Administrator's Guide
Total Page:16
File Type:pdf, Size:1020Kb
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: http://docs.trendmicro.com/en-us/enterprise/scanmail-for-microsoft-exchange.aspx Trend Micro, the Trend Micro t-ball logo, Apex Central, eManager, and ScanMail are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2019. Trend Micro Incorporated. All rights reserved. Document Part No.: SMEM148893/191210 Release Date: December 2019 Protected by U.S. Patent No.: 5,951,698 This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product. Detailed information about how to use specific features within the product may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp Privacy and Personal Data Collection Disclosure Certain features available in Trend Micro products collect and send feedback regarding product usage and detection information to Trend Micro. Some of this data is considered personal in certain jurisdictions and under certain regulations. If you do not want Trend Micro to collect personal data, you must ensure that you disable the related features. The following link outlines the types of data that ScanMail for Microsoft Exchange collects and provides detailed instructions on how to disable the specific features that feedback the information. https://success.trendmicro.com/data-collection-disclosure Data collected by Trend Micro is subject to the conditions stated in the Trend Micro Privacy Notice: https://www.trendmicro.com/privacy Table of Contents Preface Preface ................................................................................................................. ix ScanMail Documentation .................................................................................. x Audience .............................................................................................................. x Document Conventions ................................................................................... xi Part I: Introducing ScanMail and Getting Started Chapter 1: Introducing Trend Micro ScanMail for Microsoft Exchange System Requirements ..................................................................................... 1-2 What’s New ...................................................................................................... 1-6 Features and Benefits ..................................................................................... 1-7 Version Comparison .................................................................................... 1-17 How ScanMail Protects the Microsoft Exchange Environment ........... 1-19 About Uncleanable Files ............................................................................. 1-23 ScanMail Technology ................................................................................... 1-23 Chapter 2: Getting Started with ScanMail Getting Started ................................................................................................ 2-2 Understanding the Product Console ........................................................... 2-2 ScanMail Registration ..................................................................................... 2-9 ScanMail Activation ...................................................................................... 2-11 About ScanMail Updates ............................................................................. 2-17 Office 365 Protection with Trend Micro Cloud App Security .............. 2-22 i ScanMail™ for Microsoft™ Exchange 14.0 Patch 2 Administrator’s Guide Chapter 3: Establishing and Maintaining Security for Your Exchange Servers Establishing a Security Baseline .................................................................... 3-2 Maintaining Security ....................................................................................... 3-3 Managing Outbreak Situations ..................................................................... 3-4 Chapter 4: Managing ScanMail Understanding Real-time Monitor ............................................................... 4-2 Understanding the Server Management Console ...................................... 4-4 Starting and Stopping the Services ............................................................ 4-10 Understanding ScanMail Icons ................................................................... 4-10 Part II: Configuring Scans and Scan Filters Chapter 5: Understanding Smart Protection About Trend Micro Smart Protection ......................................................... 5-2 Configuring Local Sources ............................................................................ 5-7 Scan Service Settings ...................................................................................... 5-8 Chapter 6: Configuring Scans About Scans ..................................................................................................... 6-2 Compressed File Handling ............................................................................ 6-6 About ScanMail Actions ................................................................................ 6-9 Notifications .................................................................................................. 6-23 Chapter 7: Configuring Security Risk Scans About Security Risk Scans ............................................................................. 7-2 ScanMail Scan Hierarchy ............................................................................... 7-3 ii Table of Contents Security Risk Scan Actions ............................................................................ 7-6 Enabling Real-time Security Risk Scan ........................................................ 7-7 Configuring Security Risk Scan Targets ...................................................... 7-7 Configuring Security Risk Scan Actions ...................................................... 7-9 Configuring Security Risk Scan Notifications .......................................... 7-13 Chapter 8: Configuring Attachment Blocking About Attachment Blocking ......................................................................... 8-2 Enabling Real-time Attachment Blocking .................................................. 8-3 About the Attachment Blocking Global Policy ......................................... 8-3 Adding an Exception to the Attachment Blocking Global Policy .......... 8-7 Editing an Attachment Blocking Exception ............................................... 8-8 Adding a Customized Policy ....................................................................... 8-10 Editing a Customized Policy ....................................................................... 8-11 Chapter 9: Configuring Content Filtering About Content Filtering ................................................................................ 9-2 Enabling Real-time Content Filtering .......................................................... 9-3 Global Settings ................................................................................................ 9-4 Configuring Content Filtering Policies ........................................................ 9-4 Configuring a Content Filtering Exception .............................................. 9-13 Editing a Content Filtering Policy .............................................................. 9-14 Chapter 10: Configuring Data Loss Prevention About Data Loss Prevention (DLP) .......................................................... 10-2 Data Identifier Types ................................................................................... 10-2 About Data Loss Prevention Templates ................................................. 10-12 About Data Loss Prevention Policies ..................................................... 10-17 iii ScanMail™ for Microsoft™ Exchange 14.0 Patch 2 Administrator’s Guide Chapter 11: Configuring Spam Prevention About Spam Prevention .............................................................................. 11-2 About Email Reputation ............................................................................. 11-3 About Content Scanning ............................................................................. 11-6 Chapter 12: Configuring Advanced Spam Prevention About Advanced Spam Prevention ........................................................... 12-2 Configuring Advanced Spam Prevention Settings .................................. 12-3 Configuring Writing Style Training Settings ............................................. 12-7 Configuring Writing Style Verification Settings ....................................... 12-8 Chapter 13: Configuring Web Reputation About Web Reputation Services ...............................................................