McAfee MAP-3300-SWG Product Guide - Page 125

Sender Authentication Settings — Cumulative Score and Other Options, File Filtering Settings

Page 125 highlights

Overview of Email features Email Policies Table 100 Option definitions (continued) Option Definition If the sender passes the check Provides actions to take. For example: Allow through (Monitor) - lets the message move to the next stage. Add to score - combines the results of several methods of sender authentication. Enable DKIM verification Select to enable DomainKeys Identified Mail (DKIM) verification of email messages. Sender Authentication Settings - Cumulative Score and Other Options Use this page to specify various options, including scoring techniques for authenticating senders. If no method is entirely effective against untrusted senders, or some methods work better than others in your network, you can associate scores to each method to refine the overall detection. To ensure scoring works correctly, select Add to score as the action for every method that is in use. Table 101 Option definitions Option Check the total added score, Score threshold, If this threshold is reached Delay period when tarpitting Parse the email headers for sender address if behind an MTA and Number of hops to the MTA Definition Uses scores from several methods of sender authentication to determine the action to take against an email message when its sender cannot be authenticated. Specifies a delay when acknowledging the sending of an email. The default value of 5 seconds is often effective in deterring a denial-of-service attack. If the appliance is preceded by Mail Transfer Agents (MTAs), specify the number of hops from the appliance to the MTA. The appliance can then parse the email headers to find the original sender and check against that IP address. File Filtering Settings Use this page to specify actions against different types of file. This is known as file filtering. Email | Email Policies | Scanning Policies | Compliance | File Filtering The default policy values are normally suitable, but you might need another policy to allow the occasional transfer of large, deeply nested files, or to investigate possible attacks. Table 102 Option definitions Option Definition Order Display the order in which the filters are applied. To change the order, click icons in the Move column. Rule Name Displays the rule name. If Triggered Displays the action to take. Create new filtering rule If clicked, opens a further window where you can specify the types of file you want to detect. Change the default alert text If clicked, opens a further window where you can change the alert message that is issued after a detection. McAfee Email and Web Security Appliances 5.6.0 Product Guide 125

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Table 100
Option definitions
(continued)
Option
Definition
If the sender passes the check
Provides actions to take. For example:
Allow through (Monitor)
- lets the message move to the next stage.
Add to score
- combines the results of several methods of sender authentication.
Enable DKIM verification
Select to enable DomainKeys Identified Mail (DKIM) verification of email
messages.
Sender Authentication Settings — Cumulative Score and Other Options
Use this page to specify various options, including scoring techniques for authenticating senders.
If no method is entirely effective against untrusted senders, or some methods work better than others
in your network, you can associate scores to each method to refine the overall detection. To ensure
scoring works correctly, select Add to score as the action for every method that is in use.
Table 101
Option definitions
Option
Definition
Check the total added score
,
Score
threshold
,
If this threshold is reached
Uses scores from several methods of sender authentication to
determine the action to take against an email message when its
sender cannot be authenticated.
Delay period when tarpitting
Specifies a delay when acknowledging the sending of an email. The
default value of 5 seconds is often effective in deterring a
denial-of-service attack.
Parse the email headers for sender
address if behind an MTA
and
Number of hops to the MTA
If the appliance is preceded by Mail Transfer Agents (MTAs), specify
the number of hops from the appliance to the MTA. The appliance
can then parse the email headers to find the original sender and
check against that IP address.
File Filtering Settings
Use this page to specify actions against different types of file. This is known as file filtering.
Email
|
Email Policies
|
Scanning Policies
|
Compliance
|
File Filtering
The default policy values are normally suitable, but you might need another policy to allow the
occasional transfer of large, deeply nested files, or to investigate possible attacks.
Table 102
Option definitions
Option
Definition
Order
Display the order in which the filters are applied. To change the order, click
icons in the
Move
column.
Rule Name
Displays the rule name.
If Triggered
Displays the action to take.
Create new filtering rule
If clicked, opens a further window where you can specify the types of file you
want to detect.
Change the default alert text
If clicked, opens a further window where you can change the alert message
that is issued after a detection.
Overview of Email features
Email Policies
McAfee Email and Web Security Appliances 5.6.0 Product Guide
125