Symantec 10744983 Administration Guide - Page 108

Configuring sender groups, Enable, disable, and con attack recognition

Page 108 highlights

108 Configuring email filtering Managing Email Firewall policies Virus attack A specified quantity of infected messages has been received from a particular IP address. By default, connections received from violating senders are deferred. Enable, disable, and configure attack recognition Set up attack recognition as described in the following sections. All attack recognition types are disabled by default, and must be enabled to be activated. To enable or disable attack recognition 1 In the Control Center, click Policies > Attacks. 2 Check the box next to each attack type that you want to enable or disable, or check the box next to Attacks to select all attack types. 3 Click Enable to enable the checked attack types, or click Disable to disable the checked attack types. To configure directory harvest, spam, and virus attack recognition 1 In the Control Center, click Policies > Attacks. 2 Click Directory Harvest Attack, Spam Attack orVirus Attack. 3 Accept the defaults or modify the values under Directory Harvest Attack Configuration. 4 Under Actions, accept the default recommended action Defer SMTP Connection, or change and/ add more actions. 5 Click Save. Configuring sender groups Filtering based on the source of the message, whether it's the sender's domain, email address or mail server IP connection, can be a powerful way to fine-tune filtering at your site.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

A specified quantity of infected messages has been received from
a particular IP address. By default, connections received from
violating senders are deferred.
Virus attack
Enable, disable, and configure attack recognition
Set up attack recognition as described in the following sections. All attack
recognition types are disabled by default, and must be enabled to be activated.
To enable or disable attack recognition
1
In the Control Center, click
Policies > Attacks
.
2
Check the box next to each attack type that you want to enable or disable, or
check the box next to
Attacks
to select all attack types.
3
Click
Enable
to enable the checked attack types, or click
Disable
to disable
the checked attack types.
To configure directory harvest, spam, and virus attack recognition
1
In the Control Center, click
Policies > Attacks
.
2
Click
Directory Harvest Attack, Spam Attack
or
Virus Attack
.
3
Accept the defaults or modify the values under
Directory Harvest Attack
Configuration
.
4
Under
Actions
, accept the default recommended action
Defer SMTP
Connection
, or change and/ add more actions.
5
Click
Save
.
Configuring sender groups
Filtering based on the source of the message, whether it's the sender's domain,
email address or mail server IP connection, can be a powerful way to fine-tune
filtering at your site.
Configuring email filtering
Managing Email Firewall policies
108