Trend Micro InterScan™ Messaging Security Virtual Appliance 9.1 Patch 2 Online Help
Contents
Index
Search
Collapse All
Expand All
Previous Page
Next Page
Getting Started
Introducing InterScan Messaging Security Virtual Appliance
About InterScan Messaging Security Virtual Appliance
IMSVA Main Features and Benefits
About Cloud Pre-Filter
About Email Encryption
About Spyware/Grayware
How Spyware/Grayware Gets into Your Network
Potential Risks and Threats
About Web Reputation Services
About Email Reputation
Types of Email Reputation
Email Reputation: Standard
Email Reputation: Advanced
How Email Reputation Technology Works
About Trend Micro Control Manager
Control Manager Support
About Graymail Scanning
About Command & Control (C&C) Contact Alert Services
Getting Started
Opening the IMSVA Management Console
Using the Online Help
Viewing the Management Console Using Secure Socket Layer
Setting Up a Child Device
Using Smart Search
Configuring Proxy Settings
IMSVA Services
Starting or Stopping Services
User Accounts
Administrator Account Management
Adding Administrator Accounts
Editing or Deleting Administrator Accounts
Editing Administrator Accounts
Deleting Administrator Accounts
Changing the Management Console Password
Using the Configuration Wizard
Configuring IMSVA with the Configuration Wizard
Configuring System Settings
Configuring Deployment Settings
Configuring SMTP Routing
Configuring Notification Settings
Configuring the Update Source
Configuring LDAP Settings
Configuring Internal Addresses
Configuring Control Manager Server Settings
Activating the Product
Verifying Settings Summary
Updating Components
Updating Engine and Pattern Files
Specifying an Update Source
Performing a Manual Update
Rolling Back a Component Update
Scheduled Component Updates
Configuring Scheduled Updates
Updating the System and Application Files
Uploading a New System or Application File
Deploying the System or Application File
Viewing Update History for any Device or to Roll Back an Update
Getting Started with Cloud Pre-Filter
Understanding Cloud Pre-Filter
Mail Flow With and Without Cloud Pre-Filter
Cloud Pre-Filter and IMSVA Communication
Cloud Pre-Filter Terminology
Creating a Cloud Pre-Filter Account
Getting Started with ATSE and Virtual Analyzer
Scan Technology
About Advanced Threat Scan Engine
Understanding Advanced Threats
Enabling Advanced Threat Scan Engine
About Virtual Analyzer
ATSE Detections and Virtual Analyzer
Virtual Analyzer Risk Levels and IMSVA Security Level Settings
Configuring Virtual Analyzer Settings
Adding Virtual Analyzer Servers
Getting Started with Email Encryption
Understanding Email Encryption
Using Email Encryption
Registering for Email Encryption
Managing Domains
Registering Domains
Registering Domains to the Encryption Service
Configuring IMSVA and Cloud Pre-filter
Configuring Cloud Pre-Filter
Understanding Cloud Pre-Filter Policies
Considerations
Creating a Cloud Pre-Filter Policy
Step 1: Domain Settings
Step 2: Configuring Condition Settings
Step 3: Configuring Filter Settings
Verifying Cloud Pre-Filter Works
Configuring DNS MX Records
Suggested IMSVA Settings When Using Cloud Pre-Filter
Disabling Cloud Pre-Filter
Configuring Sender Filtering Settings
Sender Filtering Service
Using Email Reputation
Preparing Your Message Transfer Agent for Use With Email Reputation Services
Using the Email Reputation Management Console
Configuring Sender Filtering
Enabling Email Reputation, IP Profiler and SMTP Traffic Throttling
Adding Approved List Records
Adding Blocked List Records
Enabling Sender Filtering Rules
Specifying Sender Filtering Spam Settings
Specifying Sender Filtering Virus Settings
Specifying Sender Filtering Directory Harvest Attack (DHA) Settings
Specifying Sender Filtering Bounced Mail Settings
Specifying Sender Filtering SMTP Traffic Throttling Settings
Configuring Email Reputation
Displaying Suspicious IP Addresses and Domains
Domain-based Message Authentication, Reporting & Conformance (DMARC)
Specifying DMARC Settings
Configuring SMTP Settings
Configuring SMTP Routing
Configuring the SMTP Greeting Message
Configuring Connection Settings
Configuring Message Rule Settings
Email Relay
Specifying Message Rules
Configuring Message Delivery Settings
Specifying Message Delivery Settings
Editing Message Delivery Settings
Importing Message Delivery Settings
Exporting Message Delivery Settings
Configuring DKIM Signature Settings
Adding a DKIM Signature
Configuring Known Hosts Settings
About Known Hosts
Adding Known Hosts
Importing Known Hosts
Exporting Known Hosts
Configuring Transport Layer Security
About Transport Layer Security
Prerequisites for Using TLS with IMSVA
Obtaining a Digital Certificate
Ensure that the Certificate Format is Valid
Supported Protocols and Cipher Suites
Configuring TLS Settings
TLS Settings for Messages Entering IMSVA
Adding TLS Settings for Messages Entering IMSVA
Importing TLS Settings for Messages Entering IMSVA
Exporting TLS Settings for Messages Entering IMSVA
TLS Settings for Messages Exiting IMSVA
Adding TLS Settings for Messages Exiting IMSVA
Importing TLS Settings for Messages Exiting IMSVA
Exporting TLS Settings for Messages Exiting IMSVA
Managing Certificates in IMSVA
SMTP and HTTPS Certificates
Creating a Self-Signed Certificate
Creating a Certificate Signing Request
Importing a Certificate
Exporting a Certificate
Assigning a Certificate
Deleting Certificates
Trusted CA Certificates
Importing CA Certificates
Exporting CA Certificates
Deleting CA Certificates
Configuring POP3 Settings
Scanning POP3 Messages
Understanding POP3 Scanning
POP3 Requirements
Enabling POP3 Scanning
Configuring POP3 Settings
Configuring POP3 Scan Service
IMSVA Policies
Managing Policies
About Policies
How the Policy Manager Works
Filter Policies that Display in the Policy List
Configuring Common Policy Objects
Policy Object Descriptions
Address Groups
Creating Address Groups
Adding an Address Group During Policy Creation
Editing or Deleting an Address Group
Editing or Deleting an Address Group from an Existing Policy
Exporting an Address Group
Exporting an Address Group from an Existing Policy
Using the Keyword & Expression List
Selecting Scanning Conditions for Content
Configuring an Expression
Creating Keywords or Expressions
Adding/Editing a Keyword or Expression during Policy Creation/Modification
About Regular Expressions
Characters
Bracket Expression and Character Classes
Boundary Matches
Greedy Quantifiers
Logical Operators
Shorthand and meta-symbol
Literal string and escape character of regular expressions
Data Loss Prevention
Data Identifier Types
Expressions
Predefined Expressions
Viewing Settings for Predefined Expressions
Customized Expressions
Criteria for Customized Expression
Creating a Customized Expression
Importing Customized Expressions
File Attributes
Creating a File Attribute List
Importing a File Attribute List
Keywords
Predefined Keyword Lists
How Keyword Lists Work
Number of Keywords Condition
Distance Condition
Customized Keyword Lists
Customized Keyword List Criteria
Creating a Keyword List
Importing a Keyword List
DLP Compliance Templates
Predefined DLP Templates
Customized DLP Templates
Condition Statements and Logical Operators
Creating a Template
Importing Templates
Notifications
Sending Policy Notifications
Adding or Modifying Policy Notifications
Adding or Modifying a Policy Notification During Policy Creation or Modification
Stamps
Using Stamps in a Policy
Creating Stamps
Creating a Stamp During Policy Creation or Modification
DKIM Approved List
Enabling the DKIM Approved List
Web Reputation Approved List
Enabling the Web Reputation Approved List
Adding to the Web Reputation Approved List
Configuring Internal Addresses
Configuring Internal Addresses
Setting Internal Addresses
Exporting Internal Addresses
Using Trend Micro Smart Protection
About Trend Micro Smart Protection
The Need for a New Solution
Trend Micro Smart Protection Network
Smart Feedback
Smart Protection Sources
Smart Protection Sources Compared
Adding Smart Protection Servers
Selecting a Scan Method
Using Web Reputation Services
Configuring Policies
Adding Policies
Specifying a Route
Adding a Route
Editing a Route
Route Configuration
Configuring the Route
Configuring Exceptions for Routes
Specifying Scanning Conditions
Configuring the C&C Email Approved List
Submitting Potentially Misclassified Email Addresses to Trend Micro
Selecting Scanning Conditions for Spam
Configuring Approved and Blocked Sender Lists
Configuring Spam Text Exemption Rules
Configuring Graymail Exceptions
Importing Graymail Exceptions
Configuring Web Reputation Settings
Enabling Web Reputation Settings
Completing Web Reputation Settings
Configuring Time-of-Click Protection Settings
Selecting Scanning Conditions for Attachments
Specifying Scanning Conditions for Attachment Names or Extensions
Specifying MIME Content Type Scanning Conditions
Specifying True File Type Scanning Conditions
Specifying Attachment Size Scanning Conditions
Specifying Attachment Number Scanning Conditions
Blocking Password Protected Zip Files
Selecting Scanning Conditions for Message Size
Selecting Scanning Conditions for Message Content
Specifying Compliance Scanning Conditions
Specifying "Other" Scanning Conditions
Selecting Scanning Conditions for Number of Recipients
Setting Scanning Conditions for Message Arrival Time
Setting Scanning Conditions for Spoofed Internal Messages
Specifying Actions
Specifying Actions for "Other" Rules
Specifying Actions for "Virus" Rules Main Actions
Specifying Actions for "Virus" Rules Special Viruses
Creating a Tag Subject
Finalizing a Policy
Finalizing a Rule
Configuring Encryption Settings
Configuring Encryption Settings
Encryption Types
Encrypting Message Traffic
Configuring Encryption Policies
Configuring Scanning Exceptions
Setting Scan Exceptions
Configuring Scan Exceptions
Configuring Exceptions for Security Settings Violations
Setting Scan Actions for Security Setting Violations
Setting Scan Actions for Malformed Messages
Configuring Exceptions for Encrypted Messages
Setting Scan Actions for Encrypted Messages
Setting Scan Actions for Virtual Analyzer Scanning Exceptions
Configuring Existing Policies
Modifying Existing Policies
Using the Domain List for the Global DKIM Enforcement Rule
Adding Domains to the Domain List in the Global DKIM Enforcement Rule
Modifying Recipients and Senders for Existing Rules
Policy Example 1
Step 1: Specify the Route
Step 2: Specify the Scanning Conditions
Step 3: Specify the Actions
Step 4: Specify the Priority
Policy Example 2
Step 1: Specify the Route
Step 2: Specify the Scanning Conditions
Step 3: Specify the Actions
Step 4: Specify the Priority
Using the Asterisk Wildcard
Wildcards in Email Addresses
Wildcards in File Names
Monitoring the Network
Monitoring the Network
Monitoring Your Network
Viewing System Status
Dashboard and Widgets
Using the Dashboard
User Accounts and the Dashboard
Understanding Tabs
Default Tabs
System Overview Tab
Message Traffic Tab
Sender Filtering Tab
Cloud Pre-Filter Tab
Adding Tabs
Configuring Tab Settings
Understanding Widgets
Using Widgets
Configuring Widgets
Editing Widgets
Adding Widgets
Reports
Generating Reports
Types of Report Content
Managing One-time Reports
Adding One-time Reports
Scheduled Reports
Configuring Scheduled Reports
Accessing Scheduled Reports
Using Scheduled Reports
Logs
About Logs
Configuring Log Settings
Configuring Syslog Settings
Querying Logs
Log Query Behavior
Message Tracking Enhancement
Query Behavior
Querying Message Tracking Logs
Querying System Event Logs
Querying Policy Event Logs
Querying Quarantine Event Logs
Querying URL Click Tracking Logs
Querying MTA Event Logs
Querying Sender Filtering Logs
Mail Areas and Queues
About Mail Areas and Queues
Configuring Quarantine and Archive Settings
Managing Quarantine Areas
Managing the Quarantine from the Actions Screen of a Policy Rule
Managing the Quarantine Settings
Managing Archive Areas
Managing the Archive from the Actions Screen of a Policy Rule
Managing the Archive Settings
Querying Messages
Querying the Quarantine Areas
Querying the Archive Areas
Querying Postponed Messages
Querying Messages in MTA Queues
Querying Messages in the Virtual Analyzer Queue
Viewing Quarantined Messages
Viewing Archived Messages
Viewing Postponed Messages
Viewing Messages in MTA Queues
Deferred Queue Parameters
Viewing Messages in the Virtual Analyzer Queue
Notifications
Event Notifications
Configuring Delivery Settings
Configuring Event Criteria and Notification Message
EUQ Digest
Configuring EUQ Digest Settings
Inline Action Links
Configuring a Logon Notice
Editing Notifications
Administering IMSVA
Backing Up, Restoring, and Replicating Settings
Importing and Exporting
Importing and Exporting Settings
Exporting Device Configuration Files
Importing Device Configuration Files
Backing Up IMSVA
Exporting Settings
Restoring IMSVA by Importing Settings
Replicating Settings
Enabling MCP Agent
Replicating Settings from Control Manager
End-User Quarantine
About EUQ
EUQ Authentication
Configuring End-User Quarantine (EUQ)
Enabling EUQ
Configuring SMTP Server Settings
Starting or Stopping the EUQ Management Console
Enabling End-User Access
Opening the End-User Quarantine Management Console Remotely
Logon Name Format
Distribution List EUQ Management
Managing Distribution List EUQ
Disabling EUQ
Managing EUQ Databases
Administrative Tasks
Configuring Connection Settings
About LDAP Settings
LDAP Server Types
Adding LDAP Servers
Enabling and Disabling LDAP Servers
Configuring POP3 Settings
Configuring POP3 Generic Services
Configuring POP3 Dedicated Services
Configuring Database Settings
Configuring TMCM Settings
Providing IMSVA Logon Credentials in Control Manager
Unregistering from Control Manager
Configuring NTP Settings
Configuring Child IP Settings
Configuring Database Maintenance Schedule
Managing Product Licenses
Component Descriptions
Viewing Your Product Licenses
Renewing or Activating a License
Renewing a License Using a New Activation Code
Renewing a License Using an Existing Activation Code
Activating Products
Activating from the Configuration Wizard
Activating from the Product Licenses
Configuring Smart Protection Network Settings
How to...
Create a Policy
Policy Example 1
Step 1: Specify the Route
Step 2: Specify the Scanning Conditions
Step 3: Specify the Actions
Step 4: Specify the Priority
Policy Example 2
Step 1: Specify the Route
Step 2: Specify the Scanning Conditions
Step 3: Specify the Actions
Step 4: Specify the Priority
Use the Configuration Wizard
Configuring IMSVA with the Configuration Wizard
Configuring System Settings
Configuring Deployment Settings
Configuring SMTP Routing
Configuring Notification Settings
Configuring the Update Source
Configuring LDAP Settings
Configuring Internal Addresses
Configuring Control Manager Server Settings
Activating the Product
Verifying Settings Summary
Configure Antispam Service
Setting the Spam Catch Rate or Detection Thresholds
Querying Email Reputation
Monitoring the Behavior of IP Addresses
Configure POP3 Scan Service
Configure End-User Quarantine (EUQ)
Enabling EUQ
Configuring SMTP Server Settings
Starting or Stopping the EUQ Management Console
Enabling End-User Access
Opening the End-User Quarantine Management Console Remotely
Logon Name Format
Export Debugging Files
Best Practices
Download Center
Technical Support
Troubleshooting Resources
Trend Community
Using the Support Portal
Security Intelligence Community
Threat Encyclopedia
Contacting Trend Micro
Speeding Up the Support Call
Sending Suspicious Content to Trend Micro
File Reputation Services
Email Reputation Services
Web Reputation Services
Other Resources
TrendEdge
Download Center
TrendLabs
about IMSVA
[1]
activate
license
[1]
product
[1]
add
administrator accounts
[1]
address group
add
[1]
delete
[1]
edit
[1]
address groups
examples of
[1]
understand
[1]
administrator accounts
add
[1]
delete
[1]
edit
[1]
manage
[1]
Advanced Threat Scan Engine
[1]
adware
[1]
antivirus rule
[1]
APOP
[1]
approved list
add hosts
[1]
approved senders list
configure
[1]
archive
configure settings
[1]
archive areas
manage
[1]
archived messages
view
[1]
asterisk wildcard
use
[1]
attachment size
scanning conditions
[1]
backing up
[1]
back up
[1]
blocked list
add records
[1]
blocked senders list
configure
[1]
bounced mail settings
configure
[1]
C&C email
[1]
CA certificates
[1]
change
management console password
[1]
child
configure IP Settings
[1]
Cloud Pre-Filter
configure DNS MX records
[1]
create account
[1]
create policy
[1]
policies
[1]
suggested settings
[1]
understand
[1]
verify it works
[1]
Cloud Pre-Filter tab
[1]
Command & Control (C&C) Contact Alert Services
[1]
community
[1]
component update
[1]
condition statements
[1]
Configuration Wizard
accessing
[1]
[2]
configure
[1]
approved senders list
[1]
archive settings
[1]
blocked senders list
[1]
child IP settings
[1]
connection settings
[1]
[2]
Control Manager server settings
[1]
[2]
database maintenance schedule
[1]
delivery settings
[1]
Deployment Settings
[1]
[2]
Direct Harvest Attack (DHA) settings
[1]
DNS MX records
[1]
Email reputation
[1]
encrypted message scan actions
[1]
expressions
[1]
internal addresses
[1]
[2]
[3]
LDAP settings
[1]
log settings
[1]
Message Delivery settings
[1]
Message Rule settings
[1]
notification messages
[1]
notification settings
[1]
[2]
other scanning exceptions scan actions
[1]
[2]
POP3 settings
[1]
[2]
product settings
[1]
[2]
quarantine settings
[1]
route
[1]
scan exceptions
[1]
scheduled reports
[1]
security setting violation exceptions
[1]
[2]
security setting violation scan actions
[1]
Sender Filtering
[1]
Sender Filtering bounced mail settings
[1]
Sender Filtering SMTP traffic throttling settings
[1]
Sender Filtering spam settings
[1]
Sender Filtering virus settings
[1]
SMTP routing
[1]
[2]
[3]
SMTP settings
[1]
spam text exemption rules
[1]
System Settings
[1]
[2]
TMCM settings
[1]
update source
[1]
[2]
Web EUQ Digest settings
[1]
configure event criteria
[1]
configuring
Encryption settings
[1]
connection settings
configure
[1]
[2]
Control Manager
enable agent
[1]
replicate settings
[1]
see Trend Micro Control Manager
[1]
Control Manager server settings
configure
[1]
[2]
Conventional scan
[1]
criteria
customized expressions
[1]
keywords
[1]
customized expressions
[1]
[2]
[3]
criteria
[1]
importing
[1]
customized keywords
[1]
criteria
[1]
importing
[1]
customized templates
[1]
creating
[1]
importing
[1]
dashboard
using
[1]
database
configure maintenance schedule
[1]
data identifiers
[1]
expressions
[1]
file attributes
[1]
keywords
[1]
Data Loss Prevention
[1]
data identifiers
[1]
expressions
[1]
[2]
[3]
[4]
[5]
[6]
file attributes
[1]
[2]
[3]
keywords
[1]
[2]
[3]
[4]
[5]
[6]
[7]
templates
[1]
[2]
[3]
[4]
[5]
[6]
Data Loss Prevention (DLP)
[1]
default tabs
[1]
delete
address group
[1]
administrator accounts
[1]
delivery settings
configure
[1]
Deployment Settings
configure
[1]
[2]
dialers
[1]
Direct Harvest Attack (DHA) settings
configure
[1]
display
domains
[1]
suspicious IP addresses
[1]
DKIM Signing
[1]
DLP
[1]
domains
display
[1]
Email Encryption
[1]
[2]
edit
address group
[1]
administrator accounts
[1]
Email Encryption
managing domains
[1]
registering domains
[1]
understand
[1]
email relay
[1]
Email reputation
about
[1]
Administration Console
[1]
configure
[1]
enable
[1]
types
[1]
email threats
spam
[1]
unproductive messages
[1]
enable
Control Manager agent
[1]
Email reputation
[1]
End-User Access
[1]
[2]
EUQ
[1]
[2]
IP Profiler
[1]
POP3 scanning
[1]
sender filtering rules
[1]
SMTP Traffic Throttling
[1]
encrypting messages
[1]
Encryption settings
configuring
[1]
End-User Access
enable
[1]
[2]
ERS
MTA settings
[1]
using
[1]
EUQ
[1]
authentication
[1]
disable
[1]
enable
[1]
[2]
open the console
[1]
[2]
start
[1]
[2]
web console
[1]
[2]
event criteria
configure
[1]
event notifications
[1]
export notes
[1]
expression lists
manage
[1]
expressions
[1]
[2]
configure
[1]
customized
[1]
[2]
criteria
[1]
predefined
[1]
[2]
regular
[1]
file attributes
[1]
[2]
[3]
[4]
creating
[1]
importing
[1]
wildcards
[1]
File Reputation Services
[1]
filtering, how it works
[1]
filters
examples of
[1]
generate
reports
[1]
graymail
[1]
hacking tools
[1]
import notes
[1]
IMSVA
about
[1]
internal addresses
configure
[1]
[2]
[3]
IP Profiler
enable
[1]
joke program
[1]
keywords
[1]
[2]
customized
[1]
[2]
[3]
predefined
[1]
[2]
[3]
known hosts
[1]
add
[1]
export
[1]
import
[1]
LDAP settings
configure
[1]
[2]
[3]
license
activate
[1]
renew
[1]
logical operators
[1]
logs
[1]
configure settings
[1]
query
[1]
query message tracking
[1]
query MTA event
[1]
query policy event
[1]
query quarantine event
[1]
query sender filtering
[1]
query system event
[1]
query URL click tracking
[1]
manage
administrator accounts
[1]
expression lists
[1]
notifications list
[1]
one-time reports
[1]
product licenses
[1]
manage domains for Email Encryption
[1]
management console password
change
[1]
manual update
[1]
mass mailing viruses
pattern
[1]
Message Delivery settings
configure
[1]
Message Rule settings
configure
[1]
messages in the Virtual Analyzer queue
view
[1]
message size
scanning conditions
[1]
message traffic tab
[1]
MIME content type
scanning conditions
[1]
MTA
with ERS
[1]
MTA queues
view
[1]
notes
export
[1]
import
[1]
notification messages
configure
[1]
notifications
event
[1]
notification settings
configure
[1]
[2]
notifications list
manage
[1]
one-time reports
manage
[1]
online
community
[1]
other rule
[1]
password
management console
[1]
password cracking applications
[1]
pattern files
update
[1]
PCRE
[1]
Perle Compatible Regular Expressions
[1]
permitted senders
[1]
policies
add
[1]
example 1
[1]
[2]
finalize
[1]
policy management
DLP
[1]
policy notification
add
[1]
edit
[1]
POP3 messages
scan
[1]
POP3 scanning
enable
[1]
POP3 settings
configure
[1]
[2]
postponed messages
view
[1]
predefined expressions
[1]
viewing
[1]
predefined keywords
distance
[1]
number of keywords
[1]
predefined templates
[1]
product licenses
manage
[1]
view
[1]
product services
[1]
product settings
configure
[1]
[2]
quarantine
configure settings
[1]
quarantine and archive
[1]
quarantine areas
manage
[1]
quarantined messages
view
[1]
query
archive areas
[1]
logs
[1]
messages
[1]
messages in the Virtual Analyzer queue
[1]
MTA event logs
[1]
MTA messages
[1]
policy event logs
[1]
postponed messages
[1]
quarantine areas
[1]
quarantine event logs
[1]
sender filtering logs
[1]
system event logs
[1]
URL click tracking logs
[1]
register domains for Email Encryption
[1]
remote access tools
[1]
renew
license
[1]
replicating settings
[1]
reports
content
[1]
generate
[1]
manage one-time
[1]
scheduled reports
[1]
[2]
restore
[1]
[2]
roll back
components
[1]
route
configure
[1]
configure exceptions
[1]
specify
[1]
route exceptions
[1]
scan
POP3 messages
[1]
scan actions
configure encrypted message settings
[1]
configure other scanning exceptions settings
[1]
[2]
scan engine
update
[1]
scan exceptions
configure
[1]
Scan methods
[1]
scanning conditions
[1]
attachment names
[1]
attachment number
[1]
[2]
attachments
[1]
attachment size
[1]
extensions
[1]
message size
[1]
MIME content type
[1]
spam
[1]
specify
[1]
true file type
[1]
scheduled reports
access
[1]
configure
[1]
use
[1]
scheduled updates
[1]
security risks
spyware/grayware
[1]
security setting violations
configure exceptions
[1]
[2]
configure scan actions
[1]
Sender Filtering
configure
[1]
configure bounced mail settings
[1]
configure Direct Harvest Attack (DHA) settings
[1]
configure SMTP traffic throttling settings
[1]
configure spam settings
[1]
configure virus settings
[1]
Sender Filtering Service
about
[1]
Sender Filtering tab
[1]
services
[1]
Sender Filtering Service
[1]
smart protection
[1]
[2]
source
[1]
[2]
sources
comparison
[1]
protocols
[1]
Smart Protection
[1]
Smart Protection Network
[1]
Smart Scan
[1]
SMTP and HTTPS certificates
[1]
SMTP routing
[1]
configure
[1]
[2]
[3]
SMTP settings
configure
[1]
SMTP Traffic Throttling
enable
[1]
SMTP traffic throttling settings
configure
[1]
spam settings
configure
[1]
spam text exemption rules
configure
[1]
specify
actions
[1]
route
[1]
scanning conditions
[1]
update source
[1]
spyware/grayware
[1]
adware
[1]
dialers
[1]
entering the network
[1]
hacking tools
[1]
joke program
[1]
password cracking applications
[1]
remote access tools
[1]
risks and threats
[1]
start
EUQ
[1]
[2]
support
knowledge base
[1]
resolve issues faster
[1]
TrendLabs
[1]
suspicious IP addresses
display
[1]
system overview tab
[1]
System Settings
configure
[1]
[2]
System Status screen
[1]
tabs
add a tab
[1]
Cloud Pre-Filter
[1]
configure a tab
[1]
default tabs
[1]
message traffic
[1]
Sender Filtering
[1]
system overview
[1]
understand
[1]
tag subject
add
[1]
templates
[1]
[2]
[3]
[4]
[5]
[6]
condition statements
[1]
customized
[1]
[2]
[3]
logical operators
[1]
predefined
[1]
TMCM settings
configure
[1]
transport layer
[1]
Transport Layer Security
[1]
TrendLabs
[1]
Trend Micro Control Manager
[1]
agent
[1]
server
[1]
true file type
[1]
understand
Email Encryption
[1]
widgets
[1]
update
application files
[1]
automatically
[1]
manually
[1]
pattern files
[1]
scan engine
[1]
system files
[1]
update source
configure
[1]
[2]
specify
[1]
view
archived messages
[1]
messages in the Virtual Analyzer queue
[1]
MTA queues
[1]
postponed messages
[1]
product licenses
[1]
quarantined messages
[1]
Virtual Analyzer
[1]
virus settings
configure
[1]
Web EUQ Digest
configure settings
[1]
Web Reputation Services
[1]
widgets
add a widget
[1]
configure a widget
[1]
edit a widget
[1]
understanding
[1]
using a widget
[1]
wildcards
[1]
file attributes
[1]
Search
Toggle search result highlighting
Importing Known Hosts
Procedure
Go to
Administration
→
IMSVA
Configuration
→
Known Hosts
.
The
Known Hosts
screen appears.
Click
Import
.
The
Import Known Hosts
dialog box appears.
Click
Browse
to locate the file to import.
Select one of the following:
Merge with current list
Overwrite current list
Click
Import
.
Note
IMSVA
can import host addresses from only a text file. Ensure that the text file contains only one IP address or subnet address per line.