Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 102

Configuring Distributed Spam Analysis, To add a blacklist provider to the real-time blacklist

Page 102 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance To add a blacklist provider to the real-time blacklist: 1. In the Add Real-time Blacklist section, add the following information: • In the Provider field, add the name of the blacklist provider. • In the RBL Domain Suffix field, enter the domain suffix of the blacklist provider. 2. Click the Add table button in the Add column. The new blacklist provider is added to the Real-Time Blacklist (SMTP) table, and it is disabled by default. To delete a blacklist provider from the real-time blacklist, click the Delete table button next to the blacklist provider that you want to delete. Configuring Distributed Spam Analysis Spam, phishing, and other email-borne threats consist of millions of messages intentionally composed differently to evade commonly used filters. Nonetheless, all messages within the same outbreak share at least one unique, identifiable value that can be used to distinguish the outbreak. With distributed spam analysis, message patterns are extracted from the message envelope, headers, and body with no reference to the content itself. Pattern analysis can then be applied to identify outbreaks in any language, message format, or encoding type. Message patterns can be divided into distribution patterns and structure patterns. The STM uses distribution patterns to determine if the message is legitimate or a potential threat by analyzing the way it is distributed to the recipients. The STM uses structure patterns to determine the volume of the distribution. The STM uses a distributed spam analysis architecture to determine whether or not an email is spam for SMTP and POP3 emails. Any email that is identified as spam is tagged as spam (an option for both SMTP and POP3), blocked, or quarantined (the latter two are options possible only for SMTP). Note: Unlike other scans, you do not need to configure the spam score because the NETGEAR Spam Classification Center performs the scoring automatically as long as the STM is connected to the Internet. However, this does mean that the STM needs to be connected to the Internet for the spam analysis to be performed correctly. 102 | Chapter 4. Content Filtering and Optimizing Scans

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

102
|
Chapter 4.
Content Filtering and Optimizing Scans
ProSecure Web/Email Security Threat Management (STM) Appliance
To add a blacklist provider to the real-time blacklist:
1.
In the Add Real-time Blacklist section, add the following information:
In the Provider field, add the name of the blacklist provider.
In the RBL Domain Suffix field, enter the domain suffix of the blacklist provider.
2.
Click the
Add
table button in the Add column. The new blacklist provider is added to the
Real-Time Blacklist (SMTP) table, and it is disabled by default.
To delete a blacklist provider from the real-time blacklist, click the
Delete
table button next to
the blacklist provider that you want to delete.
Configuring Distributed Spam Analysis
Spam, phishing, and other email-borne threats consist of millions of messages intentionally
composed differently to evade commonly used filters. Nonetheless, all messages within the
same outbreak share at least one unique, identifiable value that can be used to distinguish
the outbreak.
With distributed spam analysis, message patterns are extracted from the message envelope,
headers, and body with no reference to the content itself. Pattern analysis can then be
applied to identify outbreaks in any language, message format, or encoding type. Message
patterns can be divided into distribution patterns and structure patterns. The STM uses
distribution patterns to determine if the message is legitimate or a potential threat by
analyzing the way it is distributed to the recipients. The STM uses structure patterns to
determine the volume of the distribution.
The STM uses a distributed spam analysis architecture to determine whether or not an email
is spam for SMTP and POP3 emails. Any email that is identified as spam is tagged as spam
(an option for both SMTP and POP3), blocked, or quarantined (the latter two are options
possible only for SMTP).
Note:
Unlike other scans, you do not need to configure the spam score
because the NETGEAR Spam Classification Center performs the
scoring automatically as long as the STM is connected to the
Internet. However, this does mean that the STM needs to be
connected to the Internet for the spam analysis to be performed
correctly.