malware engines, Metascan increases detection rates for all types of malware without the hassle of licensing and maintaining multiple antivirus engines. Metascan can also perform file sanitization and file type checking, preventing zero-day and targeted attacks. Metascan can be purchased as an add-on for Policy Patrol, and is available in packages with 4, 8, 12, and 16 anti-malware engines. If needed, more engines can be added up to a total of 30 engines. More information about the different packages can be found on the following page: http:///metascan-advanced-threat-prevention. This guide describes how to install and use Metascan with Policy Patrol. Step 1. Install Metascan In order to use Metascan with Policy Patrol, you need to install Metascan on your network. Metascan can be installed on the same machine as Policy Patrol, but it can also be installed on a separate machine. If Metascan is installed on a separate machine, you must configure Policy Patrol to connect to the Metascan server. Note: File sanitization is only available if you install Metascan on the same machine as Policy Patrol. To obtain your Metascan trial version, go to http:///policy-patrolmail-security/download-metascan/. Fill out the form and follow the instructions in the email to download Metascan. You may also need to install a Policy Patrol Metascan update depending on your Policy Patrol version. Instructions are provided in the email. - 1 of 11 -

Once you have downloaded Metascan, follow the next steps: Note that Metascan requires.net Framework 4.0 or later to be installed on the system. 1. Double-click on the executable. The welcome screen will appear. Click on Start and wait until the Metascan prerequisites are installed. 2. When the Setup Wizard appears, click Next. 3. Select Accept the terms in the License Agreement and click Next. 4. Choose which components of Metascan you would like to install. - 2 of 11 -

5. Click Next. 6. Click Install. 7. Click Finish to complete the installation. 8. Go to Start > OPSWAT > Metascan Management Console. The console will open in a browser. You can configure scanning options from Workflow in the top menu. 9. If you installed Metascan on a different machine than Policy Patrol: Go to Clients in the top menu. - 3 of 11 -

Copy the link from the Metascan Server box for entering in Policy Patrol (see below). Make sure you open the port specified in the URL in order to allow Policy Patrol to remotely connect to this server (in the screen above this is port 8008). Tip: Metascan clients are also available for the Metascan server, allowing you to scan endpoint systems for advanced threats. Step 2. Enable Metascan in Policy Patrol After installing Metascan, you must enable Metascan in Policy Patrol. Follow the instructions below depending on whether you have installed Metascan on the same machine as Policy Patrol or on a separate machine. If Metascan is installed on the same machine as Policy Patrol: If Metascan is installed on the same machine as Policy Patrol you can enable Metascan multi anti-virus scanning by going to Anti-Virus > Metascan and selecting the option Enable Metascan. Note: You must restart the Policy Patrol Email Server service from services control panel in order for Policy Patrol to detect that Metascan has been installed on the same machine. - 4 of 11 -

If Metascan is installed on a separate machine: If Metascan is installed on a different machine than Policy Patrol, enable Metascan multi anti-virus scanning by following the next steps: 1. Go to Anti-Virus > Metascan and select the option Configure remote Metascan connection. - 5 of 11 -

2. Specify the URL of the machine where Metascan is installed. This URL can be found in the Metascan Management Console > Clients > Metascan Server. Make sure that the port in the URL is open (in this example it is port 8008). - 6 of 11 -

3. Click Test connection. A message box will appear saying that the connection was successfully created. Click OK. 4. Now select the option Enable Metascan. Step 3. Configure Actions In Configure actions.. you can select what actions to take on each message that has been detected as containing a known or possible virus. Policy Patrol includes the following anti-virus categories: Infected, Suspicious, Password protected and Spoofed file types. To view which actions have been configured for the category, click on the Browse button next to the anti-virus category, right-click the category in the list and select Edit. - 7 of 11 -

In Primary action, the following options are available: Delete message: Select this option to delete the message. Note that if you select to delete the message, you will only be able to configure the secondary actions Add sender s email address to black list and Add sender s IP address to black list. Redirect message: Select this option to redirect the message to another mailbox. Enter or select the email address to redirect the messages to. Move to folder: Select this option if you wish to quarantine the message in a monitoring folder. Select the appropriate folder by clicking on the button. Accept message: Select this option if you wish to accept the message and apply only the secondary action(s). - 8 of 11 -

In Secondary actions, the following options are available: Add x-header to message: If you select this option Policy Patrol will add an X- header to the message. Enter the header name and value you wish to add, for instance X-PP-VIRUS = TRUE. Add tag to subject: This option will add a tag to the subject. Select the tag template to be used by clicking on. Add sender s email address to black list: Select this option to add the sender s email address to the black list. Add sender s IP address to black list: Select this option to add the sender s IP address to the black list. In Notifications, specify the sender and recipient(s) for the notifications: Enter or select a From: address. If you wish a display name to appear in the notification message, enter Display name <email address>, e.g. "John Doe" <John.Doe@company.com>. Now specify who should receive the notification (Sender, Recipient, Administrator*, Sender s Manager**, Recipient(s) Manager** or Other(s)) and select the template to be used for each recipient. If you wish to use a new template, click New. * The Administrator address(es) are taken from <server name> > Advanced > System configuration > System notifications. ** The manager s email address will be taken from the Active Directory user properties. If the sender or recipient is external, no notification is sent since the manager of an external recipient is not known. - 9 of 11 -

Step 4. Configure File Type Spoofing In addition to anti-malware scanning, Metascan can verify and detect spoofed email attachment types, preventing for instance.exe files posing as.txt files from entering your organization. To specify which attachment types should be checked for spoofing, go to Configure actions and select Spoofed file types. You will be able to select which file types need to be verified for file type spoofing. If Metascan determines that a file is spoofed, Policy Patrol will take the actions as specified in the Spoofed file types anti-virus category. Step 5. Configure File Sanitization To prevent advanced threats that might be missed by anti-malware engines, Metascan can sanitize potentially dangerous file types, thwarting zero-day and targeted attacks by converting to a different file type (e.g. DOC to PDF) and eliminating any embedded objects and macros. Note: File sanitization is only available if you install Metascan on the same machine as Policy Patrol. The file sanitization option is available as an action in the Email Security rule: 1. In Rule Actions, select the secondary action Convert attachments with Metascan. - 10 of 11 -

2. You will be able to select from a list of attachment formats to convert to another format. In the From format column, select the original file format that should be converted. In the To format column, select the file format that the attachment should be converted to. Click on Add to add another file format to convert. Tick the option Compress converted attachment(s) into zip archives if you would like to compress all attachments into a zip archive after they have been converted. - 11 of 11 -