41
Configuring system settings
Configuring Control Center settings
■
Configuring, enabling and scheduling Scanner replication
■
SMTP host
■
System locale
Control Center administration
You access the Control Center via a Web browser. By default anyone with the
correct address and logon information has access from any host. You can choose
to limit host access to the Control Center if you wish. Users attempting to log
into the Control Center from unauthorized computers will see a 403 Forbidden
page in their Web browser. Reverse Domain Name Server (DNS) lookup must be
enabled in your DNS software for this feature to work with host names.
When entering host names, there is a possibility that a name can be entered
incorrectly. If it is the only name on the list, you have effectively blocked
yourself all access to the Control Center. See the procedure below for help
resolving this situation.
Specify Control Center access or reset Control Center access
Follow these instructions to specify Control Center access or to regain access to
the Control Center.
To specify Control Center access
1
In the Control Center, click
Settings
>
Control Center
.
2
Check
All hosts
to allow any host access to the Control Center.
3
Check
Only the following hosts
to assign specific hosts to access the Control
Center.
All other hosts are rejected after you add one or more hosts to the list.
Add and Delete buttons are available to help you manage the list of allowed
hosts.
4
To add a host, type host name, IP address, IP address with subnet mask, or
Classless Inter-Domain Routing (CIDR) netblock and click
Add
.
Specify additional computers or networks as needed.
5
Click
Save
to store the current settings.
To regain access to the Control Center when no host name matches the list
1
Log in to the MySQL Control Center.
2
Select the Brightmail database.
use brightmail;
Summary of Contents for Mail Security
Page 1: ...Symantec Mail Security for SMTP Administration Guide ...
Page 16: ...16 About Symantec Mail Security for SMTP Where to get more information ...
Page 60: ...60 Configuring email settings Configuring scanning settings ...
Page 116: ...116 Configuring email filtering Managing policy resources ...
Page 142: ...142 Working with Spam Quarantine Configuring Spam Quarantine ...
Page 150: ...150 Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine ...
Page 162: ...162 Configuring alerts and logs Configuring logs ...
Page 208: ...208 Feature Cross Reference About email filtering and message handling options ...