Symantec 10744983 Administration Guide - Page 107

Managing Email Firewall policies, Configuring attack recognition

Page 107 highlights

Configuring email filtering 107 Managing Email Firewall policies To set compliance policy order 1 In the Control Center, click Policies > Compliance. 2 Check the box next to a compliance policy. 3 Click Move Up or Move Down. Enabling and disabling compliance policies On the Content Compliance Policies page, the Enabled column indicates one of the following policy statuses: ■ Enabled, indicated by a green check ■ Disabled, indicated by a red x. To enable this policy, check it and click Enable. To enable or disable a compliance policy 1 In the Control Center, click Policies > Compliance. 2 Check the box next to a compliance policy. 3 Click Enable or Disable. Managing Email Firewall policies Symantec Mail Security can detect patterns in incoming messages to thwart certain types of spam and virus attacks. You can block and allow messages based on email addresses, domains, or IP address. Messages can be checked against Open Proxy Senders, Suspected Spammers, and Safe Senders lists maintained by Symantec. Sender authentication provides a way to block forged email. Configuring attack recognition Symantec Mail Security can detect the following types of attacks originating from a single SMTP server (IP address): Directory harvest attacks Spam attack Spammers employ directory harvest attacks to find valid email addresses at the target site. A directory harvest attack works by sending a large quantity of possible email addresses to a site. An unprotected mail server will simply reject messages sent to invalid addresses, so spammers can tell which email addresses are valid by checking the rejected messages against the original list. By default, connections received from violating senders are deferred. A specified quantity of spam messages has been received from a particular IP address. By default, connections received from violating senders are deferred.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

To set compliance policy order
1
In the Control Center, click
Policies > Compliance
.
2
Check the box next to a compliance policy.
3
Click
Move Up
or
Move Down
.
Enabling and disabling compliance policies
On the Content Compliance Policies page, the Enabled column indicates one of
the following policy statuses:
Enabled, indicated by a green check
Disabled, indicated by a red x. To enable this policy, check it and click
Enable
.
To enable or disable a compliance policy
1
In the Control Center, click
Policies > Compliance
.
2
Check the box next to a compliance policy.
3
Click
Enable
or
Disable
.
Managing Email Firewall policies
Symantec Mail Security can detect patterns in incoming messages to thwart
certain types of spam and virus attacks. You can block and allow messages based
on email addresses, domains, or IP address. Messages can be checked against Open
Proxy Senders, Suspected Spammers, and Safe Senders lists maintained by
Symantec. Sender authentication provides a way to block forged email.
Configuring attack recognition
Symantec Mail Security can detect the following types of attacks originating from
a single SMTP server (IP address):
Spammers employ directory harvest attacks to find valid email
addresses at the target site. A directory harvest attack works by
sending a large quantity of possible email addresses to a site. An
unprotected mail server will simply reject messages sent to invalid
addresses, so spammers can tell which email addresses are valid
by checking the rejected messages against the original list. By
default, connections received from violating senders are deferred.
Directory harvest
attacks
A specified quantity of spam messages has been received from a
particular IP address. By default, connections received from
violating senders are deferred.
Spam attack
107
Configuring email filtering
Managing Email Firewall policies