McAfee MAP-3300-SWG Product Guide - Page 99

Postmaster address, DKIM signing, Enable DKIM, signing, Domain name, Selector, Signing key, Export

Page 99 highlights

Overview of Email features Email Configuration Postmaster address McAfee recommends that you assign a postmaster, so that queries from your users are handled promptly. The postmaster must be someone who reads email regularly. You can use the name of a single user or a distribution list. Table 76 Option definitions Option Definition Postmaster address Specifies an email address that the appliance uses to deliver email that has a recipient of postmaster. We recommend that you specify an email address here, so that any delivery problems are handled promptly. You can specify a distribution list or a single user who reads email regularly. DKIM signing The Domain Keys Identified Mail (DKIM) technique uses RSA private and public keys and DNS TXT records to enable the recipient to verify the identity of an email sender. The sender signs the email message with a private key, by adding an extra header - the DKIM-Signature header. The header provides the email message with a cryptographic signature. The signature is typically derived from the message body and email headers such as From and Subject, then encrypted by the sender's private key. Recipients can verify that the message is genuine by making a query on the signer's domain to retrieve the signer's public key from a DNS TXT record. The recipient then verifies that the email and its signature match. The recipient can therefore be confident that the email was sent from the stated sender and was not altered during transit. The appliance can verify signatures from incoming mail and attach signatures to outgoing mail. For information about Domain Keys Identified Mail (DKIM), visit the Internet Engineering Task Force website, http://www.ietf.org and http://www.dkim.org. Use this section to create a Domain Keys Identified Mail (DKIM) key. Table 77 Option definitions Option Enable DKIM signing Definition When selected, adds a DKIM header (like a digital signature) to each email message as it is sent. You must add a key before you can enable DKIM signing. Domain name and Selector During verification, the recipient extracts your Domain Name and Selector from the signature to retrieve the public key associated with the appliance's private signing key. For example, if your Selector is mail and your Domain Name is example.com, the recipient must issue a DNS query for the TXT record of mail._domainkey.example.com. Signing key Select the key to be used to sign the messages. DKIM signing keys Allows you to create signing keys from numerous parameters. Export When clicked, allows you to save the private key to a file, in case the original private key is lost or erased. View Public Key Place the public key on your DNS server or give it to your Internet Service Provider, so that recipients can verify email from your organization. McAfee Email and Web Security Appliances 5.6.0 Product Guide 99

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Postmaster address
McAfee recommends that you assign a postmaster, so that queries from your users are handled
promptly. The postmaster must be someone who reads email regularly. You can use the name of a
single user or a distribution list.
Table 76
Option definitions
Option
Definition
Postmaster address
Specifies an email address that the appliance uses to deliver email that has a
recipient of
postmaster
.
We recommend that you specify an email address here, so that any delivery
problems are handled promptly. You can specify a distribution list or a single user
who reads email regularly.
DKIM signing
The Domain Keys Identified Mail (DKIM) technique uses RSA private and public keys and DNS TXT
records to enable the recipient to verify the identity of an email sender.
The sender signs the email message with a private key, by adding an extra header - the
DKIM-Signature header. The header provides the email message with a cryptographic signature. The
signature is typically derived from the message body and email headers such as From and Subject,
then encrypted by the sender's private key.
Recipients can verify that the message is genuine by making a query on the signer's domain to
retrieve the signer's public key from a DNS TXT record. The recipient then verifies that the email and
its signature match. The recipient can therefore be confident that the email was sent from the stated
sender and was not altered during transit.
The appliance can verify signatures from incoming mail and attach signatures to outgoing mail.
For information about Domain Keys Identified Mail (DKIM), visit the Internet Engineering Task Force
website,
and
.
Use this section to create a Domain Keys Identified Mail (DKIM) key.
Table 77
Option definitions
Option
Definition
Enable DKIM
signing
When selected, adds a DKIM header (like a digital signature) to each email message
as it is sent.
You must add a key before you can enable DKIM signing.
Domain name
and
Selector
During verification, the recipient extracts your Domain Name and Selector from the
signature to retrieve the public key associated with the appliance’s private signing key.
For example, if your Selector is mail and your Domain Name is example.com, the
recipient must issue a DNS query for the TXT record of mail._domainkey.example.com.
Signing key
Select the key to be used to sign the messages.
DKIM signing
keys
Allows you to create signing keys from numerous parameters.
Export
When clicked, allows you to save the private key to a file, in case the original private
key is lost or erased.
View Public Key
Place the public key on your DNS server or give it to your Internet Service Provider, so
that recipients can verify email from your organization.
Overview of Email features
Email Configuration
McAfee Email and Web Security Appliances 5.6.0 Product Guide
99