Views
3 years ago

SonicWALL Email Security 4.6 Administrator's Guide

SonicWALL Email Security 4.6 Administrator's Guide

SonicWALL Email Security 4.6 Administrator's

COMPREHENSIVE INTERNET SECURITY SonicWALL Email Security 4.6 Administrator's Guide

  • Page 2 and 3: SonicWALL ® Email Security Adminis
  • Page 4 and 5: Table of Contents Table of Contents
  • Page 6 and 7: Chapter 6: Server Configuration ...
  • Page 8 and 9: Probe Accounts ....................
  • Page 10 and 11: Configuring Microsoft Exchange 5.5
  • Page 12 and 13: Preface SonicWALL’s email threat
  • Page 14 and 15: CHAPTER 1 Planning SonicWALL Email
  • Page 16 and 17: Defining SonicWALL Email Security D
  • Page 18 and 19: Proxy vs. MTA SonicWALL Email Secur
  • Page 20 and 21: SonicWALL Email Security Inside You
  • Page 22 and 23: How to change the SMTP Port on Exch
  • Page 24 and 25: Deploying SonicWALL Email Security
  • Page 26 and 27: Microsoft Outlook and Lotus Notes T
  • Page 28 and 29: CHAPTER 2 Installing SonicWALL Emai
  • Page 30 and 31: SonicWALL Email Security Installati
  • Page 32 and 33: Installing SonicWALL Email Security
  • Page 34 and 35: Installing SonicWALL Email Security
  • Page 36 and 37: CHAPTER 3 Installing SonicWALL Emai
  • Page 38 and 39: SonicWALL Email Security Installati
  • Page 40 and 41: Installing SonicWALL Email Security
  • Page 42 and 43: CHAPTER 4 Installing SonicWALL Emai
  • Page 44 and 45: SonicWALL Email Security Installati
  • Page 46 and 47: Installing SonicWALL Email Security
  • Page 48 and 49: Installing SonicWALL Email Security
  • Page 50 and 51: Installing SonicWALL Email Security
  • Page 52 and 53:

    CHAPTER 5 Getting Started Introduct

  • Page 54 and 55:

    Licensing SonicWALL Email Security

  • Page 56 and 57:

    Licensing SonicWALL Email Security

  • Page 58 and 59:

    Licensing SonicWALL Email Security

  • Page 60 and 61:

    Licensing SonicWALL Email Security

  • Page 62 and 63:

    Configuring Automatic Software Down

  • Page 64 and 65:

    CHAPTER 6 Server Configuration Intr

  • Page 66 and 67:

    Setting Your Network Architecture S

  • Page 68 and 69:

    Setting Your Network Architecture N

  • Page 70 and 71:

    Setting Your Network Architecture 2

  • Page 72 and 73:

    Setting Your Network Architecture A

  • Page 74 and 75:

    Setting Your Network Architecture 2

  • Page 76 and 77:

    Deleting a Remote Analyzer from a S

  • Page 78 and 79:

    LDAP Configuration Configuring LDAP

  • Page 80 and 81:

    LDAP Configuration Note After you c

  • Page 82 and 83:

    LDAP Configuration To configure adv

  • Page 84 and 85:

    Directory Protection Protecting you

  • Page 86 and 87:

    Default Message Management Settings

  • Page 88 and 89:

    Junk Box Summary 9. Email Sent From

  • Page 90 and 91:

    User View Setup 4. Check the Report

  • Page 92 and 93:

    Monitoring Web proxy configuration

  • Page 94 and 95:

    Installing the User Profiler for Mi

  • Page 96 and 97:

    Installing the User Profiler for Ou

  • Page 98 and 99:

    Securing Outlook Profile Communicat

  • Page 100 and 101:

    Configuring Advanced Settings Figur

  • Page 102 and 103:

    CHAPTER 7 Reports and Monitoring Mo

  • Page 104 and 105:

    Reports Dashboard Junk Email Breakd

  • Page 106 and 107:

    Reports Dashboard Figure 7:3 System

  • Page 108 and 109:

    Return on Investment Determining th

  • Page 110 and 111:

    Anti-Phishing Reports Top Spam Reci

  • Page 112 and 113:

    Directory Protection Reports Outbou

  • Page 114 and 115:

    Scheduled Reports Scheduled Reports

  • Page 116 and 117:

    CHAPTER 8 Anti-Spam Techniques Mana

  • Page 118 and 119:

    Spam Identification Note If this ch

  • Page 120 and 121:

    Spam Identification Mailing Lists S

  • Page 122 and 123:

    Spam Identification Configuring Adv

  • Page 124 and 125:

    Spam Identification Publishing Your

  • Page 126 and 127:

    Spam Identification Managing Spam S

  • Page 128 and 129:

    Forwarding Miscategorized Email to

  • Page 130 and 131:

    CHAPTER 9 Anti-Virus Techniques Son

  • Page 132 and 133:

    How Virus Checking Works Table 1 Ac

  • Page 134 and 135:

    Zombie and Spyware Protection Zombi

  • Page 136 and 137:

    CHAPTER 10 Anti-Phishing Techniques

  • Page 138 and 139:

    Preventing Phishing Configuring Phi

  • Page 140 and 141:

    CHAPTER 11 Policy Management SonicW

  • Page 142 and 143:

    Basic Concepts for Policy Managemen

  • Page 144 and 145:

    Basic Concepts for Policy Managemen

  • Page 146 and 147:

    Inbound vs Outbound Policy Policy G

  • Page 148 and 149:

    Inbound vs Outbound Policy Approval

  • Page 150 and 151:

    Inbound vs Outbound Policy Figure 1

  • Page 152 and 153:

    Policy Filters Figure 11:10 Adding

  • Page 154 and 155:

    Policy Filters 6. Click the plus si

  • Page 156 and 157:

    Policy Filters When no additional f

  • Page 158 and 159:

    Managing Filters Changing Filter Or

  • Page 160 and 161:

    Managing Filters Figure 11:13 Advan

  • Page 162 and 163:

    CHAPTER 12 User and Group Managemen

  • Page 164 and 165:

    Resetting User Message Management S

  • Page 166 and 167:

    SonicWALL Email Security Roles Soni

  • Page 168 and 169:

    Setting Spam Blocking Options for L

  • Page 170 and 171:

    Setting Spam Blocking Options for L

  • Page 172 and 173:

    Setting Spam Blocking Options for L

  • Page 174 and 175:

    CHAPTER 13 Junk Box The Junk Box al

  • Page 176 and 177:

    Junk Box - detailed search mode To

  • Page 178 and 179:

    Working with Junk Box Messages Rele

  • Page 180 and 181:

    CHAPTER 14 Troubleshooting SonicWAL

  • Page 182 and 183:

    Problems with Control Center, Remot

  • Page 184 and 185:

    Problems with Configuring SSL and L

  • Page 186 and 187:

    SonicWALL Email Security Server Ale

  • Page 188 and 189:

    Appendix A LDAP This Appendix detai

  • Page 190 and 191:

    Configuring Microsoft Active Direct

  • Page 192 and 193:

    Configuring Microsoft Active Direct

  • Page 194 and 195:

    Configuring Microsoft Active Direct

  • Page 196 and 197:

    Configuring Microsoft Active Direct

  • Page 198 and 199:

    Configuring Microsoft Active Direct

  • Page 200 and 201:

    Appendix B SonicWALL Email Security

  • Page 202 and 203:

    Other TCP Port Usage Figure B:1 Por

  • Page 204 and 205:

    Appendix C Secure Socket Layer This

  • Page 206 and 207:

    Setting up LDAP over SSL (LDAPS) If

  • Page 208 and 209:

    Setting up LDAP over SSL (LDAPS) 6.

  • Page 210 and 211:

    Generating a Self-Signed Certificat

  • Page 212 and 213:

    5. Install the CA certificate in To

  • Page 214 and 215:

    Configuring a Remote Analyzer as a

  • Page 216 and 217:

    Importing New Verisign Certificates

  • Page 218 and 219:

    Appendix D SonicWALL Email Security

  • Page 220 and 221:

    About SonicWALL Email Security Logs

  • Page 222 and 223:

    About SonicWALL Email Security Logs

  • Page 224 and 225:

    Glossary Term All-in-One Architectu

  • Page 226 and 227:

    Term Remote Analyzer Privilege Role

  • Page 228 and 229:

    Index A a record in your internal D

  • Page 230 and 231:

    junk submissions 115 L language of

  • Page 232 and 233:

    mail servers 65 URL for user view i

  • Page 234:

    SonicWALL,Inc. 1143 Borregas Avenue

SonicWALL Global VPN Client 4.6 Administrator's Guide
SonicWALL Global VPN Client 4.1 Administrator's Guide
SonicWALL EX9000 Getting Started Guide - Ingram Micro
The Definitive Guide to Email Management and Security
Trend Micro™ Worry-Free™ Business Security Administration Guide
Avira Managed Email Security (AMES)
Kaspersky Security Center 10.0 Administrator's Guide
Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...
likewise enterprise installation and administration guide - Purple Rage
PBS Pro Administrator Guide - Department of Electrical and ...
Linux Email, 2nd Edition November 2009.pdf
Clearswift SECURE Email Gateway Evaluation Guide
VIPRE Email Security for Exchange Quick Start Guide
SonicOS Enhanced 5.1 Administrator's Guide - RouterShop
Imaging Suite Administrator's Guide_v8.3 - JAMF Software
VIPRE Email Security for Exchange (VPX) Best Practices Guide
HHS - Lesson 9 - Email Security - Hacker Highschool
HHS - Lesson 9 - Email Security - Hacker Highschool
Imaging Suite Administrator's Guide_v8.2 - JAMF Software
Apple Mac OS X Server v10.5 - Open Directory Administration - Mac OS X Server v10.5 - Open Directory Administration
Apple Mac OS X Server v10.3 - Open Directory Administration - Mac OS X Server v10.3 - Open Directory Administration
Enterprise iPhone iPad Administrator's Guide
G etting Started Guide - Netbox Blue
Linux Email, 2nd Edition November 2009.pdf
Apple Mac OS X Server v10.4 - Open Directory Administration - Mac OS X Server v10.4 - Open Directory Administration
Apple Mac OS X Server v10.5 - Open Directory Administration - Mac OS X Server v10.5 - Open Directory Administration