Enforced Client Product Guide

Using the Email Security Service

 

Setting up your account

7

4Do you want to manage all users’ quarantined messages in one central quarantine, rather than separate user quarantines?

Initially, each user’s detected spam is quarantined in an individual user quarantine, where you can go to manage that user’s spam. If you prefer to manage all your organization’s spam from one location, you can divert all spam to a central quarantine by changing your spam disposition.

5Do you want to allow attachments larger than 200 MB, or block attachments smaller than that?

By default, the protection service blocks all messages containing attachments that are larger than 200 MB. These messages are not delivered to users and cannot be retrieved. You can change this size limit using Attachment Manager on the Applications tab.

6Do you want to prohibit or approve messages based on the file type of any attachment?

On the Applications tab, enable Attachment Manager and configure a custom filter or one of the file type filters. For example, you might want to block potentially dangerous executable attachments, such as .EXE files, but specifically allow certain image file types.

7Do you want to prohibit or approve messages based on text in the message?

On the Applications tab, create Content Manager filters. For example, you might want to allow all messages containing the text “résumé” to make sure that no incoming resumes are accidentally filtered as spam.

8Do you want to adjust sensitivity for blocking specific types of server attacks?

Connection Manager automatically detects attacks against your email server, including directory harvest attacks, virus outbreaks, and spam attacks. You can optionally detect email bombs and change the sensitivity of blocking for individual types of attacks.

Configure general administration settings

Manage general system administration of the email security service on the Administration page.

To configure administrative settings:

1On the SecurityCenter website, click the SecurityCenter tab.

2Under Your email protection, select Click here to configure.

3On the portal, click the Administration tab.

Figure 7-2 Administration page

138

Page 138
Image 138
SonicWALL 4.5 manual Configure general administration settings, On the portal, click the Administration tab, 138

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.