SMSMSE Implementation Guide
SMSMSE Implementation Guide
SMSMSE Implementation Guide
Exchange Server
2010/2013/2016/2019
Symantec™ Mail Security for Microsoft® Exchange
Implementation Guide
Legal Notice
Copyright © 2019 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, the Checkmark Logo and are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks
of their respective owners.
This Symantec product may contain third party software for which Symantec is required to provide attribution
to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open
source or free software licenses. The License Agreement accompanying the Software does not alter any
rights or obligations you may have under those open source or free software licenses. Please see the
Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec
product for more information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying, distribution,
and decompilation/reverse engineering. No part of this document may be reproduced in any form by any
means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY
INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL
DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS
DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO
CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined
in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer
Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and
Commercial Computer Software Documentation," as applicable, and any successor regulations, whether
delivered by Symantec as on premises or hosted services. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government
shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
https://www.symantec.com
Symantec Support
All support services will be delivered in accordance with your support agreement and the
then-current Enterprise Technical Support policy.
Feature Description
Mailbox database level selection in Now, you can select mailbox database level in manual and
manual and scheduled scan scheduled scan.
Support for Microsoft Exchange 2019 Symantec Mail Security for Microsoft Exchange now supports
Microsoft Exchange 2019.
Exchange transport submission Now, you can monitor the Exchange transport submission queue.
queue manager
You can monitor the queue by configuring the queue size. When
the queue reaches 90% of the configured size, emails are skipped
from scanning.
Support for Microsoft System Center Mail Security for Microsoft Exchange Management Pack lets you
Operations Manager (SCOM) 2016 integrate Symantec Mail Security for Microsoft Exchange events
with SCOM 2016.
■ Spam
See “About spam detection” on page 105.
■ Email attachment violations
See “About file type filtering ” on page 123.
See “Blocking attachments by file name” on page 151.
■ Content filtering rule violations
See “About content and file filtering” on page 121.
Mail Security takes the actions that you specify in the respective policies when a violation is
detected.
See “About Mail Security policies” on page 87.
Mail Security contains a decomposer that extracts container files so that they can be scanned.
The decomposer continues to extract container files until it reaches the base file or until it
reaches its extraction limit. If the decomposer reaches the set limit before the base file is
reached, the scanning process stops. Mail Security then logs the violation to the specified
logging destinations, and the file is handled according to Unscannable File Rule.
See “Configuring rules to address unscannable and encrypted files” on page 96.
Task Description
Manage your Exchange You can configure Mail Security for Microsoft Exchange to scan email
environment by using messages and their attachments for threats such as viruses, Trojan horses,
policies adware, spyware, and spam. You can define policies to detect potential
risks to your Microsoft Exchange email system and process email messages
and attachments that contain threats.
Task Description
Scan your Exchange server You can keep your server protected by performing any of the following
for risks and violations types of scans:
■ Auto-Protect scans
■ Manual scans
■ Scheduled scans
■ Background scans (for Exchange Server 2010 only)
See “About the types of scanning that you can perform” on page 170.
Protect against threats Symantec engineers track reported outbreaks of threats (such as viruses,
Trojan horses, and worms) to identify new risks. After a threat is identified,
information about the threat (a signature) is stored in a definition file. This
file contains information to detect and eliminate the threat. When Mail
Security scans for threats, it searches for these signatures. Definition files
are downloaded using LiveUpdate or Rapid Release.
Keep your protection Mail Security relies on up-to-date information to detect and eliminate risks.
up-to-date One of the most common reasons computers are vulnerable to attacks is
that definition files are out-of-date. Symantec regularly supplies updated
definition files.
See “About using Mail Security with other antivirus products” on page 48.
Note: You must have a valid license to update definitions.
Task Description
Identify spam email Spam is unsolicited bulk email, which most often advertises messages for
a product or service. It wastes productivity, time, and network bandwidth.
See “How to detect spam using Symantec Premium AntiSpam” on page 107.
Filter undesirable message Mail Security lets you create the filtering rules that you can use to filter
content and attachments email messages and attachments. Mail Security provides the predefined
file name and file type filtering rules that you can use to enforce email
attachment policies. Mail Security uses match lists to filter email messages
and attachments for specific words, terms, and phrases. Mail Security also
provides the predefined content filtering policy templates that help prevent
data leakage.
Apply X-headers to Mail Security provides default X-headers that you can apply to the email
messages for archiving messages that contain filtering rule violations or are spam or suspected
spam. You can modify the default X-headers, or you can create your own.
Task Description
Manage outbreaks An outbreak occurs when the number of threats to the Microsoft Exchange
system that are detected over a period of time exceeds a specified limit.
Mail Security lets you manage outbreaks quickly and effectively by setting
outbreak rules and sending notifications when an outbreak is detected.
You can also select an action to take when an outbreak is detected, such
as the following:
You can set rules to define an outbreak based on event. For example, the
same threat occurs a specified number of times within a specified time
period. You can also configure Mail Security to send notifications and alerts
in the case of an outbreak.
Quarantine infected Mail Security for Microsoft Exchange includes a local quarantine that can
message bodies and store the infected message bodies and attachments that are detected during
attachments scans. You can configure Mail Security to quarantine threats and security
risks, and file filtering violations in the local quarantine.
Task Description
Monitor Mail Security Mail Security logs events to the Windows Application event log. You can
events view the events that are logged to the Windows Application event log from
the console.
Mail Security logs extensive report data on threats, security risks, violations,
spam, and server information to the reports database. You can use this
data to generate summary or detailed reports based on different subsets
of the data.
Generate reports Mail Security collects scan data from your Exchange servers and generates
reports.
Mail Security provides the preconfigured report templates that you can
modify. You can also create your own report templates.
You can create the following types of report templates:
■ Summary
■ Detailed
Send notifications when a Mail Security provides several options for notifying administrators, internal
threat or violation is senders, and email recipients of threats and violations.
detected
Mail Security lets you define the conditions in which to send an alert. You
can also customize the alert message text for each alert condition that you
define.
Task Description
Manage single and multiple Mail Security can protect one or more Exchange servers. If your organization
Exchange servers has multiple Exchange servers, you can manage all the servers from the
same console that you use to manage a single server.
By switching between the server view and group view, you can manage
the following:
■ System requirements
■ Post-installation tasks
Note: Symantec Mail Security for Microsoft Exchange console only connects to the server of
the same version.
You must uninstall and reinstall the product if you change the server role on which Mail Security
is installed.
Do the following before you install the product:
■ If you use the optional email tools feature of Symantec Endpoint Protection or Symantec
AntiVirus Corporate Edition, you must uninstall the feature before you install Mail Security.
These email tools are not compatible with Mail Security or Microsoft Exchange.
■ If you have any antivirus software installed on the server, you must disable it before you
install Mail Security.
After installation but before you turn on the antivirus protection, configure your other antivirus
programs to exclude certain folders from scanning.
See “About using Mail Security with other antivirus products” on page 48.
■ If you have any malware agent installed on the server (Exchange Server 2013/2016/2019)
on which you want to install Mail Security, you must disable it.
Note: The Mail Security installer disables the Microsoft Exchange malware agent during
installation. If the installer fails to disable the malware agent, then make sure that you
disable it manually after the installation. Mail Security may not function properly if any other
malware agent is enabled. Therefore, make sure that you disable the malware agent before
you use Mail Security.
Note: While installing Mail Security on local Exchange Mailbox server, in the Logon Information
screen, specify the domain user credentials in the User name and Password fields. Mail
Security provides this user account Application Impersonation and Logon as service rights.
Ensure that the following IIS Role Service components are installed when you install Mail
Security on Windows Server 2008 for Exchange servers. This installation is applicable for both
remote installation and local installation.
■ Application Development - ASP.NET
■ Security - Windows Authentication, Basic Authentication, Digest Authentication
■ Management Tools - IIS management console, IIS 6 Scripting Tools
Component Location
Component Location
Component Location
Component Location
SMSMSE Admins Permits read and write access to all Mail Security
components and features.
The user groups are domain-wide for Active Directory. You can use the Active Directory Users
and Computers Microsoft Management Console (MMC) snap-in to change membership in the
groups.
Users must be designated in one of the SMSMSE user groups to access the product. For
example, administrators who are not in one of the SMSMSE user groups are not granted
access to Mail Security. Adding a user to the SMSMSE Admins group does not automatically
grant the user Windows Local Administrator, Windows Domain Administrator, or Exchange
administrator rights.
Security is also set for the Mail Security registry key and file folders during the security set-up
process. You must have administrator access to the local servers and domain administrator
rights for the security set-up to proceed.
Note: The Check for publisher's certificate revocation option is set on a per-account basis.
System requirements
Ensure that you meet the appropriate system requirements for the type of installation that you
want to perform.
See “Before you install” on page 21.
See “Server system requirements” on page 28.
See “Console system requirements” on page 29.
See “Port requirements” on page 30.
Mail Security supports various platforms of Microsoft Small Business Server. For the support
matrix information, go to the following article:
http://www.symantec.com/business/support/index?page=content&id=TECH97861
Minimum system ■ 2 GB of memory for Mail Security besides the minimum requirements for the
requirements operating system and Exchange.
Approximately 4GB or more of memory is required.
■ 4 GB disk space is required for Mail Security. This space does not include the
disk space that is required for items such as quarantined messages and
attachments, reports, and log data.
■ Supported version of .NET Framework version is 3.5
■ MDAC 2.8 or higher
■ DirectX 9 or higher
■ Microsoft Internet Information Services (IIS) Manager
■ Microsoft .NET Framework 3.5 and Microsoft Windows PowerShell 2.0
■ Microsoft ASP.Net 3.5 extension
Ensure that the components.NET Framework, MDAC, and DirectX are installed before you
install Mail Security.
Adobe Acrobat Reader is not a requirement to install and run Mail Security. However, it is
required to view the reports that are generated in .pdf format. You can download Adobe Acrobat
Reader from www.adobe.com. You must also have Internet Explorer 8.0 or later to view the
reports.
See “Installing Mail Security on a local server” on page 32.
See “Silently installing Mail Security using an automated installation tool” on page 42.
See “About installing Mail Security on remote servers” on page 38.
Requirement Description
Memory 2 GB
This requirement does not include the space that Mail Security
requires for items such as quarantined messages and attachments,
reports, and log data.
Adobe Acrobat Reader is not a requirement to install and run the Mail Security console.
However, it is required to view the reports that are generated in .pdf format. You can download
Adobe Acrobat Reader from www.adobe.com. You must also have Internet Explorer 8.0 or
later to view the reports.
See “Installing the Mail Security console” on page 36.
Port requirements
Symantec Mail Security for Microsoft Exchange scans the SMTP mail traffic that passes through
Exchange servers on port 25. Mail Security does not interact with MAPI or any other mail
protocols, such as POP3 on port 110 or IMAP on port 143.
Some Mail Security components require certain ports for communication.
Table 2-3 lists the ports that Mail Security components use by default.
Installing Symantec Mail Security for Microsoft Exchange 31
Installing Symantec Mail Security for Microsoft Exchange
Note: If Symantec Premium AntiSpam is enabled, ensure that you open port 443 on the firewall
for bi-directional traffic to aztec.brightmail.com. If Symantec Premium AntiSpam is not licensed
and enabled, Mail Security does not initiate activity on port 443. Similarly, if the optional Rapid
Release feature is not enabled, Mail Security does not initiate activity on port 21.
The port that is used for communication with Mail Security Console can be configured during
installation or at any time after the installation. You can see activity only on these ports when
you use the console to administer a remote server.
Note: There are no port conflicts or incompatibility between Mail Security and Symantec
Endpoint Protection 11.x or the Symantec Endpoint Protection Manager.
Local server You can install or upgrade Mail Security on a local computer that is running the
Microsoft Exchange Server.
Remote server You can install Mail Security on remote servers through the product console.
Console You can install the product console on a computer that is not running Mail
Security. This way you can manage your servers from any computer that has
access to your Exchange servers.
Silent/automated You can install Mail Security using automated installation tools.
installation
See “Silently installing Mail Security using an automated installation tool”
on page 42.
Note: Symantec automatically installs MSXML 6.0 during installation if the installer does not
detect this component.
Begin the installation process You can use the installation wizard to select the product
installation folder location and the type of installation
that you want to perform
C:\Program Files\Symantec\
SMSMSEServerUpgradeTemp\Quarantine
Configure additional setup options and confirm You can specify whether you want to automatically
settings restart the Exchange Transport Service after
installation. You can also specify the Web service
set-up values, designate an email notification address
and SMTP server address, and review your setup
configurations.
Install your licenses You can install your licenses during installation.
3 Warning message appears that you may need to restart your computer after installation.
Click OK.
4 Click Next until you reach the License Agreement panel.
5 In the License Agreement panel, click I accept the terms in the license agreement,
and then click Next.
You must accept the terms of the license agreement for the installation to continue.
6 In the Existing Settings panel, select one of the following:
Retain existing settings Retains the existing settings that are supported
for migration to the new version.
Install with default settings Installs the product with the default settings, as
if you install Mail Security for the first time.
This panel appears only if you upgrade from a previous version of Mail Security.
7 In the Destination Folder panel, do one of the following:
■ To install the product in the default location, click Next.
The default directory is as follows:
C:\Program Files\Symantec\
■ To install the product in a different location, click Change, select the location of the
installation folder, click OK, and then click Next.
Mail Security does not support the directory names that contain multi-byte characters.
If you intend to use the Symantec Premium AntiSpam, you cannot install the product
to a directory whose name contains high ASCII characters.
8 In the Setup Type panel, click Complete, and then click Next.
9 In the Symantec Endpoint Protection or Symantec AntiVirus Corporate Edition Users
warning dialog box, click OK.
To configure additional setup options
1 In the Exchange Transport Service Reset Options panel, click Next to accept the default
setting to automatically restart the Exchange Transport Service after installation.
If you choose not to automatically restart the Exchange Transport Service after installation,
you must do so manually. Otherwise, Mail Security does not function properly.
2 In the Web Service Setup panel, do one of the following:
■ Click Next to accept the default values.
■ Modify the following settings, and then click Next:
Installing Symantec Mail Security for Microsoft Exchange 35
Installing Symantec Mail Security for Microsoft Exchange
IP/Name By default, the computer name resolves to the primary external network
identification card (NIC). You can also use an IP address.
Port # By default, port 8081 is the port number for the Web service that Mail Security
uses. A different default port number appears if another application is using
port 8081.
If you change the port number, ensure that another application is not using
that. You should not use port 80. The default Web service uses port 80 and
IIS hosts this port.
3 In the Notification Email Address panel, do one of the following to specify the email
address from which email notifications are sent and to which notifications to the
administrator are sent:
■ Click Next to accept the default value.
The default value is: Administrator
■ Modify the originator email address, and then click Next.
You can modify the address after installation is complete.
See “Configuring notification settings for scan violations” on page 193.
4 In the SMTP Server Host panel, specify the SMTP receive connector server address for
sending email messages.
The default server address is as follows: localhost.
5 In the Service Account Information panel, specify the user name and password of the
domain user account.
Do not specify the user name and password of the domain administrator account.
6 In the Setup Summary panel, review the information, and then click Next.
If you need to make any modifications, click Back to return to the appropriate panel.
7 In the Ready to Install the Program panel, click Install.
To install a license and the update definitions
1 In the Install Content License File panel, do one of the following:
Installing Symantec Mail Security for Microsoft Exchange 36
Installing Symantec Mail Security for Microsoft Exchange
To install a license file later through Click Skip, and then click Next.
the console
See “About licensing” on page 52.
To perform a LiveUpdate at a later time Click No, and then click Next.
Note: To ensure secured communication between the Mail Security console and server, it is
recommended that you enable SSL.
EMAIL ADDRESS= Serves as the address of the N/A (Email address of domain
domain administrator for the administrator)
“Address of sender” and
“Administrator and others to
notify” Notification/Alert
settings.
INSTALLDIR= Serves as the default product \Program Files\ (Any valid path)
installation directory. Symantec\
Note: If you install Mail
Security in a non-default
location and the path name
contains spaces, then you
must enclose the path name
in quotation marks. For
example,
INSTALLDIR="E:\test
vpremote"
Installing Symantec Mail Security for Microsoft Exchange 40
Installing Symantec Mail Security for Microsoft Exchange
PORTNUMBER= Serves as the port that the 8081 (Any valid port)
product uses for Web
services.
REINSTALLMODE Controls the mechanism for N/A Set to voums to perform a silent
reinstall. installation.
Warning: The following entry should not be changed: {setup.exe /s /v" NOT_FROM_ARP=1
REMOTEINSTALL=ALL REINSTALLMODE=voums REINSTALL=ALL”}. You can append the entry.
For example, setup.exe /s /v" NOT_FROM_ARP=1 REMOTEINSTALL=1 REINSTALLMODE=voums
REINSTALL=ALL PORTNUMBER=1010”
For example, to specify a silent installation, the entry would appear as follows:
{setup.exe /s /v" NOT_FROM_ARP=1 REMOTEINSTALL=1 REINSTALLMODE=voums
REINSTALL=1”}
Note: The Mail Security installation may automatically restart your computer at the end of the
installation. If you have selected the Send group settings option, you have to manually deploy
the group settings on the remote server after the computer restarts.
Note: Remote install must be performed from the computer which is part of the same domain.
Note: After the Mail Security silent installation, the Symantec Mail Security Utility Service
and the Symantec Mail Security for Microsoft Exchange services do not start automatically.
You must start these services manually.
To silently install Mail Security using an automated installation tool on Exchange 2010 hub
role
1 Copy the installation media in its entirety to the location from which installation is launched.
For example: xcopy [Drive]:\*.* /s [Destination drive]
2 Launch setup.exe using the following command to initiate a silent installation:
[Destination drive]:\setup.exe /v"/lvx* “c:\smsmse_install.log”
NOT_FROM_ARP=1 REMOTEINSTALL=1 REINSTALLMODE=voums REINSTALL=ALL" /s
Where "c:\smsmse_install.log" is the path of installation log file that gets generated during
installation.
Installing Symantec Mail Security for Microsoft Exchange 43
Post-installation tasks
To silently install Mail Security using an automated installation tool on mailbox role of Exchange
1 Copy the installation media in its entirety to the location from which installation is launched.
For example: xcopy [Drive]:\*.* /s [Destination drive]
2 Launch setup.exe using the following command to initiate a silent installation:
[Destination drive]:\setup.exe /v"/lvx* "c:\smsmse_install.log"
NOT_FROM_ARP=1 REMOTEINSTALL=1 REINSTALLMODE=voums REINSTALL=ALL
SMSMSE_RBAC_USERNAME=<username> SMSMSE_RBAC_PASSWORD=<password>" /s
where "c:\smsmse_install.log" is the path of installation log file that is generated during
installation.
Post-installation tasks
After you install Mail Security, you can perform the following post-installation tasks:
■ Implement SSL communications.
See “Implementing SSL communications” on page 43.
■ Install license files if they were not installed during setup.
See “About licensing” on page 52.
■ Update definitions if a LiveUpdate was not performed during setup.
See “About keeping your server protected” on page 231.
■ Access the Mail Security console.
See “Accessing the Mail Security console” on page 45.
■ Configure other antivirus products that are on the same computer as Mail Security.
See “About using Mail Security with other antivirus products” on page 48.
■ Configure Mail Security transport agents.
See “Configuring Mail Security transport agents” on page 48.
■ Configure the number of scanning threads and scan processes, if necessary.
See “Setting scanning threads and number of scan processes” on page 50.
■ Reduce the launch time of Mail Security console.
See “Resolving installation issues” on page 246.
After you implement SSL, you must enable SSL from the console and specify the SSL port for
each server.
See “Modifying the port and the communication properties of a server” on page 73.
To install a server certificate
1 On the computer on which Mail Security is installed, click Start > Administrative Tools
> Internet Information Services (IIS) Manager.
2 In the server list, expand the folder for the server that hosts Mail Security.
3 In the Web sites folder, right-click Symantec Mail Security for Microsoft Exchange,
and then click Properties.
4 Under Secure communications, select the Directory Security tab, and click Server
Certificate.
5 Follow the instructions in the Web server Certificate wizard to install the server certificate.
To implement SSL communications
1 Ensure that a valid server certificate is installed.
2 Under Secure Communications, click the Directory Security tab, and then click Edit.
3 In the Secure Communications dialog box, check Require secure channel (SSL), and
then click OK.
4 On the Web Site tab, under Web site identification, in the IP Address text box, type
the IP address of the Mail Security server.
5 In the SSL Port text box, type the port to use for SSL communications.
6 Click OK to close the Mail Security Properties window.
To implement SSL communications on Windows Server
1 On the local computer, ensure that a valid server certificate is installed in Trusted Root
Certification Authorities.
2 Click Start > Administrative Tools > Internet Information Services (IIS) Manager.
3 In the Web sites folder, right-click Symantec Mail Security for Microsoft Exchange,
click Edit Bindings and select Add.
4 From the drop-down list, select https and All Unassigned for Type and IP addresses
respectively.
5 In the SSL Port text box, type the port number.
For example, type 8082 for SSL communications.
To avoid port conflicts, ensure that you do not use the ports that Exchange server uses.
For example, TCP port 80 and SSL port 443.
Installing Symantec Mail Security for Microsoft Exchange 45
Post-installation tasks
6 From the SSL certificate, select the certificate that you installed and restart the Symantec
Mail Security for Microsoft Exchange website.
7 In the right pane, double-click Authentication and ensure that Windows Authentication
and ASP.NET Impersonation are enabled.
8 From the Web sites folder, select Symantec Mail Security for Microsoft Exchange.
9 In the right pane, double-click SSL Settings and check Require SSL and Require 128-bit
SSL.
10 Click Apply to apply the changes.
To implement SSL communications on client computer
1 Export the server certificate from the server and install it to the client computer where Mail
Security console is installed in Trusted Root Certification Authorities.
2 Open Certificate snap-in and ensure that the certificate resides in Trusted Root
Certification Authorities.
3 On the Mail Security console, click the Assets tab and click Add server(s) to add a server.
4 Right-click the server that you added and then click Properties.
5 Provide the SSL port number that is configured on the server.
6 Check Use SSL and click OK.
You can now connect to the server from the console by using the SSL connection.
Menu bar
Tool bar
Primary
navigation
bar
Content area
List pane
Sidebar
Preview
pane
Resizing bars
Home Lets you view server status, recent activities, and violations statistics
Policies Lets you create and configure the sets of rules that specific scans implement
Monitors Lets you configure notification addresses and quarantine settings and monitor quarantine
data and events
Reports Lets you view and print the data that Mail Security collects
Installing Symantec Mail Security for Microsoft Exchange 48
Post-installation tasks
Admin Lets you update definitions, configure system settings, and install licenses
The following result appears, which shows that the Mail Security transport agents have
a lower priority than the Exchange antispam transport agents:
You might encounter an error about not being able to edit the config file when running
these commands. You can resolve the error by opening the Exchange Management Shell
as an administrator and running the commands again.
4 Run the following command to restart the transport agent service:
restart-service -force MSExchangeTransport
Note: If you use Intel Xeon processors, you must set this value using the formula based on
the number of physical processors, instead of the number that is reported by the operating
system.
3 In the Number of VSAPI scanning threads box, type the number of threads to use for
VSAPI scanning.
The default value is 3.
4 In the Number of scan processes box, type the number of scan processes.
The default is configured during installation using the formula 2 times the number of
processors plus 1.
5 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
■ About licensing
About licensing
Key features of Symantec Mail Security, which include definition updates and Symantec
Premium AntiSpam, are activated by a license. When a license expires or no license is installed,
limited functionality is available. To regain product functionality when your license expires, you
must renew and reactivate your license subscription.
Table 3-1 describes the licenses that are required.
License Description
Content license A content license is required to update Symantec software with the latest
associated content (such as new definitions) through LiveUpdate and
Rapid Release. A valid content license enables your servers to stay
protected.
License Description
Symantec Premium AntiSpam This license is required to enable Symantec Premium AntiSpam. Symantec
license Premium AntiSpam is a subscription service that provides enhanced
spam detection. Continuous updates to the premium antispam filters
ensure that your Exchange server has the most current spam detection
filters that are available.
Definition updates and updates to Symantec Premium AntiSpam are limited to the period of
time that the license specifies. The start and the end dates of the license period depend on
the terms of your license agreement.
You must install one license file on each server that is running Symantec Mail Security. You
cannot replicate license files.
See “About renewing the Mail Security license” on page 56.
You can view the status of your license on the Home page of the Mail Security console.
Obtain a license file from To request a license file, you must have the license serial number or
Symantec upgrade voucher code. After you complete the registration process,
Symantec sends you the appropriate license file by email.
Install the license file Install the license file on each server on which you run Mail Security.
Warning: License files are digitally signed. When you try to edit a license file, it corrupts the
file and renders it invalid.
Activating licenses 55
About activating the Mail Security license
4 Click Install.
Activating licenses 56
About renewing the Mail Security license
7 Click Install.
If a server within a server group is already licensed, the license file is reapplied. The
license file with the latest expiration date is applied.
If you purchased Mail Security Contact your administrator, reseller, or Symantec account manager
through the Symantec Value or Elite to determine whether your maintenance agreement has been
Enterprise Licensing programs renewed and if new licenses are available.
If you purchased Mail Security Small To find more information about license renewal on the Internet,
Business Edition go to the following URL:
http://www.symantec.com/products-solutions/licensing/renewals/
Activating licenses 57
About renewing the Mail Security license
Global Group The Global Group consists of all of the servers that you manage through the Mail Security
console.
The changes are propagated to all servers in all groups when you configure and apply
Global Group settings. Changes that are made at the Global Group level overwrite all
individual server and user-defined server group settings.
Mail Security provides the following Global Groups:
Global Groups include the servers that are added to user-defined groups. They also
include the servers that are added to multi-server management control but are not assigned
to a specific server group.
User-defined A user-defined server group is a grouping of servers that have common roles and,
server therefore, require similar configurations. You can create a user-defined server group and
group(s) configure settings for the group to simplify server management. For example, a server
group can be the mail servers that are used by department such as marketing or the
physical location of servers such as third floor of Building A).
Deploys your changes to the server if you are in the server view.
Deploys your changes to each server in the group and to the group settings
if you are in the group view.
Deploy all Applies the pending changes to the group settings, and then pushes out the
settings group settings to all the servers in the group.
Pushes out the group settings to all of the servers in the group if there are no
pending changes.
Note: Any configuration settings that were made to an individual server within
the group are overwritten.
See “To apply pending changes (if any) and deploy group settings to each
server in the group” on page 61.
After you deploy your changes, the Operation Status window indicates whether changes
were successfully applied.
To deploy pending changes to a server or group
1 In the console on the toolbar, click Deploy changes.
2 In the Pending changes window, click Deploy changes.
3 In the Operation Status window, click Close when the operation is complete.
Managing your Exchange servers 61
Managing servers and server groups
To apply pending changes (if any) and deploy group settings to each server in the group
1 In the console on the toolbar, click Deploy all settings.
The Deploy all settings icon is only enabled in the group view.
2 In the Deploy all settings dialog box, click OK.
3 In the Operation Status window, click Close when the operation is complete.
To cancel pending changes
1 In the console on the toolbar, click Discard changes.
2 In the Discard changes dialog box, click OK.
See “Modifying or viewing server or server group settings” on page 66.
Single server Mail Security logs onto a single server when you do any of the following:
Server group (user-defined Mail Security logs onto all of the servers in the current asset list when
server groups and Global you do any of the following:
Groups)
■ Manually refresh the console.
See “Refreshing the console” on page 48.
■ Apply settings to a server group.
Mail Security logs onto all of the servers in a group when you apply
settings to that group. If you apply settings to a user-defined server
group, Mail Security logs onto all of the servers in the user-defined
group. If you apply settings to a Global Group, Mail Security logs onto
all of the servers in the Global Group. Mail Security also logs onto all
of the servers in the user-defined groups within that Global Group.
For example, assume that you have Global Group - Exchange - 2010
and Global Group - Exchange - 2013. Within Global Group - Exchange
- 2010, you have user-defined groups named ServersEast and
ServersWest
If you apply settings to Global Group - Exchange - 2010, Mail Security
logs onto all of the servers in the ServersEast group and the
ServersWest group. Mail Security does not log onto any of the servers
in the Global Group - Exchange - 2013.
Another example assumes that you apply settings to the ServersEast
group. Mail Security logs onto all of the servers in the ServersEast
group. But Mail Security does not log onto any of the servers in the
ServersWest group.
See “Deploying settings and changes to a server or group” on page 60.
See “About managing your Exchange servers” on page 58.
To log onto servers when you apply settings or refresh the console
1 In the console on the toolbar, click Assets.
2 In the Asset Management window in the Assets box, uncheck Automatically connect
to the servers in the current group on startup.
Mail Security only logs onto a server when you apply settings to that server or when you
view or modify the settings of that server.
3 Click Close.
Note: The password must be changed before it expires or select the Password never expires
option for the user account.
5 Click Start > Programs > Administrative Tools > Active Directory Users and
Computers.
6 In the Active Directory Users and Computers window in the left pane, click Microsoft
Exchange Security Groups.
7 In the right pane, right-click Organization Management and then click Properties.
8 On the Members tab, select the user that you want to remove and click Remove.
9 Click Start > Programs > Administrative Tools > Local Security Policy.
10 In the Local Security Policy window in the left pane, click Local Policies.
11 In the right pane, double-click User Rights Assignment.
12 In the right pane, right-click Log on as a Service and then click Properties.
13 Select the user that you want to remove and click Remove.
Managing your Exchange servers 66
Managing servers and server groups
2 Click Start > Programs > Administrative Tools > Active Directory Users and
Computers.
3 In the Active Directory Users and Computers window in the left pane, click Microsoft
Exchange Security Groups.
4 In the right pane, right-click Organization Management and then click Properties.
5 On the Members tab, select the user that you want to add and click Add.
You must ensure that the user is a member of the Local Administrators Group.
6 Click Start > Programs > Administrative Tools > Local Security Policy.
7 In the Local Security Policy window in the left pane, click Local Policies.
8 In the right pane, double-click User Rights Assignment.
9 In the right pane, right-click Log on as a Service and then click Properties.
10 Select the user that you want to add and click Add.
11 From the Windows taskbar, click Start > Programs > Administrative Tools > Services.
12 Right-click Symantec Mail Security for Microsoft Exchange and click Properties.
13 On the Log On tab, enter the new user's credentials and click Apply to apply the settings.
14 Start the Mail Security service.
See “Changing the password of the domain user account” on page 64.
4 In the Global Group list, select the appropriate group, and then click OK.
5 Click Close.
See “Modifying or viewing server or server group settings” on page 66.
Note: The Global Groups have version association with the Exchange Servers. For example,
Exchange 2013 Global Group can have Exchange 2013 Servers only.
See “Installing Symantec Mail Security for Microsoft Exchange” on page 31.
To add servers to a group
1 In the console on the toolbar, click Assets.
2 In the Asset Management window, in the sidebar under Tasks, click Add server(s).
3 In the Add Server(s) window, under Management group, do one of the following:
To select an existing group Click Select group, select the existing group in which you want to
add the server, and then click OK.
To create a new group In the Group box, type the name of the new server group that you
want to create.
5 Under Server options, in the TCP port number box, type the TCP port number for the
server or group of servers that you want to add.
The default port number is 8081. The port number must be the same for all servers that
you want to add. The port number and SSL setting must be identical for the console to
communicate with the server.
See “Modifying the port and the communication properties of a server” on page 73.
6 Check Send group settings to apply group settings to the newly added server.
If unchecked, existing server settings are retained, and the future changes that are made
to the server group are applied to the server.
7 Check Install SMSMSE to install Mail Security to the newly added server.
8 Check Keep installation files on server(s) to maintain the installation files on the server.
9 Click OK, and then click Close.
■ Right-click on the server that you want to move, and then click Move server.
5 Check Send group settings to server to apply the settings of the targeted user-defined
server group to the server.
6 Click OK, and then click Close.
See “Synchronizing group settings to a server” on page 70.
Note: Importing settings file exported from version 7.5 into version 7.9 is not supported.
To export settings
1 In the console on the toolbar, click File > Export.
2 In the confirmation dialog box, click OK.
3 In the Select the file to save exported settings window, choose the location where you
want to save the file.
4 In the File name box, type the file name.
5 Click Save.
6 In the Operation Status window, click Close when the operation is complete.
To import settings
1 In the console on the toolbar, click File > Import.
2 In the confirmation dialog box, click OK.
3 In the Select an SMSMSE settings file window, locate the file that you want to import.
Managing your Exchange servers 73
Managing servers and server groups
4 Click Open.
5 In the console on the toolbar, click Deploy changes to apply your changes.
Note: You must manually re-create any consolidated report schedules after you import
the settings.
To create and assign a custom throttling policy to the Mail Security service account user
1 Click Start > Programs > Microsoft Exchange Server server version > Exchange
Management Shell.
2 Type the following command to create the throttling policy and then press Enter:
New-ThrottlingPolicy -Name <PolicyName> -EWSPercentTimeInAD $null
-EWSPercentTimeInMailboxRPC $null -EWSMaxConcurrency $null
-EWSMaxSubscriptions $null -EWSPercentTimeInCAS $null
3 Type the following command to assign the throttling policy to the Mail Security service
account user and then press Enter:
Set-ThrottlingPolicyAssociation -Identity Service Account User Name
-ThrottlingPolicy Throttling Policy Name
Note: This configuration is applicable for other Windows platforms where TLS 1.2 protocol is
enabled.
Local You can choose to send infected messages and attachments to the local quarantine when
quarantine you configure Mail Security policies. You can also configure policies to quarantine the
messages that trigger violations.
Quarantine You can forward the infected files that are in the local quarantine to the Symantec
Server Quarantine Server, if it is set up on your network. Mail Security forwards infected files to
the Quarantine Server at 60-minute intervals.
Files that are sent to the Quarantine Server are then forwarded to Symantec for analysis
in real-time using HTTPS communications. Symantec automatically distributes updated
definitions to the Quarantine Server when they are available.
\ADMTOOLS\DIS
See the Symantec Central Quarantine Administrator's Guide for more information about
the Symantec AntiVirus Central Quarantine, which is provided with the installation package
at the following location:
\DOCS\DIS\CentQuar.pdf
Note: Files that contain non-viral threats, are unscannable, or violate filtering rules are
not forwarded to the Quarantine Server.
7 In the Network Protocol list, click the drop-down menu and select the appropriate network
protocol.
8 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
Maximum number The maximum number of messages or attachments that are stored in the quarantine
of items
Maximum size of The maximum file size (in megabytes or gigabytes) of the quarantine
quarantine
Retain items in The maximum number of days to retain a message or attachment in the quarantine
quarantine
5 Check Retain items in quarantine to limit how long an item is quarantined, and then
type the number of days.
Quarantining messages and attachments 79
Viewing the contents of the local quarantine
Item Description
Time encrypted The date and time when Mail Security intercepted and encrypted the file.
Message part Part of the message that was sent to the quarantine.
Quarantine Id The Alpha-numeric identifier that Mail Security assigns to the quarantined
file.
Sent to QServer Whether the file was sent to the Quarantine Server.
When you select an item in the Quarantine, details about the message (and attachments, if
any) appear in the preview pane.
Table 5-2 lists the detailed information that is shown in the preview pane.
Item Description
Time encrypted The date and time when Mail Security intercepted and encrypted the file.
If the message body triggered the violation, this entry is: Message Body.
Item Description
Sent to QServer Whether the file was sent to the Quarantine Server.
4 In the Search Criteria for Quarantine window, use the following filters:
Rule violated Type the name of the violated rule to filter the items that are
quarantined for the specific rule violation.
Message part (Attachment Filter the items based on the attachment name.
name)
Time encrypted Select the option and specify the date range to filter the items that
are quarantined (encrypted) during the specified period.
Note: You can type the complete filter name or part of the filter name (literal string) to filter
the items. Regular expression and wildcard expression search is not supported.
5 To clear the search results on the page, in the sidebar under Tasks, click Clear Search.
Delete oldest items Removes the oldest items in the local quarantine
when a threshold is met.
Note: By default, Mail Security version 7.5 and later do not re-scan the items that are
quarantined due to antivirus and file filtering violations, once they are released. However, if
the items are quarantined due to content filtering violations, Mail Security scans these items
only for virus policies and file filtering conditions. This behavior is configurable through registry.
Messages that are released from the quarantine are not filtered for spam and filtering rules.
5 In the Releasing item(s) by mail window, select from the mail options that Mail Security
provides.
Mail Security provides the following mail options:
Send to original intended recipient(s) Sends the message to the original intended
recipient(s).
6 Click OK.
7 In the Operation Status window, click Close when the operation is complete.
Yes Removes the item from the quarantine after it has been saved to the Release folder
No Keeps the item in the quarantine after it has been saved to the Release folder
■ Remediation overview
■ Types of Remediation
■ Managing certificates
General Contains the rules controlling scanning limits, exceptions, and outbreak
management
Antivirus Contains the rules for detecting threats in messages and attachments
with viruses, virus-like characteristics, or security risks, such as adware
or spyware
■ Detect spam.
■ Allow specified senders to bypass antispam scanning.
■ Specify the recipients whose email messages are not scanned for
spam.
Content Enforcement Contains the rules to filter inappropriate content in message bodies and
attachments.
Also contains file filtering rules and match the lists that let you detect and
block messages by file name and file type.
Risk Description
Threats Mail Security detects viruses, worms, and Trojan horses in all major file
types.
Table 6-1 Risks that can threaten your Exchange server (continued)
Risk Description
Mass-mailer worms Mail Security detects that an email message is a mass-mailer worm. It
automatically deletes the infected email message and any attachments.
Denial-of-service attacks Mail Security protects your network from the file attachments that can
overload the system and cause denial-of-service attacks. The attachments
include the container files that are overly large. They contain large
numbers of embedded, compressed files or are designed to maliciously
use resources and degrade performance. You can impose limits to control
how Mail Security handles container files to reduce your exposure to
denial-of-service threats.
Security risks Mail Security detects security risks, such as adware, dialers, hacking
tools, joke programs, remote access programs, spyware, and trackware.
Mail Security also helps you detect and block other potential risks from entering your network,
such as unscannable and encrypted container files.
See “Configuring rules to address unscannable and encrypted files” on page 96.
When a risk is detected, the incident is logged to the locations that you specify. You can also
configure Mail Security to issue alerts when risks are detected or when an outbreak occurs.
See “About logging events” on page 204.
See “About outbreak management” on page 194.
Definitions Symantec engineers track reported outbreaks of threats (such as viruses, Trojan horses,
worms) to identify new threats. After a threat is identified, information about the threat (a
signature) is stored in a definition file. This file contains information to detect and eliminate
the threat. Mail Security searches for these signatures when it scans for threats.
Protecting your server from risks 89
Configuring a threat detection
Heuristics Mail Security uses Symantec Bloodhound heuristics technology to scan for threats for
which no known definitions exist. Bloodhound heuristics technology scans for unusual
behavior such as self-replication to target potentially infected message bodies and
attachments. Bloodhound technology is capable of detecting upwards of 80 percent of
new and unknown executable file threats.
Bloodhound-Macro technology detects and repairs over 90 percent of new and unknown
macro viruses. Bloodhound requires minimal overhead since it examines only message
bodies and the attachments that meet stringent prerequisites. In most cases, Bloodhound
can determine in microseconds whether a message or attachment is likely to be infected.
If it determines that a file is not likely to be infected, it moves to the next file.
Container file Mail Security contains a decomposer that extracts container files so that they can be
decomposer scanned for risks. The decomposer attempts to extract container files until it reaches the
base file or until it reaches its extraction limit. If the decomposer reaches the set limit
before the base file is reached, the scanning process stops. Mail Security then logs the
violation to the specified logging destinations, and the file is handled according to the
Unscannable File Rule.
Enable threat detection Mail Security detects viruses, worms, and Trojan horses in all major file
scanning types. Antivirus scanning must be enabled for Mail Security to detect threats.
Threat detection scanning applies to all types of scans.
See “About the types of scanning that you can perform” on page 170.
Set the Bloodhound Mail Security uses Bloodhound technology to supplement the detection of
Detection level threats by signature.
You can customize your level of protection against new threats, from zero
protection to a high level of protection. A high level of protection increases
protection of your network; however, server performance might be affected.
At lower levels of protection, an unknown threat might escape detection, but
the trade-off with server performance decreases. In most cases, the default
(Medium) setting is appropriate.
Enable mass-mailer Mail Security detects that an email message is a mass-mailer worm or virus
worm-infected message when this feature is enabled. If Mail Security detects that an email message
detection is a mass-mailer worm or virus, it deletes the infected email message and
any attachments. Mail Security does not send notifications after deleting a
mass-mailer worm or virus message and any attachments. When the
mass-mailer detection feature is not enabled, an infected mass-mailer email
message is treated the same as an infected message.
Enable advanced Mail Security provides a better antivirus protection if you enable the
heuristics detection Advanced heuristics detection check box.
Modify default threat Mail Security provides default antivirus rules, which are always enabled.
detection rules, as needed You can modify these rules.
Low Optimizes the server performance, but might not detect potential threats.
High Increases the detection of threats, but might affect server performance.
6 In the Rules table, select any of the following rules to view or modify them in the preview
pane:
Basic Virus Rule Applies to the messages or the attachments that contain repairable
threats.
Unrepairable Virus Rule Applies to the messages or the attachments that contain the threats that
cannot be repaired.
Security Risk Rule Applies to messages that contain security risks, such as adware or
spyware.
The settings for the rule that you select appear in the preview pane.
7 In the preview pane, in the Action to take list, select the action to take when a threat is
detected using the drop-down menu.
8 In the Replacement text box, type your customized message if you want to replace the
message or the attachment body with a text message.
The default text is: Symantec Mail Security replaced %attachment% with this text message.
The original file contained %violation% and was %action%.
You can use variables in your customized text.
See “Alert and notification variables” on page 239.
9 Check one or more of the following to send email notifications about the detection:
■ Notify administrators.
Click the down arrow and type your customized text in the Subject line box and the
Message body box. The default Subject line and Message body text is as follows:
■ Default subject line text: Administrator Alert: Symantec Mail Security detected
%violation%
■ Default message body text: Location of the infected item: %location% Sender of
the infected item: %sender% Subject of the message: %subject% The attachment(s)
"%attachment%" was %action% for the following reasons: %information% This
was done due to the following Symantec Mail Security settings: Scan: %scan%
Rule: %rule%
Click the down arrow and type your customized text in the Subject line box and the
Message body box. The default Subject line and Message body text is as follows:
■ Default subject line text: Symantec Mail Security detected %violation% in a message
that is sent from your address
■ Default message body text: %subject% Recipient of the message: %recipient%
Category Description
Hack tools Programs that are used to gain unauthorized access to a user's computer.
Joke programs Programs that alter or interrupt the operation of a computer in a way that
is intended to be humorous or bothersome.
For example, a joke program might move the Recycling Bin away from
the mouse when the user tries to click on it.
Remote access programs Programs that let a remote user gain access to a computer over the
Internet to gain information from, attack, or alter the host computer.
Spyware The standalone programs that can secretly monitor computer activity and
detect passwords and other confidential information. Spyware can then
relay the information back to a remote computer.
Trackware The standalone or appended applications that trace a user's path on the
Internet and relay the information to a remote computer.
5 In the Replacement text box, type your customized message if you want to replace the
message or the attachment body with a text message.
The default text is: Symantec Mail Security replaced %attachment% with this text message.
The original file contained %violation% and was %action%.
You can use variables in your customized text.
See “Alert and notification variables” on page 239.
6 Check one or more of the following to send email notifications about the detection:
■ Notify administrators.
Click the down arrow and type your customized text in the Subject line box and the
Message body box. The default Subject line and Message body text is as follows:
■ Default subject line text: Administrator Alert: Symantec Mail Security detected
%violation%
■ Default message body text: Location of the infected item: %location% Sender of
the infected item: %sender% Subject of the message: %subject% The attachment(s)
"%attachment%" was %action% for the following reasons: %information% This
was done due to the following Symantec Mail Security settings: Scan: %scan%
Rule: %rule%
UFR - Scanning Limits This rule gets triggered when any of the scanning limits are violated. You
(Unscannable File Rule for can set the scanning limits under the Policies > Scanning Limits
Scanning Limits) workspace.
The default action for the Unscannable File Rule for Scanning Limits is
Quarantine entire message and replace with text (By part for Store).
UFR - Malformed Files This rule gets triggered when Mail Security does not recognize the file
(Unscannable File Rule for format of a specific file and is unable to scan it. In such cases, the file is
Malformed Files) treated as Malformed.
The default action for the Unscannable File Rule for Malformed Files is
Quarantine entire message and replace with text (By part for Store).
Encrypted File Rule Infected files can be intentionally encrypted. Encrypted files cannot be
decrypted and scanned without the appropriate decryption tool. You can
configure how you want Mail Security to process encrypted container files
to protect your network from threats.
The default setting for the Encrypted File Rule is to log the violation only.
4 In the preview pane, in the Action to take list, use the drop-down menu to select the
action to take when a violation is detected.
Protecting your server from risks 97
Configuring rules to address unscannable and encrypted files
5 In the Replacement text box, type your customized message if you want to replace the
message or the attachment body with a text message.
The default text is: Symantec Mail Security replaced %attachment% with this text message.
The original file was unscannable and was %action%.
You can use variables in your customized text.
See “Alert and notification variables” on page 239.
6 Check the option Enable list of trusted domains or users if you want to enter a list of
domains or email addresses.
For each of the three rules, you can enter a list of trusted domains or users. You can set
different actions for these trusted domains or users.
7 From the Action to take drop-down menu, select an action that you want to take on the
list of trusted domains or users.
8 In the Replacement text box, type your customized message if you want to replace the
message or the attachment body with a text message.
The default text is: Symantec Mail Security replaced %attachment% with this text message.
The original file was unscannable and was %action%.
9 Check one or more of the following to send email notifications about the detection:
■ Notify administrators.
Click the down arrow and then type your customized text in the Subject line box and
the Message body box. The default Subject line and Message body text is as follows:
■ Default subject line text: Administrator Alert: Symantec Mail Security detected a
message with an unscannable attachment or body
■ Default message body text: Location of the message: %location% Sender of the
message: %sender% Subject of the message %subject% The attachment(s)
"%attachment%" was %action%. This action was done due to the following
Symantec Mail Security settings: Scan: %scan% Rule: %rule%
■ Notify Trusted Domain: Send the email notification to administrator. When the
checkbox is cleared, the email notification is not sent. By default, this is enabled.
■ Notify Trusted Domain: Send the email notification to sender. By default, this is
enabled.
When the checkbox is cleared, the email notification is not sent.
Remediation overview
Symantec Mail Security for Microsoft Exchange has been enriched with a new fully-automated
remediation feature to protect exchange mailboxes against known email threats. This feature
lets you auto-remediate threats inside your mailboxes based on the email feeds. The email
feeds contain information about the location of the email threat and the action to be taken.
Mail Security enables Symantec or third-party products to automatically initiate remediation
over secure, email-based communication channel. On the Remediation settings page, you
can specify detailed configuration, such as the remediation mode – Sent items folder or Deep
discovery and clean-up.
Following are the remediation categories:
■ In Internal Remediation, the Mail security generates the email feeds.
■ In External Remediation, other Symantec products or third-party products generate the
email feeds.
Once the remediation feature is configured and enabled, Mail Security handles the remediation
requests automatically for the whole organization.
Protecting your server from risks 99
How remediation works
Remediation aims to address the following issues by searching for threats in one or more
mailboxes of your organization and sanitize them.
■ Copies of email threats residing in the sent items folder.
■ Delayed detection and remediation of malware poses risk.
■ Day zero threats which can quickly proliferate making it difficult to remediate.
See “How remediation works” on page 99.
See “Configuring remediation options” on page 100.
See “Types of Remediation” on page 100.
Note: Remediation search scope does not include public folders in your mailbox.
Types of Remediation
You can remediate threats present in a single mailbox or all the mailboxes across organization
and clean all possible threat trails. Mail Security searches data in the mailbox for last 24 hours.
■ Sent Items Remediation Only
In this mode, only the Sent Items folder of the sender’s mailbox is searched for email
threats.
For example, If email with malicious attachment is sent, Mail Security scans and cleans
the email and forwards the email to the intended recipient. But, a copy of the sent email is
saved in the sent items folder containing the malicious attachment. The sent items are
never scanned and can pose a risk which can proliferate across other mailboxes. In this
scenario, you might want to use the sent items remediation to sanitize the sent items folder.
■ Deep discovery and Clean-up
The scope of Sent Item remediation is limited only to the sender’s mailbox. But, if you want
to remediate threats across the organization, this remediation type is useful. In deep
discovery and clean-up, the threat is searched with the attachment hash and all the emails
for which the hash matches are quarantined. The deep discovery and clean-up remediation
type generate multiple quarantine entries.
See “Viewing the contents of the local quarantine” on page 79.
See “Configuring remediation options” on page 100.
See “Remediation feed settings” on page 100.
administrator has to select and move the email feeds from the Inbox folder to the newly
configured folder for remediation. Once the remediation feed arrives, the remediation
handler picks up the feed and starts processing it.
If you want to create your own remediation email feed, See “Creating an email remediation
feed” on page 101.
■ Certificate based auto validation (Symantec Recommended)
This option provides the highest level of security by verifying and authenticating the validity
of the sender. It requires you to install digital certificate on all the servers where Mail Security
is installed. You can also use self-signed certificate for validation purpose.
Once you have installed the certificate, you must specify the Certificate Subject (CN=)
and Certificate Serial Number in Remediation Setting > Feed Validation Settings >
Certificate based auto validation.
After certificate validation, the email feed is consumed for processing else the email feed
is ignored.
See “Managing certificates” on page 103.
■ Custom auto Validation (Default option)
Use this option to create a list of valid senders of the feeds. Any email that arrives apart
from the configured list of senders is discarded.
For an additional layer of secure connection, you can enable the auth key. Once you enable
the authentication key, both sender email ID and auth key is used for validation purpose.
To enable auth key, See “Enabling authentication key” on page 103.
See “Configuring remediation options” on page 100.
rem_scope_mailboxes Optional, Default All Mandatory To narrow down search, the scope
Mailboxes parameter is used. If you want to
[value=mailbox1;mailbox2]
search multiple mailboxes, you can
[value=mailbox1;mailbox2]
specify multiple mailboxes that are
separated by a semicolon.
For example,
rem_scope_mab
li oxes=user1@xyz.com;user2@xyz.com
rem_scope_last_n_hours Optional, Default last 24 hrs Optional, Default last 24 hrs Remediation search scope for the
emails that arrived in last N hours.
[value=N] [value=N]
For example,
rem_scope_last_n_hours=24
Managing certificates
For certificate-based validation feed setting, you must install a self-signed certificate or a
third-party certificate. The certificate must be installed in the local machine store and the current
user store.
You can create a self-signed certificate by using the Visual Studio tools command line.
For example, to create a 'emailsigning.pfx' certificate, use the following commands:
To install certificate in the local machine store and current user store
1 Install certificate in the user personal store: Certificates- Current user > Personal >
Certificate.
2 Install certificate in local machine store: Certificates (Local Computer) > Personal >
Certificate. While installing the certificate, make sure to enable Mark this key as
exportable. Also, give full permissions to the Network Service in the certificate. To do
this, select the certificate, All Tasks > Manage Private keys....
3 Repeat steps 1 and 2 on all the servers where Mail Security is installed.
4 After installing the certificate, specify the certificate serial number and subject in the
Remediation Setting > Feed Settings > Certificate based validation.
You can configure additional validation for certificates where you want to assign certain
certificate for remediation feature. This may be required in case multiple certificates are installed
on different exchange servers. Instead of validating the certificate generically from certificate
store, you can add extra validation by providing certificate information. In this case, if certificate
is not found in the list, the validation fails.
If the list is configured and certificate is found in the list, the validation process validates the
certificate from the store. If the file RemediationTrustedCert.txt does not exist or empty,
the certificate validation happens from the certificate store.
To configure the certificate list
1 Go to the installation directory.
2 Create a text file RemediationTrustedCert.txt in the etc folder.
<InstallDir>\SMSMSE\7.9\Server\etc\RemediationTrustedCert.txt
3 Type issuer name that is followed by comma and the serial number. Type one entry per
line if you have multiple certificates.
For example, CN=Remediation, f00000087974e880405f414e8x4fxxx7
See “Remediation feed settings” on page 100.
■ Configuring whitelists
Configuring whitelists
You can enable and populate the following whitelists to minimize false positives:
Allowed Senders Lets you list the sender domains that are permitted to bypass antispam scanning
Unfiltered Recipients Lets you list the email addresses to which inbound emails are permitted to bypass
antispam scanning
If the Allowed Senders and Unfiltered Recipients lists are both enabled, Mail Security processes
the Allowed Senders list first.
Email messages that are permitted to bypass antispam scanning are still scanned for risks
and file filtering violations.
To configure whitelists
1 In the console on the primary navigation bar, click Policies.
2 In the sidebar under Antispam, click Whitelist.
3 In the content area, under Allowed Senders, check Bypass spam detection for
messages sent from the following.
4 In the Email and domain addresses box, type the domains and email addresses (one
per line) that are permitted to bypass spam detection.
Domain names must begin with either @ (at symbol) or an asterisk before the at symbol
(for example, @mail.com or *@mail.com).
You can use DOS wildcard characters.
See “About DOS wildcard style expressions” on page 160.
5 Under Unfiltered Recipients List, check Bypass spam detection for messages sent
to the following.
Identifying spam 107
How to detect spam using Symantec Premium AntiSpam
6 In the Fully qualified email addresses box, type the fully qualified email addresses (one
per line) to which email messages are permitted to bypass spam detection.
You can list up to 50 email addresses.
7 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
6 Click OK.
7 In the Registry Editor window, in the left pane, browse and locate the following folder:
HKEY-LOCAL_MACHINE\SOFTWARE\Symantec\SMSMSE\<version>\Licensing\
If the file SPARunRegister In the right pane, right-click on any blank space, and select New
does not exist > DWORD Value. In the name box, type:
SPARunRegister
If the file SPARunRegister In the right pane, right-click on the file, and select Modify. In the
exists Edit DWORD Value dialog box, in the Value data box, change
the value to 0, and then click OK.
See “About registering Symantec Premium AntiSpam through an ISA server” on page 107.
■ Configure your proxy server to permit downloads for Symantec Premium AntiSpam.
See “Configuring your proxy server to download spam definition updates” on page 108.
■ Install the Symantec Premium AntiSpam license.
See “About licensing” on page 52.
Configure the following settings to detect and handle spam:
Reputation service: Symantec monitors email sources to determine how much of the email
messages that are sent from those sources is legitimate. Email from those sources can then
be blocked or allowed based on the source's reputation value as determined by Symantec.
Enable Ruleset The Rule Based Reputation Service is the name for a set of downloadable IP address
based sender IP lists. You can use this list to block SMTP connections from known spam IP addresses
reputation or allow SMTP connections from known reputable IP addresses.
The Rule Based Reputation Service currently includes the following classification
lists of IP addresses, which are continuously compiled and updated:
Suspect List Contains the IP addresses from which all of the outgoing email is spam. This list is
always enabled.
Fast Pass The Fast Pass feature conserves resources by providing a temporary exemption
from spam scanning for senders with a demonstrated history of sending no spam
messages. Thus senders with the best local reputation are exempted from spam
scanning.
Marketing mail Emails that contain commercial or fund-raising messages, requested by the user.
When the policy detects these messages it takes the action that is configured under
Suspected Spam.
Newsletter Emails that include content on specific topics for a known period, often weekly, or
monthly. The user may have requested to receive these publications. When the
policy detects these messages it takes the action that is configured under Suspected
Spam.
Identifying spam 110
How to detect spam using Symantec Premium AntiSpam
Suspicious URL Suspicious URLs include free hosting sites, URL shortening services, and URL
redirecting the services that can potentially be abused to deliver spam or malware
payloads. SMSMSE can filter against the email messages that contain one or more
suspicious URLs. When the policy detects the messages it takes the action that is
configured under Suspected Spam.
DNS IP Reputation:
Note: DNS IP reputation feature is disabled by default for all upgrade scenarios.
Spam Scoring
Flag messages as suspected spam Flags the messages as suspected spam when their
scores reach the suspected spam threshold.
You must have a valid Symantec Premium AntiSpam license to enable Symantec Premium
AntiSpam.
See “About licensing” on page 52.
Identifying spam 111
How to detect spam using Symantec Premium AntiSpam
5 Check Suspect list which contains the emails sources that primarily send spam. This
option is selected by default and cannot be changed.
6 To bypass antispam filtering of email messages from verified senders check Fast Pass.
7 Under DNS IP reputation, check the Enable DNS IP Reputation option. This DNS-based
IP (DNS IP) reputation allows the delivery of the Symantec Global Bad Senders list, which
is the largest Symantec IP reputation list.
Note: Symantec recommends using either Enable Ruleset based sender IP or DNS IP
reputation services to avoid heavy network bandwidth consumption.
8 Under Spam Scoring, check Flag messages as suspected spam if you want the
messages that are flagged as suspected spam. In the Lower spam threshold box, type
the suspected spam threshold level if you choose to identify suspected spam.
9 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
8 Check Assign SCL value to message to reassign the SCL value, and in the drop-down
list, select the threshold value.
You can choose a value from 1 to 9. The default value is 6.
Identifying spam 114
How to detect spam using Symantec Premium AntiSpam
9 Check Log to log suspected spam messages to the specified logging destinations.
Suspected spam messages are identified in the Windows Event Log as information or
events.
See “About logging events” on page 204.
10 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
5 Check Log to log suspected spam messages to the specified logging destinations.
See “About logging events” on page 204.
6 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
To accept the suspected spam messages that exceed an SCL threshold
1 In the console on the primary navigation bar, click Policies.
2 In the sidebar under Antispam, click Premium AntiSpam Actions.
3 Under Suspected Spam and SCL from the If message is Suspected Spam and SCL
is list, select the SCL value threshold.
You can choose a value from 0 to 8. The default value is 5.
4 Check Accept the message.
5 Check Prevent delivery to original recipient(s) to prevent the intended recipients from
receiving suspected spam messages.
6 Check Deliver to alternate recipient to send suspected spam messages to a different
recipient, and type the address to which suspected spam messages are delivered.
You can only specify one recipient.
7 Check Add to subject line to prepend the subject line of suspected spam messages,
and in the subject line box, type your customized text.
The default text is Spam.
8 Check Add X-header(s) to add one or more X-headers to messages that trigger the
violation, and then do any of the following:
9 Check Assign SCL value to message to assign an SCL value to suspected spam
messages, and in the drop-down list, select the threshold value.
You can choose a value from 1 to 9. The default value is 8.
10 Check Log to log suspected spam messages to the specified logging destinations.
The suspected spam messages that meet or exceed an SCL value are identified in the
Windows Event Log as information or events.
See “About logging events” on page 204.
11 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
8 Check Assign SCL value to message to assign an SCL value to spam messages, and
in the drop-down list, select the threshold value.
You can choose a value from 1 to 9. The default value is 9.
Identifying spam 119
How to detect spam using Symantec Premium AntiSpam
Note: X-headers can only be applied to SMTP transported email messages. X-headers cannot
be applied to messages that are scanned in the message store.
Mail Security provides default X-headers that Enterprise Vault uses. You can modify the default
X-headers, or you can create your own. You can apply up to 25 X-headers for a single violation.
When a message triggers one or more violations and the disposition for any of the violations
is to delete the message, no X-headers are applied. For example, a message is identified as
spam, and the disposition is to reject the message. No X-header is applied to the message.
Table 7-1 describes how Mail Security handles multiple filtering violations based on where the
violations occur within the message.
Identifying spam 120
How to detect spam using Symantec Premium AntiSpam
Multiple violations in different Mail Security applies X-headers A single message violates a
parts of a message for each rule that is violated for filtering rule for message body
each message part. and a separate content filtering
rule for subject. Mail Security
Message parts include:
applies the X-headers that you
■ Message body specify for the message body rule
■ Subject and the X-headers that you
■ Sender specify for the subject rule.
■ Attachment name In this example, the message can
■ Attachment content have up to 50 X-headers applied
to it. You can apply up to 25
X-headers for the message body
violation and up to 25 X-headers
for the subject violation.
Multiple violations for the same When a message triggers multiple A message triggers violations for
message part violations for the same message two different attachment filtering
part, Mail Security applies only the rules. Mail Security only applies
X-headers that you specify for the the X-headers for the first rule that
first rule that is triggered. was violated.
Note: X-headers are applied to
the message even when the
disposition is to delete the
attachment but not the message
body.
Content filtering Content filtering rules filter messages and their attachments for the specific content
rules that you specify (for example, offensive language or sensitive information).
Mail Security lets you create the content filtering rules that apply to SMTP inbound
and SMTP outbound mail and the Exchange Information Store.
Mail Security can scan for content within the following message parts: message
body, subject, sender, attachment name, and attachment content.
You can use the default content filtering rules that Mail Security provides or you can
create your own rules. You can individually enable and disable each rule. Mail
Security takes the action that you specify in the rule when it detects a violation.
File name and file Mail Security lets you use file filtering rules to filter messages based on attached
type filtering rules file names or file types such as video or document files.
Mail Security uses file filtering rules to enforce email attachment policies.
Mail Security provides the following predefined file name filtering rule:
You can customize the file name rule by associating it with a match list to block
attachments with specific names included in the match list.
Mail Security provides the following predefined file type filtering rules:
Mail Security handles filtering violations according to the action that you configure
for the rule. Mail Security can notify administrator and senders (internal and external)
of file filtering violations. You can customize the notification message.
Match lists Mail Security uses match lists to filter email messages and attachments for specific
words and phrases. To implement a match list, you must associate it with a content
or file filtering rule. When the rule is enabled, Mail Security scans for the criteria
that you specify in the rule. The criteria includes the words and phrases that are in
the associated match list.
Mail Security provides the match lists for use with the File Name Rule or with content
filtering rules. You can create new match lists and delete or edit words in an existing
match list. Match lists support literal strings, DOS wildcard-style expressions, or
regular expressions.
You can also use match lists to help manage outbreaks. You can configure Mail
Security to automatically add the names of outbreak-triggered attachments and
outbreak-triggered subject text to match lists. Mail Security uses these match lists
with content or file filtering rules to automatically block suspicious file attachments
or subjects.
You can specify the action that you want Mail Security to take when it detects a filtering rule
violation. You can also configure Mail Security to notify the administrator and senders (internal
and external) of a violation with a message that you can customize.
ISO .iso
Table 8-2 lists the documents file types that Mail Security supports
Filtering content 124
About content and file filtering
Table 8-3 lists the image file types that Mail Security supports
Table 8-4 lists the video file types that Mail Security supports
Table 8-5 lists the sounds file types that Mail Security supports
Table 8-6 lists the compressed file types that Mail Security supports
BINHEX .hqx
UUEncode .uu
MacBinary .bin
UNIX Compress .z
7 Zip .7z
Rule Description
Blank Subject and Sender Detects and filters messages with blank subject line and blank
sender line
Quarantine Triggered Attachment Detects and filters the files whose attachment name matches
Names a list of outbreak-triggered attachment names
Rule Description
Quarantine Triggered Subjects Detects and filters the messages whose subject matches a list
of outbreak-triggered subjects
Sample Executable File Detects and filters executable files based on the Sample
Attachment Name match list
Enable the default content filtering rules that you want to use. You can modify the rules as
needed.
See “About content and file filtering” on page 121.
See “Configuring the conditions of a content filtering rule” on page 128.
Rule Description
Compressed File Rule Detects and filters messages with an attachment of compressed
file based on its true file type.
Documents File Rule Detects and filters messages with an attachment of document file
based on its true file type.
Executable File Rule Detects and filters messages with an attachment of executable file
based on its true file type.
Image File Rule Detects and filters messages with an attachment of image file based
on its true file type.
Multimedia File Rule Detects and filters messages with an attachment of multimedia file
based on its true file type.
Enable the default file type filtering rules that you want to use. You can modify the rules as
needed.
See “About file type filtering ” on page 123.
See “Creating a file type filtering rule” on page 129.
Filtering content 128
About creating the filtering rules
Modify an existing rule In the content area, double-click the rule that you want to edit.
Filtering content 129
About creating the filtering rules
4 On the Rule tab, define the conditions for the content filtering rule.
See “Elements of a content filtering rule” on page 142.
5 Do any of the following:
■ Configure the remaining components of the content filtering rule.
See “Specifying the users and groups in a filtering rule” on page 129.
See “Specifying whom to notify if a filtering rule is violated” on page 131.See “Configuring
rule actions” on page 133.
■ Click OK and then click Deploy Changes.
See “Deploying settings and changes to a server or group” on page 60.
Note: This feature is not available for the Edge Server role.
You can select groups from Active Directory. You can also add users based on SMTP
addresses.
Table 8-9 shows the SMTP address formats that Mail Security supports.
Filtering content 130
About creating the filtering rules
Address Example
When you use the address formats from the table above, sub-domains are automatically
supported. For example, when you use the address format <name>@<domain name>, Mail
Security will support joe@symantec.com, as well as joe@security.symantec.com.
If you do not specify users, the rule applies to all senders and recipients.
If you want to specify a user or group whose domain is not in the Exchange server domain,
specify the domain name in the Internal Domains list.
See “Specifying inbound SMTP domains ” on page 150.
Note: You can select any Active Directory group except the Users group. Adding the Users
group to Active Directory Groups list results in unintended behavior. For the filtering rules
based on Active Directory group, you must add SMSMSE service account user (RBAC user)
to the SMSMSE Admin's Active Directory group.
Modify an existing rule In the content area, double-click the rule that you want to edit.
To apply the rule based on Click Sender, and then select one of the following options from the
the sender drop-down list:
To apply the rule based on Click Recipient, and then select one of the following options from the
the recipient drop-down list:
6 Under List of Users or Groups, in the SMTP addresses box, do one of the following:
■ Type the addresses of the users that you want to include or exclude.
Type one address per line.
■ To add a preconfigured match list that contains user addresses, click Add Match List
and select a match list.
You can only insert one match list. You can combine a match list with typed addresses.
See “About match lists” on page 155.
7 Under the Active Directory groups list, to select groups from Active Directory, click Add.
8 In the Active Directory domains and groups window, under Available groups, select
the group that you want to add and click the >> command icon.
The group that you select appears in the Selected groups list. To deselect a group in
the Selected groups list, click on the group entry, and then click the << command icon.
9 Do any of the following:
■ Configure the remaining components of the content filtering rule.
See “Configuring the conditions of a content filtering rule” on page 128.
See “Specifying whom to notify if a filtering rule is violated” on page 131.
See “Configuring rule actions” on page 133.
■ Click OK and then click Deploy Changes.
See “Deploying settings and changes to a server or group” on page 60.
Modify an existing rule In the content area, double-click the rule that you want to edit.
6 Click OK.
7 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
Modify an existing rule In the content area, double-click the rule that you want to edit.
Filtering content 134
About creating the filtering rules
4 On the Actions tab, in the When a violation occurs box, use the drop-down menu to
select Delete entire message.
The default setting is: Quarantine entire message and replace with text.
5 Do any of the following:
■ Configure the remaining components of the content filtering or file type filtering rule.
See “Configuring the conditions of a content filtering rule” on page 128.
See “Creating a file type filtering rule” on page 129.
See “Specifying the users and groups in a filtering rule” on page 129.
See “Specifying whom to notify if a filtering rule is violated” on page 131.
■ Click OK and then click Deploy Changes.
See “Deploying settings and changes to a server or group” on page 60.
To configure rule actions to delete the attachment and message body and replace with text
1 In the console on the primary navigation bar, click Policies.
2 In the sidebar under Content Enforcement, click Content Filtering Rules/File Type
Filtering Rules.
3 Do one of the following:
Modify an existing rule In the content area, double-click the rule that you want to edit.
4 On the Actions tab, in the When a violation occurs box, use the drop-down menu to
select Delete attachment/message body and replace with text.
The default setting is: Quarantine entire message and replace with text.
5 In the Replacement text box, type your customized text.
The default text is: Symantec Mail Security replaced %attachment% with this text message.
The original attachment content type was not allowed and was %action%.
See “Alert and notification variables” on page 239.
6 Check Add X-header(s) to add one or more X-headers to messages that trigger the
violation, and then do any of the following:
Filtering content 135
About creating the filtering rules
To configure rule actions to quarantine entire message and replace with text
1 In the console on the primary navigation bar, click Policies.
2 In the sidebar under Content Enforcement, click Content Filtering Rules/File Type
Filtering Rules.
3 Do one of the following:
Modify an existing rule In the content area, double-click the rule that you
want to edit.
4 On the Actions tab, in the When a violation occurs box, ensure that Quarantine entire
message and replace with text is selected.
This option is selected by default.
5 In the Replacement text box, type your customized text.
The default text is: Symantec Mail Security replaced %attachment% with this text message.
The original attachment content type was not allowed and was %action%.
6 Check Add X-header(s) to add one or more X-headers to messages that trigger the
violation, and then do any of the following:
To configure rule actions to quarantine the attachment and message and replace with text
1 In the console on the primary navigation bar, click Policies.
2 In the sidebar under Content Enforcement, click Content Filtering Rules/File Type
Filtering Rules.
3 Do one of the following:
Modify an existing rule In the content area, double-click the rule that you want to edit.
Filtering content 138
About creating the filtering rules
4 On the Actions tab, in the When a violation occurs box, select Quarantine
attachment/message body and replace with text.
The default setting is: Quarantine entire message and replace with text.
5 In the Replacement text box, type your customized text.
The default text is: Symantec Mail Security replaced %attachment% with this text message.
The original attachment content type was not allowed and was %action%.
6 Check Add X-header(s) to add one or more X-headers to messages that trigger the
violation, and then do any of the following:
Modify an existing rule In the content area, double-click the rule that you want to edit.
4 On the Actions tab, in the When a violation occurs box, use the drop-down menu to
select Add tag to beginning of subject line.
The default setting is: Quarantine entire message and replace with text.
This rule action is not available if you apply the rule to the internal messages (store).
5 In the Subject line tag box, type the customized text that you want to prepend to the
subject line.
The default text is: Content Violation:
6 Check Add X-header(s) to add one or more X-headers to messages that trigger the
violation, and then do any of the following:
Filtering content 140
About creating the filtering rules
Modify an existing rule In the content area, double-click the rule that you want to edit.
4 On the Actions tab, in the When a violation occurs box, use the drop-down menu to
select Log only.
See “About logging events” on page 204.
The default setting is: Quarantine entire message and replace with text.
5 Check Add X-header(s) to add one or more X-headers to messages that trigger the
violation, and then do any of the following:
Name Lets you provide a unique name for the content filtering rule that you can
easily identify in the list of rules and in reports in the event log.
Filtering content 143
About creating the filtering rules
Description Lets you provide a unique description for the content filtering rule. The
description should provide enough detail to remind you what the rule is
configured to detect.
Message part to scan Lets you specify the part of the email message that you want Mail Security
to scan for violations.
Use the Message part to scan drop-down list to choose from the following
message parts:
■ Message Body
■ Subject
■ Sender
■ Attachment Name
■ Attachment Content
■ Any Part
When the message part to scan is Attachment Name, Mail Security scans
the attachment name and all the file names inside the container. You can
bypass the scanning of the container files. Select the Bypass scanning
of container file(s) box, and Mail Security will not evaluate the file names
that are inside a container file. For example, the compressed files in a
.zip file.
See “What you can do with the filtering rules” on page 147.
Apply rule to Lets you specify the messages to which you want the rule to apply. You
can choose to apply the rule to any combination of inbound, outbound,
or internal messages. You must select at least one of these options.
Match type Lets you determine how words and phrases in the Content list and Unless
list are interpreted.
Note: The content filtering rule Match type element does not determine
how the match lists that you use in the Content list and Unless list are
interpreted. A match list can have a different match type than the content
filtering rule.
■ Literal string: Matches the exact text in the Content and Unless lists
■ Regular expression: Matches the patterns of text using symbols and
syntactic elements
See “About regular expressions” on page 161.
■ Wild cards: Specifies the file names using wild card-style expressions
See “About DOS wildcard style expressions” on page 160.
■ Whole term: Applies the rule only if the exact term in the Content list
and Unless list or match list is found.
■ Case: Applies the rule only if the exact term is in the same case as in
the Content list and Unless list or in the match list. For example, if
you type ACME in the Content list, a message that contains the word
Acme does not trigger a violation.
Content Pane
Contains Lets you specify the Contains condition for a content filtering rule.
■ Contains: The message part to scan contains the terms in the Content
list.
■ Does not contain: The message part to scan does not contain the
terms in the Content list.
■ Equals: The message part to scan equals the terms in the Content
list.
■ Does not equal: The message part to scan does not equal the terms
in the Content list.
The Equals and Does not equal options only apply to the Subject, Sender,
and Attachment Name message parts.
Filtering content 145
About creating the filtering rules
Add match list Lets you specify a match list to use in your content filtering rule. You can
also create a new match list or edit an existing match list.
Match any term Lets you evaluate the specified message part for any term that is contained
in the Content list.
For example, assume that the Content list contains the terms: free,
confidential, and money. If Mail Security detects any one of these terms
in the specified message part, it triggers a violation.
Match all terms Lets you evaluate the specified message part for all of the terms that are
contained in the Content list.
The Match all terms option is only available to use with the terms in the
Content list.
For example, assume that the Content list contains the terms: free,
confidential, and money. Mail Security must detect all of these terms in
the specified message part to trigger a violation.
The Match all terms option is not available when the message part to
scan is Any Part.
Template Lets you add a template to your content filtering rule. You can edit an
existing template but cannot create a new template or delete an existing
one. You can add a single template to a content filtering rule.
Content list Lets you specify the words or phrases for which you want to evaluate the
specified message parts.
The format of the terms that you type in the Content list should mirror
that of the match type that you select. For example, if you select literal
string from the match type list, format your Content list entries as literal
strings.
Filtering content 146
About creating the filtering rules
Attachment size is Lets you specify Attachment size is as a condition of the content filtering
rule. The Attachment size is option can be applied to all message parts
to scan, except message body. You can also use Attachment size is by
itself if you want Mail Security to detect attachments of a certain size.
When you select the sender or subject message parts and the Match
any term or Match all terms conditions, the rule action is applied to the
message or the attachment based on the violation that is detected.
For example, assume that you have specified Sender, chosen the Match
any term condition, and specified the Attachment size is as = 2MB.
Since Mail Security scans messages in parts, if there is a Sender match,
dispositions are applied to the message body and the attachment. If the
attachment size is the only match, the disposition only applies to the
attachment.
Assume for the same example that you change the condition to Match
all terms. Mail Security applies a disposition to the attachment only if it
detects all of the terms in the Content list AND the specified attachment
size.
Unless Pane
Contains Lets you specify the Contains condition for a content filtering rule.
■ Contains: The message part to scan contains the terms in the Unless
list.
■ Does not contain: The message part to scan does not contain the
terms in the Unless list.
■ Equals: The message part to scan equals the terms in the Unless list.
■ Does not equal: The message part to scan does not equal the terms
in the Unless list.
The Equals and Does not equal options apply only to the Subject,
Sender, and Attachment Name message parts.
Add match list Lets you specify a match list to use in your content filtering rule Unless
condition. You can also create a new match list or edit an existing match
list.
Unless list Lets you create exceptions to content filtering rules. You can add words
and phrases to the Unless list which Mail Security evaluates as exceptions
to the content filtering rule.
All entries in the Unless list are automatically designated with the Match
any term (OR condition) option.
The format of the terms that you type in the Unless list should mirror that
of the match type that you select. For example, if you select Literal string
from the Match Type menu, you should format your Unless list entries as
literal strings.
Or attachment size Lets you specify Attachment size is as a condition of the content filtering
rule. The Attachment size is option can be applied to all message parts
to scan, except message body. You can also use Attachment size is by
itself if you want Mail Security to detect attachments of a certain size.
When you select the sender or subject message parts, the rule action is
applied to the message or the attachment based on the violation that is
detected. (All Unless conditions are applied as OR conditions between
the message part and the attachment.) And the Match any term condition
always applies to all Unless conditions.
For example, assume that you have specified Sender and specified the
Attachment size is as = 2MB. Since Mail Security scans messages in
parts, if there is a Sender match, dispositions are applied to the message
body and the attachment because "Match any term" makes this rule an
OR condition. However, if the attachment size is the only match, the
disposition only applies to the attachment.
Note: A single message can be considered both inbound and outbound. In this case, both
inbound and outbound rules are applied to the message.
Note: This feature is not available for the Edge Server role.
For example, you create a filtering rule that applies to the Active Directory group Executives
and deploy your changes. Then you add a user to the Executives group. After you deploy your
changes, you must update the Active Directory group cache so that the rule applies to the user
that you added to the group.
You must have access to Active Directory or be logged onto a client in the Active Directory
domain to update the Active Directory group cache.
To refresh the Active Directory group cache
1 In the console on the primary navigation bar, click Policies.
2 In the sidebar under Content Enforcement, click Content Filtering Rules/File Type
Filtering Rules.
3 In the sidebar under Tasks, click Update Active Directory groups cache now.
4 In the Operation Status window, click Close when the operation is complete.
See “What you can do with the filtering rules” on page 147.
You can configure Mail Security to match words and phrases that are in a match list against
the names of files. Names of both non-container files (individual files without embedded files)
and container files (files with embedded files) are examined.
The prohibited file is blocked if Mail Security detects a match. The entire container file is blocked
if the prohibited file is within a container file.
For example, if an incoming .zip file named sample.zip contains three executable files (a.exe,
b.doc, and c.bat), sample.zip is blocked if any of the following occurs:
■ The match list contains one of the literal strings: sample.zip, a.exe, b.doc, or c.bat
■ The match list contains one of the DOS wildcard expressions: *.zip, *.exe, *.doc, or *.bat
■ The match list contains one of the regular expressions: sample\.\w{3}, a\.\w{3}, b\.\w{3}, or
c\.\w{3}
See “About match lists” on page 155.
To block attachments by file name, do the following:
■ Enable the File Name Rule.
■ Select the match list that contains the file name attachments that you want detected. You
can create or modify match lists when you modify the File Name Rule.
You can only select one match list.
■ Specify the action to take if a violation is detected, who to notify of the violation, and the
notification message text.
To enable the File Name Rule
1 In the console, on the primary navigation bar, click Policies.
2 In the sidebar, under Content Enforcement, click File Filtering Rules.
3 In the content area, in the File Filtering Rules table, on the File Name Rule row, click the
box under the Status column, and then click Enabled from the drop-down menu.
This rule is disabled by default.
To bypass scanning of container files
1 In the console, on the primary navigation bar, click Policies.
2 In the sidebar, under Content Enforcement, click File Filtering Rules.
3 In the content area, in the File Name Rule, select the Bypass scanning of container
file(s) check box to bypass contents of container files without scanning. However, other
filtering rules and AV scanning are applicable to the contents of the container.
This option is not selected by default.
Filtering content 153
About enforcing email attachment policies
7 Under Filter, type the file attachment names, one per line, that you want to add to the
match list.
8 Click OK.
9 In the Select a match list window, click Select to select the match list that you just created
or modified.
To specify the action to take if a file filtering rule violation is detected
1 In the console, on the primary navigation bar, click Policies.
2 In the sidebar under Content Enforcement, click File Filtering Rules.
3 In the File Filtering Rules table, select the rule that you want to modify.
4 In the File Filtering Rules preview pane, in the Action to take list, use the drop-down menu
to select one of the following:
■ Delete entire message
■ Delete attachment/message body and replace with text
Filtering content 154
About enforcing email attachment policies
Note: The preconfigured match lists are designed to be used with content filtering rules.
However, you can modify and use the preconfigured match lists with the File Name Rule file
filtering rule.
Table 8-11 lists the preconfigured match lists that Mail Security provides.
Outbreak Triggered When you enable outbreak management, Mail Security adds the names
Attachment Names of outbreak-triggered attachments to the Outbreak Triggered Attachment
Names match list.
You can use this match list with the Quarantine Triggered Attachment
Names content filtering rule. This rule lets you automatically quarantine
files with the attachment names that are found in the Outbreak Triggered
Attachment Names match list.
You can edit the rule description and the text in the Filter box. Leave the
match type as wild cards.
Note: The preconfigured match lists are designed to be used with content
filtering rules. However, you can modify and use the preconfigured match
lists with the File Name Rule file filtering rule.
Outbreak Triggered Subject When you enable outbreak management, Mail Security adds the names
Lines of outbreak-triggered subject lines to the Outbreak Triggered Subject
Lines match list.
You can use this match list with the Quarantine Triggered Subjects content
filtering rule. This rule lets you automatically quarantine files with the
subject line text that is found in the Outbreak Triggered Subject Lines
match list.
You can edit the rule description and the text in the Filter box. Leave the
match type as literal.
Note: The preconfigured match lists are designed to use with content
filtering rules. However, you can modify and use the preconfigured match
lists with the File Name Rule file filtering rule.
Sample Attachment Name This match list contains a list of attachment file names or extensions that
might contain malicious code.
You can edit the rule description and add or remove file extensions in the
Filter box. Leave the match type as wild cards.
Sample Executable File This list contains the file names or extensions that can potentially execute
Names malicious code.
Sample Message Body This list contains keywords and phrases typically found in the bodies of
Words spam email messages.
You can edit the rule description, add, or remove keywords and phrases
in the Filter box, and modify the match type. The default match type is
literal.
Sample Multimedia File This list contains file names or extensions of multimedia files.
Names
Leave the match type as wild cards.
Sample Subject Line This list contains keywords and phrases typically found in spam email
message subject lines.
You can edit the rule description, add, or remove keywords and phrases
in the Filter box, and modify the match type. The default match type is
literal.
Filtering content 157
About match lists
Canadian Social Insurance This match list contains the keywords that indicate a Canadian social
Keywords insurance number.
The default match type is literal. You can add or remove keywords in the
Filter box.
Canadian Social Insurance This match list contains a pattern that indicates a Canadian social
Numbers insurance number. The default match type is regular expression.
Credit Card Number This match list contains the keywords that are associated with a credit
Keywords card number.
The default match type is literal. You can add or remove keywords in the
Filter box.
Credit Card Number Pattern This match list contains a pattern that indicates a credit card number. The
default match type is regular expression.
M and A Project Code Names This match list contains the keywords that can help you identify information
or communication about upcoming merger and acquisition activity. For
example, MergerProjectName.
The default match type is literal. You can add or remove keywords in the
Filter box.
Sensitive Project Code This match list contains sensitive project code names.
Names
The default match type is literal. You can add or remove keywords in the
Filter box.
SWIFT Code Keywords This match list contains the keywords that are associated with Society
for Worldwide Interbank Financial Telecommunication (SWIFT) codes.
The default match type is literal. You can add or remove keywords in the
Filter box.
SWIFT Code Regex This match list contains a pattern that indicates a SWIFT Code. The
default match type is regular expression.
UK Drivers License Numbers This match list contains a pattern that indicates a UK drivers license
Pattern1 number. The default match type is regular expression.
UK Drivers License Numbers This match list contains another pattern that indicates a UK drivers license
Pattern2 number. The default match type is regular expression.
Filtering content 158
About match lists
UK Electoral Roll Numbers This match list contains the keywords that indicate a UK electoral roll
Keywords number.
The default match type is literal. You can add or remove keywords in the
Filter box.
UK Electoral Roll Numbers This match list contains a pattern that indicates a UK electoral roll number.
Pattern The default match type is regular expression.
UK Keywords This match list contains the keywords that indicate UK-related information.
The default match type is literal. You can add or remove keywords in the
Filter box.
UK NIN Keywords This match list contains the keywords that indicate a UK national insurance
number.
The default match type is wild cards. You can add or remove keywords
in the Filter box.
UK NIN Pattern This match list contains a pattern that indicates a UK national insurance
number. The default match type is regular expression.
UK Passport Keywords This match list contains the keywords that indicate a UK passport number.
The default match type is wild cards. You can add or remove keywords
in the Filter box.
UK Passport Pattern (New) This match list contains a pattern that indicates a UK passport number.
The default match type is regular expression.
UK Passport Pattern (Old) This match list contains another pattern that indicates a UK passport
number. The default match type is regular expression.
UK Tax ID Number Keywords This match list contains the keywords that indicate a UK tax ID number.
The default match type is literal. You can add or remove keywords in the
Filter box.
UK Tax ID Number Pattern This match list contains another pattern that indicates a UK tax ID number.
The default match type is regular expression.
US ITIN Keywords This match list contains the keywords that indicate a US individual
taxpayer identification number (ITIN).
The default match type is literal. You can add or remove keywords in the
Filter box.
Filtering content 159
About match lists
US ITIN Pattern This match list contains a pattern that indicates a US individual taxpayer
identification number. The default match type is regular expression.
IP Address Pattern This match list contains a pattern that indicates an IP address. The default
match type is regular expression.
US SSN Keywords This match list contains the keywords that indicate a US individual social
security number (SSN).
The default match type is literal. You can add or remove keywords in the
Filter box.
US SSN Patterns This match list contains another pattern that indicates a US individual
social security number. The default match type is regular expression.
Create a match list In the sidebar under Tasks, click New match list.
Edit an existing match list In the content area under Match Lists, select the list that you want to
edit, and then in the sidebar under Tasks, click Edit match list.
4 In the New Match List window, in the Title box, type a name for the match list.
You can only configure the title when you create a new match list.
5 In the Description box, type a description for the match list.
Filtering content 160
About match lists
7 In the Filter box, type a literal string, regular expression, or DOS wildcard-style expression.
Enter one expression per line. You can link several regular expressions to form a larger
one to match certain content in email.
8 Click OK.
9 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
Regular expressions
You can combine alphanumeric characters and metacharacters to create match patterns for
rules that will block messages and attachments specifically designed to bypass file filtering
rules.
Table 8-13 lists examples of regular expressions that show how pattern matching is
accomplished with the use of metacharacters and alphanumeric characters.
abc Matches any line of text that contains the three letters abc in that order.
Your results may differ depending on the comparison that you use to
create the rule. For example, if you build a rule to match the word Free
and use the Contains condition, then the filtering engine detects all words
that contain the word Free instead of an exact match (for example,
Freedom). However, if you use the Equal condition, then the filtering
engine detects only exact matches of the word Free with no other
surrounding text. If you use the Contains condition with Whole words
only, then the filtering engine detects Free as a stand-alone word, even
if there are other words present in the text that is being searched.
a.c Matches any string that begins with the letter a, followed by any character,
followed by the letter c.
^.$ Matches any line that contains exactly one character. (The newline
character is not counted.)
a(b*|c*)d Matches any string beginning with the letter a, followed by either zero or
more instances of the letter b, or zero or more instances of the letter c,
followed by the letter d.
.+\....\.... Matches any file name that has two, three-letter extensions (for example,
Filename.gif.exe).
About metacharacters
Table 8-14 lists the metacharacters that you can use in regular expressions to build filtering
rules.
Some characters are not considered special unless you use them in combination with other
characters.
Note: You can use metacharacters in regular expressions to search for both single-byte and
multi-byte character patterns.
Metacharacter Description
$ Dollar sign: Represents the end of the input line. For example, A$ is a
regular expression that matches the letter A at the end of a line. The $
character is only special character at the end of a regular expression or
before the ) or | characters.
+ Plus sign: Matches one or more instances of the string to the immediate
left of the plus sign.
| Pipe: Matches either expression on either side of the pipe. For example,
exe|com|zip matches exe, com, or zip.
Filtering content 164
About content filtering policy templates
Metacharacter Description
If the initial character in the bracket is a circumflex (^), then the expression
matches any character or collating element except those inside the bracket
expression.
If the first character after any potential circumflex (^) is a dash (-) or a
closing bracket (]), then that character matches only a literal dash or
closing bracket.
(string) \(string\) Parentheses: Groups parts of regular expressions, which gives the string
inside the parentheses precedence over the rest.
The order in which metacharacters are evaluated, from highest to lowest precedence, is as
follows:
Escape \
List []
Precedence override ( )
Single character *
Start with ^
Alternation |
You can edit an existing template but cannot create a new template or delete an existing one.
See “Editing a content filtering policy template” on page 168.
Table 8-15 lists the preconfigured templates that Mail Security provides.
Canadian Social Insurance Number You can use this template in a rule to detect the
patterns that indicate Canadian Social Insurance
Numbers that are at a risk of exposure.
This template is a combination of the following
match lists:
Credit Card Numbers You can use this template in a rule to detect the
patterns that indicate credit card numbers at a risk
of exposure.
This template is a combination of the following
match lists:
Individual Taxpayer Identification Number (ITIN) An Individual Taxpayer Identification Number (ITIN)
is a tax processing number issued by the US
Internal Revenue Service (IRS). The IRS issues
ITINs to track individuals who are not eligible to
obtain a social security number (SSN).
■ US ITIN Keywords
■ US ITIN Pattern
Mergers and Acquisitions Data You can use this template in a rule to detect
information and communication about upcoming
merger and acquisition activity.
Project Data You can use this template in a rule to identify the
sensitive project code names that are at a risk of
exposure.
UK Drivers License Numbers This policy template helps you detect UK drivers
license numbers by using the official specification
of the UK Government Standards of the UK Cabinet
Office.
This template is a combination of the following
match lists:
■ UK Keywords
■ UK Drivers License Numbers Pattern1
■ UK Drivers License Numbers Pattern2
■ UK Passport Keywords
■ UK Passport Pattern (New)
■ UK Passport Pattern (Old)
UK National Insurance Numbers UK Department for Work and Pensions and Inland
Revenue (DWP/IR) issues the national insurance
numbers to individuals to administer the national
insurance system.
■ UK NIN Keywords
■ UK NIN Pattern
UK Electoral Roll Numbers You can use this template in a rule to detect UK
electoral roll numbers.
This template is a combination of the following
match lists:
■ UK Keywords
■ UK Electoral Roll Numbers Pattern
■ UK Electoral Roll Numbers Keywords
Filtering content 168
About content filtering policy templates
■ US SSN Keywords
■ US SSN Patterns
5 In the Select a template window, select the template that you want to edit and click Edit
template.
Alternatively you can double-click the template that you want to edit.
6 Edit the description for the template.
7 Edit the frequency that is specified for match lists in the template.
8 Uncheck the box beside the match list name to disable it.
If you disable the parent condition, the child conditions are no longer applicable.
9 Click OK and then click Close.
10 Click OK.
11 On the toolbar, click Deploy changes to apply your changes.
Chapter 9
Scanning your Exchange
servers for threats and
violations
This chapter includes the following topics:
■ Configuring advanced scanning options for Auto-Protect and background (Exchange Server
2010 only) scanning
Auto-Protect When Auto-Protect is enabled, it runs constantly and detects threats and violations
scans in real-time to everything that is on or passes through your Exchange server.
Auto-Protect scanning applies to all policies, except for antispam detection. Antispam
scanning occurs continuously, in real-time as email traffic flows through your Exchange
server.
Manual scans Manual scans run on-demand and scan public folders and mailboxes. All policies
apply to manual scans, except antispam. Antispam scanning continuously occurs in
real-time as email traffic flows through your Exchange server.
You can specify which file folders and mailboxes to scan during a manual scan. You
can also specify the filtering rules that you want to enable for the manual scan.
Scheduled scans Scheduled scans run unattended, usually at off-peak periods. All policies apply to
scheduled scans, except antispam. Antispam scanning continuously occurs in real-time
as email traffic flows through your Exchange server.
You can specify which file folders and mailboxes to scan during a scheduled scan.
You can also specify the filtering rules that you want to enable for the scheduled scan.
Background Background scanning is a scan of the message store on Exchange Server 2010
scanning Mailbox role. You can perform scans of the message store during off-peak periods
to enhance performance.
See “Configuring background scanning for Exchange Server 2010 mailbox role”
on page 177.
When Mail Security detects a security risk or a violation during a scan, it takes the action that
you specify for that policy. For example, when a threat is detected, Mail Security takes the
action that you specify in the Antivirus Settings policy.
Mail Security does not support the Quarantine entire message and replace with text action
for Auto-Protect, Manual, Scheduled, or Background scanning. If a violation is detected during
these scans, Mail Security quarantines the message by parts although you specify the action
as Quarantine entire message and replace with text for a policy.
Note: Ensure that each Journal database name is entered on a new line.
3 Set the registry ReloadNow to 1 and wait for this value to set back to 0 for changes to
take effect.
This registry is located at
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSExchangeIS\VirusScan.
4 Whenever the file vsapi.xmb is updated further with new database entries or the database
entries are removed, perform step 3 for the changes to take effect.
See “About the types of scanning that you can perform” on page 170.
Note: Messages that have been stamped are not rescanned for file filtering and content filtering
rules.
The message is disposed of based on the settings that you configure when Mail Security
detects a violation. No stamp is applied to the message, even if the message is repaired. If
the message is routed to another server role, Mail Security detects that there is no stamp and
rescans the message.
Scanning your Exchange servers for threats and violations 173
How Mail Security scans messages
Figure 9-1 shows how an incoming email message is scanned as it enters your Exchange
Server 2010 environment.
Internet
Edge
Transport No virus or violation is detected A virus or violation is detected
server
Hub
Transport Hub No virus or violation is A virus or violation is
definitions detected
server are the
Hub detected
definitions
same as or
are more The message is disposed of
older than The message is stamped
current (no stamp is applied)
those used
Quarantine
at the Edge
Repair Delete entire
Delete attachment/ message
message body
Log only
Figure 9-2 shows how an outgoing email message is scanned as it leaves your Exchange
Server 2010 environment.
Scanning your Exchange servers for threats and violations 174
How Mail Security scans messages
Edge Edge
No virus or violation is A virus or violation is
Edge
Transport detected detected
definitions definitions
are the are more
server same or current
older than
The message is disposed of
the Hub
Quarantine
definitions
Repair Delete entire
Delete attachment/ message
message body
Log only
Internet
Mailbox
server No virus or
Mailbox Mailbox A virus or violation is
definitions definitions violation is detected
are the are more detected
same as or current
older than
those used The message is disposed of
in stamp
The message is
delivered to the The message is Delete entire
recipient’s mailbox delivered to the message
The message is recipient’s mailbox
delivered to the
recipient’s mailbox
Mail Security scans email messages at the Mailbox only when the following occurs:
■ An incoming email message does not have a stamp that indicates that it has already been
scanned.
■ The Mailbox server has more current definitions than those used to scan the message at
the Hub Transport or Edge Transport servers.
■ You schedule background scanning.
See “Configuring background scanning for Exchange Server 2010 mailbox role” on page 177.
■ You disable the "Exclude outbound scanning on mailbox server" setting.
This option is enabled by default.
See “Configuring advanced scanning options for Auto-Protect and background (Exchange
Server 2010 only) scanning” on page 180.
■ You send an Outlook Web Access message.
Note: Install and configure Mail Security on all of the server roles in your Exchange environment
using the same parameters. This ensures optimum scanning performance and violation and
threat detection.
See “Before you install” on page 21.
See “How Mail Security scans messages ” on page 172.
See “Configuring advanced scanning options for Auto-Protect and background (Exchange
Server 2010 only) scanning” on page 180.
To configure Auto-Protect scanning
1 In the console on the primary navigation bar, click Scans.
2 In the sidebar under Views, click Auto-Protect.
3 In the content area, under Auto-Protect Settings, check Enable Auto-protect.
4 On the toolbar, click Deploy changes to apply your changes.
Note: If the Auto-Protect status on the SMSMSE UI is seen as “Started (VSAPI is still
down)”, the transport scan functionality works seamlessly but the On Access scan and
Background scanning functionality may not function.
Note: Mail Security enables the Exchange VSAPI background scanning feature. Based on the
load and Microsoft Exchange's algorithms, Microsoft might interrupt the background scanning
process.
See “Configuring advanced scanning options for Auto-Protect and background (Exchange
Server 2010 only) scanning” on page 180.
See “About enhancing performance when you update definitions on Exchange 2010 mailbox
server” on page 236.
Scanning your Exchange servers for threats and violations 178
Configuring background scanning for Exchange Server 2010 mailbox role
Scan all messages in the store Scans all messages in the store.
Scan all messages from the past number of days Scans all messages from the past number of
days.
Scan all messages from the past number of hours Scans all messages from the past number of
hours.
Scan all messages from the start date If you select this option, do the following:
Background scan log status for Exchange Server 2010 mailbox role
Mail Security version 6.5.5 provides improved logs with status of the background scan. An
event is generated when background scan is either halted or is completed. This event also
provides the count of the number of items that were scanned so far during the background
scan. Another event is generated when background scan is completed. This event provides
the total time that is taken for completing the scan. See “Configuring background scanning for
Exchange Server 2010 mailbox role” on page 177.
Scan message bodies (applies to AV only) Detects the risks in message bodies.
Exclude outbound scanning on mailbox server Prevents the scanning of outbound messages
so that they can be scanned at the Hub
Transport.
On virus definition update, force rescan before Performs a scan each time definitions are
allowing access to Information Store updated and a user attempts to access a
message.
Note: Ensure that the public folders that you want to scan have owners assigned to them.
Mail Security does not perform a manual scan on the public folders that do not have owners
assigned to them.
Note: Before you run the manual scan, ensure that you create a custom throttling policy
and assign it to the Symantec Mail Security for Microsoft Exchange service account user.
See “Creating and assigning a custom throttling policy to the Mail Security service account
user” on page 73.
See “Performing a manual scan” on page 186.
■ View the manual scan results.
See “Viewing manual scan results” on page 186.
You can stop running a manual scan at any time.
Scan Options You can choose from the following basic scanning options:
■ Stop scanning after ___ minutes. Next scan will restart where it stopped
Select this option if you want to specify a duration for the scan. Type the number
of minutes you want the scan to run in the box next to the option.
■ Scan only the items modified since last rescan
Select this option to scan only the items that have been modified since the last
scan. Scanning only the items that have been modified decreases overall scanning
time.
■ Scan message bodies (Applies to AV only)
Select this option to scan only the message bodies. Scanning message bodies
increases the overall scanning time.
Scan location You can specify the mailboxes, archive mailboxes, and public folders that you want
included or excluded from the scan.
■ Exclude archive: You can specify to exclude archive mailbox scanning, and scan
mailboxes only.
■ Archive with mailboxes: You can specify this option to scan both mailboxes and its
associated archive mailbox.
■ Archive Only: You can specify to scan only archive mailboxes as per selection of
mailboxes in the list.
Note: When you select All mailboxes or Specific Mailboxes, the associated archive
mailbox is selected or excluded based on the options selected: Exclude archive, Archive
with mailboxes, Archive only.
The Scan location option is available if you are in a server view only.
Content filtering You can enable or disable content filtering scanning. If content filtering is enabled,
rules enable the rules that you want to apply to the scan.
File type filtering You can enable or disable file type filtering. If file type filtering is enabled, enable the
rules rules that you want to apply to the scan.
Scan all messages from the past number of days Scans all messages from the past number of
days.
Scan all messages from the past number of hours Scans all messages from the past number of
hours.
Scan all messages from the start date If you select this option, do the following:
6 Click Next.
Scanning your Exchange servers for threats and violations 185
About manual scans
Specific mailboxes Scans only the mailboxes that you specify in the list box.
Specific public folders Scans only the public folders that you specify in the list box.
3 Click Next.
To disable content and file type filtering
1 Uncheck Enable content filtering/Enable file type filtering.
This option is enabled by default.
2 Click Finish.
3 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
To enable content and file type filtering
1 Check Enable content filtering/Enable file type filtering.
This option is enabled by default.
2 Do any of the following:
■ To add a new filtering rule, on the toolbar, click Add new.
■ To modify an existing filtering rule, on the toolbar, click Edit rule.
■ To delete an existing filtering rule, click Delete rule.
See “About creating the filtering rules” on page 128.
Scanning your Exchange servers for threats and violations 186
About manual scans
3 Click the box under the Enable column and select Enable to enable the rules that you
want to apply to the scan.
4 Click Finish.
5 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
Note: From the Mail Security console, you cannot stop scheduled scans once they are started.
Create a new scan In the sidebar under Tasks, click New scan.
Modify an existing scan In the content area, under the Name column, double-click the scan that
you want to modify.
4 In the Scan name box, type the name for the scan.
Mail Security lets you enter a maximum of 128 SBCS (single-byte character set) characters
(64 double-byte character set characters) in the Scan name box.
This option is available only when you create a new scheduled scan.
Scanning your Exchange servers for threats and violations 189
About scheduling a scan
5 Under Scan Options, check Stop after scanning ___ minutes to limit the amount of
time for the scan, and then type the maximum scanning time in minutes.
The default value is 120 minutes.
If Mail Security reaches this limit, it stops scanning. The next scheduled scan starts where
the previous scan stopped.
6 Check Only scan items modified since last scan to exclude the items that have not
changed since the last scan.
7 Check Scan message bodies to scan message bodies.
8 Under Choose messages to scan, select one of the following options:
Scan all messages in the store. Scans all messages in the store.
Scan all messages from the past number of days. Scans all messages from the past number of
days.
Scan all messages from the past number of Scans all messages from the past number of
hours. hours.
Scan all messages from the start date. If you select this option, do the following:
9 Click Next.
To select what to scan
1 In second panel of the schedule scan wizard, under Scan Location, to specify mailboxes
to scan, select one of the following:
Scanning your Exchange servers for threats and violations 190
About scheduling a scan
Specific mailboxes Scans only the mailboxes that you specify in the list box.
Note: When you select All mailboxes or Specific Mailboxes, the associated
archive mailbox is selected or excluded based on the options selected: Exclude
archive, Archive with mailboxes, Archive only.
Specific public folders Scans only the public folders that you specify in the list box.
3 Click Next.
To scan for the filtering rules
1 In the third panel of the scheduled scan wizard, click Enable content filtering to enable
content filtering rule scanning for the scheduled scan.
2 In the next pane, click Enable file type filtering rules to enable file type filtering rule
scanning for the scheduled scan.
3 Do any of the following:
■ To add a new filtering rule, on the toolbar, click New rule.
■ To modify an existing filtering rule, on the toolbar, click Edit rule.
■ To delete an existing filtering rule, click Delete rule.
Scanning your Exchange servers for threats and violations 191
About scheduling a scan
4 Click the box under the Enable column and select Enable to enable the rules that you
want to apply to the scan.
5 Click Next.
To specify the scanning schedule
1 In the final panel of the scheduled scan wizard, in the Time of day to run box, select the
time of day that you want Mail Security to perform the scan (in 24-hour format).
2 Under Days to run on, check the days of the week that you want the scan to run.
3 Under Dates of the month to run on, select any of the following:
End of the month The scan runs on the 28th day of each month.
4 Check Run scan at service start to perform a scan when the service starts.
5 Check Run scan when virus definitions change to perform a scan when new definitions
are received.
Enabling Run scan when virus definitions change in conjunction with Rapid release
definitions can significantly affect performance. Leave this feature disabled if you update
definitions at frequent intervals. If this option is enabled, the scheduled scan runs each
time definitions are updated. Because definitions are delivered frequently, the scan might
not complete before new definitions are available. This can affect overall scanning
performance.
See “Scheduling definition updates” on page 235.
6 Click Finish.
7 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
4 Click OK.
5 In the registry editor window, in the left pane, browse and locate the following folder:
HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\SMSMSE\7.x\Server\ScanJobs\<name
of scheduled scan>
6 In the right pane, double-click ProgressStateDword.
7 In the Value data box, type the binary value0, and then click Ok.
8 Close the registry editor window.
9 On the Windows menu, click Start > Programs > Administrative Tools > Services.
10 Restart the Symantec Mail Security for Exchange service.
See “Configuring scheduled scan options” on page 188.
Note: Email notifications are sent only to the names and addresses that can be resolved against
Active Directory. If you install Mail Security on the Edge server role, type a fully qualified email
address (for example, user@mycompany.com).
As your outbreak triggers are tested, you can fine-tune the values that you use.
Mail Security lets you manage outbreaks with the following options:
■ Enable Outbreak Management.
See “Enabling outbreak management” on page 198.
■ Specify the criteria for an outbreak.
The criteria consist of the number of times that an event must occur during a specified time
interval.
See “About the criteria that defines an outbreak” on page 195.
See “About outbreak triggers” on page 197.
See “Configuring outbreak triggers” on page 198.
■ Define the email notifications to send to the administrator when an outbreak is detected.
See “Configuring outbreak notifications” on page 200.
■ End the outbreak event after the situation is managed.
See “Clearing outbreak notifications” on page 203.
1:00 P.M.
At 1:20, checks the prior
20 minutes and detects an
1:45 1:15
outbreak. An outbreak
notification is sent.
1:30 P.M.
1:00 P.M.
At 1:22, checks the prior
20 minutes and detects an
1:45 1:15
outbreak still exists. A
subsequent notification is
sent. 1:30 P.M.
1:00 P.M.
At 1:24, checks the prior
20 minutes and detects an
outbreak still exists. A 1:45 1:15
subsequent notification is
sent. 1:30 P.M.
1:00 P.M.
At 1:26, checks the prior
20 minutes. Does not
1:45 1:15
detect outbreak
conditions. No notification
is sent. 1:30 P.M.
■ Enable the On virus definition update, force rescan before allowing access to
information store option on the Auto-Protect page.
See “Configuring advanced scanning options for Auto-Protect and background (Exchange
Server 2010 only) scanning” on page 180.
■ Start or schedule a background scan. Configure the "Scan all messages from the past
number of days" option to cover the period of the outbreak.
See “Configuring background scanning for Exchange Server 2010 mailbox role” on page 177.
You can return to your pre-outbreak configuration when the outbreak has been managed.
At least one outbreak trigger must be enabled for outbreak management to work.
See “Configuring outbreak triggers” on page 198.
■ Unrepairable viruses
■ Unscannable files
■ Filtering violations
■ Total viruses
You can enable or disable the triggers. You can also modify the number of occurrences for a
violation and the span of time in which the events must occur to constitute an outbreak. You
can specify whether to notify an administrator when an outbreak occurs.
See “Configuring outbreak notifications” on page 200.
When you enable outbreak management, you can also configure Mail Security to automatically
add the names of attachments that triggered an outbreak. The names of the attachments are
added to the Outbreak Triggered Attachment Names match list and outbreak triggered
subject text to the Outbreak Triggered Subject Lines match list. Mail Security uses these
match lists for the preconfigured content filtering rules that automatically block suspicious file
attachments or subjects. You can also use these match lists to create your own content filtering
rules.
See “What you can do with the filtering rules” on page 147.
To configure outbreak triggers
1 In the console on the primary navigation bar, click Policies.
2 In the sidebar under General, click Outbreak.
3 In the content area, in the table, select the trigger that you want to modify.
The trigger that you select is highlighted in blue.
4 In the Status column, use the drop-down menu to select Enabled or Disabled.
5 In the Occurrences column, type the number of instances that must occur to constitute
an outbreak.
The default value is 100.
6 In the Time column, type the span of time in which the instances must occur to constitute
an outbreak.
The default value is 20.
7 In the Units column, click the drop-down menu, and select one of the following:
■ Minutes
This setting is the default setting.
■ Hours
■ Days
Managing outbreaks 200
Configuring outbreak notifications
8 In the Notify Administrator column, check the box if you want to notify an administrator
of the outbreak.
See “Configuring outbreak notifications” on page 200.
9 In the Update Match List column, check the box if you want to automatically add the
attachment name or subject to the Outbreak Triggered Names match list or Outbreak
Triggered Subjects match list. The trigger must be activated.
See “About match lists” on page 155.
10 In the Rule column, click View Rule to view or modify the associated content filtering rule.
This option is available only for the Same attachment name and Same subject triggers.
Note that Mail Security disables content filtering on the server if you uncheck Enable
content filtering in the Content Enforcement Rule window.
See “What you can do with the filtering rules” on page 147.
11 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
3 In the content area, in the preview pane, under Initial Notification, in the Subject Line
box, type your customized subject line text.
The default text is as follows:
Initial notification
Same attachment name Symantec Mail Security has started noticing possible email outbreak
conditions. The “%outbreak_rule%” rule was violated %outbreak_count%
times.
Same subject Symantec Mail Security has started noticing possible email outbreak
conditions. The “%outbreak_rule%” rule was violated %outbreak_count%
times.
Filtering violations Symantec Mail Security has started noticing possible email outbreak
conditions. The “%outbreak_rule%” rule was violated %outbreak_count%
times.
Same virus Symantec Mail Security has started noticing possible conditions of outbreak
of emails with viruses. The “%outbreak_rule%” rule was violated
%outbreak_count% times.
Unrepairable viruses Symantec Mail Security has started noticing possible conditions of outbreak
of emails with viruses. The “%outbreak_rule%” rule was violated
%outbreak_count% times.
Total viruses Symantec Mail Security has started noticing possible conditions of outbreak
of emails with viruses. The “%outbreak_rule%” rule was violated
%outbreak_count% times.
Unscannable files Symantec Mail Security has started noticing possible conditions of outbreak
of emails with unscanable files. The “%outbreak_rule%” rule was violated
%outbreak_count% times.
4 In the Message Body box, type your customized message body text.
The default text is as follows:
Outbreak Trigger Information: %trigger%
Threshold is set at: %threshold%
Current count for configured time period: %count%
Server name: %server%
Outbreak triggers at: %outbreak_count% times
Managing outbreaks 202
Configuring outbreak notifications
5 Under Subsequent Notifications, in the Subject Line box, type your customized subject
line text.
The default text is as follows:
Subsequent notification
Same attachment Symantec Mail Security continues to observe possible email outbreak
name conditions. The rule “%outbreak_rule%” was violated %outbreak_count%
times.
Same subject Symantec Mail Security continues to observe possible email outbreak
conditions. The rule “%outbreak_rule%” was violated %outbreak_count%
times.
Filtering violations Symantec Mail Security continues to observe possible email outbreak
conditions. The rule “%outbreak_rule%” was violated %outbreak_count%
times.
6 In the Message Body box, type your customized message body text.
The default text is as follows:
Outbreak Trigger Information: %trigger%
Threshold is set at: %threshold%
Current count for configured time period: %count%
Server name: %server%
Outbreak triggers at: %outbreak_count% times
7 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
■ Managing reports
Windows Server events and policy violations are reported in the Windows Application
Application Event Event Log. The Mail Security console provides an event log page. This page
Log lets you view Windows Application event log entries in chronological order with
the most current event at the top. The event log page displays information,
warning, and error events.
Mail Security Reports Mail Security logs extensive report data on threats, security risks, violations,
database spam, and server information to a reports database. You can use this data to
generate summary or detailed reports based on different subsets of the data.
When you define a report, you specify a criteria. For example, the time span of
the collected data, whether to show specific violations or all violations, and the
output format of the report.
You can specify how long Mail Security maintains data in the Reports database.
You can also purge the database at any time.
See “Specifying the duration for storing data in the Reports database”
on page 207.
Microsoft Management The MMC Performance console shows system performance. You can add Mail
Console (MMC) Security performance counters to the MMC view.
Performance console
See “About logging performance counters to the MMC Performance console”
on page 208.
■ Warning
■ Information
■ Error
■ Auto-Protect
■ Content Filtering Engine
■ Content Filtering Rules
■ Encrypted
■ Error
■ Licensing
■ LiveUpdate/Rapid Release
■ Manual and Scheduled Scanning
■ Outbreak Management
■ Quarantine
■ Scanning
■ Service
■ Premium AntiSpam
■ Threat/Security Risk
■ Unscannable
■ VSAPI (for Exchange Server 2010)
Manually refresh the page if it is blank or to refresh the page to view the most recent events.
In a large group, refreshing the page might take several minutes.
To view the Mail Security event log
1 In the console on the primary navigation bar, click Monitors.
2 In the sidebar under Views, click Event Log.
3 Click the column headers to sort the list data by different criteria.
To populate and refresh the Mail Security event log
◆ Press F5.
Logging events and generating reports 207
About logging events
If you select this option, it means that there is no data available to generate
reports. The products still reports the total scans and the items that
Auto-Protect scans.
Store data for __ The data is cleared after the specified time period.
months
If you select this option, type the number of months of data to store. Only
summary spam data is stored unless you check the "Include spam data"
option.
ADMTOOLS\MOM
See the MMC documentation for more information about how to add the Mail Security
performance object.
Table 11-1 lists the Mail Security counters that are available.
Note: Mail Security lets you configure performance counters for logging. By default, this counter
is enabled. To improve a scanning performance, these performance counters for logging can
be turned off by adding the following registry key and setting its value to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\SMSMSE\7.9\Server\TurnOffPerfCounters.
Restart the Mail Security service after setting this registry key.
can create a report for an individual server. You can also create a single Summary report that
consolidates data for all the servers in a server group.
See “Configuring the initial setup of the report consolidation feature” on page 220.
Report templates let you define a subset of the raw report data that Mail Security collects for
a single server. Report templates can include different categories or combinations of
security-related statistics.
You can create different report templates to describe different subsets of the raw report data.
After you create a report template, you use it to generate reports.
Mail Security provides two preconfigured report templates that you can modify. You can also
create your own report templates. When you create or modify a report template, Mail Security
provides a wizard to guide you through the configuration process.
The types of report templates that you can create are as follows:
■ Summary
See “Creating or modifying a Summary report template” on page 211.
■ Detailed
See “Creating or modifying a Detailed report template” on page 216.
Note: Reports cannot be generated with a new or an updated report template until you deploy
your changes.
Mail Security provides two preconfigured report templates that you can modify. You can also
create your own report templates. When you create or modify a report template, Mail Security
provides a wizard to guide you through the configuration process.
The types of report templates that you can create are as follows:
■ Summary
See “Creating or modifying a Summary report template” on page 211.
■ Detailed
Logging events and generating reports 211
About report templates
Note: Mail Security supports emailing the reports that are 5 MB or smaller only. You can view
the reports that are larger than 5 MB on the Reports page. Mail Security logs the generation
of reports that are larger than 5 MB to the Windows Application event log
Logging events and generating reports 212
About report templates
Mail Security provides a wizard that helps you configure your report template.
To identify the report to be created or modified
1 Select the server or server group for which you want to generate a report.
See “Modifying or viewing server or server group settings” on page 66.
2 In the console on the primary navigation bar, click Reports.
3 In the sidebar under Views, click Report Templates.
4 Do one of the following:
Create a new executive summary report In the sidebar under Tasks, click New template.
template
Modify an existing report template. In the content pane, in the Report Templates table,
double-click the template that you want to modify.
■ Past Day
This setting is the default setting.
■ Past Week
■ Past Month
■ Past Year
■ Customized
2 If you select the Customized time range, in the customize time range boxes, click the
drop-down arrows and select the start and the end dates for the data that you want included
in your report.
To configure scheduled report generation
1 Under Report Generation Option, click Scheduled.
2 In the Generate report at list, select the time of day to generate the report.
3 Click Daily, Weekly, or Monthly.
If you select Weekly, check the day(s) of the week to generate the report.
If you select Monthly, use the drop-down menu to select the day of the month to generate
the report.
If you select Monthly, also ensure that you select a day that exists in each month.
Otherwise, a report is not generated for that month. If you select the 31st day of every
month, reports are not generated for any month that has 30 days or less. For example,
February, April, June, September, and November.
4 Click Next.
To configure the report chart options
1 Under Report Chart Options, select any of the following:
■ Total violations chart
■ Threats and security risks chart
Also select the chart granularity using the drop-down menu.
The default setting is Week.
■ Content violation chart
Also select the chart granularity using the drop-down menu.
The default setting is Week.
■ Spam pie chart
2 Click Next.
Logging events and generating reports 214
About report templates
Total items scanned Total number of the files that were processed
during the reporting period
Items that are scanned by Auto-Protect Total number of the files that were scanned
with Auto-Protect scanning during the reporting
period
Items that are scanned by background scan Total number of the files that were scanned
(applicable to Exchange 2010 mailbox server with background scanning during the reporting
only) period
Items that are scanned by Manual scan Total number of the files that were scanned
with manual scanning during the reporting
period
Items that are scanned by scheduled scan(s) Total number of the files that were scanned
with a scheduled scan during the reporting
period
Items that are scanned by antispam scan Total number of the files that were scanned
with a spam scan during the reporting period
Top threats table Table of the top threats that were detected
during the reporting period
Total security risks Number of the security risks that were detected
during the reporting period
■ Infection disposition
2 Click Next.
3 Under Executive Summary Template Options, select the data that you want to appear
in the executive summary report.
Data selections are as follows:
■ Show content violations
Total content violations Total number of the content violations that were
detected during the reporting period
Table of top content violations Table of the top content violations that were
detected during the reporting period
Total file type violations Total number of the file type violations that were
detected during the reporting period.
Total encrypted attachments blocked Total number of the encrypted attachments that
were blocked during the current reporting
period
Table of top attachments blocked Table of the top attachments that were blocked
during the reporting period
■ Spam options
You must check the "Include spam data" box on the Reports Settings page to view data
about spam in the Summary report.
See “Specifying the duration for storing data in the Reports database” on page 207.
4 Click Next.
5 Under Executive Summary Template Options, check Show server information.
6 Select the data that you do want to appear in the executive summary report.
7 Click Finish.
8 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
Note: Consider limiting the date range to less than 30 days. Generating a detailed report over
30 days might consume large amounts of computer memory. This report depends on the
number of violations that are in the report database.
Note: Mail Security supports emailing the reports that are 5 MB or smaller only. You can view
the reports that are larger than 5 MB on the Reports page. Mail Security logs the generation
of reports that are larger than 5 MB to the Windows Application event log.
Mail Security provides a wizard that helps you configure your report template.
To identify the report to be created or modified
1 Select the server or server group for which you want to generate a report.
See “Modifying or viewing server or server group settings” on page 66.
2 In the console on the primary navigation bar, click Reports.
3 In the sidebar under Views, click Report Templates.
4 Do one of the following:
Create a new Detailed report template. In the sidebar under Tasks, click New template.
Modify an existing report template. In the content pane, in the Report Templates table,
double-click the template that you want to modify.
5 Check Email report to the following recipients and type one or more addresses to
which the report should be delivered.
Separate entries with semicolons.
6 Click Next.
To specify the report time range
1 Click the drop-down arrow in the Time Range box and select one of the following:
■ Past Day
This setting is the default setting.
■ Past Week
■ Past Month
■ Past Year
■ Customized
2 If you select the Customized time range, in the customize time range boxes, click the
drop-down arrows. Select the start and the end dates for the data that you want included
in your report.
To configure on-demand report generation
1 Under Report Generation Option, click On demand.
2 Click Next.
To configure scheduled report generation
1 Under Report Generation Option, click Scheduled.
2 In the Generate report at list, select the time of day to generate the report.
3 Click Daily, Weekly, or Monthly.
If you select Weekly, check the day(s) of the week to generate the report.
If you select Monthly, use the drop-down menu to select the day of the month to generate
the report.
If you select Monthly, also ensure that you select a day that exists in each month.
Otherwise, a report is not generated for that month. If you select the 31st day of every
month, reports are not generated for any month that has 30 days or less. For example,
February, April, June, September, and November.
4 Click Next.
Logging events and generating reports 219
About report templates
To select a predefined violation filter Click the drop-down menu and select a
predefined violation filter.
To select a user-defined content filtering rule Click the drop-down menu and select User
Defined Rule.
(This option is only available if you select the
violation types “All” or “Content Enforcement.”) Click the drop-down menu in the Rule name box
and select one of the content filtering rules that
you created.
4 Select the columns that you want to appear in the detailed report.
5 Click Finish.
6 On the toolbar, click Deploy changes to apply your changes.
See “Deploying settings and changes to a server or group” on page 60.
Managing reports
The following lists the tasks that you can do to reports:
■ Configuring the initial setup of the report consolidation feature
■ Generating a consolidated report
■ Scheduling a consolidated report
■ Generating a report on demand
■ Accessing a report
■ Printing a report
■ Saving report data
■ Deleting a report
Specify the shared location to store reports Mail Security lets you specify where you want each
server to store the reports for consolidation. The
location must be the same for each server in the
group.
Grant access for the Symantec Mail Security Utility The Symantec Mail Security Utility service must be
service to access the shared storage location able to access the shared storage location.
Configure the service to run in an account that is a
member of the local system administrators and
domain users groups. The account must also have
access to the shared storage location.
scheduled reports. For on-demand reports, a single consolidated report is generated. But if a
consolidated report is scheduled, then separate reports for each and every server in the group
are generated.
See “Configuring the initial setup of the report consolidation feature” on page 220.
To generate a consolidated report
1 In the console on the primary navigation bar, click Reports.
2 In the sidebar under Views, click Report Templates.
3 In the Report Templates table, select the report that you want to generate.
4 In the sidebar under Tasks, click Generate consolidated report.
You must be in a group view to generate a consolidated report.
5 In the Operation Status window, click Close when the operation is complete.
3 Save the setting and let the Active Directory replication complete.
4 Under the Members tab of the SMSMSE Admins Properties panel, add the domain user
to the SMSMSE Admins group.
The user who schedules the consolidated report is the domain user.
Note: Repeat steps 1 through 4 for every domain where SMSMSE is installed in the forest.
SMSMSE Admins group from each domain must be changed to Universal security Group. The
user account that is used for generating the reports must be added to SMSMSE Admins group.
Logging events and generating reports 224
Managing reports
The user account or the group (SMSMSE Admins) that is used for generating reports must
have the Log on as a batch job permission on the SMSMSE console computer. To perform
this action, go to Start > Run and type secpol.msc to launch the Local Security Policy
console. Browse to Local Policies > User Rights Assignment > Log on as a batch job
properties panel, as illustrated and add the user or the group SMSMSE Admins.
■ Monthly - Select the day of the month from the Day drop-down list on which you want
to schedule generation of a consolidated a report.
5 Enter a password in the Please Enter Logged-in User Password input box.
You must provide the logged on user password to schedule the task in Task Scheduler
with the property Run whether user is logged on or not.
6 Click Ok to save the settings.
The SMSMSE report consolidation process needs to wait till the request gets routed to each
server in the group. The default wait time can be changed. For more information refer the Mail
Security Knowledge Base.
Accessing a report
You can view a report from the console or from the Mail Security Reports folder. If you view
a report from the console, you must be in a server view.
The Reports page in the console displays the following information:
Date Created Indicates the date and time that the report was generated
Logging events and generating reports 226
Managing reports
Template Name Indicates the template from which the report was generated
A generated report (scheduled or on demand) is also automatically saved in its own folder in
the Mail Security Reports folder. You can browse to the folder location and view the report file.
The file is automatically deleted from the Mail Security Reports folder when you delete a report
in the console.
See “Deleting a report” on page 228.
To access a report from the console
1 In the console on the primary navigation bar, click Reports.
2 In the sidebar under Views, click Reports.
3 In the content pane in the Reports table, do one of the following:
■ Select the report that you want to view, and in the sidebar under Tasks, click View
report if you are in a server view. Click View consolidated report if you are in a group
view.
■ Double-click the report.
3 Double-click the report folder that contains the report that you want to view.
4 Do one of the following:
For a report in .html format Double-click the file to view it. The report appears the same as if it
were accessed from the console.
For a report in .csv format Open the .csv file in a program such as Microsoft Excel to view it.
Files that are created in .csv format contain raw data and must be
viewed in a program that can interpret the data.
Printing a report
You can print a report if your printer is properly configured. Mail Security provides the features
that let you configure the page set-up and preview the report. Print reports in landscape mode
to prevent the data from being cut off at the right margin.
To print a report
1 In the console on the primary navigation bar, click Reports.
2 In the sidebar under Views, click Reports.
3 In the content pane in the Reports table, do one of the following:
■ Select the report that you want to view, and in the sidebar under Tasks, click View
report if you are in a server view. Click View consolidated report if you are in a group
view.
■ Double-click the report.
You can print the report from the Print Preview window.
5 Click OK.
Logging events and generating reports 228
Managing reports
6 Click Save.
Deleting a report
You can delete a report when it is no longer needed or after you have saved the report to a
file location. This action lets you manage the volume of reports on the Reports page.
See “Saving report data” on page 228.
When you delete a report in the console, the file is automatically deleted from the Mail Security
Reports folder.
See “Accessing a report” on page 225.
To delete a report
1 In the console on the primary navigation bar, click Reports.
2 In the sidebar under Views, click Reports.
Logging events and generating reports 229
Managing reports
3 In the content pane in the Reports table, select the report that you want to delete.
4 In the sidebar under Tasks, click Delete report if you are in a server view or Delete
consolidated report if you are in a group view.
Resetting statistics
You can reset statistics for reporting purposes. Resetting statistics also resets the Activity
Summary information on the Home page.
To reset statistics
1 In the console on the primary navigation bar, click Reports.
2 In the sidebar under Views, click Report Settings.
3 Under Tasks, select one of the following:
■ Reset database statistics
Purges all data from the Reports database.
See “Purging the Reports database” on page 208.
■ Reset Home page statistics
Resets the Home page statistics for Recent Activity, Total Violations, and Activity
Summary data.
■ Reset all statistics
Resets the Home page statistics and database statistics
■ Updating definitions
■ About enhancing performance when you update definitions on Exchange 2010 mailbox
server
you update definitions through Symantec Endpoint Protection or Symantec AntiVirus Corporate
Edition.
The version support status information is stored, and the console applies the information to
all the servers that the console manages. You only need to update the version support status
in any view. The version support information is automatically updated for all of the servers that
are managed in the server group. The version support information appears on the console for
all of the servers in the group. The information does not appear on the console for the individual
server
To monitor your version support status in a server view
◆ In the console on the primary navigation bar, click Home.
The version status information appears in the Status pane.
To monitor your version support status in a group view
1 In the console on the primary navigation bar, click Home.
2 In the Status pane, in the Server list, select the server for which you want to view version
status information.
The version status information appears below the server list.
To manually update the version status information
1 In the console on the primary navigation bar, click Home.
2 In the Status pane, click Refresh Version Details...
3 In the LiveUpdate dialog box, click Next.
This LiveUpdate session only searches for updates to your product. It does not search
for or download updates to your definitions.
See “About keeping your server protected” on page 231.
4 In the LiveUpdate dialog box, click Finish when LiveUpdate is complete.
To refresh the version status information on the Home page
1 In the console on the primary navigation bar, click Home.
2 Press F5.
organization's Exchange mail server against infections and the downtime that is associated
with an outbreak.
Mail Security lets you update your protection from threats and security risks using the following
tools:
LiveUpdate LiveUpdate downloads and installs available definitions from the Symantec LiveUpdate
server. LiveUpdate certified definitions undergo stringent testing and are updated daily.
LiveUpdate is enabled by default with a recommended daily schedule. However, you can
modify the schedule.
Rapid Rapid Release definitions provide the fastest response to emerging threats and are updated
Release approximately every hour. HTTP delivers the Rapid Release definitions and provides reliable
first-line protection.
Rapid Release definitions are created when a new threat is discovered. Rapid Release
definitions undergo quality assurance testing by Symantec Security Response. Rapid
Release definitions do not undergo the intense testing that is required for a LiveUpdate
release. Symantec updates Rapid Release definitions as needed to respond to high-level
outbreaks and might be made available before the LiveUpdate definitions quality assurance
process is complete. Rapid Release definitions provide a quick response to new threats
and security risks and can be augmented later on by more robust detection capabilities in
certified definitions.
Both methods let you update definitions on demand and automatically, based on the schedule
that you specify. You can run Rapid Release definition updates instead of or in addition to
LiveUpdate updates. For example, you can schedule daily LiveUpdate and then manually run
Rapid Release when a new threat emerges.
Note: Mail Security relies on the definition update process to keep the version support
information current. Configure Mail Security to perform definition updates if you have multiple
Symantec AntiVirus products on the same computer.
You must have a valid content license to update definition files. A content license is a grant
by Symantec Corporation for you to update Symantec corporate software with the latest
associated content, such as new definitions. When you do not have a content license or your
license expires, your product does not receive the most current definitions. This results in
servers vulnerable to risks.
See “About licensing” on page 52.
Keeping your product up to date 233
About keeping your server protected
Note: : If you use LiveUpdate Administrator to push definitions to Mail Security Servers, include
the product Symantec Mail Security for Microsoft Exchange 7.9. to your product list in the
LiveUpdate Administrator.
Updating definitions
You can update definitions using any of the following methods:
■ Perform updates on demand.
See “Updating definitions on demand” on page 235.
■ Schedule automatic updates.
See “Scheduling definition updates” on page 235.
4 In the Operation Status window, click Close when the operation is complete.
3 In the content pane, under LiveUpdate/Rapid Release Schedule, check Enable automatic
virus definitions updates.
This option is enabled by default.
4 Select one of the following:
■ Use Rapid Release definitions
■ Use Certified LiveUpdate definitions
This option is enabled by default.
Note: With this feature, Mail Security has discontinued using the older mechanism of sending
alerts on LiveUpdate failure.
Appendix A
Using variables to
customize alerts and
notifications
This appendix includes the following topics:
Note: The percent (%) sign is used to surround variables in the replacement text and email
notification boxes. However, when a single percent sign (%) is placed in the text, it is filtered
out and does not appear in the email notifications.
Table A-1 lists the replacement variables that you can use in any violation notification.
Variable Description
%server% Autofills with the name of the server on which a violation was discovered
Table A-2 lists the replacement variables that you can use in rule violation notifications.
Using variables to customize alerts and notifications 240
Alert and notification variables
Variable Description
%action% Autofills with the action description that is taken in response to a rule
violation
%attachment% Autofills with the name of the attachment in which a rule violation has
been found
%information% Autofills with any general information available about the violation
%location% Autofills with the name of the location at which a violation was discovered.
For example, inbox, outbox, public folder
%recipient% Autofills with the name of the intended recipient of a message in which
a violation was discovered
%sender% Autofills with the name of the sender of a message in which a violation
was discovered
%ViolatingTerm% Autofills with the list of violating terms that triggered content filtering policy
Table A-3 lists the variables that you can use in outbreak notifications.
Variable Description
%count% Autofills with the number of messages that violate the outbreak trigger
%trigger% Autofills with the outbreak trigger name that detected an outbreak
%outbreak_rule% Autofills with the outbreak rule name that triggers an outbreak
Mail Security cannot access the file. Mail Security cannot access the file to scan it.
http://service1.symantec.com/SUPPORT/
ent-gate.nsf/docid/
2000110108382454?Open&src=w
The file is corrupt. Mail Security correctly identifies the file, but the file
is corrupt.
The file is incorrectly identified. Mail Security misidentifies the file based on the
message header. The actions that the program
performs on the file are incorrect and invalid for the
file type.
The scanner or decomposer times out. The antivirus scanner or decomposer times out
when it attempts to scan the file.
The temporary working directory is missing, or the This scenario could occur if the temporary working
path to the directory is incorrect. directory is deleted or moved. Check to see if the
\Temp directory exists. If it has been deleted, create
it in the following location:
C:\Program Files\Symantec\SMSMSE\7.9\Server \
Temp
The file contains a large compressed attachment. A file that contains a large attachment might trigger
the Unscannable File Rule. For example, a 100-MB
attachment that is compressed into a 4-MB zip file.
A Symantec AntiVirus product attempts to scan files You must configure the Symantec AntiVirus product
in Mail Security folders. to exclude Mail Security folders from being scanned.
Note: If the Encrypted File Rule is enabled, encrypted files trigger the Encrypted File Rule
instead of the Unscannable File Rule.
See “Configuring rules to address unscannable and encrypted files” on page 96.
The Mail Security service is stuck in a starting state The following are the most common reasons
that the Mail Security service gets stuck in a
starting state:
Spam data is not collected by default If spam-related data does not appear in reports,
ensure that the "Include spam data" check box
is enabled on the Report Settings page.
Cannot connect to server One possible cause for this error is if the
domain controller is running on the same server
as Microsoft Exchange. Microsoft
acknowledges this scenario as a defect and
has provided a manual workaround for this
issue.
http://support.microsoft.com/?id=824308
Unique identifier (UID) errors might occur in Outlook or Outlook This error can occur when the mail client is
Express when you use IMAP open on the desktop at the same time a
violation is detected on the server. These
warnings can be ignored. Refresh the mailbox.
Outlook, Exchange, and Mail Security continues
to function normally.
OWA message: The action cannot be completed because of a conflict A message sender who uses Outlook web
with the original item access might get the following error message
if Mail Security detects a violation:
Error in assigning Application Impersonation right to user. Please Please check whether the SMSMSE_RBAC
check whether the SMSMSE_RBAC right is already there or change right is already there or change user name
user name.
User does not have mailbox or Error in checking mailbox. Check whether user has a mailbox. If not,
create a mailbox for the user, or give some
other user who has mailbox.
User is not member of Administrators group. Please add user to User must be a member of the following
Administrators group. groups: Administrators and Exchange
Organization Management
Existing RBAC user is different from the given user name. Already there is a user with RBAC rights.
During silent install, different user is provided.
The scan <ScanName> cannot be completed as Microsoft Exchange's This error occurs if the status of manual scan
Client Access server is not reachable. on the UI is FAILED. This error also occurs if
there is an error in the event log with event ID
396. The possible cause is that Mail Security
is unable to determine or connect to the Client
Access server (CAS) of the mailbox databases.
To resolve this issue, ensure that CAS server
is up and running and can be accessed from
the mailbox server.
Following are some error messages that might occur when a user's password expires.
Note: Each installation error and warning in the log file has a URL. You can copy and paste
the URL from the log file on to the browser to view the instructions.
Table B-2 lists the errors you might encounter during remote installation and how to resolve
them.
If the user name that you provide while logging on Ensure that the user is a member of the Local
to Windows is not a member of the Local Administrators group and retry the remote
Administrators group on the remote server, then installation process.
the following message appears:
The following error occurs due to any of the Ensure that the user is a member of Organization
following causes: Management and that the Active Directory objects
are replicated correctly. Start the remote installation
■ The user name that you provide while logging
process again.
on to Windows is not a member of Organization
Management, one of the Exchange security
groups.
■ The Active Directory is not in sync maybe
because of the Active Directory replication
latency.
During the installation of Mail Security on remote Ensure that you provide the user name and
mailbox role, if you provide logon credentials of a password of a user who is a member of the
user who is not a member of the Organization Organization Management group.
Management group, then the Mail Security service
does not start.
Sometimes it takes a long time during the launch of Mail Security console when .NET
Framework 2.0 is installed on your system. If you are running .NET Framework 2.0, then it is
recommended that you install SP1 of .NET Framework 2.0. However, you do not experience
delay in launching Mail Security console on systems with higher versions of .NET Framework
installed.
To reduce time during the launch of Mail Security console
1 Start Internet Explorer.
2 On the Tools menu, click Internet Options.
3 Click the Advanced tab, and then locate the Security section.
4 Uncheck Check for publisher’s certificate revocation and then click OK.
5 After the installation is complete, check Check for publisher’s certificate revocation.
Note: The Check for publisher's certificate revocation option is set on a per-account basis.
Export/import of scheduled consolidated reports is Recreate the scheduled consolidated reports after
not supported. you import settings.
Multiple users performing a Reset to factory If user A has created some consolidated report
defaults task schedules and user B tries to perform the Reset to
factory defaults task, then only the schedules that
user B creates get deleted. Schedules that user A
creates are retained.
A automated installation 39
Active Directory 129, 151
Active Summary 229 B
adware. See security risks background scanning 170
alert notifications 15, 237, 239 configure 177
Allowed Senders list 106 stop 177
antispam filtering background scans 180
about 105 logging 179
configuring Symantec Premium AntiSpam 108 stopping 179
configuring whitelists 106 Basic Virus Rule 89
licensing requirements 52 Bloodhound heuristics technology 88
processing spam 116
processing suspect spam that exceeds a SCL
threshold 114
C
processing suspected spam 111 certificate revocation list 27
antivirus configure
Basic Virus Rule 89 content filtering 128
detecting mass-mailer viruses 89 file type filtering 128
enabling detection 89 console
how Mail Security detects viruses 88 about 46
logging detections 204 accessing 45
modifying virus policies 89 Home page 47
quarantining viruses 76 installing 36
setting Bloodhound detection level 89 primary navigation bar 47
Unrepairable Virus Rule 89 system requirements 29
updating protection against 231 version support 230
antivirus definitions. See definitions consolidated report 220–221
antivirus products, other 48 container files
attachments configuring limits 95
Allow-Only Attachment Rule 126 decomposing 88
blocking by attachment name 151 denial-of-service attacks 95
enforcing email attachment policies 151 encrypted 87, 96
filtering 121 unscannable 87, 96
Outbreak Triggered Attachment Names match content area 46
list 155 content filtering policy templates 13
Quarantined Triggered Attachment Names about 164
Rule 126 editing 168
Sample Attachment Name match list 155 preconfigured 164
Sample Executable File Names match list 155 content filtering rules
Sample Multimedia File Names match list 155 about 121
auto-protect scans 148, 176, 180 configuring conditions 128
configuring violation notification 131
Index 252