Deep Discovery Email Inspector 3.6 > Appendices
        • Online Help Center Home

        • Privacy and Personal Data Collection Disclosure
        • Home
          • Documentation
          • Audience
          • Document Conventions
          • About Trend Micro
        • Introduction
          • About Deep Discovery Email Inspector
            • What's New
            • Features and Benefits
              • Advanced Detection
              • Features and Benefits
              • Flexible Deployment
              • Policy Management
              • Custom Threat Simulation Sandbox
              • Email Attachment Analysis
              • Embedded URL Analysis
              • Email Encryption
              • Spam Scanning
              • Graymail Scanning
              • Sender Filtering
              • Sender Authentication
              • Content Filtering
              • Data Loss Prevention
              • End-User Quarantine
              • Social Engineering Attack Protection
              • Password Derivation
          • A New Threat Landscape
            • Spear-Phishing Attacks
            • C&C Callback
          • A New Solution
            • Virtual Analyzer
            • Advanced Threat Scan Engine
            • Predictive Machine Learning
            • Web Reputation Services
            • Social Engineering Attack Protection
            • Apex Central
            • Deep Discovery Director
        • Getting Started
          • Getting Started Tasks
          • Management Console Navigation
        • Dashboard
          • Dashboard Overview
          • Tabs
            • Predefined Tabs
            • Tab Tasks
            • New Tab Window
          • Widgets
            • Adding Widgets to the Dashboard
            • Widget Tasks
            • Overview
              • Detection Summary Widget
              • Sender Filtering/Authentication Widget
              • Quarantined Messages Widget
              • Top Policy Violations Widget
              • Message Queues Widget
              • Processed Messages Widget
            • Threat Monitoring
              • Attack Sources Widget
              • High-Risk Messages Widget
              • Detected Messages Widget
              • Advanced Threat Indicators
              • Time-of-Click Protection Widget
            • Top Trends
              • Top Attachment Names Widget
              • Top Attachment Types Widget
              • Top Affected Recipients Widget
              • Top Attack Sources Widget
              • Top Callback Hosts from Virtual Analyzer Widget
              • Top Callback URLs from Virtual Analyzer Widget
              • Top Email Subjects Widget
            • System Status
              • Processing Volume Widget
              • Hardware Status Widget
            • Virtual Analyzer
              • Messages Submitted to Virtual Analyzer Widget
              • Average Virtual Analyzer Processing Time Widget
              • Suspicious Objects from Virtual Analyzer Widget
        • Detections
          • Detected Risk
            • Email Message Risk Levels
            • Virtual Analyzer Risk Levels
          • Threat Type Classifications
          • Exporting Search Results
          • Detected Messages
            • Viewing Detected Messages
              • Detected Message Search Filters
                • Applying Advanced Filters
            • Investigating a Detected Message
              • Email Message Details
            • Viewing Affected Recipients
            • Viewing Attack Sources
            • Viewing Senders
            • Viewing Email Subjects
          • Suspicious Objects
            • Viewing Suspicious Hosts
            • Viewing Suspicious URLs
            • Viewing Suspicious Files
            • Viewing Synchronized Suspicious Objects
          • Quarantine
            • Viewing Quarantined Messages
              • Quarantine Search Filters
                • Applying Advanced Filters
              • Quarantine Reasons
            • Investigating a Quarantined Email Message
              • Quarantined Message Details
          • Sender Filtering/Authentication
            • Viewing Sender Filtering/Authentication Detections
        • Policies
          • About Policies
            • General Message Scanning Order
            • Policy Management Guidelines
            • Policy Actions
            • Policy Matching
            • Policy Splintering
          • Policy List
            • Configuring a Policy
            • Address Groups
              • Adding an Address Group
              • Editing an Address Group
          • Policy Rules
            • Content Filtering Rules
              • Configuring a Content Filtering Rule
                • Scanning Conditions for Attachments
                • Adding Keyword Lists or Expressions
            • Data Loss Prevention (DLP) Rules
              • Configuring a DLP Rule
            • Antispam Rules
              • Configuring an Antispam Rule
            • Threat Protection Rules
              • Configuring a Threat Protection Rule
          • Policy Objects
            • Notifications
              • Configuring Recipient Notification
            • Message Tags
              • Specifying Message Tags
            • Redirect Pages
              • Customizing the Redirect Pages
            • Archive Servers
              • Configuring an Archive Server
            • Data Identifiers
              • Expressions
                • Predefined Expressions
                  • Viewing Settings for Predefined Expressions
                • Customized Expressions
                  • Criteria for Customized Expressions
                  • Configuring a Customized Expression
                • Importing Expressions
                • Exporting Expressions
              • File Attributes
                • Predefined File Attributes List
                • Configuring File Attributes
                • Importing File Attributes
                • Exporting File Attributes
              • Keyword Lists
                • Predefined Keyword Lists
                • Customized Keyword Lists
                  • Criteria for Customized Keyword Lists
                  • Configuring a Keyword List
                • Importing Keyword Lists
                • Exporting Keyword Lists
            • Data Loss Prevention (DLP) Templates
              • Predefined DLP Templates
              • Customized DLP Templates
                • Condition Statements and Logical Operators
                • Creating a DLP Template
                • Importing DLP Templates
                • Exporting DLP Templates
          • Policy Exceptions
            • Configuring Message Exceptions
            • Managing Object Exceptions
              • Adding an Object Exception
              • Importing Object Exceptions
            • Configuring URL Keyword Exceptions
            • Graymail Exceptions
              • Adding a Graymail Exception
              • Importing Graymail Exceptions
            • Configuring Email Encryption Exceptions
        • Alerts and Reports
          • Alerts
            • Critical Alerts
            • Important Alerts
            • Informational Alerts
            • Configuring Alert Notifications
            • Viewing Triggered Alerts
              • Managing Alerts
            • Alert Notification Parameters
              • Critical Alert Parameters
              • Important Alert Parameters
              • Informational Alert Parameters
          • Reports
            • Scheduling Reports
            • Generating On-Demand Reports
        • Logs
          • Time-Based Filters and DST
          • Email Message Tracking
            • Querying Message Tracking Logs
          • MTA Events
            • Querying MTA Event Logs
          • System Events
            • Querying System Event Logs
          • Message Queue Logs
            • Querying Message Queue Logs
            • Rerouting Messages in Message Queues
          • Email Submission Logs
            • Querying Email Submission Logs
          • Time-of-Click Protection Logs
            • Querying Time-of-Click Protection Logs
              • Applying Advanced Filters
        • Administration
          • Component Updates
            • Components
            • Update Source
              • Configuring the Update Source
            • Updating Components
            • Rolling Back Components
            • Scheduling Component Updates
          • Product Updates
            • System Updates
            • Managing Patches
            • Upgrading Firmware
          • Scanning / Analysis
            • Email Scanning
            • Virtual Analyzer
              • Virtual Analyzer Overview
                • Virtual Analyzer Statuses
                • Overall Status Table
                • Virtual Analyzer Images
                  • Virtual Analyzer Image Preparation
                  • Importing Virtual Analyzer Images
                    • Importing an Image from a Local or Network Folder
                    • Importing an Image from an HTTP or FTP Server
                  • Deleting Virtual Analyzer Images
                  • Modifying Instances
              • Configuring Virtual Analyzer Network and Filters
                • Certified Safe Software Service
                • Virtual Analyzer Network Types
                • Virtual Analyzer File Submission Filters
              • Configuring an External Virtual Analyzer
            • Email Submissions
              • Manually Submitting Email Message Samples
            • URL Scanning
              • Disabling URL Scanning
            • File Passwords
              • Password-protected File Types
              • Adding File Passwords
              • Importing File Passwords
            • Smart Protection
              • About Smart Protection Server
              • Setting Up Smart Protection Server
              • Configuring Smart Protection Settings
            • Smart Feedback
              • Enabling Smart Feedback
            • YARA Rules
              • Creating a YARA Rule File
              • Adding a YARA Rule File
              • Editing a YARA Rule File
              • Deleting a YARA Rule File
              • Exporting a YARA Rule File
            • Time-of-Click URL Protection
              • Configuring Time-of-Click Protection Settings
            • Business Email Compromise
              • Adding a High-Profile User
              • Adding an Internal Domain
              • Adding an Approved Sender
          • Sender Filtering/Authentication Settings
            • Sender Filter Order of Evaluation
            • SMTP Error Codes
            • Approved Senders List
              • Adding Approved Senders
            • Blocked Senders List
              • Adding Blocked Senders
            • Enabling Email Reputation Services
            • Configuring DHA Protection Settings
            • Configuring Bounce Attack Protection Settings
            • Configuring SMTP Traffic Throttling Settings
            • Sender Policy Framework (SPF)
              • Configuring SPF Settings
            • DomainKeys Identified Mail (DKIM)
              • Configuring DKIM Authentication Settings
              • DKIM Signatures
                • Configuring a DKIM Signature
                • Importing DKIM Signatures
            • Domain-based Message Authentication, Reporting & Conformance (DMARC)
              • Configuring DMARC Settings
          • End-User Quarantine
            • Configuring User Quarantine Access Settings
              • Adding an SMTP Server for EUQ Authentication
            • EUQ Digest
              • Inline Action Links
              • Configuring EUQ Digest Settings
            • End-User Quarantine Console
              • Accessing the End-User Quarantine Console
              • Viewing Quarantined Messages
              • Adding Approved Senders
              • Viewing Quarantined Messages for Distribution Lists
          • Mail Settings
            • Message Delivery
            • Configuring SMTP Connection Settings
              • Configuring TLS Settings
            • Configuring Message Delivery Settings
              • Importing Message Delivery Settings
            • Configuring Limits and Exceptions
            • Configuring the SMTP Greeting Message
            • Edge MTA Relay Servers
              • Configuring Edge MTA Relay Servers
            • Internal Domains
              • Adding Internal Domains
              • Importing Internal Domains
          • Integrated Products/Services
            • Integrated Trend Micro Products
            • Apex Central
              • Apex Central Features
              • Apex Central Components
              • Registering to Apex Central
              • Unregistering from Apex Central
            • Deep Discovery Director
              • Deep Discovery Director Registration Considerations
              • Registering to Deep Discovery Director
              • Unregistering from Deep Discovery Director
            • Threat Intelligence Sharing
              • Configuring Threat Intelligence Sharing Settings
            • Auxiliary Products/Services
              • Trend Micro TippingPoint Security Management System (SMS)
                • Configuring Trend Micro TippingPoint Security Management System (SMS)
              • Check Point Open Platform for Security (OPSEC)
                • Configuring Check Point Open Platform for Security (OPSEC)
                • Preconfiguring a Security Gateway
                • Configuring a Secured Connection
              • IBM Security Network Protection
                • Configuring IBM Security Network Protection
              • Palo Alto Panorama or Firewalls
                • Configuring Palo Alto Panorama and Firewalls
            • Microsoft Active Directory
              • Configuring Microsoft Active Directory Settings
            • Log Settings
              • Adding a Syslog Server
              • Editing Syslog Server Profiles
            • SFTP
            • Email Encryption
              • Registering Domains for Email Encryption
              • Configure Default Email Identity for Message Signing
          • System Settings
            • Network Settings
              • Configuring Network Settings
            • Operation Modes
              • Monitoring Rules for SPAN/TAP Mode
                • Adding a Monitoring Rule
                • Editing a Monitoring Rule
                • Deleting a Monitoring Rule
            • Configuring Proxy Settings
            • Configuring the Notification SMTP Server
            • Configuring System Time
            • SNMP
              • Configuring Trap Messages
              • Configuring Manager Requests
            • Configuring Session Timeout Setting
          • Accounts / Contacts
            • Managing Accounts
              • Account Role Classifications
              • Adding a Local User Account
              • Adding an Active Directory User Account or Group
              • Editing Accounts
              • Deleting Accounts
              • Unlocking a Locked Account
            • Changing Your Password
            • Managing Contacts
          • System Maintenance
            • Backing Up or Restoring a Configuration
              • License Compatibility
              • Backup Recommendations
              • Backing Up a Configuration
              • Restoring a Configuration
            • Configuring Storage Maintenance
            • Powering Off or Restarting Deep Discovery Email Inspector
            • Debug Logs
              • Exporting Debugging Files
              • Configuring Log Level
            • Testing Network Connections
          • Licenses
            • Maintenance Agreement
            • Activation Codes
            • Product License Status
            • Viewing Your Product License
            • Activating or Renewing Your Product License
          • About Deep Discovery Email Inspector
        • Technical Support
          • Troubleshooting Resources
            • Using the Support Portal
            • Threat Encyclopedia
          • Contacting Trend Micro
            • Speeding Up the Support Call
          • Sending Suspicious Content to Trend Micro
            • Email Reputation Services
            • File Reputation Services
            • Web Reputation Services
          • Other Resources
            • Download Center
            • Documentation Feedback
        • Appendices
          • Transport Layer Security
            • About Transport Layer Security
            • Deploying Deep Discovery Email Inspector in TLS Environments
            • Prerequisites for Using TLS
              • Obtaining a Digital Certificate
              • Ensure that the Certificate Format is Valid
            • Configuring TLS Settings for Incoming Messages
            • Configuring TLS Settings for Outgoing Messages
            • Creating and Deploying Certificates
              • Creating the Certificate Authority Key and Certificate
              • Creating the Deep Discovery Email Inspector Private Key and Certificate
              • Creating the Keys and Certificates for Other Servers
              • Signing the Deep Discovery Email Inspector Certificate
              • Uploading Certificates
          • Using the Command Line Interface
            • Using the CLI
            • Entering the CLI
            • Command Line Interface Commands
              • Entering Privileged Mode
              • CLI Command Reference
                • configure product management-port
                • configure product operation-mode
                • configure network basic
                • configure network dns
                • configure network hostname
                • configure network interface
                • configure network route add
                • configure network route default
                • configure network route del
                • configure network route del default/default ipv6
                • configure service nscd disable
                • configure service nscd enable
                • configure service ssh disable
                • configure service ssh enable
                • configure service ssh port
                • configure service ntp
                • configure system date
                • configure system password enable
                • configure system timezone
                • enable
                • exit
                • help
                • history
                • logout
                • ping
                • ping6
                • start task postfix drop
                • start task postfix flush
                • start task postfix queue
                • start service nscd
                • start service postfix
                • start service product
                • start service ssh
                • stop process core
                • stop service nscd
                • stop service postfix
                • stop service product
                • stop service ssh
                • reboot
                • resolve
                • show storage statistic
                • show network
                • show kernel
                • show service
                • show memory
                • show process
                • show product-info
                • show system
                • shutdown
                • traceroute
          • Notification Message Tokens
            • Recipient Notification Message Tokens
            • Alert Notification Message Tokens
          • Connections and Ports
            • Service Addresses and Ports
            • Ports Used by the Appliance
          • SNMP Object Identifiers
            • SNMP Query Objects
            • SNMP Traps
            • Registration Objects
          • IPv6 Support in Deep Discovery Email Inspector
            • Configuring IPv6 Addresses
            • Configurable IPv6 Addresses
              • Management Console IPv6 Addresses
          • System Event Logs
          • Sender Authentication Error Codes
          • Glossary

        Appendices

        • Transport Layer Security
        • Using the Command Line Interface
        • Notification Message Tokens
        • Connections and Ports
        • SNMP Object Identifiers
        • IPv6 Support in Deep Discovery Email Inspector
        • System Event Logs
        • Sender Authentication Error Codes
        • Glossary