This document contains information that is
proprietary and confidential to McAfee. No
part of this document may be reproduced,
stored in a retrieval system, or transmitted, in
any form or by any means (electronic,
mechanical, photocopying, recording, or otherwise) without prior written permission
from McAfee. All copies of this document
are the sole property of McAfee and must be
returned promptly upon request.
McAfee, Inc.
9781 South Meridian Blvd., Suite 400
Englewood, CO 80112 USA
Direct +1 720-895-5700
Fax +1 720-895-5757
November 2012Proprietary: Not for use or disclosure outside McAfee without written permission2
November 2012Proprietary: Not for use or disclosure outside McAfee without written permissionviii
Email Protection Administrator GuideDifferences in Administration for Service
1. Overview
McAfee® Saas Email Protection provides security services that safeguard corporations
from unsolicited spam email (junk mail), viruses, worms, and unwanted content at the
network perimeter before they can enter the internal network.
Multiple layers of McAfee Saas Email Protection provide secure and complete email
filtering to protect your users. You can enable or disable specific layers by changing the
licensed packages of features and/or through configuring the specific email policies in the
Control Console, the comprehensive graphical interface into McAfee Saas Email
Protection.
This document describes the tasks necessary to configure and maintain your McAfee Saas
Email Protection.
Differences in Administration for
Service Providers
This document is for use by Enterprise customers only. Service Provider customers do not
administer groups for Email Protection and therefore, do not assign groups to email
filtering policies. Instead, Service Provider customers assign policies directly to domains.
The capabilities for managing policies and groups, as described in this document, apply
only to Enterprise customers.
Account Management Necessary for
Email Protection
Account Management is a set of administrative windows you use to configure and manage
the entities that use or are affected by Email Protection (Email Protection), as well as the
Web Protection Service (WDS) and Message Archiving products. These entities include:
•Domains
•Users
•Other administrators, including other Customer Administrators, Domain
Administrators, Quarantine Managers, and Reports Managers
In addition, for Email Protection only, you use Account Management to administer groups
of users that share a common email filtering policy.
For more information, see Account Management Administrator Guide.
November 2012Proprietary: Not for use or disclosure outside McAfee without written permission1
Auto-creation of UsersEmail Protection Administrator Guide
MX Record Validation
You can validate that the MX Records that are configured for your domain are properly
redirected by entering the specific DNS and/or IP address for your MTA server. The
Control Console displays the MX Record configuration as reported by the authoritative
DNS server.
See Check Your MX Record.
Alias Domain Names
You can configure alias domain names that act as virtual domains using the configurations
and email addresses defined in the primary Domain name. Email addresses are created
automatically for alias domains (for example, jsmith@yourcompanyalias.com is
automatically created for jsmith@yourcompany.com), allowing the single user to receive
email for both addresses.
For more information, see Account Management Administrator Guide.
Auto-creation of Users
The Email Protection automatically creates new user accounts if all the following is true:
•SMTP Discovery is enabled. SMTP Discovery, which is enabled by default, is a
convenient way to add users to your service. However, this capability might also add
users who are not real users at your company and not add users who are real.
•SMTP discovery creates users that receive eight valid emails within a 24 hour period.
•A user account does not exist for the email address in the designated Domain.
•The emails were not addressed to an alias domain name.
For more information, see Set up User Creation Mode — SMTP Discovery or Explicit.
Email Filtering Policies
Email Protection has default inbound and outbound mail filters to block and clean
malicious email and to quarantine email that might be malicious. The filters are
configured by using policies, which are the parameters for the filters default policies are
automatically assigned to each of your domains.
You can customize the default inbound policy for any and each domain, or any and each
group, to fit your business Email Protection.
For more information, see Customize Inbound Mail Filters.
2Proprietary: Not for use or disclosure outside McAfee without written permission.November 2012
Email Protection can filter both inbound and outbound email. Inbound filtering that is
available to be configured is as follows:
•Anti-Spam Filtering
•Real-time Blackhole List
•Anti-Virus Filter
•Content Filtering and ClickProtect
•Attachment Filtering
•Multi-Level Allow and Deny Lists
Anti-Spam Filtering
Spam is usually defined as unsolicited (and usually unwanted) and commercial email sent
to a large number of addresses. However, what one recipient may consider as spam,
another recipient would consider as legitimate email.
In addition, spam has become a tool of hackers and electronic terrorists who deliberately
attempt to gather proprietary information from computer systems and/or attempt to cause
harm to a company’s email system. Typically, these types of spammers deliberately use
naming standards, hijacked From: addresses, scrambled content, etc., to bypass spam
filters such as blacklists and keyword lists.
Using Stacked Classification Framework®, Email Protection provides the most
comprehensive and effective spam-blocking product on the market today—blocking 98%
of spam and providing an industry-leading low false positive rate (legitimate email
marked as spam).
The Stacked Classification Framework aggregates the most effective spam filters and
techniques in the industry into a spam likelihood. As appropriate, email is assigned a high
or medium likelihood of being spam. A separate email action can be assigned to each
likelihood.
The spam classification techniques include the following:
Spam FilterTypeDescription
IP Reputation
Connection Manager
Bayesian Statistical
Filtering
This filter operates at the front of the Stacked Classification
Framework. It rates the reputation of every incoming email, based
on IP reputation data collected by your Email Protection provider
on an on-going basis. Connections are dropped for all messages
which originate from IP addresses that are determined to carry a
reputation for sending spam.
Statistical algorithms built by your Email Protection provider
identify and quantify the possibility that an email is spam based on
how often elements in that email have appeared in identified spam
emails.
November 2012Proprietary: Not for use or disclosure outside McAfee without written permission3
Industry HeuristicsEmail Protection incorporates thousands of successful industry-
wide spam-fighting rules to recognize characteristics of spam.
Proprietary HeuristicsEmail Protection experts write and update thousands of proprietary
rules to block spam, including fraudulent phishing spam, using
real-time data from your service provider’s Threat Center.
URL FilteringURL filtering works by comparing embedded links found in emails
with URLs associated with identified spam.
Reputation AnalysisEmail Protection constantly monitors inbound email to build a list
of IP addresses and domain names to rate the reputation of the
sender based upon the percentage of spam emails received from
that address in the past.
Reputation-Based RBL
Filtering
Sender Policy
Framework (SPF)
Using up to 31 real-time blackhole lists (RBLs) of known
spammers provided by the industry, Email Protection creates a
single RBL indicator to help gauge the likelihood of an email being
sent by a known spammer. By using multiple black lists to create a
single vote and by rating the reputation of each RBL based on its
accuracy at distinguishing spammers from senders of legitimate
email helps to minimize the possibility of a non-spammer being
blocked by mistake.
The SPF classifier helps identify and block fraudulent spoofing
emails – those sent by spammers with forged “From” addresses –
from entering your email network. For each inbound email, the SPF
classifier will look up the sending domain’s Domain Naming
System (DNS) record and its list of authorized IP addresses.
Emails that carry an IP address not found on the authorized list will
be included within the Stacked Framework Classification System
for the detection of spam. By determining whether or not the
relationship between the DNS record and the IP address is
legitimate, Email Protection is able to more accurately filter out
fraudulent spoofed emails. As a result, Email Protection reduces
risk for users who might be duped by the email into divulging
confidential personal information.
Real-time Blackhole List
The Real-time Blackhole List (RBL) is a system for creating intentional network outages
(blackholes) for the purpose of limiting the transport of known-to-be-unwanted mass
email. The RBL is a database of IP addresses that are reported to be spam sources.
4Proprietary: Not for use or disclosure outside McAfee without written permission.November 2012
Email Protection provides highly effective, organization-wide virus and worm protection.
By identifying viruses and worms at your network perimeter—before they enter or leave
your messaging infrastructure— Email Protection minimizes outbreak and infection risks
to your enterprise messaging infrastructure. You can configure whether infected emails are
quarantined, denied, or stripped of infection.
•Provides maximum protection using multiple, industry-leading anti-virus engines to
allow Email Protection to customize the protection to meet the latest threats.
•Virus definition updates every 5 minutes provide up-to-the-minute defense against the
latest threats.
•Provides safe, external virus scanning and quarantine management for protection
against viruses before they reach your network. Protects your users, networks, and
data from harm
Content Filtering and ClickProtect
Email Protection protects your organization and reduces liability and risk by automatically
identifying unwanted and malicious content before it enters or leaves your network.
You can enable any of the following types of content filtering:
Content Filter TypeDescription
Predefined Content
Keyword Groups
Customized Content
Keyword Groups
Multiple Levels of
HTML Filtering
Graphic Image
Replacement
You can enable or disable predefined content keyword groups
provided by Email Protection:
•Profanity
•Sexual Overtones
•Racially Insensitive
You can define customized content keyword groups containing
terms and phrases to satisfy the business and security Email
Protection of your organization.
You can designate the level of HTML filtering to be used (low,
medium, or high), with predefined actions for each level.
Depending on the level, malicious HTML tags and scripting
options embedded in email are stripped.
You can enable or disable the automatic replacement of images
with a transparent 1x1 pixel GIF within HTML emails.
November 2012Proprietary: Not for use or disclosure outside McAfee without written permission5
Spam beacons and web bugs are typically transparent, 1x1 pixel
graphics embedded in HTML content that send information about
your system to the source (usually a URL) of the spam beacon or
web bug. Typically, web bugs are used on Web sites to monitor
surfing behavior, but now spammers are hiding them in their mass
mailings as spam beacons. If the graphic is not removed before an
email is opened, the spam beacon sends a signal back to the
spammer’s URL that lets the spammer know whether the email
was opened and if the recipient’s email address is valid. If the
spammer gets this signal, the recipient is marked as a valid email
address and is guaranteed to receive more spam in the future.
You can enable or disable the auto
matic stripping of spam beacons
or Web bugs within HTML emails.
Disabling hyperlinks
within email
ClickProtect
with
SM
ClickProtect allows you to monitor and disable or enable whether
Web hyperlinks received in emails can be clicked and followed by
the user. With multiple levels of ClickProtect policy control,
Administrators can customize the desired level of protection. This
feature supports blocking phishing sites and accidental downloads
of viruses and worms.
Attachment Filtering
Email Protection provides you the ability to control the types and sizes of allowed
attachments entering your email network. You can control attachment filtering using any
of the following:
Attachment Filter
Type
Attachment Filtering
File Type
by
Attachment Filtering
Size
by
Custom Attachment
Rules by
Filename
Filtering for Files
ained within a Zip
Cont
File Attachment
Encrypted or “High
Risk” Zip
File
Attachment Rules
Description
You can enable or disable filtering of attachments by file type. File
type is determined using the file extension, MIME content type,
and binary composition.
You can designate a maximum allowed size for each enabled
attachment type.
You can configure custom rules using filenames that override the
global settings for an attachment file type. You can designate that
the rule use the entire filename or any part of the filename.
You can configure custom rules to cause Email Protection to
analyze the files within a zip file attachment, if possible, to
determine if a file in the zip file violates attachment policies. If the
zip file cannot be analyzed, you can designate the email action to
be applied.
You can configure custom rules for emails with encrypted zip files
and/or zip files that are considered high risk (too large, too many
nested levels, etc.).
6Proprietary: Not for use or disclosure outside McAfee without written permission.November 2012
Email Protection allows you to define lists of emails that will always be denied (blacklists)
or will always be accepted (whitelists) at multiple levels. In addition, you can enable thirdparty Real-time Blackhole List to be used to filter unwanted emails.
The administrator-level lists override the user-level lists in a top-down manner: global lists
first, policy set lists next, and lastly user-level lists. For example, if the same address is
added to a user-level Allow list and the policy set Deny list, the address is always denied.
At the same level, the Allow list overrides the Deny list. For example, if you designate a
range of email addresses (for example, by designating an entire domain) in the Deny list,
but then designate a single email address from that domain in the Allow list, the email
from that single address will be always accepted while the email from any other address in
the domain in the Deny list will be always denied.
The same address string cannot be added multiple times in the same list or added to both
the Allow and Deny lists.
Be aware that emails that have been quarantined by Email Protection may not need to be
added to Deny lists because they are already being blocked from entering your email
network.
Following are the types of Allow and Deny lists that are available in Email Protection:
Allow/Deny List
Type
Global Deny ListIf your Email Protection provider determines that a Sending
SMTP has sent too many invalid incoming emails within a
specified time period, it will add the IP address for that Sending
SMTP to a Global Deny List for a designated time period (default
is 2 hours). During the denial period, all emails received from that
Sending SMTP will be automatically denied. This process helps to
protect against dictionary harvest and Denial of Service attacks.
This process can be disabled at the system level.
Policy set-level
Sender Deny Lists
and Sender Allow
Lists
Sender Deny lists indicate sender addresses from which email is
denied automatically. Sender Allow lists indicate sender addresses
from which email is allowed without spam, content, or attachment
filtering (virus filtering is always enabled unless specifically
disabled).
You can designate a single email address, entire domains or IPs, or
use wildcards to designate ranges of addresses. Optionally, you
can save these lists to a spreadsheet file.
Each policy set affects the email filtering for all user accounts in
the groups that are subscribed to that policy set.
Description
November 2012Proprietary: Not for use or disclosure outside McAfee without written permission7
Recipient Shield ListYou can define a list of recipient em
Maintained by you and/or the user, Deny lists indicate sender
addresses from which email is denied automatically. Allow lists
indicate sender addresses from which email is allowed without
spam filtering (all other enabled filtering will be applied).
You can designate a single email address, entire domains or IPs, or
se wildcards to designate ranges of addresses. Optionally, you
u
can save these lists to a spreadsheet file.
These lists affect only the emails received for the designated user
account
want to specify special email actions (for example, you want to
deny all emails for a user who is an ex-employee). You can also
specify the email action to take if the recipient email address is
invalid in your system (permfailed by your email server as an
invalid recipient).
and its alias addresses (user-level lists).
Description
ail addresses for which you
Types of Outbound Email Filtering
You can add outbound filtering to each package, helping to ensure the safety and
appropriateness of information being sent from your corporate email system to valued
customers or business partners.
Filter TypeDescription
Content
Filtering
Attachment
Filtering
Virus
canning
S
This feature automatically prevents inappropriate,
confidential content from leaving your corporate email system,
allowing you to monitor and enforce your corporate email
policies.
Outbound attachments can be filtered by size, by MIME content
type, or by
policies.
Outbound virus scanning stops viruses and worms from leaving
your corporate email system, preventing your enterprise from
being the source of email-borne viruses to customers, suppliers,
and partners.
binary content, according to your corporate email
malicious, or
Configurable Actions for Filtered Email
In Email Protection, email filtering policies control how emails are filtered within a
specific Domain and how Email Protection will respond during email filtering and
reporting. Depending on the feature package that is licensed for a domain, specific email
filters will be available to be enabled and configured. Also, depending on the enabled
email filter, various actions must be configured that define how Email Protection will
respond if an email violates the specific filter policy.
8Proprietary: Not for use or disclosure outside McAfee without written permission.November 2012
Based on the defined policy configuration, each email that violated the specified policy
can have any of the following actions taken, depending on the type of policy:
ActionDescription
QuarantineThe email is added to the respective quara
ntine area and is not sent to
the recipient email address. If the email violated a spam policy, the
email is reported in the user’s Spam Quarantine Report.
TagThe subject line of the email has a descri
ptive phrase (for example,
“[SPAM]”) added to the beginning of the subject text and the email is
sent to the recipient email address.
Deny DeliveryThe email is blocked automatically. Depending on the sending system’s
nfiguration, the email sender may or may not be notified with a 5xx
co
Deny email.
Do Nothing or Allow
elivery
D
The email is forwarded to the recipient email address with no
processing applied. The values in the reports and the
Overview
window will be incremented for the relevant email policy to indicate
that an email did trigger the specific policy.
Silent CopyA copy of the email is forwarded to a list of designated email address
es
with no notification to the sender or recipient.
Strip AttachmentIf the email had an attachment that vi
olated configured policies, this
action causes that attachment to be removed from the email and the
email is be sent to the recipient email address. Text is inserted into the
email notifying the recipient that an attachment has been stripped. Only
the attachment that violated the policy is stripped.
CleanIf the email had an attachment that
contained a virus or worm, this
action attempts to remove the virus or worm and preserve the
attachment. If the clean is successful, text is inserted into the email
notifying the recipient that an attachment had contained a virus and
was cleaned. If this action is selected, a second fall-back action also
must be designated in case the Clean action fails. This action is specific
to the virus filtering policies.
Custom X-HeaderIf the email was determined to have a high or medium likelihood of
Disable FilterA non-administrator user cannot disable virus filtering if it is licensed
November 2012Proprietary: Not for use or disclosure outside McAfee without written permission9
spam, you can configure that a custom X-header be inserted into
being
the email. This X-header can be used by your email servers to perform
additional actions within your network, such as redirecting the email.
Each spam likelihood can have a different custom X-header. This
action is specific to the spam filtering policies.
and enabled
for a specific Domain or policy set. Only Administrators
can enable or disable virus filtering for a specific Domain or policy set.
You can designate that Email Protection first attempts to remove the
from an infected attachment, and if the clean fails, perform
virus
another action. You can designate that only the infected attachment is
stripped. and the remaining email contents and attachments are sent to
the recipient.
You can enable or disable email notifications to the sender and/or recipient email
addresses of email that was filtered because of virus, content keywords, or attachment.
For more information, see one of the following:
•Set Email Protection to Notify Users about Emails with Viruses
•Notify Users about Spam Content
•Notify Users about Attachment Violations
User-level Policy Configurations
By default, policy configurations are defined for each domain and group. All emails
received for all user accounts within a domain or group are processed using the same
policy configurations.
Optionally, user-level policy configurations can be defined for individual users that
override the Domain/Group policies. Thus, if there is a conflict between a user-level
policy and any of the other types of policy configurations, the user-level policy setting will
be used. These user-level policy configurations allow customization of email actions for
each user.
User-level policies are confined to the following policies:
•Enable or disable email processing for spam, virus, content keyword, attachments,
and/or HTML content.
•Specify actions to take for emails if they are determined to have a high or medium
likelihood of being spam.
•Configure the spam quarantine reporting
To manage the policy for an individual user, see User-Level Policy Configuration.
To establish user control of policies, see Set up Spam Quarantine Reports.
User also can have some control over their policies.
Quarantine
Email Protection provides multiple quarantine areas with different security accesses to
store and support review of suspect email outside of your email network.
Emails that violate configured policies and that have the Quarantine action applied are
sorted into multiple quarantines to ease email management and support security levels:
•Spam Quarantined Messages – Accessible to all users, with users with role of User or
Reports Manager allowed to access only their own personal spam quarantine
10Proprietary: Not for use or disclosure outside McAfee without written permission.November 2012
Email Protection Administrator GuideCustomizing the Interface
•Virus Quarantined Messages – Accessible to only Administrators and Quarantine
Managers
•Attachment Quarantined Messages – Accessible to only Administrators and
Quarantine Managers
•Content Keyword Quarantined Messages – Accessible to only Administrators and
Quarantine Managers
Within each quarantine, you can do any of the following:
•Delete selected emails or all emails
•Release selected emails or all emails for delivery to the recipient
•View selected email in a Safe View window
•Add the sender email addresses to the recipients’ user-level Allow list and release the
emails (available only for quarantined spam emails)
Emailed Reports of Quarantined Spam Emails
Optionally, emails are sent to users to indicate that spam emails that have been
quarantined, using either of the following types of emails:
•Spam Quarantine Report
Spam Quarantine Reports are HTML-based email notifications of quarantined spam
emails that sent to users. Multiple links in the Reports allow management of
quarantined spam email based on policy set-level and user-level configurable control
settings. When the user clicks a link, the designated action is performed and the user is
automatically logged into the Control Console.
•Spam Quarantine Summary
Spam Quarantine Summaries are optional text-based email notifications of
quarantined spam email sent to users, to support email applications that are not
HTML-compatible. The user clicks the link provided in the email and is automatically
logged into the Control Console. Once logged in, the user can navigate to the relevant
window to manage the spam quarantine and modify personal settings.
Customizing the Interface
Licensed Branding
There are multiple branding levels that control the appearance and URL addresses used
within the Control Console and Spam Quarantine Reports and Summaries:
•Standard – Branding uses images and addresses provided by your service provider.
•Private – You control the images and addresses.
•Cobrand – Branding uses images provided by you and your service provider., and
addresses provided by you.
•White Label – Branding uses no identifying images and uses addresses provided by
you.
November 2012Proprietary: Not for use or disclosure outside McAfee without written permission11
Customizing the InterfaceEmail Protection Administrator Guide
Branding levels other than Standard must be licensed separately.
For more information, see Rebrand Your User Interface in Account Management Administrator Guide.
Language Localization
Within the Control Console, windows and features available to the non-administrative
user (whose role is User) can be provided in translated form supporting multiple
languages. When the user logs in via the log on window, he or she can select the desired
language in the Language field. Thereafter, all spam quarantine reporting emails and
window and field labels will be provided in the designated language.
The following languages are supported:
•Brazilian Portuguese
•Chinese Simplified
•Chinese Traditional
•Danish
•Dutch
•English
•Finnish
•French
•German
•Italian
•Japanese
•Korean
•Norwegian
•Portuguese
•Russian
•Spanish
•Swedish
•Turkish
This feature is available only to non-administrative user accounts. This feature must be
enabled at the system level to be available.
As a Customer Administrator, you can set the language for a user on the user’s Preferences
window. See Set User Display Preferences, Including Your Own in Account Management Administrator Guide.
Outbound Disclaimer
You can define text that will be appended to the email content to support liability or legal
requirements for your organization. Every email that was sent from your organization to
Email Protection for email filtering will have the designated text added to the end of the
email content. This feature requires that outbound filtering be licensed.
12Proprietary: Not for use or disclosure outside McAfee without written permission.November 2012
Email Protection Administrator GuideMonitoring and Reporting
See Add an Outbound Email Disclaimer.
Notifications
You can customize the content of the notification email for each combination of the type
of filter and each type of email action (quarantine, deny, or strip).
See Define the Format and Text of Notifications to Users.
Monitoring and Reporting
Email Protection provides near-real-time monitoring for most reports of system usage,
email filtering, etc., for the designated Domain and date or date range. Report data is
available to be downloaded to Microsoft Excel spreadsheet file (*.csv).
There are multiple reports available for viewing in the Control Console:
For more information, see System Reports.
Optional Utilities
Your service provider provides additional, free tools that provide additional support for
your email network.
Spam Control for Outlook®
If you receive email that you feel should have been filtered as spam, you can use the Spam
®
Control for Outlook
packages the email data, forwards it to your service provider’s Threat Center, and then
deletes it from your Microsoft Outlook mailbox. This utility only works for the Outlook
mail client.
You can download this utility at the following location:
The Fail Safe Disaster Recovery Service provides protection against lost emails in the case
when your inbound email server (a.k.a. Customer MTA server) may be unavailable to
receive email. If you have multiple inbound servers configured in Email Protection, all of
these servers must be unavailable before Fail Safe is invoked.
When your inbound servers becomes unavailable, Fail Safe begins spooling email, which
means Fail Safe stores your emails in a temporary location until your inbound server
becomes available. Once any of your inbound servers become available, Fail Safe begins
unspooling the emails. That is, Fail Safe restores these stored emails to the inbound server
using the first in, first out order.
The messages Fail Safe stores are not available until the messages have been unspooled.
Fail Safe has an unlimited amount of storage capacity but removes messages that have
been in Fail Safe storage for more than 5 days.
For more information, see Administer Disaster Recovery Services.
Email Continuity
Email Continuity saves messages for later delivery if your mail server becomes
unavailable. When your mail server becomes available, Email Continuity delivers the
messages. Users can access their messages through a Web-based interface while messages
are in Email Continuity only.
Email Continuity also has unlimited storage capacity and removes messages that have
been in Email Continuity storage for more than 60 days.
For more information, see Administer Disaster Recovery Services.
14Proprietary: Not for use or disclosure outside McAfee without written permission.November 2012
Email Protection Administrator GuideWho Can Access Email Protection Admin-
2. Access Email Protection
Administration
As a customer of Email Protection, you can have administrators who access the Control
Console with different levels of privileges within Account Management and Email
Protection.
Who Can Access Email Protection
Administration windows
The levels of administrative users you can add are as follows:
Administrative levelDescription
Reports ManagerThe Reports Manager can view, for an assigned domain, reports
available with Email Protection. The Reports Manager can also
manage his or her own user preferences and all other tasks a user
can perform.
Group AdministratorThe Group Administrator can add and remove members from one
re groups if assigned to those groups. A Group Administrator
or mo
can also create, edit, and modify Email Protection policies for the
assigned groups. Finally, a Group Administrator can view user lists
and user details. A Group Administrator does not need to be a
member of a group in order to have these capabilities.
Note: A Group
edit user information
Quarantine ManagerThe Quarantine Manager, for an assigned domain, can manage the
same areas as
domain, all users’ Quarantine for spam and other problematic
messages, only if Email Protection is enabled.
Domain AdministratorThe Domain Administrator, for an assigned domain, can manage
same areas as a Quarantine Manager, plus manage server setup
the
and authentication rules for the domain.
Customer AdministratorThe Customer Administrator can manage
customer’s Account Management for all domains.
Group AdsministratorThe Group Administrator can, within the Group Administrator’s
assigned
groups if assigned to those groups. A Group Administrator can also
create and modify Email Protection policies for the assigned
groups. A Group Administrator does not need to be a member of a
group in order to have these capabilities.
Administrator cannot add or remove a group nor
a Report Manager, plus manage, for the assigned
all aspects of the
domain, add and remove members from one or more
November 2012Proprietary: Not for use or disclosure outside McAfee without written permission15
Who Can Access Email Protection Administration windowsEmail Protection Administrator Guide
The following figure summarizes the levels of administrators, plus users, in an
Email Protection configuration.
16Proprietary: Not for use or disclosure outside McAfee without written permission.November 2012
NoYe sNoNoYe s
Email Protection Administrator GuideWho Can Access Email Protection Admin-
Window AccessFeature
Enablement
Required
Content: Custom
Content Groups
Content:
Notifications
Content: HTML
Shield
Content: Click
Protect
Attachments: File
Types
Attachments: File
Name Policies
Attachments:
Additional Policies
Attachments:
Additional
Notifications
NoYe sNoNoYe s
NoYe sNoNoYe s
NoYe sNoNoYe s
NoYe sNoNoYe s
NoYe sNoNoYe s
NoYe sNoNoYe s
NoYe sNoNoYe s
Customer
Administrator
Ye sNoNoYe s
Domain
Administrator
Quarantine
Manager
Admnistrator
Group
Allow/Deny:
Sender Allow
Allow/Deny:
Sender Deny
Allow/Deny:
Recipient Shield
Enforced TLS:
Actions
Enforced TLS:
Notifications
Notifications:
Content
Notifications:
Attachment
Group
Subscriptions
Disaster RecoveryYe sNoNoYe s
Quarantine TabNoYe sYe sYesNo
NoYe sNoNoYe s
NoYe sNoNoYe s
NoYe sNoNoYe s
NoYe sNoNoYe s
NoYe sNoNoYe s
NoYe sNoNoYe s
NoYe sNoNoYe s
NoYe sNoNoYe s
SetupTabNo
November 2012Proprietary: Not for use or disclosure outside McAfee without written permission17
Who Can Access Email Protection Administration windowsEmail Protection Administrator Guide
Window AccessFeature
Enablement
Required
Inbound Servers
Setup
Outbound Servers
Setup
Outbound
Disclaimer
Disaster Recovery
Setup
NoYe sYe sNoNo
Ye s.
Depending on
your purchased
package, this
service might
need to be
enabled.
Ye s.
Depending on
your purchased
package, this
service might
need to be
enabled.
Yes. Either
FailSafe or
Email
Continuity
must be
enabled or
included in
your package.
Customer
Administrator
Ye sYe sNoNo
Ye sYe sNoNo
Ye sYe sNoNo
Domain
Administrator
Quarantine
Manager
Admnistrator
Group
MX Records SetupNoYesYe sNoNo
User Creation
Settings
Reports tab
Traffic OverviewNoYe sYe sYe sNo
Threats OverviewNoYe sYe sYe sNo
Threats: VirusesNoYe sYe sYe sNo
Threats: SpamNoYe sYe sYe sNo
Threats: ContentNoYe sYe sYe sNo
Threats:
Attachments
ClickProtect:Over
view
ClickProtect:
Click Log
NoYe sNoNoNo
NoYe sYe sYe sNo
NoYe sYe sYe sNo
NoYe sYe sYe sNo
18Proprietary: Not for use or disclosure outside McAfee without written permission.November 2012
Email Protection Administrator GuideOther Documents You Might Need
Window AccessFeature
Enablement
Customer
Administrator
Domain
Administrator
Quarantine
Manager
Admnistrator
Required
Quarantine:
Release Overview
Quarantine:
Release Log
User ActivityNoYe sYe sYe sNo
Event LogNoYe sYe sYe sNo
Audit TrailNoYe sYe sYesNo
Inbound Server
Connections
Disaster Recovery:
Overview
Disaster Recovery:
Event Log
NoYe sYe sYe sNo
NoYe sYe sYe sNo
NoYe sYe sYe sNo
Yes. Either
FailSafe or
Email
Continuity
must be
enabled.
Yes. Either
FailSafe or
Email
Continuity
must be
enabled.
Ye sYe sYe sNo
Ye sYe sYe sNo
Group
Other Documents You Might Need
Account Management is a self-contained subset of windows you access on the Control
Console. You use it in conjunction with the administration windows for the previouslymentioned products. For information on administering these products, see the online help
in the Control Console or the documentation as listed below.
Email Protection Documents
•Email Protection Concepts Guide
•Email Protection Quick Start
•Intelligent Routing User Guide
•Email Continuity Administrator Quick Start Guide
November 2012Proprietary: Not for use or disclosure outside McAfee without written permission19
Ensure You Can Receive Email from Your Service ProviderEmail Protection Administrator Guide
Web Protection Service Documents
•Web Protection Service Quick Start
•WDS Connector Installation Guide
Message Archiving Documents
•Message Archiving Administrator Guide
•Message Archiving Quick Setup Guide for Microsoft® Exchange® Server 2000
•Message Archiving Quick Setup Guide for Microsoft® Exchange® Server 2003
•Message Archiving Quick Setup Guide for Microsoft® Exchange® Server 2007
User Guides
In addition, a variety of guides for your users are available. These are:
•Email Protection User Guide
•Message Archiving User Guide
•Spam Control for Outlook
•Email Continuity User Quick Start Guide
Ensure You Can Receive Email from
Your Service Provider
If you had or still have a different email security or filtering service and your network is
administered so that you can receive email only from IP addresses associated with that
security service, you must administer your network to allow incoming email from the
Control Console servers. For example, a port in your company’s firewall may need to be
enabled to receive email from the IP addresses of the Control Console servers.
This enablement is necessary in order for you and your users to set the initial password for
access to the Control Console.
Log on to the Control Console
To manage your account, you must log on to the Control Console with the following steps.
Note: The first time you log on, you might need to create your password. If so, see Reset
Your Password from the log on window.
1Open a browser on your computer and enter the URL for the Control Console.
20Proprietary: Not for use or disclosure outside McAfee without written permission.November 2012
Email Protection Administrator GuideLog on to the Control Console
The URL should be identified in the Service Activation Guide you received from your
provisioner. If you don’t have the URL, contact your sales representative or Customer
Support.
2At the Control Console log on window, enter your email address and password.
3Click Sign in.
If you have not previously entered an answer to a security question, the Security
Question window pops up.
The answer to the security question is used is used to validate you, the user, if you
forget your password.
You can later change your security question and/or security answer on the Preferences
window of your user account. See Set User Display Preferences, Including Your Own
in Account Management Administrator Guide.
4Select a security question and type the answer. Your answer is not case-sensitive.
Note: If
from a Spam Quarantine Report.
you also use the Email Protection, you can also log onto the Control Console
Reset Your Password from the log on
window
Note: This capability may not be available if the user authentication method is set to
LDAP, POP3, or IMAP or if the ability to change passwords has been disabled at the
system level.
If you forget your password or want to rese
1On the log on window, click the
The following window is displayed.
t it, perform the following steps:
Forgot your password or need to create a password? link.
2In the Username field, type your email address.
3Do one of the following:
November 2012Proprietary: Not for use or disclosure outside McAfee without written permission21
Log on to the Control ConsoleEmail Protection Administrator Guide
•If your email address is working and you are already receiving email, select
Email password information to me.
•If your email address is not working, select Email password information to my
Domain Contact.
Your Domain Contact might be your administrator or another person your
administrator defined for your domain within the Control Console. Check with
your administrator on who that person is.
4Click Next.
If you selected the option for your email, your email application receives an email
momentarily with further instructions. Continue with Step 5.
If you selected the option to email a Domain Contact, that person receives an email
from which the person can reset your password. The person can also forward the
message to an alternative email address you might have. Contact that person for the
password, then try to log on again. You are finished with this procedure.
5If you selected the option to email information to you, open the email in your email
application. The email subject line says Control Console Sign in Information.
The email is similar to the following:
6Click the link in the email. The link is active for only a limited time after the email is
sent (typically, 60 minutes).
22Proprietary: Not for use or disclosure outside McAfee without written permission.November 2012
Loading...
+ 138 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.