SonicWALL 7.2 manual Index

Page 36

Index

A adding

a delegate 16 companies or domains

allowed, blocked lists 8

lists

allowed list 9 people

allowed, blocked lists 7 address conflicts 7

Adversarial Bayesian Aggressiveness 11 allowed list

adding 9 allowed, blocked lists 7

adding companies or domains 8 adding people 7

deleting 9 deleting people 8

anti-spam aggressiveness settings 10

B

blocking

foreign languages 12 lists 7

C

companies or domains 9 configuring

Adversarial Bayesian Aggressiveness 11 language preferences 12

SMART Network Aggressiveness 11

D

delegates for junk box 16 deleting

companies or domains

allowed, blocked lists 9 delegate 17

junk mail 4

people from allowed, blocked lists 8 spam 2

Directory Harvest Attacks (DHA) 24 displaying

junk mail 4 downloading reports 21

F

foreign languages blocking 12 preferences 12

G

graphical junk box summary 19

J

junk box 1 delegates 16 searching 4

junk box summary 1, 17 configuring language preference 13 language 17

simple or graphical 19 junk mail

deleting 4 displaying 4

junk message 1

L languages

junk box summary 17 logging in 34

logging out 5

SonicWALL Email Security User’s Guide

29

Image 36
Contents SonicWALL Email Security User Guide SonicWALL, IncSonicWALL Email Security User’s Guide Copyright Notice Table of Contents Reports & Monitoring Preface Documentation OverviewDocumentation Conventions Finding Online HelpIi Preface When a Message is Flagged as Junk About SonicWALL Email SecurityDeleting Spam About SonicWALL Email SecurityManaging the Junk Box SonicWALL Email Security 7.2 User’s GuideLogging In to Your Junk Box Managing the Junk BoxSearching in Your Junk Box To use Simple ViewTo use Advanced View Supported Search Boolean SearchWildcard Search Phrase SearchDeleting Messages Unjunking MessagesProximity Search Viewing Message Content Ending Your Junk Box SessionAnti-Spam Techniques Managing Allowed and Blocked ListsSonicWALL Email Security 7.2 User Guide Adding People to Allowed or Blocked Lists Deleting People from Allowed or Blocked ListsAnti-Spam Techniques Adding Companies or Domains to Allowed or Blocked Lists Adding a Company or Domain to the Allowed ListDeleting a Domain To enter the name of the domain into your allowed listConfiguring Anti-Spam Aggressiveness Adding Lists to the Allowed ListConfiguring Smart Network Aggressiveness Settings Configuring Adversarial Bayesian Aggressiveness SettingsDetermining Amounts and Flavors of Spam Screening Messages in Other Languages Configuring Language Preferences for your Junk Box Summary To change the languageClick Apply Changes Anti-Spam Techniques Settings Spam ManagementSettings Assigning Users for the Junk BoxTo add a user To manage your junk summary settings Junk Box SummaryRemoving a User To remove a userSettings Send Simple Summary or Graphical Summary Settings Reports & Monitoring Inbound Good vs. Junk Email Outbound Good vs. Junk EmailReports & Monitoring Junk Email Breakdown Reports & Monitoring Feature Overview Junk Button for Microsoft OutlookHow Does the Junk Button Work? Using the Junk Button Installing the Junk ButtonTo install the Junk Button Junk Button for Microsoft OutlookIndex Messages SonicWALL, Inc
Related manuals
Manual 28 pages 19.01 Kb

7.2 specifications

SonicWALL 7.2 represents a significant advancement in network security, offering enhanced features and technologies that cater to the evolving needs of businesses in the digital landscape. This latest iteration builds upon its predecessors, delivering robust protection against an array of cyber threats while enhancing operational efficiency.

One of the standout features of SonicWALL 7.2 is its Advanced Threat Protection (ATP), which leverages deep learning techniques and artificial intelligence to identify and neutralize sophisticated threats in real-time. By analyzing both encrypted and unencrypted traffic, ATP ensures that even the most elusive malware and ransomware are detected and mitigated before they can cause significant damage.

The platform also introduces Enhanced SSL Inspection capabilities, allowing organizations to inspect encrypted traffic without compromising performance. This is critical in today’s environment where a growing percentage of web traffic is encrypted, hiding potentially harmful activities from traditional security measures. SonicWALL 7.2 can decrypt, inspect, and re-encrypt traffic seamlessly, ensuring comprehensive threat visibility and defense.

In addition to these core features, SonicWALL 7.2 embraces a user-friendly interface that streamlines management and monitoring processes. The simplified dashboard provides administrators with real-time insights into security events, network performance, and potential vulnerabilities. This level of transparency is vital for rapidly addressing security incidents and maintaining compliance with industry regulations.

SonicWALL 7.2 also incorporates innovative technologies such as Capture Cloud Platform, which centralizes cybersecurity management and provides advanced analytics driven by machine learning. This cloud-based approach not only enhances responsiveness but also supports a more agile security posture, adapting to emerging threats as they arise.

Another key characteristic of SonicWALL 7.2 is its scalability. Whether a small business or a large enterprise, organizations can tailor their security solutions to meet their specific needs. The ability to easily scale allows businesses to grow without compromising their security infrastructure, enabling them to focus on core innovations and expansion.

In summary, SonicWALL 7.2 equips businesses with a powerful arsenal to combat today's cyber threats. With features such as Advanced Threat Protection, Enhanced SSL Inspection, a user-friendly interface, and the benefits of the Capture Cloud Platform, it addresses the critical demands for comprehensive security in an increasingly complex digital ecosystem. Organizations deploying SonicWALL 7.2 can expect not only improved security but also enhanced visibility and control over their network environments.