McAfee MSA-3400-SWGI Installation Guide - Page 47

About Virtual host management, Email | Email Overview | INCOMING EMAIL SUMMARY

Page 47 highlights

Exploring the appliance Using policies to manage message scanning If content scanning is disabled, select Yes in Enable content scanning. 2 From the Content section, click Content scanning. If content scanning is currently disabled, click Yes. 3 Type a Rule name:. 4 Click Next >. 5 From The rule is triggered if any selected dictionary applies, select one or more dictionaries, for example, Gambling (English). 6 Click Next >. 7 From The rule is ignored if any selected dictionary applies, select any dictionary you want ignored. For this example, do not select any dictionaries. 8 Click Next >. 9 From If the content scanning rule is triggered, select your required action, for example Replace the content with an alert (Modify). 10 Select Quarantine from the Original email options area. 11 Click Finish. 12 Click OK to complete the wizard. 13 Apply your configuration changes. 14 From an external email account, create a message to a test mailbox that the device protects. In the message body, type the words: See you at the blackjack table tonight! 15 Send the message. 16 Open the mailbox to which you addressed the message and view the alert message. 17 Use Email | Email Overview | INCOMING EMAIL SUMMARY to see the event. 18 View the Dashboard to see information about items quarantined because of their content. 19 Using the recipient's email account, open McAfee Quarantine Manager User interface and select Unwanted Content. 20 Select the message and click Submit for Release. 21 Open the McAfee Quarantine Manager Administrator interface and select User Submissions. 22 Select Submitted for Release. 23 Select the message and click Release. 24 Open the mailbox to which you sent the message to view the received message. The device checks the message as it enters your mail gateway and identifies that it contains a virus. The device quarantines the message and notifies the intended recipient and the sender that the message was infected. About Virtual host management Using virtual hosts, a single device can appear to behave like several devices. Each virtual device can manage traffic within specified pools of IP addresses, enabling the device to provide scanning services to traffic from many sources or customers. Benefits • Separates each customer's traffic. • Policies can be created for each customer or host, which simplifies configuration and prevents clashes that might occur in complex policies. McAfee Email and Web Security Appliance 5.5 Installation Guide 47

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60

If content scanning is disabled, select
Yes
in
Enable content scanning
.
2
From the
Content
section, click
Content scanning
.
If content scanning is currently disabled, click
Yes
.
3
Type a
Rule name:
.
4
Click
Next >
.
5
From
The rule is triggered if any selected dictionary applies
, select one or more
dictionaries, for example,
Gambling (English)
.
6
Click
Next >
.
7
From
The rule is ignored if any selected dictionary applies
, select any dictionary you
want ignored. For this example, do not select any dictionaries.
8
Click
Next >
.
9
From
If the content scanning rule is triggered
, select your required action, for example
Replace the content with an alert (Modify)
.
10
Select
Quarantine
from the
Original email options
area.
11
Click
Finish
.
12
Click
OK
to complete the wizard.
13
Apply your configuration changes.
14
From an external email account, create a message to a test mailbox that the device protects.
In the message body, type the words:
See you at the blackjack table tonight!
15
Send the message.
16
Open the mailbox to which you addressed the message and view the alert message.
17
Use
Email | Email Overview | INCOMING EMAIL SUMMARY
to see the event.
18
View the
Dashboard
to see information about items quarantined because of their content.
19
Using the recipient’s email account, open McAfee Quarantine Manager User interface and
select
Unwanted Content
.
20
Select the message and click
Submit for Release
.
21
Open the McAfee Quarantine Manager Administrator interface and select
User
Submissions
.
22
Select
Submitted for Release
.
23
Select the message and click
Release
.
24
Open the mailbox to which you sent the message to view the received message.
The device checks the message as it enters your mail gateway and identifies that it contains a
virus. The device quarantines the message and notifies the intended recipient and the sender
that the message was infected.
About Virtual host management
Using virtual hosts, a single device can appear to behave like several devices. Each
virtual
device
can manage traffic within specified pools of IP addresses, enabling the device to provide scanning
services to traffic from many sources or customers.
Benefits
Separates each customer's traffic.
Policies can be created for each customer or host, which simplifies configuration and prevents
clashes that might occur in complex policies.
Exploring the appliance
Using policies to manage message scanning
47
McAfee Email and Web Security Appliance 5.5 Installation Guide