Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
0Activity
×

Table Of Contents

Technical Support
■About Symantec Mail Security for Microsoft Exchange
About Symantec Mail Security for Microsoft Exchange
What’s new in Symantec Mail Security
Components of Symantec Mail Security
How Symantec Mail Security works
What you can do with Symantec Mail Security
Manage your Exchange environment using policies
Scan your Exchange server for risks and violations
Protect against threats
Keep your protection up-to-date
Identify spam email
Filter undesirable message content
Save messages to a folder for archiving
Manage outbreaks
Quarantine infected message bodies and attachments
Monitor Symantec Mail Security events
Generate reports
Send notifications when a threat or violation is detected
Manage single and multiple Exchange servers
Where to get more information about Symantec Mail Security
■Before you install
Before you install
See“Software component locations” on page30
Software component locations
About installing Symantec Mail Security
Installing Symantec Mail Security on a local server
About installing Symantec Mail Security on remote servers
Customizing remote server installation settings
Installing the Symantec Mail Security console only
About installing Symantec Mail Security in a Microsoft Cluster
Configuring the cluster resource
To configure the cluster resource
Post-installation tasks
About setting up impersonation privileges on the IWAM account
Restarting the IIS
To restart the IIS
Implementing SSL communications
Accessing the Symantec Mail Security console
To access the Symantec Mail Security console
Sidebar
About using Symantec Mail Security with other antivirus products
Setting scanning threads and number of scan processes
To set scanning threads and number of scan processes
Migrating to version 5.0.3
Uninstalling Symantec Mail Security
■About licensing
About licensing
How to activate a license
If you do not have a serial number
Obtaining a license file
See“If you do not have a serial number” on page65
See“Obtaining a license file” on page65
About the Symantec Premium AntiSpam license file
Installing license files
Checking the license status of a server
To check the license status of a server
If you want to renew a license
■About managing your Exchange servers
About managing your Exchange servers
Deploying settings to a server or group
User-defined
How to manage servers and server groups
■Modifying or viewing server or server group settings
Modifying or viewing server or server group settings
To modify or view server or server group settings
Viewing the status of a server
Creating a server group
Adding servers to a group
To add servers to a group
Moving a server to another group
Move a server to another group
Synchronizing group settings to a server
To synchronize group settings to a server
Restoring default settings to a server or group
To restore default settings to a server or group
Removing a server from group management
To remove a server from group management
Removing a server group
Importing and exporting settings
Modifying the port and communication properties of a server
To modify the port and communication properties of a server
■About the quarantine
About the quarantine
Forwarding quarantined items to the Quarantine Server
To forward quarantined items to the Quarantine Server
Establishing local quarantine thresholds
To establish local quarantine thresholds
Viewing the contents of the local quarantine
Release messages from the quarantine
■Releasing messages from the quarantine by email
Releasing messages from the quarantine by email
To release messages from the quarantine by email
Releasing messages from the quarantine to a file
To release messages from the quarantine to a file
Deleting an item from the quarantine
To delete an item from the quarantine
■About protecting your server from risks
About protecting your server from risks
How Symantec Mail Security detects risks
Configuring threat detection
To configure threat detection
Configuring security risk detection
Configuring file scanning limits
Configuring rules to address unscannable container files
To configure rules to address unscannable container files
■About spam detection
About spam detection
How Symantec Mail Security detects and processes spam
See“About spam confidence level (SCL) values” on page110
About spam confidence level (SCL) values
Configuring the Store Action Threshold (SAT) setting
Blocking spam using real-time blacklists
To block spam using real-time blacklists
Configuring whitelists
How to detect spam using Symantec Premium AntiSpam
How the Symantec Premium AntiSpam service works
About spam foldering
About registering Symantec Premium AntiSpam through an ISA server
Configuring your proxy server to download spam definition updates
About the Symantec Spam Folder Agent for Exchange
About the Symantec Spam Plug-in for Outlook
Configuring Symantec Premium AntiSpam to identify spam
What you can do with spam and suspected spam messages
Processing suspected spam messages that exceed a SCL threshold
Configuring heuristic antispam protection
■About filtering content
About filtering content
About default content filtering rules
About content evaluation
Elements of a content filtering rule
See“About regular expressions” on page150
About regular expressions
Working with match lists
See“About DOS wildcard style expressions” on page154
Working with content filtering rules
■Specifying inbound SMTP domains
Specifying inbound SMTP domains
Enabling or disabling content filtering for auto-protect scanning
To enable or disable content filtering for auto-protect scanning
Creating a new rule
Editing an existing rule
About configuring a content filtering rule
See“Specifying a rule name and description” on page160
Configuring rule conditions
Specifying the users and groups in which the rule applies
Prioritizing content filtering rules
To prioritize content filtering rules
Deleting a content filtering rule
To delete a content filtering rule
Refreshing the Active Directory groups cache
To refresh the Active Directory groups cache
How to enforce email attachment policies
Blocking attachments by file name
See“Blocking attachments by file name” on page170
Configuring multimedia file detection
Configuring executable file detection
To configure executable file detection
About the scanning process
Configuring auto-protect scanning
To configure auto-protect scanning
About manual scans
See“Configuring the manual scan parameters” on page180
Configuring the manual scan parameters
Configure the manual scan parameters
Running a manual scan
Viewing manual scan results
About scheduling a scan
See“Creating a scheduled scan” on page183
See“Editing a scheduled scan” on page184
See“Deleting a scheduled scan” on page187
Creating a scheduled scan
Editing a scheduled scan
See“Enabling a scheduled scan” on page187
See“Configuring scheduled scan options” on page184
Configuring scheduled scan options
Enabling a scheduled scan
Deleting a scheduled scan
Configuring notification settings for scan violations
To configure notification settings for scan violations
■About outbreak management
About outbreak management
What defines an outbreak
About outbreak triggers
Enabling outbreak management
To enable outbreak management
Configuring outbreak triggers
To configure outbreak triggers
See“Configuring outbreak notifications” on page194
Configuring outbreak notifications
To configure outbreak notifications
Clearing outbreak notifications
To clear outbreak notifications
■About logging events
About logging events
Viewing the Symantec Mail Security Event log
Specifying the duration for storing data in the Reports database
Purging the Reports database
To purge the Reports database
About report templates
About report output formats
Microsoft Excel
Creating or modifying a Summary report template
Creating or modifying a Detailed report template
Deleting a report template
To delete a report template
What you can do with reports
■Generating a report on demand
Generating a report on demand
To generate a report on demand
Accessing a report
from the Symantec Mail Security Reports folder
Printing a report
To print a report
Saving report data
Deleting a report
Resetting statistics
■About keeping your server protected
About keeping your server protected
Configuring a proxy server to permit LiveUpdate definitions
About setting up your own LiveUpdate server
How to update definitions
See“Updating definitions on demand” on page220
Updating definitions on demand
To update definitions on demand
Scheduling definition updates
To schedule definition updates
Distributing definitions to multiple servers
To distribute definitions to multiple servers
Using variables to customize alerts and notifications
About alert and notification variables
■About SESA
About SESA
Interpreting Symantec Mail Security events in SESA
Configuring logging to SESA
Configuring SESA 2.1 to recognize Symantec Mail Security
To configure SESA 2.1 to recognize Symantec Mail Security
Configuring SESA 2.5 to recognize Symantec Mail Security
Installing the local SESA Agent
Updating the Windows hosts file to log events to SESA 2.5
To update the Windows hosts file to log events to SESA 2.5
Configuring Symantec Mail Security to log events to SESA
To configure Symantec Mail Security to log events to SESA
About uninstalling SESA
About uninstalling the SIP
About uninstalling the SESA Agent
Index
0 of .
Results for:
No results containing your search query
P. 1
SymanteMailSecurity 5.0 Implementation Guide

SymanteMailSecurity 5.0 Implementation Guide

Ratings: (0)|Views: 593|Likes:
Published by imijovic
Guide
Guide

More info:

Published by: imijovic on Feb 12, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

02/12/2013

pdf

text

original

You're Reading a Free Preview
Pages 5 to 30 are not shown in this preview.
You're Reading a Free Preview
Pages 35 to 140 are not shown in this preview.
You're Reading a Free Preview
Pages 145 to 204 are not shown in this preview.
You're Reading a Free Preview
Pages 209 to 238 are not shown in this preview.
You're Reading a Free Preview
Pages 243 to 244 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->