Messaging Security FAQ
Messaging Security FAQ
Messaging Security FAQ
Check Point offers comprehensive Messaging Security as part of UTM-1 Total Security™ in
UTM-1 Total Security appliances or VPN-1® UTM Total Security software licenses.
2
Classification: [Public]—For everyone
Messaging Security Functionality
Q: Which platforms support the Messaging Security infrastructure?
• A: Messaging Security is supported on the following platforms:
o Microsoft IAS (M2) with Total Security, Microsoft IAS (M6, M8) with Power UTM and
Total Security
Note: Support for Messaging Security on Nokia IPSO is currently on Check Point’s
immediate roadmap.
To filter by subject, filter according to the configured strings that are added to the subject
line when choosing "Flag subject."
To filter by header, filter either by the "X-Spam-Status: Yes" header line, or by the
"Category=Spam" / "Category=Suspected Spam" strings that are added to the "X-Check
Point" header in the case of spam or suspected spam emails.
Several external tools for MS Exchange Server allow such functionality. For more
information, please see http://www.slipstick.com/addins/content_control.asp.
Filtering of emails can also be done in the user's mail client by adding appropriate rules in
MS Outlook, or adding message filters in Mozilla Thunderbird.
3
Classification: [Public]—For everyone
Q: How does the Content Anti-spam engine classify emails as Spam,
Suspected Spam or Non-spam?
• A: The Content Anti-spam functionality employs unique licensed technology. The Check
Point Messaging Security anti-spam solution classifies spam by analyzing known and
emerging distribution patterns, and doesn’t rely on searching for keywords or on lexical
analysis of email content (a more commonly taken approach in many anti-spam
applications).
A query, similar to the one used in Content Anti-spam, is sent to the Check Point Detection
Center (if both anti-spam and zero-hour layers are enabled, this is the same query). The
result of this query might indicate the presence of a pattern, which belongs to emails that are
known to contain a spreading malware (e.g. a 'worm'). The Detection Center collects
information about such outbreaks and extracts the relevant email patterns.
4
Classification: [Public]—For everyone
transfer of the email.
The firewall also keeps an internal cache of IP addresses. So in the majority of connection
attempts, no query is sent to the database (the classification of the address is already
known). The cache approach enables extremely high performance for the IP-reputation
feature.
Real-time classification and protection – New spam outbreaks can be identified as they
occur by checking the sender’s IP address (using IP-Reputation) and email content patterns
(Content Anti-Spam) against dynamically-updated information in the Check Point Detection
Center. These methods allow true zero-hour malware outbreak protection, unlike other email
antivirus solutions which rely solely on signatures.
5
Classification: [Public]—For everyone
On-session blocking – Spam emails are checked, and if needed blocked, during the original
SMTP/POP3 session. If the IP-reputation method identifies spam, then the session is
blocked without even initiating a connection to the mail server. This method is superior to
those performed by other products, which scan emails after the original session ends, and
are then required to send a non-delivery report if the email is blocked.
The table can be viewed using the "fw tab" command. In the enforcing module, type:
fw tab –t aspam_syn_cache
The result should look like the following:
localhost:
-------- aspam_syn_cache --------
dynamic, id 157, attributes: expires 30, limit 25000, hashsize
16384
<c0a80001; 00000002, 00000000; 594/600>
The above is an entry for IP address 192.168.0.1. The action is ACCEPT, and will expire in
594 seconds.
Note that the table can contain up to 25,000 entries. In order to see all of the entries, add "-
u" to the command.
To check a specific entry, add "-e [IP in hexadecimal format]" to the command.
6
Classification: [Public]—For everyone
Q: How do I block email delivery attempts to non-existing users?
• A: Follow the below steps to configure a list of valid addresses which are allowed to receive
email.
1. Create a list of valid addresses, each in a different line, e.g.:
John@myserver.com
Gil@myserver.com
Guy@myserver.com
Alias_for_guy@myserver.com
Merv@myserver.com
Patrick@sales.myserver.com
William@myotherserver.com
Addresses are case insensitive. Note that this list is not updated automatically by
default. Aliases, if desired, must be explicitly added to the list.
To match against the Web filtering engine, in the [Web_filtering] section of the file, change
enforce=0 to enforce=1. Emails will be handled according to the Web Filtering policy
(rejected or monitored).
To check the URLs in RBL repositories (zen.spamhaus.org is the default), find the [rbl]
section and change to enforce_urls=1. Change 'url_action' to the desired action to be taken
upon match ('reject', 'monitor', 'stamp-subject', 'stamp-header'). Save the changes and install
policy on the module.
7
Classification: [Public]—For everyone
Performance
Q: How do I increase the number of active security server processes?
• A: Exit SmartDashoard and run the GuiDBedit utility. Open the "Other" table and inside it,
open the "Content Security" tab. Select "Global_security_server_settings". Change the
values of 'smtp_process_num' and 'pop3_process_num' to the desired values. The
maximum value is 12. Save the changes and install policy.
Tracking
Q: What is an “Email Session ID?”
• A: An Email Session ID is a string that is unique per SMTP/POP3 session. The ID is
generated at the beginning of each session and used for easy tracking of events in that
session. In order to view log records that are related to the same session, right-click a log
record in SmartView Tracker and use "Follow Email Session ID":
8
Classification: [Public]—For everyone
Q: Where can I find the Email Session ID of emails that passed inspection?
• A: A special header is added to every email that passes Messaging Security inspection. The
Email Session ID string appears after the "X-CheckPoint:" header declaration. In MS
Outlook, the header section of the email can be viewed by selecting "Options" from the
"View" menu:
9
Classification: [Public]—For everyone
In Outlook Express, the header and session ID can be viewed by selecting "Properties" from
the "File" menu, and then clicking the "Details" tab.
10
Classification: [Public]—For everyone
In Mozilla Thunderbird, open the email, and from the "View" menu select "Headers" and
"All.”
11
Classification: [Public]—For everyone
Q: Why are there multiple SmartView Tracker log records for each
session?
• A: When the anti-spam 'Non Spam' tracking option is set to any value other than 'None',
every active anti-spam layer generates a tracker log. Also, when the 'SMTP/POP3 Allowed
files' tracking option is set to a value other than 'None', every active antivirus layer also
generates a tracker log. All generated log records will have the same Email Session ID.
SMTP:
IP Block List Æ IP Reputation Æ Sender Block List Æ File Types Æ Mail Antivirus Æ
Zero-Hour Malware Protection Æ
Content-based Anti-spam
POP3:
Sender Block List Æ File Types Æ Mail Antivirus Æ Zero-Hour Malware Protection Æ
Content-based Anti-spam
(This window opens after using "Follow Email Session ID". The 'Control' field is not displayed in the default query).
12
Classification: [Public]—For everyone
The above SmartView Tracker screenshot illustrates a spam email that passed all security
layers except Content Anti-spam. The Content Anti-spam layer identified the email as spam
and blocked it.
13
Classification: [Public]—For everyone
Troubleshooting
Q: Why was a spam email not blocked? What should I do if I wish to report
this?
• A: In SmartDashboard, verify that the 'Non Spam' tracking option is set to a value other than
'None', thus enabling tracking of emails which are not identified as spam.
Open the SmartView Tracker and find the logs relevant for this email (filter by time or
recipient, or use 'Follow Email Session ID'). Next, verify that the email has not passed
inspection as a result of a Bypass rule. If an "Accept" record exists for the Content Anti-
spam layer, the email was likely misclassified.
The Messaging Security solution identifies 97 percent of all spam, and classifies it as Spam
or as Suspected Spam. To report a misclassification issue to Check Point:
- On the Check Point public Web site, on the Messaging Security page, select “Report
Spam Classification Error” under the Things To Do heading
- Using your User Center credentials, complete the requested Support Center form
Q: Why is the disclaimer missing in some emails? Does this indicate that
the email was not scanned?
• A: The disclaimer can be left off of a scanned email when the MIME format of the message
is not standard or malformed. Also, disclaimers will not be added to text encoded in Base64
or Unicode formats, nor to certain kinds of HTML messages. However, the absence of a
disclaimer does not mean that the messages weren't scanned. To verify that the message
was scanned, look for the 'X-CheckPoint' header in the header section of the email.
14
Classification: [Public]—For everyone
Q: How do I direct spam or virus traffic to a different mail server?
A: The headers of spam emails can be flagged, and the mail server can be configured to direct
the flagged emails to a different server, not to the user's inbox. While such functionality can be
achieved, it cannot be configured directly at the gateway level and may require a special add-on
to the mail server.
15
Classification: [Public]—For everyone