355
Preventing attacks
Increasing productivity by identifying spam email
4
On the Response tab, under Email senders identified as spam (SMTP only), select one of the
following:
■
Block the mail message
■
No response
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
6
To apply these settings, create a rule and, on the Antispam tab, check
Senders lists
.
Related information
For further information related to this topic, see the following:
■
“Adding antispam protection to a rule”
■
“Understanding and using licenses”
Identifying spam using subject pattern matching
The security gateway lets you identify spam email based on the content in the subject line. When the
content of an email message subject line matches a pattern that you specify, the security gateway
handles the email based on the settings that you configure. You can block the email message or send
the message to the recipient unmodified.
Ensure that you enable the subject pattern matching setting in the appropriate firewall rule. You must
also have a valid Content Security license. If you do not, the security gateway does not attempt to use
this antispam scanning process.
Note:
This feature is only available for the SMTP protocol.
Prerequisites
None.
To identify spam using subject pattern matching
1
In the SGMI, in the left pane, under Policy, click
Antispam
.
2
In the right pane, on the Configuration tab, to the right of the Subject patterns identified as spam
list, click
Add
.
3
In the Subject patterns identified as spam dialog box, in the Subject pattern text box, type the
subject line content that you want to identify as spam.
4
Click
OK
.
5
To identify email messages without subject lines as spam, under the Subject patterns identified as
spam list, check
Identify messages with no subject line as spam
.
6
On the Response tab, under Subject patterns identified as spam (SMTP only), select one of the
following:
■
Block the mail message
■
No response
7
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...