38
Trend Micro Hosted Email Security Administrator’s Guide
ii
Disabling Hosted Email Security ...........................................................2-10
Logging on to the Administrative Console ...............................................2-10
Logging on for the First Time ................................................................2-10
Using the Hosted Email Security Web Console .......................................2-12
Reports ............................................................................................................2-13
Traffic Tab .................................................................................................2-15
Size Tab ......................................................................................................2-18
Threats Tab ...............................................................................................2-19
Details Tab ................................................................................................2-21
Top Spam Tab ..........................................................................................2-26
Top Virus Tab ...........................................................................................2-27
Chapter 3: Managing Policies
Policy Overview ...............................................................................................3-2
Default Policy Settings ...................................................................................3-4
Content Filtering .............................................................................................3-7
Filtering Content with Keywords ............................................................3-7
Filtering Content with Regular Expressions ........................................3-10
Weighting Keyword Expression Lists ..............................................3-12
Rule Actions ...................................................................................................3-14
Delete Entire Message .............................................................................3-14
Deliver the Message Now .......................................................................3-14
Quarantine the Message ..........................................................................3-16
Clean Cleanable Virus and Delete Those That Cannot Be Cleaned 3-16
Delete Matching Attachments ................................................................3-17
Insert a Stamp in the Mail Body .............................................................3-17
Tag the Subject Line ................................................................................3-18
Send a Notification Message ..................................................................3-18
BCC Another Recipient ..........................................................................3-19
Reject the Message ...................................................................................3-19
Bypass a Rule ............................................................................................3-20
Encrypt Email Message ...........................................................................3-20
Reading an Encrypted Email .............................................................3-21
Execution Order of Rules ............................................................................3-25
Intercept Actions ......................................................................................3-25
Important Note About the Deliver Now Action ...........................3-25
Modify Actions .........................................................................................3-26
37
Contents
iii
Monitor Actions .......................................................................................3-26
Scan Limitations .......................................................................................3-27
Email Encryption Action ........................................................................3-27
Adding and Modifying Rules ......................................................................3-27
Adding a New Rule ..................................................................................3-27
Editing an Existing Rule .........................................................................3-35
Copying an Existing Rule .......................................................................3-37
Deleting an Existing Rule .......................................................................3-37
Chapter 4: Approved Senders, Quarantine, and Logs
Approved Senders .......................................................................................... 4-2
Quarantine ....................................................................................................... 4-3
Quarantine Query ...................................................................................... 4-3
Quarantine Settings ................................................................................... 4-4
Approving Messages or Senders From Within the Spam Digest Email
(Inline Action) ......................................................................... 4-4
Web End-User Quarantine ..........................................................................4-13
End-User Password Reset ......................................................................4-13
Logs ................................................................................................................. 4-14
Mail Tracking Details ..............................................................................4-15
Chapter 5: Administration and IP Reputation
IP Reputation Settings ................................................................................... 5-2
Using the Dynamic Reputation Slider ....................................................5-3
Adjusting the IP Exclusion Settings ........................................................5-4
IP Exclusion Section ............................................................................ 5-4
Valid Mail Servers ................................................................................. 5-5
Selecting Standard IP Reputation Lists .................................................. 5-5
Approved and Blocked Lists for IP Reputation ...................................5-6
Block All Countries Except ................................................................. 5-7
Troubleshooting IP Reputation Settings ................................................5-9
Administration ...............................................................................................5-10
Changing Passwords ................................................................................5-10
Changing the Admin Password ........................................................5-11
Resetting an End-User Password for the Web EUQ ....................5-12
Managing Directories ..............................................................................5-12
Directory Management Notes ...........................................................5-13
38
Trend Micro Hosted Email Security Administrator’s Guide
iv
Verifying Your User Directory ...............................................................5-15
Managing Domains ..................................................................................5-16
About Domain Status .........................................................................5-16
Adding a Domain ................................................................................5-17
Confirming Mail Delivery Through the Service .............................5-19
Modifying a Domain ...........................................................................5-19
Resuming Suspended Domains .........................................................5-21
Co-Branding ..............................................................................................5-21
Logo Specifications .............................................................................5-21
Co-branding the Administrative Console ........................................5-22
Co-Branding the Web EUQ Interface .............................................5-23
Accessing a Co-Branded Site .............................................................5-26
Web Services .............................................................................................5-27
Downloading the Hosted Email Security Web Services Guide ...5-28
Viewing the Service Level Agreement ..................................................5-29
Remote Management ...............................................................................5-31
License Modes ..........................................................................................5-33
Appendix A: Frequently Asked Questions
What is Trend Micro™ Hosted Email Security? .......................................A-1
What are the advantages of a hosted email security service? ...................A-1
Do I need to buy/upgrade any hardware or software? ............................A-1
How much does the service cost? ................................................................A-2
How confidential is this service? .................................................................A-2
Why should I trust Trend Micro with my email? ......................................A-2
What do I need in order to use this service? ..............................................A-2
How do I begin using the service? ...............................................................A-3
How do I redirect my email/mail exchange record? ................................A-3
How do I accept mail from the service? .....................................................A-3
Why does the status of my domain stay at "Verifying"? ..........................A-4
Can I try the service on a limited number of users? .................................A-4
Will delivery of my email be delayed as a result of this service? .............A-4
Does Trend Micro store/archive email? .....................................................A-4
How do I reset or resend an end-user password for the Web EUQ? ....A-5
What happens to my messages if my mail server is unavailable for a period
of time? ....................................................................................................A-5
Where does my outgoing email go? .............................................................A-5
28
Contents
v
Can resellers and end user customers still log on using existing credentials?
A-6
How can I change a managed domain name? ........................................... A-6
How do I use the "Test Email" feature? .................................................... A-6
Why is the domain management screen disabled? .................................... A-6
What happens when my license expires? ................................................... A-7
Appendix B: Contact Information and
Web-Based Resources
Contacting Technical Support ......................................................................B-2
General Contact Information ..................................................................B-3
Supported Performance Levels ................................................................B-3
Service Availability ................................................................................B-3
Email Delivery .......................................................................................B-3
Knowledge Base .........................................................................................B-4
Sending Suspicious Code to Trend Micro .............................................B-4
TrendLabs ...................................................................................................B-7
Security Information Center ........................................................................B-7
Appendix C: Introducing Web EUQ
Accessing the Web End User Quarantine ..................................................C-2
Creating an Account .......................................................................................C-2
Logging on to Hosted Email Security Web End User Quarantine .........C-4
Working with Quarantined Spam .................................................................C-4
Using the Approved Senders Screen ...........................................................C-6
Changing Your Password ..............................................................................C-8
Glossary
Index
2
Trend Micro Hosted Email Security Administrator’s Guide
vi
Documents you may be interested
Documents you may be interested