SonicWALL Email Security Quick Start Guide Version 4.6
Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more complex installation and configuration instructions or more explanation, see the SonicWALL Email Security Administration Guide. Getting Started Installing the SonicWALL Email Security software 1. Double-click the SonicWALL Email Security installer executable file you have downloaded. 2. Follow the prompts to install the application. Logging in to SonicWALL Email Security 1. If you are logged in to the machine where SonicWALL Email Security is installed, click Start > Programs > SonicWALL Email Security > login. If you are logged into a remote machine, launch a web browser, and type the name of the server on which SonicWALL Email Security is installed into the URL field (for example: http://myserver.example.com). 2. At the login screen, type admin for the user name of the master account. 3. Type master for the password. 4. Click the Login button. 5. Change the password for this master account. Entering your License Keys SonicWALL Email Security requires a license key for each functional module. You need to enter licenses for each of the modules you purchased. Click Server Configuration > License Management. For each module: 1. Cut and paste the serial number for the license key into the License Key text field. 2. Click the Add License Key button. Sever Configuration 1) Click on Server Configuration>Network Architecture. 2) Select All in One configuration (See the SonicWALL Email Security Administration Guide for details on Split mode configurations). 3) Click the Add Path button in the Inbound Email Flow section to configure the server to process inbound messages. a) Source IP Contacting Path Select Any source IP address is allowed to connect to this path. b) Path Listens On Select Listen on all IP addresses on this port and specify port 25. c) Destination of Path Select the Proxy option and specify the destination server and port number. d) Advanced Settings Select Adhere to corporate setting from the drop-down list adjacent to Action for messages that are not in your LDAP server. 4) Click the Apply button. 2
If you want to configure this server for outbound message processing as well, click the Add Path button in the Outbound Email Flow section and fill in the configuration information. Configuring LDAP If your network uses LDAP (Active Directory, Lotus Domino, etc.) to authenticate users, complete the following steps: 1. Click the Configure LDAP to enable per-user access and management check box. 2. Type the Server Name or IP address of your LDAP server. 3. Type the Port Number for the LDAP server. The default LDAP port is 389. 4. Check the Requires SSL check box only if your server requires a secured connection. 5. Select the LDAP login method: o For Active Directory, use the NetBIOS Domain name\username. Example: domain\admin o For Exchange 5.5, use cn = username. Example cn = administrator 6. For Active Directory or Exchange 5.5 servers, enter the Windows NT/NetBIOS domain name. 7. Click the Apply Changes button. Directory Protection The Directory Harvest Attack (DHA) Protection window configures the action you want SonicWALL Email Security to take for messages sent to email addresses that are not in your LDAP server. SonicWALL recommends the following option: Always store in Junk Box Default Message Management Use this window to configure: Number of Junk Box days Number of rows to display in the Message Center (users junk box) You can link to spam, virus, and phishing and policy management from this window. Junk Box Summary Junk Box summaries alert users that messages addressed to them have been quarantined in the Junk Box. Use this window to configure the timing of Junk Box Summary messages, the language in which the messages are delivered, and other aspects of Junk Box summary messages. User View Setup Use this window to configure whether users can log in to the Junk Box, download user profilers, and who can view quarantined messages. Monitoring 1. Type the email address of the administrator who receives alerts if there are performance issues with SonicWALL Email Security. 2. Add one or more fallback SMTP servers. 3
Anti-Spam Techniques Default Spam Management Use this module to configure actions taken for messages that are categorized as Spam or Likely Spam. See Table 1 for a list of actions that you can take.. 4
Table 1 - Actions for Messages that are categorized as a threat Action Spam Phishing Virus filtering off Permanently Delete Bounce Back to Sender Store in Junk Box Send to addressee Tag with text Description All messages are delivered to the recipient. No filtering takes place. The email message is permanently deleted and no further processing occurs. CAUTION: If you select this option, your organization risks losing wanted email. The message is returned to sender with a message indicating that it was not deliverable. CAUTION: You may end up providing additional information to phishers and spammers with this action. The email message is stored in the Junk Box. It can be released by users and administrators who have the necessary permissions. NOTE: SonicWALL recommends this option. The email message is sent to a designated postmaster or administrator. The email message is tagged with the specified text in the subject line. Selecting this option allows the user to receive the email and junk it if it is unwanted. Anti-Spam Aggressiveness Use the Anti-Spam Aggressiveness screen to tailor SonicWALL Email Security s spam capture aggressiveness to your organization s preferences. Configuring these settings is optional. Start with the default rating, 3, and increase or decrease as desired. Consider Sender ID in statistical evaluation Check this box only if SonicWALL Email Security is the first-touch server (receiving email directly from the internet). Anti-Virus Techniques Use this module to configure actions taken for messages that are categorized as Virus or Likely Virus. See Table 1 for a list of actions that you can take. NOTE: SonicWALL removes the virus from the message when users or administrators release the message. Anti-Phishing Techniques Use this module to configure actions taken for messages that are categorized as Phishing or Likely Phishing. See Table 1 for a list of actions that you can take. Select one of the following options to Send proactive Phishing alerts to users: Do not send Send with Junk Summary alert Send separately Check the Allow users to control their Phishing notifications check box if desired. Policy Management Use this page to add and manage policy filters. Click the Add New Filter button to add policy filters. Use the arrows to move filters up or down. Filters at the top of the list execute first. 5
Junk Box Use this module to manage and find messages stored in the Junk Box. Reports and Monitoring Use this module to check SonicWALL Email Security system status, MTA status, and to see reports that show statistics about mail flow through the system. 6