McAfee MAP-3300-SWG Product Guide - Page 95

Recipient Checks, Directory harvest prevention, Table 72, Option definitions

Page 95 highlights

Overview of Email features Email Configuration Recipient Checks Use this section to prevent directory-harvest attacks and attacks that issue large numbers of email messages (known as flooding). You can provide the appliance with a list of permitted recipients. Your network might already have this information on its LDAP servers. Alternatively, you can import a list of email addresses from a text file. Table 72 Option definitions Option Definition Protocol preset Specifies the policy (and network group) to which these settings apply. If the recipient is not in When selected, checks the recipient address against email addresses in the list. the following list Email address Lists the acceptable email addresses. You can use wildcards, for example: user*@example.com. We recommend that you do not overuse wildcards, because you will defeat the intention. Or if the recipient is not When selected, checks the recipient address against email addresses in the listed in LDAP LDAP. To connect to an LDAP server, select System | Users, Groups and Services | Directory Services on the navigation bar. Take the following action • Accept and ignore the recipient - Accepts the email message and ignores it. The appliance sends an acceptance code (SMTP 250 OK). We do not recommend this option because it suggests to the sender that the message was received as intended. • Reject - Sends a rejection code (SMTP 550 Fail). We recommend this option because the sender is normally informed that the message was not accepted. Directory harvest prevention Use this section to prevent directory harvest attacks. The appliance examines the number of known and unknown email addresses to determine whether an attack is taking place. When used with some email servers, Directory Harvest Prevention might not function as expected. Table 73 Option definitions Option Protocol preset When the appliance is in transparent mode Definition Specifies the policy (and network group) to which these settings apply. • None - Takes no action. • Tarpit - Delays a response to email that has several recipient addresses. • Tarpit then deny connection - Delays a response to the email, then adds the sender to the Denied Connections list. • Deny connection - Adds the sender to the Denied Connections list. Default value is Deny connection. When the appliance is in proxy mode • None - takes no action. • Deny connection - adds the sender to the Denied Connections list. Default value is Deny connection. McAfee Email and Web Security Appliances 5.6.0 Product Guide 95

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Recipient Checks
Use this section to prevent directory-harvest attacks and attacks that issue large numbers of email
messages (known as flooding). You can provide the appliance with a list of permitted recipients. Your
network might already have this information on its LDAP servers. Alternatively, you can import a list of
email addresses from a text file.
Table 72
Option definitions
Option
Definition
Protocol preset
Specifies the policy (and network group) to which these settings apply.
If the recipient is not in
the following list
When selected, checks the recipient address against email addresses in the list.
Email address
Lists the acceptable email addresses. You can use wildcards, for example:
user*@example.com. We recommend that you do not overuse wildcards,
because you will defeat the intention.
Or if the recipient is not
listed in LDAP
When selected, checks the recipient address against email addresses in the
LDAP. To connect to an LDAP server, select
System
|
Users, Groups and Services
|
Directory Services
on the navigation bar.
Take the following action
Accept and ignore the recipient
— Accepts the email message and ignores it. The
appliance sends an acceptance code (SMTP 250 OK). We do not recommend
this option because it suggests to the sender that the message was received
as intended.
Reject
— Sends a rejection code (SMTP 550 Fail). We recommend this option
because the sender is normally informed that the message was not accepted.
Directory harvest prevention
Use this section to prevent directory harvest attacks. The appliance examines the number of known
and unknown email addresses to determine whether an attack is taking place.
When used with some email servers, Directory Harvest Prevention might
not function as expected.
Table 73
Option definitions
Option
Definition
Protocol preset
Specifies the policy (and network group) to which these settings apply.
When the appliance is in
transparent mode
None
— Takes no action.
Tarpit
— Delays a response to email that has several recipient addresses.
Tarpit then deny connection
— Delays a response to the email, then adds the
sender to the Denied Connections list.
Deny connection
— Adds the sender to the Denied Connections list.
Default value is
Deny connection
.
When the appliance is in
proxy mode
None
— takes no action.
Deny connection
— adds the sender to the Denied Connections list.
Default value is
Deny connection
.
Overview of Email features
Email Configuration
McAfee Email and Web Security Appliances 5.6.0 Product Guide
95