background image

Email Protection Administrator Guide

156

Proprietary:  Not for use or disclosure outside McAfee without written permission.

November 2012

Question: I’m receiving spam email from my own email address and I 
know I didn’t send it. What’s happening and how do I stop it?

Answer:

 A spammer has “spoofed” your email address. Spoofing means that the “From:” 

address in emails has been falsified to be an address other than the real source of the 
emails. The intent is to trick the recipient into opening the email because it appears to be 
from a trusted source. In your case, they made the mistake of using your own email 
address as the spoofed address and you realized that you had not sent the email. Spoofing 
is illegal according to the CAN-SPAM Act of 2003; however, it is still a common tactic 
used by spammers.

You can do any of the following in Email Protection to block these types of emails.

Confirm that your own email address is not in an Allow list.
It is possible that the spoofed email would be caught by normal spam filtering; 
however, if your email address is in an Allow list, spam filtering will be disabled. If 
necessary, remove your email address from any Allow lists to make sure spam 
filtering is performed.

Add your own email address to your user-level Deny list
This policy will automatically deny any emails received from your email address. It 
will apply to all emails received from the Internet into Email Protection that are 
filtered and then sent to you. It will affect only emails sent to your address.

Add your own email address or entire Domain name to your policy set Sender Deny 
list

This policy will do the same as above, but will apply all user accounts subscribed to that 
policy set. If the Domain name is used, then all emails from that Domain will be filtered.

Note:

 Using a Deny list as a filtering tactic in this situation will succeed only if your 

corporate email is 

not

 sent into the Internet cloud before delivery to other addresses in 

your Domain name. The assumption is that your corporate email is delivered within your 
internal network without filtering by Email Protection. 

If your organization does deliver your corporate email using a delivery method that 
includes sending it into the Internet, it is possible that valid corporate emails will be 
filtered if you make the above policy changes. 

System Configuration

Question: I just redirected my MX Record. How can I make sure that my 
email is coming through Email Protection?

Answer: 

Once the MX Record has been redirected and the entities (Reseller, Customer, 

Domain, and user accounts) have been configured, emails can be sent from a sender 
outside of the system to a user provisioned on the Domain. To see if the email was 
received in your system from Email Protection, monitor email processing flow in the 

Overview

 window.

You should be aware that email servers do not always accept changes immediately after 
the redirection of the MX Record. This means that some email servers may still send email 
directly to your inbound servers and not to the redirected MX Record for the first 2-3 days 
after the redirection.

Содержание SaaS Email Protection

Страница 1: ...McAfee SaaS Email Protection Administrator Guide Updated November 2012 Proprietary and Confidential...

Страница 2: ...y form or by any means electronic mechanical photocopying recording or oth erwise without prior written permission from McAfee All copies of this document are the sole property of McAfee and must be r...

Страница 3: ...creation of Users 2 Email Filtering Policies 2 Types of Inbound Email Filtering 3 Types of Outbound Email Filtering 8 Configurable Actions for Filtered Email 8 User level Policy Configurations 10 Qua...

Страница 4: ...vider 20 Log on to the Control Console 20 Reset Your Password from the log on window 21 Check the Status of Email Protection on the Overview 25 Set up Your Servers 29 Confirm Your Inbound Servers Setu...

Страница 5: ...cript ActiveX and Spam Beacons 58 Configure Web Hyperlink Filters ClickProtect 60 Define an Attachment Filter 62 Filter by Attachment File Types 62 Filter by Attachment File Name 65 Filter Zip File At...

Страница 6: ...ine the Format and Text of Notifications to Users 92 Assign a Group to the Custom Policy 92 Managing Quarantine Reports 93 Set up Quarantine Reports 93 Monitor Users Quarantined Email 93 Primary Email...

Страница 7: ...affic Encryption 110 Threats Overview 111 Threats Viruses 113 Threats Spam 115 Threats Content 117 Threats Attachments 119 Enforced TLS Details 121 Enforced SPF Report 122 ClickProtect Overview 123 Cl...

Страница 8: ...dminister MSP Connector 139 Configure the MSP Connection 139 Add Domains to the MSP Connection 141 Turn on Exception Notifications for the MSP Connection 142 View an MSP Connector Audit Report 143 Adm...

Страница 9: ...erences in Administration for Service Providers This document is for use by Enterprise customers only Service Provider customers do not administer groups for Email Protection and therefore do not assi...

Страница 10: ...s The Email Protection automatically creates new user accounts if all the following is true SMTP Discovery is enabled SMTP Discovery which is enabled by default is a convenient way to add users to you...

Страница 11: ...h as blacklists and keyword lists Using Stacked Classification Framework Email Protection provides the most comprehensive and effective spam blocking product on the market today blocking 98 of spam an...

Страница 12: ...the past Reputation Based RBL Filtering Using up to 31 real time blackhole lists RBLs of known spammers provided by the industry Email Protection creates a single RBL indicator to help gauge the likel...

Страница 13: ...efore they reach your network Protects your users networks and data from harm Content Filtering and ClickProtect Email Protection protects your organization and reduces liability and risk by automatic...

Страница 14: ...d Encrypted or High Risk Zip File Attachment Rules You can configure custom rules for emails with encrypted zip files and or zip files that are considered high risk too large too many nested levels et...

Страница 15: ...lists Be aware that emails that have been quarantined by Email Protection may not need to be added to Deny lists because they are already being blocked from entering your email network Following are...

Страница 16: ...Email Protection will respond during email filtering and reporting Depending on the feature package that is licensed for a domain specific email filters will be available to be enabled and configured...

Страница 17: ...be removed from the email and the email is be sent to the recipient email address Text is inserted into the email notifying the recipient that an attachment has been stripped Only the attachment that...

Страница 18: ...es of policy configurations the user level policy setting will be used These user level policy configurations allow customization of email actions for each user User level policies are confined to the...

Страница 19: ...of quarantined spam emails that sent to users Multiple links in the Reports allow management of quarantined spam email based on policy set level and user level configurable control settings When the u...

Страница 20: ...esignated language The following languages are supported Brazilian Portuguese Chinese Simplified Chinese Traditional Danish Dutch English Finnish French German Italian Japanese Korean Norwegian Portug...

Страница 21: ...ta is available to be downloaded to Microsoft Excel spreadsheet file csv There are multiple reports available for viewing in the Control Console For more information see System Reports Optional Utilit...

Страница 22: ...s become available Fail Safe begins unspooling the emails That is Fail Safe restores these stored emails to the inbound server using the first in first out order The messages Fail Safe stores are not...

Страница 23: ...oups Finally a Group Administrator can view user lists and user details A Group Administrator does not need to be a member of a group in order to have these capabilities Note A Group Administrator can...

Страница 24: ...guration Table 1 Email Protection Window Access Privileges Window Access Feature Enablement Required Customer Administrator Domain Administrator Quarantine Manager Group Admnistrator Overview No Yes Y...

Страница 25: ...hments Additional Policies No Yes No No Yes Attachments Additional Notifications No Yes No No Yes Allow Deny Sender Allow No Yes No No Yes Allow Deny Sender Deny No Yes No No Yes Allow Deny Recipient...

Страница 26: ...led Yes Yes No No Disaster Recovery Setup Yes Either FailSafe or Email Continuity must be enabled or included in your package Yes Yes No No MX Records Setup No Yes Yes No No User Creation Settings No...

Страница 27: ...Email Protection Documents Email Protection Concepts Guide Email Protection Quick Start Intelligent Routing User Guide Email Continuity Administrator Quick Start Guide Quarantine Release Overview No...

Страница 28: ...ity User Quick Start Guide Ensure You Can Receive Email from Your Service Provider If you had or still have a different email security or filtering service and your network is administered so that you...

Страница 29: ...curity question and or security answer on the Preferences window of your user account See Set User Display Preferences Including Your Own in Account Management Administrator Guide 4 Select a security...

Страница 30: ...ou selected the option for your email your email application receives an email momentarily with further instructions Continue with Step 5 If you selected the option to email a Domain Contact that pers...

Страница 31: ...must answer this question when you forget your password or need to reset it The Security Question and Security Answer fields are displayed Select a question from the Security Question drop down menu t...

Страница 32: ...mber your password but do not use obvious passwords for example password your name or a family member s name Keep your password safe and private 11 Retype your password in the Confirm Password field 1...

Страница 33: ...to your domain over the previous 24 hours Disaster recovery information News and update information Customer Administrators will see the information for all the domains in the customer where the role...

Страница 34: ...hot Displays a 24 hour snapshot of inbound email traffic Messages Number of inbound messages processed Avg Size Average size of inbound messages including attachments Bandwidth Average bandwidth used...

Страница 35: ...over the past 24 hours of the designated time zone Optionally select one of the graphic display type icons to change the appearance of the graph Disaster Recovery Current Status Displays domains that...

Страница 36: ...Email Protection Administrator Guide 28 Proprietary Not for use or disclosure outside McAfee without written permission November 2012...

Страница 37: ...on Setup 2 From the domain drop down menu on the Setup window select the domain whose SMTP server you want to check The SMTP Host Address field displays the domain name s or IP address es for the doma...

Страница 38: ...server 5 In the Port field type the port on the server to which the Email Protection will connect The default value is 25 6 In the Preference field type the number indicating order of connection prefe...

Страница 39: ...icked Email Protection immediately accepts email traffic from the active servers Note If email is received from an outbound server that is not configured in the Email Protection system it will be refu...

Страница 40: ...then relayed through Email Protection before continuing to its final destinations The outbound Smart Host address is listed at the bottom of the Outbound Server Setup window or you can refer to your S...

Страница 41: ...rver operated by your Internet Service Provider ISP Each MX record specifies a host name and preference that determines where and how your ISP routes your company s email Your MX record or records at...

Страница 42: ...correctly redirected to Email Protection The analysis indicates the following All Authoritative Name Servers for the entered DNS name All MX Records that are recognized by the Authoritative Name Serv...

Страница 43: ...tus of the MX record Valid MX Record is current and fully authenticated Valid recommend update MX Record uses an older hostname standard It still works but it is recommended that you update to the cur...

Страница 44: ...gain Set up User Creation Mode SMTP Discovery or Explicit Note This procedure applies only if your service includes Email Protection Explicit user creation means that you must add user email addresses...

Страница 45: ...dministrator Guide Set up User Creation Mode SMTP Dis November 2012 Proprietary Not for use or disclosure outside McAfee without written permission 37 3 Under the User Creation Mode heading select Exp...

Страница 46: ...Set up User Creation Mode SMTP Discovery or Explicit Email Protection Administrator Guide 38 Proprietary Not for use or disclosure outside McAfee without written permission November 2012...

Страница 47: ...ovider Customer Important This document is for use by Enterprise customers only The way in which custom policies are applied to your users varies depending on whether you are classified as a service p...

Страница 48: ...il Protection Administrator Guide 40 Proprietary Not for use or disclosure outside McAfee without written permission November 2012 Figure 6 Service Provider Custom Policy Assignment Figure 7 Enterpris...

Страница 49: ...Custom Policy Enterprise Customer Only Important Note It is assumed that all domains within an Enterprise Customer will have the same package assigned to them If some domains have different packages u...

Страница 50: ...set Most settings are copied based on this selection However you must choose to copy some settings from the existing policy separately by selecting the following fields Copy Sender Allow List Select...

Страница 51: ...how Email Protection handles an email that contains a known virus Important Note If an email is detected that contains a wide spread worm or virus for example SoBig or MyDoom Email Protection may aut...

Страница 52: ...ends the email to quarantine with the message that an attachment had been stripped Email Protection does not send a separate notification to the recipient Strip the attachment Email Protection strips...

Страница 53: ...scores are Medium likelihood if default settings are used This email is normally quarantined for review Field Description To the sender when a message is due to a virus infection Select one or more c...

Страница 54: ...ionally some emails might be marked as spam when in fact they are legitimate emails For these false positive email messages you can help Email Protection tune the spam thresholds and rules by sending...

Страница 55: ...spam content groups You can define a custom spam content group that contains additional lists of keywords that are used to filter email as spam For each content group you also define the action to tak...

Страница 56: ...Managers or higher level administrators Users cannot view this spam 1 Click Email Protection Policies 2 Select the policy you want to change 3 Click the Spam 4 Click Content Groups 5 Double click the...

Страница 57: ...al string as is If individual words are desired each word must be on its own line Letter case for example upper case or lower case is ignored The wildcards question mark and asterisk can be used to de...

Страница 58: ...m is filtered What actions users can take on quarantined email See the Email Protection User Guide on how users might manage quarantine reports To set up quarantine reports for users perform the follo...

Страница 59: ...with email applications that do not support HTML content Text New Items Since Last Report A text only email report is sent to you that indicates how many new emails have been quarantined as spam since...

Страница 60: ...frequency with which they receive Spam Quarantine Reports Users select the frequency of reports from the Preferences window on the Control Console Allow users to personalize report type Select to allo...

Страница 61: ...s not affect the ability of users to log in by clicking a link in a Spam Quarantine Report If Control Console access is not enabled and users do not receive the Spam Quarantine Report the Quarantine M...

Страница 62: ...ined content groups that contain valid and acceptable personal identifiable information that is allowed in email messages due to specific policies You cannot edit these content groups but can designat...

Страница 63: ...the subject text and the email is sent to the recipient email address Encrypt Message is also available for Outbound content groups if the Customer has subscribed to Encryption 3 Silent Copy allows y...

Страница 64: ...nt keywords needed to define your Custome Content Group In the Content field type any keywords you want to search for in email Use the following rules for entering keywords Each entry must be on its o...

Страница 65: ...de standard Email Protection spam content filtering for particular keywords Note Emails that match keywords but are allowed will be reported as Other in the Threats Spam report Tag the message subject...

Страница 66: ...e sender Quarantined The infected email was quarantined Denied delivery The infected email was denied delivery To the recipient when a message is due to a content group violation Select one or more co...

Страница 67: ...options for HTML filtering 7 Select Replace all image links with a default transparent image to eliminate objectionable images in email This option replaces links to images in email with links to an...

Страница 68: ...clicked so that they are reported in the ClickProtect Click Log Report Caution ClickProtect only processes links in emails with accepted message formats which include HTML or Rich Text 1 Click Email...

Страница 69: ...n instead of typing in each email address associated with the domain The following list provides some examples of allowable URLs www domainname com www domainname n www domainname www domainname examp...

Страница 70: ...sole If you want to download the list of allowed URLs to your local drive click Download ClickProtect Allow List The downloaded list is a file in CSV format You can open it in Microsoft Excel Define a...

Страница 71: ...ollowing options from the drop down menu Disallow All email containing this file type are blocked A file size such that an email with a file of this file type that exceeds the file size is blocked Max...

Страница 72: ...e fdf ofm p65 pdd pdf Macintosh Files a3m a4m bin hqx rs_ Compressed or Archived Files arj bz2 cab gz gzip jar lah lzh rar rpm tar tgz z zip Audio Files aff affc aif aiff au m3u mid mod mp3 ra rmi snd...

Страница 73: ...lowing steps 1 Click Email Protection Policies 2 Select the policy you want to change 3 Click Attachments The Attachments File Types window is displayed 4 Click Filename Policies The Filename Policies...

Страница 74: ...ent Email Protection strips the attachment from the email and the email is sent to the recipient Text is inserted into the email notifying the recipient that an attachment has been stripped Quarantine...

Страница 75: ...ny delivery Email Protection denies delivery of the email The action applies if an email message has an attachment that is a zipped file and is encrypted and password protected This format is commonly...

Страница 76: ...o an attachment policy violation Select one or more conditions that will cause Email Protection to send a notification email to the sender Quarantined The email that contained an attachment violation...

Страница 77: ...tering is always applied if licensed for that policy set unless overridden by the user level policy configurations In addition the user level Deny list will override the policy set level Sender Allow...

Страница 78: ...rds Should the SPF check fail the mail is denied The following conditions apply to an SPF verification If the record can be verified then content and spam filtering is skipped for the sender s inbound...

Страница 79: ...main names Complete domain name or partial name with wildcards for example domain com IP addresses Complete IP address or partial address with wildcards for example 123 123 12 3 or 123 123 12 Note CID...

Страница 80: ...ient Shield Addresses with a Batch File 1 Click Email Protection Policies 2 Select the policy you want to change 3 Click Allow Deny The Sender Allow window is displayed 4 Click Recipient Shield The Re...

Страница 81: ...Email Protection automatically creates a Microsoft Excel spreadsheet csv file containing the address list You can choose to save the file or open it directly Add Allow Deny or Recipient Shield Address...

Страница 82: ...turn on TLS to ensure TLS is implemented in your system prior to setting up your domain lists From the Policy Set window select Email Authentication Enforce TLS tab and complete the following steps Ad...

Страница 83: ...default is updated to reflect those changes Save 9 Click the Save button to save your information Download To Download a domain list in a csv file click the Download button select the list you wish to...

Страница 84: ...and caution is advised Create an Enforced SPF Domain Go to the Email Authentication Enforced SPF tab and complete the following information to implement an SPF domain To enter values for the SPF doma...

Страница 85: ...unavailable Upload Enforced SPF List appends to existing list To Upload a file with a predefined list click the Upload Browse button After you select the file and it s path appears in the text field...

Страница 86: ...ple com If the sub domain is not going to be entered using the wildcard character the sub domain must be explicitly defined 1 Click the Add button The value is added to the list box Note The maximum n...

Страница 87: ...text field click the Upload button The contents are added to the Add Domain box above Download Enforced DKIM List be sure to save changes first 4 To Download a domain list in a csv file click the Down...

Страница 88: ...Viruses Content Attachments Default notification templates are provided for all the notification scenarios You can change these templates if you wish One notification email template is defined for eac...

Страница 89: ...3 Click Notifications The Notifications Virus window is displayed SENDER Inserts a variable that automatically indicates the sender s email address From address from the email that violated the polic...

Страница 90: ...ionally you can type variables that insert system information into this content Body Type the text to be used as the body text for the notification email template Optionally you can type variables tha...

Страница 91: ...ubject or highlight a subject and click Edit The Edit section of the window is displayed 7 Change if desired the text or variables in any or all of the following fields From Designates what email addr...

Страница 92: ...e click on a subject or highlight a subject and click Edit The Edit section of the window is displayed 7 Change if desired the text or variables in any or all of the following fields Body Type the tex...

Страница 93: ...e email content had been sent If you wish to have a Subject value for the Notification message edit the Subject field otherwise the Subject appears as Delivery Notification FROM Inserts a variable tha...

Страница 94: ...tes the Domain that received the email that violated the policy POSTMASTER Inserts postmaster ex postmaster domain com email address for the Domain Variable syntax requires name_of_variable where name...

Страница 95: ...available options Defer to domain based Email Continuity access control configured under Disaster Recovery Setup Select this option to use the configuration settings from the Disaster Recovery Setup w...

Страница 96: ...m Policy To perform this task you must first create the group of users who are to be assigned to the policy See Managing Groups in Account Management Administrator Guide 1 Click Email Protection Polic...

Страница 97: ...om an existing inbound policy Create a Custom Outbound Policy Important Note It is assumed that all domains within an Enterprise Customer will have the same package assigned to them If some domains ha...

Страница 98: ...r inbound email For more information see Create a Custom Policy Direction From the drop down menu select the direction of email outbound SMTP for which this policy will be configured Copy From From th...

Страница 99: ...roup Name under Content Groups if desired Select the group name you wish to encrypt from the Action drop down list select to have that Group encrypted More Options If a Customer or Domain subscribes t...

Страница 100: ...inbound email For more information see Define an Attachment Filter Policy Define the Format and Text of Notifications to Users You configure notifications for outbound email in the same way as that fo...

Страница 101: ...orts are formatted How often reports are sent How Spam is filtered What actions users can take on quarantined email See the Email Protection User Guide on how users might manage quarantine reports To...

Страница 102: ...address continues to be shown as a public domain address If an email that was sent to an alias email address is quarantined the recipient email address is changed to be the associated primary email ad...

Страница 103: ...n displays information that varies depending on the type of threats you searched for The following table lists the type of information that might be contained in this column Field Description From Ent...

Страница 104: ...mxlogic com Attachment Attachment Displays the name of an attachment that was included in the email message and violates attachment rules size file typ zip file attachments as defined on the Attachme...

Страница 105: ...l which deletes all email in the Search Results list Release Quarantined Messages By releasing a quarantined email message you remove the message from quarantine and send the email to the mailbox of t...

Страница 106: ...d or words that violated the content filter If the Threat type is Attachment check the Attachments list for size and or type of file or for html code violations The Content Type is based on the MIME p...

Страница 107: ...Monitor Your Own Quarantine You can check your own messages in quarantine and take the same actions on those messages that you do on other users To access your own quarantined messages perform the fo...

Страница 108: ...Monitor Users Quarantined Email Email Protectionr Administrator Guide 100 Proprietary Not for use or disclosure outside McAfee without written permission November 2012...

Страница 109: ...has unlimited storage capacity and removes messages that have been in Email Continuity storage for more than 60 days Set up Spooling for Disaster Recovery 1 Click Email Protection Setup Disaster Reco...

Страница 110: ...at you don t want to allow access Set up Notifications of Disaster Recovery You can specify that notifications are emailed automatically to designated recipients typically yourself or other administra...

Страница 111: ...pects of a policy for individual users For more information see the following sections in the Account Management Administrator Guide Personalize Spam Reporting for a User Allow or Deny Email to a User...

Страница 112: ...Email Protection Administrator Guide 104 Proprietary Not for use or disclosure outside McAfee without written permission November 2012...

Страница 113: ...ed the virus policies for the designated domain s during the selected date or date range Threats Spam Information about emails that violated the spam policies for the designated domain s during the se...

Страница 114: ...rom all quarantine areas within the Email Protection for the designated domain s during the selected date or date range User Activity Information about all Inbound and Outbound email traffic and bandw...

Страница 115: ...date Note You can select only the current month or click the down arrow at the top of the calendar to select the previous month You cannot retrieve data from a timeframe beyond the previous month Cha...

Страница 116: ...ry Information about inbound and outbound email traffic for the designated Domain and date range as follows Inbound Messages Indicates the total number of inbound emails received Average Inbound Messa...

Страница 117: ...ayed report results in spreadsheet format Report Purpose Identifies Inbound and Outbound email messages that were delivered via a TLS connection and any email messages that were denied due to an Enfor...

Страница 118: ...ges processed via a TLS connection Outbound Messages blocked by Enforced TLS The total of outgoing email messages blocked by an Enforced TLS policy Bandwidth Summary TLS Inbound Total Bandwidth The qu...

Страница 119: ...server and available to the recipient Email Encryption is only available for a selected Outbound package Email Encryption Summary Outbound Messages blocked by Email Encryption The total outbound mess...

Страница 120: ...d Domain and date range Total Viruses The total number of inbound emails that contained known worms and viruses Infection Rate The percentage of inbound emails that contained known viruses vs the tota...

Страница 121: ...ded as indicated in the legend below the graphic Outbound Threat Summary Information about the number of outbound emails that violated each policy type for the designated Domain and date range as foll...

Страница 122: ...for use or disclosure outside McAfee without written permission November 2012 The following table lists the report items in the report Report Item Description Virus Volume Trends The total number of...

Страница 123: ...Outbound Infection Rate The percentage of infected outbound emails vs the total number of sent outbound emails Disinfected cleaned The total number of infected emails that had their viruses successful...

Страница 124: ...or use or disclosure outside McAfee without written permission November 2012 The following table lists the report items in the report Report Item Description Spam Volume Trends The total number of ema...

Страница 125: ...licies vs the total number of received inbound emails Spam Beacons Detected The total number of spam beacons detected in emails Note that each email may contain multiple spam beacons RBL The total num...

Страница 126: ...closure outside McAfee without written permission November 2012 The following table lists the report items in the report Report Item Description Content Policy Violation Trends The total number of ema...

Страница 127: ...s Credit Card The total number of emails that contained keywords and phrases from the Credit Card predefined content group Profanity The total number of emails that contained keywords from the Profani...

Страница 128: ...outside McAfee without written permission November 2012 The following table lists the report items in the report Report Item Description Attachment Policy Violation Trends The total number of emails...

Страница 129: ...spreadsheet format Attachment Summary Information about the emails that had attachments that violated the attachment policies Average Attachment Size The average size of attachments encountered in ema...

Страница 130: ...feature acme com acme denver com is the public domain primary domain respectively acme com alias Traffic Summary Enforced TLS Accepted Inbound Messages The total number of TLS inbound messages that we...

Страница 131: ...the report table does not display unless an Enforced SPF policy has been created with a deny action or domains have been added to the list for the Enforced SPF policy SPF Message Summary Summarizes i...

Страница 132: ...The following table lists the report items in the report Report Item Description ClickProtect Trends The numbers of emails that contained hyperlinks and that contained hyperlinks that were clicked by...

Страница 133: ...l clicks The total number of times that a recipient clicked a hyperlink in an email Total allowed click throughs The total number of times that a recipient was allowed to access the destination design...

Страница 134: ...ail address To The email address to which this email was sent recipient email address Subject The text that was in the subject header of this email URL The URL destination defined in the clicked hyper...

Страница 135: ...color coded as indicated in the legend below the graphic Inbound Spam Release Summary Information about the emails that were quarantined as potential spam and then released Total Spam Identified The...

Страница 136: ...mation about the emails that were quarantined because of content and then released Total Content Policy Violations The total number of quarantined emails that violated content policies Total Content R...

Страница 137: ...d HTML From The email address that sent this email sender email address To The email address to which this email was sent recipient email address Subject The text that was in the subject header of thi...

Страница 138: ...violated content policies Subject The contents of the Subject line of the email To The email address to which this email was addressed recipient email address Sender IP The IP address of the server t...

Страница 139: ...n the email was quarantined Timestamp The date time and time zone when the logged item was processed for example when an email was processed by Email Protection Details Additional information about th...

Страница 140: ...addresses that received the most inbound email in order of volume Messages The total number of emails received by each email address Size The size of the largest email including attachments received...

Страница 141: ...able lists the report items in the report Report Item Description Display Designates which set of event log items to display All Events Displays event log items for actions performed for all the quara...

Страница 142: ...that only outbound emails are displayed Inbound Outbound Designates that both inbound and outbound emails are displayed Type The type of policy that the filtered email violated Timestamp The date tim...

Страница 143: ...the action was performed in the Control Console Domain column The domain where the action was performed Details column A description of the action that was performed including the role and user accoun...

Страница 144: ...elected inbound server only Connection Volume Trends for All Servers The total number of successful and unsuccessful connections to the designated server s Green Indicates successful connections Purpl...

Страница 145: ...view report displays information about emails that were spooled and unspooled by the disaster recovery service which can be either FailSafe or Email Continuity Failure Rate The percentage of connectio...

Страница 146: ...that were unspooled either automatically or manually Disaster Recovery Trends Bytes The amount of spool storage used by spooled and unspooled emails processed by the disaster recovery service over the...

Страница 147: ...the previous calendar month to the ConnectWise dashboard All data will be kept for two calendar months For example in July customers would be able to view data from both May and June Customers who als...

Страница 148: ...ld type your ConnectWise access site 5 In the Company ID field type your ConnectWise Company ID 6 In the Integrator Username field type your ConnectWise Integrator Username 7 In the Integrator Passwor...

Страница 149: ...s MSP Connector 2 Click Domains The Domains window is displayed 3 To find one or a few domains out of a large number of domains type the name of the domain you wish to find in the Filter field 4 Click...

Страница 150: ...k Remove Note Clicking Remove All will remove the domains listed even those not displayed due to pagination The Remove All button is disabled if there is an active filter for selected domains Turn on...

Страница 151: ...2 00 A M MT which includes all failures that occurred in the last 24 hours Failures may include one of the following Failed authentication Failed connection Failed invalid Company ID Failed invalid So...

Страница 152: ...rietary Not for use or disclosure outside McAfee without written permission November 2012 The Status column lists the status of attempts to pass data to ConnectWise 3 Double click a report to view the...

Страница 153: ...Email Protection Administrator Guide Administer MSP Connector November 2012 Proprietary Not for use or disclosure outside McAfee without written permission 145...

Страница 154: ...ord or site is invalid check information on the ConnectWise side Failed connection ConnectWise server was moved ConnectWise server was offline ConnectWise network potentially down Failed invalid Compa...

Страница 155: ...variables such as Time zone settings Message delivery timing may be briefly queued Quarantine releases Reporting period Total Messages The total number of messages processed for the previous calendar...

Страница 156: ...the Deliver To drop down menu select the distribution list containing the recipient s for the Performance Reports 4 From the Time Zone drop down menu select the time zone for the Performance Reports 5...

Страница 157: ...his includes Inbound Threats Inbound Message Actions Disaster Recovery reports Field Description Total Inbound Messages The total number of all inbound messages processed When users have the same filt...

Страница 158: ...cy rules for virus and had the policy action Clean applied to the message Denied The record of all the inbound messages refused because they violated the pol icy rules for spam virus content or attach...

Страница 159: ...r 2012 Proprietary Not for use or disclosure outside McAfee without written permission 151 Outbound Messages Overview The Outbound Messages Overview reports on the number of messages processed and suc...

Страница 160: ...Administer Performance Reports Email Protection Administrator Guide 152 Proprietary Not for use or disclosure outside McAfee without written permission November 2012...

Страница 161: ...ue A specified number default is 3 emails that were not quarantined or denied have been received within a day for the new email address Emails that had content stripped but were sendable can still tri...

Страница 162: ...ration changes in the Control Console including policy configurations Allow and Deny lists and changes to entity configurations will take approximately 10 15 minutes before the configuration is effect...

Страница 163: ...nt occurrence it may happen occasionally especially to mailing list and newsletter traffic In such cases we ask that you help us tune our spam thresholds and rules by sending a forwarded copy of the e...

Страница 164: ...d then sent to you It will affect only emails sent to your address Add your own email address or entire Domain name to your policy set Sender Deny list This policy will do the same as above but will a...

Страница 165: ...servers are now no longer published which helps to protect your email servers from direct email attacks and bad email Question My server went down for a short period of time what happened to our compa...

Страница 166: ...from an IP address where more than 60 of the recipients are invalid it adds the IP address to a temporary global blacklist for 4 hours by default the time period is configurable at the system level A...

Страница 167: ...k the Privacy tab 3 In the Settings area in the Privacy tab do one of the following A Move the slider to select Medium B Click the Sites button 4 In the Per Site Privacy Actions window enter the URL f...

Страница 168: ...y bypass email filtering Wrong Email Got Past Filter What do we do if spam email virus email etc was delivered anyway If you or an email recipient in your system has received email that you feel shoul...

Отзывы: