Summary of Contents for Symantec 10490452 - Mail Security 8220
Page 1
Symantec Mail Security for SMTP Administration Guide...
Page 2
Symantec Corporation or its affiliates in other countries. Other names may be trademarks of their respective owners. Symantec Mail Security for SMTP 5.0 is protected under U.S. Patent Nos. 6,052,709; 5,999,932; and 6,654,787. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering.
Page 3
Technical support As part of Symantec Security Response, the Symantec global Technical Support group maintains support centers throughout the world. The Technical Support group’s primary role is to respond to specific questions on product feature/ function, installation, and configuration, as well as to author content for our Web-accessible Knowledge Base.
Page 4
Recent software configuration changes and/or network changes ■ Customer Service To contact Enterprise Customer Service online, go to www.symantec.com, select the appropriate Global Site for your country, then choose Service and Support. Customer Service is available to assist with the following types of issues: Questions regarding product licensing or serialization ■...
Contents Chapter 1 About Symantec Mail Security for SMTP Key features ......................11 Functional overview .................... 12 Architecture ......................13 Where to get more information ................. 14 Chapter 2 Configuring system settings Configuring certificate settings ................ 17 Configuring host (Scanner) settings ..............20 Working with the Services page ..............
Page 7
Configuring Suspect Virus Quarantine ............148 Configuring Suspect Virus Quarantine port for incoming email ..148 Configuring the size for Suspect Virus Quarantine ......148 Chapter 7 Testing Symantec Mail Security for SMTP Verifying normal delivery ................151 Verifying spam filtering ...................151 Testing antivirus filtering ................152 Verifying filtering to the Spam Quarantine ..........153...
Page 8
8 Contents Chapter 9 Working with reports About reports ..................... 163 Choosing a report ....................164 About charts and tables ..................172 Selecting report data to track ................172 Setting the retention period for report data ..........173 Running reports ....................173 Saving and editing Favorite Reports ..............
Page 9
Maintaining adequate disk space ............200 Appendix A Feature Cross-Reference New features for all users .................202 Changes for Symantec Mail Security for SMTP users .........203 New feature names ..................204 Discontinued features ................204 Changes for Symantec Brightmail Antispam users ........205 About email filtering and message handling options ........206...
Page 10
10 Contents Appendix D Editing antivirus notification messages Modifying notification files ................231 Changing the notification file character set .......... 232 Editing messages in the notification file ..........232 Notification file contents ................. 233 Glossary Index...
■ Where to get more information ■ Key features Symantec Mail Security for SMTP offers enterprises an easy-to-deploy, comprehensive gateway-based email security solution through the following: Antispam technology – Symantec’s state-of-the-art spam filters assess and ■ classify email as it enters your site.
You can deploy Symantec Mail Security for SMTP in different configurations to best suit the size of your network and your email processing needs. Each Symantec Mail Security for SMTP host can be deployed in the following ways: Scanner – Deployed as a Scanner, a Symantec Mail Security for SMTP host ■...
About Symantec Mail Security for SMTP Architecture Architecture Symantec Mail Security for SMTP processes a mail message as follows. For the sake of discussion, our sample message passes through the Filtering Engine to the Transformation Engine without being rejected. The incoming connection arrives at the inbound MTA via TCP/IP.
Symantec Mail Security also includes a comprehensive help system that contains conceptual and procedural information. You can visit the Symantec Web site for more information about your product. The following online resources are available: Provides access to the technical support Knowledge www.symantec.com/...
Page 15
About Symantec Mail Security for SMTP Where to get more information Provides access to the Virus Encyclopedia, which www.symantec.com/ contains information about all known threats; avcenter/global/index.html information about hoaxes; and access to white papers about threats...
Page 16
16 About Symantec Mail Security for SMTP Where to get more information...
Chapter Configuring system settings System settings apply to the Control Center and to attached and enabled Scanners. This section explains the following: Configuring certificate settings ■ Configuring host (Scanner) settings ■ Testing Scanners ■ Configuring LDAP settings ■ Replicating data to Scanners ■...
Page 18
18 Configuring system settings Configuring certificate settings You can add certificates to the certificate list in the following two ways: Add a self-signed certificate by adding the certificate and filling out the ■ requested information as presented to you at the time. Add a Certification Authority Signed certificate by submitting a certificate ■...
Page 19
Configuring system settings Configuring certificate settings On the Import Certificate page, type the full path and filename or click Browse and choose the file. 10 Click Import. To view or delete a certificate In the Control Center, click Settings > Certificates. Check the box next to the certificate to be viewed or deleted.
20 Configuring system settings Configuring host (Scanner) settings Configuring host (Scanner) settings The following sections describe changes that can be made to individual hosts. Information is available on these topics: Working with the Services page ■ HTTP proxies ■ SMTP Scanner settings ■...
HTTP proxies The Conduit and Symantec LiveUpdate run on each Scanner, and receive filter updates from Symantec. If you need to add proxy and/or other security settings to your server definition, use the steps below. To change or add proxy information In the Control Center, click Settings >...
22 Configuring system settings Configuring host (Scanner) settings SMTP Scanner settings A full complement of SMTP settings has been provided to help you define internal and external SMTP configurations for Scanners. Inbound SMTP settings determine how the inbound MTA processes inbound messages. Outbound SMTP settings determine how the outbound MTA processes outbound messages.
Page 23
Configuring system settings Configuring host (Scanner) settings Setting Description Inbound Mail Provides settings for inbound messages. In this area, you can provide Settings the following information: Inbound mail IP address— Location at which inbound ■ messages will be received. Inbound mail SMTP port—Port on which inbound mail is ■...
Page 24
24 Configuring system settings Configuring host (Scanner) settings Setting Description Outbound Mail Provides settings for outbound mail characteristics. In this area, you settings can provide the following information: Outbound mail IP address—Specifies the IP address on which ■ outbound messages are sent. Outbound mail SMTP port—Specifies the port on which ■...
Configuring system settings Configuring host (Scanner) settings Advanced SMTP settings Use the MTA Configuration portion of the page to specify the MTA host name. The MTA Host Name gives you the ability to define the Hello banner during the initial portion of the SMTP conversation. Use the following advanced inbound SMTP settings to further define your SMTP configuration: Table 2-1...
Page 26
26 Configuring system settings Configuring host (Scanner) settings Table 2-2 Outbound SMTP advanced setting descriptions Item Description Maximum message Sets the maximum size allowable for a message before it is size in bytes rejected. The default is 10,485,760 bytes. Maximum number Indicates the maximum number of recipients permitted to receive of recipients per this message.
Page 27
Configuring system settings Configuring host (Scanner) settings Table 2-3 SMTP delivery advanced setting descriptions Item Description Maximum number Sets the maximum number of connections allowed to all defined of connections to all internal mail servers. Any additional connection attempts are internal mail servers rejected.
28 Configuring system settings Testing Scanners Configuring internal mail hosts You can add or delete internal mail hosts at your site. Configure internal mail hosts Follow these procedures to add or delete internal mail hosts. To add an internal mail host From the Control Center, click Settings >...
User and group data is read from the LDAP server and cached in the Control Center and Scanners, but not written back to the LDAP server. Symantec Mail Security for SMTP supports the following LDAP directory types: Windows 2000 Active Directory ■...
Page 30
30 Configuring system settings Configuring LDAP settings Note: When adding an LDAP server that performs synchronization, you can replicate data from the Control Center to attached and enabled Scanners with the Replicate now button. Begin this replication only after initial synchronization has completed successfully as shown on the Status >...
Page 31
Configuring system settings Configuring LDAP settings Table 2-4 LDAP Server Parameters when adding a server Item Description Usage Describes how this LDAP server will be used. Available usage modes are: Authentication ■ Synchronization ■ Authentication and Synchronization ■ You can have only one authentication server defined in the Control Center.
Page 32
32 Configuring system settings Configuring LDAP settings Table 2-4 LDAP Server Parameters when adding a server Item Description Authentication Contains the following options: Query Details Autofill—Places default values in the field for you to modify as ■ needed. Query start (Auth base DN)—Designates the point in the ■...
Page 33
Configuring system settings Configuring LDAP settings Table 2-4 LDAP Server Parameters when adding a server Item Description Synchronization Specifies queries to use for synchronization. Available choices are: Query Details Autofill—Places default values in the field for you to modify as ■...
Page 34
34 Configuring system settings Configuring LDAP settings Not all parameters are available for editing in an LDAP definition. Only the following can be changed after an LDAP server has been defined: Table 2-5 LDAP Server Parameters when editing a server Item Description Administrator...
Page 35
Configuring system settings Configuring LDAP settings Table 2-5 LDAP Server Parameters when editing a server Item Description Authentication Contains the following options: Query Details Autofill—Places default values in the field for you to modify as ■ needed. Query start (Auth base DN)—Designates the point in the ■...
Page 36
36 Configuring system settings Configuring LDAP settings To cancel an LDAP synchronization in progress Click Status > LDAP Synchronization. Click Cancel Synchronization. To delete an LDAP server In the Control Center, click Status > LDAP Synchronization. Check to be sure that no synchronization is processing. You cannot delete a synchronization server while synchronization is running.
Configuring system settings Replicating data to Scanners Item Description Read The number of directory entries read from the synchronization server. For a full synchronization, this number is equal to the total number of records from the LDAP source. Added The number of directory entries added from the synchronization server to the Control Center.
Replication status information When LDAP data is replicated from the Control Center to one or more Scanners, status information is generated and displayed via the Status interface in Symantec Mail Security for SMTP. To view replication status information ◆ In the Control Center, click Status > Scanner Replication.
Configuring system settings Replicating data to Scanners The following information is displayed: Item Description Status Status can be any of the following: Idle—Nothing is happening. ■ Started—A replication request has been issued. ■ Cancelled—Either the LDAP synchronization was cancelled manually via clicking Status ■...
If replication still stalls, restart the Control Center software and begin the entire cycle again with a full synchronization. Configuring Control Center settings The Symantec Mail Security for SMTP Control Center allows you to configure the following: Control Center administration ■...
Configuring system settings Configuring Control Center settings Configuring, enabling and scheduling Scanner replication ■ SMTP host ■ System locale ■ Control Center administration You access the Control Center via a Web browser. By default anyone with the correct address and logon information has access from any host. You can choose to limit host access to the Control Center if you wish.
42 Configuring system settings Configuring Control Center settings Delete the host control access items from the database. truncate settings_host_access_control About specifying host names for Control Center access When specifying host names for Control Center access, the Control Center allows clients to connect based on the Control Center’s own DNS perspective. If the client’s IP address resolves into a name that is allowed (a “reverse lookup”), then it’s a match and the client is allowed to access the Control Center.
Page 43
Configuring system settings Configuring Control Center settings full synchronization cycle has completed. For information on setting up LDAP services, see “Configuring LDAP settings” on page 29. The replication attributes on the Control Center > Replication Settings page determine how replication operates in your installation. You can determine if replication is to take place, and how often it occurs.
Spam Quarantined messages ■ When the MTA for Symantec Mail Security for SMTP is used, messages that pass through it will be tracked by the message tracking log facilities in the product. In order for the Control Center to know where to send information, you must supply the SMTP host IP address and port.
Address masquerading is a method of concealing email addresses or domain names behind the mail gateway by assigning replacement values to them. Symantec Mail Security for SMTP lets you implement address masquerading on inbound mail, outbound mail, or both. Manage masqueraded entries Follow these steps to add or edit masqueraded entries.
46 Configuring email settings Configuring address masquerading Click Save. To edit a masqueraded entry In the Control Center, click Settings > Address Masquerading. Click the masqueraded address or domain or check a box, and then click Edit. In the Edit Masqueraded Entry page, modify the masqueraded entry as desired.
Configuring email settings Configuring aliases To import a list of masqueraded entries In the Control Center, click Settings > Address Masquerading. Click Import. On the Import Masqueraded Entry page, enter or browse to the filename containing the list of masqueraded entries. Click Import.
Page 48
Configuring aliases Alias transformation does not occur for messages passing through ■ Symantec Mail Security for SMTP’s MTA to the Internet. Alias transformation only applies to inbound or internal messages that pass through Symantec Mail Security for SMTP’s MTA. The system’s inbound MTA checks email addresses in the SMTP envelope ■...
Commas or semi-colons are not valid delimiters. In the import file, each line must contain an alias address followed by one or more destination addresses. Following is a sample import file: oak@example.com quercus@symantec-internetsecurity.com ops@example.com tla@example.com bmi@example.com noadsorspam.com blocksads.com To import aliases In the Control Center, click Settings >...
50 Configuring email settings Configuring local domains Configuring local domains On the Local Domains page, you can view, add, edit, and delete local domain names and email addresses for which inbound messages are accepted. You can also import lists of local domains formatted as described in this section. Work with local domains Use these procedures to manage local domains.
Note: If entries in the import file do not match the required file format, you can download a file containing the unprocessed entries. Understanding spam settings The following types of spam settings are available in Symantec Mail Security for SMTP: Configuring suspected spam ■...
1 to 100 for each message, based on techniques such as pattern matching and heuristic analysis. If an email scores in the range of 90 to 100 after being filtered by Symantec Mail Security for SMTP, it is defined as spam.
You can also type a value in the box. Under Do you want to enable Language Identification, click Yes or No. Click Yes if users will use the Symantec Outlook Spam Plug-in for language identification. Built-in language identification is disabled, and can’t be accessed in the Edit Group page.
54 Configuring email settings Configuring virus settings Click Save. Configuring virus settings The following types of virus settings are available in Symantec Mail Security for SMTP: Configuring LiveUpdate ■ Excluding files from virus scanning ■ Configuring general settings ■ Configuring LiveUpdate LiveUpdate is the process by which your system receives current virus definitions from Symantec Security Response.
To receive Rapid Response updates Click Settings > Virus. Click LiveUpdate. Click Enable Rapid Response updates. Symantec Mail Security for SMTP checks every 10 minutes after this setting is saved. Click Save. Installing non-default definitions Symantec Mail Security for SMTP employs the Intelligent Updater in order to update virus definitions.
By default, when an email message arrives addressed to your domain, but is not addressed to a valid user, Symantec Mail Security for SMTP passes the message to the internal mail server. The internal mail server may either accept the...
Configuring container settings When Symantec Mail Security for SMTP processes certain zip files and other types of compressed files, these files can expand to the point where they deplete system memory. Such container files are often referred to as “zip bombs.”...
You can specify this size threshold and the maximum extraction level that Symantec Mail Security for SMTP will process in memory, as well as a time limit for scanning containers. If the configured limits are reached, Symantec Mail Security for SMTP will automatically perform the action designated for the “unscannable”...
Page 59
Configuring email settings Configuring scanning settings maximizes the effect of content filtering, it can also impact the system load and slow down email filtering. To check attachments that are not plain text against your dictionaries Click Settings > Scanning. In Content Filtering Settings, check Enable searching of non-plain text attachments for words in dictionaries.
Symantec Mail Security for SMTP provides a wide variety of actions for filtering email, and allows you to either set identical options for all users, or specify different actions for distinct user groups.
Page 62
Mass-mailing worm Email is flagged because it contains a mass-mailing worm, based on current virus filters from Symantec. Unscannable for viruses Email is flagged because it exceeds the container limits configured on the Scanning Settings page, or because it is unscannable for other reasons, such as malformed MIME attachments.
Page 63
Configuring email filtering About email filtering Table 4-1 Filtering verdicts by category (Continued) Filtering Category Verdict Description Attachment type Email is flagged because it contains a specific attachment type. Attachment content Email is flagged because specific text appears in a specific frequency in its attachments.
Page 64
64 Configuring email filtering About email filtering The following table shows the filtering actions available for each verdict. Note: See “Notes on filtering actions” on page 66 for additional limitations. Table 4-2 Filtering actions by verdict Action Description Verdict ● ●...
Page 65
● ● ● Deliver message to the Deliver the message to end-user Spam folder(s). Requires recipient’s Spam folder use of the Symantec Spam Folder Agent for Exchange or the Symantec Spam Folder Agent for Domino. ● ● ● ● ●...
66 Configuring email filtering About email filtering Table 4-2 Filtering actions by verdict (Continued) Action Description Verdict ● Treat as a blocked Process the message using the action(s) specified in the sender domain-based Blocked Senders List. Applies even if the domain-based Blocked Senders List is disabled, and applies to inbound messages only.
Defining a Group Policy, the administrator assigns members then selects the new virus policy. An email message is received whose recipients include someone in the new Group Policy. Symantec Mail Security for SMTP cleans the message, annotates it, then sends a notification to its intended recipients.
Page 68
68 Configuring email filtering About email filtering The following table lists the limitations on combining actions. Table 4-3 Compatibility of filtering actions by verdict Action Compatibility with other actions Can be added multiple times? Add a header Any except Delete the message Add annotation Any except Delete the message One for header or one for...
Configuring email filtering About email filtering Table 4-3 Compatibility of filtering actions by verdict (Continued) Action Compatibility with other actions Can be added multiple times? Reject SMTP Can’t be used with other actions connection Remove invalid Any except Delete the message recipients Route the message Any except Delete the message...
70 Configuring email filtering About email filtering Security risks Symantec Mail Security for SMTP can detect security risks. Security risks are programs that do any of the following: Provide unauthorized access to computer systems ■ Compromise data integrity, privacy, confidentiality, or security ■...
Configuring email filtering About email filtering Table 4-4 Security risk categories included in spyware or adware verdict Category Description Remote access Programs that let a remote user gain access to a computer over the programs Internet to gain information, attack, or alter the host computer. Spyware Stand-alone programs that can secretly monitor system activity and detect passwords and other confidential information and then relay the...
Also, lists that you create have precedence over lists created by Symantec. However, third party DNS blacklists do not have priority over all Symantec lists. In the event of a conflict between Open Proxy Senders and an entry from a DNS blacklist, Open Proxy Senders will “win.”...
Page 73
Configuring email filtering Creating groups and adding members Note: To edit a group member, such as to correct a typo, delete the member and add the member again. There is no edit button for group members. To create a new Group Policy In the Control Center, click Policies >...
Page 74
74 Configuring email filtering Creating groups and adding members These examples are not valid, and won’t match any users: domain.* @domain.* dom*.com sub*.domain.com Check the box next to one or more LDAP groups. ■ The LDAP groups listed on this page are loaded from your LDAP server. “Configuring LDAP settings”...
Assigning filter policies to a group Note: The maximum number of entries in the Members list for a Group Policy is 10,000. If you require more than 10,000 entries, contact your Symantec representative for instructions on how to configure MySQL and Tomcat to support more entries.
Page 76
76 Configuring email filtering Assigning filter policies to a group Table 4-5 Virus categories and default actions (Continued) Category Default action Spyware or adware Prepend [SPYWARE OR ADWARE INFECTED] to Subject: header. Suspicious attachments Inbound message: Strip and hold message in Suspect Virus Quarantine.
Configuring email filtering Assigning filter policies to a group Outbound suspicious attachment message policy ■ Outbound spyware/adware message policy ■ Optionally, click View next to any policy to view details of that policy. Click Save. Note: You cannot change virus policy details from the Edit Group page. See “Creating virus policies”...
78 Configuring email filtering Assigning filter policies to a group Note: You cannot change spam policy details from the Edit Group page. See “Creating spam policies” on page 85 for information about creating or editing spam policies. Selecting compliance policies for a group By associating an appropriate compliance policy with a group, you can check messages for attachment types, keywords, or regular expressions.
The login and password for end users is the same as their LDAP login and password. For information about supported browsers, see the Symantec Mail Security for SMTP Installation Guide. Note: End users are limited to a total of 200 entries in their combined Allowed Senders and Blocked Senders Lists.
English and Spanish messages, or block messages in English and Spanish and allow messages in all other languages. Note: If the Language tab in the Edit Group page is inaccessible, the Symantec Outlook Spam Plug-in has been enabled. To disable support for the Outlook Plug-in and enable support for built-in language identification, set Language Identification to No on the Spam Settings page.
If you chose the second or third option, check the box for each desired language. Click Save. Note: The language identification technology employed by Symantec Mail Security for SMTP to identify the language of a message is not foolproof. Note that messages identified to be in a disallowed language are deleted.
82 Configuring email filtering Creating virus, spam, and compliance filter policies Add or delete members or change filtering actions for this Group Policy as you did when you created it. See “Add or remove members from a group” page 72 for more information. To enable a Group Policy ◆...
Configuring email filtering Creating virus, spam, and compliance filter policies Table 4-6 Policy status page (Continued) Column Description Number of Groups Number of groups that this policy has been used in Creating virus policies Using the Virus Policies page, you can add, edit, copy, delete, and enable or disable virus policies.
Page 84
If a message contains a The message contains an attachment that, according to suspicious attachment Symantec filters, may contain a virus or other threat. If a message contains The message contains spyware or adware. spyware or adware Select the desired action.
Configuring email filtering Creating virus, spam, and compliance filter policies deleted. You may want to change the default setting for unscannable messages if you are concerned about losing important messages. See Table 4-5, “Virus categories and default actions,” on page 75. Creating spam policies Using the Spam Policies page, you can add, edit, copy, delete, and enable or disable spam policies.
86 Configuring email filtering Creating virus, spam, and compliance filter policies Select the desired action. Table 4-2, “Filtering actions by verdict,” on page 64. For some actions you need to specify additional information in fields that appear below the action. Click Add Action.
Page 87
Sieve scripts cannot be imported, including those created in previous ■ versions of Symantec or Brightmail software. There is no limit to the number of conditions per compliance policy. ■ Conditions can’t be nested.
Page 88
88 Configuring email filtering Creating virus, spam, and compliance filter policies Adding conditions to compliance policies Refer to the following tables when creating your compliance policy. Table 4-7 describes the conditions available when creating a compliance policy. Table 4-7 Compliance conditions Condition Test against Examples...
Page 89
Configuring email filtering Creating virus, spam, and compliance filter policies Table 4-7 Compliance conditions (Continued) Condition Test against Examples For all messages All email not filtered by a higher (Not applicable) precedence policy is flagged. For example, if a message matches a spam, virus, sender group, or higher precedence compliance policy, it won’t match the “For all messages”...
Page 90
90 Configuring email filtering Creating virus, spam, and compliance filter policies Table 4-8 shows the additional fields available when you add a condition. Table 4-8 Additional fields for adding conditions Condition Information required Attachment content, Bcc: Choose one of three options: address, Body, Cc: address, Click the first radio button, choose contains or does ■...
Page 91
Configuring email filtering Creating virus, spam, and compliance filter policies Table 4-9 Filter tests (Continued) Test type Description Ends with/does not Equivalent to .*text$ wildcard test using matches exactly. end with Matches exactly/ Exact match for the supplied text (not available for the message does not match body).
Page 92
Note: Symantec Mail Security for SMTP uses two different types of analysis in scanning for messages that match your criteria. If you specify a condition using a regular expression, a regular expression analysis is performed. If you specify a condition using a keyword or dictionary, a text search is performed.
Click Enable or Disable. Managing Email Firewall policies Symantec Mail Security for SMTP can detect patterns in incoming messages to thwart certain types of spam and virus attacks. You can block and allow messages based on email addresses, domains, or IP address. Messages can be...
Symantec. Sender authentication provides a way to block forged email. Configuring attack recognition Symantec Mail Security for SMTP can detect the following types of attacks originating from a single SMTP server (IP address). Directory harvest Spammers employ directory harvest attacks to find valid attacks email addresses at the target site.
“Enabling and disabling end user settings” on page 79. Alternatively, you can deploy the Symantec Outlook Spam Plug-in. With the Symantec Outlook Spam Plug-in, users can easily create personal lists of blocked and allowed senders from within their Outlook mail client. The Plug-in imports information from the Outlook address book to populate the personal Allowed Senders List.
Page 96
96 Configuring email filtering Managing Email Firewall policies Symantec Mail Security for SMTP lets you customize spam detection in the following ways: Define Allowed Senders ■ Symantec Mail Security for SMTP treats mail coming from an address or connection in an Allowed Senders List as legitimate mail. As a result, you ensure that such mail is delivered immediately to the inbox, bypassing any other filtering.
Page 97
If your mail volume is sufficiently high, running incoming mail through a third party database could hamper performance because of the requisite DNS lookups. Symantec recommends that you use the Sender Reputation Service lists instead of enabling third party lists.
Page 98
Lists and Blocked Senders Lists. Domain-based: specify sender addresses or domain names ■ Symantec Mail Security for SMTP checks the following characteristics of incoming mail against those in your lists: MAIL FROM: address in the SMTP envelope. Specify a pattern that ■...
Page 99
IP-based: specify IP connections ■ Symantec Mail Security for SMTP checks the IP address of the mail server initiating the connection to verify if it is on your Allowed Senders Lists or Blocked Senders Lists. Wildcards are not supported. Although you can use network masks to indicate a range of addresses, you cannot use subnet masks that define non-contiguous sets of IP addresses (e.g.
Page 100
Click one of the Blocked Sender groups. Click Add. On the Add Sender Group Members page, supply the information appropriate for the current Blocked Sender group. “How Symantec Mail Security for SMTP identifies senders and connections” on page 98. Click Save.
Page 101
You may need to periodically disable and then re-enable senders from your list for troubleshooting or testing purposes or if your list is not up to date. Symantec Mail Security for SMTP will treat mail from a sender that you’ve disabled just as it would any other message.
Page 102
102 Configuring email filtering Managing Email Firewall policies Click one of the Blocked or Allowed Sender groups, depending on the list that you want to work with. A red x in the Enabled column indicates that the entry is currently disabled. A green check mark in the Enabled column indicates that the entry is currently enabled.
Page 103
Configuring email filtering Managing Email Firewall policies After the header, each line contains exactly one attribute, along with a ■ corresponding pattern. Empty lines or white spaces are not allowed. ■ Lines beginning with # are ignored. ■ Entries terminating with the colon-dash pattern ( ) are disabled;...
Page 104
“Format of allowed and blocked sender file” on page 102. Symantec Mail Security for SMTP merges data from the imported list with the existing sender information. Click Save. Exporting sender information You can export to a single file all the information in your Allowed Senders Lists and Blocked Senders Lists.
Symantec Mail Security for SMTP checks the sending IP address against the published DNS record for the named mail server. If the DNS record includes a hard outbound email policy (one that requires compliance), and it does not match the sending IP address, the specified action is taken on the message.
106 Configuring email filtering Managing policy resources If you add Sender Authentication domains, it’s best to specify the highest level domain possible, such as example.com, because subdomains of the specified domain will also be tested for compliance. Warning: Authenticating all domains can lead to significant unnecessary processing load.
Page 107
Configuring email filtering Managing policy resources annotation may be a legal disclaimer or text necessary to comply with government or corporate policy, such as “All email sent to or from this email system may be retained and/or monitored.” How plain text and HTML text is added to messages When specifying an annotation, a plain text version is required, and an HTML version is optional.
Page 108
108 Configuring email filtering Managing policy resources notification. See “Adding and editing notifications” on page 114 for instructions. When you specify the action to add an annotation in a policy, you can choose ■ to prepend the annotation to the beginning of the message body, or append the annotation to the end of the message body.
X-archive: messages followed by your text. The header may be useful to sort X-archive: archived messages when viewing them with an email client. However, Symantec Mail Security for SMTP itself does not use the header. If multiple X-archive:...
110 Configuring email filtering Managing policy resources policies result in archiving the same message, each unique header is X-archive: added to the message. For example, the following archive tag: Docket 53745 adds the following header to the message when it is archived: X-archive: Docket 53745 To specify an archive tag When configuring a virus, spam, or compliance policy, click the Archive the...
Page 111
Configuring email filtering Managing policy resources Add Attachment List page. For the last three choices, all characters are interpreted literally; wildcards are not allowed. Table 4-15 Attachment characteristics for attachment lists Characteristic Description Examples True file type Specifies an attachment type based on direct Microsoft Word for Windows inspection of the type of file.
A dictionary is a list of words, phrases, or both that messages are checked against when you choose the Any part of the message condition in a compliance policy. Symantec Mail Security for SMTP evaluates matches to a dictionary using substring text analysis, not regular expression analysis.
Page 113
When adding words to a dictionary, keep in mind that some words can be ■ considered both profane and legitimate, depending on the context. Symantec Mail Security does not search for dictionary matches in the HTML ■ headers or tags of HTML messages or HTML attachments.
114 Configuring email filtering Managing policy resources Click Save. Editing a dictionary Edit an existing dictionary to add or delete keywords. To edit a dictionary In the Control Center, click Policies > Dictionaries. Click the dictionary that you want to edit. Add or delete keywords as desired.
Page 115
Configuring email filtering Managing policy resources Under Send to, check one or more of the following: Sender Check this box to send the notification to sender listed in the message envelope (not the sender listed in the From: header). Recipients Check this box to send the notification to the recipients listed in the message envelope (not the recipients listed in the To: header).
Spam Quarantine provides storage of spam messages and Web-based end-user access to spam. Use of Spam Quarantine is optional. Quarantined messages and associated databases are stored on the Control Center. Symantec recommends Spam Quarantine for user populations of 30,000 users or less.
118 Working with Spam Quarantine Working with messages in Spam Quarantine for administrators Note: To understand how Spam Quarantine handles messages sent to distribution lists or aliases, see “Notification for distribution lists/aliases” page 130. Working with messages in Spam Quarantine for administrators This section describes how Spam Quarantine works for administrators.
Page 119
This also removes the message from Spam Quarantine. Depending on how you configured Spam Quarantine, a copy of the message may also be sent to an administrator email address (such as yourself), Symantec, or both. This allows the email administrator or Symantec to monitor the effectiveness of Symantec Mail Security for SMTP.
Page 120
120 Working with Spam Quarantine Working with messages in Spam Quarantine for administrators To search messages Click Show Filters to search messages for a specific recipient, sender, ◆ subject, message ID, or date range. “Searching messages” on page 123. To navigate through messages Click one of the following buttons to navigate through message list pages: ◆...
Working with Spam Quarantine Working with messages in Spam Quarantine for administrators Differences between the administrator and user message list pages The pages displayed for administrators and other users on your network have the following differences. Users can only view and delete their own quarantined messages. Quarantine ■...
Page 122
This also removes the message from Spam Quarantine. Depending on how you configured Spam Quarantine, a copy of the message may also be sent to an administrator email address (such as yourself), Symantec, or both. This allows the email administrator or Symantec to monitor the effectiveness of Symantec Mail Security for SMTP.
Working with Spam Quarantine Working with messages in Spam Quarantine for administrators To display full headers To display all headers available to Spam Quarantine, click Display Full ◆ Headers. The full headers may provide clues about the origin of a message, but keep in mind that spammers usually forge some of the message headers.
Page 124
124 Working with Spam Quarantine Working with messages in Spam Quarantine for administrators To search message envelope “To” recipient Type in the To box to search the message envelope : recipient in all ◆ RCPT TO messages for the text you typed. You can search for a display name, the user name portion of an email address, or any part of a display name or email user name.
Page 125
Working with Spam Quarantine Working with messages in Spam Quarantine for administrators To search using time range Choose a time range from the Time Range list to show all messages from ◆ that time range. Search details The search function is optimized for searching a large number of messages. However, this can lead to unexpected search results.
126 Working with Spam Quarantine Configuring Spam Quarantine The amount of time required for the search is dependent on how many ■ search boxes you filled in and the number of messages in the current mailbox. Searching in the administrator mailbox will take longer than searching in a user’s mailbox.
Working with Spam Quarantine Configuring Spam Quarantine Under Policy name, type Spam Quarantine or a descriptive name of your choice. Under Apply to, click Inbound messages. Under Groups, check the box next to the groups that should have their email quarantined.
By default, when users click on the Need help logging in? link on the Control Center login page, online help from Symantec is displayed in a new window. You can customize the login help by specifying a custom login help page. This change only affects the login help page, not the rest of the online help.
If users or administrators find false positive messages in Spam Quarantine, they can click Release. Clicking Release redelivers the selected messages to the user’s normal inbox. You can also send a copy to a local administrator, Symantec, or both. Note: If you are quarantining messages flagged by content compliance filters, you should copy a local administrator who can review the misidentified messages and make appropriate changes to the content compliance filters.
When Symantec Mail Security for SMTP forwards a spam message sent to a distribution list to Spam Quarantine, the message is not delivered in the intended recipients’...
Page 131
Working with Spam Quarantine Configuring Spam Quarantine If the Include View link box is selected, recipients of the notification digest can view all the quarantined distribution list messages. If the Include Release link box is selected, recipients of the notification digest can release quarantined distribution list messages.
Page 132
132 Working with Spam Quarantine Configuring Spam Quarantine Changing the notification digest templates The notification digest templates determine the appearance of notification messages sent to users as well as the message subject and send from address. The default notification templates are similar to the text listed below. The distribution list notification template lacks the information about logging in.
Page 133
Working with Spam Quarantine Configuring Spam Quarantine Table 5-1 Notification Message Variables Variable Description %USER_NAME% User name of user receiving the notification message. To edit the notification templates, digest subject, and send from address In the Control Center, click Settings > Quarantine. If needed, click on the Spam tab.
Page 134
134 Working with Spam Quarantine Configuring Spam Quarantine To enable notification for distribution lists In the Control Center, click Settings > Quarantine. If needed, click on the Spam tab. Under Notification Settings, click Notify distribution lists. Click Save on the Quarantine Settings page. Selecting the notification digest format The notification digest template determines the MIME encoding of the notification message sent to users as well as whether View and Release links...
Working with Spam Quarantine Configuring Spam Quarantine released from Spam Quarantine and sent to the user’s normal inbox. This check box is only available if you choose Multipart (HTML and text) or HTML only notification format. If you remove the variable from the notification digest %NEW_QUARANTINE_MESSAGES% template, the new message summary, including the Release links, won’t be...
136 Working with Spam Quarantine Configuring Spam Quarantine Choose the desired setting from the Quarantine Expunger frequency drop- down list. Choose the desired setting from the Quarantine Expunger start time drop- down lists. Click Save. Specifying Spam Quarantine message and size thresholds To limit the number of messages in Spam Quarantine or size of Spam Quarantine, configure Spam Quarantine threshold settings.
Working with Spam Quarantine Configuring Spam Quarantine Click Save. Note: No alert or notification occurs if Spam Quarantine thresholds are exceeded. However, you can be alerted when disk space is low, which may be caused by a large number of messages in the Spam Quarantine database. For more information about alerts, see “Configuring alerts and logs”...
Page 138
138 Working with Spam Quarantine Configuring Spam Quarantine from the Scanner to Spam Quarantine are larger than the standard packet size used by MySQL (1 MB). com.mysql.jdbc.PacketTooBigException: Packet for query is too large (3595207 > 1048576) at com.mysql.jdbc.MysqlIO.send(MysqlIO.java:1554) at com.mysql.jdbc.MysqlIO.send(MysqlIO.java:1540) at com.mysql.jdbc.MysqlIO.sendCommand(MysqlIO.java:1005) at com.mysql.jdbc.MysqlIO.sqlQueryDirect(MysqlIO.java:1109) at com.mysql.jdbc.Connection.execSQL(Connection.java:2030)
Page 139
Undeliverable quarantined messages go to Spam Quarantine postmaster If Spam Quarantine can’t determine the proper recipient for a message received by Symantec Mail Security for SMTP, it delivers the message to a postmaster mailbox accessible from Spam Quarantine unless you have specified Delete message sent to unresolved email addresses in Settings >...
Page 140
In the left pane, click Active Directory Schema to select it. Click Action > Operations Master. Check the check box for The Schema may be modified on this Domain Controller. If replication to the Global Catalog cannot be modified as described above, contact your Symantec representative for a work-around.
Page 141
Working with Spam Quarantine Configuring Spam Quarantine Duplicate messages appear in Spam Quarantine You may notice multiple copies of the same message when logged into Spam Quarantine as an administrator. When you read one of the messages, all of them are marked as read.
Page 142
142 Working with Spam Quarantine Configuring Spam Quarantine...
Chapter Working with Suspect Virus Quarantine This chapter includes the following topics: About Suspect Virus Quarantine ■ Accessing Suspect Virus Quarantine ■ Configuring Suspect Virus Quarantine ■ About Suspect Virus Quarantine The Suspect Virus Quarantine provides short-term storage of messages that are suspected to contain viruses.
144 Working with Suspect Virus Quarantine Accessing Suspect Virus Quarantine administrators with full privileges or Manage Quarantine rights (View or Modify) can make all Quarantine setting changes. Users with only 'view' rights for manage quarantine will see the 'Settings' tab, but cannot make changes to those settings, and they cannot release or delete messages.
Page 145
Working with Suspect Virus Quarantine Accessing Suspect Virus Quarantine To redeliver misidentified messages Click on the check box to the left of a misidentified message and then click ◆ Release to redeliver the message to the intended recipient. This also removes the message from Suspect Virus Quarantine. Note: Releasing messages requires access to the IP address of the Control Center.
146 Working with Suspect Virus Quarantine Accessing Suspect Virus Quarantine Go to next page of messages Choose up to 500 pages before or after the current page of messages To set the entries per page On the Entries per page drop-down list, click a number. ◆...
Page 147
Working with Suspect Virus Quarantine Accessing Suspect Virus Quarantine To search message envelope “To” recipient Type in the To box to search the message envelope : recipient in all ◆ RCPT TO messages for the text you typed. You can search for a display name, the user name portion of an email address, or any part of a display name or email user name.
148 Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine containing emerson, Emerson, and eMERSOn would all be displayed in the search results. The amount of time required for the search is dependent on how many ■ search boxes you filled in and the number of messages in the current mailbox.
Page 149
Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine To configure the size for your Suspect Virus Quarantine Click Settings > Quarantine. Specify your desired values for the options provided in Maximum size of suspect virus quarantine. The default is 10 GB.
Page 150
150 Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine...
Verifying filtering to the Spam Quarantine ■ The following are sample tests by which you can verify that Symantec Mail Security for SMTP is filtering your email as intended. Use these tests as models for additional tests that you can perform periodically.
152 Testing Symantec Mail Security for SMTP Testing antivirus filtering To test spam filtering with subject line modification Create a POP3 account on your MDA. For the SMTP Server setting on this account, specify the IP address of an enabled Scanner.
Verifying filtering to the Spam Quarantine If you configure Symantec Mail Security for SMTP to forward spam messages to Spam Quarantine as described below, you should see spam messages when you enter the Spam Quarantine. There can be a slight delay until the first spam message arrives, depending on the amount of spam received at your organization.
Page 154
154 Testing Symantec Mail Security for SMTP Verifying filtering to the Spam Quarantine http://www.example.com/url-1.blocked/ Send the message. Send a message to the same account that is not spam and that does not contain any viruses. In the Control Center, click the Spam Quarantine tab and click Search.
■ Configuring logs ■ Configuring alerts Alerts are email notifications sent automatically by Symantec Mail Security for SMTP to inform system administrators of conditions potentially requiring attention. You can choose the types of alerts sent, the header shown in From: alerts, and which administrators receive them.
Page 156
Alert settings (Continued) Alert setting Explanation New virus rules are An alert is sent because new virus rules are available for download from Symantec available Security Response. New virus rules are updated daily, Rapid Response rules are updated hourly. A message queue is larger...
Configuring alerts and logs Viewing logs Configure alerts Follow these procedures to configure alerts. To specify which administrators receive alerts In the Control Center, click Administration. In the Administrators list, click the name of an administrator. Under Administrator, check or uncheck Receive alert notifications. Click Save.
Page 158
158 Configuring alerts and logs Viewing logs Table 8-2 View Logs page (Continued) Item Description Time range (drop-down) Select a time range from the list or create a custom time range. If you have recently changed time zones on the Control Center, this change is not reflected immediately, but requires you to stop and restart Tomcat or to reboot the system.
Display, wait a few minutes then click Display again. Configuring logs You can configure log settings for Symantec Mail Security for SMTP components on each Scanner in your system. The severity of errors you want written to the log files can be chosen for the following components: Conduit ■...
Page 160
160 Configuring alerts and logs Configuring logs Table 8-3 Log Settings page – Local Log Type (Continued) Item Description Mail Transfer Agent Set the logging level for the Mail Transfer Agent. Apply to All Hosts Apply these log settings to all hosts in your system. Maximum log size If desired, set the maximum size for logs.
Page 161
Configuring alerts and logs Configuring logs For more information, see “Message tracking” on page 184. Warning: Because logging data for each message can impair system performance, you should use this feature judiciously. To configure log settings for remote hosts In the Control Center, click Settings > Logs. Click the Remote tab.
Page 162
162 Configuring alerts and logs Configuring logs...
■ Scheduling reports to be emailed ■ About reports Symantec Mail Security for SMTP reporting capabilities provide you with information about filtering activity at your site, including the following features: Analyze consolidated filtering performance for all Scanners and investigate ■...
The third column lists the reporting data that you must instruct Symantec Mail Security for SMTP to track before you can generate the specified report. You can choose from a selection of reports, all of which can be customized to include specific date ranges, time period grouping per row, and email delivery.
Page 165
Working with reports Choosing a report Table 9-1 Available Message reports (Continued) Report Type: Displays... Required Report Data Storage Options (Reports Settings Page) Top Sender Domains from which the most messages have been processed. For each Sender domains Domains domain, the total processed and number of virus and spam messages are listed.
Page 166
166 Working with reports Choosing a report Table 9-2 Available Virus reports Report Type: Displays... Required Report Data Storage Options (Reports Settings Page) Overview A summary of total messages that matched for each virus type. For each None grouping, the virus to total processed percentage, total processed, and number of virus, suspected virus, worm, unscannable, scan error, malware (spyware/adware), encrypted attachment, and malformed MIME messages are listed.
Page 167
Working with reports Choosing a report Table 9-2 Available Virus reports (Continued) Report Type: Displays... Required Report Data Storage Options (Reports Settings Page) Top Recipients Email addresses for which the most virus messages have been detected. For Recipients, each email address, the virus to total processed percentage, total Recipient domains processed, and number of virus, worm, and unscannable messages are listed.
Page 168
168 Working with reports Choosing a report Table 9-3 Available Spam reports (Continued) Report Type: Displays... Required Report Data Storage Options (Reports Settings Page) Top Sender SMTP HELO domain names from which the most spam messages have Sender HELO HELO Domains been detected.
Page 169
Working with reports Choosing a report Table 9-4 Available Content Compliance reports (Continued) Report Type: Displays... Required Report Data Storage Options (Reports Settings Page) Top Sender Domains from which the most compliance matches have been detected. For Sender domains Domains each domain, the total messages processed and number and percentage of content compliance policies triggered are listed.
Page 170
170 Working with reports Choosing a report Table 9-5 Available Attack reports Report Type: Displays... Required Report Data Storage Options (Reports Settings Page) Overview Total messages processed and number and percentage of directory harvest, None spam, and virus attacks versus messages processed. Top Directory IP addresses from which the most directory harvest attacks have been Sender IP...
Page 171
Working with reports Choosing a report Table 9-6 Available Sender Authentication reports (Continued) Report Type: Displays... Required Report Data Storage Options (Reports Settings Page) Top Succeeded Email addresses from which the most successful sender authentication Senders Senders attempts have been detected. For each email address, the total messages processed and number and percentage of successful sender authentication attempts versus authentication attempts are listed.
20 items. Selecting report data to track By default, Symantec Mail Security for SMTP tracks data for several basic reports. Before you can generate other reports, you must configure Symantec Mail Security for SMTP to track and store data appropriate for the report. For...
Setting the retention period for report data Setting the retention period for report data You can specify the number of days or weeks that Symantec Mail Security for SMTP should keep track of report data. Depending on your organization’s size and message volume, the disk storage requirements for reports data could be quite large.
174 Working with reports Saving and editing Favorite Reports To specify a different time period, click Customize, and then click in ■ the Start Date and End Date fields and use the popup calendar to graphically select a time range. You must have JavaScript enabled in your browser to use the calendar.
■ For example, perhaps you specified a recipient address that received no mail during the specified period, for a Specific Recipients report. Symantec Mail Security for SMTP is configured to keep data for that report ■ type. “Selecting report data to track”...
Internet address. Reports presented in local time of Control Center Symantec Mail Security for SMTP stores statistics in the stats directory on the individual hosts that run Scanners. The date and hour for each set of these statistics are recorded in Greenwich Mean Time (GMT).
Working with reports Printing, saving, and emailing reports processed count increases by 1, not 12. If a policy for any of the recipients determines that this message is spam, it will also increase the spam count by 1 for that day. The spam count will be 1 no matter how many of the recipients have policies that determine the message is spam.
Schedule, Edit, or Delete Reports Follow these steps to schedule, edit, or delete reports. To schedule a report Ensure that you have configured Symantec Mail Security for SMTP to track the appropriate data for the report. See “Selecting report data to track”...
Page 179
Working with reports Scheduling reports to be emailed In the Control Center, click Reports > Scheduled Reports. Click Add. In the Report Name box, type a name for the report. Using the procedure under “Running reports” on page 173 as a guide, select the desired report and report settings.
Page 180
180 Working with reports Scheduling reports to be emailed Click Save. To delete a scheduled report In the Control Center, click Reports > Scheduled Reports. Check the box next to the scheduled report that you want to delete, and then click Delete.
■ Getting status information Symantec Mail Security for SMTP provides a comprehensive means of checking and displaying system, host and message status. Status information is combined with options for changing what is displayed as well as with actions you can take based on the information shown.
Last 30 Days graph. Message status The following sections provide information about messages that have been processed and assigned a verdict by Symantec Mail Security for SMTP: Message details ■...
Page 183
Administering the system Getting status information Suspected Spam ■ Content Compliance ■ Columns list the numbers of messages for each of the following time periods: Past Hour ■ Past Day ■ Past Week ■ Past Month ■ Uptime: the period since the software was last started ■...
Page 184
Message Tracking logs page enables you to specify either one or two criteria and related supplementary information as follows: Host—One or more Scanners running Symantec Mail Security for SMTP. In ■ order to find all details about a message, search on all attached Scanners.
Page 185
■ software initiating the sending of the message and included as a message header. Because the Message ID is not generated by Symantec Mail Security for SMTP the uniqueness of the ID cannot be guaranteed. At times, distributors of spam have used this header to mask the identity of a message originator.
186 Administering the system Getting status information View or search the message audit log Follow these procedures to view or search the message audit log. To view message tracking information In the Control Center, click Status > Message Tracking. ◆ To search information in the message audit log In the Control Center, click Status >...
Administering the system Getting status information To enable or disable the Conduit, Live Update, Filter Engine or MTA Select a host and click the Status link which reports either Running or ◆ Stopped depending on the status of the service being selected. This will take you to the Services page in Editing Scanners.
188 Administering the system Managing Scanners Log details You can examine performance logs for Scanners and the Control Center. Log data is based on time range, log type, and error severity. See “Viewing logs” page 157. Scanner replication Status information is available to show you your most recent replication activity.
Administering the system Managing Scanners Editing Scanners Once you set up a Scanner, you can go back and edit the configuration. For example, you can suspend the flow of mail or enable different components and services. Edit a scanner Follow either of these procedures to edit a scanner. To edit a Scanner In the Control Center, click Settings >...
190 Administering the system Managing Scanners Disable or enable a Scanner Follow these procedures to disable or enable a Scanner. To disable a Scanner In the Control Center, click Settings > Hosts. A red x ( ) in the Enabled column indicates that the Scanner is disabled. A green check mark ( ) in the Enabled column indicates that the Scanner is enabled.
Administering the system Administering the system through the Control Center To delete a Scanner In the Control Center, click Settings > Hosts. Check the box next to the scanner you want to delete. Click Delete. Administering the system through the Control Center The following administrative tasks can be performed through the Control Center:...
The following sections describe common Control Center administrative tasks. Starting and stopping the Control Center The Control Center is configured to start when Symantec Mail Security for SMTP is turned on and to stop when it is shut down. However, there may be times when you need to manually stop and later start the Control Center, such as to investigate a problem.
194 Administering the system Administering the Control Center Checking the Control Center error log Periodically, you should check the Control Center error log. All errors related to the Control Center are written to the file. Follow the BrightmailLog.log procedure at the end of this section to view it. Each problem results in a number of lines in the error log.
BrightmailLog.log described below. To increase the detail of logging messages saved into BrightmailLog.log Open the following file in a text editor such as WordPad or vi: On Solaris or Linux: /opt/Symantec/SMSSMTP/tomcat/webapps/brightmail/WEB-INF/ classes/log4j.properties On Windows: C:\Program \ WEB-INF\classes\log4j.properties Find the following line: #log4j.rootLogger=WARN, file...
Starting and stopping UNIX and Windows services Although you should perform routine administration using the Control Center, you may occasionally need to start and stop Symantec Mail Security for SMTP services outside of the Control Center. For example, the Control Center itself can’t be stopped using the Control Center.
Page 197
Administering the system Starting and stopping UNIX and Windows services Table 10-1 Windows services Service display Service short name Process in Task Description name Manager SMS IPlanet SMSIPLANETCNASVC iPlanet_CNA.exe Tracks changes in Notification iPlanet/Sun ONE for Agent SyncService SMS Live BMIJLUSVC jlu-controller.exe Downloads updated virus...
For example: /etc/init.d/bcc stop Periodic system maintenance System maintenance of the Symantec software should be done as part of your regular server maintenance schedule, including the tasks below. Backing up logs data In general, there is no reason to store stale logs. For troubleshooting purposes,...
MySQL. Or you can backup each database separately. If you have a large number of messages in Spam Quarantine, backing up may take some time. Backups can be done while the Symantec software is running. MySQL must be running when you perform backups. For complete instructions on performing backups of MySQL data, see MySQL documentation.
Maintaining adequate disk space Use standard file system monitoring tools to verify that you have adequate disk space. Remember that the storage required by certain Symantec Mail Security for SMTP features, such as extended reporting data and Spam Quarantine, can...
About email filtering and message handling options ■ All users will find significant new features in this release of Symantec Mail Security for SMTP. You will also find familiar features, in many cases improved and expanded. In some cases the names of features are the same; in some cases the names have changed, and the changes are noted in this appendix.
New features for all users New features for all users Table A-1 lists features that are new for both Symantec Mail Security for SMTP users and Symantec Brightmail Antispam users. Table A-1 New features for Symantec Mail Security for SMTP and Symantec Brightmail Antispam...
Changes for Symantec Mail Security for SMTP users For users of Symantec Mail Security for SMTP 4.1, Version 5.0 provides a host of expanded and improved capabilities. In addition to the new features listed in Table A-1, additional new features for Symantec Mail Security for SMTP users...
Settings > Virus > Exclude Scanning tab Routing Settings > Hosts > Edit > SMTP tab Discontinued features The following Symantec Mail Security for SMTP 4.1 features are not included in Symantec Mail Security for SMTP 5.0: Auto-generated whitelist ■...
Changes for Symantec Brightmail Antispam users Although the product name has changed, if you were a Symantec Brightmail Antispam user you will find the user interface for Symantec Mail Security for SMTP 5.0 quite familiar. Most features are named similarly, and the organization of the user interface is quite similar.
About email filtering and message handling options In Symantec Mail Security for SMTP 5.0, there are five types of choices you can make about filtering options. These choices provide much greater flexibility,...
Page 207
Sender Groups: Manage three types of Allowed Sender Lists, specify ■ actions for three types of Blocked Senders Lists, and enable or disable three Symantec-managed Reputation Service lists. Policy Resources: Create sets of data that enable further customization of ■...
Page 208
208 Feature Cross-Reference About email filtering and message handling options...
■ About foldering and the plug-in This chapter tells you how to install and configure the Symantec Outlook Spam Plug-in and spam foldering agents for Microsoft Exchange and Lotus Domino users. The Symantec Outlook Spam Plug-in is an alternative to the personal Allowed Senders and Blocked Senders Lists and language preferences offered by the Control Center.
Installing the Symantec Outlook Spam Plug-in Installing the Symantec Outlook Spam Plug-in The Symantec Outlook Spam Plug-in makes it easy for Outlook users to submit missed spam and false positives to Symantec. Depending on how you configure the plug-in, user submissions can also be automatically sent to a local system administrator.
Page 211
After performing a simple installation process, users will have a new toolbar in their Outlook window: This is Spam Users click this button to submit the message to Symantec Security Response and move it from their Inbox to their Spam folder...
NT, Windows 2000, Windows XP, and Windows 2003. Note: If you are using Symantec Spam Folder Agent for Exchange, the plug-in retrieves the name of the spam folder from the Symantec Spam Folder Agent for Exchange Inbox Rule. Absent the Symantec Spam Folder Agent for Exchange, the plug-in retrieves the value from the Windows registry.
Page 213
(optional) Open the setup.ini file for editing. This file contains the initial settings for launching the Symantec Outlook Spam Plug-in installation package. All the settings you need to use can be set on the CmdLine attribute in the [Startup] section at the beginning of the setup.ini file.
Page 214
214 Spam foldering and the Symantec Outlook Spam Plug-in Installing the Symantec Outlook Spam Plug-in Table B-1 Symantec Outlook Spam Plug-in setup variables (Continued) Variable Name Description ALLOWED_CONTACTS If set to 1 (the default) or any non-zero value, treat all entries of the Outlook Contacts folder as members of the Allowed Senders List.
Page 215
Spam foldering and the Symantec Outlook Spam Plug-in Installing the Symantec Outlook Spam Plug-in Table B-1 Symantec Outlook Spam Plug-in setup variables (Continued) Variable Name Description DISPLAY_ARE_YOU_SURE_MSGS Specifies whether the confirmation dialog is displayed after a message is submitted. If this variable is set to 1 (the default value) the confirmation message will be displayed.
Page 216
216 Spam foldering and the Symantec Outlook Spam Plug-in Installing the Symantec Outlook Spam Plug-in Table B-1 Symantec Outlook Spam Plug-in setup variables (Continued) Variable Name Description MODIFY_OPTIONS If set to 1 (the default) or any non-zero value, allow users to view/edit the Submissions and Preferences tabs.
Follow these steps to configure the Symantec Spam Folder Agent for Exchange. Note: Symantec Mail Security for SMTP does not support native spam foldering for Exchange 2003. As an alternative, you can deploy the Symantec Spam Folder Agent for Exchange on Exchange 2003 systems.
When all worker threads have completed, the maintenance flag will be marked as completed. When the time has passed the maintenance end hour, the maintenance flag is reset. If the Symantec Spam Folder Agent for Exchange is restarted during the maintenance window, it will rerun maintenance immediately.
Page 219
Spam foldering and the Symantec Outlook Spam Plug-in Configuring automatic spam foldering After reading the license agreement, click I accept the terms of the license agreement, and then click Next. The Preparing to Install panel is displayed. Complete all prerequisite steps if you haven’t already done so.
Page 220
Domino distributes changes to all other mail servers in your environment as part of the Design task, which runs overnight. The Symantec Spam Folder Agent for Domino will not be visible on each user’s mail file until the following conditions occur: Replication distributes the change to the template on the user’s home mail...
Spam foldering and the Symantec Outlook Spam Plug-in Enabling automatic spam foldering Uninstalling the Symantec Spam Folder Agent for Domino Use the following procedure to uninstall the Symantec Spam Folder Agent for Domino. To uninstall the Symantec Spam Folder Agent for Domino Click Domino Agent in the Installer screen.
222 Spam foldering and the Symantec Outlook Spam Plug-in Enabling language identification Enabling language identification Symantec Mail Security for SMTP must be configured to work with the client- side language processing offered by the Symantec Outlook Spam Plug-in. “Enabling and disabling end user settings”...
Interpreting events in the Information Manager ■ About Symantec Security Information Manager In addition to using the Symantec Mail Security for SMTP logging features, you can also log events to the Symantec Security Information Manager appliance for event management and correlation. Symantec Security Information Manager...
For more information about interpreting events in the Information Manager and on the event management capabilities of the Information Manager, see the Symantec Security Information Manager documentation. Symantec Mail Security for SMTP can send the following types of events to the Information Manager: Firewall events ■...
Configuring data sources You must configure the following data sources on the Information Manager to receive events from Symantec Mail Security for SMTP. You can add a new sensor for each data source. Once you have configured these sources, you must distribute the configuration to the Collector for it to take effect.
Dynamic Filename & Monitor in Real Time Firewall events that are sent to the Information Manager Table C-4 lists the firewall events that Symantec Mail Security for SMTP can send to the Information Manager. Table C-4 Firewall events that are sent to the Information Manager...
Permit definition update Message events that are sent to the Information Manager Table C-6 lists the message events that Symantec Mail Security for SMTP can send to the Information Manager. Table C-6 Message events that are sent to the Information Manager...
228 Integrating Symantec Mail Security with Symantec Security Information Manager Interpreting events in the Information Manager Administration events that are sent to the Information Manager Table C-7 lists the administration events that Symantec Mail Security for SMTP can send to the Information Manager.
Page 229
Integrating Symantec Mail Security with Symantec Security Information Manager Interpreting events in the Information Manager Table C-7 Administration events that are sent to the Information Manager Event ID Severity Rule Description Event class (SES_EVENT_<Unique ID>) (Reason sent) SES_EVENT_CONFIGURATION_CHANGE Informational symc_config_update...
Page 230
230 Integrating Symantec Mail Security with Symantec Security Information Manager Interpreting events in the Information Manager...
Modifying notification files The notification files are located at: C:\Program Files\Symantec\SMSSMTP\scanner\etc\ Windows UNIX /opt/Symantec/SMSSMTP/scanner/etc/ The notification file used by Symantec Mail Security for SMTP depends on your locale: Notification.en_US.UTF-8.xml US English Notification.ja_JP.UTF-8.xml Japanese Notification.xml Default for locales that aren’t US English or Japanese...
ISO 8859 http://www.czyborra.com/charsets/iso8859.html. Note: The Notification.xml file also contains a content-transfer-encoding element. However, it is not used. Symantec Mail Security for SMTP chooses the encoding method (quoted-printable or base64) that results in the shortest message. Editing messages in the notification file The notification messages can be edited.
Notification file contents This section shows the full contents of the Notification.en_US.UTF-8.xml file which contains text for notifications issued by Symantec Mail Security for SMTP as it sidelines and processes messages. The other notification files are similar. You can modify certain text in elements as described in the <advisory>...
Page 234
Notification file contents <advisory name="cant_scan_oless_corrupted_sentence"> The Microsoft document <t name="file_name"/> was not scanned because it is corrupted (Symantec decomposer reports <t name="error"/>). If you are able to open it, use caution when doing so as it may contain embedded files with viruses.</advisory>...
Page 235
</BODY> </HTML> ]]> </advisory> <advisory name="sender_text"> The message you sent has been processed by Symantec AntiVirus. <t name="file_actions"/> You may want to install or update antivirus software on your computer. For more information on antivirus tips and technology, visit http://www.symantec.com Headers of infected message: <t name="message_headers"/>...
Page 236
236 Editing antivirus notification messages Notification file contents </advisory> <advisory name="sender_html"> <![CDATA[ <HTML> <BODY> <P> The message you sent has been processed by Symantec AntiVirus.<BR> <BR> <PRE> ]]> <t name="file_actions"/> <![CDATA[ </PRE> <BR>You may want to install or update antivirus software on your computer.<br>...
A component of Symantec Mail Security for SMTP that facilitates communicating configuration information between the Control Center and each Scanner. Allowed Senders List In Symantec Mail Security for SMTP, a list of senders whose messages are omitted from most types of filtering (but not from virus filtering). annotation A phrase or paragraph placed at the beginning or end of the body of an email message.
Page 238
Blocked Senders List. You can configure how messages from blocked senders are handled. Blocked Senders List A list used by Symantec Mail Security for SMTP in filtering email. Email from senders on a Blocked Senders List is processed according to your configuration choices.
Page 239
A list of words and phrases against which email messages can be checked for non- compliant content. Symantec Mail Security for SMTP allows you to create Content Compliance filters that screen email against a specific dictionary. You can use the provided dictionaries, add terms to the provided dictionaries, or add additional dictionaries.
Page 240
In Symantec Mail Security for SMTP, a set of actions that apply to a category of messages. The actions specified in a filter policy are only applied to users who are members of a Group Policy that includes the filter policy. There are three types of filter policies: spam, virus, and content compliance policies.
Page 241
(for example, 123.45.6.24). language identification In Symantec Mail Security for SMTP, a feature that allows you to block or allow messages written in a specified language. For example, you can choose to only allow English and Spanish messages, or block messages in English and Spanish and allow messages in all other languages.
Page 242
See also LAN (local area network). notification 1. In Symantec Mail Security for SMTP, a separate email that can be automatically sent to the sender, recipients, or other email addresses when a specified condition is met. For example, if you have a policy that strips .exe attachments from incoming messages, you...
Page 243
Part of the Sender Reputation Service, Open Proxy Senders is a sender group in Symantec Mail Security for SMTP. You can specify actions to take on messages from each sender group.
Page 244
SMTP response code to tell the sending MTA that the message is not accepted. release In Symantec Mail Security for SMTP, an action that end users or administrators can take on messages in the Spam Quarantine database. Releasing removes the message from the Spam Quarantine database and returns the message to the end user’s inbox.
Page 245
Safe Senders A list of IP addresses from which no outgoing email is spam, provided by Symantec based on data from the Probe Network. Part of the Sender Reputation Service, Safe Senders is a sender group in Symantec Mail Security for SMTP. You can specify actions to take on messages from each sender group.
Page 246
A collection of one or more computers hosting Symantec Mail Security for SMTP, in which exactly one computer hosts a Control Center, and one or more computers host Scanners. If the site consists of one computer, that computer will include the Control Center and a Scanner.
Page 247
A list of IP addresses from which virtually all of the outgoing email is spam, identified by Symantec based on data from the Probe Network. Part of the Sender Reputation Service, Suspected Spammers is a sender group within Symantec Mail Security for SMTP. You can specify actions to take on messages from each sender group.
Page 248
The Symantec Spam Folder Agent for Domino also allows users to submit missed spam and false positives to Symantec.
Page 249
In Symantec Mail Security for SMTP, a message can be unscannable for viruses for a variety of reasons. For example, if it exceeds the maximum file size or maximum scan depth configured on the Scanning Settings page, or if it contains malformed MIME attachments, it may be unscannable.
Page 250
A series of virus-infected emails from a specific domain. Symantec Mail Security for SMTP allows you to choose an action to perform on these messages; by default messages received from violating senders are deferred.
110 advanced SMTP settings 25, 27 attachments agents determining your policy 84 Symantec Spam Folder Agent for Domino 218 use dictionaries to scan 58 Symantec Spam Folder Agent for attachments, Spam Quarantine 121 Exchange 217, 218 Audit ID 185...
Page 252
52, 80 email filtering 61 order 93 email firewall policies 93 types of tests available 90 end user experience, Symantec Outlook Spam Plug- use Perl regular expressions in 91 in 210 Control Center 12 end user settings 79 administer 193...
Page 253
52 firewall virus scanning 56 See email firewall policies host details, status 186 firewall events 226 how Symantec Mail Security appliances work 12 flow, of messages 13 HTML text foldering add to messages 107 configure 217 HTTP proxies 21...
Page 254
254 Index configure aliases and distribution lists 47 archive 109 delete senders from lists 101 configure misidentified message import aliases and distribution lists 49 submissions 129 import Local Routes list 50 configure Spam Quarantine message and size select Sender Reputation Service lists 105 thresholds 136 separate notification templates for, Spam configure Spam Quarantine message retention...
Page 255
Index details, status 183 tailor information on 183 Open Proxy Senders enable 105 Outlook Plug-in. See Symantec Outlook Spam Plug- Rapid Response. See LiveUpdate overview recipients, drop invalid ones 56 architectural 13 redeliver misidentified messages, Spam functional 12 Quarantine 119, 122...
Page 257
227 Symantec Security Information Manager (SSIM) status host information 186 integrating with 223 LDAP synchronization 187 Symantec Spam Folder Agent for Domino log information 188 configure 218 overview information 182 distribute end-user help 220 processed message information 182...
Page 258
258 Index log details 188 virus definitions system administrator. See administrator non-default 55 system locale 44 virus filters system maintenance 198 configure virus settings 54 create virus policies 83 LiveUpdate 54 Suspect Virus Quarantine 143 tests virus 54 anti-virus filtering 152 virus scanning delivery of legitimate mail 151 exclude files from 55...
Need help?
Do you have a question about the 10490452 - Mail Security 8220 and is the answer not in the manual?
Questions and answers