McAfee MAP-3300-SWG Product Guide - Page 121

Anti-Spam Settings — Rules, Anti-Phish Settings, Whitelisted senders, Whitelisted recipients

Page 121 highlights

Overview of Email features Email Policies Whitelisted senders Table 92 Option definitions Option Definition Email Address Use this to make a list of users who want to send email messages that the appliance normally treats as spam. Specifies each email address. You can use wildcards, for example: user_?@example.* Whitelisted recipients Table 93 Option definitions Option Definition Email Address Use this page to make a list of users who want to receive email messages that are normally identified as spam. Specifies each email address. You can use wildcards, for example: user_?@example.* User Submitted (Blacklists and Whitelists) - Option definitions Use this to manage lists of blacklists and whitelists that have been submitted by users through quarantine digests. If the appliance is configured to use the McAfee Quarantine Manager, you can only view the lists. Anti-Spam Settings - Rules Use this page to remove any spam rules that are causing some email to be wrongly detected as spam. It is unlikely that you will need to change this list. Make changes only if you understand the implications. Table 94 Option definitions Option Definition Rule Name Displays the rule name that is seen in the spam report. Rule Score Displays the rule score, which is typically 1-5. Enabled Specifies whether a rule is active. To disable a rule, deselect its checkbox. Apply and Filter When Apply is clicked, the table shows only those numbers specified by Filter. You can type a regular expression here, for example: • ^AA - Find all terms that begin with AA. • BB$ - Find all terms that end with BB. • CC - Find all terms that contain CC. To see the full list again, clear Filter and click Apply. Anti-Phish Settings Use this page to specify how to handle phishing email. Email | Email Policies | Scanning Policies [Spam] -- Phish Phishing is the illegal activity of using spoofed email messages to persuade unsuspecting users to disclose personal identity and financial information. Criminals can use the stolen identity to fraudulently obtain goods and services and to steal directly from bank accounts. McAfee Email and Web Security Appliances 5.6.0 Product Guide 121

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Whitelisted senders
Table 92
Option definitions
Option
Definition
Email Address
Use this to make a list of users who want to send email messages that the appliance
normally treats as spam.
Specifies each email address. You can use wildcards, for example: user_?@example.*
Whitelisted recipients
Table 93
Option definitions
Option
Definition
Email Address
Use this page to make a list of users who want to receive email messages that are
normally identified as spam.
Specifies each email address. You can use wildcards, for example: user_?@example.*
User Submitted (Blacklists and Whitelists) — Option definitions
Use this to manage lists of blacklists and whitelists that have been submitted by users through
quarantine digests.
If the appliance is configured to use the McAfee Quarantine Manager, you can only view the lists.
Anti-Spam Settings — Rules
Use this page to remove any spam rules that are causing some email to be wrongly detected as spam.
It is unlikely that you will need to change this list. Make changes only if you understand the implications.
Table 94
Option definitions
Option
Definition
Rule Name
Displays the rule name that is seen in the spam report.
Rule Score
Displays the rule score, which is typically 1-5.
Enabled
Specifies whether a rule is active. To disable a rule, deselect its checkbox.
Apply
and
Filter
When
Apply
is clicked, the table shows only those numbers specified by
Filter
. You can
type a regular expression here, for example:
^AA — Find all terms that begin with AA.
BB$ — Find all terms that end with BB.
CC — Find all terms that contain CC.
To see the full list again, clear
Filter
and click
Apply
.
Anti-Phish Settings
Use this page to specify how to handle phishing email.
Email
|
Email Policies
|
Scanning Policies [Spam] -- Phish
Phishing is the illegal activity of using spoofed email messages to persuade unsuspecting users to
disclose personal identity and financial information. Criminals can use the stolen identity to
fraudulently obtain goods and services and to steal directly from bank accounts.
Overview of Email features
Email Policies
McAfee Email and Web Security Appliances 5.6.0 Product Guide
121