McAfee Email and Web Security Appliance 5.5 Скачать руководство пользователя страница 46

9

Release the spam message.

10 Check the recipient email account to see the message.

Detected messages are sent to McAfee Quarantine Manager and can be managed by an
administrator.

Creating an email compliance policy

Use this task to set up a policy to ensure that messages your users send to external mail accounts
comply with official content libraries.

This policy maintains regulatory compliance to standards such as the HIPAA personal medical
information privacy standard and privacy standards on messages that contain sensitive
information. It notifies senders that their messages failed the compliance requirements.

Task

1

On the device, select Email | Email Policies | Dictionaries.

2

Select Privacy Rules.

3

View the List of terms for selected dictionary.

4

Select Email | Email Policies | Scanning Policies.

5

Under Content, select Content Scanning.

6

Select Enable content scanning | Yes.

7

Click OK.

8

Under Content scanning rules, click Create new content scanning rule.

9

Select Privacy Rules, from within Type: Compliancy.

10 Click OK.

11 In If Triggered, select Accept and then drop the data (Block).

12 Click OK.

13 Click OK.

14 Create an email on the server from <example server email address> to <example client

email address>. Include the line:

Hi: We need to assess the accredited accumulation on your

annuity. Please consider arbitration if your assets have less capital than expected.

15 Send the message.

16 Use Email | Email Overview | INCOMING EMAIL SUMMARY to see the results.

The client email agent does not receive the email. The server email account should receive two
email messages: an email notification that the message failed the compliancy test and a copy
of the original email.

Creating a content filtering policy

Use this task to set up a policy to quarantine incoming messages that contain unwanted content.
This is now achieved using a wizard to guide you.

Use the following to set up an example of content filtering:

Task

1

On the device, select Email | Email Policies | Scanning Policies.

Exploring the appliance
Using policies to manage message scanning

McAfee Email and Web Security Appliance 5.5 Installation Guide

46

Содержание Email and Web Security Appliance 5.5

Страница 1: ...McAfee Email and Web Security Appliance 5 5 Installation Guide...

Страница 2: ...is distinctive of McAfee brand products All other registered and unregistered trademarks herein are the sole property of their respective owners LICENSE INFORMATION License Agreement NOTICE TO ALL USE...

Страница 3: ...12 Transparent bridge mode 13 Transparent router mode 14 Explicit proxy mode 15 Deployment Strategies for Using the device in a DMZ 17 SMTP configuration in a DMZ 18 Workload management 20 Connecting...

Страница 4: ...tallation 42 Exploring the appliance 43 Generating reports 43 Using policies to manage message scanning 43 Creating an anti virus scanning policy 44 Creating an anti spam scanning policy 45 Creating a...

Страница 5: ...System maintenance 54 Anti virus automatic updating 54 Anti spam 55 Getting more help the links bar 57 5 McAfee Email and Web Security Appliance 5 5 Installation Guide Contents...

Страница 6: ...This guide helps you to Plan and perform your installation Become familiar with the interface Test that the product functions correctly Apply the latest detection definition files Explore some scannin...

Страница 7: ...router mode operational mode A collection of security criteria such as configuration settings benchmarks and network access specifications policy that defines the level of compliance required for user...

Страница 8: ...s This information describes where to get more information and assistance McAfee KnowledgeBase Go to https mysupport mcafee com eservice Default aspx McAfee products and click Search the KnowledgeBase...

Страница 9: ...POP3 FTP HTTP and ICAP maintenance and monitoring Introducing McAfee Email and Web Security Appliances Available resources 9 McAfee Email and Web Security Appliance 5 5 Installation Guide...

Страница 10: ...Observe all provided safety warnings CAUTION Review and be familiar with all provided safety information Contents What s in the box Plan the installation Inappropriate use Operating conditions Positio...

Страница 11: ...e device cannot handle all types of traffic If you use explicit proxy mode only protocols that are to be scanned should be sent to the device Pre installation Operating conditions 10 to 35 C 50 to 95...

Страница 12: ...arding the network modes are Whether communicating devices are aware of the existence of the device That is if the device is operating in one of the transparent modes How the device physically connect...

Страница 13: ...parent bridge mode requires less configuration than transparent router and explicit proxy modes You do not need to reconfigure all your clients default gateway MX records Firewall NAT or mail servers...

Страница 14: ...e LAN1 and LAN2 ports The device scans the traffic it receives on one network and forwards it to the next network device on a different network The device acts as a router routing the traffic between...

Страница 15: ...ur client devices to point to the default gateway Configure the device to use the Internet gateway as its default gateway Ensure your client devices can deliver email messages to the mail servers with...

Страница 16: ...mmunicate directly with the device although traffic might pass through several network servers before reaching the device The perceived path is from the external mail server to the device Protocols To...

Страница 17: ...st Ensure that your client devices can deliver email messages to the mail servers within your organization Ensure that your firewall rules are updated The firewall must accept traffic from the device...

Страница 18: ...scans every message twice once in each direction For this reason explicit proxy mode is usually used for SMTP scanning Mail relay Figure 7 Device in explicit proxy configuration in a DMZ If you have...

Страница 19: ...ffic to the firewall rather than the mail gateway itself In this case the firewall must instead be reconfigured to direct inbound mail requests to the device Firewall rules specific to Lotus Notes By...

Страница 20: ...comprehensive explanation but we do not recommend it The RPC protocol is widespread on Microsoft networks opening TCP 135 inbound is a red flag to most security professionals If you intend to use thi...

Страница 21: ...est that the network traffic is being scanned 11 Configure policies and reporting 12 Route production traffic through the appliance CAUTION Connecting the appliance to your network can disrupt Interne...

Страница 22: ...Test that the network traffic is being scanned 8 Using policies to manage message scanning Configure policies and reporting 9 Using the Configuration Console Configure production traffic through the s...

Страница 23: ...ng upgrading or diagnosing system faults on the appliance CD ROM drive System status LED System status and hard Lights during normal use Flashes when the System Identification button is pressed disk d...

Страница 24: ...uipment designed for 10 Mbps 100 Mbps or 1000 Mbps 1Gb Ethernet network use port NIC 1 and LAN2 Each LAN port has built in LEDs port NIC 2 Lights green when the port has a good link to the attached Et...

Страница 25: ...an Ethernet Cat 5e cable to the RJ 45 port Remote Access Card 3300 and 3400 appliances only 3000 3100 appliances only The 3000 and 3100 appliances have a single hard disk drive Hard disk drives 3200...

Страница 26: ...from the bottom up If you are installing multiple appliances start with the lowest available position first Contents Connect to the network This section describes how to connect the appliance to your...

Страница 27: ...nt port To manage the appliance locally use a crossover Cat 5e Ethernet cable to connect the appliance to your local computer s network card Using Fiber LAN connections Use the fiber cables to connect...

Страница 28: ...ration Console or from the Setup Wizard within the user interface The Configuration Console launches automatically at the end of the startup sequence after either an unconfigured device starts or afte...

Страница 29: ...o make other changes to the default configuration Select Restore from a File not available from the Configuration Console to set up your device based on a previously saved configuration Following the...

Страница 30: ...rk against viruses spam and phish and uses McAfee TrustedSource to protect your network from unwanted email If you want to scan more types of traffic you can enable each protocol from its page From th...

Страница 31: ...rd twice to confirm it The original default password is scmchangeme Password Offers a choice of time zones The zones are organized from West to East to cover mid Pacific America Europe Asia Africa Ind...

Страница 32: ...he device is in Explicit Proxy mode and a protocol is disabled traffic directed to the blade server for that protocol is refused The protocol is blocked at the device In Explicit Proxy mode only SMTP...

Страница 33: ...otection against Potentially Unwanted Programs including Spyware Scan SMTP traffic Scan POP3 traffic Under Relaying options the device suggests the domain information if this is available via DHCP Del...

Страница 34: ...r network For example 198 168 10 1 or FD4A A1B2 C3D4 1 IP Address You can specify multiple IP addresses for the appliance s ports If the appliance is in Transparent Bridge mode the IP addresses are co...

Страница 35: ...ster set by default For all cluster members the administrator must set the cluster identifier This unique identifier ensures that members of the cluster are joined correctly To create multiple cluster...

Страница 36: ...ntaining two or three appliances it is likely that you want to enable scanning on all appliances For larger systems you may prefer to not have the Cluster Failover scanning Enable scanning on this app...

Страница 37: ...en they do not noticeably affect the blade servers performance Option definitions Definition Option Specifies your local time zone You might need to set this twice each year if your region observes da...

Страница 38: ...on Option The value is set according to best practice The value is probably not correct Although the value is valid it is not set according to best practice Check the value before continuing No value...

Страница 39: ...des some information to help you get started How to start the user interface again Tasks to complete to make sure that the device is working correctly Contents Introducing the user interface Testing t...

Страница 40: ...s information Library which describes every virus and other potentially unwanted programs that McAfee detects and cleans Download SNMB files Download files for SMI MIB and HP Openview Opens the Online...

Страница 41: ...rnal email account such as Hotmail to an internal mailbox and confirm that it arrived 2 Select Dashboard The SMTP protocol section shows that a message was received Testing virus detection Use this ta...

Страница 42: ...s 3 Send the new email message to an internal mailbox address The device scans the message recognizes it as a junk email message and deals with it accordingly The GTUBE overrides blacklists and whitel...

Страница 43: ...en click Next The log shows the EICAR test file that you detected Task Use this task to update the appliance s DAT files and to then view the the update report NOTE The System Status page is displayed...

Страница 44: ...e sender and Quarantine the original email 6 In If cleaning fails select Replace the detected item with an alert 7 In the And also section beneath If cleaning fails select Deliver a notification E mai...

Страница 45: ...ntains a virus It quarantines the message and notifies the intended recipient and the sender that the message was infected Creating an anti spam scanning policy Use this task to set up a policy to pro...

Страница 46: ...ng rule 9 Select Privacy Rules from within Type Compliancy 10 Click OK 11 In If Triggered select Accept and then drop the data Block 12 Click OK 13 Click OK 14 Create an email on the server from examp...

Страница 47: ...event 18 View the Dashboard to see information about items quarantined because of their content 19 Using the recipient s email account open McAfee Quarantine Manager User interface and select Unwante...

Страница 48: ...host Queued Email You can view all quarantined email or just quarantined email for each host Quarantined Email You can view all reports or just reports for each host Reporting Behavior between the dev...

Страница 49: ...iance is switched on and its software is running If the power button LED is orange the appliance is connected but is not turned on If the power LED is green the appliance is connected and turned on Th...

Страница 50: ...rk and that it can reach the same subnet to which the appliance is connected You have used the new IP address that you configured for the LAN1 port in the URL field of your web browser If you have not...

Страница 51: ...heck the accompanying release notes for known issues when using some web browsers on particular operating systems Client software cannot communicate through theappliance Check the following The correc...

Страница 52: ...l select Refresh to see the progress that the appliance has made through the list of messages The appliance works through the messages until each one is sent If there is still a delivery problem cause...

Страница 53: ...configuration of your inside and outside networks Make sure that the list of outside networks has an asterisk as the last entry Also make sure that the list of inside networks does not have an asteri...

Страница 54: ...y appear to the appliance as though they were coming from the firewall System maintenance This section discusses system maintenance issues The appliance does not accept the HotFix file Do not unzip th...

Страница 55: ...block a specific sender of spam 1 In the navigation pane select Configure SMTP 2 Select Protocol Settings Permit and Deny Settings 3 At Deny Sender type the sender s email address Users are not getti...

Страница 56: ...or to simply block the spam at the appliance The email messages might be coming from senders domains or networks that are in the Permit Sender list Review the list to make sure that you really want em...

Страница 57: ...can Access the McAfee online virus information library to find out more about a specific virus Submit a virus sample to McAfee for analysis Contact McAfee Technical Support See the Online help for mo...

Страница 58: ......

Страница 59: ......

Страница 60: ...700 2315A00...

Отзывы: