SonicWALL 7.2 manual Reports & Monitoring

Page 5

Reports & Monitoring

21

Inbound Good vs. Junk Email

22

Outbound Good vs. Junk Email

23

Junk Email Breakdown

24

Chapter 6

 

Junk Button for Microsoft Outlook

25

Feature Overview

25

How Does the Junk Button Work?

25

Using the Junk Button

25

installing the Junk Button

26

Index

27

Image 5
Contents SonicWALL, Inc SonicWALL Email Security User GuideSonicWALL Email Security User’s Guide Copyright Notice Table of Contents Reports & Monitoring Documentation Overview PrefaceDocumentation Conventions Finding Online HelpIi Preface About SonicWALL Email Security When a Message is Flagged as JunkAbout SonicWALL Email Security Deleting SpamSonicWALL Email Security 7.2 User’s Guide Managing the Junk BoxManaging the Junk Box Logging In to Your Junk BoxTo use Advanced View Searching in Your Junk BoxTo use Simple View Boolean Search Supported SearchWildcard Search Phrase SearchProximity Search Deleting MessagesUnjunking Messages Ending Your Junk Box Session Viewing Message ContentSonicWALL Email Security 7.2 User Guide Anti-Spam TechniquesManaging Allowed and Blocked Lists Anti-Spam Techniques Adding People to Allowed or Blocked ListsDeleting People from Allowed or Blocked Lists Adding a Company or Domain to the Allowed List Adding Companies or Domains to Allowed or Blocked ListsDeleting a Domain To enter the name of the domain into your allowed listAdding Lists to the Allowed List Configuring Anti-Spam AggressivenessDetermining Amounts and Flavors of Spam Configuring Smart Network Aggressiveness SettingsConfiguring Adversarial Bayesian Aggressiveness Settings Screening Messages in Other Languages Click Apply Changes Configuring Language Preferences for your Junk Box SummaryTo change the language Anti-Spam Techniques Spam Management SettingsTo add a user SettingsAssigning Users for the Junk Box Junk Box Summary To manage your junk summary settingsRemoving a User To remove a userSettings Send Simple Summary or Graphical Summary Settings Reports & Monitoring Reports & Monitoring Inbound Good vs. Junk EmailOutbound Good vs. Junk Email Junk Email Breakdown Reports & Monitoring How Does the Junk Button Work? Feature OverviewJunk Button for Microsoft Outlook Installing the Junk Button Using the Junk ButtonTo install the Junk Button Junk Button for Microsoft OutlookIndex Messages SonicWALL, Inc
Related manuals
Manual 28 pages 19.01 Kb

7.2 specifications

SonicWALL 7.2 represents a significant advancement in network security, offering enhanced features and technologies that cater to the evolving needs of businesses in the digital landscape. This latest iteration builds upon its predecessors, delivering robust protection against an array of cyber threats while enhancing operational efficiency.

One of the standout features of SonicWALL 7.2 is its Advanced Threat Protection (ATP), which leverages deep learning techniques and artificial intelligence to identify and neutralize sophisticated threats in real-time. By analyzing both encrypted and unencrypted traffic, ATP ensures that even the most elusive malware and ransomware are detected and mitigated before they can cause significant damage.

The platform also introduces Enhanced SSL Inspection capabilities, allowing organizations to inspect encrypted traffic without compromising performance. This is critical in today’s environment where a growing percentage of web traffic is encrypted, hiding potentially harmful activities from traditional security measures. SonicWALL 7.2 can decrypt, inspect, and re-encrypt traffic seamlessly, ensuring comprehensive threat visibility and defense.

In addition to these core features, SonicWALL 7.2 embraces a user-friendly interface that streamlines management and monitoring processes. The simplified dashboard provides administrators with real-time insights into security events, network performance, and potential vulnerabilities. This level of transparency is vital for rapidly addressing security incidents and maintaining compliance with industry regulations.

SonicWALL 7.2 also incorporates innovative technologies such as Capture Cloud Platform, which centralizes cybersecurity management and provides advanced analytics driven by machine learning. This cloud-based approach not only enhances responsiveness but also supports a more agile security posture, adapting to emerging threats as they arise.

Another key characteristic of SonicWALL 7.2 is its scalability. Whether a small business or a large enterprise, organizations can tailor their security solutions to meet their specific needs. The ability to easily scale allows businesses to grow without compromising their security infrastructure, enabling them to focus on core innovations and expansion.

In summary, SonicWALL 7.2 equips businesses with a powerful arsenal to combat today's cyber threats. With features such as Advanced Threat Protection, Enhanced SSL Inspection, a user-friendly interface, and the benefits of the Capture Cloud Platform, it addresses the critical demands for comprehensive security in an increasingly complex digital ecosystem. Organizations deploying SonicWALL 7.2 can expect not only improved security but also enhanced visibility and control over their network environments.