McAfee MAP-3300-SWG Product Guide - Page 103

Email Scanning Policies menu, Anti-Virus, Compliance - bank

Page 103 highlights

Overview of Email features Email Policies Email Scanning Policies menu Use this page to make policies for handling threats in email. Links under the following headings go to further pages, where you can configure the features of the appliance. • Anti-Virus • Spam • Compliance • Scanner Options Anti-Virus Email | Email Policies | Scanning Policies [Anti-Virus] This column on the page contains the following links, which lead to further pages where you can control the features of the appliance. Link What you can do from this part of the interface Virus Use this page to specify basic options for anti-virus scanning. Spyware Use this page to specify the actions to take against potentially unwanted programs. Packers Use this page to specify the actions to take against packers. Packers compress files, which change the binary signature of the executable. Packers can compress Trojan-horse programs and make them harder to detect. Spam Email | Email Policies | Scanning Policies [Spam] This column on the page contains the following links, which lead to further pages where you can control the features of the appliance. Link Spam Phish Sender Authentication What you can do from this part of the interface Use these pages to manage spam by specifying thresholds and blacklists. Use this page to specify how to handle phishing email. Phishing is the illegal activity of using spoofed email messages to persuade unsuspecting users to disclose personal identity and financial information. Criminals can use the stolen identity to fraudulently obtain goods and services and to steal directly from bank accounts. Use these pages to manage the use of authentication systems such as DKIM and SPF. Compliance Email | Email Policies | Scanning Policies [Compliance] McAfee Email and Web Security Appliances 5.6.0 Product Guide 103

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Email Scanning Policies menu
Use this page to make policies for handling threats in email.
Links under the following headings go to further pages, where you can configure the features of the
appliance.
Anti-Virus
Spam
Compliance
Scanner Options
Anti-Virus
Email
|
Email Policies
|
Scanning Policies [Anti-Virus]
This column on the page contains the following links, which lead to further pages where you can
control the features of the appliance.
Link
What you can do from this part of the interface
Virus
Use this page to specify basic options for anti-virus scanning.
Spyware
Use this page to specify the actions to take against potentially unwanted programs.
Packers
Use this page to specify the actions to take against packers.
Packers compress files, which change the binary signature of the executable. Packers can
compress Trojan-horse programs and make them harder to detect.
Spam
Email
|
Email Policies
|
Scanning Policies [Spam]
This column on the page contains the following links, which lead to further pages where you can
control the features of the appliance.
Link
What you can do from this part of the interface
Spam
Use these pages to manage spam by specifying thresholds and blacklists.
Phish
Use this page to specify how to handle phishing email.
Phishing is the illegal activity of using spoofed email messages to persuade
unsuspecting users to disclose personal identity and financial information. Criminals
can use the stolen identity to fraudulently obtain goods and services and to steal
directly from bank accounts.
Sender
Authentication
Use these pages to manage the use of authentication systems such as DKIM and SPF.
Compliance
Email
|
Email Policies
|
Scanning Policies [Compliance]
Overview of Email features
Email Policies
McAfee Email and Web Security Appliances 5.6.0 Product Guide
103