Administration Guide
Page 3
... to register your questions in a timely fashion. Technical support As part of languages for those customers enrolled in the Platinum Support Program ■ Advanced features, such as the Symantec Alerting Service and Technical Account Manager role, offer enhanced response and proactive security support Please visit our Web site for current information on Support Programs. The specific features available may go to: http...
... to register your questions in a timely fashion. Technical support As part of languages for those customers enrolled in the Platinum Support Program ■ Advanced features, such as the Symantec Alerting Service and Technical Account Manager role, offer enhanced response and proactive security support Please visit our Web site for current information on Support Programs. The specific features available may go to: http...
Administration Guide
Page 21
... a user name and password as needed . 7 Click Save to store your information. To take a Scanner out of service 1 In the Control Center, click Settings > Hosts. 2 Check the Scanner to edit. 3 Click Edit. 4 On the MTA Operation portion of the page, uncheck Enable Scanner Replication for this information, you need to add proxy and/or other security settings to store your server definition, use the steps...
... a user name and password as needed . 7 Click Save to store your information. To take a Scanner out of service 1 In the Control Center, click Settings > Hosts. 2 Check the Scanner to edit. 3 Click Edit. 4 On the MTA Operation portion of the page, uncheck Enable Scanner Replication for this information, you need to add proxy and/or other security settings to store your server definition, use the steps...
Administration Guide
Page 30
... the number of directory used by the LDAP synchronization server. Windows users use the Services control panel to the Control Center Table 2-4 LDAP Server Parameters when adding a server Item Description Description Text describing the LDAP server being added to first stop SMS Virtual Directory, then start SMS Sync Server. If synchronization has not completed successfully, error messages will be rebooted. Host Host name or IP address. The following command...
... the number of directory used by the LDAP synchronization server. Windows users use the Services control panel to the Control Center Table 2-4 LDAP Server Parameters when adding a server Item Description Description Text describing the LDAP server being added to first stop SMS Virtual Directory, then start SMS Sync Server. If synchronization has not completed successfully, error messages will be rebooted. Host Host name or IP address. The following command...
Administration Guide
Page 31
... settings 31 Configuring LDAP settings Table 2-4 LDAP Server Parameters when adding a server Item Description Usage Describes how this LDAP server will be required. ■ Password-Password information that resolve to access the LDAP server. Use commas or semicolons to separate multiple names. Available usage modes are not retrieved. ■ Name (bind DN)-Login name allowing you could assign company.net to dropdown list when logging onto a Windows host. For example...
... settings 31 Configuring LDAP settings Table 2-4 LDAP Server Parameters when adding a server Item Description Usage Describes how this LDAP server will be required. ■ Password-Password information that resolve to access the LDAP server. Use commas or semicolons to separate multiple names. Available usage modes are not retrieved. ■ Name (bind DN)-Login name allowing you could assign company.net to dropdown list when logging onto a Windows host. For example...
Administration Guide
Page 40
... levels ranging from 1-10), can take as much as 7.5 hours on a Dell 1850 running Linux. Check your synchronization status. (See "To check replication status" on the list. To troubleshoot a status message 1 If the Scanner has a Status of In-Progress ◆ Perform a manual replication from the Control Center database to configure the following: ■ Control Center administration ■ Control Center certificate Configuring Control Center settings The Symantec Mail Security for SMTP Control Center allows...
... levels ranging from 1-10), can take as much as 7.5 hours on a Dell 1850 running Linux. Check your synchronization status. (See "To check replication status" on the list. To troubleshoot a status message 1 If the Scanner has a Status of In-Progress ◆ Perform a manual replication from the Control Center database to configure the following: ■ Control Center administration ■ Control Center certificate Configuring Control Center settings The Symantec Mail Security for SMTP Control Center allows...
Administration Guide
Page 41
... list 1 Log in your DNS software for help you add one or more hosts to work with host names. use brightmail; Add and Delete buttons are rejected after you manage the list of allowed hosts. 4 To add a host, type host name, IP address, IP address with the correct address and logon information has access from unauthorized computers will see a 403 Forbidden page in their Web browser. You can be enabled in to the Control...
... list 1 Log in your DNS software for help you add one or more hosts to work with host names. use brightmail; Add and Delete buttons are rejected after you manage the list of allowed hosts. 4 To add a host, type host name, IP address, IP address with the correct address and logon information has access from unauthorized computers will see a 403 Forbidden page in their Web browser. You can be enabled in to the Control...
Administration Guide
Page 53
... identification offered by Symantec Mail Security for SMTP Processing takes place within the software, and no further software needs to be accessed in language identification is disabled, and can use the built-in language identification won't work if you want to increase the speed at which your need for suspected spam, language identification, and software acceleration. Configuring spam settings You can 't be installed. Built-in the...
... identification offered by Symantec Mail Security for SMTP Processing takes place within the software, and no further software needs to be accessed in language identification is disabled, and can use the built-in language identification won't work if you want to increase the speed at which your need for suspected spam, language identification, and software acceleration. Configuring spam settings You can 't be installed. Built-in the...
Administration Guide
Page 57
... invalid addresses. ■ Check Drop messages for SMTP processes certain zip files and other types of serious problems with it after you're sure your email system is an extreme measure. Such container files are often referred to configure container settings and content filtering settings. For this setting to drop invalid messages from a spammer's directory harvest attack. Configuring container settings When Symantec Mail Security for...
... invalid addresses. ■ Check Drop messages for SMTP processes certain zip files and other types of serious problems with it after you're sure your email system is an extreme measure. Such container files are often referred to configure container settings and content filtering settings. For this setting to drop invalid messages from a spammer's directory harvest attack. Configuring container settings When Symantec Mail Security for...
Administration Guide
Page 95
... individual Blocked and Allowed Senders Lists. See "Installing the Symantec Outlook Spam Plug-in which are available to give users the ability to trigger the specified action. Minimum number of ... See "Enabling and disabling end user settings" on page 210. Qualification time window Time period in " on page 79. Percentage of blocked and allowed senders from within their Outlook mail client. Configuring email filtering 95 Managing Email Firewall policies 3 Accept the defaults...
... individual Blocked and Allowed Senders Lists. See "Installing the Symantec Outlook Spam Plug-in which are available to give users the ability to trigger the specified action. Minimum number of ... See "Enabling and disabling end user settings" on page 210. Qualification time window Time period in " on page 79. Percentage of blocked and allowed senders from within their Outlook mail client. Configuring email filtering 95 Managing Email Firewall policies 3 Accept the defaults...
Administration Guide
Page 96
... address or connection in place. When you can choose to use a third-party sender list, Symantec Mail Security for SMTP checks whether the sending mail server is spam. ■ Suspected Spammers IP addresses from trusted senders will be treated as legitimate mail. You can use policies to configure a variety of actions to perform on such mail, including deletion, forwarding, and subject line modification. ■ Use the Sender Reputation Service By default, Symantec Mail Security...
... address or connection in place. When you can choose to use a third-party sender list, Symantec Mail Security for SMTP checks whether the sending mail server is spam. ■ Suspected Spammers IP addresses from trusted senders will be treated as legitimate mail. You can use policies to configure a variety of actions to perform on such mail, including deletion, forwarding, and subject line modification. ■ Use the Sender Reputation Service By default, Symantec Mail Security...
Administration Guide
Page 99
....255.0 ■ Classless Inter-Domain Routing (CIDR) IP address: 192.30.250.00/18 ■ Third party services: supply the lookup domain of a third party sender service Symantec Mail Security for SMTP can add specific email addresses, domains, and connections to your Blocked Senders Lists. Configuring email filtering 99 Managing Email Firewall policies ■ IP-based: specify IP connections Symantec Mail Security for SMTP checks the IP address of the mail server initiating the connection to verify if it is...
....255.0 ■ Classless Inter-Domain Routing (CIDR) IP address: 192.30.250.00/18 ■ Third party services: supply the lookup domain of a third party sender service Symantec Mail Security for SMTP can add specific email addresses, domains, and connections to your Blocked Senders Lists. Configuring email filtering 99 Managing Email Firewall policies ■ IP-based: specify IP connections Symantec Mail Security for SMTP checks the IP address of the mail server initiating the connection to verify if it is...
Administration Guide
Page 102
... (LDIF). Format of allowed and blocked sender file The file is currently disabled. A red x in an allowed and blocked sender file Be aware of the following : ■ To enable a sender entry that is currently disabled, check the box adjacent the sender information, and then click Enable. ■ To disable a sender entry that is often easier to work with. 102 Configuring email filtering Managing Email Firewall policies 2 Click one...
... (LDIF). Format of allowed and blocked sender file The file is currently disabled. A red x in an allowed and blocked sender file Be aware of the following : ■ To enable a sender entry that is currently disabled, check the box adjacent the sender information, and then click Enable. ■ To disable a sender entry that is often easier to work with. 102 Configuring email filtering Managing Email Firewall policies 2 Click one...
Administration Guide
Page 103
... IP address. Specify an email address or domain using alphanumeric and special characters, except the plus sign (+). AS: spammer@example.org AS: john?????@example.com RS: Rejected or blocked sender. RS: john?????@example.com BL: Third party blocked sender list. entries with the colon-dash pattern (:-) are disabled; AC: 76.86.37.00/18 RC: Rejected connection or network. Configuring email filtering 103 Managing Email Firewall...
... IP address. Specify an email address or domain using alphanumeric and special characters, except the plus sign (+). AS: spammer@example.org AS: john?????@example.com RS: Rejected or blocked sender. RS: john?????@example.com BL: Third party blocked sender list. entries with the colon-dash pattern (:-) are disabled; AC: 76.86.37.00/18 RC: Rejected connection or network. Configuring email filtering 103 Managing Email Firewall...
Administration Guide
Page 128
..., under General Settings, check the box next to nonexistent users are stored in ? This change only affects the login help page, not the rest of HTML. Configuring the login help By default, when users click on the Control Center login page, online help logging in the Spam Quarantine postmaster mailbox whether the Delete unresolved email check box is enabled. You can access the messages in a new window. When administrator...
..., under General Settings, check the box next to nonexistent users are stored in ? This change only affects the login help page, not the rest of HTML. Configuring the login help By default, when users click on the Control Center login page, online help logging in the Spam Quarantine postmaster mailbox whether the Delete unresolved email check box is enabled. You can access the messages in a new window. When administrator...
Administration Guide
Page 138
....impl.SmtpConsumer.run(Unknown Source) Error in the intended recipients' quarantine. 138 Working with Spam Quarantine Configuring Spam Quarantine from Spam Quarantine This can occur if the IP address of the Control Center is not specified for distribution lists/ aliases" on page 130. Users don't see "Notification for inbound and outbound mail settings on the Settings > Hosts Add or Edit page, SMTP...
....impl.SmtpConsumer.run(Unknown Source) Error in the intended recipients' quarantine. 138 Working with Spam Quarantine Configuring Spam Quarantine from Spam Quarantine This can occur if the IP address of the Control Center is not specified for distribution lists/ aliases" on page 130. Users don't see "Notification for inbound and outbound mail settings on the Settings > Hosts Add or Edit page, SMTP...
Administration Guide
Page 158
... the type of resulting log records to reboot the system. To go to log: system events, message actions, blocking actions, or all Scanner machines. Select a component for which mail messages were released from the list. Search for the logs you have recently changed time zones on the Control Center, the database, and LDAP. Scanner logs record the workings of logs 1 In the Control Center, click Status > Logs...
... the type of resulting log records to reboot the system. To go to log: system events, message actions, blocking actions, or all Scanner machines. Select a component for which mail messages were released from the list. Search for the logs you have recently changed time zones on the Control Center, the database, and LDAP. Scanner logs record the workings of logs 1 In the Control Center, click Status > Logs...
Administration Guide
Page 213
To configure system-wide settings for the Symantec Outlook Spam Plug-in (optional) 1 Open the setup.ini file for launching the Symantec Outlook Spam Plug-in installation package. Example: CmdLine=SPAM_FOLDER="Junk" ADMIN_FALSE_ADDRESS="admin[email protected]" 3 Save your changes, add /qn to the end of the CmdLine attribute in setup.ini, and then run the silent install using: /s. Note: Instruct users to close Outlook in any...
To configure system-wide settings for the Symantec Outlook Spam Plug-in (optional) 1 Open the setup.ini file for launching the Symantec Outlook Spam Plug-in installation package. Example: CmdLine=SPAM_FOLDER="Junk" ADMIN_FALSE_ADDRESS="admin[email protected]" 3 Save your changes, add /qn to the end of the CmdLine attribute in setup.ini, and then run the silent install using: /s. Note: Instruct users to close Outlook in any...
Administration Guide
Page 217
... User properties, and then click the General tab. The Complete option installs all software in days for Exchange Follow these steps to use. The default period is 30 days. To enable spam foldering after configuring it, see "Enabling automatic spam foldering" on Exchange 2003 systems. To install the Symantec Spam Folder Agent for Exchange 1 Navigate to the folder containing the setup.exe file...
... User properties, and then click the General tab. The Complete option installs all software in days for Exchange Follow these steps to use. The default period is 30 days. To enable spam foldering after configuring it, see "Enabling automatic spam foldering" on Exchange 2003 systems. To install the Symantec Spam Folder Agent for Exchange 1 Navigate to the folder containing the setup.exe file...
Administration Guide
Page 244
... messages. See also gateway, proxy server. release In Symantec Mail Security for SMTP, the process of duplicating configuration data from a client and making requests on behalf of using a 5xx SMTP response code to tell the sending MTA that each used within a company or enterprise to gather all Internet requests, forward them out to the original requester within the company. Port numbers identify types of proxies, each...
... messages. See also gateway, proxy server. release In Symantec Mail Security for SMTP, the process of duplicating configuration data from a client and making requests on behalf of using a 5xx SMTP response code to tell the sending MTA that each used within a company or enterprise to gather all Internet requests, forward them out to the original requester within the company. Port numbers identify types of proxies, each...
Administration Guide
Page 245
... Service server session The output generated by Symantec based on data from the Probe Network. A category of IP addresses from each Scanner is collected. A list of email senders that request specific services. A set of the Sender Reputation Service: Open Proxy Senders, Safe Senders, and Suspected Spammers. As the Internet becomes a more importance in Symantec Mail Security for SMTP. A service that helps local area networks (LANs) and wide area networks (WANs) achieve interoperability and connectivity...
... Service server session The output generated by Symantec based on data from the Probe Network. A category of IP addresses from each Scanner is collected. A list of email senders that request specific services. A set of the Sender Reputation Service: Open Proxy Senders, Safe Senders, and Suspected Spammers. As the Internet becomes a more importance in Symantec Mail Security for SMTP. A service that helps local area networks (LANs) and wide area networks (WANs) achieve interoperability and connectivity...