Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.

Slides:



Advertisements
Similar presentations
1 Effective, secure and reliable hosted security and continuity solution.
Advertisements

Basic Communication on the Internet:
· SoftScan Solna Strandväg Solna Sweden The less you hear from us the better Shhh… The less.
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Introductory Presentation. Agenda Why CronLab? Anti Spam Archiving Web Filter 1.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Exchange 2003 and SPAM Fighting Emmanuel Ormancey, Rafal Otto Internet Services Group Department of Information Technology CERN 3 June 2015.
What’s New in WatchGuard XCS 10.0 Update 2 WatchGuard Training.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Using the Engaging Networks tools Ghazal Vaghedi Toronto February 21, 2012 #12ENCONF.
October 16, Community Conference Broadcast tool Marta Fornal de Seixas: Engaging Networks.
Broadcast service Core tools. Agenda 1.Introduction – tool and its main features 2.Setting up and sending a simple broadcast 3.Achieving.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Spam Reduction Techniques Using greylisting and SpamAssassin.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Filter Services. Advantages of Using Spam Filters Effective Filter Bigger Bandwidth Space Easy Interface Accurate Results.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
1 New : Create your own message starting from scratch 2 New From Template: add professionally designed templates provided exclusively by Gorilla Contact.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
What’s New in WatchGuard XCS v9.1 Update 2. WatchGuard XCS v9.1 Update 2  Introduce New Features WatchGuard XCS Outlook Add-in Secur Encryption.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Presented By: Product Activation Group Syndication.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
What’s New in WatchGuard XCS v9.1. Introducing WatchGuard XCS v9.1  Enhancements that improve ease of use Improved web-based installation wizard After.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
 2:00 pm - 2:15 p.m. ◦ Intro, Welcome and Overview of Agenda  2:15 p.m. - 3:00 p.m. – Admin Training ◦ Introduction to Live at EDU and roadmap.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
What’s New in WatchGuard XCS v9.2. WatchGuard XCS v9.2  New Feature Introduction  Ease of use enhancements  Frequent Tasks page  DLP and QMS Wizards.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Module 6 Planning and Deploying Messaging Security.
Norman Protection Powerful and flexible Protection Gateway.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Content Control Stewart Duncan Technical Manager.
Tired of Spam? The solution is MailWasher
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
Module 7 Planning and Deploying Messaging Compliance.
FP6 IT System 1 ELECTRONIC PROPOSAL SUBMISSION SYSTEM.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Security fundamentals Topic 9 Securing internet messaging.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Enterprise Messaging & Collaboration. e-Interact Modules.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
What’s New in Fireware v WatchGuard Training.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
Prototype Security New Feature: Send Mass & Activity Code.
Windows Vista Configuration MCTS : Productivity Applications.
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
Demo Advanced Threat Protection
Birdville ISD SPAM Filter – Self management portal
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
This is the Sign In page for the Dashboard
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

Client X CronLab Spam Filter Technical Training Presentation 19/09/2015

Technical information 1 Detailed Information 1. Rate Control Controls spam high volume, by giving a soft reject to IP numbers with too high volumes of per minute If the is valid, the sender will try again This feature helps to keep legitimate s passing through, even when servers are under spam attacks 2. Address Verification Verifies the address is valid by checking with the receiving server During recipient of the first to a new address a probe is sent to the receiving server to validate the address This method simplifies the integration with the server and avoids Active Directory or LDAP setup The address status is stored in a database which is updated on a regular basis If the address is invalid, the – along with future s to that address - is rejected. The testing of the address validity is updated every 3 hours If the address is valid, the – along with future s to that address - goes through to further analysis. The testing of the address validity is updated every 7 days Spam Control Flow Incoming Rate control Address verification Virus scanning Spam detection Auto averaging FP prevention Delivery Quarantine User Message Center Delete / Release Stored for deletion Reject Stored for deletion DNS & URL blacklists Hash database comparison Statistic analysis (incl. Bayes) Content analysis Sender Policy Framework verification

Technical information (continued) 2 3. Virus Scanning is scanned for viruses using ClamAV anti-virus engine. BitDefender available as an add-on service. 4. Spam Detection The is analysed for spam in a scoring system and undergoes the following checks against: Sets of commercial and freely available blacklists & whitelists Internal server blacklists and whitelists CronLab proprietary blacklists and whitelist Hash databases Internal content analysis databases SPF records Internal statistical analysis tools, including a Bayes database Detailed Information Spam Control Flow Incoming Rate control Address verification Virus scanning Spam detection Auto averaging FP prevention Delivery Quarantine User Message Center Delete / Release Stored for deletion Reject Stored for deletion DNS & URL blacklists Hash database comparison Statistic analysis (incl. Bayes) Content analysis Sender Policy Framework verification

Technical information (continued) 3 5. Auto Averaging Adjusts scoring of based on historical data This uses a combination of the receiving address and the sender’s IP cluster If the comes from a known valid sender and still looks like spam, the auto-averaging will lower the score based on historical data to allow the to pass through If the comes from a known spammer to the receiving address, the is likely to be stopped even if it looks valid 6. FP Prevention If an is marked as a false positive, the sending server is automatically added to a whitelist, preventing future s from that server to end up in the quarantine 7. Delivery If is deemed to be legitimate it is delivered straight to the receiving server Detailed Information Spam Control Flow Incoming Rate control Address verification Virus scanning Spam detection Auto averaging FP prevention Delivery Quarantine User Message Center Delete / Release Stored for deletion Reject Stored for deletion DNS & URL blacklists Hash database comparison Statistic analysis (incl. Bayes) Content analysis Sender Policy Framework verification

Technical information (continued) 4 8. Quarantine If the is likely to be spam, but its status cannot definitely be established, then the is sent to the quarantine All s in the quarantine are subject to further analysis every hour for potential re-categorization. This minimizes the volume of s in the quarantine The quarantine is user-based. Each user manages his own quarantine login information in a web based message center. Users can also delegate handling of their quarantine to other users of the CronLab spam filter On the first visit message center visit, the user registers for a password which can easily be changed (or reset) More information about message center is available on future slides 9. Stored for Deletion If ed is determined to be spam or to contain a virus, the is stored for 30 days before deletion The 30 day storage of spam allows administrator to retrieve a potential false positive Detailed Information Spam Control Flow Incoming Rate control Address verification Virus scanning Spam detection Auto averaging FP prevention Delivery Quarantine User Message Center Delete / Release Stored for deletion Reject Stored for deletion DNS & URL blacklists Hash database comparison Statistic analysis (incl. Bayes) Content analysis Sender Policy Framework verification

Technical information (continued) Learning and Adapting All actions taken by the system or the user are added back to the internal learning engine Users can report false negatives as spam by clicking on the footer at the bottom of the (unless the user opts out from this feature in the message center) If a user reports an as spam or ham, this will result in updating of internal statistical databases as well as blacklists and whitelists Detailed Information Spam Control Flow Incoming Rate control Address verification Virus scanning Spam detection Auto averaging FP prevention Delivery Quarantine User Message Center Delete / Release Stored for deletion Reject Stored for deletion DNS & URL blacklists Hash database comparison Statistic analysis (incl. Bayes) Content analysis Sender Policy Framework verification

Message Center 6 Detailed Information The message center enables access to the user’s quarantine All s can be reported: As legitimate - after which they are released back to the user. This also updates internal statistical databases as well as blacklists and whitelists As spam - after which they are deleted. This also updates internal statistical databases as well as blacklists and whitelists As ignored - after which they are merely deleted Users receive a notification in the morning if the content of the quarantine has changed Quarantine Search Engine The Postmaster of a domain can access all s received in the last 30 days and release potential false positives back to the relevant user Users can search through their own s, up to 30 days old and release potential false positives The Postmaster can also see mail log extracts for recent s to help search for potential problems footers can be switched on/off Can toggle all footers or footers applied to incoming s only This will prevent the user from reporting s as spam but might be desired for some users nonetheless Phishing filters can be switched on/off Sites that the user deem safe from phishing attacks can be reported Any report results in further analysis by CronLab’s support team Delegation of quarantine Users can delegate the quarantine, e.g. when having multiple addresses or if an administrator is to take care of their quarantine This results in an aggregated quarantine for all the addresses that the delegated recipient is to manage

Outgoing Filter: Send s securely from anywhere, while reducing reputational risk 7 End user station s sent to recipient Spam and Viruses Administrator alerted Encrypted communication to CronLab. Communication to recipient encrypted if possible. Availability: Ensure safe delivery of s no matter where you are. Works on all networks with all servers and clients, including mobile phones Alarms: Alarms are sent to the administrator if a computer starts sending out spam or viruses Security: All communication is handled through strong TLS or SSL encryption Prevents blacklisting: Minimize risk of your domain being blacklisted as spam and viruses are removed before they reach the recipient Validity control: Users can only send s from their own address, using their own accounts. Domain accounts can be set up for authorized relaying servers to allow senders from all domain accounts and even from several domains CronLab’s cluster

Attachment Saver (EAS), an add-on that simplifies sending large files 8 User A sends large file as attachment CronLab cluster replaces attachment with link; saves attachment User B receives with link and downloads file from CronLab luster EAS Benefits The EAS uses a format known to users ( ) - no training or extra programs required It saves network bandwidth and avoids bouncing s It reduces user frustration common when trying (and failing) to transfer large files

Further important technical facts 9 Treatment of potentially dangerous files CronLab’s clusters are redundant and geographically distributed To speed up communications, CronLab chooses not to use greylisting in its filters No s are blocked if receiving address is valid Potentially dangerous files that are still not viruses (e.g. exe-files or bat- files) are removed from the and replaced by a text-file containing information on the danger of the file and, if permitted by postmaster, a link to a website where the user can retrieve the file All domains will receive multiple MX pointers s are scanned by several geographically distributed servers. The servers are however always country-specific CronLab does not apply greylisting to control for spam Significantly speeds up communication As long as the receiving address is valid, an will always be retrieved and analyzed, no matter what the reputation of the IP address is If an has been wrongly classified as spam, the can still be retrieved by the user or the postmaster for a period of 30 days

Thank you! Questions? Full tests of Pro 2000 Anti-Spam Appliance available at Full tests of Light 1100 Anti-Spam Appliance available at 10