Administration Guide
Page 2
... names may be trademarks of their respective owners. Federal acquisitions: Commercial Software - Symantec Mail Security is protected under U.S. Cupertino, CA 95014 USA http://www.symantec.com and other countries. and 6,654,787. Symantec Corporation 20330 Stevens Creek Blvd. Patent Nos. 6,052,709; 5,999,932; ...The product described in the U.S. No part of this document may be reproduced in accordance with the terms of the agreement. Symantec Mail Security Administration Guide The software described in this book is furnished under a license agreement and may be used only in any form ...
... names may be trademarks of their respective owners. Federal acquisitions: Commercial Software - Symantec Mail Security is protected under U.S. Cupertino, CA 95014 USA http://www.symantec.com and other countries. and 6,654,787. Symantec Corporation 20330 Stevens Creek Blvd. Patent Nos. 6,052,709; 5,999,932; ...The product described in the U.S. No part of this document may be reproduced in accordance with the terms of the agreement. Symantec Mail Security Administration Guide The software described in this book is furnished under a license agreement and may be used only in any form ...
Administration Guide
Page 3
...level of service for our online Knowledge Base. The Technical Support group works collaboratively with Product Engineering and Symantec Security Response to answer your country or language under Global Support. For example, the Technical Support group works with the... : ■ A range of support options that are enrolled in your region or language under Global Support. Symantec's maintenance offerings include the following URL: www.symantec.com/techsupp/ent/enterprise.html Select your product documentation. Technical Support's primary role is available 24 hours a day...
...level of service for our online Knowledge Base. The Technical Support group works collaboratively with Product Engineering and Symantec Security Response to answer your country or language under Global Support. For example, the Technical Support group works with the... : ■ A range of support options that are enrolled in your region or language under Global Support. Symantec's maintenance offerings include the following URL: www.symantec.com/techsupp/ent/enterprise.html Select your product documentation. Technical Support's primary role is available 24 hours a day...
Administration Guide
Page 5
.... Educational Services Educational Services provide a full array of managing and monitoring security devices and events, ensuring rapid response to real threats. Managed Security Services These services remove the burden of technical training, security education, security certification, and awareness communication programs. ■ Advice about Symantec's technical support options ■ Nontechnical presales questions ■ Issues that are...
.... Educational Services Educational Services provide a full array of managing and monitoring security devices and events, ensuring rapid response to real threats. Managed Security Services These services remove the burden of technical training, security education, security certification, and awareness communication programs. ■ Advice about Symantec's technical support options ■ Nontechnical presales questions ■ Issues that are...
Administration Guide
Page 7
Additional Uses and Restrictions: Disclaimer of Damages: 4. Export Regulation: 6. Government Restricted Rights: 5. License: You may: You may not: 2. General: 7. Limited Warranty: 3. U.S. Symantec Software License Agreement Symantec Mail Security or SMTP 1.
Additional Uses and Restrictions: Disclaimer of Damages: 4. Export Regulation: 6. Government Restricted Rights: 5. License: You may: You may not: 2. General: 7. Limited Warranty: 3. U.S. Symantec Software License Agreement Symantec Mail Security or SMTP 1.
Administration Guide
Page 9
Contents Technical Support Chapter 1 About Symantec Mail Security Key features 15 New features 16 Functional overview 18 Architecture 19 Where to get more information 20 Chapter 2 Configuring system settings Configuring certificate settings...24 Configuring host (Scanner) settings 25 Working with Services 26 HTTP proxies 27 SMTP Scanner settings 27 Configuring Default SMTP Settings 31 Configuring internal mail hosts 35 Testing Scanners 35 Configuring LDAP settings 36 Configure LDAP settings 37 Synchronization status information 43 Replicating data to Scanners 45 Starting and ...
Contents Technical Support Chapter 1 About Symantec Mail Security Key features 15 New features 16 Functional overview 18 Architecture 19 Where to get more information 20 Chapter 2 Configuring system settings Configuring certificate settings...24 Configuring host (Scanner) settings 25 Working with Services 26 HTTP proxies 27 SMTP Scanner settings 27 Configuring Default SMTP Settings 31 Configuring internal mail hosts 35 Testing Scanners 35 Configuring LDAP settings 36 Configure LDAP settings 37 Synchronization status information 43 Replicating data to Scanners 45 Starting and ...
Administration Guide
Page 10
... content filtering settings 67 Configuring email filtering About email filtering 69 Notes on filtering actions 78 Multiple actions per verdict 79 Multiple group policies 81 Security risks 81 About precedence 83 Creating groups and adding members 84 Add or remove members from a group 84 Assigning filter policies to a group 87 Selecting...
... content filtering settings 67 Configuring email filtering About email filtering 69 Notes on filtering actions 78 Multiple actions per verdict 79 Multiple group policies 81 Security risks 81 About precedence 83 Creating groups and adding members 84 Add or remove members from a group 84 Assigning filter policies to a group 87 Selecting...
Administration Guide
Page 12
12 Contents Chapter 7 Chapter 8 Chapter 9 Configuring Suspect Virus Quarantine port for incoming email 162 Configuring the size for Suspect Virus Quarantine 163 Testing Symantec Mail Security Verifying normal delivery 165 Verifying spam filtering 165 Testing antivirus filtering 166 Verifying filtering to Spam Quarantine 167 Configuring alerts and logs About alerts 169 ...
12 Contents Chapter 7 Chapter 8 Chapter 9 Configuring Suspect Virus Quarantine port for incoming email 162 Configuring the size for Suspect Virus Quarantine 163 Testing Symantec Mail Security Verifying normal delivery 165 Verifying spam filtering 165 Testing antivirus filtering 166 Verifying filtering to Spam Quarantine 167 Configuring alerts and logs About alerts 169 ...
Administration Guide
Page 13
... system maintenance 215 Backing up logs data 216 Backing up the Spam and Virus Quarantine databases 216 Maintaining adequate disk space 219 Integrating Symantec Mail Security with Symantec Security Information Manager About Symantec Security Information Manager 221 Interpreting events in the Information Manager 222 Configuring data sources 223 Firewall events that are sent to the Information Manager...
... system maintenance 215 Backing up logs data 216 Backing up the Spam and Virus Quarantine databases 216 Maintaining adequate disk space 219 Integrating Symantec Mail Security with Symantec Security Information Manager About Symantec Security Information Manager 221 Interpreting events in the Information Manager 222 Configuring data sources 223 Firewall events that are sent to the Information Manager...
Administration Guide
Page 15
... liability, and ensure compliance with regulatory requirements. ■ Group policies and filter policies - Virus definitions and engines protect your site. ■ Antivirus technology - 1 Chapter About Symantec Mail Security This chapter includes the following topics: ■ Key features ■ New features ■ Functional overview ■ Architecture ■ Where to get more information Key features...
... liability, and ensure compliance with regulatory requirements. ■ Group policies and filter policies - Virus definitions and engines protect your site. ■ Antivirus technology - 1 Chapter About Symantec Mail Security This chapter includes the following topics: ■ Key features ■ New features ■ Functional overview ■ Architecture ■ Where to get more information Key features...
Administration Guide
Page 16
.... Email messages that may contain viruses can be effective in email being sent to this version of Symantec Mail Security: Table 1-1 New features for Symantec Mail Security (all users) Category Features Description Threat protection features Improved email firewall Protects against directory-harvest attacks,.... Support for Specify conditions that result in defeating virus attacks before conventional signatures are available. 16 About Symantec Mail Security New features New features The following table lists the features that have been added to Enterprise Vault and ...
.... Email messages that may contain viruses can be effective in email being sent to this version of Symantec Mail Security: Table 1-1 New features for Symantec Mail Security (all users) Category Features Description Threat protection features Improved email firewall Protects against directory-harvest attacks,.... Support for Specify conditions that result in defeating virus attacks before conventional signatures are available. 16 About Symantec Mail Security New features New features The following table lists the features that have been added to Enterprise Vault and ...
Administration Guide
Page 17
... taken, actions and individually or in combination, on messages combinations Expanded mail controls SMTP connection management, including support for secure email (TLS encryption, with security level depending on a scheduled basis. Enhanced localization capabilities Support for non...Support for user-based routing and static routes; About Symantec Mail Security 17 New features Table 1-1 New features for Symantec Mail Security (all users) (continued) Category Features Description Flexible LDAP integration mail management Dynamic group population via any of several supported...
... taken, actions and individually or in combination, on messages combinations Expanded mail controls SMTP connection management, including support for secure email (TLS encryption, with security level depending on a scheduled basis. Enhanced localization capabilities Support for non...Support for user-based routing and static routes; About Symantec Mail Security 17 New features Table 1-1 New features for Symantec Mail Security (all users) (continued) Category Features Description Flexible LDAP integration mail management Dynamic group population via any of several supported...
Administration Guide
Page 18
... all Symantec Mail Security hosts in the following ways: Scanner Deployed as a Scanner, a Symantec Mail Security host filters email for adding new Scanners. 18 About Symantec Mail Security Functional overview Functional overview You can deploy Symantec Mail Security in your email infrastructure. Each Symantec Mail Security host can...and monitored from a Web-based interface. The Control Center provides the Setup Wizard, for initial configuration of Symantec Mail Security, but only one Control Center can be deployed to isolate and store spam and virus messages, respectively. ...
... all Symantec Mail Security hosts in the following ways: Scanner Deployed as a Scanner, a Symantec Mail Security host filters email for adding new Scanners. 18 About Symantec Mail Security Functional overview Functional overview You can deploy Symantec Mail Security in your email infrastructure. Each Symantec Mail Security host can...and monitored from a Web-based interface. The Control Center provides the Setup Wizard, for initial configuration of Symantec Mail Security, but only one Control Center can be deployed to isolate and store spam and virus messages, respectively. ...
Administration Guide
Page 19
... the installation in the following way: ■ The incoming connection arrives at the inbound MTA via TCP/IP. About Symantec Mail Security 19 Architecture Note: Symantec Mail Security does not filter messages that don't flow through the Symantec Mail Security filters. For example, when two mailboxes reside on the same MS Exchange Server, or on different MS Exchange Servers...
... the installation in the following way: ■ The incoming connection arrives at the inbound MTA via TCP/IP. About Symantec Mail Security 19 Architecture Note: Symantec Mail Security does not filter messages that don't flow through the Symantec Mail Security filters. For example, when two mailboxes reside on the same MS Exchange Server, or on different MS Exchange Servers...
Administration Guide
Page 20
...■ The message is spam. The following manuals: ■ Symantec Mail Security Administration Guide ■ Symantec Mail Security Planning Guide ■ Symantec Mail Security Installation Guide ■ Symantec Mail Security Getting Started Symantec Mail Security also includes a comprehensive help system that contains conceptual and procedural information....Policies. Where to get more information about your product. 20 About Symantec Mail Security Where to get more information The Symantec Mail Security documentation set consists of the message for more information ■ ...
...■ The message is spam. The following manuals: ■ Symantec Mail Security Administration Guide ■ Symantec Mail Security Planning Guide ■ Symantec Mail Security Installation Guide ■ Symantec Mail Security Getting Started Symantec Mail Security also includes a comprehensive help system that contains conceptual and procedural information....Policies. Where to get more information about your product. 20 About Symantec Mail Security Where to get more information The Symantec Mail Security documentation set consists of the message for more information ■ ...
Administration Guide
Page 21
information about all known threats; About Symantec Mail Security 21 Where to get more information Provides information about registration, frequently www.symantec.com asked questions, how to respond to error messages, /licensing/els/help/en/help.html and how to contact Symantec License Administration Provides product news and updates www.enterprisesecurity.symantec.com Provides access to white papers about threats www.symantec.com/security_response and access to the Virus Encyclopedia, which contains information about hoaxes;
information about all known threats; About Symantec Mail Security 21 Where to get more information Provides information about registration, frequently www.symantec.com asked questions, how to respond to error messages, /licensing/els/help/en/help.html and how to contact Symantec License Administration Provides product news and updates www.enterprisesecurity.symantec.com Provides access to white papers about threats www.symantec.com/security_response and access to the Virus Encyclopedia, which contains information about hoaxes;
Administration Guide
Page 23
... the SMTP tab on the Settings > Hosts > Edit Host Configuration page. Assign this certificate from the Inbound Mail Settings and Outbound Mail Settings portions of certificates are as presented to Scanners ■ Configuring Control Center settings Configuring certificate settings Manage your...9632; Testing Scanners ■ Configuring LDAP settings ■ Replicating data to you at the time. Every Scanner has separate MTAs for secure Web management. You can add certificates to the certificate list in each Scanner. Assign this certificate from the Settings > Control Center >...
... the SMTP tab on the Settings > Hosts > Edit Host Configuration page. Assign this certificate from the Inbound Mail Settings and Outbound Mail Settings portions of certificates are as presented to Scanners ■ Configuring Control Center settings Configuring certificate settings Manage your...9632; Testing Scanners ■ Configuring LDAP settings ■ Replicating data to you at the time. Every Scanner has separate MTAs for secure Web management. You can add certificates to the certificate list in each Scanner. Assign this certificate from the Settings > Control Center >...
Administration Guide
Page 27
... 5 Check Use proxy server. 6 Specify the proxy host name and port on each Scanner and receive filter updates from Symantec. If you need to add proxy and/or other security settings to edit. 3 Click Edit. 4 On the MTA Operation portion of the page, check Do not accept incoming messages...external SMTP configurations for this Scanner when the box is not checked. 6 Click Save to store your changes. HTTP proxies The Conduit and Symantec LiveUpdate services run on this panel. SMTP Scanner settings A full complement of SMTP settings has been provided to disable Scanner replication. To change...
... 5 Check Use proxy server. 6 Specify the proxy host name and port on each Scanner and receive filter updates from Symantec. If you need to add proxy and/or other security settings to edit. 3 Click Edit. 4 On the MTA Operation portion of the page, check Do not accept incoming messages...external SMTP configurations for this Scanner when the box is not checked. 6 Click Save to store your changes. HTTP proxies The Conduit and Symantec LiveUpdate services run on this panel. SMTP Scanner settings A full complement of SMTP settings has been provided to disable Scanner replication. To change...
Administration Guide
Page 36
... Scanner is attached, select the Scanner you must update to patch 4 to address some changelog issues that arose in the Control Center for quarantined messages. Symantec Mail Security supports the following purposes: Authentication Synchronization LDAP user data is used by checking their user-name and password data directly against the LDAP source. LDAP...
... Scanner is attached, select the Scanner you must update to patch 4 to address some changelog issues that arose in the Control Center for quarantined messages. Symantec Mail Security supports the following purposes: Authentication Synchronization LDAP user data is used by checking their user-name and password data directly against the LDAP source. LDAP...
Administration Guide
Page 46
To stop a replication in Symantec Mail Security. The replication has completed successfully. ■ Failed - The replication has failed. To start or stop replication using the following information is generated and displayed via ...
To stop a replication in Symantec Mail Security. The replication has completed successfully. ■ Failed - The replication has failed. To start or stop replication using the following information is generated and displayed via ...