Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 97

Protecting Against Email Spam, Apply, Whitelist, Blacklist, Real-time blacklist

Page 97 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Table 29. Email Filter Settings (Continued) Setting Description (or Subfield and Description) Filter by File Type File Extension By default, the File Extension field lists the most common file extensions that are detected. You can manually add or delete extensions. Use commas to separate different extensions. You can enter a maximum of 40 file extensions; the maximum total length of this field, excluding the delimiter commas, is 160 characters. You can also use the drop-down list to add predefined file extensions from a specific category to the File Extension field: • None. No file extensions are added to the File Extension field. This is the default setting. • Executables. Executable file extensions (exe, com, dll, so, lib, scr, bat, and cmd) are added to the File Extension field. • Audio/Video. Audio and video file extensions (wav, mp3, avi, rm, rmvb, wma, wmv, mpg, mp4, and aac) are added to the File Extension field. • Compressed Files. Compressed file extensions (zip, rar, gz, tar, and bz2) added to the File Extension field. Action SMTP POP3 IMAP From the drop-down list, specify an action when an email attachment with a file extension that is defined in the File Extension field is detected. The drop-down list selections and defaults are the same as the ones for the Filter by Password-Protected Attachments (ZIP, RAR, etc.) section earlier in this table. Filter by File Name File Name Enter the file names that are detected. For example, to block the Netsky worm (which normally arrives as netsky.exe), enter netsky.exe. You can enter a maximum of 20 file names. Use commas to separate multiple file names. The maximum total length of this field is 400 characters, excluding the delimiter commas. Action SMTP POP3 IMAP From the drop-down list, specify an action when an email attachment with a name that is defined in the File Name field is detected. The drop-down list selections and defaults are the same as the ones for the Filter by Password-Protected Attachments (ZIP, RAR, etc.) section earlier in this table. 3. Click Apply to save your settings. Protecting Against Email Spam The STM integrates multiple antispam technologies to provide comprehensive protection against unwanted email. You can enable all or a combination of these antispam technologies. The STM implements these spam prevention technologies in the following order: 1. Whitelist. Emails from the specified sources or to the specified recipients are not considered spam and are accepted. 2. Blacklist. Emails from the specified sources are considered spam and are blocked. 3. Real-time blacklist. Emails from known spam sources that are collected by blacklist providers are blocked. 4. Distributed spam analysis. Emails that are detected as spam by the NETGEAR Spam Classification Center are either tagged, blocked, or quarantined. Chapter 4. Content Filtering and Optimizing Scans | 97

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 4.
Content Filtering and Optimizing Scans
|
97
ProSecure Web/Email Security Threat Management (STM) Appliance
3.
Click
Apply
to save your settings.
Protecting Against Email Spam
The STM integrates multiple antispam technologies to provide comprehensive protection
against unwanted email. You can enable all or a combination of these antispam technologies.
The STM implements these spam prevention technologies in the following order:
1.
Whitelist
. Emails from the specified sources or to the specified recipients are not
considered spam and are accepted.
2.
Blacklist
. Emails from the specified sources are considered spam and are blocked.
3.
Real-time blacklist
. Emails from known spam sources that are collected by blacklist
providers are blocked.
4.
Distributed spam analysis
. Emails that are detected as spam by the NETGEAR Spam
Classification Center are either tagged, blocked, or quarantined.
Filter by File Type
File Extension
By default, the File Extension field lists the most common file extensions that are detected.
You can manually add or delete extensions. Use commas to separate different extensions.
You can enter a maximum of 40 file extensions; the maximum total length of this field,
excluding the delimiter commas, is 160 characters.
You can also use the drop-down list to add predefined file extensions from a specific
category to the File Extension field:
None
. No file extensions are added to the File Extension field. This is the default setting.
Executables
. Executable file extensions (exe, com, dll, so, lib, scr, bat, and cmd) are
added to the File Extension field.
Audio/Video
. Audio and video file extensions (wav, mp3, avi, rm, rmvb, wma, wmv, mpg,
mp4, and aac) are added to the File Extension field.
Compressed Files
. Compressed file extensions (zip, rar, gz, tar, and bz2) added to the
File Extension field.
Action
SMTP
From the drop-down list, specify an action when an email attachment with a file
extension that is defined in the File Extension field is detected. The drop-down list
selections and defaults are the same as the ones for the
Filter by
Password-Protected Attachments (ZIP, RAR, etc.)
section earlier in this table.
POP3
IMAP
Filter by File Name
File Name
Enter the file names that are detected. For example, to block the Netsky worm (which
normally arrives as netsky.exe), enter netsky.exe. You can enter a maximum of 20 file
names. Use commas to separate multiple file names. The maximum total length of this field
is 400 characters, excluding the delimiter commas.
Action
SMTP
From the drop-down list, specify an action when an email attachment with a name
that is defined in the File Name field is detected. The drop-down list selections
and defaults are the same as the ones for the
Filter by Password-Protected
Attachments (ZIP, RAR, etc.)
section earlier in this table.
POP3
IMAP
Table 29.
Email Filter Settings (Continued)
Setting
Description (or Subfield and Description)