McAfee MAP-3300-SWG Product Guide - Page 109

McAfee Global Threat Intelligence, About Protocol Presets, Email Scanning Policies

Page 109 highlights

Overview of Email features Email Policies McAfee Global Threat Intelligence This technique reduces the delay between McAfee's detection of a new malware threat and when a customer receives and installs a detection definitions (DAT) file. The delay can be 24 - 72 hours. 1 The appliance scans each file, comparing its code against the information (or signatures) in the current detection definitions (DAT) file. 2 If the code is not recognized and is suspicious, for example, the file is packed or encrypted, the appliance sends a small definition (or fingerprint) of that code to McAfee Global Threat Intelligence - an automated analysis system at McAfee. Millions of other computers with McAfee software also contribute fingerprints. 3 McAfee compares the fingerprint against a database of fingerprints collected worldwide, and informs the appliance of the likely risk - within seconds. Based on settings in the scanning policies, the appliance can then block, quarantine, or try to clean the threat. If McAfee later determines that the code is malicious, a DAT file is published as usual. About Protocol Presets Protocol presets enable you to configure your appliance to cater for differences in parts of your network, or for specific devices on your network. Normally you design your connection settings to apply to all devices. However some parts of your network might need some differences because some devices operate differently. For example: • Part of the network can handle larger or smaller files than normal. • A slow connection requires a different time-out value. • Part of the network must use an alternative authentication service. By creating a protocol preset, you can cater for this exception to the connection settings. Where this feature is available, you can click this icon: . Email Scanning Policies Use this page as a single point where you can access the pages and dialog boxes you need to set up and configure your policies. Email | Email Policies | Scanning Policies Policy settings specify how the appliance handles threats to groups of users or devices. For example, a policy can apply to all computers on the same subnet, or all users in a department. Benefits of using the Scanning Policies page The Scanning Policies page enables you to access all the forms you need to configure and manage your policies for the SMTP and POP3 protocols. The user interface provides an overview of your policy settings, giving you information about each policy such as the action taken when a virus is detected. The page to configure these settings is displayed when you click the relevant information. McAfee Email and Web Security Appliances 5.6.0 Product Guide 109

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

McAfee Global Threat Intelligence
This technique reduces the delay between McAfee's detection of a new malware threat and when a
customer receives and installs a detection definitions (DAT) file. The delay can be 24 - 72 hours.
1
The appliance scans each file, comparing its code against the information (or
signatures
) in the
current detection definitions (DAT) file.
2
If the code is not recognized and is suspicious, for example, the file is packed or encrypted, the
appliance sends a small definition (or
fingerprint
) of that code to McAfee Global Threat Intelligence
— an automated analysis system at McAfee. Millions of other computers with McAfee software also
contribute fingerprints.
3
McAfee compares the fingerprint against a database of fingerprints collected worldwide, and
informs the appliance of the likely risk — within seconds. Based on settings in the scanning
policies, the appliance can then block, quarantine, or try to clean the threat.
If McAfee later determines that the code is malicious, a DAT file is published as usual.
About Protocol Presets
Protocol presets enable you to configure your appliance to cater for differences in parts of your
network, or for specific devices on your network.
Normally you design your connection settings to apply to all devices. However some parts of your
network might need some differences because some devices operate differently.
For example:
Part of the network can handle larger or smaller files than normal.
A slow connection requires a different time-out value.
Part of the network must use an alternative authentication service.
By creating a protocol preset, you can cater for this exception to the connection settings.
Where this feature is available, you can click this icon:
.
Email Scanning Policies
Use this page as a single point where you can access the pages and dialog boxes you need to set up
and configure your policies.
Email
|
Email Policies
|
Scanning Policies
Policy settings specify how the appliance handles threats to groups of users or devices. For example, a
policy can apply to all computers on the same subnet, or all users in a department.
Benefits of using the Scanning Policies page
The
Scanning Policies
page enables you to access all the forms you need to configure and manage your
policies for the SMTP and POP3 protocols.
The user interface provides an overview of your policy settings, giving you information about each
policy such as the action taken when a virus is detected. The page to configure these settings is
displayed when you click the relevant information.
Overview of Email features
Email Policies
McAfee Email and Web Security Appliances 5.6.0 Product Guide
109