11.07.2015 Views

Titus and Cisco IronPort Integration Guide Improving Outbound and ...

Titus and Cisco IronPort Integration Guide Improving Outbound and ...

Titus and Cisco IronPort Integration Guide Improving Outbound and ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Information in this document is subject to change without notice. Complying with all applicable copyright laws is theresponsibility of the user. No part of this document may be reproduced or transmitted in any form or by any means, electronicor mechanical, for any purpose, without the express written consent of <strong>Titus</strong><strong>Titus</strong> may have patent applications, trademarks, copyrights or other intellectual property rights covering subject matter in thisdocument.Copyright 2008-10 <strong>Titus</strong>Image of <strong>Cisco</strong> <strong>IronPort</strong> Email Security Appliance courtesy of <strong>Cisco</strong> Systems, Inc. Unauthorized use not permitted.<strong>IronPort</strong>, the <strong>IronPort</strong> logo <strong>and</strong> SenderBase are registered trademarks of <strong>Cisco</strong> Systems, Inc. or its affiliates.Microsoft Windows, Windows 2000, Windows XP, Windows Server 2003, Microsoft Windows Rights Management Services, <strong>and</strong>Microsoft SharePoint are either registered trademarks or trademarks of Microsoft Corporation in the U.S.A. <strong>and</strong>/or othercountries.At <strong>Titus</strong> we work to help businesses better manage <strong>and</strong> secure valuable corporate information. Our focus is on building policymanagement solutions that make it easier for IT administrators to protect <strong>and</strong> manage corporate correspondence includingemail <strong>and</strong> documents.For further information, contact us at (613) 820-5111 or email us at info@titus.comwww.titus.comwww.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 2


1.0 | AbstractInformation classification is an important foundation for a comprehensive information securitymanagement plan. When information is properly classified it enables organizations <strong>and</strong> the peoplewithin them to more effectively enforce security controls at the same time it simplifies informationsharing through various communication channels, most notably through email.While email has become an indispensable tool of modern communications its use has also been at thecenter of numerous security <strong>and</strong> privacy breaches in government <strong>and</strong> commercial organizations. Inresponse regulatory frameworks <strong>and</strong> organizational best practices for email security controls haveevolved considerably over the past five years, as have the tools that enable them.This paper will focus on email security controls enabled through the use of email <strong>and</strong> documentclassification with a particular focus on technical integration of the <strong>Titus</strong> Message Classification product<strong>and</strong> <strong>IronPort</strong> Email Security Appliance. The use of these two products together enables morecomprehensive security controls while providing the flexibility to ensure productivity is not undulyimpacted. To illustrate how these products can be used together several usage scenarios relevant toemail security controls are described <strong>and</strong> configuration guidance is provided to enable them.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 4


2.0 | What is Classification?Classification is a technique for adding labels or protective markings <strong>and</strong> metadata to email <strong>and</strong>documents. If applied judiciously, it offers an effective strategy for managing <strong>and</strong> controlling email <strong>and</strong>document content.Often referred to as “Classifications” or “Labels” or “Tags”, this information can take many differentforms <strong>and</strong> vary in complexity between businesses, often dependent on the regulatory requirementsbeing imposed upon the industry.In their simplest form they are labels or visual markings found in prominent locations in emails <strong>and</strong>documents to inform the reader to the sensitivity with which the asset should be considered.The most common locations in emails are:• Email Subject (prefix, postfix, abbreviated);• Email Body (prefix, postfix, custom fonts, supports HTML); <strong>and</strong>• Metadata within the MAPI property or SMTP message header (x-header).Figure 1 - Locations for Email Classification InformationThe most common locations in documents are:• Within the document header & footer sections;• As a watermark across the document; <strong>and</strong>• Metadata within the custom properties of the document.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 5


Figure 2 - Locations for Document Classification Informationwww.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 6


3.0 | Business DriversGovernment agencies <strong>and</strong> the military have historically faced higher expectations than otherorganizations in the h<strong>and</strong>ling of information. Governments hold sensitive information in the public trust<strong>and</strong> are ultimately answerable to the public. As such they place stringent safeguards on the h<strong>and</strong>ling <strong>and</strong>safeguarding of that information in the traditional ‘paper’ world <strong>and</strong> have been early adopters ofclassification concepts in the digital world as well.Classifying emails by applying labels <strong>and</strong> metadata presents an obvious opportunity for governments’efforts to manage <strong>and</strong> control electronic communications. Through the use of security procedures <strong>and</strong>server-based content scanning which complement user-based classification, governments can ensurethat private or confidential information is protected from unintended or illegal disclosure, whileensuring citizens’ timely <strong>and</strong> cost effective access to public records <strong>and</strong> personal information under fairdisclosure legislation.Some governments, such as the United State (US), United Kingdom (UK), <strong>and</strong> Australian governments,have specifically required various forms of email classification for their departments.In the US the White House has issued a Memor<strong>and</strong>um called “Designation <strong>and</strong> Sharing of ControlledUnclassified Information” (CUI) that requires Federal Agencies <strong>and</strong> Departments to take action todesignate <strong>and</strong> safeguard information in a consistent way to allow more secure <strong>and</strong> more efficientcollaboration throughout government.In the United Kingdom, the Government Protective Marking Scheme (GPMS) requires that broad classesof government-generated information, including email, be marked with an appropriate security marking<strong>and</strong> h<strong>and</strong>led appropriately. The UK Government Connect Secure Extranet (GCSx) is a programme toprovide secure communications between various departments <strong>and</strong> levels of government within Engl<strong>and</strong><strong>and</strong> Wales. Departments <strong>and</strong> Local Authorities are required to demonstrate compliance with the GCSxCode of Connection (CoCo) requirements, which include labeling email with protective markings.The Australian government has taken a more pointed approach to government email. Amendments tothe Australian Defense Signals Directorate’s Communications Technology Security Manual require thatall email originating in federal agencies carry markings in compliance with its Electronic Mail ProtectiveMarking Policy. These markups establish a maximum-security classification <strong>and</strong> accompanying caveatsfor the message.On a global level there is a growing recognition that organizations outside of government must alsoimplement appropriate information security policies <strong>and</strong> systems. As an example, ISO 27001 is apublished st<strong>and</strong>ard for an Information Security Management System (ISMS) that is intended to bringinformation security under explicit management control. The use of classification <strong>and</strong> labeling on email<strong>and</strong> documents helps organizations become ISO 27001 certified by enabling controls for the h<strong>and</strong>ling<strong>and</strong> management of information.<strong>Titus</strong> has a number of white papers available that go into greater depth regarding specific businessdrivers <strong>and</strong> relevant regulations.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 7


4.0 | Combining Desktop Classification withGateway ControlsThe use of <strong>Titus</strong> Message Classification (TMC) <strong>and</strong> <strong>Titus</strong> Document Classification (TDC) on the desktop isan excellent method of building security awareness. These tools ensure that users creating contentconsider security implications before sharing the information. The visible labels applied to emails <strong>and</strong>documents serve to inform recipients of the sensitivity of the information <strong>and</strong> help them makeappropriate h<strong>and</strong>ling decisions.In a similar way, the classification metadata applied to emails <strong>and</strong> documents can be used by automatedsystems to implement information h<strong>and</strong>ling controls.An excellent example of a system that can provide such controls in combination with the TMC/TDCdesktop tools is the <strong>Cisco</strong> <strong>IronPort</strong> Email Security Appliance series of products. The combineddeployment of these two products enables more effective controls than either used alone.The following table describes some of the capabilities enabled through this combination.CapabilityDescriptionUser BasedClassification /MarkingThe <strong>Titus</strong> Message Classification <strong>and</strong> Document Classification solutions allowthe end user to classify & mark emails <strong>and</strong> documents while they are beingcreated.Automated Marking ofAttachmentsThe use of <strong>Titus</strong> Document Classification on the desktop enables classification<strong>and</strong> marking of documents which can then be appropriately detected <strong>and</strong>controlled as message attachments by <strong>IronPort</strong> filters.Immediate UserFeedback on PolicyViolation<strong>Titus</strong> Message Classification can analyze <strong>and</strong> provide immediate feedback tothe user about sensitive content <strong>and</strong> policy violations before the email is sent.This reduces the number of inappropriate or compromising emails processed<strong>and</strong> streamlines the remediation process by suggesting corrective action thatcan be taken while the email content is still open.Policy Enforcement onInternalCommunicationsBy including <strong>Titus</strong> Message Classification in desktop deployments the solutioncan also enforce policy controls on internal communications which do notpass through the outbound email gateway.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 8


Visual Marking ofInbound MessagesIn many cases inbound content is sensitive or privacy protected <strong>and</strong> shouldbe h<strong>and</strong>led appropriately, but it may not arrive with appropriate markingsor labels. To address these scenarios, <strong>IronPort</strong> message filters canautomatically classify inbound emails which can then be detected <strong>and</strong>visually labeled by Message Classification.Layered approachDeploying policy controls at the desktop (<strong>Titus</strong>) <strong>and</strong> outbound gateway(<strong>IronPort</strong>) in combination increases the flexibility of policies to allow businessto continue as smoothly as possible while reducing the likelihood of dataleakage much more than using either approach exclusively.Control labelling onrepliesUsing TMC as part of the solution enables greater control over contentclassification, for example ensuring replies to a message retain the equivalentor higher classification.Email EncryptionOptionsUsing TMC with <strong>IronPort</strong> adds TLS <strong>and</strong> secure web envelopes (<strong>Cisco</strong> RES) tothe supported methods for automated secure delivery of sensitiveinformation.Advanced MessageRoutingThe <strong>IronPort</strong> appliance can quarantine or intelligently route email throughdifferent networks based on classification applied by Message Classificationat the desktop, <strong>and</strong> on recipient domain or address.Recipient ValidationThe combined solution can enforce controls on external delivery based onuser classification <strong>and</strong> recipient address or domain.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 9


5.0 | Step By Step Demonstration ConfigurationThis document will refer to a simple demonstration configuration to illustrate how <strong>Titus</strong> MessageClassification, <strong>Titus</strong> Document Classification, <strong>and</strong> the <strong>IronPort</strong> Email Security Appliance can interact in atypical environment.The following instructions <strong>and</strong> screen captures show the process of configuring <strong>and</strong> deploying a basiccontent filter on the <strong>IronPort</strong> appliance to detect <strong>and</strong> take action based on the presence of <strong>Titus</strong>message headers (x-titus-classifications-30) in outbound messages. For the purposes of the example theuser has selected a classification of Confidential <strong>and</strong> the action taken is to automatically encrypt theemail prior to delivery.The steps listed below assume a working installation of the <strong>IronPort</strong> appliance appropriately configuredin your environment with inbound <strong>and</strong> outbound mail flows. <strong>IronPort</strong> AsyncOS v7.0.1 was installed onthe appliance used.The instructions also assume that the <strong>Titus</strong> Message Classification is installed <strong>and</strong> a number ofclassification labels are defined, including a ‘Confidential’ label (see Figure 3). <strong>Titus</strong> MessageClassification/Document Classification v3.2.55 was installed on the desktop <strong>and</strong> used with MicrosoftOutlook 2007.Figure 3 - Add a CONFIDENTIAL Classificationwww.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 10


Figure 3 shows the CONFIDENTIAL Classification Control Definition (left side) that has been dragged <strong>and</strong>dropped onto the Outlook Definitions Control Structure (right side) to enable the classification <strong>and</strong>marking used throughout the following example.Step 1 – Create An Outgoing Content FilterFigure 4 - Select Outgoing Content Filters under the Mail Policies menuClick on the Mail Policies menu <strong>and</strong> then on Outgoing Content Filters as shown in Figure 4.Figure 5 - Click on 'Add Filter...'To create the new filter click on Add Filter as shown in Figure 5.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 11


Figure 6 - Name <strong>and</strong> describe the new filter. Click on "Add Condition..."Name the new filter <strong>and</strong> provide a short description of its purpose. Once done, click on Add Conditionas shown in Figure 6.Step 2 – Define the Content Filter ConditionsFigure 7 – Define A Condition For the FilterFrom the Add Condition dialog that appears select the “Other Header” tab <strong>and</strong> enter the Header Nameas "x-titus-classifications-30". Then select “Header value” <strong>and</strong> the operator “Contains” before typing inthe search term “CONFIDENTIAL” as shown in Figure 7.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 12


Step 3 – Create the Corresponding ActionFigure 8 – Adding an Action To the FilterReview the Conditions settings in the filter overview page that follows, <strong>and</strong> then click on Add Action asshown in Figure 8.Figure 9 – Adding an Encrypt on Deliver Action To the Filterwww.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 13


For this example the chosen action to take when a message matches the defined conditions is to deliverthe message using <strong>IronPort</strong> encryption services. As shown in Figure 9, <strong>IronPort</strong> also provides a widerange of other actions Such as Quarantine <strong>and</strong> Strip Attachment.Figure 10 - <strong>IronPort</strong> Email Encryption ConfigurationSetting up an encryption profile using <strong>Cisco</strong>’s hosted Registered Envelope Service(RES) is outside of thescope of this document, but is relatively straightforward. The configuration process is started using theAdd Encryption Profile button on the <strong>IronPort</strong> Email Encryption page found under the Security Servicesmenu item.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 14


Figure 11 – Final Filter SettingsReview the finalized filter settings as shown in Figure 11, click Submit, <strong>and</strong> then Commit Changes.Step 4 – Apply the <strong>Outbound</strong> content filter to the <strong>Outbound</strong> Mail PoliciesFigure 12 - Select Outgoing Mail Policies from under the Mail Policies menuNow that the filter is defined the next step is to add it to an outgoing policy. To begin, select OutgoingMail Policies from under the Mail Policies menu as shown in Figure 12.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 15


Figure 13 - Click on the 'Disabled' link under 'Content Filters' in the ‘Default Policy’ row item.For this exercise the content filter will be added to the pre-defined Default Policy. Content Filters areinitially disabled on this policy, so click on the ‘Disabled’ link to begin changing settings as shown inFigure 13.Figure 14 - Select 'Enable Content Filters (Customize settings)' from the drop down menu.Click on the drop down menu as shown in Figure 14 <strong>and</strong> select ‘Enable Content Filters (Customizesettings)’. Once that selection is made the <strong>Titus</strong>-CONFIDENTIAL filter created earlier will be visible.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 16


Figure 15 – Enabled the <strong>Titus</strong>-CONFIDENTIAL filterClick 'Enable' beside the filter as shown in Figure 15, click Submit, <strong>and</strong> then Commit Changes.Figure 16 - The new policy <strong>and</strong> filter are now enabled.Figure 16 shows the filter enabled as part of the Default Policy. At this point any email sent outside theorganization labeled as confidential will be encrypted prior to delivery.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 17


Figure 17 - Confidential Email Being Forwarded Outside OrganizationFigure 17 shows a sample email classified as confidential <strong>and</strong> addressed to a recipient outside of theinternal domain.Figure 18– Confidential Email Automatically Encrypted For DeliveryFigure 18 shows the encrypted email as it arrives in the external recipient’s mailbox when using <strong>Cisco</strong>RES encryption.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 18


6.0 | Additional Deployment ScenariosOnce the basics of integration between the <strong>Titus</strong> classification solutions <strong>and</strong> <strong>IronPort</strong> are understood itis possible to construct any number of control <strong>and</strong> remediation scenarios. These capabilities can begrouped as preventive, detective, or corrective controls.Automatic encryption of an email based on classification metadata was shown in the previous section.This can be thought of as a preventive control, since information leakage was prevented by automatedencryption of the sensitive information.A few additional example scenarios are described here.6.1 | <strong>Outbound</strong> Sensitive Email, Automatically Quarantined forApprovalThis scenario is very similar to the one described in the previous section, 5.0 | Step By StepDemonstration Configuration. Instead of automatically encrypting the confidential email it will bequarantined for administrator review.Figure 19 - Edit <strong>Titus</strong>-CONFIDENTIAL Filter To Use QuarantineFigure 19 Shows Quarantine selected instead of Encrypt on Delivery while editing the <strong>Titus</strong>-CONFIDENTIAL filter defined in Step By Step Demonstration Configuration. The <strong>IronPort</strong> defaultwww.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 19


installation includes several pre-defined quarantines to hold email until they can be reviewed. Here the‘Policy’ quarantine is used.Figure 20 - <strong>Titus</strong>-CONFIDENTIAL Filter Changed to Use Quarantine ActionFigure 20 shows the modified filter now using a Quarantine action. With this modified filter email foundto have the CONFIDENTIAL classification within the TMC x-header will be held by the <strong>IronPort</strong> applianceuntil an administrator can review it or until a specified amount of time passes.Figure 21 - View of <strong>IronPort</strong> Quarantinewww.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 20


Figure 22 - Viewing Quarantined Message Details <strong>and</strong> Available ActionsThe preceding scenario is a preventative control, since the email was not delivered to the intendedrecipient. An example of a detective control would be to use the duplicate message option in theQuarantine action (see Figure 23) <strong>and</strong> to allow the original message to be delivered. The quarantinedcopy could be used in subsequent investigations if required.Figure 23 - Duplicate Message Option in Quarantine Actionwww.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 21


6.2 | Inbound Sensitive Email, Automatically Tagged at GatewayA number of use cases can be described where it is useful to be able to tag inbound email appropriatelyto ensure proper h<strong>and</strong>ling <strong>and</strong> controls as internal users process <strong>and</strong> share the information.One example is inbound resumes. Whether they are sent to an HR inbox, or directly to employees of thecompany the documents are considered privacy protected documents under many countries’regulations.Adding appropriate header information to the message right at the email gateway seamlessly enablesthe visual privacy protection cues <strong>and</strong> controls made possible with the TMC desktop client.Figure 24 - Simple Filter to Detect Incoming ResumesFigure 24 above shows a basic filter to detect attached resume files in incoming email. The filter wascreated using variations of the steps described above in the Step By Step Demonstration Configurationsection.Condition 1 uses a regular expression to search the message body <strong>and</strong> attachment content for variationsof the words resume or CV (the simple RegEx used here is “[Rr]esume| CV”, without quotes). Condition2 requires that a file attachment is present. Note that both of these conditions must be true for thedefined action to be taken. To do this select “Only if all conditions match” from the drop-down providedbeside “Apply rule:”.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 22


The action taken is to add header information. Here the st<strong>and</strong>ard TMC x-header (x-tituslabsclassifications-30)is added with a value of “Classification=CONFIDENTIAL;Sensitivity=HR;” to indicatethat the information is confidential <strong>and</strong> HR related.Figure 25 - TMC Detects the X-Header Added By <strong>IronPort</strong>Figure 26 - <strong>Titus</strong> X-Header As Applied by <strong>IronPort</strong>Figure 25 shows that the original internal recipient of the email can see that the email is classified asConfidential with HR sensitivity <strong>and</strong> Figure 26 shows the x-header information that was added by the<strong>IronPort</strong> filter.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 23


Figure 27 - Labels Are Applied on Forward or ReplyFigure 27 shows that appropriate labels are applied when the email is shared with other users.6.3 | <strong>Outbound</strong> Uncategorized Email, Automatically Tagged at theGatewayWhere organizational security policy, or the policy of a partner network requires that all email beclassified <strong>and</strong> labeled, appropriate controls should be put in place at the outbound gateway to verify <strong>and</strong>enforce this.The use of TMC on user desktops for classification <strong>and</strong> labeling provides a high degree of coverage butsome internal systems generating automated emails may not apply appropriate labels.As an example of what is possible with <strong>IronPort</strong> filtering the following scenario explores how to detect<strong>and</strong> act on outbound unclassified email during a transition period. A copy of all email withoutappropriate classification headers is sent to a defined email address, but the original email is allowed toproceed. In this way it is possible to identify any sources of unclassified email without impeding the flowof business.In addition to the web-based interface shown previously the <strong>IronPort</strong> AsyncOS provides a powerfulComm<strong>and</strong> Line Interface (CLI). This example will configure <strong>and</strong> apply a message filter to detect <strong>and</strong> acton unclassified messages using the CLI. An SSH client is required to connect <strong>and</strong> login to the <strong>IronPort</strong>appliance, <strong>and</strong> the SSH service must be enabled on at least one IP Interface.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 24


The sample filter acts on email that does not include the <strong>Titus</strong> x-header.Actions taken are:• insert an x-header with a value of UNCLASSIFIED,• insert UNCLASSIFIED at the beginning of the subject line, <strong>and</strong>• send a copy of the message to the “Policy” quarantine.The following is a transcript of an SSH session to add <strong>and</strong> enable the filter through the CLI. Typedcomm<strong>and</strong>s <strong>and</strong> content is in bold.Last login: Mon Aug 30 11:56:45 2010 from 192.168.201.177Copyright (c) 2001-2009, <strong>IronPort</strong> Systems, Inc.AsyncOS 7.0 for <strong>IronPort</strong> C160 build 102Welcome to the <strong>IronPort</strong> C160 Messaging Gateway(tm) Applianceironport.tlmcdc.com>ironport.tlmcdc.com> filtersChoose the operation you want to perform:- NEW - Create a new filter.- IMPORT - Import a filter script from a file.[]> newEnter filter script. Enter '.' on its own line to end.No_Classification_Headers:if(NOT header("x-tituslabs-classifications-30")) {insert-header("x-tituslabs-classifications-30","UNCLASSIFIED");edit-header-text ("Subject","^\\s*","[UNCLASSIFIED] ");duplicate-quarantine("Policy");}.1 filters added.Choose the operation you want to perform:- NEW - Create a new filter.- DELETE - Remove a filter.- IMPORT - Import a filter script from a file.- EXPORT - Export filters to a file- MOVE - Move a filter to a different position.- SET - Set a filter attribute.- LIST - List the filters.- DETAIL - Get detailed information on the filters.- LOGCONFIG - Configure log subscriptions used by filters.- ROLLOVERNOW - Roll over a filter log file.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 25


[]>ironport.tlmcdc.com> commitPlease enter some comments describing your changes:[]> Added No Classification Header filterChanges committed: Mon Aug 30 12:44:03 2010 EDTironport.tlmcdc.com>Figure 28 - Unclassified Email In QuarantineFigure 28 shows an email that has triggered the message filter <strong>and</strong> has been copied to the Policyquarantine. Note that the subject line <strong>and</strong> header modifications defined in the filter were done prior tosending the message copy to the quarantine.www.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 26


7.0 | SummaryThe scenarios discussed in this paper covered a few simple use cases to illustrate how <strong>Titus</strong>’ MessageClassification <strong>and</strong> <strong>Cisco</strong>’s <strong>IronPort</strong> Email Security Appliance can be used together to enable bettersecurity controls on outbound <strong>and</strong> inbound email.Information security management is not one size fits all. Whether you are complying with governmentregulations <strong>and</strong> directives or protecting sensitive commercial information, <strong>Titus</strong>’ Message Classification<strong>and</strong> <strong>Cisco</strong>’s <strong>IronPort</strong> Email Security are a powerful combination, providing the tools <strong>and</strong> flexibility youneed to implement suitable controls in your environment.To learn how <strong>Titus</strong> can help your organization promote better security, please visitwww.titus.com<strong>Titus</strong>343 Preston Street, Suite 800, Ottawa, ON, Canada.Call us: (613) 820-5111 ext.127Toll Free 1-866-530-5111or email us: info@titus.comwww.titus.com <strong>Titus</strong> <strong>and</strong> <strong>Cisco</strong> <strong>IronPort</strong> <strong>Integration</strong> <strong>Guide</strong> | 27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!