Dell SonicWALL Security 8.1.1

Similar documents
SonicWall Security 9.0.6

SonicWall Security 9.0.5

Spotlight Management Pack for SCOM. User Guide

Dell Statistica. Statistica Enterprise Server Installation Instructions

SonicWall Security

Dell SonicWALL SonicOS 5.9 Upgrade Guide

Cloud Access Manager How to Deploy Cloud Access Manager in a Virtual Private Cloud

Dell Secure Mobile Access Connect Tunnel Service User Guide

One Identity Quick Connect Express

One Identity Active Roles 7.2

One Identity Starling Two-Factor Authentication. Administration Guide

Cloud Access Manager SonicWALL Integration Overview

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

One Identity Active Roles Diagnostic Tools 1.2.0

Dell GPOADmin 5.7. About Dell GPOADmin 5.7. New features. Release Notes. December 2013

SonicWALL Security Software

One Identity Starling Two-Factor Authentication. Administrator Guide

One Identity Password Manager User Guide

The Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide

Dell SonicWALL WXA 1.3.1

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide

Quest One Password Manager

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide

One Identity Starling Two-Factor AD FS Adapter 6.0. Administrator Guide

One Identity Defender 5.9. Product Overview

One Identity Management Console for Unix 2.5.1

Rapid Recovery License Portal Version User Guide

EAM Portal User's Guide

Dell One Identity Cloud Access Manager 8.0. Overview

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

Spotlight on SQL Server Enterprise Spotlight Management Pack for SCOM

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

One Identity Active Roles 7.2. Configuration Transfer Wizard Administrator Guide

Quest Migrator for Notes to Exchange SSDM User Guide

About Toad for Oracle 2017 Editions 2. Product release notes 4. Installation 5

Quest Collaboration Services 3.6. Installation Guide

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

One Identity Starling Two-Factor HTTP Module 2.1. Administration Guide

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Dell Change Auditor 6.5. Event Reference Guide

Setting up Quest QoreStor as an RDA Backup Target for NetVault Backup. Technical White Paper

MySonicWall Secure Upgrade Plus

SonicWall SMA 8200v. Getting Started Guide

Quest Migration Manager for Exchange Resource Kit User Guide

One Identity Active Roles 7.2. Management Pack Technical Description

Rapid Recovery DocRetriever for SharePoint User Guide

Quest Migration Manager Upgrade Guide

Metalogix Intelligent Migration. Installation Guide

July SonicWall SonicOS 6.2 Upgrade Guide

SQL Optimizer for Oracle Installation Guide

SonicWall SonicOS 5.9

LiteSpeed for SQL Server 6.1. Configure Log Shipping

SonicWall Secure Mobile Access

Dell Change Auditor for Active Directory 6.5. User Guide

SonicWall Analyzer 8.4

Quest Knowledge Portal 2.9

SonicWall Content Filtering Client for Windows and Mac OS

About One Identity Quick Connect for Base Systems 2.4.0

Quest Unified Communications Diagnostics Data Recorder User Guide

SonicWall Analyzer 8.4 SP1

Quest Migration Manager for Exchange Granular Account Permissions for Exchange 2010 to 2010 Migration

One Identity Starling Two-Factor Authentication

Quest Code Tester for Oracle 3.1. Installation and Configuration Guide

KACE GO Mobile App 5.0. Release Notes

SonicWall Secure Mobile Access

Dell AppAssure. PowerShell Module Reference 5.4.3

KACE GO Mobile App 4.0. Release Notes

Dell Statistica Silent Installer Instructions

One Identity Manager 8.0. Administration Guide for Connecting to Azure Active Directory

Quest Migration Manager for Exchange Granular Account Permissions for Exchange 2010 to 2013 Migration

SQL Optimizer for IBM DB2 LUW 4.3.1

KACE GO Mobile App 5.0. Getting Started Guide

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE

SonicWall Global VPN Client Getting Started Guide

Quest Recovery Manager for Active Directory Forest Edition 9.0. Quick Start Guide

Metalogix Archive Manager for Files 8.0. IIS Installation

voptimizer Pro Version What s New

Quest Recovery Manager for Active Directory 9.0. Quick Start Guide

Toad DevOps Toolkit 1.0

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide

Dell Change Auditor for SharePoint 6.5. User Guide

KACE GO Mobile App 3.1. Release Notes

Setting up the DR Series System with vranger. Technical White Paper

One Identity Manager Administration Guide for Connecting to SharePoint

Toad Intelligence Central 3.3 New in This Release

Cloud Access Manager Overview

Dell Migration Solutions for SharePoint 4.8. User Guide

Setting up the DR Series System on Acronis Backup & Recovery v11.5. Technical White Paper

SonicWall Mobile Connect for Chrome OS

Metalogix ControlPoint 7.6. for Office 365 Installation Guide

About Space Manager with LiveReorg

Metalogix ControlPoint 7.6

Cloud Access Manager How to Configure Microsoft Office 365

Toad Edge 2.0 Preview

Management Console for SharePoint

A Rapid Recovery Technical Whitepaper. Lenovo Nutanix Data Protection: Best Practices for Quest Software Data Protection Solutions

Dell Migration Manager 8.11 Collection Management Utility

Quest InTrust InTrust Events

Toad Data Modeler Limitation Matrix

Transcription:

Dell SonicWALL July 2015, updated October 2015 These release notes provide information about the Dell SonicWALL release. About Supported platforms New features Resolved issues Product licensing Upgrading information Technical support resources About Dell About is a release that introduces a new Reports Dashboard, Top Spam Countries Report, TLS Encryption, and other various updates to the Dell SonicWALL Email Security product. Supported platforms This section lists the requirements needed to use Dell SonicWALL. Appliance requirements Dell SonicWALL firmware is supported on the following appliances: Dell SonicWALL Email Security 3300 Dell SonicWALL Email Security 4300 Dell SonicWALL Email Security 8300 1

Software requirements When installed as software, Dell SonicWALL is supported on systems that meet the following requirements: Requirement Processor Memory Hard Disk Space Operating System Intel Pentium: P4 or compatible CPU 4 GB of RAM Additional 160 GB minimum. Recommended installation on separate drive. Your storage needs are based on your mail volume, quarantine size, archived data, and auditing settings. Microsoft Hyper-V Server 2012 R2 (64-bit) Microsoft Hyper-V Server 2012 (64-bit) Microsoft Hyper-V Server 2008 (64-bit) Windows Server 2012 R2 (64-bit) Windows Server 2012 (64-bit) Windows Server 2008 R2 (64-bit) SBS 2008 (64-bit) Dell SonicWALL Software is not supported on Windows running on VMware. Use the Email Security Virtual Appliance on VMware platforms only. Virtual appliance requirements When installed as a Virtual Appliance, Dell SonicWALL is supported on systems that meet the following requirements: Minimum Requirement Processor Memory Hard Disk Space Details 1 CPU, can be expanded to 8 CPU 4 GB of RAM, can be expanded to 64 GB VMware Platforms ESX 5.1 and newer ESXi 5.1 and newer 160 GB thick provisioned hard disk space Note: The OVA image for the Dell SonicWALL Email Security Appliance The OVA image for the Dell SonicWALL Email Security appliance specifically allocates 160 GB on the virtual disk and cannot be altered. 2

New features The following are the new features in the release: Reports Dashboard RUA report delivery Downloading reports as PDF and JPEG Top Spam Countries Report Rate Limiting for MTA TLS between Email Security appliances Per Binary Logging Log4j support Policy Filter additions Flood protection for OU DKIM outbound signing for OU Reports Dashboard The Reports > Dashboard page provides information about Dell SonicWALL Email Security at a glance. These charts are updated hourly and display the statistics for the last 24 hours. On any report page, you can drag and drop the charts to customize the order of how each report appears on the page. 3

RUA report delivery When the DMARC feature is enabled on the Anti-Spoofing page, DMARC outgoing reports are automatically sent. You can specify the RUA email address that will receive the reports. The RUA is the aggregated report for domains with published domain records. Downloading reports as PDF and JPEG Dell SonicWALL Email Security provides many types of reports. All reports allow you to optionally download the data in PDF and JPEG format. Click the Download icon of the report to select the format you want to download. Top Spam Countries Report Under the Reports > Connection Management Reports page, a Top Spam Countries Report is now available. This report allows you to monitor which countries are most accountable for sending spam to your organization. Rate Limiting for MTA The Rate Limiting Settings section on the System > Network Architecture > MTA Configuration page is an optional advanced feature. Because many connections can throttle or defer connections from an IP address, the Rate Limit Settings section allows you to limit the maximum number of simultaneous connections the MTA can open to MX record domains. TLS between Email Security appliances This release of Dell SonicWALL Email Security supports the encryption of quarantined messages that are transferred between Split Mode Remote Analyzers (RA) and Control Centers (CC), using TLS. These quarantined messages originate from the Junk Box and Approval Box, and have in the past been transferred via clear SMTP. 4

Per Binary Logging Dell SonicWALL Email Security now implements a per Binary Logging Structure for all logs. Log4j support Dell SonicWALL Email Security now supports Log4j migration for WebUI and Search Engines. Policy Filter additions Two new filters have been added to this release of Dell SonicWALL Email Security: Attachment Type and Country Code. Navigate to the Policy & Compliance > Filters page and click the Add New Filter button. Select Attachment Type from the drop down list and specify the type to create a filter based on Attachment Type. Select Country Code from the drop down list and specify the country to create a filter based on the Country Code. 5

Flood protection for OU Flood protection is now configurable for Organizational Units (OU) Administrators. In this release of Email Security, OU Administrators are able to configure and manage the Flood Protection settings independently for their organization deployments. Configurable settings include threshold settings, action settings, and exception lists. OU Administrators can disable the Flood Protection feature. Log in as an OU Administrator and navigate to the Anti-Virus page. Click the check box to Enable Zombie and Spyware Protection. DKIM outbound signing for OU DKIM Outbound configuration is available for Organizational Unit (OU) Administrators, with settings configurable per each domain. OU Admins are able to generate Public Private Key Pairs for DKIM Signing or import an existing public-private key pair. Admins are required to create a passphrase for the private key. 6

7

Resolved issues The following issues are resolved in this release. Resolved issue Policy filters with PDF attachments sent through the proxy results in an error. Occurs when the policy filter for Deep Content Scanning is enabled. Workaround: Disable this Policy Filter. Policy filters with attachments can indefinitely loop and consume disk space. Occurs when processing a message containing a malicious RTF file. Workaround: Disable this Policy Filter. Logjam vulnerability against TLS. Occurs when using SMTP Client implementation of Ephemeral Diffie-Hellman key exchange (EDH). Workaround: Disable EDH using the cipherstringmap setting in server.xml: <cipherstringmap> <cipherstring strength="strong">"high:!md5:!sslv2:!anull:!enull:!edh:@strength</cipherstring> </cipherstringmap> SPF configuration is a per-user configurable setting rather than a global configurable setting. Occurs when configuring SPF settings on the Anti-Spoofing page. Issue ID 161395 161393 161164 89400 Product licensing Dell SonicWALL Email Security appliances must be registered on MySonicWALL to enable full functionality and the benefits of Dell SonicWALL security services, firmware updates, and technical support. Upgrading information The following procedures are for upgrading an existing Email Security appliance or for installing the Email Security Virtual Appliance. Backing up your existing environment Upgrading your existing firmware Upgrading your existing software Installing the virtual appliance Backing up your existing environment Before you upgrade your appliance firmware, you should back up your existing environment. This will enable you to restore it if you decide to change back for some reason. Your backup should include the settings files, including the per user settings. To back up your existing environment: 1. Login to Email Security interface using the admin account 8

2. In the left navigation pane under System, choose Backup/Restore. You will see the Backup/Restore page: 3. In the Manage Backups section, select Settings. 4. Click Take Snapshot Now to create a snapshot. 5. Click Download Snapshot to save the snapshot to your local file system. Upgrading your existing firmware Follow this procedure to upgrade your existing Email Security firmware on Email Security appliances. 1. Navigate to the System>Advanced page and scroll down to the Upload Patch section. 2. Click Choose File to locate the Email Security Firmware file on your local file system, and then click Apply Patch. 3. As part of the upgrade process, the Email Security appliance will reboot. The upgrade process could take between 10-20 minutes. All the settings and data will be preserved. CAUTION for ES8300 Appliances: Your ES8300 is equipped with a battery backup unit on the RAID Controller Card, which allows the appliance to write volatile memory to disk in the event of a loss of power. This battery backup unit must be charged for 24 hours. When deploying your ES8300 appliance, follow the startup and registration instructions detailed in the Getting Started Guide, and then allow the battery backup in the unit to charge for 24 hours. If the battery is not fully charged, some RAID features are turned off, and the appliance performance is temporarily impaired until the battery is fully charged. 9

Upgrading your existing software Follow this procedure to upgrade your existing Email Security installation. The Full Installer includes installation of Apache Tomcat, the Java Runtime Environment (JRE), Firebird, and MySQL as well as the base Email Security software. 1. On the server running Email Security, double-click the Email Security installation file. Click Run in the dialog box. If you do not have direct access to the server, use a remote desktop connection to connect to the server and run the installation file on the server. Note: Administrators must copy the installation file to the Email Security Server in order to run the installation file. Administrators will not be able to upgrade through the Web UI on Windows. 2. In the Welcome page of the installation wizard, click Next. 3. Read the License Agreement and then click Next to accept the agreement. 4. Dell SonicWALL recommends that Asian language packs be installed, and an alert is displayed if they are missing. To proceed with the Email Security installation and install Asian language packs later, click Next. To install Asian language packs prior to proceeding, click Cancel. Note: Installing Asian language packs is optional; however, the spam prevention capabilities of Dell SonicWALL Email Security may be diminished without them. Asian language packs can be installed before or after Email Security Software installation. 5. On the Destination Folder page, click Browse to select an alternate folder, or click Next to accept the default location. Note: It is important that this folder is not scanned by an anti-virus engine. 6. On the Choose Data Folder page, click Browse to select an alternate folder, or click Next to accept the default location. If the data folder is on a different disk drive than the install directory, ensure that it has fast read/write access with less than 10 millisecond latency. You can test latency with the ping command. 7. On the Start Installation page, click Next. 8. If requested, allow the installation of Tomcat, Firebird, and the Java Runtime Environment (J2RE). If Tomcat is installed in this step, it prompts for the Apache Tomcat Web server port number. The default port is 80. If you are already running a Web server on port 80, you must change the port setting. Dell SonicWALL recommends port 8080. Click Next to continue. Note: You can change the port number and configure HTTPS access after installation by using the Server Configuration > User View Setup page of the Email Security appliance. 9. After the installation finishes, click Finish in the Installation Complete wizard. A browser window is displayed with links to the Email Security user interface and documentation. Installing the virtual appliance For information about installing Dell SonicWALL Email Security 8.0.7 as a Virtual Appliance, see the Dell SonicWALL Email Security Virtual Appliance Getting Started Guide, available at: https://support.software.dell.com/sonicwall-email-security/virtual%20appliance/release-notes-guides Technical support resources Technical support is available to customers who have purchased Dell software with a valid maintenance contract and to customers who have trial versions. To access the Support Portal, go to http://software.dell.com/support/. Dell SonicWALL Administration Guides and related documents are available on the Dell Software Support site at https://support.software.dell.com/release-notes-product-select. The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. In addition, the portal provides direct access to product support engineers through an online Service Request system. 10

The site enables you to: View Knowledge Base articles at: https://support.software.dell.com/kb-product-select View instructional videos at: https://support.software.dell.com/videos-product-select Engage in community discussions Chat with a support engineer Create, update, and manage Service Requests (cases) Obtain product notifications About Dell Dell listens to customers and delivers worldwide innovative technology, business solutions and services they trust and value. For more information, visit www.software.dell.com. Contacting Dell Technical support: Online support Product questions and sales: (800) 306-9329 Email: info@software.dell.com 11

2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Dell Inc. The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Dell does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Dell Inc. Attn: LEGAL Dept 5 Polaris Way Aliso Viejo, CA 92656 Refer to our web site (software.dell.com) for regional and international office information. Patents For more information about applicable patents, refer to http://software.dell.com/legal/patents.aspx. Trademarks Dell, the Dell logo, and SonicWALL are trademarks of Dell Inc. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest in the marks and names of others. Legend CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death. IMPORTANT NOTE, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information. Last updated: 10/15/2015 232-002917-00 Rev C 12