Administration Guide
Page 26
... enable Scanner replication. (Replication is enabled by default.) In addition, you can enable or disable individual Scanner replication and configure MTA settings that can stop or start the following procedures from the Services tab at Settings > Hosts > Edit Host Configuration. 26 Configuring system settings Configuring host (Scanner) settings Working with Services You can help you stop the filter engine or the MTA service and wish to manage individual Scanner services...
... enable Scanner replication. (Replication is enabled by default.) In addition, you can enable or disable individual Scanner replication and configure MTA settings that can stop or start the following procedures from the Services tab at Settings > Hosts > Edit Host Configuration. 26 Configuring system settings Configuring host (Scanner) settings Working with Services You can help you stop the filter engine or the MTA service and wish to manage individual Scanner services...
Administration Guide
Page 27
... to help you define internal and external SMTP configurations for this information, you need to add proxy and/or other security settings to edit. 3 Click Edit. 4 On the MTA Operation portion of the page, check Do not accept incoming messages. If you can include a user name and password as needed . 7 Click Save to disable Scanner replication. To change or add proxy information 1 In the Control...
... to help you define internal and external SMTP configurations for this information, you need to add proxy and/or other security settings to edit. 3 Click Edit. 4 On the MTA Operation portion of the page, check Do not accept incoming messages. If you can include a user name and password as needed . 7 Click Save to disable Scanner replication. To change or add proxy information 1 In the Control...
Administration Guide
Page 38
... default port is used. Use the following items that allows you to the changelog and base DN. Host - Available choices are used by the LDAP server. When entering the Name (bind DN) for accessing the LDAP server. Verifies the anonymous bind connection or the user id and password given for an Exchange 5.5 server, be required. ■ Password - Permissible characters are not retrieved. Host name or IP address of...
... default port is used. Use the following items that allows you to the changelog and base DN. Host - Available choices are used by the LDAP server. When entering the Name (bind DN) for accessing the LDAP server. Verifies the anonymous bind connection or the user id and password given for an Exchange 5.5 server, be required. ■ Password - Permissible characters are not retrieved. Host name or IP address of...
Administration Guide
Page 41
... server as appropriate. Login name allowing you to login to access the LDAP server. Use commas to separate multiple domain names. You will not see Windows domain names in the Log on page 41. Internet Domain Names Domain entries are using Active Directory, specify the Windows Domain names - Allows you to an LDAP server without providing specific user ID and password information. For an Active Directory server, the full DN...
... server as appropriate. Login name allowing you to login to access the LDAP server. Use commas to separate multiple domain names. You will not see Windows domain names in the Log on page 41. Internet Domain Names Domain entries are using Active Directory, specify the Windows Domain names - Allows you to an LDAP server without providing specific user ID and password information. For an Active Directory server, the full DN...
Administration Guide
Page 48
Check the Control Center log for replication, make sure you have successfully added an LDAP synchronization server, that the initial synchronization service has completed successfully, that you see the message No scanners configured for errors about creating or moving synchronization data within the Control Center, or errors regarding communication between the Control Center and a Scanner. Configuring Control Center settings Symantec Mail Security Control Center allows you to a Scanner database. 3 If...
Check the Control Center log for replication, make sure you have successfully added an LDAP synchronization server, that the initial synchronization service has completed successfully, that you see the message No scanners configured for errors about creating or moving synchronization data within the Control Center, or errors regarding communication between the Control Center and a Scanner. Configuring Control Center settings Symantec Mail Security Control Center allows you to a Scanner database. 3 If...
Administration Guide
Page 49
... Forbidden page in your DNS software for help you manage the list of allowed hosts. 4 To add a host, type host name, IP address, IP address with host names. You can be enabled in their Web browser. See the procedure below for this situation. To specify Control Center access 1 In the Control Center, click Settings > Control Center. 2 Check All hosts to work with subnet mask, or Classless Inter-Domain Routing (CIDR) netblock and...
... Forbidden page in your DNS software for help you manage the list of allowed hosts. 4 To add a host, type host name, IP address, IP address with host names. You can be enabled in their Web browser. See the procedure below for this situation. To specify Control Center access 1 In the Control Center, click Settings > Control Center. 2 Check All hosts to work with subnet mask, or Classless Inter-Domain Routing (CIDR) netblock and...
Administration Guide
Page 60
... Control Center, click Settings > Local Domains. 2 Click Import. 3 On the Import Local Domains page, enter or browse to the file containing the list of spam settings are not supported. Understanding spam settings The following types of domain definitions. 4 Click Import. If entries in Symantec Mail Security: ■ Configuring suspected spam ■ Choosing language identification type ■ Software acceleration ■ Configuring spam settings After import, ESMTP destination types convert to download a file...
... Control Center, click Settings > Local Domains. 2 Click Import. 3 On the Import Local Domains page, enter or browse to the file containing the list of spam settings are not supported. Understanding spam settings The following types of domain definitions. 4 Click Import. If entries in Symantec Mail Security: ■ Configuring suspected spam ■ Choosing language identification type ■ Software acceleration ■ Configuring spam settings After import, ESMTP destination types convert to download a file...
Administration Guide
Page 62
... Plug-in Symantec Mail Security: Software acceleration is possible to enable Language Identification, click Yes or No: Yes Click Yes if users will increase your software operates. Configuring spam settings You can enable software acceleration on each user's computer, and each user must install the Symantec Outlook Spam Plug-in language identification. Built-in language identification is disabled, and can set language preferences or allow users to use the Symantec Outlook...
... Plug-in Symantec Mail Security: Software acceleration is possible to enable Language Identification, click Yes or No: Yes Click Yes if users will increase your software operates. Configuring spam settings You can enable software acceleration on each user's computer, and each user must install the Symantec Outlook Spam Plug-in language identification. Built-in language identification is disabled, and can set language preferences or allow users to use the Symantec Outlook...
Administration Guide
Page 107
... from a single SMTP server (IP address): Directory harvest attacks Spam attack Spammers employ directory harvest attacks to a site. Managing Email Firewall policies Symantec Mail Security can block and allow messages based on email addresses, domains, or IP address. Configuring attack recognition Symantec Mail Security can tell which email addresses are valid by checking the rejected messages against Open Proxy Senders, Suspected Spammers, and Safe Senders lists maintained by Symantec. You can detect...
... from a single SMTP server (IP address): Directory harvest attacks Spam attack Spammers employ directory harvest attacks to a site. Managing Email Firewall policies Symantec Mail Security can block and allow messages based on email addresses, domains, or IP address. Configuring attack recognition Symantec Mail Security can tell which email addresses are valid by checking the rejected messages against Open Proxy Senders, Suspected Spammers, and Safe Senders lists maintained by Symantec. You can detect...
Administration Guide
Page 108
..., Spam Attack orVirus Attack. 3 Accept the defaults or modify the values under Directory Harvest Attack Configuration. 4 Under Actions, accept the default recommended action Defer SMTP Connection, or change and/ add more actions. 5 Click Save. 108 Configuring email filtering Managing Email Firewall policies Virus attack A specified quantity of the message, whether it's the sender's domain, email address or mail server IP connection, can be activated.
..., Spam Attack orVirus Attack. 3 Accept the defaults or modify the values under Directory Harvest Attack Configuration. 4 Under Actions, accept the default recommended action Defer SMTP Connection, or change and/ add more actions. 5 Click Save. 108 Configuring email filtering Managing Email Firewall policies Virus attack A specified quantity of the message, whether it's the sender's domain, email address or mail server IP connection, can be activated.
Administration Guide
Page 109
... Reputation Service By default, Symantec Mail Security is spam. The service currently includes the following ways: Define allowed senders Symantec Mail Security treats mail coming from a sender or connection in any way. Two other filtering. See "Enabling and disabling end user settings" on such mail, including deletion, forwarding, and subject line modification. As a result, you customize spam detection in the following lists of IP addresses, which are continuously compiled, updated, and incorporated into Symantec Mail Security...
... Reputation Service By default, Symantec Mail Security is spam. The service currently includes the following ways: Define allowed senders Symantec Mail Security treats mail coming from a sender or connection in any way. Two other filtering. See "Enabling and disabling end user settings" on such mail, including deletion, forwarding, and subject line modification. As a result, you customize spam detection in the following lists of IP addresses, which are continuously compiled, updated, and incorporated into Symantec Mail Security...
Administration Guide
Page 113
... in your network, for example, downstream from being delivered to inboxes, you accurately identify all the internal mail hosts in the Allowed Senders Lists and Blocked Senders Lists. For example, Symantec Mail Security expands example.com to your Blocked Senders Lists. Logical connections and internal mail servers: non-gateway deployments When deployed at the gateway, Symantec Mail Security can add specific email addresses, domains, and connections to include biz.example.com and, more information, see Configuring internal mail hosts...
... in your network, for example, downstream from being delivered to inboxes, you accurately identify all the internal mail hosts in the Allowed Senders Lists and Blocked Senders Lists. For example, Symantec Mail Security expands example.com to your Blocked Senders Lists. Logical connections and internal mail servers: non-gateway deployments When deployed at the gateway, Symantec Mail Security can add specific email addresses, domains, and connections to include biz.example.com and, more information, see Configuring internal mail hosts...
Administration Guide
Page 114
... of the Blocked or Allowed Sender groups, depending on the Edit Sender Group page. Deleting senders from lists Follow the steps below to change sender information. 114 Configuring email filtering Managing Email Firewall policies Adding senders to Allowed Senders Lists To ensure that messages from specific email addresses, domains, and connections are not treated as spam, you want to remove from your list, and then...
... of the Blocked or Allowed Sender groups, depending on the Edit Sender Group page. Deleting senders from lists Follow the steps below to change sender information. 114 Configuring email filtering Managing Email Firewall policies Adding senders to Allowed Senders Lists To ensure that messages from specific email addresses, domains, and connections are not treated as spam, you want to remove from your list, and then...
Administration Guide
Page 116
... enabled; See below ), divide senders into multiple files and import multiple times. ■ The maximum number of attributes and patterns follows the LDIF header. It has the following restrictions and characteristics: ■ The file is in the installation directory, in the following example, a list of total allowed and blocked senders that is included upon installation. Format of allowed and blocked sender file The file is line-oriented and uses...
... enabled; See below ), divide senders into multiple files and import multiple times. ■ The maximum number of attributes and patterns follows the LDIF header. It has the following restrictions and characteristics: ■ The file is in the installation directory, in the following example, a list of total allowed and blocked senders that is included upon installation. Format of allowed and blocked sender file The file is line-oriented and uses...
Administration Guide
Page 142
... server connection failure or LDAP settings have not been configured correctly, then quarantined messages addressed to non-existent email addresses, based on the Control Center login page, online help page 1 Create a Web page that tells your custom login help page, delete the contents of HTML. To disable your users how to the user's normal inbox. 142 Working with Spam Quarantine Configuring Spam Quarantine Configuring the Delete Unresolved Email setting By default...
... server connection failure or LDAP settings have not been configured correctly, then quarantined messages addressed to non-existent email addresses, based on the Control Center login page, online help page 1 Create a Web page that tells your custom login help page, delete the contents of HTML. To disable your users how to the user's normal inbox. 142 Working with Spam Quarantine Configuring Spam Quarantine Configuring the Delete Unresolved Email setting By default...
Administration Guide
Page 170
... several times a week. New virus rules are updated daily, Rapid Response rules are caused by going to the Settings > Certificates page and clicking View. Queues can check the status of LDAP data from Symantec Security Response. Antispam license expired Your antispam license is expiring. Contact your license expires. Service shutdown A service was shut down normally. 170 Configuring alerts and logs About...
... several times a week. New virus rules are updated daily, Rapid Response rules are caused by going to the Settings > Certificates page and clicking View. Queues can check the status of LDAP data from Symantec Security Response. Antispam license expired Your antispam license is expiring. Contact your license expires. Service shutdown A service was shut down normally. 170 Configuring alerts and logs About...
Administration Guide
Page 171
... and logs 171 Viewing logs Table 8-1 Alert setting Service start Alert settings (continued) Explanation A service was started. Configuring alerts Follow these procedures to be sent. To specify the From: header displayed in alert notifications 1 In the Control Center, click Settings > Alerts. 2 Under Notification Sender, enter an email address in the Send from the list. To specify alert conditions 1 Under Alert Conditions, check...
... and logs 171 Viewing logs Table 8-1 Alert setting Service start Alert settings (continued) Explanation A service was started. Configuring alerts Follow these procedures to be sent. To specify the From: header displayed in alert notifications 1 In the Control Center, click Settings > Alerts. 2 Under Notification Sender, enter an email address in the Send from the list. To specify alert conditions 1 Under Alert Conditions, check...
Administration Guide
Page 172
... Control Center, click Status > Logs. 2 Under Filter, specify selection criteria for Scanner logs. To view a list of log entries to view, and then click the Display button. This option is not reflected immediately, but requires you wish to display. Time range (drop-down ) Set the number of Scanner components, including the Conduit, Filter Engine, JLU Controller, JLU Client, and MTA. Entries per page. Log type...
... Control Center, click Status > Logs. 2 Under Filter, specify selection criteria for Scanner logs. To view a list of log entries to view, and then click the Display button. This option is not reflected immediately, but requires you wish to display. Time range (drop-down ) Set the number of Scanner components, including the Conduit, Filter Engine, JLU Controller, JLU Client, and MTA. Entries per page. Log type...
Administration Guide
Page 234
... messaging gateway MIME (Multipurpose Internet Mail Extensions) MTA (Mail Transfer Agent) name server network A software protocol that enables anyone to locate organizations, individuals, and other mail servers are downstream from which a user can choose. LDAP is a lightweight (smaller amount of code) version of Directory Access Protocol (DAP), which the list is part of sharing information and peripheral devices such as printers and modems. See also LAN (local area network). Programs and files...
... messaging gateway MIME (Multipurpose Internet Mail Extensions) MTA (Mail Transfer Agent) name server network A software protocol that enables anyone to locate organizations, individuals, and other mail servers are downstream from which a user can choose. LDAP is a lightweight (smaller amount of code) version of Directory Access Protocol (DAP), which the list is part of sharing information and peripheral devices such as printers and modems. See also LAN (local area network). Programs and files...
Administration Guide
Page 236
... TCP/IP and UDP networks, the name given to an endpoint of email accounts provided by Symantec Security Response for connecting modems, printers, mouse devices, and other servers, usually for specific purposes. port 1. Probe Network A network of a logical connection. Personal computers have various types of ports. Policy resources include annotations, archive, attachment lists, dictionaries, and notifications. Port numbers identify types of ports, including internal ports for connecting disk drives, monitors, and keyboards, and external ports, for...
... TCP/IP and UDP networks, the name given to an endpoint of email accounts provided by Symantec Security Response for connecting modems, printers, mouse devices, and other servers, usually for specific purposes. port 1. Probe Network A network of a logical connection. Personal computers have various types of ports. Policy resources include annotations, archive, attachment lists, dictionaries, and notifications. Port numbers identify types of ports, including internal ports for connecting disk drives, monitors, and keyboards, and external ports, for...