Features
15
Attachment Control
Attachment filtering can be used to control a wide range of problems
originating from the use of attachments, such as viruses, objectionable
content, and confidential documents leaving your network.
Both inbound and outbound email can be scanned. Messages containing
forbidden attachments can be rejected or quarantined.
Email Security
Communications between email gateways that are normally sent in clear
text can be protected from interception and eavesdropping via TLS
(Transport Layer Security) encryption.
Reporting
The 3Com Email Firewall's reporting features allow you to create
customized reports on mail and system activity, including the following:
■
Traffic Summary
■
System Health
■
Top Mailbox Disk Users
■
Spam Statistics
■
Virus Reports
■
Email History
■
System Events History
The reports are derived from information written to the various systems
logs and then stored in the database. Reports are stored on the system
for online viewing and can also be emailed automatically to specified
users.
Summary of Contents for 3CR3MFA-92
Page 8: ......
Page 12: ...12 ABOUT THIS GUIDE ...
Page 30: ...30 CHAPTER 2 CONFIGURING MAIL DELIVERY ...
Page 46: ...46 CHAPTER 3 CONFIGURING MAIL SECURITY ...
Page 98: ...98 CHAPTER 6 SYSTEM CONFIGURATION ...
Page 114: ...114 CHAPTER 7 SYSTEM MANAGEMENT ...
Page 144: ...144 APPENDIX C THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS ...