•
Link protection will only examine the first 10 links in an email. After that no more link
processing is performed for subsequent links.
•
When a link triggers web content filtering, the link will still appear in the mail but will be
disabled so it cannot be clicked.
•
If one or more links trigger the specified link protection score (see properties below) will be
added just once for an email to the overall anti-spam score.
The following properties of an
Email Control Profile
are used to control link protection:
•
Link Protection
By default, link protection is enabled if anti-spam is enabled. Disable this property to always
switch it off.
•
Link Protection Score
This is the score that is added to the total anti-spam score if just one link is found that triggers
wen content filtering. The default value is 10.
•
Link Protection Categories
This is a list of one or more web content filtering categories which are to be disabled. By
default, the is set to only the
MALICIOUS
category. All available categories are described in
Section 6.3.4, “Dynamic Web Content Filtering”
.
Note: A valid web content filtering subscription is required
The malicious link protection filter will only function if NetDefendOS also has a valid
subscription for the web content filtering feature since this is used to evaluate links.
IMAP Clients May Display Incorrect Header Information
Email clients using IMAP to retrieve email details from an email server, can download and display
the headers of emails before they download the email body. This means the user can only
download the body of emails they want to read based on the header information.
Since NetDefendOS may perform some of its spam scoring based on the email body, the initial
header information displayed by the client may not yet correctly show the spam text in the
subject line. When the email body is eventually downloaded, NetDefendOS examines it and the
header information will be updated if the mail is now considered to be spam. However, some
email clients may not update the displayed header information and will continue to display the
original unflagged header information. This is not something that can be controlled by
NetDefendOS.
In all cases, the spam related log messages generated by NetDefendOS and the spam related
statistics it keeps will correctly reflect which emails it has classified as spam.
Example 6.27. Email filtering of IMAP Traffic
This example shows how to set up an
IP Policy
object which allows internal clients on
lan_net
to
retrieve email from a mail server located on
dmz_net
using the IMAP protocol. This retrieval is
illustrated below.
Chapter 6: Security Mechanisms
531
Summary of Contents for NetDefendOS
Page 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Page 32: ...Chapter 1 NetDefendOS Overview 32 ...
Page 144: ...Chapter 2 Management and Maintenance 144 ...
Page 284: ...Chapter 3 Fundamentals 284 ...
Page 392: ...Chapter 4 Routing 392 ...
Page 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Page 420: ...Chapter 5 DHCP Services 420 ...
Page 573: ...Chapter 6 Security Mechanisms 573 ...
Page 607: ...Chapter 7 Address Translation 607 ...
Page 666: ...Chapter 8 User Authentication 666 ...
Page 775: ...Chapter 9 VPN 775 ...
Page 819: ...Chapter 10 Traffic Management 819 ...
Page 842: ...Chapter 11 High Availability 842 ...
Page 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Page 879: ...Chapter 13 Advanced Settings 879 ...