Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 88

Customizing Email Anti-Virus Settings, Table 25., Email Policy Settings

Page 88 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance 2. Select the check boxes and complete the fields and as explained in the following table: Table 25. Email Policy Settings Setting Description Services to Scan SMTP Select the SMTP check box to enable Simple Mail Transfer Protocol (SMTP) scanning. This service is enabled by default and uses default port 25. POP3 Select the POP3 check box to enable Post Office Protocol 3 (POP3). This service is enabled by default and uses default port 110. IMAP Select the IMAP check box to enable Internet Message Access Protocol (IMAP). This service is enabled by default and uses default port 143. Note: If a protocol uses a port other than the standard service port (for example, port 25 for SMTP), enter this nonstandard port in the Ports to Scan field. For example, if the SMTP service on your network uses both port 25 and port 2525, enter both port numbers in the Ports to Scan field and separate them by a comma. Note: The following protocols are not supported by the STM: SMTP over SSL using port number 465, POP3 over SSL using port number 995, and IMAP over SSL using port number 993. 3. Click Apply to save your settings. Customizing Email Anti-Virus Settings If you have used the Setup Wizard, you might have already configured the email antivirus action and exception settings; the Action and Exception screens allows you to modify these settings. The Notification screen allows you to specify the email antivirus notification settings. Whether or not the STM detects an email virus, you can configure it to take a variety of actions (some of the default actions are listed in Table 24 on page 85), set exceptions for file sizes, and specify which notifications, emails, or both need to be sent to the end users. 88 | Chapter 4. Content Filtering and Optimizing Scans

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

88
|
Chapter 4.
Content Filtering and Optimizing Scans
ProSecure Web/Email Security Threat Management (STM) Appliance
2.
Select the check boxes and complete the fields and as explained in the following table:
Note:
If a protocol uses a port other than the standard service port (for
example, port 25 for SMTP), enter this nonstandard port in the Ports
to Scan field. For example, if the SMTP service on your network
uses both port 25 and port 2525, enter both port numbers in the
Ports to Scan field and separate them by a comma.
Note:
The following protocols are not supported by the STM: SMTP over
SSL using port number 465, POP3 over SSL using port number 995,
and IMAP over SSL using port number 993.
3.
Click
Apply
to save your settings.
Customizing Email Anti-Virus Settings
If you have used the Setup Wizard, you might have already configured the email antivirus
action and exception settings; the Action and Exception screens allows you to modify these
settings. The Notification screen allows you to specify the email antivirus notification settings.
Whether or not the STM detects an email virus, you can configure it to take a variety of
actions (some of the default actions are listed in
Table 24
on page 85), set exceptions for file
sizes, and specify which notifications, emails, or both need to be sent to the end users.
Table 25.
Email Policy Settings
Setting
Description
Services to Scan
SMTP
Select the
SMTP
check box to enable Simple Mail Transfer Protocol (SMTP) scanning. This
service is enabled by default and uses default port 25.
POP3
Select the
POP3
check box to enable Post Office Protocol 3 (POP3). This service is enabled
by default and uses default port 110.
IMAP
Select the
IMAP
check box to enable Internet Message Access Protocol (IMAP). This
service is enabled by default and uses default port 143.