Policy Based Encryption Gateway. Administration Guide

Similar documents
Cloud Services. Cloud Control Panel. Admin Guide

Policy Based Encryption Gateway. Administration Guide

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide

Policy Based Encryption Essentials. Administrator Guide

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Hosting Control Panel (CP) Admin Guide

Hosting Control Panel (CP) Admin Guide

Fus - Exchange ControlPanel Admin Guide Feb V1.0. Exchange ControlPanel Administration Guide

Creating a Content Group and assigning the Encrypt action to the Group.

USING OUTLOOK WEB ACCESS

Chapter 10 Encryption Service

TriCore Secure Web Gateway User Guide 1

Exchange & Related Services Quick Start Guide

PaperClip. em4 Cloud Client. Setup Guide

Document Revision Date: August 14, Create a New Data Protection Policy in the Symantec.cloud Management Portal

SecureAnywhereTM Web Security Service

10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started!

Data Protection. Administrator Guide

Update Instructions

Mimecast Services for Outlook (MSO4)

University of Mary s Spam Solution

Mailbox control panel. User guide

Barracuda Spam Firewall User s Guide

User Guide Online Backup

Apple Mail Outlook Web Access (OWA) Logging In Changing Passwords Mobile Devices Blackberry...

Training Manual. Version 6

Encryption Recipient Guidelines

Hosted Exchange & Portal. Admin Guide

Barracuda Spam & Virus Firewall User's Guide 5.x

Encryption Admin & User Guide

Hosted Exchange Setup Instructions

V-Requester Add-in for Microsoft Outlook

How To Manage Your Quarantine On A Blackberry.Com

Secure Message Center User Guide

CHARTER BUSINESS CUSTOM HOSTING MIGRATION INSTRUCTIONS

Microsoft Lync TM Order & Provisioning. Admin Guide

Instructions for setting up Junk E mail filters

Word Secure Messaging User Guide. Version 3.0

- Spam Spam Firewall How Does the Spam Firewall Work? Getting Started username Create New Password

Booth Gmail Configuration

Managing Spam in & More Introduction Spam Detector Block Sender Filters

U.S. Bank Secure Mail

Prepared by Mythtech Limited OFFICE 365 MIGRATION MANUAL GUIDELINE

HGC SUPERHUB HOSTED EXCHANGE / 2007 SMART PANEL USER GUIDE

Registering at the Secur site

DigitalPersona Privacy Manager Pro

Update Instructions

INET1005 May 2009 Getting Started with MyUH

How to set up Outlook Anywhere on your home system

Admin Guide Boundary Defense for Anti-Virus & Anti-Spam

henry schein secure chart patient portal

Barracuda User Guide. Managing your Spam Quarantine

BlackBerry Internet Service. Version: Administration Guide

Setting up Microsoft Office 365

Setting up Microsoft Office 365

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

kalmstrom.com Business Solutions

How to install and use the File Sharing Outlook Plugin

Setting Up Sharp MX-Color Imagers To Scan To

Encryption. Instructions for sending and retrieving an encrypted

DOMAIN CENTRAL HOSTING

Encryption. How do I send my encryption key?

Hosted Microsoft Exchange Client Setup & Guide Book

MSGCU SECURE MESSAGE CENTER

IC L05: Security.cloud Configuring DLP on to your flow & Applying security to your Office 365 or Google Apps deployment Hands-On Lab

Trunk Archive Tool

External End User Training Guide: Secure Extract

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc S. Winchester Blvd Campbell, CA

All existing accounts will be listed. 2. Click Add and select Mail to add a new account (see Figure 2). Figure 1. Figure 2

D3 TECHNOLOGIES SPAM FILTER

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

Outlook Mail, Calendar, Contacts, Notes & Tasks. User Guide

How To Set Up A Sartorius Mailbox In Outlook On A Non-Standard Pc On A Windows Xp Oracle 365 On A Pc Oracle365 On A Sertorius Mailbox On A Microsoft Office365 On Pc Orca 2 On A

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2007

Secure Recipient Guide

Admin Guide Exchange 2010 & Related Services Apptix Hosting Control Panel (CP)

Folder Management in Outlook for Macintosh

Oakland County Webmail Anti-Spam Setup

Update Instructions

DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD. Unify Data Management Platform 2012/2013 Software Build 5.15

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2010

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc S. Winchester Blvd Campbell, CA

Cloud Services. Anti-Spam. Admin Guide

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to or Network Folder

How to access your via Outlook Web Access

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

Spam Manager User Guide. Boundary Defense for Anti-Spam End User Guide

Using the Barracuda Spam Firewall to Filter Your s

Update Instructions

Cloud. Hosted Exchange Administration Manual

SECURE MESSAGING PLATFORM

Mimecast Personal Portal (MPP)

Plesk Control Panel Adding accounts

PaperClip. em4 Cloud Client. Manual Setup Guide

Cloud Services ADM. User Interface Guide

Transcription:

Policy Based Encryption Gateway Administration Guide

Policy Based Encryption Gateway Admin Guide 1 Contents Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control... 2 Features Summary... 2 Enabling Policy-Based Encryption... 4 Accessing the Boundary Defense / Policy Based Encryption Control Panel... 7 Creating an Encryption Group... 10 Defining an Encryption Rule... 13 Tips & Suggestions... 17

Policy Based Encryption Gateway Admin Guide 2 Description of Policy Based Encryption The Policy Based Encryption (PBE) service encrypts specific emails based on a policy that is, a set of rules designed to analyze all email, and encrypt any email that matches the pre-defined conditions. Policy Based Encryption uses the Email Content Control rules to identify which email needs to be encrypted. The Policy Based Encryption Service is managed through the same control panel that you use to manage your Anti-virus and Anti-spam settings. Policy Based Encryption and Email Content Control The Policy Based Encryption service is closely integrated with the Email Content Control service the rule that defines whether an email is to be encrypted is set up in the Email Content Control configuration screens in the Boundary Defense for Email Control Panel. The encryption rule has an action to redirect any emails that meet the rules conditions to a specified encryption email address. This email address will be sent to the administrator when the service is purchased. This email address is used solely to process and encrypt the email. Features Summary The following summary shows some of the features available. PBE Number of recipient languages supported 12 Best Method Of Delivery (BMOD) Encryption strength (-bit) 128 Maximum size of an encrypted email (MB) 50 Maximum number of encrypted emails per user per month 240 Offline reading of emails (possible under certain circumstances) Support for mobile devices (Blackberry and Windows Mobile 5) Branding Configurable password policy

Policy Based Encryption Gateway Admin Guide 3 Recipients able to reply securely Secure portal email expiry time (days) 30 Portal session timeout if inactive (minutes) 10 US Infrastructure European Infrastructure

Enabling Policy-Based Encryption 1) Access Hosted Exchange through the Menu Ribbon. Policy Based Encryption Gateway Admin Guide 4 2) Click on the Boundary Defense tab.

3) Click on the Manage link next to Policy-Based Encryption. Policy Based Encryption Gateway Admin Guide 5 4) Click on the Activate link.

Policy Based Encryption Gateway Admin Guide 6 5) Click on Finish. 6) The service will show as Provisioning. Click on the Refresh button in the upper right to confirm that the service is activated.

Policy Based Encryption Gateway Admin Guide 7 Accessing the Boundary Defense / Policy Based Encryption Control Panel The Policy Based Encryption Service is managed through the same control panel that you use to manage your Anti-virus and Anti-spam settings. This control panel can be accessed through the main Control Panel: 1) Access Hosted Exchange through the Menu Ribbon.

Policy Based Encryption Gateway Admin Guide 8 2) Click on the Boundary Defense tab. 3) Click on the Open link next to Boundary Defense Management Portal.

Policy Based Encryption Gateway Admin Guide 9 4) Log on to the Boundary Defense Management Portal using the User Name and Password from the Control Panel Boundary Defense Tab. NOTE: If the password has been changed in the Boundary Defense for Email Control Panel, password will not be synched back to the Control Panel. In this case, that password that is displaying in the Control Panel will not work.

Policy Based Encryption Gateway Admin Guide 10 Creating an Encryption Group Prior to creating any encryption rules, an encryption group must be created. This group needs to be added to each rule, as an exception in order for the mail to be forwarded to the Policy Based Encryption Gateway. See below for instructions for adding this group to the encryption rule. To create an encryption group: 1. Select the Users and Groups tab.

2. Click on the Email Content Control User Groups link. Policy Based Encryption Gateway Admin Guide 11 3. Click on the User Groups tab. 4. Click on the Create New Groups button. 5. Enter the Group Name, for example PBE Exclusion Do Not Delete, in the Group Name field. 6. In the New users field, enter a non-valid email address (such as example@domain.com).

7. Select Save and Exit. Policy Based Encryption Gateway Admin Guide 12

Policy Based Encryption Gateway Admin Guide 13 Defining an Encryption Rule To trigger mail to be encrypted, an Email Content Control rule must be configured with an action to redirect the mail to the specified email address for the service you are using. Define the rule to include the specific conditions that you want to cause email to be encrypted, for example, specific words contained in the header or body of the email. The Email Content Control service scans email against the rules in the order they are listed in the BDE Control Panel portal. If an email triggers a rule with an exit action, it is subject to that action and does not pass on to be scanned for further rules. The redirection action for PBE rules is an exit action. So it is important to put encryption rules towards the bottom of the rule set, so that other rules defined to comply with the organization s acceptable usage policy are acted on first. NOTE: If an email triggers a rule with an exit action, such as a block action higher in the rule set, the email will not be encrypted, because the first rule, blocking the email, will take precedence. NOTE: It is recommended that test groups be added to a rule initially for testing, to ensure the new encryption performs as expected. This will prevent potential problems on mail flow for the entire organization. Test groups are created as in Section 4 above, only with valid corporate email addresses added to the rule instead non-valid email address. To create an encryption rule: 1. Select the Services tab.

2. Select Content Control, and click the [Create new rule] button. Policy Based Encryption Gateway Admin Guide 14 3. Give the rule a name and specify the rule to apply to Outbound mail. 4. In the Sender tab, select the user groups this rule applies to, if the rule will only be for a subset of your users. If you do not select any setting in this tab, the rule will apply to all users in your organization. 5. In the Recipient tab, specify a user group condition. Please note the following: All encryption rules MUST specify a recipient user group condition. To encrypt emails sent by anyone in the organization, you will need to use the user group you created in section 4, and then select the option to All recipients EXCEPT those in selected groups. The rule will then be applied to all of your users; so all emails will trigger the rule and therefore be encrypted.

Policy Based Encryption Gateway Admin Guide 15 If a domain list is also specified as a recipient, in the Rule conditions section, you must select All the conditions below need to be satisfied. NOTE: Any modifications to the rules will require replication throughout the platform before the rule is active. 1. In the Email Content tab, select the criteria with which you desire to filter. In this tab, you can also select if you want to Scan email body, Scan email subject line, Scan Microsoft Office & PDF documents, Scan email header. Email content section you can select content from the drop-down list, or choose Custom

Policy Based Encryption Gateway Admin Guide 16 List to add customized keywords. You will need to click the information in the Selected content section to filter on this content. (<CTRL> and click to select multiple items) Email templates section you can select content to encrypt on from Credit Card Numbers, Social Security Numbers, or Specific Credit Cards. You will need to click the information in the Selected templates section to filter on this content. (<CTRL> and click to select multiple items) 2. In the Attachments tab, you can select to ignore attachments based on size, or whether you want to encrypt all messages with a certain attachment type. 3. In the Time Intervals tab, specify a specific time period for the rule to run. 4. In the Actions & notifications tab, select the action Redirect to administrator from the dropdown list, and check the Use Custom Email address box 5. In the Administrator s email address box, enter the PBE-specific email address that was sent to your company administrator after the purchase of the PBE service. 6. Review the settings in the Summary tab, and click [Save and exit].

Policy Based Encryption Gateway Admin Guide 17 Tips & Suggestions Below are some tips and suggestions for setting up and configuring the Policy Based Encryption Gateway: It is highly recommended to use a test group before activating the rules. This allows you to limit any issues caused by mail flow the rule to only affect a subset of the organization. Once the rule has been tested and proper functionality has been verified, the rule can be enabled for the entire organization. When setting up filter keywords, it is recommended to review the keywords internally, to ensure they meet the encryption needs of the organization. Each customer s encryption requirements are different, so there are no default rules configured initially upon purchase of the service. When forwarding a message to the Administrator email, it is vital the forwarding email address is correct in the Administrator s email address field. If this address is not correct, mail will not flow correctly, and will not reach the encryption gateway or the proper recipient. As messages flow through the system, they are filtered according to the order that the rules appear on the screen, from top to bottom. When a message meets the criteria of a rule, the actions of that rule are enforced, and the message will not reach the rules that follow. Policy Based Encryption rules should only be configured for outbound mail. Encrypted messages can be sent to any email user. If the recipient is not a subscriber, he or she will be directed to a secure web portal to access the encrypted message after creating a log-in. If the recipient is a subscriber, the message will be delivered to the recipient s mailbox. Policy Based Encryption can be used in conjunction with the Secure Mail encryption client. Policy Based Encryption encrypts messages sent via the Outlook client, the OWA web client, or any mobile device. If a rule is not working, the organization may want to deactivate the rule instead of deleting the rule. The rule will no longer filter messages, but it remains available so that the organization can refer back to the rule or activate it in the future, should the need arise.