57
Threat Type
Selected
Column
Label
Description
Virus
Virus
Displays the type of virus detected in the email
Spam
Spam Score
Displays a score that indicates how likely that the email is spam.
•
A spam score of 90% - 98.9% is considered “medium”
likelihood if default settings are used.
•
A spam score of 99% or higher is considered “high” likelihood
if default settings are used.
Email Protection anti-spam filtering uses a large number of
filtering processes, as well as sophisticated statistical classification
techniques, as part of its Stacked Classification Framework® to
determine the score. If you specified an additional Realtime
Blackhole List (RBL) in the Anti-Spam window of the assigned
policy, the RBL can influence the spam score as well.
Note: Occasionally, some emails might be marked as spam when in
fact they are legitimate emails. For these “false positive” email
messages, you can help Email Protection “tune” the spam
thresholds and rules by sending a forwarded copy of the email with
all content and attachments to falsepositive@mxlogic.com.
Attachment
Attachment
Displays the name of an attachment that was included in the email
message and violates attachment rules (size, file typ, zip file
attachments) as defined on the Attachment windows of the
assigned policy. If a message contains more than one delinquent
attachment, the first attachment found in the message is listed. You
can check to see all attachments by opening the message.
Content
Keyword
Displays Content to indicate that the email that violated a content
policy, as defined in the Content Groups window for the assigned
policy. You can see what keywords were violated by opening the
message and checking the Status line.
All Threats
Type
Displays the type of threat filtering that the email violated.
Monitor Users’ Quarantined Email
Email Protectionr Administrator Guide
96
Proprietary: Not for use or disclosure outside McAfee without written permission.
November 2012
Sort the Search Results
You can sort the search results according to any of the columns in the Search Results
section.
1 Click on the heading of the column you want to sort.
You have the choice of sorting the messages in ascending or descending order of the
values in the column.
2 Click Sort Ascending or Sort Descending.
How to C#: Basic SDK Concept of XDoc.PDF for .NET C# programmers can convert Word, Excel, PowerPoint Tiff, Jpeg, Bmp, Png, and Gif to PDF document. This class describes bookmarks in a PDF document.
add bookmarks to pdf reader; create bookmark pdf file
35
Email Protectionr Administrator Guide
Monitor Users’ Quarantined Email
November 2012
Proprietary: Not for use or disclosure outside McAfee without written permission
97
3 To hide columns in the results, move your cursor over the Columns menu item and
Select select or deselect the columns you want to display in your sorted list.
4 To move columns around so they are displayed in a different left-to-right sequence,
perform the following steps:
A Place your cursor on the column you want to move.
B Click and hold the mouse button.
C Drag the column to a different location.
Delete Quarantined Messages
Email Protection deletes each message automatically if the messages stays in quarantine
for more than seven days. However, you can immediately delete quarantined email listed
in the Quarantine Search Results in one of two ways:
• Highlight each email in the list and click Delete.
• Click Delete All, which deletes all email in the Search Results list.
Release Quarantined Messages
By releasing a quarantined email message, you remove the message from quarantine and
send the email to the mailbox of the recipient’s primary email address. You can release
email in one of two ways:
• Select each email you want to release, and click Release.
The email is removed from quarantine and sent to the recipient mailbox or mailboxes.
• Select email you want to release, and click the Always Allow for User.
The email is removed from quarantine and sent to the recipient mailbox or mailboxes.
This option also adds the sender address of each selected message to the Allow list of
the associated recipient.
Caution: Releasing emails that contained worms or viruses can potentially allow the
recipients’ machines to be infected.
View Quarantines Messages
Email Protection allows you to view a quarantined message without risk of infection by
any malicious virus or attachments. To view a message in the quarantine:
1 Double-click the message you want to view.
The message opens in a new tab with the subject heading.
VB.NET PDF: Basic SDK Concept of XDoc.PDF VB.NET programmers can convert Word, Excel, PowerPoint Tiff, Jpeg, Bmp, Png, and Gif to PDF document. This class describes bookmarks in a PDF document.
how to add bookmarks to pdf document; bookmark pdf documents
18
Monitor Users’ Quarantined Email
Email Protectionr Administrator Guide
98
Proprietary: Not for use or disclosure outside McAfee without written permission.
November 2012
2 Check the email for any of the following, depending on the Threat type:
If the Threat type is Spam, check the subject line and body of the message, as well as
the Status line for the spam score.
If the Threat type is Content, check the Status line for the word or words that violated
the content filter.
If the Threat type is Attachment, check the Attachments list for size and/or type of
file or for html code violations. The Content Type is based on the MIME protocol.
If the Threat type is Virus, check the Virus list for the viruses found.
3 Note the IP address listed in the message. This address is the last hop the message took
prior to delivery to Email Protection. The IP address can be useful in tracking the path
of a message and can help identify spoofed senders.
4 After checking a message, do one of the following:
• Delete the message as described in Delete Quarantined Messages.
21
Email Protectionr Administrator Guide
Monitor Users’ Quarantined Email
November 2012
Proprietary: Not for use or disclosure outside McAfee without written permission
99
• Release the message as described in Release Quarantined Messages.
• Close the message by clicking the X in the tab at the top of the message.
Monitor Your Own Quarantine
You can check your own messages in quarantine and take the same actions on those
messages that you do on other users. To access your own quarantined messages, perform
the following steps:
1 Click Email Protection | Quarantine.
2 Click My Spam.
Your message quarantine is displayed.
3 Perform any of the following tasks:
• Search for Quarantined Email
• Interpret the Search Results
• Sort the Search Results
• Delete Quarantined Messages
• Release Quarantined Messages
• View Quarantines Messages
5
Monitor Users’ Quarantined Email
Email Protectionr Administrator Guide
100
Proprietary: Not for use or disclosure outside McAfee without written permission.
November 2012
39
Email Protection Administrator Guide
Administer Disaster Recovery Services
November 2012
Proprietary: Not for use or disclosure outside McAfee without written permission
101
8. Set up Disaster Recovery
Services
Administer Disaster Recovery
Services
Disaster Recovery Services consists of one of two services:
• Fail Safe — Fail Safe saves messages for later delivery if your mail server becomes
unavailable. When your mail server becomes available, Fail Safe delivers the
messages. Users cannot access their messages while messages are in Fail Safe only.
Fail Safe has an unlimited amount of storage capacity but removes messages that have
been in Fail Safe storage for more than 5 days.
• Email Continuity — Email Continuity saves messages for later delivery if your mail
server becomes unavailable. When your mail server becomes available, Email
Continuity delivers the messages. Users can access their messages through a Web-
based interface while messages are in Email Continuity only.
Email Continuity also has unlimited storage capacity and removes messages that have
been in Email Continuity storage for more than 60 days.
Set up Spooling for Disaster Recovery
1 Click Email Protection | Setup | Disaster Recovery.
2 From the Domain drop-down menu, select the domain you want to set up for Disaster
Recovery.
3 In the Configuration Settings section, select one of the following options:
• Automatic — This option automatically spools all incoming email when Email
Protection detects a loss of connectivity with your email server(s). With this
option, you must also specify how long Email Protection should wait after
connectivity is lost to begin spooling.
Note: Be aware that it may take several minutes to determine that your inbound
server is unavailable. During this time, and during the time delay, received emails
can be tempfailed if your inbound server is unavailable
• Manual — This option allows you to start and stop Disaster Recovery spooling
manually for planned email server outages such as server maintenance.
When necessary, you then select Start Spooling to initiate manual spooling; and
select Stop Spooling to stop it.
Note: It may take a few minutes for manual spooling of incoming mail to start and
stop.
28
Administer Disaster Recovery Services
Email Protection Administrator Guide
102
Proprietary: Not for use or disclosure outside McAfee without written permission.
November 2012
4 If you selected the Manual option, check the Deliver spooled email when
connectivity is available box to deliver spooled email when connectivity to the email
server(s) is restored.
5 If your service includes Email Continuity, check the checkbox Allow users to use
Email Continuity to set the default permission for users to get messages through
Email Continuity. This setting applies to the domain. You can override this setting on
the Disaster Recovery window under Policies if you have some groups that you don’t
want to allow access.
Set up Notifications of Disaster Recovery
You can specify that notifications are emailed automatically to designated recipients,
typically yourself or other administrators, when the following Disaster Recovery events
occur:
• Automatic spooling has started
• Automatic unspooling has started
• Automatic or manual unspooling has completed.
1 Under the Notifications section of the Disaster Recovery Setup window, type, in the
Recipient Email Address field, the email address of a person who should receive
notification of a disaster recovery event.
Note: In order to minimize the possibility that Disaster Recovery notifications cannot
be delivered to listed recipients, it is recommended that notifications be sent to email
addresses associated with cell phones or pagers.
2 Click Add.
3 Repeat steps 1 and 2 for up to three more notification recipients.
Documents you may be interested
Documents you may be interested