Administrator's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Administrator's Guide Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: https://docs.trendmicro.com/en-us/enterprise/email-security.aspx Trend Micro, the Trend Micro t-ball logo, Remote Manager, Apex Central, Cloud App Security, and Hosted Email Security are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2021. Trend Micro Incorporated. All rights reserved. Document Part No.: APEM09182/210104 Release Date: September 9, 2021 Protected by U.S. Patent No.: Patents pending. This documentation introduces the main features of the service and/or provides installation instructions for a production environment. Read through the documentation before installing or using the service. Detailed information about how to use specific features within the service may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Evaluate this documentation on the following site: https://www.trendmicro.com/download/documentation/rating.asp Privacy and Personal Data Collection Disclosure Certain features available in Trend Micro products collect and send feedback regarding product usage and detection information to Trend Micro. Some of this data is considered personal in certain jurisdictions and under certain regulations. If you do not want Trend Micro to collect personal data, you must ensure that you disable the related features. The following link outlines the types of data that Trend Micro Email Security collects and provides detailed instructions on how to disable the specific features that feedback the information. https://success.trendmicro.com/data-collection-disclosure Data collected by Trend Micro is subject to the conditions stated in the Trend Micro Privacy Notice: https://www.trendmicro.com/privacy Table of Contents About Trend Micro Email Security .......................................... 1 What's New ..................................................................... 1 Service Requirements .................................................... 15 Features and Benefits ..................................................... 17 Available License Versions ............................................. 20 Inbound Message Protection .......................................... 22 Inbound Message Flow ............................................ 23 Outbound Message Protection ........................................ 24 Integration with Trend Micro Products ........................... 25 Apex Central ........................................................... 25 Trend Micro Remote Manager .................................. 27 Getting Started with Trend Micro Email Security ................... 28 Accessing the Trend Micro Email Security Administrator Console ......................................................................... 28 Provisioning a Trend Micro Business Account ................. 31 Setting Up Trend Micro Email Security ...................... 33 Working with the Dashboard ................................................ 34 Threats Tab ................................................................... 37 Ransomware Details Chart ....................................... 38 Threats Chart .......................................................... 38 Threats Details Chart ............................................... 41 Virtual Analyzer File Analysis Details Chart ............... 43 Virtual Analyzer URL Analysis Details Chart .............. 44 Virtual Analyzer Quota Usage Details ........................ 46 Domain-based Authentication Details Chart .............. 47 Blocked Message Details .......................................... 48 Top Statistics Tab ........................................................... 51 Top BEC Attacks Detected by Antispam Engine Chart ............................................................................... 51 Top BEC Attacks Detected by Writing Style Analysis Chart ...................................................................... 51 Top Targeted High Profile Users ................................ 52 i Trend Micro Email Security Administrator's Guide Top Analyzed Advanced Threats (Files) Chart ............ 53 Top Analyzed Advanced Threats (URLs) Chart ........... 53 Top Malware Detected by Predictive Machine Learning Chart ...................................................................... 54 Top Malware Detected by Pattern-based Scanning Chart ............................................................................... 54 Top Spam Chart ....................................................... 55 Top Data Loss Prevention (DLP) Incidents Chart ........ 55 Other Statistics Tab ........................................................ 56 Volume Chart .......................................................... 56 Bandwidth Chart ..................................................... 57 Time-of-Click Protection Chart ................................. 58 Managing Domains .............................................................. 59 Adding a Domain ........................................................... 61 Configuring a Domain .................................................... 63 Adding SPF Records ................................................. 69 Adding Office 365 Inbound Connectors ..................... 70 Adding Office 365 Outbound Connectors ................... 73 Editing or Deleting Domains .......................................... 76 Inbound and Outbound Protection ....................................... 77 Managing Recipient Filter .............................................. 77 Managing Sender Filter .................................................. 77 Sender Filter Settings ............................................... 78 Configuring Approved and Blocked Sender Lists ........ 79 Transport Layer Security (TLS) Peers .............................. 85 Adding Domain TLS Peers ........................................ 88 Editing Domain TLS Peers ........................................ 90 Understanding IP Reputation ......................................... 90 About Quick IP List .................................................. 91 About Standard IP Reputation Settings ...................... 93 About Approved and Blocked IP Addresses ................ 94 IP Reputation Order of Evaluation ............................ 95 Troubleshooting Issues ............................................ 96 Domain-based Authentication ........................................ 97 Sender IP Match ...................................................... 98 Sender Policy Framework (SPF) .............................. 100 DomainKeys Identified Mail (DKIM) ........................ 105 ii Table of Contents Domain-based Message Authentication, Reporting & Conformance (DMARC) .......................................... 112 How DMARC Works with SPF and DKIM .................. 119 File Password Analysis ................................................. 120 Configuring File Password Analysis ......................... 121 Adding User-Defined Passwords .............................. 122 Importing User-Defined Passwords ......................... 122 Configuring Scan Exceptions ........................................ 123 Scan Exception List ................................................ 123 Configuring "Scan Exceptions" Actions .................... 125 High Profile Users ........................................................ 127 Configuring High Profile Users ............................... 127 High Profile Domains ................................................... 130 Configuring High Profile Domains .......................... 130 Configuring Time-of-Click Protection Settings ............... 132 Data Loss Prevention .................................................... 133 Data Identifier Types .............................................. 134 DLP Compliance Templates .................................... 146 Configuring Policies ........................................................... 149 Policy Rule Overview .................................................... 151 Managing Policy Rules ................................................. 152 Reordering Policy Rules ............................................... 154 Naming and Enabling a Rule ......................................... 155 Specifying Recipients and Senders ................................ 156 Inbound Policy Rules ............................................. 156 Outbound Policy Rules ........................................... 158 About Rule Scanning Criteria ........................................ 161 Configuring Virus Scan Criteria .............................. 163 Configuring Spam Filtering Criteria ........................ 166 Configuring Data Loss Prevention Criteria ............... 175 Configuring Content Filtering Criteria ..................... 176 About Rule Actions ....................................................... 192 Specifying Rule Actions .......................................... 193 Intercept Actions ..................................................
Recommended publications
  • Searching for Privacy: How to Protect Your Search Activity
    Searching for Privacy: How to Protect Your Search Activity Abstract: This guide explains how to perform searches anonymously, protecting you from increasingly intrusive tracking and analysis by corporate and governmental organizations. Toll free: 866.760.0222 Toll free: 0808.101.2678 www.ioactive.com Copyright ©2010 by IOActive, Incorporated All Rights Reserved. Contents Understanding the Problem.................................................................................................................. 2 You are not Anonymous ....................................................................................................................... 2 A Solution ............................................................................................................................................. 3 Configuring your computer to perform anonymized searches.............................................................. 5 Conclusion.......................................................................................................................................... 16 References ......................................................................................................................................... 17 About IOActive.................................................................................................................................... 17 Confidential. Proprietary. Understanding the Problem If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place. If you
    [Show full text]
  • Paid Social Trends Iprospect QUARTERLY REPORT | 2017 Q4
    Paid Social Trends iPROSPECT QUARTERLY REPORT | 2017 Q4 By Brittany Richter, VP, Head of Social Media and Katherine Patton, Director, Paid Social iProspect.com COPYRIGHT 2018 © iPROSPECT, INC. ALL RIGHTS RESERVED. iProspect Quarterly Report Paid Social Trends | 2017 Q4 2 Reviewing Overarching Q4 2017 Trends While the cost of inventory continues to rise, so does the value that brands see in paid social advertising. The brands that saw the strongest Q4 business performance were the ones that leveraged the Facebook pixel, optimized toward site engagement (Retail) or Reach (CPG, branding), took advantage of Dynamic Broad Audiences (DABA), and planned content designed for the feed. Based on iProspect client data, paid social continues to drive performance in its own right while also fueling our clients’ first-party data, which can be leveraged to drive cross-channel performance. The following trends and insights are based on analysis of the data from more than 210 brands managed by iProspect U.S. (though the spend is not confined to U.S. mar- kets). The spend data is representative of Facebook, Instagram, Pinterest, Snap, Inc., and Twitter, while performance data is specific to Facebook and Instagram only. SPEND Overall, iProspect’s paid social clients’ total Q4 social spend was up 72% quarter over quarter (QoQ) compared to Q3 2017, and 86% year over year (YoY) when compared to Q4 of 2016. Q4 is consistently the busiest time of the year for many of our clients, so it’s not unusual to see an increase spend as they strive to hit annual goals and capitalize on the holiday time period.
    [Show full text]
  • Longitudinal Study of Links, Linkshorteners, and Bitly Usage on Twitter Longitudinella Mätningar Av Länkar, Länkförkortare Och Bitly An- Vänding På Twitter
    Linköping University | Department of Computer and Information Science Bachelor’s thesis, 16 ECTS | Link Usage 2020 | LIU-IDA/LITH-EX-G--20/001--SE Longitudinal study of links, linkshorteners, and Bitly usage on Twitter Longitudinella mätningar av länkar, länkförkortare och Bitly an- vänding på Twitter Mathilda Moström Alexander Edberg Supervisor : Niklas Carlsson Examiner : Marcus Bendtsen Linköpings universitet SE–581 83 Linköping +46 13 28 10 00 , www.liu.se Upphovsrätt Detta dokument hålls tillgängligt på Internet - eller dess framtida ersättare - under 25 år från publicer- ingsdatum under förutsättning att inga extraordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka ko- pior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervis- ning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säker- heten och tillgängligheten finns lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsman- nens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida http://www.ep.liu.se/. Copyright The publishers will keep this document online on the Internet - or its possible replacement - for a period of 25 years starting from the date of publication barring exceptional circumstances. The online availability of the document implies permanent permission for anyone to read, to down- load, or to print out single copies for his/hers own use and to use it unchanged for non-commercial research and educational purpose.
    [Show full text]
  • Securing Your Email in 13 Steps: the Email Security Checklist Handbook Securing Your Email in 13 Steps
    HANDBOOK Securing Your Email in 13 Steps: The Email Security Checklist handbook Securing Your Email in 13 Steps overview You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because someone fell for a phishing email and wired money to a scammer, while another user inadvertently downloaded and installed malware from an email link that opened a backdoor into the network. Email is as important as the website when it comes to security. As a channel for social engineering, malware delivery and resource exploitation, a combination of best practices and user education should be enacted to reduce the risk of an email-related compromise. By following this 13 step checklist, you can make your email configuration resilient to the most common attacks and make sure it stays that way. 2 @UpGuard | UpGuard.com handbook Securing Your Email in 13 Steps 1. Enable SPF How do you know if an email is really from who it says it’s from? There are a couple of ways to answer this question, and Sender Policy Framework (SPF) is one. SPF works by publishing a DNS record of which servers are allowed to send email from a specific domain. 1. An SPF enabled email server receives an email from [email protected] 2. The email server looks up example.com and reads the SPF TXT record in DNS. 3. If the originating server of the email matches one of the allowed servers in the SPF record, the message is accepted.
    [Show full text]
  • Webtrekk Documentation
    Documentation Webtrekk GmbH | Robert-Koch-Platz 4 | 10115 Berlin Webtrekk Support | [email protected] Teaser Tracking Plugin (v2) Table of Contents 1 Disclaimer 3 1.1 Introduction 4 2 Technical Requirements 5 2.1 Browser Support 5 3 Creating Teaser Parameters 6 4 Configuring and Activating the Plugin 8 4.1 Tag Integration (Web) 8 4.2 JavaScript 10 5 Initializing the Teaser Elements 13 6 Best Practices 16 6.1 View Tracking with Dynamic Teaser Insertion 16 6.2 View Tracking 17 6.3 Customizing a Website Goal 18 6.4 Customizing the Engagement Page 18 12/13/2018 2/18 Teaser Tracking Plugin (v2) 1 Disclaimer This manual is the intellectual property of Webtrekk GmbH. This includes the contents but also all images, tables, and drawings. Change or removal of copyright notices, registering mark or control numbers are not allowed. Any use not permitted by German copyright law requires the prior written consent of the respective author or creator. This applies in particular to reproduction, editing, translation, storage, processing or distribution of contents in databases or other electronic media and systems. Webtrekk GmbH allows the use of the content solely for the contractual purpose. It should be noted that the contents of this manual may be subject to changes, without that a reporting obligation on the part of Webtrekk GmbH can be derived from this. Users of this manual must independently obtain information themselves, whether modified versions or notes to the contents are present, for example on the Internet at https://docs.webtrekk.com/, and take these into account during operation.
    [Show full text]
  • Imail V12 Web Client Help
    Ipswitch, Inc. Web: www.imailserver.com 753 Broad Street Phone: 706-312-3535 Suite 200 Fax: 706-868-8655 Augusta, GA 30901-5518 Copyrights ©2011 Ipswitch, Inc. All rights reserved. IMail Server – Web Client Help This manual, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by such license, no part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the expressed prior written consent of Ipswitch, Inc. The content of this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Ipswitch, Inc. While every effort has been made to assure the accuracy of the information contained herein, Ipswitch, Inc. assumes no responsibility for errors or omissions. Ipswitch, Inc. also assumes no liability for damages resulting from the use of the information contained in this document. Ipswitch Collaboration Suite (ICS), the Ipswitch Collaboration Suite (ICS) logo, IMail, the IMail logo, WhatsUp, the WhatsUp logo, WS_FTP, the WS_FTP logos, Ipswitch Instant Messaging (IM), the Ipswitch Instant Messaging (IM) logo, Ipswitch, and the Ipswitch logo are trademarks of Ipswitch, Inc. Other products and their brands or company names are or may be trademarks or registered trademarks, and are the property of their respective companies. Update History December 2011 v12 April 2011 v11.5 October 2010 v11.03 May 2010 v11.02 Contents CHAPTER 1 Introduction to IMail Web Client About Ipswitch Web Messaging Help ..................................................................................................................
    [Show full text]
  • Introduction to Email
    Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting started, you'll see that with a little bit of practice, email is easy to understand and use. In this lesson, you will learn what email is, how it compares to traditional mail, and how email addresses are written. We'll also discuss various types of email providers and the features and tools they include with an email account. Getting to know email Email (electronic mail) is a way to send and receive messages across the Internet. It's similar to traditional mail, but it also has some key differences. To get a better idea of what email is all about, take a look at the infographic below and consider how you might benefit from its use. Email advantages Productivity tools: Email is usually packaged with a calendar, address book, instant messaging, and more for convenience and productivity. Access to web services: If you want to sign up for an account like Facebook or order products from services like Amazon, you will need an email address so you can be safely identified and contacted. Easy mail management: Email service providers have tools that allow you to file, label, prioritize, find, group, and filter your emails for easy management. You can even easily control spam, or junk email. Privacy: Your email is delivered to your own personal and private account with a password required to access and view emails.
    [Show full text]
  • Overview Trackings
    Overview Trackings Category Tracking Name Description Essential cbAcAuth This cookie is necessary to authenticate an affiliate. Cookies Essential cbAcAuth1 This cookie is necessary to authenticate an affiliate. Cookies Essential This cookie is used to save information about your session so cbsession Cookies that we can correctly process your purchase. Essential This cookie is necessary to authenticate your session on our cbsession1 Cookies platform. Essential This cookie is necessary to process your actions on our cbsession2 Cookies platform. This cookie is used to save important information about your Essential p0 purchase so we can correctly display your purchase Cookies information. Essential This cookie is necessary to correctly process payment provider pr_{transactionId} Cookies information. AB Testing and Machine Learning. Conductrics uses machine Performance learning to optimize website or application behavior to meet Conductrics Cookies defined objectives. Machine learning can be cross-referenced with "targeting" data like geo-location or user segment. Performance enableFlash This cookie is necessary to enable Flash on our website. Cookies Performance Google Optimize Google Optimize is a custom A/B Testing from Google. Cookies A/B Testing from google. Tests different variations of a website Performance Google Optimizer and then tailors it to deliver a personalized experience for each Cookies Asynchronous customer and their business. Performance InsertTask This cookie is necessary to correctly process task information. Cookies Performance License Key Push for Custom script sharing your license key with Acronis. This is Cookies vmProtect required for proper use of their product. Performance This cookie is used to identify that a checkout preview is active preview-{sessionId} Cookies and used to load the checkout preview data.
    [Show full text]
  • Fordcommercialvehiclecenter.Com Privacy Statement
    fordcommercialvehiclecenter.com Privacy Statement 1. General Statement: We respect your privacy and are committed to protecting it. This privacy statement explains our policies and practices regarding online customer information. It is through this disclosure that we intend to provide you with a level of comfort and confidence in how we collect, use, and safeguard personal and other information we collect or that you provide through this website, and how you can contact us if you have any questions or concerns. It is our sincere hope that by explaining our data handling practices we will develop a trusting and long-lasting relationship with you. By using the site, you agree to the terms of this privacy statement. 2. Information About Our Organization and Website and General Data Collection Practices: This Privacy Statement applies to www.fordcommercialvehiclecenter.com is administered by Marketing Associates, 777 Woodward Avenue, Detroit, MI 48226 on behalf of Ford Motor Company. The business purpose of this website is to provide Ford commercial business customers with an online Ford Commercial Vehicle Center dealer locator, and product and upfit incentive information. For added convenience, a select set of site features are accessible from web-enabled mobile devices as a mobile-optimized web experience. These site features may be limited in functionality. Online Tracking Information When you visit this site analytics providers may collect information about your online activity over time and across websites. Because there is not yet a common understanding of how to interpret web browser-based “Do Not Track” (“DNT”) signals other than cookies, Ford Motor Company does not currently respond to undefined “DNT” signals to its US websites.
    [Show full text]
  • Entering SMTP Details in REV MESSAGE Dispatcher
    Entering SMTP Details in REV MESSAGE Dispatcher. To Configure using Internet Mail Server (SMTP) to send Emails please do the following. Select the Email (SMTP) option under the Email tab in the Configure window. Then, click on the SMTP Details button to launch the SMTP Settings window. SMTP details Page 1 Entering SMTP Details in REV MESSAGE Dispatcher. In the User Information enter the Sender Name and the Sender E-mail Address. This is what will appear in the ‘From:’ field when the email is received. For example, we use Message Dispatcher for the Name and [email protected] as the E-mail Address SMTP details Page 2 Entering SMTP Details in REV MESSAGE Dispatcher. Example of what it looks like when the email is viewed. SMTP details Page 3 Entering SMTP Details in REV MESSAGE Dispatcher. The next step is to enter the Outgoing Mail Server SMTP (Simple Mail Transport Protocol) address. You can also use an IP address instead, i.e. 118.208.34.220 SMTP details Page 4 Entering SMTP Details in REV MESSAGE Dispatcher. The final step is to enter your outgoing email account and password information that provided to you by your ISP or Network Administrator. SMTP details Page 5 Entering SMTP Details in REV MESSAGE Dispatcher. There’re also Options for Email Attachment Encoding (MIME and UUEncode) and Email Message Format (HTML Mail Format). To send out long URL link in the email (like we have with the Web Interface link) we recommend you to select the HTML Mail Format option. Now, we just need to click on the Accept button to save these settings SMTP details Page 6 .
    [Show full text]
  • The Search for Consumers of Web-Based Raw DNA Interpretation Services: Using Social Media to Target Hard-To-Reach Populations
    JOURNAL OF MEDICAL INTERNET RESEARCH Cahill et al Original Paper The Search for Consumers of Web-Based Raw DNA Interpretation Services: Using Social Media to Target Hard-to-Reach Populations Tiernan J Cahill1, MA; Blake Wertz1, MA; Qiankun Zhong1, MA; Andrew Parlato1, MA; John Donegan1, MA, MBA; Rebecca Forman1, MA; Supriya Manot1, MA; Tianyi Wu1, MA; Yazhu Xu1, MA; James J Cummings1, PhD; Tricia Norkunas Cunningham2, MPH, MA; Catharine Wang2, PhD, MSc 1Division of Emerging Media, Boston University College of Communication, Boston, MA, United States 2Department of Community Health Sciences, Boston University School of Public Health, Boston, MA, United States Corresponding Author: Catharine Wang, PhD, MSc Department of Community Health Sciences Boston University School of Public Health 801 Massachusetts Avenue Boston, MA, 02118 United States Phone: 1 617 358 1475 Email: [email protected] Related Article: This is a corrected version. See correction statement in: http://www.jmir.org/2019/8/e15735/ Abstract Background: In recent years, there has been a proliferation of third-party Web-based services available to consumers to interpret raw DNA from direct-to-consumer genetic testing companies. Little is known about who uses these services and the downstream health implications. Identifying this hard-to-reach population of consumers for research raised questions about the most effective recruitment methods to undertake. Past studies have found that Web-based social media survey distribution can be cost-effective for targeting hard-to-reach populations, yet comparative efficacy information across platforms is limited. Objective: The aim of this study was to identify the most effective Web-based strategies to identify and recruit the target population of direct-to-consumer genetic testing users who also made use of third-party interpretation services to analyze their raw genetic data.
    [Show full text]
  • Webtrends Administration User's Guide
    WebTrends Administration User’s Guide July 2009 Edition | © 2009 WebTrends Inc. Documentation Center Send Feedback Disclaimer This document and the software described in this document are furnished under and are subject to the terms of a license agreement or a non-disclosure agreement. EXCEPT AS EXPRESSLY SET FORTH IN A LICENSE AGREEMENT, WEBTRENDS INC. PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. You agree that you shall not loan, sell, or otherwise transfer this document or the software described in this document. Except as expressly set forth in a license agreement, you agree that you shall not reproduce, store in a retrieval system, or transmit in any form or by any means, electronic, mechanical, or otherwise, all or any part of this document or the software described in this document. Some companies, names, and data in this document are used for illustration purposes and do not represent real companies, individuals, or data. This document may include technical inaccuracies or typographical errors. WebTrends Inc. may make improvements in or changes to the software described in this document at any time. © 1996-2009 WebTrends Inc. All rights reserved. U.S. Government Restricted Rights: The software is "commercial software." If the software and documen- tation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R.
    [Show full text]