background image

Email Protection Administrator Guide

Set up User Creation Mode — SMTP Dis-

November 2012

Proprietary:  Not for use or disclosure outside McAfee without written permission

37

3

Under the 

User Creation Mode

 heading, select 

Explicit

.

4

Click 

Save

.

Summary of Contents for SaaS Email Protection

Page 1: ...McAfee SaaS Email Protection Administrator Guide Updated November 2012 Proprietary and Confidential...

Page 2: ...y form or by any means electronic mechanical photocopying recording or oth erwise without prior written permission from McAfee All copies of this document are the sole property of McAfee and must be r...

Page 3: ...creation of Users 2 Email Filtering Policies 2 Types of Inbound Email Filtering 3 Types of Outbound Email Filtering 8 Configurable Actions for Filtered Email 8 User level Policy Configurations 10 Qua...

Page 4: ...vider 20 Log on to the Control Console 20 Reset Your Password from the log on window 21 Check the Status of Email Protection on the Overview 25 Set up Your Servers 29 Confirm Your Inbound Servers Setu...

Page 5: ...cript ActiveX and Spam Beacons 58 Configure Web Hyperlink Filters ClickProtect 60 Define an Attachment Filter 62 Filter by Attachment File Types 62 Filter by Attachment File Name 65 Filter Zip File At...

Page 6: ...ine the Format and Text of Notifications to Users 92 Assign a Group to the Custom Policy 92 Managing Quarantine Reports 93 Set up Quarantine Reports 93 Monitor Users Quarantined Email 93 Primary Email...

Page 7: ...affic Encryption 110 Threats Overview 111 Threats Viruses 113 Threats Spam 115 Threats Content 117 Threats Attachments 119 Enforced TLS Details 121 Enforced SPF Report 122 ClickProtect Overview 123 Cl...

Page 8: ...dminister MSP Connector 139 Configure the MSP Connection 139 Add Domains to the MSP Connection 141 Turn on Exception Notifications for the MSP Connection 142 View an MSP Connector Audit Report 143 Adm...

Page 9: ...erences in Administration for Service Providers This document is for use by Enterprise customers only Service Provider customers do not administer groups for Email Protection and therefore do not assi...

Page 10: ...s The Email Protection automatically creates new user accounts if all the following is true SMTP Discovery is enabled SMTP Discovery which is enabled by default is a convenient way to add users to you...

Page 11: ...h as blacklists and keyword lists Using Stacked Classification Framework Email Protection provides the most comprehensive and effective spam blocking product on the market today blocking 98 of spam an...

Page 12: ...the past Reputation Based RBL Filtering Using up to 31 real time blackhole lists RBLs of known spammers provided by the industry Email Protection creates a single RBL indicator to help gauge the likel...

Page 13: ...efore they reach your network Protects your users networks and data from harm Content Filtering and ClickProtect Email Protection protects your organization and reduces liability and risk by automatic...

Page 14: ...d Encrypted or High Risk Zip File Attachment Rules You can configure custom rules for emails with encrypted zip files and or zip files that are considered high risk too large too many nested levels et...

Page 15: ...lists Be aware that emails that have been quarantined by Email Protection may not need to be added to Deny lists because they are already being blocked from entering your email network Following are...

Page 16: ...Email Protection will respond during email filtering and reporting Depending on the feature package that is licensed for a domain specific email filters will be available to be enabled and configured...

Page 17: ...be removed from the email and the email is be sent to the recipient email address Text is inserted into the email notifying the recipient that an attachment has been stripped Only the attachment that...

Page 18: ...es of policy configurations the user level policy setting will be used These user level policy configurations allow customization of email actions for each user User level policies are confined to the...

Page 19: ...of quarantined spam emails that sent to users Multiple links in the Reports allow management of quarantined spam email based on policy set level and user level configurable control settings When the u...

Page 20: ...esignated language The following languages are supported Brazilian Portuguese Chinese Simplified Chinese Traditional Danish Dutch English Finnish French German Italian Japanese Korean Norwegian Portug...

Page 21: ...ta is available to be downloaded to Microsoft Excel spreadsheet file csv There are multiple reports available for viewing in the Control Console For more information see System Reports Optional Utilit...

Page 22: ...s become available Fail Safe begins unspooling the emails That is Fail Safe restores these stored emails to the inbound server using the first in first out order The messages Fail Safe stores are not...

Page 23: ...oups Finally a Group Administrator can view user lists and user details A Group Administrator does not need to be a member of a group in order to have these capabilities Note A Group Administrator can...

Page 24: ...guration Table 1 Email Protection Window Access Privileges Window Access Feature Enablement Required Customer Administrator Domain Administrator Quarantine Manager Group Admnistrator Overview No Yes Y...

Page 25: ...hments Additional Policies No Yes No No Yes Attachments Additional Notifications No Yes No No Yes Allow Deny Sender Allow No Yes No No Yes Allow Deny Sender Deny No Yes No No Yes Allow Deny Recipient...

Page 26: ...led Yes Yes No No Disaster Recovery Setup Yes Either FailSafe or Email Continuity must be enabled or included in your package Yes Yes No No MX Records Setup No Yes Yes No No User Creation Settings No...

Page 27: ...Email Protection Documents Email Protection Concepts Guide Email Protection Quick Start Intelligent Routing User Guide Email Continuity Administrator Quick Start Guide Quarantine Release Overview No...

Page 28: ...ity User Quick Start Guide Ensure You Can Receive Email from Your Service Provider If you had or still have a different email security or filtering service and your network is administered so that you...

Page 29: ...curity question and or security answer on the Preferences window of your user account See Set User Display Preferences Including Your Own in Account Management Administrator Guide 4 Select a security...

Page 30: ...ou selected the option for your email your email application receives an email momentarily with further instructions Continue with Step 5 If you selected the option to email a Domain Contact that pers...

Page 31: ...must answer this question when you forget your password or need to reset it The Security Question and Security Answer fields are displayed Select a question from the Security Question drop down menu t...

Page 32: ...mber your password but do not use obvious passwords for example password your name or a family member s name Keep your password safe and private 11 Retype your password in the Confirm Password field 1...

Page 33: ...to your domain over the previous 24 hours Disaster recovery information News and update information Customer Administrators will see the information for all the domains in the customer where the role...

Page 34: ...hot Displays a 24 hour snapshot of inbound email traffic Messages Number of inbound messages processed Avg Size Average size of inbound messages including attachments Bandwidth Average bandwidth used...

Page 35: ...over the past 24 hours of the designated time zone Optionally select one of the graphic display type icons to change the appearance of the graph Disaster Recovery Current Status Displays domains that...

Page 36: ...Email Protection Administrator Guide 28 Proprietary Not for use or disclosure outside McAfee without written permission November 2012...

Page 37: ...on Setup 2 From the domain drop down menu on the Setup window select the domain whose SMTP server you want to check The SMTP Host Address field displays the domain name s or IP address es for the doma...

Page 38: ...server 5 In the Port field type the port on the server to which the Email Protection will connect The default value is 25 6 In the Preference field type the number indicating order of connection prefe...

Page 39: ...icked Email Protection immediately accepts email traffic from the active servers Note If email is received from an outbound server that is not configured in the Email Protection system it will be refu...

Page 40: ...then relayed through Email Protection before continuing to its final destinations The outbound Smart Host address is listed at the bottom of the Outbound Server Setup window or you can refer to your S...

Page 41: ...rver operated by your Internet Service Provider ISP Each MX record specifies a host name and preference that determines where and how your ISP routes your company s email Your MX record or records at...

Page 42: ...correctly redirected to Email Protection The analysis indicates the following All Authoritative Name Servers for the entered DNS name All MX Records that are recognized by the Authoritative Name Serv...

Page 43: ...tus of the MX record Valid MX Record is current and fully authenticated Valid recommend update MX Record uses an older hostname standard It still works but it is recommended that you update to the cur...

Page 44: ...gain Set up User Creation Mode SMTP Discovery or Explicit Note This procedure applies only if your service includes Email Protection Explicit user creation means that you must add user email addresses...

Page 45: ...dministrator Guide Set up User Creation Mode SMTP Dis November 2012 Proprietary Not for use or disclosure outside McAfee without written permission 37 3 Under the User Creation Mode heading select Exp...

Page 46: ...Set up User Creation Mode SMTP Discovery or Explicit Email Protection Administrator Guide 38 Proprietary Not for use or disclosure outside McAfee without written permission November 2012...

Page 47: ...ovider Customer Important This document is for use by Enterprise customers only The way in which custom policies are applied to your users varies depending on whether you are classified as a service p...

Page 48: ...il Protection Administrator Guide 40 Proprietary Not for use or disclosure outside McAfee without written permission November 2012 Figure 6 Service Provider Custom Policy Assignment Figure 7 Enterpris...

Page 49: ...Custom Policy Enterprise Customer Only Important Note It is assumed that all domains within an Enterprise Customer will have the same package assigned to them If some domains have different packages u...

Page 50: ...set Most settings are copied based on this selection However you must choose to copy some settings from the existing policy separately by selecting the following fields Copy Sender Allow List Select...

Page 51: ...how Email Protection handles an email that contains a known virus Important Note If an email is detected that contains a wide spread worm or virus for example SoBig or MyDoom Email Protection may aut...

Page 52: ...ends the email to quarantine with the message that an attachment had been stripped Email Protection does not send a separate notification to the recipient Strip the attachment Email Protection strips...

Page 53: ...scores are Medium likelihood if default settings are used This email is normally quarantined for review Field Description To the sender when a message is due to a virus infection Select one or more c...

Page 54: ...ionally some emails might be marked as spam when in fact they are legitimate emails For these false positive email messages you can help Email Protection tune the spam thresholds and rules by sending...

Page 55: ...spam content groups You can define a custom spam content group that contains additional lists of keywords that are used to filter email as spam For each content group you also define the action to tak...

Page 56: ...Managers or higher level administrators Users cannot view this spam 1 Click Email Protection Policies 2 Select the policy you want to change 3 Click the Spam 4 Click Content Groups 5 Double click the...

Page 57: ...al string as is If individual words are desired each word must be on its own line Letter case for example upper case or lower case is ignored The wildcards question mark and asterisk can be used to de...

Page 58: ...m is filtered What actions users can take on quarantined email See the Email Protection User Guide on how users might manage quarantine reports To set up quarantine reports for users perform the follo...

Page 59: ...with email applications that do not support HTML content Text New Items Since Last Report A text only email report is sent to you that indicates how many new emails have been quarantined as spam since...

Page 60: ...frequency with which they receive Spam Quarantine Reports Users select the frequency of reports from the Preferences window on the Control Console Allow users to personalize report type Select to allo...

Page 61: ...s not affect the ability of users to log in by clicking a link in a Spam Quarantine Report If Control Console access is not enabled and users do not receive the Spam Quarantine Report the Quarantine M...

Page 62: ...ined content groups that contain valid and acceptable personal identifiable information that is allowed in email messages due to specific policies You cannot edit these content groups but can designat...

Page 63: ...the subject text and the email is sent to the recipient email address Encrypt Message is also available for Outbound content groups if the Customer has subscribed to Encryption 3 Silent Copy allows y...

Page 64: ...nt keywords needed to define your Custome Content Group In the Content field type any keywords you want to search for in email Use the following rules for entering keywords Each entry must be on its o...

Page 65: ...de standard Email Protection spam content filtering for particular keywords Note Emails that match keywords but are allowed will be reported as Other in the Threats Spam report Tag the message subject...

Page 66: ...e sender Quarantined The infected email was quarantined Denied delivery The infected email was denied delivery To the recipient when a message is due to a content group violation Select one or more co...

Page 67: ...options for HTML filtering 7 Select Replace all image links with a default transparent image to eliminate objectionable images in email This option replaces links to images in email with links to an...

Page 68: ...clicked so that they are reported in the ClickProtect Click Log Report Caution ClickProtect only processes links in emails with accepted message formats which include HTML or Rich Text 1 Click Email...

Page 69: ...n instead of typing in each email address associated with the domain The following list provides some examples of allowable URLs www domainname com www domainname n www domainname www domainname examp...

Page 70: ...sole If you want to download the list of allowed URLs to your local drive click Download ClickProtect Allow List The downloaded list is a file in CSV format You can open it in Microsoft Excel Define a...

Page 71: ...ollowing options from the drop down menu Disallow All email containing this file type are blocked A file size such that an email with a file of this file type that exceeds the file size is blocked Max...

Page 72: ...e fdf ofm p65 pdd pdf Macintosh Files a3m a4m bin hqx rs_ Compressed or Archived Files arj bz2 cab gz gzip jar lah lzh rar rpm tar tgz z zip Audio Files aff affc aif aiff au m3u mid mod mp3 ra rmi snd...

Page 73: ...lowing steps 1 Click Email Protection Policies 2 Select the policy you want to change 3 Click Attachments The Attachments File Types window is displayed 4 Click Filename Policies The Filename Policies...

Page 74: ...ent Email Protection strips the attachment from the email and the email is sent to the recipient Text is inserted into the email notifying the recipient that an attachment has been stripped Quarantine...

Page 75: ...ny delivery Email Protection denies delivery of the email The action applies if an email message has an attachment that is a zipped file and is encrypted and password protected This format is commonly...

Page 76: ...o an attachment policy violation Select one or more conditions that will cause Email Protection to send a notification email to the sender Quarantined The email that contained an attachment violation...

Page 77: ...tering is always applied if licensed for that policy set unless overridden by the user level policy configurations In addition the user level Deny list will override the policy set level Sender Allow...

Page 78: ...rds Should the SPF check fail the mail is denied The following conditions apply to an SPF verification If the record can be verified then content and spam filtering is skipped for the sender s inbound...

Page 79: ...main names Complete domain name or partial name with wildcards for example domain com IP addresses Complete IP address or partial address with wildcards for example 123 123 12 3 or 123 123 12 Note CID...

Page 80: ...ient Shield Addresses with a Batch File 1 Click Email Protection Policies 2 Select the policy you want to change 3 Click Allow Deny The Sender Allow window is displayed 4 Click Recipient Shield The Re...

Page 81: ...Email Protection automatically creates a Microsoft Excel spreadsheet csv file containing the address list You can choose to save the file or open it directly Add Allow Deny or Recipient Shield Address...

Page 82: ...turn on TLS to ensure TLS is implemented in your system prior to setting up your domain lists From the Policy Set window select Email Authentication Enforce TLS tab and complete the following steps Ad...

Page 83: ...default is updated to reflect those changes Save 9 Click the Save button to save your information Download To Download a domain list in a csv file click the Download button select the list you wish to...

Page 84: ...and caution is advised Create an Enforced SPF Domain Go to the Email Authentication Enforced SPF tab and complete the following information to implement an SPF domain To enter values for the SPF doma...

Page 85: ...unavailable Upload Enforced SPF List appends to existing list To Upload a file with a predefined list click the Upload Browse button After you select the file and it s path appears in the text field...

Page 86: ...ple com If the sub domain is not going to be entered using the wildcard character the sub domain must be explicitly defined 1 Click the Add button The value is added to the list box Note The maximum n...

Page 87: ...text field click the Upload button The contents are added to the Add Domain box above Download Enforced DKIM List be sure to save changes first 4 To Download a domain list in a csv file click the Down...

Page 88: ...Viruses Content Attachments Default notification templates are provided for all the notification scenarios You can change these templates if you wish One notification email template is defined for eac...

Page 89: ...3 Click Notifications The Notifications Virus window is displayed SENDER Inserts a variable that automatically indicates the sender s email address From address from the email that violated the polic...

Page 90: ...ionally you can type variables that insert system information into this content Body Type the text to be used as the body text for the notification email template Optionally you can type variables tha...

Page 91: ...ubject or highlight a subject and click Edit The Edit section of the window is displayed 7 Change if desired the text or variables in any or all of the following fields From Designates what email addr...

Page 92: ...e click on a subject or highlight a subject and click Edit The Edit section of the window is displayed 7 Change if desired the text or variables in any or all of the following fields Body Type the tex...

Page 93: ...e email content had been sent If you wish to have a Subject value for the Notification message edit the Subject field otherwise the Subject appears as Delivery Notification FROM Inserts a variable tha...

Page 94: ...tes the Domain that received the email that violated the policy POSTMASTER Inserts postmaster ex postmaster domain com email address for the Domain Variable syntax requires name_of_variable where name...

Page 95: ...available options Defer to domain based Email Continuity access control configured under Disaster Recovery Setup Select this option to use the configuration settings from the Disaster Recovery Setup w...

Page 96: ...m Policy To perform this task you must first create the group of users who are to be assigned to the policy See Managing Groups in Account Management Administrator Guide 1 Click Email Protection Polic...

Page 97: ...om an existing inbound policy Create a Custom Outbound Policy Important Note It is assumed that all domains within an Enterprise Customer will have the same package assigned to them If some domains ha...

Page 98: ...r inbound email For more information see Create a Custom Policy Direction From the drop down menu select the direction of email outbound SMTP for which this policy will be configured Copy From From th...

Page 99: ...roup Name under Content Groups if desired Select the group name you wish to encrypt from the Action drop down list select to have that Group encrypted More Options If a Customer or Domain subscribes t...

Page 100: ...inbound email For more information see Define an Attachment Filter Policy Define the Format and Text of Notifications to Users You configure notifications for outbound email in the same way as that fo...

Page 101: ...orts are formatted How often reports are sent How Spam is filtered What actions users can take on quarantined email See the Email Protection User Guide on how users might manage quarantine reports To...

Page 102: ...address continues to be shown as a public domain address If an email that was sent to an alias email address is quarantined the recipient email address is changed to be the associated primary email ad...

Page 103: ...n displays information that varies depending on the type of threats you searched for The following table lists the type of information that might be contained in this column Field Description From Ent...

Page 104: ...mxlogic com Attachment Attachment Displays the name of an attachment that was included in the email message and violates attachment rules size file typ zip file attachments as defined on the Attachme...

Page 105: ...l which deletes all email in the Search Results list Release Quarantined Messages By releasing a quarantined email message you remove the message from quarantine and send the email to the mailbox of t...

Page 106: ...d or words that violated the content filter If the Threat type is Attachment check the Attachments list for size and or type of file or for html code violations The Content Type is based on the MIME p...

Page 107: ...Monitor Your Own Quarantine You can check your own messages in quarantine and take the same actions on those messages that you do on other users To access your own quarantined messages perform the fo...

Page 108: ...Monitor Users Quarantined Email Email Protectionr Administrator Guide 100 Proprietary Not for use or disclosure outside McAfee without written permission November 2012...

Page 109: ...has unlimited storage capacity and removes messages that have been in Email Continuity storage for more than 60 days Set up Spooling for Disaster Recovery 1 Click Email Protection Setup Disaster Reco...

Page 110: ...at you don t want to allow access Set up Notifications of Disaster Recovery You can specify that notifications are emailed automatically to designated recipients typically yourself or other administra...

Page 111: ...pects of a policy for individual users For more information see the following sections in the Account Management Administrator Guide Personalize Spam Reporting for a User Allow or Deny Email to a User...

Page 112: ...Email Protection Administrator Guide 104 Proprietary Not for use or disclosure outside McAfee without written permission November 2012...

Page 113: ...ed the virus policies for the designated domain s during the selected date or date range Threats Spam Information about emails that violated the spam policies for the designated domain s during the se...

Page 114: ...rom all quarantine areas within the Email Protection for the designated domain s during the selected date or date range User Activity Information about all Inbound and Outbound email traffic and bandw...

Page 115: ...date Note You can select only the current month or click the down arrow at the top of the calendar to select the previous month You cannot retrieve data from a timeframe beyond the previous month Cha...

Page 116: ...ry Information about inbound and outbound email traffic for the designated Domain and date range as follows Inbound Messages Indicates the total number of inbound emails received Average Inbound Messa...

Page 117: ...ayed report results in spreadsheet format Report Purpose Identifies Inbound and Outbound email messages that were delivered via a TLS connection and any email messages that were denied due to an Enfor...

Page 118: ...ges processed via a TLS connection Outbound Messages blocked by Enforced TLS The total of outgoing email messages blocked by an Enforced TLS policy Bandwidth Summary TLS Inbound Total Bandwidth The qu...

Page 119: ...server and available to the recipient Email Encryption is only available for a selected Outbound package Email Encryption Summary Outbound Messages blocked by Email Encryption The total outbound mess...

Page 120: ...d Domain and date range Total Viruses The total number of inbound emails that contained known worms and viruses Infection Rate The percentage of inbound emails that contained known viruses vs the tota...

Page 121: ...ded as indicated in the legend below the graphic Outbound Threat Summary Information about the number of outbound emails that violated each policy type for the designated Domain and date range as foll...

Page 122: ...for use or disclosure outside McAfee without written permission November 2012 The following table lists the report items in the report Report Item Description Virus Volume Trends The total number of...

Page 123: ...Outbound Infection Rate The percentage of infected outbound emails vs the total number of sent outbound emails Disinfected cleaned The total number of infected emails that had their viruses successful...

Page 124: ...or use or disclosure outside McAfee without written permission November 2012 The following table lists the report items in the report Report Item Description Spam Volume Trends The total number of ema...

Page 125: ...licies vs the total number of received inbound emails Spam Beacons Detected The total number of spam beacons detected in emails Note that each email may contain multiple spam beacons RBL The total num...

Page 126: ...closure outside McAfee without written permission November 2012 The following table lists the report items in the report Report Item Description Content Policy Violation Trends The total number of ema...

Page 127: ...s Credit Card The total number of emails that contained keywords and phrases from the Credit Card predefined content group Profanity The total number of emails that contained keywords from the Profani...

Page 128: ...outside McAfee without written permission November 2012 The following table lists the report items in the report Report Item Description Attachment Policy Violation Trends The total number of emails...

Page 129: ...spreadsheet format Attachment Summary Information about the emails that had attachments that violated the attachment policies Average Attachment Size The average size of attachments encountered in ema...

Page 130: ...feature acme com acme denver com is the public domain primary domain respectively acme com alias Traffic Summary Enforced TLS Accepted Inbound Messages The total number of TLS inbound messages that we...

Page 131: ...the report table does not display unless an Enforced SPF policy has been created with a deny action or domains have been added to the list for the Enforced SPF policy SPF Message Summary Summarizes i...

Page 132: ...The following table lists the report items in the report Report Item Description ClickProtect Trends The numbers of emails that contained hyperlinks and that contained hyperlinks that were clicked by...

Page 133: ...l clicks The total number of times that a recipient clicked a hyperlink in an email Total allowed click throughs The total number of times that a recipient was allowed to access the destination design...

Page 134: ...ail address To The email address to which this email was sent recipient email address Subject The text that was in the subject header of this email URL The URL destination defined in the clicked hyper...

Page 135: ...color coded as indicated in the legend below the graphic Inbound Spam Release Summary Information about the emails that were quarantined as potential spam and then released Total Spam Identified The...

Page 136: ...mation about the emails that were quarantined because of content and then released Total Content Policy Violations The total number of quarantined emails that violated content policies Total Content R...

Page 137: ...d HTML From The email address that sent this email sender email address To The email address to which this email was sent recipient email address Subject The text that was in the subject header of thi...

Page 138: ...violated content policies Subject The contents of the Subject line of the email To The email address to which this email was addressed recipient email address Sender IP The IP address of the server t...

Page 139: ...n the email was quarantined Timestamp The date time and time zone when the logged item was processed for example when an email was processed by Email Protection Details Additional information about th...

Page 140: ...addresses that received the most inbound email in order of volume Messages The total number of emails received by each email address Size The size of the largest email including attachments received...

Page 141: ...able lists the report items in the report Report Item Description Display Designates which set of event log items to display All Events Displays event log items for actions performed for all the quara...

Page 142: ...that only outbound emails are displayed Inbound Outbound Designates that both inbound and outbound emails are displayed Type The type of policy that the filtered email violated Timestamp The date tim...

Page 143: ...the action was performed in the Control Console Domain column The domain where the action was performed Details column A description of the action that was performed including the role and user accoun...

Page 144: ...elected inbound server only Connection Volume Trends for All Servers The total number of successful and unsuccessful connections to the designated server s Green Indicates successful connections Purpl...

Page 145: ...view report displays information about emails that were spooled and unspooled by the disaster recovery service which can be either FailSafe or Email Continuity Failure Rate The percentage of connectio...

Page 146: ...that were unspooled either automatically or manually Disaster Recovery Trends Bytes The amount of spool storage used by spooled and unspooled emails processed by the disaster recovery service over the...

Page 147: ...the previous calendar month to the ConnectWise dashboard All data will be kept for two calendar months For example in July customers would be able to view data from both May and June Customers who als...

Page 148: ...ld type your ConnectWise access site 5 In the Company ID field type your ConnectWise Company ID 6 In the Integrator Username field type your ConnectWise Integrator Username 7 In the Integrator Passwor...

Page 149: ...s MSP Connector 2 Click Domains The Domains window is displayed 3 To find one or a few domains out of a large number of domains type the name of the domain you wish to find in the Filter field 4 Click...

Page 150: ...k Remove Note Clicking Remove All will remove the domains listed even those not displayed due to pagination The Remove All button is disabled if there is an active filter for selected domains Turn on...

Page 151: ...2 00 A M MT which includes all failures that occurred in the last 24 hours Failures may include one of the following Failed authentication Failed connection Failed invalid Company ID Failed invalid So...

Page 152: ...rietary Not for use or disclosure outside McAfee without written permission November 2012 The Status column lists the status of attempts to pass data to ConnectWise 3 Double click a report to view the...

Page 153: ...Email Protection Administrator Guide Administer MSP Connector November 2012 Proprietary Not for use or disclosure outside McAfee without written permission 145...

Page 154: ...ord or site is invalid check information on the ConnectWise side Failed connection ConnectWise server was moved ConnectWise server was offline ConnectWise network potentially down Failed invalid Compa...

Page 155: ...variables such as Time zone settings Message delivery timing may be briefly queued Quarantine releases Reporting period Total Messages The total number of messages processed for the previous calendar...

Page 156: ...the Deliver To drop down menu select the distribution list containing the recipient s for the Performance Reports 4 From the Time Zone drop down menu select the time zone for the Performance Reports 5...

Page 157: ...his includes Inbound Threats Inbound Message Actions Disaster Recovery reports Field Description Total Inbound Messages The total number of all inbound messages processed When users have the same filt...

Page 158: ...cy rules for virus and had the policy action Clean applied to the message Denied The record of all the inbound messages refused because they violated the pol icy rules for spam virus content or attach...

Page 159: ...r 2012 Proprietary Not for use or disclosure outside McAfee without written permission 151 Outbound Messages Overview The Outbound Messages Overview reports on the number of messages processed and suc...

Page 160: ...Administer Performance Reports Email Protection Administrator Guide 152 Proprietary Not for use or disclosure outside McAfee without written permission November 2012...

Page 161: ...ue A specified number default is 3 emails that were not quarantined or denied have been received within a day for the new email address Emails that had content stripped but were sendable can still tri...

Page 162: ...ration changes in the Control Console including policy configurations Allow and Deny lists and changes to entity configurations will take approximately 10 15 minutes before the configuration is effect...

Page 163: ...nt occurrence it may happen occasionally especially to mailing list and newsletter traffic In such cases we ask that you help us tune our spam thresholds and rules by sending a forwarded copy of the e...

Page 164: ...d then sent to you It will affect only emails sent to your address Add your own email address or entire Domain name to your policy set Sender Deny list This policy will do the same as above but will a...

Page 165: ...servers are now no longer published which helps to protect your email servers from direct email attacks and bad email Question My server went down for a short period of time what happened to our compa...

Page 166: ...from an IP address where more than 60 of the recipients are invalid it adds the IP address to a temporary global blacklist for 4 hours by default the time period is configurable at the system level A...

Page 167: ...k the Privacy tab 3 In the Settings area in the Privacy tab do one of the following A Move the slider to select Medium B Click the Sites button 4 In the Per Site Privacy Actions window enter the URL f...

Page 168: ...y bypass email filtering Wrong Email Got Past Filter What do we do if spam email virus email etc was delivered anyway If you or an email recipient in your system has received email that you feel shoul...

Reviews: