Trend Micro InterScan™ Messaging Security Suite Online Help
Contents
Index
Search
Collapse All
Expand All
Previous Page
Next Page
Home
What's New
Audience
InterScan Messaging Security Suite Documentation
Document Conventions
Getting Started
Introducing InterScan Messaging Security Suite
About InterScan Messaging Security Suite
IMSS Main Features and Benefits
About Cloud Pre-Filter
About Spyware/Grayware
How Spyware/Grayware Gets into Your Network
Potential Risks and Threats
About Web Reputation Services
About Email Reputation
Types of Email Reputation
Email Reputation: Standard
Email Reputation: Advanced
How Email Reputation Technology Works
About Trend Micro Control Manager
Control Manager Support
About Trend Micro Smart Protection
The Need for a New Solution
Trend Micro Smart Protection Network
About Graymail Scanning
About Command & Control (C&C) Contact Alert Services
Getting Started
Opening the IMSS Management Console
Using the Online Help
Changing the Management Console Password
Using Smart Search
Configuring Proxy Settings
IMSS Services
Starting or Stopping Services
Opening the End-User Quarantine Console
Logon Name Format
Using the Configuration Wizard
Accessing the Configuration Wizard
Configuring Notification Settings
Configuring the Update Source
Configuring LDAP Settings
Configuring Internal Addresses
Configuring Control Manager Server Settings
Activating the Product
Verifying Settings Summary
Updating Components
Updating Engine and Pattern Files
Specifying an Update Source
Performing a Manual Update
Rolling Back a Component Update
Scheduled Component Updates
Configuring Scheduled Updates
Getting Started with Cloud Pre-Filter
Understanding Cloud Pre-Filter
Mail Flow With and Without Cloud Pre-Filter
Cloud Pre-Filter and IMSS Communication
Cloud Pre-Filter Terminology
Creating a Cloud Pre-Filter Account
Getting Started with ATSE and Virtual Analyzer
Scan Technology
About Advanced Threat Scan Engine
Understanding Advanced Threats
Enabling Advanced Threat Scan Engine
About Virtual Analyzer
ATSE Detections and Virtual Analyzer
Virtual Analyzer Risk Levels and IMSS Security Level Settings
Configuring Virtual Analyzer Settings
Adding Virtual Analyzer Servers
Getting Started with Email Encryption
Understanding Email Encryption
Using Email Encryption
Registering for Email Encryption
Managing Domains
Registering Domains
Registering Domains to the Encryption Service
Configuring IMSS and Cloud Pre-filter
Configuring Cloud Pre-Filter
Understanding Cloud Pre-Filter Policies
Considerations
Creating a Cloud Pre-Filter Policy
Step 1: Domain Settings
Step 2: Configuring Condition Settings
Step 3: Configuring Filter Settings
Verifying Cloud Pre-Filter Works
Configuring DNS MX Records
Suggested IMSS Settings When Using Cloud Pre-Filter
Disabling Cloud Pre-Filter
Configuring Sender Filtering Settings
Sender Filtering Service
Using Email Reputation
Preparing Your Message Transfer Agent for Use With Email Reputation Services
Using the Email Reputation Management Console
Configuring Sender Filtering
Enabling Email Reputation and IP Profiler
Adding Approved List Records
Adding Blocked List Records
Enabling Sender Filtering Rules
Specifying Sender Filtering Spam Settings
Specifying Sender Filtering Virus Settings
Specifying Sender Filtering Directory Harvest Attack (DHA) Settings
Specifying Sender Filtering Bounced Mail Settings
Configuring Email Reputation
Displaying Suspicious IP Addresses and Domains
Configuring SMTP Settings
Message Transfer Agents
Enabling SMTP Connections
Configuring SMTP Routing
Configuring SMTP Settings
Configuring Connection Settings
Configuring Message Rule Settings
Email Relay
Specifying Message Rules
About Message Delivery
Incoming Message and Message Delivery Domains
Configuring Message Delivery Settings
Configuring Known Hosts Settings
About Known Hosts
Adding Known Hosts
Importing Known Hosts
Exporting Known Hosts
Configuring POP3 Settings
Scanning POP3 Messages
Understanding POP3 Scanning
POP3 Requirements
Enabling POP3 Scanning
Configuring POP3 Settings
Configuring POP3 Scan Service
IMSS Policies
Managing Policies
About Policies
How the Policy Manager Works
Filter Policies that Display in the Policy List
Configuring Common Policy Objects
Policy Object Descriptions
Address Groups
Creating Address Groups
Adding an Address Group During Policy Creation
Editing or Deleting an Address Group
Editing or Deleting an Address Group from an Existing Policy
Exporting an Address Group
Exporting an Address Group from an Existing Policy
Using the Keyword & Expression List
Selecting Scanning Conditions for Content
Configuring an Expression
Keywords & Expressions
Creating Keywords or Expressions
Adding/Editing a Keyword or Expression during Policy Creation/Modification
About Regular Expressions
Characters
Bracket Expression and Character Classes
Boundary Matches
Greedy Quantifiers
Logical Operators
Shorthand and meta-symbol
Literal string and escape character of regular expressions
Data Loss Prevention
Data Identifier Types
Expressions
Predefined Expressions
Viewing Settings for Predefined Expressions
Customized Expressions
Criteria for Customized Expression
Creating a Customized Expression
Importing Customized Expressions
File Attributes
Creating a File Attribute List
Importing a File Attribute List
Keywords
Predefined Keyword Lists
How Keyword Lists Work
Number of Keywords Condition
Distance Condition
Customized Keyword Lists
Customized Keyword List Criteria
Creating a Keyword List
Importing a Keyword List
DLP Compliance Templates
Predefined DLP Templates
Customized DLP Templates
Condition Statements and Logical Operators
Creating a Template
Importing Templates
Notifications
Sending Policy Notifications
Adding or Modifying Policy Notifications
Adding or Modifying a Policy Notification During Policy Creation or Modification
Stamps
Using Stamps in a Policy
Creating Stamps
Creating a Stamp During Policy Creation or Modification
DKIM Approved List
Enabling the DKIM Approved List
Web Reputation Approved List
Enabling the Web Reputation Approved List
Adding to the Web Reputation Approved List
Configuring Internal Addresses
Configuring Internal Addresses
Setting Internal Addresses
Exporting Internal Addresses
Searching for Users or Groups
Searching for an LDAP User or Group
Using Trend Micro Smart Protection
About Trend Micro Smart Protection
The Need for a New Solution
Trend Micro Smart Protection Network
Smart Feedback
Smart Protection Sources
Smart Protection Sources Compared
Adding Smart Protection Servers
Selecting a Scan Method
Using Web Reputation Services
Configuring Policies
Adding Policies
Specifying a Route
Adding a Route
Editing a Route
Route Configuration
Configuring the Route
Configuring Exceptions for Routes
Specifying Scanning Conditions
Configuring the C&C Email Approved List
Submitting Potentially Misclassified Email Addresses to Trend Micro
Selecting Scanning Conditions for Spam
Configuring Approved and Blocked Sender Lists
Configuring Spam Text Exemption Rules
Configuring Graymail Exceptions
Importing Graymail Exceptions
Configuring Web Reputation Settings
Enabling Web Reputation Settings
Configuring Web Reputation Settings
Configuring Time-of-Click Protection Settings
Configuring Marketing Message Exceptions
Importing Marketing Email Exceptions
Selecting Scanning Conditions for Attachments
Specifying Scanning Conditions for Attachment Names or Extensions
Specifying MIME Content Type Scanning Conditions
Specifying True File Type Scanning Conditions
Specifying Attachment Size Scanning Conditions
Specifying Attachment Number Scanning Conditions
Blocking Password Protected Zip Files
Selecting Scanning Conditions for Message Size
Selecting Scanning Conditions for Message Content
Specifying Compliance Scanning Conditions
Specifying "Other" Scanning Conditions
Selecting Scanning Conditions for Number of Recipients
Setting Scanning Conditions for Message Arrival Time
Setting Scanning Conditions for Spoofed Internal Messages
Specifying Actions
Specifying Actions for "Other" Rules
Specifying Actions for "Virus" Rules Main Actions
Specifying Actions for "Virus" Rules Special Viruses
Creating a Tag Subject
Finalizing a Policy
Finalizing a Rule
Configuring Encryption Settings
Configuring Encryption Settings
Encryption Types
Encrypting Message Traffic
Configuring Encryption Policies
Configuring Scanning Exceptions
Setting Scan Exceptions
Configuring Scan Exceptions
Configuring Exceptions for Security Settings Violations
Setting Scan Actions for Security Setting Violations
Setting Scan Actions for Malformed Messages
Configuring Exceptions for Encrypted Messages
Setting Scan Actions for Encrypted Messages
Setting Scan Actions for Virtual Analyzer Scanning Exceptions
Configuring Existing Policies
Modifying Existing Policies
Using the Domain List for the Global DKIM Enforcement Rule
Adding Domains to the Domain List in the Global DKIM Enforcement Rule
Modifying Recipients and Senders for Existing Rules
Policy Example 1
Step 1: Specify the Route
Step 2: Specify the Scanning Conditions
Step 3: Specify the Actions
Step 4: Specify the Priority
Policy Example 2
Step 1: Specify the Route
Step 2: Specify the Scanning Conditions
Step 3: Specify the Actions
Step 4: Specify the Priority
Using the Asterisk Wildcard
Wildcards in Email Addresses
Wildcards in File Names
Monitoring the Network
Monitoring the Network
Monitoring Your Network
Viewing System Status
Dashboard and Widgets
Using the Dashboard
User Accounts and the Dashboard
Understanding Tabs
Default Tabs
System Overview Tab
Message Traffic Tab
Sender Filtering Tab
Cloud Pre-Filter Tab
Adding Tabs
Configuring Tab Settings
Understanding Widgets
Using Widgets
Configuring Widgets
Editing Widgets
Adding Widgets
Reports
Generating Reports
Types of Report Content
Managing One-time Reports
Adding One-time Reports
Scheduled Reports
Configuring Scheduled Reports
Accessing Scheduled Reports
Using Scheduled Reports
Logs
About Logs
Configuring Log Settings
Querying Logs
Log Query Behavior
Message Tracking Enhancement
Query Behavior
Querying Message Tracking Logs
Querying System Event Logs
Querying Policy Event Logs
Querying Quarantine Event Logs
Querying URL Click Tracking Logs
Querying MTA Event Logs
Querying Sender Filtering Logs
Mail Areas and Queues
About Mail Areas and Queues
Configuring Quarantine and Archive Settings
Managing Quarantine Areas
Managing the Quarantine from the Actions Screen of a Policy Rule
Managing the Quarantine Settings
Managing Archive Areas
Managing the Archive from the Actions Screen of a Policy Rule
Managing the Archive Settings
Querying Messages
Querying the Quarantine Areas
Querying the Archive Areas
Querying Postponed Messages
Querying Messages in the Virtual Analyzer Queue
Viewing Quarantined Messages
Viewing Archived Messages
Viewing Postponed Messages
Viewing Messages in the Virtual Analyzer Queue
Notifications
Event Notifications
Configuring Delivery Settings
Configuring Event Criteria and Notification Message
EUQ Digest
Configuring EUQ Digest Settings
Inline Action Links
Configuring a Logon Notice
Editing Notifications
Administering IMSS
Backing Up, Restoring, and Replicating Settings
Importing and Exporting Settings
Exporting Configuration Files
Importing Configuration Files
Backing Up IMSS
Performing a Full Backup
Performing a Minimal Backup
Restoring IMSS
Performing a Full Restoration
Performing a Minimal Restoration
Replicating Settings
Enabling MCP Agent
Replicating Settings from Control Manager
Exporting Debugging Files
End-User Quarantine
About EUQ
EUQ Authentication
Configuring End-User Quarantine (EUQ)
Enabling EUQ
Configuring SMTP Server Settings
Starting or Stopping the EUQ Management Console
Enabling End-User Access
Opening the End-User Quarantine Management Console Remotely
Logon Name Format
Distribution List EUQ Management
Managing Distribution List EUQ
Disabling EUQ
Managing EUQ Databases
Administrative Tasks
Managing Administrator Accounts
Adding Administrator Accounts
Editing Administrator Accounts
Deleting Administrator Accounts
Configuring Connection Settings
About LDAP Settings
LDAP Server Types
Configuring LDAP Settings
Enabling and Disabling LDAP Servers
Configuring POP3 Settings
Configuring POP3 Generic Services
Configuring POP3 Dedicated Services
Configuring Database Settings
Configuring TMCM Settings
Providing IMSS Logon Credentials in Control Manager
Unregistering from Control Manager
Configuring Database Maintenance Schedule
Managing Product Licenses
Component Descriptions
Viewing Your Product Licenses
Renewing or Activating a License
Renewing a License Using a New Activation Code
Renewing a License Using an Existing Activation Code
Activating Products
Activating from the Configuration Wizard
Activating from the Product Licenses
Configuring Smart Protection Network Settings
Updating and Rescuing the System and Application
Updating the System and Application
Uploading a New System or Application File
Deploying the System or Application File
Viewing the Update History for Any Device or Rolling Back an Update
Troubleshooting and FAQs
Troubleshooting
Troubleshooting Issues
General
Troubleshooting Management Console or Component Access
Troubleshooting the IMSSPS Daemon
Troubleshooting Product Activation or Component Updates
Troubleshooting Email Notifications
Troubleshooting Message Log Queries
Troubleshooting System Status Screen
Troubleshooting Attachment Information
Troubleshooting Not Receiving Email Messages
Troubleshooting Services Not Running
Troubleshooting Scan Time After Enabling Web Reputation
End-User Quarantine Issues
Troubleshooting EUQ Access
Troubleshooting User Access to EUQ
Troubleshooting EUQ Using NTLM SSO
Troubleshooting EUQ Digest Message Display
Troubleshooting Messages Appearing on EUQ
Troubleshooting LDAP with Kerberos Authentication
Troubleshooting Kerberos SSO to EUQ
Sender Filtering Issues
Troubleshooting FoxyProxy Startup
Troubleshooting FoxyProxy Connectivity
Troubleshooting FoxyProxy Message Processing Speed
Troubleshooting Viewing FoxyProxy Blocked Connections
Troubleshooting FoxDNS
Troubleshooting IP Profiler Logs
Troubleshooting Email Reputation After Enabling the Management Console
Troubleshooting SMTP Routing and Postfix
Troubleshooting IP Profiler Blocked List
Troubleshooting Blocked IP Addresses in Overview Page
IMSS Ports
Frequently Asked Questions
Postfix MTA Settings
If I deploy multiple scanners with Postfix, how can I manage these Postfix instances centrally?
IMSS Components
How can I set up and maintain the database?
Email Reputation
How do I configure Email reputation not to block certain IP addresses or domains?
IP Profiler
How can I purge the FoxProxy log?
Which process monitors FoxProxy’s status? Which process rescues it when it shuts down?
Which process/component performs DNS queries?
Why is the domain name of an IP address that was added to the blocked/approved list always N/A?
Why does the Sender Filtering Suspicious IP screen also display the connection information of blocked IP addresses?
Can the IP Profiler use an existing BIND server?
When does IMSS 9.1 send an email message to "Foxhunter_proxy@domain"?
Is the LDAP service mandatory for analyzing whether an incoming traffic is a form of DHA attack?
Mail Areas & Queues
Can I use special characters to perform queries?
Why is there a quarantined message without a message ID when the user views message details?
End-User Quarantine
If I am using Kerberos, why are users unable to log on to the EUQ console with a short name: “domain\user_name”?
If I installed Microsoft Exchange Server and have set multiple mail addresses for each user, how do I enable EUQ to check multiple mail addresses for one user?
How do I send a non-English EUQ digest?
How can I speed up LDAP access if the LDAP server is Active Directory?
Using Port 3268 for LDAP Queries
Using Port 389 for LDAP Queries
What user logon name formats does IMSS support for Active Directory?
Why are some users unable to use Kerberos SSO?
Spam Protection Service
How is the spam catch rate determined?
ActiveUpdate
How do I roll back a pattern file?
Control Manager
How do I verify that IMSS is registered to Control Manager? Unregistered from Control Manager?
Verifying that IMSS is registered from the Control Manager management console
Verifying that IMSS is registered from the OS shell
Verifying that IMSS is registered from IMSS management console
LDAP
I cannot add an LDAP server using the correct admin account. Why?
Active Directory 2008 cannot use Kerberos authentication. Why?
I use Sun iPlanet as my LDAP server, but my accounts are not synchronizing correctly to Cloud Pre-Filter. Why?
Other FAQs
Can the IP address for IMSS or IMSS components be changed?
Changing the IP Address for IMSS (Central Controller + Scanner)
How does IMSS process a partial message?
What file format can IMSS import when configuring policy settings?
Why are newly created administrator accounts not able to access the User Quarantine Access, Admin Accounts, and Product License pages?
Why are changes to the IMSS configuration settings not applied immediately?
Are there limits on the following items?
How can I modify the log paths?
Can IMSS 9.1 configure its own relay restrictions if a third-party upstream server is not installed?
How can I modify the Access Control List (ACL) for the IMSS scanner?
Why are messages from some senders always received as attachments? Why is the message body replaced by the disclaimer or stamp?
How can I specify a keyword expression to represent a blank header for matching fields such as "From", "To", or "Subject" when creating rules with the content filter?
Why does the message size scan condition not work for encrypted messages?
Troubleshooting Cloud Pre-Filter
Unable to Connect to Cloud Pre-Filter
Unable to Receive Messages from Cloud Pre-Filter
Appendices
Technical Support
Troubleshooting Resources
Trend Community
Using the Support Portal
Security Intelligence Community
Threat Encyclopedia
Contacting Trend Micro
Speeding Up the Support Call
Sending Suspicious Content to Trend Micro
File Reputation Services
Email Reputation Services
Web Reputation Services
Other Resources
TrendEdge
Download Center
TrendLabs
IMSS Scripts
Using IMSS Scripts
Default Directory Locations
Default Mail Queues
eManager, Virus, and Program Logs
Temporary Folder
Notification Pickup Folder
Configuring the SMTP Notification Server
about IMSS
[1]
activate
license
[1]
product
[1]
add
administrator accounts
[1]
address group
add
[1]
delete
[1]
edit
[1]
address groups
examples of
[1]
understand
[1]
administrator accounts
add
[1]
delete
[1]
edit
[1]
manage
[1]
Advanced Threat Scan Engine
[1]
adware
[1]
antivirus rule
[1]
APOP
[1]
approved list
add hosts
[1]
approved senders list
configure
[1]
archive
configure settings
[1]
archive areas
manage
[1]
archived messages
view
[1]
asterisk wildcard
use
[1]
attachment size
scanning conditions
[1]
audience
[1]
back up
IMSS
[1]
blocked list
add records
[1]
blocked senders list
configure
[1]
bounced mail settings
configure
[1]
change
management console password
[1]
Cloud Pre-Filter
configure DNS MX records
[1]
create account
[1]
create policy
[1]
policies
[1]
suggested settings
[1]
troubleshoot
[1]
understand
[1]
verify it works
[1]
Cloud Pre-Filter tab
[1]
Command & Control (C&C) Contact Alert Services
[1]
commands
[1]
community
[1]
component update
[1]
condition statements
[1]
Configuration Wizard
accessing
[1]
configure
approved senders list
[1]
archive settings
[1]
blocked senders list
[1]
connection settings
[1]
[2]
Control Manager server settings
[1]
database maintenance schedule
[1]
delivery settings
[1]
Direct Harvest Attack (DHA) settings
[1]
DNS MX records
[1]
Email reputation
[1]
encrypted message scan actions
[1]
expressions
[1]
internal addresses
[1]
[2]
LDAP settings
[1]
log settings
[1]
Messaged Delivery settings
[1]
Message Rule settings
[1]
notification messages
[1]
notification settings
[1]
other scanning exceptions scan actions
[1]
[2]
POP3 settings
[1]
[2]
product settings
[1]
quarantine settings
[1]
route
[1]
scan exceptions
[1]
scheduled reports
[1]
security setting violation exceptions
[1]
[2]
security setting violation scan actions
[1]
Sender Filtering
[1]
Sender Filtering bounced mail settings
[1]
Sender Filtering spam settings
[1]
Sender Filtering virus settings
[1]
SMTP routing
[1]
SMTP settings
[1]
spam text exemption rules
[1]
TMCM settings
[1]
update source
[1]
Web EUQ Digest settings
[1]
configure event criteria
[1]
configuring
Encryption settings
[1]
connection settings
configure
[1]
[2]
Control Manager
enable agent
[1]
replicate settings
[1]
see Trend Micro Control Manager
[1]
Control Manager server settings
configure
[1]
Conventional scan
[1]
criteria
customized expressions
[1]
keywords
[1]
customized expressions
[1]
[2]
[3]
criteria
[1]
importing
[1]
customized keywords
[1]
criteria
[1]
importing
[1]
customized templates
[1]
creating
[1]
importing
[1]
dashboard
using
[1]
database
configure maintenance schedule
[1]
data identifiers
[1]
expressions
[1]
file attributes
[1]
keywords
[1]
Data Loss Prevention
[1]
data identifiers
[1]
expressions
[1]
[2]
[3]
[4]
[5]
[6]
file attributes
[1]
[2]
[3]
keywords
[1]
[2]
[3]
[4]
[5]
[6]
[7]
templates
[1]
[2]
[3]
[4]
[5]
[6]
Data Loss Prevention (DLP)
[1]
default tabs
[1]
delete
address group
[1]
administrator accounts
[1]
delivery settings
configure
[1]
dialers
[1]
Direct Harvest Attack (DHA) settings
configure
[1]
display
domains
[1]
suspicious IP addresses
[1]
DLP
[1]
documentation
[1]
domains
display
[1]
Email Encryption
[1]
[2]
edit
address group
[1]
administrator accounts
[1]
Email Encryption
managing domains
[1]
registering domains
[1]
understand
[1]
email relay
[1]
Email reputation
[1]
about
[1]
Administration Console
[1]
configure
[1]
enable
[1]
types
[1]
email threats
spam
[1]
unproductive messages
[1]
enable
Control Manager agent
[1]
Email reputation
[1]
End-User Access
[1]
EUQ
[1]
IP Profiler
[1]
POP3 scanning
[1]
sender filtering rules
[1]
encrypting messages
[1]
Encryption settings
configuring
[1]
End-User Access
enable
[1]
ERS
MTA settings
[1]
using
[1]
EUQ
[1]
authentication
[1]
disable
[1]
enable
[1]
open the console
[1]
start
[1]
web console
[1]
Web console
[1]
event criteria
configure
[1]
event notifications
[1]
export notes
[1]
expression lists
manage
[1]
expressions
[1]
[2]
configure
[1]
customized
[1]
[2]
criteria
[1]
predefined
[1]
[2]
regular
[1]
FAQ
ERS
[1]
EUQ
[1]
IMSS components
[1]
IP Profiler
[1]
mail areas
[1]
postfix
[1]
queues
[1]
file attributes
[1]
[2]
[3]
[4]
creating
[1]
importing
[1]
wildcards
[1]
File Reputation Services
[1]
[2]
filtering, how it works
[1]
filters
examples of
[1]
generate
reports
[1]
graymail
[1]
hacking tools
[1]
import notes
[1]
IMSA
scripts
[1]
IMSS
about
[1]
backing up
[1]
restore
[1]
scripts
[1]
internal addresses
configure
[1]
[2]
IP Profiler
[1]
enable
[1]
joke program
[1]
keywords
[1]
[2]
customized
[1]
[2]
[3]
predefined
[1]
[2]
[3]
known hosts
[1]
add
[1]
export
[1]
import
[1]
LDAP settings
configure
[1]
[2]
LDAP User or Group
search for
[1]
license
activate
[1]
renew
[1]
logical operators
[1]
logs
[1]
configure settings
[1]
query
[1]
query message tracking
[1]
query MTA event
[1]
query policy event
[1]
query quarantine event
[1]
query sender filtering
[1]
query system event
[1]
query URL click tracking
[1]
manage
administrator accounts
[1]
expression lists
[1]
notifications list
[1]
one-time reports
[1]
product licenses
[1]
manage domains for Email Encryption
[1]
management console password
change
[1]
manual update
[1]
mass mailing viruses
pattern
[1]
message delivery
[1]
Message Delivery settings
configure
[1]
Message Rule settings
configure
[1]
messages in the Virtual Analyzer queue
view
[1]
message size
scanning conditions
[1]
message traffic tab
[1]
MIME content type
scanning conditions
[1]
MTA
with ERS
[1]
new features
[1]
notes
export
[1]
import
[1]
notification messages
configure
[1]
notifications
event
[1]
notification settings
configure
[1]
notifications list
manage
[1]
one-time reports
manage
[1]
online
community
[1]
online help
[1]
other rule
[1]
password
management console
[1]
password cracking applications
[1]
pattern files
update
[1]
PCRE
[1]
Perle Compatible Regular Expressions
[1]
permitted senders
[1]
policies
add
[1]
example 1
[1]
finalize
[1]
policy management
DLP
[1]
policy notification
add
[1]
edit
[1]
POP3 messages
scan
[1]
POP3 scanning
enable
[1]
POP3 settings
configure
[1]
[2]
postponed messages
view
[1]
predefined expressions
[1]
viewing
[1]
predefined keywords
distance
[1]
number of keywords
[1]
predefined templates
[1]
product licenses
manage
[1]
view
[1]
product services
[1]
product settings
configure
[1]
quarantine
configure settings
[1]
quarantine and archive
[1]
quarantine areas
manage
[1]
quarantined messages
view
[1]
query
archive areas
[1]
logs
[1]
messages
[1]
messages in the Virtual Analyzer queue
[1]
MTA event logs
[1]
policy event logs
[1]
postponed messages
[1]
quarantine areas
[1]
quarantine event logs
[1]
sender filtering logs
[1]
system event logs
[1]
URL click tracking logs
[1]
readme file
[1]
register domains for Email Encryption
[1]
remote access tools
[1]
renew
license
[1]
replicating settings
[1]
reports
content
[1]
generate
[1]
manage one-time
[1]
scheduled reports
[1]
[2]
restore
IMSS
[1]
roll back
components
[1]
route
configure
[1]
specify
[1]
scan
POP3 messages
[1]
SMTP messages
[1]
scan actions
configure encrypted message settings
[1]
configure other scanning exceptions settings
[1]
[2]
scan engine
update
[1]
scan exceptions
configure
[1]
Scan methods
[1]
scanning conditions
[1]
attachment names
[1]
attachment number
[1]
[2]
attachments
[1]
attachment size
[1]
extensions
[1]
message size
[1]
MIME content type
[1]
spam
[1]
specify
[1]
true file type
[1]
scheduled reports
access
[1]
configure
[1]
use
[1]
scheduled updates
[1]
security risks
spyware/grayware
[1]
security setting violations
configure exceptions
[1]
[2]
configure scan actions
[1]
Sender Filtering
configure
[1]
configure bounced mail settings
[1]
configure Direct Harvest Attack (DHA) settings
[1]
configure spam settings
[1]
configure virus settings
[1]
Sender Filtering Service
about
[1]
Sender Filtering tab
[1]
services
[1]
Sender Filtering Service
[1]
smart protection
[1]
[2]
source
[1]
[2]
sources
comparison
[1]
protocols
[1]
Smart Protection
[1]
[2]
Smart Protection Network
[1]
[2]
Smart Scan
[1]
SMTP
notification server
[1]
SMTP messages
scan
[1]
SMTP routing
[1]
configure
[1]
SMTP settings
configure
[1]
spam settings
configure
[1]
spam text exemption rules
configure
[1]
specify
actions
[1]
route
[1]
scanning conditions
[1]
update source
[1]
spyware/grayware
[1]
adware
[1]
dialers
[1]
entering the network
[1]
hacking tools
[1]
joke program
[1]
password cracking applications
[1]
remote access tools
[1]
risks and threats
[1]
start
EUQ
[1]
support
knowledge base
[1]
resolve issues faster
[1]
TrendLabs
[1]
suspicious IP addresses
display
[1]
system overview tab
[1]
System Status screen
[1]
tabs
add a tab
[1]
Cloud Pre-Filter
[1]
configure a tab
[1]
default tabs
[1]
message traffic
[1]
Sender Filtering
[1]
system overview
[1]
understand
[1]
tag subject
add
[1]
templates
[1]
[2]
[3]
[4]
[5]
[6]
condition statements
[1]
customized
[1]
[2]
[3]
logical operators
[1]
predefined
[1]
TMCM settings
configure
[1]
transport layer
[1]
TrendLabs
[1]
Trend Micro Control Manager
[1]
agent
[1]
server
[1]
troubleshooting
[1]
imssps daemon
[1]
true file type
[1]
understand
Email Encryption
[1]
widgets
[1]
update
automatically
[1]
manually
[1]
pattern files
[1]
scan engine
[1]
system and application
[1]
update source
configure
[1]
specify
[1]
view
archived messages
[1]
messages in the Virtual Analyzer queue
[1]
postponed messages
[1]
product licenses
[1]
quarantined messages
[1]
Virtual Analyzer
[1]
virus settings
configure
[1]
Web EUQ Digest
configure settings
[1]
Web Reputation Services
[1]
[2]
what’s new
[1]
widgets
add a widget
[1]
configure a widget
[1]
edit a widget
[1]
understanding
[1]
using a widget
[1]
wildcards
[1]
file attributes
[1]
Search
Toggle search result highlighting
Configuring Sender Filtering Settings
This chapter provides general descriptions about the various configuration tasks to get
IMSS
up and running.
Topics include:
Sender Filtering Service
Using Email Reputation
Configuring Sender Filtering
Displaying Suspicious IP Addresses and Domains