The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH
DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL
NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE
INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE
WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be “commercial computer
software” and “commercial computer software documentation” as defined in FAR
Sections 12.212 and DFARS Section 227.7202.
Symantec Corporation
20330 Stevens Creek Blvd.
Cupertino, CA 95014
http://www.symantec.com
Printed in the United States of America.
10987654321
Technical support
As part of Symantec Security Response, the Symantec global Technical Support
group maintains support centers throughout the world. The Technical Support
group’s primary role is to respond to specific questions on product feature/
function, installation, and configuration, as well as to author content for our
Web-accessible Knowledge Base. The Technical Support group works
collaboratively with the other functional areas within Symantec to answer your
questions in a timely fashion. For example, the Technical Support group works
with Product Engineering as well as Symantec Security Response to provide
Alerting Services and Virus Definition Updates for virus outbreaks and security
alerts.
Symantec technical support offerings include:
■A range of support options that give you the flexibility to select the right
amount of service for any size organization
■Telephone and Web support components that provide rapid response and
up-to-the-minute information
■Upgrade insurance that delivers automatic software upgrade protection
■Content Updates for virus definitions and security signatures that ensure
the highest level of protection
■Global support from Symantec Security Response experts, which is
available 24 hours a day, 7 days a week worldwide in a variety of languages
for those customers enrolled in the Platinum Support Program
■Advanced features, such as the Symantec Alerting Service and Technical
Account Manager role, offer enhanced response and proactive security
support
Please visit our Web site for current information on Support Programs. The
specific features available may vary based on the level of support purchased and
the specific product that you are using.
To receive the latest product information by email, go to:
If the product that you are implementing requires registration and/or a license
key, the fastest and easiest way to register your service is to access the
Symantec licensing and registration site at www.symantec.com/certificate.
Alternatively, you may go to www.symantec.com/techsupp/ent/enterprise.html,
select the product that you wish to register, and from the Product Home Page,
select the Licensing and Registration link.
Contacting Technical Support
Customers with a current support agreement may contact the Technical
Support group via phone or online at http://www.symantec.com/techsupp/
enterprise/ .
Customers with Platinum support agreements may contact Platinum Technical
Support via the Platinum Web site at http://www-secure.symantec.com/
platinum/ .
When contacting the Technical Support group, please have the following:
■Product release level
■Hardware information
■Available memory, disk space, NIC information
■Operating system
■Version and patch level
■Network topology
■Router, gateway, and IP address information
■Problem description
■Error messages/log files
■Troubleshooting performed prior to contacting Symantec
To contact Enterprise Customer Service online, go to www.symantec.com, select
the appropriate Global Site for your country, then choose Service and Support.
Customer Service is available to assist with the following types of issues:
■Questions regarding product licensing or serialization
■Product registration updates such as address or name changes
■General product information (features, language availability, local dealers)
■Latest information on product updates and upgrades
■Information on upgrade insurance and maintenance contracts
■Information on Symantec Value License Program
■Advice on Symantec's technical support options
■Nontechnical presales questions
■Missing or defective CD-ROMs or manuals
Contents
Chapter 1About Symantec Mail Security for SMTP
Key features ..........................................................................................................11
Symantec Mail Security for SMTP offers enterprises an easy-to-deploy,
comprehensive gateway-based email security solution through the following:
■Antispam technology – Symantec’s state-of-the-art spam filters assess and
■Antivirus technology – Virus definitions and engines protect your users
■Content Compliance – These features help administrators enforce corporate
■Group policies and filter policies – An easy-to-use authoring tool lets
classify email as it enters your site.
from email-borne viruses.
email policies, reduce legal liability, and ensure compliance with regulatory
requirements.
administrators create powerful and flexible ad hoc filters for individuals and
groups.
12 About Symantec Mail Security for SMTP
Functional overview
Functional overview
You can deploy Symantec Mail Security for SMTP in different configurations to
best suit the size of your network and your email processing needs.
Each Symantec Mail Security for SMTP host can be deployed in the following
ways:
■Scanner – Deployed as a Scanner, a Symantec Mail Security for SMTP host
filters email. Your installation can have one or many Scanners. Symantec
Mail Security for SMTP runs alongside your existing email or groupware
server(s).
■Control Center – Deployed as a Control Center, a Symantec Mail Security for
SMTP host is a Web-based configuration and administration center. Use it to
configure and manage email filtering, SMTP routing, system settings, and
all other functions. Your enterprise-wide deployment of Symantec Mail
Security for SMTP can have multiple Scanners but only one Control Center,
from which you configure and monitor all the Scanner hosts.
The Control Center provides status for all Symantec Mail Security for SMTP
hosts in your system, system logs, and extensive customizable reporting.
Use it to configure both system-wide and host-specific details.
The Control Center provides the Setup Wizard, for initial configuration of
all Symantec Mail Security for SMTP instances at your site, and also the
Add Scanner Wizard, for adding new Scanners.
It also hosts the Spam and Suspect Virus Quarantines, for storage of spam
and virus messages respectively. End users can access the Control Center to
view their quarantined spam messages and set their preferences for
language filtering and blocked and allowed senders. Alternatively, you can
configure the Spam Quarantine for administrator-only access.
■Scanner and Control Center – A single Symantec Mail Security for SMTP
host performs both functions.
Note: Symantec Mail Security for SMTP provides neither mailbox access for end
users nor message storage; it is not intended for use as the only MTA in your
email infrastructure.
Note: Symantec Mail Security for SMTP does not filter messages that don’t flow
through the SMTP gateway. For example, when two mailboxes reside on the
same MS Exchange Server, or on different MS Exchange Servers within an
Exchange organization, the messages will not pass through the Symantec Mail
Security for SMTP filters.
Architecture
Symantec Mail Security for SMTP processes a mail message as follows. For the
sake of discussion, our sample message passes through the Filtering Engine to
the Transformation Engine without being rejected.
13About Symantec Mail Security for SMTP
Architecture
■The incoming connection arrives at the inbound MTA via TCP/IP.
■The inbound MTA accepts the connection and moves the message to its
inbound queue.
■The Filtering Hub accepts a copy of the message for filtering.
14 About Symantec Mail Security for SMTP
Where to get more information
■The Filtering Hub consults the LDAP SyncService directory to expand the
message’s distribution list.
■The Filtering Engine determines each recipient’s filtering policies.
■The message is checked against Blocked/Allowed Senders Lists defined by
administrators.
■Virus and configurable heuristic filters determine whether the message is
infected.
■Content Compliance filters scan the message for restricted attachment types
or keywords, as defined in configurable dictionaries.
■Spam filters compare message elements with current filters published by
Symantec Security Response to determine whether the message is spam. At
this point, the message may also be checked against end-user defined
Language settings.
■The Transformation Engine performs actions per recipient based on
filtering results and configurable Group Policies.
Where to get more information
In addition to this Administration Guide, your Symantec Mail Security for SMTP
product comes with the following documentation:
■Symantec Mail Security for SMTP Installation Guide
■Symantec Mail Security for SMTP Planning Guide
■Symantec Mail Security for SMTP Getting Started
Symantec Mail Security also includes a comprehensive help system that
contains conceptual and procedural information.
You can visit the Symantec Web site for more information about your product.
The following online resources are available:
Provides access to the technical support Knowledge
Base, newsgroups, contact information, downloads,
and mailing list subscriptions
Provides information about registration, frequently
asked questions, how to respond to error messages,
and how to contact Symantec License Administration
Provides product news and updateswww.enterprisesecurity.
symantec.com
Where to get more information
15About Symantec Mail Security for SMTP
Provides access to the Virus Encyclopedia, which
contains information about all known threats;
information about hoaxes; and access to white papers
about threats
www.symantec.com/
avcenter/global/index.html
16 About Symantec Mail Security for SMTP
Where to get more information
Chapter
Configuring system
settings
System settings apply to the Control Center and to attached and enabled
Scanners. This section explains the following:
■Configuring certificate settings
2
■Configuring host (Scanner) settings
■Testing Scanners
■Configuring LDAP settings
■Replicating data to Scanners
■Configuring Control Center settings
Configuring certificate settings
Manage your certificates using the Certificate Settings page.
The two types of certificates are as follows:
■MTA TLS certificate—This is the TLS certificate used by the MTAs in each
Scanner. Every Scanner has separate MTAs for inbound messages, outbound
messages, and message delivery. Assign this certificate from the Inbound
Mail Settings and Outbound Mail Settings portions of the SMTP tab on the
Settings > Hosts page.
■User interface HTTPS certificate—This is the HTTPS certificate used by the
Control Center for secure Web management. Assign this certificate from the
Settings > Certificates page.
18 Configuring system settings
Configuring certificate settings
You can add certificates to the certificate list in the following two ways:
■Add a self-signed certificate by adding the certificate and filling out the
■Add a Certification Authority Signed certificate by submitting a certificate
Manage certificates
Follow these steps to add either self-signed or Certification Authority Signed
certificates and to assign certificates.
To add a self-signed certificate to the list
1In the Control Center, click Settings > Certificates.
2Click Add.
requested information as presented to you at the time.
request to a Certification Authority. When you receive the certificate back
from the Certification Authority, you then import the certificate into the
Control Center.
3In the Certificate type drop-down list, choose Self-Signed Certificate.
4Complete the information on the Add Certificate page.
5Click Create.
To add a Certification Authority Signed certificate to the list
1In the Control Center, click Settings > Certificates.
2Click Add.
3In the Certificate type drop-down list, choose Certificate Authority Signed.
4Fill in the information on the Add Certificate page.
5Click Request.
A new page is displayed, showing the certificate information in a block of
text, designed for use by the Certification Authority.
6Copy the block of text that appears and submit it to the Certification
Authority.
Each Certification Authority has its own set of procedures for granting
certificates. Consult your Certificate Authority for details.
7When you receive the certificate file from the Certification Authority, place
the file in an easily accessed location on the computer from which you are
connecting to the Control Center.
8On the Certificate Settings page, click Import.
Configuring certificate settings
9On the Import Certificate page, type the full path and filename or click
Browse and choose the file.
10 Click Import.
To view or delete a certificate
1In the Control Center, click Settings > Certificates.
2Check the box next to the certificate to be viewed or deleted.
3Click View to read the certificate.
4Click Delete to remove the certificate.
To assign an MTA TLS certificate
1In the Control Center, click Settings > Hosts.
2Select a host and click Edit.
3Click the SMTP tab.
19Configuring system settings
4Check Accept TLS encryption as appropriate.
5Choose the TLS certificate from the Certificate drop-down list for the
inbound or outbound MTA.
6Click Save.
To assign a user interface HTTPS certificate
1In the Control Center, click Settings > Control Center.
2Select a certificate from the User interface HTTPS certificate drop-down
list.
3Click Save.
20 Configuring system settings
Configuring host (Scanner) settings
Configuring host (Scanner) settings
The following sections describe changes that can be made to individual hosts.
Information is available on these topics:
■Working with the Services page
■HTTP proxies
■SMTP Scanner settings
Working with the Services page
You can stop or start the following services on a Scanner.
■Conduit
■LiveUpdate
■Filter Engine
■MTA
Note: If you stop the filter-hub or the MTA service and wish to continue
receiving alerts, specify an operating MTA IP address in the settings for the
Control Center.
In addition, you can configure individual Scanner replication and MTA settings
that can help you take a Scanner offline on this page.
Work with the services page
Use the following procedures from the Services page to manage individual
Scanner services, replication, and stop the flow of messages through a Scanner.
To start and stop services
1In the Control Center, click Settings > Hosts.
2Check the Scanner to edit.
3Click Edit.
4Select the services to be started or stopped.
5Click Stop to stop a running service or Start to start a stopped service.
To enable or disable Scanner replication for a host
1In the Control Center, click Settings > Hosts.
2Check the Scanner to edit.
Configuring host (Scanner) settings
3Click Edit.
4Using the Scanner Replication portion of the page, check Enable Scanner
Replication for this host to enable Scanner replication. (Replication is
enabled by default.)
5Using the Scanner Replication portion of the page, uncheck Enable Scanner
Replication for this host to disable Scanner replication. The Control Center
will not update the directory for this Scanner when the box is not checked.
6Click Save to store your changes.
To take a Scanner out of service
1In the Control Center, click Settings > Hosts.
2Check the Scanner to edit.
3Click Edit.
4On the MTA Operation portion of the page, check Do not accept incoming
messages.
All messages in Scanner queues are processed as needed, but no new
messages will be received.
21Configuring system settings
HTTP proxies
5Click Save to store your changes.
The Conduit and Symantec LiveUpdate run on each Scanner, and receive filter
updates from Symantec. If you need to add proxy and/or other security settings
to your server definition, use the steps below.
To change or add proxy information
1In the Control Center, click Settings > Hosts.
2Check the Scanner to edit.
3Click Edit.
4Click the Proxy tab.
5Check Use proxy server.
6Specify the proxy host name and port on this panel. In addition to this
information, you can include a user name and password as needed.
7Click Save to store your information.
22 Configuring system settings
Configuring host (Scanner) settings
SMTP Scanner settings
A full complement of SMTP settings has been provided to help you define
internal and external SMTP configurations for Scanners. Inbound SMTP
settings determine how the inbound MTA processes inbound messages.
Outbound SMTP settings determine how the outbound MTA processes outbound
messages. If you set up inbound or outbound SMTP filtering rather than using
Content Compliance filters, you can save resources because messages that do
not meet the SMTP criteria will be rejected before content filtering begins.
To modify SMTP settings for a Scanner
1In the Control Center, click Settings > Hosts.
2Check the Scanner to edit.
3Click Edit.
4Click SMTP.
5As appropriate, complete the SMTP definition for the scanner.
The following parameters are included:
Setting Description
Scanner Role Determines if the Scanner is used for Inbound mail filtering only,
Outbound mail filtering only, or Inbound and outbound mail
filtering.
Setting Description
23Configuring system settings
Configuring host (Scanner) settings
Inbound Mail
Settings
*
Provides settings for inbound messages. In this area, you can provide
the following information:
■Inbound mail IP address— Location at which inbound
messages will be received.
■Inbound mail SMTP port—Port on which inbound mail is
received, typically port 25.
■Accept TLS encryption—Indicates if TLS encryption is
accepted. Check the box to accept encryption. You must have a
certificate defined for MTA TLS certificate in Settings >
Certificates to accept TLS encryption.
■Certificate—Specifies an available certificate for TLS
encryption.
■Accept inbound mail connections from all IP addresses—
Indicates that all connections for inbound messages are
accepted when checked. This is the default.
■Accept inbound mail connections from only the following IP
addresses and domains—Indicates that only the addresses or
domain names entered in the checked IP Address/Domains
box are accepted.
If you specify one or more IP addresses, you must include the IP
address of the Control Center so that Spam Quarantine and
Suspect Virus Quarantine can release messages. After you add
the first entry, the IP address of the Control Center is added
automatically and selected. If you are using a different IP
address for the Control Center, or have the Control Center and
Scanner installed on different machines, you must add the new
IP address and disable the one that was added automatically.
Relay local domain
mail to:
Warning: If you are deploying this Scanner behind a gateway,
and are specifying one or more IP addresses instead of All IP addresses, you must add the IP addresses of ALL upstream
mail servers in use by your organization. Upstream mail
servers that are not specified here may be classified as spam
sources.
Gives the location where inbound mail is sent after being received on
the inbound port.
24 Configuring system settings
Configuring host (Scanner) settings
Setting Description
Outbound Mail
settings
*
Provides settings for outbound mail characteristics. In this area, you
can provide the following information:
■Outbound mail IP address—Specifies the IP address on which
outbound messages are sent.
■Outbound mail SMTP port—Specifies the port on which
outbound mail is sent, typically port 25.
■Accept TLS encryption—Indicates if TLS encryption is
accepted. Check the box to accept encrypted information. You
must have a certificate defined for MTA TLS certificate in
Settings > Certificates to accept TLS encryption.
■Certificate—Specifies an available certificate for TLS
encryption.
■Accept outbound mail connections from the following IP
addresses and domains—Indicates that only the addresses
entered in the checked IP Address/Domains box are accepted.
If you specify one or more IP addresses, you must include the IP
address of the Control Center so that Spam Quarantine and
Suspect Virus Quarantine can release messages. After you add
the first entry, the IP address of the Control Center is added
automatically and selected. If you are using a different IP
address for the Control Center, or have the Control Center and
Scanner installed on different machines, you must add the new
IP address and disable the one that was added automatically.
If you specify one or more IP addresses, you must include the IP
address of the Control Center so that Spam Quarantine and
Suspect Virus Quarantine can release messages. After you add
the first entry, the IP address of the Control Center is added
automatically and selected. If you are using a different IP
address for the Control Center, or have the Control Center and
Scanner installed on different machines, you must add the new
IP address and disable the one that was added automatically.
Relay non-local
mail to:
Apply above
settings to all hosts
Advanced Settings Provides for inbound, outbound and delivery advanced settings. See
(*) Classless InterDomain Routing (CIDR) is supported for inbound and outbound mail
connection IP addresses.
6Click Save to store your changes.
Specifies how outbound SMTP message relaying is routed. By
default, MX Lookup is used.
Indicates that when saved, all settings on this page are applied
immediately to all hosts.
“Advanced SMTP settings” on page 25 for details.
Advanced SMTP settings
Use the MTA Configuration portion of the page to specify the MTA host name.
The MTA Host Name gives you the ability to define the Hello banner during the
initial portion of the SMTP conversation.
Use the following advanced inbound SMTP settings to further define your SMTP
configuration:
Maximum number of
connections from a single
IP address
Maximum message size in
bytes
Maximum number of
recipients per message
Insert RECEIVED header
to inbound messages
Enable reverse DNS
lookup
Sets the maximum number of simultaneous inbound
connections allowed. Additional attempted connections are
rejected. The default is 2,000 connections.
Sets the maximum number of simultaneous inbound
connections allowed from a single IP address. Additional
connections for the same IP address will be rejected. The
default is 20. You can also limit the number of connections
from a single IP address per time period. Click Policies >
Attacks in the Control Center.
Sets the maximum size of a message before it is rejected. The
default is 10,485,760 bytes.
Sets the maximum number of recipients for a message. The
default is 1,024 recipients.
Places a RECEIVED header in the message during inbound
SMTP processing.
Causes the system to perform reverse DNS lookup on the
SMTP client IP addresses to resolve the IP address to a name
when checked. This is the default condition. When
unchecked, reverse DNS lookup is not performed for inbound
messages.
Use the following advanced outbound SMTP settings to define further your
SMTP configuration:
Sets the maximum number of permissible simultaneous outbound
connections. Additional attempted connections are rejected. The
default is 2,000 connections.
Default domain for
sender addresses
with no domain
Insert RECEIVED
header
Strip pre-existing
RECEIVED headers
from outbound
messages
Sets the maximum size allowable for a message before it is
rejected. The default is 10,485,760 bytes.
Indicates the maximum number of recipients permitted to receive
this message. The default is 1,024 recipients.
Sets a default domain when none can be found in the message.
Places a RECEIVED header in the message during outbound SMTP
processing when checked. When unchecked, no RECEIVED header
is inserted during outbound SMTP processing. If Insert RECEIVED
header and Strip RECEIVED headers are both checked, the
outbound SMTP RECEIVED header remains when the message
goes to the delivery queue.
Removes all RECEIVED headers for the message when checked.
When headers are stripped, message looping can occur depending
on the settings of other MTAs. When unchecked, RECEIVED
headers remain in the message during outbound processing. The
RECEIVED header for outbound SMTP processing remains in the
message when Insert a RECEIVED header and Strip pre-existing
RECEIVED headers from outbound messages are checked.
Enable reverse DNS
lookup
Causes the system to perform reverse DNS lookup on the SMTP
client IP addresses to resolve the IP address to a name. when
checked. This is the default condition. When unchecked, reverse
DNS lookup is not allowed for outbound messages.
Settings also exist governing SMTP delivery configuration for your site.
Delivery configuration message settings are as follows:
Maximum number
of external
connections to a
single IP address
Sets the maximum number of simultaneously allowed external
connections. Additional attempted connections are rejected. The
default is 100 connections.
Sets the maximum number of simultaneous connections allowed
to a single IP address. Additional connections to this IP address are
rejected. The default is 50 connections. You can also limit the
number of connections to a single IP address per time period.
Maximum number
of connections to all
internal mail servers
Maximum number
of connections per
single internal mail
server
Minimum retry
interval
Sent message timeout
Message delay time
in queue before
notification
Enable TLS
encryption
Sets the maximum number of connections allowed to all defined
internal mail servers. Any additional connection attempts are
rejected. The default is 100 internal mail server connections.
Sets the maximum number of connections to one internal mail
server. Any additional attempt to make a connection is rejected.
The default is 50 connections.
Sets the smallest interval the SMTP server waits before trying to
deliver a message again. The default is 15 minutes.
Sets the time after which a undelivered message times out and is
rejected from the queue. The default is 5 days.
Sets the time a message waits in the mail queue before notification
of nondelivery is sent. The default is 4 hours.
Allows TLS encryption when checked. If unchecked, TLS
encryption is not performed. By default, TLS encryption is not
enabled.
To set up the SMTP Advanced Configuration
1From the Control Center, click Settings > Hosts.
2Select a Scanner from the displayed list.
3Click Edit.
4Click the SMTP tab.
On this page, you will see some general-purpose settings described in
“SMTP Scanner settings” on page 22.
5Click Advanced Settings.
On this page you will see some advanced Scanner configuration SMTP
settings. These settings are fully described in “Advanced SMTP settings” on
page 25.
6As appropriate, modify the settings explained above.
7Click Save to store your information.
You are returned to the main SMTP configuration page.
8Click Save.
28 Configuring system settings
Testing Scanners
Configuring internal mail hosts
You can add or delete internal mail hosts at your site.
Configure internal mail hosts
Follow these procedures to add or delete internal mail hosts.
To add an internal mail host
1From the Control Center, click Settings > Hosts.
2Check the Scanner you want to configure.
3Click Edit.
4Click the Internal Mail Hosts tab.
5Specify the IP address for an internal mail host.
6Click Add.
7Click Save to store the information.
To delete an internal mail host
1From the Control Center, click Settings > Hosts.
2Check the Scanner you want to configure.
3Click Edit.
4Click the Internal Mail Hosts tab.
5Select an internal mail host.
6Click Delete.
7Click Save to store the information.
Testing Scanners
After adding or editing a Scanner, you can quickly test that the Scanner is
operating and that the Agent is able to make a connection. The Agent is a
component that facilitates communicating configuration information between
the Control Center and each Scanner.
To test a Scanner
1In the Control Center, click Status > Host Details.
2If only one Scanner is attached to your system, you can see a snapshot of
how it is currently functioning.
3If more than one Scanner is attached, select the Scanner you want to test
from the drop-down list.
You will see a snapshot of its current status.
Configuring LDAP settings
The Control Center can optionally use directory information from LDAP servers
at your site for one or both of the following purposes:
■Authentication—LDAP user and password data is used for Quarantine access
authentication and resolving email aliases for quarantined messages. The
Control Center reads user and password data directly from the LDAP server.
■Synchronization—LDAP user and group data is used for group policies,
directory harvest attack recognition, distribution list expansion and
dropping messages for invalid recipients. User and group data is read from
the LDAP server and cached in the Control Center and Scanners, but not
written back to the LDAP server.
29Configuring system settings
Configuring LDAP settings
Symantec Mail Security for SMTP supports the following LDAP directory types:
■Windows 2000 Active Directory
■Windows 2003 Active Directory
■Sun Directory Server 5.2 (formerly known as the iPlanet Directory Server)
■Exchange 5.5
■Lotus Domino LDAP Server 6.5
Note: If you are using version 5.2 of the SunOne LDAP server, you must update
to patch 4 to address some changelog issues that arose in patch 3.
Configure LDAP settings
Follow these procedures to configure LDAP settings.
To add an LDAP server
1In the Control Center, click Settings > LDAP.
2Click Add.
3Complete the necessary fields presented for defining a new LDAP Server.
The values you complete will depend on your choice in the Usage drop-down
list.
4Click Save.
30 Configuring system settings
Configuring LDAP settings
Note: When adding an LDAP server that performs synchronization, you can
replicate data from the Control Center to attached and enabled Scanners with
the Replicate now button. Begin this replication only after initial
synchronization has completed successfully as shown on the Status > LDAP
Synchronization page, and the number of rejected entries is 0 or stays constant
after successive synchronization changes. If synchronization has not completed
successfully, error messages will be shown on the Status > LDAP
Synchronization page. Alternatively, you can wait until the next scheduled
replication occurs at which time all Scanners will be fully updated by the LDAP
synchronization server.
Note: If you see the error during server creation, Failed to create user mappings
for source, and you have recently changed DNS servers, restart your LDAP
synchronization components. Windows users use the Services control panel to
first stop SMS Virtual Directory, then start SMS Sync Server. Dependencies are
automatically restarted. Alternatively, the host can be rebooted. Linux/Solaris
users issue the following command:
/etc/init.d/sms_ldapsync restart
Then, follow the above steps again.
The following table describes the available settings for LDAP authentication and
synchronization services when an LDAP server is being added to the Control
Center
Table 2-4LDAP Server Parameters when adding a server
Item Description
Description Text describing the LDAP server being defined. Permissible
characters are any alphanumeric character (0-9, a-z, and A-Z), a space
( ), hyphen (-), or underline (_) character. Any other symbol will cause
the definition to fail.
Host Host name or IP address.
Port TCP/IP port for the server. The default port is 389.
Directory Type Specifies the type of directory used by the LDAP server. Available
choices are:
■Active Directory
■iPlanet/Sun ONE/Java Directory Server
■Exchange 5.5
■Domino
Configuring LDAP settings
Table 2-4LDAP Server Parameters when adding a server
Item Description
Usage Describes how this LDAP server will be used. Available usage modes
are:
■Authentication
■Synchronization
■Authentication and Synchronization
You can have only one authentication server defined in the Control
Center.
31Configuring system settings
Administrator
Credentials
Windows
Domain Names
(Active Directory
only)
Specifies login and usage information for the LDAP server as follows:
Anonymous bind—Allows you to login to an LDAP server without
providing specific user ID and password information. Before using
anonymous bind, configure your LDAP server to grant anonymous
access to the changelog and base DN. For the Domino Directory Type
using anonymous bind, group and dlist data are not retrieved.
■Name (bind DN)—Login name allowing you to access the LDAP
server.
When entering the Name (bind DN) for an Exchange 5.5 server,
be sure to use the full DN such as
cn=Administrator,cn=Recipients,ou=mysite,o=myorg rather
than a shortened form such as cn=Administrator to ensure
detection of all change events and guarantee full authentication
by the LDAP server.
For an Active Directory server, the full DN or logon name with
User Principal Name suffix can be required.
■Password—Password information that allows you to access the
LDAP server.
■Test Login—Verifies the anonymous bind connection or the user
id and password given for accessing the LDAP server.
Windows domain names you see in the Log on to dropdown list when
logging onto a Windows host. Use commas or semicolons to separate
multiple domain names.
Primary domain
(Domino only)
Domain aliases
(Domino only)
Internet domain to which mail is delivered.
Internet domain names that resolve to the primary domain. For
example, you could assign company.net to be an alias for
company.com. Use commas to separate multiple names.
32 Configuring system settings
Configuring LDAP settings
Table 2-4LDAP Server Parameters when adding a server
Item Description
Authentication
Query Details
Synchronization
Configuration
Contains the following options:
■Autofill—Places default values in the field for you to modify as
needed.
■Query start (Auth base DN)—Designates the point in the
directory from which to start searching for entries to
authenticate. If an entry contains an ampersand, delimit the
ampersand as follows:
OU=Sales \& Marketing,OU=test,DC=domain,DC=com &
OU=test1,DC=domain,DC=com
■Login attribute—Specifies the attribute that identifies a directory
entry representing a person.
■Primary email attribute—Finds users based on the attribute
which represents a mailbox.
■Email alias attribute—Finds users based on the attribute
representing an alternative address for entities’ mailbox.
■Login query—Finds users based on their Login attributes.
■Test—Attempts to execute the query as defined.
Note: For Exchange 5.5, the user directory Name (rdn) must be the
same as the alias (uid) for that user.
Allows for the following definitions governing synchronization
behavior:
■Synchronize every—Specifies how often scheduled
synchronization occurs. You can specify a number of minutes,
hours, or days. The default is 1 day.
■Audit level—Verbosity setting for LDAP audit logs. Choices of Off,
Low, and Verbose are available. The default is Off.
■Page size—Number of discrete changes that are accepted
together for synchronization. Use a number between 1 and
2,000. The default is 25. If you are using the iPlanet/SunOne
directory server, change Page size to 0 for optimal performance.
This section is grayed out if Usage type is Authentication.
Configuring LDAP settings
Table 2-4LDAP Server Parameters when adding a server
Item Description
33Configuring system settings
Synchronization
Query Details
Specifies queries to use for synchronization. Available choices are:
■Autofill—Places default values in the field for you to modify as
needed.
■Query start (Sync base DN)—Designates the point in the
directory from which to start searching for entries with email
addresses/aliases or groups. To use this field, begin by clicking
Auto Fill for the naming contexts of the directory. Reduce the
received list of DN’s brought into the field by Auto Fill to a single
DN, or write your own DN based on the provided list.
■Custom query start—Allows for the addition of a customized
query.
■User query—Finds users in the LDAP server.
■Group query—Finds LDAP groups in the LDAP server.
■Distribution list query—Finds Distribution Lists in the LDAP
Server.
Buttons labelled Test allow you to test each synchronization query
type.
Note: If you need to change Host, Port, base DN, ldap Group filter,
User filter, or Distribution List filter after saving an LDAP
synchronization source, you must delete the source, add the source
including all attributes to be filtered, and perform a full
synchronization.
To edit an LDAP server
1In the Control Center, click Settings > LDAP.
2Choose an LDAP server definition by checking the box next to it.
3Click Edit.
4Make changes as appropriate.
5Click Save.
34 Configuring system settings
Configuring LDAP settings
Table 2-5LDAP Server Parameters when editing a server
Not all parameters are available for editing in an LDAP definition. Only the
following can be changed after an LDAP server has been defined:
Item Description
Administrator
Credentials
Windows
Domain Names
(Active Directory
only)
Specifies login and usage information for the LDAP server as follows:
Anonymous bind—Allows you to login to an LDAP server without
providing specific user ID and password information. Before using
anonymous bind, configure your LDAP server to grant anonymous
access to the changelog and base DN. For the Domino Directory Type
using anonymous bind, group and dlist data are not retrieved.
■Name (bind DN)—Login name allowing you to access the LDAP
server.
When entering the Name (bind DN) for an Exchange 5.5 server,
be sure to use the full DN such as
cn=Administrator,cn=Recipients,ou=mysite,o=myorg rather
than a shortened form such as cn=Administrator to ensure
detection of all change events and guarantee full authentication
by the LDAP server.
For an Active Directory server, the full DN or logon name with
User Principal Name suffix can be required.
■Password—Password information that allows you to access the
LDAP server.
■Test Login—Verifies the anonymous bind connection or the user
id and password given for accessing the LDAP server.
Windows domain names you see in the Log on to dropdown list when
logging onto a Windows host. Use commas or semicolons to separate
multiple domain names.
Primary domain
(Domino only)
Domain aliases
(Domino only)
Internet domain to which mail is delivered.
Internet domain names that resolve to the primary domain. For
example, you could assign company.net to be an alias for
company.com. Use commas to separate multiple names.
Configuring LDAP settings
Table 2-5LDAP Server Parameters when editing a server
Item Description
35Configuring system settings
Authentication
Query Details
Synchronization
Configuration
Contains the following options:
■Autofill—Places default values in the field for you to modify as
needed.
■Query start (Auth base DN)—Designates the point in the
directory from which to start searching for entries to
authenticate.
■Login attribute—Specifies the attribute that identifies a directory
entry representing a person.
■Primary email attribute—Finds users based on the attribute
which represents a mailbox.
■Email alias attribute—Finds users based on the attribute
representing an alternative address for entities’ mailbox.
■Login query—Finds users based on their Login attributes.
■Test—Attempts to execute the query as defined.
Allows for the following definitions governing synchronization
behavior:
■Synchronize every—Specifies how often scheduled
synchronization occurs. You can specify a number of minutes,
hours, or days. The default is 1 day.
■Audit level—Verbosity setting for LDAP audit logs. Choices of Off,
Low, and Verbose are available. The default is Off.
■Page size—Number of discrete changes that are accepted
together for synchronization. Use a number between 1 and
2,000. The default is 25. If you are using the iPlanet/SunOne
directory server, change Page size to 0 for optimal performance.
Editing an LDAP server definition can cause a full synchronization to be
initiated. This can have serious performance impact on your system until
the synchronization completes.
To initiate an LDAP synchronization
1Click Status > LDAP Synchronization.
2If you wish to synchronize fewer than 1,000 changes of LDAP data, click
Synchronize Changes.
3If you wish to synchronize 1,000 changes of LDAP data or more, click Full
Synchronization.
This section is grayed out if Usage type is Authentication.
36 Configuring system settings
Configuring LDAP settings
To cancel an LDAP synchronization in progress
1Click Status > LDAP Synchronization.
2Click Cancel Synchronization.
To delete an LDAP server
1In the Control Center, click Status > LDAP Synchronization.
2Click Settings > LDAP.
3Choose an LDAP server definition by checking the box next to it.
4Click Delete.
Synchronization status information
When LDAP data is synchronized between an LDAP server and the Control
Center, status information is generated and displayed via the Status tab.
Check to be sure that no synchronization is processing. You cannot delete a
synchronization server while synchronization is running.
To view LDAP Synchronization status information
◆In the Control Center, click Status > LDAP Synchronization.
The following information is displayed:
Item Description
StatusInformation about synchronization activity.
Status can be any of the following:
■Idle—Nothing is happening.
■Starting—A synchronization request was issued either by the Control
Center or through a replication request from a Scanner.
■Cancelled—Either the LDAP synchronization was cancelled manually
via clicking Status > LDAP Synchronization > Cancel, or a
replication was in progress when a scheduled or manual LDAP
synchronization was initiated.
■In Progress—A synchronization request has been acknowledged by
the synchronization server and the process is under way.
■Success—The synchronization has completed successfully.
■Failed—The synchronization has failed. Consult your logs to identify
possible causes.
StartedThe time at which the most recent synchronization began.
Ended The time at which the most recent synchronization finished.
Replicating data to Scanners
Item Description
Read The number of directory entries read from the synchronization server. For
a full synchronization, this number is equal to the total number of records
from the LDAP source.
Added The number of directory entries added from the synchronization server to
the Control Center.
Modified The number of records modified in the Control Center based on
synchronization server information.
Deleted The number of entries deleted from the Control Center based on
synchronization server information.
Rejected The number of directory entries from the LDAP server rejected by the
synchronization server.
A number of LDAP transactions can be rejected when an attempt to add a
group entry fails because one or more of the group members is not yet
known to the LDAP synchronization service. Generally, this can be
resolved by issuing a Synchronize Changes request from the Control
Center. Each time this is done, the number of rejected entries should
decrease. Once all group members are propagated, the group entries are
added successfully. If, after a number of LDAP synchronization attempts,
you continue to see the same number of rejected entries for an LDAP
Source, examine the logs at Status > Logs with Control Center: LDAP
selected in the Log Type: drop-down list. Use the information on this page
to determine why the entries are repeatedly rejected. Pay particular
attention to the file error.log.X, where X is a number.
37Configuring system settings
Replicating data to Scanners
After an LDAP server has been defined to the Control Center, and after the
synchronization of LDAP data between the LDAP server and the Control Center
has successfully completed one full cycle, LDAP data can be synchronized to all
attached and enabled Scanners.
LDAP data includes:
■Directory information
■User settings
■Allowed/Blocked Sender settings
■Language settings
For replication to work properly, you must have completed the procedures in
“Configuring, enabling and scheduling Scanner replication” on page 42 and
38 Configuring system settings
Replicating data to Scanners
made certain that Scanner replication is enabled for each Scanner as described
in “Working with the Services page” on page 20.
In this section, information is available on the following:
■Starting and stopping replication
■Replication status information
■Troubleshooting replication
Starting and stopping replication
You may occasionally need to start or stop replication manually.
Start or stop replication
Start and stop replication using the following procedures.
To start a manual replication cycle
1In the Control Center, click Status > Scanner Replication.
2Click Replicate Now.
To stop a replication in progress
1In the Control Center, click Status > Scanner Replication.
2Click Cancel Replication.
Replication status information
When LDAP data is replicated from the Control Center to one or more Scanners,
status information is generated and displayed via the Status interface in
Symantec Mail Security for SMTP.
To view replication status information
◆In the Control Center, click Status > Scanner Replication.
The following information is displayed:
Item Description
StatusStatus can be any of the following:
■Idle—Nothing is happening.
■Started—A replication request has been issued.
■Cancelled—Either the LDAP synchronization was cancelled manually via clicking Status
Synchronization > LDAP > Cancel, or a replication was in progress when a scheduled
or manual LDAP synchronization was initiated.
■In Progress—A replication request has been acknowledged by the Control Center and the
process is under way.
■Success—The replication has completed successfully.
■Failed—The replication has failed. Consult your logs to identify possible causes.
StartedThe time at which the most recent replication began.
Ended The time at which the most recent replication finished.
39Configuring system settings
Replicating data to Scanners
Size The number of bytes of replicated data.
Troubleshooting replication
Replication will not complete until at least one LDAP synchronization source is
available, and synchronization has completed successfully. Until this happens,
there is no data that replication can use to update Scanners.
Troubleshoot replication
The following techniques can help you troubleshoot replication problems.
Basic troubleshooting procedure
1Verify that synchronization has occurred.
2If a successful synchronization has occurred, check your replication status
and take one or more of the actions described below.
To verify that synchronization has completed successfully
1In the Control Center, click Status > LDAP Synchronization.
2Check the Status column for a Success message.
For additional information about synchronization status, see
“Synchronization status information” on page 36.
To check replication status
1In the Control Center, click Status > Scanner Replication.
40 Configuring system settings
Configuring Control Center settings
2Check the Status column for each attached and enabled Scanner on the list.
To troubleshoot a status message
1If the Scanner has a Status of Success, all attached and enabled Scanners are
2If a message is displayed indicating that replication has been cancelled and
For additional information about replication status, see “Replication status
information” on page 38.
fully updated with LDAP information and no action is required.
was not cancelled via Status > Replication and clicking Cancel, an LDAP
synchronization source was found, but either synchronization has not yet
completed, or synchronization has failed.
Check your synchronization status. (See “To check replication status” on
page 39.) Check the Control Center log for errors about creating or moving
synchronization data within the Control Center, or errors regarding
communication between the Control Center and a Scanner. Check LDAP
synchronization logs for any errors that occur in transforming data from the
Control Center database to a Scanner database.
3If you see the message
No scanners configured for replication, make
sure you have successfully added an LDAP synchronization server, that the
initial synchronization service has completed successfully, that you have
enabled global replication via Settings > Replication Settings, and that
replication is enabled on at least one attached and enabled Scanner via the
Replication tab at Settings > Hosts > Edit.
4If the replication process shows the message
long period of time, the replication process has stalled. It is difficult to
predict the length of time a replication can take. As a benchmark, a user
population of 25k users and 5k distribution lists (with nesting levels ranging
from 1-10), can take as much as 7.5 hours on a Dell 1850 running Linux.
To resolve a replication process with a message of In-Progress
◆Perform a manual replication from the Control Center.
If replication still stalls, restart the Control Center software and begin the entire
cycle again with a full synchronization.
Configuring Control Center settings
IN-PROGRESS for an unusually
The Symantec Mail Security for SMTP Control Center allows you to configure
the following:
■Control Center administration
■Control Center certificate
■Configuring, enabling and scheduling Scanner replication
■SMTP host
■System locale
Control Center administration
You access the Control Center via a Web browser. By default anyone with the
correct address and logon information has access from any host. You can choose
to limit host access to the Control Center if you wish. Users attempting to log
into the Control Center from unauthorized computers will see a 403 Forbidden
page in their Web browser. Reverse Domain Name Server (DNS) lookup must be
enabled in your DNS software for this feature to work with host names.
When entering host names, there is a possibility that a name can be entered
incorrectly. If it is the only name on the list, you have effectively blocked
yourself all access to the Control Center. See the procedure below for help
resolving this situation.
41Configuring system settings
Configuring Control Center settings
Specify Control Center access or reset Control Center access
Follow these instructions to specify Control Center access or to regain access to
the Control Center.
To specify Control Center access
1In the Control Center, click Settings > Control Center.
2Check All hosts to allow any host access to the Control Center.
3Check Only the following hosts to assign specific hosts to access the Control
Center.
All other hosts are rejected after you add one or more hosts to the list.
Add and Delete buttons are available to help you manage the list of allowed
hosts.
4To add a host, type host name, IP address, IP address with subnet mask, or
Classless Inter-Domain Routing (CIDR) netblock and click Add.
Specify additional computers or networks as needed.
5Click Save to store the current settings.
To regain access to the Control Center when no host name matches the list
1Log in to the MySQL Control Center.
2Select the Brightmail database.
use brightmail;
42 Configuring system settings
Configuring Control Center settings
3Delete the host control access items from the database.
About specifying host names for Control Center access
When specifying host names for Control Center access, the Control Center
allows clients to connect based on the Control Center’s own DNS perspective. If
the client’s IP address resolves into a name that is allowed (a “reverse lookup”),
then it’s a match and the client is allowed to access the Control Center. The
reverse lookup of an IP address is controlled by the owner of a netblock, not
necessarily a user of that netblock, so users often have no control over what
name their IP addresses resolve to. Also, two different DNS servers may each
have mappings for the same netblock that are not the same. For example, the
client’s authoritative DNS server has a reverse lookup record of
m1.example.com for the client’s IP address, while the DNS that is configured to
be the Control Center’s primary DNS server has a reverse mapping of
dhcp23.example.com for the same IP address. In this case, the Control Center
will see the dhcp23.example.com name whenever the client connects, so that is
the name that should be entered into the host access control list in the Control
Center. This situation happens more frequently on private networks than on the
public Internet.
truncate settings_host_access_control;
Control Center certificate
Through the Control Center, you can designate a user interface HTTPS
certificate. This enhances the security for the Control Center and those logging
into it.
To designate a Control Center certificate
1In the Control Center, click Settings > Control Center.
2Through the User interface HTTPS certificate dropdown list, select the
desired choice.
3Click Save to store the current settings.
Configuring, enabling and scheduling Scanner replication
In the Control Center, replication refers to the process by which LDAP data are
propagated from the Control Center to attached and enabled Scanners.
Replication is controlled by global settings in the Control Center and by locally
configurable settings on each Scanner. The following information will assist you
in configuring and scheduling replication. However, no replication can occur
until you have defined one or more LDAP servers to the Control Center and one
Configuring Control Center settings
full synchronization cycle has completed. For information on setting up LDAP
services, see “Configuring LDAP settings” on page 29.
The replication attributes on the Control Center > Replication Settings page
determine how replication operates in your installation. You can determine if
replication is to take place, and how often it occurs. These are in addition to
settings available on local Scanners attached and enabled through the Control
Center.
To configure Control Center replication settings
1In the Control Center, click Settings > Control Center.
3If Scanner replication is enabled, set the frequency and interval of
replication for Replicate every as follows:
■Frequency—Use this edit box to enter a digit indicating the number of
intervals at which replication occurs.
43Configuring system settings
■Interval—Use the combo box to select the interval of time between
replications. Available choices are hours and days.
The replication schedule should begin at a different time than the
synchronization schedule to avoid schedule conflicts. For instance, if you
have replication set to every 12 hours, setting the LDAP synchronization
schedule to 53 minutes will help prevent one from starting while the other is
in progress.
4Click Replicate Now to have LDAP data replicated to all attached and
enabled Scanners immediately.
5Click Save to store the current settings.
6To verify the most recent replication, click Status > Scanner Replication in
the Control Center.
Note: The replication process will not complete until an LDAP
synchronization source is available.
Local replication settings
Local replication settings for each Scanner are configured by editing the
Scanner configuration. For more information, see “Starting and stopping
replication” on page 38. Additional information is available for checking the
status of Scanner replication and for troubleshooting possible problems with
Scanner replication in “Replicating data to Scanners” on page 37 and
“Troubleshooting replication” on page 39.
44 Configuring system settings
Configuring Control Center settings
SMTP host
The Control Center manages the sending of the following information to
designated email addresses and repositories at your site:
■Alert notifications
■Reports
■Spam Quarantined messages
When the MTA for Symantec Mail Security for SMTP is used, messages that pass
through it will be tracked by the message tracking log facilities in the product.
In order for the Control Center to know where to send information, you must
supply the SMTP host IP address and port.
To specify where the Control Center should send alerts, reports, and
quarantined messages
1In the Control Center, click Settings > Control Center.
System locale
2In the Control Center Settings section of the page, fill in the Host and Port
values for the MTA.
3Click Save to store the current settings.
The Control Center can be configured for single and double-byte character sets
and for related language settings. This is done through the Locale setting.
To configure the Control Center to handle single and double-byte character
sets and related foreign languages
1In the Control Center, click Settings > Control Center.
2Using the dropdown list in the System Locale section of the page, select a
language from the list.
Chapter
Configuring email settings
■Configuring address masquerading
■Configuring aliases
■Configuring local domains
■Understanding spam settings
3
■Configuring virus settings
■Configuring invalid recipient handling
■Configuring scanning settings
Configuring address masquerading
Address masquerading is a method of concealing email addresses or domain
names behind the mail gateway by assigning replacement values to them.
Symantec Mail Security for SMTP lets you implement address masquerading on
inbound mail, outbound mail, or both.
Manage masqueraded entries
Follow these steps to add or edit masqueraded entries.
To add a masqueraded entry
1In the Control Center, click Settings > Address Masquerading.
2Click Add.
3Specify an address or domain to masquerade.
4Specify a new name for the address or domain name.
5Specify a mail flow direction to which this masqueraded name will apply:
inbound, outbound, or both.
46 Configuring email settings
Configuring address masquerading
6Click Save.
To edit a masqueraded entry
1In the Control Center, click Settings > Address Masquerading.
2Click the masqueraded address or domain or check a box, and then click
Edit.
3In the Edit Masqueraded Entry page, modify the masqueraded entry as
desired.
4Click Save.
Importing masqueraded entries
In addition to creating new masqueraded entries, you can import them from a
text file similar to the Sendmail
masquerade address definition on a line by itself. Each address in the file must
be separated with one or more spaces or tabs, or a combination of spaces and
tabs. Commas or semi-colons are not valid delimiters.
virtusertable. In the import file, place each
The masquerade address definition consists of the following:
■Original entry—Specifies the original email address or domain name to be
masqueraded
■Replacement entry—Specifies the replacement email address or domain
name.
■Apply to—Indicates the direction to which masquerading is applied.
Available choices are:
■Inbound messages
■Outbound messages
■Inbound and outbound messages
Following is a sample import file:
orig1@domain.com new1@domain.com inbound
orig2@domain.com new2@domain.com outbound
orig3@domain.com new3@domain.com inbound/outbound
orig4@domain.com new4.com inbound
orig5@domain.com new5.com outbound
orig6@domain.com new6.com inbound/outbound
orig7.com new7@domain.com inbound
orig8.com new8@domain.com outbound
orig9.com new9@domain.com inbound/outbound
To import a list of masqueraded entries
1In the Control Center, click Settings > Address Masquerading.
2Click Import.
3On the Import Masqueraded Entry page, enter or browse to the filename
containing the list of masqueraded entries.
4Click Import.
Note: If entries in the import file are not specified correctly, do not match
the required file format, or are duplicates, a message is displayed. You can
click a link to download a file containing the unprocessed entries. Click
Cancel to return to the main Address Masquerading page to review the valid
imported entries.
Configuring aliases
47Configuring email settings
Configuring aliases
An alias is an email address that translates to one or more other email
addresses. Windows users may understand this concept as a “distribution list.”
You can add an alias as a convenient shortcut for typing a long list of recipients.
An alias can also translate addresses from one top-level domain to another, such
as from example.com to example-internetsecurity.com. Email addressed to
kyi@example.com, for example, would be delivered to kyi@exampleinternetsecurity.com.
Note: The alias functionality available on the Settings > Aliases page is separate
from LDAP aliases.
Note the following additional information about aliases:
■Aliases are recursive. This means that an alias specified in the destination
email address list is expanded as defined in the list of aliases. For example,
with the aliases specified in Table 3-1, a message addressed to
it@example.com would be delivered to the destination addresses for both
it@example.com and ops@example.com, because it@example.com includes
ops@example.com.
■Alias transformation does not occur for messages passing through
Symantec Mail Security for SMTP’s MTA to the Internet. Alias
transformation only applies to inbound or internal messages that pass
through Symantec Mail Security for SMTP’s MTA.
■The system’s inbound MTA checks email addresses in the SMTP envelope
To: to determine if any need to be transformed exists. Transformed
addresses are written back to the SMTP envelope
message
■Inbound address masquerading has precedence over aliases. If the same
To: and Cc: headers are ignored and not changed.
To:. The contents of the
original email address or domain exists in both the address masquerading
list and the aliases list, but the new address or domain is different, the
message is routed to the new address or domain in the address masquerade
list, not the aliases list.
Manage aliases
Follow these steps to add or edit aliases.
To add an alias
1In the Control Center, click Settings > Aliases.
2Click Add.
3In the Add Aliases page, type the alias in the Alias domain or email address
box.
Alias formExamples
Email address—specify one user name and domainkyi@example.com
Domain—specify one domain from which email addresses
should be translated
example.com
4Type a domain or one or more destination email addresses in the Domain or
email addresses for this alias box.
Alias formExamples
Email address—specify user name and
domain for each email address. Separate
multiple email addresses with a comma,
semicolon, or space.
oak@example.com, ops@example.com
Domain—specify one domain to which
email addresses should be translated
symantec-internetsecurity.com
5Click Save.
To edit an alias
1In the Control Center, click Settings > Aliases.
2Click the alias or check the box next to an alias, and then click Edit.
3In the Edit aliases page, modify the text in the Alias domain or email
4Modify the text in the Domain or email addresses for this alias box as
5Click Save.
Importing aliases
Aliases can be imported from a text file. Each address in the text file must be
separated with one or more spaces or tabs, or a combination of spaces and tabs.
Commas or semi-colons are not valid delimiters. In the import file, each line
must contain an alias address followed by one or more destination addresses.
Following is a sample import file:
3On the Import Aliases page, enter or browse to the filename containing the
list of aliases.
4Click Import.
Note: If entries in the import file are not specified correctly, do not match
the required file format, or are duplicates, a message is displayed. You can
click a link to download a file containing the unprocessed entries. Click
Cancel to return to the main Aliases page to review the valid imported
entries.
50 Configuring email settings
Configuring local domains
Configuring local domains
On the Local Domains page, you can view, add, edit, and delete local domain
names and email addresses for which inbound messages are accepted. You can
also import lists of local domains formatted as described in this section.
Work with local domains
Use these procedures to manage local domains.
To add local domains or email addresses
1In the Control Center, click Settings > Local Domains.
2On the Local Domains page, click Add.
3In Domain or email address from which to accept inbound mail, enter a
local domain, subdomain, or email address.
The resulting behavior for each setting is as follows:
SettingSyntaxBehavior
Domain namecompany.comThe system accepts email for all recipients
in the specified domain.
Subdomain.company.comThe system accepts email for all recipients
in all subdomains of the parent domain,
but not in the parent domain.
Email addressuser@company.comThe system accepts email only for the
specified recipient.
You can also specify a destination host to which the domain or email address is
routed via the Optional Destination Host field. You can specify both host name
and port for the destination host as well as enable MX lookup.
Note: If you do not specify a destination host here, the domain or email address
is routed to the Inbound Relay you configure on the SMTP Settings page. See
“SMTP Scanner settings” on page 22.
4Click Save to add the domain, subdomain, or email address.
To delete a local domain
1In the Control Center, click Settings > Local Domains.
2Select a local domain from the list of domains.
3Click Delete.
Importing local domains and email addresses
Lists of local domain definitions and email addresses can be imported from a
US-ASCII file, similar to the Sendmail
each domain definition on a line by itself. The domain definition consists of the
following:
■Domain Name—Can be either a complete domain name, a subdomain name,
or an email address.
■Destination—Consists of destination type and destination host name. Only
definitions with a destination type (Mailer) of SMTP or ESMTP are
supported, and %backreferences are not supported. After import, ESMTP
destination types convert to SMTP. When the host name is enclosed in
brackets—smtp:[destination.domain.com]—MX lookup is not performed for
the destination host.
Here is a sample import file:
mailertable. In the import file, place
51Configuring email settings
Understanding spam settings
local1@domain.com smtp:local1.com
local2@domain.com smtp:local2.com:20
local3@domain.com smtp:[local3.com]:30
local4@domain.com smtp:[local4.com]
.local5.com smtp:[192.168.248.105]
local6.com smtp:[192.168.248.106]:60
To import a list of local domains
1In the Control Center, click Settings > Local Domains.
2Click Import.
3On the Import Local Domains page, enter or browse to the file containing
the list of domain definitions.
4Click Import.
Note: If entries in the import file do not match the required file format, you
can download a file containing the unprocessed entries.
Understanding spam settings
The following types of spam settings are available in Symantec Mail Security for
SMTP:
■Configuring suspected spam
■Choosing language identification type
52 Configuring email settings
Understanding spam settings
■Software acceleration
Configuring suspected spam
Note: This feature is only available if you are running Symantec Premium
AntiSpam (SPA). If you would like to know more about this feature, contact your
Symantec representative.
When evaluating whether messages are spam, Symantec Mail Security for SMTP
calculates a spam score from 1 to 100 for each message, based on techniques
such as pattern matching and heuristic analysis. If an email scores in the range
of 90 to 100 after being filtered by Symantec Mail Security for SMTP, it is
defined as spam.
For more aggressive filtering, you can optionally define a discrete range of
scores from 25 to 89. The messages that score within this range will be
considered “suspected spam.” Unlike spam, which is determined by Symantec
and not subject to adjustment by administrators, you can adjust the trigger for
suspected spam. Using policies, you can specify different actions for messages
identified as suspected spam and messages identified as spam by Symantec.
For example, assume that you have configured your suspected spam scoring
range to encompass scores from 80 through 89. If an incoming message receives
a spam score of 83, Symantec Mail Security for SMTP will consider this message
to be suspected spam, and will apply the action you have in place for suspected
spam messages, such as Modify the Message (tagging the subject line). Messages
that score 90 or above will not be affected by the suspected spam scoring setting,
and will be subject to the action you have in place for spam messages, such as
Quarantine the Message.
Note: Symantec recommends that you not adjust the spam threshold until you
have some exposure into the filtering patterns at your site. Then, gradually
move the threshold setting down 1 to 5 points per week until the number of false
positives is at the highest level acceptable to you. A great way to test the effects
of spam scoring is to set up a designated mailbox or user to receive false positive
notifications to monitor the effects of changing the spam score threshold.
Choosing language identification type
Language identification is the ability to block or allow messages written in a
specified language. For example, you can choose to only allow English and
Spanish messages, or block messages in English and Spanish and allow
messages in all other languages.
You can use one of two types of language identification:
■Language identification offered by Symantec Mail Security for SMTP
Processing takes place within the software, and no further software needs
to be installed. Using the Policies > Group Policies > Edit > Language tab,
administrators can set language preferences or allow users to set language
preferences.
■Language identification offered by the Symantec Outlook Spam Plug-in
Processing takes place on each user’s computer, and each user must install
the Symantec Outlook Spam Plug-in. Users set their own language
preferences.
Software acceleration
53Configuring email settings
Understanding spam settings
It is possible to increase the speed at which your software can operate. Doing so
will increase your need for system memory. Software acceleration is turned on
by default.
Configuring spam settings
You can use the Spam Settings page to configure settings for suspected spam,
language identification, and software acceleration.
To configure spam settings:
1In the Control Center, click Settings > Spam.
2Under Do you want messages to be flagged as suspected spam?, click Ye s .
3Click and drag the slider to increase or decrease the lower limit of the range
for suspected spam. You can also type a value in the box.
4Under Do you want to enable Language Identification, click Yes or No.
Ye sClick Ye s if users will use the Symantec Outlook Spam Plug-in for
language identification. Built-in language identification is disabled,
and can’t be accessed in the Edit Group page.
NoClick No to use the built-in language identification. Symantec
Outlook Spam Plug-in language identification won’t work if you click
No.
54 Configuring email settings
Configuring virus settings
6Click Save.
Configuring virus settings
The following types of virus settings are available in Symantec Mail Security for
SMTP:
■Configuring LiveUpdate
■Excluding files from virus scanning
■Configuring general settings
Configuring LiveUpdate
LiveUpdate is the process by which your system receives current virus
definitions from Symantec Security Response.
Work with LiveUpdate
Follow these procedures to view LiveUpdate status, start LiveUpdate, and
schedule LiveUpdate to run automatically.
To view L i veUpda t e statu s
1Click Settings > Virus.
The top portion of the LiveUpdate tab shows the time of the last update
attempt, its status, and the update version number.
2Click View Manifest to view a complete list of virus definitions contained in
this update.
To initiate a LiveUpdate
1Click Settings > Virus.
2Click LiveUpdate.
3Click the LiveUpdate Now button.
To set the LiveUpdate schedule
1Click Settings > Virus.
2Click LiveUpdate.
3To discontinue using an automatic update schedule, click the Disable
automatic updates button.
4To implement scheduled automatic updates, click the Enable scheduled
updates button.
Configuring virus settings
5Specify a day or days of the week and time at which to begin LiveUpdates.
6Specify an interval of time after which LiveUpdate runs again.
Configuring Rapid Response updates
Rapid Response updates retrieve the very latest virus definitions from Symantec
Security Response. While Rapid Response definitions are published more
frequently (every 10 minutes) than automatic update definitions, they are not as
thoroughly tested.
To receive Rapid Response updates
1Click Settings > Virus.
2Click LiveUpdate.
3Click Enable Rapid Response updates.
Symantec Mail Security for SMTP checks every 10 minutes after this setting
is saved.
55Configuring email settings
4Click Save.
Installing non-default definitions
Symantec Mail Security for SMTP employs the Intelligent Updater in order to
update virus definitions. You can also update antivirus files with any other
Symantec definitions downloaded to the computer running Symantec Mail
Security for SMTP.
To enable installation of non-default definitions:
◆Click the box, Check for and install non-default definitions.
Excluding files from virus scanning
You can exclude specific classes and formats of files (such as .wav or MIDI) from
being scanned by Symantec Mail Security for SMTP.
To exclude a class and format of file from virus scanning
1Click Settings > Virus .
2Click Exclude Scanning.
3Click Add to create a definition of files for exclusion from virus scanning.
4Name the definition by placing a value in Exclude scanning list name.
5In the File Classes list, choose All File Classes or a specific class such as
Sound.
56 Configuring email settings
Configuring invalid recipient handling
6If you choose to exclude specific file classes, you can also select the types of
files in that class to be excluded in the File Type list.
7Click the Add File Classes or Add File Types button.
8Click Save to store a list.
Configuring general settings
The Bloodhound level determines the way in which the system uses heuristics to
flag viruses. Symantec Mail Security uses Symantec Bloodhound™ heuristics
technology to scan for threats for which no known definitions exist. Bloodhound
heuristics technology scans for unusual behaviors, such as self-replication, to
target potentially infected message bodies and attachments. Bloodhound
technology is capable of detecting upwards of 80 percent of new and unknown
executable file threats. Bloodhound-Macro technology detects and repairs over
90 percent of new and unknown macro viruses.
Bloodhound requires minimal overhead because it examines only message
bodies and attachments that meet stringent prerequisites. In most cases,
Bloodhound can determine in microseconds whether a message or attachment is
likely to be infected. If it determines that a file is not likely to be infected, it
moves to the next file.
Lower heuristic levels may miss viruses, but consume less processing power,
potentially speeding incoming mail processing. Higher heuristic levels may
catch more viruses, but consume more processing power, potentially slowing
incoming mail processing.
To set the Bloodhound Level
1Click Settings > Virus .
2Under Bloodhound Level, click the High, Medium, Low, or Off button.
3Click Save.
Configuring invalid recipient handling
By default, when an email message arrives addressed to your domain, but is not
addressed to a valid user, Symantec Mail Security for SMTP passes the message
to the internal mail server. The internal mail server may either accept the
message and generate a bounce message for that recipient, or the internal mail
server may reject the recipient, in which case Symantec Mail Security for SMTP
generates a bounce message for the recipient. Upon receiving the bounce
message, the sender can resend the original message with the correct address.
Configuring scanning settings
However, messages with invalid recipients can also result from a spammer’s
directory harvest attack.
You can drop all messages for invalid recipients using the Drop messages for
invalid recipients action described below. There is a Remove invalid recipients
action available on the Policies > Attacks > Directory Harvest Attack page that
only removes invalid recipients if a directory harvest attack is occurring. These
two settings can be combined or enabled individually.
Note: Dropping messages for invalid recipients is an extreme measure. Enabling
it may prevent diagnosis of serious problems with your email configuration, so
only enable it after you’re sure your email system is stable. Also, if enabled, even
accidentally mis-addressed messages will be dropped, and no bounce message
sent. The Remove invalid recipients action available on the Policies > Attacks >
Directory Harvest Attack page is a less extreme measure.
57Configuring email settings
To configure invalid recipient handling
1In the Control Center, click Settings > Invalid Recipients.
2Do one of the following:
■Uncheck Drop messages for invalid recipients to return bounce
messages to the sender for invalid addresses.
■Check Drop messages for invalid recipients to drop invalid messages
from the mail stream and return no bounce messages to the sender. For
this setting to take effect, a full synchronization and replication cycle
must be completed.
This setting is independent of the Directory Harvest Attack Email
Firewall policy, and can be used in conjunction with it.
3Click Save.
Configuring scanning settings
Use the Scanning Settings page to configure container settings and content
filtering settings.
Configuring container settings
When Symantec Mail Security for SMTP processes certain zip files and other
types of compressed files, these files can expand to the point where they deplete
system memory. Such container files are often referred to as “zip bombs.”
Symantec Mail Security for SMTP can handle such situations by automatically
58 Configuring email settings
Configuring scanning settings
sidelining large attachments and cleaning them. There is a presumption that
such a file can be a zip bomb and should not be allowed to deplete system
resources. The file is sidelined for cleaning only because of its size, not because
of any indication that it contains a virus.
You can specify this size threshold and the maximum extraction level that
Symantec Mail Security for SMTP will process in memory, as well as a time limit
for scanning containers. If the configured limits are reached, Symantec Mail
Security for SMTP will automatically perform the action designated for the
“unscannable” category in the Group Policies settings.
To configure container settings
1In the Control Center, click Settings > Scanning.
2Under Container Settings, specify a number in the Maximum container
scan depth box.
A container is unscannable for viruses if the nested depth in a container file
(such as a .zip file or email message) exceeds the number specified. Do not
set this value too high or you could be vulnerable to denial of service attacks
or zip bombs, in which huge amounts of data are zipped into very small files.
3Specify a number in the Maximum time to open container box and click
Seconds, Minutes, or Hours.
A container is unscannable for viruses if the specified time elapses when
scanning containers (such as .zip files). Use this setting to detect containers
that don’t exceed the other container settings, but yet include container
nesting, many files, large files, or a combination of these.
4Specify a number in the Maximum individual file size when opened box
and click KB, MB, or GB.
A container is unscannable for viruses if any individual component of the
container when unpacked exceeds the size specified.
5Specify a number in the Maximum accumulated file size when opened box
and click KB, MB, or GB.
A container is unscannable for viruses if the total size of all the files in a
container when unpacked exceeds the size specified.
6Click Save.
Configuring content filtering settings
In addition for checking plain text files against words as defined in contentrelated policies, Symantec Mail Security for SMTP can check attachments
against these dictionaries that are not plain-text files. While such checking
Configuring scanning settings
maximizes the effect of content filtering, it can also impact the system load and
slow down email filtering.
To check attachments that are not plain text against your dictionaries
1Click Settings > Scanning.
2In Content Filtering Settings, check Enable searching of non-plain text
attachments for words in dictionaries.
This can decrease system efficiency.
3Click Save.
59Configuring email settings
60 Configuring email settings
Configuring scanning settings
Chapter
Configuring email filtering
This chapter includes the following topics:
■About email filtering
■Creating groups and adding members
■Assigning filter policies to a group
4
■Managing Group Policies
■Creating virus, spam, and compliance filter policies
■Managing Email Firewall policies
■Configuring Sender Authentication
■Managing policy resources
About email filtering
Although Symantec Mail Security for SMTP provides default settings for dealing
with spam and viruses, you will likely want to tailor the actions taken on spam
and viruses to suit your requirements. Content filtering and Email Firewall
policies offer further methods of managing mail flow into and out of your
organization.
Symantec Mail Security for SMTP provides a wide variety of actions for filtering
email, and allows you to either set identical options for all users, or specify
different actions for distinct user groups.
You can specify groups of users based on email addresses, domain names, or
LDAP groups. For each group, you can specify an action or group of actions to
perform, given a particular verdict.
Each category of email includes one or more verdicts. Verdicts are the
conclusions reached on a message by the filtering process. Symantec Mail
62 Configuring email filtering
About email filtering
Security for SMTP performs actions on a message based on the verdict applied
to that message, and the groups that include the message recipient as a member.
The following table lists filtering verdicts by filtering category:
Table 4-1Filtering verdicts by category
Filtering CategoryVerdictDescription
Email FirewallDirectory harvest attack Connection is blocked because an attempt is underway—via
emailing to your domain with a specified number of non-existent
recipient addresses, sent from the same IP address—to capture
valid email addresses.
Spam attackConnection is blocked because a specified quantity of spam
messages has been received from a particular IP address.
Virus attackConnection is blocked because a specified quantity of infected
messages has been received from a particular IP address.
VirusVirusEmail is flagged because it contains a virus, based on current
Symantec virus filters.
Mass-mailing wormEmail is flagged because it contains a mass-mailing worm, based
on current virus filters from Symantec.
Unscannable for viruses Email is flagged because it exceeds the container limits
configured on the Scanning Settings page, or because it is
unscannable for other reasons, such as malformed MIME
attachments.
Encrypted attachmentEmail is flagged because it contains an attachment that is
encrypted or password-protected and therefore cannot be
scanned
Spyware or adwareEmail is flagged because it contains nay of the following types of
security risks: spyware, adware, hack tools, dialers, joke
programs, or remote access programs. See “Security risks” on
page 70 for descriptions of these risks.
Suspicious attachmentEmail is flagged because it contains an attachment that may
contain a virus or other threat.
SpamSpamEmail is flagged as spam, based on current spam filters from
Symantec.
Suspected spamEmail is flagged as suspected spam based on administrator-
Content Compliance Any part of a messageEmail is flagged because it contains keywords in your
configurable Spam Scoring.
configurable dictionary.
Table 4-1Filtering verdicts by category (Continued)
Filtering CategoryVerdictDescription
Attachment typeEmail is flagged because it contains a specific attachment type.
Attachment contentEmail is flagged because specific text appears in a specific
frequency in its attachments.
Subject:Email is flagged based on the text in the Subject: line.
From: AddressEmail is flagged based on the text in the From: address.
To: AddressEmail is flagged based on the text in the To: address.
Cc: AddressEmail is flagged based on the text in the Cc: address.
Bcc: AddressEmail is flagged based on the text in the Bcc: address.
To:/Cc:/Bcc: Address Email is flagged based on the text in the To:, Cc:, or Bcc:
address.
63Configuring email filtering
About email filtering
From:/To:/Cc:/Bcc:
Address
Envelope SenderEmail is flagged because its envelope contains a particular
Envelope RecipientEmail is flagged because its envelope contains a particular
Envelope HELOEmail is flagged because its envelope contains a particular SMTP
Message HeaderEmail is flagged because it contains a particular header.
Message SizeEmail is flagged because it is a particular size.
BodyEmail is flagged based on the text in the body.
For all messagesAll email not filtered by a higher precedence policy is flagged.
Email is flagged based on the text in the From:, To:, Cc:, or Bcc: address.
sender address.
recipient address.
HELO domain.
64 Configuring email filtering
About email filtering
The following table shows the filtering actions available for each verdict.
Note: See “Notes on filtering actions” on page 66 for additional limitations.
Table 4-2Filtering actions by verdict
ActionDescriptionVerdict
Directory harvest attack
Spam attack
Virus attack
Virus
Spam, Suspected Spam
Content Compliance
Add a headerAdd an X-header to the message.
Add annotationInsert predefined text into the message (a disclaimer, for
example).
Add BCC recipientsBlind carbon copy the message to the designated SMTP
address(es).
Archive the messageDeliver the original message and forward a copy to the
designated SMTP address, and, optionally, host.
Bounce the messageReturn the message to its From: address with a custom
response, and deliver it to the recipient. Optionally, the
original message can be included.
Clean the messageDelete unrepairable virus infections and repair repairable
virus infections.
Defer SMTP
connection
Delay message delivery Hold the message in the Suspect Virus Quarantine for a
Using a 4xx SMTP response code, tell the sending MTA to
try again later.
configured number of hours (default is six hours), then
refilter, using new virus definitions, if available. Only
available for the suspicious attachment verdict.
●●●●●●
●●●●●●
●●●●●●
●●●●●●
●●●●●●
●
●●●
●
Delete the messageDelete the message.
Deliver the message
normally
Deliver the message. Viruses and mass-mailing worms
are neither cleaned nor deleted.
●●●●●●
●●●●●●
About email filtering
Table 4-2Filtering actions by verdict (Continued)
ActionDescriptionVerdict
Directory harvest attack
Spam attack
Virus attack
65Configuring email filtering
Virus
Spam, Suspected Spam
Content Compliance
Deliver message to the
recipient’s Spam folder
Forward the messageForward the message to designated SMTP address(es).
Hold message in Spam
Quarantine
Modify the Subject line Add a tag to the message’s Subject: line.
Reject SMTP
connection
Remove invalid
recipients
Route the messageRoute the message using the designated SMTP host.
Save to diskSave the message to a standard location on the Scanner
Deliver the message to end-user Spam folder(s). Requires
use of the Symantec Spam Folder Agent for Exchange or
the Symantec Spam Folder Agent for Domino.
Send the message to the Spam Quarantine.
Using a 5xx SMTP response code, notify the sending MTA
that the message is not accepted.
If a directory harvest attack is taking place, remove each
invalid recipient rather than sending a bounce message
to the sender. You must complete LDAP synchronization
and Scanner replication before enabling this feature.
computer. On Solaris or Linux, you must specify a
writable directory.
●●●●●●
●●●●●●
●●●●●●
●●●●●●
●●●
●
●●●●●●
●●●●●●
Send notificationDeliver the original message and send a predefined
notification to designated SMTP address(es) with or
without attaching the original message.
Strip and hold in
Suspect Virus
Quarantine
Strip attachmentsRemove all message attachments.
Remove all message attachments and hold the message
in the Suspect Virus Quarantine for a configured number
of hours (default is six hours). Then refilter, with new
virus definitions, if available. Only available for the
suspicious attachment verdict.
●●●●●●
●
●●●
66 Configuring email filtering
About email filtering
Table 4-2Filtering actions by verdict (Continued)
ActionDescriptionVerdict
Directory harvest attack
Spam attack
Virus attack
Virus
Spam, Suspected Spam
Content Compliance
Treat as a b l ocked
sender
Treat as a m assmailing worm
Treat as an allowed
sender
Treat as a virusProcess the message using the action(s) specified in the
Treat as spamProcess the message using the action(s) specified in the
Process the message using the action(s) specified in the
domain-based Blocked Senders List. Applies even if the
domain-based Blocked Senders List is disabled, and
applies to inbound messages only.
Process the message using the action(s) specified in the
associated worm policy. The message is delivered
normally if the worm policy is disabled or does not apply
because of message direction.
Process the message using the action(s) specified in the
domain-based Allowed Senders List. Applies even if the
domain-based Allowed Senders List is disabled, and
applies to inbound messages only.
associated virus policy. The message is delivered
normally if the virus policy is disabled or does not apply
because of message direction.
associated spam policy. The message is delivered
normally if the spam policy is disabled or does not apply
because of message direction.
●
●
●
●
●
Treat as suspected
spam
Process the message using the action(s) specified in the
associated suspected spam policy. The message is
delivered normally if the suspected spam policy is
disabled or does not apply because of message direction.
Notes on filtering actions
When using Table 4-2 consider the following limitations:
■All Virus verdicts except suspicious attachments share the same available
actions. Two additional actions, Delay message delivery and Strip and hold
●
About email filtering
in Suspect Virus Quarantine, are available only for the suspicious
attachment verdict.
■All Spam verdicts share the same available actions.
■All Content Compliance verdicts share the same available actions.
■Messages from senders in the Allowed Senders Lists are always delivered
directly to end-user mailboxes, bypassing spam filtering.
■When using the Modify the subject action, you can specify the character set
encoding to use. If the encoding you choose is different than the encoding
used by the original message, either the message or the modified subject
line will not be displayed correctly.
■When using the Save to disk action on Solaris or Linux, you must specify a
writeable directory.
■By default, inbound and outbound messages containing a virus or mass-
mailing worm, and unscannable messages, including malformed MIME
messages, will be deleted. You may want to change the default setting for
unscannable messages if you are concerned about losing important
messages. See Table 4-5, “Virus categories and default actions,” on page 75.
67Configuring email filtering
Multiple actions
You can create compound actions, performing multiple actions for a particular
verdict. An example follows:
1Defining a virus policy, the administrator selects the Virus verdict and then
2Defining a Group Policy, the administrator assigns members then selects the
3An email message is received whose recipients include someone in the new
4Symantec Mail Security for SMTP cleans the message, annotates it, then
assigns the actions, Clean, Add annotation, and Send notification to the
policy.
new virus policy.
Group Policy.
sends a notification to its intended recipients.
68 Configuring email filtering
About email filtering
The following table lists the limitations on combining actions.
Table 4-3Compatibility of filtering actions by verdict
ActionCompatibility with other actionsCan be added multiple
times?
Add a headerAny except Delete the messageNo
Add annotationAny except Delete the messageOne for header or one for
footer, but not both
Add BCC recipientsAny except Delete the messageYes
Archive the messageAnyNo
Bounce the message
Any
No
Clean the messageAny except Delete the messageNo
Defer SMTP
Can’t be used with other actionsNo
connection
Delay message delivery Any except Delete the message, Deliver message normally,
No
Hold the message in Spam Quarantine, Strip and delay
Delete the message
Deliver message
normally
Deliver the message to
■Bounce Message
■Send Notification
■Archive
Any except Delay message delivery, Delete the message,
No
No
Quarantine the message, and Strip and delay
Any except Delete the messageNo
the recipient’s Spam
folder
Forward the messageAny except Delete the messageYes
Hold message in Spam
Quarantine
Any except
■Delay message delivery
■Deliver the message normally
■Delete the message
■Strip and delay
No
If used with Deliver the message to the recipient’s Spam
folder, affected messages are quarantined, but if released
from Spam Quarantine, messages are delivered to the
recipient’s Spam folder.
Modify the Subject line Any except Delete the messageOne for prepend and one for
append
About email filtering
Table 4-3Compatibility of filtering actions by verdict (Continued)
ActionCompatibility with other actionsCan be added multiple
times?
69Configuring email filtering
Reject SMTP
connection
Remove invalid
recipients
Route the messageAny except Delete the messageNo
Save to diskAnyNo
Send notificationAny except Delete the messageNo
Strip and hold message
in Suspect Virus
Quarantine
Strip attachmentsAny except Delete the messageYes
Treat as a b l ocked
sender
Treat as a m assmailing worm
Can’t be used with other actionsNo
Any except Delete the messageNo
Any except:
■Delete the message
■Deliver message normally
■Hold the message in Spam Quarantine
■Delay message delivery
Can’t be used with other actionsNo
Can’t be used with other actionsNo
No
Treat as an allowed
sender
Treat as a virusCan’t be used with other actionsNo
Treat as spamCan’t be used with other actionsNo
Treat as suspected
spam
Can’t be used with other actionsNo
Can’t be used with other actionsNo
Multiple policies
If there are multiple policies that may apply to a message, the policy that is
applied depends on the direction the message is traveling. If the message is
outbound, the policy applied is based on the sender. If the message is inbound,
the policy applied is based on the recipient.
70 Configuring email filtering
About email filtering
Security risks
Symantec Mail Security for SMTP can detect security risks. Security risks are
programs that do any of the following:
■Provide unauthorized access to computer systems
■Compromise data integrity, privacy, confidentiality, or security
■Present some type of disruption or nuisance
These programs can put your employees and your organization at risk for
identity theft or fraud by logging keystrokes, capturing email and instant
messaging traffic, or harvesting personal information, such as passwords and
login identifications.
Security risks can be introduced into your system unknowingly when users visit
a Web site, download shareware or freeware software programs, click links or
attachments in email messages, or through instant messaging clients. They can
also be installed after or as a by-product of accepting an end user license
agreement from another software program related to or linked in some way to
the security risk.
Table 4-4 lists the categories of security risks that Symantec Mail Security for
SMTP detects. Each of these risks can cause a verdict of spyware or adware.
Table 4-4Security risk categories included in spyware or adware verdict
CategoryDescription
AdwareStand-alone or appended programs that gather personal information
through the Internet and relay it back to a remote computer without the
user’s knowledge.
Adware might monitor browsing habits for advertising purposes. It can
also deliver advertising content.
Hack toolsPrograms used to gain unauthorized access to a user’s computer.
For example, a keystroke logger tracks and records individual keystrokes
and sends this information to a remote computer. The remote user can
perform port scans or vulnerability scans. Hack tools might also be used
to create viruses.
DialersPrograms that use a computer, without the user’s permission or
knowledge, to dial out through the Internet to a 900 number or FTP site,
typically to accrue charges.
Joke programsPrograms that alter or interrupt the operation of a computer in a way
that is intended to be humorous or bothersome.
For example, a joke program might move the Recycling Bin away from
the mouse when the user tries to click on it.
About email filtering
Table 4-4Security risk categories included in spyware or adware verdict
CategoryDescription
71Configuring email filtering
Remote access
programs
SpywareStand-alone programs that can secretly monitor system activity and
About precedence
Determining the precedence of different types of filtering for a particular
message rests on many factors. For more information on the various lists
discussed below, see “Configuring sender groups” on page 95.
If more than one verdict matches a message, the following applies:
■Any matching verdict that calls for an action of defer or reject takes
■If multiple matching verdicts call for defer or reject, the one of those
■If no matching verdict calls for an action of defer or reject, then the
Programs that let a remote user gain access to a computer over the
Internet to gain information, attack, or alter the host computer.
detect passwords and other confidential information and then relay the
information back to a remote computer.
precedence over verdicts that call for other actions.
verdicts that appears first in the precedence list (see below) takes
precedence.
matching verdict that appears first in the precedence list takes precedence.
■Although a verdict can call for multiple actions, only one verdict determines
the actions that are taken on a message. Actions called for by lower
precedence verdicts are not applied.
Order of precedence:
■Virus attack
■Wo rm
■Virus
■Spyware or adware
■Suspicious attachment (suspected virus)
■Unscannable
■Encrypted attachment
■End user-defined Allowed Senders List
■End user-defined Blocked Senders List
■Administrator-defined, IP-based Allowed Senders List
72 Configuring email filtering
Creating groups and adding members
■Administrator-defined, IP-based Blocked Senders List
■Administrator-defined, domain-based Allowed Senders List
■Administrator-defined, domain-based Blocked Senders List
■Spam attack
■Directory harvest attack
■Safe Senders List (part of the Sender Reputation Service)
■Open Proxy Senders (part of the Sender Reputation Service)
■Third Party Services Allowed Senders List
■Third Party Services Blocked Senders List
■Content Compliance policies
■Dropped invalid recipient
■Spam
■Blocked language
■Suspected spam
■Suspected Spammers (part of the Sender Reputation Service)
■Sender authentication failure
Note that end user-defined lists have precedence over all other lists. This may
affect your decision regarding whether to enable end user preferences.
Also, lists that you create have precedence over lists created by Symantec.
However, third party DNS blacklists do not have priority over all Symantec lists.
In the event of a conflict between Open Proxy Senders and an entry from a DNS
blacklist, Open Proxy Senders will “win.”
Creating groups and adding members
Group policies are configurable message management options for an unlimited
number of user groups which you define. Policies collect the spam, virus, and
content filtering verdicts and actions for a group.
Add or remove members from a group
You can specify groups of users based on email addresses, domain names, or
LDAP groups. For each group, you can specify email filtering actions for
different categories of email.
Creating groups and adding members
Note: To edit a group member, such as to correct a typo, delete the member and
add the member again. There is no edit button for group members.
To crea t e a new G r oup Pol i c y
1In the Control Center, click Pol icies > Group Policies.
This page lists each Group Policy. The Default Group Policy, which contains
all users and all domains, appears last. Although you can add or modify
actions for the Default Group Policy, you cannot add members to the Default
Group Policy. You cannot delete or disable the Default Group Policy.
2On the Group Policies page, click Add.
3Enter a name in the Group Name box.
4Click Save.
To add a new member to a Group Policy
73Configuring email filtering
1In the Control Center, click Pol icies > Group Policies.
2Click the underlined name of the Group Policy you want to edit.
3Ensure that the Members tab is displayed, and click Add.
4Specify members using one or both of the following methods:
■Type email addresses, domain names, or both in the box. To specify
multiple entries, separate each with a comma, semicolon, or space.
However, do not use a comma and a space, or a semicolon and a space.
Use * to match zero or more characters and ? to match a single
character. To add all recipients of a particular domain as members,
type any of the following:
domain.com
@domain.com
*@domain.com
If you use a wildcard in the domain when specifying a member, be sure
to precede the domain with the @ symbol and precede the @ symbol
with a wildcard, a specific user, or a combination of those. The
following examples show valid uses of wildcards:
user@domain.*
user*@dom*.com
ali*@sub*.domain.com
74 Configuring email filtering
Creating groups and adding members
5Click Add members to add the new member(s).
6Click Save on the Edit Group page.
To delete a Group Policy member
These examples are not valid, and won’t match any users:
domain.*
@domain.*
dom*.com
sub*.domain.com
■Check the box next to one or more LDAP groups.
The LDAP groups listed on this page are loaded from your LDAP server.
See “Configuring LDAP settings” on page 29 for information about
configuring LDAP.
1On the Members tab of the Add Group page, check the box next to one or
more email addresses, domains, or LDAP groups, and then click Delete.
2Click Save on the Edit Group page.
To import Group Policy members from a file
1On the Members tab of the Add Group page, click Import.
2Enter the appropriate path and filename (or click Browse to locate the file
on your hard disk), and then click Import.
Separate each domain or email address in the plain text file with a newline.
Below is a sample file:
ruth@example.com
rosa@example.com
ben*@example.com
example.net
*.org
The email addresses in the samples behave as follows:
■ruth@example.com and rosa@example.com match those exact email
addresses.
■ben*@example.com matches ben@example.com and
benjamin@example.com, etc.
■example.net matches all email addresses in example.net.
■*.org matches all email addresses in any domain ending with .org.
3Click Save.
Assigning filter policies to a group
Note: The maximum number of entries in the Members list for a Group Policy is
10,000. If you require more than 10,000 entries, contact your Symantec
representative for instructions on how to configure MySQL and Tomcat to
support more entries. This limitation refers to the number of entries in the
Members list, not the number of users at your company. Due to this limit on
importing large lists of users, when possible use domain names, subdomain
names or wildcards in email addresses to add users to groups.
To export Group Policy members to a file
1In the Members tab of the Add Group page, click Export.
2Complete your operating system’s save file dialog box as appropriate.
Note: LDAP groups cannot be imported or exported. If you export from a group
that includes LDAP groups, the LDAP groups will be omitted from the export.
75Configuring email filtering
Assigning filter policies to a group
By default, groups you create are assigned the default filter policies for spam
and viruses (there is no default for compliance policies). Follow the steps in the
sections below to assign different filter policies to groups. You may first want to
create your own filter policies. See “Creating virus, spam, and compliance filter
policies” on page 82.
Selecting virus policies for a group
Virus policies determine what to do with inbound and outbound messages that
contain any of six categories of threats. Table 4-5 lists the categories and the
default action for each category.
Table 4-5Virus categories and default actions
CategoryDefault action
VirusesClean the message
Mass-mailing wormsDelete the message
Unscannable messagesDelete the message
Encrypted attachmentsPrepend [WARNING ENCRYPTED ATTACHMENT NOT VIRUS
SCANNED] to Subject: header.
76 Configuring email filtering
Assigning filter policies to a group
Table 4-5Virus categories and default actions (Continued)
CategoryDefault action
Spyware or adwarePrepend [SPYWARE OR ADWARE INFECTED] to Subject:
header.
Suspicious attachmentsInbound message: Strip and hold message in Suspect Virus
For a description of each of these categories, see Table 4-1. See “Creating virus
policies” on page 83 for information about creating virus policies.
By default, inbound and outbound messages containing a virus or mass-mailing
worm, and unscannable messages, including malformed MIME messages, will be
deleted. You may want to change the default setting for unscannable messages if
you are concerned about losing important messages.
To select virus policies for a group
1In the Control Center, click Policie s > Group Policies.
2On the Group Policies page, click the group for which you want to select
virus policies.
3Click the Virus tab.
4If desired, check Enable inbound virus scanning for this group to enable
the following six virus policies for incoming email.
5Select the desired policy from each of the following drop-down lists:
■Inbound virus policy
■Inbound mass-mailing worm policy
■Inbound unscannable message policy
■Inbound encrypted message policy
■Inbound suspicious attachment message policy
■Inbound spyware/adware message policy
6If desired, check Enable outbound virus scanning for this group to enable
the following six virus policies for outgoing email.
7Select the desired policy from each of the following drop-down lists:
■Outbound virus policy
■Outbound mass-mailing worm policy
■Outbound unscannable message policy
■Outbound encrypted message policy
■Outbound suspicious attachment message policy
■Outbound spyware/adware message policy
8Optionally, click View next to any policy to view details of that policy.
9Click Save.
Note: You cannot change virus policy details from the Edit Group page. See
“Creating virus policies” on page 83 for information about creating or editing
virus policies.
Selecting spam policies for a group
Spam policies determine what to do with inbound and outbound messages that
contain spam or suspected spam. See “Creating spam policies” on page 85 for
information about creating spam policies.
77Configuring email filtering
Assigning filter policies to a group
By default, inbound and outbound spam will be marked up with [Spam] at the
beginning of subject lines, and inbound and outbound suspected spam will be
marked with [Suspected Spam]. Both types of spam will not be deleted by
default.
To select spam policies for a group
1In the Control Center, click Pol icies > Group Policies.
2On the Group Policies page, click the group for which you want to select
spam policies.
3Click the Spam tab.
4If desired, check Enable inbound spam scanning for this group to enable
the following two spam policies for incoming email.
5Select the desired policy from each of the following drop-down lists:
■Inbound spam policy
■Inbound suspected spam policy
6If desired, check Enable outbound spam scanning for this group to enable
the following two spam policies for outgoing email.
7Select the desired policy from each of the following drop-down lists:
■Outbound spam policy
■Outbound suspected spam policy
8Click Save.
78 Configuring email filtering
Assigning filter policies to a group
Note: You cannot change spam policy details from the Edit Group page. See
“Creating spam policies” on page 85 for information about creating or editing
spam policies.
Selecting compliance policies for a group
By associating an appropriate compliance policy with a group, you can check
messages for attachment types, keywords, or regular expressions. Depending on
the message content, you can add annotations, send notifications, or copy
messages to an email address. See “Creating compliance policies” on page 86 for
information about creating compliance policies.
To select compliance policies for a group
1In the Control Center, click Policie s > Group Policies.
2On the Group Policies page, click the group for which you want to select
compliance policies.
3Click the Compliance tab.
4Check Enable Inbound Content Compliance for this group.
5Select the desired policy from the Content Compliance Policies drop-down
list.
If desired, click View to see a summary of the compliance policy, and then
click OK to return. As you add compliance policies from the drop-down list,
they are displayed in the bottom list and become unavailable in the dropdown list.
6Click Add.
7If desired, add additional policies from the Content Compliance Policies
drop-down list.
8Configure the outbound compliance policies similarly.
9Click Save.
Note: You cannot change compliance policy details from the Edit Group page.
Although you can add existing policies to the lists on this page, you cannot add
new compliance policies from this page. See “Creating compliance policies” on
page 86 for information about creating compliance policies.
Enabling and disabling end user settings
The end user settings determine whether end users in a group can log in to the
Control Center to configure personal Allowed and Blocked Senders Lists and
block or allow email in specified languages.
Note: Depending on your system and the group you are editing, you may not be
able to view the End Users tab on the Edit Group page. See “Requirements for
enabling end user settings” on page 79 for details.
To log in, users access the same URL in their browser as Control Center
administrators: https://<hostname>:41443/brightmail. The login and password
for end users is the same as their LDAP login and password. For information
about supported browsers, see the Symantec Mail Security for SMTP Installation Guide.
79Configuring email filtering
Assigning filter policies to a group
Note: End users are limited to a total of 200 entries in their combined Allowed
Senders and Blocked Senders Lists.
The Specify language settings check box enables or disables user access to the
language identification offered by Symantec Mail Security for SMTP, not the
Symantec Outlook Spam Plug-in. If the Symantec Outlook Spam Plug-in is
installed and enabled, end users can set their language preferences using the
Options dialog box accessible from the Symantec Outlook Spam Plug-in toolbar.
Note: The language identification technology employed by Symantec Mail
Security for SMTP to identify the language of a message is not foolproof. Note
that messages identified to be in a disallowed language are deleted.
Requirements for enabling end user settings
The following requirements must be satisfied before end users can configure
their own personal Allowed and Blocked Senders Lists and block or allow email
in specified languages:
■At least one LDAP SyncService server must be configured and enabled.
■In Settings > LDAP settings, an LDAP source configured for Authentication
or Authentication and Synchronization must be defined and saved.
■In Settings > Replication settings, a replication schedule must be defined
and enabled.
80 Configuring email filtering
Assigning filter policies to a group
■In Policies > Group Policies > Edit Group, the End user preferences must be
enabled for the given group on the End Users tab.
■The members of the group in question can only be LDAP users, not a locally
defined user (that is, an email address you typed manually).
Note: End user Allowed and Blocked Senders Lists take precedence over most
other filters. See “About precedence” on page 71 for the precedence list. This
could impact your decision on whether to enable end user settings.
To select end user policies for a group
1In the Control Center, click Policie s > Group Policies.
2On the Group Policies page, click the group for which you want to select
compliance policies.
3Click the End Users tab.
4Check Enable end user settings for this group.
5If desired, check Create Personal Allowed and Blocked Senders Lists.
6If desired, check Specify language settings.
7Click Save.
Allowing or blocking email based on language
Using the language identification offered by Symantec Mail Security for SMTP,
you can block or allow messages written in specified languages for a group. For
example, you can choose to only allow English and Spanish messages, or block
messages in English and Spanish and allow messages in all other languages.
Note: If the Language tab in the Edit Group page is inaccessible, the Symantec
Outlook Spam Plug-in has been enabled. To disable support for the Outlook
Plug-in and enable support for built-in language identification, set Language
Identification to No on the Spam Settings page. That will make the Language tab
accessible. See “Choosing language identification type” on page 52.
To allow or block email based on language for a group
1In the Control Center, click Policie s > Group Policies.
2On the Group Policies page, click the group for which you want to select
compliance policies.
3Click the Language tab.
4Click the desired setting.
5If you chose the second or third option, check the box for each desired
language.
6Click Save.
Note: The language identification technology employed by Symantec Mail
Security for SMTP to identify the language of a message is not foolproof. Note
that messages identified to be in a disallowed language are deleted.
Managing Group Policies
The Group Policy management options let you do the following:
■Set Group Policy precedence, the order in which Group Policy membership is
determined when policies are applied.
81Configuring email filtering
Managing Group Policies
■Edit Group Policy membership and actions.
■Enable and disable Group Policies.
■Delete Group Policies.
■View Group Policy information for particular users.
For information on adding members to groups and importing or exporting lists
of group members, see “Creating groups and adding members” on page 72.
Manage Group Policies
The following sections describe common administrative tasks for Group
Policies.
To set Group Policy precedence
◆Check the box next to a Group Policy, and then click Move Up or Move Down
to change the order in which it is applied.
Note: The Default Group Policy is always the last Group Policy in the list. You
cannot change the precedence of the Default Group Policy.
To edit an existing Group Policy
◆On the Group Policy page, click the policy name or check the box next to a
Group Policy, and then click Edit.
82 Configuring email filtering
Creating virus, spam, and compliance filter policies
Add or delete members or change filtering actions for this Group Policy as
you did when you created it. See “Add or remove members from a group” on
page 72 for more information.
To enable a Group Policy
◆Check the box next to a Group Policy, and then click Enable.
To disable a Group Policy
◆Check the box next to a Group Policy, and then click Disable.
Note: You cannot disable the Default Group Policy.
To delete a Group Policy
◆On the Group Policies page, check the box next to a Group Policy, and then
click Delete.
To view Group Policy information for a particular user or domain:
1On the Members tab of the Edit Group page, click Find User.
2Type an email address or domain name in the Email address box.
3Click Find User.
The Control Center lists the first enabled group in which the specified user
exists, searching in the order that groups are listed on the Group Policies
page.
Creating virus, spam, and compliance filter policies
Use filter policy pages to combine a message characteristic, such as virus, with
an action, such as delete. The initial page you see when you click on Spam, Virus,
or Compliance under Policies > Filter Policies contains a table that indicates the
status of defined virus, spam, or compliance policies.
Table 4-6Policy status page
ColumnDescription
Virus/Spam/Content
Compliance Policies
Name of the policy
EnabledIndicates if the policy is enabled for one or more groups
Applied toIndicates the directions the policy is applied to: Inbound,
Outbound, or both
Table 4-6Policy status page (Continued)
ColumnDescription
Number of GroupsNumber of groups that this policy has been used in
Creating virus policies
Using the Virus Policies page, you can add, edit, copy, delete, and enable or
disable virus policies.
To add an virus policy
1In the Control Center, click Pol icies > Virus.
2Click Add.
3In the Policy name box, type a name for the virus policy.
This name appears on the Virus Policies page, and on the Virus tab when
configuring a Group Policy. Compliance, spam, and virus policy names must
be unique. For example, if you have a compliance policy called XYZ, you can’t
have an spam or virus policy called XYZ.
83Configuring email filtering
Creating virus, spam, and compliance filter policies
4Under Apply to, choose where this virus policy should be available:
■Inbound messages
■Outbound messages
■Inbound and Outbound messages
This determines where this virus policy is available on the Virus tab when
configuring a Group Policy. For example, if you choose Inbound messages
and the mass-mailing worm condition on this page, this virus policy is only
available in the Inbound mass-mailing worm policy drop-down list when
configuring a Group Policy.
5Under Groups, check one or more groups to which this policy should apply.
You can also add an virus policy to a group on the Virus tab of the Edit Group
page.
6Under Conditions, select one of the following six conditions:
If a message contains a
virus
If a message contains a
mass-mailing worm
The message contains a virus
The message contains a mass-mailing worm, a worm
that propagates itself to other systems via email, often
by using the address book of an email client program
84 Configuring email filtering
Creating virus, spam, and compliance filter policies
If a message is unscannable
for viruses
If a message contains an
encrypted attachment
If a message contains a
suspicious attachment
If a message contains
spyware or adware
A message can be unscannable for viruses for a variety
of reasons. For example, if it exceeds the maximum file
size or maximum scan depth configured on the
Scanning Settings page, or if it contains malformed
MIME attachments, it may be unscannable. Compound
messages such as zip files that contain many levels may
exceed the maximum scan depth.
The message contains an attachment that cannot be
scanned because it is encrypted.
The message contains an attachment that, according to
Symantec filters, may contain a virus or other threat.
The message contains spyware or adware.
7Select the desired action.
See Table 4-2, “Filtering actions by verdict,” on page 64. For some actions
you need to specify additional information in fields that appear below the
action.
8Click Add Action.
9If desired, add more actions.
See Table 4-3, “Compatibility of filtering actions by verdict,” on page 68.
10 Click Save.
Determining your suspicious attachment policy
When you choose the condition, “If a message contains a suspicious
attachment,” two additional actions become available:
■Delay message delivery
■Strip and hold in Suspect Virus Quarantine
Both of these actions enable you to make use of the Suspect Virus Quarantine to
delay filtering these messages until a later time, when updated virus definitions
may be available. This provides enhanced protection against new and emerging
virus threats.
By default, these messages are held in the Suspect Virus Quarantine for 6 hours.
You can vary the number of hours on the Settings > Quarantine page, Virus tab.
Changing default virus actions
By default, inbound and outbound messages containing a virus or mass-mailing
worm, and unscannable messages, including malformed MIME messages, will be
deleted. You may want to change the default setting for unscannable messages if
you are concerned about losing important messages. See Table 4-5, “Virus
categories and default actions,” on page 75.
Creating spam policies
Using the Spam Policies page, you can add, edit, copy, delete, and enable or
disable spam policies.
To add a spam policy
1In the Control Center, click Pol icies > Spam.
2Click Add.
3In the Policy name box, type a name for the spam policy.
This name appears on the Spam Policies page, and on the Spam tab when
configuring a Group Policy. Compliance, spam, and virus policy names must
be unique. For example, if you have a compliance policy called XYZ, you can’t
have a spam or virus policy called XYZ.
85Configuring email filtering
Creating virus, spam, and compliance filter policies
4Under Apply to, choose where this spam policy should be available:
■Inbound messages
■Outbound messages
■Inbound and Outbound messages
This determines where this spam policy is available on the Spam tab when
configuring a Group Policy. For example, if you choose Inbound messages
and the spam condition, this spam policy is only available in the Inbound
spam policy drop-down list when configuring a Group Policy.
5Under Groups, check one or more groups to which this policy should apply.
You can also add a spam policy to a group on the Spam tab of the Edit Group
page.
6Under Conditions, select one of the following three conditions:
If the message is
Spam
If the message is
Suspected Spam
Perform the specified action if a message is
determined to be spam.
Perform the specified action if a message might be
spam. The suspected spam level is adjustable on the
Spam Settings page.
If the message is
Spam or Suspected
Spam
Perform the specified action if a message contains
either spam or suspected spam.
86 Configuring email filtering
Creating virus, spam, and compliance filter policies
7Select the desired action.
See Table 4-2, “Filtering actions by verdict,” on page 64. For some actions
you need to specify additional information in fields that appear below the
action.
8Click Add Action.
9If desired, add more actions.
See Table 4-3, “Compatibility of filtering actions by verdict,” on page 68.
10 Click Save.
Creating compliance policies
Using the Content Compliance Policies page, you can add, edit, copy, delete, and
enable or disable compliance policies. You can also change the precedence of
compliance policies by changing their location in the list on this page.
You can create compliance policies based on key words and regular expressions
found in specific areas of a message. Based on policies you set up, you can
perform a wide variety of actions on messages that match against your
compliance policies. Compliance policies can be used to:
■Eliminate messages with specific content, or specific file attachment types
or filenames.
■Control message volume and preserve disk space by filtering out oversized
messages.
■Block email from marketing lists that generate user complaints or use up
excessive bandwidth.
■Block messages containing certain keywords or regular expressions in their
headers, bodies, or attachments.
Actions specified for custom filter matches will not override actions resulting
from matches in your Blocked Senders Lists or Allowed Senders Lists. In other
words, if a message’s sender matches an entry in your Blocked Senders Lists or
Allowed Senders Lists, compliance policies will have no effect on the message.
See “About precedence” on page 71 for more information.
Guidelines for creating compliance policy conditions
Keep these suggestions and requirements in mind as you create the conditions
that make up a filter.
■To start out, you may want to set your policies so that messages that are
match by compliance policies are quarantined, forwarded, or modified
Creating virus, spam, and compliance filter policies
instead of deleted. When you are sure the compliance policies are working
correctly, you can adjust the action.
■Sieve scripts cannot be imported, including those created in previous
versions of Symantec or Brightmail software.
■There is no limit to the number of conditions per compliance policy.
■Conditions can’t be nested.
■You can create compliance policies that block or allow email based upon the
sender information, but usually it is best to use the Allowed Senders Lists
and Blocked Senders Lists. However, it is appropriate to create compliance
policies if you need to block or keep email based on a combination of the
sender and other criteria, such as the subject or recipient.
■The order of conditions in a filter does not matter as far as whether a filter
matches a message. However, if a filter has Body tests, you can optimize the
filter by positioning them as the final conditions in a filter.
87Configuring email filtering
■Spammers usually “spoof” or forge some of the visible headers and the
usually invisible envelope information. Sometimes they forge header
information using actual email addresses or domains of innocent people or
companies. Use care when creating filters against spam you’ve received.
■The following considerations apply to keyword text string searches. For
details on regular expression searches, see “Using Perl-compatible regular
expressions in conditions” on page 91.
■All tests for words and phrases are case-insensitive, meaning that
lowercase letters in your conditions match lower- and uppercase letters
in messages, and uppercase letters in your conditions match lower- and
uppercase letters in messages. For example, if you tested that the
subject contains “inkjet”, then “inkjet”, “Inkjet”, and “INKJET” in a
message subject would match. If you instead tested for “INKJET” in the
subject, then “inkjet”, “Inkjet”, and “INKJET” would still match. This
applies to all test types and all filter components.
■Multiple white spaces in an email header or body are treated as a single
space character. For example, if you tested that the subject contains
“inkjet cartridge”, then “inkjet cartridge” and “inkjet cartridge” in a
message subject would match. If you instead tested for
“inkjet cartridge” in the subject, then “inkjet cartridge” and
“inkjet cartridge” would still match. This applies to all test types and
all filter components. A message subject containing
“i n k j e t c a r t r i d g e” would not match a test for “inkjet cartridge” or
“inkjet cartridge”.
88 Configuring email filtering
Creating virus, spam, and compliance filter policies
Adding conditions to compliance policies
Refer to the following tables when creating your compliance policy.
Table 4-7 describes the conditions available when creating a compliance policy.
Table 4-7Compliance conditions
ConditionTest againstExamples
Any part of the
message
Attachment content Text within an attachment file.Find all attachments that
Attachment typeAn attachment list, file name, or MIME
Bcc: addressBcc: (blind carbon copy) message
BodyContents of the message body. This
Cc: addressCc: (carbon copy) message header.jane
Dictionary. See “Configuring
dictionaries” on page 112.
type. See “Configuring attachment
lists” on page 110.
header.
component test is the most processing
intensive, so you may want to add it as
the last condition in a filter to
optimize the filter.
Profanity
contain the word
“discount” more than
three times.
script.vbs
application/octet-stream
jane
example.com
jane@example.com
You a lre a dy ma y hav e
won
example.com
jane@example.com
Envelope HELOSMTP HELO domain in message
Envelope recipientRecipient in message envelope.jane
Envelope senderSender in message envelope.jane
example.com
envelope.
example.com
jane@example.com
example.com
jane@example.com
Creating virus, spam, and compliance filter policies
Table 4-7Compliance conditions (Continued)
ConditionTest againstExamples
89Configuring email filtering
For all messagesAll email not filtered by a higher
precedence policy is flagged. For
example, if a message matches a spam,
virus, sender group, or higher
precedence compliance policy, it won’t
match the “For all messages”
condition.
From: addressFrom: message header.jane
From:/To:/Cc:/Bcc:
address
Message headerMessage header specified in the
Message sizeSize of the message in bytes, kilobytes,
From:, To:, Cc:, and Bcc: message
headers.
accompanying text field. A header is
case-insensitive. Don’t type the
trailing colon in a header.
or megabytes, including the header
and body is less than or greater than
the specified value.
(Not applicable)
example.com
jane@example.com
jane
example.com
jane@example.com
Reply-To
reply-to
Message-ID
2
200
2000
SubjectSubject: message header.$100 F R E E, Please Play
Now!
To: addressTo: message header.jane
example.com
jane@example.com
To:/Cc:/Bcc: address To:, Cc:, and Bcc: message headers.jane
example.com
jane@example.com
90 Configuring email filtering
Creating virus, spam, and compliance filter policies
Table 4-8 shows the additional fields available when you add a condition.
Table 4-8Additional fields for adding conditions
ConditionInformation required
Attachment content, Bcc:
address, Body, Cc: address,
Envelope HELO, Envelope
recipient, Envelope sender,
From: address, From/To/Cc/
Bcc: address, Subject, To:
address, To/Cc/Bcc: address
Choose one of three options:
■Click the first radio button, choose contains or does
not contain, type a frequency and a keyword.
■Click the second radio button, choose a test type,
and type a keyword.
■Click the third radio button, choose matches or does
not match, and type a regular expression
Any part of the messageChoose a dictionary from the drop-down list, and type a
word frequency in the box.
Attachment typeChoose one of three options:
■Click the first radio button and choose an
attachment list.
■Click the second radio button and type a filename.
■Click the third radio button and type a MIME type.
This condition will also flag attachments that are within
container files.
For all messagesNo additional information is needed. This condition flags
all messages not filtered by a higher precedence policy.
Message headerType the header category (From, To, etc), then follow the
instructions in the first row above.
Message sizeChoose a comparison from the first drop-down list, type a
number, and choose units from the second drop-down
list.
Table 4-9 describes the filter tests available for certain conditions when creating
a compliance policy.
Table 4-9Filter tests
Test ty p eDescription
Contains/does not
contain
Starts with/does not
start with
Tests for the supplied text within the component specified.
Sometimes called a substring test. You can also test for frequency the number of instances of the supplied text that appear.
Equivalent to ^text.* wildcard test using matches exactly.
Creating virus, spam, and compliance filter policies
Table 4-9Filter tests (Continued)
Test ty p eDescription
91Configuring email filtering
Ends with/does not
end with
Matches exactly/
does not match
exactly
Notes:
All text tests are case-insensitive.
Some tests are not available for some components.
Equivalent to .*text$ wildcard test using matches exactly.
Exact match for the supplied text (not available for the message
body).
Using Perl-compatible regular expressions in conditions
To use Perl-compatible regular expressions, click “matches regular expression”
or “does not match regular expression” for any of the conditions that offer you
that choice (the conditions in the first row of Table 4-8, plus the Message header
condition).
You can refine your search as described in Table 4-10. To match certain special
characters, you must escape each with \ as shown in the table. For more
information about Perl-compatible regular expressions, see:
times, for example, match
a social security number
[0-9]{3}-[0-9]{2}-[0-9]{4}123-45-6789
Note: Symantec Mail Security for SMTP uses two different types of analysis in
scanning for messages that match your criteria. If you specify a condition using
a regular expression, a regular expression analysis is performed. If you specify a
condition using a keyword or dictionary, a text search is performed.
To add a compliance policy
1In the Control Center, click Policie s > Compliance.
2Click Add.
3In the Policy name box, type a name for the compliance policy.
This name appears on the Content Compliance Policies page, and in the
Compliance tab when configuring a Group Policy. Compliance, spam, and
virus policy names must be unique. For example, if you have a compliance
policy called XYZ, you can’t have a spam or virus policy called XYZ.
4Under Apply to, choose where this compliance policy should be available:
■Inbound messages
■Outbound messages
■Inbound and Outbound messages
5Under Groups, check one or more groups to which this policy should apply.
You can also add a compliance policy to a group on the Compliance tab of the
Edit Group page.
6Under Conditions, click a condition. See Table 4-7, “Compliance conditions,”
on page 88. For some conditions you need to specify additional information
in fields that appear below the condition.
7Click Add Condition.
See Table 4-8, “Additional fields for adding conditions,” on page 90. Add
additional conditions if desired.
8Under Perform the following action, click an action.
See Table 4-2, “Filtering actions by verdict,” on page 64. For some actions
you need to specify additional information in fields that appear below the
action.
Managing Email Firewall policies
9Click Add Action.
Add additional actions if desired. See Table 4-3, “Compatibility of filtering
actions by verdict,” on page 68.
10 Click Save.
Note: You can use keywords or a regular expression in a compliance policy
to strip attachments. However, you cannot specify that only attachments
containing the keyword or regular expression are stripped. All attachments
to the message will be stripped if any of the attachments contain the
keyword or regular expression.
Determining compliance policy order
You can change the order in which compliance policies are checked against
messages.
93Configuring email filtering
To set compliance policy order
1In the Control Center, click Pol icies > Compliance.
2Check the box next to a compliance policy.
3Click Move Up or Move Down.
Enabling and disabling compliance policies
After you create compliance policies, they are automatically enabled and put to
use. For testing or other administrative purposes, you may need to enable or
disable one or more filters without having to delete them. By disabling filters,
filters become inactive but are displayed in the Content Compliance Policies list.
To enable or disable a compliance policy
1In the Control Center, click Pol icies > Compliance.
2Check the box next to a compliance policy.
3Click Enable or Disable.
Managing Email Firewall policies
Symantec Mail Security for SMTP can detect patterns in incoming messages to
thwart certain types of spam and virus attacks. You can block and allow
messages based on email addresses, domains, or IP address. Messages can be
checked against Open Proxy Senders, Suspected Spammers, and Safe Senders
94 Configuring email filtering
Managing Email Firewall policies
lists maintained by Symantec. Sender authentication provides a way to block
forged email.
Configuring attack recognition
Symantec Mail Security for SMTP can detect the following types of attacks
originating from a single SMTP server (IP address).
Directory harvest
attacks
Spam attackA specified quantity of spam messages has been received
Virus attackA specified quantity of infected messages has been received
Spammers employ directory harvest attacks to find valid
email addresses at the target site. A directory harvest
attack works by sending a large quantity of possible email
addresses to a site. An unprotected mail server will simply
reject messages sent to invalid addresses, so spammers can
tell which email addresses are valid by checking the
rejected messages against the original list. By default,
connections received from violating senders are deferred.
from a particular IP address. By default, connections
received from violating senders are deferred.
from a particular IP address. By default, connections
received from violating senders are deferred.
Enable, disable, and configure attack recognition
Set up attack recognition as described in the following sections. All attack
recognition types are disabled by default, and must be enabled to be activated.
To enable or disable attack recognition
1In the Control Center, click Policie s > Attacks.
2Check the box next to each attack type that you want to enable or disable, or
check the box next to Attacks to select all attack types.
3Click Enable to enable the checked attack types, or click Disable to disable
the checked attack types.
To configure directory harvest, spam, and virus attack recognition
1In the Control Center, click Policie s > Attacks.
2Click Directory Harvest Attack, Spam Attack, or Virus Attack.
Managing Email Firewall policies
3Accept the defaults or modify the values under Attack Configuration:
Minimum percentage of ... Percentage of bad recipient, spam, or virus messages
from a single server that must be exceeded to trigger the
specified action. The minimum number must also be
exceeded.
Minimum number of ...Number of bad recipient, spam, or virus messages from
a single server that must be exceeded to trigger the
specified action. The minimum percentage must also be
exceeded.
Qualification time window Time period in which the specified percentage and
number of bad recipient, spam, or virus messages
violations must be exceeded to trigger the specified
action.
Penalty box timePeriod of time to perform the specified action against all
messages from the sending SMTP connection.
95Configuring email filtering
4Under Actions, accept the default, recommended action of Defer SMTP
Connection, or change and/or add more actions.
5Click Save.
Configuring sender groups
Filtering based on the source of the message, whether it’s the sender’s domain,
email address or mail server IP connection, can be a powerful way to fine-tune
filtering at your site.
Note: This section describes global Blocked and Allowed Senders Lists, which are
applied at the server level for your organization. Two other options are available
to give users the ability to maintain individual Blocked and Allowed Senders
Lists. You can enable personal Allowed and Blocked Senders Lists on the End
Users tab of the Edit Group page. See “Enabling and disabling end user settings”
on page 79.
Alternatively, you can deploy the Symantec Outlook Spam Plug-in. With the
Symantec Outlook Spam Plug-in, users can easily create personal lists of
blocked and allowed senders from within their Outlook mail client. The Plug-in
imports information from the Outlook address book to populate the personal
Allowed Senders List. See “Installing the Symantec Outlook Spam Plug-in” on
page 210.
96 Configuring email filtering
Managing Email Firewall policies
Symantec Mail Security for SMTP lets you customize spam detection in the
following ways:
■Define Allowed Senders
Symantec Mail Security for SMTP treats mail coming from an address or
connection in an Allowed Senders List as legitimate mail. As a result, you
ensure that such mail is delivered immediately to the inbox, bypassing any
other filtering. The Allowed Senders Lists reduce the small risk that
messages sent from trusted senders will be treated as spam or filtered in
any way.
■Define Blocked Senders
Symantec Mail Security for SMTP supports a number of actions for mail
from a sender or connection in a Blocked Senders List. As with spam
verdicts, you can use policies to configure a variety of actions to perform on
such mail, including deletion, forwarding, and subject line modification.
■Use the Sender Reputation Service
By default, Symantec Mail Security for SMTP is configured to use the
Sender Reputation Service. Symantec monitors hundreds of thousands of
email sources to determine how much email sent from these IP addresses is
legitimate and how much is spam. The service currently includes the
following lists of IP addresses, which are continuously compiled, updated,
and incorporated into Symantec Mail Security for SMTP filtering processes
at your site:
■Open Proxy Senders
IP addresses that are either open proxies used by spammers or
“zombie” computers that have been co-opted by spammers.
■Safe Senders
IP addresses from which virtually no outgoing email is spam.
■Suspected Spammers
IP addresses from which virtually all of the outgoing email is spam.
No configuration is required for these lists. You can choose to disable any of
these lists.
■Incorporate lists managed by other parties
Third parties compile and manage lists of desirable or undesirable IP
addresses. These lists are queried using DNS lookups. When you configure
Symantec Mail Security for SMTP to use a third-party sender list, Symantec
Mail Security for SMTP checks whether the sending mail server is on the
list. If so, Symantec Mail Security for SMTP performs a configured action,
based on the policies in place.
Managing Email Firewall policies
About Allowed and Blocked Senders Lists
Note the following about the Allowed Senders Lists and Blocked Senders Lists:
■Duplicate entries:
You cannot have the exact same entry in both a Blocked Senders List and an
Allowed Senders List of the same type. If an entry already exists in one list,
you will receive the message “Duplicate sender - not added” when you try to
add the same entry to the other list. If you’d prefer to have this entry in the
other list, first delete the entry from the list that now contains it, then add it
to the other list.
■Similar entries:
If you have two entries such as a@b.com and *@b.com in the two different
lists, the list with higher precedence “wins.” See “About precedence” on
page 71 for the precedence of each list.
■Performance impact of third party DNS lists:
Incorporating third party lists adds additional steps to the filtering process.
For example, in a DNS list scenario, for each incoming message, the IP
address of the sending mail server is queried against the list, similar to a
DNS query. If the sending mail server is on the list, the mail is flagged as
spam. If your mail volume is sufficiently high, running incoming mail
through a third party database could hamper performance because of the
requisite DNS lookups. Symantec recommends that you use the Sender
Reputation Service lists instead of enabling third party lists.
97Configuring email filtering
■To understand which list or other verdict has priority in message filtering
when more than one applies, see “About precedence” on page 71.
Reasons to use Allowed and Blocked Senders
Table 4-11 provides some examples of why you would employ lists of allowed or
blocked senders. The table also lists an example of a pattern that you as the
system administrator might use to match the sender:
Table 4-11Use cases for lists of allowed and blocked senders
ProblemSolutionPattern example
Mail from an end-user’s
colleague is occasionally
flagged as spam.
Desired newsletter from a
mailing list is occasionally
flagged as spam.
Add a colleague’s email address to the end
user’s Allowed Senders List.
Add the domain name used by the
newsletter to the domain-based Allowed
Senders List.
colleague@trustedco.com
newsletter.com
98 Configuring email filtering
Managing Email Firewall policies
Table 4-11Use cases for lists of allowed and blocked senders (Continued)
ProblemSolutionPattern example
An individual is sending
unwanted mail to people in
your organization.
Numerous people from a
specific range of IP addresses
are sending unsolicited mail to
people in your organization.
How Symantec Mail Security for SMTP identifies senders and
connections
The following sections provide details about the Allowed Senders Lists and
Blocked Senders Lists.
Supported Methods for Identifying Senders
You can use the following methods to identify senders for your Allowed Senders
Lists and Blocked Senders Lists.
■Domain-based: specify sender addresses or domain names
Symantec Mail Security for SMTP checks the following characteristics of
incoming mail against those in your lists:
Add the specific email address to the
domain-based Blocked Senders List.
After analyzing the received headers to
determine the sender's network and IP
address, add the IP address and net mask to
the IP-based Blocked Senders List.
Joe.unwanted*@getmail.com
218.187.0.0/255.255.0.0
■MAIL FROM: address in the SMTP envelope. Specify a pattern that
matches the value for localpart@domain in the address. You can use
the * or ? wildcards in the pattern to match any portion of the address.
■From: address in the message headers. Specify a pattern that matches
the value for localpart@domain in the
From: header. You can use
wildcards in the pattern to match any portion of this value.
If you choose to identify messages by address or domain name, see Table 4-
12 for examples.
Table 4-12Matches for email addresses or domain names
Symantec Mail Security for SMTP checks the IP address of the mail server
initiating the connection to verify if it is on your Allowed Senders Lists or
Blocked Senders Lists. Wildcards are not supported. Although you can use
network masks to indicate a range of addresses, you cannot use subnet
masks that define non-contiguous sets of IP addresses (e.g. 69.84.35.0/
255.0.255.0). Supported notations are:
■Single host: 128.113.213.4
■IP address with subnet mask: 128.113.1.0/255.255.255.0
■Classless Inter-Domain Routing (CIDR) IP address: 192.30.250.00/18
■Third party services: supply the lookup domain of a third party sender
service
Symantec Mail Security for SMTP can check messages sources against third
party DNS-based lists to which you subscribe, for example, list.example.org.
99Configuring email filtering
Automatic expansion of subdomains
When evaluating domain name matches, Symantec Mail Security for SMTP
automatically expands the specified domain to include subdomains. For
example, Symantec Mail Security for SMTP expands example.com to include
biz.example.com and, more generally, *@*.example.com, to ensure that any
possible subdomains are allowed or blocked as appropriate.
Logical connections and internal mail servers: non-gateway deployments
When deployed at the gateway, Symantec Mail Security for SMTP can reliably
obtain the physical or peer IP connection for an incoming message and compare
it to connections specified in the Allowed Senders Lists and Blocked Senders
Lists. If deployed elsewhere in your network, for example, downstream from the
gateway MTA, Symantec Mail Security for SMTP works with the logical IP
connection. Symantec Mail Security for SMTP determines the logical connection
by obtaining the address that was provided as an IP connection address when
the message entered your network. Your network is based on the internal
address ranges that you supply to Symantec Mail Security for SMTP when
setting up your Scanners. This is why it is important that you accurately identify
all the internal mail hosts in your network. For more information, see
“Advanced SMTP settings” on page 25.
Adding senders to Blocked Senders Lists
To prevent undesired messages from being delivered to inboxes, you can add
specific email addresses, domains, and connections to your Blocked Senders
Lists.
100 Configuring email filtering
Managing Email Firewall policies
To add domain-based, IP-based, and Third Party Services entries to your
Blocked Senders Lists
1In the Control Center, click Policie s > Sender Groups.
2Click one of the Blocked Sender groups.
3Click Add.
4On the Add Sender GroupMembers page, supply the information
appropriate for the current Blocked Sender group.
See “How Symantec Mail Security for SMTP identifies senders and
connections” on page 98.
5Click Save.
6Modify the default action for messages originating from blocked senders
(Delete the message) if desired.
7Click Save on the Edit Sender Group page.
Adding senders to Allowed Senders Lists
To ensure that messages from specific email addresses, domains, and
connections are not treated as spam, you can add them to your Allowed Senders
Lists.
To add domain-based, IP-based, and Third Party Services entries to your
Allowed Senders Lists
1In the Control Center, click Policie s > Sender Groups.
2Click one of the Allowed Sender groups.
3Click Add.
4In the Add Sender GroupMembers page, supply the information appropriate
for the current Allowed Sender group.
See “How Symantec Mail Security for SMTP identifies senders and
connections” on page 98.
5Click Save.
6Modify the default action for messages originating from allowed senders
(Deliver message normally) if desired.
7Click Save on the Edit Sender Group page.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.