PDF TrendMicro™ Hosted Email Security
Hosted Email Security
Trend MicroTM Hosted Email Security
Best Practice Guide
? 2020 Trend Micro Inc.
Hosted Email Security
Copyright ? 2020 Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, Trend Micro Security, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Portions of this manual have been reprinted with permission from other Trend Micro documents. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real individual, company, product, or event, unless otherwise noted. Information in this document is subject to change without notice. Authors: Henry Martin Editor: Nancy Jiang Release Date: March 2018 Edited for sensitive terms by Sherwin Lara Paran on December 22, 2020
? 2020 Trend Micro Inc.
Hosted Email Security
Chapter 1: Introduction ............................................................................................................. 1 Chapter 2: Provisioning ........................................................................................................... 2
2.1: On-Premise Mail Server ..................................................................................................................................... 3 2.2: Microsoft Office 365.......................................................................................................................................... 4 2.3: Google G Suite..................................................................................................................................................... 4 2.4: Provisioning Additional Domains ................................................................................................................... 4
Chapter 3: Inbound Mail Protection ...................................................................................... 6
3.1: Malware and 0-Day Threats Protection......................................................................................................... 7 3.2: Spam Protection................................................................................................................................................. 8
3.2.1: Configure IP Reputation Setting........................................................................................................... 8 3.2.2: Add filters to default spam and phish policy .................................................................................... 9 3.2.3: Enable Time-Of-Click Protection ......................................................................................................... 11 3.2.4: Enable the Newletter or Spam-like Policy......................................................................................... 11 3.3: Spoofed Email Protection ............................................................................................................................... 12 3.3.1: Configure the list of High Profile Users for Business Email Compromise filter....................... 13 3.3.2: Create an Anti-Spoof Policy ................................................................................................................ 13 3.3.3: Enable SPF Checking .............................................................................................................................16 3.3.4: Enable DKIM Signature Checking....................................................................................................... 21 3.3.5: Enable DMARC .......................................................................................................................................22 3.3.6: Approved and Blocked Senders.........................................................................................................22 3.3.7: Sender Filter Settings .......................................................................................................................... 23 3.4: Backscatter Spam and Directory Harvest Attacks (DHA) Email Messages ....................................... 23 3.5: Incoming Transport Layer Security (TLS) .................................................................................................24 3.6: Ransomware Protection.................................................................................................................................25
Chapter 4: Outbound Mail Protection.................................................................................26
4.1: Using Outbound Filtering ................................................................................................................................26 4.2: Policies................................................................................................................................................................26
4.2.1: Outbound Virus Policy .......................................................................................................................... 27 4.2.2: Add additional outbound spam and phish policy .......................................................................... 27 4.3: Outgoing Transport Layer Security ............................................................................................................28 4.4: Publish SPF record in DNS ............................................................................................................................28 4.5: DomainKeys Identified Mail Signing............................................................................................................28 4.6: Email Encryption..............................................................................................................................................30
Chapter 5: Other Features and Settings............................................................................32
5.1: Dashboard........................................................................................................................................................... 32 5.2: Approved and Blocked Senders ................................................................................................................... 32 5.3: Sender Filter Settings ..................................................................................................................................... 32 5.4: Regular Expressions........................................................................................................................................ 33 5.5: Scan Exceptions ............................................................................................................................................... 33 5.6: Message Retention and Quarantine Management ..................................................................................34 5.7: Quarantine Digest ............................................................................................................................................36 5.8: General Order of Evaluation ......................................................................................................................... 37 5.9: Bulk Email Sending .......................................................................................................................................... 37 5.10: License Renewal .............................................................................................................................................39 5.11: Account Management.....................................................................................................................................39
? 2020 Trend Micro Inc.
Hosted Email Security 5.12: End-User Management ................................................................................................................................. 40
? 2020 Trend Micro Inc.
Chapter 1: Introduction
Trend Micro Hosted Email Security (HES) is a no-maintenance-required solution that provides continuously updated protection against threats. It uses an extensive combination of engines, patterns, heuristics, and techniques to stop spam, malware, phishing, ransomware, and advanced targeted attacks. Since it is hosted and works at the gateway level, it eliminates any potential threat before they even reach your network.
Hosted Email Security deployment is easy, requiring organizations to simply redirect their MX records. The default settings in Hosted Email Security are strategically optimized to provide immediate protection upon deployment. Configuration tweaks and changes can be done to fit the organization's requirement and allow lots of flexibility.
This Best Practice Guide outlines the best practices when using Trend Micro Hosted Email Security to protect your mailboxes at the gateway level.
? 2020 Trend Micro Inc.
1
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- pdf domain name registration terms and conditions eurid
- pdf setting up office 365 1 tenancy domain and licences rm
- pdf computer networks cs132 eecs148 spring 2013
- pdf virtual mail webhosting dodo
- pdf malicious email campaign faq as of 5 18 2017
- pdf sent via u s mail e mail and fax to 213 243 2539 letter
- pdf phone reliable hosting services media temple
- pdf domain name registration policy progressive
- pdf web hosting getting started guide
- pdf markmonitor comment on the community s and icann s proposed
Related searches
- cisco email security office 365
- office 365 email security settings
- microsoft hosted exchange
- social security application pdf form
- office 365 email security features
- comptia security pdf free download
- social security income and supplemental security income
- how to email pdf from edge
- social security administration security training
- email security settings windows 10
- social security administration supplemental security income
- cheap hosted email