Cloud Services. Cloud Control Panel. Admin Guide



Similar documents
Policy Based Encryption Gateway. Administration Guide

Policy Based Encryption Gateway. Administration Guide

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Policy Based Encryption Essentials. Administrator Guide

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Creating a Content Group and assigning the Encrypt action to the Group.

Mailbox control panel. User guide

Mimecast Services for Outlook (MSO4)

Cloud Services. Anti-Spam. Admin Guide

The Institute of Education Spam filter service allows you to take control of your spam filtering.

PaperClip. em4 Cloud Client. Setup Guide

Encryption Admin & User Guide

Using the Barracuda Spam Firewall to Filter Your s

IC L05: Security.cloud Configuring DLP on to your flow & Applying security to your Office 365 or Google Apps deployment Hands-On Lab

Plesk Control Panel Adding accounts

Fus - Exchange ControlPanel Admin Guide Feb V1.0. Exchange ControlPanel Administration Guide

Business . Setup guide

KUMC Spam Firewall: Barracuda Instructions

Exchange & Related Services Quick Start Guide

Using the Barracuda to Filter Your s

Data Protection. Administrator Guide

Barracuda Spam Firewall User s Guide

Encryption. Instructions for sending and retrieving an encrypted

Word Secure Messaging User Guide. Version 3.0

Hosting Control Panel (CP) Admin Guide

Barracuda User Guide. Managing your Spam Quarantine

Hosting Control Panel (CP) Admin Guide

Setting up Microsoft Office 365

Registering at the Secur site

How To Manage Your Quarantine On A Blackberry.Com

Instructions for setting up Junk E mail filters

TriCore Secure Web Gateway User Guide 1

Setting up Microsoft Office 365

Instructions Microsoft Outlook Express Page 1

IT Services page 1 of 10 Spam Filtering. Overview

Migration Manual (For Outlook Express 6)

Admin Guide Boundary Defense for Anti-Virus & Anti-Spam

Core Filtering Admin Guide

Barracuda Spam & Virus Firewall User's Guide 5.x

10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started!

User Guide Online Backup

Hosted Exchange & Portal. Admin Guide

Review Guide: Exclaimer Mail Utilities Disclaim, Brand, Sign & Protect

Apple Mail Outlook Web Access (OWA) Logging In Changing Passwords Mobile Devices Blackberry...

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

EasyMail Setup. User Guide. Issue 3 September Welcome to AT&T Website Solutions

Barracuda Spam Firewall

Apps4Rent Hosted Exchange Spam Management Interface Guide.

Barracuda Security Service User Guide

Document Revision Date: August 14, Create a New Data Protection Policy in the Symantec.cloud Management Portal

INET1005 May 2009 Getting Started with MyUH

HOW TO: Use the UWITC Barracuda Spam Filter System

DOMAIN CENTRAL HOSTING

Mimecast Personal Portal (MPP)

MUTUAL OF OMAHA SECURE SYSTEM CLIENT/PARTNER USER GUIDE

Migration Manual (For Outlook 2010)

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc S. Winchester Blvd Campbell, CA

HGC SUPERHUB HOSTED EXCHANGE / 2007 SMART PANEL USER GUIDE

Spam Management. Manage your FOPE Spam Quarantine

- Spam Spam Firewall How Does the Spam Firewall Work? Getting Started username Create New Password

Using etoken for Securing s Using Outlook and Outlook Express

Encryption Recipient Guidelines

Chapter 10 Encryption Service

USING OUTLOOK WEB ACCESS

Secure Message Center User Guide

Table of contents 1. IMPORTANT INFORMATION BEFORE YOU START GETTING STARTED EXCHANGE CONTROL PANEL... 2

DigitalPersona Privacy Manager Pro

at Bradford - Outlook

PaperClip. em4 Cloud Client. Manual Setup Guide

Folder Management in Outlook for Macintosh

Guide to Pro Spam Remove

Spam Manager User Guide. Boundary Defense for Anti-Spam End User Guide

Using Your New Webmail

Training Manual. Version 6

Oakland County Webmail Anti-Spam Setup

Evaluation Guide. eprism Messaging Security Suite V8.200

Archiving. Mimecast Training. Student Workbook V 2.3

V-Requester Add-in for Microsoft Outlook

Cloud. Hosted Exchange Administration Manual

Honeywell Secure External User Guide August 2013

Configuring, Customizing, and Troubleshooting Outlook Express

Icebox - Sendio SPAM Filter

Avaya Modular Messaging Microsoft Outlook Client Release 5.2

Microsoft Outlook Web Access Handbook

School Mail System. - Access through Office 365 Exchange Online. User Guide FOR. Education Bureau (EDB)

Welcome to HomeTown Bank s Secure ! User Guide

Avira Exchange Security Small Business Edition. Quick Guide

Icebox - Sendio SPAM Filter

Citrus Valley Health Partners. Web Outlook User Guide. Table of Contents

kalmstrom.com Business Solutions

Configuration Guide. Follow the simple steps given in this document when you are going to run Lepide Active Directory Cleaner for the first time.

Encryption. How do I send my encryption key?

Transcription:

Cloud Services Cloud Control Panel Admin Guide 10/18/2014

CONTENTS Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control... 2 Features Summary... 3 Creating an Encryption Group... 3 Defining an Encryption Rule... 5 Tips & Suggestions... 8

DESCRIPTION OF POLICY BASED ENCRYPTION The Policy Based Encryption (PBE) service encrypts specific emails based on a policy that is, a set of rules designed to analyze all email, and encrypt any email that matches the pre- defined conditions. Policy Based Encryption uses the Email Content Control rules to identify which email needs to be encrypted. The Policy Based Encryption Service is managed through the same control panel that you use to manage your Anti- Virus and Anti- Spam settings. This control panel can be accessed through the main Control Panel. Once logged in, click the Boundary Defense for Email icon: Next, log into the Boundary Defense for Email Control Panel: NOTE: If the password has been changed in the Boundary Defense for Email Control Panel, password will not be synched back to the Control Panel. In this case, that password that is displaying in the Control Panel will not work. POLICY-BASED ENCRYPTION & EMAIL CONTENT CONTROL The Policy Based Encryption service is closely integrated with the Email Content Control service the rule that defines whether an email is to be encrypted is set up in the Email Content Control configuration screens in the Boundary Defense for Email Control Panel. The encryption rule has an action to redirect any emails that meet the rules conditions to a specified encryption email address. This email address will be sent to the administrator when the service is purchased. This email address is used solely to process and encrypt the email. 2

FEATURES SUMMARY PBE Number of recipient languages supported Best Method Of Delivery (BMOD) Encryption strength (- bit) Maximum size of an encrypted email (MB) Maximum number of encrypted emails per user per month Offline reading of emails (possible under certain circumstances) Support for mobile devices (Blackberry and Windows Mobile 5) Branding Configurable password policy Recipients able to reply securely Secure portal email expiry time (days) Portal session timeout if inactive (minutes) US Infrastructure European Infrastructure 12 128 50 240 30 10 CREATING AN ENCRYPTION GROUP Prior to creating any encryption rules, an encryption group must be created. This group needs to be added to each rule, as an exception in order for the mail to be forwarded to the Policy Based Encryption Gateway. See below for instructions for adding this group to the encryption rule. To create an encryption group: 1. Select Services > Email Services > Platform > User Groups, and click the [Create new group] button. 3

2. Enter the Group name, for example PBE Exclusion Do Not Delete. 3. In the New users field, enter a non- valid email address (such as example@domain.com). 4. Click [Add] button. 5. Select [Save and exit]. 4

DEFINING AN ENCRYPTION RULE To trigger mail to be encrypted, an Email Content Control rule must be configured with an action to redirect the mail to the specified email address for the service you are using. Define the rule to include the specific conditions that you want to cause email to be encrypted, for example, specific words contained in the header or body of the email. The Email Content Control service scans email against the rules in the order they are listed in the BDE Control Panel portal. If an email triggers a rule with an exit action, it is subject to that action and does not pass on to be scanned for further rules. The redirection action for PBE rules is an exit action. So it is important to put encryption rules towards the bottom of the rule set, so that other rules defined to comply with the organization s acceptable usage policy are acted on first. NOTE: If an email triggers a rule with an exit action, such as a block action higher in the rule set, the email will not be encrypted, because the first rule, blocking the email, will take precedence. NOTE: It is recommended that test groups be added to a rule initially for testing, to ensure the new encryption performs as expected. This will prevent potential problems on mail flow for the entire organization. Test groups are created only with valid corporate email addresses added to the rule instead non- valid email address. To create an encryption rule: 1. Select Services > Email Services Configuration > Content Control, and click the [Ceate new rule] button. 2. Give the rule a name and specify the rule to apply to Outbound mail. 5

3. In the Sender tab, select the user groups this rule applies to, if the rule will only be for a subset of your users. If you do not select any setting in this tab, the rule will apply to all users in your organization. 4. In the Recipients tab, specify a user group condition. Please note the following: All encryption rules MUST specify a recipient user group condition. To encrypt emails sent by anyone in the organization, you will need to use the user group you created, and then select the option to All recipients EXCEPT those in selected groups. The rule will then be applied to all of your users; so all emails will trigger the rule and therefore be encrypted. o Select Use user groups in this rule from the User Groups section o Select PBE Exclusion Do Not Delete All recipients EXCEPT those in selected groups o Select Add Group o Select the group you created, and click Add Selected If a domain list is also specified as a recipient, in the Rule conditions section, you must select All the conditions below need to be satisfied. 6

NOTE: Any modifications to the rules will require replication throughout the platform before the rule is active. 5. In the Email Content tab, select the criteria that you desire to filter on. In this tab, you can also select if you want to Scan email body, Scan email subject line, Scan Microsoft Office & PDF documents, Scan email header. Email content section you can select content from the drop- down list, or choose Custom List to add customized keywords. You will need to click the information in the Selected content section to filter on this content. (<CTRL> and click to select multiple items) Email templates section you can select content to encrypt from Credit Card Numbers, Social Security Numbers, or Specific Credit Cards. You will need to click the information in the Selected templates section to filter on this content. (<CTRL> and click to select multiple items) 6. In the Attachment tab, you can select to ignore attachments based on size, or whether you want to encrypt all messages with a certain attachment type. 7. In the Time Intervals tab, specify a specific time period for the rule to run. 8. In the Actions & notifications tab, select the action Redirect to administrator from the drop- down list, and check the Use Custom Email address box In the Administrator s email address box, enter the PBE- specific email address that was sent to your company administrator after the purchase of the PBE service. 9. Review the settings in the Summary tab, and click Save and exit. 7

TIPS & SUGGESTIONS Below are some tips and suggestions for setting up and configuring the Policy Based Encryption Gateway: It is highly recommended to use a test group before activating the rules. This allows you to limit any issues caused by mail flow the rule to only affect a subset of the organization. Once the rule has been tested and proper functionality has been verified, the rule can be enabled for the entire organization. When setting up filter keywords, it is recommended to review the keywords internally, to ensure they meet the encryption needs of the organization. Each customer s encryption requirements are different, so there are no default rules configured initially upon purchase of the service. When forwarding a message to the administrator email, it is vital the forwarding email address is correct in the administrator s email address field. If this address is not correct, mail will not flow correctly, and will not reach the encryption gateway or the proper recipient. As messages flow through the system, they are filtered according to the order that the rules appear on the screen, from top to bottom. When a message meets the criteria of a rule, the actions of that rule are enforced, and the message will not reach the rules that follow. Policy Based Encryption rules should only be configured for outbound mail. Encrypted messages can be sent to any email user. If the recipient is not a subscriber, he or she will be directed to a secure web portal to access the encrypted message after creating a log- in. If the recipient is a subscriber, the message will be delivered to the recipient s mailbox. Policy Based Encryption can be used in conjunction with the Secure Mail encryption client. Policy Based Encryption encrypts messages sent via the Outlook client, the OWA web client, or any mobile device. If a rule is not working, the organization may want to deactivate the rule instead of deleting the rule. The rule will no longer filter messages, but it remains available so that the organization can refer back to the rule or activate it in the future, should the need arise. 8