Symantec 10744983 Administration Guide - Page 18

Functional overview, Each Symantec Mail Security host can be deployed in the following ways

Page 18 highlights

18 About Symantec Mail Security Functional overview Functional overview You can deploy Symantec Mail Security in different configurations to best suit the size of your network and your email processing needs. Each Symantec Mail Security host can be deployed in the following ways: Scanner Deployed as a Scanner, a Symantec Mail Security host filters email for viruses, spam, and noncompliant messages. You can deploy Scanners on exisiting email or groupware server(s). Control Center Deployed as a Control Center, a Symantec Mail Security host allows you to configure and manage email filtering, SMTP routing, system settings, and all other functions from a Web-based interface. Multiple Scanners can be configured and monitored from your enterprise-wide deployment of Symantec Mail Security, but only one Control Center can be deployed to administer all the Scanner hosts. The Control Center provides information on the status of all Symantec Mail Security hosts in your system, including system logs and extensive customizable reports. Use the Control Center to configure both system-wide and host-specific details. The Control Center provides the Setup Wizard, for initial configuration of all Symantec Mail Security instances at your site, and also the Add Scanner Wizard, for adding new Scanners. The Control Centrer also hosts the Spam and Suspect Virus Quarantines to isolate and store spam and virus messages, respectively. End users can view their quarantined spam messages and set their preferences for language filtering and blocked and allowed senders. Alternatively, you can configure Spam Quarantine for administrator-only access. Scanner and Control A single Symantec Mail Security host performs both functions. Center Note: Symantec Mail Security provides neither mailbox access for end users nor message storage. It is not intended for use as the only MTA in your email infrastructure.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

Functional overview
You can deploy Symantec Mail Security in different configurations to best suit
the size of your network and your email processing needs.
Each Symantec Mail Security host can be deployed in the following ways:
Deployed as a Scanner, a Symantec Mail Security host filters email
for viruses, spam, and noncompliant messages. You can deploy
Scanners on exisiting email or groupware server(s).
Scanner
Deployed as a Control Center, a Symantec Mail Security host allows
you to configure and manage email filtering, SMTP routing, system
settings, and all other functions from a Web-based interface.
Multiple Scanners can be configured and monitored from your
enterprise-wide deployment of Symantec Mail Security, but only
one Control Center can be deployed to administer all the Scanner
hosts.
The Control Center provides information on the status of all
Symantec Mail Security hosts in your system, including system
logs and extensive customizable reports. Use the Control Center
to configure both system-wide and host-specific details.
The Control Center provides the Setup Wizard, for initial
configuration of all Symantec Mail Security instances at your site,
and also the Add Scanner Wizard, for adding new Scanners.
The Control Centrer also hosts the Spam and Suspect Virus
Quarantines to isolate and store spam and virus messages,
respectively. End users can view their quarantined spam messages
and set their preferences for language filtering and blocked and
allowed senders. Alternatively, you can configure Spam Quarantine
for administrator-only access.
Control Center
A single Symantec Mail Security host performs both functions.
Scanner and Control
Center
Note:
Symantec Mail Security provides neither mailbox access for end users nor
message storage. It is not intended for use as the only MTA in your email
infrastructure.
About Symantec Mail Security
Functional overview
18