User manual SONICWALL EMAIL SECURITY SOFTWARE ADMINISTRATOR GUIDE 7.3

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual SONICWALL EMAIL SECURITY SOFTWARE. We hope that this SONICWALL EMAIL SECURITY SOFTWARE user guide will be useful to you.


SONICWALL EMAIL SECURITY SOFTWARE ADMINISTRATOR GUIDE 7.3: Download the complete user guide (8001 Ko)

Manual abstract: user guide SONICWALL EMAIL SECURITY SOFTWAREADMINISTRATOR GUIDE 7.3

Detailed instructions for use are in the User's Guide.

[. . . ] SonicWALL® Email Security Software Administrator Guide Version 7. 3 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1. 408. 745. 9600 Fax: +1. 408. 745. 9300 E-mail: info@sonicwall. com Part Number: 232-001975-00 Rev A SonicWALL® Email Security Software Administrator's Guide Version 7. 3 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1. 408. 745. 9600 Fax: +1. 408. 745. 9300 E-mail: info@sonicwall. com Copyright Notice © 2010 SonicWALL, Inc. Under the copyright laws, this manual or the software described within, can not be copied, in whole or part, without the written consent of the manufacturer, except in the normal use of the software to make a backup copy. The same proprietary and copyright notices must be affixed to any permitted copies as were affixed to the original. This exception does not allow copies to be made for others, whether or not sold, but all of the material purchased (with all backup copies) can be sold, given, or loaned to another person. [. . . ] Email is sent that appears to come from your organization can damage your community image and hurt your customers in the following ways: Spoofed email can ask customers to confirm their personal information. Spoofed email can ask customers to download new software releases, which are bogus and infected with viruses. Preventing Phishing Phishing harms organizations and consumers by raising the price of doing business, which raises the cost of goods and services. SonicWALL Email Security prevents phishing through: Adapting SonicWALL Email Security's spam-fighting heuristics to phishing Divergence DetectionTM--ensures that all contact points are legitimate. Contact points include email addresses, URLs, phone numbers, and physical addresses. Sender ID or Sender Policy Framework (SPF)--a system that attempts to validate that a message is from the domain from which it purports to be. Sender ID authenticates that the domain from which the sender's message reports matches one of the IP addresses published by that domain. SonicWALL Email Security factors Sender ID pass or fail into its junk algorithm. For more information about Sender ID, see "Authenticating the Sender's Domain via Sender ID" on page 42. SonicWALL Email Security Administrator's Guide|48 Configuring Phishing Protection To configure SonicWALL Email Security to screen for phishing: 1. Navigate to the Anti-Phishing page. Click the radio button to choose which action to take for messages that contain Phishing. Click the radio button to choose which action to take for messages that contain Likely Phishing. Check the Allow users to unjunk phishing messages checkbox if you want to allow users to unjunk fraudulent messages. Enter one or more email addresses of people designated to receive proactive phishing alerts. To send copies of fraudulent email messages to a person or people designated to deal with them, enter the recipients' email addresses in the Send copies of emails containing phishing attacks to the following email addresses text box. Click Apply Changes. Use SonicWALL Email Security's Community to Alert Others Phishing is continuously evolving and adapting to weaknesses in the organization's network. Malicious hackers use any known weakness to infiltrate the corporate firewall. SonicWALL Email Security has tuned and enhanced their spam-management techniques to prevent phishing. SonicWALL Email Security also collects incidences of phishing and summarizes the email addresses, text, phone numbers, and domains of phishing perpetrators in a database, which stores the thumbprints of the phishing message. Report Phishing and Other Enterprise Fraud to SonicWALL Email Security SonicWALL Email Security alerts organizations to phishing attacks. SonicWALL Email Security needs you to report fraudulent email messages to mailto:fraud@sonicwall. com. Reporting phishing enables SonicWALL Email Security to alert other users to the phishing attacks you experienced. CHAPTER 4 Anti-Virus Techniques SonicWALL Email Security's Anti-Virus modules protect your organization from inbound emailborne viruses and prevent your employees from sending viruses with outbound email. Once SonicWALL Email Security has identified the email message or attachment that contains a virus or is likely to contain a virus, you choose how to manage the virus-infected email. Optional virus-protection modules for the entire organization are available. How Virus Checking Works The Anti-Virus modules use virus-detection engines to scan email messages and attachments for viruses, Trojan horses, worms, and other types of malicious content. The virus-detection engines receive periodic updates to keep them current with the latest definitions of viruses. [. . . ] The Profiler can be configured to work with each supported email client. Similar to a Honeypot, an account that is established on the Internet for the sole purpose of collecting spam and tracking hackers. A list of Internet TCP/IP addresses known to send spam, or by hosts considered friendly to spam. An SMTP proxy placed in the email flow, and performs a spam analysis to determine whether email is good or junk. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE SONICWALL EMAIL SECURITY SOFTWARE




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual SONICWALL EMAIL SECURITY SOFTWARE will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.