IBM Proventia Network Mail Security System. Administrator Guide. Version 1.6. IBM Internet Security Systems

Size: px
Start display at page:

Download "IBM Proventia Network Mail Security System. Administrator Guide. Version 1.6. IBM Internet Security Systems"

Transcription

1 IBM Proventia Network Mail Security System Administrator Guide Version 1.6 IBM Internet Security Systems

2 Copyright IBM Corporation 2006, IBM Global Services Route 100 Somers, NY U.S.A. Produced in the United States of America. All Rights Reserved. IBM and the IBM logo are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. ADDME, Ahead of the threat, BlackICE, Internet Scanner, Proventia, RealSecure, SecurePartner, SecurityFusion, SiteProtector, System Scanner, Virtual Patch, X-Force and X-Press Update are trademarks or registered trademarks of Internet Security Systems, Inc. in the United States, other countries, or both. Internet Security Systems, Inc. is a wholly-owned subsidiary of International Business Machines Corporation. Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in the United States, other countries, or both. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. Disclaimer: The information contained in this document may change without notice, and may have been altered or changed if you have received it from a source other than IBM Internet Security Systems (IBM ISS). Use of this information constitutes acceptance for use in an AS IS condition, without warranties of any kind, and any use of this information is at the user s own risk. IBM Internet Security Systems disclaims all warranties, either expressed or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall IBM ISS be liable for any damages whatsoever, including direct, indirect, incidental, consequential or special damages, arising from the use or dissemination hereof, even if IBM Internet Security Systems has been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by IBM Internet Security Systems. The views and opinions of authors expressed herein do not necessarily state or reflect those of IBM Internet Security Systems, and shall not be used for advertising or product endorsement purposes. Links and addresses to Internet resources are inspected thoroughly prior to release, but the ever-changing nature of the Internet prevents IBM Internet Security Systems, Inc. from guaranteeing the content or existence of the resource. When possible, the reference contains alternate sites or keywords that could be used to acquire the information by other methods. If you find a broken or inappropriate link, please send an with the topic name, link, and its behavior to support@iss.net. September 25, 2008

3 Contents Preface Overview How to Use the Appliance Documentation Getting Technical Support Part I: Network Setup Chapter 1: Getting Started Overview How the Appliance Works License Keys Backing Up Configuration Settings Opening Ports on the Firewall Appliance Passwords Date and Time Settings Routing Modes Network Interface Settings Deleting Self-Signed SSL Certificates in Firefox 3.x Chapter 2: SMTP Settings Overview About SMTP Mail Routing Using Transport Layer Security (TLS) Certificates to Establish Secure Connections Defining System Accounts Managing Messages in the SMTP Server Queues Section A: Inbound SMTP Configuration Overview Configure SMTP Settings for the Appliance to Receive Messages Configuring DNSBL Settings to Block Suspicious Messages Configuring Recipient Verification to Block Messages for Unknown Users Enabling Host Reputation Filters to Filter Incoming Spam Section B: Outbound SMTP Configuration Overview Configuring SMTP Settings for Outgoing Messages Chapter 3: Clusters Overview About Clusters Creating a New Cluster Adding an Appliance to an Existing Cluster Changing Passphrases or IP Addresses IBM Proventia Network Mail Security System Administrator Guide, Version 1.6 3

4 Contents Part II: Policy Configuration Chapter 4: Policy Settings Overview Enabling Policy Rules for Processing Messages Defining Valid Recipients of Messages (Who Objects) LDAP Integration (Directory Objects) Who Object Verification Tool Running Policy Rules (When Objects) Using Conditions for a Policy Rule Applying Responses to Inspected Messages Chapter 5: Spam Settings Overview Spam Analysis Modules Bayesian Filter Spam Flow Control Setting Up End-User Spam Management Accounts Chapter 6: Message Queues Overview Setting Up Directories that Store Archived or Quarantined Messages Searching for Messages in the Message Storage Directories Running Queries to Locate Messages in a Message Storage Directory Tracking Messages Deleting Undelivered Messages and Log Files from the Appliance Database Chapter 7: Reports Overview Generating a Predefined Report Scheduling When to Run Predefined Reports from the Appliance Defining Recipients of a Quarantine Report Customizing the Quarantine Report Part III: Maintenance Chapter 8: Updates Overview Updating the Appliance Configuring Automatic Updates Scheduling a One-Time Firmware Installation Rolling Back Updates Using Advanced Parameters for Update Settings Chapter 9: System Backups Overview Options for Backing Up the Appliance Backing Up Configuration Settings Making Full System Backups Configuring an FTP Server for Data Backup Scheduling Administrative Tasks from the Mail Security Policy Backing Up the Appliance s Log Files Using System Tools Reinstalling the Appliance IBM Internet Security Systems

5 Contents Chapter 10: Alerts and Logs Overview Configuring Alert Logging for and SNMP Alerts Managing System-Related Events Enabling Alerts and Logging for Intrusion Prevention Settings Viewing Log Files for the Appliance Deleting Undelivered Messages and Log Files from the Appliance Database Backing Up the Appliance s Log Files Appendixes Appendix A: End-User Spam Management Overview Browsing a Quarantine Store for Blocked Messages Adding or Deleting Entries from a Personal Block or Allow List Changing a Password on a Personal Block or Allow List Account Requesting a Quarantine Report on Blocked Messages Appendix B: Advanced Parameters Overview Advanced Parameter Overview General Advanced Parameters for the Appliance Advanced Parameters for the SMTP Settings Advanced Parameters for the Mail Security Policy Advanced Parameters for LDAP Directory Servers Advanced Parameters for the DNS Blacklist (DNSBL) Check Advanced Parameters for the Message Storage Directories Advanced Parameters for a Replication of a Cluster of Appliances Advanced Parameters for End-User Access Appendix C: IBM SiteProtector System Integration Overview The SiteProtector System Overview Integrating the Appliance with the SiteProtector System Appendix D: Safety, Environmental, and Electronic Emissions Notices Overview Index IBM Proventia Network Mail Security System Administrator Guide, Version 1.6 5

6 Contents 6 IBM Internet Security Systems

7 Preface Overview This guide contains information about using the IBM Proventia Network Mail Security System appliance. Scope This guide helps you use and manage the protection features of the appliance to meet your specific mail security requirements. It also helps you update and maintain the appliance for optimum performance. Audience This guide is intended for two types of users: The Administrator The local end user The following table shows the task each user performs: User Performs the following tasks: The Administrator Configures and manages SMTP servers Manages local end-user accounts and licensing Configures mail security policies Configures accounts for the local end user to manage personal block and allow lists Generates predefined reports on message usage on the network Schedules updates to the spam database Manages the appliance from the IBM SiteProtector system The local end user Accesses and browses through their spam messages Creates and manages personal block and allow lists Generates a daily quarantine report of spam messages Table 1: User tasks IBM Proventia Network Mail Security System Administrator Guide, Version 1.6 7

8 Preface How to Use the Appliance Documentation This guide provides information on how to use the appliance. Using this guide This guide is organized according to the workflow needed to protect your internal mail servers from being overwhelmed by large amounts of spam: Workflow Part I, Network Setup Part II, Policy Configuration Part III, Maintenance Appendixes Description Set up the appliance on the network as an SMTP relay server between the internal mail server and the corporate firewall Configure mail security policies that monitor mail traffic flow through the appliance Perform scheduled maintenance, such as product updates and log maintenance, as well as tasks such as troubleshooting and performing unscheduled maintenance Provide end-user spam management capabilities, tune appliance and policy settings, and configure IBM SiteProtector management Table 2: Mail security workflows in the Administrator Guide Related publications The following publications provide more information about the appliance: Document IBM Proventia Network Mail Security System Getting Started Guide IBM Proventia Network Mail Security System Getting Started Guide for VMware Workstation IBM Proventia Network Mail Security System Help Readme file Contents This guide provides information on how to set up the hardware version of the appliance. This guide provides information on how to set up the appliance on VMware. The online Help is accessed from the Proventia Manager or the Management Interface, and provides information on how to use features of the appliance while you are in the application. This file provides the most current information about product issues and updates, including how to contact Technical Support. Table 3: Reference documentation Version of the SiteProtector system You can manage your Mail Security appliance through a SiteProtector Console. The information in this guide about the SiteProtector system refers to IBM Proventia Management SiteProtector 2.0, Service Pack 7.0. Licensing agreement For licensing information on IBM Internet Security Systems products, download the Licensing agreement at contracts_landing.html. 8 IBM Internet Security Systems

9 Getting Technical Support Getting Technical Support IBM ISS provides technical support through its Web site and by or telephone. The IBM ISS Web site The IBM Internet Security Systems (IBM ISS) Resource Center Web site at ibm.com/services/us/index.wss/offerfamily/iss/a provides direct access to user documentation, current versions listings, detailed product literature, white papers, and the Technical Support Knowledgebase. Hours of support The following table provides hours for Technical Support at the Americas and other locations: Location Americas All other locations Hours 24 hours a day Monday through Friday, 9:00 A.M. to 6:00 P.M. during their local time, excluding IBM ISS published holidays Note: If your local support office is located outside the Americas, you may call or send an to the Americas office for help during off-hours. Table 4: Hours for technical support IBM Proventia Network Mail Security System Administrator Guide, Version 1.6 9

10 Preface 10 IBM Internet Security Systems

11 Part I Network Setup

12

13 Chapter 1 Getting Started Overview This chapter describes how to start using the appliance after you have configured initial network settings. In this chapter This chapter contains the following topics: Topic Page How the Appliance Works 14 License Keys 17 Opening Ports on the Firewall 20 Appliance Passwords 22 Date and Time Settings 23 Routing Modes 24 Network Interface Settings 25 Deleting Self-Signed SSL Certificates in Firefox 3.x 27 13

14 Chapter 1: Getting Started How the Appliance Works The appliance functions as a store-and-forward SMTP relay server by observing mail traffic that passes through it, and inspecting the content of messages with a set of policy rules configured by the Administrator. Inbound SMTP relay Unlike other SMTP relays, the appliance does not forward messages directly to internal mail servers. Instead, it stores incoming messages in a local directory until the messages have been processed and analyzed as defined by the policy rules in place. Once messages are considered clean, the appliance releases those messages from the directory, and then relays them to internal destination servers where users connect to access their accounts. Outbound SMTP relay The Administrator should also set up the appliance to inspect outgoing messages from the network to make sure the appliance doesn t end up becoming an open relay for unauthorized users and spammers. The appliance will either relay the outgoing messages to external mail domains via SMTP directly to responsible servers on the Internet, or will forward the messages to another mail relay. Key concepts The following concepts represent the core functionality of the appliance: Inbound SMTP relay is only allowed for the domains you host. Outbound SMTP relay is allowed to any domain. The appliance must not be set up as an open SMTP relay that can be used by unauthorized users or spammers. Remote users and servers can establish secure connections with the appliance using TLS certificates. Contents of a mail security policy The Administrator configures a mail security policy that contains a set of rules defining how the appliance should inspect and control both incoming and outgoing messages. Policy objects A policy is a combination of the following objects (or instructions): Object Who When Preconditions Responses Analysis Modules Action Purpose What address/group or domain name with corresponding IP addresses applies to this rule? When is this rule valid? Did any prior rule set a flag for the message? What should be done with the message? What content will be handled or inspected in the message? What action should take place against the message? Table 5: Contents of a policy 14

15 How the Appliance Works Policy elements At a minimum, a policy should contain the following elements: At least two Who objects At least one Analysis Module and Action or one Response and Action Using reports You use predefined reports to understand your mail security status by monitoring traffic flow within the appliance, identifying the top senders and internal recipients of spam-based s, and by tuning your policy settings. You can also set up the appliance to generate and send quarantine reports to end users who have been notified that they are a recipient of quarantined messages. The appliance provides a default template with a list of macros for you to use as a basis for the report. VMware or hardware version You can run the appliance on a VMware workstation using a VMware image provided by IBM ISS or you can deploy a hardware version of the appliance on your network. If you are using the... VMware version Hardware version Then... Make sure you have consulted the Getting Started Guide for VMware Workstation on the IBM ISS Documentation Web site at for installation procedures. Make sure you have consulted the Getting Started Guide included in the appliance package or on the IBM ISS Documentation Web site at for installation procedures. Table 6: Types of Getting Started Guides for the appliance Standard network setup The following diagram illustrates how you would set up the appliance (VMware workstation or the hardware version) between the corporate firewall and the internal mail server on the network: Figure 1: Standard network setup for the appliance 15

16 Chapter 1: Getting Started Alternate network setup The following diagram illustrates how you could set up the appliance (VMware workstation or the hardware version) between an SMTP relay and an internal mail server on your network: Figure 2: Alternate network setup for the appliance 16

17 License Keys License Keys The appliance requires license key(s) in order for you to download and install updates to the mail security database (signatures, heuristics, etc.). One of the license keys is for antispam updates and the other license key is for antivirus updates. Ordering license keys When a Registered End User orders the license key(s) from IBM ISS, they will receive an message containing order confirmation information and instructions for registering, generating, and downloading the license key(s). Downloading licensing keys The Registered End User will need to follow these steps in order to download the license keys from the License Registration Center: 1. Go to the IBM ISS License Registration Center at 2. Enter the order confirmation number (OCN) and the password provided in the message. 3. Optional: Complete the survey. 4. The key is generated and ready for download. 5. Download the key to a temporary directory on your computer. License key settings You use the Licensing page in Proventia Manager (Updates > Status & Licensing) to view information about the current status of the license keys, including expiration dates. Additionally, this page lets you view information about how to acquire current license keys. You can view information for each license key you purchase for your appliance. The following table describes the licensing information for each license key: Setting Serial Number OCN Expiration Maintenance Expiration Description The serial number of the license key. Each license key has its own serial number, unique to the Identity and the OCN. The Order Confirmation Number (OCN) or your customer number with IBM ISS. The date the license key expires, in the yyyy-mm-dd format: The date the maintenance agreement expires, in the yyyy-mmdd format: Table 7: License key settings Procedure 1. In the navigation pane, click Updates, and then Status & Licensing. 2. Click the Licensing tab. 3. Click Install a new license key. 4. Locate the license key file that you downloaded. 17

18 Chapter 1: Getting Started 5. Click Install Key. The appliance installs the license key file in the appropriate directory. 18

19 Backing Up Configuration Settings Backing Up Configuration Settings The process for updating your appliance is designed to keep your appliance up-to-date while taking the precautionary action of backing up your system before you install updates that alter original configuration settings. Snapshot files Create a settings snapshot file of your appliance s original configuration settings before you apply firmware updates or change your configuration settings. You can also create additional settings snapshot files later if you want to use different configuration settings or test new policy settings for the appliance. Site certificate issues with Firefox 3.x If you import and install a backup file that you have previously saved, you may receive a site certificate security warning when you first try to open Proventia Manager or access the End-User Login/Authentication site using the Firefox 3.x browser. You will need to close your Firefox session after you import and install the backup, and then open a new Firefox session to delete the self-signed certificate. See Deleting Self- Signed SSL Certificates in Firefox 3.x on page 27 for more information. Default settings file FactoryDefault.settings contains the original appliance settings. Procedure 1. In the navigation pane, click Backup & Restore, and then click System. 2. Click Manage Configuration Backups. 3. In the Configuration Backups section, choose an option: If you want to... Create a snapshot file Restore a snapshot file Delete a snapshot file Upload a snapshot file Download a snapshot file Then Click New. 2. Type a name for the snapshot file, and then click Create. Select the snapshot file you want to restore, and then click Restore. Select the snapshot file you want to delete, and then click Delete. 1. Click New. 2. Type the name of the snapshot file you want to upload, and then click Upload. Select the snapshot file you want to download, and then click Download to copy the file to your local computer. 19

20 Chapter 1: Getting Started Opening Ports on the Firewall You will need to open ports on your corporate firewall that enable the appliance to communicate with external servers. Important: The firewall settings affect the availability of a service on the appliance. Make sure you have enabled the services correctly for each of the appliance s interfaces (ETH0 - ETH3). Configuring the ETH1 interface You will need to re-route mail traffic through the appliance, before it can inspect all incoming mail and then forward the clean mail on to internal mail servers. Make sure the ETH1 interface is configured as the default gateway IP address for the appliance. You can set up the appliance to receive mail traffic by changing the MX record of your DNS server to resolve to the appliance s IP address, or you can create a rule on your firewall that routes all mail traffic to the appliance. Figure 3: Network interfaces Procedure 1. In the navigation pane, click System, and then click Firewall. 2. Verify the services for the appliance are enabled correctly or are accessible: Service Port Number Service Description SMTP (for sending and receiving messages) TCP 25 (inbound and outbound) Enables SMTP accessibility for the following uses: To the Internet for outgoing mail relay usage From the Internet to receive mails from the Internet To all configured internal mail servers HTTPS (for Management) TCP 43 Enables the proxy server to authenticate end-user spam management SSH (for appliance Console access) TCP 22 Enables an SSH client (for example, PuTTY) to connect to the appliance from a command line 20

21 Opening Ports on the Firewall Service (Continued) Port Number Service Description HTTPS (only if end-user access is enabled) TCP 4443 Enables the end user to access End-User Account Authentication pages for the following purposes: Access their spam messages Browse through quarantined messages Manage their block and allow lists Generate a daily report of spam messages SNMP GET (only if SNMP is enabled) UDP 160 Enables you to set up alerts that notify you of the status of the appliance Database Access TCP 5432 Enables the clients of a cluster to access the central appliance's database Cluster Communications TCP 4990 Enables members of a cluster to communicate within the cluster 21

22 Chapter 1: Getting Started Appliance Passwords You can change the passwords that you or another Administrator initially set up for the appliance accounts. Procedure Important: To change a password, you must know the current password. 1. In the navigation pane, click System, and then click Admin Passwords. 2. Choose the password you want to change: If you want to change the... root password Administrative passwords Then In the root section, type the current password 2. Click Enter Password. 3. Type and confirm the new password. 4. Click Save Changes. 1. In the Admin section, type the current password. 2. Click Enter Password. 3. Type and confirm the new password. The password appears as asterisks. 4. Click Save Changes. 22

23 Date and Time Settings Date and Time Settings You can change the date and the time of the appliance from what you initially set up, and enable the network time protocol (NTP) to synchronize the appliance time with a network time server. Important impact of saving these settings The Time Configuration page in the Proventia Manager (System > Time) always contains the last manually configured values for date and time options not the actual date and time. When you save the settings, the appliance is set to the currently configured values, whether you have changed them or not. Important: To avoid inadvertently resetting the time and date to the previously configured values, update the time and date before you save the settings. Procedures 1. In the navigation pane, click System, and then click Time. 2. Choose an option: If you want to... Change the date and time of the appliance Enable the network time protocol Then Click the Date and Time arrow to see the calendar. 2. Select the correct month and date. 3. Use the arrows at the top to change the month and year in the calendar. 4. Select the hour and minutes in the Time boxes. 5. Click outside the calendar to close it. 6. Click the Time Zone arrow and select the correct time zone for your region. 7. Click Save Changes. 1. Select the Enable NTP check box, and then type the name of the NTP server. 2. Click Save Changes. 23

24 Chapter 1: Getting Started Routing Modes In routing mode, one of the appliance s basic functions is to route network traffic from one physical network to another. These networks are connected to the appliance s multiple interfaces. For routing to occur, you must enable the interfaces and physically connect them to their respective networks. You must also assign network information to the interfaces such as IP addresses and subnet masks. The external and internal interfaces are enabled and configured during the initial setup. You can enable additional internal interfaces as needed to connect to appliance to other internal networks. How the appliance routes traffic The appliance routes traffic on the networks and subnetworks connected to it. You must assign IP network settings to the interfaces, including IP addresses, subnetwork mask, and gateway router IP addresses. Route precedence in the Routing table If there are two or more routes for identical destinations, the most specific route in the Routing table takes precedence. Example: In this example, a packet destined to the host uses the route. You configure the routes in the following table: Destination Subnet Mask Gateway IP Address Table 8: Precedence in routing tables Adding a static route 1. In the navigation pane, click System, and then click Routes. 2. Click Add. 3. Type the following IP addresses or values: Destination IP address Subnet mask value Gateway IP address 4. If needed, set a value in the Metric field. The Metric (or hop count) indicates the number of routes or segments between the source and destination. 5. Click OK, and then click Save Changes. 24

25 Network Interface Settings Network Interface Settings If needed, you can change the initial configuration of the management port, default gateway port, and DNS servers. About routing mode Routing Mode is the default network mode for your appliance. You configured the management interface when you set up the appliance with the Setup Assistant. Important: You already configured the ETH0 and ETH1 interfaces during initial setup of the appliance. Make sure you have configured ETH0 as the default IP address of the appliance, and ETH1 as the default gateway IP address. Use the procedure below to configure the appliance s additional internal interfaces: ETH2 and ETH3. Why would you change these settings? You may need to change the network configuration settings for the following reasons: Your company s network policy has changed Your company has relocated You have changed your Internet Service Provider You have changed addresses You want to specify DHCP settings You want to change DNS settings Enabling the external interface 1. In the navigation pane, click System, and then click Networking. 2. Click the External Interface tab. 3. Select the Enabled box. 4. Type the appliance s hostname. Use the format appliance.example.com. 5. Click Save Changes. Selecting the external IP address type 1. In the navigation pane, click System, and then click Networking. 2. Select an IP address type in the IP Address area: IP Type DHCP Static Action 1. Select DHCP. 2. If needed, select Enable Mac Cloning, and then type 6 hex pairs, separated by colons. Use the format AA:BB:CC:11:22: Select Static. 2. Type the IP address of the appliance s external interface, and then press ENTER. 3. Provide the subnet mask (network mask) value. 4. Type the gateway IP address. If you want this interface to be the Primary Management Interface for the SiteProtector system, then select the Primary Management Interface box. 3. Click Save Changes. 25

26 Chapter 1: Getting Started Configuring DNS settings for the external interface You configured this interface when you set up the appliance with the Setup Assistant. Use the following procedure to change those settings. 1. In the navigation pane, click System, and then click Networking. 2. Go to the DNS area. Do you want to use dynamic settings? If yes, select Use Dynamic Settings, and then go to Step 6. If no, go to Step Provide the IP addresses for the primary, secondary, and tertiary DNS servers. 4. Optional: Go to the DNS Search Path section, and then click Add. The DNS search path appends the domain name to the host name. Associating these names enables the computer to more easily find the domain location. 5. Type the domain name to add to the search list, and then click OK. 6. Click Save Changes. Enabling the internal interfaces 1. In the navigation pane, click System, and then click Networking. 2. Click the Internal Interface tab. 3. Click Add. 4. Select an interface from the list. 5. Select the Enabled box. 6. Type the following IP addresses or values: Destination IP address Subnet mask value Gateway IP address 7. Click OK, and then click Save Changes. 26

27 Deleting Self-Signed SSL Certificates in Firefox 3.x Deleting Self-Signed SSL Certificates in Firefox 3.x Firefox uses certificates on secure Web sites to make sure that information is only being sent to the intended recipient. These warnings indicate that there may be an issue if you access a site they have blocked for security reasons. Issue You may receive the following security warning that there is an issue with the appliance s self-signed SSL certificate when you first try to access Proventia Manager (the appliance s Web-based interface) or the End-User Login/Authentication site. Figure 4: Firefox invalid security certificate warning Remedy You will need to delete the self-signed SSL certificate to allow Firefox to bypass the security warning. 1. On the Secure Connection Failed warning page, click Or you can add an exception. Figure 5: Firefox s Or you can add an exception window 27

28 Chapter 1: Getting Started 2. On the next window, click Add Exception. The Add Security Exception window appears. Figure 6: Firefox s Add Security Exception window 28

29 Deleting Self-Signed SSL Certificates in Firefox 3.x 3. Click Get Certificate. 4. Read the certificate status on the window describing the problems with the site. 5. Click Confirm Security Exception if you want to trust the site. Reference For more information on this issue, see the following Web site: Secure+Connection+Failed#Certificate_is_only_valid_for_i_site_name 29

30 Chapter 1: Getting Started 30

31 Chapter 2 SMTP Settings Overview This chapter explains how to configure SMTP settings that enable you to integrate the appliance into your existing network environment. In this chapter This chapter contains the following topics: Topic Page About SMTP Mail Routing 32 Using Transport Layer Security (TLS) Certificates to Establish Secure Connections 37 Defining System Accounts 38 Managing Messages in the SMTP Server Queues 39 Configure SMTP Settings for the Appliance to Receive Messages 42 Configuring DNSBL Settings to Block Suspicious Messages 45 Configuring Recipient Verification to Block Messages for Unknown Users 46 Enabling Host Reputation Filters to Filter Incoming Spam 48 Configuring SMTP Settings for Outgoing Messages 50 IBM Proventia Network Mail Security System Administrator Guide, Version

32 Chapter 2: SMTP Settings About SMTP Mail Routing Before you set up and configure the appliance, you should understand the basics of using SMTP, which will help you in determining where to place the appliance on your network. Performing a DNS lookup Every domain has a domain name server (DNS) that handles its requests, and a System Administrator who maintains the records in that DNS. These records are used to determine mail routing to and from the Internet. You can easily check what servers are responsible for your domain by performing an nslookup on the MX DNS records for that domain. Example of performing a DNS lookup The following example shows how to check the MX DNS records for the iss.net domain: Open a command prompt, and then enter the following: nslookup The output would look something like the following: Default Server: dns.server Address: x.x.x.x Now enter the following commands (these commands set the DNS query to look up responsible mail servers for the iss.net domain): set q=mx iss.net The output would look something like the following: Server: dns.server Address: x.x.x.x iss.net MX preference = 5, mail exchanger = atla-mx1.iss.net iss.net MX preference = 10, mail exchanger = colo-mx1.iss.net iss.net MX preference = 10, mail exchanger = sfld-mx1.iss.net The Internet mail servers for the iss.net domain use the servers, atla-mx1.iss.net, colo-mx1.iss.net, and sfld-mx1.iss.net to send messages. MX preferences MX preferences are used to determine the priority of a mail server. By default, sending Internet mail servers will use the mail server with the lowest preference number (= lowest cost like metric in IP routes). Servers with the lowest preference number have the highest priority. For example, if the server atla-mx1.iss.net is unreachable, the sending Internet mail servers will use colo-mx1.iss.net or sfld-mx1.iss.net to deliver messages for the iss.net domain. Using the same MX preference automatically load balances the mail traffic beyond the servers with the same priority. If you have multiple mail servers available for redundancy 32 IBM Internet Security Systems

33 About SMTP Mail Routing and/or load balancing, the use of multiple DNS MX entries with the same MX preference is the easiest and most common way for SMTP to split mail traffic. You will often find multiple mail servers responsible for one domain due to redundancy and load balancing needs. Reference: See the following Web sites for more information on MX records: or Example of receiving The following diagram illustrates how messages are relayed through the appliance to internal mail servers on the corporate network after the messages have passed through the corporate firewall, accessible to the Internet: Figure 7: An example of incoming mail traffic In the example above, a remote mail server performs a DNS MX lookup on the iss.net domain, which outputs two mail servers with the same MX preference = 10. Since the servers are the same priority, the remote mail server will randomly choose one of the servers to deliver messages via SMTP on TCP port 25. You can assign mail servers with the configured MX IP addresses or an external firewall/ router/switch can own these IP addresses and forward (for example, destination NAT) incoming SMTP connections on these addresses to the appropriate internal servers. This allows mail traffic to be efficiently balanced so that if one system fails the other system takes over completely (redundancy). Relaying SMTP traffic through the appliance After messages are received and processed by the appliance, the clean messages are relayed to their internal destination servers where users connect to access their accounts. From a deployment perspective, you must make sure that all incoming SMTP traffic on MX IP addresses is routed through the appliance before it is relayed to internal servers. You can do this by changing the destination NAT rules on the firewall(s) to redirect SMTP connections on the MX IP addresses to the appliance. Changes might also be possible on preceding mail relays, load balancers, or content switches. Important: Make sure that all MX IP addresses for all internal domains are routed through the appliance. The appliance works as an SMTP relay, which is a Layer 7 device. IBM Proventia Network Mail Security System Administrator Guide, Version

34 Chapter 2: SMTP Settings The appliance does not forward or route IP traffic; inline deployment is not a deployment option for the appliance. Important: If you need to change the DNS MX entries on your DNS servers to new addresses, the DNS population over the Internet can take up to three days (72 hours). Make sure you can re-route SMTP traffic on MX IP addresses before you change any DNS records. Example of sending Important: Even if you only want to scan incoming mail traffic, you should still configure outgoing SMTP, which is used for messages generated from the appliance. You should set up the appliance to inspect outgoing messages from your network, for example, configuring the appliance to check for attachments, confidential content, or disclaimers that have been added to outgoing mail. Figure 8: An example of outgoing mail traffic The System Administrator for the internal mail server should make sure that all outgoing messages are being relayed through the appliance (by configuring the relay host/ smart host for outgoing mail). If the IP addresses for the internal mail servers have not been configured as relay hosts, messages may be denied by the built-in anti-relay check that protects the appliance from being used by unauthorized users or spammers to send unsolicited junk mail to other Internet users. 34 IBM Internet Security Systems

35 About SMTP Mail Routing The appliance delivers messages to external mail domains as follows: Performs direct MX DNS lookups and then sends the messages via SMTP directly to responsible servers on the Internet. Figure 9: DNS resolution method for outgoing mail delivery Forwards all outgoing messages to another mail relay. Figure 10: Forward method for outgoing mail delivery To forward all outgoing messages to an IP address, configure *;<IP>. To forward messages from specific domains to a specific host, configure maildomain1;<ip1>, maildomain2;<ip2>. IBM Proventia Network Mail Security System Administrator Guide, Version

36 Chapter 2: SMTP Settings Required services You will need the following services in order to operate the appliance: Service Port Number Required Optional DNS UDP 53 HTTPS (for Management) TCP 43 SMTP (for sending and receiving messages) SSH (for appliance Console access) HTTPS (only if end-user access is enabled) SNMP GET (only if SNMP is enabled) SNMP Trap (only if SNMP Trap is enabled) LDAP (only if LDAP integration is enabled) the IBM SiteProtector Console if SiteProtector is enabled (disabled by default) TCP 25 (inbound and outbound) TCP 22 TCP 4443 UDP 160 UDP 161 TCP Table 9: Services needed to operate the appliance Note: You can adjust these settings on the Firewall Settings page in Proventia Manager (System > Firewall). 36 IBM Internet Security Systems

37 Using Transport Layer Security (TLS) Certificates to Establish Secure Connections Using Transport Layer Security (TLS) Certificates to Establish Secure Connections To establish a secure connection between the appliance and external servers, you will need to upload certificates that are used by the appliance to authenticate with remote servers, and for those remote servers to authenticate with the appliance. After authentication, remote users can secure their connections to the appliance using TLS encryption. Important: The appliance only supports the.pem key file format. Procedure 1. In the navigation pane, click SMTP, and then click TLS Certificates. 2. Provide the following information: If you want to upload this certificate... Server Client Then Click the Server tab. 2. Click Upload. 3. Browse for the location of the Certification file and the Key file, and then click Upload Certificate. 1. Click the Certificates tab. 2. Click Upload. 3. Browse for the location of the Certification file, and then click Upload Certificate. IBM Proventia Network Mail Security System Administrator Guide, Version

38 Chapter 2: SMTP Settings Defining System Accounts You will need to provide the hostname for your main internal mail domain and define the accounts that will be used by the appliance to send notification messages for undelivered or quarantined messages. Procedure 1. In the navigation pane, click System, and then click SMTP. 2. Click the Global tab. 3. Provide the root domain for your mail server. 4. Provide addresses for the following accounts: Directory Postmaster Error Admin Temporary Error Admin Send New As Send Quarantine Report As Description The SMTP address of the Administrator. The path to the SMTP address in which each undelivered message is sent in addition to the original sender of the message. If you leave the field blank, only the original sender of the message receives a notification if the message was not delivered successfully. The temporary path to the SMTP address in which each undelivered message is sent in addition to the original sender of the message. The address shown by the appliance as the sender when a new message is sent. The address shown by the appliance as the sender when a quarantine report is sent. 5. Click Save Changes. 38 IBM Internet Security Systems

39 Managing Messages in the SMTP Server Queues Managing Messages in the SMTP Server Queues If there are issues with the flow of mail traffic in the queues, you can browse through the SMTP server queues for problematic messages or log files (if available) generated by the appliance. Troubleshooting issues with the SMTP queues Try the following suggestions to troubleshoot issues with the SMTP queues: Access the log files of the message to determine why a message was not delivered Respool marked messages in the resend queue and in the frozen queue immediately to the SMTP queue Delete messages from the frozen queue using a clean-up job you can set from the Maintenance tab on the SMTP Configuration page (SMTP > Configuration > Maintenance) Procedure 1. In the navigation pane, click SMTP, and then click Queue Browser. 2. Select the queue in which you want to check messages: Message Type unchecked unchecked/processing unchecked/processable unchecked/processable.cal unchecked/processable.smtp unchecked/processable.timeout unchecked/processable.processing unchecked/processable.processing.db unchecked/processable.processing.pgdb unchecked/processable.processing.unk local send Description Messages that are waiting to be analyzed by the appliance. Every incoming message goes to the unchecked queue first. Once the message has been analyzed by the policy in place, the message is removed from the unchecked queue. The messages in the unchecked queue are considered temporary data; a large unchecked queue indicates that the appliance is receiving more messages then it can process. Messages in the mail queue that are being processed by the appliance. Messages that may appear in the queue if there were bad mails or other issues. Note: These messages are informational and do not require user intervention. Messages that were in the unchecked queue, but have been analyzed and then moved from the unchecked queue to the local queue. These messages are also considered temporary data. New messages in the mail queue that are attempting to be delivered from the XMail server. IBM Proventia Network Mail Security System Administrator Guide, Version

40 Chapter 2: SMTP Settings Message Type frozen resend Description Messages that were sent to the target SMTP server but failed to be processed due to a temporary error, such as the server was not reachable, the receiving mail server (remote server) returns a permanent error, or after the message is unable to be sent within the configured resend interval. The message is moved to the resend queue to be resent by the appliance. A large resend queue indicates that there is an delivery problem. Messages that were sent to the target SMTP server but failed to be processed due to a temporary error, such as the server was not reachable. The message is moved to the resend queue to be resent by the appliance. A large resend queue indicates that there is an delivery problem. 3. Optional: Click Respool if you have experienced a slowdown in message processing that has caused a backlog in one of the spool directories. 40 IBM Internet Security Systems

41 SECTION A: Inbound SMTP Configuration Overview This section describes how to enable the appliance to function as a store-and-forward SMTP relay server that locks received messages in a local directory until they have been processed and analyzed using the policy rules in place. Once the messages are considered clean, the appliance releases the messages from the directory, and then relays those messages to internal destination servers where users connect to access their accounts. Prerequisite Make sure you understand the basics of using SMTP or have read About SMTP Mail Routing on page 32, which will help you in determining where to place the appliance on your network. Task overview Complete the following tasks to set up the appliance to receive and process incoming messages: Task Configure SMTP settings for the appliance to receive messages Configure DNSBL settings to block suspicious messages Configure Recipient Verification to block messages for unknown users Enable host reputation filters to determine whether incoming messages are legitimate Description Configure XMail, TLS, and network settings on the appliance to enable it to function as an SMTP relay server between the corporate firewall and your internal mail servers Add the IP addresses of servers that are known for sending spam to the DNS blacklist check Configure settings on the appliance that block messages before they are sent to an unknown user Configure the host reputation filter to quarantine the IP addresses of hosts who send a high percentage of spam Table 10: Task overview for configuring the appliance s inbound SMTP settings IBM Proventia Network Mail Security System Administrator Guide, Version

42 Chapter 2: SMTP Settings Configure SMTP Settings for the Appliance to Receive Messages In order for the appliance to function as an SMTP relay server between the corporate firewall and the internal mail servers on the network, you will need to configure XMail, security, and network settings on the appliance. Note: This is the first of four required tasks for setting up the appliance to receive and process incoming messages. Configure XMail settings The XMail settings enable the appliance to immediately block messages that are sent to a user who does not exist in your organization. 1. In the navigation pane, click SMTP, and then click Configuration. 2. Click the Receiving SMTP > Settings tab. 3. Select the Enable Logging box to enable the appliance to write log entries to a log file. The appliance logs two entries per message (one entry for recipient ok and one entry for sender ok) to the smtp-yyyymmdd0000 log file. Example: 18BD-17E3-479D-8BD2-212A1BE162E8" "RCPT=OK" "" "0" "" "example.com" "example.com" " " " :13:30" "bob" "example.com" "bob@iss.net" "did@example.com" "288718BD-17E3-479D-8BD2-212A1BE162E8" "RECV=OK" "" "5465" "" 4. Provide the following XMail settings: Setting Port Max Recipients per Message Max Messages per Session Session Timeout Max Message Size (KB) Allow NULL Sender Max SMTP Errors per Session Description The port number on which the XMail server will accept a connection. Default: port 25 The maximum number of mail recipients. Default: 100 recipients The maximum number of messages the XMail server can deliver during each session. The maximum number of seconds before the sessions times out. Default: The default is 60 seconds after which the server closes the connection if it does not receive a command. The maximum message size that is possible to send through the XMail server. Note: If you set this value to zero, the server will allow any message size. Enables the XMail server to accept null sender (MAIL FROM:<>) messages. The maximum number of SMTP errors the appliance can handle for a session. 42 IBM Internet Security Systems

43 Configure SMTP Settings for the Appliance to Receive Messages Setting Check Mailer Domain Max MTA Hops Enable Reverse DNS Lookup Return Path Domain Check HELO Domain Check Forward Path Domain Check SMTP Greeting Received Header Description Enable if you want the XMail server to perform a DNS/MX lookup on the domain of the sender SMTP address for validation. The server will only accept s from the sender SMTP addresses whose domains are known by DNS/MX. The maximum number of MTA relay steps before the message is looped. Default: 20 Select if you want XMail to determine if the source IP address of an incoming SMTP connection resolves to an actual valid domain name; otherwise XMail will deny this connection. Select if you want XMail to verify that the Return-Path has a valid MX or DNS record. Select if you want XMail to determine whether it can resolve the domain from which the message is being sent. Select if you want XMail to use the source routing list of hosts and the destination mailbox. The response that the XMail server uses to greet the appliance. Choose an option for viewing the header information: Standard (client IP shown, server IP not) The message header information contains the client IP address, but not the server IP address. Verbose (client IP shown, server IP shown) The message header information contains the client IP address and the server IP address. Strict (no IP shown) The message header information contains no IP addresses. If you set the Received Header Type to Strict when you open your corporate firewall to receive SMTP traffic, the analysis modules in the Sender Policy Framework will not work because these modules rely on information in the received header. Configure TLS settings The TLS settings enable the appliance to authenticate with remote servers, and for remote servers to authenticate with the appliance 1. In the navigation pane, click SMTP, and then click Configuration. 2. Click the Receiving SMTP > Settings tab. 3. Enable these settings if you will be using TLS to encrypt mail traffic: Setting Require Certificate Description Tells the SSL link negotiation code to fail if the remote peer does not supply a certificate. SSLWantCert in the XMail server.tab IBM Proventia Network Mail Security System Administrator Guide, Version

44 Chapter 2: SMTP Settings Setting Verify Certificate Allow Self-Signed Certificates Description Tells the SSL link negotiation code to verify the remote peer certificate. SSLWantVerify in the XMail server.tab Allows self-signed certificates supplied by remote peers. SSLAllowSelfSigned in the XMail server.tab Provide the IP addresses of local domains and relay hosts For local domains: All incoming messages from external sources need to be forwarded to your local mail servers. You need to define the IP address for each internal mail exchange domain. If several internal servers are used for the same mail exchanger domain for redundancy reasons, separate the IP addresses with semicolons (;). For relay hosts: After you have defined local domains, XMail checks if the recipient s domain actually matches one of the local domains. If not, XMail recognizes the message as a relay and will deny it. The relay server will accept outgoing messages addressed to a different domain name other than the local domains if they are being sent from a local mail server. Apart from the above scenario, all outgoing s are detected as relayed mail. You should enter the IP addresses of the local mail servers, and use the default entry or localhost for system-generated messages. 1. In the navigation pane, click SMTP, and then click Configuration. 2. Click the Receiving SMTP > Settings tab. 3. Provide the following IP addresses: If you want to... Add a local domain Add a relay host Then Click Add in the Local Domains area. 2. Type the local domain and the IP address. 3. Click OK. Example: If the mail server is down, XMail will try sending it to : Domain= mydomain.com Mailservers= ; Click Add in the Relay Hosts area. 2. Type the IP address and the subnet mask. 3. Click OK. 44 IBM Internet Security Systems

45 Configuring DNSBL Settings to Block Suspicious Messages Configuring DNSBL Settings to Block Suspicious Messages You can add IP addresses to the DNSBL server that are known for sending spam s, either deliberately or unknowingly due to an address that has been compromised. You can also set scores for each entry on the list so that the DNSBL server can determine whether the message is spam based on whether or not that IP address has sent spam in the past. Note: This is the second of four required tasks for setting up the appliance to receive and process incoming messages. DNSBL border IP addresses DNSBL border IPs are IP addresses that specify the outer border of the trusted network around the appliance. The IP addresses that are considered DNSBL border IP addresses for the appliance include: DNSBL Border IP Address Servers that relay to the local domains Servers that relay through the appliance Servers that the appliance forwards to A user-specified list of IP addresses separated by semicolons How to Configure SMTP > Configuration > Receiving SMTP > Settings > Local Domains SMTP > Configuration > Receiving SMTP > Settings > Relay Hosts SMTP > Configuration > Sending SMTP > Delivery > Forward DNSBL advanced tuning parameter host_reputation.border_ips (page 145) Table 11: DNSBL border IP addresses Important: Use border IP addresses if the appliance is receiving messages directly from hosts on the Internet. You will not be able to use border IP addresses if the appliance is behind an SMTP relay. Procedure 1. In the navigation pane, click SMTP, and then click Configuration. 2. Click the Receiving SMTP > DNSBL Settings tab. 3. Select the Enable box. 4. Provide an error code and an error message. 5. Click the DNSBL Settings button. 6. Set a threshold value in the DNSBL Lists area. Any message that scores a probability of this value or higher is automatically sent back to the filter and used for learning. 7. Click Add. 8. Select the Enabled box. 9. Type the name of the DNSBL server. 10. Enter the match score, and then click OK. 11. Click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

46 Chapter 2: SMTP Settings Configuring Recipient Verification to Block Messages for Unknown Users The appliance uses a modified version of XMail to immediately block messages that are sent to a user who does not exist in your organization. Note: This is the third of four required tasks for setting up the appliance to receive and process incoming messages. Using XMail The modified version of XMail looks in specific directories for files with the.allowed extension. There can be zero or more of these files, which are read to construct a list of known addresses. These files contain a single address on each line. XMail allows limited support of wildcards in allowed addresses. To allow all addresses for a domain, XMail accepts addresses in the following format: *@example.com. XMail does not recognize invalid wildcards and treats them as normal addresses. XMail has a standard filter mechanism called the pre-data filter that is invoked when all header information (From, To) is received from the client and before any message data is transmitted. The appliance uses a pre-pre-data filter that is invoked before the pre-data filter is evaluated. If the appliance s filter allows the message, XMail will continue and invoke the pre-data filters, if present. The appliance s filter is called for all recipients of an message until an allowed recipient is found or the whole list of recipients is processed. If at least one recipient is allowed, the message is accepted. Errors for invalid recipients (if one or more out of many, but not all, are non-allowed recipients) are produced by standard message processing. If zero recipients are allowed, the message is rejected. Procedure 1. In the navigation pane, click SMTP, and then click Configuration. 2. Click the Receiving SMTP > Recipient Verification tab. 3. Select the Enable Recipient Verification box. 4. Choose how the appliance will handle recipients who are rejected: Option Reject with Error Silent Drop Description The appliance returns the given error code and error message to the SMTP client. The sender knows which SMTP addresses are valid, which can be desired or undesired behavior. The message is accepted on the SMTP layer but not analyzed or sent to the recipient, but silently dropped. This prevents the sender from gaining knowledge of valid SMTP addresses and can help to prevent address harvesting. Note: If at least one recipient is allowed, the message is accepted. Errors for invalid recipients (if one or more out of many, but not all, are non-allowed recipients) are produced by standard message processing. If zero recipients are allowed, the message is rejected. 5. Provide an SMTP error code and an SMTP error message. 46 IBM Internet Security Systems

47 Configuring Recipient Verification to Block Messages for Unknown Users 6. Choose the access type for the recipients: Default Access Type Denied Allowed Description All recipients that are not on the list of recipients are rejected. All recipients that are not on the list of recipients are allowed. You can either build a list of allowed recipients and reject all others or build a list of rejected recipients and allow all others. IBM Proventia Network Mail Security System Administrator Guide, Version

48 Chapter 2: SMTP Settings Enabling Host Reputation Filters to Filter Incoming Spam Host reputation filters enable the appliance to determine whether or not an incoming message should be classified as spam based on whether the sender of the has sent spam in the past. Important: Because the filter takes the IP address of the connection host as the host IP address, you can only use the filter if the appliance is receiving messages directly from the Internet. If the appliance is behind an SMTP relay, you will not be able to use host reputation filters. Note: This is the last of four required tasks for setting up the appliance to receive and process incoming messages. Procedure 1. In the navigation pane, click SMTP, and then click Configuration. 2. Click the Receiving SMTP > Dynamic Host Reputation Filter tab. 3. Select Enable Dynamic Host Reputation. 4. Select what method the appliance should use to reject the message: Option Reject with Error Silent Drop Tag Description The appliance returns the given error code and error message to the SMTP client. The sender knows which SMTP addresses are valid, which can be desired or undesired behavior. The message is accepted on the SMTP layer but not analyzed or sent to the recipient, but silently dropped. This prevents the sender from gaining knowledge of valid SMTP addresses and can help to prevent address harvesting. If the IP address is on the Deny list, the filter inserts the following tag in the Header field of the message: X-MSHostReputation:<sender IP>. 5. Provide an SMTP error code and an SMTP error message. 6. Configure the filter to quarantine the IP addresses of hosts who send a high percentage of spam: Filter Settings Analysis Window (minutes) Quarantine Duration (minutes) Minimum SPAM/Phishing Hits SPAM/Phishing Percentage Description The time frame during which IP addresses are analyzed. The amount of time that a host marked as a spammer is quarantined from the system. The minimum amount of spam or phishing messages sent by a host before that host is considered a spammer. If the system reaches this percentage of ham/spam messages, the host is marked as a spammer. (Spam/Phishing versus Ham percentage for every IP) 7. Add the IP addresses that are not considered senders of spam to the Allow List. 8. Add the IP addresses that are considered senders of spam to the Deny List. 48 IBM Internet Security Systems

49 Overview SECTION B: Outbound SMTP Configuration Overview This section provides steps on setting up your appliance for outbound SMTP relay. Why set up outbound SMTP? Even if you set up your appliance to only filter inbound mail traffic, you should still enable outbound SMTP, so the appliance can send messages to internal mail servers, external mail servers, or a relay. The System Administrator for the internal mail server should make sure that all outgoing messages are being relayed through the appliance (by configuring the relay host/ smart host for outgoing mail). If the IP addresses for the internal mail servers have not been configured as relay hosts, messages may be denied by the built-in anti-relay check that protects the appliance from being used by unauthorized users or spammers to send unsolicited junk mail to other Internet users. Outgoing mail traffic scenario The following diagram illustrates how you could set up the appliance for outbound SMTP: Figure 11: An example of outgoing mail traffic IBM Proventia Network Mail Security System Administrator Guide, Version

50 Chapter 2: SMTP Settings Configuring SMTP Settings for Outgoing Messages You should set up the appliance to relay messages to external mail domains via SMTP directly to responsible servers on the Internet, or to forward those messages to another mail relay. Configuring delivery methods 1. In the navigation pane, click SMTP, and then click Configuration. 2. Click the Sending SMTP tab. 3. Select the Enable box. 4. Select the Enable Logging box if you want to enable the appliance to write log entries to a log file. 5. Provide the following settings: Setting HELO Domain Remove Spool Errors Timeout Maximum Number of Retries Resend Increment Ratio Notify Sender on Retries Number of Cited Lines in Bounces Always Try TLS Description The host name of the domain that you want to send messages from. Enable if you want to remove or store messages in the frozen directory after a failure in delivery or filtering. The amount of time the SMTP server should wait after encountering a delivery error before it tries to send an message. The maximum number of retries before a notification is sent out to the original sender. The increment ratio of the reschedule time for sending an message. The notification to the sender if XMail retries to deliver an message (Status delivery errors). The amount of lines from the bounced address that will be used in the notify message. Enable if you want the SMTP server to try to use TLS in SMTP communications. If TLS is not supported by the target server, the system will fall back to unencrypted communication. 50 IBM Internet Security Systems

51 Configuring SMTP Settings for Outgoing Messages Setting Description Delivery For the DNS resolution method, type the IP address of the DNS server in the DNS Server field, and then click OK. Figure 12: DNS resolution method For the Forward delivery method, type a domain name for the server in the Domain field. 6. Click Save Changes. Figure 13: Forward delivery method To forward all outgoing messages to an IP address, configure *;<IP>. To forward messages from specific domains to a specific host, configure maildomain1;<ip1>, maildomain2;<ip2>. Type an IP address for the mail server in the Mailserver(s) field, and then click OK. IBM Proventia Network Mail Security System Administrator Guide, Version

52 Chapter 2: SMTP Settings 52 IBM Internet Security Systems

53 Chapter 3 Clusters Overview This chapter explains how to configure and manage a group of appliances in a cluster. In this chapter This chapter contains the following topics: Topic Page About Clusters 54 Creating a New Cluster 55 Adding an Appliance to an Existing Cluster 56 Changing Passphrases or IP Addresses 57 IBM Proventia Network Mail Security System Administrator Guide, Version

54 Chapter 3: Clusters About Clusters A cluster consists of a number of appliances in which one appliance acts as the central appliance (Cluster Central), and the other appliances become clients of the central appliance (Cluster Clients). Policy configuration settings All members of the cluster share the policy configuration settings of the central appliance. The policy configuration settings for the central appliance are defined on the Mail Security Policy page (Mail Security > Policy) and the Mail Security Policy Objects page (Mail Security > Policy Objects). How data is processed in the cluster The central appliance acts as the central database server for the cluster. Each appliance in the cluster has a local database that stores all the information for the messages processed on that specific appliance. All appliances in the cluster replicate database changes (such as new data, changed data, or deleted data) from their local database to the central appliance s database. The central appliance s database collects that data to allow end users to browse their quarantine stores and to generate and send quarantine reports to end users. Things to note when using clusters When an appliance is promoted to the central appliance in the cluster or an appliance joins an existing cluster, that appliance loses all data. Open firewall ports 5432 (database) and 4990 (cluster communication) to allow communication between the central appliance and an appliance that is joining the cluster. Make sure all members of the cluster can reach each other on the network. Use a network time server to synchronize the time settings on all members of the cluster. Some SMTP settings reference the Policy Objects defined under Mail Security. Policy Objects are replicated between cluster members, but SMTP settings are not replicated. You should remove all references to Policy Objects from SMTP > Configuration > Receiving SMTP > Recipient Verification. When you create a cluster or add appliances to a cluster, all references to Schedule objects and FTP Server objects must be removed. The central appliance generates quarantine reports. Users will only receive one quarantine report containing all quarantined messages, regardless of which appliance processed the messages. 54 IBM Internet Security Systems

55 Creating a New Cluster Creating a New Cluster You can create a cluster of appliances that distribute the functions of a single appliance, such as policy management, over multiple appliances. Procedure 1. In the navigation pane, click Mail Security, and then click Clustering. 2. Click Create a New Cluster. 3. Type and then confirm the passphrase for the cluster. Important: Choose a passphrase you can remember. IBM ISS will not be able to reset or recover your passphrase once you have created it. 4. Select an IP address from the Communications IP drop-down list. 5. Click Create Cluster. IBM Proventia Network Mail Security System Administrator Guide, Version

56 Chapter 3: Clusters Adding an Appliance to an Existing Cluster You can add an appliance to an existing group of appliances that are currently distributing the functions of a single appliance over multiple machines. Note: When an appliance joins an existing cluster, that appliance loses all data. Process for joining the cluster When an appliance joins the cluster, it goes through the following process after it receives the connection parameters to the database for the central appliance: Stops processing messages, including the SMTP server Connects to the central appliance s database Deletes all data from its own database Replicates all configuration data from the central appliance (Cluster Central) to its own database Applies the policy previously read from the central appliance s database Starts processing messages Procedure 1. In the navigation pane, click Mail Security, and then click Clustering. 2. Click Join an Existing Cluster. 3. Type and then confirm the passphrase for the cluster. 4. Select an IP address from the Communications IP drop-down list. 5. Click Join Cluster. Removing a client from the cluster You can remove an appliance that is a client of the cluster if it is no longer needed. 1. In the navigation pane, click Mail Security, and then click Clustering. 2. Click Manage this Cluster. 3. Choose the client you want to remove from the cluster. 4. Type the passphrase for the cluster. Note: This is the passphrase that was set when you or another Administrator created the cluster. 5. Click Remove this client. The client stops processing SMTP traffic and leaves the cluster. 6. Restart the processing of SMTP traffic. Erasing a cluster of appliances You can return a cluster of appliances back into a single appliance. 1. In the navigation pane, click Mail Security, and then click Clustering. 2. On the Cluster Central Mode page, click Erase this Cluster. 3. Type the passphrase for the cluster, and then choose to erase the cluster. 56 IBM Internet Security Systems

57 Changing Passphrases or IP Addresses Changing Passphrases or IP Addresses You can change the passphrase for the central appliance in the cluster, or change an IP address for any members of the cluster. Procedure 1. In the navigation pane, click Mail Security, and then click Clustering. 2. Click Manage this Cluster. 3. Choose an option: If you want to change the... Passphrase of the primary central appliance IP address of a member of the cluster Then Go to the Cluster Central appliance, and then click Change Cluster Passphrase. 2. Type the current passphrase for the cluster, and then type the new passphrase twice to confirm it. 3. Click Change Passphrase. 1. Choose an appliance, and then click Update IP Address. 2. Type the passphrase for the cluster, and then provide a new IP address. 3. Click Change IP Address. IBM Proventia Network Mail Security System Administrator Guide, Version

58 Chapter 3: Clusters 58 IBM Internet Security Systems

59 Part II Policy Configuration

60

61 Chapter 4 Policy Settings Overview This chapter explains the settings you use to configure a mail security policy in Proventia Manager. Contents of a policy A mail security policy contains a set of rules that define how the appliance should inspect and control both incoming and outgoing messages. Process for creating a policy You create a mail security policy by: Defining your users or groups of users in the organization Defining what type of action should take place once the appliance has identified a suspicious message Creating rules that instruct the appliance on how to handle suspicious messages Defining which analysis modules should be used to examine messages In this chapter This chapter contains the following topics: Topic Page Enabling Policy Rules for Processing Messages 62 Defining Valid Recipients of Messages (Who Objects) 66 LDAP Integration (Directory Objects) 68 Who Object Verification Tool 72 Running Policy Rules (When Objects) 73 Using Conditions for a Policy Rule 74 Applying Responses to Inspected Messages 75 IBM Proventia Network Mail Security System Administrator Guide, Version

62 Chapter 4: Policy Settings Enabling Policy Rules for Processing Messages The appliance uses policy rules to inspect and filter each message that passes through it. Policy rules A policy rule is the central point of the mail security policy. You define how the appliance processes messages by: Creating specific rules Adding senders, recipients, time ranges, analysis modules, and action responses to the rules Defining the action for each matching rule Contents of a policy rule A policy rule is a combination of the following four item: Item Description Who objects When objects Analysis modules Responses A Who object defines who or what group it represents, such as an address, user name, or a group name from the domain. A When object defines when a policy rule is valid. An analysis module defines what spam detection method the appliance will use to inspect the content of an message. A response lets you decide what should happen to an message after it has been analyzed by the appliance. Table 12: Contents of a policy rule How the appliance processes policy rules The appliances uses a chain policy system by processing policy rules one by one from top to bottom and left to right (who, when, analysis modules) to determine matches. Each policy rule displays information (below the policy rule name) on how the appliance should process the policy rule when it becomes a matching rule. The policy rule s information defines the state of the conditions and determines whether the appliance should stop processing the policy rule based off the Action (Continue, Allow, or Block) in place for the rule. The appliance processes the policy rule within the context of a single recipient. If an message that is being analyzed has multiple recipients, the appliance will process the message separately for each recipient. When policy rules match For every matching policy rule, all actions are collected by the appliance. If the Action is set to either Block or Allow, the appliance will stop processing that specific policy rule, and will apply all collected actions. If the Action is set to Allow, the appliance will deliver the message to a particular recipient. However, if the Action is set to Block, the appliance will drop the message (if it was not previously stored in an queue). 62 IBM Internet Security Systems

63 Enabling Policy Rules for Processing Messages Policy rule system The appliance uses the following steps for every active policy rule from the first rule to the last rule (top to bottom) until a rule matches and the specified Action is either Block or Allow, or the end of the rule chain is reached (in which case the default action is Allow): Figure 14: Policy rule system workflow IBM Proventia Network Mail Security System Administrator Guide, Version

64 Chapter 4: Policy Settings Preconfigured rules The appliance provides preconfigured rules that would commonly be used by an Administrator to analyze messages that pass through the appliance. Figure 15: Example of preconfigured policy rules Procedure 1. In the navigation pane, click Mail Security, and then click Policy. 2. Click the Settings > Rules tab. 3. Right-click in the Rules column, and then select Add new empty rule. 4. Configure the following policy settings: Settings Pre Conditions Rule Name Comment Senders Recipients Whens Description The conditions or circumstances that are required for this policy rule to be evaluated. The appliance will not evaluate this policy rule if the required condition is not set or if a condition is set, but the condition entry specifies NOT. Reference: See Using Conditions for a Policy Rule on page 74 for more information about conditions. The name of the policy rule. A meaningful description of the policy rule. The Who objects an sender is checked against. Reference: See Defining Valid Recipients of Messages (Who Objects) on page 66 for more information about Who Objects. The Who objects an 's recipient is checked against. Reference: See Defining Valid Recipients of Messages (Who Objects) on page 66 for more information about Who Objects. The When objects defining the time the policy rule is valid. Reference: See Running Policy Rules (When Objects) on page 73 for more information about When Objects. 64 IBM Internet Security Systems

65 Enabling Policy Rules for Processing Messages Settings Analysis Modules Responses Action Description The type of modules (executed on demand) that will inspect the content of an message. The appliance processes messages as follows: Tries to recognize the file type using binary pattern matching Breaks each file or attachment down into its unique parts Uses the content analysis modules that are enabled for the rule to inspect each piece of content Collects all the data from the previous steps and builds up a detailed description of the message that is being processed by the appliance Reference: See Spam Analysis Modules on page 82 for more information about analysis modules. The type of responses that are to be taken against the message. Reference: See Applying Responses to Inspected Messages on page 75 for more information about responses. The following actions are available: Continue The Continue action permits an analyzed message to continue to the next rule in the policy until it matches a Block or Allow action, or the end of the rule system (where it will then be allowed). Allow The Allow action permits an analyzed message that is deemed safe to be sent or received by its recipients, which ends the processing of the message by the appliance. Block The Block action blocks messages, which ends the processing of the message by the appliance. Blocked messages are not delivered to recipients. Reference: See Policy rule system workflow on page 63 for more information on how the appliance uses actions while it processes a policy rule. 5. Click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

66 Chapter 4: Policy Settings Defining Valid Recipients of Messages (Who Objects) You use Who objects to define individual recipients in your internal or external network, including who or what group that object represents. Who object contents You can use an address, user name, or a group name from the domain to define a Who object. The appliance accepts addresses with wild cards or expressions like *@domain.com or *@*.org as addresses. You can also integrate your users list with a directory service (see LDAP Integration (Directory Objects) on page 68). You use this list to define your Who objects by populating the Senders and Recipients columns in the policy with valid users and user groups. Who object priority A Who object follows a sequence of priority. If more than one rule in a certain configuration is invoked during an implementation, the appliance uses the following priority, with the first object being the highest priority: Figure 16: Who object priority Procedure 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Who tab, and then click Add. 3. Type a name and a comment for the Who object. 4. Select the type of Who object: Type Directory Group User Compound Who Description The object matches an address or pattern. The object matches a specific Directory object. The object matches if the current SMTP address belongs to the following: A user contained within LDAP and NT4 A group contained within only LDAP A group with only an LDAP specified group name in the Directory object The object matches if the current SMTP address belongs to a user with a specified user name in the Directory object. A list of Who objects of the same or different types. The Compound Who object matches if one of the Who objects contained in the Compound Who object matches. 5. Click OK, and then click Save Changes. 66 IBM Internet Security Systems

67 Defining Valid Recipients of Messages (Who Objects) Configuring an Unknown Who object You can configure a rule in which messages that have no valid recipients on the internal mail server are marked as unknown and immediately blocked on the SMTP layer. 1. In the navigation pane, click Mail Security, and then click Policy. 2. Click the Settings > Rules tab. 3. Right-click in the Rules column, and then select Add new empty rule. 4. Provide a name for the rule that indicates that it will be used for identifying users who do not exist in the organization. 5. Make sure you have integrated a Directory object that contains a valid list of SMTP addresses for your organization. 6. Add that Directory object to the Recipients list. 7. Right-click on the Directory object in the Recipients list, and then select Toggle Not. The directory will now identify SMTP addresses that are not listed in the directory. 8. Click OK, and then click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

68 Chapter 4: Policy Settings LDAP Integration (Directory Objects) LDAP directory servers provide user and user/group information to the appliance. You can use the information from LDAP queries to map user names and groups to the Who object(s) you are defining for a policy. Provide LDAP information 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Directories tab, and then click Add. 3. Select the Active box. 4. Set the values for the LDAP server: Value Name Cache Expiration Type Host name Port User name Password Description The name and an optional comment for the LDAP server. The length of time to cache user credentials. Default: 1440 minutes The type of server. The host name or the IP address of the LDAP server. The port on which the LDAP server will accept a connection. Default: Port 389 for unencrypted and TLS-encrypted requests, and port 636 for SSL requests The user name of the Administrator. The password for the Administrator. Configure entry points and attribute entries 5. Optional: Enter the directory entry point for the LDAP search. Example: DC=domain,DC=com (DC stands for Domain Component) 6. Determine the scope of the LDAP search, including what LDAP entries will be used during the search: Mode Basic (default mode) One Level Sub Tree Description The appliance uses the entry configured at the OU (Directory Entry Point). The appliance uses only the entries located directly within the entry configured at the OU (Directory Entry Point). The appliance uses the LDAP entry configured at the OU (Directory Entry Point) and all entries located somewhere below this entry. 68 IBM Internet Security Systems

69 LDAP Integration (Directory Objects) 7. Provide values for the attribute entries: Attribute User and Group Membership SMTP Addresses Description Indicates the attribute for Users and Groups: ObjectClass This attribute controls which attributes are required and allowed in an entry. The values of this attribute determine the schema rules the entry must obey. Name Attribute: The name of the LDAP attribute containing a user name or a group name. ObjectCategory This attribute exists in every LDAP object within an Active Directory. This value uses the same method for determining objects just like the ObjectClass attribute, but with the following differences: This attribute only has one value. This attribute is usually indexed in the server s underlying database. Tip: Use ObjectCategory instead of ObjectClass to improve performance on large domains (more than 10,000 users) or on slow servers. Name Attribute: The name of the LDAP attribute containing a user name or a group name. Select the method used for detecting all groups to which a particular user or group belongs: Member Object Any user or group that contains information to which the group belongs. Group Object Any group entry that contains information about the users and groups that belong to the group entry. Membership Attribute: This is the attribute on the LDAP group object that contains the DNs (distinguished names) of the users or groups who are members of this group: for example, Member. The name of the LDAP attribute containing the SMTP addresses. Provide a list of SMTP domains for the query The appliance uses a list of SMTP domains during message processing and end-user login/authentication in order to determine whether to perform LDAP queries. If the list of SMTP domains is... Then the appliance... Empty Not empty Performs LDAP queries as needed Searches the list for the domain part of an SMTP address If the domain part is in the list, LDAP queries are performed as needed. If the domain part is not in the list, no LDAP queries are performed and the SMTP address is treated like an unknown address. 8. Click OK, and then click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

70 Chapter 4: Policy Settings Setting up multiple LDAP servers You can set up a primary and a secondary LDAP directory server to balance the workload for user/group information and SMTP address queries. Sample scenario Set up one LDAP directory server that contains only user/group information (no SMTP addresses), and then set up a second LDAP directory server that only contains SMTP information to test whether those SMTP addresses exist in the organization. Option 1: Secondary LDAP server with user/ group information Set up a secondary LDAP server containing user/group information: 1. Select LDAP Server with 2nd server in the Type area. 2. Click the LDAP Server with User/Group Information tab. 3. Set the values for the secondary LDAP server. (See the procedure on page 68.) 4. Configure entry points and the scope of the LDAP search. (See the procedure on page 68.) 5. Provide values for the attribute entries. (See the procedure on page 68.) Option 2: Secondary LDAP server with SMTP addresses 1. Click the LDAP Server with SMTP Addresses tab. 2. Click the LDAP Server tab. 3. Set the values for the LDAP server. (See the procedure on page 68.) 4. Configure entry points and the scope of the LDAP search. (See the procedure on page 68.) 5. Provide values for the attribute entries: Attribute SMTP Addresses Description Indicates the attribute containing the SMTP addresses: ObjectClass This attribute controls which attributes are required and allowed in an entry. The values of this attribute determine the schema rules the entry must obey. Name Attribute: The name of the LDAP attribute containing a user name or a group name. ObjectCategory This attribute exists in every LDAP object within an Active Directory. This value uses the same method for determining objects just like the ObjectClass attribute, but with the following differences: This attribute only has one value. This attribute is usually indexed in the server s underlying database. Tip: Use ObjectCategory instead of ObjectClass to improve performance on large domains (more than 10,000 users) or on slow servers. Name Attribute: The name of the LDAP attribute containing a user name or a group name. 70 IBM Internet Security Systems

71 LDAP Integration (Directory Objects) Attribute Synchronization Attribute Description The name of the LDAP attribute containing the user and/or group name of the matching entry on the LDAP Server with User/Group Information. The matching entry is matched as follows: Any entry <A> at the User/Group LDAP server is considered to contain user/group information for an entry <B> at the SMTP Address LDAP server in one of the following cases: (You enter the Synchronization attribute in the Synchronization field.) Case 1: The Synchronization attribute exists at both entries and the attribute values are the same. Case 2: The Synchronization attribute exists only at entry <B> at the SMTP Address LDAP server and has the same value as the user/group name attribute of entry <A> at the User/Group LDAP server. 6. Click OK, and then click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

72 Chapter 4: Policy Settings Who Object Verification Tool Use the Who Object Verification tool to determine if you have configured Who objects correctly (such as LDAP-type Who objects) and to verify SMTP addresses against Who objects. Procedure 1. In the navigation pane, click Mail Security, and then click Verify Who Objects. 2. Select All Who Objects or SMTP Address from the Verify drop-down list, and then click the Submit button. The appliance displays the following information for each configured Who object: Column Description Who The name of the Who object as configured in Mail Security > Policy Objects (or the Mail Security Policy Objects page). Status Type Description SMTP Match (use only for SMTP addresses) Result The status of the Who object, either active or inactive (shown in italics against a gray background). The appliance does not use inactive Who objects when it processes the mail security policy for an message. The type of Who object. A description of the Who object. Indicates whether or not the SMTP address matches for the given Who object. The result from verifying the configuration of the Who object, either OK or a specific error message. Note: Select underlined text or text displayed as a link to view a detailed description of the specific error. 72 IBM Internet Security Systems

73 Running Policy Rules (When Objects) Running Policy Rules (When Objects) You will need to define when a policy rule is valid. An example of a When object would be to set up a rule to run against mail traffic during specific periods of time. Procedure 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the When tab, and then click Add. 3. Enable the Active box. 4. Type a name for the When object. 5. Click Add in the Timerange area. 6. Set the following values: Value Time Duration Repeat every Description Indicates a start time for the time range Indicates how long from the start time you want the time range to last Indicates how often you want the time range repeated Example: This example instructs the appliance to process that rule against mail traffic every day starting with September 1, 2008 from 12:00 P.M. to 06:00 P.M.: Start: :00:00, Duration 6 hours, repeat every 1 day(s) 7. Click OK, and then click OK again to apply the settings. 8. Click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

74 Chapter 4: Policy Settings Using Conditions for a Policy Rule You can configure a condition (or a prerequisite) that states under what circumstances a policy rule should be applied to an incoming message. These conditions are evaluated and modified separately for every message that is processed. A condition also allows you to dynamically turn specific rules in the policy on and off by assigning a condition to a rule and toggling it using a response. Procedure 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Conditions tab, and then click Add. 3. Type a name and a comment or description for the condition. 4. Click OK, and then click Save Changes. 74 IBM Internet Security Systems

75 Applying Responses to Inspected Messages Applying Responses to Inspected Messages You can set up responses in the policy rules that determine what should happen to an message after it has been inspected by the appliance. Modify Field response The Modify Field response modifies or adds a field to the header. Important: You should be careful when you modify the message field. Do not modify compulsory fields that might eventually corrupt or damage your message, causing it to be discarded instead of reaching its recipient. 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Responses tab, and then click Add. 3. Type a name for the response. 4. Select Modify Field from the Response drop-down list. 5. Enter the appropriate field from the Field drop-down list. 6. Enter the appropriate macro from the Value drop-down list. 7. Click OK, and then click Save Changes. Store response The Store response sends the message to a message storage directory. You can also choose whether to save the original or the current message (an message that has been modified by another policy rule). 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Responses tab, and then click Add. 3. Type a name for the response. 4. Select Store from the Response drop-down list. 5. Choose which folder you would like to store the detected message. 6. From the Messagetype to Store drop-down list, select what type of message should be stored. 7. Click OK, and then click Save Changes. Add Disclaimer response The Add Disclaimer response modifies the content or nature of an original message by adding a standard company disclaimer for every outgoing message. 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Responses tab, and then click Add. 3. Type a name for the response. 4. Select Add Disclaimer from the Response drop-down list. 5. Choose where you would like the disclaimer placed in the message from the Position drop-down list. 6. Type or paste the disclaimer in either the HTML field or the Text field. 7. Click OK, and then click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

76 Chapter 4: Policy Settings Add Attachment response The Add Attachment response modifies the content or nature of an original message by adding an attachment to an outgoing message. 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Responses tab, and then click Add. 3. Type a name for the response. 4. Select Add Attachment from the Response drop-down list. 5. Choose whether you would like to attach the current message, the original message, or a file. 6. Click OK, and then click Save Changes. Remove Attachment response The Remove Attachment response analyzes attachments found in messages. If the attachment matches the defined condition, the appliance will remove the attachment (or all attachments) from the original message. If you use this action to remove an uuencoded textblock and select the Matching attachments option, other uuencoded parts of the message are recorded as attachments in the resulting message. 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Responses tab, and then click Add. 3. Type a name for the response. 4. Select Remove Attachment from the Response drop-down list. 5. From the Type drop-down list, choose whether you would like remove all attachments or only previously matched attachments. 6. Click OK, and then click Save Changes. Send To response The Send To response requests the application to reply to the sender of the analyzed message or to somebody else such as the Administrator, with different options of message content manipulation. You can perform the following actions with this response: Create a new message to the sender Add an attachment Attach the original message as an attachment Send a redefined warning message to the original sender Procedure 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Responses tab, and then click Add. 3. Type a name for the response. 4. Select Send To from the Response drop-down list. 76 IBM Internet Security Systems

77 Applying Responses to Inspected Messages 5. Provide the following information: Field From To Subject Body Attachment Description The name or address of the sender of the message. The message will identify itself as The name of the designated recipient of the message. The subject of the message. The content for the message. Indicates whether to add an attachment to the message. BCC response The BCC response sends a copy of the message as BCC to the given recipient. You can modify the message sent as the BCC with other responses. The BCC action applies to all messages, whether they are allowed or blocked. 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Responses tab, and then click Add. 3. Type a name for the response. 4. Select BCC from the Response drop-down list. 5. List the response recipients using any of the following macros: Macro $(SENDER) $(RECIPIENTS) $(ALLOWEDRCPTS) $(BLOCKEDRCPTS) $(NEWMSGSENDER) $(POSTMASTER) Definition Specifies the sender address used for the original message. A list of all the recipients of the original message. A list of all the recipients that were allowed. A list of all the recipients that were blocked. Specifies the sender address used for newly created messages. Sends the detected message to the original sender as postmaster@mycompany.com and informs the sender that the original message has been quarantined. Redirect response The Redirect response sends the message to the given recipient. 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Responses tab, and then click Add. 3. Type a name for the response. 4. Select Redirect from the Response drop-down list. 5. List the appropriate recipients using any of the following macros: Macro $(SENDER) Definition Specifies the sender address used for the original message. IBM Proventia Network Mail Security System Administrator Guide, Version

78 Chapter 4: Policy Settings Macro $(RECIPIENTS) $(ALLOWEDRCPTS) $(BLOCKEDRCPTS) $(NEWMSGSENDER) $(POSTMASTER) Definition A list of all the recipients of the original message. A list of all the recipients that were allowed. A list of all the recipients that were blocked. Specifies the sender address used for newly created messages. Sends the detected message to the original sender as postmaster@mycompany.com and informs the sender that the original message has been quarantined. Log response The Log response writes to a plain text file (with replaced macros), but does not write to the database. 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Responses tab, and then click Add. 3. Type a name for the response. 4. Select Log from the Response drop-down list. 5. Enter the appropriate macros in the Log Line field. 6. In the Log to File field, determine what information to log to the file using the list of provided macros. 7. Click OK, and then click Save Changes. Set/Clear Condition response The Set/Clear Condition response allows you to activate a condition for a specific rule in the policy. 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Responses tab, and then click Add. 3. Type a name for the response. 4. Select Set/Clear Condition from the Response drop-down list. 5. From the Set/Clear drop-down list, choose whether to set or clear the response. 6. From the Condition drop-down list, choose which media type to detect. 7. Click OK, and then click Save Changes. Relay Message response The Relay Message response relays a specific message to a specific host. Example: To relay all messages from the iss.net domain to a host at the IP address: 1. Create a rule named To iss.net. 2. Use the corresponding Who object in the Recipients column. 3. Add the Relay Message response using the IP address as the recipient address. 78 IBM Internet Security Systems

79 Applying Responses to Inspected Messages Procedure 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Responses tab, and then click Add. 3. Type a name for the response. 4. Select Relay Message from the Response drop-down list. 5. Type the IP address or the name of the host who is to receive the relay message. 6. Click OK. Require Encryption response The Require Encryption response is used when an message matching a specific policy rule must be delivered using Transport Layer Security (TLS). Example: The following example shows how you would create a policy rule that uses the Require Encryption response: If you want to... Send messages to a specific domain using encryption Require messages that contain a Company Confidential disclaimer to be sent using encryption Create this rule... From My Domains to this.specific.domain with a Require Encryption response From My Domains if the message contains Company Confidential with a Require Encryption response If an message is flagged to be delivered using TLS, but the SMTP counterpart does not support TLS, the system will try to resend the message as configured for normal SMTP traffic by sending non-delivery reports to the sender. If the message cannot be delivered via TLS, the system will not deliver the message. 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Responses tab, and then click Add. 3. Type a name for the response. 4. Select Require Encryption from the Response drop-down list. 5. Click OK. IBM Proventia Network Mail Security System Administrator Guide, Version

80 Chapter 4: Policy Settings 80 IBM Internet Security Systems

81 Chapter 5 Spam Settings Overview This chapter describes the spam analysis techniques used by the appliance. In this chapter This chapter contains the following topics: Topic Page Spam Analysis Modules 82 Bayesian Filter 86 Spam Flow Control 90 Setting Up End-User Spam Management Accounts 91 IBM Proventia Network Mail Security System Administrator Guide, Version

82 Chapter 5: Spam Settings Spam Analysis Modules The appliance uses a variety of spam analysis modules to inspect the content of an message. Reference: See the procedure on page 64 for the steps needed to enable a spam analysis module. Spam Signature Database The Spam Signature Database allows the appliance to break down every message into several logical parts (sentences, paragraphs), and computes a unique 128-bit signature for each part. These signatures are subject to minor modifications in the message, but are still accurate enough to uniquely identify a known spam with a couple of matching signatures in the filter database. Spam URL Check The Spam URL Check compares data with URL entries found from the Internet. All relevant URLs that appear in spam messages are stored in the filter database together with the stored spam signatures. A single Spam URL is enough to identify a spam message. Spam Heuristics The Spam Heuristics employs an internal scoring system with each heuristic receiving either positive or negative points, depending on whether the heuristic is designed to match spam or ham (normal message). If the point count reaches a predetermined threshold, the message is classified as spam. For example, the following information is used for heuristic analysis: Message-ID field characteristics Received field invalid or missing Checks for Apparently-To: or X-Apparently-To fields Checks for mailing list fields Checks for multiple recipients and alphabetic recipient patterns like a@, b@, c@ Checks for missing fields like From and To Spam DNSBL Check The Spam DNS blacklist check uses DNSBL servers to determine if messages have originated from possible spam sources. You can define multiple servers with relevant scores to generate more precise detection, which provides higher flexibility. Spam Bayesian Classifier The Bayesian classifier is a system that determines whether an message is spam based on statistics. To train the classifier, thousands of examples of spam and regular messages are presented to the system and relevant data is extracted and stored in a statistical model. Through this training, the classifier is able to learn the difference between spam and regular messages. IBM offers an updated, pre-trained Bayesian database that is trained using thousands of different spam types coming from the spam collectors and through end-user feedback. You can fine tune the filter or train a completely new one by providing additional spam and ham samples to the filter. 82 IBM Internet Security Systems

83 Spam Analysis Modules The advantage of the Bayesian classifier is the ability to recognize new types of spam, whereas the signature technology is better in detecting identical and nearly identical spam. Spam Flow Check The Spam Flow Check analyzes mail flow within a specific time frame. If the same message (based on a number of similarity measures) is received more than a threshold number of times within the time frame and has different sender domains, then the message is a classified as spam. This technology can detect completely unknown types of spam based on the way spam is typically created and sent. Spam Structure Check The Spam Structure Check examines the HTML structure of the message and computes two signatures based on the structure. For example, some spam typically has a bold headline followed by one or more paragraphs in a different color, and then some random text at the bottom. Such layout structures are close to the actual text in the message and are therefore an excellent addition to the textual spam signatures mentioned above. The module computes structure signatures are for all known spam (coming from spam collectors and other sources) and stores the spam signatures and URLs in the filter database. Spam Fingerprint Every message computes a unique 128-bit signature. You can use the signatures in filter database to identify existing spams. The appliance computes spam signatures for all known spams (from spam collectors and other sources) and stores the signatures in the filter database. Spam Keyword The Spam Keyword covers standard keywords and patterns (regular expressions) that are typically found in spam messages. IBM has extracted relevant keywords and patterns from known spam and weighted individual relevancy for additional spam protection. Phishing Check Phishing messages are a type of spam intended to retrieve personal information from potential victims. Typically, phishing messages look as if they are coming from an individual s bank or favorite shopping sites, but the intention is to steal that person s account information, including passwords. In many cases, it is very difficult for the average end user to distinguish a real message that was sent by their bank from a phishing message. For phishing detection, IBM combines a variety of methods. The URL checker is able to detect links to banking and other commercial sites in all spam coming from the spam collectors. Phishing messages also show typical heuristics compared to regular spam, and are categorized separately from regular spam in the filter database. Message Field Check The Message Field Check allows you to scan for expressions within the message fields of the message using regular expressions. You can use this feature to check for a word in the subject (for example) or to identify HTML messages (check for the content type header field). IBM Proventia Network Mail Security System Administrator Guide, Version

84 Chapter 5: Spam Settings Attachment Check The Attachment Check analyzes the number of attachments, the size of single attachments, or the complete size of all attachments. You can use this feature, for example, if you have bandwidth problems and want to delay the delivery of messages with big attachments. Keyword Search The Keyword Search module provides a regular expression search engine. This module allows you to generate your own categories that perform compliance checks. Media Type The Media Type module is able to detect more than 120 different file types. You can use this, for example, to extract dangerous file types like executables. URL Check The URL Check analyzes URLs in messages using content from the filter database. The appliance provides more than 61 categories that allow you to block messages with unwanted or dangerous links. Language Check The Language Check module is used by the appliance when you are training the appliance to analyze messages from different foreign languages. The appliance currently supports more than 40 different languages. It is possible to block or redirect messages because they are written in a language the employee is not able to read. User Sender Block List Each user is able to maintain their own Sender block list. You can specify in detail which user is allowed to use this feature and in which position of the rule chain this check is performed. User Sender Allow List Each user is able to maintain their own Sender allow list. You can specify in detail which user is allowed to use this feature and in which position of the rule chain this check is performed. Sender Policy Framework Important: If you set the Received Header Type to Strict when you open port on the firewall to receive SMTP traffic, the analysis modules in the Sender Policy Framework will not work since these modules rely on information in the received header. The Sender Policy Framework module evaluates an SPF record and produces one of the following results: Result None Neutral Pass Fail Description The domain does not publish SPF data. The SPF client must proceed as if a domain did not publish SPF data. This result occurs if the domain explicitly specifies a "?" value, or if processing falls off the end" of the SPF record. The message meets the publishing domain's definition of legitimacy. MTAs proceed to apply local policy and may accept or reject the message accordingly. The message does not meet a domain's definition of legitimacy. MTAs may reject the message using a permanent failure reply code, such as Code 550. Table 13: Sender Policy Framework module results 84 IBM Internet Security Systems

85 Spam Analysis Modules Result Softfail Error Unknown Description The message does not meet a domain's strict definition of legitimacy, but the domain cannot confidently state that the message is a forgery. MTAs should accept the message but may subject it to a higher transaction cost, deeper scrutiny, or an unfavorable score. There are two error conditions, one temporary and one permanent. Indicates an error during lookup; an MTA should reject the message using a transient failure code, such as 450. Indicates incomplete processing: an MTA must proceed as if a domain did not publish SPF data. When SPF-aware SMTP receivers accept a message, they should prepend a Received- SPF header. SPF clients must use the algorithm described in this section or its functional equivalent. If an SPF client encounters a syntax error in an SPF record, it must terminate processing and return a result of unknown. Table 13: Sender Policy Framework module results (Continued) Virus Check The Virus Check module provides two modules that use antivirus software to detect viruses and handle infected messages: Signature Pattern Detection Remote Malware Detection You can choose between a pattern-based scanner such as Sophos (if you have installed a valid license) or the Remote Malware Detection scanner. Compound The Compound module allows you to combine any of the analysis modules. You can assign different scores to the different modules and define a threshold. IBM Proventia Network Mail Security System Administrator Guide, Version

86 Chapter 5: Spam Settings Bayesian Filter The appliance uses Bayes s Theorem (a simple mathematical formula) to calculate the probability that elements within an message indicate that it is spam. Tokens The elements in an message are called tokens, and may include the following: Words Header elements, such as the sender s name Embedded HTML and Javascript strings, such as ff0000, which is the HTML notation for the color bright red Special characters, such as dashes, apostrophes, and dollar signs, where they have been specifically included in the analysis as tokens The filter ignores any special characters that are not specifically included in the analysis. About the Bayesian filter The Bayesian filter uses a corpus (body) of good messages (ham), and a corpus of spam messages to determine how frequently each token appears in each corpus. This trains the filter to identify spam using the words and other tokens that routinely appear in your enterprise s legitimate stream. This improves the false positive rate, compared to filters that are not trained in your environment. This formula also reduces false positives by weighting the importance of tokens in the legitimate corpus. The spam filter supports English, French, Italian, German, and Spanish. Training the appliance A database merge is when you add token sets from two databases to form a new database. The merge includes all tokens from both databases. If a token occurs in both databases, the merge combines the spam/ham counts for the token. The merge also combines some statistical information from both databases, for example the total number of ham and spam files contained in the respective training sets. The Bayesian filter is pretrained with a small database by IBM. For the pretrained filter to be useful, you must also use your own custom-trained Bayes database. Since the Bayesian filter only counts words and compares them to the frequency in the training data, results depend on the training data you use. The final spam score is calculated from the word count and the ratio of their occurrence in the training data. You can train the Bayes database with the following data: 1. Spam: Your local bank does not want you to know this!! 2. Ham: Reason for Escalation: CR has already been created for this If you send an message with the content Hello Peter, you know you have to go to the bank to get some cache today. the Bayesian classifier counts the following words as: Hello - NOTHING Peter - NOTHING you - SPAM know - SPAM you - SPAM 86 IBM Internet Security Systems

87 Bayesian Filter have - NOTHING to - SPAM go - NOTHING to - SPAM the - NOTHING bank - SPAM to - SPAM get - NOTHING some - NOTHING cache - NOTHING today - NOTHING Because of the small training set, the message appears very spammy to the classifier, since it is not correctly trained. Using foreign languages in training data If you train the data using different foreign languages, make sure the ham and spam corpus contain the same proportion of foreign languages. For example, you write normal messages in English, and you receive spam in Korean and German. If you train the foreign language spam messages, you may inadvertently train the classifier to block Korean and German messages, since you have no ham messages of these languages in the training set. Using a customtrained classifier A big advantage to using a custom-trained classifier is that it is trained for exactly the type of messages you normally receive at work. For example, if you work at a hospital, the names of drugs are not counted as spammy words and so this prevents overblocking from simpler filters (like the predefined keyword lists), but for other companies, drugs that are advertised in spam messages are considered spammy for the Bayesian classifier. Token types The tokeniser uses regular expression matching to extract tokens from various parts of the message. In addition, some meta tokens are also extracted that relate to the message as a whole. Tokens are extracted from the following areas of an message: Τhe plain text part of the message, and the text content of the HTML part of the message The Subject header field Τhe Received header fields The From header field All URLs found in the message The HTML structure of the message Meta tokens are extracted from the following areas of an message: Εxistence of Message-ID field in header Εxistence of X-MsgInfo field in header Εxistence of very small text in the HTML content Encoded format of Message-ID field in header Token extraction Tokens are extracted on a per message basis. If a token is found more than once in an message, it counts only once in the analysis. IBM Proventia Network Mail Security System Administrator Guide, Version

88 Chapter 5: Spam Settings The classifier uses different regular expressions to extract tokens from text (including subject), header fields, and URLs. The expression for body text and subject allows all alpha-numeric characters (including foreign characters like Ã, Ï), with the optional character separators.,,,, -. The monetary symbols $,, and are allowed before numbers (for example, $500,00), and a single?,!, or % is allowed at the end of a word. The following are examples of tokens from body and subject text: $1.99, 140%, only, only!, opt-in. Tokens from other header fields are restricted to plain alpha-numeric [a-za-z0-9] sequences that may contain the. character. For example, , pop.gmx.net. Tokens from URLs are either IP addresses or alpha-numeric [a-za-z0-9] sequences. Hostnames are split into their constituent parts, as the. character is not allowed between sequences. This behavior is designed for spam URLS that frequently contain random character sequences as host parts. All tokens are case insensitive. porn, PorN, and PORN all equate to the same token. Tokens that consist of the numbers [0-9] are ignored if they are less than five characters in length. Special tokens Tokens are not extracted from the Message-ID field directly, since this field contains random character sequences. Sequences of digits and alpha characters are first encoded up to and including the character, and the entire coded sequence is taken as a token. For example, the message id token <dsdsd$sd$d@ has a high spam value in the default database, whereas the token <sdsd.d@ has a high ham value. The classifier obtains HTML structure tokens from the top-level structure definition created by the Spam Structure Analysis module. The training program extracts tokens from messages that lie in pre-sorted spam and ham directories. The messages must be in a format compliant with [rfc822]1 or [rfc2045]2 (MIME format). Mailbox format is not supported. A mailbox file will, however, be recognized as a valid message and parsed normally. If it contains more than one message, the second and subsequent messages are treated as text belonging to the first message, and so header tokens in these messages are treated incorrectly as plain text tokens. All messages in mailbox files must be first extracted before being presented for database training. Tokens are extracted from attachment data if the attachment is in plain text or HTML format, and are inlined in the message. All other attachment data is ignored. UUencoded data inside a text block is treated as an attachment, and is also ignored. If an message contains attachments, the entire message is ignored. [rfc822]1 and [rfc2045]2 compliant messages are created and read by Microsoft Outlook Express. Other clients, for example, Microsoft Outlook or Lotus Notes may create and read different formats. Procedure You can train the Bayesian classifier by providing a set of ham (good) messages and spam (bad) messages from your Message Stores. 1. In the navigation pane, click Mail Security, and then click Policy. 2. Click the Settings > Bayesian Classifier tab. 88 IBM Internet Security Systems

89 Bayesian Filter 3. Select the Enable Bayesian Classifier Learning box. 4. Select Include Default Database to use the Bayesian database provided by IBM as a basis for the training, in addition to the messages provided in the ham store and the spam store. 5. If you do not include the default database, the database from the training will consist of information gathered from your ham store and spam store. 6. Choose one of your message storage directories to be used as the source for spam and another message storage directory to be used as the source for ham. 7. Do not select the same message storage directory for both ham and spam, or a message storage directory that contains mixed ham and spam messages. You may render the database ineffective. 8. Enable the training, and then choose a schedule. 9. Click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

90 Chapter 5: Spam Settings Spam Flow Control Spam Flow Control classifies an message as spam if the count for a similarity measure over a given time period exceeds a predefined threshold. How Spam Flow Control works The Spam Flow Control module consists of a number of different similarity measures. For a given message, each similarity measure produces a unique signature. A sender address is stored with each signature, and a measure of how often this signature occurs with different sender addresses over a given time frame. If, over a given time frame, the signature count exceeds a predetermined threshold, the signature is added to the shared database, and will be then available to all accounts. Procedure 1. In the navigation pane, click Mail Security, and then click Policy. 2. Click the Settings > Spam Settings tab. 3. Set the number of seconds the appliance should monitor the mail traffic for similar copies of this signature after an message has been received. 4. Set the predefined threshold. 5. Click Save Changes. 90 IBM Internet Security Systems

91 Setting Up End-User Spam Management Accounts Setting Up End-User Spam Management Accounts You or another Administrator can set up access for end users who want to: Browse or access their quarantined or spam messages Create and manage personal block and allow lists Generate a daily quarantine report of quarantined messages Procedure 1. In the navigation pane, click Mail Security, and then click Policy. 2. Click the User Access List tab. 3. Select Denied from the Default Access drop-down list. 4. In the Enduser Accessible URL field, type the IP address of the End-User Login/ Authentication site followed by the port number Default: : Select a Who object from the Who drop-down list. 6. Select the Granted access mode in the Access Type drop-down list. 7. Click OK, and then click Save Changes. Creating a new account for an end user You can use LDAP to manage the End-User Login/Authentication site where end users create and manage their personal block and allow lists. If you do not use LDAP, the end user must create an account on the End-User Login/Authentication page. Example if used LDAP: In the User Access List, add a Directory Who object to the Allow List (Mail Security >Policy> User Access List). LDAP users will be able to log on with their SMTP address as their user name without having to create a new account on the End-User Login page. Example if did not use LDAP: In the User Access List (Mail Security > Policy > User Access List), configure the mail security policy to allow all SMTP addresses *@iss.net. The end user jdoe@iss.net can create an account, however jdoe@iss.de will not be allowed to create an account. Procedure for local users 1. Open a Web browser. 2. In the Address field, type the IP address of the End-User Login/Authentication site followed by the port number Example: The Login page appears. 3. Click on the Create a New User link. 4. Type the address of the end user you want to create an account for, and then click Create a New User. IBM Proventia Network Mail Security System Administrator Guide, Version

92 Chapter 5: Spam Settings Managing end-user access lists You can also perform the following additional administrative tasks on the End-User Management page: 1. In the navigation pane, click System, and then click Enduser Manager. 2. Choose an option: If you want to... Search for an end user Delete an invalid block or allow list for a user Delete an end user from managing a block or allow list Reset an end-user's password Then... Type a user name in the Filter field, and then click Filter. Select one or more end users, and then click Delete Blocklist or Delete Allowlist. Select an end user in the list, and then click Delete User. Select an end user, and then click Reset Password. The new password is automatically sent by message to that user. 92 IBM Internet Security Systems

93 Chapter 6 Message Queues Overview This chapter describes how the appliance stores and tracks messages that pass through it. In this chapter This chapter contains the following topics: Topic Page Setting Up Directories that Store Archived or Quarantined Messages 94 Searching for Messages in the Message Storage Directories 95 Running Queries to Locate Messages in a Message Storage Directory 96 Tracking Messages 97 Deleting Undelivered Messages and Log Files from the Appliance Database 98 IBM Proventia Network Mail Security System Administrator Guide, Version

94 Chapter 6: Message Queues Setting Up Directories that Store Archived or Quarantined Messages Storage directories enable you to store messages that you want to archive or quarantine. Types of storage directories The appliance provides two types of directories that you can use to store messages: Message Storage Type Description Message Store Quarantine Store Stores blocked or delayed messages, including messages that are considered bad or problematic. Stores messages that meet certain criteria defined by an Administrator, such as messages that are infected by viruses or contain confidential data. Table 14: Types of message storage directories Creating a storage directory 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Storages tab. 3. Click Add. 4. Select the type of message storage directory from the Store Type drop-down list. 5. Type a name for the message storage directory. 6. Click the General tab. 7. Set the number of days you would like to store the messages in that storage directory. 8. Choose when and how the messages will be delivered to their intended recipient. 9. Select a schedule to define when the appliance will deliver quarantine reports to the intended recipient. 10. Click the MetaData tab. 11. Use the macros that represent which part of the message you want sent to the recipient of the quarantine report. 12. Click OK, and then click Save Changes. Deleting messages from a storage directory You use the message log cleanup tool to delete unnecessary messages in order to free up space in a storage directory. 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Storages tab. 3. Select the Enable box in the Message Log Cleanup area. 4. Set the number of days to keep the logs. Tip: You should set this value to seven days. 5. Click Save Changes. 94 IBM Internet Security Systems

95 Searching for Messages in the Message Storage Directories Searching for Messages in the Message Storage Directories You can search for messages that have been sent to a specific directory based off the policy rules enabled for inspecting that type of message. Procedures 1. In the navigation pane, click Mail Security, and then click Browser. 2. Choose an option: If you want to... Search in a specific folder for an message Search for a specific message Then Select Folders from the Search drop-down list. 2. In the Folder specific section, select a folder type. 3. Optional: Provide the name and the number of messages in the folder you want to search for in the message storage. 1. Select Mails from the Search drop-down list. 2. In the Mail specific section, provide the following filtering criteria: Message ID The message identifier. Sender The sender of the message. Recipient The recipient of the message. Subject The subject of the message. Metadata Information about the sender, recipient(s), creation date, and attachments. The types of metadata are dependent on how you have configured the MetaData field for the individual Message Store or Quarantine Store. Size The size of the message. Folder The location of the message in the stores. In Timerange The range of time in which to search for the message. Use the yyyy-mm-dd hh:mm:ss format: :45: Click the Search button. IBM Proventia Network Mail Security System Administrator Guide, Version

96 Chapter 6: Message Queues Running Queries to Locate Messages in a Message Storage Directory Use queries to search for blocked, delayed, or quarantined messages that are being stored in a message storage directory. Example of creating and saving a query To search for messages addressed to username@mycompany.com: 1. In the navigation pane, click Mail Security, and then click Browser. 2. Select Mails from the Source drop-down list. 3. In the Mail Specific section, type username@mycompany.com in the Sender field. 4. Click the Search button. 5. Click Save in the Filter active area. 6. Type the name of the query in the Name field, and then click Save. 7. The next time you want to search for messages addressed to username@mycompany.com, go to Mail Security > Browser, select the query from the Favorite drop-down list, and then click Load Query. Procedures 1. In the navigation pane, click Mail Security, and then click Browser. 2. In the Source section, select Favorites from the Search drop-down list. 3. Choose an option: If you want to... Search for an often used query Save a Search Favorites query Delete a query from the Search Favorites list Then In the Favorite specific section, select a query from the Favorite drop-down list. 2. Click the Load Query button to display the query. 1. In the Favorite specific section, select a query that you would like to save. 2. Select Save in the Filter Active area. 3. Type a meaningful name for your query, and then click Save Query. 1. In the Favorite specific section, select a query that you would like to delete. 2. Click Delete Query. 96 IBM Internet Security Systems

97 Tracking Messages Tracking Messages You can set up the appliance to track incoming messages, beginning at the SMTP layer, until the messages are sent out or dropped. Procedure 1. In the navigation pane, click Mail Security, and then click Policy. 2. Click the Message Tracking/Reporting tab. 3. Select one of the following options: Option Disabled Standard Verbose (more details) Description The appliance will not track messages. The appliance tracks the following information about the message: When it entered the system at the SMTP layer When it was processed by the mail security policy When it was sent out at the SMTP layer This option is useful when you use Recipient Verification at the SMTP layer to track the following information about an message: When and why the message was rejected or dropped at the SMTP layer The flow of an message through the system (such as which sending server accepted the message) The delay between when the message was accepted at the SMTP layer and analyzed Which SMTP server sent out the message The appliance uses the information it has gathered from the following sources: The Standard mode (see above) Logging information Analysis details This option is useful if you need to contact Technical Support about an issue you are having with the appliance. 4. Click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

98 Chapter 6: Message Queues Deleting Undelivered Messages and Log Files from the Appliance Database You can remove undelivered messages and log files from the appliance that are not stored in a message storage directory or are older than the amount of time you specified for storage. Note: These tasks run automatically in the background, and do not require user intervention. Procedure 1. In the navigation pane, click SMTP, and then click Configuration. 2. Click the Maintenance tab. 3. Set the number of days to keep undelivered messages or log files in the database. 4. Click Save Changes. 98 IBM Internet Security Systems

99 Chapter 7 Reports Overview This chapter explains how to view and generate predefined reports from the appliance. In this chapter This chapter contains the following topics: Topic Page Generating a Predefined Report 100 Scheduling When to Run Predefined Reports from the Appliance 101 Defining Recipients of a Quarantine Report 102 Customizing the Quarantine Report 103 IBM Proventia Network Mail Security System Administrator Guide, Version

100 Chapter 7: Reports Generating a Predefined Report The appliance provides predefined reports that you can use to understand your mail security status. These reports allow you to monitor traffic flow within the appliance, identify the top senders and internal recipients of spam-based messages, and fine-tune your policy settings. Procedure 1. In the navigation pane, click Mail Security, and then click Reporting. 2. If applicable, provide the following values: A data source A start time for the report An end time for the report 3. Select one of the following reports, and then click Generate: Report Executive Summary Traffic Monitoring Matched Rules Policy Configuration Top 10 Responses Top 10 Analysis Modules Top 10 Recipients Top 10 Senders Top 10 Viruses Description Displays the overall throughput of the appliance versus the messages that where taken action on, as well as quarantined versus messages released from quarantine. Provides information about network traffic over a given period of time. Provides information about which policy rules matched over a given period of time. Provides information about the mail security policy currently in place. Provides information about the top 10 responses that were executed by the mail security policy over a given period of time. Provides information about the top 10 analysis modules that have matched Analysis modules enabled in the mail security policy. Provides information on the top 10 recipients by number of received messages. Provides information on the top 10 senders by number of messages sent. Provides information on the top 10 viruses by number of infected messages. 4. Print the report. 100 IBM Internet Security Systems

101 Scheduling When to Run Predefined Reports from the Appliance Scheduling When to Run Predefined Reports from the Appliance You can schedule when to generate a report from the appliance. Procedure 1. In the navigation pane, click Mail Security, and then click Policy. 2. Click the Message Tracking/Reporting tab. 3. Select the Reporting Enabled box. 4. Set the number of days to keep the report on the filesystem. 5. Optional: Select Database Enabled to save the report to the appliance s database. 6. Optional: Select SiteProtector Enabled to use graphical reports integrated in SiteProtector. 7. In the Configure Scheduled Reports section, click Add. 8. Select Cluster if the appliance is part of a cluster. 9. Select a report from the drop-down list. 10. In the To field, specify which addresses should receive the report. 11. Select Enable, and then select a schedule. 12. Choose to schedule the report from either a relative or an absolute time range. 13. Click OK, and then click Apply Settings. IBM Proventia Network Mail Security System Administrator Guide, Version

102 Chapter 7: Reports Defining Recipients of a Quarantine Report You can specify which addresses in a quarantine store should be included in the quarantine report. Defining recipients of a quarantine report A recipient s address is automatically added to the quarantine store if: The domain part of the SMTP address is found in one of the SMTP local domains. The domain part of the SMTP address is found in the semicolon separated list of additional domains defined in the tuning parameter msgstore.quarantine_domains. You can also define the recipients of a quarantine report by enabling a setting in the Mail Security Policy page. Each user, who is defined, receives a periodic report of messages. They can then decide if they want the message delivered to their mailbox. Process for generating a quarantine report You generate a quarantine report based on a customized template that uses various macros, and on which schedule is in use for the corresponding quarantine store. The appliance delivers the quarantine report directly by message to any recipient with quarantined messages. 102 IBM Internet Security Systems

103 Customizing the Quarantine Report Customizing the Quarantine Report You can define your own quarantine report by modifying the default template. Line template The line template defines the display of blocked messages and relevant information including the link to allow delivery. You can add customized messages or notifications to the template to provide information that is needed by users. message template The template must contain at least the $(DAILYLIST) macro, which is replaced with a list of blocked messages. The line template text file defines each line of that list. The following provides an example of the line template: <tr> <td width="20%">$(encodehtml $(MSG.FROM))</td> $(ENCODEHTML $(MSG.urn:schemas:httpmail:from))</td> <td width="60%"> $(ENCODEHTML $(ORIGMSG.SUBJECT))</td> <td width="20%"> <a href=" Deliver</a><br> <a href="mailto:$(smtpaddress)?subject=$(cmd.deliver)"> Deliver by </a></td> </tr> The example above is a mixture of HTML code and the template macros. This example displays a row in a table, and includes information such as Sender, Original Message Subject, and the respective delivery links. You can customize the formatting and usage of macros. You can also make a test message to trigger the rule to test the output of the quarantine report. In the template message, you can only use a few macros that are not specific to a current message, for example, $(RECIPIENTNAME). If the appliance contains information about the domain or LDAP user name, it will be replaced with the respective user name. Otherwise, the appliance displays the address of the user. Important: Do not use special characters such as umlauts when defining the folder names. The use of white may cause problems with delivery through an http: link. Procedure 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Quarantine Report Templates tab, and then click Add. 3. Type a name for the report. IBM Proventia Network Mail Security System Administrator Guide, Version

104 Chapter 7: Reports 4. Click the Template tab. 5. Click the arrow to the right of the Body tab to display a list of macros: Macro $(TAB) $(CR) $(DATE) $(DATE.DAY) $(DATE.MONTH) $(DATE.YEAR) $(DATE.HOUR) $(DATE.MINUTE) $(HOSTNAME) Description The tabulator macro or \t. The new line macro or \n. The current date. The current day. The current month. The current year. The current hour. The current minute. The host name. $(ADMINSERVERPORT) The port of the Administrator's server or port $(ENDUSERSERVERPORT) The port of the end user server or port $(MSGSTORE) $(LOGDIR) $(CONFIGDIR) $(ENV.<env>) $(OPTION.<option>) $(FILE.<filename>) $(ENCODEHTML) $(NEWMSGSENDER) $(POSTMASTER) $(DAILYLIST) $RECIPIENTNAME) $(RECIPIENT) $(ENDUSERLINK) The Message Store root directory. The Log file directory. The configuration directory. The value of the environment variable <env>. The value of the tuning parameter <option>. The content of the file <filename>. Encodes the HTML tags in the macro text. The value of the Send New As configuration item (page 38). Sends the detected message to the original sender as postmaster@mycompany.com and informs the sender that the original message has been quarantined. This macro is replaced with a list of blocked messages. The SMTP address or directory user name of the recipient (if available). The SMTP address of the recipient. The value of the Enduser Accessible URL configuration item. 6. Enter the macro that you want to use for the template. 7. Click the Line Template tab. 8. Enter the macros you want to use for each line. 9. Click OK, and then click Save Changes. 104 IBM Internet Security Systems

105 Part III Maintenance

106

107 Chapter 8 Updates Overview This chapter explains how to download and install firmware, database, and security content updates for your appliance. Attention: You should update your appliance as soon as possible after the initial setup to make sure you have the latest protection capabilities. Updates ensure that the appliance has the latest fixes, features, security content, and database updates. In this chapter This chapter contains the following topics: Topic Page Updating the Appliance 108 Configuring Automatic Updates 109 Rolling Back Updates 112 Using Advanced Parameters for Update Settings 113 IBM Proventia Network Mail Security System Administrator Guide, Version

108 Chapter 8: Updates Updating the Appliance You should always make sure your appliance is running the latest firmware, security content, and database updates. Your appliance retrieves updates from the Download Center, accessible over the Internet. Types of updates you can install You can install the following updates: Firmware updates Security content updates Update packages and rollbacks A rollback removes the last update that was installed on the appliance. You cannot roll back firmware updates. Attention: You should perform a full system backup before you install a firmware update. If you enable automatic firmware updates, you can enable the Perform Full System Backup Before Installation option. After an update is installed, the appliance deletes the update package and the downloaded package is no longer on your appliance. If you roll back the update, then the appliance finds the update available for download and installation the next time you find updates or at the next scheduled automatic update. The SiteProtector system management If you manage your appliance with the SiteProtector system, you can install an update while the appliance is registered with the SiteProtector system s Agent Manager. Creating a system backup Attention: You should create a system backup prior to installing any firmware updates. To ensure that you have a system backup before each automatic firmware update installation, you can enable the Perform Full System Backup Before Installation option on the Automatic Update Settings page. Troubleshooting download problems If you experience problems in Proventia Manager after you apply a firmware update, try the following steps: 1. Close your Web browser. 2. Clear your Java cache. 3. Restart your Web browser, and log on to Proventia Manager. Reference: For more information about how to clear your Java cache, refer to your operating system documentation. 108 IBM Internet Security Systems

109 Configuring Automatic Updates Configuring Automatic Updates You can configure the appliance to automatically check for firmware or database updates. Specifying when to check for updates 1. In the navigation pane, click Updates, and then click Automatic Updates. 2. Click the Update Settings tab. 3. Select when the appliance should automatically check for updates: Option Check for updates daily or weekly Check for updates at given interval Description Specifies the day of week and time of day Note: Make sure that your appliance checks for updates at least one hour before automatic installations to ensure sufficient time for downloading updates. Specifies an interval (in minutes) Default: The range is 60 minutes to 1440 minutes (24 hours). Configuring automatic security updates 4. You can schedule the appliance to automatically confirm whether there are security updates available for install from the IBM Web site. To specify whether the appliance automatically downloads and installs security updates: Option Automatically Download Automatically Install Description Enables the appliance to download any applicable updates it finds Enables the appliance to automatically install any downloaded updates 5. Select the Automatically Update Mail Security Database check box if you want to enable that feature. 6. Select the Automatically Download check box if you want to automatically download firmware updates. 7. Select the Perform Full System Backup Before Installation if you want to enable that feature. This option is enabled by default. You should perform a full system backup before installing a firmware update. Your appliance stores only one system backup, so this option overwrites the previous system backup. Specifying when to install firmware updates 8. You can schedule the appliance to install firmware updates when they are available from the IBM ISS Web site. To specify when to install firmware updates: Option Description Do Not Install Requires you to do all installations manually. This option gives you the most control over how an installation impacts your operation. IBM Proventia Network Mail Security System Administrator Guide, Version

110 Chapter 8: Updates Option Automatically Install Updates Description Updates are installed automatically based on the When To Install choice you selected: Delayed: Designates the day of week and time of day the installations occur Immediate: Starts the installation as soon as the update is downloaded. This option gives you the least control and predictability of when an installation occurs. Important: Installing an update can take the system offline while the installation is in progress. 110 IBM Internet Security Systems

111 Scheduling a One-Time Firmware Installation Scheduling a One-Time Firmware Installation You can schedule the appliance to install specific firmware updates that are available for install from the IBM ISS Web site. What are firmware updates? A firmware update is an update from the Download Center that contains: New program files Fixes or patches Enhancements Online Help Firmware updates can be automatically downloaded and installed. Some firmware updates require that you reboot your appliance after installation. Procedure 1. In the navigation pane, click Updates, and then click Automatic Updates. 2. Click the Update Settings tab. 3. Select Schedule One-Time Install in the Firmware Updates section. 4. Select which version you want to install: If you want to install versions up to... The most recent version A specific version number Then... Select All Available Updates. Select Up To Specific Version, and then type the version. Example: To install up to version 2.1, type the following in the Version field: Click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

112 Chapter 8: Updates Rolling Back Updates You can roll back updates that have already been applied to the appliance. What is a rollback? A rollback removes the antispam or antivirus update that was installed on the appliance. You cannot roll back firmware updates or database updates. Cumulative updates and rollbacks Updates are cumulative. Refer to the following example for a description of the appliance behavior during a roll back of cumulative updates. Example: If you install Security Content update version and then wait to install future updates until you install version , the appliance is updated with all Security Content to version If you roll back the update, however, the rollback takes the appliance back to version Update packages and rollbacks After an update is installed, the appliance deletes the update package. Therefore, the downloaded package is no longer on your appliance. If you roll back the update, then the update will be found as available for download and installation the next time you find updates or at the next scheduled automatic update. Procedure 1. In the navigation pane, click Updates, and then click Status & Licensing. 2. Select a security content section that contains outdated content. 3. Click Rollback Update. 112 IBM Internet Security Systems

113 Using Advanced Parameters for Update Settings Using Advanced Parameters for Update Settings You may need to use parameters to tune the update settings for the appliance. Procedure 1. In the navigation pane, click Updates, and then click Status & Licensing. 2. If needed, review the Export Agreement, select Yes, and then click Submit. 3. Click the Advanced Parameters tab. 4. Do one of the following: If you want to... Add a parameter Edit a parameter Copy a parameter Remove a parameter Then Click Add. 2. Type a parameter name. 3. Type a meaningful description. 4. Specify the value type and value. 5. Click OK. 1. Select a parameter, and then click Edit. 2. Edit the parameter, and then click OK. 1. Select a parameter, and then click Copy. 2. Click Paste. 3. Edit the parameter as needed, and then click OK. Select a parameter, and then click Remove. IBM Proventia Network Mail Security System Administrator Guide, Version

114 Chapter 8: Updates 114 IBM Internet Security Systems

115 Chapter 9 System Backups Overview This chapter explains how to back up the appliance s configuration settings and system settings. In this chapter This chapter contains the following topics: Topic Page Options for Backing Up the Appliance 116 Backing Up Configuration Settings 117 Making Full System Backups 118 Configuring an FTP Server for Data Backup 119 Scheduling Administrative Tasks from the Mail Security Policy 120 Backing Up the Appliance s Log Files 121 Using System Tools 122 Reinstalling the Appliance 123 IBM Proventia Network Mail Security System Administrator Guide, Version

116 Chapter 9: System Backups Options for Backing Up the Appliance Use the Backup & Restore page to create two types of backup files for your appliance: Backup Type Description Settings Backs up your appliance s configuration settings. (See page 117.) Full Backs up the operating system and the configuration settings of the appliance. (See page 118.) Table 15: Types of backups If you restore before you make backup files The default system backup for a new appliance contains the original installation. Therefore, if you restore a system backup or apply settings snapshot files before you create your own backup files, you are restoring the appliance to its installation defaults. The following consequences result: You lose the configuration settings you have already applied. If you restore from a system backup, you lose any updates you have applied. You cannot connect to the Proventia Manager until you reconfigure the appliance. Important: Use this option to automatically back up your system before it installs updates to avoid having to reconfigure your appliance in case of an emergency. Clearing the Java cache After you restore the system from a backup file, be sure to do the following before you log back on to the Proventia Manager: 1. Close all browser windows. 2. Clear the Java cache. Note: For information about how to clear your Java cache, refer to your operating system documentation. In Windows operating systems, it is typically available in the Control Panel, under Java. Important: If you do not perform these steps, Proventia Manager may behave unpredictably. 116 IBM Internet Security Systems

117 Backing Up Configuration Settings Backing Up Configuration Settings The process for updating your appliance is designed to keep your appliance up-to-date while taking the precautionary action of backing up your system before you install updates that alter original configuration settings. Snapshot files Create a settings snapshot file of your appliance s original configuration settings before you apply firmware updates or change your configuration settings. You can also create additional settings snapshot files if you want to use different configuration settings or test new policy settings for the appliance. Site certificate issues with Firefox 3.x If you import and install a backup file that you have previously saved, you may receive a site certificate security warning when you first try to open Proventia Manager or access the End-User Login/Authentication site using the Firefox 3.x browser. You will need to close your Firefox session after you import and install the backup, and then open a new session to delete the self-signed certificate. See Deleting Self-Signed SSL Certificates in Firefox 3.x on page 27 for more details. Default settings file FactoryDefault.settings contains the original appliance settings. Procedure 1. In the navigation pane, click Backup & Restore, and then click System. 2. Click Manage Configuration Backups. 3. In the Configuration Backups section, choose an option: If you want to... Create a snapshot file Restore a snapshot file Delete a snapshot file Upload a snapshot file Download a snapshot file Then Click New. 2. Type a name for the snapshot file, and then click Create. Select the snapshot file you want to restore, and then click Restore. Select the snapshot file you want to delete, and then click Delete. 1. Click New. 2. Type the name of the snapshot file you want to upload, and then click Upload. Select the snapshot file you want to download, and then click Download to copy the file to your local computer. IBM Proventia Network Mail Security System Administrator Guide, Version

118 Chapter 9: System Backups Making Full System Backups You should create a full system backup before you apply firmware updates and before you download and apply snapshot files that change the original configuration settings of the appliance. Backup file restrictions The following restrictions apply to creating full system backups: You can only have one system backup. Creating a system backup overwrites the previous backup. Creating a system backup takes the appliance offline and disrupts connectivity for several minutes. Procedure 1. In the navigation pane, click Backup & Restore, and then click System. 2. Click Manage System Backup. 3. Choose an option: If you want to... Create a full system backup Restore a system backup Then... Click Create System Backup. Click Restore System Backup. Important: The IP address for the appliance is unavailable during the backup process, and you cannot access the Proventia Manager in the browser window. 118 IBM Internet Security Systems

119 Configuring an FTP Server for Data Backup Configuring an FTP Server for Data Backup You can configure an FTP server to back up the appliance s log files. Procedure 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the FTP Servers tab. 3. Click the Add icon. 4. Type the name, hostname, port number, root directory, and the user who has access to log on to the FTP server. 5. Confirm the password. 6. Click OK, and then click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

120 Chapter 9: System Backups Scheduling Administrative Tasks from the Mail Security Policy You can schedule the following tasks from the appliance: Back up mail security data Clean up the SMTP log Deliver quarantine reports to intended recipients Procedure 1. In the navigation pane, click Mail Security, and then click Policy Objects. 2. Click the Schedules tab, and then click Add. 3. Type a name for the schedule. Example: Enter Daily 7:00 to schedule the task to run every day at 7:00 A.M. 4. Configure the schedule times in the Timerange area. Example: The time ranges display as YYYY-MM-DD and use a 24 hour clock. For example, 7:00 P.M. displays as 19: Click OK. 120 IBM Internet Security Systems

121 Backing Up the Appliance s Log Files Backing Up the Appliance s Log Files You can back up log files to use for diagnosing issues with the appliance. Procedure 1. In the navigation pane, click Backup & Restore, and then click Logfiles. 2. Select Enable Backup. 3. Schedule a time to back up the log files. 4. Choose where you would like to back up the files. 5. Click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

122 Chapter 9: System Backups Using System Tools The appliance provides tools that you use to perform basic system maintenance and diagnostic functions. Procedure 1. In the navigation pane, click System, and then click Tools. 2. Choose an option: If you want to... Reboot the appliance Shut down the appliance Ping a computer Use the traceroute utility Renew the DHCP lease Clear the DNS entries currently cached in memory Then... Click Reboot. Click Shut Down. After the appliance shuts down, you must press the power button on the appliance to manually restart it. Type the IP address of the computer you want to test, and then click Submit. 1. Type the IP address you want to trace. 2. Select a protocol, and then click Submit. Click Renew Lease. Click Clear Cache. 122 IBM Internet Security Systems

123 Reinstalling the Appliance Reinstalling the Appliance This topic describes the process and procedures for reinstalling the appliance. Caution: Reinstalling the appliance firmware clears the appliance s current configuration settings and all data stored on the appliance. The Recovery CD The Recovery CD included in the appliance packaging contains the software that was installed on the appliance at the factory. You can reinstall the software from this CD on the appliance. Important: Reinstalling the appliance means erasing all data from the system and returning it to its factory state. Only perform this procedure under the guidance of IBM ISS Technical Support. Recovery process Use the following procedure to reinstall the firmware on your appliance: 1. Connect a computer monitor to the appliance. 2. Boot the Recovery CD. 3. At the prompt, type reinstall, and then press ENTER. The installer reloads the operating system. Note: When the reinstallation is complete, the appliance automatically reboots. Let the appliance complete the boot process without interruption. 4. When the appliance has rebooted, the unconfigured.appliance login prompt appears. You can log in with the default user and password of admin/admin and configure the appliance using the Configuration Menu. Results This process does the following: Overwrites software configuration changes you have made since you first installed the appliance. Restores the original, default login credentials for the username and password (admin/admin). IBM Proventia Network Mail Security System Administrator Guide, Version

124 Chapter 9: System Backups 124 IBM Internet Security Systems

125 Chapter 10 Alerts and Logs Overview This chapter describes the alert and log selections available from the appliance. In this chapter This chapter contains the following topics: Topic Page Configuring Alert Logging for and SNMP Alerts 126 Managing System-Related Events 129 Enabling Alerts and Logging for Intrusion Prevention Settings 130 Viewing Log Files for the Appliance 133 Deleting Undelivered Messages and Log Files from the Appliance Database 134 Backing Up the Appliance s Log Files 135 IBM Proventia Network Mail Security System Administrator Guide, Version

126 Chapter 10: Alerts and Logs Configuring Alert Logging for and SNMP Alerts Alerts define the types of errors, warnings, or informational messages that should be included in an notification or SNMP notification, in addition to the recipients of those alert messages. Defining recipients of alert messages You can enable the appliance to send alert messages to a designated address or group. 1. In the navigation pane, click System, and then click & SNMP Alerts. 2. Click the Alerts Recipients tab. 3. In the Configuration section, click Add. 4. Provide the following information: Option Name SMTP Host To Subject Format Body Format Description A meaningful name for the response entry. The mail server (as a fully qualified domain name or IP address). Note: The SMTP Host must be accessible to the appliance to send notifications. Do not use the IP address or the hostname of the appliance. An individual recipient or group. A list of message subject fields. A list of message body fields. Note: This field is blank by default. If you leave this field blank, the response includes all available fields. You can also customize this content by typing your own text and embedding fields from the list. You should leave this field blank, so that the response contains all relevant fields. 5. Click OK, and then click Save Changes. Configuring alert logging You can enable the appliance to send alert messages that notify you of mail security or system-related events. 1. In the navigation pane, click System, and then click & SNMP Alerts. 2. Click the Alert Configuration tab. 3. Select any of the following alert logging check boxes to enable logging and notification for that type of event: Alert Logging for Mail Security Events Alert Logging for System Error Events Alert Logging for System Warning Events 126 IBM Internet Security Systems

127 Configuring Alert Logging for and SNMP Alerts Alert Logging for System Info Events Note: If you enable the Send Alerts for System Info Events setting, and then reboot the appliance, you may receive the following message in the Message.log or as an SMTP or SNMP notification message: Message: Critical entry point(responsesdkgetclassobject) of library... This is expected behavior for this type of message and does not require user intervention. Enabling SNMP notifications You can enable an SNMP Get to retrieve a piece of appliance information, or enable an SNMP Trap to report when certain events about the appliance occur. SNMP traps may be sent out for any of the following reasons: If a link goes up or down If the disk usage goes below 10% If authentication with SNMP Get fails If the average system load for each interval exceeds a certain threshold value Procedure 1. In the navigation pane, click System, and then click & SNMP Alerts. 2. Click the Alert Configuration tab. 3. Click Configure SNMP. 4. Choose an option: If you want to enable an... SNMP Get SNMP Trap Then Select the SNMP Get Enabled box. 2. Provide the system name, the system location, contact information, and the appropriate community name. 3. Click Save Changes. 1. Select the SNMP Traps Enabled box. 2. Provide the following information: Trap Receiver The IP address running the SNMP Manager. The SNMP host must be accessible to the appliance to send notification. Trap Address The appropriate community name (public or private). Trap Version The following trap versions are available: - V1: Simple Network Management Protocol version 1 - V2C: Community-Based Simple Network Management Protocol version 2 IBM Proventia Network Mail Security System Administrator Guide, Version

128 Chapter 10: Alerts and Logs Adding an event notification advanced parameter You can add an event notification parameter to the appliance. 1. In the navigation pane, click System, and then click & SNMP Alerts. 2. Click the Advanced Parameters tab. 3. Click Add. 4. Type the name of the parameter, a meaningful description, and then specify the value type and value. 5. Click OK, and then click Save Changes. 128 IBM Internet Security Systems

129 Managing System-Related Events Managing System-Related Events The appliance enables you to view and manage mail security events, system messages, intrusion prevention events, or update issues generated by the appliance over a specified period of time. Risk level icons You can determine the risk level of an event by the icon in the Risk Level column of the log file: Icon Description A low risk event A medium risk event A high risk event Table 16: Risk level descriptions Event information icons Additional information about an event is available by clicking the event information icon in the Alert Name column of the log file: Links to an X-Force Alert Description of the event Searching by filtering options 1. In the navigation pane, click System, and then click Events. 2. Select On in the Filter field. 3. Specify a search value for the chosen filtering option: Option Start Date End Date Severity Event Type Event Name Search Value Type the start date in the field. Use the yyyy-mm-dd hh:mm:ss format: :45:10. Type the end date in the field. Use the yyyy-mm-dd hh:mm:ss format: :45:10. Select a risk level: High Medium Low Choose the type of alert on which you want to filter from the list. Type any valid alert name in the box. 4. Click Filter Results. IBM Proventia Network Mail Security System Administrator Guide, Version

130 Chapter 10: Alerts and Logs Enabling Alerts and Logging for Intrusion Prevention Settings Intrusion prevention settings monitor network traffic and block attacks. The settings seldom change. However, you may occasionally need to perform maintenance tasks to keep the appliance properly configured. Intrusion Prevention events The Intrusion Prevention feature takes the following actions: Detects and block attacks in progress Detects and blocks audits such as unauthorized port scans or network surveillance Alerts you by message, by network message (SNMP traps), or in the IBM SiteProtector Console about attacks, audits, and blocking activity Logs attacks, audits, and blocking activity in the system log filters events Guidelines If you expect a high volume of events, then you should carefully consider the type of alerts and logging you choose. A large number of alerts and log entries can require a significant amount of storage space and processing power. Enabling alerts and logging for IPS events 1. In the navigation pane, click System, and then click IPS Configuration. 2. Click the Event Notification tab. 3. Select any of the following check boxes to enable alert logging for their category of events: Alert Logging for Blocked Events Alert Logging for Non-Blocked Attack Events Alert Logging for Non-Blocked Audit Events Non-Blocked Audit Event Notification Delivery 4. Select how the appliance notifies you of the event: If you want to... Receive alerts by message Configure another account for notification Receive network alerts (SNMP traps) Configure SNMP Get or an SNMP Trap Receive Intrusion Prevention statistics Then Select Enabled. 2. Select the account name from the Name drop-down list. Select Configure . Tip: If you use notification, leave the default setting for the attack.log_one_attack_every advanced parameter. The default setting is 100, which means that if 100 of the same type of event occur only 1 log event record will be written. Therefore, you will receive only one notification, rather than 100. Select SNMP Trap Enabled. Select Configure SNMP. Select the Status Summary Enabled box. 130 IBM Internet Security Systems

131 Enabling Alerts and Logging for Intrusion Prevention Settings 5. Click Save Changes. Enabling alerts and logging for general events 1. In the navigation pane, click System, and then click IPS Configuration. 2. Click the Event Notification tab. 3. Specify whether to receive alerts for the following settings in the Alert Logging for General Events section: Event Quarantine Rule Added Quarantine Rule Removed Quarantine Rule Expired Quarantine Rule Matched Invalid Checksum Invalid Protocol Resource Error Blocked TCP Connection Result Displays an alert if a quarantine rule is added Displays an alert if a quarantine rule is removed Displays an alert if a quarantine rule has expired Displays an alert if a quarantine rule matches Drops packets that contain an invalid IP or TCP checksum Drops packets that violate IP protocol Drops packets if there are insufficient resources to inspect the packet Drops TCP packets that are not part of an existing connection 4. Click Save Changes. Adding event filters Event filters control the events that the appliance generates. Set up event filters when you want the appliance to ignore events on specific hosts or traffic. 1. In the navigation pane, click System, and then click IPS Configuration. 2. Click the Event Notification tab. 3. Choose an option: If you want to... Add an event filter Add a rule to an event filter Then Click the Add icon. 2. Type a meaningful name in the Description field. The description identifies the filter in events and responses. 3. Select Enabled to enable the event filter. 4. Select an issue from the Issue ID list. 5. Click OK, and then click Save Changes. 1. Select an event filter entry, and then click Edit. 2. Select an issue from the Issue ID list. 3. In the Event Filter area, click Add. 4. To add other rules, repeat Steps 2 and Click OK, and then click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

132 Chapter 10: Alerts and Logs Viewing the IPS issue list You can view a list of intrusions encountered by the appliance. Intrusions can occur when a device attempts to exploit a vulnerability in your network or when a device attempts to scan your network for information that can be used in an attack at a later time. 1. In the navigation pane, click System, and then click IPS Protection List. 2. Choose an option: If you want to view... The list A specific issue in the list Then... Select an issue in the list 1. Select an issue in the list 2. Click Display. 3. Review the details about the issue. 4. Click OK. Using IPS advanced parameters The following advanced parameters are preconfigured for the appliance: Parameter Description ipm.assume.valid.checksum ipm.drop.invalid.checksum ipm.drop.invalid.protocol ipm.drop.resource.error ipm.drop.rogue.tcp.packets Assumes all IP and TCP checksums are valid Drops packets that contain an invalid IP or TCP checksum Drops packets that violate IP protocol Drops packets if there are insufficient resources to inspect the packet Drops TCP packets that are not part of an existing connection Table 17: Advanced parameters for Intrusion Prevention 1. In the navigation pane, click System, and then click IPS Configuration. 2. Click the Advanced Parameters tab. 3. Click the Add icon. 4. Type the parameter name, a meaningful description, and then specify the value type and value. 5. Click OK, and then click Save Changes. 132 IBM Internet Security Systems

133 Viewing Log Files for the Appliance Viewing Log Files for the Appliance You can view or download a log file from the appliance to your local machine if you need to troubleshoot an issue you are having with the appliance. Procedure 1. In the navigation pane, click System, and then click Logfiles. 2. Choose a directory in the Browse Directories area. 3. Select the log file that you want to view. 4. Optional: Click the Download button to download the log file to a directory of your choice. IBM Proventia Network Mail Security System Administrator Guide, Version

134 Chapter 10: Alerts and Logs Deleting Undelivered Messages and Log Files from the Appliance Database You can remove undelivered messages and log files from the appliance that are not stored in a message storage directory or are older than the amount of time specified for storage. Note: These tasks run automatically in the background, and do not require user intervention. Procedure 1. In the navigation pane, click SMTP, and then click Configuration. 2. Click the Maintenance tab. 3. Set the number of days to keep undelivered messages or log files in the database. 4. Click Save Changes. 134 IBM Internet Security Systems

135 Backing Up the Appliance s Log Files Backing Up the Appliance s Log Files You can back up log files to use for diagnosing issues with the appliance. Procedure 1. In the navigation pane, click Backup & Restore, and then click Logfiles. 2. Select Enable Backup. 3. Schedule a time to back up the log files. 4. Choose where you would like to back up the files. 5. Click Save Changes. IBM Proventia Network Mail Security System Administrator Guide, Version

136 Chapter 10: Alerts and Logs 136 IBM Internet Security Systems

137 Appendixes

138

139 Appendix A End-User Spam Management Overview This appendix provides procedures that enable an end user to set up and manage their personal block list or allow list. In this appendix This appendix contains the following topics: Topic Page Browsing a Quarantine Store for Blocked Messages 140 Adding or Deleting Entries from a Personal Block or Allow List 141 Changing a Password on a Personal Block or Allow List Account 142 Requesting a Quarantine Report on Blocked Messages

140 Appendix A: End-User Spam Management Browsing a Quarantine Store for Blocked Messages The end user can browse through quarantined messages to determine if an message should be added to their personal block list or allow list, or completely removed from the quarantine store. Procedure 1. Open a Web browser. 2. In the Address field, type the IP address of the End-User Login/Authentication site followed by the port number Example: The Login page appears. 3. Type your address, your password, and the directory/domain. 4. Click Login. The Welcome page appears. 5. Click the Quarantine link. The Quarantine Store page appears. 6. Mark the quarantined messages you want to work with, and then do one of the following: If you want to... Remove an message from the store Deliver the blocked message to your personal address Then... Click Delete. Click Deliver. 140 IBM Internet Security Systems

141 Adding or Deleting Entries from a Personal Block or Allow List Adding or Deleting Entries from a Personal Block or Allow List The end user can add or delete addresses and domains from their personal block or allow lists. Procedure 1. Open a Web browser. 2. In the Address field, type the IP address of the End-User Login/Authentication site followed by the port number Example: 3. Type your address, your password, and the directory/domain. 4. Click Login. The Welcome page appears. 5. Click the Blocklist/Allowlist Management link. The Blocklist/Allowlist page appears. 6. Choose an option: If you want to... Add an entry to a block list Add an entry to an allow list Delete an entry from either list Then... Switch to Blocklist mode, type the addresses and domains in the field provided, and then click Add to Blocklist. Switch to Allowlist mode, type the addresses and domains in the field provided, and then click Add to Allowlist. Switch to Allowlist or Blocklist mode, select the entry, and then click on the Trash icon. 141

142 Appendix A: End-User Spam Management Changing a Password on a Personal Block or Allow List Account The end user can change the password that is used to access their personal block/allow list account. Important: This functionality is only available if the end user is a local user. If the end user is part of a directory, the functionality does not appear in the user interface. Procedure 1. Open a Web browser. 2. In the Address field, type the IP address of the End-User Login/Authentication site followed by the port number Example: The Login page appears. 3. Type your address, your password, and the directory/domain. 4. Click Login. The Welcome page appears. 5. Click the Change Password link. 6. Type the new password, and then click Change Password. 142 IBM Internet Security Systems

143 Requesting a Quarantine Report on Blocked Messages Requesting a Quarantine Report on Blocked Messages The end user can request a daily report of messages currently being quarantined for their address. Procedure 1. Open a Web browser. 2. In the Address field, type the IP address of the End-User Login/Authentication site followed by the port number Example: The Login page appears. 3. Type your address, your password, and the directory/domain. 4. Click Login. The Welcome page appears. 5. Click the Quarantine Report link. The report is sent to your personal address. 143

144 Appendix A: End-User Spam Management 144 IBM Internet Security Systems

145 Appendix B Advanced Parameters Overview Advanced Parameters can help diagnose, correct, or improve performance issues you might be experiencing with your network or environment. Important: You should not change these parameters unless you are instructed by IBM ISS Technical Support personnel. In this appendix This appendix contains the following topics: Topic Page Advanced Parameter Overview 146 General Advanced Parameters for the Appliance 147 Advanced Parameters for the SMTP Settings 148 Advanced Parameters for the Mail Security Policy 149 Advanced Parameters for LDAP Directory Servers 150 Advanced Parameters for the DNS Blacklist (DNSBL) Check 151 Advanced Parameters for the Message Storage Directories 152 Advanced Parameters for a Replication of a Cluster of Appliances 153 Advanced Parameters for End-User Access 154 IBM Proventia Network Mail Security System Administrator Guide, Version

146 Appendix B: Advanced Parameters Advanced Parameter Overview Advanced parameters provide greater control over appliance behavior. Advanced parameters contain a name and value pair. Each name and value pair has a default value. You can change this value to meet your requirements. The value is one of the following: Boolean Number String Note: The Proventia Manager displays only the most commonly-used advanced parameters for a feature. Other parameters might be available but not displayed. Working with advanced parameters 1. In the navigation pane, click Mail Security, and then click Policy. 2. Click the Advanced Parameters tab. 3. Do one of the following: If you want to... Add a parameter Edit a parameter Copy a parameter Remove a parameter Then Click Add. 2. Type a parameter name. 3. Type a meaningful description. 4. Specify the value type and value. 5. Click OK. 1. Select a parameter, and then click Edit. 2. Edit the parameter, and then click OK. 1. Select a parameter, and then click Copy. 2. Click Paste. 3. Edit the parameter as needed, and then click OK. Select a parameter, and then click Remove. 146 IBM Internet Security Systems

147 General Advanced Parameters for the Appliance General Advanced Parameters for the Appliance This topic describes general tuning parameters for the appliance. Important: You should not change these parameters unless you are instructed by IBM ISS Technical Support. List of parameters The following table describes the advanced tuning parameters for general appliance settings. Parameter Description Default log_level The log level to enable or disable the output of messages. The possible values range from 0 (no log output) to 4 (detailed log output). 0 recipient.nospam_learn The recipient address for the nospam learn mail. nospam@spam.iss.net recipient.spam_learn The recipient address for the spam learn mail. spamlearn@spam.iss.net sendmail.includetrackingdata display_mailbody.disable Resource monitoring operational.behaviour Filter database dbupdates.maxbandwidth If set to true, message tracking data is attached to messages sent to nospam_learn and spam_learn. If set to true, the message store browser will not display the body of an message. This value adjusts the thresholds for entering the memory and disk space warning levels at 1 and 2. 0 = The software can use less memory/disk space than normal until the warning levels are reached. 1 = Normal behavior. 2 = The software can use more memory/disk space than normal until the warning levels are reached. 3 = A special value for disabling resource monitoring. You should not use this value. This value limits the bandwidth used during database updates to the given value in KB per second. A value of 0 does not limit the bandwidth used. true false 1 0 (KB per second) dbupdates.weblearn This value enables the upload of unknown URLs to the Download Server. Table 18: General advanced parameters for the appliance false IBM Proventia Network Mail Security System Administrator Guide, Version

148 Appendix B: Advanced Parameters Advanced Parameters for the SMTP Settings This topic describes SMTP tuning parameters for the appliance. Important: You should not change these parameters unless you are instructed by IBM ISS Technical Support. List of parameters The following table describes the advanced tuning parameters for the SMTP settings. Parameter Description Default smtp.command_delay This value specifies the delay on each SMTP command. 0 (in milliseconds) smtp.passthrough If set to true, messages are not analyzed, but forwarded to the next SMTP relay. false xmail.smtp.threads The number of threads used for receiving messages. 256 smtp.check_helo_domain smtp.check_return_path smtp.check_forward_path smtp.throttle.unchecked_max_count This value enables the HELO domain check according to RFC This value enables the return path (MAIL FROM) check according to RFC This value enables the forward path (MAIL FROM) check according to RFC The maximum calculated value of the fill level for the unchecked queue. Important: You should not change this value unless it is absolutely necessary / 5000 smtp.ipc.send_timeout This value specifies the timeout value of IPC sends to the mailsec daemon. Table 19: Advanced parameters for the SMTP settings (in milliseconds) 148 IBM Internet Security Systems

149 Advanced Parameters for the Mail Security Policy Advanced Parameters for the Mail Security Policy This topic describes policy tuning parameters for the appliance. Important: You should not change these parameters unless you are instructed by IBM ISS Technical Support. List of parameters The following table describes the advanced tuning parameters for the mail security policy. Parameter Description Default mailthreads.unchecked The number of processing threads. 8 (hardware) 4 (VMware) cal.analysis.timeout maillog.append_xml_on_error.enable host_reputation.spam_perc_unquarantined smtp.command_delay quarantine.deletemsgonrelease.enable policy.throttle.delayms The amount of time in which an analysis by the Content Analysis Library (CAL) is aborted and the application is restarted. Enables or disables the appending of the XML results to the error message generated for a Content Analysis Library (CAL) analysis error. When a host is quarantined and the quarantine delay has exceeded its limit, it will be tracked as a non-spammer host. In this case, an initial value is used for this IP address. Set this value ranging from 0 to 99%. Higher values will requarantine hosts faster, a value of 0 rates the host as a new host. The number of seconds XMail waits before handling an SMTP command. This value is used when disk or memory shortage is at level 1 or on an unchecked queue overflow. If set to true, the appliance deletes the message from the quarantine store after it has been released. Defines the delay value, the policy processing should use for a given fill level of the DBWriter Queue (in ms). (percent is 0,25,50,60,70,80,85,90,95,100) 600 (in seconds) false 0 2 false 0,100,200, 400,650,1000, 2000,4000, 10000,60000 dbwriter.max_sqllines_chunk The maximum count of SQL statements per chunk. 100 dbwriter.ta_max_count dbwriter.throttle.normal.delayms dbwriter.throttle.warn.delayms The maximum amount of transactions in the queue (used for calculating the fill level). The delay to be used if the DBWriter Queue is running under normal conditions. The delay to be used when the DBWriter Queue is in a warn state dbwriter.throttle.error.delayms The delay to be used when the DBWriter Queue is in an error state. Table 20: Advanced parameters for the mail security policy IBM Proventia Network Mail Security System Administrator Guide, Version

150 Appendix B: Advanced Parameters Advanced Parameters for LDAP Directory Servers This topic describes LDAP directory server tuning parameters for the appliance. Important: You should not change these parameters unless you are instructed by IBM ISS Technical Support. List of parameters The following table describes the advanced tuning parameters for LDAP directory servers: Parameter Description Default dirservice.connection.timeout The timeout value for the socket connection used for all LDAP server and NTLM client queries. If the connection is not successful (after the timeout has expired), the server is marked as unreachable (in milliseconds) dirservice.reconnect.interval The amount of time that an unreachable NTLM client or LDAP server remains in the unreachable state until reconnecting. Table 21: Advanced parameters for LDAP servers 180 (in seconds) 150 IBM Internet Security Systems

151 Advanced Parameters for the DNS Blacklist (DNSBL) Check Advanced Parameters for the DNS Blacklist (DNSBL) Check This topic describes the DNS blacklist tuning parameters for the appliance. Important: You should not change these parameters unless you are instructed by IBM ISS Technical Support. List of parameters The following table describes the advanced tuning parameters for the DNS blacklist check. Parameter Description Default dnsblthreads.count The minimum amount of DNSBL threads used for the DNSBL check. If needed, the check dynamically allocates threads up to the value of the maximum amount. 20 (hardware) 10 (VMware) host_reputation.border_ips A semicolon separated list of DNSBL border IP addresses. Table 22: Advanced parameters for the DNSBL check IBM Proventia Network Mail Security System Administrator Guide, Version

152 Appendix B: Advanced Parameters Advanced Parameters for the Message Storage Directories This topic describes message storage directory tuning parameters for the appliance. Important: You should not change these parameters unless you are instructed by IBM ISS Technical Support. List of parameters The following table describes the advanced tuning parameters for the message storage directories. Parameter Description Default msgstore.release.tag.subject.disable msgstore.release.tag.subject.string nospam.send.to.recipients quarantinereport.maxlines If set to false, messages are tagged when they are released from a quarantine store. Reference: See msgstore.release.tag.subject.string below. This string is added at the beginning of the subject of an message when the message is released from a quarantine folder. Reference: See msgstore.release.tag.subject.disable above. If set to true, an message that has been sent to nospam.iss.net will be sent to the original recipient(s) as well. The maximum number of messages reported in one quarantine report. false [Release from Quarantine Store] false 250 msgstore.quarantine_domains A semicolon separated list of SMTP domains for which a quarantine is allowed (in addition to SMTP local domains). Table 23: Advanced parameters for the message storages 152 IBM Internet Security Systems

153 Advanced Parameters for a Replication of a Cluster of Appliances Advanced Parameters for a Replication of a Cluster of Appliances This topic describes cluster replication tuning parameters for the appliance. Important: You should not change these parameters unless you are instructed by IBM ISS Technical Support. List of parameters The following table describes the advanced tuning parameters for the replication of a cluster of appliances. Parameter Description Default replication.alerting.warn.perc replication.alerting.warn.duration replication.alerting.error.perc replication.alerting.error.duration replication.alerting.critical.perc A warning alert is generated if the replication rating exceeds this value. A warning state is applied if the fill level exceeds the warn.perc value for more than given period of time. An error alert is generated if the replication rating exceeds this value. An error state is applied if the fill level exceeds the error.perc value for more than given period of time. If the replication rating exceeds this value, the cluster host is forcibly removed from the cluster to avoid overflowing the size of the database *60 (30 minutes) *60 (1 hour) 400 replication.alerting.critical.duration A critical state is applied if the fill level exceeds the critical.perc value for more than given period of time. Table 24: Advanced parameters for a replication of a cluster of appliances 24*60*60 (1 day) IBM Proventia Network Mail Security System Administrator Guide, Version

154 Appendix B: Advanced Parameters Advanced Parameters for End-User Access This topic describes end-user access tuning parameters for the appliance. Important: You should not change these parameters unless you are instructed by IBM ISS Technical Support. List of parameters The following table describes the advanced tuning parameters for end-user access. Parameter Description Default clientconnections.count The default amount of client connections that can be used at the same time for end-user access. Table 25: Advanced parameters for end-user access IBM Internet Security Systems

155 Appendix C IBM SiteProtector System Integration Overview This appendix explains how to set up the appliance to work with the SiteProtector system. In this appendix This appendix contains the following topics: Topic Page The SiteProtector System Overview 156 Integrating the Appliance with the SiteProtector System

156 Appendix C: IBM SiteProtector System Integration The SiteProtector System Overview The SiteProtector system is a centralized management system that provides command, control, and monitoring capabilities over all of your IBM ISS products, including the appliance. Architecture The SiteProtector system consists of the following: Components The SiteProtector system components provide the core SiteProtector system functionality and use specific channels to communicate with each other and other IBM ISS products such as the appliance. For a complete list of the components and ports, see the IBM SiteProtector System Installation Guide Version 2.0, Service Pack 7.0. Additional Modules These provide added SiteProtector system functionality. Agents These are IBM ISS products that work with the SiteProtector system to detect and prevent security events; the appliance is considered an agent in the IBM SiteProtector Console. Components that work with the appliance The SiteProtector system consists of different components, each with a very specific function in the SiteProtector system. The following table describes some of the SiteProtector system components that work with the appliance: Component Agent Manger Central responses Console Description The Agent Manager provides you with the ability to configure, update, and manage the appliance in the SiteProtector system. It also provides management for the alternate update server for the appliance called the IBM SiteProtector X-Press Update Server. As the appliance generates security data, the Agent Manager facilitates the data processing required for you to view the data in the IBM SiteProtector Console. The appliance sends a heartbeat signal to its Agent Manager on a routine basis to indicate that it is active and to receive policies and updates from the Agent Manager. The amount of time between heartbeats is user-defined. Central responses are alerts, log entries, and responses from the SiteProtector system. For example, when a security event enters the SiteProtector system from the appliance, the SiteProtector system can alert you by message, by network message (SNMP trap), or in the IBM SiteProtector Console. You can also log the events to a central location in the SiteProtector system for analysis and monitoring. You can request alerts about changes in the appliance s status. The Console is the interface where you perform all the SiteProtector system tasks, including the following: Configure and manage the appliance(s) Create and manage security policies Enable alerts and logging Set up users and user permissions Monitor security events and vulnerabilities on your network Generate reports Table 26: The SiteProtector system component descriptions 156 IBM Internet Security Systems

157 The SiteProtector System Overview Component Site Database X-Press Update Server Description The Site Database stores the following information: Security data generated by your IBM ISS products Statistics for security events The update status of all products The SiteProtector system user accounts and permissions The X-Press Update Server is the primary tool for updating the SiteProtector system and the other IBM ISS products that are set up to work with it. The X-Press Update Server does the following: Connects to the IBM ISS Download Center Downloads firmware and security content updates for the appliance Applies firmware and security content updates for the appliance Important: The X-Press Update Server does not download or apply database updates for the appliance. The appliance must have Internet access to download and apply database updates. Table 26: The SiteProtector system component descriptions (Continued) 157

158 Appendix C: IBM SiteProtector System Integration Integrating the Appliance with the SiteProtector System You can integrate the appliance with the SiteProtector system. Related documentation For information about how to install, configure, and update the SiteProtector system, including information about how to configure and apply policies in the SiteProtector system, see the SiteProtector documentation on the IBM ISS Documentation Web site at Before you begin Before you register the appliance with the SiteProtector system, you complete the following tasks: Install, configure, and update the SiteProtector system. Set up a license for the appliance in the IBM SiteProtector Console. This license is required for the appliance to receive updates from the SiteProtector system. Verify that you are running IBM SiteProtector 2.0, Service Pack 7.0. Create a group in the IBM SiteProtector Console for the appliance and define the group settings. The group can only contain appliances of the same type. Verify the name of the SiteProtector system group to which you want to assign the appliance. Verify the IP address and port for each SiteProtector system Agent Manager that will communicate with the appliance. To verify this information, go to the IBM SiteProtector Console and view the properties for the Agent Manager on the Agent View. Verify the IP address of the appliance s primary management interface. This interface is user-defined when you configure the appliance interfaces. To verify the information, go to System > SiteProtector. Update the appliance to the latest firmware. Procedure To configure the SiteProtector system management of your appliance: 1. In the navigation pane, click System > SiteProtector. 2. Select Register with SiteProtector. 3. Do one of the following: If you want the appliance to... Keep its own configuration settings and policies Obtain its configuration settings and policies from the SiteProtector system Then... Select the Local Settings Override SiteProtector Group Settings option. You should use this option if you have not defined settings for the appliance in the SiteProtector system, and it prevents the appliance from inheriting the default policies included with the SiteProtector system. Clear the Local Settings Override SiteProtector Group Settings option. You should use this option if you have defined all appliance settings and policies in the SiteProtector system. 158 IBM Internet Security Systems

159 Integrating the Appliance with the SiteProtector System 4. Complete the following: Option Desired SiteProtector Group for Appliance Heartbeat Interval Description The IBM SiteProtector Console organizes network devices into groups for management and configuration purposes. Type the name of the group where you want to register the appliance. Important: You should create the group in the SiteProtector system before you register the appliance. Otherwise, the SiteProtector system creates the group for you when you register the appliance. The appliance sends periodic signals to the SiteProtector system to initiate a communication session with the SiteProtector system. Type the number of seconds between these signals. Allowed Values= 60 to 86,400 seconds 5. In the SiteProtector Management Level section, select the level of the SiteProtector system management you want: Level Policy Control and Events Events Only Description Select this option if you want to manage the appliance in the IBM SiteProtector Console. Select this option if you want to manage the appliance in Proventia Manager and only send alerts to the IBM SiteProtector Console. Note: The appliance still registers with the SiteProtector system regardless of this setting. The appliance appears as an agent in the group you specified, and its status appears as Unmanaged. 6. In the Agent Manager Configuration section, click the Add icon, set up the Agent Manager, and then save the changes: Option Authentication level Description Set the trust level between the appliance and the Agent Manager: Trust-all The appliance always trusts connections from the Agent Manager without using the SiteProtector system s digital certificate. First-time Trust The appliance trusts the first connection with the Agent Manager without using the SiteProtector system s certificate. During this first connection, the appliance automatically copies the required certificate from the SiteProtector system to the following location on the appliance: /cache/spool/crm/cacerts directory From this point forward, the appliance uses the certificate to authenticate all future connections with the Agent Manager. Explicit Trust You must do the following: Manually copy the SiteProtector system s certificate to the following location on the appliance: cache/spool/crm/cacerts directory Perform the additional setup tasks as described in the knowledgebase article number 2202 located at the IBM ISS Support Web site: 159

160 Appendix C: IBM SiteProtector System Integration Option Agent Manager Name, Address, and Port Account Name Use Proxy Settings Description Type the name of the Agent Manager, its IP address, and the port used for communicating with it. Default Port= 3995 Optional: Type the account name and password that the appliance must use to access the Agent Manager. Select this option if the appliance must go through a proxy server to access the Agent Manager, and then type the IP address and port of the proxy server. 160 IBM Internet Security Systems

161 Appendix D Safety, Environmental, and Electronic Emissions Notices Overview Safety notices may be printed throughout this guide. DANGER notices warn you of conditions or procedures that can result in death or severe personal injury. CAUTION notices warn you of conditions or procedures that can cause personal injury that is neither lethal nor extremely hazardous. Attention notices warn you of conditions or procedures that can cause damage to machines, equipment, or programs. DANGER notices The following DANGER notices apply to this product: DANGER To prevent a possible shock from touching two surfaces with different protective ground (earth), use one hand, when possible, to connect or disconnect signal cables. (D001) DANGER Overloading a branch circuit is potentially a fire hazard and a shock hazard under certain conditions. To avoid these hazards, ensure that your system electrical requirements do not exceed branch circuit protection requirements. Refer to the information that is provided with your device or the power rating label for electrical specifications. (D002) DANGER If the receptacle has a metal shell, do not touch the shell until you have completed the voltage and grounding checks. Improper wiring or grounding could place dangerous voltage on the metal shell. If any of the conditions are not as described, STOP. Ensure the improper voltage or impedance conditions are corrected before proceeding. (D003) DANGER An electrical outlet that is not correctly wired could place hazardous voltage on the metal parts of the system or the devices that attach to the system. It is the responsibility of the customer to ensure that the outlet is correctly wired and grounded to prevent an electrical shock. (D004) 161

162 Appendix D: Safety, Environmental, and Electronic Emissions Notices DANGER When working on or around the system, observe the following precautions: Electrical voltage and current from power, telephone, and communication cables are hazardous. To avoid a shock hazard: Connect power to this unit only with the IBM ISS provided power cord. Do not use the IBM ISS provided power cord for any other product. Do not open or service any power supply assembly. Do not connect or disconnect any cables or perform installation, maintenance, or reconfiguration of this product during an electrical storm. The product might be equipped with multiple power cords. To remove all hazardous voltages, disconnect all power cords. Connect all power cords to a properly wired and grounded electrical outlet. Ensure that the outlet supplies proper voltage and phase rotation according to the system rating plate. Connect any equipment that will be attached to this product to properly wired outlets. When possible, use one hand only to connect or disconnect signal cables. Never turn on any equipment when there is evidence of fire, water, or structural damage. Disconnect the attached power cords, telecommunications systems, networks, and modems before you open the device covers, unless instructed otherwise in the installation and configuration procedures. Connect and disconnect cables as described in the following procedures when installing, moving, or opening covers on this product or attached devices. To disconnect: 1. Turn off everything (unless instructed otherwise). 2. Remove the power cords from the outlets. 3. Remove the signal cables from the connectors. 4. Remove all cables from the devices. To connect: 1. Turn off everything (unless instructed otherwise). 2. Attach all cables to the devices. 3. Attach the signal cables to the connectors. 4. Attach the power cords to the outlets. 5. Turn on the devices. (D005) 162 IBM Internet Security Systems

163 Overview CAUTION notices The following CAUTION notices apply to this product: CAUTION Data processing environments can contain equipment transmitting on system links with laser modules that operate at great than Class 1 power levels. For this reason, never look into the end of an optical fiber cable or open receptacle. (C027) CAUTION The battery contains lithium. To avoid possible explosion, do not burn or charge the battery. Do not: Throw or immerse into water Heat to more than 100 C (212 F) Repair or disassemble Exchange only with the IBM ISS-approved part. Recycle or discard the battery as instructed by local regulations. In the United States, IBM ISS has a process for the collection of this battery. For information, call Have the IBM ISS part number for the battery unit available when you call. (C003) CAUTION For 19 rack mount products: Do not install a unit in a rack where the internal rack ambient temperatures will exceed the manufacturer s recommended ambient temperature for all your rackmounted devices. Do not install a unit in a rack where the air flow is compromised. Ensure that air flow is not blocked or reduced on any side, front, or back of a unit used for air flow through the unit. Consideration should be given to the connection of the equipment to the supply circuit so that overloading the circuits does not compromise the supply wiring or overcurrent protection. To provide the correct power connection to a rack, refer to the rating labels located on the equipment in the rack to determine the total power requirement of the supply circuit. (For sliding drawers) Do not pull or install any drawer or feature if the rack stabilizer brackets are not attached to the rack. Do not pull out more than one drawer at a time. The rack might become unstable if you pull out more than one drawer at a time. (For fixed drawers) This drawer is a fixed drawer and must not be moved for servicing unless specified by the manufacturer. Attempting to move the drawer partially or completely out of the rack might cause the rack to become unstable or cause the drawer to fall out of the rack. (R001 Part 2 of 2) Product handling information One of the following two safety notices may apply to this product. Please refer to the specific product specifications to determine the weight of the product to see which applies. 163

164 Appendix D: Safety, Environmental, and Electronic Emissions Notices CAUTION This part or unit is heavy but has a weight smaller than 18 kg (39.7 lb). Use care when lifting, removing, or installing this part or unit. (C008) CAUTION The weight of this part or unit is between 18 and 32 kg (39.7 and 70.5 lb). It takes two persons to safely lift this part or unit. (C009) Product safety labels One or more of the following safety labels may apply to this product. DANGER Hazardous voltage, current, or energy levels are present inside any component that has this label attached. Do not open any cover or barrier that contains this label. (L001) DANGER Multiple power cords. The product might be equipped with multiple power cords. To remove all hazardous voltages, disconnect all power cords. (L003) World trade safety information Several countries require the safety information contained in product publications to be presented in their national languages. If this requirement applies to your country, a safety information booklet is included in the publications package shipped with the product. The booklet contains the safety information in your national language with references to the US English source. Before using a US English publication to install, operate, or service this IBM ISS product, you must first become familiar with the related safety information in the booklet. You should also refer to the booklet any time you do not clearly understand any safety information in the US English publications. 164 IBM Internet Security Systems

165 Overview Laser safety information The following laser safety notices apply to this product: CAUTION This product may contain one or more of the following devices: CD-ROM drive, DVD- ROM drive, DVD-RAM drive, or laser module, which are Class 1 laser products. Note the following information: Do not remove the covers. Removing the covers of the laser product could result in exposure to hazardous laser radiation. There are no serviceable parts inside the device. Use of the controls or adjustments or performance of procedures other than those specified herein might result in hazardous radiation exposure. (C026) CAUTION Data processing environments can contain equipment transmitting on system links with laser modules that operate at greater than Class 1 power levels. For this reason, never look into the end of an optical fiber cable or open receptacle. (C027) Laser compliance All lasers are certified in the U.S. to conform to the requirements of DHHS 21 CFR Subchapter J for class 1 laser products. Outside the U.S., they are certified to be in compliance with IEC as a class 1 laser product. Consult the label on each part for laser certification numbers and approval information. Product recycling and disposal This unit must be recycled or discarded according to applicable local and national regulations. IBM encourages owners of information technology (IT) equipment to responsibly recycle their equipment when it is no longer needed. IBM offers a variety of product return programs and services in several countries to assist equipment owners in recycling their IT products. Information on IBM ISS product recycling offerings can be found on IBM s Internet site at prp.shtml. Esta unidad debe reciclarse o desecharse de acuerdo con lo establecido en la normativa nacional o local aplicable. IBM recomienda a los propietarios de equipos de tecnología de la información (TI) que reciclen responsablemente sus equipos cuando éstos ya no les sean útiles. IBM dispone de una serie de programas y servicios de devolución de productos en varios países, a fin de ayudar a los propietarios de equipos a reciclar sus productos de TI. Se puede encontrar información sobre las ofertas de reciclado de productos de IBM en el sitio web de IBM Notice: This mark applies only to countries within the European Union (EU) and Norway. Appliances are labeled in accordance with European Directive 2002/96/EC concerning waste electrical and electronic equipment (WEEE). The Directive determines the 165

166 Appendix D: Safety, Environmental, and Electronic Emissions Notices framework for the return and recycling of used appliances as applicable through the European Union. This label is applied to various products to indicate that the product is not to be thrown away, but rather reclaimed upon end of life per this Directive. In accordance with the European WEEE Directive, electrical and electronic equipment (EEE) is to be collected separately and to be reused, recycled, or recovered at end of life. Users of EEE with the WEEE marking per Annex IV of the WEEE Directive, as shown above, must not dispose of end of life EEE as unsorted municipal waste, but use the collection framework available to customers for the return, recycling, and recovery of WEEE. Customer participation is important to minimize any potential effects of EEE on the environment and human health due to the potential presence of hazardous substances in EEE. For proper collection and treatment, contact your local IBM representative. Remarque: Cette marque s applique uniquement aux pays de l Union Européenne et à la Norvège. L etiquette du système respecte la Directive européenne 2002/96/EC en matière de Déchets des Equipements Electriques et Electroniques (DEEE), qui détermine les dispositions de retour et de recyclage applicables aux systèmes utilisés à travers l Union européenne. Conformément à la directive, ladite étiquette précise que le produit sur lequel elle est apposée ne doit pas être jeté mais être récupéré en fin de vie. Battery return program This product contains a lithium battery. The battery must be recycled or disposed of properly. Recycling facilities may not be available in your area. For information on disposal of batteries outside the United States, go to environment/products/batteryrecycle.shtml or contact your local waste disposal facility. In the United States, IBM has established a return process for reuse, recycling, or proper disposal of used IBM sealed lead acid, nickel cadmium, nickel metal hydride, and other battery packs from IBM equipment. For information on proper disposal of these batteries, contact IBM at Please have the IBM part number listed on the battery available prior to your call. For Taiwan: Please recycle batteries 166 IBM Internet Security Systems

167 Overview For the European Union: Notice: This mark applies only to countries within the European Union (EU). Batteries or packing for batteries are labeled in accordance with European Directive 2006/ 66/EC concerning batteries and accumulators and waste batteries and accumulators. The Directive determines the framework for the return and recycling of used batteries and accumulators as applicable throughout the European Union. This label is applied to various batteries to indicate that the battery is not to be thrown away, but rather reclaimed upon end of life per this Directive. Les batteries ou emballages pour batteries sont étiquetés conformément aux directives européennes 2006/66/EC, norme relative aux batteries et accumulateurs en usage et aux batteries et accumulateurs usés. Les directives déterminent la marche à suivre en vigueur dans l'union Européenne pour le retour et le recyclage des batteries et accumulateurs usés. Cette étiquette est appliquée sur diverses batteries pour indiquer que la batterie ne doit pas être mise au rebut mais plutôt récupérée en fin de cycle de vie selon cette norme. In accordance with the European Directive 2006/66/EC, batteries and accumulators are labeled to indicate that they are to be collected separately and recycled at end of life. The label on the battery may also include a symbol for the metal concerned in the battery (Pb for lead, Hg for the mercury, and Cd for cadmium). Users of batteries and accumulators must not dispose of batteries and accumulators as unsorted municipal waste, but use the collection framework available to customers for the return, recycling, and treatment of batteries and accumulators. Customer participation is important to minimize any potential effects of batteries and accumulators on the environment and human health due to potential presence of hazardous substances. For proper collection and treatment, contact your local IBM representative. For California: Perchlorate Material - special handling may apply. See hazardouswaste/perchlorate. The foregoing notice is provided in accordance with California Code of Regulations Title 22, Division 4.5, Chapter 33. Best Management Practices for Perchlorate Materials. This product, part, or both may include a lithium manganese dioxide battery which contains a perchlorate substance. 167

IBM Proventia Management SiteProtector. Scalability Guidelines Version 2.0, Service Pack 7.0

IBM Proventia Management SiteProtector. Scalability Guidelines Version 2.0, Service Pack 7.0 IBM Proventia Management SiteProtector Scalability Guidelines Version 2.0, Service Pack 7.0 Copyright Statement Copyright IBM Corporation 1994, 2008. IBM Global Services Route 100 Somers, NY 10589 U.S.A.

More information

Analyzer Quick Start Guide

Analyzer Quick Start Guide September 18, 2006 Overview Introduction This guide provides connection and initial configuration instructions for your Proventia Network ADS 3.6.1 Analyzer appliance. These instructions allow you to connect

More information

Deployment Guide: Routing Mode with No DMZ

Deployment Guide: Routing Mode with No DMZ Deployment Guide: Routing Mode with No DMZ March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a router-firewall device on your network with

More information

User Guide for Proventia Server IPS for Linux

User Guide for Proventia Server IPS for Linux IBM Proventia Server Intrusion Prevention System User Guide for Proventia Server IPS for Linux Version 1.0 IBM Internet Security Systems Copyright IBM Corporation 2006, 2008. IBM Global Services Route

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

Technical Note. FortiMail Best Practices Version 3.0 MR4.

Technical Note. FortiMail Best Practices Version 3.0 MR4. Technical Note FortiMail Best Practices Version 3.0 MR4 www.fortinet.com FortiMail Best Practices Technical Note Version 3.0 MR4 October 29, 2008 06-30004-0392-20081029 Copyright 2007 Fortinet, Inc. All

More information

Policy Configuration Guide. Firmware Version 3.11

Policy Configuration Guide. Firmware Version 3.11 Policy Configuration Guide Firmware Version 3.11 Internet Security Systems, Inc. 6303 Barfield Road Atlanta, Georgia 30328-4233 United States (404) 236-2600 http://www.iss.net Internet Security Systems,

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215

More information

Collector Quick Start Guide

Collector Quick Start Guide September 18, 2006 Overview Introduction This guide provides connection and initial configuration instructions for your Proventia Network ADS 3.6.1 Collectors. These instructions allow you to connect to

More information

Sophos Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017

Sophos  Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017 Sophos Email Appliance Configuration Guide Product Version 4.3 Sophos Limited 2017 ii Contents Sophos Email Appliance Contents 1 Copyrights and Trademarks...4 2 Setup and Configuration Guide...5 3 Product

More information

Symantec Messaging Gateway Installation Guide. powered by Brightmail

Symantec Messaging Gateway Installation Guide. powered by Brightmail Symantec Messaging Gateway 10.6.4 Installation Guide powered by Brightmail Symantec Messaging Gateway 10.6.4 Installation Guide Documentation version: 4.3 Legal Notice Copyright 2017 Symantec Corporation.

More information

Step 2 - Deploy Advanced Security for Exchange Server

Step 2 - Deploy Advanced  Security for Exchange Server Step 2 - Deploy Advanced Email Security for Exchange Server Step 1. Ensure Connectivity and Redundancy Open your firewall ports to allow the IP address ranges based on your Barracuda Email Security Service

More information

Sophos Virtual Appliance. setup guide

Sophos Virtual  Appliance. setup guide Sophos Virtual Email Appliance setup guide Contents Installing a virtual appliance...1 Prerequisites...3 Enabling Port Access...4 Downloading Virtual Appliance Files... 7 Determining Disk Space and Memory

More information

Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control)

Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control) Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control) Deployment Guide Cisco VCS X7.2 D14524.03 August 2012 Contents Introduction 3 Example network deployment 3 Internal

More information

M1000, M2000, M3000. eprism Installation Guide

M1000, M2000, M3000. eprism Installation Guide M1000, M2000, M3000 eprism Installation Guide Preface 3 CHAPTER 1 Pre-Installation Tasks 5 eprism Deployment 6 Network Modifications 8 Firewall Configuration 9 DNS Configuration for Mail Routing 10 Hardware

More information

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance CounterACT 7.0 Quick Installation Guide for a Single Virtual CounterACT Appliance Table of Contents Welcome to CounterACT Version 7.0... 3 Overview... 4 1. Create a Deployment Plan... 5 Decide Where to

More information

G400/G2000 Appliances User Guide

G400/G2000 Appliances User Guide G400/G2000 Appliances User Guide Internet Security Systems, Inc. 6303 Barfield Road Atlanta, Georgia 30328-4233 United States (404) 236-2600 http://www.iss.net Internet Security Systems, Inc. 2003-2005

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

Nokia Intrusion Prevention with Sourcefire. Appliance Quick Setup Guide

Nokia Intrusion Prevention with Sourcefire. Appliance Quick Setup Guide Nokia Intrusion Prevention with Sourcefire Appliance Quick Setup Guide Part Number N450000567 Rev 001 Published September 2007 COPYRIGHT 2007 Nokia. All rights reserved. Rights reserved under the copyright

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

Quest Collaboration Services 3.6. Installation Guide

Quest Collaboration Services 3.6. Installation Guide Quest Collaboration Services 3.6 Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

File Reputation Filtering and File Analysis

File Reputation Filtering and File Analysis This chapter contains the following sections: Overview of, page 1 Configuring File Reputation and Analysis Features, page 5 File Reputation and File Analysis Reporting and Tracking, page 14 Taking Action

More information

Symantec Brightmail Gateway 9.0 Installation Guide

Symantec Brightmail Gateway 9.0 Installation Guide Symantec Brightmail Gateway 9.0 Installation Guide Symantec Brightmail Gateway 9.0 Installation Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2006 Kerio Technologies. All Rights Reserved. Printing Date: May 3, 2006 This guide provides detailed description on configuration of the local network

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

Nokia Intrusion Prevention with Sourcefire Appliance Quick Setup Guide. Sourcefire Sensor on Nokia v4.8

Nokia Intrusion Prevention with Sourcefire Appliance Quick Setup Guide. Sourcefire Sensor on Nokia v4.8 Nokia Intrusion Prevention with Sourcefire Appliance Quick Setup Guide Sourcefire Sensor on Nokia v4.8 Part No. N450000774 Rev 001 Published September 2008 COPYRIGHT 2008 Nokia. All rights reserved. Rights

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.6.051117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...

More information

Cisco TelePresence VCS Cluster Creation and Maintenance

Cisco TelePresence VCS Cluster Creation and Maintenance Cisco TelePresence VCS Cluster Creation and Maintenance Deployment Guide Cisco VCS X8.5 Cisco TMS 13.2 or later December 2014 Contents Introduction 4 Prerequisites 5 Upgrading an X7.1 or later cluster

More information

Management Console User Guide

Management Console User Guide Secure Web Gateway Management Console User Guide Release 10.2.0 Manual Version v 10.2.0.1 M86 SECURITY SECURE WEB GATEWAY MANAGEMENT CONSOLE USER GUIDE 2012 M86 Security All rights reserved. 828 W. Taft

More information

Contents. Limitations. Prerequisites. Configuration

Contents. Limitations. Prerequisites. Configuration Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically

More information

Cisco Expressway Cluster Creation and Maintenance

Cisco Expressway Cluster Creation and Maintenance Cisco Expressway Cluster Creation and Maintenance Deployment Guide Cisco Expressway X8.6 July 2015 Contents Introduction 4 Prerequisites 5 Upgrading an X8.n cluster to X8.6 6 Prerequisites 6 Upgrade Expressway

More information

Secure Web Gateway. SWG User Guide. Release Manual Version v

Secure Web Gateway. SWG User Guide. Release Manual Version v Secure Web Gateway SWG User Guide Release 10.2.0 Manual Version v 10.2.0.1 M86 SECURITY SECURE WEB GATEWAY SWG USER GUIDE 2012 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA

More information

Cisco TelePresence Basic Cisco VCS configuration

Cisco TelePresence Basic Cisco VCS configuration Cisco TelePresence Basic Cisco VCS configuration Deployment Guide D14651.02 September 2011 Cisco VCS Control with Cisco VCS Expressway X7.0 Contents Document revision history 5 Introduction 6 Out of scope

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

WorldSecure/Mail Getting Started Guide

WorldSecure/Mail Getting Started Guide WorldSecure/Mail Getting Started Guide Release 4.3 012-0068-43 The software described in this document is furnished under license and may be used or copied only according to the terms of such license.

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Release Date: March 16, 2007 This guide provides detailed description on configuration of the local network which

More information

Office 365 Standalone Security

Office 365 Standalone  Security The standalone Email Security option is available for purchase only through the Barracuda Self-Service Gateway or Barracuda MSP. Once you complete the Essentials for Office 365 Wizard, the Essentials page

More information

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration.

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. Administrator Guide Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. The information and content in this document is provided for informational purposes

More information

Networking Guide for Redwood Manager

Networking Guide for Redwood Manager Issue 4, August 2014 Networking Guide for Redwood Manager General The Redwood engine controls the lighting policies, communicates to the Redwood gateways, distributes low-voltage DC power to the fixtures,

More information

SOLUTION MANAGEMENT GROUP

SOLUTION MANAGEMENT GROUP InterScan Messaging Security Virtual Appliance 8.0 Reviewer s Guide February 2011 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com

More information

Blue Coat ProxySG First Steps Transparent Proxy Deployments SGOS 6.7

Blue Coat ProxySG First Steps Transparent Proxy Deployments SGOS 6.7 Transparent Proxy Deployments SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks

More information

Configuring Symantec AntiVirus for BlueArc Storage System

Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System The software described in this book is furnished under a license agreement and may be

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide h-series 800-782-3762 www.edgewave.com 2001 2011 EdgeWave Inc. (formerly St. Bernard Software). All rights reserved. The EdgeWave logo, iprism and iguard are trademarks

More information

M Series Appliances User Guide. Release 2.3

M Series Appliances User Guide. Release 2.3 M Series Appliances User Guide Release 2.3 Internet Security Systems, Inc. 6303 Barfield Road Atlanta, Georgia 30328-4233 United States (404) 236-2600 http://www.iss.net Internet Security Systems, Inc.

More information

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6 Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc.

More information

ExtraHop 6.1 ExtraHop Explore Admin UI Guide

ExtraHop 6.1 ExtraHop Explore Admin UI Guide ExtraHop 6.1 ExtraHop Explore Admin UI Guide 2018 ExtraHop Networks, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machinereadable form

More information

Silver Peak EC-V and Microsoft Azure Deployment Guide

Silver Peak EC-V and Microsoft Azure Deployment Guide Silver Peak EC-V and Microsoft Azure Deployment Guide How to deploy an EC-V in Microsoft Azure 201422-001 Rev. A September 2018 2 Table of Contents Table of Contents 3 Copyright and Trademarks 5 Support

More information

SonicWall Security 9.0.6

SonicWall  Security 9.0.6 SonicWall Email Security 9.0.6 December 2017 These release notes provide information about the SonicWall Email Security 9.0.6 release. Topics: About Email Security Features and Enhancements Resolved Issues

More information

How to Configure Office 365 for Inbound and Outbound Mail

How to Configure Office 365 for Inbound and Outbound Mail How to Configure Office 365 for Inbound and Outbound Mail You can configure Microsoft Office 365 with the Barracuda Email Security Service as your inbound and/or outbound mail gateway. If you make setting

More information

Lotus Protector for Mail Security

Lotus Protector for Mail Security Lotus Protector for Mail Security A Consultant in your Pocket series webinar Presented by: Victor Toal Lotus Protector for Mail Security What we will cover in this Webinar 1 Lotus Protector for Mail Security

More information

Symantec Messaging Gateway 10.0 Getting Started Guide. powered by Brightmail

Symantec Messaging Gateway 10.0 Getting Started Guide. powered by Brightmail Symantec Messaging Gateway 10.0 Getting Started Guide powered by Brightmail The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.7.073118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...5

More information

McAfee Gateway Appliance Patch 7.5.3

McAfee  Gateway Appliance Patch 7.5.3 Release Notes McAfee Email Gateway Appliance Patch 7.5.3 Contents About this release Resolved issues Installation - incremental package Installation - full images Known issues Find product documentation

More information

High Availability Deployment

High Availability Deployment April 18, 2005 Overview Introduction This addendum provides connectivity and configuration task overviews for connecting two M appliances as a high availability (HA) cluster pair. For detailed configuration

More information

SonicWall Web Application Firewall 2.0. AWS Deployment Guide

SonicWall Web Application Firewall 2.0. AWS Deployment Guide SonicWall Web Application Firewall 2.0 AWS Deployment Guide Contents 1 Overview..........................................................................3 Before You Begin....................................................................4

More information

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

provides several new features and enhancements, and resolves several issues reported by WatchGuard customers.

provides several new features and enhancements, and resolves several issues reported by WatchGuard customers. WatchGuard XCS v9.2 Update 5 Release Notes WatchGuard XCS Build 130322 Revision Date March 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard XCS v9.2 Update 5. This update

More information

G400/G2000 Appliance Quick Start Guide

G400/G2000 Appliance Quick Start Guide G400/G2000 Appliance Quick Start Guide Internet Security Systems, Inc. 6303 Barfield Road Atlanta, Georgia 30328-4233 United States (404) 236-2600 http://www.iss.net Internet Security Systems, Inc. 2003-2005.

More information

Cisco Meeting Management

Cisco Meeting Management Cisco Meeting Management Cisco Meeting Management 1.1 User Guide for Administrators September 19, 2018 Cisco Systems, Inc. www.cisco.com Contents 1 Introduction 4 1.1 The software 4 2 Deployment overview

More information

Proofpoint Threat Response

Proofpoint Threat Response Proofpoint Threat Response Threat Response Auto Pull (TRAP) - Installation Guide Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 United States Tel +1 408 517 4710 www.proofpoint.com Copyright Notice

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Videoscape Distribution Suite Software Installation Guide

Videoscape Distribution Suite Software Installation Guide First Published: August 06, 2012 Last Modified: September 03, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Interdomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 10.5(1)

Interdomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 10.5(1) Interdomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 10.5(1) First Published: 2014-01-29 Last Modified: 2017-12-01 Americas Headquarters Cisco Systems, Inc.

More information

Version SurfControl RiskFilter - Administrator's Guide

Version SurfControl RiskFilter -  Administrator's Guide Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with

More information

Interdomain Federation for the IM and Presence Service, Release 10.x

Interdomain Federation for the IM and Presence Service, Release 10.x First Published: 2014-01-29 Last Modified: 2018-11-05 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

vrealize Operations Management Pack for NSX for vsphere 3.0

vrealize Operations Management Pack for NSX for vsphere 3.0 vrealize Operations Management Pack for NSX for vsphere 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual GFI MailSecurity 2011 for Exchange/SMTP Administration & Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and

More information

Version Installation Guide. 1 Bocada Installation Guide

Version Installation Guide. 1 Bocada Installation Guide Version 19.4 Installation Guide 1 Bocada Installation Guide Copyright 2019 Bocada LLC. All Rights Reserved. Bocada and BackupReport are registered trademarks of Bocada LLC. Vision, Prism, vpconnect, and

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network

More information

Symantec Brightmail Gateway 9.0 Getting Started

Symantec Brightmail Gateway 9.0 Getting Started Symantec Brightmail Gateway 9.0 Getting Started 20961949 Symantec Brightmail Gateway 9.0 Getting Started The software described in this book is furnished under a license agreement and may be used only

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Creating a Multi-data Center (MDC) System

Creating a Multi-data Center (MDC) System , page 1 About Multi-data Centers The Multi-data Center (MDC) licensed feature is available in version 2.5 and higher. It allows two CWMS systems to be joined into a single MDC system. One license must

More information

CounterACT 7.0 Single CounterACT Appliance

CounterACT 7.0 Single CounterACT Appliance CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment

More information

Endpoint Security Manager

Endpoint Security Manager Comodo Endpoint Security Manager Software Version 1.6 CIS Configuration Editor Version 1.6.010511 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction

More information

Cisco CSPC 2.7.x. Quick Start Guide. Feb CSPC Quick Start Guide

Cisco CSPC 2.7.x. Quick Start Guide. Feb CSPC Quick Start Guide CSPC Quick Start Guide Cisco CSPC 2.7.x Quick Start Guide Feb 2018 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 17 Contents Table of Contents 1. INTRODUCTION

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

Downloading and Licensing. (for Stealthwatch System v6.9.1)

Downloading and Licensing. (for Stealthwatch System v6.9.1) Downloading and Licensing (for Stealthwatch System v6.9.1) Contents Contents 2 Introduction 5 Purpose 5 Audience 5 Preparation 5 Trial Licenses 5 Download and License Center 6 Contacting Support 6 Registering

More information

Cisco Expressway Cluster Creation and Maintenance

Cisco Expressway Cluster Creation and Maintenance Cisco Expressway Cluster Creation and Maintenance Deployment Guide First Published: December 2009 Last Updated: April 2017 Cisco Expressway X8.9.2 Cisco Systems, Inc. www.cisco.com Contents Preface 3 Change

More information

A Appliance Upgrade Guide

A Appliance Upgrade Guide A Appliance Upgrade Guide IBM Internet Security Systems, Inc. 6303 Barfield Road Atlanta, Georgia 30328-4233 United States (404) 236-2600 http://www.iss.net IBM Internet Security Systems, Inc. 2003-2006.

More information

IBM Internet Security Systems. SiteProtector System Two-Factor Authentication API Guide

IBM Internet Security Systems. SiteProtector System Two-Factor Authentication API Guide IBM Internet Security Systems SiteProtector System Two-Factor Authentication API Guide IBM Internet Security Systems SiteProtector System Two-Factor Authentication API Guide ii IBM Internet Security Systems:

More information

Franzes Francisco Manila IBM Domino Server Crash and Messaging

Franzes Francisco Manila IBM Domino Server Crash and Messaging Franzes Francisco Manila IBM Domino Server Crash and Messaging Topics to be discussed What is SPAM / email Spoofing? How to identify one? Anti-SPAM / Anti-email spoofing basic techniques Domino configurations

More information

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic IBM Security IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic Version 2.9 Note Before using this information and the product it supports, read the information in Notices

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 8.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Cisco WebEx Meetings Server Administration Guide

Cisco WebEx Meetings Server Administration Guide First Published: October 23, 2012 Last Modified: October 23, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Cisco WebEx Meetings Server Administration Guide Release 1.5

Cisco WebEx Meetings Server Administration Guide Release 1.5 First Published: August 16, 2013 Last Modified: April 18, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Cisco Expressway with Jabber Guest

Cisco Expressway with Jabber Guest Cisco Expressway with Jabber Guest Deployment Guide First Published: Decemeber 2016 Cisco Expressway X8.9 Cisco Jabber Guest Server 10.6.9 (or later) Cisco Systems, Inc. www.cisco.com Contents Preface

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Zimbra Collaboration Suite Virtual Appliance VMware Installation

Zimbra Collaboration Suite Virtual Appliance VMware Installation Zimbra Collaboration Suite Virtual Appliance VMware Installation Network Edition 4.5 Beta 2 The Zimbra Collaboration Suite (ZCS) virtual appliance includes the rpath Linux operating system and the ZCS

More information

RealPresence Access Director System Administrator s Guide

RealPresence Access Director System Administrator s Guide [Type the document title] Polycom RealPresence Access Director System Administrator s Guide 2.1.0 March 2013 3725-78703-001A Polycom Document Title 1 Trademark Information POLYCOM and the names and marks

More information

ForeScout Extended Module for Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection ForeScout Extended Module for Symantec Endpoint Protection Version 1.0.0 Table of Contents About the Symantec Endpoint Protection Integration... 4 Use Cases... 4 Additional Symantec Endpoint Protection

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE 1.0 Quest Enterprise Reporter Discovery Manager USER GUIDE 2012 Quest Software. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Installation and Configuration Guide

Installation and Configuration Guide CYBERSECURITY, EVOLVED EdgeWave iprism Web Security Installation and Configuration Guide V8.0 15333 Avenue of Science, Suite 100 San Diego, CA 92128 Give us a call 1-855-881-2004 Send us an email: info@edgewave.com

More information

WeCloud Security. Administrator's Guide

WeCloud  Security. Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security Administrator's Guide WeCloud Security provides a variety of useful features within a user-friendly web console to manage the functions including

More information

Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control)

Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control) Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control) Deployment Guide Cisco VCS X8.2 D14524.05 June 2014 Contents Introduction 3 Example network deployment 3 Network elements

More information