Anda di halaman 1dari 58

Addendum

Administration Guide
for IronMail 6.5.4
Copyright
© 2008 Secure Computing Corporation. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
retrieval system, or translated into any language in any form or by any means without the written permission of Secure Computing Corporation.

Trademarks
Secure Computing, SafeWord, Sidewinder, Sidewinder G2, Sidewinder G2 Firewall, SmartFilter, Type Enforcement, CipherTrust, IronMail,
IronIM, SofToken, Enterprise Strong, Mobile Pass, G2 Firewall, PremierAccess, SecureSupport, SecureOS, Bess, Cyberguard, SnapGear, Total
Stream Protection, Webwasher, Strikeback and Web Inspector are trademarks of Secure Computing Corporation, registered in the U.S. Patent
and Trademark Office and in other countries. G2 Enterprise Manager, SmartReporter, SecurityReporter, Application Defenses, Central
Management Control, RemoteAccess, SecureWire, TrustedSource, On-Box, Securing connections between people, applications and networks
and Access Begins with Identity are trademarks of Secure Computing Corporation.

Software license agreement


CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS BEFORE LOADING THE SOFTWARE. THIS AGREEMENT GOVERNS
THE USE OF THE SOFTWARE (AS DEFINED BELOW). BY CLICKING “I ACCEPT” BELOW, OR BY INSTALLING, COPYING, OR
OTHERWISE USING THE SOFTWARE, YOU ARE SIGNING THIS AGREEMENT, THEREBY BECOMING BOUND BY ITS TERMS. BY
INDICATING YOUR AGREEMENT, YOU ALSO REPRESENT AND WARRANT THAT YOU ARE A DULY AUTHORIZED REPRESENTATIVE
OF THE ENTITY THAT HAS PURCHASED THE SOFTWARE AND THAT YOU HAVE THE RIGHT AND AUTHORITY TO ENTER INTO THIS
AGREEMENT ON THE ENTITY’S BEHALF. IF YOU DO NOT AGREE WITH THIS AGREEMENT, THEN CLICK “I DO NOT ACCEPT” BELOW
OR DO NOT USE THE SOFTWARE AND RETURN ALL COPIES OF THE SOFTWARE AND DOCUMENTATION TO SECURE COMPUTING
CORPORATION (“SECURE COMPUTING”) OR THE RESELLER FROM WHOM YOU OBTAINED THE SOFTWARE.
1. DEFINITIONS. “Documentation” means the published user manuals and documentation that are made available for the Software. “Secure
Computing Software” means the machine-readable object-code versions of certain Secure Computing messaging gateway software applications
(for example, without limitation, IronMail, IronIM, IronNet and Secure Computing Edge) as indicated on your invoice and any updates or revisions
of the Secure Computing Software that you may receive. “Software Module” shall mean software applications that Secure Computing licenses to
its customers in addition to the Secure Computing Software (for example, without limitation, anti-virus software) as indicated on your invoice and
any updates or revisions of the Software Module that you may receive. “Software” shall mean collectively the Secure Computing Software and, if
purchased by you, the Software Module(s).
2. GRANT OF LICENSE. Secure Computing grants to you, and you accept, (a) a non-exclusive, and non-transferable license to use the Secure
Computing Software solely on and in conjunction with the Secure Computing appliance on which the Secure Computing Software is installed,
and, if purchased by you, (b) a non-exclusive, non-transferable license to use the Software Module(s) for a specific period of time and for the
specific number of licensed users as each is indicated on your invoice solely on and in conjunction with the Secure Computing appliance on
which the Software Module is installed. Under no circumstances will you receive any source code of the Software. Secure Computing also grants
to you, and you accept, a non-exclusive, and non-transferable license to use the Documentation solely in conjunction with the Software.
3. LIMITATION OF USE. You may not: 1) copy, except to make one copy of the Software solely for back-up or archival purposes; 2) transfer,
distribute, rent, lease or sublicense all or any portion of the Software or Documentation to any third party; 3) translate, modify, adapt, decompile,
disassemble, or reverse engineer any Software in whole or in part; 4) modify or prepare derivative works of the Software or the Documentation;
or 5) use the Software to process the data of a third party. You agree to keep confidential and use your best efforts to prevent and protect the
contents of the Software and Documentation from unauthorized disclosure or use. Secure Computing reserves all rights that are not expressly
granted to you.
4. DISCLAIMER OF WARRANTIES. Secure Computing does not warrant that the functions contained in the Software will meet your
requirements or that operation of the program will be uninterrupted or error-free. The entire risk as to the results and performance of the Software
is assumed by you. THE SOFTWARE IS FURNISHED, “AS IS” WITHOUT ANY WARRANTY OF ANY KIND, AND SECURE COMPUTING
AND ITS LICENSORS HEREBY DISCLAIM ALL WARRANTIES, EXPRESS, IMPLIED OR STATUTORY IN RESPECT OF THE SOFTWARE
INCLUDING, WITHOUT LIMITATION, ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE,
AND ANY WARRANTIES AS TO NON-INFRINGEMENT. SOME STATES AND COUNTRIES DO NOT ALLOW THE EXCLUSION OF IMPLIED
WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU
MAY HAVE OTHER RIGHTS WHICH VARY BY STATE OR COUNTRY.
5. LIMITATION OF REMEDIES. SECURE COMPUTING’S AND ITS LICENSORS ENTIRE LIABILITY UNDER, FOR BREACH OF, OR ARISING
OUT OF THIS AGREEMENT, IS LIMITED TO A REFUND OF THE PURCHASE PRICE OF THE PRODUCT OR SERVICE THAT GAVE RISE
TO THE CLAIM. IN NO EVENT SHALL SECURE COMPUTING OR ITS LICENSORS BE LIABLE FOR YOUR COST OF PROCURING
SUBSTITUTE GOODS. IN NO EVENT WILL SECURE COMPUTING OR ITS LICENSORS BE LIABLE FOR ANY INDIRECT, SPECIAL,
CONSEQUENTIAL, INCIDENTAL, EXEMPLARY, OR OTHER DAMAGES WHETHER OR NOT SECURE COMPUTING HAS BEEN ADVISED
OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
6. TERM AND TERMINATION. This license is effective until terminated. You may terminate it at any time by destroying the Software, including
all computer programs and Documentation, and erasing any copies residing on computer equipment. This Agreement also will automatically
terminate if you do not comply with any terms or conditions of this Agreement. Upon such termination you agree to destroy the Software and
Documentation and erase all copies of the Software residing on computer equipment. Notwithstanding the foregoing, each license to use a
Software Module will automatically terminate on expiration of its applicable term (as set forth on your invoice) unless it is renewed prior to such
termination.
7. PROTECTION OF CONFIDENTIAL INFORMATION. The Software and Documentation are delivered to you on a confidential basis and you
are responsible for employing reasonable measures to prevent the unauthorized disclosure or use thereof, which measures shall not be less
than those measures employed by you in protecting your own proprietary information. You may disclose the Software or Documentation to your
employees as necessary for the use permitted under this Agreement. You shall not remove any trademark, trade name, copyright notice or other
proprietary notice from the Software or Documentation.
8. OWNERSHIP. The Software and Documentation are licensed (not sold) to you. All intellectual property rights including trademarks, service
marks, patents, copyrights, trade secrets, and other proprietary rights in or related to the Software and Documentation are and will remain the
property of Secure Computing or its licensors, whether or not specifically recognized or protected under local law. You will not remove any
product identification, copyright notices, or other legends set forth on the Software or Documentation.

i
9. EXPORT RESTRICTIONS. You agree to comply with all applicable United States export control laws, and regulations, as from time to time
amended, including without limitation, the laws and regulations administered by the United States Department of Commerce and the United
States Department of State. You have been advised that the Software is subject to the U.S. Export Administration Regulations. You shall not
export, import or transfer Software contrary to U.S. or other applicable laws, whether directly or indirectly, and will not cause, approve or
otherwise facilitate others such as agents or any third parties in doing so. You represent and agree that neither the United States Department of
Commerce nor any other federal agency has suspended, revoked or denied your export privileges. You agree not to use or transfer the Software
for end use relating to any nuclear, chemical or biological weapons, or missile technology unless authorized by the U.S. Government by
regulation or specific license.
10. U.S. GOVERNMENT RIGHTS. Any Software or Documentation acquired by or on behalf of a unit or agency of the United States
Government is “commercial computer software” or “commercial computer software documentation” and, absent a written agreement to the
contrary, the Government’s rights with respect to such Software or Documentation are limited by the terms of this Agreement, pursuant to FAR §
12.212(a) and its successor regulations and/or DFARS § 227.7202-1(a) and its successor regulations, as applicable.
11. ENTIRE AGREEMENT. This Agreement is our offer to license the Software and Documentation to you exclusively on the terms set forth in
this Agreement, and is subject to the condition that you accept these terms in their entirety. If you have submitted (or hereafter submit) different,
additional, or other alternative terms to Secure Computing or any reseller or authorized dealer, whether through a purchase order or otherwise,
we object to and reject those terms. Without limiting the generality of the foregoing, to the extent that you have submitted a purchase order for
the Software, any shipment to you of the Software is not an acceptance of your purchase order, but rather is a counteroffer subject to your
acceptance of this Agreement without any objections or modifications by you. To the extent that we are deemed to have formed a contract with
you related to the Software prior to your acceptance of this Agreement, this Agreement shall govern and shall be deemed to be a modification of
any prior terms in their entirety.
12. GENERAL. Any waiver of or modification to the terms of this Agreement will not be effective unless executed in writing and signed by Secure
Computing. If any provision of this Agreement is held to be unenforceable, in whole or in part, such holding shall not affect the validity of the
other provisions of this Agreement. You may not assign this License Agreement or any associated transactions without the written consent of
Secure Computing. This License Agreement shall be governed by and construed in accordance with the laws of California, without regard to its
conflicts of laws provisions.

Technical support information


Secure Computing works closely with our reseller partners to offer the best worldwide Technical Support services. Your Secure Computing
reseller is the first line of support when you have questions about our products and services; however, if you require additional assistance,
contact us directly.
• To contact Secure Computing Technical Support directly, telephone +1.800.700.8328 or +1.651.628.1500.
• To inquire about obtaining a support contract, refer to our “Contact Secure” Web page for the latest information at
www.securecomputing.com.
• To use our web support site, point your browser to: support.securecomputing.com. This site allows you to submit support issues, and to
monitor, edit, and set the severity of issues 24 hours a day.
• To use the Secure KnowledgeBase, go to www.securecomputing.com/goto/kb. Enter your company ID.

Customer Advocate information


To suggest enhancements in a product or service, or to request assistance in resolving a problem, please contact a Customer Advocate at
+1.877.851.9080. If you prefer, send an e-mail to customer_advocate@securecomputing.com.
If you have comments or suggestions you would like to make regarding this document or any other Secure Computing document, please send
an e-mail to techpubs@securecomputing.com.

Publication history

Date Part number Software release

January 2008 86-0948263-A IronMail 6.5.4

ii
CONTENTS

Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .v


Who should read this addendum . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
How this addendum is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
How to use this addendum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
User interface bookmarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Your first log-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi

CHAPTER 1 Anti-Spam Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1


TrustedSource features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
TrustedSource whitelisting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
TrustedSource queries for LDAP rejections . . . . . . . . . . . . . . . . . . 3
Bayesian retraining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Ham retraining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Administrator-released messages . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Improved Bayesian tokenization . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Classifying spam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Image Spam Classifier (ISC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Dynamic Spam Classifier (DSC) . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Connection Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
LDAP connection control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Connection control deny list improvement . . . . . . . . . . . . . . . . . . . 9
Backscatter Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
DSN Bounce Verification Protection . . . . . . . . . . . . . . . . . . . . . . . . 9
Other features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
End User Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
RBL hop count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Non-ASCII characters for “Add Header” options . . . . . . . . . . . . . . 14
Subject re-write changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

CHAPTER 2 IntrusionDefender Features . . . . . . . . . . . . . . . . . . . . . . . . . .15


LDAP features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Secure LDAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
LDAP variable User Identification . . . . . . . . . . . . . . . . . . . . . . . . . 17
SMTP on custom TCP ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

CHAPTER 3 Queue Manager Features . . . . . . . . . . . . . . . . . . . . . . . . . . . .19


Dynamic Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Enabling and disabling Dynamic Quarantine from the UI . . . . . . . 20
TrustedSource score variable in Dynamic Quarantine . . . . . . . . . 20
Automatic shut-off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

CHAPTER 4 Compliance Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21


Whitelisting features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Integrating TrustedSource into whitelisting rules . . . . . . . . . . . . . . 22
Whitelisting include/exclude option . . . . . . . . . . . . . . . . . . . . . . . . 22

iii
Table of Contents

Automated Administrator whitelist expiration . . . . . . . . . . . . . . . .23


Content Analysis Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Using the pre-defined regular expressions . . . . . . . . . . . . . . . . . .25
Using the validation algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Message stamping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32

CHAPTER 5 Reporting Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35


Message Blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
Configuring the Message Blocking Report . . . . . . . . . . . . . . . . . .36
A sample report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
SNMP polling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
SNMP polling configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
Public SNMP variables for IronMail . . . . . . . . . . . . . . . . . . . . . . . .40
Syslog additions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41

CHAPTER 6 System Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43


Improved TRUSign update process . . . . . . . . . . . . . . . . . . . . . . . . .44
Downloading and installing updates . . . . . . . . . . . . . . . . . . . . . . .44
Locking your current configuration settings . . . . . . . . . . . . . . . . . .44
Special configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

iv
BEFORE YOU BEGIN

Who should read You should read this addendum if you are responsible for configuring and managing one or
more IronMail® appliances. The addendum assumes you are familiar with networks and
this addendum network terminology. You should also be familiar with the internet and its associated terms and
applications. Please take a few minutes to become acquainted with the documentation.

How this This addendum provides current information about features and functions that have been
added to IronMail or enhanced since the publication of the IronMail 6.5.1 Administration
addendum is Guide. The addendum is comprised of chapters that correspond to major program areas in
organized IronMail, as identified by the tabs at the top of IronMail’s main window, and to the
corresponding sections of the Administration Guide.

How to use this This addendum should have been delivered to you in PDF format. You can navigate through
the addendum by clicking a line in the Table of Contents (each line is a hyperlink to the page it
addendum references).

Figure 1: TOC navigation

Figure 2: Index The listings in the Index are also clickable. There, the
navigation pages numbers are links to the locations in the text. You
can navigate with a simple click of your mouse.

Figure 3: Chapter You will also be able to navigate within the text of the PDF
navigation version, using the following aids:

In each chapter, the topics introduced by “In this chapter”


are links that allow you to navigate to your selected topic.
When you navigate to a page or topic, you will also find a
“back” arrow at the bottom of the page; the arrow will
return you to your prior location.

v
Before You Begin

Conventions Names of buttons, tabs, keys, etc., or other items that receive an action from the window will
appear in boldface type. Examples: Submit - Next - Reset.

User interface Within IronMail itself, you will find the ability to set bookmarks. These markers will allow you to
navigate quickly to screens you visit frequently. Using these bookmarks permits easy access
bookmarks to specific screens.

Figure 4: Adding a Most IronMail screens include the bookmark


bookmark capability. Available bookmarks (those that have
not already been set) are indicated by a
bookmark icon a the top of the window near the
window title. If you click the icon, IronMail creates
a link for that window on the Bookmarks list.

Figure 5: Bookmark list When you click the Bookmarks link at the upper right
of the IronMail window, the Bookmarks list opens. All
bookmarks you have added are listed. The window
also includes commands for saving bookmarks and
for clearing all the bookmarks on the list.

When you place the cursor over a listed bookmark,


the bookmark will become bold. Clicking the
bookmark will take you directly to the indicated
window.

Your first log-in IronMail provides a window that appears the first time a user logs into the Web Administration
interface.

Figure 6: First-time
opening window

The primary section of this window is entitled “What’s New?” Here you will find a list of new
features included in IronMail version 6.5.4. When you click on any item in the list, it expands to
offer a brief explanation of that feature.

vi
CHAPTER Anti-Spam Features
1
In this chapter...

TrustedSource features ..................................................................................... 2


TrustedSource whitelisting............................................................................ 2
TrustedSource queries for LDAP rejections ................................................. 3
Bayesian retraining............................................................................................ 4
Ham retraining .............................................................................................. 4
Administrator-released messages ................................................................ 5
Improved Bayesian tokenization................................................................... 5
Classifying spam ............................................................................................... 6
Image Spam Classifier (ISC) ........................................................................ 6
Dynamic Spam Classifier (DSC)................................................................... 7
Connection Control............................................................................................ 9
LDAP connection control .............................................................................. 9
Connection control deny list improvement.................................................... 9
Backscatter Protection ...................................................................................... 9
DSN Bounce Verification Protection ............................................................. 9
Other features ..................................................................................................11
End User Quarantine...................................................................................11
RBL hop count............................................................................................ 13
Non-ASCII characters for “Add Header” options ........................................ 14
Subject re-write changes ............................................................................ 14

1
Chapter 1: Anti-Spam Features
TrustedSource features

TrustedSource IronMail includes significant features to TrustedSource functionality since IronMail 6.5.1. The
new functionality includes the following:
features
• TrustedSource whitelisting, and
• TrustedSource queries for LDAP rejections.

The information that follows refers to new functionality. Further information about
TrustedSource may be found in Chapter 15 of the IronMail 6.5.1 Administration Guide.

TrustedSource whitelisting
IronMail provides the capability to whitelist IP addresses from TrustedSource reputation
queries. The details surrounding this capability follow.

TS whitelist rules
• The Administrator must be able to add an IP address using the existing whitelisting window
and set TrustedSource as the sub-feature to be whitelisted.
• Anti-Spam and TrustedSource must be the only selections in such a rule.
• SMTPProxy will read IP based rules which have a bypass list value of Anti-Spam/
TrustedSource, and use them when it perfrorms the TrustedSource lookup.
• The Administratore must create a policy including the rules that need to be evaluated.
Policy attributes are not evaluated, so the policy could be global, user based, etc. The
policy indicates explicitly the rules to be used. This allows the Administrator to create
certain rules that may not be used immediately, and helps extend this feature to VIPs in the
future.
• IronMail will not use whitelist rules created on filters other than IP address, and will ignore
the direction (inbound/outbound) in the whitelist rule.
• Just before TrustedSource lookup is initiated, SMTP proxy will look up the address in
memory. If it is present, it will send TrustedSource a special parameter to let it know that
this message should not be flagged.
• IronMail will log the result of TrustedSource lookup, but will not evauate it for further action.
• IronMail will continue processing as if the TrustedSource lookup reports the IP address as
neutral.

Configuring a TrustedSouce whitelist rule

To create a TrustedSource whitelist rule, navigate to the Whitelist - Manage Rules window
(Compliance > Whitelist > Create).

Figure 7: Creating a
TrustedSource rule

2
Chapter 1: Anti-Spam Features
TrustedSource features

Table 1: Creating a TS Whitelist rule

Field Description

Who Select from the drop down list the type of entity to be whitelisted by this
rule. For a TS rule, the only allowable option is IP Address.

Data In this field, enter the data that defines the particular entity you have
chosen to whitelist. For a TS rule, an IP address is required.

File If you wish, you may import a list of whitelist entries from a file, if the
entries are in the proper format. For format information, see Appendix 5 in
the IronMail 6.5.1 Administration Guide.

Export (hyperlink) If you wish, you may export this file (listing your whitelist entries) to save it
as a backup, etc. Click the Export hyperlink.

Direction Click the appropriate radio button to determine the message direction for
which the rule will apply.
• Inbound
• Outbound
• Both

Queue Select Anti-Spam as the queue for which you want to select processes to
be bypassed.

Bypass When you select queue(s), the processes managed by that queue will
appear in the Bypass list. Select TrustedSource as the rule to bypass.

When you have finished entering the required information, click Submit. The rule will be
created, and will appear on the Whitelist - View Rules window (Compliance > Whitelist >
View).

Figure 8: Viewing the


Whitelist rule

You may apply the TrustedSource whitelist rule just as you would any other.

TrustedSource queries for LDAP rejections


IronMail includes a field in the TrustedSource query it sends, which allows TrustedSource to
capture partial LDAP rejections. The query will return proper information about an IP address
if one or more recipients on the email are rejected. Such emails are likely to be malicious.

Since the LDAP query occurs before TrustedSource, the message will be dropped if all
recipients are rejected. No TrustedSource query will be required.

3
Chapter 1: Anti-Spam Features
Bayesian retraining

Bayesian IronMail improvements involve Bayesian analysis and retraining. They include:
retraining • Better token utilization and management, and
• Improved training, including the handling of smaller datasets.

Specific features are explained below. The information that follows refers to new functionality.
Further information about Bayesian analysis and training may be found in Chapter 17 of the
IronMail 6.5.1 Administration Guide.

Ham retraining
As part of Secure Computing’s ongoing efforts to improve Bayesian training and effectiveness,
Bayesian training is being enhanced to include training on outbound messages. Bayesian
functionality will be trained using all messages being sent outbound from the enterprise, so
long as each message has multiple recipients. Messages destined to a single recipient will not
be used for training.

IronMail also allows you to send “ham,” or legitimate email, to a special email account. This
mail will be used for retraining the Bayesian classifier, similar to the way spam messages have
been supplied in the past.

To configure this feature, enter the ham notification address in the data field on the User Spam
Reporting - Configure window.

Figure 9: User Spam


Reporting window with
ham email address field

If a message is sent to the ham address and that message contains an embedded image, or if
it has an image attached, the image will be added to the list of whitelisted images for the
specific IronMail’s Image Spam Classifier.

Note: Image Spam Classifier requires that SuperQueue be manually restarted before it will
recognize whitelisted items.

IronMail includes a provision to allow you to enable training on outgoing messages (as ham).
As Figure 11 reveals, the Bayesian - Configure window includes a checkbox that allows the
Administrator to enable or disable training. This option may be used to alleviate overemphasis
on spam messages for Bayesian training.

4
Chapter 1: Anti-Spam Features
Bayesian retraining

Administrator-released messages
IronMail provides the ability to specify messages that will be used for Bayesian training, much
as the way EUQ released messages are used.

To specify messages for training, select the messages on the Quarantine Queue Message List
window, then click the button at the top of the window, as indicated in Figure 10. Any
messages you have selected will be used for Bayesian and ISC training.

Figure 10: Quarantined


Messages List window

Improved Bayesian tokenization


Secure Computing’s Research group continually tests additional tokenization methods that
may be useful in Bayesian analysis. You may select the desired method from the drop down
list on the Bayesian - Configure window. Only one method may be selected at a time, and
“Split on white space” remains the default method.

Bayesian training can be done for additional tokenization methods; Secure Computing can
apply added methods if customers have issues with those available in the GUI.

Figure 11: Bayesian


configuration window

The content of the drop down list will be managed by the Research group, so that all effective
methods are available to the Administrator. If you encounter spam effectiveness issues and
Support determines that a different Bayes method would help, additional methods can be
made available to you.

5
Chapter 1: Anti-Spam Features
Classifying spam

Classifying spam Two additional spam classification engines are now included in IronMail:

• Image Spam Classifier, and


• Dynamic Spam Classifier

The information that follows refers to new functionality that you may access in SpamProflier.
Further information about SpamProflier may be found in Chapter 14 of the IronMail 6.5.1
Administration Guide.

Image Spam Classifier (ISC)


This enhancement adds a new feature, the Image Spam Classifier (ISC), to IronMail. The
Image Spam Classifier is a solution for identifying image spam. Image spam incorporates text
content into common graphic encodings, such as GIF, JPEG and PNG, using graphic features
such as animation and transparency to obscure the text from detection.

Note: This feature is not related to the Image Analysis feature already in IronMail. That feature is
primarily concerned with pornographic or objectionable material.

The Image Spam Classifier includes two additional features:

• It includes a whitelist designed to improve performance by quickly recognizing and


bypassing customer-supplied images that may appear in messages, such as corporate
logos, signature embellishments, etc.
• It also includes a blacklist designed to improve effectiveness by catching images similar to
those known to evade detection by ISC.

Images may be added to the whitelist and blacklist by informing Support and allowing them to
be added. The lists are not user-configurable, and will be maintained by Secure Computing.

The only user-configurable option for ISC is the ability to enable or disable it from the Spam
Profiler configuration window. ISC is disabled by default.

How Image Spam Classifier works

The high-level process for the ISC is as follows:

1 The ISC sorts the images it detects in a message and selects the three largest (the number
of images processed is configurable upon request by Support).
2 It checks the whitelist to look for a match. If it finds a match, it skips the image.
3 The ISC checks size heuristics. If the image is too large or too small, ISC skips it.
4 The Support Vector Machine (SVM) applies algorithms to determine the likelihood that the
image is spam.
5 The ISC checks the blacklist to see if the image matches known spam images.
6 The ISC returns a raw score for the image to the Spam Profiler. By default, the score will
be 0 if the image is determined not to be spam, and 50 points if it is spam. A confidence
value will be applied to the raw score.

Default scores for the Spam Profiler may be reconfigured by Support upon request.

Important notes about the ISC

The Image Spam Classifier reduces throughput when processing e-mail messages with
images.

If a message is greater than 100 KB in size, a setting in Spam Queue Properties will cause it
to bypass spam queue and therefore bypass the ISC. The setting is configurable by the

6
Chapter 1: Anti-Spam Features
Classifying spam

Administrator, via the anti-spam bypass feature.

Dynamic Spam Classifier (DSC)


Because spammers change techniques more quickly than specific solutions can be provided
to the field, Secure Computing is providing a method for delivering increased spam protection
that is not contingent upon a new release of IronMail. Dynamic Spam Classifier (DSC) is a
technology that can implement new spam detection techniques within IronMail in a timely
manner.

DSC is a framework for delivery of fast-reaction detection methods to IronMail to fight spam
outbreaks. The benefits are:

• Flexibility and timeliness in delivering spam updates independently of IronMail release


cycles;
• Deliverability using ThreatResponse Signature updates methods;
• Ability to tailor methods for specific outbreaks, and to retire methods that are no longer
needed; and,
• No dependence upon existing spam features in IronMail.

Note: DSC is implemented to deliver better protection from the latest spam outbreaks. It does not
replace TRU, Spam Queue, or any other detection method on IronMail.

How DSC works

DSC will deliver a series of methods that will look at specific heuristics of a file. Whenever
DSC is updated, it will replace or override the previous one, which allows for retirement of
methods no longer necessary. In addition, if a certain method continues to be used, it can
become a candidate for inclusion as an IronMail feature.

DSC runs as the last feature when Spam Queue runs. Spam Queue will pass messages to the
DSC, where they will be compared to the current methods. DSC will then hand the message
back with an associated score to contribute to the Spam Profile score. Every message that
goes through Spam Queue will be sent to DSC. The only exceptions are:

• Messages larger than a preconfigured size, which can vary as necessary for the method;
• Messages that have received TrustedSource scores greater than 100 points or less than -
100 points;
• Messages that have been whitelisted for DSC, as discussed below.

The individual scores from each DSC module will be visible in the X-header of the message,
and in the message log files.

How to configure DSC

You can enable or disable the DSC on the SpamProfiler - Configure window. It is listed as a
potential contributor to the Spam Profile along with other spam detection features. To enable it,
select the Enable check box. You do not need to supply a threshold or confidence value. It is
disabled by default.

7
Chapter 1: Anti-Spam Features
Classifying spam

Figure 12: Anti-Spam >


SpamProfiler > Configure

Updating DSC

The frequency of DSC updates will be based on research and evaluation of new spam threats.
The updates will be delivered as ThreatResponse Signatures, which can be delivered as
frequently as every twenty minutes. The delivery method will be the same as for any other
ThreatResponse Signature update.

If you have DSC enabled and have configured to allow automatic TRU updates at System >
Updates > Configure Auto Updates, updated DSC files will be installed automatically.

Whitelisting

If you so choose, you can whitelist messages from DSC. You must select Anti-Spam from the
Queue list, then you can select Dynamic Spam Classifier from the Bypass list.

Figure 13: Compliance >


Whitelist > Create

Reporting

The message count stopped by DSC will be included on any report that reports overall spam
(Executive Summary, Domain Executive Summary, Spam Action Summary) or in the totals for
any report that shows messages blocked by SpamProfiler (Overall Spam Summary, Top Spam
Lists).

8
Chapter 1: Anti-Spam Features
Connection Control

Connection IronMail’s connection control functionality has been improved by including LDAP rejections in
the TrustedSource query, and by enabling a TrustedSource query on IP addresses before they
Control are added to the deny list.

The information that follows refers to new functionality. Further information about Connection
Control may be found in Chapter 15 of the IronMail 6.5.1 Administration Guide.

LDAP connection control


LDAP rejections for any IP address that meets or exceeds a defined threshold will be
subjected to a TrustedSource query. If the query produces a reputation score greater than
zero, the IP address will be added to the Connection Control deny list.

Important: If you wish to use LDAP connection control, and the IronMail appliance is protected by
an Edge appliance, you must add the Edge appliance to the connection control exclude list.

Connection control deny list improvement


As a method for reducing false positives, all IP addresses will be checked by TrustedSource
before they are added to the Connection Control deny list. The query is performed after Spam
Profiler determines the address qualifies for the deny list, but before it is actually added to the
list.

Important: For connection control functionality requiring TrustedSource information, you must have
TrustedSource enabled, and the IP address being checked must not be whiltelisted for
TrustedSource.

Backscatter When hackers create spam or phishing messages using forged (spoofed) source addresses
belonging to a company’s domain, that company can experience denial of service attacks
Protection under certain conditions. Where the fraudulent email’s recipient address doesn’t exist, the
spoofed company can be flooded with email bounces. In the worst cases, a mail loop occurs
when the message is bounced to a non-existent sender address.

The information that follows refers to new functionality. Further information about phishing
threats may be found in Chapter 15 of the IronMail 6.5.1 Administration Guide.

Bounced Address Tag Validation (BATV) is a method for determining whether the return
address specified in a bounced email is valid. The goal is to reject bounced messages to
forged return addresses.

DSN Bounce Verification Protection


The BATV feature in IronMail is DSN Bounce Verification Protection. The feature allows the
Administrator to configure a text key that is included in all recipient addresses supported by
IronMail appliances.

The following conditions apply:

• DSN Bounce Verification will not work if IronMail or a BATV-compatible device with
matching Address Tagging key is not used for outbound mail delivery.
• If there are multiple IronMails on site, they must share the same hash code.
• Recipients of outgoing messages will not be able to see the header code.
• You should allow a delay time to allow the DSNs to filter through your system.

9
Chapter 1: Anti-Spam Features
Backscatter Protection

Configuring DSN Bounce Verification

To configure this feature, navigate to the DSN Bounce Verification Protection - Configure
window (Anti-Spam > Anti-Spam Advanced > DSN Bounce Verification Protection).

Figure 14: Configuration


window

Table 2: Configuring DSN Bounce Verification Protection

Field Description

Enable DSN Select the check box to enable DSN Verification Protection on this
Verification IronMail.
Protection
The protection is disabled by default.

Select Action Select the proper radio button to configure the action IronMail should take
when a message fails bounce protection. Options are:
• Log verification failure - IronMail creates a log entry for the failed
message, but the message will still be received.
• Log and block verification failure - IronMail creates a log entry for
the failure and drops the message.

Address Tagging Enter the text for the tagging key (in plain text) that will be included in the
Key mail recipient addresses that are supported by this IronMail. A minimum
of four characters is required; the maximum number allowed is fourteen
characters.
Note: If multiple BATV-capable devices exist on site, they must all have the
same key.

Incoming DSNs are Specify the number of days before incoming DSNs are considered
considered expired expired, even if otherwise valid, by selecting the number of days from the
after __ days drop down list.

When the configuration options have been properly set, click Submit.

How DSN Bounce Verification Protection works

The feature solves the BATV issue by generating a unique hash (the tagging key) and
including it in the header of all outgoing email messages. If a bounced email doesn’t include
this header code, IronMail takes the configured action on that message (log only, or log and
drop).

DSN Verification processing is performed in SMTPProxy. When the feature is enabled,


IronMail will check to see if the “Mail From” header is empty. If it is NOT empty, then BATV will
be bypassed. If the header is empty, IronMail will check the “Receipt To” header to see if the
tagging key is present. If it is not present, IronMail will take the configured action.

10
Chapter 1: Anti-Spam Features
Other features

Other features IronMail includes other significant improvements.

End User Quarantine


The information that follows refers to new functionality. Further information about End User
Quarantine may be found in Chapter 16 of the IronMail 6.5.1 Administration Guide.

IronMail allows users to have a unique (controlled expiration) link for accessing their
quarantined messages, rather than receiving a new link each time they get EUQ notices. The
Administrator can control the expiration frequency of the links for security purposes, and can
refresh them at any time should the need arise.

To configure the expiration of these links or to refresh them for other reasons, navigate to the
End User Quarantine - Configure window (Anti-Spam > Advanced > End User Quarantine >
Configure).

Figure 15: Configuring


EUQ link expiration

Configuration of the new functionality requires populating new fields at the bottom of the
window. The rest of the configuration process is unchanged.

Table 3: Configuring EUQ link expiration

Field Description

EUQ Link Expiration Choose the correct radio button to determine the expiration rule you
prefer. Options are:
• Always - the EUQ links will expire immediately (no persistent links)
• Never - the links will never expire, but will remain available
permanently unless refreshed by the Administrator
• A specific number of days - enter the length of time you want the links
to stay active unless they are refreshed by the Administrator.
More...

11
Chapter 1: Anti-Spam Features
Other features

Table 3: Configuring EUQ link expiration

Field Description

EUQ Link From the drop down list, select the particular notification to be sent to
Notification users when the links expire or when they are refreshed.
Note: When the information in these two fields is correctly entered, click
Submit to establish the expiration cycle.

EUQ Link Refresh If you wish to refresh the EUQ links, select the correct radio button to
identify the specific links to be affected. Options are:
• Refresh for All Users - selecting this option will refresh all unique
links associated with this IronMail appliance
• Refresh for Specific Users - selecting this option requires you to
enter one or more complete email addresses in the data field. Multiple
addresses must be entered as a comma-separated list.
Note: When you have determined which links are to be refreshed, click
Refresh.

Configuring the notification

The notices users are to receive can be configured in the Mail Notification windows. IronMail is
delivered with a default EUQ Link Notification that cannot be edited or deleted. To view the
notice, navigate to the Mail Notification - Manage window (Compliance > Advanced
Compliance > Mail Notification).

Figure 16: Mail


Notification window
showing EUQ link
expiration notice

You may also add your own custom notice by clicking Add New at the bottom of the screen.

Figure 17: Adding a new


notification

12
Chapter 1: Anti-Spam Features
Other features

Select the type of notification you want to create, then enter the required information, just as
you would for any other type of mail notification. More information about configuring mail
notifications may be found in Chapter 13 of the IronMail 6.5.1 Administration Guide.

RBL hop count


The information that follows refers to new functionality. Further information about Realtime
Blackhole Lists may be found in Chapter 17 of the IronMail 6.5.1 Administration Guide.

The dynamic hop count feature allows you to specify the hop count of messages, identifying
the entities that are to be reported by TrustedSource. The feature is important for companies
that have complex networks, such as multiple paths to their email systems. It tells
TrustedSource what to check and in what position it should occur when reporting a reputation
score.

Dynamic hop count is configured on the Realtime Blackhole List window. The newly-added
segment from the bottom of that window appears in Figure 18.

Figure 18: Configuring


dynamic hop count

Configuration is based on combinations of the following pieces of information:

• The connecting IP address;


• Received headers (the header string to be matched); and,
• Position of the received header string (header position).

IronMail supports the following configuration combinations:

• Connecting IP, header string and header position - all conditions must be met;
• Connecting IP only - set the hop count for the specified IP; or,
• Header string and header position - set the hop count for matches on the header string and
position, for all IPs. The received header is checked to see if the header string occurs in
the specified header position.

The following basic rules apply:

• You must always specify the header string and header position together. You must have
both.
• You cannot specify a header string with a position of 0, which implies the header string is
NULL (matching is done for the connecting IP only).

The actual processing using dynamic hop count occurs in smtpproxy, where the
TrustedSource lookup happens.

Extending Dynamic Hop Count functions

IronMail has extended the Dynamic Hop Count functions to additional anti-spam features,
including SenderID, Reverse DNS and System Defined Header Analysis. Settings that were
formerly limited to RBL now apply globally to these features, to ensure they analyze the
correct IP address.

13
Chapter 1: Anti-Spam Features
Other features

Non-ASCII characters for “Add Header” options


The information that follows refers to new functionality accessible through SpamProfiler.
Further information about SpamProfiler may be found in Chapter 14 of the IronMail 6.5.1
Administration Guide.

IronMail allows you to enter non-ASCII characters as input for the “add header” action in Spam
Profiler. Users whose languages do not support ASCII can take advantage of this action. To
add a header to a message that has been identified as spam, navigate to the Spam Profiler -
Configure window. Select the check box, then enter the name you want to appear as the
added header.

Figure 19: Add Header


option

Subject re-write changes


When IronMail inserts a character string as a subject re-write parameter, IronMail will not
automatically convert that string to UTF-8. Instead, it will use the character set that already
exists in the subject line. If a subject line has multiple character sets, IronMail will use the first
detected character set.

If the subject line is written in a character set that IronMail does not support, it will be
converted to UTF-8.

Further information about IronMail actions and action values may be found in Appendix 8 of
the IronMail 6.5.1 Administration Guide.

14
CHAPTER IntrusionDefender Features
2
In this chapter...

LDAP features ................................................................................................. 16


Secure LDAP.............................................................................................. 16
LDAP variable User Identification............................................................... 17
SMTP on custom TCP ports............................................................................ 17

15
Chapter 2: IntrusionDefender Features
LDAP features

LDAP features IronMail’s LDAP functionality has been enhanced to allow secure communication with the
LDAP server, and to allow support for an additional user attribute, User Identification (UID).

The information that follows refers to new functionality. Further information about LDAP may
be found in Chapter 23 of the IronMail 6.5.1 Administration Guide.

Secure LDAP
This feature provides the capability for IronMail to communicate with the LDAP server over a
secure tunnel. Three radio buttons on the LDAP Profile - Add Definition window allow you to
select the mode and set the appropriate port. Three modes are possible:

• Non-secure communication - this is the default mode;


• Secure LDAP over SSL - this mode enables communication over a secure port using
encrypted text; and,
• Secure LDAP and TLS - the query to the LDAP server will be done securely via a TLS
session.

For Microsoft Active Directory, the port for non-secure communication and for the TLS mode is
3268; the port for SSL communication is 3269. For other platforms, the non-secure/TLS port is
389, and the SSL port is 636.

The proper default port for the selected platform will populate the Port field when you select
the mode.

Figure 20: Selecting


secure communication

Note: The Administrator can change the port by simply typing over the default.

16
Chapter 2: IntrusionDefender Features
SMTP on custom TCP ports

LDAP variable User Identification


The feature adds support for the use of an attribute called User Identification (UID) as an
alternative or alias for the email user.

Figure 21: LDAP query


browser with UID

Some LDAP platforms, such as Domino, e-Directory and OpenLDAP support the variable. The
UID replaces the user name to the left of the @ sign in the email address. IronMail supports
the variable within the search filter when it queries the LDAP server.

SMTP on custom Since some companies have a need for their mail servers to listen for SMTP traffic on ports
other than port 25, IronMail allows the Administrator to define the destination SMTP ports for
TCP ports mail delivery on the Domain Routing - Add Mapping window. The option is available only for
inbound static and outbound static routes.

The information that follows refers to new functionality. Further information about Domain
Routing may be found in Chapter 22 of the IronMail 6.5.1 Administration Guide.

The process for adding a new static route remains much as it has been, with one change to
the window. The Port field has been added, where you may enter a valid port ID to specify the
custom port you desire.

Figure 22: Adding a


domain routing

When the configuration has been entered properly, click Submit. The Domain Routing
Mapping - Manage window will update to show the newly-designated port.

17
Chapter 2: IntrusionDefender Features
SMTP on custom TCP ports

Figure 23: Domain


routing updated

18
CHAPTER Queue Manager Features
3
In this chapter...

Dynamic Quarantine........................................................................................ 20
Enabling and disabling Dynamic Quarantine from the UI........................... 20
TrustedSource score variable in Dynamic Quarantine ............................... 20
Automatic shut-off....................................................................................... 20

19
Chapter 3: Queue Manager Features
Dynamic Quarantine

Dynamic The information that follows refers to new functionality. Further information about Dynamic
Quarantine may be found in Chapter 5 of the IronMail 6.5.1 Administration Guide.
Quarantine
IronMail includes enhancements to Dynamic Quarantine, allowing better Administrative
control and the ability to add rules based on TrustedSource scores. Details are shown below.

Enabling and disabling Dynamic Quarantine from the UI


IronMail includes the ability to enable or disable Dynamic Quarantine from the UI. Customers
have the capability to opt out of the feature if they so choose by simply selecting or de-
selecting a checkbox on the TrustedSource - Configure window.

Dynamic Quarantine is disabled by default.

Figure 24: Enabling


Dynamic Quarantine

TrustedSource score variable in Dynamic Quarantine


There are two methods for sending a message to Dynamic Quarantine:

• through a TrustedSource lookup that returns a score within a preconfigured range; or,
• using rules that have been deployed as part of a TRUSign package.

IronMail provides the ability to add rules based on a TrustedSource score variable to the
TRUSign rules, in addition to rules based on subject, attachment name, attachment format,
and message size.

Automatic shut-off
Dynamic Quarantine will automatically disable itself if available disk space falls below 30% of
the system’s capacity. This feature is intended to prevent performance degradation or other
problems that may result from inadequate disk space.

20
CHAPTER Compliance Features
4
In this chapter...

Whitelisting features ........................................................................................ 22


Integrating TrustedSource into whitelisting rules ........................................ 22
Whitelisting include/exclude option............................................................. 22
Automated Administrator whitelist expiration.............................................. 23
Content Analysis Features .............................................................................. 25
Using the pre-defined regular expressions ................................................. 25
Using the validation algorithms................................................................... 29
Message stamping .......................................................................................... 32

21
Chapter 4: Compliance Features
Whitelisting features

Whitelisting The information that follows refers to new functionality. Further information about whitelisting
may be found in Chapter 12 of the IronMail 6.5.1 Administration Guide.
features
IronMail’s whitelisting capabilities have received three refinements, allowing increased
capabilities and expanded administrative options:

• Integrating TrustedSource into whitelisting,


• Whitelisting include/exclude option, and
• Automated whitelist expiration.

Integrating TrustedSource into whitelisting rules


This feature provides the ability to whitelist an IP address, exempting it from TrustedSource
queries. You can select TrustedSource as a sub-feature to be bypassed like any other sub-
feature.

TrustedSource is an allowed selection only when IP Address is the selected “Who”


parameter.

Figure 25: Whitelist


rules window

Whitelisting include/exclude option


In prior versions of IronMail, whitelisting was implemented as an inclusive function. If IronMail
received a message with more than one recipient, and one of the recipients was whitelisted,
then all recipients were treated as if they were whitelisted. The current feature permits an
exclusive mode of operation that you may select. The default setting is “inclusive.”

If the Exclusive check box is selected, when IronMail receives a message with multiple
recipients and one of the recipients is whitelisted, but the others are not, the message will be
processed as if no one is whitelisted. The other recipients must also be explicitly whitelisted in
order for the message to bypass processing.

22
Chapter 4: Compliance Features
Whitelisting features

Figure 26: Whitelist


exclusive mode

Automated Administrator whitelist expiration


If whitelist rules continue to accumulate on an IronMail appliance, they may eventually
degrade performance. IronMail allows the Administrator to configure automatic expiration and
deletion of whitelist rules that are no longer in use.

Creating the whitelist entry

Whitelist entries are created on the Whitelist - Manage Rule window. The only change to the
creation process comes with the addition of one check box, labeled Don’t Expire. If the
Administrator selects this check box, the entry will remain until it is manually deleted by the
Administrator.

Figure 27: Configuring


whitelist expiration

When the whitelist entry is configured properly, click Submit. The Whitelist - View Rules
window will refresh to include the new entry.

23
Chapter 4: Compliance Features
Whitelisting features

Figure 28: Viewing


whitelist rules

As Figure 28 illustrates, the Administrator’s expiration preference shows on this window. If


Don’t Expire is checked for an entry, the only way to delete it is to check the Delete box and
then click Submit. If, however, the option is unchecked, the Administrator can navigate to the
Cleanup Schedule feature and create cleanup/expiration rules that automatically delete
unused whitelist entries.

Setting automatic cleanup for whitelist entries

On the Cleanup Schedule - Configure window (Administration > Cleanup Schedule), the
Administrator sets the schedule for deletion of unused rules. The deletion occurs based on the
length of time that has expired since the entry was last used. The last hit date appears on the
View Rules window, as shown in Figure 28.

Figure 29: Setting


automatic whitelist
expiration

Table 4: Configuring whitelist rule removal

Field Description

File Type: Choose the Whitelist rules file type from the drop down list. Then click
Select. The window will refresh to appear as it does in the screen shot
above.

Admin Whitelist Enter the length of time in hours that must expire since an Administrator-
Cleanup Interval created rule was last hit. When a rule’s last use is beyond this number of
hours, the rule is set for cleanup.

EUQ Whitelist Enter the length of time in hours that must expire since an End User
Cleanup Interval Quarantine-created rule was last hit. When a rule’s last use is beyond this
number of hours, the rule is set for cleanup.
More...

24
Chapter 4: Compliance Features
Content Analysis Features

Table 4: Configuring whitelist rule removal

Field Description

Frequency Clicking this button enables creation of a fixed-interval schedule for the
Schedule Cleanup cycle. The Administrator may select an interval in hours (1 hour
to 72 hours) between cycles.
Note: You must choose either Frequency Schedule or Detailed Schedule.
Enabling one disables the other.

Detailed Schedule This option allows creation of a specifically detailed schedule for the
Cleanup cycle. The schedule is configured in two steps:
• The left side of the window displays a list of days of the week. Select
the day during which the cleanup cycle is to run. You may select only
one day at a time. However, after you submit the detailed schedule for
one day, you can do it again for another day and the system will
accumulate the daily schedules. It is therefore possible to create
individual detailed schedules for all seven days per week.
• The right side of the window contains check boxes for each of the 24
hours in a day. Clicking a check box enables IronMail to run Auto
Cleanup at that time on the designated day. You may select from 0 to
24 cleanup times per day.

When the cleanup schedule is correctly configured, click Submit.

Content Analysis The information that follows refers to new functionality. Further information about Content
Analysis may be found in Chapter 8 of the IronMail 6.5.1 Administration Guide.
Features
Two new features have been added to Content Analysis Dictionaries:

• Use of pre-defined regular expressions, and


• Support for validation algorithms.

Both additions are related to the use of regular expressions.

Using the pre-defined regular expressions


The two pre-defined regular expressions are specifically intended to identify US Social
Security Numbers and Canadian Social Insurance Numbers.

You may use the pre-defined regular expressions two ways,

• Add them to an existing compliance dictionary


• Create a new compliance dictionary that contains the pre-defined regular expressions.

After logging into your IronMail appliance, click on the Compliance tab. In the left column
menu, expand Content Analysis, then click Dictionaries.

25
Chapter 4: Compliance Features
Content Analysis Features

Figure 30: Dictionaries


window

In this example, we will add a new dictionary that will contain the use of the pre-defined
regular expressions.

1 Click Add New.


Figure 31: Adding a
dictionary

2 Enter a name for the new dictionary. In this example, we will simply name it “regex_test.”
3 Accept the default settings for the remaining fields, then click Submit.
Figure 32: Dictionaries
updated

The new dictionary will appear in the dictionary list.

4 Click the name of the dictionary you just created.

26
Chapter 4: Compliance Features
Content Analysis Features

Figure 33: Dictionary


content window

5 Click Add New.


Figure 34: Selecting the
content type

6 From the Content Type pulldown menu, select Regular Expressions. The window will
change and display the following options.

27
Chapter 4: Compliance Features
Content Analysis Features

Figure 35: Selecting the


RegEx type

7 From the Enter Regular Expression field pulldown menu, select the type you want to use.
Figure 36: Predefined In this example, we use the U.S. Social Security Number.
headers

Figure 37: Dictionary


content with pre-defined
RegEx selection

Upon selection, several changes will occur on the window.


• The Search Type will reset to “substring” and cannot be changed.
• The Enter Regular Expression field will automatically populate with the pre-defined
regular expression selected. It may NOT be edited.
• The Validation Algorithm is not editable.
• The Side Note is not editable.

28
Chapter 4: Compliance Features
Content Analysis Features

8 Click Submit to save your information.

Using the validation algorithms


IronMail includes three validation algorithms for use when validating regular expressions.

You may use the validation algorithms two ways,

• Add them to an existing compliance dictionary


• Create a new compliance dictionary that contains the pre-defined regular expressions.
1 After logging into your IronMail appliance, click on the Compliance tab. In the left column
menu, expand Content Analysis, then click Dictionaries.

Figure 38: The Manage


Dictionaries window

In this example, we will add a new dictionary that will contain the use of the regular expres-
sions along with the validation algorithms.
2 Click Add New.
Figure 39: Adding a new
dictionary

3 Enter a name for the new dictionary. In this example, we will simply name it
“regex_validation.”
4 Accept the default settings for the remaining fields, then click Submit.

29
Chapter 4: Compliance Features
Content Analysis Features

Figure 40: Dictionaries


window updated

The new dictionary will appear in the dictionary list.

5 Click the name of the dictionary you just created.


Figure 41: Manage
Dictionary Content
window

6 Click Add New.

30
Chapter 4: Compliance Features
Content Analysis Features

Figure 42: Selecting the


content type

7 From the Content Type pulldown menu, select Regular Expressions. The window will
change and display the following options.

Figure 43: Selecting the


validation algorithm

Enter your configuration according to the table below.

Field Description

Search Type Select “substring.”

Enter Regular Select “Custom” then type the regular expression you want to use.
Expression

Regular Expression Select an appropriate flag, if desired. (Not required.)


Flags
More...

31
Chapter 4: Compliance Features
Message stamping

Field Description

Validation Algorithm From the pulldown menu, select the validation algorithm to use for
validating your regular expression. Choices are:
• Mod 10 - also known as the Luhn algorithm, a simple checknumber
formula used to validate various ID numbers, including credit card
numbers and Canadian Social Insurance Numbers.
• CUSIP - a 9-character alphanumeric identifier for North American
securities, created by the Committee on Uniform Security
Identification.
• ISIN - international security identifying number, used to identify
securities such as bonds, commercial paper, equities and warrants.

Test Value Enter a value to test against if you wish to test your regular expression.

Weight Enter a value to represent the score contribution for one instance of this
entry.

Include Click the checkbox to include this entry in the dictionary's message scans.

Scan Area Select one or more parts of the message that should be included in the
dictionary's scan for this entry.

Contribution Type Click the radio button to determine whether the entry will be counted only
once per message, no matter how many times it appears, or will
contribute the amount configured as Maximum Contribution.

Note: For the contribution value, enter a number to represent the


maximum contribution per message for this entry. The count will
accumulate multiples of the entry's weight each time the entry appears,
until the maximum is reached. If the count is set at zero and Maximum
Contribution was selected above, the count will be the weight of the
entry multiplied by the actual number of times it appears in the
message.

Side Note Enter any explanatory or identifying text you wish to associate with this
entry.

8 Click Submit.

Message The information that follows refers to new functionality. Further information about Message
Stamping may be found in Chapter 13 of the IronMail 6.5.1 Administration Guide.
stamping
The following character sets have been added to IronMail, to be used for Message Stamping
only:

• Arabic (Windows) win-1256


• Baltic (ISO) 1o-8859-4
• Baltic (Windows) win-1257
• Central Euro (Windows) win-1250
• Chinese Simplified (HZ) hz-gb-2312
• Cyrillic (KOI8-U) koi8-u
• Estonian (ISO) iso-8859-13
• Greek (ISO) iso-8859-7
• Green (Windows) win-1253
• Hebrew (Windows) win-1255

32
Chapter 4: Compliance Features
Message stamping

• Korean ks_c_5601-1987
– An alternative alias character set my be used - CP949
• Latin9 (ISO) iso-8859-15
• Thai (Windows) win-874
• Turkish (OSO) iso-8859-9
• Turkish (Windows) win-1254
• Unicode (utf7) utf-7

33
Chapter 4: Compliance Features
Message stamping

34
CHAPTER Reporting Features
5
In this chapter...

Message Blocking ........................................................................................... 36


SNMP polling................................................................................................... 38
SNMP polling configuration ........................................................................ 38
Public SNMP variables for IronMail ............................................................ 40
Syslog additions .............................................................................................. 41

35
Chapter 5: Reporting Features
Message Blocking

Message The information that follows refers to new functionality. Further information about IronMail
Reports may be found in Chapter 31 of the IronMail 6.5.1 Administration Guide.
Blocking
A Message Blocking report has been added to the list of available reports from IronMail. It is a
PDF report, accessible from the Reports window, as shown in Figure 44.

Figure 44: The Reports


Window

Clicking on the link for the Message Blocking report will take you to a window where you can
see the most recent report and where you can access others by clicking the appropriate links.

Configuring the Message Blocking Report


You can configure the report on the Reports - Configure window, just as you would any other
IronMail report. The Message Blocking Report appears in the lower list of reports, as shown in
Figure 45.

Figure 45: Configuring


the report

36
Chapter 5: Reporting Features
Message Blocking

In the upper section of the window, you can configure the archiving and transfer method for
the report just as you would for any other. Of particular interest for the Message Blocking
Report, you must also specify the Connection to Message ratio by selecting Industry
Standard or Admin Defined ratio. If you select the Admin Defined setting, you will also
specify the maximum number of messages allowed per connection by entering a number from
1 to100 in the data field.

You may elect to disable the report, create the report, or create and email it by selecting the
desired options associated with the report name as shown.

A sample report
Figure 46 shows a current day’s report as it appears in IronMail. The Reports window allows
you to determine the period of time the report should represent. It provides a simple Total
Messages Summary for quick review, followed by a detailed report that shows messages
blocked by each IronMail feature.

Figure 46: Message


Blocking Report

The Detail section tracks both connections and messages blocked by IronMail. Information for
the current day is presented graphically and numerically, including trends over time. The two
numerical tables represent connection-layer blocking and application-layer blocking,
respectively. Connection-layer blocking (the table to the left) is concerned with the

37
Chapter 5: Reporting Features
SNMP polling

connections blocked and the associated messages that were not allowed into IronMail.
Application-layer blocking (the table to the right) shows messages blocked as a result of
IronMail’s actions on messages it processed.

The lower portion of the current report lists available reports for today and the recent past. If
you click View for any available report, you will be allowed to open or save that day’s report in
PDF format, as illustrated in Figure 47.

Figure 47: PDF Message


Blocking report

SNMP polling IronMail includes an SNMP polling feature that provides the capability for a polling station or
package to collect data from the IronMail appliance via the SNMP protocol. This feature is
helpful in mapping alert events to SNMP traps. The IronMail appliance publishes a MIB view
that allows “read only” access to data to be used in processing a variety of queries. There is
NO “write” access permitted, so the data remains secure. The feature allows the Administrator
to set the polling interval.

IronMail’s SNMP polling supports SNMP v1 and SNMP v2.

SNMP polling configuration


The SNMP polling feature may be accessed from the Reporting tab (Reporting > SNMP
Polling).

Figure 48: Configuring


SNMP Polling

38
Chapter 5: Reporting Features
SNMP polling

Table 5: SNMP Polling

Field Description

Service This field contains the service name. In this case, the name is Internal-
snmpd2, the name of the SNMP polling service.
Click the name to configure the polling time interval.

Auto-Start A red X or green check icon indicates whether or not the service is set to
start automatically when the IronMail appliance is rebooted. If an icon is
green, the service will begin running when IronMail restarts. In addition, if
the icon is green, IronMail’s Health Monitor will restart any service except
SMTPO that has stopped for any reason when it performs its tests on all
appliance subsystems. If an icon is red, the service will not start on
reboot, nor when Health Monitor runs its system tests.
Note: A service can continue to run after its auto-start setting is turned off.
The red and green light icons are hyperlinks. Clicking the icon/hyperlink
toggles the auto-start option on and off.

Running A red or green light icon indicates whether or not the service is currently
running.
In some situations, the Running icon may not refresh when clicked, i.e.
change from green to red. If the icon does not toggle as expected, click
the Mail Services - Configure hyperlink in the left navigation frame of the
Web Administration interface to refresh the page, rather than clicking the
Running icon a second time.

Service Uptime This column indicates (in days, hours, minutes, and seconds) how long a
service has been running since it was last restarted.
If the “uptime” appears less than expected, it may indicate that the service
was manually stopped and restarted by an administrator, or was stopped
by an administrator and was restarted automatically by IronMail’s Health
Monitor.

If you click the service name, the following window will appear.

Figure 49: Configuring


the collection interval

On this window, you can set the polling interval by entering a time in seconds. The allowable
range is from 60 to 3600 seconds. This interval defines the wait time between SNMP polling
occurrences.

39
Chapter 5: Reporting Features
SNMP polling

Public SNMP variables for IronMail


The following variables are provided to the SNMP polling station from the IronMail SNMP
daemon.

Table 6: SNMP Variables

S# Variable Name Description

1 ctCPUSystem Current system-space CPU utilization

2 ctCPUIdle Current idle CPU

3 ctCPUUser Current user-space CPU utilization

4 ctMemoryFree Currently free memory (in bytes)

5 ctMemoryActive Currently active memory (in bytes)

6 ctMemoryInactive Currently inactive memory (in bytes)

7 ctMemorySwap Current swap space in use (in bytes)

8 ctDiskIOtps Disk I/O transactions per second

9 ctDiskIOmbps Disk I/O in megabytes per second

10 ctDiskFSct Current percentage of the ct partition used

11 ctDiskFSvar Current percentage of the var partition used

12 ctDiskFStmp Current percentage of the tmp partition used

13 ctNetworkIOin Current rate of data into the physical network


interface (bits/sec)

14 ctNetworkIOout Current rate of data out of the physical network


interface (bits/sec)

15 ctServiceSmtpo Status of smtpo service (0 = not running, 1 = running)

16 ctServiceSmtpproxy Status of smtpproxy service (0 = not running, 1 =


running)

17 ctQueueLevel Number of messages currently being processed by


queues

18 ctQueueProcessedAVQ Number of messages processed by AVQ since local


midnight

19 ctQueueActionAVQ Number of messages processed by AVQ since local


midnight that required action

20 ctQueueProcessedCFQ Number of messages processed by CFQ since local


midnight

21 ctQueueActionCFQ Number of messages processed by CFQ since local


midnight that required action

22 ctQueueProcessedMMQ Number of messages processed by MMQ since local


midnight

23 ctQueueActionMMQ Number of messages processed by MMQ since local


midnight that required action

24 ctQueueProcessedSMTPO Number of messages processed by SMTPO since


local midnight
More...

40
Chapter 5: Reporting Features
Syslog additions

Table 6: SNMP Variables

S# Variable Name Description

25 ctQueueActionSMTPO Number of messages processed by SMTPO since


local midnight that required action

26 ctQueueProcessedRIPQ Number of messages processed by RIPQ since local


midnight

27 ctQueueActionRIPQ Number of messages processed by RIPQ since local


midnight that required action

28 ctQueueProcessedJOINQ Number of messages processed by JOINQ since


local midnight

29 ctQueueActionJOINQ Number of messages processed by JOINQ since


local midnight that required action

30 ctQueueProcessedSPAMQ Number of messages processed by SPAMQ since


local midnight

31 ctQueueActionSPAMQ Number of messages processed by SPAMQ since


local midnight that required action

32 ctQueueProcessedSUPERQ Number of messages processed by SUPERQ since


local midnight

33 ctQueueActionSUPERQ Number of messages processed by SUPERQ since


local midnight that required action

34 ctQueueProcessedCCQ Number of messages processed by CCQ since local


midnight

35 ctQueueActionCCQ Number of messages processed by CCQ since local


midnight that required action

Before IronMail’s SNMP traps can provide all the available information to the SNMP service,
you must compile the appropriate IronMail MIB file within your SNMP application. You can
download the MIB you will need for SNMP polling from the Support KnowledgeBase, article
7220. The file you need to download is CT-SNMP-PUBLIC-MIB.txt.

Syslog additions Three new parameters have been added to Syslog:

• ESP score and message hash;


• LDAP message drops; and,
• SMTPI full throttle/sleep information.

41
Chapter 5: Reporting Features
Syslog additions

42
CHAPTER System Feature
6
In this chapter...

Improved TRUSign update process ................................................................ 44


Downloading and installing updates ........................................................... 44
Locking your current configuration settings ................................................ 44
Special configurations................................................................................. 45

43
Chapter 6: System Feature
Improved TRUSign update process

Improved The information that follows refers to new functionality. Further information about
ThreatResponse updates may be found in Chapter 35 of the IronMail 6.5.1 Administration
TRUSign update Guide.
process
ThreatResponse updates are a critical asset that enable Administrators to ensure they have
the best and latest protection configuration settings for their IronMail appliance. However,
there are situations wherein specific settings should not be overwritten when a new
ThreatResponse Signature (TRUSign) update is installed. For example, a custom Content
Analysis dictionary may have been created to meet the unique needs of the organization.
IronMail provides the capability to block changes to feature configuration when new updates
are installed.

Administrators can lock current configuration settings to be kept as they are, either individually
or as a group.

Important: If you want to protect any of the existing configuration settings in your system, you must
lock those settings prior to installing new TRUSign updates.

Downloading and installing updates


The basic downloading and installation process for TRUSign updates remains essentially
unchanged. Available updates are downloaded and installed from the ThreatResponse
Signatures - Updates window. Figure 50 illustrates a listing of updates that have been
installed. You can refresh the window at any time to view recent updates that have become
available.

Figure 50: TRU


Signature Updates

Prior to installing any updates, you have the option of locking current settings.

Locking your current configuration settings


You can lock your current settings by either of two methods. You can navigate to the Configure
Auto Updates window and lock all existing configurations by clicking the Locked check box
associated with the ThreatResponse Updates service, as indicated in Figure 51.

44
Chapter 6: System Feature
Improved TRUSign update process

Figure 51: Locking all


features

If you select this option, all your existing rules will remain as they are. None will be overwritten.

Note: Selecting the Locked option on the Auto Updates window overrides the Locked check
boxes on the SpamProfiler - Configure window. Choose one method or the other for locking your
configuration.

You may also lock the current settings for specific features by navigating to the SpamProfiler -
Configure window. As the screen shot shows, most features that appear in SpamProfiler have
a checkbox that allows you to lock them. If you select the check box next to a feature, the
current settings will be maintained, while those for unchecked features will be overwritten.

Figure 52: Locking


individual features

Special configurations
As Figure 52 illustrates, some features do not offer the locking option on the SpamProfiler
window. Realtime Blackhole Lists, System Defined Header Analysis and User Defined Header
Analysis require their own configuration methods.

Note: Selecting the locking option on the AutoUpdates window will protect the settings for these
features, just as it does for all the others.

As shown in Figure 53, you can configure each zone you add to your RBL as you add it.
Checking the Locked check box causes the entry to be protected when new TRUSign
updates are added.

45
Chapter 6: System Feature
Improved TRUSign update process

Figure 53: Realtime


Blackhole List locking

For SDHA and UDHA, each filter has its own checkbox by which you can protect the current
configuration. You can select the individual filters from the lists, as you can see in Figure 54.

Figure 54: SDHA locking

46
INDEX

A User ID variable 17

Add Header options


Non-ASCII characters 14
M
Message actions
B subject re-write 14
Message Blocking 36
Backscatter Protection (BATV) 9 Configure report 36
Bayesian 4 Sample report 37
Admin-released messages 5 Message stamping 32
Ham retraining 4
R
C
RBL Hop Count 13
Connection Control 9
Deny list 9
LDAP 9
S
Content Analysis 25 SMTP
Pre-defined RegEx 25 Custom Ports 17
Validation algorithms 29 SNMP Polling 38
Configuration 38
D IronMail variables 40
Syslog 41
DSN Bounce Verification 9
Configuration 10
How DSN Bounce Protection works 10
T
Dynamic Quarantine 20 TRUSign Updates 44
Enabling from the UI 20 Installing 44
TrustedSource variable 20 Locking current settings 44
Dynamic Spam Classifier 7 Special locking configurations 45
Configuring DSC 7 TrustedSource 2
How DSC Works 7 LDAP Rejections 3
Reporting 8 Whitelisting 2
Updating DSC 8
Whitelisting 8
W
E Whitelisting 22
Automated expiration 23
End User Quarantine 11 Include option 22

I
Image Spam Analysis 6
How ISC works 6

L
LDAP 16
Secure LDAP 16

47
Index

48
Part Number: 86-0948263-A
Software Version: IronMail 6.5.4
Product names used within are trademarks of their respective owners.
© 2008 Secure Computing Corporation. All rights reserved.

Anda mungkin juga menyukai