SonicWALL Email Security Quick Start Guide. Version 4.6



Similar documents
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Security 7.4 Administrator s Guide

SonicWALL Security Appliance Administrator Guide

Security 8.0 Administrator s Guide

Hosted Security Administrator s Guide

Comprehensive Anti-Spam Service

Security 8.0 User Guide

SonicWALL Security Solutions SonicWALL Security

Dell SonicWALL Hosted Security. Administration Guide

Core Protection Suite

Configuring Trend Micro Content Security

Using SonicWall Anti-Spam Utility Managing your junkbox settings

Core Filtering Admin Guide

Deploying Layered Security. What is Layered Security?

Barracuda Security Service User Guide

University of Mary s Spam Solution

How to Use Red Condor Spam Filtering

Steps for Basic Configuration

Configuration Information

Introduction. SonicWALL Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

Install and Configure RelayFax

WatchGuard QMS End User Guide

602LAN SUITE 5.0 Groupware

Overview. Accessing the User Interface. Logging In. Resetting your Password

Barracuda Spam Firewall

MultiSite Manager. User Guide

Hosted Security 2.0 Quick Start Guide

Migration Manual (For Outlook Express 6)

Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration

escan SBS 2008 Installation Guide

POP3 Connector for Exchange - Configuration

DLP Quick Start

F-Secure Messaging Security Gateway. Deployment Guide

Green House Data Spam Firewall Administrator Guide

How To Install & Use Metascan With Policy Patrol

Chapter 10 Encryption Service

Hosted Security Quick Start Guide

GFI Product Manual. Administration and Configuration Manual

Configuration Information

Important Information

Migration Manual (For Outlook 2010)

Configuring Your Gateman Server

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to or Network Folder

Advanced Settings. Help Documentation

Defender Token Deployment System Quick Start Guide

Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions

Configuration Manual

Releasing blocked in Data Security

LifeSize Control Installation Guide

Installing Policy Patrol with Lotus Domino

Kaseya Server Instal ation User Guide June 6, 2008

YSU Spam Solution Guide to Using Proofpoint

Setting Up Scan to SMB on TaskALFA series MFP s.

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Setting Up Sharp MX-Color Imagers To Scan To

Content Filtering Client Policy & Reporting Administrator s Guide

TRITON Unified Security Center Help

Sophos Appliance Configuration Guide

Trend Micro Hosted Security. Best Practice Guide

Sonicwall Reporting Server

8.7. NET SatisFAXtion Gateway Installation Guide. For NET SatisFAXtion 8.7. Contents

Implementing MDaemon as an Security Gateway to Exchange Server

Service Overview & Installation Guide

Feature Comparison Guide

TREND MICRO. InterScan VirusWall 6. Getting Started Guide. Integrated virus and spam protection for your Internet gateway.

Deployment Guide: Transparent Mode

Sophos Appliance Configuration Guide

SonicWALL Security 4.6 Administrator's Guide

Migration Project Plan for Cisco Cloud Security

Cloud & Web Security. Administrator Quick Start Guide

CanIt-PRO End-User s Guide Roaring Penguin Software Inc. 9 September 2005

Office 365 Exchange Online Protection Administration Guide

MadCap Software. Upgrading Guide. Pulse

Installing GFI MailEssentials

Active Directory Requirements and Setup

How To Manage Spam On A Webmail Website On A Pc Or Mac Or Mac (For A Webcomic) On A Mac Or Ipa (For An Ipa) On An Ipam (For Free) On Your Pc Or Ipam

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014


IIS, FTP Server and Windows

Websense Security Transition Guide

F-SECURE MESSAGING SECURITY GATEWAY

ClicktoFax Service Usage Manual

Frequently Asked Questions

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

Device Log Export ENGLISH

Sophos for Microsoft SharePoint startup guide

- Spam Spam Firewall How Does the Spam Firewall Work? Getting Started username Create New Password

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) , option 1. Access Methods:

How to install and use the File Sharing Outlook Plugin

138 Configuration Wizards

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5

Administrator Quick Start Guide

User Guide. ThreatTrack Security Product Manual

Contents. Before You Install Server Installation Configuring Print Audit Secure... 10

Transcription:

SonicWALL Email Security Quick Start Guide Version 4.6

Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more complex installation and configuration instructions or more explanation, see the SonicWALL Email Security Administration Guide. Getting Started Installing the SonicWALL Email Security software 1. Double-click the SonicWALL Email Security installer executable file you have downloaded. 2. Follow the prompts to install the application. Logging in to SonicWALL Email Security 1. If you are logged in to the machine where SonicWALL Email Security is installed, click Start > Programs > SonicWALL Email Security > login. If you are logged into a remote machine, launch a web browser, and type the name of the server on which SonicWALL Email Security is installed into the URL field (for example: http://myserver.example.com). 2. At the login screen, type admin for the user name of the master account. 3. Type master for the password. 4. Click the Login button. 5. Change the password for this master account. Entering your License Keys SonicWALL Email Security requires a license key for each functional module. You need to enter licenses for each of the modules you purchased. Click Server Configuration > License Management. For each module: 1. Cut and paste the serial number for the license key into the License Key text field. 2. Click the Add License Key button. Sever Configuration 1) Click on Server Configuration>Network Architecture. 2) Select All in One configuration (See the SonicWALL Email Security Administration Guide for details on Split mode configurations). 3) Click the Add Path button in the Inbound Email Flow section to configure the server to process inbound messages. a) Source IP Contacting Path Select Any source IP address is allowed to connect to this path. b) Path Listens On Select Listen on all IP addresses on this port and specify port 25. c) Destination of Path Select the Proxy option and specify the destination server and port number. d) Advanced Settings Select Adhere to corporate setting from the drop-down list adjacent to Action for messages that are not in your LDAP server. 4) Click the Apply button. 2

If you want to configure this server for outbound message processing as well, click the Add Path button in the Outbound Email Flow section and fill in the configuration information. Configuring LDAP If your network uses LDAP (Active Directory, Lotus Domino, etc.) to authenticate users, complete the following steps: 1. Click the Configure LDAP to enable per-user access and management check box. 2. Type the Server Name or IP address of your LDAP server. 3. Type the Port Number for the LDAP server. The default LDAP port is 389. 4. Check the Requires SSL check box only if your server requires a secured connection. 5. Select the LDAP login method: o For Active Directory, use the NetBIOS Domain name\username. Example: domain\admin o For Exchange 5.5, use cn = username. Example cn = administrator 6. For Active Directory or Exchange 5.5 servers, enter the Windows NT/NetBIOS domain name. 7. Click the Apply Changes button. Directory Protection The Directory Harvest Attack (DHA) Protection window configures the action you want SonicWALL Email Security to take for messages sent to email addresses that are not in your LDAP server. SonicWALL recommends the following option: Always store in Junk Box Default Message Management Use this window to configure: Number of Junk Box days Number of rows to display in the Message Center (users junk box) You can link to spam, virus, and phishing and policy management from this window. Junk Box Summary Junk Box summaries alert users that messages addressed to them have been quarantined in the Junk Box. Use this window to configure the timing of Junk Box Summary messages, the language in which the messages are delivered, and other aspects of Junk Box summary messages. User View Setup Use this window to configure whether users can log in to the Junk Box, download user profilers, and who can view quarantined messages. Monitoring 1. Type the email address of the administrator who receives alerts if there are performance issues with SonicWALL Email Security. 2. Add one or more fallback SMTP servers. 3

Anti-Spam Techniques Default Spam Management Use this module to configure actions taken for messages that are categorized as Spam or Likely Spam. See Table 1 for a list of actions that you can take.. 4

Table 1 - Actions for Messages that are categorized as a threat Action Spam Phishing Virus filtering off Permanently Delete Bounce Back to Sender Store in Junk Box Send to addressee Tag with text Description All messages are delivered to the recipient. No filtering takes place. The email message is permanently deleted and no further processing occurs. CAUTION: If you select this option, your organization risks losing wanted email. The message is returned to sender with a message indicating that it was not deliverable. CAUTION: You may end up providing additional information to phishers and spammers with this action. The email message is stored in the Junk Box. It can be released by users and administrators who have the necessary permissions. NOTE: SonicWALL recommends this option. The email message is sent to a designated postmaster or administrator. The email message is tagged with the specified text in the subject line. Selecting this option allows the user to receive the email and junk it if it is unwanted. Anti-Spam Aggressiveness Use the Anti-Spam Aggressiveness screen to tailor SonicWALL Email Security s spam capture aggressiveness to your organization s preferences. Configuring these settings is optional. Start with the default rating, 3, and increase or decrease as desired. Consider Sender ID in statistical evaluation Check this box only if SonicWALL Email Security is the first-touch server (receiving email directly from the internet). Anti-Virus Techniques Use this module to configure actions taken for messages that are categorized as Virus or Likely Virus. See Table 1 for a list of actions that you can take. NOTE: SonicWALL removes the virus from the message when users or administrators release the message. Anti-Phishing Techniques Use this module to configure actions taken for messages that are categorized as Phishing or Likely Phishing. See Table 1 for a list of actions that you can take. Select one of the following options to Send proactive Phishing alerts to users: Do not send Send with Junk Summary alert Send separately Check the Allow users to control their Phishing notifications check box if desired. Policy Management Use this page to add and manage policy filters. Click the Add New Filter button to add policy filters. Use the arrows to move filters up or down. Filters at the top of the list execute first. 5

Junk Box Use this module to manage and find messages stored in the Junk Box. Reports and Monitoring Use this module to check SonicWALL Email Security system status, MTA status, and to see reports that show statistics about mail flow through the system. 6