Securing, Protecting, and Managing the Flow of Corporate Communications
|
|
- Darren Wood
- 5 years ago
- Views:
Transcription
1 Securing, Protecting, and Managing the Flow of Corporate Communications Getting mailflow right Dave Stork Technical Consultant OGD ict-diensten QR: URL to Presentation
2 Who am I? Dave Stork Technical OGD ict-diensten Based in The Netherlands (EU) Microsoft Office Apps and Services MVP Mail: dave.stork@ogd.nl Blog: Interesting Facts: Science & Sci-Fi nut I co-wrote/tech reviewed books!
3 Topics A short SMTP intro Filtering mail Securing mail transport Encrypting mail Spoofing and how to mitigate Q & A
4 A short SMTP intro
5 Definitions Banner EHLO/HELO EHLO Response MAIL FROM: RCPT TO: DATA Includes mail headers
6 SMTP delivery Message Headers Received: from dc10 ( ) by mail.lab2010.com ( ) with Microsoft SMTP Server id ; Mon, 23 Apr :00: From: Subject: spoof test To: Return-Path:
7 Filtering mail
8 Filtering mail Some spam filtering concepts: Recipient filtering Tar pitting Reverse DNS Connection/content filtering...
9 Filtering mail Best practice: Use a cloud provider! Exchange Online Protection, MessageLabs, Etc. Why? They take care of most things faster than most admins It s an arms race; machine learning based on big data
10 Securing mail transport
11 SMTP TLS Transport Opportunistic TLS Best effort encryption: fallback to lower or unencrypted SMTP Certificate based EHLO response with server FQDN; i.e. mail.contoso.com Certificate name must be equal to EHLO Certificate does not have to be trusted
12 SMTP TLS Transport Mutual TLS / Domain Security Forced authentication & encryption: no fallback Certificate based Configured per mail domain (connectors for each domain) Trusted certificate with name corresponding with EHLO
13 SMTP TLS Transport DANE DNS-Based Authentication of Named Entities (DANE); RFC7672 Certificate based Ensures mail server target found in DNS is correct (and not spoofed via DNS cache poison etc) DNSSEC required Prevents downgrade attacks of SMTP TLS (for instance due to MitM attack) No Trusted Certificate required
14 SMTP TLS Transport What is SMTP Strict Transport Security? Uses DNS to check list of valid public keys of certificate: TXT record under _smtp_sts.contoso.com Checks certificate with list & Certificate Authority + Trust-on-First- Use Failure reporting & handling No DNSSEC required: little bit less secure as DANE Can we use it? Currently a protocol draft at the IETF: draft-margolis-smtp-sts-00
15 Encrypting mail
16 S/MIME User level signing or signing and encryption of individual mails Certificate based Sender & receiver require each others public key before encryption is possible Limited client compatibility Cumbersome configuration and required on each client Solutions that change content of mail will break S/MIME PGP has a comparable experience
17 Office 365 Message Encryption (OME) Sending encrypted mail messages Fully based on Rights Management Services/Information Protection Mail is encrypted and sent to external recipient Partner opens mail When on O365: auto decrypted When on other: hosted on O365 for viewing using OTP, other idp (Google, Yahoo, MSA). Lot of other solutions with similar experience (i.e. Egress, open source)
18 OME
19 OME
20 OME
21 OME
22 Spoofing and how to mitigate
23 What is spoofing? The creation of messages with a forged sender address Organizational mitigations: SPF DKIM DMARC Results in Authenticated mail
24 SMTP delivery Message Headers Received: from dc10 ( ) by mail.lab2010.com ( ) with Microsoft SMTP Server id ; Mon, 23 Apr :00: RFC5322.From From: Subject: spoof test To: Return-Path: RFC5321.From
25
26 What does SPF do? Sender Policy Framework Public list of servers that are allowed to mail for your domain Public as in: Public DNS TXT record Recipient servers can check AT CONNECTION whether incoming IP is on that allow list Based on domain from MAIL FROM or EHLO Recipient organization may choose to receive, quarantine or reject those mails
27 SPF Syntax Action + Pass (default, can be omitted) - Fail ~ Softfail? Neutral Match IP4 IP6 A MX INCLUDE ALL Ipv4 address or range Ipv6 address or range DNS A records for domain DNS MX records for domain Include spf of other domain Always matches (catch all).
28 SPF Syntax Example v=spf1 ip4: include:spf.protection.outlook.com include:servers.mcsv.net ~all (OGD.nl) v=spf1 mx a: ip4: include:_spf.intermax.nl all (Tweede Kamer) v=spf1 all (aivd.nl) Max 10 DNS lookup, cumulative (include, MX etc. included) When Include fails; no negative effect Max string length of TXT record is 255 bytes
29 SPF Caveats You have to know every mail server that uses your domain Mailing services like MailChimp, SaaS Legitimate forwarding could be broken i.e. Mailinglists No protection to From: header spoofing (RFC5322.From) Subdomains require explicit SPF record
30 SPF Caveats: forwards EHLO contoso.com MAIL FROM: RCPT TO: From: EHLO fabrikam.com MAIL FROM: RCPT TO: From: Mitigation in Fabrikam could be Sender Rewriting Scheme
31 What does DKIM do? DomainKeys Identified Mail Signs messages leaving the organization Private/Public Key construction Signed with Private Key Recipient organization verifies with Public Key Public Key information in public DNS record This way recipients know: Domain owner takes responsibility If message has been changed in transit
32 DKIM in DNS <selector>._domainkey.contoso.com TXT Includes public key CNAME Other record, for instance: selector1-contosocom._domainkey.contoso.onmicrosoft.com You can have multiple selectors either TXT or CNAME
33 DKIM Syntax
34 What does DMARC do? Domain-based Message Authentication, Reporting & Conformance Checks incoming mail based on RFC5322.From domain This is what users see in Display Name etc.. Includes results from SPF and DKIM checks Sender organization can suggest actions when SPF and/or DKIM fail Sender organization can receive reports Subdomains can have different policy from main domain
35 DMARC in DNS Txt record in the form of _dmarc.your_domain.com. Subdomain first checks subdomain dns, if not present on subdomain, uses organizational > _dmarc.service.marketing.ogd.nl If not existing > _dmarc.ogd.nl If no dns record is found, dmarc check is skipped.
36 Tag Short description Value Required?/default V Protocol version, for now its version 1 DMARC1 Required P Policy for organizational domain None, Quarantine, Reject Required SP Policy for subdomains of the organizational domain None, Quarantine, Reject Optional, if not explicitly defined SP is same as P PCT Percentage of messages subjected to filtering Optional (default is 100) FO Reporting options 0,1,d,s Optional RUF For reporting of forensic reports Mail address Optional (Required if FO= is used) RUA For reporting of aggregate reports Mail address Optional ADKIM Alignment mode for DKIM (relaxed or strict) R, S Optional / Default is Relaxed ASPF Alignment mode for SPF (relaxed or strict) R, S Optional / Default is Relaxed
37 DMARC Syntax Example v=dmarc1; p=quarantine; fo=1 v=dmarc1; p=quarantine; adkim=s; aspf=r; sp=reject; fo=1; pct=100
38 Putting SPF, DKIM and DMARC together Schematics provided by OGD ict diensten Client sends mail SPF check Extra filtering or delivery Server signs and sends the mail Internet Server receives mail deliver request DKIM check DMARC check DNS 1. Client sends a mail 2. Server signs with DKIM and sends the mail over the internet 3. Receiving server gets a connection request to accept mail 4. Starts with a SPF check 5. Simultaneously starts a DKIM check 6. Then starts with the DMARC check A. Checks DNS for DMARC policy B. Checks the results of the SPF (RFC5321.from) and DKIM (d=) with RFC5322.From C. Applies DMARC policy according to the DNS record 7. If everything passes (depending on policy) the mail gets delivered to the receiving client or is subjected to additional filtering
39 Example v=dmarc1; p=quarantine; fo=1
40 Best practices Protect all your domains, even if you don t mail from them. SPF: V=spf1 all DMARC: V=DMARC1;p=reject Protect your subdomains, even if you don t mail from them SPF: V=spf1 all DMARC: Add sp=reject on organization domain
41 Best practices Implement a process for changes to SPF, DKIM and DMARC Make sure every change goes through someone that knows how it works Do a regular check to see if SPF, DKIM and DMARC are still configured correctly Demand DKIM from mailing services (Mailchimp and the like) If not possible, consider using a subdomain for it; this way your domain can be kept strict Use at least 1024 bit strength (default in O365)
42 Best practices Make DMARC stricter after a test period. 1. P=none, sp=quarantine or reject 2. P=quarantine, sp=reject 3. P=reject Optional: Use pct to limit impact Warn users for mailinglists that do not use DKIM and/or do not use Sender Rewrite Scheme. Forwarding from Outlook or with a mail rule is no issue as the old mail is attached in new mail.
43 Not talked about: Alignment: DMARC Relaxed vs strict Relaxed = organizational domain must match (marketing.ogd.nl matches ogd.nl) Strict = FQDN must match (marketing.ogd.nl does not match ogd.nl) DKIM Alignment Make sure that mailing services sign DKIM with correct domain at d= Authenticated Received Chain (ARC) ARC preserves authentication results across subsequent intermediaries
44 Questions?
Office 365: Secure configuration
Office 365: Secure email configuration Published September 2017 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created
More informationM 3 AAWG DMARC Training Series. Mike Adkins, Paul Midgen DMARC.org October 22, 2012
M 3 AAWG DMARC Training Series Mike Adkins, Paul Midgen DMARC.org October 22, 2012 M3AAWG DMARC Training Videos (2.5 hours of training) This is Segment 3 of 6 The complete series of DMARC training videos
More informationAnti-Spoofing. Inbound SPF Settings
Anti-Spoofing SonicWall Hosted Email Security solution allows you to enable and configure settings to prevent illegitimate messages from entering your organization. Spoofing consists of an attacker forging
More informationA Federal Agency Guide to Complying with Binding Operational Directive (BOD) 18-01
Table of Contents Introduction... 2 Required Actions Overview... 2 Required Actions Email Security... 3 Required Actions Web Security... 9 Status of Implementation... 11 Roles and Responsibilities... 11
More informationM 3 AAWG DMARC Training Series. Mike Adkins, Paul Midgen DMARC.org October 22, 2012
M 3 AAWG DMARC Training Series Mike Adkins, Paul Midgen DMARC.org October 22, 2012 M3AAWG DMARC Training Videos (2.5 hours of training) This is Segment 1 of 6 The complete series of DMARC training videos
More informationbuilding an effective action plan for the Department of Homeland Security
Customer Guide building an effective action plan for the Department of Homeland Security Binding The recently issued directive from the Department of Homeland Security (DHS), Binding Operational Directive
More informationSecurity by Any Other Name:
Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko University of California, San
More informationTowards authentication
Towards email authentication TLS SPF + DKIM + DMARC 2012/10/03 Roberto Innocente 1 Who adopted it? Hotmail.com Gmail.com AOL.com Verizon.com Ebay Paypal Yahoo.com 2012/10/03 Roberto Innocente 2 Tls/SPF/DKIM/DMARC
More informationCommunicator. Branded Sending Domain July Branded Sending Domain
Branded Sending Domain Communicator Branded Sending Domain July 2017 Version 2.1 This document includes instructions on how to set up a new sender domain and ensure this is configured correctly. Contents
More informationSMTP Settings for Magento 2
For more details see the Delete Order for Magento 2 extension page. SMTP Email Settings for Magento 2 Send only reliable emails from a popular local hosting or a custom Magento 2 SMTP server. Run tests
More informationM 3 AAWG DMARC Training Series. Mike Adkins, Paul Midgen DMARC.org October 22, 2012
M 3 AAWG DMARC Training Series Mike Adkins, Paul Midgen DMARC.org October 22, 2012 M3AAWG DMARC Training Videos (2.5 hours of training) This is Segment 6 of 6 The complete series of DMARC training videos
More informationISSN: March Domain-based Message Authentication, Reporting, and Conformance (DMARC)
Independent Submission Request for Comments: 7489 Category: Informational ISSN: 2070-1721 M. Kucherawy, Ed. E. Zwicky, Ed. Yahoo! March 2015 Domain-based Message Authentication, Reporting, and Conformance
More informationDesign and Implementation of a DMARC Verification Result Notification System
Proceedings of the APAN Research Workshop 2016 ISBN 978-4-9905448-6-7 Design and Implementation of a DMARC Verification Result Notification System Naoya Kitagawa, Toshiki Tanaka, Masami Fukuyama and Nariyoshi
More informationOffice 365 Standalone Security
The standalone Email Security option is available for purchase only through the Barracuda Self-Service Gateway or Barracuda MSP. Once you complete the Essentials for Office 365 Wizard, the Essentials page
More information2016 Online Trust Audit Authentication Practices Deep Dive & Reality Check
2016 Online Trust Audit Email Authentication Practices Deep Dive & Reality Check July 20, 2016 Craig Spiezle Executive Director Online Trust Alliance https://otalliance.org/dmarc 2016 All rights reserved.
More informationDefining Which Hosts Are Allowed to Connect Using the Host Access Table
Defining Which Hosts Are Allowed to Connect Using the Host Access Table This chapter contains the following sections: Overview of Defining Which Hosts Are Allowed to Connect, page 1 Defining Remote Hosts
More informationDefining Which Hosts Are Allowed to Connect Using the Host Access Table
Defining Which Hosts Are Allowed to Connect Using the Host Access Table This chapter contains the following sections: Overview of Defining Which Hosts Are Allowed to Connect, on page 1 Defining Remote
More informationBuilding a Scalable, Service-Centric Sender Policy Framework (SPF) System
Valimail White Paper February 2018 Building a Scalable, Service-Centric Sender Policy Framework (SPF) System Introduction Sender Policy Framework (SPF) is the protocol by which the owners of a domain can
More informationSMTP Relay set up. Technical team
Technical team 09/08/2016 Summary Introduction... 3 SMTP Relay service description... 3 Presentation of our service... 4 Service set-up... 5 Infrastructure... 5 Set-up... 5 Customer sending authentication...
More informationHow to Configure Esva for Office365
How to Configure Esva for Office365 This article addresses configuring Office 365 with Libra Esva as your inbound and/or outbound mail gateway. You can specify the appliance as an inbound mail gateway
More informationMail Assure. Quick Start Guide
Mail Assure Quick Start Guide Last Updated: Wednesday, November 14, 2018 ----------- 2018 CONTENTS Firewall Settings 2 Accessing Mail Assure 3 Application Overview 4 Navigating Mail Assure 4 Setting up
More informationDMARC ADOPTION AMONG e-retailers
DMARC ADOPTION AMONG e-retailers Q1 2018 Almost 90% of Top US and EU e-retailer Domains Fail to Protect Consumers from Phishing Attacks Featuring Matthew Vernhout (CIPP/C) Director of Privacy, 250ok TABLE
More informationAutomatic Delivery Setup Guide
for GuideSpark Communicate Cloud Table of Contents Summary: Working with Automatic Email Delivery... 1 What your IT department needs to know... 2 Prerequisite: Select a Targeted Audience... 3 Enable Automatic
More informationStep 2 - Deploy Advanced Security for Exchange Server
Step 2 - Deploy Advanced Email Security for Exchange Server Step 1. Ensure Connectivity and Redundancy Open your firewall ports to allow the IP address ranges based on your Barracuda Email Security Service
More informationPROTECTION. ENCRYPTION. LARGE FILES.
NoSpamProy PROTECTION. ENCRYPTION. LARGE FILES. All features at a glance With its three modules PROTECTION, ENCRYPTION, and LARGE FILES, NoSpamProy offers reliable protection from spam and malware, secure
More informationTrendMicro Hosted Security. Best Practice Guide
TrendMicro Hosted Email Security Best Practice Guide 1 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. The names of companies,
More informationDMARC ADOPTION AMONG e-retailers
DMARC ADOPTION AMONG e-retailers Q1 2018 Almost 90% of Top US and EU e-retailer Domains Fail to Protect Consumers from Phishing Attacks Featuring Matthew Vernhout (CIPP/C) Director of Privacy, 250ok TABLE
More informationDesigning an open source DMARC aggregation tool
Research project 2 Designing an open source DMARC aggregation tool Yadvir Singh supervised by Michiel Leenaars August 17, 2016 Abstract DMARC provides a standard for interaction between a domain owner
More informationOffice 365 Inbound and Outbound SMX configuration. 4 th January 2018
Office 365 Inbound and Outbound SMX configuration 4 th January 2018 Legal Notice Copyright 2005-2018 SMX Limited. All rights reserved. The contents of this document constitute valuable proprietary and
More informationMDaemon Vs. Kerio Connect
Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS
More informationAutomatic Delivery Setup Guide
for GuideSpark Communicate Cloud Table of Contents Summary: Working with Automatic Email Delivery... 1 What your IT department needs to know... 2 Prerequisite: Select a Targeted Audience... 3 Enable Automatic
More informationTo create a few test accounts during the evaluation period, use the Manually Add Users steps.
Once you complete the Essentials for Office 365 Wizard, the Essentials page displays in Barracuda Cloud Control. Click Set up additional domains to go to the Barracuda Email Security Service Domains page,
More informationForward set up. Technical team
Forward set up Technical team 09/04/2015 Summary Introduction... 3 Forward service description... 3 Presentation of our service... 3 Service set-up... 5 Infrastructure... 5 Set-up... 5 Customer sending
More informationCiphermail Webmail Messenger Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login
More informationMDaemon Vs. IceWarp Unified Communications Server
Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS
More informationMDaemon Vs. MailEnable Enterprise Premium
Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP
More informationMDaemon Vs. MailEnable Enterprise Premium
Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP
More informationMail Assure Quick Start Guide
Mail Assure Quick Start Guide Version: 11/15/2017 Last Updated: Wednesday, November 15, 2017 CONTENTS Getting Started with Mail Assure 1 Firewall Settings 2 Accessing Mail Assure 3 Incoming Filtering 4
More informationUntitled Page. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Antispam Administration SmarterMail comes equipped with a number
More informationUsing Centralized Security Reporting
This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the
More informationFinal exam in. Web Security EITF05. Department of Electrical and Information Technology Lund University
Final exam in Web Security EITF05 Department of Electrical and Information Technology Lund University October 22 nd, 2013, 8.00-13.00 You may answer in either Swedish or English. If any data is lacking,
More informationApplications Area Working Group. Intended status: Informational. D. Kodama BIGLOBE Inc. K. Okada Lepidum Co. Ltd. July 28, 2017
Applications Area Working Group Internet-Draft Intended status: Informational Expires: January 29, 2018 G. Yasutaka Rakuten, Inc. T. Akagiri Regumi, Inc. D. Kodama BIGLOBE Inc. K. Okada Lepidum Co. Ltd.
More informationGetting Started with DMARC A Guide for Federal Agencies Complying with BOD 18-01
Getting Started with DMARC A Guide for Federal Agencies Complying with BOD 18-01 The DHS Mandate Adopt DMARC for Email Security On October 16, 2017, the U.S. Department of Homeland Security issued a Binding
More informationBest Practices. Kevin Chege
Email Best Practices Kevin Chege Why your email setup is critical Billions of SPAM emails are generated every day The tips here can help you to reduced the chances of you receiving SPAM email or inadvertently
More informationanti-spam techniques beyond Bayesian filters
anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based
More informationDomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc.
DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc. Overview of DKIM Cryptography-based protocol, signs selected header fields and message body Intended to: Enable reliable domain name
More informationUsing Trustwave SEG Cloud with Exchange Online
.trust Using Trustwave SEG Cloud with Exchange Online Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Exchange Online 2 2 Networking and DNS Setup 2 3 Provisioning Trustwave
More informationDKIM Base Issue Review IETF 66 Montréal. Eric Allman
DKIM Base Issue Review IETF 66 Montréal Eric Allman 2006-07-11 1287: Signature Removal https://rt.psg.com/ticket/display.html?id=1287 http://mipassoc.org/pipermail/ietfdkim/2006q2/003764.html Remove sentence
More informationAre You Protecting Your & Your Customers? Learnings from the 2017 OTA Trust Audit. August 1, 2017
Are You Protecting Your Email & Your Customers? Learnings from the 2017 OTA Trust Audit August 1, 2017 2017 All rights reserved. Online Trust Alliance (OTA) Slide 1 Panel Kevin Gallant Manager, Intelligence
More informationSecure the connections of mail servers
Secure the connections of mail servers STARTTLS and DANE protect email traffic on the internet Factsheet FS-2017-01 version 1.1 4 April 2017 Traditionally, connections between mail servers have hardly
More informationSymantec ST Symantec Messaging Gateway Download Full Version :
Symantec ST0-199 Symantec Messaging Gateway 10.0 Download Full Version : https://killexams.com/pass4sure/exam-detail/st0-199 QUESTION: 111 When configuring DKIM signing, how should the domain key generated
More informationSetting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
More informationHow to Configure Office 365 for Inbound and Outbound Mail
How to Configure Office 365 for Inbound and Outbound Mail You can configure Microsoft Office 365 with the Barracuda Email Security Service as your inbound and/or outbound mail gateway. If you make setting
More informationCompetitive Matrix - IRONSCALES vs Alternatives
Competitive Matrix - IRONSCALES vs Alternatives Traditional Awareness and Training Features IRONSCALES SEG PhishMe Wombat Knowbe4 Sans Institute Simulation & Training Compliance PCI/DSS, HIPAA, GLBA to
More informationFRAUD DEFENSE: How To Fight The Next Generation of Targeted BEC Attacks
EMAIL FRAUD DEFENSE: How To Fight The Next Generation of Targeted BEC Attacks Brian Westnedge bwestnedge@proofpoint.com November 8, 2017 1 2017 Proofpoint, Inc. THE BUSINESS PROBLEM BUSINESS EMAIL COMPROMISE
More informationInstallation & Configuration Guide Version 1.4
TekSMTP Installation & Configuration Guide Version 1.4 Document Revision 1.7 https://www.kaplansoft.com/ TekSMTP is built by Yasin KAPLAN Read Readme.txt for last minute changes and updates which can be
More informationMDaemon Vs. Zimbra Network Edition Professional
Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS
More informationSymantec ST0-250 Exam
Volume: 126 Questions Question No: 1 What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5? A. 80 GB B. 90 GB C. 160 GB D. 180 GB Answer: B Question
More informationSPF (Sender Policy Framework)
SPF (Sender Policy Framework) Harpreet Singh Riat (hsr22@bath.ac.uk) 1 Agenda What s SPF? Why is it needed? How does it work? Who uses it? 2 Security flaws in SMTP Flaw: SMTP allows any computer to send
More informationGetting Started with DMARC. A Guide for Federal Agencies Complying with BOD 18-01
Getting Started with DMARC A Guide for Federal Agencies Complying with BOD 18-01 The DHS Mandate - Adopt DMARC for Email Security in 90 Days On October 16, 2017, the U.S. Department of Homeland Security
More informationM 3 AAWG DMARC Training Series. Mike Adkins, Paul Midgen DMARC.org October 22, 2012
M 3 AAWG DMARC Training Series Mike Adkins, Paul Midgen DMARC.org October 22, 2012 M3AAWG DMARC Training Videos (2.5 hours of training) This is Segment 1 of 6 The complete series of DMARC training videos
More informationMDaemon Vs. SmarterMail Enterprise Edition
Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of Email Server and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3,
More informationInstructions Microsoft Outlook 2003 Page 1
Instructions Microsoft Outlook 2003 Page 1 Instructions Microsoft Outlook 2003 This manual is written for users who already have an e-mail account configured in Outlook 2003 and will therefore only focus
More informationMDaemon Vs. Kerio Connect
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS Account
More informationBased on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman
DKIM Patrik Fältström Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman September 22, 2005 1 What is Domain Keys Identified Mail? Method of using cryptographic
More informationManaging Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.
Email Defense Admin Panel Managing Spam The admin panel enables you to configure spam settings for messages. Tuning your spam settings can help you reduce the number of spam messages that get through to
More informationUsing Trustwave SEG Cloud with Cloud-Based Solutions
.trust Using Trustwave SEG Cloud with Cloud-Based Email Solutions Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Cloud-Based Email Solutions 2 2 Networking and DNS
More informationSPF classic. Przemek Jaroszewski CERT Polska / NASK The 17th TF-CSIRT and FIRST joint Event, Amsterdam, January 2006
SPF classic Przemek Jaroszewski CERT Polska / NASK The 17th TF-CSIRT and FIRST joint Event, Amsterdam, 23-25 January 2006 Agenda What is SPF and how does it work? History and current status Mitigations
More informationMDaemon Vs. SmarterMail Enterprise Edition
Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of Email Server and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3,
More informationInstructions Microsoft Outlook 2007 Page 1
Instructions Microsoft Outlook 2007 Page 1 Instructions Microsoft Outlook 2007 This manual is written for users who already have an e-mail account configured in Outlook 2007 and will therefore only focus
More informationDMARC ADOPTION AMONG
DMARC ADOPTION AMONG Top US Colleges and Universities Q1 2018 Featuring Matthew Vernhout (CIPP/C) Director of Privacy, 250ok TABLE OF CONTENTS Introduction... 03 Research Overview... 04 Top US Colleges
More informationWHITEPAPER Rewrite Services. Power365 Integration Pro
WHITEPAPER Email Rewrite Services Power365 Integration Pro Table of Contents The Challenge... 3 The Binary Tree Solution... 3 What to Expect... 3 Day 1 Email Rewrite Services... 3 Day 2 Email Rewrite Services...
More informationMDaemon Vs. Microsoft Exchange Server 2016 Standard
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS
More informationInstructions Microsoft Outlook 2013 Page 1
Instructions Microsoft Outlook 2013 Page 1 Instructions Microsoft Outlook 2013 This manual is written for users who already have an e-mail account configured in Outlook 2013 and will therefore only focus
More informationMDaemon Vs. SmarterMail Enterprise Edition
Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,
More informationCS 356 Internet Security Protocols. Fall 2013
CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5
More informationThis post documents the basic steps that should be performed after installing Exchange I perform the following steps:
Dean Suzuki Blog Title: Basic Exchange 2013 Configuration Created: 11/28/2012 Description: This post documents the basic steps that should be performed after installing Exchange 2013. I perform the following
More informationOn the Surface. Security Datasheet. Security Datasheet
Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record
More informationInstructions Eudora OSE Page 1
Instructions Eudora OSE Page 1 Instructions Eudora OSE This manual is written for users who already have an e-mail account configured in Eudora OSE and will therefore only focus on how to change the SMTP
More informationAbout Us. Overview Integrity Audit Fighting Malicious & Deceptive August 13, 2014
2014 Email Integrity Audit Fighting Malicious & Deceptive Email August 13, 2014 Craig Spiezle Executive Director & President, OTA Mike Jones Director of Product Management, Agari About Us The Online Trust
More informationInstructions Microsoft Outlook 2010 Page 1
Instructions Microsoft Outlook 2010 Page 1 Instructions Microsoft Outlook 2010 This manual is written for users who already have an e-mail account configured in Outlook 2010 and will therefore only focus
More informationDMARC ADOPTION AMONG. SaaS 1000 Q Featuring Matthew Vernhout (CIPP/C) Director of Privacy, 250ok
DMARC ADOPTION AMONG SaaS 1000 Q1 2018 Featuring Matthew Vernhout (CIPP/C) Director of Privacy, 250ok TABLE OF CONTENTS Introduction... 03 Research Overview... 04 SaaS 1000... 05 DMARC Adoption Among SaaS
More informationIntroduction to Network. Topics
Introduction to Network Security Chapter 7 Transport Layer Protocols 1 TCP Layer Topics Responsible for reliable end-to-end transfer of application data. TCP vulnerabilities UDP UDP vulnerabilities DNS
More informationDMARC ADOPTION AMONG
DMARC ADOPTION AMONG Top US Colleges and Universities Q1 2018 Featuring Matthew Vernhout (CIPP/C) Director of Privacy, 250ok TABLE OF CONTENTS Introduction... 03 Research Overview... 04 Top US Colleges
More informationMDaemon Vs. Microsoft Exchange Server 2016 Standard
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS
More informationFireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.
Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which
More informationTeach Me How: B2B Deliverability in a B2C World
Teach Me How: B2B Deliverability in a B2C World Chris Arrendale CEO & Principal Deliverability Strategist Inbox Pros (www.inboxpros.com) @Arrendale Agenda - Outline Delivery versus Deliverability Provisioning
More informationMDaemon Vs. SmarterMail Enterprise Edition
Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,
More informationBEST PRACTICES FOR PERSONAL Security
BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple
More informationDMARC ADOPTION AMONG. SaaS 1000 Q Featuring Matthew Vernhout (CIPP/C) Director of Privacy, 250ok
DMARC ADOPTION AMONG SaaS 1000 Q1 2018 Featuring Matthew Vernhout (CIPP/C) Director of Privacy, 250ok TABLE OF CONTENTS Introduction... 03 Research Overview... 04 SaaS 1000... 05 DMARC Adoption Among SaaS
More informationImplementation Guide for Delivery Notification in Direct
Implementation Guide for Delivery Notification in Direct Contents Change Control... 2 Status of this Guide... 3 Introduction... 3 Overview... 3 Requirements... 3 1.0 Delivery Notification Messages... 4
More informationConnecting to Mimecast
Page 1 of 5 0 KBID10577 Connecting to Mimecast Congratulations and welcome to Mimecast! Thank you for making the choice to move your email management to the cloud with the Mimecast Unified Email Management
More informationHandling unwanted . What are the main sources of junk ?
Handling unwanted email Philip Hazel Almost entirely based on a presentation by Brian Candler What are the main sources of junk email? Spam Unsolicited, bulk email Often fraudulent penis enlargement, lottery
More informationDKIM Implementation How
DKIM Implementation How Murray S. Kucherawy Principal Engineer, Cloudmark June 8, 2009 Planning Your Deployment Selecting Key Rotation Policy How long do your keys live? Similar in nature to your password
More informationExtract of Summary and Key details of Symantec.cloud Health check Report
SYMANTEC.CLOUD EXAMPLE HEALTH CHECK SUMMARY REPORT COMPUTER SECURITY TECHNOLOGY LTD. 8-9 Lovat lane, London, London. EC3R 8DW. Tel: 0207 621 9740. Email: info@cstl.com WWW.CSTL.COM Customer: - REDACTED
More informationSecurity and Privacy
E-mail Security and Privacy Department of Computer Science Montclair State University Course : CMPT 320 Internet/Intranet Security Semester : Fall 2008 Student Instructor : Alex Chen : Dr. Stefan Robila
More informationVersion SurfControl RiskFilter - Administrator's Guide
Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with
More informationDNS Management Guide. Read our Blog: View our support site:
DNS Management Guide Read our Blog: http://inside.123-reg.co.uk/ View our support site: http://123-support.co.uk/ Follow us on Twitter: https://twitter.com/123reg Contents What is DNS? 3 What are subdomains?
More informationThe Anti-Impersonation Company. Date: May 2 nd, ValiMail. All Rights Reserved. Confidential and Proprietary.
The Email Anti-Impersonation Company Date: May 2 nd, 2017 Email: I need you, but I don t trust you 3 90%+ of cyber attacks start with a phish 4 Anyone can send email in your name Your Company 3 rd -Party
More informationWeCloud Security. Administrator's Guide
WeCloud Security Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security provides a variety of useful features within a user-friendly web console to manage the functions including
More information