Symantec 10490452 Administration Guide - Page 94

Configuring attack recognition, Policie, Attacks, Enable, Disable, Directory Harvest Attack

Page 94 highlights

94 Configuring email filtering Managing Email Firewall policies lists maintained by Symantec. Sender authentication provides a way to block forged email. Configuring attack recognition Symantec Mail Security for SMTP can detect the following types of attacks originating from a single SMTP server (IP address). Directory harvest attacks Spam attack Virus attack Spammers employ directory harvest attacks to find valid email addresses at the target site. A directory harvest attack works by sending a large quantity of possible email addresses to a site. An unprotected mail server will simply reject messages sent to invalid addresses, so spammers can tell which email addresses are valid by checking the rejected messages against the original list. By default, connections received from violating senders are deferred. A specified quantity of spam messages has been received from a particular IP address. By default, connections received from violating senders are deferred. A specified quantity of infected messages has been received from a particular IP address. By default, connections received from violating senders are deferred. Enable, disable, and configure attack recognition Set up attack recognition as described in the following sections. All attack recognition types are disabled by default, and must be enabled to be activated. To enable or disable attack recognition 1 In the Control Center, click Policies > Attacks. 2 Check the box next to each attack type that you want to enable or disable, or check the box next to Attacks to select all attack types. 3 Click Enable to enable the checked attack types, or click Disable to disable the checked attack types. To configure directory harvest, spam, and virus attack recognition 1 In the Control Center, click Policies > Attacks. 2 Click Directory Harvest Attack, Spam Attack, or Virus Attack.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

94
Configuring email filtering
Managing Email Firewall policies
lists maintained by Symantec. Sender authentication provides a way to block
forged email.
Configuring attack recognition
Symantec Mail Security for SMTP can detect the following types of attacks
originating from a single SMTP server (IP address).
Enable, disable, and configure attack recognition
Set up attack recognition as described in the following sections. All attack
recognition types are disabled by default, and must be enabled to be activated.
To enable or disable attack recognition
1
In the Control Center, click
Policie
s >
Attacks
.
2
Check the box next to each attack type that you want to enable or disable, or
check the box next to Attacks to select all attack types.
3
Click
Enable
to enable the checked attack types, or click
Disable
to disable
the checked attack types.
To configure directory harvest, spam, and virus attack recognition
1
In the Control Center, click
Policie
s >
Attacks
.
2
Click
Directory Harvest Attack
,
Spam Attack
, or
Virus Attack
.
Directory harvest
attacks
Spammers employ directory harvest attacks to find valid
email addresses at the target site. A directory harvest
attack works by sending a large quantity of possible email
addresses to a site. An unprotected mail server will simply
reject messages sent to invalid addresses, so spammers can
tell which email addresses are valid by checking the
rejected messages against the original list. By default,
connections received from violating senders are deferred.
Spam attack
A specified quantity of spam messages has been received
from a particular IP address. By default, connections
received from violating senders are deferred.
Virus attack
A specified quantity of infected messages has been received
from a particular IP address. By default, connections
received from violating senders are deferred.