94 Configuring email filtering
Managing Email Firewall policies
lists maintained by Symantec. Sender authentication provides a way to block
forged email.
Configuring attack recognition
Symantec Mail Security for SMTP can detect the following types of attacks
originating from a single SMTP server (IP address).
Enable, disable, and configure attack recognition
Set up attack recognition as described in the following sections. All attack
recognition types are disabled by default, and must be enabled to be activated.
To enable or disable attack recognition
1
In the Control Center, click
Policie
s >
Attacks
.
2
Check the box next to each attack type that you want to enable or disable, or
check the box next to Attacks to select all attack types.
3
Click
Enable
to enable the checked attack types, or click
Disable
to disable
the checked attack types.
To configure directory harvest, spam, and virus attack recognition
1
In the Control Center, click
Policie
s >
Attacks
.
2
Click
Directory Harvest Attack
,
Spam Attack
, or
Virus Attack
.
Directory harvest
attacks
Spammers employ directory harvest attacks to find valid
email addresses at the target site. A directory harvest
attack works by sending a large quantity of possible email
addresses to a site. An unprotected mail server will simply
reject messages sent to invalid addresses, so spammers can
tell which email addresses are valid by checking the
rejected messages against the original list. By default,
connections received from violating senders are deferred.
Spam attack
A specified quantity of spam messages has been received
from a particular IP address. By default, connections
received from violating senders are deferred.
Virus attack
A specified quantity of infected messages has been received
from a particular IP address. By default, connections
received from violating senders are deferred.
Summary of Contents for Mail Security
Page 1: ...Symantec Mail Security for SMTP Administration Guide ...
Page 16: ...16 About Symantec Mail Security for SMTP Where to get more information ...
Page 60: ...60 Configuring email settings Configuring scanning settings ...
Page 116: ...116 Configuring email filtering Managing policy resources ...
Page 142: ...142 Working with Spam Quarantine Configuring Spam Quarantine ...
Page 150: ...150 Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine ...
Page 162: ...162 Configuring alerts and logs Configuring logs ...
Page 208: ...208 Feature Cross Reference About email filtering and message handling options ...