SonicWALL 7.2 Junk Button for Microsoft Outlook, Feature Overview, How Does the Junk Button Work?

Page 34

SonicWALL Email Security 7.1 User Guide 27

C H A P T E R 6

Junk Button for Microsoft Outlook

This chapter describes the SonicWALL Junk Button for Outlook, a small application that can be added to Microsoft Outlook. The Junk Button allows end-users to report spam messages to the SonicWALL GRID Network. The GRID Network’s ability to detect spam is enhanced each time a user uses the Junk Button.

z“Feature Overview” section on page 27

z“How Does the Junk Button Work?” section on page 27

z“Using the Junk Button” section on page 28

Feature Overview

When a user presses the Junk Button, the highlighted email message is moved to the user’s Outlook Deleted Items folder and the message’s thumbprint is added to the GRID Network thumbprint database. As more thumbprint reports accrue about a message, SonicWALL Email Security appliances and installations are more likely to filter that message as spam so that other users do not see it.

Benefits:

zEmpowers users—Users are not just getting rid of their own spam, they are helping themselves and other users around the world.

zImproves enterprise spam filtering—The enterprise benefits from the human intelligence of its members because the amount of spam the organization as a whole receives is reduced.

zDecreases helpdesk requests—Users can report and dispose of spam themselves.

How Does the Junk Button Work?

The SonicWALL Junk Button allows you to remove spam from your inbox by clicking a small toolbar button in Microsoft Outlook. Your feedback helps block spam sent to you, your organization, and other people using SonicWALL Anti-Spam and Email Security products.

The SonicWALL GRID Network collects your “Junk vote”, parsing the spam email into its attributes and combining your vote with other sources. These reputation updates, called thumbprints, are delivered back to your SonicWALL Email Security system every five minutes, improving your system’s ability to block spam, phishing, and virus emails.

The text of messages is not reported to the GRID Network. Instead, the message is converted into a uniquely identifying hash, and only this hash is used in the thumbprint.

Image 34
Contents SonicWALL Email Security User Guide SonicWALL, IncSonicWALL Email Security User’s Guide Copyright Notice Table of Contents Reports & Monitoring Documentation Conventions PrefaceDocumentation Overview Finding Online HelpIi Preface When a Message is Flagged as Junk About SonicWALL Email SecurityDeleting Spam About SonicWALL Email SecurityManaging the Junk Box SonicWALL Email Security 7.2 User’s GuideLogging In to Your Junk Box Managing the Junk BoxTo use Simple View Searching in Your Junk BoxTo use Advanced View Wildcard Search Supported SearchBoolean Search Phrase SearchUnjunking Messages Deleting MessagesProximity Search Viewing Message Content Ending Your Junk Box SessionManaging Allowed and Blocked Lists Anti-Spam TechniquesSonicWALL Email Security 7.2 User Guide Deleting People from Allowed or Blocked Lists Adding People to Allowed or Blocked ListsAnti-Spam Techniques Deleting a Domain Adding Companies or Domains to Allowed or Blocked ListsAdding a Company or Domain to the Allowed List To enter the name of the domain into your allowed listConfiguring Anti-Spam Aggressiveness Adding Lists to the Allowed ListConfiguring Adversarial Bayesian Aggressiveness Settings Configuring Smart Network Aggressiveness SettingsDetermining Amounts and Flavors of Spam Screening Messages in Other Languages To change the language Configuring Language Preferences for your Junk Box SummaryClick Apply Changes Anti-Spam Techniques Settings Spam ManagementAssigning Users for the Junk Box SettingsTo add a user Removing a User To manage your junk summary settingsJunk Box Summary To remove a userSettings Send Simple Summary or Graphical Summary Settings Reports & Monitoring Outbound Good vs. Junk Email Inbound Good vs. Junk EmailReports & Monitoring Junk Email Breakdown Reports & Monitoring Junk Button for Microsoft Outlook Feature OverviewHow Does the Junk Button Work? To install the Junk Button Using the Junk ButtonInstalling the Junk Button Junk Button for Microsoft OutlookIndex Messages SonicWALL, Inc
Related manuals
Manual 28 pages 19.01 Kb

7.2 specifications

SonicWALL 7.2 represents a significant advancement in network security, offering enhanced features and technologies that cater to the evolving needs of businesses in the digital landscape. This latest iteration builds upon its predecessors, delivering robust protection against an array of cyber threats while enhancing operational efficiency.

One of the standout features of SonicWALL 7.2 is its Advanced Threat Protection (ATP), which leverages deep learning techniques and artificial intelligence to identify and neutralize sophisticated threats in real-time. By analyzing both encrypted and unencrypted traffic, ATP ensures that even the most elusive malware and ransomware are detected and mitigated before they can cause significant damage.

The platform also introduces Enhanced SSL Inspection capabilities, allowing organizations to inspect encrypted traffic without compromising performance. This is critical in today’s environment where a growing percentage of web traffic is encrypted, hiding potentially harmful activities from traditional security measures. SonicWALL 7.2 can decrypt, inspect, and re-encrypt traffic seamlessly, ensuring comprehensive threat visibility and defense.

In addition to these core features, SonicWALL 7.2 embraces a user-friendly interface that streamlines management and monitoring processes. The simplified dashboard provides administrators with real-time insights into security events, network performance, and potential vulnerabilities. This level of transparency is vital for rapidly addressing security incidents and maintaining compliance with industry regulations.

SonicWALL 7.2 also incorporates innovative technologies such as Capture Cloud Platform, which centralizes cybersecurity management and provides advanced analytics driven by machine learning. This cloud-based approach not only enhances responsiveness but also supports a more agile security posture, adapting to emerging threats as they arise.

Another key characteristic of SonicWALL 7.2 is its scalability. Whether a small business or a large enterprise, organizations can tailor their security solutions to meet their specific needs. The ability to easily scale allows businesses to grow without compromising their security infrastructure, enabling them to focus on core innovations and expansion.

In summary, SonicWALL 7.2 equips businesses with a powerful arsenal to combat today's cyber threats. With features such as Advanced Threat Protection, Enhanced SSL Inspection, a user-friendly interface, and the benefits of the Capture Cloud Platform, it addresses the critical demands for comprehensive security in an increasingly complex digital ecosystem. Organizations deploying SonicWALL 7.2 can expect not only improved security but also enhanced visibility and control over their network environments.