Welcome to our NEW support portal! We are now SonicWall, with a dedicated support site. Learn more.

SonicWALL Email Security OS 8.3 - Administration Guide

This Guide Deployment Planning System Configuration
System > License Management System > Administration System > Network Architecture System > LDAP Configuration System > User View Setup System > Updates System > Monitoring System > Connection Management System > Backup/Restore Settings System > Host Configuration System > Advanced System > Branding System > Certificates System > Audit Trail System > Diagnostics
Anti-Spoofing Anti-Spam Anti-Phishing Anti-Virus Auditing Policy & Compliance Encryption Service Users, Groups & Organizations Junk Box Management Reports and Monitoring Downloads Email Security Update for Split Mode Cipher Set

This Guide

Welcome to the Dell SonicWALL Email Security Administration Guide. This guide provides information about configuring and using the different features for all facets of the Dell SonicWALL Email Security product, including Email Security appliances, the Email Security virtual appliance, and Email Security software.

The document contents include:

This chapter, This Guide, provides a general document overview and describes the conventions used within this guide.
Chapter 2, Deployment Planning , discusses the things you need to define and plan prior to implementing an Email Security product.
Chapter 3, System Configuration , reviews the commands and procedures for configuring Email Security. It focuses on the commands listed under the System option on the user interface.
Chapter 4, Anti-Spoofing , provides an overview and configuration information specific to the Anti-Spoofing feature.
Chapter 5, Anti-Spam , provides an overview and configuration information specific to the Anti-Spam feature.
Chapter 6, Anti-Phishing , describes how to protect your organization from email messages with fraudulent content or the intention to steal consumers’ personal identity and financial credentials.
Chapter 7, Anti-Virus , provides an overview and configuration information specific to the Anti-Virus feature.
Chapter 8, Auditing , describes how you can monitor all emails, both inbound and outbound, that pass through Email Security.
Chapter 9, Policy & Compliance , describes how to write policies to filter messages and their contents as they enter or exit your organization. Note that policies can only be defined only by an administrator.
Chapter 10, Encryption Service , describes how the Encryption Service feature works in tandem with Dell SonicWALL Email Security as a Software-as-a-Service (SaaS), which provides secure mail delivery solutions.
Chapter 11, Users, Groups & Organizations , describes how to manage users in Email Security, sign in as any user, set their message management settings to corporate default, and edit their privileges in the system.
Chapter 12, Junk Box Management , describes how to review and process email messages that have been flagged as spam, virus-infected, organization policy violations, or phishing.
Chapter 13, Reports and Monitoring , provides information on how to view system status and another other Email Security data through the Reports & Monitoring option on the user interface.
Chapter 14, Downloads , reviews the tools available for you to download to enhance your spam-blocking capabilities.
Appendix A, Email Security Update for Split Mode , documents how to update your Dell SonicWALL Email Security hardware or Virtual Appliance solution that was configured in a Split Mode configuration.
Appendix B, Cipher Set , lists the current ciphers included in Email Security.

Go to http://suppport.software.dell.com/sonicwall-email-security/ for the latest version of this guide as well as other Dell SonicWALL products and services documentation.


Was this topic helpful?

[Select Rating]



About this Guide

Welcome to the Dell SonicWALL Email Security Administration Guide. This guide provides information about configuring and using the different features for all facets of the Dell SonicWALL Email Security product, including Email Security appliances, the Email Security virtual appliance, and Email Security software.

The document contents include:

This chapter, This Guide, provides a general document overview and describes the conventions used within this guide.
Chapter 2, Deployment Planning , discusses the things you need to define and plan prior to implementing an Email Security product.
Chapter 3, System Configuration , reviews the commands and procedures for configuring Email Security. It focuses on the commands listed under the System option on the user interface.
Chapter 4, Anti-Spoofing , provides an overview and configuration information specific to the Anti-Spoofing feature.
Chapter 5, Anti-Spam , provides an overview and configuration information specific to the Anti-Spam feature.
Chapter 6, Anti-Phishing , describes how to protect your organization from email messages with fraudulent content or the intention to steal consumers’ personal identity and financial credentials.
Chapter 7, Anti-Virus , provides an overview and configuration information specific to the Anti-Virus feature.
Chapter 8, Auditing , describes how you can monitor all emails, both inbound and outbound, that pass through Email Security.
Chapter 9, Policy & Compliance , describes how to write policies to filter messages and their contents as they enter or exit your organization. Note that policies can only be defined only by an administrator.
Chapter 10, Encryption Service , describes how the Encryption Service feature works in tandem with Dell SonicWALL Email Security as a Software-as-a-Service (SaaS), which provides secure mail delivery solutions.
Chapter 11, Users, Groups & Organizations , describes how to manage users in Email Security, sign in as any user, set their message management settings to corporate default, and edit their privileges in the system.
Chapter 12, Junk Box Management , describes how to review and process email messages that have been flagged as spam, virus-infected, organization policy violations, or phishing.
Chapter 13, Reports and Monitoring , provides information on how to view system status and another other Email Security data through the Reports & Monitoring option on the user interface.
Chapter 14, Downloads , reviews the tools available for you to download to enhance your spam-blocking capabilities.
Appendix A, Email Security Update for Split Mode , documents how to update your Dell SonicWALL Email Security hardware or Virtual Appliance solution that was configured in a Split Mode configuration.
Appendix B, Cipher Set , lists the current ciphers included in Email Security.

Go to http://suppport.software.dell.com/sonicwall-email-security/ for the latest version of this guide as well as other Dell SonicWALL products and services documentation.


Was this topic helpful?

[Select Rating]



Guide Conventions

The following conventions used in this guide are as follows:

Bold

Highlights dialog box, window, and screen names. Also highlights buttons. Also used for file names and text or values you are being instructed to type into the interface.

Italic

Indicates the name of a technical manual. Also indicates emphasis on certain words in a sentence. Sometimes indicates the first instance of a significant term or concept.

Computer code

Indicates sample code or text to be typed into data fields.


Was this topic helpful?

[Select Rating]



Supported platforms

Email Security 8.3 is supported on Dell SonicWALL Email Security appliances, as a software installation on Windows Server systems and as a virtual appliance on VMware ESX® or VMware ESXI™ platforms.


Was this topic helpful?

[Select Rating]



Self Service Tools
Knowledge Base
My SonicWall
Product Support
Professional Services
Software Downloads
Technical Documentation
Training and Certification
Video Tutorials
Related Documents