Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Revision A
TRADEMARK ATTRIBUTIONS
McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee DeepSAFE, ePolicy Orchestrator, McAfee ePO, McAfee EMM, Foundscore,
Foundstone, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee Total
Protection, TrustedSource, VirusScan, WaveSecure are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and
other countries. Other names and brands may be claimed as the property of others.
Product and feature names and descriptions are subject to change without notice. Please visit mcafee.com for the most current products and features.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS
FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU
HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR
SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A
FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET
FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF
PURCHASE FOR A FULL REFUND.
Preface 9
About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
What's in this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Find product documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Index 513
Contents
About this guide
Find product documentation
Audience
McAfee documentation is carefully researched and written for the target audience.
The information in this guide is intended primarily for:
Administrators People who implement and enforce the company's security program.
Conventions
This guide uses these typographical conventions and icons.
Book title, term, Title of a book, chapter, or topic; a new term; emphasis.
emphasis
Bold Text that is strongly emphasized.
User input, code, Commands and other text that the user types; a code sample; a displayed
message message.
Interface text Words from the product interface like options, menus, buttons, and dialog
boxes.
Hypertext blue A link to a topic or to an external website.
Note: Additional information, like an alternate method of accessing an
option.
Tip: Suggestions and recommendations.
Task
1 Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com.
To access... Do this...
User documentation 1 Click Product Documentation.
KnowledgeBase Click Search the KnowledgeBase for answers to your product questions.
Click Browse the KnowledgeBase for articles listed by product and version.
McAfee Email Gateway protects your network from viruses, undesirable content, spam, and other
threats. Understand these concepts to help you configure your McAfee Email Gateway.
Contents
How McAfee Email Gateway processes mail traffic through your network
The interface
Ports used by McAfee Email Gateway
Resources
Top Frequently Asked Questions (FAQs)
Using the McAfee Email Gateway 7.x troubleshooting tree
Upgrading McAfee Email Gateway
About timeouts
Working with FIPS 140-2
The interface
The user interface provides you with an intuitive way of finding information and configuring options for
your McAfee Email Gateway.
The interface you see might look slightly different from that shown here, because it can vary depending
on the appliance's hardware platform, software version, and language.
A Navigation area
The navigation area contains four areas: user information, section icons, tab bar, and support controls.
C Section icons
The icons include the following:
Reports Use the Reports pages to view events recorded on the appliance, such as
viruses detected in email messages, and system activities such as details of
recent updates and logins.
Email Use the Email pages to manage threats to email messages, quarantine of
infected email, and other aspects of email configuration.
Troubleshoot Use the Troubleshoot pages to diagnose any problems with the appliance.
D Tab bar
The contents of the tab bar are controlled by the selected section icon. The selected tab dictates what
is displayed in the content area.
Icon Description
Refreshes or updates the content.
Returns you to the previously viewed page. We recommend that you click this button, rather
than your browser's Back button.
Appears when you configure something to allow you to apply your changes.
Appears when you configure something to allow you to cancel your changes.
Opens a window of Help information. Much of the information in this window also appears in
the Product Guide.
F View control
The status window, which appears in the bottom right of the interface, shows recent activity. New
messages are added at the top of the window. If a message is blue and underlined, you can click the
link to visit another page. You can also manage the window with its own Clear and Close links.
G Content area
The content area contains the currently active content and is where most of your interaction will be.
The changes that you make take effect after you click the green checkmark.
Contents
Make changes to the appliance's configuration
Using lists
Import and export information
Task
1 In the navigation bar, click an icon. The blue tabs below the icons change to show the available
features.
2 Click the tabs until you reach the page you need.
To locate any page, examine the tabs, or locate the subject in the Help index. The location of the
page is often described at the top of the Help page. Example:
3 On the page, select the options. Click the Help button (?) for information about each option.
5 To save your configuration changes, click the green checkmark icon at the top right of the window.
6 In the Configuration change comment window, type a comment to describe your changes, then click OK.
Wait a few minutes while the configuration is updated.
7 To see all your comments, select Review Configuration Changes in System | System Administration | Configuration
Management.
Using lists
Within the McAfee Email Gateway user interface, lists are used in many places to help define
information.
Contents
Make and view lists
Add information to a list
Remove single items from a list
Remove many items from a list
Change information in a list
View information in a long list
Order information in a list by priority
Order information alphabetically in a list
Task
1 Click Add below the list.
A new row appears in the table. If this is your first item, a column of checkboxes appears on the
left of the table. You might also see a Move column on the right of the table.
2 Type the details in the new row. Press Tab to move between fields.
3 For help with typing the correct information, move your cursor over the table cell, and wait for a
4
To save the new items immediately, click the green checkmark: .
Task
1 Click the item to select it. The row turns pale blue.
2
Click the trashcan icon , or click Delete at the bottom of the list.
Task
1 In the column of checkboxes on the left of the table, select each required item. To select many
items, select the checkbox in the table's heading row to select all the items, then deselect those
that you want to keep.
3
To save the new changes immediately, click the green checkmark: .
Task
1
Click the edit icon .
3
To save the new changes immediately, click the green checkmark:
4
To cancel any recent changes, click the close button at the top right of the window:
Task
1 To determine the position of an item in the list or the size of the list, view the text at the bottom of
the list, such as Items 20 to 29 of 40.
2 To move through the list or to move quickly to either end of the list, click the arrows at the bottom
right of the list. ( ).
Task
1 Find the row that contains the item.
2 In the Move column (on the right of the table), click the upward or downward arrow:
Task
To change the order:
To force items in a column into alphabetical order, click the column heading. Items in other
columns are automatically sorted accordingly. An icon appears in the column heading to indicate
that this column is sorted:
To reverse and restore the alphabetical order of the information within a single column, click the
icons in the column heading:
Contents
Import prepared information
Export prepared information
Task
1 Click Import.
Task
1 Click Export or Download.
2 In the Export or Download window, follow the instructions to create the file.
Intercept ports
When operating in either of the transparent modes transparent bridge mode or transparent router
mode the appliance uses the following intercept ports to intercept traffic to be scanned.
Listening ports
The appliance typically uses the following ports to listen for traffic on each protocol. The appliance
listens for traffic arriving on the designated ports. You can set up one or more listening ports for each
type of traffic being scanned by your appliance.
IP addresses needed for communication between McAfee Email Gateway and the
McAfee Email Protection (Hybrid)
To allow communication between McAfee Email Gateway and the McAfee Email Protection (Hybrid),
you must ensure that relevant IP addresses for the McAfee Email Protection (Hybrid) can be accessed
from your McAfee Email Gateway appliances.
Preferred Setting
If your hardware firewall solution accepts CIDR notation and supports Class 8 C notation, please
include the following:
Alternative settings
If your hardware firewall solution accepts CIDR notation but supports only Class 1 C notation, you
need to include the following entries for the entire subnet:
If your hardware firewall solution does not accept CIDR notation, you need to include the starting and
ending IP address for either the Class 8 C addresses or the Class 1 C addresses, which are included
above.
If your hardware firewall does not accept CIDR notation or ranges of starting and ending IP addresses,
you can download a complete listing of affected IP addresses at: http://co.mcafeesaas.com/configtest/
validiplist.txt.
You can make any of the above changes by creating a firewall rule or restricting access at the server
level. We highly recommend that you lock down these subnets at your firewall as the priority
preference. Please consult with your network administrator before making any changes. For additional
information regarding the restriction of IP addresses, please refer to instructions for setting up your
firewall or guidelines from your firewall provider.
Resources
The information, links, and supporting files that you can find from the Resources dialog box.
Click Resources from the black information bar at the top of the McAfee Email Gateway user interface.
The Resources dialog box contains links to different areas or to files that you might need when setting
up your appliance.
Submit a sample If you have a file that you believe to be malicious, but that your McAfee systems are
not detecting, you can safely submit it to McAfee for further analysis.
Follow the Submit a sample link and either log on or register as a new user to access the
McAfee Labs Tool to submit suspicious files.
Virus Information Viruses are continually evolving, with new malicious files being developed daily. To
Library find out more about particular viruses or other threats, follow the link to the McAfee
Threat Center.
ePO Extensions Download the McAfee ePolicy Orchestrator extensions for Email and Web Security
Appliances.
This file contains both the EWG and the EWS extensions.
The EWG extension allows reporting from within McAfee ePolicy Orchestrator for the
following products:
McAfee Email and Web Security Appliances version 5.5
McAfee Email and Web Security Appliances version 5.6
McAfee Web Gateway
McAfee Email Gateway
The EWS extension provides full McAfee ePolicy Orchestrator management for McAfee
Email and Web Security Appliances version 5.6.
For you to use McAfee ePolicy Orchestrator for either reporting or management, the
ePO extensions need to be installed on your McAfee ePolicy Orchestrator server.
ePO Help Download the McAfee ePolicy Orchestrator Help extensions for the ePO extensions
Extensions listed above.
This file installs the Help extensions relating to the McAfee ePolicy Orchestrator
extensions for Email and Web Security Appliances onto your McAfee ePolicy
Orchestrator server.
SMI File Download the Structure of Managed Information (SMI) file for use with the Simple
Network Management Protocol (SNMP).
This file provides information about the syntax used by the SNMP Management
Information Base (MIB) file.
MIB File Download the MIB file for use with SNMP.
This file is used to define the information that your McAfee Email Gateway can
transmit using SNMP.
HP OpenView Download the HP OpenView installer file to enable you to configure your McAfee Email
NNM Smart Gateway to communicate with HP OpenView.
Plug-in Installer
Download the McAfee Email Gateway 7.x troubleshooting tree from KnowledgeBase article PD23748.
Upgrading your appliance refers to installing the latest version of the McAfee Email Gateway software
onto your existing hardware or virtual appliances. Migrating refers to you setting up new hardware or
virtual appliances with the latest version of the McAfee Email Gateway software, and then using the
in-built migration tools to restore the protocol, policy and systems settings from your existing McAfee
Email Gateway system.
Features associated with LDAP and role-based access control include enhanced protection options in
McAfee Email Gateway.
There are several supported methods that you can choose from to manage the process in the way that
is best suited to your organization:
From a McAfee Email Gateway installation CD, perform a new installation and restore a
configuration file from a previous version
From a McAfee Email Gateway installation CD, perform an upgrade from a previous version
retaining configuration and log files
To perform the upgrade from another location, obtain the latest McAfee Email Gateway ISO image
and upload it on to an McAfee Email Gateway appliance using the Rescue Image feature (System |
System Administration | Rescue Image.
Before performing any upgrade, back up the McAfee Email Gateway configuration (System |
Cluster Management | Backup and Restore Configuration).
If installing on an McAfee Email Gateway Appliance cluster the steps must be carried out on all
appliances in the cluster, starting with the Failover Management appliance, then the Management
appliance, then the remainder.
If installing on a McAfee Email Gateway Blade Server, go first to the Failover Management blade server
to perform the upgrade, then repeat on the Management blade server, then the scanning blades.
Task
1 Turn on the appliance or blade server, and agree to the license agreement.
2 When the installation options menu appears, choose one of the following installation options:
a To upgrade from the appliance itself:
Choose option a to perform a new installation, then restore the McAfee Email Gateway Blade
Server configuration from a previously backed up configuration file.
Choose option c to back up the configuration, policies, log files, and email messages and
restore them automatically when you install the latest version of McAfee Email Gateway.
Choose option e to restore policy settings, but no log files or email messages.
To get a description of the installation options, press the RETURN key on the installation
options menu appears. Press the RETURN key to continue through the descriptions until you
return to the installation options menu.
b Use the installation options menu to define any further installation options such as the action
you want to take when the installation finishes, and press the ENTER key.
c Select option a to perform the upgrade, then press the ENTER key to confirm the installation
option you chose.
d Press the RETURN key to complete the installation, and wait while the computer restarts.
If you chose option a, select Restore from a File to reinstate the previous configuration settings.
Depending on the installation option you chose, all protocol, email policy, and system settings from
McAfee Email Gateway 7.0.3 are migrated for you to ensure your previous level of protection is
maintained.
To change any network settings after installation, select System | Appliance Management | General and click
Change Network Settings.
After an operating system is installed on a virtual appliance, the virtual machine always starts from
the hard disk first. To work around this feature, you have to shut down the virtual machine and
configure a power-on-boot delay so that you have enough time to access the Boot menu and tell it to
start from the installation CD instead.
Task
1 Download the McAfee Email Gateway Virtual Appliance .ISO upgrade file from the McAfee download
site and extract it.
3 Log on to VMware ESX Server or use the VMware Infrastructure Client, or the VMware vSphere
Client to log on to VMware Virtual Center Server.
4 Enable a Power-on-Boot delay to get enough time to force the virtual machine to boot from CD:
a Select the virtual appliance in the Inventory list and click Summary.
c In Power-on-Boot delay, type 10,000 in the text box, and click OK.
6 Make sure the cursor focus is on the virtual appliance console. Then press the ESC key to open the
Boot Menu.
7 Release the cursor from the console and select Connect CD/DVD1.
8 Browse to the folder where you downloaded the McAfee Email Gateway Virtual Appliance .ISO file
and double-click <McAfee-MEG 7.5-<build-number>.VMbuy.iso>.
9 When the .ISO file is connected, click back on to the console screen. Select CD-ROM Drive and press
the ENTER key.
11 Select the upgrade option that you want, and press the ENTER key to perform the upgrade.
Depending on the installation option you chose, all protocol, email policy, and system settings from
McAfee Email Gateway Virtual Appliance 7.0.3 are migrated for you to ensure your previous level of
protection is maintained.
This upgrade process automatically disconnects the appliance from being managed by
McAfee ePO.
The inbuilt McAfee Email Gateway migration tools migrate many of your McAfee Email Gateway 7.0.3
settings for you. However, some settings may need to be recreated.
Task
1 In McAfee ePO, click Policy Catalog and select the McAfee Email Gateway 7.0.3 product.
8 Select the epo_config_<date_stamp>.xml file produced at the end of this process, and save the file.
9 From the McAfee Email Gateway Resources link, download the ePO Extensions and ePO Help Extensions
files.
10 From McAfee ePO, install the ePO Extensions and ePO Help Extensions files.
11 In McAfee ePO, click Policy Catalog and select the McAfee Email Gateway product.
The policies and settings within the configuration file are migrated across to your McAfee ePO
server.
After you have imported the settings into McAfee Email Gateway managed by McAfee ePO, you
need to re-assign the migrated policies to the correct groups in the System Tree in McAfee ePO.
13 On McAfee ePO, navigate to Menu | Gateway Protection | Email and Web Gateway.
14 From Actions, select Export Connection Settings. Save the epoConfig<xxxxxxx>.zip file.
15 On your McAfee Email Gateway, navigate to System | Component Management | ePO, click Import ePO
connection settings. Browse to the epoConfig<xxxxxxx>.zip file, and click OK.
Your McAfee ePO configuration settings are imported into your McAfee Email Gateway appliance.
16 Select both Enable ePO management, and Allow configuration to be applied from ePO.
If you chose to create a scheduled task to push your McAfee Email Gateway 7.0.3 DLP database to the
new McAfee Email Gateway version, you will need to create an equivalent scheduled task to push the
new McAfee Email Gateway DLP database to your appliance.
About timeouts
Learn about the timeouts that occur between the appliance receiving a message, scanning it, and
delivering it.
When the appliance receives an email message, the SMTP conversation and corresponding timeouts
occur as follows:
T0 The time the appliance receives the connection (where time = zero)
T1 The time taken between commands (EHLO, MAIL FRIM, RCPT TO, DATA (but not the dot that
signifies the end of DATA), RSET) defined in Email | Email Configuration | Protocol Configuration | Connection
Settings (SMTP) | Timeouts
T2 The time taken between receiving the chunks of data during DATA transfer
T3 The time taken for the whole conversation to occur, that is, to receive a message, scan it,
and deliver it
T4 The total time taken to scan the message, that is, when the appliance has received all the
data
As an email message passes through the appliance, the following timeouts are applied.
Client: Connection
Client: EHLO
Appliance: 250 OK
The appliance waits T1 seconds to receive the next command
Appliance: 220 OK
The appliance waits T1 seconds to receive the next command
Appliance 220 OK
The appliance waits T1 seconds to receive the next command
Client: DATA
Client:
Subject: 1234
Hello there
The appliance delivers the message and makes an onward connection. It has taken T3 T5
T0 to deliver the message. In other words, if the overall time to process a message is six
minutes, (T3), and receiving the message and scanning has taken four minutes, the appliance
has two minutes to deliver the message. If this limit is exceeded, the email is queued for
delivery later.
Appliance: 250 OK
FIPs mode is enabled during installation. When the appliance is installed with FIPS mode enabled, the
Email Gateway installation menu (available locally, serial, ssh) is available. By default, it does not
include "Shell access"
To enable FIPS, select Option k Enable FIPS 140-2 level 1 compliant installation in the configuration console, then
select Option a - Perform installation.
In the Email Gateway Configuration Menu, a FIPS option is available. Select it to access the following options:
This privilege is available to an administrator role with Access system administration privileges.
SSLFIPS Enable or disable the OpenSSL FIPS checking (enabled by default) All applications on the
appliance that use the OpenSSL library perform the OpenSSL FIPS validity check when they
start. If it causes compatibility issues with other devices, it can be disabled
Validate Re-run FIPS validity tests The ability to re-run the tests and view the output in the console.
To check that the appliance is running in FIPS mode, click About the Appliance in the menu bar. The FIPS
140-2 Compliant status shows Yes, No, or Partial.
FIPS validation failures occurred, where the failure handling has been modified from the
default setting Prompt for cryptographic officer password.
Go to Reports | System Reports in the user interface to get more information about the FIPS
status.
When you first open the browser, you see the Dashboard, which gives a summary of the activity of the
appliance.
Dashboard
From this page you can access most of the pages that control the appliance.
Contents
The Dashboard
Option definitions Inbound Mail Summary portlet
Option definitions Outbound Mail Summary portlet
Option definitions SMTP Detections portlet
Option definitions POP3 Detections portlet
Option definitions System Summary portlet
Option definitions Hardware Summary portlet
Option definitions Network Summary portlet
Option definitions Services portlet
Option definitions Clustering portlet
Option definitions Tasks portlet
The Dashboard
The Dashboard provides a summary of the activity of the appliance.
Dashboard
On a cluster master appliance, use this page also to see a summary of activity on the cluster of
appliances.
On a McAfee Email Gateway Blade Server master blade, use this page also to see a summary of all
activity on the scanning blades within the McAfee Email Gateway Blade Server.
Some portlets display graphs that show appliance activity over the following periods of time:
1 hour 2 weeks
1 week
Within the Dashboard, you can make some changes to the information and graphs displayed:
Expand and collapse the portlet data using the and buttons in the portlet's top right-hand
corner.
See a status indicator that shows whether the item needs attention:
Healthy The reported items are functioning normally.
Requires Attention A warning threshold has been exceeded.
Requires Immediate Attention A critical threshold has been exceeded.
Disabled A service is not enabled.
Use and to zoom in and zoom out of a timeline of information. There is a short delay while
the view is updated. By default, the Dashboard shows data relating to the previous one day.
Double-click the top bar of a portlet to expand it across the top of the Dashboard.
Set your own alert and warning thresholds to trigger events. To do so, highlight the item and click
it, edit the alert and warning threshold fields, and click Save. When the item exceeds the threshold
you set, an event is triggered.
Depending on the browser used to view the McAfee Email Gateway user interface, the Dashboard
"remembers" the current state of each portlet (whether it is expanded or collapsed, and if you have
drilled down to view specific data), and attempts to re-create that view if you navigate to another page
within the user interface and then return to the Dashboard within the same browsing session.
Dashboard portlets
The McAfee Email Gateway Dashboard portlets provide information about the state of email traffic,
recent detections and the current status of your McAfee Email Gateway.
Option Definition
Inbound Mail Displays the delivery and status information about messages sent to your
Summary organization.
Outbound Mail Displays the delivery and status information about messages sent from your
Summary organization.
SMTP Detections Displays the total number of messages that triggered a detection based on the
sender or connection, the recipient, or the content, and to view data specific to
either inbound or outbound SMTP traffic.
POP3 Detections Displays how many messages triggered a detection based on threats such as
viruses, packers, or potentially inappropriate images.
System Summary Displays information about load balancing, the disk space used for each partition,
total CPU usage, used and available memory, and swap details.
Hardware Summary Status indicators to show the status of network interfaces, UPS servers, bridge
mode (if enabled), and RAID status.
Network Summary Provides information about the status of your connections, network throughput
and counters relating to Kernel Mode Blocking
Services Displays update and service status statistics based on protocol and external
servers used by the appliance.
Clustering Provides information about the entire cluster when appliance is part of a cluster or
you are using the blade server hardware.
Tasks Links directly to the areas of the user interface that search the message queue,
view reports, manage policies, configure mail protocol settings and network and
system settings, and access troubleshooting features.
Configurable thresholds
You can configure user-defined warning thresholds and critical thresholds for some status indicators.
When set, McAfee Email Gateway then provides the relevant level of warnings when these
user-defined values are exceeded.
For the System Summary portlet, you can configure the threshold values for the following parameters:
Swap | Used
Disk Space | /deferred | Inodes used
Disk Space | /deferred | Disk used
Disk Space | /encryption | Inodes used
Disk Space | /encryption | Disk used
For the Services portlet, you can configure the threshold values for the following parameters:
Task
1 Expand the Dashboard | System Summary portlet.
3 Click the status indicator (the red, yellow or green circle) for the area on which to set the
threshold.
The parameter name is replaced as shown:
4
Adjust the threshold values for the Requires Attention and Requires Immediate Attention threshold
fields.
When the values for the dashboard information reaches the new threshold, the status indicator
changes to the appropriate color and an event is logged.
Events will not be logged until after the thresholds have been saved, the next Dashboard refresh has
taken place and the threshold has been hit or exceeded.
You can set thresholds for warnings, alerts or both. The warning threshold must be equal to or less than
the alert threshold.
Task
1 Expand the Dashboard | Services portlet.
2 Click the status icon beside the area to have thresholds set.
3
Adjust the threshold values for the Requires Attention and Requires Immediate Attention threshold
fields.
When the values for the dashboard information reaches the new threshold, the status indicator
changes to the appropriate color and an event is logged.
Events will not be logged until after the thresholds have been saved, the next Dashboard refresh has
taken place and the threshold has been hit or exceeded.
The information in this portlet relates to data from the SMTP Detections | Inbound portlet. Data is shown in
bar chart format.
Blocked Queued
Bounced Quarantined
Counter Definition
Total Inbound A top level counter which increments for each email that passes the MAIL FROM stage
Messages of the SMTP conversation.
If multiple messages are sent down one connection, this counter will increment. You
can drill down to see how the email connection was received:
TLS The email was received over a TLS connection.
Non TLS The email was received over a standard non TLS connection.
Delivered A top level counter which increments for each email that is delivered. You can drill down
to see how the email was delivered:
Plain The email was delivered as a standard plain message.
Encrypted The email was delivered encrypted by:
TLS The email was delivered over a TLS connection:
Secure Web Mail The content was encrypted using one of the following methods:
Push
Pull
Push/Pull
S/Mime The content was encrypted by S/MIME.
PGP The content was encrypted by PGP.
Plain The content was a standard plain message.
Non TLS The email was delivered over a standard non TLS connection:
Secure Web Mail The content was encrypted by one of the following methods:
Push
Pull
Push/Pull
S/Mime The content was encrypted by S/MIME.
PGP The content was encrypted by PGP.
Counter Definition
Blocked A top level counter which increments for each email that is blocked. You can expand the
counter to see the number of messages blocked by sender or connection, recipient, and
content:
Sender/Connection provides a breakdown of the scanner that blocked the email,
either:
Deny Sender BATV
RBL (Real-time blackhole lists) SPF (Sender Policy Framework).
FCrDNS
Recipient provides a breakdown of the scanner that blocked the email, either:
Anti-Relay LDAP Recipient
Grey Listing Directory Harvesting
Rejected Recipient
Content provides a breakdown of the scanner that blocked the email, either:
GTI Message Reputation Compliance
Sender ID Image Filtering
DKIM Mail URL Reputation
Spam Mail URL Reputation DoS
Phish DLP
Mail Filtering Virus
Mail Size Filtering PUPs
File Filtering Packers
Denial of Service
A single message may be quarantined to more than one category. Summing the total
number of messages in all categories will not necessarily generate the total quarantined
messages.
Sender and Type the name of a particular sender or recipient for whom you wish to locate a
Recipient message, and click Search to go to the Message Search page.
Search Click Search to go to the Message Search feature where you can look for messages based
on their status; either blocked, bounced, delivered, quarantined, or queued.
Blocked Queued
Bounced Quarantined
If you are using the quarantine features, messages may also summarized in the quarantined list.
Counter Definition
Total Outbound A top level counter which increments for each email that passes the MAIL TO stage of
Messages the SMTP conversation.
If multiple messages are sent down one connection, this counter will increment. You
can drill down to see how the email connection was received:
TLS The email was received over a TLS connection.
Non TLS The email was received over a standard non TLS connection.
Delivered A top level counter which increments for each email that is delivered. You can drill down
to see how the email was delivered:
Plain The email was delivered as a standard plain message
Encrypted The email was delivered encrypted by:
TLS The email was delivered over a TLS connection:
Secure Web Mail the content was encrypted using one of the following methods:
Push
Pull
Push/Pull
S/Mime The content was encrypted by S/MIME.
PGP The content was encrypted by PGP.
Plain The content was a standard plain message.
Non TLS The email was delivered over a standard non TLS connection:
Secure Web Mail The content was encrypted by one of the following methods:
Push
Pull
Push/Pull
S/Mime The content was encrypted by S/MIME.
PGP The content was encrypted by PGP.
Counter Definition
Blocked A top level counter which increments for each email that is blocked. You can expand the
counter to see the number of messages blocked by sender or connection, recipient, and
content:
Sender/Connection Provides a breakdown of the scanner that blocked the email, either:
Deny Sender BATV
RBL (Real-time blackhole lists) SPF (Sender Policy Framework).
FCrDNS
Recipient Provides a breakdown of the scanner that blocked the email, either:
Anti-Relay LDAP Recipient
Grey Listing Directory Harvesting
Rejected Recipient
Content Provides a breakdown of the scanner that blocked the email, either:
GTI Message Reputation Compliance
Sender ID Image Filtering
DKIM Mail URL Reputation
Spam Mail URL Reputation DoS
Phish DLP
Mail Filtering Virus
Mail Size Filtering PUPs
File Filtering Packers
Denial of Service
A single message may be quarantined to more than one category. Summing the total
number of messages in all categories will not necessarily generate the total quarantined
messages.
Search Click Search to go to the Message Search feature where you can look for messages based on
their status; either blocked, bounced, delivered, quarantined, or queued.
The counters that appear in this portlet work differently to those in the Inbound and Outbound
Summary portlets where each message represents a single counter. In the Detections portlets, one
message can increment several counters, depending on the number of checks it fails.
Option Definition
Total Shows the total number of inbound and outbound messages that triggered a detection, and
expands the statistics further to see the number of messages based on the following
criteria:
Sender/Connection Provides a breakdown of the scanner that triggered a detection, either:
Deny Sender BATV
RBL (Real-time blackhole lists) SPF (Sender Policy Framework)
FCrDNS
Policy Based Action Provides a count of the actions taken based on policy rather than a
scanning trigger.
Content Provides a breakdown of the scanner that triggered a detection, either:
GTI Message Reputation
Sender ID
DKIM
Spam
Phish
Mail Filtering
Mail Size Filtering
File Filtering
Denial of Service
Compliance
Image Filtering
Mail URL Reputation
Mail URL Reputation DoS
DLP
Virus By either the McAfee or the Commtouch Command scanner
PUPs By either the McAfee or the Commtouch Command scanner
Packers By either the McAfee or the Commtouch Command scanner
Inbound Shows the total number of inbound messages that triggered a detection, and expands the
statistics further to see the number of messages based on the following criteria:
Sender/Connection Provides a breakdown of the scanner that triggered a detection, either:
Deny Sender BATV
RBL (Real-time blackhole lists) SPF (Sender Policy Framework)
FCrDNS
Option Definition
Anti-Relay LDAP Recipient
Grey Listing Directory Harvesting
Rejected Recipient
Policy Based Action Provides a count of the actions taken based on policy rather than a
scanning trigger.
Content Provides a breakdown of the scanner that triggered a detection, either:
GTI Message Reputation
Sender ID
DKIM
Spam
Phish
Mail Filtering
Mail Size Filtering
File Filtering
Denial of Service
Compliance
Image Filtering
Mail URL Reputation
Mail URL Reputation DoS
DLP
Virus By either the McAfee or the Commtouch Command scanner
PUPs By either the McAfee or the Commtouch Command scanner
Packers By either the McAfee or the Commtouch Command scanner
Outbound Shows the total number of inbound messages that triggered a detection, and expands the
statistics further to see the number of messages based on the following criteria:
Sender/Connection Provides a breakdown of the scanner that triggered a detection, either:
Deny Sender BATV
RBL (Real-time blackhole lists) SPF (Sender Policy Framework)
FCrDNS
Policy Based Action Provides a count of the actions taken based on policy rather than a
scanning trigger.
Content Provides a breakdown of the scanner that triggered a detection, either:
GTI Message Reputation
Option Definition
Sender ID
DKIM
Spam
Phish
Mail Filtering
Mail Size Filtering
File Filtering
Denial of Service
Compliance
Image Filtering
Mail URL Reputation
Mail URL Reputation DoS
DLP
Virus By either the McAfee or the Commtouch Command scanner
PUPs By either the McAfee or the Commtouch Command scanner
Packers By either the McAfee or the Commtouch Command scanner
The counters that appear in this portlet work differently to those in the Inbound and Outbound
Summary portlets where each message represents a single counter incrementation. In the Detections
portlets, one message can increment several counters, depending on the number of checks it fails.
Option Definition
Spam Messages that could originate from a spammer.
Phish Messages that could contain a phish attack.
Mail Size Filtering Messages filtered because of their size.
Image Filtering Messages that could contain inappropriate or pornographic images.
Virus Messages that exhibit virus-like behavior or content.
PUPs Messages that contain potentially unwanted programs.
Packers Messages that could contain packers.
Option Definition
Uptime Displays the amount of time the appliance has been running since it was last started
Load Average Displays the five second load average
Processor Displays the total usage for all processors
Memory Displays:
Memory used includes used and buffered memory
Free memory includes free and cached memory
Swap Displays:
Used Percentage used of swap (the area on the hard disk that is part of the
appliance's virtual memory which temporarily stores inactive memory pages if there
is insufficient physical memory available to do so.)
Rate A high swap-rate indicates the system is in some form of overload.
Disk Space Displays the percentage of Inodes and disk space used for each partition
Message Queue Displays the current status of the message queue.
Information states
On the Hardware Summary portlet, there are the following status indicators available:
functioning normally
a warning threshold has been exceeded
a critical threshold has been exceeded
the service is not enabled.
Further descriptions of a red status indicator for external services are given in the definition table.
Option Definition
Network Shows the following for LAN1 and LAN2:
Interface
Received Data received over the network interface
Transmitted Data sent over the network interface
Speed Speed of the network interface in bits per second
A red status indicator against any Network Interface indicates that urgent attention is
required.
You may need to:
Review your network configuration and check it is correct.
Check that the switch is functioning correctly.
Check that the switch configuration is correct.
Check the cabling to and from the appliance. (Not necessary for the Content
Security Blade Server).
In virtual appliance installations, check the virtual switch configuration.
Hardware Shows a summary status indicator about the following hardware modules:
Modules
Temperature Cooling Device
Voltage Memory
Fan Module Board
Current Cable Interconnect
Physical Security Management subsystem
Power Supply
Any module that is not installed is categorized as Not Applicable. Any module that shows as
red or amber contains links to Troubleshoot | Tools | Hardware Status where you can get more
detailed information.
Requires Immediate Attention The UPS is offline
Critical The battery is low
Option Definition
Bridge A red status indicates that McAfee Email Gateway is running in bridge mode, and is not
forwarding the network data.
RAID Depending on the type of RAID controller and hard disk drives installed on your appliance
or blade server, the overall status of the RAID system is displayed:
Healthy The RAID system is functioning correctly.
Requires attention The RAID system is functioning, but one or more of the hard disk
drives are reporting that a predictive failure is imminent.
Critical One or more hard disk drives have failed.
In addition, where this information is reported to McAfee Email Gateway, the status of
each hard disk drive within the RAID array is reported. The possible statuses for these
drives are:
Healthy The hard disk drive is functioning correctly.
Operational but requires attention The diagnostics within the hard disk drive is reporting
that failure of the drive is possible. This indicates that the drive needs to be replaced.
Requires immediate attention The hard disk drive has failed and needs to be replaced
immediately.
Option Definition
Connections A top level counter which increments to show the total number of TCP connections
made to the SMTP port on the appliance
Throughput A top level counter which increments to show the average throughput of data for all
TCP connections made to the SMTP port on the appliance
Kernel Mode A top level counter which increments to show the total number of SYN packets
Blocking blocked from an IP address that has triggered a Reject, close and deny (Block) action. The
GTI message reputation lookup feature is configured to perform this action by default
for the next ten minutes.
Within the Kernel Mode Blocking counter, you can also drill down to view information
about the number of Blocked Hosts.
The information given by the Kernel Mode Blocking counter are the number of blocked
packets for the currently selected time frame. The information given by the Blocked Hosts
counter are the number of hosts currently being blocked.
Information states
On the Services portlet, the following status indicators are available:
Functioning normally.
A warning threshold has been exceeded.
A critical threshold has been exceeded.
The service is not enabled.
Further descriptions of a red status indicator for external services are given in the definition table.
Option Definition
Updates Anti-Virus Shows the anti-virus DAT and engine update status. Any older than three days
are shown in red.
If you have activated the additional Commtouch Command anti-virus engine, information
specific to this engine is also shown.
Anti-Spam Shows the anti-spam definition and engine update status. Any older than 30
minutes are shown in red.
Status Configuration Shows any configuration alerts, such as the appliance operating as an open
relay.
FIPS 140-2 Compliance When installed in FIPS-compliant mode, shows the current FIPS
status for the McAfee Email Gateway. More details information on the FIPS status can be
found at Troubleshoot | Tools | FIPS Status.
SMTP Service Shows whether the SMTP service is functioning correctly.
POP3 Service Shows whether the POP3 service is functioning correctly.
Encryption Service Shows whether the encryption service is functioning correctly.
External McAfee ePO Shows the state of the communication between McAfee Email Gateway and
McAfee ePolicy Orchestrator.
The following are reported:
Event Reports Events are regularly sent from the appliance to the ePolicy Orchestrator
server for to be used to generate reports. If event files are not successfully uploaded,
this indicator turns red. (The default threshold is 25 files that failed to upload.)
Communication Attempts The appliance communicates with the McAfee ePO server at
regular intervals. Failures with these communication attempts are shown here.
Configuration Integrity The appliance checks that the configuration that has been pushed
by the ePolicy Orchestrator server does not contain any inconsistencies. Inconsistencies
could be a policy that refers to a Policy group or Directory service that might no longer
exist. The status is either Healthy, or Operational, but requires attention.
This issue can occur if incorrect McAfee ePO policies are assigned within the McAfee ePO
System tree.
Policy Enforcement Confirmation that the policy has been correctly enforced on the
appliance.
DLP DB Updates Confirmation that the Data Loss Prevention database has been correctly
updated.
MQM Shows the state of the communication between McAfee Email Gateway and McAfee
Quarantine Manager (MQM).
A red status indicates that communication between McAfee Email Gateway and MQM is
broken.
GTI Message Reputation Shows the state of the communication between McAfee Email
Gateway and the McAfee Global Threat Intelligence (McAfee GTI) message reputation
server.
A red status indicates that communication between McAfee Email Gateway and the McAfee
GTI message reputation server is broken.
GTI Feedback Shows the state of the communication between McAfee Email Gateway and
the McAfee Global Threat Intelligence feedback server.
Option Definition
A red status indicates that communication between McAfee Email Gateway and the McAfee
GTI feedback server is broken.
GTI File Reputation Shows the state of the communication between McAfee Email Gateway
and the McAfee GTI file reputation server.
A red status indicates that a DNS query of a sample <Artemis> query did not respond
with the expected answer.
RBL Shows the state of the communication between McAfee Email Gateway and any RBL
(Real-time Blackhole List) servers that are configured.
A red status indicates that communication between McAfee Email Gateway and RBL
servers is broken, or gray status can indicate that there are no servers to monitor.
Syslog Shows the state of the communication between McAfee Email Gateway and any
off-box system log servers that are configured.
A red status indicates that communication between McAfee Email Gateway and the system
log servers is broken, or a gray status can indicate that there are no servers to monitor.
LDAP Shows the state of the communication between McAfee Email Gateway and any
LDAP servers that are configured.
A red status indicates that a test query did not respond with the expected response, or
gray status can indicate that there are no servers to monitor.
SNMP Shows whether the SNMP service is functioning correctly.
A red status indicates that the SNMPD agent is not running or functioning correctly.
DNS Shows the state of the communication between McAfee Email Gateway and any
DNS servers that are configured.
A red status indicates that communication between McAfee Email Gateway and the DNS
servers is broken, or gray status can indicate that there are no servers to monitor.
NTP Shows the state of the communication between McAfee Email Gateway and active
NTP (Network Time Protocol) servers that are configured.
A red status indicates that the time synchronization is not up to date with the active NTP
server.
This section is available only on a cluster master appliance or management blade (on a blade
server).
Option Definition
Email When clicked, the meter displays Message per hour.
Message per hour Displays the average throughput of the cluster, based on measurements taken every
few minutes. If the cluster has twice as many scanning appliances, its throughput
almost doubles too. Extra management activity consumes some of the processing
power
Option Definition
Status Displays the status of the device:
Operating normally
Needs attention
Cluster Failover
Load Displays the average system load over a period of five minutes
Active Displays the number of active connections for each appliance. The row for the
cluster master shows the total for all appliance
Connections Displays the number of connections handled by each appliance since the counters
were last reset
Component version Displays the versions of anti-spam and anti-virus DAT files. The version numbers are
information the same if the appliances are up-to-date. During updating, the values might be
different. To see more information, move the cursor over the text and wait for a
yellow box to appear
Option Definition
View Message Search the Message Queue Search for messages blocked, bounced, delivered,
Queue and quarantined, and queued by sender, recipient, and subject.
Reports
View Favorite Reports Display your most popular email reports in a variety of view
types.
Manage Scheduled Reports Create schedules for available report documents, such as
email activity.
Create Policy Manage Policy (SMTP) Go to the Email Policies settings for the SMTP protocol where you
can create and edit policies for anti-virus and anti-spam protection, and compliance
settings.
Manage Policy (POP3) Go to the Email Policies settings for the POP3 protocol where you
can create and edit policies for anti-virus and anti-spam protection, and compliance
settings.
Manage Compliance Dictionaries Choose from a library of predefined rules, or create your
own rules and dictionaries specific to your organization. Compliance rules can vary in
complexity from a straightforward trigger when an individual term within a dictionary
is detected, to building on and combining score-based dictionaries which will only
trigger when a certain threshold is reached. Using the advanced features of
compliance rules, dictionaries can be combined using logical operations.
Register DLP Documents Restrict the flow of sensitive information sent by email
through the appliance. for example, block the transmission of a sensitive document
such as a financial report that is to be sent outside of your organization.
Configure Mail Configure Email Relay Domains Build a list of IP addresses, networks, and users who
Protocol can, or cannot connect to the appliance.
Configure Domain Routing Set up the network hosts that you want the appliance to use
to route mail traffic to specific domains.
Configure Encryption Enable the appliance to use supported encryption methods to
securely deliver your email messages.
Manage Certificates Use digitally signed certificates for tasks such as securely
transferring email using TLS, or using S/MIME certificates.
Configure Manage Network Settings View and edit basic settings for the appliance such as its
Network domain name, and the network interfaces settings.
Manage a Cluster Specify the appliance's load balancing requirements when it acts as
part of a cluster.
Manage Virtual Hosting Specify the addresses where the appliance receives or
intercepts mail traffic on the Inbound Address Pool.
Option Definition
Configure Configure ePO Management Set up the appliance to be managed by epolicy
System Orchestrator.
Configure Quarantine Options Tell the appliane to store quarantined messages itself, or
to store them using the McAfee Quarantine Manager (MQM) service.
Generate Syslog Reports Set up and view system logs for a variety of events.
Define Directory Services Configure the appliance to work with your LDAP servers.
Configure SNMP Send alerts to the trap manager for a variety of events.
Configure DNS and Routing Create a list of DNS servers and sort them in order of
priority, and set up routes.
Troubleshoot Generate a Minimum Escalation Reports Create a report that contains the minimum
information needed by support to help them diagnose a problem with the appliance.
Run System Tests Perform a series of tests on the appliance to ensure that key areas
are functioning correctly.
Back up and Restore Configuration Configure the appliance to back up the configuration,
or create a backup schedule, and restore the configuration if necessary.
This topic provides an overview of the features within Email Gateway that relate to reporting the
activities of the appliance.
Reports
Contents
Types of reports
Message Search overview
Scheduled Reports
Scheduled Reports New Report dialog box
Scheduled Reports Edit Report dialog box
Email Reports
System Reports
Types of reports
You can generate reports either on your appliance, your ePolicy Orchestrator server, or externally.
Reports
Use the external methods to keep the reported events over a longer period of time than that offered
by the reporting options on the appliance itself. Use features available from System | Logging, Alerting and
SNMP, or McAfee ePolicy Orchestrator to send data to generate reports externally.
Use the appliance Dashboard to see high-level event statistics. Use the options in Reports to produce
regular and real-time reports on the following types of events on the appliance.
Message Search provides you with a convenient method to locate email messages on your appliance.
If the appliance has not received the message body, the message cannot be found in Message Search. For
example, if an email message is blocked by the Real-time Blackhole Lists (RBLs), the appliance will not have
received the message body. In this situation, use Reports | Email Reports from the McAfee Email Gateway to
find further information about this email message.
Contents
Benefits of using Message Search
Message Search parameters
Message Search results
Message Search icons
Task Identify quarantined email messages
Task Find out which email messages are queued
Task Find out which email messages are being blocked
Task Find the emails that were successfully delivered
Task A user has requested that I release one of their quarantined email messages
From a single location within the user interface, Message Search allows you to confirm the status of
email messages that have passed through the appliance. It provides you with information about the
email, including:
You can use a wide range of different criteria to search on, including:
Audit ID
If you have configured Sender address masquerading or Recipient address aliasing, Message Search shows the
masqueraded or aliased email addresses.
Option Definition
Message status You can choose to search All email messages. If you suspect that a message is in a
certain state, you can also search only for messages that are:
Blocked
Bounced
Delivered
Quarantined
Queued
You can multi-select to search for messages in more than one status.
Sender, You can search for emails containing particular sender, recipient, or subject text.
Recipient, Subject The appliance can modify the subject of some emails, typically by adding a [spam] or
[phish] prefix to the subject line. However, the subject displayed on the Message Search
page is the original subject line of the email message before the appliance makes
any changes.
To search for a literal *, ?, or \ character within these fields, use the backslash (\)
character before the search term. For example, use \* to search for the asterisk
character.
Option Definition
Category When you search on Blocked or Quarantined items, you can further refine your search by
selecting the Category that the appliance used to block or quarantine the message.
When viewing messages that have been Blocked, the following Category options are
available:
Anti-Phish
Anti-Spam
Anti-Virus
If you have enabled the additional Commtouch Command anti-virus engine, you
will see anti-virus detections listed by detection engine.
Anti-Virus (Packer)
Anti-Virus (PUP)
Compliance
Corrupt Content
Data Loss Prevention
Directory Harvesting
DKIM
Encrypted Content
File Filtering
Image Filtering
Mail Filtering
Mail Size
Message Reputation
Sender Authentication Threshold
SenderID
Signed Content
For messages that were Quarantined by the appliance, the following Category options are
available:
Anti-Phish
Anti-Spam
Anti-Virus
If you have enabled the additional Commtouch Command anti-virus engine, you
will see anti-virus detections listed by detection engine.
Anti-Virus (Packer)
Anti-Virus (PUP)
Compliance
Corrupt Content
Data Loss Prevention
Directory Harvesting
Option Definition
Encrypted Content
File Filtering
Image Filtering
Mail Filtering
Mail Size
Signed Content
You can multi-select to search for messages in more than one category. See
Quarantine Options to find out how the categories relate to those reported in McAfee
Quarantine Manager.
Quarantined to: For messages that were quarantined, you can search all quarantine queues, or select
one or more from the list of configured queues. The queues are:
Viruses Other
PUPs Phish
Compliance Spam
A single message may be quarantined to more than one category. Summing the total
number of messages in all categories will not necessarily generate the total
quarantined messages.
All Dates / Date You can search on All Dates , or you can specify a Date Range, using From and To dates
Range and times.
Audit ID When an email message passes through the appliance, a received header
containing audit ID information is added to the message header.
The received header will look similar to the following:
id 1448_0004_4d37a0e8_93e1_11df_b43f_00114336c271
This audit ID information can be used to track the message as it passes through the
appliance.
Source IP This is the source IP address of the originating email server. If your appliance is
configured behind one or more Mail Transfer Agents (MTAs), the email headers are
used to obtain the correct source IP address.
If you know the IP address that is sending email messages to you, you can search
using this address.
You can use either a single address (for example, 192.168.0.1) or a network
address/netmask (for example, 192.168.0.0/255.255.255.0).
Disposition Allows you to select All or One or more of Inbound, Outbound and Internal messages in your
search.
Type When dealing with quarantined email messages, this allows you to search for the all,
messages, original email or for messages that have been modified by the appliance.
It also allows you to search for messages that have their Release requested by your
users.
Option Definition
Virtual host If you have enabled the use of virtual hosts on your appliance, you can track or view
email messages that are processed by an individual virtual host on the appliance.
To do this, select the relevant host name from the Virtual host drop-down list.
Attachment To find specific attachments within email messages, enter a full or partial attachment
(only visible name. You can also use wildcard characters.
when
Attachment
identification
is enabled)
View recipients Clicking on any of the highlighted links in the View recipients area shows you either All
messages, or a list of recipients and the number of items against each recipient
beginning with the selected character. For example, it might show that one recipient
currently has four queued messages, one quarantined message and three delivered
messages.
By clicking on a particular recipient, you can then view all relevant items for that
recipient.
To revert to the total view of messages, click Close.
Search/Refresh Click to search the appliance for email messages that match your search parameters,
or to refresh the list if you have changed any of the parameters.
Clear Parameters Resets all search parameters to their default states.
Option Definition
Options When you have searched for your required email types, you can perform actions
based on the type of message. These actions include:
Message status is All:
Delete selected
Release selected Only available if all selected messages are quarantined
"on-the-box", and do not contain viral content.
Retry selected
Forward selected Only available if all selected messages are either queued or
quarantined.
Find related
Submit false positive Submit the selected messages to McAfee for analysis, to help
reduce false positive detections.
Delete all
Message status is Quarantined :
Delete selected
Release selected Only available if all selected messages are quarantined
"on-the-box", and do not contain viral content.
Retry selected
Forward selected Only available if all selected messages are either queued or
quarantined.
Find related
Submit false positive Submit the selected messages to McAfee for analysis, to help
reduce false positive detections.
Delete all
Release all
Message status is Queued:
Delete selected
Release selected Only available if all selected messages are quarantined
"on-the-box", and do not contain viral content.
Retry selected
Forward selected Only available if all selected messages are either queued or
quarantined.
Find related
Submit false positive Submit the selected messages to McAfee for analysis, to help
reduce false positive detections.
Delete all
Retry all
If you have configured your appliance to perform off-box quarantining using McAfee
Quarantine Manager, you cannot make release requests from within Message Search.
Real-Time retry To retry the delivery of a queued item and to then show the results of the SMTP
conversation with the target MTA, click Real-Time Retry .
You can only use Real-Time Retry by selecting a single queued message.
Option Definition
View Message If the message is still available to the appliance (for example, if the email message
has been queued or quarantined on the appliance) you can view the selected
message.
From within the message view, you can:
Delete the message from the appliance.
Release the message from the appliance. (Quarantined messages only.)
Retry to deliver the message from the appliance. (Queued messages only.)
Forward the message to another email address.
Download the message to your local file system in .eml format.
You can also use Show headers to view the information contained within the email
header.
View When SMTP conversation logging is enabled (from Email | Email Configuration | Protocol
Conversation Log Configuration | Connection Settings (SMTP) | SMTP conversation logging) on your appliance, select
an email message and click View Conversation Log to see the conversation details for the
selected message through the different stages of the SMTP conversation.
Download Downloads the selected queued or quarantined message to your local file system
Message in .eml format.
Show Report View information about the selected email message.
Hide and You can hide and unhide columns in the Message Search results area.
unhide
Click the left-arrow to hide the selected column.
columns
Option Definition
Email message is Inbound.
Email message was composed within the Secure Web Mail Client.
Internal email messages are Alert messages and Quarantine Digest messages.
This is the version of the quarantined message that has been modified by the appliance.
This email message is currently held in a queue, but the appliance is not actively trying to
deliver the message.
Option Definition
The appliance is trying to deliver this message.
Access to the quarantined email message is restricted. You do not have sufficient privileges
to view or download the message, or perform any actions (delete, release, forward) on the
message.
Task
1 Click Reports | Message Search.
3 Click Search/Refresh.
All messages that have been quarantined are displayed in the lower part of the page.
Task
1 Complete the steps in Task Find out which email messages are quarantined.
3 Click Search/Refresh.
The lower part of the screen is refreshed to show only the messages that have been quarantined due
to compliance issues.
Task
1 Complete the steps in Task Refine the search.
2 Select the relevant quarantined message using the checkbox to the left of the page.
The selected message is displayed in a new window. From this window, you can view the content of
the email message. You can also choose to view the detailed email header information. After you have
viewed the message, by clicking the relevant buttons, you can choose further actions to perform on
the email message.
Task
1 Complete the steps in Task View a specific email message.
Email messages that contain viral content cannot be released from quarantine, as to do so would risk
causing damage to your systems.
You can only submit messages that have been detected as either spam or phishing email
messages, and that have then been quarantined by McAfee Email Gateway.
By investigating samples of genuine email messages that have been incorrectly detected as either
spam or phishing email messages (false positive detections), McAfee can improve the accuracy of the
spam and phishing message detections.
Task
1 Select Reports | Message search.
3 Click Search/Refresh.
4 Select the email messages that have been incorrectly identified as either spam or phishing
messages.
6 Click Go.
The selected incorrectly-identified spam or phishing messages are submitted to a secure McAfee site
where they can be analyzed and the results used to improve spam and phishing email message
detections.
Task
1 Click Reports | Message Search.
3 Click Search/Refresh.
All messages that have been queued are displayed in the lower part of the page.
Task Find out which email messages are queued for inbound delivery
Use this task to refine your search for messages queued for inbound delivery.
You can further refine your search for queued email messages to show only those messages that have
been queued for inbound or outbound delivery. To view the queued messages awaiting inbound
delivery:
Task
1 Complete the steps in Task Find out which email messages are queued.
3 Click Search/Refresh.
All messages that have been queued for inbound delivery are displayed in the lower part of the page.
Task
1 Complete the steps in Task Find out which email messages are queued for inbound delivery.
2 Select the relevant queued messages using the check-boxes to the left of the page.
For a single message, click View Message, and then select the Retry button.
To retry the sending of the messages and then see the results within the page, click Real-Time
Retry.
Task
1 Click Reports | Message Search.
3 Click Search/Refresh.
All messages that have been blocked are displayed in the lower part of the page. Email messages can
be blocked for a variety of reasons, and the table showing all blocked messages includes the reason
that each message was blocked within the Status/Category column.
Task
1 Click Reports | Message Search.
3 Click Search/Refresh.
All messages that have been successfully delivered by the appliance are listed in the lower part of the
page.
Task
1 Click Reports | Message Search.
4 Click Search/Refresh.
7 If you are happy that the selected message is safe to release, select Release selected from the Options
drop-down list.
8 Click Go.
In the Dashboard | Email Queues area, you can see how many quarantine release requests have been made
by your users. Clicking the link on this page opens the Message Search page, and auto-populates the fields
required to release these messages.
Task
1 Navigate to the Message Search window.
You can navigate using Reports | Message search, or using the Task portlet on the Dashboard (Dashboard |
Tasks | Message Search & Reports | Search the Message Queue).
The report you create will contain the entire results from your search.
The report displays. The format is essentially the same as the Message Search results table, with a
few differences:
The audit ID displays.
The time displays both as seconds for sorting, and as a human-readable local time string.
The Properties column shows as three columns: Disposition, Type, and Encryption Type.
Task
1 Navigate to the Message Search window. You can navigate using Reports | Message search, or using the
Task portlet on the Dashboard ( Dashboard | Tasks | Message Search & Reports | Search the Message Queue).
4 Use the Attachments column to identify messages containing the relevant attachment.
You can also search for specific attachment names by using the Attachment field. This field accepts
either complete attachment names or partial names with wildcard characters.
5 Use the available controls to take appropriate actions on the selected messages.
Scheduled Reports
Use this page to see a list of the available reports about threats that the appliance has detected.
You can view the reports, send reports immediately to other people, or schedule reports to be sent at
regular intervals.
Keeping up-to-date with threat detection statistics and system activity, and sharing that information is
vital. The Scheduled Reports option has some default report types already set up for you, or you can
customize their content or frequency, or even create new report types as necessary. The resulting
reports can be sent by email immediately, or at regular intervals to other people in your organization
in a variety of formats, such as PDF, HTML, or text.
You must enable the default reports to run automatically. To do so, select the report type from the list of
available reports, and click Edit. On the Edit Report dialog box, click Enable scheduled delivery.
System Disk utilization provides information relating to the used and available space on the disk
for items such as the log and quarantine partitions
Disk utilization trends shows the % utilization of each partition in graph format
Favorite Click Edit to choose from a list of pre-defined report types for email, web and system
reports, and optionally send the report to other people in your organization daily,
weekly, or monthly. Any new favorite reports that you created in the Email Interactive
Reports, or Web Interactive Reports section are available from here too.
Inbound Mail Inbound Mail lists all inbound mail activity, broken out into various categories, such as
plain text, encryption method used, information about messages quarantined,
bounced, queued and blocked, detection types triggered and information about the
senders, connections and email recipients.
Outbound Mail Outbound Mail lists all outbound mail activity, broken out into various categories, such as
plain text, encryption method used, information about messages quarantined,
bounced, queued and blocked, detection types triggered and information about the
senders, connections and email recipients.
Services Services lists information about the software services provided.
SMTP SMTP Detections lists information about SMTP detections made.
Detections
POP3 POP3 Detections lists information about POP3 detections made.
Detections
Network Network Summary shows network connections, kernal mode blocking statistics and total
Summary throughput.
System System Summary Shows the status of the services, network and hardware.
Summary
Hardware Hardware Summary provides information about your hardware, including information about
Summary the mode of operation, the network interfaces, information relating to the hardware
modules, RAID and UPS status.
Clustering Clustering provides information about your McAfee Email Gateway cluster.
Option Definition
Name Displays the name of the report. By default, the list includes some standard reports,
which you cannot delete.
The icon indicates the type of content in that report:
Email activity
Description Displays the title that appears on the first page of the report, the scheduling
information, and a list of the recipients.
When clicked, generates the report, then allows you to download it for viewing in a
Download browser or saving as a file.
When clicked, generates the report, then immediately sends it to the recipients. Any
Email Now regular schedule is not affected.
If the icon is disabled, the schedule has not been set. Double-click the icon, then
specify the details under Delivery Schedule.
New report When clicked, lets you create a new report, which is an exact copy of an existing
report. A dialog box prompts you for further information:
Report name, which appears under the Name column on this page.
Report title, which appears at the top of the report.
When you click OK, you return to the main page. There you can select the new report,
click the icon under Edit, and design your own report.
When the icon is clicked, enables you to change the schedule, content, format and
Edit delivery information of the selected report.
When the icon is clicked, deletes the selected report.
Delete
Task
1 Select Reports | Scheduled Reports.
2 From the list of report types, select Overview, and click Edit.
3 In the Edit Report dialog box, set the Reporting period to 1 week.
Task
1 Select Reports | Scheduled Reports.
2 From the list of report types, select Email, and click Edit.
4 Set the Report sent option to Weekly and choose Monday from the drop-down menu.
Task
1 Select Reports | Scheduled Reports.
2 From the list of report types, select Favorite, and click Edit.
4 In Report content, select the information that you want to appear in the .csv formatted file. For
example, select Email reports and Top Spam Senders (last 24h).
5 In Advanced options, select CSV as the Document format. Configure other options to suit your
requirements.
7 Click Download.
Task
1 Select Reports | Scheduled Reports.
2 From the list of report types, select Favorite, and click Edit.
Option Definition
Name Type a name for the new report that you are creating.
Title Use the Title field to enter a descriptive title for the new report.
Use template Select the template that you want to use as the basis of the new report.
Use the postmaster address Select to use the already configured postmaster address as the sending
as the sender address for the scheduled reports.
Sender address To configure your appliance to use a sender address that is different to the
already configured postmaster address, ensure that Use the postmaster address as
the sender is unselected, and enter the required Sender address.
Recipients The list of email addresses to which the scheduled reports are to be sent.
Click New Recipient to specify new addresses.
Paper size Select the paper size for the scheduled report. Select from:
A4 (210x297 mm)
Letter (8.5x11 in)
Character set Select the character set for the scheduled report. The options include:
Unicode (UTF-8) Simplified Chinese (GBK)
Unicode (UTF-7) Traditional Chinese (BIG-5)
ASCII Japanese (SJIS)
Latin Alphabet No. 1 Japanese (ISO-2022-JP)
(ISO-8859-1)
Windows Latin-1 Korean (ISO-2022-KR)
(WINDOWS-1252)
Message subject Enter the Subject line that you want to appear on the email containing the
scheduled report.
Message body text Enter the body text for the email message containing the scheduled report.
Generate unique file names Select this option to ensure that each scheduled report has a unique file
name.
Attachment file name To specify the name of the attachment file containing the scheduled report,
unselect Generate unique file names and then enter the required file name.
Maximum number of items in a Specify the maximum number of items that you want to appear in each list.
list
Email Reports
Use this page to create and view real-time reports about threats detected in the email passing through
your Email Gateway, and the subsequent actions taken by the appliance.
You can generate a report based on a set of predefined filters, or edit the filters, test the results, and
save the report as a new report.
The following tabs are shown beneath Email Interactive Reporting, each providing different views on a
report's results. See View types:
Total view
Time view
Itemized view
Detail view
Filter enables you to further define the data in each Favorite report using standard and advanced
filter settings, and set the period of time for which you want to retrieve data. See Filter types.
Additionally, use the Email Reports feature with the Scheduled Reports feature to create regular
reports, and send them immediately to other people, or at regular intervals.
You can compile a list of, for example, blocked email messages using the Message Search feature
(Reports | Message search). Message Search cannot locate messages if the appliance has not received the
message body, such as messages blocked by the Real-time Blackhole Lists (RBLs). In this situation, use
the Email Reports feature to find out about an individual message.
The appliance comes with a set of reports with pre-defined filters available from the Favorites tab. You
can run these reports immediately, or edit them using standard and advanced settings and save as a
new favorite report to run again in the future, then make it available in the Scheduled Reports feature.
To see the default settings in each report, hold your mouse cursor to the left of a report name.
Each report that you generate can be presented in one of the following views:
Type of Definition
View
Total view Reports | Email Reports | Email Interactive Reporting | Total View
The information is displayed in a horizontal bar chart. If you see no information, click Apply
on the Filter tab, or change the period and click Apply.
For information about the Filter or Favorites section on the right, click its tab, then click the Help
button (?).
Action Displays the list of actions taken by the appliances policies against each email
message or web access.
Number of email messages Displays the number of email messages or web accesses where
this action was applied.
Time view Reports | Email Reports | Email Interactive Reporting | Time View
Displays results in a bar chart and table format over the time specified. Results are shown
in periods of ten minutes for hourly reports, by the hour for 24 hour reports, every six
hours for weekly reports, twelve hours for fortnightly reports, or daily for monthly reports.
The information is displayed in a vertical bar chart, and organized into small intervals. For
example, a weekly report shows activity in whole 6-hour portions of each day. If you see no
information, click Apply on the Filter tab, or change the period and click Apply.
You might not be able to view some older data, because the appliances log is regularly
purged.
For information about the Filter or Favorites section on the right, click its tab, then
click the Help button (?).
Type of Definition
View
Itemized Reports | Email Reports | Email Interactive Reporting | Itemized View
view
The information is displayed in a pie chart and table format for each filter criteria, or for all
filters.
If you see no information, click Apply on the Filter tab, or change the period and click Apply.
For information about the Filter or Favorites section on the right, click its tab, then click the Help
button (?).
Pie chart Displays the percentage of all email or web accesses that match the criteria
selected in the Filter tab.
The orange portion of the pie shows the portion of the data that matches the criteria. The
green portion shows the remainder. If no filtering is set, the whole pie appears orange.
Filter criteria Displays the list of categories taken against the email message or web
access. Click any blue link for more information represented as a bar chart.
To return to the pie chart, click List all criteria. To examine the information further, click any
blue links.
As you click each link, values in the Filter tab are updated. Click Apply to display the pie
chart again.
Number of distinct criteria items within the selection Displays the number of email messages or
web accesses where each criteria applies.
Detail view Reports | Email Reports | Email Interactive Reporting | Detail View
Displays all results in a table format. Results are shown for each detection in the report
results.
Information includes any threat in the email messages or IP addresses. The information is
displayed in a table.
If you see no information, click Apply on the Filter tab, or change the period and click Apply.
For information about the Filter or Favorites section on the right, click its tab, then click the Help
button (?).
Date and other headings Displays the details of each email message or web access.
To see all columns, move the horizontal scroll bar.
To sort the data in any column, click the column heading. The most recently sorted
column is indicated by a red arrow in the column heading.
Data Click the blue link to see further information about an email message in a table
or as raw data (that is, in an XML-like format).
To move through the list or to move quickly to either end of the list, click the arrows at
the bottom right of the list.
Each report allows you to filter the results by standard and advanced criteria. For example, you can
see information about viruses from all sources in the last month. Make your selections, then click
Apply. The new report might take a while to appear. You can save these selections to produce a similar
report at any time. or clear the selections you made.
Action Enables you to filter reports on specific actions, such as Legitimate or Blocked. Examples:
To view information about one sender or recipient, type:
<user@example.com>
To view information about all senders' names that begin with b or B, type:
<b*
To view information about all senders' names that begin with b, B, e, or E, type:
<b*, <e*
Category Displays information about a single type of detection, such as spam or virus. If the
selection is not All, you see further choices. For example, if you select Content, you
can further select Mail Size.
Extra categories appear here if you have installed any optional software.
Detection Top Spam Senders report only. Choose whether the report should contain results for
spam senders, phish senders, or both.
Virus/PuPs Top Viruses report only. Type the name of the virus or potentially unwanted program
to get detection results for that specific threat.
Show Advanced When clicked, shows the options below.
To hide the options again, click Hide Advanced.
Source Domain Filter traffic based on the domain that the messages are being sent from.
Source IP Filter traffic based on the IP address that the messages are being sent from.
Destination Domain Filter traffic based on the domain that the messages are being sent to.
Destination IP Filter traffic based on the IP address that the messages are being sent to.
Favorite reports
Use this page to run an existing favorite report immediately, or build a list of links to reports that you
have already saved.
Save the report as a new favorite report to be run again in the future
Task
1 Click Reports | Email Reports.
2 From the Favorites list, select the Email Overview (last 24h) report.
A report is created that shows the email traffic over the last 24 hours, for all users.
Task Filter the data for a particular sender and save the report as a new
favorite report
Use this task to filter data produced from a global email report to refer to a particular sender.
Additionally, save the new report as a favorite.
Task
1 Click Filter.
2 In Sender, type sender@examplecompany.com and click Apply to filter the data for that sender.
3 Click Save, type a name for the report, and click OK.
Task
1 Click Reports | Scheduled Reports.
2 In the list of available report documents, select Favorite, and click Edit.
3 Select Enable scheduled delivery, and set the report to run Daily at 17:00 hours.
6 In the list of favorite reports, select the report that you created, click OK, and apply the changes to
the appliance.
The selected report is send each day at 17:00 hours to the specified email administrator.
Task
1 Click Reports | Email Reports.
2 From the Favorites list, select the Top Viruses report, and click Filter.
4 Select Time view to see the action that was taken on each message broken down into eight hour
periods.
5 Select Detail view to see further information such as policy details, and the source IP address for each
message.
The required report, showing the total number of viruses detected in the previous week, is generated.
System Reports
Use this page to create and view real-time reports about threat detection updates, and system events.
You can generate a report based on a set of pre-defined filters, or edit the filters, test the results, and
save the report as a new report.
Under System Interactive Reporting is a detailed view of the report results that tells you the type of update
made, when it ran, and whether it was successful. Data shows the update number so you can check
with the McAfee website that you're running the most up-to-date threat detection files available.
Filter enables you to further define the data in each Favorite report, and set the period of time for
which you want to retrieve data. See Filter types.
Additionally, use the System Reports feature with the Scheduled Reports feature to create regular
reports, and send them immediately to other people, or at regular intervals.
The appliance comes with a set of reports with pre-defined filters available from the Favorites tab. You
can run these reports immediately, or edit them, and save as a new favorite report to run again in the
future, then make it available in the Scheduled Reports feature.
To see the default settings in each report, hold your mouse cursor to the left of a report name.
If you see no information, click Apply on the Filter tab, or change the period and click Apply.
For information about the Filter or Favorites section on the right, click its tab, then click the Help button
(?).
Event type Displays reports about particular event types. For example, issues concerning the
Network.
Event Select individual events based on the chosen Event type.
Reason Select individual reasons based on the chosen Event.
Favorite reports
Use this page to run an existing favorite report immediately, or build a list of links to reports that you
have already saved.
Filter the results to show only the URL filter updates that failed
Save the report as a new favorite report to be run again in the future
Task
1 Click Reports | System Reports.
2 From the Favorites list, select the Anti-Virus Updates (last week) report.
4 Click Filter.
5 In Event, select URL filter update failed, and click Apply to filter the data accordingly.
6 Click Save, type a name for the report, and click OK.
This section of the online help topic provides an overview of the Email features and controls within
your Email Gateway appliances.
Contents
Life of an email message
Email Configuration overview
Email Policies
DLP and Dictionaries overview
Encryption
Certificate Management
Hybrid configuration
Group Management
Add Directory Service wizard
Quarantine Configuration
When passing through the scanning stage, the next step that the email message takes depends on the
scanners that are triggered and the primary actions defined for each scanner.
The appliance scans an email message and triggers against both a virus and spam. The anti-virus
scanner is configured to block on detection, whereas the anti-spam scanner is configured to block.
In this situation, the appliance will report the email message as containing viral content, as this is
the highest-priority primary action.
The appliance scans an email message and again triggers against both a virus and spam. However,
this time, both the anti-virus and the anti-spam scanners have their primary actions set to block.
In this case, the appliance will report the anti-spam trigger anti-spam scanning occurs before
the anti-virus scanning but, as both scanners are configured with the same priority primary
action, this will also be reported as containing viral material.
From the Email Configuration pages, you can configure features such as your protocol setting for SMTP
and POP3 email messages, Anti-relay settings, Recipient authentication, Permit and deny lists, as well
as other areas such as DKIM signing, delivering email domains and fallback relays.
Contents
Protocol Configuration
Option definitions Protocol Presets dialog box
Option definition - New Protocol Preset
Receiving Email
Sending Email
Sending Email Add Relay List dialog box and Add MX Lookup dialog box
Anti-Relay Settings Add Relay Domain dialog box and Add MX Lookup dialog box
Protocol Configuration
The Protocol Configuration tab within Email Configuration enables you to configure settings that are
protocol-dependant.
Further tabs enable you to configure connection and protocol settings for both SMTP and POP3
protocols, as well as to configure address masquerading and transport layer security for your SMTP
protocol.
Contents
Connection Settings (SMTP)
Protocol Settings (SMTP)
Address Masquerading (SMTP)
Connection and Protocol Settings (POP3)
Email | Email Configuration | Protocol Configuration | Connection Settings (SMTP) | Basic SMTP settings
Changing these settings can affect scanning performance. If you are not sure about the impact of
making any changes, ask your network expert.
Secure ports Specifies the type of port. The default value is 465.
SMTPS uses a secure port.
Click these icons and the port headings to reveal icons for managing the
port information:
Enable reverse DNS lookups When selected, enables the appliance to perform lookups. Default value is
Yes.
Take care if deselecting this setting. If you deny reverse DNS lookups, some
functions might fail.
Timeouts
Use this area to specify the timeouts that apply to the SMTP conversations.
These settings are configured by default to provide the best SMTP performance with most appliances
and network configurations. Changing these settings can affect performance. If you are not sure about
the impact of making any changes, ask your network expert.
Protocol preset
Select the required protocol preset, or create a new preset, using the drop-down list and button to the
right of the page.
Option Definition
Between commands The default value is 60 seconds.
Between receiving chunks of data The default value is 180 seconds.
Acknowledgment of all the data The default value is 360 seconds.
Option Definition
Establishing a connection The default value is 60 seconds.
Response to a MAIL command The default value is 60 seconds.
Response to a RCPT command The default value is 60 seconds.
Response to a DATA command The default value is 60 seconds.
Between sending chunks of data The default value is 180 seconds.
Acknowledgment of the final dot The default value is 300 seconds.
Option Definition
Enable SMTP conversation logging Select to produce a log of performed scans. These logs are available
from Reports | Message search.
Attachment identification
Enable attachment identification to use Message Search to find messages containing attachments.
Table 4-3 Option definitions
Option Definition
Enable attachment identification Configure McAfee Email Gateway to carry out additional scanning of email
messages to identify attachments contained within the messages.
Once enabled, you can use Message Search to find email messages
containing specific attachments.
If these limits are exceeded Specifies how the appliance responds. Default value is Close the connection.
Maximum line length before the By default, no limit is set.
message is re-encoded
Maximum number of trivial Prevents the appliance receiving too many trivial commands before a
commands successful DATA command. An attacker might repeatedly send commands
like HELO, EHLO, NOOP, VRFY, and EXPN.
Default value is 100.
Maximum number of AUTH Prevents too many AUTH conversation attempts. (Transparent Bridge
attempts mode only). The SMTP AUTH command is a request to the email server
for an authentication mechanism.
Default value is No limit.
Maximum command length Prevents excessive command length. This might be a buffer-overflow
attack. According to RFC 2821, the maximum total length of a command
line including the command word and the CR-LF is 512 characters.
Default value is 999.
Maximum duration of an SMTP Limits the time between opening the connection and receiving the final
conversation dot (.) command.
Default value is No limit.
Message processing
Use this area to configure message processing options within the SMTP protocol.
Table 4-7 Option definitions
Option Definition
Welcome message Specifies the text that is seen by a host when connecting to the appliance in
Explicit Proxy mode.
By default, this message is empty.
Store and forward email if In proxy mode, messages which exceed the specified limits will always be
accepted and queued by the appliance before onward delivery is attempted.
Messages below the specified limits will have delivery attempted immediately
(whilst the client is still connected).
Default values:
The message size exceeds No limit
The number of recipients exceeds No limit
Maximum number of MX Specifies the response to messages that use MX (mail exchange) records
records used excessively.
Default value is 100.
Maximum number of A Specifies the response to messages that use A (address) records excessively.
records used Default value is 100.
Advanced options
Use this section to specify further settings for message processing. You do not normally need to
change the settings.
Maximum number of policies per email Limits the number of policies that can be applied to each email
message. A larger number can affect scanning performance.
Default number is 5.
Add the IP address of the connecting If you prefer that the IP address of your server is not made available,
server to the Received header deselect this feature.
Default value is Yes.
Add the domain name of the If you prefer that the domain address of your server is not made
connecting server to the Received available, deselect this feature.
header Default value is No.
A HELO command implies a reset Forces the HELO command to automatically perform a reset (RSET
command). The RSET command clears the buffers that store data
such as the sender, recipients, and the email message.
Default value is Yes.
A HELO or EHLO command is required Forces the use of the HELO or EHLO command in any SMTP
communication. Most SMTP conversations begin with these
commands. You need this feature only if the sender does not use the
command.
Default value is No.
Dump input email to disk Provides information for troubleshooting. Select only if instructed to
do so. Otherwise performance will be affected.
Default value is No.
Dump output email to disk Provides information for troubleshooting. Select only if instructed to
do so. Otherwise performance will be affected.
Default value is No.
Send keepalives (NOOP Prevents the connection between the appliance and the onward email server
commands) during the from timing-out when the appliance is scanning large email messages by
DATA phase and sending a keep-alive command to the destination server. This keeps the
Keepalive interval connection alive until the DATA phase from the sending email server to the
appliance has completed. When the data has been transferred to the appliance,
the appliance stops sending the commands and starts the DATA phase between
the appliance and the destination email server. Default value is No.
Specify how often to send the keep-alive (NOOP) commands during the DATA
phase.
Default value of interval is 55 seconds
Advanced options
Use this section to specify further settings for transparency options. You do not normally need to
change these settings.
Allow multiple Allows the use of multiple policies for email messages that have more than one
policies per email recipient.
Default value is No.
If an email message has more than one recipient, you can configure the appliance
to allow different policies to apply to each of the recipients. If you do not allow
multiple policies, the appliance applies only the highest priority policy, as defined
by the order of your policies.
As the TLS or SSL connection is effectively direct between the two email servers,
McAfee Email Gateway cannot scan the secured traffic that is passed through it
using Secure conversation pass-through. Therefore, it is possible that malicious content
could pass undetected through your McAfee Email Gateway and into your network.
ESMTP extensions Scans features of the Extended Simple Mail Transfer Protocol.
Default values:
Enable ESMTP extensions Yes
DSN (Delivery Status Notification), 8BITMIME (8-bit data transfer), AUTH
(Authentication) Yes
SIZE No
You do not normally need to change these settings. Change the settings only if you understand the
possible effects, or you have consulted an expert.
Maximum length of the domain part Specifies how many characters can be used in the domain part.
The RFC limit is 255 characters.
Allow non-RFC characters in the domain By default, characters outside the ASCII range are not allowed in
part an email address.
For example:
Send and receive email for general enquiries using an anonymous address such as
info@example.com, instead of one persons specific address.
Modify the email headers to hide information about your internal domains.
Make modifications to the From address and sender headers of outgoing email under Sender address
masquerading.
Make modifications to the To address of incoming email under Recipient address aliasing.
Address masquerading is based on protocol presets and can affect a large number of email messages.
When configuring your policies, consider whether you need the policy rules to apply to the email
addresses before or after they might be re-written.
Useful websites
Regular expressions: http://www.regular-expressions.info/reference.html
Option Definition
Type States whether the sender address is a string replacement, or an LDAP lookup.
Search pattern Specifies a search pattern that uses regular expressions to convert the original sender
email address to a masqueraded email address.
Take care with the use of ^ and $ in a regular expression. If the email headers contain
extra characters such as chevrons (< >), the regular expression will not replace the
email address, as expected.
Replacement Displays the address you want to put in place of the original email address.
Move The search for the pattern is done from the top to the bottom of the list. When a
pattern matches, it replaces using the replacement. In the case of LDAP lookups, it
uses the relevant LDAP query.
Option Definition
Add Entry Adds a string replacement entry to the list.
Add LDAP entry Adds an LDAP lookup to the list.
Test When clicked, opens a further window where you can test whether your regular
expression makes the correct replacement address. Type an email address as input,
click Check to see the resulting output address.
Export When clicked, this link opens a dialog box you can use to export your list of
masquerade addresses as a text file. The list can be stored on the appliance, or on
your local computer.
The list is a text file in the following format:
List, search pattern
Replacement
List, search pattern
Replacement
Write down the file name and location in case you need to import it.
Import When clicked, this link opens a dialog box you can use to navigate to a stored
(exported) address list and import it to your current Masquerade window. You can
overwrite existing addresses, or append to the existing list.
Option Definition
Sender mail headers Specifies the mail headers to search within outgoing email messages.
to search You need only add new headers if your mail server attaches its own unique
headers, or extra headers are defined in new email specifications.
By default, the following email headers are searched when using Sender address
masquerading:
return-path resent-sender
from reply-to
sender return
resent-from
Option Definition
Type States whether the sender address is a string replacement, or an LDAP lookup.
Search pattern Specifies a search pattern that uses regular expressions to convert the recipients email
address to an aliased email address.
Take care with the use of ^ and $ in a regular expression. If the email headers contain
extra characters such as chevrons (< >), the regular expression will not replace the
email address, as expected.
Replacement Displays the address you want to put in place of the recipient email address.
Move The search for the pattern is done from the top to the bottom of the list. When a
pattern matches, it replaces using the replacement. In the case of LDAP lookups, it
uses the relevant LDAP query.
Option Definition
Add Entry Adds a string replacement entry to the list.
Add LDAP Entry Adds an LDAP lookup to the list.
Test When clicked, opens a further window where you can test whether your regular
expression makes the correct replacement address. Type an email address as input,
click Check to see the resulting output address.
Export When clicked, this link opens a dialog box you can use to export your list of virtual
addresses as a text file. The list can be stored on the appliance, or on your local
computer.
The list is a text file in the following format:
List, search pattern
Replacement
List, search pattern
Replacement
Write down the file name and location in case you need to import it.
Import When clicked, this link opens a dialog box you can use to navigate to a stored
(exported) address list and import it to your current Masquerade window. You can
overwrite existing addresses, or append to the existing list.
Option Definition
Recipient mail headers to Specifies the email headers to search within incoming email messages.
search You need only add new headers if your mail server attaches its own unique
headers, or if extra headers are defined in new email specifications.
You can follow these steps to masquerade a recipient by selecting Add LDAP Entry from the Recipient address
aliasing section of the page.
Task
1 Go to Email | Email Configuration | Protocol Configuration | Address Masquerading (SMTP)
4 In Replacement, select the correct server and address masquerading query and click Test.
5 In Input email address, type the email address that you want to masquerade. and click Check.
The Pattern matched and Output email address fields are automatically populated.
6 Click Close.
When the query is selected, any email that comes from, for example originalsender@test.dom, should
be replaced with the masqueraded email address such as <masqueraded sender>@test.dom.
Email | Email Configuration | Protocol Configuration | Connection and Protocol Settings (POP3)
Optionally specify periods when some parts of the network will not be scanned.
Before turning off scanning of any traffic, consider the security risks. The most secure option is to scan
all traffic. If an appliance is operating in a transparent mode, use this feature to exclude some parts of
the network from scanning traffic in a protocol during specific periods. You might need to do this if you
regularly move many large files through the appliance.
Changing these settings can affect scanning performance. If you are not sure about the impact of
making any changes, ask your network expert.
Click these icons and the port headings to reveal icons for managing the port
information:
Enable reverse DNS lookups. When selected, enables the appliance to perform lookups. Default value is
Yes.
Take care if deselecting this setting. If you deny reverse DNS lookups, some
functions might fail.
Timeouts
Use this area to specify time-out values for the POP3 protocol.
Maximum wait times when talking to Specifies how long the appliance waits for responses from the mail
a POP3 server server that receives the email message. Default values:
Establishing a connection 60 seconds
Completing data transfer 60 seconds
Enable client Specifies values to keep the client connection open. The appliance can repeatedly
keepalives send a POP3 command to prevent the connection between the appliance and the
POP3 mail client timing-out. Default values:
Enable client keepalives No
Keepalive interval 60 seconds
Address delimiters Specifies the characters that identify each part of an email address. For example:
[user name]#[host name]:[port number]. Default values:
# User delimiter
: Host delimiter
You need only change the delimiter characters if your POP3 provider uses different
characters.
Respond to CAPA Responds to a POP3 CAPA command, which returns a list of capabilities supported
requests by the POP3 server. Default value is No.
For more information, see RFC 2449.
Option Definition
Add network group Click to open the Add Network Group dialog box to group together hosts or networks
that you want to be associated with each other.
Network groups can be used when defining rules for email policies and protocol
presets by selecting the source or destination network group rule type.
Some of these options may not be available in all instances of creating a new protocol preset.
Option Definition
Policy name Type a name for the virtual host policy
Description Optionally type a description for the policy to help you identify it.
Inherit settings Select the protocol preset from which you want to inherit the settings, that is, any
from settings that are not overridden by this protocol preset will be taken from the
protocol preset specified here.
This option is only available when you create a protocol preset from Email | Email
Configuration when virtual hosting has been enabled on the appliance.
This option is only available when you create a protocol preset from Email | Email
Configuration.
Rule type / Lists the rules associated with the preset, and allows you to move or edit them as
Move / Edit appropriate.
This option is only available when you create a protocol preset from Email | Email
Configuration.
Option Definition
Add Rule Click to specify the type of rule that you want to apply to the preset, and set its
Match and Value.
This option is only available when you create a protocol preset from Email | Email
Configuration.
Add network Click to create a network group to associate with the preset.
group
This option is only available when you create a protocol preset from Email | Email
Configuration.
Receiving Email
The Receiving Email tab within Email Configuration enables you to configure settings that are
protocol-dependant.
Further tabs enable you to configure permit and deny lists and anti-relay settings as well as recipient
authentication and bounce address tag validation.
Contents
Permit and Deny Lists
Anti-Relay Settings
Recipient Authentication
Bounce Address Tag Validation
Once set, the permit and deny lists help prevent your users from being swamped by unwanted email
messages, whilst helping ensure that email messages from trusted senders do not accidentally get
blocked.
Domain Name Displays the domain name associated with the blocked IP address.
Port Displays the number of the port on which the message was received. This is
typically port 25.
VLAN ID Displays the ID of the virtual LAN on which the message was received. This is
typically 1 to 4094.
Applicable to Transparent Bridge mode only.
Seconds remaining Displays the time that must pass before the appliance again allows a connection
from this IP address.
Refresh When clicked, updates the list of connections. The list is not automatically
updated.
Resolve Addresses When clicked, the appliance attempts to resolve the IP addresses to show the
relevant domain name.
Unblock When clicked, enables the selected IP address to try to reconnect.
Store a maximum of If the limit is reached, the appliance can only add more IP addresses to the list
items in the blocked when an existing address expires or is removed manually by clicking Unblock.
connections list Default value is 5000.
Value type (Blocked If an email is from a blocked sender, it will be refused unless there is a
senders) corresponding entry in the permitted senders list.
Value (Blocked senders) Displays the details of the sender (email address, IP address and domain
name).
Response if a sender is in Offers various actions, including:
the block list
Allow through Reject and close
Accept and drop Reject, close and deny
Reject
Resolve permitted / When selected, causes the appliance to use DNS to resolve host names to IP
blocked host names to IP addresses from a domain name. These lookups take place when the SMTP
addresses proxy is initialized. The default value is Yes.
Reverse lookup sender IP When selected, causes the appliance to use DNS to do a reverse lookup of the
address sending IP address to match domains in the list. Because this requires an extra
lookup for each connection, this can affect performance. The default value is
No.
Import List To prevent you having to enter the permitted or denied senders individually
onto each of your appliances, you can import lists of permitted or denied
senders.
Export List Once you have configured the permitted or denied senders list for one of your
appliances, you can export the information, to be imported onto other
appliances.
The files are created in comma separated variables (CSV) format.
Task
1 Browse to Email | Email Configuration | Receiving Email | Permit and Deny Lists | Permitted and blocked connections |
Permitted connections.
2 Click Add.
3 Type the IP address and the netmask for the connection that you want listed as permitted.
Task
1 Browse to Email | Email Configuration | Receiving Email | Permit and Deny Lists.
2 Click Export List for the relevant area (Permitted connections, Permitted senders or Blocked senders).
4 Click Close.
Your list of Permitted connections, Permitted senders or Blocked senders is downloaded to your local file system.
Task
1 Ensure that you have exported the required list, and that it is located where it can be accessed
from your user interface.
2 Browse to Email | Email Configuration | Receiving Email | Permit and Deny Lists.
3 From the relevant area (Permitted connections, Permitted senders or Blocked senders), click Import List.
5 Click OK.
Anti-Relay Settings
Use this page to prevent the appliance from being used as an open relay.
Anti-relay settings are required to ensure that the appliance only handles email for authorized users,
and to prevent other people such as spammers from using the appliance to forward their messages.
When you first log on to the appliance, a warning is given in the Services portlet on the Dashboard.
You must create at least one local domain to prevent the appliance from being used as an open relay.
Even if you have a list of domains categorized as permitted domains or denied domains, the lack of a
local domain will still mean that the appliance can be used as an open relay.
Relaying email
Anti-relay options
A typical scenario is that the local domain, such as *.local.dom, accepts messages for delivery by
the appliance. You also have a network from which you accept messages, such as 192.168.0.0/24.
The anti-relay feature checks the contents of these lists to determine whether a recipient is
acceptable.
No. The appliance checks whether the recipient matches on a denied routing character.
Yes. The appliance rejects the recipient.
Option Definition
Add Domain Click to specify the domains that can relay messages through the appliance to the
recipient. Choose from:
Local domain These are the domains or networks for which email is accepted for
delivery. For convenience, you can import a list of your local domain names using
the Import Lists and Export Lists options. McAfee recommends that you add all domains
or networks that are allowed to relay messages as local domains.
Permitted domain Email is accepted. Use permitted domains to manage exceptions.
Denied domain Email is refused. Use denied domains to manage exceptions.
Hold your mouse cursor over the field to see the recommended format.
Add MX Lookup Click to specify a domain that the appliance will use to identify all mail server IP
addresses from which it will deliver messages.
Delete Selected Removes the selected item from the table. You must apply the changes before the
Items item is completely removed from the appliance configuration.
Domain Name/ Displays the domain names, wildcard domain names, network addresses, and MX
Network lookups from which the appliance will accept or refuse email.
Address/MX
Record
Type Domain name for example, example.dom. The appliance uses this to compare the
recipient's email address and compare the connection against an A record lookup.
Network Address for example, 192.168.0.2/32 or 192.168.0.0/24. The appliance
uses this to compare the recipient's IP literal email address such as
user@[192.168.0.2], or the connection.
MX Record Lookup for example, example.dom. The appliance uses this to compare
the connection against an MX record lookup.
Wildcard domain name for example, *.example.dom. The appliance only uses this
information to compare the recipients email address.
Resolve the If selected, allows the appliance to use DNS to resolve the IP addresses of the
above domain domains. These lookups take place only when the SMTP proxy is initialized.
names to IP
addresses
Option Definition
If a sender or Reject sends an SMTP 550 (permanent failure) response and closes the connection.
recipient is
rejected Reject the email and close the connection sends a rejection code, SMTP 550 (permanent
failure) response code or a SMTP 421 (Temporarily unavailable service due to
potential threat message), then closes the connection.
Accept and ignore the recipient sends an acceptance code, SMTP 250 (OK). McAfee does
not recommend this option because it suggests to the sender that the message was
received as intended.
Import Lists/ On an appliance from which you want to save a list of domains for anti-relay
Export Lists specification, click Export Lists to create a comma-separated CSV file that contains
details of all the domains that you specified on this page, whether they are local,
permitted or denied. On an appliance onto which you wish to put the list of domains,
click Import Lists.
To create your own list, see Formats for export lists later on this page.
Using routing characters (such as %, !, and |) is a method of passing messages between computers.
With these characters, unauthorized users can relay email messages (often spam) by using computers
inside your network. To permit or block this form of relaying, you specify the routing characters, which
are in the part of an email address before the final @. By default, the appliance does not support
routing characters in email addresses.
Option Definition
Permitted routing Specifies permitted routing characters. Normally you do not need to type any
characters characters here.
Use the default When selected, prevents the use of the following routing characters: *!* *%*
(Permitted routing *|*
characters)
Denied routing Accepts any of the following characters:
characters *%* - Right-binding routing character (%-exploit).
*!* Local or mail gateway routing.
*|* Pipe is used by some mail servers to execute commands.
*[*]* Parentheses that encloses a dotted-decimal domain address such as
192.168.254.200.
*:* Colon for multiple hops.
For example, to block the relaying of addresses of the type
user@host@relay.com, add *@* to the list of denied characters.
Use the default (Denied When selected, prevents the use of the following routing characters: *!* *%*
routing characters) *|*
Enable routing character When selected, examines routing characters on outgoing mail.
checking for sender
Protocol preset Lists any connection-based policies to which the routing characters setting
applies.
Click to open the Protocol Presets screen to assign additional policies, or create
new policies or network groups to which the routing characters setting applies.
Task
1 Go to Email | Email Configuration | Receiving Email | Anti-Relay Settings.
5 Click Add Domain, and type the network address or the IP address from which you expect to receive
messages (such as 192.168.0.2/32 or 192.168.0.0/24).
The domains that you specify are allowed to relay incoming or outgoing email traffic.
Task
1 Go to Email | Email Configuration | Receiving Email | Anti-Relay Settings.
3 Type the domain name that you want to deny using a wildcard, such as *example.dom to reject all
messages sent to that domain.
5 Click Add Domain again, and type the name of the subdomain that you want to accept, such as
sub.example.dom.
Task
1 On a master appliance, go to Email | Email Configuration | Receiving Email to set up the local domain, and
any permitted or denied domains.
2 Click Export Lists to create a CSV file that contains a list of all domains displayed in the Relaying
email list.
3 Click the link to download the file, and save it onto your local file system.
4 On a secondary appliance, go to Email | Email Configuration | Receiving Email and click Import Lists.
For example:
Recipient Authentication
Use this page to prevent attacks from zombie networks, bogus recipient names, and directory
harvesting.
Recipient checks are useful tools in preventing directory-harvest attacks and flooding attacks (where
large volumes of email messages are directed at your email servers, in the hope that some will get
through to valid email addresses). Recipient checks work by you providing information about your
genuine recipients of email messages within your organization. This information may already be
available from your LDAP servers. You can also import lists of recipient email addresses from a file.
This option is intended for small companies who can easily maintain a list of email recipients. For
larger companies, consider using LDAP directory services to provide email attributes to the appliance
(Email | Group Management | Directory Services.)
Directory harvest prevention compares the number of email messages being sent to known and unknown
email addresses within your organization. From this, the appliance can identify when a directory
harvest is taking place, and can take steps to minimize the impact of the attack.
Use this section to create a grey list, which is effective against attacks from unknown senders such as
zombie networks. Greylisting temporarily rejects email from new senders to resist spam attacks.
Option Definition
Protocol preset Specifies the policy (and network group) to which these settings apply.
Accept SMTP If selected, overcomes delays caused by devices that use SMTP callbacks to
callback requests prevent spam.
Initial retry delay Specifies how long to reject any early attempt to resend the email. The default
value is 3600 seconds (1 hour). Many mail servers typically try to resend after one
hour. The range is up to 86400 seconds (1 day).
Unretried record Specifies how long to keep a record, where the sender has not tried to send
lifetime another message.
After this time, the appliance deletes the record of any triplet that has not be
retried. We recommend a value below 8 hours. The range is up to 96 hours (4
days). Default value is 4 hours.
Greylisted record Specifies how long to keep a greylisted record. The appliance deletes records of
lifetime triplets that have not been referenced for some time. The range is up to 2160
hours (90 days). Default value is 864 hours (36 days), which is suitable for
occasional mail like monthly newsletters.
Maximum number of Specifies the maximum number of greylisted records. When the number of records
records approaches this value, the appliance starts deleting old records. The range is
50,000 to 2,000,000. Default value is 2000000.
Use this section to prevent directory-harvest attacks and attacks that issue large numbers of email
messages (known as flooding). You can provide the appliance with a list of permitted recipients. Your
network might already have this information on its LDAP servers. Alternatively, you can import a list of
email addresses from a text file.
Option Definition
Protocol preset Specifies the policy (and network group) to which these settings apply.
If the recipient is not in When selected, checks the recipient address against email addresses in the list.
the following list
Email address Lists the acceptable email addresses. You can use wildcards, for example:
user*@example.com. We recommend that you do not overuse wildcards,
because you will defeat the intention. Add or remove addresses as necessary.
Or if the recipient does When selected, checks the recipient address against email addresses in the LDAP.
not satisfy the query To connect to an LDAP server, select Email | Group management | Directory Services and
click Add Server.
Take the following Accept and ignore the recipient Accepts the email message and ignores it. The
action appliance sends an acceptance code (SMTP 250 OK). We do not recommend
this option because it suggests to the sender that the message was received as
intended.
Reject Sends a rejection code (SMTP 550 Fail). We recommend this option
because the sender is normally informed that the message was not accepted.
Use this section to prevent directory harvest attacks. The appliance examines the number of known
and unknown email addresses to determine whether an attack is taking place.
When used with some email servers, Directory Harvest Prevention might not function as expected.
Response delay When a tarpit action was selected, specifies the delay in responding to this
email.
Default value is 5 seconds. This is often enough to deter an attack.
Maximum number of When a tarpit action was selected, specifies how many recipient addresses
recipients each email may have. Default value is 10.
Applies a delay if there are too many recipient addresses in the email message.
A directory harvesting Defines this type of attack. Default values are 5 failed recipients and 10%
attack ... accepted recipients.
Email that falls outside this specification is not considered to be an attack, so
no action is taken.
Task Block all incoming email where the user does not exist in LDAP
Use this task to block all incoming email messages where the user does not exist in LDAP.
Task
1 Go to Email | Email Configuration | Receiving Email | Recipient Authentication | Recipient checks.
2 Select Or if the recipient does not satisfy the query and select the desired Valid recipient query for the LDAP
server.
If an Mail Transfer Agent (MTA) cannot deliver an email message, the MTA returns (or 'bounces') the
message to the sender using a return address in the message. Unfortunately, spam email messages
often have a forged (or spoofed) return address. The bounced email often goes to an innocent
organization. This type of email is known as backscatter. During a spam attack, your organization
might receive many such messages.
BATV can be implemented on a per-policy basis, using suitably configured Protocol presets.
If email is handled by several appliances for example, one appliance handles outgoing email, while
another appliance handles incoming email all the appliances need information about the signature
seeds and signature lifetime. To distribute the information between your appliances, use the import
and export features in the interface.
Option Definition
Enable bounce Select to configure BATV on your appliance.
address tag validation
Signature lifetime Specifies how long the signature seed will be used to sign outgoing email. Mail
servers typically try to deliver mail for up to four days. McAfee recommend a value
of 47 days.
Signature seed Specifies a seed for signing the sender's address.
Use only letters, numbers and space characters. The acceptable key length is 4
64 characters. Type a seed that is not easy to guess.
Generate When clicked, generates a signature seed that has 20 random letters and
numbers. You can use this method instead of typing your own signature seed.
Import settings When clicked, opens a file browser to import a text file that contains BATV settings
from another appliance.
Export settings When clicked, opens a file browser to create a text file that contains BATV settings
for use by another appliance.
Click to open a dialog box enabling you to re-order your existing protocol presets.
When validation fails Specifies how the appliance must handle each invalid bounced message. The
available options are:
Allow through
Reject
When you enable BATV tagging, the maximum length of local part of the MAIL FROM address used by
the appliance increases by 16 characters. Adjust your configuration setting to allow up to 80
characters to allow BATV tagged email addresses. To do this, navigate to Email | Email Configuration | Protocol
Configuration | Protocol Settings (SMTP) | Address Parsing Options and change the maximum length.
Sending Email
Use this page to specify how the appliance delivers email messages.
Using the recipient's domain, the appliance uses the following logic to decide how it will deliver
messages:
If the recipient's domain matches those listed in Domain Routing, it uses those relays to deliver the
message.
If the recipient's domain does not match those listed in Domain Routing, it can be configured to use an
MX record lookup to deliver using DNS. If no MX records are available, it attempts to make the
delivery using an A record lookup. MX delivery is attempted to hosts in the order of priority that is
returned by the DNS server.
If it cannot deliver using one of the previous methods, it uses fallback relays to make the delivery
(providing the recipient's domain matches those listed in the Fallback relays field).
If the domain does not exist, the appliance generates a non-delivery report and sends it to the
originator.
If the receiving server cannot accept delivery, or there are no IP addresses to complete the
delivery, the message is queued.
Option Definition
Import Lists Click the link to open the Import Lists dialog box.
Export Lists Click the link to open the Export Lists dialog box.
Domain Routing Displays a list of domains.
This list allows you to specify specific relays/sets of relays to be used to deliver
messages destined for specific domains. Domains can be identified using exact
matches, or using pattern matches such as *.example.com.
Click Add Relay List to populate the Domain Routing table with a list of host names, or IP
addresses for delivery. Delivery will be attempted in the order specified unless you
select the Round-robin the above hosts option which will distribute the load between the
specified hosts.
Click Add MX Lookup to populate the Domain Routing table with an MX record lookup to
determine the IP addresses for delivery.
Delivery will be attempted to host names returned by the MX lookup in the order of
priority given by the DNS server.
Click Add LDAP Lookup to populate the Domain routing table with an LDAP lookup to
determine the Home Mail Transfer Agent (MTA) to be used for emails to the specified
domain.
Only LDAP servers that have already been set up in Email | Group Management | Directory
Services | Add Server appear on this list.
Use an IPv4 or IPv6 address with optional port number or a fully qualified domain
name. For example, 10.6.1.6, 10.6.1.5:25,
2001:db8:ac10:fe01:205:2cff:fe03:2a45 or mailrelay.mydomain1.dom. If you
specify a fully qualified domain name, the appliance does an A-record lookup to
determine the IP address.
To specify multiple relays for a single domain, separate each with a space.
If the first mail relay is accepting email, all email is delivered to the first relay. If that
relay stops accepting email, subsequent email is delivered to the next relay in the
list.
Option Definition
Enable DNS If selected, the appliance uses DNS to route email for other, unspecified domains.
lookup for DNS delivery attempts an MX-record lookup. If there are no MX records, it does an
domains not A-record lookup.
listed above
If you deselect this checkbox, the appliance delivers email only to the domains that
are specified under Domain Routing.
Fallback relays for Specifies the fallback relays. If delivery is unsuccessful by any other method, and the
unreachable domain matches an entry in this list, the appliance uses the information in this list to
domains determine a host to be used for delivery.
Click Add Relay List to populate the Domain Routing table with a list of host names, or IP
addresses for delivery. Delivery will be attempted using the hosts in the order
specified unless you select the Round-robin the above hosts option which will distribute the
load between the specified hosts.
Click Add MX Lookup to populate the Domain Routing table with an MX record lookup to
determine the IP addresses for delivery.
Delivery will be attempted to host names returned by the MX lookup in the order of
priority given by the DNS server.
Click Add LDAP Lookup to populate the Domain Routing table with an LDAP lookup to
determine the Home Mail Transfer Agent (MTA) to be used for emails to the specified
domain.
Only LDAP servers that have already been set up in Email | Group Management | Directory
Services | Add Server appear on this list.
McAfee recommends that you assign a postmaster, so that queries from your users are handled
promptly. The postmaster must be someone who reads email regularly. You can use the name of a
single user or a distribution list.
Option Definition
Postmaster Specifies an email address that the appliance uses to deliver email that has a
address recipient of postmaster.
We recommend that you specify an email address here, so that any delivery
problems are handled promptly. You can specify a distribution list or a single user
who reads email regularly.
Option Definition
Enable digest messages Specifies whether to enable digest messages for the selected protocol preset.
and message Reminds you that digest messages are enabled for this protocol preset.
Protocol preset Allows you to make settings for any exception to the default setting. For
example, you can specify that some parts of the network do not use digest
messages.
The Domain Keys Identified Mail (DKIM) technique uses RSA private and public keys and DNS TXT
records to enable the recipient to verify the identity of an email sender.
The sender signs the email message with a private key, by adding an extra header - the
DKIM-Signature header. The header provides the email message with a cryptographic signature. The
signature is typically derived from the message body and email headers such as From and Subject,
then encrypted by the sender's private key.
Recipients can verify that the message is genuine by making a query on the signer's domain to
retrieve the signer's public key from a DNS TXT record. The recipient then verifies that the email and
its signature match. The recipient can therefore be confident that the email was sent from the stated
sender and was not altered during transit.
The appliance can verify signatures from incoming mail and attach signatures to outgoing mail.
For information about Domain Keys Identified Mail (DKIM), visit the Internet Engineering Task Force
website, http://www.ietf.org and http://www.dkim.org.
Use this section to create a Domain Keys Identified Mail (DKIM) key.
Option Definition
Enable DKIM When selected, adds a DKIM header (like a digital signature) to each email message as
signing it is sent.
You must add a key before you can enable DKIM signing.
Domain name During verification, the recipient extracts your Domain Name and Selector from the
and Selector signature to retrieve the public key associated with the appliances private signing key.
For example, if your Selector is mail and your Domain Name is example.com, the
recipient must issue a DNS query for the TXT record of mail._domainkey.example.com.
Option Definition
Import Key Select this to import an existing DKIM key onto your system.
Advanced This section enables you to select specific advanced options that relate to the way your
options appliance carries out DKIM checks.
From this area, you can choose:
What to sign either signing All headers or Selected headers. Click the linked text to select
the individual headers to sign.
Header canonicalization you can choose either Simple or Relaxed canonicalization for the
headers.
Body canonicalization you can choose either Simple or Relaxed canonicalization for the
body text.
Key expiry choose to either have a key that does not expire, or to set an expiry date
for the key.
Signing identity add an optional signing identity to your DKIM keys.
Use the Per-domain settings section to specify how the appliance delivers email intended for known
domains. The options outside this section apply to email for all other destinations.
Retry Interval (success) and Retry Specifies how often to retry delivery to the specified domain.
Interval (failure) By default, further email is sent every 1 minute if previous email was
sent successfully. If a previous attempt failed, the appliance waits 10
minutes before trying again.
Maximum open connections and Specifies other options that control the rate for delivering email to this
Emails per connection domain.
Task
Use the default settings.
Task Deliver all email to a specific domain using round robin delivery
Use this task to deliver all email to a specific domain using round robin delivery.
Task
1 Go to Email | Email Configuration | Sending Email.
Your Email gateway is configured to deliver all email to the specified domain using round robin
delivery.
Task
1 Go to Email | Email Configuration | Sending Email.
Your email messages sent to the specified domain are delivered using MX lookup.
Task Use a specified LDAP server to deliver email from a specific domain
Use this task to specify that email messages from a particular domain are handed by a specified LDAP
server.
Task
1 Go to Email | Email Configuration | Sending Email.
4 In Directory servers, select the LDAP directory server to be used to deliver email messages to the
domain specified in Domain name.
The specified LDAP server is used to handle email messages from the selected domain.
Task
1 Go to Email | Email Configuration | Sending Email.
All failed email message deliveries are now sent to the specified server.
Task - Deliver the email for a user to the Home MTA attribute defined in
LDAP
Use this task to deliver a message for a user to the Home Message Transfer Agent attribute defined in
LDAP.
Task
1 Go to Email | Email Configuration | Sending Email .
2 In the Domain Routing area under Delivering email, select Add LDAP Lookup.
3 In the Domain name field, add the domain name of the email recipients on which you want to perform
the LDAP lookups.
4 Select the server from the list of directory servers, and click OK.
Sending Email Add Relay List dialog box and Add MX Lookup
dialog box
Add a relay to the lists for sending email, or use MX lookups.
Email Policies
Use this page to view and configure policies relating to your email traffic.
Introduction to policies
The appliance uses policies which describe the actions that the appliance must take against threats
such as viruses, spam, unwanted files, and the loss of confidential information.
Policies are collections of rules or settings that can be applied to specific types of traffic or to groups of
users.
SMTP policies
Email Gateway provides the following features when scanning the SMTP protocol:
Anti-Virus, including:
Anti-virus
McAfee Anti-Spyware
Packer detection
Spam, including:
Spam
Phish
Sender Authentication
Compliance, including:
File filtering Image filtering
Compliance
POP3 policies
Email Gateway provides the following features when scanning the POP3 protocol:
Anti-Virus, including:
Anti-virus
McAfee Anti-Spyware
Packer detection
Spam, including:
Spam
Phish
Compliance, including:
Mail size filtering
Image filtering
Content handling
Alert settings
Anti-Virus, including:
Anti-virus
McAfee Anti-Spyware
Packer detection
Spam, including:
Spam
Phish
Compliance, including:
File filtering Compliance
For example:
Part of the network can handle larger or smaller files than normal.
By creating a protocol preset, you can cater for this exception to the connection settings.
In general, a client MTA sends an email to McAfee Email Gateway. The email message is then scanned.
If no detections are found, the message is delivered to its intended recipients on the server MTAs.
However, if a scanner triggers a detection, McAfee Email Gateway applies the selected primary action
and a number of secondary actions to the message that contains the detection.
When McAfee Email Gateway is configured in hybrid mode, email messages from the inbound client
MTA are scanned by the cloud-based McAfee Email Protection (Hybrid). If no detections are found, the
message is delivered to the McAfee Email Gateway for onward delivery to its intended recipients.
However, the process taken when a scanner triggers a detection varies depending on the scanner.
Primary Action
The primary action is defined as What happens to the message coming from the client MTA to the
server MTA?":
Was it blocked?
The message is scanned by all scanners. If multiple scanners trigger, the primary action that has the
highest priority is applied. For example, if the file filtering policy is set to Allow Through (Monitor), and the
anti-spam policy was set to Accept and Drop the data (Block), then the Accept and Drop the data (Block) action
applies.
Deny Connection (Block) Blocks the message from being delivered, returns a 550 SMTP code to the
sending MTA, places the connecting IP address in the Kernel Mode Block list.
Refuse the data and return an error code (Block) Blocks the message from being delivered, returns a 550
SMTP code to the sending MTA.
Accept and Drop the data (Block) Accepts the connection, but blocks the message from being delivered,
returning a 250 SMTP code to the sending MTA.
Replace the content with an alert (Modify) Replaces any detected content with a configurable alert and
delivers the modified Email to its intended recipients.
Allow Through (Monitor) Lets the message pass to its intended recipients, but information is retained
within the logs and reports.
This option might allow viruses and other unwanted content to pass through without detection.
Tarpit - Delays the response to the email message. By default, the delay is 5 seconds, and is
configurable from the Default Sender Authentication Settings | Cumulative score and other options tab.
Reject (Block) Blocks the message from being delivered, and returns the appropriate code to the
sending MTA.
Reject and close (Block) Blocks the message from being delivered, returns appropriate code to the
sending MTA and the closes the connection.
Reject, close and deny (Block) - Kernel Mode Blocking. This is an effective method of combating spam, as
it deals with the message itself (reject), the connection (close) and adds the sending server to the
deny list.
Secondary Action
A secondary action is defined as What additional actions will happen due to the scanner triggering a
detection?:
The message is scanned by all scanners. If multiple scanners trigger, the secondary actions are
aggregated together. For example, if the file filtering policy is set to Annotate and deliver original to a list, and
the anti-spam policy is set to Annotate and deliver original to a list, then only one notification is sent.
You can also configure any or all of the following secondary actions:
Quarantine options
Quarantine original Select to have the original message added to the Quarantine database.
Quarantine modified Select to have the modified message added to the Quarantine database.
If you are using off-box quarantine, you can also select the quarantine queue into which the email
message is placed. This selection can include custom quarantine queues that you have created.
Send one or more notification emails Use notification templates to customize the notifications send. Click
Manage templates to make changes to the notification options.
Annotate and deliver original to sender Deliver the original email message to the sender, with
annotations added.
Deliver a notification email to 'Notification Email List' Deliver a notification email to all addresses defined
within the notification email list.
Deliver a notification email to the original recipient(s) Deliver a notification email to all the recipients on
the original email message.
Deliver a notification email to the sender Deliver a notification email to the sender of the email
message.
Deliver an audit copy to 'Auditing Email List' Deliver a copy of the original email message for auditing
purposes to all addresses defined within the auditing email list.
Deliver the modified email to the sender Deliver the email message to the sender, with modifications
made by McAfee Email Gateway included.
Show selected/Show all To help manage the options shown, you can hide unselected notification
templates.
In addition to the pre-defined templates shown above, this list will also include any custom
notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message using
user-definable templates, and then delivers the message to the intended recipients. Click Manage
templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using user-definable
templates, and then delivers the message to the intended recipients. You can select multiple
header modification templates. Click Manage templates to change the way the headers are re-written.
Deliver message using encryption Attempt delivery of the message using your configured encryption
settings.
Policy exceptions
Use policy exceptions to minimize the number of policies that you need to create and maintain.
By applying exceptions for specific circumstances to standard policies, you avoid the time-consuming
task of changing all of your policies.
Contents
What are policy exceptions?
Benefits of using policy exceptions
Task - Configure a policy exception to allow email messages containing blacklisted URLs to be
received by members of Human Resources
For example, you might configure a policy that includes mail size filtering, with a corporate-wide size
limit of 100,000 KB. You can now configure a policy exception to this policy that states that members
of your creative services team have a higher email size limit, as they often have a legitimate
requirement to send very large files via email.
Policy exceptions can be used for most email scanning policies used within McAfee Email Gateway.
When you configure a policy exception, you cannot configure any inheritance of settings from the
original policy. In order to configure different settings for a policy exception to those in the underlying
policy, inheritance is automatically broken for the policy exception.
However, you might want to allow your Human Resources team to receive email messages containing
links to these web sites so that they can keep abreast of the current positions and salaries within your
industry. This goal is achieved by creating a policy exception for all members of the Human Resources
team. A policy exception for all members of the Human Resources team has the blacklisted URLs
removed.
Task
1 Select Email | Email Policies | Compliance.
d In the Value field, type the information that identifies the selected entity.
Example: *@hr.example.com.
e Click OK.
6 Click OK.
The Scanning Policies New Policy Exception window closes, and the new exception appears in the
exceptions box. An exceptions icon is displayed to the left of the policy area to which it applies.
This example shows how to add a rule to an exception to URL reputation settings.
Task
1 Select Email | Email Policies | Compliance | URL Reputation.
3 In the exceptions box, click the button for the exception to which you want to add a rule.
6 In the Value field, type the information that identifies the selected entity.
7 Click OK.
8 Click OK.
Task
1 Navigate to the portion of the policy you want to change.
Example: Select Email | Email Policies | Compliance | URL Reputation.
3 In the exceptions box, click the button for the exception you want to change.
The configuration page for the policy shows the settings that apply to the exception.
Example: From the URL Reputation Settings page, select Blacklists and Whitelists. Remove the URLs you
want excluded from the blacklist.
5 Click OK.
Human Resources are allowed to see links to competitor's employment opportunities without other
departments receiving this information within their email messages.
Task
1 Select Email | Email Policies | Compliance | URL Reputation.
3 In the exceptions box, click the button for the exception you want to edit.
5 Click OK.
Custom Notifications
McAfee Email Gateway allows you to create your own custom notification email messages for any rule
that allows secondary actions.
Custom notifications allow you to send different messages to specific individuals or groups when an
email message triggers the associated rule. You can use custom notification templates along with the
pre-configured templates. You can also have more than one custom notification template for each rule,
and use any of the available templates in combination.
Provide the most relevant information to different individuals about messages that trigger action.
Issue: In the Default policy, you have enabled Compliance, and you created five compliance rules.
By default, all five rules use the default compliance notification. You want to send more detailed
notifications to two distinct groups when a message triggers specific rules: the Legal Department,
and a list of other individuals.
Resolution: You create two custom notification templates, one for each of these groups. Then you
can add the notifications to the actions for each rule you want, without affecting the actions for
other rules.
Issue: You have created a policy that applies to inbound mail, and you have enabled Image
Filtering. You have created a rule that scans messages for objectionable images. You want to notify
the intended recipient about the message, and you want to inform Human Resources. The
notification to Human Resources contains unique content.
Resolution: You create a custom notification template for Human Resources, then apply it to the
rule. You also apply the pre-configured notification to the recipient.
Use the wizard from the Manage Templates page to create a custom notification.
Task
1 Select Email | Email Policies. In the scanner column of your choice, select the link for a rule.
4 Under Take the following action, select the main action for the rule.
5 Under And also, scroll to Notification email options and select the check box to Send one or more notification
emails.
8 Use the Add Notification Template wizard to create the custom notification template.
11 On the options page for the rule you chose, select the new custom notification template from the
list of available templates.
Messages that trigger the rule will generate the custom email notifications.
Email Policies
Use this page as a single point where you can access the pages and dialog boxes you need to set up
and configure your policies.
Policy settings specify how the appliance handles threats to groups of users or devices. For example, a
policy can apply to all computers on the same subnet, or all users in a department.
The user interface provides an overview of your policy settings, giving you information about each
policy such as the action taken when a virus is detected. The page to configure these settings is
displayed when you click the relevant information.
Some of the options described on this help page do not apply to POP3 or McAfee Secure Web Mail
scanning policies. Where options only apply to one protocol, this is highlighted.
The following information and controls are available to configure this feature:
Order Policies are used in a "top-down" order. When more than one policy has been created,
you can select the order in which they are applied.
Policy Name Displays the name of each policy.
The appliance always has a default policy, which applies to everything in the network.
You can change the default policy, but you cannot delete it.
To see the users or devices that are affected by a policy, move the cursor over the
policy name and wait for a yellow box to appear.
To change any details of the policy, click the blue link to open another window.
Applies to inbound email traffic (SMTP protocol only)
Applies to outbound email traffic (SMTP protocol only)
You can enable this option for a higher detection threshold, a lower detection
threshold, or both, based on GTI Message Reputation levels.
Move Use the arrow icons to move your policies higher or lower in priority order.
Move the policy up
Move the policy down
The default policy always appears at the bottom of the list of policies. You cannot change
its position.
clicking .
Add Policy When clicked, opens the Scanning Options New Policy dialog box where you can create new
policies, user groups, and network groups.
Task
1 Click Email | Email Policies | Scanning Policies.
3
Click .
Task View policies for SMTP, POP3 or McAfee Secure Web Mail
View the scanning policies that exist for SMTP, POP3 or McAfee Secure Web Mail.
You use this page to create, and manage your SMTP, POP3 or McAfee Secure Web Mail email scanning
policies.
The POP3 protocol limits some of the scanning actions that can be applied to email messages. Options
not available to scan POP3 email messages are hidden from the POP3 protocol view.
Task
1 Click Email | Email Policies | Scanning Policies.
2 Select either SMTP, POP3 or McAfee Secure Web Mail from the Select a protocol: drop-down list.
The Email | Email Policies | Scanning Policies page refreshes to show the policies that have been defined for
the selected protocol.
If you have created more than two scanning policies, you can change the order that your appliance
uses the policies to evaluate email traffic. This is achieved by moving the relevant policies up or down
the policy list.
The default policy always appears at the bottom of the list of policies. You cannot change its position.
Task
1 Click Email | Email Policies | Scanning Policies.
If the identified policy is either at the top of the evaluation order, or is next to the default policy,
then one or other of the icons will not be available for selection.
Task Turn on GTI message reputation for all users in the HR group
defined in LDAP
Use this task to enable GTI message reputation checks for all users in the Human Resources group
defined in LDAP.
Define a user group for Human Resources (Email | Group Management | Network Groups
Task
1 Go to Email | Email Policies.
3 Type a name for the new policy, and add a description if desired.
4 Select the policy from which this policy will inherit settings.
5 Indicate the email direction for messages treated with this policy.
8 In the Add Rule dialog box, select the LDAP Query rule type and click OK.
10 In the Spam section for the new policy (or for the Default policy if you selected that), click the link
for GTI message reputation.
12 Select the green check mark icon in the upper portion of the window to save and apply your
configuration.
Tasks
Task Create a compliance dictionary to match all subject lines on page 137
Create a compliance dictionary that matches all email messages with a valid subject line.
Task Create a compliance dictionary to match subject lines that have already been
modified on page 138
To prevent the subject line of a message being re-written each time any other process
modifies the subject, create a new compliance dictionary.
Task Configure a policy to use the new compliance dictionaries on page 139
Link the new compliance dictionaries to a policy, so that your McAfee Email Gateway can
re-write the subject of email messages matching the compliance dictionary, unless the
subject line has already been modified.
Task
1 Browse to Email | DLP and Dictionaries | Compliance Dictionaries.
3 Type a name for the new category. For example, type All Subjects in the Name field.
6 Click OK.
7 Click the Everything link from within Dictionary details for 'All Subjects'.
8 Unselect Everything.
11 Click OK.
The new dictionary, All Subjects, now is applied only to email messages with a valid Subject line.
12
From the New term row of the Dictionary details for 'All Subjects' table, click the edit icon.
14 Click OK.
The new compliance dictionary is created, and is configured to match any email message with a valid
subject line.
Task
1 Browse to Email | DLP and Dictionaries | Compliance Dictionaries.
3 Type a name for the new category. For example, type Previously Modified Subjects in the Name
field.
6 Click OK.
Under Dictionary details for 'Previously Modified Subjects', a New term is added.
7 Click the Everything link form within Dictionary details for 'Previously Modified Subjects'.
8 Unselect Everything.
11 Click OK.
The new dictionary, Previously Modified Subjects, now is applied only to email messages with a valid
Subject line.
12
From the New term row of the Dictionary details for 'Previously Modified Subjects' table, click the edit icon.
Repeat this step for any other modification patterns that you do not want to be re-applied.
14 Click OK.
The new compliance dictionary is created, and is configured to match any email message with a
subject line that includes re: or fw:
This rule is not case sensitive, so it will match re: Re: RE: fw: Fw: or FW:
You can edit an existing policy to use the new compliance dictionaries, or you can create a new policy.
Task
1 Create a new policy, or select the policy to be edited.
3 Ensure that Compliance is enabled (Select Yes at the top of the dialog box.)
You will need to create a new rule for the "All Subjects" compliance dictionary and another new rule
for the "Previously Modified Subjects" compliance dictionary.
Previously Modified Subjects for the rule to prevent multiple subject re-writes.
6 Click Next.
7 Search for and select the compliance dictionaries you previously created (in the example, this was
"All Subjects", and "Previously Modified Subjects".)
8 Click Next.
9 Click Next.
10 From the If the compliance rule is triggered drop-down list, select Allow Through (Monitor).
11 From And also, select Modify subject from the Other actions sub-category.
For the "Previously Modified Subjects" rule, select the %SUBJECT% option, and make sure that
it has a higher priority than the "Policy Match: %SUBJECT%" template (by moving this to the
top of the list).
15 Click OK.
16 Click OK.
17 Select the modified subject from the Select a template drop-down list.
18 Click Finish.
19 Click OK.
The subject line of all email messages matching this policy are re-written, unless the subject lines
have already been modified.
Tasks
Task Create a compliance dictionary to match all messages on page 140
Create a compliance dictionary that matches all email messages. One way to achieve this is
to match email messages with a valid subject line.
Task Configure a policy to use the new compliance dictionaries on page 141
Link the new compliance dictionary to a policy, so that your McAfee Email Gateway can add
a custom header to email messages matching the compliance dictionary.
Task
1 Browse to Email | DLP and Dictionaries | Compliance Dictionaries.
3 Type a name for the new category. For example, type All Subjects in the Name field.
6 Click OK.
7 Click the Everything link from within Dictionary details for 'All Subjects'.
8 Unselect Everything.
11 Click OK.
The new dictionary, All Subjects, now is applied only to email messages with a valid Subject line.
12
From the New term row of the Dictionary details for 'All Subjects' table, click the edit icon.
14 Click OK.
The new compliance dictionary is created, and is configured to match any email message with a valid
subject line.
You can edit an existing policy to use the new compliance dictionary, or you can create a new policy.
Task
1 Create a new policy, or select the policy to be edited.
3 Ensure that Compliance is enabled (Select Yes at the top of the dialog box.)
You will need to create a new rule for the "All Subjects" compliance dictionary.
5 Type a name for the new rule: (for example:) Match all messages for the All Subjects rule.
6 Click Next.
7 Search for and select the compliance dictionary you previously created (in the example, this was
"All Subjects".)
8 Click Next.
9 Click Next.
10 From the If the compliance rule is triggered drop-down list, select Allow Through (Monitor).
11 From And also, select Modify headers from the Other actions sub-category.
14 Select or edit the required header templates, including defining the name for each header and
specifying the tokens applicable to each header.
To prevent multiple copies of a defined header being added to a message, select Remove Existing.
15 Click OK.
16 Click OK.
17 Select one or more Header Modification Templates from the list of currently configured templates.
18 Click Finish.
19 Click OK.
The Add Policy page enables you to specify the parameters that define the policy, add the users or user
groups to which the policy will apply and specify the network groups.
Option Definition
Add user group Click to open the Add User Group dialog box.
Add network group Click to open the Add Network Group dialog box
Policy name Type the name of the new policy.
Description Optionally add a description of the new policy to facilitate identification.
Inherit settings from Select the policy from which you want this policy to inherit its settings.
Email direction Choose whether you want the policy to apply to inbound or outbound email traffic
only. By default, policies apply to both inbound and outbound traffic.
Match logic Choose whether you want the match to be made on one or more of the rules, or all
of the rules in the list.
Add Rule Opens a new dialog box where you can specify the type and match for the rule
that you want to create, and specify the value.
The network group and user group and LDAP query rules are not available until you
create the items.
Move Use the arrows to move the rules up and down the list.
The rules are actions from the top of the list downwards.
Option Definition
Group name Type the name of the group
Selected or Select a group and click Edit or Delete Selected Rules as appropriate. Use the arrow
unselected icons to move the rules up and down the list.
Rule type Choose from:
Sender email address
Recipient email address
Sender user group
Recipient user group
LDAP Query (if configured)
The LDAP query and user group options become available only when a user
group or LDAP server has been created.
Value Type the value that you want to associate with Match.
Add Rule Click to add a new rule to the list.
Option Definition
Group name Type the name of the network group
Rule type Choose from:
IP address
VLAN identifier
Network connection
Host name
Value Type the value associated with the type of rule that you chose
Move Use the arrows to move the rules up and down the list
The rules are actions from the top of the list downwards.
Add Rule / Delete Selected Rules Click to add a new rule to the list
Reset Click Reset to clear all data from this form.
Task
1 Select Email | Email Policies | Scanning Policies.
2 Select the required protocol using steps in Task View policies for SMTP, POP3 or McAfee Secure
Web Mail.
4 In the Scanning Policies New Policy page, enter the following information:
a Name for the policy.
If you have a similar policy already set up, select this to allow its settings to be inherited by the
new policy.
d Choose if the policy is to apply to inbound or outbound email traffic. (SMTP only)
f Select the type of rule, how it should match, and the value that the rule tests against.
g If required, add additional rules, and use the and buttons to correctly order the rules.
5 Click OK.
Task
1 Go to Email | Group Management | Email Senders and Recipients.
The Values field is populated with the name of the LDAP group you selected.
8 In Value, select the user group you created, and click OK.
Task
1 Go to Email | Group Management | Network Groups.
2 Click Add, and type a name for the network group such as Internal Email Servers.
5 In Match, select is, and type the IP address of one of your mail servers.
6 In Value, type the IP address of one of your email servers, and click OK.
8 Click Email | Email Policies | Add Policy..., and type a name for the policy.
If the network group that you want to use for the policy is not already created, click Add network group.
11 In Rule type, select Source network group, and in Value, select the Internal mail servers group.
12 Click OK.
Option definitions Add Rule dialog box and Edit Rule dialog
box
Use this dialog box to set up or edit the type of rules that you want the policy to use.
The options on this dialog box change depending on the rule type you choose.
Option Definition
Rule type Choose from:
Source IP address use this rule to enforce a policy based on the IP address of the incoming
network connection.
The is match allows you to add a single IP address (for example, 92.168.0.1). The is in
match allows you to add a network address if the incoming connection may be from a
collection of servers on a particular subnet (for example, 192.168.0.0/24).
The source IP address is usually the IP address of the Senders MTA or of the Firewall/NAT
in front of the MTA.
This rule works with proxy or transparent connections.
Destination IP address use this rule to enforce a policy based on the IP address of the
outgoing network connection.
The is match allows you to add a single IP address (for example, 92.168.0.1). The is in
match allows you to add a network address if the incoming connection may be from a
collection of servers on a particular subnet (for example, 192.168.0.0/24).
The destination IP address is usually the IP address of the Recipients MTA or of the
Firewall/NAT in front of the MTA.
This rule only works with transparent connections.
Sender email address use this rule to enforce a policy based on the email address of the
sender.
The email address to evaluate is taken from the 'MAIL FROM' of the SMTP conversation.
The is match allows you to specify the exact email address to match the rule.
The is like match allows you specify an email address pattern to match the rule. Use the
wildcard character * to match any character in the address.
Masqueraded sender email address - use this rule to enforce a policy based on an email address
after address masquerading is carried out.
The email address to evaluate is taken from 'MAIL FROM' of the SMTP conversation, after
address masquerading has been applied. If the email address has not been masqueraded
the original Sender email address is used.
The is like match allows you specify an email address pattern to match the rule. Use the
wildcard character * to match any character in the address.
This rule will be used regardless of masquerading has been successful.
Recipient email address use this rule to enforce a policy based on the email address of the
recipient of the email.
The email address to evaluate is taken from the 'RCPT TO' of the SMTP conversation.
Since an email may be addressed to more than one recipient, the application of this rule
differs between transparent and proxy connections:
Proxy connections application of this rule causes the message to be split if a single
policy does not match all of the recipients of the email (as specified by the Recipient
email address or Aliased recipient email address). The message will be scanned using
each of policies for the recipients that match that policy. It is possible that recipients
who match different policies will receive a different mail to other recipients, if policy
settings cause modification of the mail.
The number of times a message may be split is configured in Email Configuration | Protocol
Configuration | Protocol Settings (SMTP) | Message processing | Advanced options | Maximum number of
policies per email. If the message is split more that the configured number of times, no
message split is performed and the message is scanned with the highest order common
policy.
Transparent connections by default a policy with this rule is only triggered if all
recipients match the rules for the policy (as specified by the Recipient email address or
Aliased recipient email address).
Option Definition
When a message has multiple recipients and multiple policies would have matched, the
highest order policy that matched all rules up to the RCPT TO phase of the policy will
be used for scanning. This behavior may be overridden in Email Configuration | Protocol
Configuration | Protocol Settings (SMTP) | Transparency options (router and bridge mode only) | Advanced
options | Allow multiple policies per email.
Overriding this behavior will cause the original connection to the onward server to be
ended, and a new mail delivered for each policy.
The is match allows you to specify the exact email address to match the rule.
The is like match allows you specify an email address pattern to match the rule. Use the
wildcard character * to match any character in the address.
If you have multiple policies based on recipient email address and a message is intended
for recipients in different policies, the message will be split and each recipient will get
evaluated using their policy.
A policy will never trigger, if 'Recipient email address' rule type has been used more than
once in the policy with 'Match all of the following rules' match logic.
Recipient email address list use this rule to enforce a policy based on the email addresses of
the complete set of recipients included in the email delivery.
This rule is evaluated after the complete set of recipients has been received at the 'RCPT
TO' phase of the SMTP conversation. It will not cause the message to be split for different
policies.
This rule may be used to trigger a policy when you need to consider whether multiple
recipients have been sent a message.
The contains match allows you to specify the exact email address to match the rule.
The contains addresses like match allows you specify an email address pattern to match the
rule. Use the wildcard character * to match any character in the address.
Aliased recipient email address use this rule to enforce a policy based on the aliased email
address of the recipient.
The email address to evaluate is taken from 'MAIL FROM' of the SMTP conversation, after
aliasing has been applied. If the email address has not been aliased the original recipient
email address is used.
Aliased recipient email address list use this rule to enforce a policy based on a recipient email
address list after the recipient aliasing is carried out.
The email address to evaluate is taken from 'MAIL FROM' of the SMTP conversation, after
aliasing has been applied. If the email address has not been aliased the original recipient
email address is used.
Once the policy is enforced based on the email address list it will stop evaluating the
policies in the later in the order for that email.
VLAN identifier use this rule to enforce a policy based on a VLAN identifier which uniquely
identifies the VLAN to which the frame belongs.
You can use a value between 0 4095.
Option Definition
This rule applies to transparent connections only.
Incoming network connection
Outgoing network connection
Source host name
Destination host name
Source network group
Destination network group
User group
LDAP query
Policy rules
Operator This option is only available when you select the LDAP query rule type.
Match Choose from:
is
is not
is in
is not in
If you select the LDAP query rule type, two additional options appear: Contains and Does not
contain.
Value Enter the value associated with the type of rule that you chose.
Match logic Select the required option to determine how the system applies policy
exception rules.
Rule type Displays the type of the rule, based on the parameters set when you
created the rule.
Move Clicking the relevant arrow moves a rule up or down in the list of rules.
Rule priority is determined by the position within the list, with the rules at
the top of the list having a higher priority than those lower down.
Edit Opens the edit window for the specific rule.
Option Definition
Group name Type the name of the group.
Selected or Select a group and click Edit or Delete Selected Rules as appropriate. Use the arrow
unselected icons to move the rules up and down the list.
Rule type Choose from:
Sender email address
Recipient email address
Sender user group
Recipient user group
LDAP Query (if configured)
The LDAP query and user group options become available only when a user
group or LDAP server has been created.
Value Type the value that you want to associate with Match.
Add Rule Click to add a new rule to the list.
Task
1 Go to Email | Group Management | Email Senders and Recipients.
The Values field is populated with the name of the LDAP group you selected.
8 In Value, select the user group you created, and click OK.
Option Definition
Group name Type the name of the network group.
Rule type Choose from:
IP address
VLAN identifier
Network connection
Host name
Value Type the value associated with the type of rule that you chose.
Move Use the arrows to move the rules up and down the list.
Add Rule / Delete Selected Rules Click to add a new rule to the list.
Reset Use the Reset button to clear the entries you have made in this dialog box.
Option Definition
Template Shows the text or tokens that will be used to re-write the subject line.
Priority Shows the priority of the available templates.
Option Definition
Move Use the arrow icons to move your subject template higher or lower in priority order.
Move the template up
Move the template down
Edit Click to make changes to the text that is used to re-write the subject line.
Delete Click to remove the template.
You cannot delete the pre-defined notification templates, or any templates that are
currently being used by a policy.
Add Create a new notification template. The new template is added at the bottom of the
template list.
Recipients
When editing a pre-configured customized notification template, these same pages are available from
tabs accessed from the Edit Notification Template link.
Selecting either of the forward options does not allow the use of custom subjects, or
allow the forwarding of any attachments contained within the email message.
Editing area When creating custom notification content, use the editing area to create the
notification. Select from the drop down list of available tokens to have McAfee Email
Gateway add the required information at the time the notification is sent. Type any
other message for the intended recipients of the notification.
Anti-virus features
The anti-virus protection within Email Gateway provides many ways to protect your network and
users.
Protects your network from potentially unwanted programs (PUPs). The appliance can be
configured to:
Enable or disable detection of potentially unwanted programs.
Detect specific types of potentially unwanted programs, such as mass mailers and Trojan
horses.
Protects your network from named packers. You can add and remove packer names from the list of
packers that will be detected.
Packers compress files and can effectively disguise executable programs. They can also compress
Trojan horses and make them harder to detect. The appliance can be configured to:
Protects your network from PUPs. A cautious user might want to be informed of PUPs, and might
want to remove them.
McAfee anti-spyware software detects and, with your permission, removes potentially unwanted
programs. Some purchased or intentionally downloaded programs act as hosts for other potentially
unwanted programs. Removing these potentially unwanted programs may prevent their hosts from
working. Review the license agreement for these host programs for further details. McAfee does not
encourage nor condone breaking any license agreements. Read the details of license agreements
and privacy policies carefully before downloading or installing any software.
Automatically decompresses and scans files compressed in the packages that include PKZip, LHA,
and ARJ.
Detects new viruses in executable files and OLE compound documents, using a technique called
heuristic analysis.
Viruses
Spyware
Adware
Various kinds of malware (malicious software) and other potentially unwanted software.
Spyware can steal information and passwords. This category includes potentially unwanted programs
(PUPs), which are any software that a cautious network administrator might want to be informed of,
and possibly remove, such as password crackers. Adware, too is among these nuisances, because it
distracts employees from their normal work.
Some software programs written by legitimate companies might alter the security or privacy of the
computer where they are installed. This software can include spyware, adware, and dialers, and might
be downloaded unwittingly with a program that the user wants. Cautious users prefer to know about
such programs, and in some cases, remove them.
Although more options can provide greater security, scanning will take longer. The scanning
capabilities are:
To specify that a scanner on the appliance handles some packers and PUPs differently, use the Custom
Malware Options tab.
For example, you can configure the appliance to inform the sender, the recipient and an administrator
with an alert message whenever a virus is detected in an email message. This feature is useful
because it shows that the anti-virus detection is working correctly, but it can become a nuisance if a
mass-mailer virus is encountered.
Mass-mailer viruses (for example Melissa and Bubbleboy) propagate themselves rapidly using email.
Numerous alerts are generated, and these can be as annoying as the surge of detected email
messages that has been blocked.
The appliance can handle any mass-mailer virus separately from other types of virus. You example,
you can choose to discard the detected document immediately, and thereby suppress any alert
messages that will otherwise be generated.
The Anti-Virus | Basic Options page enables you to configure options such as the types of files that are
scanned for viruses, the actions to take if a virus is identified, and what to do if an infected file cannot
be cleaned.
Contents
Benefits of configuring basic Anti-Virus options
Benefits of using McAfee Global Threat Intelligence file detection
Option definitions Anti-Virus Basic Options
Task Enabling McAfee Global Threat Intelligence file reputation
This page also give you the option of enabling McAfee Global Threat Intelligence file reputation.
Using McAfee Global Threat Intelligence file reputation enables your Email Gateway to provide
protection against new threats, before they are included in detection definition (DAT) files.
1 The appliance scans each file, comparing its code against the information (or signatures) in the
current detection definitions (DAT) file.
2 If the code is not recognized and is suspicious, for example, the file is packed or encrypted, the
appliance sends a small definition (or fingerprint) of that code to McAfee Global Threat Intelligence
an automated analysis system at McAfee. Millions of other computers with McAfee software also
contribute fingerprints.
3 McAfee compares the fingerprint against a database of fingerprints collected worldwide, and
informs the appliance of the likely risk within seconds. Based on settings in the scanning
policies, the appliance can then block, quarantine, or try to clean the threat.
If McAfee later determines that the code is malicious, a DAT file is published as usual.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Scan archive files By default, the scanner does not scan inside file archives such as .zip or .lzh files
(ZIP, ARJ, RAR ...) because any virus-infected file inside them cannot become active until it has been
extracted.
When selected, Email Gateway scans these types of files.
However, scanning takes longer and might affect performance. As the contents of
these files are harmful only when files inside are extracted, they can be scanned by
the on-access scanners on individual computers in your network.
Find unknown file An anti-virus scanner typically detects viruses by looking for the virus signature,
viruses which is a binary pattern that is found in a virus-infected file. However, this
approach cannot detect a new virus because its signature is not yet known,
therefore the scanner uses another technique: heuristic analysis. Program file
heuristics scans program files and identify potential new file viruses. Macro
heuristics scans for macros in the attachments (such as those used by Microsoft
Word, Microsoft Excel, and Microsoft Office) and identify potential new macro
viruses.
When selected, does extra analysis to find any virus-like behavior.
Find unknown macro Macros inside documents are a popular target for virus writers.
viruses to Remove When selected, take actions against macros in documents. Macros inside
all macros from documents are a popular target for virus writers.
document files
Enable McAfee Enables McAfee Global Threat Intelligence file reputation on your appliance.
Global Threat McAfee Global Threat Intelligence file reputation complements the DAT-based
Intelligence file signatures by providing the appliances access to millions of cloud-based
reputation with signatures. This reduces the delay between McAfee detecting a new malware
Sensitivity level threat and its inclusion in DAT files, providing broader coverage.
The sensitivity levels enable you to balance the risk of missing potentially harmful
content (low settings) with the risk of false positive detections (high settings).
For gateway appliances, the recommended sensitivity level is Medium.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include any
custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using
user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Notification and When clicked, opens another window where you can specify who the appliance will
annotated email notify when a threat is detected.
options
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include any
custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using
user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
If a file is zero Provides an action against a file that is now empty. Zero-byte files cannot carry
bytes after threats, but you might prefer to remove the files if they confuse users.
cleaning The available options are:
Keep zero byte file
Remove zero byte file
Treat as a failure to clean
Perform optimized scanning Objects are not passed to the Commtouch Command
anti-virus engine if the McAfee anti-virus engine makes a detection that is then
either replaced with an alert message, or that causes the email message to be
dropped.
Depending on the actions configured for the McAfee anti-virus engine, the
additional anti-virus engine might not be used to scan an email message.
Command anti-virus engine after the McAfee engine completes its scan.
Task
1 Select Email | Email Policies | Anti-Virus | Basic Options.
2 From within Specify which files to scan, select Enable McAfee Global Threat Intelligence file reputation.
3 Select your required Sensitivity level. A low setting means that the McAfee Email Gateway may miss
some potentially harmful content, whereas a high setting means that the McAfee Email Gateway
may detect some harmless files and wrongly label them as potentially harmful.
4 Click OK.
5 Click Apply.
The Anti-Virus | McAfee Anti-Spyware page enables you to configure McAfee Anti-Spyware to detect and take
action against certain types of potentially unwanted programs being transmitted within email
messages.
Contents
Benefits of using McAfee Anti-Spyware
Option definitions Default Anti-Virus Settings McAfee Anti-Spyware
You can configure your Email Gateway to scan for potentially unwanted programs.
A PUP (potentially unwanted program) is any program that may be unwanted, even though the user
consented to downloading and installing the software. This may be because the user did not read the
terms and conditions relating to the software, or because it was downloaded in conjunction with
another piece of software that the user did want to install.
Potentially unwanted programs can include spyware, adware, and dialers. To learn more about
potentially unwanted programs, visit McAfee Labs Threat Library(http://vil.nai.com/vil/default.aspx).
Options on the user interface enable you to select the categories of unwanted programs the appliance
should detect.
You can also specify the actions to use when a potentially unwanted program is detected, and some
optional additional actions.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Spyware to Other PUPs Select the types of potentially unwanted programs detected.
Exclude and Include Build a list of names of programs to scan or ignore.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include any
custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using
user-definable templates, and then delivers the message to the intended recipients.
You can select multiple header modification templates. Click Manage templates to
change the way the headers are re-written.
The Anti-Virus | Packers page enables you to configure Email Gateway to detect and take action against
types of packers.
Packers compress files, which changes the binary signature of the executable. Packers can compress
Trojan-horse programs and make them harder to detect.
Contents
Benefits of using Packer detection
Option definitions - Default Anti-Virus Settings - Packers
Enabling Packer detection helps defend against this type of threat, by scanning within the compressed
files to check the true binary signatures of the files contained within.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include any
custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using
user-definable templates, and then delivers the message to the intended recipients.
You can select multiple header modification templates. Click Manage templates to
change the way the headers are re-written.
The Anti-Virus | Custom Malware Options page enables you to configure Email Gateway to take different
actions when certain types of malware are detected.
Contents
Benefits of using the Custom Malware options
Option definitions Default Anti-Virus Settings Custom Malware Options
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Table 4-49 Option definitions Apply different actions to certain detection types
Option Definition
Mass mailers to Trojan horses When selected, applies the specified action to this type of malware.
If the option is not selected, the malware is handled as described by
the basic options.
Specific detection name When selected, allows you to add names of specific detections. You
can use * and ? to represent multiple and single characters in
the malware names.
Do not perform custom malware check Enable this to prevent the appliance carrying out the custom
if the object has already been cleaned. malware checks if the object has already been successfully cleaned.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include any
custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using
user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
If you are using off-box quarantine, you can also select the quarantine queue
into which the email message is placed. This selection can include custom
quarantine queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email
message using user-definable templates, and then delivers the message to
the intended recipients. Click Manage templates to change the way the subject is
re-written.
Modify headers McAfee Email Gateway modifies the email message headers
using user-definable templates, and then delivers the message to the
intended recipients. You can select multiple header modification templates.
Click Manage templates to change the way the headers are re-written.
Notification and Link that opens the Notification Emails page where you can set options.
annotated email options
If an action results in an Enables or disables use of the default text for virus alerts. If the default is
alert disabled, the system uses alert text provided by the user.
If you are using off-box quarantine, you can also select the quarantine queue
into which the email message is placed. This selection can include custom
quarantine queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email
message using user-definable templates, and then delivers the message to
the intended recipients. Click Manage templates to change the way the subject is
re-written.
Modify headers McAfee Email Gateway modifies the email message headers
using user-definable templates, and then delivers the message to the
intended recipients. You can select multiple header modification templates.
Click Manage templates to change the way the headers are re-written.
Notification and Link that opens the Notification Emails page where you can set options.
annotated email options
Task
1 Select Email | Email Policies, then in the Anti-Virus column, click the Viruses: Clean or Replace link.
3 In the Hybrid scanning options section of the page, select the checkbox to enable hybrid scanning.
4 If you want your Email Gateway appliance to scan any email that passes through the hybrid scan
without triggering an action, select the Rescan the mail locally checkbox.
5 Configure the actions you want the Email Protection Service to take when it detects a virus.
a Select the primary action for virus detection from the drop-down list.
b Select any secondary action or actions from the scrolling And also menu.
c Click the Notification and annotated email options link to set options on the Notification Emails page.
d Specify the use of the default alert text for anti-virus alerts by selecting the Use default text
checkbox.
e If you want to change the text of the anti-virus alert, click the Change the default alert text link.
6 Configure the actions you want the Email Protection Service to take when it detects a potentially
unwanted program (PUP).
a Select the primary action for PUP detection from the drop-down list.
b Select any secondary action or actions from the scrolling And also menu.
c Click the Notification and annotated email options link to set options on the Notification Emails page.
d Specify the use of the default alert text for PUP alerts by selecting the Use default text checkbox.
e If you want to change the text of the alert, click the Change the default alert text link.
Anti-Spam features
The anti-spam protection within Email Gateway provides many ways to protect your users from
unsolicited email messages.
The anti-spam features include:
ability to add prefixes to the subject line of emails identified as being unsolicited
spam rules that can be disabled if they are incorrectly identifying legitemate emails as spam
In addition, McAfee Email Gateway provides protection against phishing emails. Phishing emails are
messages that proport to come from a users bank or other institution, but, in fact are aimed at
tricking the user into disclosing sensitive financial data about their account and PIN numbers.
Another method of reducing the amount of unsolicited email is to use Sender Authentication to check
that the email messages have actually been sent from the source that it appears to have been sent.
Contents
Benefits of using basic Anti-Spam options
Option definitions Default Anti-Spam Settings Basic Options
From this dialog box, you can also choose how you want to inform your users that a message could
possibly be spam. You can add a prefix to the subject line of emails suspected of being spam, and can
edit the text that appears within the subject.
You can also configure further spam-based options, including defining stricter actions (monitor, block
or reroute) for messages gaining a higher spam score.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Add a prefix to the subject When selected, adds some text that helps users to find suspicious messages
line of spam messages and in their email inbox.
Prefix text Default value is [spam].
Add a spam score indicator When selected, adds an indicator to each message's Internet headers. For
and Indicator text example, a message that has a spam score between 6 and 7 can be given an
indicator of six asterisks. This information is useful for later analysis.
Default value is *.
Attach a spam report When selected, adds a report to the messages, showing the names of the
anti-spam rules that have triggered.
We recommend that you select a spam report for initial testing only, because
it can affect your server's performance. When you have collected the
information, deselect the option.
If the action to take against email is Route to an alternate relay, you can click a Manage the
list of relays link to a list of other devices that will handle the email instead.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using
user-definable templates, and then delivers the message to the intended
Notification and When clicked, opens another window where you can specify who the appliance will
annotated email notify when a threat is detected.
options
Contents
Benefits of using the advanced Anti-Spam options
Option definitions Default Anti-Spam Settings Advanced Options
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Specify limits
Option Definition
Use the default maximum Select to use the default message size limits.
message size The default size is 250 KB.
Deselect to set a custom Maximum message size.
Maximum message size Specifies the maximum size of the email message. Spam messages are
typically small.
Maximum width of spam Specifies the maximum width of headers that the appliance adds to email
headers messages.
We do not recommend that you decrease the value. For example, Verbose
reporting creates header lines, each with the name and description of a rule. A
reduced width will truncate the rule descriptions, making them more difficult to
read.
Default value is 76 bytes.
Maximum number of Specifies the maximum number of anti-spam rule names that can be included
reported rules in a spam report.
Default value is 180.
Use alternative header names If selected, appends the text - Checked to the normal spam header names
when a mail is not spam when the email message did not contain spam. This option can be useful to
other devices that handle the same email message later.
Contents
Benefits of using Blacklists and Whitelists
Option definitions Blacklisted Senders
Option definitions Blacklisted Recipients
Option definitions Whitelisted Senders
Option definitions Whitelisted Recipients
Option definitions User Submitted
During email "spam" campaigns, high volumes of email messages can be generated in a short period
of time. If each of these spam emails that reach your email servers have to be individually scanned to
check the content, this can consume scanning resources on your Email Gateway.
Using blacklists, you can block all emails from a specific address, thereby removing the requirement to
scan each of the emails individually.
If you find that people that send legitimate email messages into your organization have their
messagse erroneously tagged as being spam, adding their addresses to the whitelists can prevent the
messages being tagged as spam.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Option Definition
Email Address Use this to make a list of email addresses that often send spam.
Specifies each email address. You can use wildcards, for example: user_?
@example.*
Add Address Click to add a new row to the list of email addresses that often send spam. Type
the email address that you want added to the list.
Delete Selected If you find that legitimate email sender addresses have been added to the
Addresses Blacklisted Senders list, select each legitimate address, and click Delete Selected Addresses.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Option Definition
Email Address Use this to make a list of email addressses that often receive spam.
Specifies each email address. You can use wildcards, for example: user_?
@example.*
Add Address Click to add a new row to the list of email addresses that often receive spam. Type
the email address that you want added to the list.
Delete Selected If you find that legitimate email addresses have been added to the Blacklisted
Addresses Recipients list, select each legitimate address, and click Delete Selected Addresses.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Option Definition
Email Address Use this to make a list of users who want to send email messages that the
appliance normally treats as spam.
Specifies each email address. You can use wildcards, for example: user_?
@example.*
Add Address Click to add a new row to the list of email addresses that are to be allowed to send
email. Type the email address that you want added to the list.
Delete Selected If you find that illegal email sender addresses have been added to the Whitelisted
Addresses Senders list, select each illegal address, and click Delete Selected Addresses.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Add Address Click to add a new row to the list of email addresses that are to be allowed to
receive email messages. Type the email address that you want added to the list.
Delete Selected If you find that illegal email recipient addresses have been added to the Whitelisted
Addresses Recipients list, select each illegal address, and click Delete Selected Addresses.
Use this to view and manage lists of blacklists and whitelists that have been submitted by users
through quarantine digests.
If the appliance is configured to use the McAfee Quarantine Manager, you can only view the lists.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Modify, Add and Delete Use these buttons to add, remove or edit entries within the user-submitted lists.
Contents
Benefits of configuring Spam Rules
Option definitions Spam Rules
One of these methods is to use a set of regularly-updated rules to detect specific spam campaign
messages.
However, on occasion, one of these rules may wrongly detect legitimate email messages as spam - a
false positive detection. In this situation, you can disable just the rule that is causing the false positive
detections.
It is unlikely that you will need to change this list. Make changes only if you understand the
implications.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Option Definition
Rule Name Displays the rule name that is seen in the spam report.
Rule Score Displays the rule score, which is typically 1-5.
Enabled Specifies whether a rule is active. To disable a rule, deselect its checkbox.
Apply and Filter When Apply is clicked, the table shows only those numbers specified by Filter. You can
type a regular expression here, for example:
^AA Find all terms that begin with AA.
BB$ Find all terms that end with BB.
CC Find all terms that contain CC.
To see the full list again, clear Filter and click Apply.
Contents
Benefits of scoring spam terms
Option definitions Spam terms
Task Create a dictionary of spam terms
Task Create a dictionary of spam term exclusions
Task Use the spam terms and spam term exclusions dictionaries to modify spam scores
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
If you have configured your McAfee Email Gateway to scan for Graymail, the predefined
Graymail dictionary is automatically added to this list. If you have not configured Graymail
from the Setup Wizard, you can manually add this dictionary to the Dictionaries list.
Exclusions Use a custom dictionary to define a list of terms that cause the email message containing
the terms defined within the configured Dictionaries to be whitelisted.
Score The value used to modify the total spam score for the message.
For terms to be considered as spam, add a positive value in this field.
For terms to not be considered as spam, add a negative value.
Add Term Opens a window to define further dictionaries that are used to modify spam scores.
Task
1 Select Email | DLP and Dictionaries | Compliance Dictionaries.
4 Define whether to use simple string matching or regular expressions for this dictionary.
5 Click OK.
6 Use the Add OR condition, Add AND Condition, and Insert Term buttons to define the terms to be added to
the new dictionary and to configure the relationships between the terms.
7 Click OK.
Task
1 Select Email | DLP and Dictionaries | Compliance Dictionaries.
3 Enter a name for the dictionary; for example, Spam Term Exclusions.
Optionally, enter a description for this dictionary.
4 Define whether to use simple string matching, or regular expressions for this dictionary.
5 Click OK.
6 Use the Add OR condition, Add AND Condition, and Insert Term buttons to define the exclusion terms to be
added to the new dictionary and to configure the relationships between the terms.
7 Click OK.
Task Use the spam terms and spam term exclusions dictionaries to modify spam
scores
Use the dictionaries containing the spam terms and spam term exclusions to modify the spam scores
for the email messages.
Task
1 Select Email | Email Policies | Spam | Spam Terms.
4 Search for the dictionaries containing the required spam terms (in the example, this was Spam
Terms).
Exclusions are used to negate the impact of finding a spam term in a message if a further term, that
is included within the exclusions list, is also found.
7 Search for the dictionaries containing the required spam term exclusions .
9 In the Score field, enter the score to be added to the total spam score for each message.
10 Click OK.
Contents
Benefits of Anti-Phish scanning
Option definitions Anti-Phish
Configuring the anti-phish settings within your appliance helps to protect your users and your
organization from the illegal phishing activities.
Option Definition
Enable anti-phish scanning When selected, enables anti-phish scanning of email messages.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Reporting options
Option Definition
Add a prefix to the subject When selected, adds a prefix to help users to see phishing messages in their
line of phishing messages email inbox quickly.
Specifies text for the prefix.
Add a phish indicator header When selected, adds an indicator in the email X-header, which enables other
to messages software to process or analyze the message further.
Attach a phish report When selected, attaches a report to the email message, which explains why
the email message was marked as phish.
Verbose reporting When selected, provides a fuller report, providing descriptions of the names
of the rules that have triggered.
Actions
Option Definition
If a phishing attempt Provides a main action to take against the phish message. The options available
is detected are:
Deny connection (Block) Replace the content with an alert (Modify)
Refuse the data and return an error code Route to an alternate relay (Reroute)
(Block)
Accept and then drop the data (Block) Allow Through (Monitor)
If the action to take against email is Route to an alternate relay, you can click a Manage the
list of relays link to a list of other devices that will handle the email instead.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using
user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Option Definition
Deliver message using encryption Attempt delivery of the message using your
configured encryption settings.
Notification and When clicked, opens another window where you can specify who the appliance will
annotated email notify when a threat is detected.
options
If an anti-phishing Enables you to use the default anti-phish alert message, or to change the text to
action results in an create your own message.
alert You can also choose the following options:
Do not attach the original message
Attach the original message in RFC822 format
Attach the original message in plain text format
The appliance uses McAfee Global Threat Intelligence message reputation to identify senders of spam
email messages.
By default the appliance is configured to use the McAfee Blackhole list, cidr.bl.mcafee.com.
You are able to add as many RBL servers as you require. The appliance will query each server in the
order they are shown in the user interface until a match is found, when it will take the specified
action. McAfee recommends that you place the RBL servers in the order that they are most likely to
trigger to reduce the number of lookups the appliance carries out for each incoming connection.
These techniques reduce the workload for the appliance, because they reject suspicious email without
the need for scanning.
The appliance can take various actions according to whether the email passes or fails each check. You
can use each type of authentication separately or combine the techniques by using scoring (or
"weighting").
Enable DKIM verification Select to enable DomainKeys Identified Mail (DKIM) verification of email
messages.
Enable FCrDNS Select to enable Forward-Confirmed reverse DNS lookups to provide weak
verification of email messages.
If no method is entirely effective against untrusted senders, or some methods work better than others
in your network, you can associate scores to each method to refine the overall detection. To ensure
scoring works correctly, select Add to score as the action for every method that is in use.
This is because SPF checks are performed during the Mail From phase of the SMTP conversation. To
change this default behavior, you need to force the SPF checks to be carried out after the DATA phase
of the SMTP conversion starts.
Task
1 Navigate to Email | Email Policies | Spam | Sender Authentication | Cumulative Score and Other Options.
Cumulative Score and Other Options is available from the drop-down list on the Default Sender Authentication
Settings (SMTP) window tab bar.
2 Select Parse the email headers for sender address if behind an MTA.
3 Click OK.
4 Apply changes.
SPF checks are now carried out after the DATA phase of the SMTP conversation starts.
The default policy values are normally suitable, but you might need another policy to allow the
occasional transfer of large, deeply nested files, or to investigate possible attacks.
When creating file filtering rules, you can detect files in many ways: You can configure the appliance
to restrict the use of certain file types:
By file name For example, some graphic file formats such as bitmap (.BMP) use large amounts
of computer memory and can affect network speed when transferred. You might prefer that users
work with other more compact formats such as GIF, PNG or JPEG.
If your organization produces computer software, you might see executable (.exe) files moving
around the network. Within another organization, those files might be games or illegal copies of
software. Similarly, unless your organization regularly handles movie files (MPEG or MPG), they are
probably for entertainment only.
A file filtering rule that examines the file extension name can restrict the movement of these files.
Financial information might have file names like Year2008.xls or 2008Results. A file filter that
matches the text 2008 can detect the movement of these files.
By file format For example, much of your organization's most valuable information such as
designs and lists of customers is in databases or other special files, so it is important to control
the movement of these files. The appliance examines files based on their true content.
Any file can be made to masquerade as another. A person with malicious intent might rename an
important database file called CUSTOMERS.MDB to NOTES.TXT and attempt to transfer that file,
believing that it cannot be detected. Fortunately, you can configure the appliance to examine each
file based on its content or file format, and not on its file name extension alone.
By file size For example, although you might allow graphic files to moved around the network,
you can restrict their size to prevent the service running too slowly for other users.
When you create settings to control the use of any file, remember that some departments within your
organization might need fewer constraints. For example, a marketing department might need large
graphic files for advertising.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Option Definition
Order Display the order in which the filters are applied. To change the order, click
icons in the Move column.
Rule Name Displays the rule name.
If Triggered Displays the action to take. Click the link to change the primary and
secondary actions associated with the rule.
Create new filtering rule If clicked, opens a further window where you can specify the types of file you
want to detect.
Change the default alert text If clicked, opens a further window where you can change the alert message
that is issued after a detection.
Setting the DLP policy to action, and control the detection (this topic)
If an uploaded registered document contains embedded documents, their content is also fingerprinted
so the combined content is used when calculating the percentage match at scan time. To have
embedded documents treated individually, they must be registered separately.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Option Definition
Yes, No, or Use the Select to activate the Data Loss Prevention policy settings
same settings as the
default policy
Document match The percentage of the original registered document which must be seen in order
percentage to trigger DLP. For example, if you register two documents; one with 100 pages
of content, and another with 10 pages, a setting of 30% would require 30 pages
to match the document with 100 pages, and just 3 pages to match the document
of 10 pages.
Number of consecutive Set the number of sequential signatures which will cause a trigger. For example,
signatures (advanced): if you register two documents; one with 100 pages of content, and another with
10 pages, use this feature to detect a small section of the original content,
irrespective of its original size.
Rules Select the box to show or hide the list of existing DLP rules.
Create new rule This list is empty until you set up categories for registered documents. Click the
link to create a new data loss prevention rule based on the categories that you
set in Registered Documents.
This opens a dialog box to allow you to select one or more DLP categories.
Exclusions Select the box to show or hide the list of existing document exclusions.
Create document This list is empty until you register documents. Click the link to specify registered
exclusion documents to exclude from this policy.
This opens a dialog box to allow you to select one or more documents to be
excluded from the rule.
If a Data Loss When selected, issues the default alert upon detection. When deselected, allows
Prevention action you to click the link, then change the text of the alert.
results in an alert
Task
1 Select Email | Email Policies | Compliance | Data Loss Prevention.
2 In the Default Data Loss Prevention Settings dialog box, click Yes to enable the policy.
3 Click Create new rule, select the Finance category, and click OK to have the category appear in the Rules
list.
4 Select the action associated with the category, change the primary action to Deny connection (Block),
and click OK.
Task
1 Select Email | Email Policies | Compliance | Data Loss Prevention.
2 In the Default Data Loss Prevention Settings dialog box, click Yes to enable the policy.
3 Enable the consecutive signatures setting, and type the number of consecutive signatures against
which the DLP policy will trigger a detection. The level is set to 10 by default.
4 Click Create new rule, select the Finance category, and click OK to have the category appear in the
Rules list.
5 Select the action associated with the category, change the primary action to Deny connection (Block),
and click OK.
Task
1 Select Email | Email Policies | Compliance | Data Loss Prevention.
2 In the Default Data Loss Prevention Settings dialog box, click Yes to enable the policy.
3 Click Create document exclusion, select the document you want to ignore for this policy, and click OK.
Attachment Size
Attachment Count
Options
The default policy values are normally suitable, but you might need another policy to allow the
occasional transfer of large numbers of large email messages, or the occasional transfer of large
attachments within email messages, or the number of attachments within email messages, or to
investigate possible attacks.
Changing these settings can affect scanning performance. If you are not sure about the impact of
making any changes, ask your network expert.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Option Definition
If the message size Specifies the limit. The default values are:
exceeds Message size - 100000KB (100MB).
Use the message size only as a guide. When encoded, a message can become up to
33% larger. To use the actual size of the message, select Decode email parts for the
purposes of size calculation from the Options tab.
Option Definition
And also Specify the secondary actions to take.
Quarantine options
Quarantine original Select to have the original message added to the Quarantine
database.
Quarantine modified Select to have the modified message added to the Quarantine
database.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include any
custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using
user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Deliver message using encryption Attempt delivery of the message using your
configured encryption settings.
Notification and Follow the link to configure the options for notification messages and annotated
annotated email email messages.
options
If attachments are Select to use the default alert.
replaced with an Click change the default alert text to view or change this alert message.
alert
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers
using user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Deliver message using encryption Attempt delivery of the message using your
configured encryption settings.
Table 4-80 Option definitions Specify the maximum size of all attachments
Option Definition
If the size of all Specifies the limit for the combined size of all attachments. The default values
attachments exceeds are:
Size of all attachments - 64000KB (64MB).
Use the attachment size only as a guide. When encoded as an attachment, a file
can become up to 33% larger. To use the actual size of the attachments, select
Decode email parts for the purposes of size calculation from the Options tab.
Table 4-80 Option definitions Specify the maximum size of all attachments (continued)
Option Definition
And also Specify the secondary actions to take.
Quarantine options
Quarantine original Select to have the original message added to the Quarantine
database.
Quarantine modified Select to have the modified message added to the
Quarantine database.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers
using user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Deliver message using encryption Attempt delivery of the message using your
configured encryption settings.
Table 4-80 Option definitions Specify the maximum size of all attachments (continued)
Option Definition
Notification and Follow the link to configure the options for notification messages and annotated
annotated email email messages.
options
If attachments are Select to use the default alert.
replaced with an alert Click change the default alert text to view or change this alert message.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Option Definition
If the attachment Specifies the limit. The default values are:
count exceeds Attachment count - 500.
Option Definition
And also Specify the secondary actions to take.
Quarantine options
Quarantine original Select to have the original message added to the Quarantine
database.
Quarantine modified Select to have the modified message added to the Quarantine
database.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using
user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Deliver message using encryption Attempt delivery of the message using your
configured encryption settings.
Notification and Follow the link to configure the options for notification messages and annotated
annotated email email messages.
options
If attachments are Select to use the default alert.
replaced with an Click change the default alert text to view or change this alert message.
alert
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Compliance Settings
Use this page to create and manage compliance rules.
Compliance rules can vary in complexity from a straightforward trigger when an individual term within
a dictionary is detected, to building on and combining score-based dictionaries which will only trigger
when a certain threshold is reached. Using the advanced features of compliance rules, dictionaries can
be combined using logical operations of any of, all of, or except.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Option Definition
Enable compliance Select to activate the Compliance policy settings.
Rules Lists the configured compliance rules.
Create new rule Click to open a wizard that creates a new compliance rule.
Create new rule from template Click to open a wizard that lists the predefined compliance rules.
If a compliance action results in an alert When selected, issues the default alert upon detection. When
deselected, allows you to click the link, then change the text of the
alert.
Task
1 Select Email | Email Policies | Compliance.
2 In the Default Compliance Settings dialog box, click Yes to enable the policy.
3 Click Create new rule from template to open the Rule Creation Wizard.
4 Select the Acceptable Use - Threatening Language policy, and click Next.
6 Change the primary action to Deny connection (Block), and click Finish.
Task
1 Select Email | Email Policies | Compliance.
2 In the Default Compliance Settings dialog box, click Yes to enable the policy.
6 Select the Social Security Number dictionary, and click Next twice.
Task
1 Select Email | Email Policies | Scanning Policies and select Compliance.
2 In the Default Compliance Settings dialog box, click Yes to enable the policy.
6 Select a dictionary that you want to exclude from the rule in the exclusion list.
7 Select the action that you want to take place if the rule triggers.
8 From the And conditionally drop-down list, select All, and click Finish.
Task
1 Select Email | Email Policies | Compliance.
4 Select the new dictionary that you want to include, and click OK.
Task
1 Select Email | Email Policies | Compliance.
2 Click Create new rule, type a name for it such as Discontent - Low, and click Next.
6 Click Finish.
7 Repeat steps 2 through 4 to create another new rule but name it Discontent - High and assign it
a threshold of 40.
9 Click Finish.
Task
1 Select Email | Email Policies | Compliance.
2 Expand the rule that you want to edit, then select the Edit icon next to the dictionary whose score
you want to change.
3 In dictionary threshold, type the score on which you want the rule to trigger, and click OK.
You can restrict how many times a term can contribute to the overall score.
For example, if testterm within a dictionary has a score of 10 and is seen five times within an email,
it will add 50 to the overall score. Alternatively you can restrict this, for example to contribute only
twice by setting Maximum term count to 2.
Task
1 Select Email | Email Policies | Compliance.
2 Expand the rule that you want to edit, then click the Edit icon next to the dictionary whose score
you want to change.
3 In Maximum term count, type the maximum number of times that you want a term to contribute to the
score.
Image Filtering
The Image Filtering scanner analyzes images to determine attributes that indicate the image may be of a
pornographic nature.
The Image Filtering feature uses sophisticated, analytical processes that consist of thousands of
algorithms. These include eleven different detection methods to provide enough information to reliably
distinguish between pornographic and non-pornographic images.
Detecting potential pornographic material enables you, as an administrator, to enforce acceptable use
policies around image content leaving and entering your company, and be able to monitor and block
any deliberate or inadvertent infractions of your policy.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Confidence level In %, the level of confidence that an image is pornographic against each detection.
Set to 75% by default.
Take the following Provides a main action to take. The options are:
action
Deny connection (Block) Replace the content with an alert (Modify)
Refuse the data and return an error code Allow Through (Monitor)
(Block)
Accept and then drop the data (Block)
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using
user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Deliver message using encryption Attempt delivery of the message using your
configured encryption settings.
Notification and When clicked, opens another window where you can specify who the appliance will
annotated email notify when a threat is detected.
options
Confidence level In %, the level of confidence that an image is pornographic against each detection.
Set to 50% by default.
Take the following Provides a main action to take. The options are:
action
Deny connection (Block) Replace the content with an alert (Modify)
Refuse the data and return an error code Allow Through (Monitor)
(Block)
Accept and then drop the data (Block)
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Deliver message using encryption Attempt delivery of the message using your
configured encryption settings.
Notification and When clicked, opens another window where you can specify who the appliance will
annotated email notify when a threat is detected.
options
Task
1 Go to Email | Email Policies.
4 In the Higher Image Detection Threshold section, select the Accept and then drop the data (Block) action.
Quarantined messages can be viewed in the Message Search feature (Reports | Message Search), in the Image
Filtering category.
Task
1 Go to Email | Email Policies.
4 In the Lower Image Detection threshold section, select the Allow Through (Monitor) action.
5 In And also, select the Forward modified to... notification email option.
The message is sent to any email lists you have created.
a To change the email recipients who will receive the forwarded message, click Edit.
b Select the lists that you want to receive the message and click OK.
The Encrypted Content Settings options are divided into the following categories:
Signed Content
Encrypted Content
Plaintext Content
For each category, you can choose a primary action to take when that type of content is detected, and
optionally choose a secondary action. Additionally, you can set notification and alert actions too.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Notification and Follow the link to configure the options for notification messages and annotated
annotated email email messages.
options
Alert Settings Select to use the default alert, or follow the link to make changes to the alert text.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Notification and Follow the link to configure the options for notification messages and annotated
annotated email email messages.
options
Alert Settings Select to use the default alert, or follow the link to make changes to the alert text.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Notification and Follow the link to configure the options for notification messages and annotated
annotated email email messages.
options
Alert Settings Select to use the default alert, or follow the link to make changes to the alert text.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Notification and Follow the link to configure the options for notification messages and annotated
annotated email email messages.
options
Alert Settings Select to use the default alert, or follow the link to make changes to the alert text.
McAfee GTI provides reputation scores to the URL reputation database. Use the reputation scores to
configure actions for suspected security risks. The URL blacklists and whitelists have an impact on the
URL reputation scans.
The URL reputation score has no appreciable effect on the overall score for the message.
You can enable URL reputation scanning when you run the Setup Wizard, or you can do it after initial
setup. The URL database is not available until you enable URL reputation scans.
URL scanning appears as a component of the Compliance features on the Email Policies page. The
database appears under System | Component Management | Update Status.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Confidence level This field is pre-populated with the proper score to trigger the
higher threshold.
Take the following action Select the preferred action from the drop down list.
And also If necessary, select one or more secondary actions from the scrolling
menu.
Notification and annotated email options Click this link to configure default notifications and alerts.
Lower URL reputation threshold
Detection threshold Select threshold level. Options are:
Highly suspect
Suspect
Custom
Confidence level This field is pre-populated with the proper score to trigger the lower
threshold.
Take the following action Select the preferred action from the drop down list.
And also If necessary, select one or more secondary actions from the scrolling
menu.
Notification and annotated email options Click this link to configure default notifications and alerts.
Alert settings
If an action results in an alert Select the checkbox to generate the default alert.
(change the default alert text) Click this link to change the text in the default alert.
Task
1 Navigate to Email | Email Policies.
The Email Policies page opens, showing all currently configured policies and the evaluation order.
4 If URL reputation scanning is not already enabled, click the Yes radio button.
c Select the primary action for URLs that trigger the higher threshold.
e Set notification and alert options associated with the higher threshold.
c Select the primary action for URLs that trigger the lower threshold.
e Set notification and alert options associated with the lower threshold.
9 Click OK.
The Default URL Reputation Settings page closes, and the URL reputations link shows the primary action.
ftp://user:1234@ftp.domain.com:2021/docs/data.rtf;type=a
Type (only for Transfer type (added to type=a Starts after path, begins
FTP URLs) path) with ';'
Ends at end of string
Anchor (not valid Specifies a location within para1 Starts after '#'
for FTP URLs) the document Ends at end of string
Using expressions
Global Threat Intelligence tests URLs found in emails against regular expressions to determine if the
URL is allowed or forbidden to enter the system.
Email Gateway permits the user to specify patterns for the individual parts of the URL and then
compile these parts into a regular expression that will match a complete URL. If the user does not
enter a value for a part, the compiled expression matches anything or nothing for that part.
You must enter a value for the Host part. A recognizable URL must have, at a minimum, a host name.
You can specify parts as either simple DOS patterns or as regular expressions.
Simple patterns
Simple patterns allow you to enter much less information than regular expressions, but offer much
less flexibility. You can use simple wildcards:
'?' match single character
Certain matches are not possible with simple patterns. For example:
In the Host field, '*' does not match '.' by design. This prevents possible unwanted matches.
Regular expressions
The ability to specify the URL parts of interest as regular expressions overcomes any restrictions of
simple patterns:
www\.mcafee\.(?:com|co\.uk)
8080|8443
(?:[12]?\d{1,2}\.){3}[12]?\d{1,2}
On the URL Expression Builder, each text field is a separate regular expression that follows Perl-compatible
regular expression (PCRE) syntax, and is validated as a regular expression. Regular expressions offer
greater flexibility, but they are more complex than simple patterns. You are allowed to enter nothing
for all fields, resulting in a generated regex that matches anything that sufficiently resembles a URL.
You must remember to escape characters that have significant meaning in a regular expression.
These characters are: \.-[]{}()^$|+?*
You must not use positional matches, otherwise known as anchors, in regular repressions.
Examples of anchors are: '^', '$', '\A' and '\z'.
Anyone who wants to use regular expressions in this feature should already be comfortable with regular
expressions, due to their complexity.
If you want to specify a regular expression that matches any number or character, avoid using '.* and
'.+' as the expression. Either of these choices is likely to match more characters than you desire and
will result in less efficient pattern matching. Use one of these combinations to 'match any character'
based on the part you want to specify:
Host '[^:/\?#]' (match anything apart from ':', '/', '?' and '#')
When you use these patterns, the matches stop at the next part of the URL.
The best approach when constructing regular expressions is to use the URL parser tool which is
regex-aware and will do the necessary escaping for you.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Match Case Indicates whether the regular expression should evaluate the URL on a
case-sensitive basis.
Edit Clicking this link opens the URL Expression Builder where you can edit this URL .
Add Simple Pattern Click this button to open the URL Expression Builder to add a URL by entering a
simple DOS pattern.
Match Case Indicates whether the regular expression should evaluate the URL on a
case-sensitive basis.
Edit Clicking this link opens the URL Expression Builder where you can edit this URL .
Add Simple Pattern Click this button to open the URL Expression Builder to add a URL by entering a
simple DOS pattern.
Add Regular Expression Click this button to open the URL Expression Builder to add a URL by entering a
regular expression.
Delete Selected Patterns Click this button to delete any patterns you have checked in this table.
Task
1 Navigate to Email | Email Policies.
The Email Policies page opens, showing all currently configured policies and the evaluation order.
4 If URL reputation scanning is not already enabled, click the Yes radio button.
The page displays tables of URLs that should always be blocked, or always be allowed.
7 To delete a URL from either list, select the Delete check box associated with the URL.
b Type or paste the URL into the data field, then click OK.
The URL Parser closes, and the component parts of the URL populate the URL Expression Builder.
Encode only individual path segments and individual terms. Do not encode the entire path or
multiple segments at the same time.
c To encode the fragment to its canonical representation (%-encoded sequence), click the Encode
button.
d To decode a %-encoded fragment into readable form, click the Decode button.
e To convert an improperly or partially encoded sequence into its canonical representation, click
the Canonicalize button.
10 Click OK.
The URL Expression Builder closes, returning you to Default URL Reputation Settings page which shows the
results of your additions, edits, or deletions.
12 Click OK.
Compiled regular expression This dynamic table shows the regular expression you create as you enter
one or more parts.
Test a URL Data field where you can type or paste a URL to test it against the
regular expression. Icons indicate whether the URL matches or not.
Tools: Parse a URL Link opens an additional dialog box where you can paste or type a URL
and have it parsed into its component parts. If you click OK in this dialog,
the URL will populate the fields in the URL Expression Builder.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Parsing URLs
The URL Expression Builder includes a link that allows you to parse a URL into its component parts.
The parsed URL populates the appropriate fields on the page.
URL normalization
Certain characters, such as /', ? and #, serve as delimiters in the URL. Other characters, such as
control codes, are not printable. These characters must be escaped by encoding them as % followed
by their hexadecimal ASCII value when they are used in the Credentials, Path, or Query string, or in the
named Anchor field. For example, = must be represented by %3B so it will not be misinterpreted as a
key-value separator in the Query string.
The ASCII characters A-Z, a-z, 0-9 and -._~ never need to be escaped. Characters outside the ASCII
range must be represented by the %-encoding of their UTF-8 byte values. For example, a character
is encoded as %E2%82%AC.
Attackers can manipulate the %-encoding rules to obfuscate the URL. Manipulations include:
Escaping characters that do not need to be escaped to make part of the URL unreadable to
humans. An example of this would be the sequence %2E%2E%2F/ in the path.
Not escaping characters that should be escaped. For example, the glyph for the Unicode character
U+2215, DIVISION SLASH, looks identical to an ASCII / character. If used in un-escaped form in
the path, it would look indistinguishable from a regular path separator. This is called a homograph
attack.
To overcome any issues from ambiguous representation, URLs found in emails are normalized by
decoding the individual parts and reapplying the %-encoding so that it is in strict compliance with the
encoding rules in RFC 3986, Uniform Resource Identifier (URI): Generic Syntax. The path is further
normalized so that . (current directory) and .. (directory above the current directory) sequences are
removed. For example /a/b/../c is normalized to the equivalent /a/c.
Address normalization
Instead of a domain name in the host field, a URL may contain an IP address.
An IPv4 address may be represented in many different ways, all of which offer an attacker
opportunities to obscure the host that a URL points to. As well as the familiar a.b.c.d format where a,
b, c and d represent base-10 numbers in the range 0-255, an IPv4 address may be represented by 1
to 4 numbers, each of which may be represented using base 10, octal (base 8) and hexadecimal (base
16). For example, it is not at all obvious that the following URLs point to the same resource:
http://7763631671/
http://235396898359/
http://206.057717067/
When testing URLs found in emails, all variant representations of IPv4 addresses are normalized to the
a.b.c.d format.
IPv6 addresses have stricter rules for representation within a URL. However, the same address can
vary in its representation depending on how empty quads are displayed and how many leading zeroes
are used. Therefore, IPv6 addresses are normalized to their most compact form with hexadecimal
values in uppercase. For example, http://[2001:ea75:0000:0:00:000:0:0001]/ is normalized to
http://[2001:EA75::1]/.
When an IDN in its encoded form is encountered, it is decoded to its human-readable, Unicode form.
This decoding may fail if the encoded URL fails a TLD check. Top Level Domain (TLD) registrars who
accept IDNs limit the Unicode characters that they will allow. For example, the .no (Norway) TLD will
only allow Unicode characters that are part of the Norwegian alphabet. If the decoding fails, the
domain name is left in its encoded form with a warning message stating why the decoding failed.
If an IDN is encountered in its Unicode form, it is normalized. Without normalization, IDNs are subject
to homograph attacks. For example, if the URL http://www..gr were blacklisted, an attacker
might try to circumvent this by replacing (U+03BC, GREEK SMALL LETTER MU) with (U+00B5,
MICRO SIGN). According to IDN rules these domain names are identical and encode to the same
ASCII form: www.xn--hxakkrmio1b.gr. However, a simple string match would not detect that the URLs
were identical. Therefore, Unicode names are normalized by applying the RFC 3490 Nameprep
algorithm which disambiguates visually identical string values.
Keep the following information in mind when you use the encode/decode tool:
The encoded sequences %00 - %1F and %7F are control characters any may render unpredictably
when decoded. Two-byte sequences starting with %C2 followed by %80 - %A0 are also control
characters.
Do not use the URL encode tool to encode, for example, the entire path. This will result in a
non-canonical encoding. Encoding a/b will result in the string a%2Fb which will no longer match
a/b in the path. Only encode individual path segments and individual terms (the keys and values
in key-value pairs) in the Query string.
Option Definition
Name The name of the DLP category.
Documents Any documents associated with that category.
Option Definition
Name The name of the DLP categories available
Documents The number of documents contained in the category
Option Definition
Search Search by name for documents that you want to exclude from the policy.
Name The name of the document.
Size The size of the document.
Trained on The date on which the document was trained.
Extend this rule to unrecognized Select this option to enable this rule to be used for file categories that
file categories are unrecognized.
Option Definition
If the file filtering rule is Select the primary action to take when the rule triggers. Choose from:
triggered
Deny connection (Block)
Refuse the data and return an error code (Block)
Replace the content with an alert (Modify)
Allow Through (Monitor)
And also Select the secondary actions to take when the rule triggers on the original
message, and set notification and ecryption options as necessary.
Notification and annotated When clicked, takes you to the Default Notification and Routing Settings
email options (SMTP) set of options.
Option Definition
Rule name Type the name of the rule that you want to create.
Option Definition
Search Search the list of dictionaries for the ones that you want to include in the rule.
Name Displays the dictionary name as it appears in the Compliance Dictionaries list (Email | DLP and
Dictionaries | Compliance Dictionaries).
Threshold Displays the threshold that will trigger a score-based dictionary. To enable score-based
detection for a dictionary, go to Email | DLP and Dictionaries | Compliance Dictionaries.
Max Term Count Displays the maximum number of times that terms in that dictionary can contribute
towards a threshold score.
Option Definition
Search Search the list of dictionaries for the ones that you want to exclude from the rule
Name Displays the dictionary name as it appears in the Compliance Dictionaries list (Email | DLP and
Dictionaries | Compliance Dictionaries).
Threshold Displays the threshold that will trigger a score-based dictionary. To enable score-based
detection for a dictionary, go to Email | DLP and Dictionaries | Compliance Dictionaries.
Max Term Count Displays the maximum number of times that terms in that dictionary can contribute
towards a threshold score.
Option Definition
If the compliance rule is Select the primary type of action from the drop-down list that you want the
triggered appliance to take when it triggers a compliance detection.
And also Optionally, select secondary actions that can be applied to the detection, such
as quarantining the original or modified message, notifying the sender, and
sending the message to other people. The options displayed differ according to
the primary action that you select.
Notification and annotated Opens the Default Notification and Routing Settings pages. See Email | Email Policies |
email options Policy Options | Notifications and routing.
And conditionally Specify whether you want the actions to take place when Any or All of the
dictionaries in the rule trigger a match.
Option Definition
Select a predefined rule to Expand the rule that contains the settings on which to base the new rule.
configure
Search Search the list of dictionaries for the rule on which you want to base your
new rule.
Option Definition
Rule name Edit the name of the rule.
Option Definition
If the compliance rule is Select the primary type of action from the drop-down list that you want the
triggered appliance to take when it triggers a compliance detection.
And also Optionally, select secondary actions that can be applied to the detection, such
as quarantining the original or modified message, notifying the sender, and
sending the message to other people. The options displayed differ according to
the primary action that you select.
Notification and annotated Opens the Default Notification and Routing Settings pages. See Email | Email Policies |
email options Policy Options | Notifications and routing | Routing.
And conditionally Specify whether you want the actions to take place when Any or All of the
dictionaries in the rule trigger a match.
Scanner Limits
Use this page to set limits on scanning to prevent attacks and other performance issues.
The default policy values are normally suitable, but you might need another policy to allow the
occasional transfer of large, deeply nested files, or to investigate possible attacks.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email
message using user-definable templates, and then delivers the message to the
intended recipients. Click Manage templates to change the way the subject is
re-written.
Modify headers McAfee Email Gateway modifies the email message headers
using user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Deliver message using encryption Attempt delivery of the message using your
configured encryption settings.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email
message using user-definable templates, and then delivers the message to the
intended recipients. Click Manage templates to change the way the subject is
re-written.
Modify headers McAfee Email Gateway modifies the email message headers
using user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Deliver message using encryption Attempt delivery of the message using your
configured encryption settings.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email
message using user-definable templates, and then delivers the message to the
intended recipients. Click Manage templates to change the way the subject is
re-written.
Modify headers McAfee Email Gateway modifies the email message headers
using user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Deliver message using encryption Attempt delivery of the message using your
configured encryption settings.
Alert Settings
Use this page to control the format and appearance of the alert message that users receive when the
appliance detects a threat.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Option Definition
Alert format Provides a choice of formats.
Header text Specifies the text for the top of each alert message.
Show Shows the header text as HTML source (showing tags such as <p>) or as users see
the text (WYSIWYG). This option is not applicable for text alerts.
Footer text Specifies the text for the bottom of each alert message.
Option Definition
Show Shows the footer text as HTML source (showing tags such as <p>) or as users see
the text (WYSIWYG). This option is not applicable for text alerts.
Restore Defaults When clicked, displays the original text of the alert.
Character encoding Offers a choice of encoding for the alert text.
Numeric character references enables the use of special characters for alerts in HTML
format.
Big 5 to UTF-8 provides character encoding for plain texts.
Default value is Numeric character references.
Alert filename Specifies the name of the file that contains the alert. Default value is warning.htm or
warning.txt.
Option Definition
Style / Font / Size Select the paragraph style, size, and font that you want to apply to the text.
Tokens Select the token variables that you want to appear in the message, such as the name
of the attachment and the policy that it infringed.
Show Choose how you want to view the notification text in the Alert Editor.
Use Default Select to have the notification appear in the default format.
Email | Email Policies | Policy Options | Content handling | Email Options | Basic Options
To cater for the needs of various departments, you might need several policies, each with its own
disclaimer. Alternatively, you can configure policy exceptions, to reduce the total number of policies
you need to maintain.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Table 4-114 Option definitions Content Handling Settings Email Options Basic
Options
Option Definition
Add a prefix to the subject of Specifies a prefix that the appliance adds to the subject line after a major
modified emails modification to the message, for example when an alert message replaces
an infected item.
If this prefix is added to the subject line, it precedes other prefixes such as
those that indicate spam or phish detections. If you add a disclaimer to a
message, its subject line is not affected.
Enable the use of disclaimers When selected, adds extra text to each email message.
The appliance cannot add a disclaimer to an email message that contains
unsupported character sets, such as the Hebrew character set,
ISO-8859-8-I.
Disclaimer text Specifies the text, which can be a legal disclaimer, or an advertisement, or
general information such as addresses and telephone numbers.
For the HTML disclaimer to appear in an email, the email must be received
in HTML format.
If you refer to an image (using <img>), the recipient will see the image
only if it is publicly available. In other words, the image must be accessible
via the Internet, with a full path such as http://www.example.com/abc.gif.
Email | Email Policies | Policy Options | Content handling | Email Options | Advanced Options
Changing these settings can affect scanning performance. If you are not sure about the impact of
making any changes, ask your network expert.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Table 4-116 Option definitions Content Handling Settings Email Options Advanced
Options
Option Definition
Preferred transfer encoding for text Offers a choice of encoding:
8-bit - for SMTP servers that support the transport SMTP extension,
8BITMIME.
Base64 for non-text data and for messages that do not have
much ASCII text.
Quoted-printable for messages that contain mainly ASCII
characters and also some byte values outside that range.
But do not encode if the text is already When selected, prevents encoding of 7-bit data.
7-bit
Default decode character set Offers a set to use if one is not specified in the MIME headers. To
specify further sets, see the Character Sets tab.
Maximum number of MIME parts Specifies a maximum, which can help prevent denial-of-service
attacks.
Default value is 10000.
Treat corrupt message headers the If selected, the email message is handled according to the action that
same as corrupt content the policy applies to any corrupt content.
Treat NULL characters in message When selected, acts on NULL characters.
headers the same as corrupt content
Remove any Received-From headers Select this to obscure any network information displayed in the
to obscure.. Received headers. The Last Received header, added by your
appliance, is not removed.
Email | Email Policies | Policy Options | Content handling | Email Options | Missing / Empty Headers
In spam and spoofed email, headers are sometimes altered to hide the identity of the sender.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Table 4-118 Option definitions Content Handling Settings Email Options Missing/
Empty Headers
Option Definition
Take action under the Never Select this option if you do not need the feature.
following circumstances
When one or more email headers have no value Select this option to detect any
suspicious headers.
When one or more of the following headers are missing or empty Select this option to
specify the headers, such as From, Sender, and Reply-to. For a full list of
headers, see RFC 2822.
Table 4-118 Option definitions Content Handling Settings Email Options Missing/
Empty Headers (continued)
Option Definition
And also Specify the secondary actions to take.
Quarantine options
Quarantine original Select to have the original message added to the
Quarantine database.
Quarantine modified Select to have the modified message added to the
Quarantine database.
If you are using off-box quarantine, you can also select the quarantine queue
into which the email message is placed. This selection can include custom
quarantine queues that you have created.
In addition to the pre-defined templates shown above, this list will also
include any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email
message using user-definable templates, and then delivers the message to
the intended recipients. Click Manage templates to change the way the subject is
re-written.
Modify headers McAfee Email Gateway modifies the email message headers
using user-definable templates, and then delivers the message to the
intended recipients. You can select multiple header modification templates.
Click Manage templates to change the way the headers are re-written.
Notification and Follow the link to configure the options for notification messages and annotated
annotated email options email messages.
If either of the above Select to use the default alert, or follow the link to make changes to the alert
actions results in an alert text.
Content Handling Settings Email Options Text and binary MIME types
Use this page to specify special MIME types as text or binary to improve the efficiency of the scanning.
Email | Email Policies | Policy Options | Content handling | Email Options | Text and binary MIME types
The appliance handles common MIME types. You need only specify any new or unusual MIME types
here.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Table 4-120 Option definitions Content Handling Settings Email Options Text and
binary MIME types
Option Definition
Treat the following MIME types as text attachments Allows you to build a list of text MIME types.
Treat the following MIME types as binary attachments Allows you to build a list of binary MIME types.
Email | Email Policies | Policy Options | Content handling | Email Options | Text and binary MIME types
8-bit audio
Video files
MIME defines different ways of encoding the non-ASCII formats so that they can be represented using
characters in the 7-bit ASCII character set.
MIME also defines extra email headers that contain further information:
The resulting MIME message can be "decoded" or "re-encoded" after transmission. We say
"re-encoded", because the MIME messages can be converted into a different character set from the
original message.
Email | Email Policies | Policy Options | Content handling | Email Options | Character sets
You can select a fixed mapping (always use the alternative character set) or a list of alternatives to be
used only if decoding fails.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Comments to Raw HTML When selected, the items are scanned for inappropriate content.
Email | Email Policies | Policy Options | Content handling | Corrupt or Unreadable Content | Corrupt content
Scanners and other applications can have difficulty reading corrupt content. You can specify the action
to take when the appliance detects corrupt content in:
Email messages
Archives
Documents
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
Option Definition
If corrupt content is Provides a main action to take. The available options are:
detected
Deny connection (Block) Replace all attachments with an alert (Modify)
Refuse the data and return an error code Allow Through (Monitor)
(Block)
Accept and then drop the data (Block)
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using
user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Option Definition
Notification and Follow the link to configure the options for notification messages and annotated
annotated email email messages.
options
If either of the above Select to use the default alert, or follow the link to make changes to the alert text.
actions results in an
alert
Email | Email Policies | Policy Options | Content handling | Corrupt or Unreadable Content | Protected files
You can specify the action to take when the appliance is unable to scan into an email attachment
(either archive or document) or a file that is being requested from a website, because it has been
password protected. If the content is protected by password, the appliance cannot examine the
contents because they are encrypted.
If you choose to allow such files into your network, you must ensure that their contents can be
scanned later for any threats by an on-access scanner.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
The action associated with read protected documents will only trigger when
compliance scanning is enabled, and the contents of the document can not be
extracted.
If you are using off-box quarantine, you can also select the quarantine queue
into which the email message is placed. This selection can include custom
quarantine queues that you have created.
In addition to the pre-defined templates shown above, this list will also
include any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email
message using user-definable templates, and then delivers the message to
Notification and annotated Follow the link to configure the options for notification messages and
email options annotated email messages.
If an action results in an Select to use the default alert, or follow the link to make changes to the alert
alert text.
If a password-protected Provides a main action to take. The available options are:
archive file is detected
Deny connection (Block) Replace all attachments with an alert
(Modify)
Refuse the data and return an error code Allow Through (Monitor)
(Block)
Accept and then drop the data (Block) Reroute to an alternative relay (Reroute)
If you are using off-box quarantine, you can also select the quarantine queue
into which the email message is placed. This selection can include custom
quarantine queues that you have created.
In addition to the pre-defined templates shown above, this list will also
include any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email
message using user-definable templates, and then delivers the message to
the intended recipients. Click Manage templates to change the way the subject
is re-written.
Modify headers McAfee Email Gateway modifies the email message headers
using user-definable templates, and then delivers the message to the
intended recipients. You can select multiple header modification templates.
Click Manage templates to change the way the headers are re-written.
Notification and annotated Follow the link to configure the options for notification messages and
email options annotated email messages.
If an action results in an Select to use the default alert, or follow the link to make changes to the alert
alert text.
Email | Email Policies | Scanning Policies | Scanner Options | Content Handling | Corrupt or Unreadable Content
A partial message. If a message has been divided into smaller parts for sending as several separate
email messages, each part is called a partial message.
An external-body message. The message contains a reference to an external resource and the
scheme (usually FTP) that retrieves that resource.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Notification and Follow the link to configure the options for notification messages and annotated
annotated email email messages.
options
If a message/ Provides a main action to take. The available options are:
external-body type is
Deny connection (Block) Replace all attachments with an alert
encountered
(Modify)
Refuse the data and return an error code Allow Through (Monitor)
(Block)
Accept and then drop the data (Block)
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers
using user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Notification and Follow the link to configure the options for notification messages and annotated
annotated email email messages.
options
If either of the above Select to use the default alert, or follow the link to make changes to the alert
actions results in an text.
alert
Email | Email Policies | Policy Options | Content handling | Corrupt or Unreadable Content | Unscannable Content
You can specify the action to take when the appliance finds a file that is unscannable.
Move up and Move When you have two or more policy exceptions, you can change the
down priority in which they are used by using the and buttons. The
exception at the top of the list is given the highest priority.
Click to open the Scanning Policies Edit Policy Exception Details window to edit
Edit exception properties the properties of the selected policy exception.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include
any custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers
using user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Policy-based actions
Policy-based actions execute when an email message matches a configured policy, without needing a
scan to trigger the selected action.
Contents
Benefits of fine-tuning scanning with policy-based actions
Option definitions Policy-based actions
Scenario - Configure policy-based actions
Using this setting can allow viruses and other undesirable content to pass through.
If you enable Skip scanning, McAfee Email Gateway will not add disclaimers to the
messages.
Quarantine options
Quarantine original Select to have the original message added to the Quarantine
database.
Quarantine modified Select to have the modified message added to the Quarantine
database.
If you are using off-box quarantine, you can also select the quarantine queue into
which the email message is placed. This selection can include custom quarantine
queues that you have created.
In addition to the pre-defined templates shown above, this list will also include any
custom notification templates that you create.
Other actions
Modify subject McAfee Email Gateway rewrites the subject of the email message
using user-definable templates, and then delivers the message to the intended
recipients. Click Manage templates to change the way the subject is re-written.
Modify headers McAfee Email Gateway modifies the email message headers using
user-definable templates, and then delivers the message to the intended
recipients. You can select multiple header modification templates. Click Manage
templates to change the way the headers are re-written.
Deliver message using encryption Attempt delivery of the message using your
configured encryption settings.
In the options, n represents the number of lists you select for each related action.
Notification and Opens the Default Notification and Routing Settings page.
annotated email
options
Policy- based actions apply to all messages that do not match any other policies or that match policies
that do not override the settings for policy-based actions.
You can configure McAfee Email Gateway to scan the messages with any settings you prefer. For this
example, no scanning is needed.
Task
1 Log on to McAfee Email Gateway and select Email | Email Polices.
c From the drop-down list, select the policy from which the new policy inherits settings. In this
case, select Default policy.
e To set the Match logic, select Match one or more of the following rules.
j Click OK.
The Add Rule window closes and the new rule appears on the Scanning Policies New Policy window.
4 Click OK.
The Scanning Policies New Policy window closes, and the new policy appears at the top of the list on
the Email Policies page.
5 Within the new policy, select the Policy Options | Policy based action link.
Be sure you select options within the new policy, rather than the default or any other configured
policies!
b For the primary action, select Skip scanning from the drop-down list.
c For the secondary action, select Other Actions | Deliver message using encryption.
d Click OK.
The Policy Based Action Settings window closes, and the policy-based actions appear under Policy
Options.
Outbound messages from the Legal Department are encrypted, and are not scanned.
Task
1 Log on to McAfee Email Gateway and select Email | Email Polices.
c From the drop-down list, select the policy from which the new policy inherits settings. In this
case, select Default policy.
e To set the Match logic, select Match one or more of the following rules.
j Click OK.
The Add Rule window closes and the new rule appears on the Scanning Policies New Policy window.
4 Click OK.
The Scanning Policies New Policy window closes, and the new policy appears at the top of the list on
the Email Policies page.
5 Within the new policy, select the Policy Options | Policy based action link.
Be sure you select options within the new policy, rather than the default or any other configured
policies!
b For the primary action, select Allow through (Monitor) from the drop-down list.
c For the secondary action, check Original email options | Forward original to n lists.
f Click OK.
The Policy Based Action Settings window closes, and the policy-based actions appear under Policy
Options.
A designated reviewer receives original email messages from XYZ Corp. and can take further action.
For example, the appliance can send a notification email if it detects a threat in an email message or it
cannot deliver a message.
Changing these settings can affect scanning performance. If you are not sure about the impact of
making any changes, ask your network expert.
To use the sender information from the original email message, leave this field empty.
Email | Email Policies | Policy Options | Notifications and routing | SMTP Relays
Email | Email Policies | Policy Options | Notifications and routing | Encryption Servers
Email | Email Policies | Policy Options | Notifications and routing | Email Recipients
For example, you can make lists of email addresses for administration and auditing. The lists are used
by several pages in the interface, for example: Email | Email Policies | Scanning Policies [Scanner Options] |
Notification and routing | Audit Copies
Email | Email Policies | Scanning Policies | Scanner Options | McAfee GTI feedback
Dashboard | Services
Encryption settings
Define the encryption settings for this policy.
These options allow you to configure, for this policy, whether a message should be encrypted, and the
encryption method that you want to use.
When to Encrypt
Option Definition
When to Encrypt Choose from:
Only when triggered from a scanner action encrypts all messages that trigger any
compliance scanner that have a secondary action of "encrypt".
Always encrypts all messages that trigger this policy.
Encryption server / server Selects where encryption occurs, either on the appliance, or externally.
group Click Manage the server groups to add other encryption servers.
Manage the server groups Click to open the Encryption Servers dialog box where you add lists of encryption
servers.
Prioritize encryption over If a message triggers a reroute action, you can choose to override the reroute
reroute actions with the encryption action.
Option Definition
Encrypt the message Choose from:
using one of
S/MIME
PGP
Secure Web Mail
If more than one encryption option is chosen, the encryption methods are
attempted in the order that you see here until one is successful.
Prioritize TLS over If selected, McAfee Email Gateway attempts to use TLS to secure the link. If TLS
content encryption is established, the content of the email message is not encrypted.
However, if TLS cannot be established, then the email message content is
encrypted using your chosen encryption methods.
If none of the selected If the selected encryption method(s) fail, specify the action that you want to
encryption methods are take:
possible
Attempt delivery using TLS and send an NDR if that is not possible TLS is enforced for
delivery subject to your TLS settings
Send an NDR without attempting delivery using TLS the email is not delivered, and a
report is sent to the sender.
Option Definition
Attempt to decrypt S/MIME-encrypted Enable this to configure your appliance to attempt the decryption of
emails email messages encrypted using S/MIME.
By default, this option is disabled.
Attempt to decrypt PGP-encrypted Enable this to configure your appliance to attempt the decryption of
emails email messages encrypted using PGP.
By default, this option is disabled.
The decryption settings are based on the highest-order policy that applies to all recipients. Decryption
cannot be configured for policies that only apply to a sub-set of users.
If these options are left disabled, or the appliance is unable to decrypt the message, the
Encrypted Content settings are used.
Task
1 Navigate to Email | Email Policies | Policy Options | Encryption.
4 Click OK.
Once you have enabled Secure Web Mail, you will need to configure your Email Policies to use this feature.
Option Definition
Email List Displays the lists of email recipients. three lists come with the appliance by default:
Administration Email List, Notification Email List, and Auditing Email List. The default lists cannot be
removed from the list, even if they are empty.
Add Click to open the Edit List dialog box where you can create a new notification list.
Reset Click reset to remove the information within all fields in the dialog box .
Option Definition
List name Displays the name of the list - either Administration Email List, Notification Email List, or
Auditing Email List, or a list that you created yourself.
Email address A list of email addresses that belong to the list. Use the trashcan icon to remove a
selected address from the list. The trashcan icon becomes active only when more than
one address exists in the list.
Add Click to open the Edit Email Address dialog box where you can either type or use a template
to add a new email address to the list.
Delete Deletes the selected user-created notification lists.
You cannot delete the built-in lists provided with the appliance.
Option Definition
Standard Type in the email address that you want to use.
Template Use the template fields to create the email address.
Reset Click to remove all information from the fields in this dialog box.
Contents
Registered Documents
Compliance Dictionaries
Option definitions Add Dictionary Details
Option definitions Applicable File Formats
Option definitions OR Condition
Option definitions AND Condition
Option definitions Edit Regular Expression
Registered Documents
Use this page to register documents for inclusion in the Data Loss Prevention policies.
Sensitive documents can be uploaded where the content is then transformed into a set of signatures
representing the original content. Note that only the signatures are permanently stored on the
appliance, not the original contents. Once the policy is set, these signatures are compared against all
content sent by email through the appliance to prevent data leakage occurring.
If a document is used by a data loss prevention policy, you cannot delete either the document, or any
categories that the document belongs to. To delete either the category, or the document, the document
must first be removed from any associated policies. Hover the cursor over the Used by column to see
the policies that use either the category, or the document.
Option Definition
Categories Groups of registered documents. Contains the Excluded Content category by default.
Excluded Content is a system category for uploaded standard corporate text (boilerplate
text), and corporate templates that you want the appliance to ignore in its data loss
prevention checks.
Documents in the Excluded Content category have a higher number of signatures than
those in other categories. A document in the Excluded Content category can be copied to
other categories, but retains its higher number of signatures.
Status shows that there are two possible states, with appropriate tool tips:
The category has been modified (renamed)
Documents have been added or removed from the category
indicates that the category is new and does not exist in the Data Loss Prevention
database. This status disappears as soon as the configuration is applied.
indicates that everything is normal
Used by Displays the number of data loss policies that use this category.
Documents Displays the number of documents to which this content category applies.
Add Create a content category.
Clear Selection Click to not have any category selected.
Option Definition
Copy selected documents to another category. When you select this option, it opens the
Search feature which will look for categories without that document.
Documents from other categories cannot be copied into the Excluded Content category.
However, you can upload documents from other categories to the Excluded Content
category.
When you upload a document from another category to the Excluded Content category, the
document's signatures increase. The version of the document in the other category has
the same higher number of signatures as the version in the Excluded Content category.
Click on Clear Selection first, to select a document in all the categories, or select a category
to search for a document only in that category.
Delete multiple documents by name. When you select this option, it opens the Search
feature which looks for documents by name in all categories or just a selected category.
To delete documents from all the categories click on Clear Selection first. If no category is
selected, the selected documents are deleted in every category so that the document is
removed entirely from the registered documents database.
File Name Lists all the documents associated with the selected document category.
Status indicates that there is an error in the document. See the tooltip to see the reason,
either:
an error in the database
an error occurred while uploading the document
an error occurred during document training
indicates that there are modifications that have not yet been applied.
indicates that the document is new. Documents are trained when they are
uploaded.
indicates that the document is normal, either:
the document is unchanged.
the uploaded document was trained successfully.
Option Definition
Upload Click to register documents against this category, either individually or within an archive.
Supported archive formats are:
Zip (*.zip) Tar (*.tar)
Gzip (*.gz) gzipped tar (*.tar.gz, *.tgz)
Bzip2 (*.bz2, *.bz) bzipped tar (*.tar.bz2, *.tar.bz,
*.tbz2, *.tbz)
The Character Encoding drop-down list allows you to specify the character set used for
filenames.
To upload files in .TXT format, McAfee recommends that you save them using Unicode or
UTF-8 formats.
Copy existing Click to copy an existing document from other categories into the selected category.
When you select this option, it opens the Search feature which will look for documents
that are not currently linked to the selected category, but that exist in other categories.
Task
1 Go to Email | DLP and Dictionaries | Registered Documents.
4 Browse to the file that you want to register in the Finance category, and click OK.
Task
1 Go to Email | Email Policies | Registered Documents.
2 Either select a pre-defined category from the list, or create a new one.
4 Browse to the zip file that you created, and click OK.
Task
1 Go to Email | Email Policies | Registered Documents.
3 Browse to the template file that you want to ignore, and click OK.
Task
1 Go to Email | Email Policies | Registered Documents.
2 In the Documents section, select the document, and click the Copy icon.
3 Select the categories to which you want the document to be associated, and click OK.
Task
1 Go to Email | Email Policies | Registered Documents.
2 In the document list, locate the file that you want to remove as registered document, and try to
click the Delete icon.
3 Hover the mouse cursor over the Excluded by entry for that document to find out which policy
excludes that document.
4 Go to Policy Catalog | McAfee Email Gateway 7.6 | Email Policies and click Edit Settings.
7 Click the Delete icon next to the appropriate document in the Exclusions list.
Compliance Dictionaries
Use this page to view and edit compliance dictionaries.
The compliance dictionaries contain words and phrases that might offend some readers.
Compliance rules can vary in complexity from a straightforward trigger when an individual term within
a dictionary is detected, to building on and combining score-based dictionaries which will only trigger
when a certain threshold is reached. Using the advanced features of compliance rules, dictionaries can
be combined using logical operations of "any of", "all of", or "except".
Option Definition
Language Filters the dictionaries by locale.
Selecting a language selects all dictionaries available in that language, and any
language-neutral dictionaries.
Dictionary Displays the name of the dictionary and a symbol to indicate its type:
Red book: Non score-based
Blue book: Score-based
Green book: User-defined
Open book: Currently selected item
Category Dictionaries are grouped into related categories. For example, Profanity and Sex are
in the Acceptable Use category.
Used by Displays the number of policies that use the dictionary.
When the icon is clicked, a window opens where you can change the dictionary name
Edit and description.
Option Definition
Add dictionary When clicked, adds a new dictionary. Type a name and description for your
dictionary, and select whether the dictionary will match on regular expressions, or
simple strings.
A new row for your dictionary appears at the bottom of the list of dictionaries. You
can add words to the new dictionary later.
Import dictionaries When clicked, imports a file to replace your existing dictionaries.
Export dictionaries When clicked, exports the dictionaries as an XML file. You can send the file to other
appliances, ensuring that content scanning is consistent.
Option Definition
Match type Select how the appliance matches terms within this dictionary.
Applies to Select what the term applies to.
Click the link and select from the available options.
Term Enter the term that you want the appliance to search for.
Click a row within the dictionary list to display the contents of that dictionary.
Open a window where you can change the description for the currently selected
dictionary. You cannot change the name of dictionaries supplied by McAfee.
Conditions For dictionaries that are not score-based, you can view lists of terms that are combined
(OR) using the logical OR operator. The dictionary will trigger when 'any of' the term lists
trigger.
Individual term lists can apply to different contexts. For example, one term list might
look for terms within message bodies whilst another might look for terms within the
subject line.
Individual term lists can apply to different contexts. For example, one term list might
look for terms within message bodies whilst another might look for terms within the
subject line.
Applies to Click the link to specify the category and subcategory against which the terms will be
searched for, such as looking for terms within an email message subject line.
Term Displays the trigger word or phrase. The icon before the term indicates whether it is a
regular expression, simple string or complex term.
Hover your mouse cursor over the icon to see the term type.
Score Displays the score attributed to the term. To make the dictionary score-based, click Add.
To find out more about using thresholds and scores, see the tasks in Compliance
Settings.
Case sensitive If selected, the appliance responds only to text that matches the term exactly in letter
case.
Example: If the term is Abc, the appliance responds to the word Abc. However, the
appliance ignores abc or ABC.
Wildcard When selected, allows the use of ? and * in the term to represent unknown single or
multiple characters.
Example: If the term is ab?, the appliance responds to the word abc or abd. If the term
is ab*f, the appliance responds to the word abcdef or abcf.
Starts with When selected, matches the term when it appears at the start of a word.
Example: If the term is bc, the appliance responds to the words bc, bcd or bcdef.
However, the appliance ignores abc or abcd.
Ends with When selected, matches the term when it appears at the end of a word.
Example: If the term is bc, the appliance responds to the words bc or abc. However, the
appliance ignores bcd or abcd.
When used together, Starts with and Ends with match the term when it appears as a whole
word.
Example: If the term is bc, the appliance responds to the words bc. However, the
appliance ignores bcd or abc.
When clicked, opens a window that allows you to change the basic term properties, or
Edit create a complex term.
Term details Edit the basic term properties including the actual text that you are
looking for, as well as case sensitive, wildcard, and starts with and ends with as
defined above.
Contextual matching (advanced) Set triggers for terms based on proximity to other terms.
To set these details, click Add Word or Phrase:
Display string Sets the display name for the term in the list of dictionary terms.
Enable near matching Enable or disable triggers based on proximity.
Condition Specify the conditions under which you want the term to trigger.
Within a block Set the proximity within which the terms must be found.
Word or phrase The list of terms.
Individual term lists can apply to different contexts. For example, one term list might
look for terms within message bodies whilst another might look for terms within the
subject line.
Add AND For dictionaries that are not score-based, click to add new lists that are combined using
condition the logical AND operator using the following settings:
Match type Specify whether the list contains regular expressions, or simple strings.
Applies to Click the link to specify the category and subcategory against which the
terms will be applied, such as looking for terms within an email message subject line.
Term Provide the first term in the list.
The dictionary will trigger when 'all of' the conditions trigger.
Individual term lists can apply to different contexts. For example, one term list might
look for terms within message bodies whilst another might look for terms within the
subject line.
Individual term lists can apply to different contexts. For example, one term list might
look for terms within message bodies whilst another might look for terms within the
subject line.
Insert term When clicked, opens a window where you can add a new term using the following
settings:
Term details Specify the basic term properties including the actual text that you are
looking for, as well as case sensitive, wildcard, and starts with and ends with as
defined above.
Contextual matching (advanced) Set triggers for terms based on proximity to other terms.
To set these details, click Add Word or Phrase:
Display string Set the display name for the term in the list of dictionary terms.
Enable near matching Enable or disable triggers based on proximity.
Condition Specify the conditions under which you want the term to trigger.
Within a block Set the proximity within which the terms must be found.
Word or phrase The list of terms.
This feature assumes that you have selected a dictionary and one of its terms. When
you click OK in the Term Details window, the appliance adds the term to the dictionary and
next to the selected term. Both terms have the same condition.
Anchors require that an expression is found in a particular place within a string, but do not match any
characters (zero width assertions)
\b matches a word boundary (start or end of a word)
For example:
^aa matches lines that start with aa
Introduction to Graymail
Graymail is bulk email that does not meet the definition of spam.
Graymail messages could be considered either spam or legitimate email, depending upon the opinion
of the recipient.
Characteristics of Graymail
Graymail is email sent to a large number of recipients, but it differs from spam in several ways:
The user, at one time or another, requested to receive the messages, by such things as supplying
an email address.
Graymail messages come from reputable sources who want a relationship with the recipient, such
as a customer or client relationship.
Graymail typically contains content that might be of value to the recipients, and that might appeal
to their interests.
Graymail often includes an element of timeliness, such as an expiration date for an offer of goods
or services.
Requested or solicited email messages become graymail when the recipient becomes less interested in
receiving them.
You can also enable or disable the Graymail feature through the Setup Wizard.
Graymail detections show in reports as Spam detections triggered against the Graymail rule group,
along with the term that triggered the detection.
Task
1 Navigate to the Setup Wizard (System | Setup Wizard).
2 Complete the steps, or click Next for each step to leave them unchanged, to step 6, Email Configuration.
If you leave the check box unchanged from the way you found it, the Graymail configuration is
not updated.
Graymail is already configured - you did not check the box, but it was already checked.
Graymail is enabled, but it is not using the default action - the box was already checked, but the action has
previously been modified from the default action.
You can navigate back to the Email Configuration page in the Setup Wizard and uncheck then
recheck the checkbox to enable Graymail protection with the default action.
Task
1 Go to Email | DLP and Dictionaries | Compliance Dictionaries.
3 Click OK.
The dictionary appears selected in the dictionary list, and its term list appears at the bottom of the
page.
4 Click the edit icon next to the default term new term, replace it with the text you want to trigger
on, and click OK.
Task
1 Go to Email | DLP and Dictionaries | Compliance Dictionaries.
3 In the Term List, select the term you want to adjust, and change its score.
4 Apply changes.
Task
1 Go to Email | DLP and Dictionaries | Compliance Dictionaries.
3 Select the first regular expression, click the edit icon, and click Test.
The Matches area shows the text that matches the regular expression. Click OK or Cancel twice.
5 Select the second regular expression, click the edit icon, and click Test.
The Matches area shows the text that matches the regular expression. Click OK or Cancel twice.
Task Add a complex term to find the word Poker only when it is close to
the word Game
Use this task to add a complex term to the dictionary. A complex term is a word or phrase that had a
dependancy on another word or phrase.
Task
1 Go to Email | DLP and Dictionaries | Compliance Dictionaries.
2 Either create a new or select an existing non-score-based dictionary (indicated by a red book).
Email | DLP and Compliance | Compliance Dictionaries | Email dictionary list | Add Dictionary
Option Definition
Name Enter a name to identify the dictionary list by.
Description If required, add a description for the dictionary list.
Language Define the language for the content of the list.
Match type Select how the appliance matches terms within this dictionary.
Option Definition
Everything De-select this to specify specific file categories and subcategories, or leave selected for
all file types to be scanned.
File categories With the Everything check-box de-selected, choose the categories of files to be added into
the DLP Compliance Dictionaries.
Subcategories Within the selected category of files, select the sub-categories that you want included
within each chosen category.
Option Definition
Name The name of the dictionary to which this condition applies.
Description An optional text field to enable you to enter descriptive information about this condition
and the categories/subcategories it contains.
Match type Choose from:
Simple strings
Regular expressions
Applies to Set to Everything by default. Click to open the Applicable File Formats dialog box to choose the
categories and subcategories to which you want the condition to apply.
Term The term that you want to use for the condition.
Option Definition
Match type Choose from:
Simple strings
Regular expressions
Applies to Set to Everything by default. Click to open the Applicable File Formats dialog box to choose the
categories and subcategories to which you want the condition to apply.
Term The term that you want to use for the condition.
Encryption
The Encryption pages enable you to set up McAfee Email Gateway to use the supported encryption
methods to securely deliver your email messages.
Email | Encryption
The McAfee Email Gateway includes several encryption methodologies, and can be set up to provide
encryption services to the other scanning features, or can be set up as an encryption-only server used
just to encrypt email messages.
Contents
Types of Encryption
Secure Web Mail
S/MIME
PGP encryption
TLS
Secure Web Mail Branding
Task Encrypt all email that triggers against the HIPAA compliance dictionaries
Task Use S/MIME to encrypt all email to a specific target domain
Task Deliver all email from a specific customer using S/MIME encryption
Task Use PGP to encrypt all email messages
Task Deliver all email from a specific customer using PGP encryption
Types of Encryption
Information about the types of encryption methods that are available on the McAfee Email Gateway.
McAfee Email Gateway includes several different encryption methods to enable you to configure your
appliance to best match your existing email and network topography. These can be divided into the
following groups:
Server-to-server encryption
Server-to-server encryption, as its name suggests uses encryption to secure the transmission of email
messages between email servers. Many different methods of securing the server-to-server traffic are
available. McAfee Email Gateway can be configured to use the following methods to secure the
server-to-server link:
Transport Layer Security
S/MIME
PGP
In this circumstance, you can still send secure messages by using the Secure Web Mail options built
into McAfee Email Gateway.
You can use two methods of Secure Web Mail; push delivery and pull delivery.
Pull delivery
With pull delivery, the secure email message is stored on the McAfee Email Gateway, and, after
receiving a notification, the end user must log into their Secure Web Mail account and "pull" the
message from the McAfee Email Gateway.
Can be used to transmit files that are larger than many email server limits.
The McAfee Email Gateway has limited storage space, so the longevity of the message is limited.
Push delivery
With push delivery, the end user is sent a notification that contains the encrypted message as an
attachment the encrypted message is "pushed" to the end users' email system.
To read the message, the user needs to log onto the McAfee Email Gateway. During this process, the
encrypted message is returned to the McAfee Email Gateway where it is decrypted. The decrypted
message is then viewed by the end user in a secure browser.
As the encrypted messages are stored on the end users' email system, the longevity of the
message is unlimited.
The McAfee Email Gateway handles all the encryption key and certificate generation for each
recipient.
The message is secure, as only the McAfee Email Gateway can decrypt the message.
Push delivery of secure email messages does not work well on handheld devices.
With a large number of end users concurrently accessing their secure messages, the CPU load on
the McAfee Email Gateway can be high.
McAfee Email Gateway can be configured to use both push and pull delivery methods to securely
deliver email messages.
Contents
Supported browsers for Secure Web Mail
Secure Web Mail Basic Settings
Secure Web Mail User Account Settings
Secure Web Mail User Management
Secure Web Mail Password Management
Message Management
Certificates
Table 4-147 Compatible operating systems for accessing Secure Web Mail using mobile
devices
Operating System Version
Android 2.1, 2.2, 2.3
Apple iOS iPhone 3GS/ iPhone 4
Blackberry OS 6
webOS 1.4
Symbian S60 5th Edition
Windows Phone 7
One example of this is the Privacy rule within the Health Insurance Portability and Accountability Act
(HIPAA) in the United States of America. This rule contains regulations relating to the use and
disclosure of Private Health Information (PHI), and care must be taken not to violate this rule by
sending PHI above that required for the specific need, or to send information in a format that could be
easily intercepted and read by unauthorized persons.
McAfee Email Gateway assists you by enabling compliance policies that meet the requirements of
many of the laws and rules requiring the safeguarding of data. Having scanned your outgoing email
messages against the in-built compliance libraries to identify if the content of your email message
breaches any of the relevant libraries, the McAfee Email Gateway can take specified actions, such as
using a secure delivery method to attempt the delivery of the message.
Most methods for the secure delivery of email messages rely on both the sending and the receiving
email servers using the same encryption methods, such as S/MIME, PGP or SSL/TLS encryption.
Although your McAfee Email Gateway can be configured to use these encryption methods, these
settings are of no use if the receiving email server is not configured to also use encryption.
In this circumstance, McAfee Email Gateway uses Secure Web Mail to notify the recipient that an
encrypted message has been sent to them, and provides the information that they need in order to
set up a secure connection to the McAfee Email Gateway so that they can retrieve the message using
Secure Web Mail.
Large messages can be delivered without hitting the typical email server size limitations.
Option Definition
Enable the Secure Web Mail Select this to enable the Secure Web Mail Client on your McAfee Email Gateway.
Client
After enabling the Secure Web Mail Client, configure your Email Policies to set
the triggers for using this feature.
Scan messages composed in Select to force all messages composed from within the Secure Web Mail Client to
the Secure Web Mail Client be scanned for malicious content.
Secure Web Mail host name Enter the hostname for the appliance.
Option Definition
Default locale Select the default language that is to be displayed within the email notifications.
Once the end user receives their Secure Web Mail: Welcome message and clicks to activate
their account, they are able to select their own preferred language.
Option Definition
Postmaster name Use this field to define the email address that is added to the notification
messages received by the end user.
User the postmaster By default, the end user will request support using the postmaster address
address as the support details.
contact By de-selecting this option, you can then define a Support contact address and
Support contact name.
Support contact address If you choose to define a separate support contact for your end users, enter
the Support contact address that the end users will see.
Support contact name If you choose to define a separate support contact for your end users, enter
the Support contact name that the end users will see.
Option Definition
Theme Select the theme that the und users will see when logging into Secure Web Mail.
Create themes in Email | Encryption | Branding to add them to this drop-down list.
Notification Select the notification branding that the und users will see when they receive a
messages Secure Web Mail notification.
You can specify parameters relating to both the PULL and PUSH methods of delivering email
messages, including configuring the maximum message sizes and other method-specific parameters.
Additionally, you can configure how you allow the end users to read and compose email messages
using the Secure Web Mail Client.
Option Definition
Enable auto-enrolment With Enable auto-enrolment selected, a user will automatically have a Secure
Web Mail account created on the McAfee Email Gateway if an email is
delivered to them through the McAfee Email Gateway that triggers a rule
that enforced encryption.
Selected by default.
Digitally sign outgoing By default, all outgoing Secure Web mail notifications are digitally signed by
notifications the McAfee Email Gateway.
Use HTML rather than plain By default, all Secure Web Mail notifications are sent in HTML format.
text for notifications However, to conserve bandwidth, you can deselect this option to form plain
text notifications.
Option Definition
Allow messages to be Set message parameters for messages stored on the gateway:
stored on the gateway
Maximum message size. Messages that exceed this size cannot be sent using the
(PULL messages)
PULL mechanism.
Expiry time for read messages. Set the time that each message will be stored on the
appliance after it has been read.
Expiry time for unread messages. Set the time that each message will be stored on the
appliance in its unread state.
Warning period for expiring messages. Configure when a warning will be sent to the
user informing them that the message is about to expire.
Notify recipients of Choose whether to notify recipients of unread messages sent using the PULL
unread PULL method of encryption delivery.
messages When selected, you can also configure the Interval between notifications in days.
You can also specify a time period between unread message notifications.
Option Definition
Allow messages to be stored on Set message parameters for messages stored on end users' systems:
end users' systems (PUSH Maximum message size. Messages that exceed this size cannot be sent using
messages) the PUSH mechanism.
Follow the link to configure the encryption and escrow certificates to use
for PUSH messages.
Restrict the generated Secure Web Mail notifications to plain text rather than
HTML
Use this task to send notification messages in plain text.
Task
1 Click Email | Encryption | Secure Web Mail | User Account Settings.
All Secure Web Mail notification messages are sent in plain text.
Task
1 Click Email | Encryption | Secure Web Mail | User Account Settings.
2 In Message Encryption - PULL Messages, deselect Allow messages to be stored on the gateway.
3 In Message Encryption - PUSH Messages, select Allow messages to be stored on end users' systems.
Some of the situations where you need to use these features include:
Infrequent users of the Secure Web Mail system forgetting their passwords, and contacting the
configured support email address requesting help.
Users who have expired passwords, needing to have their accounts reactivated.
End users that request that their accounts are removed from your servers.
User Search
Option Definition
Email address To search for a particular Secure Web Mail end user, enter a full or partial email
address, and click Search.
All user accounts matching your search are displayed in the User Search table.
You can refine your search using the options in the Status drop-down menu.
For the selected Reset account Sends an Email notification to the recipient so that they can reset
users their password and unlock their account
Lock Account Prevents the user from accessing their account
Delete Account Deletes the account and all the user's messages
Domain Displays all unique domains that use Secure Web Mail.
Refresh Refreshes the domain list.
User Creation
Option Definition
Email address Enter the email address for the end user account you are creating.
Create After entering and confirming the email address for the end user account, click Create.
The new user account information is displayed in the User Search table.
Task
1 Email | Encryption | Secure Web Mail | User Management
2 In User Search, add the email address of the user whose account you wish to lock, such as
user@example.domain.com and click Search.
Displays the status of the account, including information such as the number of read and unread
messages, and the last time that user logged in, and provides a status of the account. The number
of read and unread messages is updated every 15 minutes.
3 Select the email address, and in For the selected users, select Lock account, then click Perform action.
The next time you search for this user, the account shows its Status as Locked.
Using a suitable password ensures that encrypted messages cannot be read by people other than the
intended recipient.
McAfee Email Gateway allows you to define a suitable end user password policy, which includes
specifying how complex you require the chosen passwords to be, how long each password is valid for
and the process required to update existing passwords.
A complex password is more secure than a very simple one, but is more likely to create a greater
volume of "forgotten password" reset requests from your end users. Therefore, you need to decide the
balance between complex passwords that are likely to generate lots of reset requests, and simpler
passwords that will require less maintenance.
Option Definition
Minimum length Select the minimum length that you will allow for end-user passwords. Longer
passwords are more secure, but may result in more calls to your support address as
end users find them more difficult to remember.
Minimum number of Specify the minimum number of alphabetical characters to be used within the end
ALPHA characters users' passwords.
To increase security, you can also Require a mixture of upper and lowercase characters to be
used.
Minimum number of The more different types of characters that may be used within an end users'
DIGIT characters password, the more secure that password can be made.
Forcing your end users to use numbers within their passwords improves the
security of the passwords.
Minimum number of The more different types of characters that may be used within an end users'
SPECIAL characters password, the more secure that password can be made.
Forcing your end users to use special characters within their passwords improves
the security of the passwords.
Option Definition
Enable password expiry Decide whether your end users will need to periodically renew their
passwords.
Specify the Password lifetime in days, and also the Grace period they are allowed
before the Password lifetime, during which they are allowed to still log into the
Secure Web Mail system, but are then forced to change their password.
Enable password expiry Choose if you want your end users to be notified that their passwords are due
reminders to expire. Also, select the required Interval between reminders.
Number of recent Use this field to prevent end users from re-entering their previous passwords.
passwords to disallow
Minimum interval between Specify any limits you want to place on the frequency with which end users
password changes can change their passwords.
Option Definition
Enable challenge / response Choose whether you want users to reset passwords without going through
any security questions.
Number of answers held Set the number of potential answers a user must provide to set up their
against a user challenge response questions.
Number of questions to ask a When challenge response is enabled, set how many questions each user
user must answer correctly to pass the security check.
Message Management
The Message Management options provide information about the number of messages stored on your
system, and the disk space you have available so you can remove some if necessary.
Purge Messages
Option Definition
Statistics Shows the number of read, unread, and draft messages and the amount of available
disk space.
Purge Messages Choose the messages that you want to remove:
Messages to delete:
All
One or more of
Read messages
Unread messages
Draft messsages
Older than x number of:
Days
Weeks
Months
Certificates
Use this page to specify the contents of a self-signed digital certificate for the appliance.
The following information applies to the Web Client HTTPS Certificate and the Notification Signing Certificate.
Option Definition
Country [C] Specifies a two-letter code such CN, DE, ES, FR, JP, KR. (See ISO 3166)
Default value is US.
State or province [ST] Specifies the location of your organization. Give a full name rather than an
Town or city [L] abbreviation.
Option Definition
Organization [O] Specifies the name of your organization such as Example, Inc.
Organizational unit [OU] Default value is Email Gateway.
Common name [CN] Displays the domain name of your appliance such as server1.example.com
Email address [ea] Specifies an email address, for example aaa@mcafee.com
View Click to view the certificate details.
Import When clicked, opens a window where you can specify the file.
To import a password-protected certificate, type the passphrase to unlock the
private key. The appliance stores the decrypted certificate in a secure internal
location.
The appliance only verifies the certificate, and makes it available to use, after
Export When clicked, opens a window where you can specify a passphrase, then
download a file. The file name extension is CRT (base-64 encoded) or P12
(PKCS#12). The certificate is in PEM format.
Generate Certificate When clicked, opens a window where you can request that the Certificate
Signing Request Signing Request is signed by a Certificate Authority on the appliance or by an
external Certificate Authority. The file name extension is CSR.
Regenerate When clicked, you are prompted to confirm that you want to regenerate the
certificate and private key.
Entries in the Option fields determine the information that appears in a subsequent certificate signing
request (CSR).
For internally self-signed certificates, the information is used to regenerate the certificates.
Subsequent viewing of these certificates reflect the changes, along with new valid to and valid
from dates.
For externally signed certificates, changing the option settings has no immediate effect on the
viewable certificate details. You must regenerate the CSR, have it externally signed, and then
import it in order to see the changed information.
The View link opens the Certificate Details window, containing the detailed information about the
certificate.
S/MIME
Understand how McAfee Email Gateway uses S/MIME to provide encrypted delivery of email messages.
Contents
S/MIME S/MIME Encryption Certificate
S/MIME Sending Email
Before you can use the S/MIME features, you must obtain and install your individual S/MIME certificate.
You can obtain it from either your in-house certificate authority (CA) or a public CA.
Option Definition
Country [C] Specifies a two-letter code such CN, DE, ES, FR, JP, KR. (See ISO 3166)
Default value is US.
State or province [ST] Specifies the location of your organization. Give a full name rather than an
Town or city [L] abbreviation.
Organization [O] Specifies the name of your organization such as Example, Inc.
Organizational unit [OU] Default value is Email Gateway.
Common name [CN] Displays the domain name of your appliance such as server1.example.com
Email address [ea] Specifies an email address, for example aaa@mcafee.com
Import When clicked, opens a window where you can specify the file.
To import a password-protected certificate, type the passphrase to unlock the
private key. The appliance stores the decrypted certificate in a secure internal
location.
The appliance only verifies the certificate, and makes it available to use, after
Export When clicked, opens a window where you can specify a passphrase, then
download a file. The file name extension is CRT (base-64 encoded) or P12
(PKCS#12). The certificate is in PEM format.
Generate Certificate When clicked, opens a window where you can request that the Certificate
Signing Request Signing Request is signed by a Certificate Authority on the appliance or by an
external Certificate Authority. The file name extension is CSR.
Option Definition
Escrow certificate Select from the available certificates.
When you have selected a certificate, click View certificate to see the
information within it.
S/MIME Encryption See the currently stored S/MIME Encryption Certificates for External Domains.
Certificates for External You can add or delete domains from this list , or view the certificates
Domains provided by each domain.
Use Filter to help find a particular certificate
Domain Lists the domain to which each S/MIME encryption certificate applies.
S/MIME Certificate Shows detail about the S/MIME encryption certificate.
Add Domain Add a new external domain to the list.
View Certificate View information about the selected S/MIME encryption certificate.
Delete Selected Domains Delete the selected domains and their S/MIME encryption certificates.
Manage S/MIME Encryption Click to move to Email | Certificate Management | Certificates | S/MIME Encryption
Certificate Certificates.
PGP encryption
Understand how McAfee Email Gateway uses PGP to provide encrypted delivery of email messages.
Contents
PGP PGP Encryption Key
PGP Sending Email
Option Definition
Displayable name A user-editable field, allowing you to choose the name that is displayed for this
encryption key.
Comment A user-editable field, allowing you to choose a comment for this encryption key.
Email address The email address associated with this encryption key.
View Click to display the content of the encryption key.
Import Click to open the Import Certificate and Key dialog box where you an upload a certificate to
the appliance, and add a passphrase to open a private key.
Export Click to open the Certificate and Key Export dialog box where you can choose whether you
want to export with no private key, or export a complete chain, and the format of key
that you want to export.
Regenerate Click to regenerate the PGP public and private keys, using the information on this
page.
Option Definition
Escrow key Select from the available keys.
When you have selected a key, click View key to see the information within it.
PGP Encryption Keys for See the currently stored PGP Encryption Keys for External Domains.
External Domains You can add or delete domains from this list , or view the certificates
provided by each domain.
Use Filter to help find a particular key.
Domain Lists the domain to which each PGP encryption key applies.
PGP Key Shows detail about the PGP key.
Add Domain Add a new external domain to the list.
View Key View information about the selected PGP key.
Delete Selected Domains Delete the selected domains and their PGP Encryption Keys.
Manage PGP keys Click to move to Email | Certificate Management | Certificates | PGP Encryption Keys
TLS
Use this page to specify how devices use encrypted communications and to manage their digital
certificates.
Import the trusted Certificates Authorities and certificates from the participating organizations before
you begin this configuration. RSA keys can be used both for encryption and for signing. DSA keys can
be used for signing only.
The receiving email server then selects the strongest supported cipher from that list, and then
notifies the McAfee Email Gateway of the chosen cipher.
The servers then use Public Key Infrastructure (PKI) to establish their authenticity. This is achieved
by the exchanging of digital certificates. On occasions, these digital certificates may be validated
against the Certificate Authority (CA) that issued the certificates.
Using the server's public key, McAfee Email Gateway generates a random number as a session key,
and sends it to the receiving email server. The receiving server then decrypts this session key using
its private key.
Both the McAfee Email Gateway and the receiving email server then use this encrypted session key
to set up communications, completing the handshake process.
Once the handshake has been completed, the secure connection is used to transfer the email
messages. The connection remains secure until the connection is closed.
TLS Connections
Use this area to define hosts that use TLS encryption.
Table 4-148 Option definitions When receiving email (gateway is acting as server)
Option Definition
Client Domain / Subnet Displays the details, such as:
192.168.200.254/24
192.168.200.254/255.255.255.0
server1.example.net
*.example.net
Use TLS Always rejects email from participating organizations if their communication
does not try to start encryption.
Never configure connections to the source server to never use TLS encryption.
When available if available, the connection uses TLS encryption.
Authenticate Client Specifies whether the other device must also authenticate.
Server Certificate Selects the certificate to use for this TLS Connection.
The name is one of the certificate IDs from the Certificate Management section .
Add Domain Enables you to specify new domains that are to use TLS.
View Certificate View the TLS certificate for the selected domains.
Delete Selected Domains Remove the selected domains from the list.
Table 4-149 Option definitions When sending email (gateway is acting as a client)
Option Definition
Server Domain / Subnet Displays the details, such as:
192.168.200.254/24
192.168.200.254/255.255.255.0
server1.example.net
*.example.net
Use TLS Always rejects email from participating organizations if their communication
does not try to start encryption.
Never configure connections to the source server to never use TLS encryption.
When available if available, the connection uses TLS encryption.
Authenticate Self Specifies whether the client must verify itself to the recipient before sending
email. The client then needs its own certificate.
Client Certificate Selects the certificate to use for this TLS Connection.
The name is one of the certificate IDs from the Certificate Management section.
Add Domain Enables you to specify new domains that are to use TLS.
View Certificate View the TLS certificate for the selected domains.
Delete Selected Domains Remove the selected domains from the list.
Allow no encryption If selected, ciphers without encryption are supported. McAfee does not
recommend using unencrypted TLS connections, so this setting is disabled by
default.
Allow anonymous key If selected, ciphers without authentication are supported. McAfee does not
exchange recommend using unauthenticated TLS connections, so this setting is disabled
by default.
TLS enforcement If selected, the appliance will enforce TLS using the sender's envelope address
rather than the ehlo address for inbound email.
The default theme cannot be edited. Click Copy Item to to create a customized theme or notification based
on the currently active item.
Specify images that appear as the logo for the desktop client, logo for the mobile client, and the
favorites icon icon.
View real time changes to the branding that you make in the previews available.
Customize the product name that's displayed, or that is presented to the user as either a text
string, or an image.
Edit notification messages and view your changes immediately within the right hand screen.
Option Definition
Name The name of the theme.
Usage Displays the number of times a theme or notification message is used.
Notification Displays the notification messages that you have created. Click Default notification set to
messages view all default messages.
Click on the notification on the left to get an expanded palette of all the notification
messages, and other available components such as disclaimers. The notification
contains a text area to edit content and a drop down list that allows you to insert
tokens. Some messages contain tokens that can be edited.
On the right hand screen, the content is updated to reflect your current selection. Also
on the right is a language picker to choose a different language. The language is one
of the basic settings of the virtual host. To change language, go to virtual host to
change the language that users will see.
Copy Item Click to create a new notification theme based on the currently active theme.
Delete Item Remove an unused theme.
Desktop View the notification as it appears on a user's desktop or through a mobile phone.
Preview /
Mobile Preview
Images Import the logo that you want to use on the notification, and view how it appears on
the desktop, mobile, and through a browser.
Upload new images through a form submission. Supported file formats for logos and
the favorites icon are .JPEG, .PNG, and .BMP. The .ICO format is also supported for the
favorites icon.
Images are scaled to the appropriate size, and converted to .PNG format for the logos,
and .ICO format for the favorites icon.
Option Definition
Product Name Set whether you want to use text or an image to display the product name.
If you choose to use an image to display the product name, the same upload rules and
supported formats apply as those that apply to Images.
Color Palette Define the appearance of the notification header and text.
Click on a colored square in the palette to edit a color. Using a color picker, you can
choose from a selection of standard colors, or you can specify the standard color as a
six character HTML hexadecimal string, or as a red/green/blue triplet.
Most recently used custom colors are added to a color palette at the bottom.
Task
1 Select Email | Encryption | Secure Web Mail | Basic Settings.
Recipients are automatically enrolled, and receive a digitally signed notification in HTML format. The
administrator chooses whether to do push and/or pull encryption.
The minimum password length is eight characters. The password expires after 365 days.
Task
1 Select Email | Email Policies | Compliance.
2 Click Enable compliance, and select Create new rule from template.
10 In On-box Encryption Options, select Secure Web Mail, and click OK.
Task
1 Click Email | Certificate Management | Certificates | CA Certificates.
7 In S/MIME Certificate, select the certificate for example.<domainname>.com that you just imported.
Task
1 Click Email | Email Policies | Add Policy....
2 In Policy name, type the name of the policy, such as Recipients for example.domainname.com.
Task
1 Click Email | Encryption | S/MIME | S/MIME Encryption Certificate.
2 Click Export.
4 Click Next.
This will generate a self signed certificate.
6 Click Finish.
Once the customer successfully configures their email system to use S/MIME encryption with the
certificate you provided, McAfee Email Gateway will automatically decrypt all of the incoming S/MIME
emails from this customer using the private key.
Task
1 Click Email | Certificate Management | Certificates | PGP Encryption Keys and import your PGP key, such as
example.<domainname>.com.
4 In PGP Key, select the key for example.<domainname>.com that you just imported.
Task
1 Click Email --> Email Policies --> Add Policy....
2 In Policy name, type the name of the policy, such as Recipients for example.domainname.com.
Task
1 Click Email | Encryption | PGP | PGP Encryption Key.
2 Click Export.
4 Click Next.
This will generate a PGP public key.
6 Click Finish.
9 Send the public key pgp_encryptor_<machinename>.asc to customer <abc>, to use for encrypting
all of their email messages to your organization.
Once the customer successfully configures their email system to use PGP encryption with the public
key you provided, McAfee Email Gateway will automatically decrypt all of the incoming PGP emails
from this customer using its private key.
Certificate Management
The Certificate Management pages enable you to configure and view certificates for use with your
appliance.
Contents
Certificates
Option definitions Certificate Details dialog box
Certificate Revocation Lists (CRLs)
Certificates
Use the linked pages to view and change important information about the certificates relating to your
appliance.
Contents
CA certificates
TLS certificates and keys
S/MIME
PGP encryption
CA certificates
Use this page to manage digital certificates from Certification Authorities.
If a yellow exclamation point appears next to the certificate after you click the green checkmark to
apply the change, the certificate is not currently trusted. Import the associated CA certificate before you
use the new certificate.
Icon Description
Certificate is valid
Certificate is invalid. For example, the certificate has expired.
RSA keys can be used both for encryption and for signing. DSA keys can be used for signing only.
Option Definition
Certificate ID Displays the name of the certificate.
Trusted Specifies whether a certificate is valid. For example, this option is deselected if
the certificate has expired.
Subject Displays details about the certificate.
Issuer Displays the certificate-issuing authority, such as Thawte and Verisign.
Expires Displays the certificate's expiry date, such as May 15 2010 12:15:00. If this date
has passed, the certificate is not valid.
Delete When clicked, deletes the selected certificate.
View When clicked, displays details of the selected certificate.
Export Selected or When clicked, opens a browser for saving a file. If you export a single certificate,
Export All the file name includes the certificate ID. The file name extension is crt (for
Base64, PEM) or p7b (for PKCS#7).
Mark All Certificates Defines all listed certificates as untrusted.
As Untrusted
Import CA Certificate When clicked, opens another window where you can select a file. The imported
certificate can be in one of these formats:
Binary (or DER-encoded) certificate file
PEM (Base64) encoded certificates
Binary PKCS#7 file
PEM-encoded PKCS#7 file
The appliance can accept certificate chains and certificates with
password-protected private keys.
The appliance only verifies the certificate, and makes it available to use, after you
When requesting that your TLS certificates be created, McAfee recommends that you include the
hostname and the IP address for the appliance that will be decrypting the TLS-encrypted email. If your
appliance is part of a cluster, and is configured in Transparent Router or Explicit Proxy mode, ensure
that you include the virtual hostname and virtual IP address for your cluster, rather than one of the
physical IP addresses.
Import the trusted Certificates Authorities and certificates from the participating organizations before
you begin TLS configuration. RSA keys can be used both for encryption and for signing. DSA keys can
be used for signing only.
Icon Description
Certificate is valid
Certificate is invalid. For example, the certificate has expired.
Option Definition
Certificate ID Displays the name of the certificate.
Subject Displays details about the certificate.
Issuer Displays the certificate-issuing authority such as Thawte or Verisign.
Expires Displays the certificate's expiry date, such as May 05 2010 12:15:00.
Delete When clicked, deletes the selected certificate.
View When clicked, displays details of the selected certificate, such as its version, issuer,
and public key.
Export When clicked, opens another window, where you can choose to export the
certificate or a complete certificate chain, and specify the certificate format. The file
name extension is typically CRT.
Option Definition
Import Certificate When clicked, opens another window where you can select a file. The imported
and Key certificate can be in one of these formats:
Binary (or DER-encoded) certificate file
PEM (Base64) encoded certificates
Binary PKCS#12 file
PEM-encoded PKCS#12 file
To import a password-protected certificate, type the passphrase to unlock the
private key. The appliance stores the decrypted certificate in a secure internal
location.
The appliance only verifies the certificate, and makes it available to use, after you
If a yellow exclamation point appears next to the certificate after you click the green checkmark to
apply the change, the certificate is not currently trusted. Import the associated CA certificate before you
use the new certificate.
S/MIME
Understand how McAfee Email Gateway uses S/MIME to provide encrypted delivery of email messages.
Before you can use the S/MIME features, you must obtain and install your individual S/MIME certificate.
You can obtain it from either your in-house certificate authority (CA) or a public CA.
Option Definition
Certificate ID Displays the name of the certificate.
Subject Displays details about the certificate.
Issuer Displays the certificate-issuing authority such as Thawte or Verisign.
Expires Displays the certificate's expiry date, such as May 05 2010 12:15:00.
Delete When clicked, deletes the selected certificate.
View When clicked, displays details of the selected certificate, such as its version, issuer,
and public key.
Option Definition
Export When clicked, opens another window, where you can choose to export the certificate
or a complete certificate chain, and specify the certificate format. The file name
extension is typically CRT.
Import Certificate When clicked, opens another window where you can select a file. The imported
certificate can be in one of these formats:
Binary or base-64 (PEM) encoded certificate
Binary PKCS#7 file
The appliance only verifies the certificate, and makes it available to use, after you click
PGP encryption
Understand how McAfee Email Gateway uses PGP to provide encrypted delivery of email messages.
Contents
PGP PGP Encryption Key
PGP Sending Email
Option Definition
Displayable name A user-editable field, allowing you to choose the name that is displayed for this
encryption key.
Comment A user-editable field, allowing you to choose a comment for this encryption key.
Email address The email address associated with this encryption key.
View Click to display the content of the encryption key.
Option Definition
Import Click to open the Import Certificate and Key dialog box where you an upload a certificate to
the appliance, and add a passphrase to open a private key.
Export Click to open the Certificate and Key Export dialog box where you can choose whether you
want to export with no private key, or export a complete chain, and the format of key
that you want to export.
Option Definition
Escrow key Select from the available keys.
When you have selected a key, click View key to see the information within it.
PGP Encryption Keys for See the currently stored PGP Encryption Keys for External Domains.
External Domains You can add or delete domains from this list , or view the certificates
provided by each domain.
Use Filter to help find a particular key.
Domain Lists the domain to which each PGP encryption key applies.
PGP Key Shows detail about the PGP key.
Add Domain Add a new external domain to the list.
View Key View information about the selected PGP key.
Delete Selected Domains Delete the selected domains and their PGP Encryption Keys.
Manage PGP keys Click to move to Email | Certificate Management | Certificates | PGP Encryption Keys
Option Definition
Details View the fully detailed information about the selected certificate.
Certification path View information about the Certificate ID and the Subject of the certificate.
Contents
Installed CRLs
CRL Updates
Installed CRLs
Use this page to manage Certificates Revocation Lists.
Option Definition
ID Displays the name of the Certificate Authority.
Issuer Displays the certificate-issuing authority, such as Thawte or Verisign.
Last Update and Displays applicable dates for the CRL.
Next Update
Delete When clicked, deletes the selected CRL.
You cannot delete a CRL that is still current. When you delete a certificate, its CRL
is deleted automatically.
Export Selected When clicked, opens a browser for saving a file. The file name extension is
typically CRL.
Import CRL When clicked, opens a browser for selecting a file.
The appliance can fetch a local file or a file from a website.
The appliance only verifies the CRL, and makes it available to use, after you click
CRL Updates
Use this page to specify how often the appliance fetches updates to its Certificate Revocation Lists.
The private key used by the certificate may have been compromised.
Being able to regularly update the CRLs on your McAfee Email Gateway enables you to be confident
that the McAfee Email Gateway will not continue to use certificates that have been revoked.
Option Definition
Update now Update the CRLs immediately.
Specify the frequency Specifies how often the appliance will collect CRL updates. Choose a time
when your network is least busy.
If you do not want to use this feature, select Never.
Use the default proxy If you intend to use a HTTP proxy that is not specified on the Default Server
settings Settings page, deselect this checkbox.
Configure defaults When clicked, opens the Default Server Settings page, where you can view or
change the default settings for the HTTP proxy.
To view proxy information at any other time, select System | Appliance Management
| Default Server Settings from the navigation bar.
Hybrid configuration
Hybrid email scanning uses the McAfee Email Gateway to scan your outbound email traffic, and uses
the cloud-based McAfee Email Protection (Hybrid) to scan your inbound email traffic.
Contents
Benefits of using hybrid email scanning
About the hybrid email registration and configuration process
Registration
Domain Management
Inbound email messages from trusted partners can be send directly to your McAfee Email Gateway for
scanning.
All communications between the cloud service and your McAfee Email Gateway are encrypted. You
configure and optimize the scanning of both inbound and outbound email traffic from a single location
the user interface of your McAfee Email Gateway.
When the McAfee Email Protection (Hybrid) makes detections within any email messages, information
about the email message and the detection is sent to your McAfee Email Gateway appliance.
Then, depending on your configuration, the McAfee Email Gateway can request the message data be
sent for further actions or for delivery. If the action is to quarantine the message, the inbound email
messages are quarantined alongside quarantined outbound email messages.
This allows you to use Message Search or other system logging options on your appliance to
investigate each message, regardless of whether it is scanned locally by your McAfee Email Gateway
or by McAfee Email Protection (Hybrid).
The communication between McAfee Email Protection (Hybrid) and the appliance must not pass through
another MTA, as the communication uses a proprietary protocol and will not succeed if another SMTP
gateway is involved in the conversation.
2 When you purchased your McAfee Email Protection (Hybrid), you were asked for information that is
used to set up a cloud-based account for you. As soon as this information has been entered, you
receive an email message containing the required links and credentials.
3 Install your McAfee Email Gateway appliance. When running through the Setup Wizard, select Use the
McAfee SaaS Email Protection Service to process inbound email on the Email Configuration page.
After applying the Setup Wizard configuration and re-loading the McAfee Email Gateway user
interface, the Email | Hybrid Configuration | Registration page is displayed.
4 Clicking the link in the Email | Hybrid Configuration | Registration page displays information that outlines
the registration process for your appliance and McAfee Email Protection (Hybrid) service.
5 Follow the information given to complete the registration, using the credentials provided by email
message.
After you have successfully completed registration, a new tab appears at Email | Hybrid
Configuration | Domain Management.
6 Before inbound email traffic can be scanned by the McAfee Email Protection (Hybrid), you must first
configure McAfee Email Protection (Hybrid) to accept email for your domain(s), and then configure
your public MX records for those domain(s) to point to the McAfee Email Protection (Hybrid)
servers.
Registration
To enable and configure hybrid email scanning, you must first register your McAfee Email Gateway
appliances with the McAfee Email Protection (Hybrid) service.
Contents
Benefits of registering hybrid email scanning
Option definitions Registration
Task Register with the McAfee Email Protection (Hybrid) service
Task Cancel your registration with the McAfee Email Protection (Hybrid) service
Address After an email message from your initial domain has been
scanned by the McAfee Email Protection (Hybrid) service,
Not displayed when your communication is initiated to the McAfee Email Gateway at this
appliance is ePO-managed. address.
Port Specifies the port assigned to your initial McAfee Email Gateway.
Not displayed when your If the publicly exposed port of the McAfee Email Gateway is not
appliance is ePO-managed. the same as the port the McAfee Email Gateway is listening on
perhaps if you are port mapping go to the Email | Hybrid
Configuration | Domain Management page.
Register Registers your McAfee Email Gateway with the McAfee Email
Protection (Hybrid).
After registration, a new tab, Email | Hybrid Configuration | Domain
Management appears. Also, a new section, Cancel Registration, is
displayed on this page.
Before cancelling your registration, you should ensure that the MX records for your
managed domains no longer point to the McAfee Email Protection (Hybrid) service.
Task
1 Select Email | Hybrid Configuration.
The hybrid configuration Registration page appears, and the system checks to ensure your appliance
can connect to the McAfee Email Protection (Hybrid).
This is the only page available under Hybrid Configuration before registration is complete. Guidance for
completing your registration appears on the page.
2 Enter the user name and password from your welcome email in the appropriate data fields.
3 (Optional) Configure your initial appliance for inbound email, for use by the McAfee Email
Protection (Hybrid) service.
If your McAfee Email Gateway does not have a public IP address, use the Email | Hybrid Configuration |
Domain Management page.
a Select the Configure this appliance to handle email for the initial domain checkbox.
b Select the appliance domain name and IP address from the drop down list.
c Select the port assigned to the appliance from the drop down list.
You should configure a virtual address for the receiving appliance when the appliance is the cluster
master.
4 Click Register.
Your appliance is registered with McAfee Email Protection (Hybrid), and the Domain Management tab
appears in the Hybrid Configuration window. The Registration window expands to show the Cancel Registration
information.
Task Cancel your registration with the McAfee Email Protection (Hybrid)
service
You can stop using the McAfee Email Protection (Hybrid) at any time.
Task
1 Select Email | Hybrid Configuration | Registration.
You can re-register with the protection service using your original credentials.
Domain Management
You can use the user interface to specify which domains you want scanned by McAfee Email Protection
(Hybrid).
Configure your domains after you have registered McAfee Email Protection (Hybrid).
The Email | Hybrid Configuration | Domain Management tab is only visible after you have registered to use Hybrid
Email scanning.
The Domain Management window shows the list of domains you have configured for McAfee Email
Protection (Hybrid), and their associated appliances. From this window, you can add domains, and edit
or delete existing domains.
Contents
Benefits of using domain management
Option definitions Domain Management page
Option definitions Add/Edit domains page
Task Manage your domains using Hybrid Email protection
By using the Domain Management page, you can quickly specify the domains that are to have inbound
email traffic scanned "in the cloud" from within the McAfee Email Gateway user interface. You do not
need to go to separate interfaces to configure your inbound and outbound email scanning; both are
managed from the same user interface.
As the inbound email settings are transferred to the McAfee Email Protection (Hybrid) service when you
make any changes to this page, these settings are changed in real-time; you do not need to click the
Apply button to save the changes to the McAfee Email Gateway configuration.
You can rank the appliances on your list to establish a preference order, with
the lowest number being tried first. The McAfee Email Protection (Hybrid)
service will try the appliances in rank order until it succeeds. If all appliances
are ranked equally, the service round-robins amongst them.
Add McAfee Email Opens a window for adding a McAfee Email Gateway to the list.
Gateways
Test Connection Tests if the selected host is accessible from McAfee Email Protection (Hybrid)
service. The test verifies:
A connection can be established to the service.
The McAfee Email Gateway has been registered with the McAfee Email
Protection (Hybrid) service.
The test button is active when you select a single appliance.
Delete Deletes selected McAfee Email Gateway appliances from the list.
Task
1 From the Domain Management window, click Add Domain.
2 Enter the fully qualified domain name for the domain you want to add.
Data fields for the new domain appear in the Public addresses of McAfee Email Gateways portion of the
window.
4 Type the IP address or the fully qualified domain name for the appliance. Optionally, you can
include the port identification.
5 To indicate the status of the appliance, select or deselect the Active? checkbox. Click Add McAfee Email
Gateways again and repeat steps 4 and 5 if you want to add more than one appliance.
6 (Optional) If you add more than one appliance, you can indicate their rank (order) by typing a
number in the Rank data field.
7 (Optional) You can test the connection between any single appliance and the McAfee Email
Protection (Hybrid) service by clicking Test Connection.
8 When you have completed the information on this window, click OK.
Task
1 On the Domain Management page, click the Edit icon for the domain you want to change.
The Edit Domain window appears, showing the current information about the selected domain.
2 Make your changes to the domain. You can change the domain name, add or delete appliances,
change the status, and for multiple appliances change the rank.
3 (Optional) To test the connection between any single appliance and the McAfee Email Protection
(Hybrid) service, click Test Connection.
Task
1 On the Domain Management page, select the check boxes for one or more domains you want to delete.
The domain or domains are removed from the Domain Management page.
Group Management
The Group Management pages enable you to set up directory services to work with your LDAP servers,
and create network groups, and user groups who relay on the appliances.
Directory Services
Use this page to build a group of directory services to work with your LDAP servers.
Directory Synchronization
Address Masquerading
Policy selection
Delivery routes
Custom queries can be created for use in policy selection using the Add Query option in the Add Directory
Service wizard.
You can set up groups of LDAP servers to ensure high availability by adding secondary servers to the
primary LDAP server.
The name that you give the primary server Service name in the Add Directory Service wizard is the name of the
group that you see when you come to select the LDAP group in the LDAP-related features in McAfee
Email Gateway, such as Address Masquerading.
Directory Synchronization.
Directory Synchronization is the mechanism to synchronize LDAP data on the appliance with remote
LDAP servers.
Once LDAP data has been synchronized, the appliance no longer performs LDAP lookups on the
remote server and uses its own on-box database, minimizing loading on the remote LDAP servers.
To enable Directory synchronization, add the LDAP server to which you need to synchronize to the
Directory Services page.
You must also select the queries that need to be synchronized, by selecting Cache Result option on the
Directory Service Queries page of the Add Directory Service wizard.
The advantages of Directory synchronization are more apparent on cluster or blade server
environments because each scanner no longer performs LDAP lookups, but uses the on-box database.
The Master is responsible for synchronizing the database with the remote LDAP servers. Once the
synchronization is finished the database is synchronized with other members of the cluster and is then
used for LDAP checks.
Attributes on the LDAP server can be accessed in real time (allowing for the most up-to-date data to
be available), or be cached on the appliance (a faster option that causes less impact to your network)
by using the Cache Result checkbox in the Add Directory Services wizard.
Use the Synchronization schedule feature to schedule when to update the cache.
McAfee Email Gateway uses queries defined on the Directory Service Queries page to populate the local
LDAP database. The 'List of Groups' and 'Synchronization' queries are mandatory and cannot be
unselected, as they are used to get group and email address information from the LDAP server. You
can choose to cache all other queries. If you choose not to cache the results of any other query,
McAfee Email Gateway will carry out a real-time lookup when the SMTP features that use the query
are used.
By default LDAP caching is on for each query. When you apply configuration changes to the appliance,
the synchronization process updates the local LDAP cache database. If the database has not been
updated for a particular server, the LDAP lookup is done in real time. Additionally, if the query is missing
or has been modified for a particular server, the LDAP lookup is done in real time.
When you configure Directory Synchronization, the following information is stored in the on-box
database:
The LDAP queries that you have configured to run against the LDAP servers.
User information, stored as a BLOB. This information includes the email addresses of the users, the
group membership of each user and any extra information collected by the LDAP queries.
You can manually start the LDAP synchronization process by clicking Email | Group Management | Directory
Services | Directory Synchronization | Update Now. You can also schedule regular LDAP synchronization from
Email | Group Management | Directory Services | Directory Synchronization | Synchronization schedule.
You can check the current status of LDAP synchronization by looking at Email | Group Management |
Directory Services | Directory Synchronization | Update Information. You can also view the LDAP synchronization
data in the log files in /var/log/messages.
Any LDAP synchronization failures are logged and can be sent to administrators by SNMP, Email or
Syslog.
Directory Services
This information describes the settings of any LDAP server that you have set up. To add a connection
to an LDAP server, click Add Server.
Option Definition
Name, Address and Displays information about each directory server such as a type like Domino or
Type Active Directory. Click Edit to open the Add Directory Service wizard to change a
server's settings.
Add Server When clicked, starts the Add Directory Services wizard where you can add details
of a directory service.
The Service name that you give this server is what is shown when you set up features
in the appliance to work with LDAP.
The server at the top of the list is queried first. You can create groups of servers
by using the Add Secondary Server option.
Add Secondary Use this option to create groups of LDAP servers by adding secondary servers that
Server are queried should the primary server be unavailable, or not have the required
information. From the features that work with LDAP, you will not see secondary
servers listed, only the primary server in the group.
Delete Server Remove primary, or secondary servers from the list.
Perform server Sets whether the appliance should attempt to validate a remote server certificate
certificate verification that is used to encrypt a secure connection between the appliance and an LDAP
on secure server.
connections You can manage the certificates required from Email | Certificate Management.
Directory Synchronization
This information describes the options available in the Directory Synchronization section of the page.
Option Definition
Update information Displays the status of the information in the on-box directory:
Information is available for query. The time and date shows when the
latest update occurred.
The on-box directory has no data, or is not up-to-date.
Update Now When clicked, the appliance immediately copies directory information from the
servers under Directory Services to its own directory.
Synchronization Specifies how often the appliance copies directory information from the LDAP
schedule servers to which you have connected to its own directory.
Setting the schedule to Hourly can create a heavy load on your network.
Test each query using the Test button to confirm that it gives you the expected results.
The queries should only take a few seconds to complete. If the queries do not quickly return a
response, check the following:
Ensure all the LDAP attributes specified in the query are also available within the LDAP schemas on
the server being queried.
Make sure all LDAP attributes specified in the query are indexed on the remote LDAP server.
Network Groups
This page enables you to create network groups to use as a policy selection criteria.
You can also define user groups based on sender email addresses, recipient email addresses, or LDAP
queries.
Option Definition
Group Name , In use?, and Displays the name of the group, whether it is in use, and provides the
Delete option to remove the group from the list.
Add Click to open the Add Network Groups dialog box.
Option Definition
Group name The name of the group.
Selected or unselected Defines whether the group is in use.
Use the arrow icons to move the rules up and down the list. The rules are
applied in a "top-down" order.
Option Definition
Match Choose from:
is
is not
is in
is not in
Value Type the value that you want to associate with Match.
Add Rule / Delected Adds a new line to the list where you can specify the name, type, and values
Selected Rules to match on for a new network group.
Option Definition
Rule Type Define the type of rule.
For Add Network Groups, options include:
IP address (default)
VLAN identifier
Network connection
Host name
For Add User Groups, options include:
Sender email address (default)
Recipeint email address
LDAP query
LDAP authentication
Option Definition
Group name , In use?, and Displays the name of the group, whether it is in use, and provides the
Delete option to remove the group from the list.
Add Opens the Add User Group dialog box.
Option Definition
Group name Type the name of the group.
Selected or Select a group and click Edit or Delete Selected Rules as appropriate. Use the arrow
unselected icons to move the rules up and down the list.
Rule type Choose from:
Sender email address Recipient user group
Recipient email address LDAP Query (if configured)
Sender user group
The LDAP query and user group options become available only when a user
group or LDAP server has been created.
Value Type the value that you want to associate with Match.
Add Rule Adds a new rule to the list .
Task
1 Go to Email | Group Management | Email Senders and Recipients.
The Values field is populated with the name of the LDAP group you selected.
8 In Value, select the user group you created, and click OK.
The appliance comes with a selection of queries already set up for you. Each query can be customized
and the results tested to ensure that they are what you expect. the following queries are available:
Use the Next > and < Back buttons to navigate through the screens. After you have successfully tested
the group and member queries, click Finish to complete the wizard.
Address Masquerading
Policy selection
Delivery routes
Custom queries can be created for use in policy selection using the Add Query option in the Add Directory
Service wizard.
You can set up groups of LDAP servers to ensure high availability by adding secondary servers to the
primary LDAP server.
The name that you give the primary server Service name in the Add Directory Service wizard will be the
name of the group that you see when you come to select the LDAP group in the features in Email
Gateway that you can use with LDAP, such as Address Masquerading.
Directory Synchronization offers a choice of access. The appliance can query an external directory server in
real-time, or its own ("on-box") cached directory.
Attributes on the LDAP server can be accessed in real time (allowing for the most up-to-date data to
be available), or be cached on the appliance (a faster option that causes less impact to your network)
by using the Cache Result checkbox in the Add Directory Services wizard.
Use the Synchronization schedule feature to schedule when to update the cache.
Option Definition
Service name Enter a name for the service you are adding. This name is displayed in the list of
Directory Services
Secure Communication Choose from:
Off not a secure connection. Data travels between the LDAP server and the
appliance in clear text.
Secure LDAP Encrypts the LDAP communication over SSL. By default this
occurs on port 636.
Use TLS Encrypts the LDAP communication over TLS. By default, this occurs
on port 389.
Server address Enter the address for the server that hosts the directory service you are adding.
Server type Select the type of LDAP server to which you want to connect:
Active directory Domino
Novell NDS (eDirectory) Generic LDAP Server v3 (RFC2251/RFC2307)
Netscape/Sun iPlanet Exchange
Based on the server type you select, the default queries are modified to match
with the default attributes. Different server types have different attributes
associated with them depending on the schemas that you have specified.
Base DN Enter the base distinguished name to be used by the directory service you are
adding.
Username Enter the user name needed for the appliance to connect to the directory service.
Password Enter the password needed for the appliance to connect to the directory service.
Option Definition
Referrals Select this to allow the appliance to follow LDAP referrals to other servers that
hold a part of the directory tree.
Page Size Shows the number of results per page. Set to 1000 by default.
Query types
When the primary server and the secondary server have different set of groups, and
if Stop on Result is selected on the primary server, only the groups from the primary
server appear on the policy creation page. To avoid this, deselect Stop On Result for
the List of Groups and Group membership queries.
Group membership Query to get the list of groups that an email address belongs to.
When the primary server and the secondary server have different set of groups, and
if Stop on Result is selected on the primary server, only the groups from the primary
server appear on the policy creation page. To avoid this, deselect Stop On Result for
the List of Groups and Group membership queries.
Synchronization Query to get all the email addresses on the LDAP server to synchronize to the
appliance.
Valid recipient Query to find whether an email recipient is valid on your LDAP server.
Delivery MTA Query to find the Message Transfer Agent (MTA) to which you want to deliver for a
particular email recipient.
Address masquerade Query to find the email address that you want to masquerade.
Option Definition
Enabled Enables or disables the query.
Cache Result Specify whether you want to cache results on the appliance to reduce the time it takes
to run the query, and reduce network load. Deselecting this option queries the LDAP
server in real time.
Fail Open Select to query a secondary LDAP server (if set up) if the primary LDAP server fails.
Stop On Result Select to stop a query on a secondary server when a successful result occurs.
When the primary server and the secondary server have different set of groups, and if
Stop on Result is selected on the primary server, only the groups from the primary server
appear on the policy creation page. To avoid this, deselect Stop On Result for the List of Groups
and Group membership queries.
Add Query Click to open a new page of the wizard that allows you to create a new query in addition
to the queries already set up for you.
Edit Query Select a query, then click Edit Query to open a new page of the wizard that allows you to
edit the query.
Option Definition
Remove Query Delete the selected query. Default queries cannot be removed.
Test Query Click to open a new page of the wizard that allows you to test whether the query
provides the results that you want before you apply the configuration to the appliance.
When the results are returned, click Next to return to this page.
Finish Completes the wizard. The query becomes available to select in areas of the appliance
that can work with LDAP, such as:
Address Masquerading
Recipient Authentication
Creating a new policy
Delivering Email
You must apply the changes to the appliance for the LDAP query to register and become
available to create a new policy.
Option Definition
Full Query String Displays the default attributes associated with the query.
Query Name The name of the query. Default query names cannot be edited.
Primary Query Specify the settings for the primary query:
Filter displays the search filters that you want the query to use. Multiple search
filters can be specified to make a request of the LDAP server.
Identity attribute 1 through 4 contains the individual attributes that you want the query
to return.
Secondary Query If necessary, create a secondary query as a further query to the first. For example, if a
primary query in the Group membership query is to locate a specific user, you can create a
secondary query to discover which user group the user belongs to.
To ensure that your query returns the results you want, the wizard provides you with the opportunity
to test the queries that you have defined.
Option Definition
Query Name The name of the query that you want to test.
Full Query String Displays the search filters, and the attributes associated with them.
Perform LDAP Query Click to have the query tested with the LDAP server.
Query Results The results are displayed within the Query Results area.
McAfee recommends that you set up an update interval that is suitable to the amount of
data transmitting. Choosing a too-frequent update interval can impact your network load.
Task
1 Go to Email | Group Management | Directory Services and click Add Server to open the Add Directory Service
wizard.
2 On the Directory Service Details page of the wizard, add the following data:
In Service name, type Exchange.
In Server address, type the IP address of the server to which you want to connect.
In Base DN, where the domain name is test.dom, type dc=test, dc=dom.
3 Type the username and password of the server to which you are connecting, and click Next.
4 On the Directory Service Queries page of the wizard, ensure that the following queries have the
Enabled and Cache Results checkboxes selected:
List of groups
Group membership
Valid recipient
Delivery MTA
Address masquerade
5 Click Test to verify the query returns the information you want, then click Finish.
6 In the Directory Synchronization section of the page, set the frequency to Hourly.
7 In the Directory Services section of the page, select the service you created, then select Add
Secondary Server to open the Add Directory Service wizard again.
8 Specify the details of the secondary server that you want to add.
Task
1 Go to Email | Group Management | Directory Services.
2 Click Add Server, and type the name of the service such as generic.
3 In Server address, add the server IP address of the LDAP server to which you are connecting.
5 In Base DN, where the domain name is test.dom, type dc=admin, dc=test, dc=dom.
6 Type the username and password of the server to which you are connecting.
7 Leave the other settings in their default state, and click Next.
10 In Identity attribute, type the attributes that you want to retrieve, such as cn and click Next.
11 On the Directory Service Queries page, select the query you created, and click Test Query.
12 In Identity for query, type the email address that you want to get the cn for, and click Perform LDAP Query.
Quarantine Configuration
Use this page to set your email quarantine configurations.
From within this page of the user interface, you can access the settings for the quarantine options,
quarantine digest options, the digest message content, and quarantine queue settings.
Contents
Quarantine Options
Quarantine Digest Options
Option definitions Digest Message Content
Quarantine Queue Settings
Quarantine Options
Use this page to configure your quarantine options.
When you select Use an off-box McAfee Quarantine Manager (MQM) service, the Quarantine Digest
Options and Digest Message Content tabs are removed from the user interface.
The following table shows what you will see in the McAfee Quarantine Manager queue for each Email
Gateway category detection:
Table 4-158 The relationship between quarantine categories displayed in Message Search
and MQM
Message Search McAfee Quarantine Manager
Anti-Phish Phish
Anti-Spam Spam
Anti-Virus Viruses
Anti-Virus (Packer) Potentially Unwanted Programs | Packers
Anti-Virus (PUP) Potentially Unwanted Programs | Potentially Unwanted Programs
Compliance Unwanted Content | Banned Content
Corrupt Content Unwanted Content | Encrypted or Corrupted
Data Loss Prevention Data Leakage Prevention
Table 4-158 The relationship between quarantine categories displayed in Message Search
and MQM (continued)
Message Search McAfee Quarantine Manager
Encrypted Content Encryption Compliance
File Filtering Unwanted Content | Banned File Type
Mail Filtering Unwanted Content | Mail Format
Mail Size Unwanted Content | Mail Format
Signed Content Unwanted Content | Encrypted or Corrupted
Directory Harvesting Others
Image Filtering Unwanted Content | Image Analysis
Denial of Service Unwanted Content | Banned File Type
A quarantine digest is an email message that the appliance sends to an email user. The digest
describes email messages that have been quarantined for the user because the messages contain
unacceptable content or spam. The digest does not contain information about viruses and other
potentially unwanted program detections.
This page is only available when you have on-box quarantine selected.
Option Definition
Enable digest messages Specifies whether to enable digest messages for the selected protocol preset.
and message Reminds you that digest messages are enabled for this protocol preset.
Protocol preset Allows you to make settings for any exception to the default setting. For
example, you can specify that some parts of the network do not use digest
messages.
Option Definition
or and Reminds you whether digest messages are enabled for this protocol preset.
message
Sender address for Specifies an email address for an administrator to handle any queries from
digest messages senders about the digest.
We recommend that you assign someone who reads email regularly. You can use
the name of a single user or a distribution list.
Option Definition
Message format Specifies the format of the digest message.
For interactive digests, choose HTML. You can then select:
Generate interactive messages When selected, makes each message interactive.
For example, users can release any of their messages that were incorrectly
quarantined as spam.
Add the digest as an email attachment When selected, attaches the digest to the
email message as an HTML file. Otherwise the digest is embedded in the email
message.
Message encoding Specifies the character set encoding for the email message that contains the
digest.
Default value is UTF-8.
Allow users to create To view the settings for user-submitted blacklists and whitelists, select Email |
and manage blacklists Email Policies | Scanning Policies [Spam] | Blacklists and Whitelists | User Submitted in the
and whitelists navigation bar.
To view how quarantine digest messages are displayed when alllowing users to
create and manage blacklists and whitelists, select Allow users to create and manage
blacklists and whitelists and then click Message Preview.
To view examples of the quarantine digest messages seen by your users, click
Message Preview.
Client-server Specifies the communication method for interactive digests when using HTML
communication method forms:
HTTP POST Parameters are hidden, which means internal information is not
visible. However, the users do not receive a response from the appliance when
their requests are received.
HTTP GET Works with any mail client. A user can receive a response from the
appliance. However, information is displayed in the action URL, which means
internal information is visible.
Appliance IP address or Specifies an IP address or a domain name, to appear as the sending information
domain name to use in for the digest messages.
digest messages For example,
192.168.254.200
example.com.
Use the appliance's When selected, uses the (FQDN) format (as specified in the appliance's basic
fully qualified domain settings) instead of an IP address.
name For example, appliance.example.com
Message Preview When clicked, displays an example of the digest that users will see.
Option Definition
Send When clicked, sends all digests that have not been sent since the last scheduled
time or since you last pressed the Send button.
Specify the frequency Specifies how often to send the digests, for example Weekly on Monday at 12
o'clock. We recommend that you select a time when the network is less busy.
Default values are Daily at 3 a.m.
If you select Never, you can send the digests by clicking Send.
Quarantine digests might not be delivered exactly at your specified time. The
appliance staggers the delivery times to prevent overloading the mail servers.
Option Definition
Message subject Specifies the text of the subject line of the email message that carries the
digest.
Default value is Quarantine Summary Digest.
Use the default value When selected, uses the default value. To change any item such as the
(Several occurrences) subject line of the email message that carries the digest, deselect its
corresponding Use the default value checkbox.
Edit the stylesheet When clicked, opens a window that displays the stylesheet that controls the
appearance of the digests when in HTML format. To edit the stylesheet, you
need some knowledge of CSS (Cascading Style Sheets).
Edit the digest report When clicked, opens a window where you can edit the main text of the
digest.
Edit the body text When clicked, opens a window where you can edit the first sentence of the
digest.
You can edit the HTML content directly or at source.
Column headings used in the When Use the default value is deselected, you can change the column headings
message body that the user sees in the digest.
Select a response type Selects the type of message that the appliance sends in response to a
user's request. For example, a user can request a release of email that was
quarantined as spam, and will receive a message to acknowledge the
request.
Edit the response body When clicked, opens a window where you can edit the text of the response
message, if it is in HTML format.
You can edit the HTML content directly or at source.
ePO) the queues for all managed McAfee Email Gateway appliances are displayed. The list includes the
default quarantine queues as well as any queues that have been added.
Compliance Spam
All quarantined messages go to at least one of these queues. However, a message may trigger more
than one quarantine action, and be added to more than one quarantine queue.
Role Restrictions
Access to the quarantine queues is role-based, and each queue can have specific roles assigned. The
primary value of configuring multiple quarantine queues is to control the users that are permitted to
access each queue.
Custom quarantine queues are available only for off-box quarantine, using McAfee Quarantine Manager.
You can add custom quarantine queues to your McAfee Email Gateway appliance. When an email
message triggers a quarantine action, you can direct the message to your custom queue. This action
allows you to track quarantined messages in a more granular manner. You can more easily research
the effectiveness of specific policies by isolating the results of the quarantine actions.
When you create or edit a policy that includes the Quarantine action, select the queue where McAfee
Email Gateway quarantines messages. When you add a queue and apply your changes, the new queue
appears with the other configured queues.
When you create or edit a policy that includes the Quarantine action, select the queue where the McAfee
Email Gateway appliances quarantine the messages. When you add a queue and apply your changes,
the new queue appears with the other configured queues.
Edit This link allows you to change the properties for the selected queue.
You cannot delete any of the default queues delivered with McAfee Email Gateway, and
can only delete custom quarantine queues that are not currently in use.
Add When McAfee Email Gateway is configured to use an off-box McAfee Quarantine
Manager (MQM) service, this button allows you to add a quarantine queue to the
bottom of the list.
Insert When McAfee Email Gateway is configured to use an off-box McAfee Quarantine
Manager (MQM) service, this button allows you to add a quarantine queue and set the
desired priority at the same time.
Task
1 Navigate to Email | Quarantine Configuration | Quarantine Queue Settings.
3 Type the queue name and a brief description in the proper text fields.
You cannot configure permitted roles for a custom quarantine queue.
You cannot change the custom queue name after you have applied your changes.
4 Click OK.
The dialog closes and your new quarantine queue appears at the bottom of the Quarantine Queues
table. The queue is assigned the lowest priority.
5 If you want to change the assigned priority, use the arrows in the Move column to put the queue in
its proper place.
6 Apply your changes by clicking the green checkmark at the upper right of the page.
If you select an existing queue from the list and then click Insert instead of Add, you can create a
quarantine queue and set the desired priority.
If you have configured your appliances to quarantine messages to a McAfee Quarantine Manager, the
custom queue appears on the MQM after you apply the changes.
Even if the defined roles have the ability to access quarantine configuration, they will not
be able to access the specific queues until permission is granted on this page.
If an email message has been quarantined to multiple quarantine queues, the user will be able to see
the message within Message Search. However, unless they have the relevant permissions for all queues to
which the message has been quarantined, they will not be able to view or download the message, or
perform any actions (delete, release, forward) on the message.
Task
1 Navigate to Email | Quarantine Configuration | Quarantine Queue Settings.
2 For the quarantine queue you wish to change, select the Edit link.
The Change Permitted Roles dialog displays, listing all configured roles that have access to Message Search.
The roles assigned to the specific queue are indicated by selection of the check box in the Permitted
column.
3 Make changes to the permitted roles by selecting or deselecting appropriate check boxes.
4 Click OK.
Your reconfigured permissions now appear in the Permitted roles for Message Search on the Role Restrictions
list.
You cannot delete any of the default queues included with the McAfee Email Gateway software. Only
custom quarantine queues that are not currently in use can be deleted.
Task
1 Navigate to Email | Quarantine Configuration | Quarantine Queue Settings.
2 Find the user-defined quarantine queue you want to delete. Click the associated Delete icon to the
far right of the queue name.
Contents
Appliance Management
System Administration
Users
Virtual Hosting
Logging, Alerting and SNMP
Component Management
Setup Wizard
Appliance Management
The Appliance Management pages enable you to reset basic and network settings for the appliance,
and specify settings such as remote access, and DNS and Routing.
Use these pages to define settings for the appliance, such as the domain name and default gateway.
General
Use this page to specify basic settings for the appliance like those you defined in the Setup Wizard.
The appliance can handle IP addresses in IPv4 and IPv6 formats.
Basic Settings displays settings such as the default gateway and domain name.
Network Interface Settings displays the current network interface settings for NIC 1 and NIC 2.
Some sections are relevant only when the appliance is in the appropriate mode.
To prevent duplication of IP addresses on your network and to deter hackers, give the appliance new
IP addresses, and disable the default IP addresses. The IP addresses must be unique and suitable for
your network. Specify as many IP addresses as you need.
Option Definition
<mode> The operating mode that you set during installation or in the Setup Wizard
Network Interface 1 Expands to show the IP address and netmask associated with Network Interface
1, the auto-negotiation state, and the size of the MTU.
Network Interface 2 Expands to show the IP address and netmask associated with Network Interface
2, the auto-negotiation state, and the size of the MTU
Change Network Click to open the Network Interface Wizard to specify the IP address and adapter
Settings settings for NIC 1 and NIC 2, and change the chosen operating mode.
View Network Interface Click to see the <?> associated with LAN1, LAN2, and the out of band interface
Layout
The options you see in the Network Interfaces Wizard depend on the operating mode. On the first
page of the wizard, you can choose to change the operating mode for the appliance. You can change
the settings by clicking Change Network Settings to start a wizard. Click Next to progress through the wizard.
In Explicit Proxy mode, some network devices send traffic to the appliances. The appliance then
works as a proxy, processing traffic on behalf of the devices.
In Transparent Router or Transparent Bridge mode, other network devices, such as mail servers,
are unaware that the appliance has intercepted and scanned the email before forwarding it. The
appliance's operation is transparent to the devices.
If you have a standalone appliance running in transparent bridge mode, you will have the option to add
a bypass device in case the appliance fails.
If the appliance is operating in Transparent Bridge mode, and the Spanning Tree Protocol (STP) is
running on your network, make sure that the appliance is configured according to STP rules.
Additionally, you can set up a bypass device in transparent bridge mode.
To configure your McAfee Email Gateway Blade Server to failover from the management blade to the
failover management blade, you must specify at least one virtual IP address, shared between the
management and failover management blades.
This version of the Network Interfaces Wizard becomes available when you select the Explicit Proxy
mode.
Specify the details for Network Interface 1, then use the Next button to set details for Network Interface
2 as necessary.
Option Definition
IP Address Specifies network addresses to enable the appliance to communicate with your
network. You can specify multiple IP addresses for the appliances network ports. The
IP address at the top of a list is the primary address. Any IP addresses below it are
aliases.
You must have at least one IP address in both Network Interface 1 and Network
Interface 2. However, you can deselect the Enabled option next to any IP addresses that
you do not wish to listen on.
Network Mask Specifies the network mask. In IPv4, you can use a format such as 255.255.255.0, or
CIDR notation, such as 24. In IPv6, you must use the prefix length, for example, 64.
Enabled When selected, the appliance accepts connections on the IP address.
Virtual When selected, the appliance treats this IP address as a virtual address.
Option Definition
New Address/ Add a new address, or remove a selected IP address.
Delete Selected
Addresses
NIC 1 Adapter Expand to set the following options:
Options or NIC
MTU size specifies the Maximum Transmission Unit (MTU) size. The MTU is the
2 Adapter
Options maximum size (expressed in bytes) of a single unit of data (for example, an
Ethernet Frame) that can be sent over the connection. The default value is 1500
bytes.
Autonegotiation state either:
On allows the appliance to negotiate the speed and duplex state for
communicating with other network devices.
Off allows you to select the speed and duplex state.
Connection speed provides a range of speeds. Default value is 100MB.
Option Definition
IP Address Specifies network addresses to enable the appliance to communicate with your
network. You can specify multiple IP addresses for the appliances ports. The IP
address at the top of a list is the primary address. Any IP addresses below it are
aliases.
Network Mask Specifies the network mask, for example: 255.255.255.0. In IPv4, you can use a
format such as 255.255.255.0, or CIDR notation, such as 24. In IPv6, you must use
the prefix length, for example, 64.
Enabled When selected, the appliance accepts connections on that IP address.
Virtual When selected, the appliance treats this IP address as a virtual address. This option
only appears in cluster configurations, or on a McAfee Content Security Blade Server.
Option Definition
New Address/ Add a new address, or remove a selected IP address.
Delete Selected
Addresses
NIC 1 Adapter Expand to set the following options:
Options or NIC
MTU size Specifies the Maximum Transmission Unit (MTU) size. The MTU is the
2 Adapter
Options maximum size (expressed in bytes) of a single unit of data (for example, an
Ethernet Frame) that can be sent over the connection. The default value is 1500
bytes.
Autonegotiation state either:
On allows the appliance to negotiate the speed and duplex state for
communicating with other network devices.
Off allows you to select the speed and duplex state.
Connection speed provides a range of speeds. Default value is 100MB.
Enable sending IPv6 router advertisements on this interface When enabled, allows IPv6 router
advertisements to be sent to machines on the sub-net that require a router
response to complete auto-configuration.
Specify the details for the Ethernet Bridge, then use the Next button to set details for the Spanning Tree
Protocol and Bypass Device as necessary.
Option Definition
Select all Click to select all the IP addresses.
IP Address Specifies network addresses to enable the appliance to communicate with your
network. You can specify multiple IP addresses for the appliances ports. The IP
addresses are combined into one list for both ports. The IP address at the top of a list
is the primary address. Any IP addresses below it are aliases.
Use the Move links to reposition the addresses as necessary.
Network Mask Specifies the network mask, for example: 255.255.255.0. In IPv4, you can use a
format such as 255.255.255.0, or CIDR notation, such as 24. In IPv6, you must use
the prefix length, for example, 64.
Enabled When selected, the appliance accepts connections on that IP address.
Option Definition
New Address/ Add a new address, or remove a selected IP address.
Delete Selected
Addresses
NIC Adapter Expand to set the following options:
Options
MTU size specifies the Maximum Transmission Unit (MTU) size. The MTU is the
maximum size (expressed in bytes) of a single unit of data (for example, an Ethernet
Frame) that can be sent over the connection. The default value is 1500 bytes.
Autonegotiation state either:
On allows the appliance to negotiate the speed and duplex state for
communicating with other network devices.
Off allows you to select the speed and duplex state.
Connection speed provides a range of speeds. Default value is 100MB.
Option Definition
Enable STP STP is enabled by default.
Bridge priority Sets the priority for the STP bridge. Lower numbers have a higher priority. The
maximum number that you can set is 65535.
Advanced parameters Expand to set the following options. Change the settings only if you understand
the possible effects, or you have consulted an expert:
Forwarding delay Garbage collection interval (seconds)
Hello interval (seconds) Ageing time (seconds)
Maximum age (seconds)
Option Definition
The bypass device inherits settings from those you entered in NIC Adapter Options
.
Select bypass device Choose from two supported devices.
Watchdog timeout For the bypass device, the time, in seconds, that can elapse before the system
(seconds) bypasses the appliance.
Option Definition
Heartbeat interval Set to monitor heartbeat by default.
(seconds)
Advanced parameters This option becomes active when you select a bypass device.
Mode choose to monitor the heartbeat or the heartbeat and the link activity.
Link activity timeout (seconds) becomes active when you select Monitor heartbeat and link
activity in Mode
Enable buzzer enabled by default. If the bypass device fails to detect the
heartbeat signal for the configured Watchdog timeout, the buzzer sounds.
Routing
Domain Name System (DNS) servers translate or map the names of network devices into IP
addresses. Use the arrows to move the servers up and down the list. The first server in the list must
be your nearest, or most reliable server. If the first server cannot resolve the request, the appliance
contacts the second server. If no servers in the list can resolve the request, the appliance forwards the
request to the DNS root name servers on the Internet.
By default, the appliance uses the common dynamic routing protocol called Routing Information
Protocol (RIP).
Option Definition
Server Address Displays the IP addresses of the DNS servers. The first server in the list must be your
fastest or most reliable server. If the first server cannot resolve the request, the
appliance contacts the second server. If no servers in the list can resolve the request,
the appliance forwards the request to the DNS root name servers on the Internet.
If your firewall prevents DNS lookup (typically on port 53), specify the IP address of a
local device that provides name resolution
New Server/ Adds a new server to the list, or removes one when, for example, you need to
Delete Selected decommission a server due to network changes. Use the arrows to move the servers
Servers up and down the list.
Only send Selected by default. McAfee recommends that you leave this option selected because it
queries to these might speed up DNS queries as the appliance sends the queries to the specified DNS
servers servers only. If they don't know the address, they go to the root DNS servers on the
Internet. When they get a reply, the appliance receives it and caches the response so
that other servers that query that DNS server can get an answer more quickly.
If you deselect this option, the appliance first tries to resolve the requests, or might
query DNS servers outside your network.
Option Definition
Network Address Type the network address of the route.
Mask Specifies how many hosts are on your network, for example, 255.255.255.0.
Gateway Specifies the IP address of the router used as the next hop out of the network. The
address 0.0.0.0 (IPv4), or :: (IPv6) means that the router has no default gateway.
Metric Specifies the preference given to the route. A low number indicates a high
preference for that route.
New Route / Add a new route to the table, or remove one. Use the arrows to move the route up
Delete Selected and down the list. The routes are chosen based on their metric value.
Routes
Enable dynamic Use this option in transparent router mode only. When enabled, the appliance can:
routing
receive broadcast routing information received over RIP (default) that it applies its
routing table so you don't have to duplicate routing information on the appliance
that is already present in the network.
broadcast routing information if static routes have been configured through the
user interface over RIP.
Task
1 Click System | Appliance Management | DNS and Routing.
2 Click New Server and type the IP address. The appliance sends requests to DNS servers in the order
that they are listed.
3 If necessary, click Only send queries to these servers, and choose the servers.
Task
1 Go to System | Appliance Management | DNS and Routing.
Gateway
Metric
Useful websites
http://www.ntp.org
Correct time settings are important to ensure the appliance keeps its logs, reports and schedules
accurate.
You can provide the details manually, or from your own computer, or via the Network Time Protocol
(NTP).
Option Definition
Appliance Time Specifies the time zone of the appliance. You might need to set this twice each year
Zone if your region observes daylight saving time.
Appliance Time Specifies the date and UTC time for the appliance. To select the date, click the
(UTC) calendar icon. You can determine the UTC time from websites such as http://
www.worldtimeserver.com.
Set Now When clicked, applies the date and UTC time that you specified in this row.
Client Time Displays the time according to the client computer from which your browser is
currently connected to the appliance.
Synchronize When selected, the time in the Appliance Time (UTC) immediately takes its value from
appliance with Client Time. You can use this checkbox as an alternative to manual setting of Appliance
client Time (UTC). The appliance calculates the UTC time based on the time zone that it finds
on the client's browser.
Ensure that the client computer is aware of any daylight savings adjustments. To find
the setting on Microsoft Windows, right-click the time display in the bottom right
corner of the screen.
Enable NTP When selected, accepts NTP messages from a specified server or a network
broadcast. NTP synchronizes timekeeping among devices in a network. Some
Internet Service Providers (ISPs) provide a timekeeping service. Because NTP
messages are not sent often, they do not noticeably affect the appliance's
performance.
Enable NTP client When selected, accepts NTP messages from network broadcasts only. This method
broadcasts is useful on a busy network but must trust other devices in the network.
When deselected, accepts NTP messages only from servers specified in the list.
NTP Server Displays the network address or a domain name of one or more NTP servers that
the appliance uses. For example, time.nist.gov.
If you specify several servers, the appliance examines each NTP message in turn to
determine the correct time.
Task Using an NTP Server to set the appliance date and time
Use this task to add an NTP server to manage the appliance time and date.
Task
1 Click System | Appliance Management | Time and Date.
Remote Access
Use this page to provide the methods of accessing the appliance remotely.
You can still access the user interface using the IP address of the appliance itself.
This feature controls the access to the user interface and the secure shell, and provides an extra layer
of protection in addition to that provided by username and password authentication.
Use the out-of-band interface if you do not want the user interface or secure shell to be accessible on
the same network as the data traffic that is being scanned.
Option Definition
Enable the Click to enable the use of Secure Shell (SSH) to connect remotely to your appliance. By
secure shell default, when you enable the use of SSH, it allows all hosts or networks that can access
the appliance.
Click Allow permitted hosts / networks listed below, then select New Address to add only the specified
devices access.
You can use your SSH client to access the support account on the appliance. Use the
same password that you use to access the interface from a remote computer.
If you are using out-of-band management and have blocked port 22, change the SSH
configuration to allow Secure Shell access.
Permitted Displays details of devices that can access the appliance. By default, access is available to
Host / ALL hosts or networks that can use Secure Shell (SSH).
Network The entries here are added to the /etc/hosts.allow file, and therefore must follow its
conventions. We recommend that you allow access to known domains or users initially.
Click New Address / Delete Selected Addresses to add or remove permitted hosts or networks
from the list.
To add a network use the following notation formats:
IPv4: 192.168.5.0/24 or 192.168.5.0/255.255.255.0 (allows every host with a
network address beginning 192.168.5 to access the secure shell)
IPv6: [3ffe:505:2:1::]/64 (allows every address in the range `3ffe:505:2:1::
through `3ffe:505:2:1:ffff:ffff:ffff:ffff)
domain wildcards: *.example.com (allows all hosts in the example.com domain to
access the secure shell)
To add an individual host, use the following notation formats:
IPv4: 192.168.0.5 (only allows the particular IP address to access the secure shell)
IPv6: [2001:470:921b:7896::3c]. The [ ] must be typed.
hostname: host1.example.com (only allows host1 in the example.com domain to
access the secure shell)
Option Definition
Management Port This field allows you to specify the port used to access the User Interface.
When the McAfee Email Gateway is first installed, port 443 is used. However, during
the configuration process, this value is changed by default to 10443.
If you intend using any of the encryption features within McAfee Email Gateway, you
must change the management port to 10443 and apply these settings.
Option Definition
Allow permitted Displays details of devices that can access the appliance through its web-based
hosts/networks interface (IPv4 addresses only). Restricts access to the user interface to the hosts
listed below or networks that you specify here. By default, access is available to ALL devices.
Click New Address / Delete Selected Addresses to add or remove permitted hosts or
networks from the list.
Type the IP addresses or domains carefully, otherwise the appliance can become
inaccessible.
Administrator's The email address of the main appliance administrator. This address appears if
Email Address someone tries to access an invalid page on the appliance user interface in the form
of the webmaster's email address.
Normally, the commands you issue to the appliance are part of the network traffic. With out-of-band
management, your commands are directed to a third port on the appliance, and become separate (or
out-of-band) from the other network traffic.
Before enabling out-of-band management, make sure you have first connected the external
USB-Ethernet adapter to your appliance and to a suitable network. Some later appliances have inbuilt
out-of-band management already, and do not need to have it separately enabled. To find out whether
this applies to your appliance, see the Email Gateway Quick Start guide.
Option Definition
Enable the out of When selected, allows you to control the appliance through a direct connection.
band interface
Ethernet adapter Offers a choice of Ethernet adapter, such as Belkin F5D5050 for a USB network
adapter, or Gb4(mb3) for in-built network adapter.
IP Address / Specifies the IP address and network mask for the port.
netmask
You cannot type an IP address that is on the same subnet as the normal operational
ports.
Option Definition
NIC Adapter Options Specifies various details for the out-of-band connection, which is effectively a third
NIC connection for the appliance.
MTU size the maximum size (expressed in bytes) of a single unit of data (for
example, an Ethernet Frame) that can be sent over the connection. Default value
is 1500 bytes.
Autonegotiation state on by default.
Connection speed 100Mbps by default.
Duplex state Full by default.
Enable IPv6 auto-configuration Select this option to allow the appliance automatically
configure its IPv6 addresses and IPv6 default next-hop router, by receiving
Router Advertisement messages sent from your IPv6 router.
Enable in-band Specifies ports to prevent any attempts to access the appliance via ports over the
management main (non-management) interface.
New Port
Delete Selected Port
In 3300 and 3400 versions of the appliance, there is a built-in remote access card installed. This
section of the interface will not appear on other appliance models.
Option Definition
Enable remote access Select to have the appliance manage the remote access card through the user
card configuration interface.
Listening port Set the listening port. Set to 443 by default.
Obtain an IP address Select whether you want the appliance to obtain an IP address dynamically
dynamically using DHCP using DHCP
IP address / netmask Specifies the IP address and network mask for the port.
You cannot type an IP address that is on the same subnet as the normal
operational ports.
Option Definition
DRAC Network Options Expand this option to:
Specify the default gateway
Select whether you want the appliance to obtain DNS information dynamically
using DHCP
Add the primary and secondary DNS servers
Task
1 Go to System | Appliance Management | Remote Access.
3 Use the drop-down box to select the USB driver, or in-built ethernet adapter.
5 Expand the NIC Adapter Options area (optional), and change any necessary information .
Task
1 Access the appliance through the out-of-band interface, and go to System | Appliance Management |
Remote Access.
2 Deselect Enable in-band management. By default, the user interface (port 443), the secure shell (port
22), and SNMP (port 161) are blocked on the appliance IP address.
3 Click New Port to add any new ports that you want to block on the main appliance IP address and
only access through the management network.
To monitor your appliance using mechanisms such as the off-box syslog feature, go to System |
Logging, Alerting and SNMP, and configure the remote server, ensuring that it can be routed through the
out-of-band network.
Option Definition
Country [C] Specifies a two-letter code such CN, DE, ES, FR, JP, KR. (See ISO 3166)
Default value is US.
State or province [ST] Specifies the location of your organization. Give a full name rather than an
Town or city [L] abbreviation.
Organization [O] Specifies the name of your organization such as Example, Inc.
Organizational unit [OU] Default value is Email Gateway.
Common name [CN] Displays the domain name of your appliance such as server1.example.com
Email address [ea] Specifies an email address, for example aaa@mcafee.com
Import When clicked, opens a window where you can specify the file.
To import a password-protected certificate, type the passphrase to unlock the
private key. The appliance stores the decrypted certificate in a secure internal
location.
The appliance only verifies the certificate, and makes it available to use, after
Export When clicked, opens a window where you can specify a passphrase, then
download a file. The file name extension is CRT (base-64 encoded) or P12
(PKCS#12). The certificate is in PEM format.
Generate Certificate When clicked, opens a window where you can request that the Certificate
Signing Request Signing Request is signed by a Certificate Authority on the appliance or by an
external Certificate Authority. The file name extension is CSR.
Regenerate When clicked, you are prompted to confirm that you want to regenerate the
certificate and private key.
This page only appears if you have not selected Export the certificate only (no private keys) on page 1 of this
wizard.
Depending on your browser, you may need to right-click the link and select the option to save the file
locally.
When the file has been downloaded locally, click Finish to close this wizard.
UPS Settings
Understand how to configure your McAfee Email Gateway to work with third-party Uninterruptible
Power Supply (UPS) systems.
Using a name and password, other devices (called "clients") can access information from the appliance
about the UPS systems, allowing the clients to respond to an imminent loss of power.
Option Definition
Delay before shutting Specifies the number of minutes before the appliance shuts down. The default As
down the appliance long as possible option means that the power stays on until the UPS signals that the
when switching to UPS battery is low. If you set the minutes value to zero, the appliance shuts down
power immediately.
Status Displays the status of the device:
Operating normally.
Needs attention.
Devices and Driver Displays the type (model) of the UPS device and driver.
Type Displays the type of connection between the appliance and the UPS USB
Cable, Serial Cable, or Network.
New Device When clicked, opens the Add UPS Device wizard where you can specify UPS settings
for the (master) appliance that connects to the UPS, or settings for one or more
appliances (slaves) that connect to the master appliance via the network.
Option Definition
Appliance Name or Displays the IP address of the monitoring device.
Address
Type Displays the status of the monitoring device. Every added device is defined as
Slave. This list always contains one Master entry.
New Client When clicked, opens a window, where you can specify the address of the client,
and a user name and password that the client must specify to access the UPS
information. The user name and password are those specified when you set up the
master device.
Task
1 Connect the USB UPS to the appliance to ensure the list displays the UPS.
5 Select the appropriate values for Vendor Name, UPS Device Model, and Attached USB Device.
To begin with, you can keep the default Off delay and On delay settings.
8 Edit the settings for the following options as applicable for more information:
Remaining battery level when UPS switches to low battery
Task
1 Connect the serial UPS to the appliance using the serial cable supplied with the UPS.
5 Select appropriate values for Vendor Name, UPS Device Model, and Serial Port.
7 Click Edit to change the settings for the following options as applicable for more information:
Remaining battery level when UPS switches to low battery
These options appear when the UPS is working (shown by a green checkmark in the Status column).
Task Configure your appliance to accept UPS status requests from other
appliances
Use this task to have the appliance accept UPS status requests from other appliances.
Task
1 Ensure that your UPS is working (a green checkmark shows in the Status column).
4 In Client Address, type the IP address of the client that you wish to allow queries from.
5 Note the information in the Username and Password fields; you will need them later to enter into
the client machine.
6 Select OK.
Task
1 Complete the steps in Configure your appliance to accept UPS status requests from other
appliances.
4 Select Get Power status from another appliance and click Next.
5 Type in the name or IP address of the appliance that has the UPS connected to it.
6 Add the username and password displayed that you made a note of in Configure your appliance to
accept UPS status requests from other appliances.
7 Click Test Authentication to check that the communication is working, then click Finish and apply
changes.
The options you see in the wizard depend on the type of device that you choose.
Option Definition
Vendor name Lists supported vendors
UPS device model Select from the list of supported USB models supplied by the vendor you chose
Attached USB device Details of the USB device
Option Definition
Off delay The length of time, in seconds, that the UPS waits before turning off the UPS after
it receives the "turn off" command
On delay The length of time, in seconds, that the UPS waits before restoring power after the
mains power returns
You can set the appliance to use different servers for each of those actions in their related configuration
wizards.
Option Definition
Proxy server Enter the proxy server address.
Proxy port Enter the port used to transfer updates over HTTP.
By default, this is port 80.
Proxy username Enter the username used to log onto the proxy server.
Proxy password Enter the password used to log onto the proxy server.
Option Definition
Proxy server Enter the proxy server address.
Proxy port Enter the port used to transfer updates over FTP
By default, this is port 21.
Proxy username Enter the username used to log onto the proxy server.
Proxy password Enter the password used to log onto the proxy server.
Option Definition
Transfer to FTP Selected by default:
Server
Server Proxy server
Port Proxy port
Directory Proxy username
Username (default value is Proxy password
anonymous)
Password (default value is
anonymous)
Transfer via SSH Click to specify the settings to transfer the backup using SSH:
Server
Port
Directory
Username (default value is anonymous)
Password Authentication/Password (default value is anonymous)
Public Key Authentication/Public key (links to the public key)
If you use either FTP or SSH with password authentication, your passwords are stored in the appliance
configuration files, in plain text format. The most secure option is to use SSH with public key
authentication. To use this feature, you must click the link to generate a key file, which you must then
copy and paste into your authorized keys file so that the appliance can perform the backup.
System Administration
The System Administration pages provide you with the features you need to enable you to set up and
maintain your McAfee Email Gateway.
From these pages you can backup and restore your configurations, push configurations from one
appliance to others, and set up the cluster management for your groups of McAfee Email Gateway
appliances. You can also carry out database maintenance and access the rescue image features for
your appliance. Use the system administration pages to access the system commands for shutting
down and rebooting your McAfee Email Gateway.
Contents
Configuration Management
Configuration Push
Cluster Management
Option definitions MAC Addresses
Resilient Mode
Configure Automatic Configuration Backups wizard
Database Maintenance
Rescue Image
System Commands
Configuration Management
Use this page to back up and restore the information about the appliances configuration.
Restore Configuration
Configuration Report
Option Definition
Backup Configuration When clicked, puts all the appliances configuration settings into a file, and allows
you to download the file.
You can safely store configuration details about the appliance offline, and restore
that information later if the original appliance fails. The system configuration files
are saved to a .zip file, which contains mainly XML files and associated DTD files.
The .zip file size is typically less than 1MB.
Save the config When clicked, allows you to download the configuration file.
The link is active only after the configuration file has been generated.
Include the Data Loss When selected, automatically includes information in the backup file about any
Prevention database DLP categories and file fingerprints. To find the contents of the DLP database, go
to Email | DLP and Dictionaries.
Include TLS When selected, includes information in the backup file about any digital
certificates and certificates and private keys that are stored on the appliance. You need to
private keys consider the security of your private keys.
To find the certificates, go to Email | Certificate Management | Certificates | TLS Certificates
and Keys.
By default, the TLS certificates and private keys are not encrypted when stored in
the backup file.
Option Definition
Encrypt private keys When Include TLS certificates and private keys is selected, choose to encrypt the private
keys. You will need to specify the Passphrase.
Include Email Hybrid When selected, includes information in the backup file about any digital
configuration certificates and private keys relating to Email Hybrid implementation that are
stored on the appliance.
The Email Hybrid private key is not encrypted when stored in the backup file.
Include Secure Web When selected, includes information in the backup file about any public
Mail user and system certificates and private keys, as well as configuration details for each domain and
data each user that are configured for Secure Web Mail.
Enable automatic When selected, configuration backups are made periodically and sent to a server
backup whose details you can specify. If no server is configured already, the Configure
Automatic Configuration Backups wizard starts. Otherwise, click the link next to
Backup Scheduled to specify the server.
When enabled, you can select the following options:
Include the Data Loss Prevention database
Include TLS certificates and private keys
Include Secure Web Mail user and system data
Include Email Hybrid configuration
Automatically backup when you apply configuration
Show Differences Select more than one configuration change, and click to display the files that have
been changed. Select a file, and click Show Difference to display the configuration
differences in code view between them.
Rollback Changes Select a configuration change, and click to select the values to restore. Secure
Web Mail user and system data configuration changes are not rolled back.
Configuration Push
Use this page to copy the settings on one appliance to other appliances.
Network settings:
Default routes
IP addresses
Load-balancing settings
Static routes
Proxy settings
Automatic Configuration push Check this to automatically push configurations to other appliances
each time you apply configuration changes to this appliance.
Scheduled Configuration push Specify how often you want this appliance to carry out a scheduled
configuration push. The options are:
Never
Hourly
Daily
Weekly
Cluster Management
Use this page to specify the cluster and load-balancing requirements for the McAfee Email Gateway
when acting as part of a cluster.
When configuring a group of appliances or a McAfee Email Gateway Blade Server the current master
uses a "least used" algorithm to assign connections to the appliances or blades configured to scan
traffic. The scanning appliance or blade that is currently showing the least number of connections, at
that moment in time, is assigned the next connection.
If you have only a master and a failover appliance, with both configured to scan traffic, the master
will send most connections to the failover appliance for scanning.
If you have scanning appliances, and scanning enabled on the master and failover, then the
scanning appliances will receive the most traffic to scan, then the failover, with the master
receiving the least. If you have more than three appliances in a cluster, McAfee recommends that
you do not enable scanning on the master appliance.
You cannot configure the master or the failover blades of the McAfee Email Gateway Blade Server to
scan traffic.
McAfee recommends that when using your appliance in a cluster environment, you use McAfee
Quarantine Manager to quarantine Email messages.
Additionally, by setting the cluster features, you are also providing redundancy in the event of
hardware failure; by configuring a master and a failover master appliance, and also by having several
scanning appliances (or blades) your email traffic can still be scanned in the event of a single
appliance or blade failing.
Option Definition
Cluster mode Specifies the clustering mode of the appliance:
Off This is a standard appliance.
Cluster Scanner The appliance receives its scanning workload from a master
appliance.
Cluster Master The appliance controls the scanning workload for several other
appliances.
Cluster Failover If the master fails, this appliance controls the scanning workload
instead.
For a McAfee Email Gateway Blade Server, this specifies the type of blade as follows:
Cluster Master The master management blade controls the scanning workload for
several scanning blades.
Cluster Failover If the master management blade fails, this failover management
blade controls the scanning workload instead.
DHCP address The management blade is responsible for issuing IP addresses to any attached
range (Content scanning blades via DHCP (Dynamic Host Configuration Protocol).
Security Specify the range of address that will be issued to scanning blades. The DHCP range
Blade Servers is limited to a single subnet. The permissible range for the starting address is 1 - 253
only) while that for the ending address is 2 - 254.
Address to use for load Specify the IP address used for load balancing within the cluster.
balancing
Enable scanning on this If not selected, this appliance distributes all scanning workload to the scanning
appliance (Not appliances.
applicable on
Content Security For a cluster of appliances, if you have only a master and a failover appliance,
Blade Servers) with both configured to scan traffic, the master will send most connections to
the failover appliance for scanning.
Configure New Clicking this button allows you to configure another blade as a management
Management Device blade.
(Content Security The available options are:
Blade Server only)
Configure next device the next blade that is PXE booted will be imaged as a
management blade.
A device with the following MAC address when the blade with the MAC address you
specify is PXE booted, it will be imaged as a management blade.
Once the chosen blade is imaged as a management blade, this option is reset.
Option Definition
MAC Address Specifies the device's Media Access Control (MAC) address as 12 hexadecimal
digits in the format: A1:B2:C3:D4:E5:F6.
Disabled Select to remove this device from the pool of scanning devices.
Encryption Storage If the scanning device is in a ready state, you can choose to include the device in
the Encryption Storage pool.
Add MAC Address Click to add the MAC address of a new device.
Manage MAC Addresses Opens the MAC Addresses dialog box that enables you to manage the list of
available MAC addresses.
Although you can add the MAC addresses of management and failover devices to this table, they always
contribute hard disk space for Secure Web Mail messages and cannot be disabled.
This wizard steps you through the process to configure the network interfaces when configuring your
appliance as part of a cluster.
The options that are displayed as you progress through the wizard depend on the operating mode and
other selections that you make. This means that you may not see all the controls and fields detailed in
this topic.
When configuring a cluster in either explicit proxy mode or transparent router mode, you need to
configure a virtual IP address that is on the same subnet as both the real IP addresses for the master
and the failover appliances. This ensures that traffic is directed to whichever appliance is currently
acting as the master appliance.
Network Interface 2 is not shown if you select explicit proxy as your operating mode.
You must have at least one IP address in both Network Interface 1 and Network
Interface 2. However, you can deselect the Enabled option next to any IP addresses that
you do not wish to listen on.
Network Mask Specifies the network mask. In IPv4, you can use a format such as 255.255.255.0,
or CIDR notation, such as 24. In IPv6, you must use the prefix length, for example,
64.
Enabled When selected, the appliance accepts connections on the IP address.
Virtual When selected, the appliance treats this IP address as a virtual address. This option
only appears in cluster configurations, or on a McAfee Content Security Blade Server.
Option Definition
Attached devices The section contains a list of devices that are currently members of the cluster.
Each device is identified by its MAC address and hostname and you can check the
items that you want to be included in the MAC address table.
If you are setting up your cluster, this section will be empty.
Unknown devices The section contains a list of MAC addresses that are not currently in the cluster.
(not available
from within the Only the MAC address is shown since the device is unrecognized.
Setup Wizard) If you are setting up your cluster all MAC addresses will appear in this section.
If the cluster has already been configured, a device may be unknown because the
appliance is currently unreachable over the network. You can check the items that
you want to be removed from the MAC address table.
Option Definition
Additional devices The section offers a convenient way of adding the MAC addresses of devices that
you intend to add to the cluster at a future time.
You may enter any number of addresses separated by spaces.
You will not be able to configure the Encryption Storage option for these unless they are
the addresses of devices that are currently members of the cluster.
Lock DHCP server Check this option to prevent the management blade from acknowledging DHCP
to MAC addresses requests sent by arbitrary hosts on its network.
(Content If selected, you should add the MAC addresses of all scanning blades that you
Security Blade intend adding to your cluster to the MAC address table. Failing to do this will
Servers only) prevent a scanning blade from acquiring the correct IP address.
Since the state of the cluster updates periodically, it is possible for a device to move from the unknown
section to the attached section (or vice versa) while you are working in this dialog. This may happen if a
device has just rebooted, for example.
Resilient Mode
Use this page of the user interface to enable resiliency mode on your blade server.
This page only applies to the McAfee Content Security Blade Server.
These multiple pathways provide enhanced resiliency to the failure of any one component either within
the blade server, or of the network devices or cabling needed to route traffic between your network
and the blade server.
Option Definition
Enable Resilient Within this area, you can check the current status regarding resiliency of your blade
Mode server.
You can also enable or disable resiliency mode.
Ensure that you have downloaded the chassis configuration files before enabling
resiliency mode.
After clicking Enable Resilient Mode or Disable Resilient Mode, and clicking OK on the
warning dialog box, your blade server will automatically be shut down,
allowing you to make the required cabling changes.
Configuration Files From the user interface, you can view or download the interconnect configuration
files for both resilient and non-resilient mode operation for all the interconnects.
Option Definition
Transfer to FTP Selected by default:
Server
Server Proxy server
Port Proxy port
Directory Proxy username
Username (default value is Proxy password
anonymous)
Password (default value is
anonymous)
Transfer via SSH Click to specify the settings to transfer the backup using SSH:
Server
Port
Directory
Username (default value is anonymous)
Password Authentication/Password (default value is anonymous)
Public Key Authentication/Public key (links to the public key)
If you use either FTP or SSH with password authentication, your passwords are stored in the appliance
configuration files, in plain text format. The most secure option is to use SSH with public key
authentication. To use this feature, you must click the link to generate a key file, which you must then
copy and paste into your authorized keys file so that the appliance can perform the backup.
McAfee recommends that you update all scanning components on a new appliance using the Update
Now feature, then use the Schedule feature for each component to create regular updates at a time
when traffic is low, such as during the night.
Option Definition
Hourly to Weekly Specifies the schedule. If you do not need this feature, select Never.
Next / Finish Moves to the next page of the wizard , or closes it and applies the settings.
Option Definition
Test Checks that the backup configuration works, and provides the desired information.
Database Maintenance
Use this page to manage the number of events contained in the reporting database, and the number
of items identified using the Message Search feature, and to enable external devices to access
information about email events via SQL.
Event Options
External Access
Maintenance
Over time, databases tend to increase in size, consuming available resources and becoming slower to
access to save information or to run reports. Regular maintenance of databases helps to avoid these
problems.
Retention Limits The appliance uses information from this database to display the reports that you
can view from Reports on the navigation bar. Information about earlier events is removed
periodically.
Retention limits are dependent on the type of hardware and the size of the appliance hard disk
space. McAfee recommends that you do not change these values unless directed to do so by your
McAfee Support representative.
Event Options You can choose the following options relating to information about events:
Insert events into the database. Doing this can provide useful information in reports, but will increase
the amount of data that is written to, or read from the database.
Insert only primary events into the database. Allow only the most important events data to be logged to
the database.
Pass on events to the logging channels. Select to allow data about events to be available to other
logging methods available from the appliance.
External Access External access to a limited set of views in the reports database on an appliance
can be configured.
Enable off box sql access. Select to allow access to the appliance' database.
Enable external database access for this address range. Limit the systems that can access the external
database to machines within a specified IP address range.
Allow external database to user. Select the level of user that can configure external database access.
Maintenance When run, the maintenance tasks trim the contents of the reporting database and
items identified using the Message Search feature according to the settings in the Retention Limits
area.
McAfee recommends that you clean up the reporting database and message search items regularly
to prevent the database from becoming too large.
Retention limits are dependent on the appliance model, the type of hardware and the amount of
appliance hard disk space. McAfee recommends that you do not change these values unless directed to
do so by your McAfee Support representative.
Option Definition
Events Items shown in the reporting database.
Please refer to the user interface for these retention limits.
Quarantined emails Maximum number or length of time that messages can be held in the quarantine
database.
Please refer to the user interface for these retention limits.
Delivery status Maximum number or length of time that delivered, blocked or bounced
(delivered, blocked, messages can be stored in the database for use by the Message Search feature.
bounced) Please refer to the user interface for these retention limits.
Option Definition
Insert events into the Select to add information about reporting events into the database. Be aware
database that the database can fill quickly when reporting events are stored.
McAfee recommends that Content Security Blade Server users use the offbox
syslog feature for reporting events and deselect this option.
Insert only primary Select to add information only about primary reporting events into the database,
events into the database such as virus detections.
A message that triggers both a virus and spam "hit" is logged twice in the
database. If you deselect this option, only the detection that caused the primary
action on the message is logged in the database.
Pass on events to the Select to allow events to be passed to the logging channels from logging and
logging channels alerting sources such as syslog, SNMP, and email detections.
Option Definition
Enable off box sql access Select to allow an off box SQL client to access the appliance.
Allow external database access for Define the address and subnet mask for the external hosts to which
this address range you want to allow access.
Allow external database access to Define the user that the external client uses to log into the appliance.
user This is set to reporter by default.
Set Reporting Password Define the password that the external database uses to log into the
appliance. This is set to reports by default.
Option Definition
Maintenance schedule Select the frequency that the appliance carries out database maintenance tasks.
The default is every 30 minutes.
Reset Database Enter the password and then click Reset Database to return the database to its default
state.
Maintain Database Click to manually start the database maintenance tasks ever X minutes. The
database checks for items in the reporting database or identified using the
Message Search feature have reached the retention limit that you set.
Task
1 Open the command line on the computer from which you want to view the database.
2 Type psql -U <username> -d reports - h <host address> and press the Enter key.
3 Type the password for the user to whom you gave access.
4 Press the Enter key to see the list of report view that you have available. Choose from:
Email_details
Configuration_change_view.
Rescue Image
Use this section to force the McAfee Email Gateway to boot from a rescue image stored on a protected
partition on the hard disk. You can also manage your rescue images and create a bootable USB drive
containing the rescue image from here.
On a USB drive:
attached to one of the external USB connectors on the appliance
mounted internally within the appliance if you have fitted an optional internal USB drive to
your appliance. (Applies to appliances based on the Dell R610 hardware only.)
Creating a bootable rescue image on a USB drive will result in the loss of all files located on the USB
device.
To prevent tampering or accidental stopping, you must type the appliance password to operate these
features.
The rescue image negates the requirement for remote access cards to be fitted to your appliance
(if you have suitable appliance models) in order for the appliances to be reimaged from a remote
location.
By creating a library of stored rescue images on your local network or on a local FTP or HTTP
server, you can use the rescue images to roll back your appliance to a previous .iso release of the
software, or to upgrade to a newer version. You do this by importing the required image to the
rescue partition on your appliance and then forcing your appliance to boot from the newly imported
rescue image using the Perform a full installation overwriting existing data option. To roll back, you need to
use the option 2 or 3 settings; to upgrade you need to use option 2, 3 or 4 settings.
Option Definition
Rescue image details Provides details of the rescue image currently stored within the rescue partition of
your appliance.
Force Boot from Provides options to reboot your appliance from a rescue image:
Rescue Image
Boot to menu
If you select Boot to menu, ensure that you are either local to the appliance, or
that you have access to the appliance using a DRAC card.
Import Image Browse to a rescue image stored on your local drive, and copy this image onto
the rescue partition on your appliance.
Download Image from Browse to a rescue image stored on a local FTP or HTTP server, and copy this
Server image onto the rescue partition on your appliance.
Export Image Save a rescue image to a file, or select a USB drive to create a bootable copy of
the rescue image on the USB drive.
Refresh USB Device Click to refresh the USB devices shown in the drop down list on the left of this
List option.
Burn Image to USB Click to copy the rescue image onto a USB.
Task
1 Click System | System Administration | Rescue Image.
2 Verify the version information displayed under Rescue image details, or from the About the Appliance
window.
Task Updating the rescue image held on the appliances' hard disk from a local
network or drive
Use this task to update the rescue image on the appliance hard disk from a local drive.
The software allows you to overwrite the rescue partition with a new image, without re-installing the
software. You can import an image from a local network or drive.
Task
1 Click System | System Administration | Rescue Image.
4 Click OK.
Task Updating the rescue image held on the appliances' hard disk from a local
FTP or HTTP server
Use this ask to update the rescue image from a local FTP or HTTP server without re-installing the
software.
You can import an image from a local FTP or HTTP server.
Task
1 Click System | System Administration | Rescue Image.
3 Specify the server settings, and if required, your proxy settings and passwords.
4 Click OK.
Task Installing from the rescue image on the appliances' hard disk
Use this task to install a rescue image on an appliance.
When you have verified that you have the correct version of the rescue image stored on the protected
partition of the appliances' hard disk, you can use this image to reimage your appliance
Task
1 Click System | System Administration | Rescue Image.
3 Select from:
Boot to menu
If you select Boot to menu, ensure that you are either local to the appliance, or that you have
access to the appliance using a DRAC card.
Perform a full installation overwriting existing date but preserving network settings
If you select either of the full installation options, you will need to take further action to import
saved configurations, or to re-configure the appliance.
5 Click OK.
The appliance reboots, and uses the rescue image to reimage the appliance, using the installation
options you selected.
To create an image on a USB drive, you can export the image to any suitable USB drive connected to
your appliance.
You cannot export a rescue image to a USB drive from the VMtrial version of the software.
If you have fitted an optional internal USB drive to your appliance, you can select this USB drive.
(Applies to appliances based on the Dell R610 hardware only.)
Task
1 Click System | System Administration | Rescue Image.
3 Select the required USB device from the USB device drop-down list.
The rescue image is copied to the USB drive, overwriting any existing files, and creates a bootable
image.
Task Installing from the rescue image on the appliance USB drive
Use this task to install from the rescue image on the appliance USB drive.
You can use the bootable rescue image stored on an external USB drive, or on an internal USB drive
(hardware dependant) to reimage your appliance.
Task
1 Click System | System Administration | Rescue Image.
2 Ensure that the USB drive with the correct version of the rescue image is attached to your
appliance.
4 Enter the appliance password into the text box next to Reboot Appliance in the System Commands section.
6 As the appliance reboots, choose Boot Menu using the appliances' keyboard and monitor.
The appliance reboots, and uses the rescue image found on the USB drive to reimage the appliance,
using the installation options you select in the standard license and console displayed on the monitor
connected to the appliance.
Task - Create a bootable USB drive rescue image without using the
appliance
Use this task to create a bootable rescue image on a USB drive without using your appliance.
Task
1 Browse to the McAfee download site, and enter your Grant Number.
2 Download the .iso file for the version of the Email Gateway appliance software.
3 Create a bootable image on the USB drive from the downloaded file, using suitable system
commands or disk-imaging software.
System Commands
Use this page to safely turn off the appliance, reboot the appliance, or revert to factory default
settings.
To prevent tampering or accidental stopping, you must type the password to operate these features.
On occasion, you may need to shut down your appliance, perhaps due to work being carried out on
your power distribution system, or changes to your network topography. You may also need to reboot
the appliance, either as part of a software upgrade, or to restart all services.
Occasionally, you may want to clear all configured options from your appliance, and to revert to the
factory default settings.
Option Definition
Shutdown Appliance When clicked, turns off the power to the appliance or takes the appliance to
a state where you can safely turn off its power.
Reboot Appliance When clicked, restarts the appliance.
Revert to Default Configuration When clicked, restores all the original out-of-the-box settings to the
appliance.
To prevent tampering or accidental stopping, you must type the password to operate this feature.
Task
1 Navigate to System | System Administration | System Commands.
The appliance commences its shut down process, and will switch off in a few minutes.
To prevent tampering or accidental stopping, you must type the password to operate this feature.
Task
1 Navigate to System | System Administration | System Commands.
The appliance commences its shut down process, and reboots after about 5 minutes.
To prevent tampering or accidental stopping, you must type the password to operate this feature.
Task
1 Navigate to System | System Administration | System Commands.
2 Enter the system password next to the Revert to Default Configuration button.
The appliance warns you that your settings will be overwritten and that you will be logged off.
Users
The Users pages enable you to set up your users and roles, and perform session management tasks.
System | Users
From these pages you can configure the appliance to set up and administer your role-based user
accounts to perform tasks such as viewing or managing reports, and managing email and system
settings. Additionally, you can tell the appliance how you want to manage session timeouts, and
whether you want your users to see your company email usage policy as they log on. The email policy
notification text can be edited.
Contents
Users and Roles
Option definitions New Role dialog box
Option definitions Role Details dialog box
Password Management
Login Services
Add Login Services wizard
Session Management
DoD CAC Authentication
Option definitions CAC Certificate Attribute Mapping
Option definitions Custom Text dialog box
Option definitions User Details
Option Definition
Role The name of the role. By default, the appliances comes with the following roles already
created:
Super Administrator has the ability to view and manage all aspects of the appliance's email
and system settings.
Email Administrator has the ability to view and manage all email-related configuration and
reports settings.
Reports Administrator has the ability to view and manage the reports settings.
Description Contains any optional description text you entered when you created the role.
Edit Click to open the Role Details dialog box and view the role's specifications. The Role Details
dialog box is read-only and cannot be saved.
Delete Remove the selected role from the list.
Add Role Click to open the New Role dialog box.
Task
1 Go to System | Users | Users and Roles.
10 Click OK.
Option Definition
Role name / Type the name of the new role, and optionally add a description to help you identify
Description it in the User Roles list.
Privileges Under the type of role that you want to create, select the privileges that you want to
associate with it for example, to have the rights to view report results, or set the
data that the report contains.
The following role types are available:
General Email Administration
Dashboard System Administration
Reporting and Queues
Option Definition
Role name / Description The name of the role you created.
Privileges The access, management, and viewing rights associated with the role.
The information in this dialog box is based on the information you entered when you created the role. It
is read-only, and cannot be saved.
Password Management
The Password Management page defines the complexity and change control that you want to apply to
the passwords that can access the appliance.
Using a suitable password ensures that the appliance cannot be accessed by people other than those
authorized to do so.
McAfee Email Gateway allows you to define a suitable end user password policy, which includes
specifying how complex you require the chosen passwords to be, how long each password is valid for
and the process required to update existing passwords. Rules for reuse and change frequency are only
enforced when you set passwords to expire. If you choose not to use this feature, default passwords
of eight characters can be specified.
A complex password is more secure than a very simple one, but is more likely to create a greater
volume of "forgotten password" reset requests from your end users. Therefore, you need to decide the
balance between complex passwords that are likely to generate lots of reset requests, and simpler
passwords that will require less maintenance.
When a user changes their password, an expiry date is always set even when password expiry is not
enabled.
This does not apply to resetting the password when the expiry date is set to 0 (zero). If the user
changes the password while completing the Setup Wizard, enabling password expiry will not cause the
password to expire.
If you set the reminder period to >0, the user starts to receive expiry reminders as the expiry date
approaches. A password change is enforced at the login screen when the expiry time is reached.
If you set the minimum period between changes to >0, the user has to wait that many days before
the password can be changed again so that it cannot be immediately changed to be the same
password that has been used for the past six months.
The appliance maintains a history of the past ten password for each user so any reuse policy can be
applied retroactively. When changing their password, a dialog box informs the user that complexity
constraints that are currently in force.
An administrator can still reset passwords for other users. The generated passwords will not
necessarily meet the exact complexity requirements. If password expiry is in force they will only be
good for one login.
Password Complexity
Option Definition
Minimum length Select the minimum length that you will allow for end user passwords. Longer
passwords are more secure, but may result in more calls to your support address
as end users fine them more difficult to remember.
Minimum number of Specify the minimum number of alphabetical characters to be used within the end
ALPHA characters users passwords. To increase security, you can also Require a mixture of upper and
lowercase characters to be used.
Minimum number of The more different types of characters that may be used within an end users
DIGIT characters password, the more secure that password can be made. Forcing your end users to
use numbers within their passwords improves the security of the passwords.
Minimum number of The more different types of characters that may be used within an end users
SPECIAL characters password, the more secure that password can be made. Forcing your end users to
use special characters within their passwords improves the security of the
passwords.
Minimum difference Specify how different a new password must be from the existing password. This is
from the previous based on the minimum number of characters that must change between the
password passwords.
This option is case-sensitive, so changing the case of existing characters within the
password is seen as a difference.
Option Definition
Enable Decide whether your end users will need to periodically renew their passwords. Specify
password the required password expiry parameters:
expiry
Password lifetime in days The number of days for which a password is valid.
Reminder period in days The time during which the user is reminded about changing
their password.
Number of recent passwords to disallow Configure this to prevent your users re-using
passwords.
Minimum interval between password changes in days Specify any limits you want to place on
the frequency with which end users can change their passwords.
Login Services
Use the Login Services options to manage user authentication and authorization using either Kerberos or
RADIUS authentication servers.
The email gateway can integrate with any existing Kerberos or RADIUS authentication management
system.
Kerberos only provides password authentication which means that you will need to define users on the
gateway as well. The RADIUS service can be configured to handle user authorization as well as
password authentication. This means that the gateway can link various attributes to specific roles to
determine access privileges without having to define users on the email gateway.
Contents
Benefits of using the Login Services options
Option definitions Login Services
Login Services provides a single place for identity management on the email gateway using either
Kerberos or RADIUS authentication servers. For example, you can change information on the RADIUS
server such as passwords, without having to replicate the change on the gateway as well.
Option Definition
Service Name The name for the service definition that you create in the Add Login Service wizard.
Service Type Choose from either Kerberos authentication or RADIUS authentication.
Realm An authentication realm, such as <companyname-corp>.
Option Definition
Role Determination Shows how the user's privileges for managing the gateway are determined. This can
be done either by referencing locally defined users whose name matches the login
name, or for RADIUS, the gateway can examine the attributes in the Access-Accept
response to determine the role that the user assumes.
This contents of this field is determined by the option you choose on the Role Mappings
page of the Add Login Service wizard.
Default Role If at login time, it is not possible to determine the role from other information
available, this is the role that an authenticated user will assume. The login will fail if
it is not possible to determine the user's role from data returned that is returned
from the authentication server, or from user information defined on the gateway.
Add Service Starts the Add Login Service wizard. After you have created a service, you can edit its
details using the standard edit button.
A backup server
A shared secret
Role mappings
Contents
Option definitions Basic Settings
Option definitions Type-Specific Settings
Option definitions Role Mappings
Option definitions Test
Option Definition
Service name Define the name that you want to give the service.
Description (optional) Optional field to add further information to identify the service.
Service type Choose from RADIUS or Kerberos. After defining the service, you cannot change
this value.
Server address The IP address or domain name of the authentication server.
Backup server (optional) For RADIUS only, the address of a server that can be used if the primary server
is unavailable.
Port The TCP port used by the authentication server. This defaults to port 88 for
Kerberos, or to port 1812 for RADIUS.
Option Definition
Shared secret Set the key that will be used for encrypting data sent between the gateway and the
RADIUS server to prevent passwords, for example, from being sent by the RADIUS
server in clear text.
This field does not appear if you chose the Kerberos server type on the Basic Settings page.
Realm The authentication realm - in RADIUS you can use it to partition your users database. If
you are linking to a Kerberos server, this field is mandatory because user names are not
globally unique.
This field is optional if you chose the RADIUS server type on the Basic Settings page.
Realm notation Choose from either Postfix (such as user@realm), or Prefix (such as realm\user).
This field does not appear if you chose the Kerberos server type.
Realm Typically, this is an @ for postfix notation, or \ for prefix notation. The character that is
delimiter used to join the user name and the realm to form a fully qualified user name.
This field does not appear if you chose the Kerberos server type.
Role mapping controls how a user privileges are determined during login. The Kerberos server type does
not support Role Mappings. To allow authentication against an external Kerberos server, either create
locally defined users, or select a default role.
Option Definition
Use locally defined Select to have the gateway look for a user in its own database with the same name
user details... as the login name to determine access privileges.
Use data returned Select to have the gateway use data returned by the authentication server to
from the server... determine access privileges. A RADIUS server returns name value pairs called
attributes. You can define RADIUS attribute to gateway role mappings.
RADIUS Attribute For example, Service-Type.
Attribute Value For example, Administrative-User.
Role Includes any role that has been created in Users and Roles, as well as the default roles.
If an attribute with the specified name and value is found in the Access-Accept
response, the authenticated user is assigned that role.
Add Mapping Opens the RADIUS Attribute Mapping dialog box where you can set a name and value for
the attribute, and select the type of user role that you want to associate with it.
Default role If it is not possible to determine a user's role through other means (either a user
defined on the gateway, or by examining data from the authentication server), this
is the role that an authenticated user is assigned. You can select any defined role, or
None. If you select None and it is not possible to determine a user's role, login fails
even if authentication is successful.
Option Definition
Username A valid user who can access the authentication server.
Password The password associated with that username.
Status The result of the last authentication test, either success or failure. If you have not yet
performed a test, the status shows as Unknown.
Output The response from the authentication server in a readable format.
For RADIUS, some attributes are binary values and are shown using hexadecimal notation.
Test Click to start the test authentication against the authentication server.
Finish Click to exit the wizard. The details you entered are displayed on the Login Services page.
Session Management
This information describes the benefits and features of the Session Management options.
Option Definition
Enable session managemnt Choose whether to allow session management settings to apply to the
appliance. This option is selected by default.
Action to perform after Choose from:
session timeout
Prompt for password
Log off
Timeout Set the length of time, in minutes, before the appliance times out.
Display custom user Select to have the appliance display a notification to your users that details
notification your usage policy. Click Edit to open the Custom Text dialog box and view the
default notification message, or change it.
Once configured to use DoD CAC Authentication, your users will only be able to log onto the McAfee
Email Gateway after inserting their CAC into the reader, and then being authenticated against the
Department of Defense certificate authority.
Once CAC authentication has been configured and applied, you will only
be able to log onto the McAfee Email Gateway user interface after
inserting your CAC into the reader, and being authenticated against the
DoD certificate authority.
Link to import CA Click the link to move to Email | Certificate Management | Certificates, to view,
certificates import or export a Department of Defense CA certificate.
Attribute Value Enter the Attribute Value to be used to identify the user when mapping them
to a role.
Role Select the required role.
By default, the options are:
Email Administrator
Reports Administrator
Super Administrator
Option Definition
NOTICE TO USERS Displays the system usage policy text that your users see when
they log on to the appliance.
Use this text as the banner text on the Deselect to edit the NOTICE TO USERS.
appliance console
Reset Click to return the text to the default.
Option Definition
Login ID Edit the Login ID for this user.
Full name Change the information displayed in the Full name field for this user.
Description (optional) Provide or change the optional description field.
Option Definition
Primary role Specify the Primary role . The options are:
Super Administrator.
Email Administrator.
Reports Administrator.
Reset password Click the link to reset the password for this user to the default value.
After a short time, a message displays the new password for that user.
Virtual Hosting
The Virtual Hosting pages enable you to configure the virtual hosts and virtual networks that the
appliance needs to scan.
From these pages, you can enable virtual hosting on the appliance, add a new virtual host, edit any
virtual networks.
Contents
Virtual Hosts
Virtual Networks
Option definitions - Edit Virtual Network
Add Virtual Host wizard
Option definitions New Scanning Policy
Option definition - New Protocol Preset
Virtual Hosts
Use this page to add, edit, or delete virtual hosts and show available virtual hosts.
You can specify the addresses where the appliance receives or intercepts traffic on the Inbound
Address Pool. At least one IP address must be present.
These addresses must be unique. They must not be referenced in the Inbound addresses for any other
virtual host. However, they are allowed in the Outbound addresses of any other virtual host.
Using virtual hosts, a single appliance can appear to behave like several appliances. Each virtual
appliance can manage traffic within specified pools of IP addresses, enabling the appliance to provide
scanning services to traffic from many customers.
Create policies for each customer or host, which simplifies configuration and prevents clashes that
might occur in complex policies.
Provide reports for each customer or host in the appliance's Favorite reports feature (Reports |
Scheduled Reports | Favorite, which removes the need for complex filtering.
If any behavior places the appliance on a reputation black list, only a single virtual host is affected
not the whole appliance.
Proxy This type of virtual host configures the appliance to listen for SMTP connections on the IP
address ranges specified for the virtual host. A proxy-mode virtual host can be configured to have
any number of addresses used for delivering mail from the appliance (Outbound address pool).
Configuring a proxy-mode virtual host is more complex, because the appliance needs to have some
knowledge of the routing to the networks for each of the IP addresses it intercepts.
Virtual hosts behave differently depending on whether the virtual host is running in proxy mode which
listens on the inbound addresses, while virtual hosts running in transparent mode intercept traffic
going to the IP addresses listed.
If you create outbound IP address pools on both the LAN1 and LAN2 NICs, the virtual host uses the IP
addresses on the appliance interface as determined by the routing table.
The following constraints apply when you create virtual hosts and virtual networks:
Virtual Host IP address ranges must not overlap
All Virtual Host IP address ranges must be contained within a Virtual Network
Virtual networks
The concept of a virtual network is used to bind a subnet to a specific interface of the appliance. With
this knowledge the appliance knows to route traffic to or from that subnet via the appropriate network
interface.
Virtual network configuration is handled automatically by the Add Virtual Host wizard, which selects
(or suggests) the appropriate virtual network and populates the Network address field accordingly when
you specify an inbound or outbound address.
Option Definition
Enable virtual hosting Click to allow your appliance to have virtual hosting configured.
on this appliance
Name Displays the name of the virtual host. The name must be unique, and is used in
other locations on the appliance user interface, such as:
Email Configuration
Email Policies
Message Search
Reports
The icons indicate the type of host:
Physical host
Virtual host
Add When clicked, opens a wizard where you can type the details of a new virtual
host.
Task
1 Go to System | Virtual Hosting | Virtual Hosts.
5 Type a Description for this virtual host. This step is optional, but enables you to quickly identify
further information about this virtual host.
8 Click Next.
b Click OK.
c Click Next.
10 Click Add to specify addresses in the Outbound Address Pool. This step is optional.
a Specify the Address range, Network address and Network interface for the Outbound Address Pool.
b Click OK.
11 Click Finish.
Task
1 Go to System | Virtual Hosting | Virtual Hosts.
8 In Base scanning policy, select the Virtual policy in a new virtual host, or an existing one.
Virtual Networks
Use this page to specify virtual networks.
Option Definition
Network address Displays a virtual network address such as 192.168.254.0 /24.
Network interface Displays the network interface for that virtual network address Bridge, LAN1
or LAN2.
When clicked, opens the Edit Virtual Network dialog box.
Edit
When clicked, deletes the network in that row. You cannot delete networks that
Delete
are in use.
Add When clicked, opens the Edit Virtual Network dialog box.
Delete Unused Networks Removes unused networks from the list.
Option Definition
Network address Enter the required IP address and range for the virtual network, such as
192.168.254.0/24.
Network interface Select the network interface to associate with the virtual network.
Option Definition
Virtual host name Specify a unique name and description of the virtual host that is used by other
and Description locations on the appliance user interface, such as:
Email Configuration
Email Policies
Message Search
Reports
Option Definition
Mode
This option is only available when the appliance runs in a transparent mode.
Base scanning Offers a choice of policies from the physical host, or allows you to specify a new
policy policy.
To view all the policies at any time, select Email | Email Policies | Scanning Policies on the
navigation bar.
Base protocol Offers a choice of presets from the physical host, or allows you to specify a new
preset preset. Presets are the connection-based policies.
Base McAfee Offers a choice of policies from McAfee Secure Web Mail, or allows you to specify a
Secure Web Mail new policy.
policy
Email relaying Configures the virtual host domain as a local relay domain.
Enable logical Logical virtual hosting allows you to configure virtual hosts on different appliances
virtual hosting with the same policies, but with different network configuration.
When you push a configuration to another appliance within the same cluster:
If a virtual host with the same logical identifier has not yet been defined, an empty
virtual host entry will be created.
If a virtual host with the same logical identifier has been defined, then the IP
addresses for the virtual host are preserved.
Option Definition
Address Displays the address range for this virtual host. At least one IP address must be specified.
range
Add Click Add to display the Edit IP Address Range dialog box. This enables you to define the
inbound IP address pool for the virtual host. These are the addresses that the appliance
intercepts traffic on.
Address range You must specify at least one inbound IP address.
These addresses must be unique, and cannot be used as the inbound addresses for any
other physical or virtual host. The addresses, can, however, be used as outbound
addresses for other virtual hosts.
The IP addresses are created on the network driver, so you cannot ping or see the IP
address by running the ip addr show commands.
Network address Specify the subnet for the address range. The appliance auto-fills this
field, based on the information you enter in Address range. Check that this is appropriate
for your infrastructure, and edit the value if necessary.
Network interface Select the interface on which you need to create the IP addresses.
Choose from the available network interfaces.
You cannot ping the IP address externally, or see the address by running the ip addr
show commands. To test that the virtual host is listening on the expected address, telnet
to the configured SMTP port.
The outbound address pool feature enables the appliance to deliver mail for a specific Virtual Host (or
the Physical Host) from a range of IP addresses. The IP address selected for the outbound is chosen
using a round-robin.
Outbound Definition
address pool
Option
Address range Displays the address range for this virtual host. At least one IP address must be
specified.
Add Click Add to display the Edit IP Address Range dialog box. This enables you to define the
outbound IP address pool for the virtual host. These are the addresses on which the
appliance will deliver scanned email.
If you do not specify any outbound IP addresses, the appliance will use the physical
host IP address.
The addresses can be used as outbound addresses for other virtual hosts.
Address range
The range of addresses can be specified in the following formats:
192.168.254.1 a single IP address
192.168.254.1-254 a range of IP addresses from 192.168.254.1 to
192.168.254.254
192.168.254.1+9 a range of IP addresses from 192.168.254.1 to
192.168.254.10
192.168.254.0/24 all host IP addresses in the /24 subnet
The IP addresses are created on the network driver, so you cannot ping or see the
IP address by running the ip addr show commands.
Host name (for Specifies the name that appears in the SMTP HELO greetings, using one of the
SMTP HELO) following options:
Resolve at runtime This option can impact performance
Use an IP address literal The IP address of a host used in place of its domain name.
To indicate that it is an address literal, it is in [square] brackets. Fr example,
[192.168.254.3]. Literal IP addresses are used because no DNS lookup needs to be
done, so it is always correct.
n
Use the following value Click Look Up to resolve the IP address to a name
Network address Specify the subnet for the address range. The appliance auto-fills this field, based on
the information you enter in Address range. Check that this is appropriate for your
infrastructure, and edit the value if necessary.
Network interface Select the interface on which you need to create the IP addresses. Choose from the
available network interfaces.
You cannot ping the IP address externally, or see the address by running the ip addr
show commands. To test that the virtual host is listening on the expected address,
telnet to the configured SMTP port.
Option Definition
Policy name Type a name for the virtual host policy
Description Optionally type a description for the policy to help you identify it.
Inherit settings from Select the policy from which you want to inherit settings.
Email direction Apply the policy to either inbound or outbound messages.
Some of these options may not be available in all instances of creating a new protocol preset.
Option Definition
Policy name Type a name for the virtual host policy
Description Optionally type a description for the policy to help you identify it.
Inherit settings Select the protocol preset from which you want to inherit the settings, that is, any
from settings that are not overridden by this protocol preset will be taken from the
protocol preset specified here.
This option is only available when you create a protocol preset from Email | Email
Configuration when virtual hosting has been enabled on the appliance.
This option is only available when you create a protocol preset from Email | Email
Configuration.
Rule type / Lists the rules associated with the preset, and allows you to move or edit them as
Move / Edit appropriate.
This option is only available when you create a protocol preset from Email | Email
Configuration.
Option Definition
Add Rule Click to specify the type of rule that you want to apply to the preset, and set its
Match and Value.
This option is only available when you create a protocol preset from Email | Email
Configuration.
Add network Click to create a network group to associate with the preset.
group
This option is only available when you create a protocol preset from Email | Email
Configuration.
You can configure the appliance to send emails containing information about viruses and other
detected threats, and to use SNMP to transfer information from your appliance.
Contents
Email Alerting
SNMP Alert Settings
SNMP Monitor Settings
System Log Settings
Logging Configuration
Logging Configuration Override events dialog boxes
Configure System Log Archive wizard
Email Alerting
Use this page to decide who receives an email message when events such as a virus detection occur.
See Alert tokens for Email alert messages on page 419 for information on the usage of each
substitution variable.
Option Definition
Anti-virus events to When selected, sends email messages when this type of event occurs. To change
Aggregated data the message, click Edit to open an email alert window.
events
Alert Settings Specifies the sender name and sender email address that appears in the From field
of the email message. This does not have to be a real email address. Default value
is MEG.
Subject Specifies the subject line of the email message. Default value is MEG Alert.
Recipients Click Add to specify the email addresses of recipients who receive the
alerts. We recommend that you choose people who often read their email and can
respond quickly to these alerts.
Alert tokens (also known as replacement tokens or substitution variables) allow you to create
meaningful email alert messages for your users.
The following tables list the available alert tokens for different circumstances.
The alert token names begin and end with the % character.
Alert tokens for Email notifications information that is often used in the notifications that are
sent to your users.
Alert tokens for Quarantine digest messages when you configure Quarantine digest messages
you can select tokens to provide information to your users about the messages being quarantined.
Alert tokens for Email alerts (Logging and Alerting) these tokens are useful when configuring
your logging and alerting messages.
Table 5-19 Alert tokens for Email alerts (Logging and Alerting)
Token name Description
Anti-Virus:
%PRODUCT%: The product name
%EVENT%: The name of the event
%REASON%: The reason for the event
%SOURCEIP%: Source IP address
%SOURCEHOST%: Source host name
%DESTINATIONIP%: Destination IP address
%DESTINATIONHOST%: Destination host name
%SERVERUSERNAME%: The login name of the user (POP3)
%LOCALTIME%: Local time
%UTCTIME%: UTC time
%WEBSHIELDNAME%: McAfee Email Gateway appliance name
%WEBSHIELDIP%: McAfee Email Gateway IP address
%APPLICATION%: The name of the process that generated the event
%SENDER%: Envelope Email Sender (SMTP)
%RECIPIENTS%: Envelope Email recipient list (SMTP)
Table 5-19 Alert tokens for Email alerts (Logging and Alerting) (continued)
Token name Description
%DETECTIONS%: List of detections in the item
%POLICY%: The name of the policy that triggered the event
%POLICY_ID%: The ID of the policy that triggered the event
%SUBJECT%: Email Subject (SMTP)
%SIZE%: Size of data
%LDAP_ADDRESS% The address queried from LDAP
%LDAP_SYNC_ERROR% A synchronization error occurred
%LDAP_SYNC_ERROR_TEXT% The text for the synchronization error
%LDAP_SYNC_SERVER% The name server that encountered the synchronization error
%AVDATVERSION%: The DAT version used by the anti-virus engine (AV)
%AVENGINEVERSION%: The version of the anti-virus engine (AV)
%ATTACHMENTNAME%: Name of the item being scanned (AV, DLP)
%IASCORE% The score assigned to an image by Image Analysis scanning
%IATHRESHOLD% The score that triggers an Image Analysis detection
%DLP_RULE%: The DLP rule that triggered
%DLP_CATEGORY% The registered document categories that triggered
%DLP_FILEDIGEST% Checksum for the trained document that resulted in the DLP
detection
%DLP_FILESIZE% Size of the trained document
%DLP_FINGERPRINTDATE% Date when the trained document was fingerprinted
%DLP_FINGERPRINTSOURCE%: The registered document name
%DLP_REPORT%: Detailed report containing the document name, the category
name, the size and the digest as per the registered documents
%LB_APPLIANCE_IP_ADDRESS% IP address of the scanning appliance
%LB_APPLIANCE_IP_NAME% Domain name of the scanning appliance
%LB_APPLIANCE_MAC_ADDRESS% MAC address of the scanning appliance
%FILESYSTEM%: The name of the filesystem on the appliance (system events)
%FILTERCONTEXT%: The name or names of the rules that triggered (compliance)
%SPAMSCORE%: Spam score (AS)
%SPAMRULESBROKEN%: The name or names of the spam rules that triggered the
detection (AS)
%SPAMTHRESHOLD%: Spam reporting threshold (AS)
Aggregated data:
%PRODUCT%: The product name
%EVENT%: The name of the event
%PROTOCOL% The mail protocol, SMTP or POP3
%SMTPNUMMESSAGES%: The number of messages received via SMTP
%SMTPVIRUSDETECTED%: The number of viruses detected (SMTP)
%SMTPPUPSDETECTED%: The number of PUPs detected (SMTP)
%SMTPANTIRELAYDETECTED% The number of items that triggered anti-relay measures
Table 5-19 Alert tokens for Email alerts (Logging and Alerting) (continued)
Token name Description
%SMTPBATVDETECTED% The number of messages that failed BATV signature
verification
%SMTPCONTENTDETECTED%: The total number of content detections
%SMTPCOMPLIANCEDETECTED% The number of compliance detections (SMTP)
%SMTPDENYSENDERDETECTED% The number of emails that triggered the denied senders list
%SMTPDHDETECTED% The number of emails that triggered directory harvest
detections
%SMTPDKIMDETECTED% The number of emails that included DKIM signature failures
%SMTPDLPDETECTED% The number of DLP violations detected (SMTP)
%SMTPFILEFILTERDETECTED% The number of emails that triggered file filtering
%SMTPGREYLISTDETECTED% The number of emails that triggered Greylisting
%SMTPGTIMSGREPDETECTED% The number of TrustedSource lookups reported as being
malicious
%SMPTIADETECTED% The number of emails that triggered Image Analysis
%SMTPLDAPRCPTDETECTED% The number of recipients that failed LDAP verification
%SMTPMAILFILTERDETECTED% The number of emails that triggered message/partial,
message/external-body, and missing/empty header detections
%SMTPMAILSIZEFILTERDETECTED% The number of detections based upon email message size
(SMTP)
%SMTPPACKERSDETECTED% The number of packers detected (SMTP)
%SMTPPHISHDETECTED% The number of phishing messages (SMTP)
%SMTPRBLDETECTED% The number of emails that failed to pass testing the origin
against an RBL
%SMTPRECIPIENTDETECTED% The number of emails that failed recipient ID verification
%SMTPSENDCONNECTDETECTED% The number of emails failed sender connection verification
%SMTPSENDERIDDETECTED% The number of emails that failed Sender ID verification
%SMTPSPAMDETECTED% The number of spam messages detected (SMTP)
%SMTPSPFDETECTED% The number of messages that failed Sender Policy Framework
(SPF) verification
%SMTPTOTALDETECTED% The total number of detections (SMTP)
%POP3NUMMESSAGES%: The number of messages scanned (POP3)
%POP3VIRUSDETECTED%: The number of viruses detected (POP3)
%POP3PUPSDETECTED%: The number of PUPs detected (POP3)
%POP3IADETECTED% The number of Image Analysis detections (POP3)
%POP3MAILSIZEFILTERDETECTED% The number of detections based upon email message size
(POP3)
%POP3PACKERSDETECTED% The number of packers detected (POP3)
%POP3PHISHDETECTED% The number of phishing messages (POP3)
%POP3SPAMDETECTED% The number of spam messages (POP3)
%POP3TOTALDETECTED% The total number of detections (POP3)
%SPAMBLOCKEDRBL%: The number of spam messages detected using RBLs
%SPAMDETECTED%: The number of spam messages detected
Table 5-19 Alert tokens for Email alerts (Logging and Alerting) (continued)
Token name Description
%SPAMBLOCKED%: The number of spam messages discarded
%SPAMQUAR%: The number of spam messages quarantined
%CONTENTQUAR%: The number of messages quarantined through compliance
%VIRUSQUAR%: The number of viral messages quarantined
%SOURCEIP%: Source IP address
%SOURCEHOST%: Source host name
%DESTINATIONIP%: Destination IP address
%DESTINATIONHOST%: Destination host name
%LOCALTIME%: Local time
%UTCTIME%: UTC time
%WEBSHIELDNAME%: McAfee Email Gateway appliance name
%WEBSHIELDIP%: McAfee Email Gateway IP address
%GATEWAYIP% The gateway IP address
%GATEWAYNAME% The gateway host name
%APPLICATION%: The name of the process that generated the event
The SNMP alerts are cumulative and are derived by adding data from the real-time logs. The real-time
logs are updated every 24hours.
Option Definition
Anti-virus events to System events When selected, specifies the types of events that will be
sent.
Trap manager, Community name, Protocol version Specifies various details for SNMP trap managers.
Basic settings
Option Definition
Name to Community Versions 1 and 2 of the SNMP protocol use the community name like a password.
name The community name is required with each SNMP Get request to allow access to
the appliance. The default Community Name is public.
If you have several appliances, change the default name.
Option Definition
Username for authentication Version 3 incorporates both authentication and privacy. You need to set the
to Store for configuration user name, and the protocols and passwords for authentication and privacy.
push (plain text)
These settings will not be included in configuration pushes between your
appliances unless you select Store for configuration push (plain text). Be aware,
however, that if you select this option, the configuration settings for the
SNMP v3 protocol are stored on the appliance in plain text.
Option Definition
Access control list The appliance is set to allow SNMP queries from all devices. We recommend that you
change the settings to allow access from known devices only. Specify the IP address
numbers of the devices that can read the appliances MIB parameters.
Syslog provides log information about the system itself, rather than about messages the system
processes. Extended logging allows you to use external software to generate reports.
The syslog protocol and message format are defined in RFC 3164.
Option Definition
Enable system Enables system logging (syslog) information to be collected and delivered to the
log events on-appliance logging system, or sent to an off-box solution.
Select the type of logging format that you want to use. This option creates an output
log file that is structured so that it can be easily read by third-party applications and
used to generate custom reports. Due to the amount of data generated, we recommend
that this option is only enabled when using TCP syslog. Choose from:
Original Content Security Reporter
Splunk McAfee Enterprise Security Manager
Common Event Format
Conversation events and Aggregated data events are not reported in the extended
logging format.
Click View the system logs to see the log files on the appliance.
Log events to Specify the events to capture within the syslog. To prevent very large log files, we
the syslog for recommend that you record only events that you want to monitor closely, and deselect
the following the events when you have finished.
event types: The appliance cannot store the transport events produced by heavy traffic for long
periods. We recommend that you use the off-box syslog option to forward the transport
events to a central syslog server.
Off-box system Enable off-box system log To send system logs for storage off-box, enable this setting and
log define the receiving server parameters:
Receiving server Specifies the IP address or host name of the server that receives the
syslog information.
Use IPv6 protocol Check this option when sending system logging information over an
IPv6 network.
Port Specify the port on the receiving server to be used to transfer the system log
information.
When using off-box system logging, you can specify different ports for each configured
off-box syslog server.
Protocol Either TCP or UDP. Specifies the packet type. UDP has a limit of 1024 bytes
per packet.
Add Server You can configure multiple off-box servers.
System Log Send archive copies of the mail logs to another server, and set up a schedule for this to
Archive happen. Click Enable log archive to open the Configure System Log Archive wizard. After
the wizard is complete, this section displays a summary of the schedule settings you
entered.
reason_id Text
77 Email Delivered
83 Email Deferred
142 Access to the requested URL is not permitted
145 clean
146 replace
161 Content categorized as spam
206 Content was categorized as non spam
305 Email blocked with SMTP Code 550
306 Email accepted and dropped
420 Email blocked with SMTP Code 550. Connection closed
611 URL categorized by URL filter
623 Phish Detection
624 PuP
625 Packer
689 DLP
728 Compliance
737 The undeliverable email has been bounced
The following table lists the mappings from Common Event Format data fields to the supported
vendor-specific event definitions.
Table 5-23 McAfee Email Gateway Appliance Connector Field Mappings (continued)
McAfee-Specific Event Definition Third party Event Data Field
The definition of this field depends on the value of the field cs2Label
'cs5': If cs5 is 'AV' or 'PA' or 'PU': 'av-engine-version' If
cs5 is 'AS': 'spam-score' If cs5 is 'DL': 'dlp-rules' If cs5 is
'PX': 'compliance-terms'
The definition of this field depends on the value of the field cs3
'cs5': If cs5 is 'AS': The threshold the message exceeded
The definition of this field depends on the value of the field cs3Label
'cs5': If cs5 is 'AS': 'spam-threshold-score'
The attachments of the email (if available) cs4
'email-attachments' cs4Label
For a detection event, the scanner which triggered the cs5
event: 'AP' - Anti-Phish 'AS' - Anti-Spam 'AV' - Anti-Virus
'DL' - Data Loss Prevention 'FF' - File Filtering 'MF' - Mail
Filtering 'MS' - Mail Size 'PA' - Packer 'PU' - Potentially
Unwanted Program 'PX' - Compliance 'IA' - Image Filtering
'master-scan-type' cs5Label
The subject of the email cs6
'email-subject' cs6Label
Indicates if the action taken is the main action defined for cn1
the event. 1 indicates primary action
'is-primary-action' cn1Label
The number of attachments in the email (if available) cn2
'num-email-attachments' cn2Label
The number of recipients of the email cn3
'num-email-recipients' cn3Label
The original subject of the email McafeeEmailgatewayOriginalSubject
The original sender of the email McafeeEmailgatewayOriginalSender
The original message ID number, such as McafeeEmailgatewayOriginalMessageId
5f84_00f8_48fd8314_29f1_472b_9c9f_1adff4733814
The encryption type of the email, shown as a number: McafeeEmailgatewayEmailEncryptionType
PGP 2 Pull delivery 16
SMIME 4 Both push and pull
delivery 32
Push delivery 8
Logging Configuration
Use this page to specify which events are recorded in the appliances logs
Although the appliance can record many types of events in the logs, normally only the most serious
events are needed.
Advanced When clicked, opens another window where you can examine the settings for each
event and choose which events to log or ignore. The information includes:
Enabled Whether the event is being recorded in the log now.
ID The event number, such as 50012, which is recorded in the log with the time and
date of the event.
Level A symbol that indicates the severity of the event:
High Severity. We recommend that this event is recorded in the log.
Medium Severity
Low Severity.
High Volume A symbol that indicates how often this event occurs:
The event can generate a high volume of log records.
Description A description of the event, such as Quarantine.
Option Definition
Enabled Shows whether the event is logged
ID The ID associated with the event
Option Definition
Level Displays the level of severity of the event
High Volume Displays a warning icon if the event is likely to produce a high volume of alerts
Description A more detailed description of the event
Restore defaults Revert the list of events and their status to the original
Transfer via SSH Click to specify the settings to transfer the backup using SSH:
Server
Port
Directory
Username (default value is anonymous)
Password Authentication/Password (default value is anonymous)
Public Key Authentication/Public key (links to the public key)
If you use either FTP or SSH with password authentication, your passwords are stored in the appliance
configuration files, in plain text format. The most secure option is to use SSH with public key
authentication. To use this feature, you must click the link to generate a key file, which you must then
copy and paste into your authorized keys file so that the appliance can perform the backup.
McAfee recommends that you update all scanning components on a new appliance using the Update
Now feature, then use the Schedule feature for each component to create regular updates at a time
when traffic is low, such as during the night.
Option Definition
Hourly to Weekly Specifies the schedule. If you do not need this feature, select Never.
Next / Finish Moves to the next page of the wizard , or closes it and applies the settings.
Option Definition
Test Checks that the backup configuration works, and provides the desired information.
Component Management
The Component Management pages enable you to view the status of your updates, to specify Package
Installer and ePolicy Orchestrator options, and to enable additional anti-virus engines.
Through the Component Management pages, you can schedule and perform anti-virus and anti-spam
detection file updates, as well as updates to software packages through hotfixes and patches.
Additionally, you can set up how packages are updated, or use ePolicy Orchestrator. You can also
configure your McAfee Email Gateway to use additional anti-virus engines when scanning your email
traffic.
Contents
Update Status
Package Installer
ePO
Anti-virus engines
Configure Anti-Virus Updates wizard
Configure Anti-Spam Updates wizard
Configure Automatic Package Updates
Edit Preferences (Warning Thresholds)
Update Status
Use this page to check that each scanning component is using the most up-to-date threat detection
data to maintain your appliance security.
From the Update Status page, you can manage updates for the following scanning components:
Anti-virus engine and database
You can choose to update scanning components immediately, and create schedules to regularly update
the components when the server traffic is low. Additionally, you can have the appliance import
anti-virus engine and database files from the update server, and export them onto other appliances
that do have Internet access.
If you are using the Commtouch Command anti-virus engine, updates for that engine are downloaded
and applied at the same time as those for the McAfee anti-virus engine.
McAfee recommends that you update all scanning components on a new appliance using the Update Now
options, then use the scheduling options for each component to create regular updates at a time when
traffic is low, such as during the night. To update appliance software updates such as HotFixes and
patches, go to System | Component Management | Package Installer.
McAfee Email Gateway no longer supports the v1 detection definition (DAT) files. The appliances now
use the McAfee Agent to handle the updating of the v2 DAT files and scanning engine files even
without having an ePolicy Orchestrator server configured on your network. When not using an ePolicy
Orchestrator server, you can now configure your appliance to use ftp or http to download the v2 DAT
files and scanning engine files. These DAT files and scanning engine updates can be obtained by ePolicy
Orchestrator and pulled from the ePolicy Orchestrator repository using the McAfee Agent. You can also
manually download the files and install them onto your appliance.
You cannot use the Update Status pages to update the Hardware Acceleration PDB files used by older
hardware fitted with Hardware Acceleration cards.
Component name Displays the component name, preceded by an icon that indicates whether the
component is up-to-date:
Up-to-date.
Out-of-date. We recommend that you update soon.
Out-of-date. We recommend that you update immediately.
Action Update Now When clicked, updates a component immediately rather than wait for
the scheduled update.
Configure opens the Configure Anti-Spam Updates dialog box where you can specify a
proxy server from which the appliance downloads the update, or accept any default
server settings that you have already entered.
Import Click Import to install the Engine and Database files previously exported from this, or
another appliance.
Export Click Export to create a zip file containing the Engine and Database files currently
installed on the appliance.
You can include:
Anti-virus engine
Anti-virus database
Spam engine
Spam rules
within the exported file.
When you import the updates zip file, all updates that are contained within it are
imported to your appliance. If you do not want a particular update to be applied,
then McAfee recommends that you do not include that update when you export the
update file.
When first configuring your appliance, using Update now confirms that the user settings
are configured correctly and working. Alternatively, you can browse to Troubleshoot |
Tests and run the System Tests to confirm these settings.
The currently installed version of the Anti-virus DAT file will be removed
from your McAfee Email Gateway. The proxies will also be restarted.
Option Definition
Use the default proxy settings Uses the FTP proxy settings set up on the Default Server Settings page (System
| Appliance Management | Default Server Settings).
configure defaults Opens the Default Server Settings page where you can edit the default FTP
proxy settings.
Proxy Server to Proxy Password Displays the settings of the FTP proxy server.
Task Update the anti-virus engine and database daily at 04:00 over HTTP
using a proxy server
Use this task to update the anti-virus engine using detailed settings.
Task
1 Go to System | Component Management | Update Status.
2 Click the link in the Scheduled column for the Anti-virus engine component.
3 On the Specify the server settings for downloading the update via HTTP page, keep the default settings, and click
Next.
The update will use the proxy server that you set up in System | Appliance Management | Default Server
Settings.
4 In Select how the McAfee FTP update site should be used, select Not Used, and click Next.
5 In Time to schedule update for, select the Daily option, and set the time to 0400, and click Finish.
Task
1 Navigate to System | Component Management | Update Status.
2 In the Scheduled column under Version information and updates, click the scheduled update link on the row
with the McAfee anti-virus engine.
3 Click Next on the first and second pages that appear, to get to the third page labeled Time to schedule
update for.
4 Uncheck the Enable updates for Commtouch Command anti-virus check box, then click Finish.
Updates for Commtouch Command anti-virus engine are now disabled.
Task
1 Go to System | Component Management | Update Status.
2 Click the link in the Scheduled column for the Spam engine component.
3 Click Next to have the update use the default FTP update server settings.
4 In Time to schedule update for, select the Daily option, and set the time to 0500, and click Finish.
Task
1 Go to System | Component Management | Update Status.
2 Click Roll back to previous installed version, in Anti-virus DAT roll back .
3 Click OK to roll back to the previous installed version of the Anti-virus DAT file.
Package Installer
Use this page to examine and install new software packages.
McAfee recommends that you update the software packages manually on a new appliance using the
Update From File option, then go to the System | Component Management | Update Status scheduling options in
Automatic package updates to create regular updates at a time when traffic is low, such as during the
night.
From the Package Installer page, you can view information about installed appliance software packages
such as patches and Hotfixes, and update them immediately to ensure that your appliance remains as
up-to-date as possible.
Option Definition
Update From file When clicked, opens another window where you can select a file from a local source to
upload to the appliance.
Package Type Displays the type of package, such as a Service Pack or Hotfix.
Name Displays a name that uniquely identifies the package.
Severity Displays information such as whether we recommend that you install the package, or
allow you to decide.
Status Displays information such as whether the package has been downloaded or installed.
Required Actions Displays information such as whether the appliance needs to be restarted when the
package is installed.
Notes Describes any dependencies or requirements, for example, whether the patch
supersedes a previous installation.
Click any Details link for more information, such as the resolved issues and
KnowledgeBase information.
Install When clicked, makes the selected patch ready to install. The patch is installed when
you click Apply.
Download When clicked, makes the selected patch ready to download. The patch is downloaded
when you click Apply.
Export When clicked, exports the downloaded file to another location so that another
appliance can use it via Manual Package Install
Refresh When clicked, sends a request to the FTP server for any changes.
Apply When clicked, installs or downloads the patches that you specified.
ePO
Use this page to manually set up the appliance to be managed by ePolicy Orchestrator.
The information and settings in this page provide similar features to those found in the ePO Managed
Setup pages of the Setup Wizard
Using McAfee ePolicy Orchestrator enables you to manage multiple McAfee Email Gateway appliances
from a single location; sharing policies across each appliance.
Option Definition
Export Appliance Use this to create an .xml file containing your McAfee Email Gateway
Configuration configuration that you can then load directly into the Policy Catalog within
ePolicy Orchestrator.
Migrate ePO Configuration Use this to select the configuration file from your ePO server, to import your
ePO settings into McAfee Email Gateway.
Option Definition
Import ePO connection Click to browse to the ePolicy Orchestrator connection settings file, to import the
settings ePolicy Orchestrator connection information into the appliance.
Enable ePO Select to allow reporting and monitoring of your Email Gateway events to be
management sent to your ePolicy Orchestrator server. You can then compile statistics from all
your ePolicy Orchestrator-managed Email Gateway appliances.
You can enable the reporting and monitoring of your Email Gateway appliance
from your ePolicy Orchestrator v4.5 (or higher) software.
Allow configuration to When Enable ePO management is selected, you can use your ePolicy Orchestrator
be applied from ePO server to create, edit and manage all policies, and to have them pushed to all
your ePO managed Email Gateway appliances.
To create, edit and manage policies for your Email Gateway appliance, you must
use ePolicy Orchestrator v4.5 (or higher) software.
Task
1 From your McAfee Email Gateway appliance, select Resources and then click ePO Extensions and ePO
Help Extensions to download the extension files.
2 On the ePO server, install the extensions using Menu | Software | Extensions | Install Extensions.
3 On the ePO server, save the connections settings from Menu | Gateway Protection | Email and Web Gateway |
Actions | Export Connection Settings.
Click System | Component Management | ePO page, and click Import ePO connection settings.
5 Browse to the ePO connections settings file and click OK to upload it.
From System | Component Management | ePO, select Enable ePO management and Allow configuration to be
applied from ePO and apply the changes to the appliance.
When a policy is sent from ePolicy Orchestrator and is then enforced on your McAfee Email Gateway,
events are sent back from your McAfee Email Gateway to ePolicy Orchestrator giving indications of
the success or failure of that enforcement, and of any warnings that may have been generated. You
can view these events from within ePolicy Orchestrator by browsing to Menu | Reporting | Threat Event
Log.
When you have configured your appliance to enable it to be managed by ePolicy Orchestrator, you will
be reminded each time that you make a configuration change using the appliance's user interface that
the appliance is under ePolicy Orchestrator management, and that your changes will be overwritten
the next time that ePolicy Orchestrator updates the configuration.
This upgrade process automatically disconnects the appliance from being managed by
McAfee ePO.
The inbuilt McAfee Email Gateway migration tools migrate many of your McAfee Email Gateway 7.0.3
settings for you. However, some settings may need to be recreated.
Task
1 In McAfee ePO, click Policy Catalog and select the McAfee Email Gateway 7.0.3 product.
8 Select the epo_config_<date_stamp>.xml file produced at the end of this process, and save the file.
9 From the McAfee Email Gateway Resources link, download the ePO Extensions and ePO Help Extensions
files.
10 From McAfee ePO, install the ePO Extensions and ePO Help Extensions files.
11 In McAfee ePO, click Policy Catalog and select the McAfee Email Gateway product.
The policies and settings within the configuration file are migrated across to your McAfee ePO
server.
After you have imported the settings into McAfee Email Gateway managed by McAfee ePO, you
need to re-assign the migrated policies to the correct groups in the System Tree in McAfee ePO.
13 On McAfee ePO, navigate to Menu | Gateway Protection | Email and Web Gateway.
14 From Actions, select Export Connection Settings. Save the epoConfig<xxxxxxx>.zip file.
15 On your McAfee Email Gateway, navigate to System | Component Management | ePO, click Import ePO
connection settings. Browse to the epoConfig<xxxxxxx>.zip file, and click OK.
Your McAfee ePO configuration settings are imported into your McAfee Email Gateway appliance.
16 Select both Enable ePO management, and Allow configuration to be applied from ePO.
If you chose to create a scheduled task to push your McAfee Email Gateway 7.0.3 DLP database to the
new McAfee Email Gateway version, you will need to create an equivalent scheduled task to push the
new McAfee Email Gateway DLP database to your appliance.
Anti-virus engines
Configure your McAfee Email Gateway to additionally use the Commtouch Command anti-virus
engine.
The information and settings in this page provide options about how you enable the additional
Commtouch Command anti-virus engine within McAfee Email Gateway.
When enabled, the Commtouch Command anti-virus engine works in series with the McAfee anti-virus
engine, rather than in place of it.
To provide a stronger and wider level of protection for your email users, McAfee Email Gateway
enables you to enable and configure an additional anti-virus engine.
This additional anti-virus engine is produced by Commtouch Command.
Although enabling an additional anti-virus engine can provide stronger protection, it will also use more
resources within the McAfee Email Gateway, and might impact overall performance and mail
throughput.
Proxy server to Proxy If the appliance obtains updates via a proxy server, type the details here.
Password
McAfee recommends that you update all scanning components on a new appliance using the Update
Now feature, then use the Schedule feature for each component to create regular updates at a time
when traffic is low, such as during the night.
Option Definition
Hourly to Weekly Specifies the schedule. If you do not need this feature, select Never.
Next / Finish Moves to the next page of the wizard , or closes it and applies the settings.
McAfee recommends that you update all scanning components on a new appliance using the Update
Now feature, then use the Schedule feature for each component to create regular updates at a time
when traffic is low, such as during the night.
Option Definition
Hourly to Weekly Specifies the schedule. If you do not need this feature, select Never.
Next / Finish Moves to the next page of the wizard , or closes it and applies the settings.
Option Definition
Update action Choose from:
Update database
Download
Download and install
Allow automatic reboot and Allow Specifies the action that the appliance will take on receiving the
automatic services restart new software.
Feature packs to Hotfixes Specifies the type of new software to download.
McAfee recommends that you update all scanning components on a new appliance using the Update
Now feature, then use the Schedule feature for each component to create regular updates at a time
when traffic is low, such as during the night.
Option Definition
Hourly to Weekly Specifies the schedule. If you do not need this feature, select Never.
Next / Finish Moves to the next page of the wizard , or closes it and applies the settings.
Warn After Specify the time between the last update and when an amber warning is shown within the
Dashboard.
Alert After Specify the time between the last update and when a red "critical level" alert is shown
within the Dashboard.
Setup Wizard
The Setup Wizard is available from the user interface to allow you to edit settings that you made in
the configuration console when you first installed the appliance.
Welcome
Use this page to select the type of installation that you want to follow.
This is the first page of the Setup Wizard. Use this page to select the type of installation you want to
perform.
Standard Setup (default) use this option to set up your device in transparent bridge mode, and
configure it to protect your network. The SMTP protocol is enabled by default. You can choose to
enable scanning of POP3 traffic.
Choosing Standard Setup forces the device to run in transparent bridge mode.
Custom Setup use this option to select the operating mode for your device. You can choose to
protect mail traffic using SMTP and POP3 protocols. You should use this if you need to configure
IPv6 and to make other changes to the default configuration.
Restore from a file (not available from the Configuration Console) use this to set up your device
based on a previously saved configuration. Following the import of the file you will be able to check
the imported settings before finishing the wizard. If the file came from an earlier McAfee Email and
Web Security Appliance, some details are not available.
ePolicy Orchestrator Managed Setup use this to set up your device so that it can be managed by your
ePolicy Orchestrator (McAfee ePO) server. Only minimal information is needed, as the device will
get most of its configuration information from your ePolicy Orchestrator server.
Encryption Only Setup use this option to set up your appliance as a standalone encryption server.
The appliance operates in one of the following modes transparent bridge, transparent router, or
explicit proxy. The mode affects how you integrate the appliance into your network and how the
appliance handles traffic. You will need to change the mode only if you restructure your network.
Explicit Proxy mode is best suited to networks where the client devices connect to the appliance
through a single upstream and downstream device. For example, you can configure your network to
have your web cache logically connected on one side of the appliance and a firewall on the other side,
with both physically connected through the LAN1 port. The advantage of this scenario is that you need
to reconfigure only the web cache and firewall. You do not need to reconfigure the clients.
Transparent Router mode is suitable for networks that have firewall rules, because the firewall still
sees the IP addresses of the clients and can therefore apply the Internet access rules to client traffic.
Transparent Bridge mode requires the least configuration. You do not need to reconfigure your clients
or default gateway to send traffic to the appliance. You do not need to update a routing table.
Standard Setup
Use the Standard Setup wizard to set up your appliance in Transparent Bridge mode, and configure it
to protect your network.
The Standard Setup wizard consists of the following pages:
Contents
Benefits of the Standard Setup wizard
Email Configuration page (Standard Setup)
Basic Settings page (Standard Setup)
Summary page (Standard Setup)
Use this option to set up your device in transparent bridge mode, and configure it to protect your
network. The SMTP protocol is enabled by default. You can choose to enable scanning of POP3 traffic.
Choosing Standard Setup forces the device to run in transparent bridge mode.
Option Definition
Enable protection Click to activate protection against Potentially Unwanted Programs. Read the
against Potentially advice from McAfee about the effects that activating this protection can have.
Unwanted Programs
Enable URL Reputation Click to activate Global Threat Intelligence scanning of URLs embedded in
checking messages.
Option Definition
Use McAfee Email Click to activate hybrid email protection, with McAfee Email Protection (Hybrid)
Protection (Hybrid) to scanning your inbound email traffic.
process inbound email
After enabling McAfee Email Protection (Hybrid), the configuration pages for this
service are displayed automatically when you next log into the user interface.
Enable Graymail Click to enable protection from messages (such as email newsletters) that some
Protection users want, but that others might prefer to block.
When selected, the Graymail dictionary is added to the Anti-Spam Terms list, found
in Email | Email Policies | Spam | Spam Terms.
To view the terms within the Graymail dictionary, select this dictionary from Email
| DLP and Dictionaries | Compliance Dictionaries.
Enable McAfee Global Select this option to enable McAfee Global Threat feedback.
Threat Intelligence Click What is this? to read about how the feedback is used, and view the McAfee
feedback Privacy Policy.
Local relay domain Enter both the IP address and netmask for your local relay domain.
Ensure that you define your local domains, as well as the domains from which
you want to permit email relaying, and that you want to deny email relaying.
Defining a domain as a Permitted domain ensures that email traffic from that domain
is always allowed to be relayed.
Option Definition
Device name Specifies a name, such as appliance1.
Domain name Specifies a name, such as domain1.com.
IP address Specifies an address, such as 198.168.200.10.
The fully qualified domain name (Device name.Domain name) must resolve to this IP
address when the DNS server (specified here) is called. We recommend that this IP
address resolves to the FQDN in a reverse lookup.
Option Definition
Appliance Time zone Specifies the time zone of the appliance. You might need to set this twice each year
if your region observes daylight saving time. The zones are organized from west to
east to cover mid-Pacific, America, Europe, Asia, Africa, India, Japan, and Australia.
Appliance Time Specifies the date and UTC time for the appliance. To select the date, click the
(UTC) calendar icon. You can determine the UTC time from websites such as http://
www.worldtimeserver.com.
Set Now When clicked, applies the date and UTC time that you specified in this row.
Client Time Displays the time according to the client computer from which your browser is
currently connected to the appliance.
Synchronize When selected, the time in the Appliance Time (UTC) immediately takes its value from
appliance with client Client Time. You can use this checkbox as an alternative to manual setting of Appliance
Time (UTC). The appliance calculates the UTC time based on the time zone that it
finds on the client's browser.
Ensure that the client computer is aware of any daylight savings adjustments. To
find the setting on Microsoft Windows, right-click the time display in the bottom
right corner of the screen.
NTP server address To use Network Time Protocol (NTP) , specify the server address.
Alternatively, you can configure NTP later.
To change any value, click its blue link to display the page where you originally typed the value.
After you click Finish, the setup wizard has completed, and the appliance is configured as a transparent
bridge.
Use the IP address shown here to access the interface. For example https://192.168.200.10.
When you first log on to the interface, type the user name, admin and the password that you gave on
the Basic Settings page.
The value is probably not correct. Although the value is valid, it is not set according to best
practice. Check the value before continuing.
No value has been set. The value has not been changed from the default. Check the value
before continuing.
Custom Setup
Use the Custom Setup Wizard to choose the operating mode when you set up your appliance. You can
also make other choices, such as setting up IPv6 networking.
The Custom Setup Wizard consists of the following pages:
Contents
Benefits of the Custom Setup wizard
Important considerations for the Custom Setup Wizard
Basic Settings page (Custom Setup)
Network Settings page
Cluster Management page
DNS and Routing page
Email Configuration page (Custom Setup)
Time Settings page
Password page
Summary page
You can choose to protect mail traffic using SMTP and POP3 protocols. You should use this
configuration option if you need to configure IPv6 and to make other changes to the default
configuration.
Cluster Management
When configuring a group of appliances or McAfee Content Security Blade Servers, the current master
uses a "least used" algorithm to assign connections to the appliances or blades configured to scan
traffic. The scanning appliance or blade that is currently showing the least number of connections, at
that moment in time, is assigned the next connection.
If you have scanning appliances, and scanning enabled on the master and failover, then the
scanning appliances will receive the most traffic to scan, then the failover, with the master
receiving the least. If you have more than three appliances in a cluster, McAfee recommends that
you do not enable scanning on the master appliance.
You cannot configure the master or the failover blades of the McAfee Content Security Blade Server to
scan traffic.
McAfee recommends that when using your appliance in a cluster environment, you use McAfee
Quarantine Manager to quarantine email messages.
Delivering email
Using the recipient's domain, the appliance uses the following logic to decide how it will deliver
messages:
If the recipient's domain matches those listed in Known Domains and relay hosts, it uses those relays to
deliver the message.
If the recipient's domain does not match those listed in Known Domains and relay hosts, it can be
configured to use an MX record lookup to deliver using DNS. If no MX records are available, it
attempts to make the delivery using an A record lookup. MX delivery is attempted to hosts in the
order of priority that is returned by the DNS server.
If it cannot deliver using one of the previous methods, it uses fallback relays to make the delivery
(providing the recipient's domain matches those listed in the Fallback relays field).
If the domain does not exist, the appliance generates a non-delivery report and sends it to the
originator.
If the receiving server cannot accept delivery, or there are no IP addresses to complete the
delivery, the message is queued.
The appliance tries to provide some information for you, and shows the information highlighted in
amber. To change the information, click and retype.
Option Definition
Cluster mode Defines the options that appear on the Cluster Management page of the Setup Wizard.
Off This is a standard appliance.
Cluster Scanner The appliance receives its scanning workload from a master
appliance.
Cluster Master The appliance controls the scanning workload for several other
appliances.
Cluster Failover If the master fails, this appliance controls the scanning workload
instead.
Network Interface Becomes available when you set the Next Hop Router for IPv6.
To prevent duplication of IP addresses on your network and to deter hackers, give the appliance new
IP addresses, and disable the default IP addresses. The IP addresses must be unique and suitable for
your network. Specify as many IP addresses as you need.
Option Definition
<mode> The operating mode that you set during installation or in the Setup Wizard
Network Interface 1 Expands to show the IP address and netmask associated with Network Interface
1, the auto-negotiation state, and the size of the MTU.
Option Definition
Network Interface 2 Expands to show the IP address and netmask associated with Network Interface
2, the auto-negotiation state, and the size of the MTU
Change Network Click to open the Network Interface Wizard to specify the IP address and adapter
Settings settings for NIC 1 and NIC 2, and change the chosen operating mode.
View Network Interface Click to see the <?> associated with LAN1, LAN2, and the out of band interface
Layout
Depending on the cluster mode you selected on the Basic Settings page, the options that appear on the
Cluster Management page change.
In explicit proxy mode or transparent router mode, you can enable failover between two appliances in a
cluster by assigning a virtual IP address to this appliance and configuring another appliance as a Cluster
Failover appliance using the same virtual address. In transparent bridge mode, this is achieved by
setting a high STP priority for this appliance and configuring another appliance as a Cluster Failover
appliance with a lower STP priority.
Option Definition
Cluster identifier If you have more than one cluster or McAfee Content Security Blade Server
on the same subnet, assign each a different Cluster identifier to ensure the
clusters do not conflict.
The allowable range is 0-255.
Option Definition
Cluster identifier If you have more than one cluster or McAfee Content Security Blade Server on
the same subnet, assign each a different Cluster identifier to ensure the clusters do
not conflict.
The allowable range is 0-255.
For a cluster of appliances, if you have only a master and a failover appliance,
with both configured to scan traffic, the master will send most connections to
the failover appliance for scanning.
Although you can add the MAC addresses of management and failover devices to this table, they always
contribute hard disk space for Secure Web Mail messages and cannot be disabled.
Enable scanning on this If not selected, this appliance distributes all scanning workload to the
appliance scanning appliances.
For a cluster of appliances, if you have only a master and a failover appliance,
with both configured to scan traffic, the master will send most connections to
the failover appliance for scanning.
Domain Name System (DNS) servers translate or "map" the names of network devices into IP
addresses (and the reverse operation). The appliance sends requests to DNS servers in the order that
they are listed here.
Option Definition
Server Address Displays the IP addresses of the DNS servers. The first server in the list must be your
fastest or most reliable server. If the first server cannot resolve the request, the
appliance contacts the second server. If no servers in the list can resolve the request,
the appliance forwards the request to the DNS root name servers on the Internet.
If your firewall prevents DNS lookup (typically on port 53), specify the IP address of a
local device that provides name resolution
New Server/ Adds a new server to the list, or removes one when, for example, when you need to
Delete Selected decommission a server due to network changes.
Servers
Only send Selected by default. McAfee recommends that you leave this option selected because it
queries to these might speed up DNS queries as the appliance sends the queries to the specified DNS
servers servers only. If they don't know the address, they go to the root DNS servers on the
Internet. When they get a reply, the appliance receives it and caches the response so
that other servers that query that DNS server can get an answer more quickly.
If you deselect this option, the appliance first tries to resolve the requests, or might
query DNS servers outside your network.
Routing Settings
Option Definition
Network Address Type the network address of the route.
Mask Specifies how many hosts are on your network, for example, 255.255.255.0.
Gateway Specifies the IP address of the router used as the next hop out of the network. The
address 0.0.0.0 (IPv4), or :: (IPv6) means that the router has no default gateway.
Metric Specifies the preference given to the route. A low number indicates a high
preference for that route.
New Route / Add a new route to the table, ore remove routes. Use the arrows to move routes up
Delete Selected and down the list. The routes are chosen based on their metric value.
Routes
Enable dynamic Use this option in transparent router mode only. When enabled, the appliance can:
routing
receive broadcast routing information received over RIP (default) that it applies its
routing table so you don't have to duplicate routing information on the appliance
that is already present in the network.
broadcast routing information if static routes have been configured through the
user interface over RIP.
Enable Graymail Protection Click to enable protection from messages (such as email newsletters) that
some users want, but that others might prefer to block.
When selected, the Graymail dictionary is added to the Anti-Spam Terms list,
found in Email | Email Policies | Spam | Spam Terms.
To view the terms within the Graymail dictionary, select this dictionary from
Email | DLP and Dictionaries | Compliance Dictionaries.
Enable McAfee Global Threat Click What is this? to read about how the feedback is used, and view the McAfee
Intelligence feedback Privacy Policy.
Scan SMTP traffic / Scan Both protocols are selected by default. Deselect a protocol to prevent
POP3 traffic scanning occurring.
Option definitions Domains for which the appliance will accept or refuse email
Use these options to define how the appliance will relay email. After you complete the Setup Wizard,
you can manage the domains from Email | Email Configuration | Receiving Email.
Option Definition
Domain Name/ Displays the domain names, wildcard domain names, network addresses, and MX
Network lookups from which the appliance will accept or refuse email.
Address/MX
Record
Type Domain name For example, example.com. The appliance uses this to compare the
recipient's email address and compare the connection against an A record lookup.
Network Address For example, 192.168.0.2/32 or 192.168.0.0/24. The appliance
uses this to compare the recipient's IP literal email address such as
user@[192.168.0.2], or the connection.
MX Record Lookup For example, example.com. The appliance uses this to compare the
connection against an MX record lookup.
Wildcard domain name For example, *.example.com. The appliance only uses this
information to compare the recipient's email address.
Ensure that you define your local domains, as well as the domains from which you want to
permit email relaying, and that you want to deny email relaying. Defining a domain as a
Permitted domain ensures that email traffic from that domain is always allowed to be relayed.
Add Domain Click to specify the domains that can relay messages through the appliance to the
recipient. Choose from:
Local domain These are the domains or networks for which email is accepted for
delivery. For convenience, you can import a list of your local domain names using the
Import Lists and Export Lists options. McAfee recommends that you add all domains or
networks that are allowed to relay messages as local domains.
Permitted domain Email is accepted. Use permitted domains to manage exceptions.
Denied domain Email is refused. Use denied domains to manage exceptions.
Hold your mouse cursor over the field to see the recommended format.
Add MX Click to specify a domain that the appliance will use to identify all mail server IP
Lookup addresses from which it will deliver messages.
Delete Remove the selected item from the table. You must apply the changes before the item is
Selected completely removed from the appliance configuration.
Items
Option Definition
Domain name / Displays a list of domains.
Network This list allows you to specify specific relays/sets of relays to be used to deliver
Address / MX messages destined for specific domains. Domains can be identified using exact
Record matches, or using pattern matches such as *.example.com.
To specify multiple relays for a single domain, separate each with a space.
If the first mail relay is accepting email, all email is delivered to the first relay. If that
relay stops accepting email, subsequent email is delivered to the next relay in the list.
Type Domain name For example, example.com. The appliance uses this to compare the
recipient's email address and compare the connection against an A record lookup.
Network Address For example, 192.168.0.2/32 or 192.168.0.0/24. The appliance
uses this to compare the recipient's IP literal email address such as
user@[192.168.0.2], or the connection.
MX Record Lookup For example, example.com. The appliance uses this to compare
the connection against an MX record lookup.
Wildcard domain name For example, *.example.com. The appliance only uses this
information to compare the recipient's email address.
Add Relay List Click to populate the Known domains and relay hosts table with a list of host names or IP
addresses for delivery. Delivery will be attempted in the order specified unless you
select the Round-robin the above hosts option, which will distribute the load between the
specified hosts.
Add MX Lookup Click to populate the Known domains and relay hosts table with an MX record lookup to
determine the IP addresses for delivery.
Delivery will be attempted to host names returned by the MX lookup in the order of
priority given by the DNS server.
Delete Selected Remove the selected item from the table. You must apply the changes before the item
Items is completely removed from the appliance configuration.
Enable DNS If selected, the appliance uses DNS to route email for other, unspecified domains. DNS
lookup for delivery attempts an MX-record lookup. If there are no MX records, it does an A-record
domains not lookup.
listed above
If you deselect this checkbox, the appliance delivers email only to the domains that are
specified under Known domains and relay hosts.
Option Definition
Appliance Time Specifies the time zone of the appliance. You might need to set this twice each year
Zone if your region observes daylight saving time.
Appliance Time Specifies the date and UTC time for the appliance. To select the date, click the
(UTC) calendar icon. You can determine the UTC time from websites such as http://
www.worldtimeserver.com.
Set Now When clicked, applies the date and UTC time that you specified in this row.
Client Time Displays the time according to the client computer from which your browser is
currently connected to the appliance.
Synchronize When selected, the time in the Appliance Time (UTC) immediately takes its value from
appliance with Client Time. You can use this checkbox as an alternative to manual setting of Appliance
client Time (UTC). The appliance calculates the UTC time based on the time zone that it finds
on the client's browser.
Ensure that the client computer is aware of any daylight savings adjustments. To find
the setting on Microsoft Windows, right-click the time display in the bottom right
corner of the screen.
Enable NTP When selected, accepts NTP messages from a specified server or a network
broadcast. NTP synchronizes timekeeping among devices in a network. Some
Internet Service Providers (ISPs) provide a timekeeping service. Because NTP
messages are not sent often, they do not noticeably affect the appliance's
performance.
Enable NTP client When selected, accepts NTP messages from network broadcasts only. This method
broadcasts is useful on a busy network but must trust other devices in the network.
When deselected, accepts NTP messages only from servers specified in the list.
NTP Server Displays the network address or a domain name of one or more NTP servers that
the appliance uses. For example, time.nist.gov.
If you specify several servers, the appliance examines each NTP message in turn to
determine the correct time.
Password page
Use this page to specify a password for the appliance.
For a strong password, include letters and numbers. You can type up to 15 characters.
Option Definition
User ID This is admin. You can add more users later.
Password Specifies the new password. Change the password as soon as possible to keep your
appliance secure.
You must enter the new password twice to confirm it. The original default password is
password.
Summary page
Review a summary of the settings that you have made for the network connections and scanning of
the email traffic.
To change any value, click its blue link to display the page where you originally typed the value.
Use the IP address shown here to access the interface. For example https://192.168.200.10. The
address starts with https, not http.
If you have configured your McAfee Email Gateway to provide Secure Web Mail, then you need to
access the appliance using port 10443. So, using the example above, you would need to enter https://
192.168.200.10:10443.
When you first log on to the interface, type the user name, admin and the password that you gave on
the Password page.
The value is probably not correct. Although the value is valid, it is not set according to best
practice. Check the value before continuing.
No value has been set. The value has not been changed from the default. Check the value
before continuing.
The options you see in the Network Interfaces Wizard depend on the operating mode. On the first
page of the wizard, you can choose to change the operating mode for the appliance. You can change
the settings by clicking Change Network Settings to start a wizard. Click Next to progress through the wizard.
In Explicit Proxy mode, some network devices send traffic to the appliances. The appliance then
works as a proxy, processing traffic on behalf of the devices.
In Transparent Router or Transparent Bridge mode, other network devices, such as mail servers,
are unaware that the appliance has intercepted and scanned the email before forwarding it. The
appliance's operation is transparent to the devices.
If you have a standalone appliance running in transparent bridge mode, you will have the option to add
a bypass device in case the appliance fails.
If the appliance is operating in Transparent Bridge mode, and the Spanning Tree Protocol (STP) is
running on your network, make sure that the appliance is configured according to STP rules.
Additionally, you can set up a bypass device in transparent bridge mode.
To configure your McAfee Email Gateway Blade Server to failover from the management blade to the
failover management blade, you must specify at least one virtual IP address, shared between the
management and failover management blades.
This version of the Network Interfaces Wizard becomes available when you select the Explicit Proxy
mode.
Specify the details for Network Interface 1, then use the Next button to set details for Network Interface
2 as necessary.
Option Definition
IP Address Specifies network addresses to enable the appliance to communicate with your
network. You can specify multiple IP addresses for the appliances network ports. The
IP address at the top of a list is the primary address. Any IP addresses below it are
aliases.
You must have at least one IP address in both Network Interface 1 and Network
Interface 2. However, you can deselect the Enabled option next to any IP addresses that
you do not wish to listen on.
Network Mask Specifies the network mask. In IPv4, you can use a format such as 255.255.255.0, or
CIDR notation, such as 24. In IPv6, you must use the prefix length, for example, 64.
Enabled When selected, the appliance accepts connections on the IP address.
Virtual When selected, the appliance treats this IP address as a virtual address.
Option Definition
IP Address Specifies network addresses to enable the appliance to communicate with your
network. You can specify multiple IP addresses for the appliances ports. The IP
address at the top of a list is the primary address. Any IP addresses below it are
aliases.
Network Mask Specifies the network mask, for example: 255.255.255.0. In IPv4, you can use a
format such as 255.255.255.0, or CIDR notation, such as 24. In IPv6, you must use
the prefix length, for example, 64.
Enabled When selected, the appliance accepts connections on that IP address.
Virtual When selected, the appliance treats this IP address as a virtual address. This option
only appears in cluster configurations, or on a McAfee Content Security Blade Server.
New Address/ Add a new address, or remove a selected IP address.
Delete Selected
Addresses
NIC 1 Adapter Expand to set the following options:
Options or NIC
MTU size Specifies the Maximum Transmission Unit (MTU) size. The MTU is the
2 Adapter
Options maximum size (expressed in bytes) of a single unit of data (for example, an
Ethernet Frame) that can be sent over the connection. The default value is 1500
bytes.
Autonegotiation state either:
On allows the appliance to negotiate the speed and duplex state for
communicating with other network devices.
Off allows you to select the speed and duplex state.
Connection speed provides a range of speeds. Default value is 100MB.
Enable sending IPv6 router advertisements on this interface When enabled, allows IPv6 router
advertisements to be sent to machines on the sub-net that require a router
response to complete auto-configuration.
Specify the details for the Ethernet Bridge, then use the Next button to set details for the Spanning Tree
Protocol and Bypass Device as necessary.
Option Definition
Select all Click to select all the IP addresses.
IP Address Specifies network addresses to enable the appliance to communicate with your
network. You can specify multiple IP addresses for the appliances ports. The IP
addresses are combined into one list for both ports. The IP address at the top of a list
is the primary address. Any IP addresses below it are aliases.
Use the Move links to reposition the addresses as necessary.
Network Mask Specifies the network mask, for example: 255.255.255.0. In IPv4, you can use a
format such as 255.255.255.0, or CIDR notation, such as 24. In IPv6, you must use
the prefix length, for example, 64.
Enabled When selected, the appliance accepts connections on that IP address.
New Address/ Add a new address, or remove a selected IP address.
Delete Selected
Addresses
NIC Adapter Expand to set the following options:
Options
MTU size specifies the Maximum Transmission Unit (MTU) size. The MTU is the
maximum size (expressed in bytes) of a single unit of data (for example, an Ethernet
Frame) that can be sent over the connection. The default value is 1500 bytes.
Autonegotiation state either:
On allows the appliance to negotiate the speed and duplex state for
communicating with other network devices.
Off allows you to select the speed and duplex state.
Connection speed provides a range of speeds. Default value is 100MB.
Option Definition
Enable STP STP is enabled by default.
Bridge priority Sets the priority for the STP bridge. Lower numbers have a higher priority. The
maximum number that you can set is 65535.
Advanced parameters Expand to set the following options. Change the settings only if you understand
the possible effects, or you have consulted an expert:
Forwarding delay Garbage collection interval (seconds)
Hello interval (seconds) Ageing time (seconds)
Maximum age (seconds)
Option Definition
The bypass device inherits settings from those you entered in NIC Adapter Options
.
Select bypass device Choose from two supported devices.
Watchdog timeout For the bypass device, the time, in seconds, that can elapse before the system
(seconds) bypasses the appliance.
Heartbeat interval Set to monitor heartbeat by default.
(seconds)
Advanced parameters This option becomes active when you select a bypass device.
Mode choose to monitor the heartbeat or the heartbeat and the link activity.
Link activity timeout (seconds) becomes active when you select Monitor heartbeat and link
activity in Mode
Enable buzzer enabled by default. If the bypass device fails to detect the
heartbeat signal for the configured Watchdog timeout, the buzzer sounds.
This dialog box shows the current assignments for the network interfaces. Use it to confirm that the
assignments are as you expect.
Contents
Import Configuration
Values to Restore
Basic Settings page (Custom Setup)
Cluster Management page
DNS and Routing page
Time Settings page
Password page
Summary page
Import Configuration
Use this dialog to import the configuration file containing the details that you want to use to configure
your appliance.
Table 5-44 Option definitions
Option Definition
Browse Locate the configuration file to use as a basis for your new settings.
The configuration filename is in the format:
config_<date and time stamp>.zip
Values to Restore
Use this dialog to choose the areas of the configuration that you want to restore.
By default, the setup wizard attempts to restore all settings found within the configuration file onto
your appliance.
You can choose not to restore settings in particular areas by deselecting them before continuing with
the installation.
The setup wizard enables you to review and change all setting before you apply then to the appliance.
Network configuration Information about the IP addresses, host names and other details that are
specific to your appliance and your network.
The reporting configuration Information about how you have configured your Favorite Reports and Scheduled
Reports.
The user preferences Information about how you have configured user interface options, such as the
Dashboard configuration.
Role-based user accounts Selecting this re-installs information about the role-based user accounts that
you have set up.
ePO configuration If the appliance that generated the configuration file was under ePolicy
Orchestrator management, this option applies these ePO configuration
settings.
The appliance tries to provide some information for you, and shows the information highlighted in
amber. To change the information, click and retype.
Option Definition
Cluster mode Defines the options that appear on the Cluster Management page of the Setup Wizard.
Off This is a standard appliance.
Cluster Scanner The appliance receives its scanning workload from a master
appliance.
Cluster Master The appliance controls the scanning workload for several other
appliances.
Cluster Failover If the master fails, this appliance controls the scanning workload
instead.
Network Interface Becomes available when you set the Next Hop Router for IPv6.
Depending on the cluster mode you selected on the Basic Settings page, the options that appear on the
Cluster Management page change.
In explicit proxy mode or transparent router mode, you can enable failover between two appliances in a
cluster by assigning a virtual IP address to this appliance and configuring another appliance as a Cluster
Failover appliance using the same virtual address. In transparent bridge mode, this is achieved by
setting a high STP priority for this appliance and configuring another appliance as a Cluster Failover
appliance with a lower STP priority.
Option Definition
Cluster identifier If you have more than one cluster or McAfee Content Security Blade Server
on the same subnet, assign each a different Cluster identifier to ensure the
clusters do not conflict.
The allowable range is 0-255.
Option Definition
Cluster identifier If you have more than one cluster or McAfee Content Security Blade Server on
the same subnet, assign each a different Cluster identifier to ensure the clusters do
not conflict.
The allowable range is 0-255.
For a cluster of appliances, if you have only a master and a failover appliance,
with both configured to scan traffic, the master will send most connections to
the failover appliance for scanning.
Although you can add the MAC addresses of management and failover devices to this table, they always
contribute hard disk space for Secure Web Mail messages and cannot be disabled.
Enable scanning on this If not selected, this appliance distributes all scanning workload to the
appliance scanning appliances.
For a cluster of appliances, if you have only a master and a failover appliance,
with both configured to scan traffic, the master will send most connections to
the failover appliance for scanning.
Domain Name System (DNS) servers translate or "map" the names of network devices into IP
addresses (and the reverse operation). The appliance sends requests to DNS servers in the order that
they are listed here.
Option Definition
Server Address Displays the IP addresses of the DNS servers. The first server in the list must be your
fastest or most reliable server. If the first server cannot resolve the request, the
appliance contacts the second server. If no servers in the list can resolve the request,
the appliance forwards the request to the DNS root name servers on the Internet.
If your firewall prevents DNS lookup (typically on port 53), specify the IP address of a
local device that provides name resolution
New Server/ Adds a new server to the list, or removes one when, for example, when you need to
Delete Selected decommission a server due to network changes.
Servers
Only send Selected by default. McAfee recommends that you leave this option selected because it
queries to these might speed up DNS queries as the appliance sends the queries to the specified DNS
servers servers only. If they don't know the address, they go to the root DNS servers on the
Internet. When they get a reply, the appliance receives it and caches the response so
that other servers that query that DNS server can get an answer more quickly.
If you deselect this option, the appliance first tries to resolve the requests, or might
query DNS servers outside your network.
Routing Settings
Option Definition
Network Address Type the network address of the route.
Mask Specifies how many hosts are on your network, for example, 255.255.255.0.
Gateway Specifies the IP address of the router used as the next hop out of the network. The
address 0.0.0.0 (IPv4), or :: (IPv6) means that the router has no default gateway.
Metric Specifies the preference given to the route. A low number indicates a high
preference for that route.
New Route / Add a new route to the table, ore remove routes. Use the arrows to move routes up
Delete Selected and down the list. The routes are chosen based on their metric value.
Routes
Enable dynamic Use this option in transparent router mode only. When enabled, the appliance can:
routing
receive broadcast routing information received over RIP (default) that it applies its
routing table so you don't have to duplicate routing information on the appliance
that is already present in the network.
broadcast routing information if static routes have been configured through the
user interface over RIP.
Option Definition
Appliance Time Specifies the time zone of the appliance. You might need to set this twice each year
Zone if your region observes daylight saving time.
Appliance Time Specifies the date and UTC time for the appliance. To select the date, click the
(UTC) calendar icon. You can determine the UTC time from websites such as http://
www.worldtimeserver.com.
Set Now When clicked, applies the date and UTC time that you specified in this row.
Client Time Displays the time according to the client computer from which your browser is
currently connected to the appliance.
Synchronize When selected, the time in the Appliance Time (UTC) immediately takes its value from
appliance with Client Time. You can use this checkbox as an alternative to manual setting of Appliance
client Time (UTC). The appliance calculates the UTC time based on the time zone that it finds
on the client's browser.
Ensure that the client computer is aware of any daylight savings adjustments. To find
the setting on Microsoft Windows, right-click the time display in the bottom right
corner of the screen.
Enable NTP When selected, accepts NTP messages from a specified server or a network
broadcast. NTP synchronizes timekeeping among devices in a network. Some
Internet Service Providers (ISPs) provide a timekeeping service. Because NTP
messages are not sent often, they do not noticeably affect the appliance's
performance.
Enable NTP client When selected, accepts NTP messages from network broadcasts only. This method
broadcasts is useful on a busy network but must trust other devices in the network.
When deselected, accepts NTP messages only from servers specified in the list.
Option Definition
NTP Server Displays the network address or a domain name of one or more NTP servers that
the appliance uses. For example, time.nist.gov.
If you specify several servers, the appliance examines each NTP message in turn to
determine the correct time.
Password page
Use this page to specify a password for the appliance.
For a strong password, include letters and numbers. You can type up to 15 characters.
Option Definition
User ID This is admin. You can add more users later.
Password Specifies the new password. Change the password as soon as possible to keep your
appliance secure.
You must enter the new password twice to confirm it. The original default password is
password.
Summary page
Review a summary of the settings that you have made for the network connections and scanning of
the email traffic.
To change any value, click its blue link to display the page where you originally typed the value.
Use the IP address shown here to access the interface. For example https://192.168.200.10. The
address starts with https, not http.
If you have configured your McAfee Email Gateway to provide Secure Web Mail, then you need to
access the appliance using port 10443. So, using the example above, you would need to enter https://
192.168.200.10:10443.
When you first log on to the interface, type the user name, admin and the password that you gave on
the Password page.
The value is probably not correct. Although the value is valid, it is not set according to best
practice. Check the value before continuing.
No value has been set. The value has not been changed from the default. Check the value
before continuing.
Contents
Settings for ePolicy Orchestrator Management
Option Definition
ePO Extensions Download the McAfee ePolicy Orchestrator extensions for McAfee Gateway products,
including McAfee Email Gateway.
The file MEGv7.x_ePOextensions.zip contains both the EWG and the MEG McAfee
ePolicy Orchestrator extensions.
The EWG extension allows reporting from within McAfee ePolicy Orchestrator for the
following products:
McAfee Email and Web Security appliances
McAfee Web Gateway appliances
McAfee Email Gateway appliances
The MEG Extension provides full McAfee ePolicy Orchestrator management for McAfee
Email Gateway versions 7.0 onwards.
For you to use McAfee ePolicy Orchestrator for either reporting or management, the
McAfee ePolicy Orchestrator Extensions need to be installed on your McAfee ePolicy
Orchestrator server.
Import ePO Click to browse to the McAfee ePolicy Orchestrator connection settings file, to import
connection the McAfee ePolicy Orchestrator connection information into the appliance.
settings
2 From your McAfee Email Gateway, on Settings for ePO Management, select ePO Help Extensions and click Save
to download the help extension file.
3 On your McAfee ePolicy Orchestrator server, install these extensions using Menu | Software | Extensions
| Install Extensions.
4 On the McAfee ePolicy Orchestrator server, save the connections settings from Menu | Gateway
Protection | Email and Web Gateway | Actions | Export Connection Settings.
5 On the McAfee Email Gateway, return to the Settings for ePO Management page in the Setup Wizard, and
click Import ePO connection settings. Browse to the McAfee ePolicy Orchestrator connections settings file.
6 Click Next to continue to the Basic Settings page in the Setup Wizard.
Option Definition
<mode> The operating mode that you set during installation or in the Setup Wizard
Network Interface 1 Expands to show the IP address and netmask associated with Network Interface
1, the auto-negotiation state, and the size of the MTU.
Network Interface 2 Expands to show the IP address and netmask associated with Network Interface
2, the auto-negotiation state, and the size of the MTU
Change Network Click to open the Network Interface Wizard to specify the IP address and adapter
Settings settings for NIC 1 and NIC 2, and change the chosen operating mode.
View Network Interface Click to see the <?> associated with LAN1, LAN2, and the out of band interface
Layout
Option Definition
Cluster identifier Specifies an identifier. Range is 0-255.
Option Definition
Address to use for load balancing Specifies the appliance address.
Cluster identifier Specifies an identifier. Range is 0-255.
Enable scanning on this appliance If not selected, this appliance distributes all scanning workload to the
scanning appliances.
Option Definition
Address to use for load balancing Specifies the appliance address. Provides a list of all subnets assigned to
the appliance.
Cluster identifier Specifies an identifier. Range is 0-255.
Enable scanning on this appliance If not selected, this appliance distributes all scanning workload to the
scanning appliances.
Domain Name System (DNS) servers translate or "map" the names of network devices into IP
addresses (and the reverse operation). The appliance sends requests to DNS servers in the order that
they are listed here.
Option Definition
Server Address Displays the IP addresses of the DNS servers. The first server in the list must be your
fastest or most reliable server. If the first server cannot resolve the request, the
appliance contacts the second server. If no servers in the list can resolve the request,
the appliance forwards the request to the DNS root name servers on the Internet.
If your firewall prevents DNS lookup (typically on port 53), specify the IP address of a
local device that provides name resolution
New Server/ Adds a new server to the list, or removes one when, for example, when you need to
Delete Selected decommission a server due to network changes.
Servers
Only send Selected by default. McAfee recommends that you leave this option selected because it
queries to these might speed up DNS queries as the appliance sends the queries to the specified DNS
servers servers only. If they don't know the address, they go to the root DNS servers on the
Internet. When they get a reply, the appliance receives it and caches the response so
that other servers that query that DNS server can get an answer more quickly.
If you deselect this option, the appliance first tries to resolve the requests, or might
query DNS servers outside your network.
Routing Settings
Option Definition
Network Address Type the network address of the route.
Mask Specifies how many hosts are on your network, for example, 255.255.255.0.
Gateway Specifies the IP address of the router used as the next hop out of the network. The
address 0.0.0.0 (IPv4), or :: (IPv6) means that the router has no default gateway.
Metric Specifies the preference given to the route. A low number indicates a high
preference for that route.
New Route / Add a new route to the table, ore remove routes. Use the arrows to move routes up
Delete Selected and down the list. The routes are chosen based on their metric value.
Routes
Enable dynamic Use this option in transparent router mode only. When enabled, the appliance can:
routing
receive broadcast routing information received over RIP (default) that it applies its
routing table so you don't have to duplicate routing information on the appliance
that is already present in the network.
broadcast routing information if static routes have been configured through the
user interface over RIP.
Option Definition
Appliance Time Specifies the time zone of the appliance. You might need to set this twice each year
Zone if your region observes daylight saving time.
Appliance Time Specifies the date and UTC time for the appliance. To select the date, click the
(UTC) calendar icon. You can determine the UTC time from websites such as http://
www.worldtimeserver.com.
Set Now When clicked, applies the date and UTC time that you specified in this row.
Client Time Displays the time according to the client computer from which your browser is
currently connected to the appliance.
Synchronize When selected, the time in the Appliance Time (UTC) immediately takes its value from
appliance with Client Time. You can use this checkbox as an alternative to manual setting of Appliance
client Time (UTC). The appliance calculates the UTC time based on the time zone that it finds
on the client's browser.
Ensure that the client computer is aware of any daylight savings adjustments. To find
the setting on Microsoft Windows, right-click the time display in the bottom right
corner of the screen.
Enable NTP When selected, accepts NTP messages from a specified server or a network
broadcast. NTP synchronizes timekeeping among devices in a network. Some
Internet Service Providers (ISPs) provide a timekeeping service. Because NTP
messages are not sent often, they do not noticeably affect the appliance's
performance.
Enable NTP client When selected, accepts NTP messages from network broadcasts only. This method
broadcasts is useful on a busy network but must trust other devices in the network.
When deselected, accepts NTP messages only from servers specified in the list.
Option Definition
NTP Server Displays the network address or a domain name of one or more NTP servers that
the appliance uses. For example, time.nist.gov.
If you specify several servers, the appliance examines each NTP message in turn to
determine the correct time.
Password page
Use this page to specify a password for the appliance.
For a strong password, include letters and numbers. You can type up to 15 characters.
Option Definition
User ID This is admin. You can add more users later.
Password Specifies the new password. Change the password as soon as possible to keep your
appliance secure.
You must enter the new password twice to confirm it. The original default password is
password.
To change any value, click its blue link to display the page where you originally typed the value.
Use the IP address shown here to access the interface. For example https://192.168.200.10. Note
that the address begins with https, not http.
When you first log onto the interface, type the user name, admin and the password that you gave to
this setup wizard.
The appliance is now managed by ePolicy Orchestrator. Log onto the ePolicy Orchestrator server to
manage your appliance.
The value is probably not correct. Although the value is valid, it is not set according to best
practice. Check the value before continuing.
No value has been set. The value has not been changed from the default. Check the value
before continuing.
The appliance tries to provide some information for you, and shows the information highlighted in
amber. To change the information, click and retype.
Option Definition
Cluster mode Defines the options that appear on the Cluster Management page of the Setup
Wizard.
Off This is a standard appliance.
Cluster Scanner The appliance receives its scanning workload from a master
appliance.
Cluster Master The appliance controls the scanning workload for several other
appliances.
Cluster Failover If the master fails, this appliance controls the scanning
workload instead.
To prevent duplication of IP addresses on your network and to deter hackers, give the appliance new
IP addresses, and disable the default IP addresses. The IP addresses must be unique and suitable for
your network. Specify as many IP addresses as you need.
Option Definition
<mode> The operating mode that you set during installation or in the Setup Wizard.
Network Interface 1 Expands to show the IP address and netmask associated with Network Interface
1, the auto-negotiation state, and the size of the MTU.
Network Interface 2 Expands to show the IP address and netmask associated with Network Interface
2, the auto-negotiation state, and the size of the MTU.
Change Network Click to open the Network Interface Wizard to specify the IP address and adapter
Settings settings for NIC 1 and NIC 2, and change the chosen operating mode.
View Network Interface Click to see the <?> associated with LAN1, LAN2, and the out of band interface.
Layout
Depending on the cluster mode you selected on the Basic Settings page, the options that appear on
the Cluster Management page change.
Option Definition
Cluster identifier If you have more than one cluster or McAfee Content Security Blade Server on the
same subnet, assign each a different Cluster identifier to ensure the clusters do not
conflict.
The allowable range is 0-255.
In explicit proxy mode or transparent router mode, you can enable failover between two appliances in a
cluster by assigning a virtual IP address to this appliance and configuring another appliance as a Cluster
Failover appliance using the same virtual address. In transparent bridge mode, this is achieved by
setting a high STP priority for this appliance and configuring another appliance as a Cluster Failover
appliance with a lower STP priority.
Option Definition
Cluster identifier If you have more than one cluster or McAfee Content Security Blade Server
on the same subnet, assign each a different Cluster identifier to ensure the
clusters do not conflict.
The allowable range is 0-255.
Option Definition
Cluster identifier If you have more than one cluster or McAfee Content Security Blade Server on
the same subnet, assign each a different Cluster identifier to ensure the clusters do
not conflict.
The allowable range is 0-255.
For a cluster of appliances, if you have only a master and a failover appliance,
with both configured to scan traffic, the master will send most connections to
the failover appliance for scanning.
Option Definition
Address to use for load Specifies the appliance address. Provides a list of all subnets assigned to the
balancing appliance.
Cluster identifier If you have more than one cluster or McAfee Content Security Blade Server on
the same subnet, assign each a different Cluster identifier to ensure the clusters do
not conflict.
The allowable range is 0-255.
Enable scanning on this If not selected, this appliance distributes all scanning workload to the scanning
appliance appliances.
For a cluster of appliances, if you have only a master and a failover appliance,
with both configured to scan traffic, the master will send most connections to the
failover appliance for scanning.
Option Definition
Address to use for load Specifies the appliance address. Provides a list of all subnets assigned to the
balancing appliance.
Cluster identifier If you have more than one cluster or McAfee Content Security Blade Server on
the same subnet, assign each a different Cluster identifier to ensure the clusters
do not conflict.
The allowable range is 0-255.
Domain Name System (DNS) servers translate or "map" the names of network devices into IP
addresses (and the reverse operation). The appliance sends requests to DNS servers in the order that
they are listed here.
Option Definition
Server Address Displays the IP addresses of the DNS servers. The first server in the list must be your
fastest or most reliable server. If the first server cannot resolve the request, the
appliance contacts the second server. If no servers in the list can resolve the request,
the appliance forwards the request to the DNS root name servers on the Internet.
If your firewall prevents DNS lookup (typically on port 53), specify the IP address of a
local device that provides name resolution
New Server / Adds a new server to the list, or removes one when, for example, when you need to
Delete Selected decommission a server due to network changes.
Servers
Only send Selected by default. McAfee recommends that you leave this option selected because it
queries to these might speed up DNS queries as the appliance sends the queries to the specified DNS
servers servers only. If they don't know the address, they go to the root DNS servers on the
Internet. When they get a reply, the appliance receives it and caches the response so
that other servers that query that DNS server can get an answer more quickly.
If you deselect this option, the appliance first tries to resolve the requests, or might
query DNS servers outside your network.
Routing Settings
Option Definition
Network Address Type the network address of the route.
Mask Specifies how many hosts are on your network, for example, 255.255.255.0.
Gateway Specifies the IP address of the router used as the next hop out of the network. The
address 0.0.0.0 (IPv4), or :: (IPv6) means that the router has no default gateway.
Metric Specifies the preference given to the route. A low number indicates a high
preference for that route.
New Route / Add a new route to the table, or remove routes. Use the arrows to move routes up
Delete Selected and down the list. The routes are chosen based on their metric value.
Routes
Enable dynamic Use this option in transparent router mode only. When enabled, the appliance can:
routing
receive broadcast routing information received over RIP (default) that it applies its
routing table so you don't have to duplicate routing information on the appliance
that is already present in the network.
broadcast routing information if static routes have been configured through the
user interface over RIP.
After you complete the Setup Wizard, you can manage the domains from Email | Email Configuration |
Receiving Email .
Option Definition
Domain Name / Displays the domain names, wildcard domain names, network addresses, and MX
Network lookups from which the appliance will accept or refuse email.
Address / MX
Record
Type Domain name for example, example.dom. The appliance uses this to compare the
recipient's email address and compare the connection against an A record lookup.
Network Address for example, 192.168.0.2/32 or 192.168.0.0/24. The appliance uses
this to compare the recipient's IP literal email address such as user@[192.168.0.2],
or the connection.
MX Record Lookup for example, example.dom. The appliance uses this to compare the
connection against an MX record lookup.
Wildcard domain name for example, *.example.dom. The appliance only uses this
information to compare the recipients email address.
Option Definition
Add Domain Click to specify the domains that can relay messages through the appliance to the
recipient. Choose from:
Local domain These are the domains or networks for which email is accepted for
delivery. For convenience, you can import a list of your local domain names using the
Import Lists and Export Lists options. McAfee recommends that you add all domains or
networks that are allowed to relay messages as local domains.
Permitted domain Email is accepted. Use permitted domains to manage exceptions.
Denied domain Email is refused. Use denied domains to manage exceptions.
Hold your mouse cursor over the field to see the recommended format.
Add MX Lookup Click to specify a domain that the appliance will use to identify all mail server IP
addresses from which it will deliver messages.
Delete Selected Remove the selected item from the table. You must apply the changes before the item
Items is completely removed from the appliance configuration.
Domain Routing
After you complete the Setup Wizard, you can manage the domains from Email | Email Configuration |
Sending Email .
Option Definition
Domain Displays a list of domains.
Type Domain name for example, example.dom. The appliance uses this to compare the
recipient's email address and compare the connection against an A record lookup.
Network Address for example, 192.168.0.2/32 or 192.168.0.0/24. The appliance
uses this to compare the recipient's IP literal email address such as
user@[192.168.0.2], or the connection.
MX record lookup for example, example.dom. The appliance uses this to compare the
connection against an MX record lookup.
Wildcard domain name for example, *.example.dom. The appliance only uses this
information to compare the recipients email address.
Relay List/MX Displays either the Relay List of the MX record for the selected domain.
Record
Add Relay List Click to populate the Known domains and relay hosts table with a list of host
names, or IP addresses for delivery. Delivery will be attempted in the order specified
unless you select the Round-robin the above hosts option which will distribute the
load between the specified hosts.
Add MX Lookup Click to populate the Known domains and relay hosts table with an MX record
lookup to determine the IP addresses for delivery.
Delivery will be attempted to host names returned by the MX lookup in the order of
priority given by the DNS server.
Option Definition
Delete Selected Remove the selected item from the table. You must apply the changes before the item
Items is completely removed from the appliance configuration.
Enable DNS If selected, the appliance uses DNS to route email for other, unspecified domains.
lookup for DNS delivery attempts an MX-record lookup. If there are no MX records, it does an
domains not A-record lookup.
listed above.
If you deselect this checkbox, the appliance delivers email only to the domains that are
specified under
Known domains and relay hosts
.
Ensure that the client computer is aware of any daylight savings adjustments. To find
the setting on Microsoft Windows, right-click the time display in the bottom right
corner of the screen.
Enable NTP When selected, accepts NTP messages from a specified server or a network
broadcast. NTP synchronizes timekeeping among devices in a network. Some
Internet Service Providers (ISPs) provide a timekeeping service. Because NTP
messages are not sent often, they do not noticeably affect the appliance's
performance.
Enable NTP client When selected, accepts NTP messages from network broadcasts only. This method
broadcasts is useful on a busy network but must trust other devices in the network.
When deselected, accepts NTP messages only from servers specified in the list.
NTP Server Displays the network address or a domain name of one or more NTP servers that
the appliance uses. For example, time.nist.gov.
If you specify several servers, the appliance examines each NTP message in turn to
determine the correct time.
For a strong password, include letters and numbers. You can type up to 15 characters.
Option Definition
User ID This is admin. You can add more users later.
Current Password The existing password. The original default password is password. Change
the password as soon as possible to keep your appliance secure.
New Password / Confirm New Specifies the new password.
Password You must enter the new password twice to confirm it.
To change any value, click its blue link to display the page where you originally typed the value.
Use the IP address shown here to access the interface. For example https://192.168.200.10. The
address starts with https, not http.
If you have configured your McAfee Email Gateway to provide Secure Web Mail, then you need to
access the appliance using port 10443. So, using the example above, you would need to enter https://
192.168.200.10:10443.
When you first log on to the interface, type the user name, admin and the password that you gave on
the Password page.
The value is probably not correct. Although the value is valid, it is not set according to best
practice. Check the value before continuing.
No value has been set. The value has not been changed from the default. Check the value
before continuing.
This topic provides an overview of the features within the Email Gateway that assist you in
troubleshooting the appliance.
Troubleshoot
If you are experiencing problems, read the Troubleshooting section, which answers some frequently
asked questions. The appliance includes many diagnostic tools for identifying problems.
The Resources link at the top of the window provides links to the following information:
Contacting support.
Submitting a sample.
Additional resources, including links to a list of McAfee addresses and to the SNMP MIB definitions.
Contents
Troubleshooting Tools
Troubleshooting Reports
Tests
Troubleshooting Tools
Use these topics to learn about the troubleshooting tools included within the appliance.
Troubleshoot | Tools
Contents
Ping and Trace Route
Generate Test Email
System Load
Route Information
Disk Space
Hardware Status
FIPS Status
If a response comes back, that device can be reached. If the request times-out, that device cannot be
reached. This test rules out physical problems with the network connection and ensures that other
devices are switched on.
Option Definition
Recipient address Type the name of the mailbox that you want to receive the test notification message.
Subject Type the subject line that you want to appear in the test notification message.
Generate Click to send the test notification message to the mailbox you specified.
System Load
Use this page to display information about the processors state.
The display is updated every few seconds. The information is similar to that from the Linux top
command.
Route Information
Use this page to see information about routes used to access certain networks and hosts.
Routes used to access hosts that have recently received IP packets from the appliance. This host
information is stored in the appliances local cache.
The information might take a few minutes to display. The information is similar to that from the Linux
route command.
Metric Displays the preference given to the route. A low number indicates a high preference
for that route.
Ref Displays the number of references to this route, and is usually 0.
Use Displays the number of times that the appliance recently selected the route.
Interface Displays the port where the IP packets are sent.
lo loopback interface.
ibr0 network interface when in Transparent Bridge mode.
eth0 equivalent to LAN1.
eth1 equivalent to LAN2.
Disk Space
Use this page to see how disk space is being used.
Hardware Status
Use this page to find out more about hardware-related issues (or potential issues) highlighted on the
Hardware Summary portlet on the Dashboard.
The content of this page varies with the hardware upon which you are running McAfee Email Gateway.
If you are running a virtual instance of the software, there will be no information displayed within this
page. The information displayed for the appliance hardware platforms that include hardware monitoring
will differ from the information displayed for a McAfee Email Gateway blade server.
The data used to provide hardware information on this page is refreshed every 10 minutes. However,
it can take some time for the hardware to report its hardware status to the user interface. To be sure
that the latest information is being displayed within this page, reload the page if it has been displayed
for some time.
Cooling Provides the status and current fan speed for the components in the cooling system
within the hardware.
Power Supplies Displays information about the power supplies within the hardware.
Other Modules Provides information on other modules included within your hardware. These can
include intrusion detection information, as well as information about memory usage
within the hardware.
Hard Disks For appliances and blade servers that include RAID systems, and depending on the type
of the RAID controller and the hard disk drives, the status of each logical volume, as
well as the status, serial number and location of each hard disk drive might reported.
FIPS Status
Find out about FIPS 140-2 compliance issues highlighted on the System Summary portlet on the Dashboard.
The FIPS standards govern which encryption algorithms are approved for the purposes of secure
communications. If the appliance is configured to use algorithms not approved by the FIPS standards,
this page shows warnings. Other warnings relating to concerns about your high-security installation
such as shell access to the appliance being enabled are also displayed.
Troubleshooting Reports
Use these topics to learn about the troubleshooting reports included within the appliance.
Troubleshoot | Reports
Contents
Minimum Escalation Report
Capture Network Traffic
Save Email Queues
Save Log Files
Error Reporting Tool
The report provides the minimum information they need. You might be asked to provide further
information later.
The report goes to a ZIP file and can take a few minutes to produce. The file size is several
megabytes.
Include Email Hybrid When selected, includes the Email Hybrid configuration in the Minimum
configuration in the backup Escalation Report.
The Email Hybrid private key is not encrypted when stored in the Minimum
Escalation Report.
Run network tests When selected, runs the network tests and includes the results in the
Minimum Escalation Report.
Collect appliance logs When selected, includes the appliance logs in the Minimum Escalation Report.
Collect system logs When selected, includes the system logs in the Minimum Escalation Report.
Collect SMTP dump files When selected, includes any SMTP dump files in the Minimum Escalation Report.
Collect reporting database When selected, includes the reporting database in the Minimum Escalation
Report.
Collect MTA database When selected, includes the Mail Transfer Agent database in the Minimum
Escalation Report.
Save the report When clicked, allows you to view the information as several HTML files on
the appliance, or save the information as a ZIP file.
The file name includes the date and time.
Delete the report When clicked, removes the report from the appliance.
This tool will not work correctly if the appliance is running in transparent router mode or transparent
bridge mode.
The output file is gzip-compressed tcpdump capture file. You can analyze the output with a tool such
as Wireshark or WinDump.
Generate report When clicked, begins capturing information about network traffic. While data is
collected, a new window shows the progress. To hide the window, click Close. To
reopen the window, click Display Current Progress.
The capture stops when one of the following events occurs:
The duration ends.
The maximum file size is exceeded.
You click Stop Capture in the Network capture progress window.
The disk on the appliance is nearly full.
Delete the report When clicked, removes the report from the appliance.
Only use this page to save copies of the email messages held within your email queues when requested
to do so by your McAfee Support representative.
The items are saved to a .ZIP file, which can take a few minutes to produce. To view the lists of email
queues on the appliance, select Reports | Message search on the navigation bar.
Generate report When clicked, collects the specified items into a .ZIP file.
While data is collected, the status window shows the progress.
Depending on the number and size of the email messages within the email
queues, this file may be very large.
Save the report When clicked, allows you to save the report containing the email messages
within the select email queues to your local computer.
The file name includes the date and time.
Delete the report When clicked, removes the report from the appliance.
You might want to regularly save your log files, because the appliance automatically removes log
entries after some time, or when the log files are nearly full. You can also use this page to view logs
currently stored on your appliance.
Limit total size of Specifies the maximum size of the file when backing up the logs.
log file to Default value is 30MB.
The output file is a collection of compressed files, containing information about
system activity, performance history, web server activity, and version numbers. For
more information about performance history, specify a large file size.
Backup Logs When clicked, collects all the appliances log settings into a file, and allows you to
download the file.
You can safely store configuration details about the appliance offline, and restore
that information later if the original appliance fails. The system configuration files
are saved to a ZIP file.
Save the logs When clicked, allows you to download the logs.
The link is active only after the log files have been generated.
McAfee Technical Support might ask for this report in addition to the Minimum Escalation Report. The
report goes to a ZIP file and can take a few minutes to produce. The file size is several megabytes.
Auto-submit error events Allows the appliance to automatically submit information about error
events to McAfee.
Event lifetime The number of days that the appliance will store events for, if an error is
detected.
Submit selected events to Use this to send error reports to McAfee for further analysis.
McAfee
Delete selected events Use this to remove events that are no longer needed.
Tests
Use these topics to learn about the troubleshooting tests that you can carry out from the appliance.
Troubleshoot | Tests
The list of tests that you see depends on the features that you have enabled in the appliance.
Option Definition
Start Tests Starts the tests. They can take several minutes to complete.
The results appear in place of this symbol.
Indicates that the test failed. Click the Details link for more information.
Stop Tests Stops the tests. Any test that has already started runs to completion.
Option Definition
Gateway tests Ping the gateway States whether the gateway can be pinged for every static route.
Ping by itself is not a reliable test of connections, because some devices might be
configured to ignore ping requests. However, even if the ping test fails, the
gateway must always appear in the ARP routing table.
Look for the gateway in the ARP table States whether the gateway is listed in the ARP
routing table.
DNS servers tests Ping the DNS server States whether the appliance can contact the DNS servers.
Query the DNS server for the external address www.mcafee.com States whether each DNS
server can resolve the address www.mcafee.com into the correct set of IP
addresses.
NTP servers test(s) Time Synchronization status with server <servername> Displays the status of each NTP server
that you have configured.
Off-box syslog servers Ping UDP syslog server <servername> Checks that the UDP syslog server is responding.
tests Check connectivity to TCP syslog server <servername>Check for connectivity to the TCP
syslog server.
MQM server test Check if the MQM server is available Sends a health check request to the McAfee
Quarantine Manager (MQM) server.
Appliance name and Query the appliance domain name and Query the appliance address States whether each DNS
domain tests server can find the appliance, given its domain address and its fully qualified
domain name.
McAfee Global Threat Check for McAfee GTI file reputation connectivity Confirms that the servers can be accessed
Intelligence File using a test sample.
Reputation Servers
test
McAfee Global Threat Query the McAfee GTI feedback server States whether the appliance can contact the
Intelligence Feedback McAfee GTI feedback server.
Server test
Sender Authentication Query the McAfee GTI message reputation lookup server States whether the appliance can
Servers tests contact the server.
Query the RBL server/Test the RBL server If you have defined an RBL server, the appliance
checks that:
A name server record exists for the RBL domain name.
An A (address) record for 2.0.0.127@RBL_DOMAIN exists.
Most RBL servers use the address 127.0.0.2 for testing.
The appliance performs a static query against the servers and tests the
connection.
LDAP Servers test Check for connectivity to LDAP server States whether the appliance can connect to the
LDAP server.
McAfee SaaS Email Connect to the web service Verifies that the appliance can connect to the McAfee SaaS
Protection Service web service.
test
Component Updates Talk to the AV update ftp server Checks that the ftp anti-virus update site can be
tests accessed.
Talk to the AV update http server Checks that the anti-virus update http site can be
accessed.
Talk to the Commtouch Command update server Checks that the Commtouch Command
Option Definition
ePO tests Updater running Checks that the updater has started.
Updater listening to ePO Checks that the appliance is listening to the McAfee ePO
server.
Initiating communication to ePO Checks that the appliance can send data to the McAfee
ePO server.
Sending events to ePO Checks that the number of McAfee ePO events waiting to be
sent to the McAfee ePO server does not exceed a predefined threshold.
SNMPD client tests Snmpd client running Checks that the snmpd process is running.
Snmpd listening for snmp requests Checks that snmpd is listening for snmp requests.
This topic provides an overview of the integration of McAfee Email Gateway appliances with McAfee
ePolicy Orchestrator.
Contents
How appliances work with ePolicy Orchestrator
Differences in Email Gateway appliance administration under ePolicy Orchestrator
Configuring your appliance for ePolicy Orchestrator management
Managing your appliances from within ePolicy Orchestrator
Task Upgrade from McAfee Email Gateway 7.0.3 appliances managed by McAfee ePolicy
Orchestrator
Within ePolicy Orchestrator, the user interface pages that you use to configure and manage your
McAfee Email Gateway appliances have a familiar look-and-feel to the pages that you find within the
appliances.
When you enable ePolicy Orchestrator management on McAfee Email Gateway appliances, the McAfee
Agent that is pre-packaged as part of each appliance is given the configuration information server
name, IP address, passwords to access the ePolicy Orchestrator update repositories, and the public
keys needed to gain access for your ePolicy Orchestrator server.
The agent then starts communication between your appliance and the ePolicy Orchestrator server.
You can download the ePolicy Orchestrator extensions from the Resources link within the McAfee Email
Gateway appliances user interface. This zip file contains two ePolicy Orchestrator extensions:
the EWG 2.0 extension that provides the monitoring and reporting capabilities for Email and Web
Security Appliances versions 5.5 and 5.6, McAfee Web Gateway and McAfee Email Gateway
products,
The MEG 7.6 extension that provides the method to push policy configuration from the ePolicy
Orchestrator server to your McAfee Email Gateway 7.6 appliances and blade servers.
In addition, you can also download the help extensions for each of these ePolicy Orchestrator
extensions. These are also available from the Resources link within the McAfee Email Gateway
appliances user interface.
Working from within ePolicy Orchestrator, you can push configurations to all your 'ePolicy
Orchestrator-enabled" appliances using the standard ePolicy Orchestrator workflows and features.
Further information about configuring your appliance for ePolicy Orchestrator management can be
found within the Setup Wizard | ePO Managed Setup help page.
Introduction
When McAfee ePolicy Orchestrator manages Email Gateway appliance, there are some noticeable
differences in the available features, and their behavior:
Data that is generated from "live" information for an Email Gateway appliance is not available in
ePolicy Orchestrator.
Some Email Gateway appliance features and options have different menu paths under ePolicy
Orchestrator.
The following tables provide a breakdown of the Email Gateway appliance 5.6 features that are not
part of ePolicy Orchestrator management, or located in a different place in the interface.
The menu paths are those used in Email Gateway appliance. The Troubleshooting tab available in Email
Gateway appliance does not appear in ePolicy Orchestrator.
Email | Message Search Live reporting information is based on live information, and is not
available from ePolicy Orchestrator.
Email | Email Overview Live reporting information is based on live information, and is not
available from ePolicy Orchestrator.
Email | Email Configuration | The Transport Layer Security (SMTP) tab is available from the
Protocol Configuration | Certificate Management category in ePolicy Orchestrator.
Transport Layer Security
(SMTP)
Email | Email Configuration | The Blocked connections list is based on live information, and is
Protocol Configuration | not available in ePolicy Orchestrator.
Receiving Email | Permit and
Deny Lists
Email | Email Configuration | Virtual hosts cannot be configured for Email and Web Security
Virtual Host Configuration Appliance in ePolicy Orchestrator.
You can configure virtual hosts in parallel with ePolicy
Orchestrator management of the physical host settings. Virtual
host configuration inherits from the physical host unless
overridden in the appliance user interface on a per virtual host
basis.
Email | Email Configuration | Network groups cannot be added to Protocol Presets in ePolicy
Protocol Settings (SMTP) Orchestrator.
and
Email | Email Configuration |
Connection and Protocol
Settings (POP3)
Email | Email Policies | User blacklists and whitelists contain live information, and are not
Scanning Policies: Spam shown in ePolicy Orchestrator.
Settings - User Submitted
Blacklists and Whitelists
Email | Email Policies | Spam rules are based on live information and are not shown in
Scanning Policies: Spam ePolicy Orchestrator. However, you can manually exclude
Settings - Rules individual rules by name from ePolicy Orchestrator.
Email | Email Policies | Virtual hosts cannot be configured for Email and Web Security
Scanning Policies | Virtual Appliance in ePolicy Orchestrator.
Host Configuration
You can configure virtual hosts in parallel with ePolicy
Orchestrator management of the physical host settings. Virtual
host configuration inherits from the physical host unless
overridden in the appliance user interface on a per virtual host
basis.
Email | Email Policies | In ePolicy Orchestrator, documents registered for data loss
Registered Documents prevention are uploaded and trained in Gateway Protection |
EWS 5.6 DLP and Compliance | Registered Documents.
Email | Quarantine When using McAfee Quarantine Manager, the Appliance ID is
Configuration | Quarantine specific to an individual Email and Web Security Appliance, and
Options not managed by ePolicy Orchestrator.
Email |Quarantine To enable quarantine digest messages in ePolicy Orchestrator, go
Configuration | Quarantine to Sending Email | Quarantine digest messages in the Email
Digest Options Configuration policy category.
System | Appliance This tab contains actions that are appliance-specific, and is not
Management | System available in ePolicy Orchestrator.
Administration
System | Appliance Obtaining the appliance's public key in the Remote Backup
Management | Default Server section cannot be done through ePolicy Orchestrator.
Settings
System | Cluster Management Cluster management is based on appliance-specific information,
and cannot be set up in ePolicy Orchestrator.
System | Users, Groups and Authentication services cannot be set up in ePolicy Orchestrator.
Services | Directory Services
System | Users, Groups and Authentication services cannot be set up in ePolicy Orchestrator.
Services | Web User
Authentication
System | Users, Groups and Configure Network Groups in the Policy Groups area of the
Services | Policy Groups Email Policies or Web Policies category in ePolicy
Orchestrator.
Configure Email Senders and Recipients in the Policy Groups
area of the Email Policies category in ePolicy Orchestrator.
Configure Web Users and URL Groups in the Policy Groups
area of the Web Policies category in ePolicy Orchestrator.
System | Users, Groups and Role-based user accounts contain appliance-specific information,
Services | Role-Based User and cannot be set up in ePolicy Orchestrator.
Accounts
System | Virtual Hosting You can set and apply physical host configuration in ePolicy
Orchestrator. However, virtual hosts cannot be configured for
Email and Web Security Appliance in ePolicy Orchestrator.
You can configure virtual hosts in parallel with ePolicy
Orchestrator management of the physical host settings. Virtual
host configuration inherits from the physical host unless
overridden in the appliance user interface on a per virtual host
basis.
In addition, you also need to install the Email Gateway extension available from the Resources link
within the Email Gateway appliances user interface onto your ePolicy Orchestrator software.
To assist you with setting up your Email Gateway appliances for ePolicy Orchestrator management, the
Setup Wizard within Email Gateway appliances (System | Setup Wizard) includes a set of pages aimed
specifically at configuring your appliance to be managed by ePolicy Orchestrator.
If you have both your McAfee Email Gateway and your McAfee ePolicy Orchestrator software
configured to use a language other than English, when you register your McAfee Email Gateway within
McAfee ePolicy Orchestrator, the default locale for the Secure Web Mail Client and the default
language for all notifications will return to English. You must re-configure these to your required
language.
If you remove the Email Gateway appliance extension from your ePolicy Orchestrator server, all data
relating to your Email Gateway appliances will be deleted.
To upgrade to a later version of the Email Gateway appliance extension, you should install the newer
extension without removing the existing extension. This preserves the Email Gateway appliances data
held within your ePolicy Orchestrator server.
When you have configured your McAfee Email Gateway appliances to be managed by McAfee ePolicy
Orchestrator, most configuration changes that you want to make to your appliances should be made
via your ePolicy Orchestrator server.
If you have enabled ePolicy Orchestrator management on your appliance, making configuration changes
from within the appliance' user interface will make the required changes, but these changes are likely to
be overwritten with the next configuration push from your ePolicy Orcestrator server.
Within ePolicy Orchestrator, the configuration pages for your appliances can be found by browsing to
Menu | Gateway Protection and then selecting either Email Gateway or DLP and Compliance.
Management of your Email Gateway appliances follows the standard ePolicy Orchestrator workflows.
Please refer to the McAfee ePolicy Orchestrator 4.5 Product Guide or McAfee ePolicy Orchestrator 4.6
Product Guidefor further information.
This upgrade process automatically disconnects the appliance from being managed by
McAfee ePO.
The inbuilt McAfee Email Gateway migration tools migrate many of your McAfee Email Gateway 7.0.3
settings for you. However, some settings may need to be recreated.
Task
1 In McAfee ePO, click Policy Catalog and select the McAfee Email Gateway 7.0.3 product.
8 Select the epo_config_<date_stamp>.xml file produced at the end of this process, and save the file.
9 From the McAfee Email Gateway Resources link, download the ePO Extensions and ePO Help Extensions
files.
10 From McAfee ePO, install the ePO Extensions and ePO Help Extensions files.
11 In McAfee ePO, click Policy Catalog and select the McAfee Email Gateway product.
The policies and settings within the configuration file are migrated across to your McAfee ePO
server.
After you have imported the settings into McAfee Email Gateway managed by McAfee ePO, you
need to re-assign the migrated policies to the correct groups in the System Tree in McAfee ePO.
13 On McAfee ePO, navigate to Menu | Gateway Protection | Email and Web Gateway.
14 From Actions, select Export Connection Settings. Save the epoConfig<xxxxxxx>.zip file.
15 On your McAfee Email Gateway, navigate to System | Component Management | ePO, click Import ePO
connection settings. Browse to the epoConfig<xxxxxxx>.zip file, and click OK.
Your McAfee ePO configuration settings are imported into your McAfee Email Gateway appliance.
16 Select both Enable ePO management, and Allow configuration to be applied from ePO.
If you chose to create a scheduled task to push your McAfee Email Gateway 7.0.3 DLP database to the
new McAfee Email Gateway version, you will need to create an equivalent scheduled task to push the
new McAfee Email Gateway DLP database to your appliance.
This topic provides an overview of the integration of McAfee Email Gateway appliances with McAfee
Quarantine Manager.
Contents
About McAfee Quarantine Manager
How appliances work with McAfee Quarantine Manager
While McAfee Quarantine Manager is effective in managing unsolicited bulk email or Spam, no
anti-spam filter is capable of detecting all spam that flows through a network. Some emails are
occasionally misidentified.
McAfee Quarantine Manager allows administrators and users to continuously tune their anti-spam
products according to the changing environments and increase the effectiveness of their spam
filtering.
When McAfee Email Gateway and McAfee Quarantine Manager have been configured to work together,
the McAfee Email Gateway sends all quarantined email messages to McAfee Quarantine Manager for
secure storage.
If, when quarantining large email messages, you get HTTP 413 errors, you need to increase the value of
the Microsoft Internet Information Service (IIS) UploadReadAheadSize metabase property on the
McAfee Quarantine Manager server. In this situation, McAfee recommends that you change the
UploadReadAheadSize property to equal 200000KB. See http://www.microsoft.com/technet/
prodtechnol/WindowsServer2003/Library/IIS/7e0d74d3-ca01-4d36-8ac7-6b2ca03fd383.mspx?mfr=true
for further details.
See also
Option definitions Quarantine Options page on page 347
The following table shows what you will see in the McAfee Quarantine Manager queue for each Email
Gateway category detection:
Table 8-1 The relationship between quarantine categories displayed in Message Search and
MQM
Message Search McAfee Quarantine Manager
Anti-Phish Phish
Anti-Spam Spam
Anti-Virus Viruses
Anti-Virus (Packer) Potentially Unwanted Programs | Packers
Anti-Virus (PUP) Potentially Unwanted Programs | Potentially Unwanted Programs
Compliance Unwanted Content | Banned Content
Corrupt Content Unwanted Content | Encrypted or Corrupted
Data Loss Prevention Data Leakage Prevention
Encrypted Content Encryption Compliance
File Filtering Unwanted Content | Banned File Type
Mail Filtering Unwanted Content | Mail Format
Mail Size Unwanted Content | Mail Format
Signed Content Unwanted Content | Encrypted or Corrupted
Directory Harvesting Others
Image Filtering Unwanted Content | Image Analysis
Denial of Service Unwanted Content | Banned File Type
currently in all custom quarantine queues. A secondary list appears beside Custom Queues. You can
refine your search to any of the individual queues by selecting it from the secondary list. The results
show only messages quarantined in the selected custom queue.
See also
Custom quarantine queues on page 351
Create a custom quarantine queue on page 352
anti-virus (continued)
.csv
features 153
download 71
understanding policy for 154
Anti-Virus
A Basic Options 156
About McAfee Quarantine Manager 509 Anti-virus DAT file
About MQM 509 roll back 442
about this guide 9 anti-virus engine
action adding 446
policy based 124 Commtouch Command 446
primary 124 enabling 446
secondary 124 anti-virus engine and database
actions updates 439
configuring policy based 273 Anti-virus engines
Actions disabling updates 442
Benefits 271 Anti-Virus policy 153
Policy based 271 anti-virus settings
Active Directory 341 anti-spyware 163
Add Login Services wizard 404 basic options 157
add policy custom malware options 169
web scanning 142 packers 166
adding anti-virus engine 446 anti-virus updates
additional anti-virus engine using FTP 447, 449, 450
benefits 446 using HTTP 447
address pool appliance management 401
in virtual hosting 409 password settings 401
administrator roles applying SPF checks to sub-policies 198
create 399 Artemis
adware 154 see Global Threat Intelligence 156
Alert settings 244 attachments
alert tokens 419 finding messages containing 66
alphabetically ordering lists 17 authentication
Anti-Phish policy 176 passwords 403
Anti-phish scanning automatic configuration backup wizard 388
benefits of 190 autonegotiation 355
Anti-Relay Settings 105
Anti-Spam policy 176 B
anti-spam updates 448 backup configuration 378
anti-spyware backup server 375
anti-virus settings 163 basic options
benefits 163 anti-virus settings 157
Anti-Spyware policy 153 Basic options
anti-virus Anti-Virus 156
customized settings 154
I M
icons mail size filtering policy 202
message search 61 Mail size filtering policy 198
image filtering 215 mail traffic
Image filtering policy 198 flow of 11
import manage internal rescue image 393
to a list 17 protected partition 393
import anti-virus engine and database 439 rescue partition 393
inbound address pool 409 Managed Setup
adding 413 ePolicy Orchestrator 476
installation Managing appliances from ePolicy Orchestrator 506
installing ePolicy Orchestrator extensions 477 maximum file size
installation options scanner limits 244
setup wizard 452 maximum nesting depth
instant anti-virus update 156 scanner limits 244
integration with ePO 501 maximum scan time
integration with McAfee Quarantine Manager 509 scanner limits 244
integration with MQM 509 McAfee Anti-Spyware 163
integration with Quarantine Manager 509 McAfee ePO
intercept ports 18 status indicators 35
interface thresholds 35
layout of 13 McAfee Global Threat Intelligence 31
IP addresses for hybrid email 18 McAfee Global Threat Intelligence settings 244
McAfee Quarantine Manager
K about 509
differences with Message Search 347, 510
Kerberos 403
integration with 509
McAfee Quarantine Manager (MQM) 346
L
McAfee Quarantine Manager integration 509
LDAP 110, 341 McAfee ServicePortal, accessing 10
LDAP query Melissa 155
create sample 345 menu
LDAP Synchronization 335 Dashboard 31
least used 382, 459, 472 email 85
listening ports 18 reports 53
lists troubleshoot 489
changing information 16
Policy exceptions R
Add 128
RADIUS 403
Add rule 129
re-write
change policy 129
subject 137
configuring 128
Recipient checks 110
Edit 129
Registered Documents
POP3
with DLP 281
policies 122
registering hybrid email scanning
POP3 policies 121
benefits 329
pornographic image detection
registration process
see image filtering 215
hybrid email scanning 329
ports 18
regular expressions 290
ePO 18
compliance dictionaries 286
ePolicy Orchestrator 18
relay
intercept 18
preventing open relay 105
listening 18
remote backup server 375
transparent 18
removing ePolicy Orchestrator extension 506
Pretty Good Privacy 309, 324
replacement tokens 419
primary action 124
report
problem solving 489
message search 66
protocol presets 124
reporting database
with anti-relay settings 105
external access to 390, 392
proxy server
maintenance 392
adding 375
reset 392
public key authentication 375
setting event items 390
PUPs 154
reporting items
special actions 155
event option settings 391
push configuration 380
retention limits 391
reports 53
Q .csv 71
Quarantine email reports 73
create queues 352 favorite reports 79, 83
custom queues 351 scheduled 67
Quarantine Manager scheduled reports 67
differences with Message Search 347, 510 system 81
integration with 509 troubleshooting 494
Quarantine Manager integration 509 types of 53
quarantine options Reports Administrator role 399
off-box 346 rescue image 393
on-box 346 restore configuration 378
quarantine queues results
changing roles 353 message search 59
deleting 353 retention limits 391
multiple 351 review configuration changes 378
options 352 roles
role access 350 create 399
settings 350 roll back
quarantined items Anti-virus DAT file 442
retention limits 391 routing
questions often asked by customers 22 dynamic and static 361
queues routing characters
quarantine 353 permitted and denied 105
queues, quarantine 350 Rule Creation Wizard 242
from template 243
S Setup Wizard
Basic Settings (Custom) 458, 471
S/MIME
Basic Settings (Encryption Only) 482
encryption 307, 323
Cluster Management 459, 472
save log files 496
Cluster Mode 458, 471
scanner limits
description of options 452
maximum file size 244
Encryption Only 482
maximum nesting depth 244
Graymail protection 292
maximum scan time 244
installation options 452
Scanning
shut down the appliance
for compliance 212
with UPS 371
phish 190
signed content 220
Scanning limits policy 244
Signed or encrypted content policy 198
scanning policies
SMTP
benefits 132
policies 122
schedule
smtp policies 121
reports 67
spam rules and engine updates 439
updates 389, 437, 448, 449, 451
Spam term exclusions
schedule,
dictionary 189
component updates 439
Spam terms
scheduled reports 67
dictionary 188
search for quarantined messages 54
special actions 155
search for queued messages 54
SPF
search quarantine 54
apply to sub-policies 198
search queues 54
Splunk
secondary action 124
extended syslog attributes 428
Secure Shell 364
spyware 154
secure web mail 297
SSH 375
basic settings 298
static routing 361
benefits of setting passwords 304
statistics
branding 313
Dashboard 31
password management settings 303
status
user account settings 300
FIPS 493
user management 302
sub-policies
Secure Web Mail
applying SPF checks 198
benefits 298
subject re-write 137
policies 123
substitution variables 419
Sender Authentication policy 176
summary
senders and recipients
Dashboard 31
create groups 339
email 85
sending email
reports 53
benefits 114
troubleshoot 489
server settings
Super Administrator role 399
system log archive 437
Support
ServicePortal, finding product documentation 10
Frequently Asked Questions 22
Session Management 406
system
setting critical thresholds 33
reports 81
setting thresholds 34
system commands 397
Setting up ePolicy Orchestrator managed appliances 443
reboot appliance 397
setting warning thresholds 33
revert to default settings 397
setup options
shutdown appliance 397
custom and standard 452
System Log Archive
encryption only 452
configuring 437
ePO 452
system tests 498
restore from a file 452
T updates
adding proxy server HTTP and FTP 375
Technical Support
schedule 389, 437, 448, 449, 451
Frequently Asked Questions 22
using FTP 447, 449, 450
Technical Support, finding product information 10
using HTTP 447
tests
upgrade
troubleshooting 498
ePO 26, 445, 506
threat feedback 31
using rescue image 393
threats
Upgrade
blocking specific 155
MEG 7.0 26, 445, 506
thresholds
upload
configurable 33
documents for dlp 281
setting 34
UPS Settings 371
setting critical 33
URL format 232
setting warning 33
URL reputation 156, 229
Time and Date
blacklists 232
setting 363
configuration 231
Time zone 363
configure blacklist 235
Timeout
configure whitelist 235
set time 406
whitelists 232
tls 311
URLs
tokens
decoding 239
alert 419
encoding 239
replacement 419
parsing 238
tools
regular expressions 233
troubleshooting 489
simple patterns 233
transparent ports 18
URLs canonicalize
troubleshoot 489
decode 235
reports
encode 235
capture network traffic 495
parse 235
mer 494
user account settings
minimum escalation report 494
secure web mail 300
save email queues 496
user accounts (encryption users)
tests
benefits 300
system tests 498
user interface 13
tools
User Interface Access Configuration 364
disk space 492
user management
ping 490
secure web mail 302
route information 491
users
system load 490
create roles 399
trace route 490
UTC
troubleshooting reports
Universel Temps Coordinee 363
log files 496
troubleshooting 489
troubleshooting reports 494 V
troubleshooting tests 498 variables
troubleshooting tools 489 alert 419
Troubleshooting Tree 23 substitution 419
Troubleshooting, using the online tree 23 view log files 496
types Virtual Host 409
encryption 296 adding 413
virtual networks 412
U viruses
VBS/Bubbleboy@MM 155
understanding policy exceptions 127
W97M/Melissa@MM 155
Update Status 439
W wizard (continued)
automatic confuguration backup 388
warning messages
Configure System Log Archive 437
Dashboard 31
Rule Creation Wizard 242
warning thresholds
Rule Creation Wizard from template 243
setting 33
working with Email Gateway 11
web policies
compliance 212
web scanning
add policy 142
wizard
Add Login Services 404