MailMarshal SMTP 5.5 User Guide
Transcription
MailMarshal SMTP 5.5 User Guide
User Guide MailMarshal SMTP 5.5 August 2006 THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, MARSHAL LIMITED PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME JURISDICTIONS DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of Marshal, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of Marshal. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. Marshal may make improvements in or changes to the software described in this document at any time. © 2006 Marshal Limited, all rights reserved. U.S. Government Restricted Rights: The software and the documentation are commercial computer software and documentation developed at private expense. Use, duplication, or disclosure by the U.S. Government is subject to the terms of the Marshal standard commercial license for the software, and where applicable, the restrictions set forth in the Rights in Technical Data and Computer Software clauses and any successor rules or regulations. Marshal, MailMarshal, the Marshal logo, WebMarshal, Security Reporting Center and Firewall Suite are trademarks or registered trademarks of Marshal Limited or its subsidiaries in the United Kingdom and other jurisdictions. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies. Contents About This Book and the Library ...........................................................................................................xv Conventions ..............................................................................................................................................xvi About Marshal .........................................................................................................................................xvii Chapter 1 Introducing MailMarshal 1 What Does MailMarshal Do? ....................................................................................................................1 Where is MailMarshal Installed? ................................................................................................................2 How Does MailMarshal Work? .................................................................................................................3 Virus Scanning .............................................................................................................................................4 Encrypted Email ..........................................................................................................................................4 MailMarshal SMTP and MailMarshal Exchange ....................................................................................5 What’s New? ................................................................................................................................................5 New Features in MailMarshal 5.5 ..............................................................................................5 Online Help ..................................................................................................................................................6 Chapter 2 Pre-Installation 7 Hardware Required for MailMarshal Server ............................................................................................7 Software Required for MailMarshal Server .............................................................................................8 Software Required for Other Components .............................................................................................9 Email Routing ..............................................................................................................................................9 How MailMarshal Routes Email ..............................................................................................10 Setting up Outbound Routing ..................................................................................................10 Setting up Inbound Routing .....................................................................................................10 When Installing MailMarshal on the Existing Email Server ................................................11 Gathering Information Before Installation ...........................................................................................16 Contents iii Chapter 3 Installation 17 Procedures to Install MailMarshal Server ............................................................................................. 18 Preliminary Steps: ..................................................................................................................... 18 Configuration Wizard ................................................................................................................ 18 Configuring an Existing Email Server .................................................................................... 32 MailMarshal and Proxy Servers ............................................................................................... 33 MailMarshal Console Installation ........................................................................................................... 34 Console Security Issues ............................................................................................................. 35 MailMarshal Configurator Remote Installation .................................................................................... 36 Uninstalling MailMarshal ......................................................................................................................... 37 Chapter 4 Monitoring and Control 39 The Configurator ...................................................................................................................................... 39 Server Properties ........................................................................................................................ 41 Configurator Root ...................................................................................................................... 41 Services and Arrays .................................................................................................................... 41 Rulesets ........................................................................................................................................ 42 User Groups ............................................................................................................................... 42 POP3 Accounts .......................................................................................................................... 43 Virus Scanners ............................................................................................................................ 43 External Commands .................................................................................................................. 43 Folders ......................................................................................................................................... 43 Email Templates ........................................................................................................................ 43 TextCensor Scripts ..................................................................................................................... 44 Logging Classifications .............................................................................................................. 44 Message Stamps .......................................................................................................................... 44 LDAP Connections ................................................................................................................... 44 Secure Email ............................................................................................................................... 45 News and Support ..................................................................................................................... 45 Windows Event Log ................................................................................................................................. 45 iv User Guide Windows Performance Counters ............................................................................................................45 Chapter 5 Rulesets and Rules 47 Best Practices .............................................................................................................................................48 Viewing and Printing Rulesets .................................................................................................................49 Creating a Ruleset .....................................................................................................................................50 Editing a Ruleset .......................................................................................................................................54 To Copy or Move Rules Between Rulesets ............................................................................54 To Enable or Disable a Ruleset ................................................................................................54 Order of Evaluation .................................................................................................................................54 Adjusting the Order of Evaluation of Rulesets .....................................................................55 Adjusting the Order of Evaluation of Rules ..........................................................................55 Creating a New Rule .................................................................................................................................55 Copying a Rule ...........................................................................................................................................59 Editing a Rule .............................................................................................................................................59 User Matching Criteria ............................................................................................................................59 Contents v Rule Conditions–Standard Rules ............................................................................................................ 61 Where message attachment is of type ..................................................................................... 62 Where attachment fingerprint is/is not known ..................................................................... 63 Where message size is ............................................................................................................... 63 Where the estimated bandwidth required to deliver this message is ................................. 64 Where message contains attachments named ........................................................................ 64 Where message triggers text censor script(s) ......................................................................... 64 Where the result of a virus scan is ........................................................................................... 66 Where the external command is triggered ............................................................................. 69 Where attachment parent is of type ........................................................................................ 69 Where message attachment size is ........................................................................................... 70 Where number of recipients is count ...................................................................................... 70 Where message contains one or more headers ..................................................................... 70 Where number of attachments is count ................................................................................. 71 Where message is categorized as Category ............................................................................ 72 Where message spoofing analysis is based on criteria .......................................................... 72 Rule Actions–Standard Rules .................................................................................................................. 74 Copy the message ....................................................................................................................... 75 BCC a copy of the message ...................................................................................................... 75 Run the external command ...................................................................................................... 75 Send a notification message ...................................................................................................... 76 Strip attachment ......................................................................................................................... 76 Write log message(s) with classifications ................................................................................ 76 Stamp message with text ........................................................................................................... 76 Rewrite message headers ........................................................................................................... 77 Add attachments to valid fingerprints list .............................................................................. 77 Route the message to host ........................................................................................................ 78 Move the message ...................................................................................................................... 78 Park the message ........................................................................................................................ 78 Delete the message .................................................................................................................... 78 Pass the message to rule ............................................................................................................ 79 vi User Guide Rule Conditions–Receiver Rules ............................................................................................................80 Where message is of a particular size: .....................................................................................80 Where sender’s IP address matches address: .........................................................................81 Where sender has authenticated ...............................................................................................82 Where sender’s IP address is listed in DNS Blacklist ...........................................................83 Rule Actions–Receiver Rules ...................................................................................................................83 Accept message ...........................................................................................................................84 Refuse message and reply with message .................................................................................84 Chapter 6 User Groups 85 To Create a New Standard User Group ................................................................................................85 To Add Members to a Standard User Group .......................................................................................85 To Add an LDAP User Group ...............................................................................................................86 To Move and Copy User Groups ...........................................................................................................88 Chapter 7 POP3 Accounts 89 To Set Up POP3 Accounts ......................................................................................................................90 POP3 Accounts for Relaying Authentication .......................................................................................91 To Edit POP3 Accounts ..........................................................................................................................91 To Delete POP3 Accounts ......................................................................................................................91 Chapter 8 Virus Scanners 93 Best Practices .............................................................................................................................................95 Configuring a New Virus Scanner ..........................................................................................................96 Viewing Virus Scanner Properties ..........................................................................................................97 Command Line Scanner Properties .........................................................................................97 DLL Scanner Properties ............................................................................................................99 Using Other Virus Scanners ..................................................................................................................100 Testing Virus Scanners ...........................................................................................................................101 Contents vii MailMarshal Directories and Resident Scanning ................................................................................ 101 Details of Excluded Directories ............................................................................................ 102 Chapter 9 External Commands 105 Uses of External Commands ................................................................................................................ 107 Message Release ....................................................................................................................... 107 Chapter 10 Folders 111 Creating a New Folder ........................................................................................................................... 112 Standard Folders ...................................................................................................................... 112 Parking Folders ........................................................................................................................ 113 The Mail Recycle Bin ............................................................................................................... 114 Editing an Existing Folder ..................................................................................................................... 114 Changing the Default Folder Location ................................................................................................ 115 Folder Security ....................................................................................................................................... 115 Chapter 11 Email Templates 117 Creating an Email Template .................................................................................................................. 118 Duplicating an Email Template ........................................................................................................... 119 Editing an Email Template .................................................................................................................... 119 Deleting an Email Template .................................................................................................................. 120 Chapter 12 TextCensor Scripts 121 TextCensor Syntax .................................................................................................................................. 122 Weighting the Script ............................................................................................................................... 123 Adding a TextCensor Script .................................................................................................................. 125 Editing a TextCensor Script .................................................................................................................. 127 viii User Guide Duplicating a TextCensor Script ...........................................................................................................127 Importing a TextCensor Script .............................................................................................................128 Exporting a TextCensor Script ..............................................................................................................128 Testing TextCensor Scripts ....................................................................................................................129 Using TextCensor Effectively ...............................................................................................................130 Constructing TextCensor Scripts ...........................................................................................130 Decreasing Unwanted Triggering ..........................................................................................131 Chapter 13 Logging Classifications 133 Creating a Logging Classification ..........................................................................................................134 Editing a Logging Classification ............................................................................................................134 Duplicating a Logging Classification ....................................................................................................135 Deleting a Logging Classification ..........................................................................................................135 Logging Classification Usage .................................................................................................................135 Chapter 14 Message Stamps 137 Creating a New Message Stamp ............................................................................................................138 Duplicating a Message Stamp ................................................................................................................139 Editing a Message Stamp .......................................................................................................................139 Deleting a Message Stamp .....................................................................................................................139 Chapter 15 Header Matching and Rewriting 141 Header Wizard .........................................................................................................................................142 Field Matching ..........................................................................................................................143 Matching/Substitution Options .............................................................................................145 Naming and Testing .................................................................................................................148 Order of Evaluation .................................................................................................................149 Contents ix Regular Expression Syntax .................................................................................................................... 149 Shortcuts .................................................................................................................................... 149 Reserved Characters ................................................................................................................ 150 Examples ................................................................................................................................... 152 Map Files .................................................................................................................................. 153 Chapter 16 LDAP Connections 155 What is LDAP? ....................................................................................................................................... 155 Adding a New LDAP Server Connection ........................................................................................... 156 Editing an LDAP Server Connection .................................................................................................. 160 Deleting an LDAP Server Connection ................................................................................................ 161 Chapter 17 Server Properties 163 General ..................................................................................................................................................... 165 Export Configuration .............................................................................................................. 166 Import Configuration .............................................................................................................. 166 Local Domains ........................................................................................................................................ 167 To Create a New Local Domain ............................................................................................ 168 To Edit a Local Domain ......................................................................................................... 169 Wildcards .................................................................................................................................. 170 Logging ..................................................................................................................................................... 171 Secure Email ............................................................................................................................................ 173 Internet Access ........................................................................................................................................ 173 Updates ..................................................................................................................................................... 174 Delivery ................................................................................................................................................... 175 Batching & Dial-Up ................................................................................................................................ 177 Blocked Hosts ......................................................................................................................................... 181 Host Validation ....................................................................................................................................... 183 DNS Blacklist ........................................................................................................................... 184 DNS Validation ........................................................................................................................ 185 x User Guide Header Rewrite ........................................................................................................................................186 Anti-Relaying ............................................................................................................................................187 Block suspicious local-part relay attempt ..............................................................................189 License Info ..............................................................................................................................................190 Advanced ..................................................................................................................................................192 Change Folders .........................................................................................................................192 Additional Options ...................................................................................................................193 Chapter 18 Reports 199 To Install MailMarshal Reports .............................................................................................................201 Starting MailMarshal Reports ................................................................................................................202 Report Properties .....................................................................................................................203 Generating Reports ..................................................................................................................204 Report Parameters ....................................................................................................................205 Report Window .......................................................................................................................................208 Toolbar Options .......................................................................................................................208 Drill-down .................................................................................................................................209 Customizing Reports ...............................................................................................................209 Exporting Reports ..................................................................................................................................210 Export Options .........................................................................................................................211 Chapter 19 Arrays 215 What Information Is Replicated? ..........................................................................................................217 What Are the Limitations of Replication? ...........................................................................................217 Prerequisites ..............................................................................................................................217 Manual Settings .........................................................................................................................218 Items Not Replicated ...............................................................................................................218 Configuring Arrays and Replication .....................................................................................................218 Array Wizard .............................................................................................................................219 Replication Exclusions .............................................................................................................224 Contents xi Managing an Array .................................................................................................................................. 226 Making Changes to an Array ................................................................................................................. 227 Updating MailMarshal Arrays ................................................................................................ 228 Chapter 20 The Console 229 Connecting to the MailMarshal Server ................................................................................................ 230 Console Security Issues ........................................................................................................... 231 The Main Console Screen ...................................................................................................................... 231 The Services Screen ................................................................................................................................ 233 Receiver State ............................................................................................................................ 233 Domain Detail .......................................................................................................................... 235 Message Folders ....................................................................................................................... 235 Message Folder Actions .......................................................................................................... 236 Mail History .............................................................................................................................. 240 History Search .......................................................................................................................... 240 Alert History ............................................................................................................................................ 243 User Options ........................................................................................................................................... 243 News and Support .................................................................................................................................. 244 Chapter 21 Troubleshooting 245 MailMarshal Console .............................................................................................................................. 245 Windows Event Viewer ......................................................................................................................... 246 MailMarshal Working Directories ........................................................................................................ 246 MailMarshal Message Names ................................................................................................................ 247 MailMarshal Log Files ............................................................................................................................ 247 Running MailMarshal in Debug Mode ................................................................................................ 247 Some Common Issues ........................................................................................................................... 248 Error 2140 ................................................................................................................................. 248 Host Name or Unable to Determine the Domain ............................................................. 248 Moving MailMarshal to a New Server ................................................................................................. 249 xii User Guide DNS Blacklists .........................................................................................................................................249 Reports Issues ..........................................................................................................................................250 Unable to determine if [Name] is a valid MailMarshal database .......................................250 SQL script could not be loaded .............................................................................................251 SQL scripts failed to load. View errors? ...............................................................................251 Further Help .............................................................................................................................................251 Chapter 22 MailMarshal and the MMC 253 Configurator and Console in the Same MMC ....................................................................................254 Multiple Console Snap-ins in the Same MMC ....................................................................................254 Appendix A Other Email Servers 257 Index 267 Configuring Microsoft Exchange 5.5 ...................................................................................................258 Exchange 5.5 and MailMarshal on Separate Machines .......................................................258 Exchange 5.5 and MailMarshal on the Same Machine .......................................................259 Configuring Lotus Notes 4 ....................................................................................................................261 Lotus Notes 4 and MailMarshal on Separate Machines .....................................................261 Lotus Notes 4 and MailMarshal on the Same Machine ......................................................261 Configuring Lotus Domino R5 .............................................................................................................263 Lotus Domino R5 and MailMarshal on Separate Machines ..............................................263 Lotus Domino R5 and MailMarshal on the Same Machine ..............................................264 • Contents xiii xiv User Guide About This Book and the Library The User Guide provides conceptual information about MailMarshal SMTP. This book defines terminology and various related concepts. Intended Audience This book provides information for individuals responsible for understanding MailMarshal SMTP concepts and for individuals managing MailMarshal SMTP installations. Other Information in the Library The library provides the following information resources: User Guide Provides conceptual information and detailed planning and installation information about MailMarshal SMTP. This book also provides an overview of the MailMarshal SMTP user interfaces and the Help. MailMarshal Secure User Guide Provides detailed information about how to configure and use the S/MIME secure email functionality in MailMarshal SMTP. Help Provides context-sensitive information and step-by-step guidance for common tasks, as well as definitions for each field on each window. About This Book and the Library xv Conventions The library uses consistent conventions to help you identify items throughout the documentation. The following table summarizes these conventions. Convention Bold Use • Window and menu items • Technical terms, when introduced Italics • Book and CD-ROM titles • Variable names and values • Emphasized words Fixed Font • File and folder names • Commands and code examples • Text you must type • Text (output) displayed in the command-line interface xvi Brackets, such as [value] • Optional parameters of a command Braces, such as {value} • Required parameters of a command Logical OR, such as value1 | value2 • Exclusive parameters. Choose one parameter. User Guide About Marshal With new threats disrupting business, productivity and wrecking reputations every day, Marshal content security solutions take a proactive approach to identifying email and web vulnerabilities to protect over seven million international users in 17,000 companies from the risks of email and Internet-based threats. Marshal Products Marshal's Content Security solution, which includes MailMarshal SMTP, MailMarshal Exchange and WebMarshal, delivers a complete email and Web security solution to these risks by acting as a gateway between your organization and the Internet. The products sit behind your firewall but in front of your network systems to control outbound documents and their content. By providing anti-virus, anti-phishing and anti-spyware protection at the gateway, Marshal's Content Security solution offers you a strategic, flexible and scalable platform for policy-based filtering that protects your network, and as a result, your reputation. Contacting Marshal Please contact us with your questions and comments. We look forward to hearing from you. For support around the world, please contact your local partner. For a complete list of our partners, please see our website. If you cannot contact your partner, please contact our Technical Support team. Telephone: +44 (0) 1256 848 080 (EMEA) +1 404 564-5800 (Americas) + 64 9 984 5700 (Asia-Pacific) Sales Email: info@marshal.com Support: www.marshal.com/support Website: www.marshal.com About Marshal xvii xviii User Guide Chapter 1 Introducing MailMarshal MailMarshal SMTP is a fast, easy-to-use email scanning solution that enforces your organization’s Acceptable Use Policy while protecting against viruses, Spam, and loss of confidential data. An Acceptable Use Policy for email typically regulates what content can be sent in and out of the organization. A policy may also call for disclaimers or other official message stamps, archive copies of messages, and encryption of sensitive email, as well as controls on the size or volume of email allowed. What Does MailMarshal Do? MailMarshal scans the content of messages and attachments as they enter or leave the organization. It can scan lexical content (such as subject lines, message text and attached documents). It can also determine the structure and size of messages and attachments. MailMarshal’s proprietary SpamCensor applies a variety of techniques to determine whether messages are Spam. MailMarshal also allows scanning for and cleaning of viruses using third-party virus scanners. Based on the result of these scans, many actions may be performed. These include blocking or quarantining of messages, making copies, stripping of attachments, sending notifications, adding disclaimers, and many others. Chapter 1 • Introducing MailMarshal 1 An optional module, MailMarshal Secure, allows signing, encryption and decryption of email messages using the S/MIME standard. Certificate import, renewal, and revocation are managed automatically. Where is MailMarshal Installed? MailMarshal SMTP is a server-based SMTP (Simple Mail Transfer Protocol) email content scanner that can be easily installed into a new or existing network with other gateway applications. It complements, and is compatible with, traditional Internet firewalls, SMTP mail servers, anti-virus and security applications. The only pre-requisite is that MailMarshal must reside on Windows 2000 Server, Windows XP Professional, or Windows Server 2003. MailMarshal consists of several pieces of software–the Server, Configurator, Console and Reporting Database. The MailMarshal Server software is installed as the email gateway of an organization. All email entering or exiting the organization passes through it. MailMarshal can be installed as a standalone server or an array of servers. Depending on load, it can reside on the same physical machine as a corporate email server product (such as Microsoft Exchange). It can also be installed as a standalone POP3 email server for small organizations. The Configurator is installed on the same machine as the MailMarshal Server software, and can also be run from a remote workstation. This module allows setup of the basic connections required to use MailMarshal. It also allows configuration of email processing rules and components, such as virus scanners and TextCensor scripts. The flow of email through MailMarshal is monitored using the Console, which can be installed on the email administrator’s workstation. Through the Console MailMarshal’s logs can be reviewed and searched for specific messages, and blocked items can be released if necessary. MailMarshal can log email activity to a SQL Server database, and use the information to produce detailed reports. The reporting suite, using a runtime version of Crystal Reports (included), can be installed on any workstation. 2 User Guide How Does MailMarshal Work? MailMarshal is an SMTP gateway and is compatible with any SMTP email server on any platform, e.g. Microsoft Exchange, Sendmail, Novell Groupwise or Lotus Notes. Where the existing email server software is a Windows application, in most circumstances MailMarshal can reside on the same physical server. Full details of installation scenarios are given in Chapter 2, “Pre-Installation.” The MailMarshal Server consists of four major system services: the Receiver, Engine, Sender, and Controller. All email entering or leaving an organization enters the MailMarshal Server software via the Receiver, and is processed in the Engine. The Engine unpacks each email message (unzipping archive or compressed files if necessary) and splits the message into its individual components. It then tests the whole message and each component against the Rules that have been set up in the Configurator. Rules are composed of three parts: User Matching, Conditions, and Actions. Details of rule configuration are given in Chapter 5, “Rulesets and Rules.” User Matching criteria allow filtering of messages by the sender and recipients. Other Conditions may match based on the header information, text content of the message and attachments, attached file types, message size, MailMarshal’s proprietary SpamCensor, virus check by a third-party virus scanner, and other criteria. Based on the results of User Matching and Condition testing, the email message is accepted, modified or quarantined. Accepted email is passed to the MailMarshal Sender, which then forwards it to the appropriate recipients. Messages may be stamped with a notice and/or stripped of objectionable attachments. Quarantined messages are placed into one of several folders defined for that purpose. They may be retrieved by the email administrator (using the Console) for examination or re-processing. Messages which cannot be unpacked or delivered are directed to special DeadLetter folders. Where MailMarshal takes action on a message, notifications or copies of the original message may be sent as required. These messages can be customized; see Chapter 11, “Email Templates.” Chapter 1 • Introducing MailMarshal 3 All MailMarshal server activities are logged in detail to a text file. The relevant log may be appended to a notification message. Virus Scanning MailMarshal invokes other vendors’ virus checking software to detect viruses. A number of commercially available scanners have been tested and shown to work with MailMarshal. For full virus protection, a licensed version of a virus scanner should be installed and its virus definition files kept up to date. MailMarshal can use multiple virus scanners to provide extra protection. Information on virus scanner configuration appears in Chapter 8, “Virus Scanners.” MailMarshal can also invoke selected virus scanning software to clean infected files. Because many email viruses are associated with known message text or file types, MailMarshal can also block viruses using these criteria. Where best security practices are followed to block suspicious files, MailMarshal can often stop new viruses before scanner updates arrive. Encrypted Email MailMarshal Secure is an optional module of MailMarshal that provides for server-based handling of encrypted messages. MailMarshal Secure uses the S/MIME (Secure MIME) standard for Public Key Encryption. MailMarshal Secure can communicate securely with any other encryption product that uses the S/MIME standard; communication is not limited to MailMarshal sites. Where MailMarshal Secure is not installed (or the appropriate encryption key is not available), MailMarshal will recognize the message as encrypted but will be unable to access the message contents. Such messages may be blocked or passed through according to local policy. Detailed information on MailMarshal Secure may be found in the MailMarshal Secure Manual, which is freely available from the Marshal website. 4 User Guide MailMarshal SMTP and MailMarshal Exchange MailMarshal SMTP shares many features with MailMarshal for Exchange, the Exchange Server based Email Content Security product from Marshal. MailMarshal for Exchange provides the ability to scan internal email within the Exchange Server. MailMarshal SMTP provides several components which are not available within MailMarshal for Exchange, including Receiver Rules and other Receiver based functions, and the MailMarshal Secure module for S/MIME email encryption. Where both sets of functions are required, they can be obtained by running both products in the same environment. MailMarshal for Exchange and MailMarshal SMTP can be run on the same computer (subject to adequate system resources). Within this Manual, “MailMarshal” always refers to MailMarshal SMTP unless otherwise stated. What’s New? This section highlights the key new features documented in this manual. For a complete list of changes in a particular release, please refer to the Release Notes and Reports Release Notes included in the MailMarshal distribution package. New Features in MailMarshal 5.5 • SpamCensor and Category Scripts: Introducing MailMarshal’s proprietary anti-Spam technology. Complex analysis of messages filters Spam efficiently. Scripts are updated automatically. Additional scripts and exceptions can be created locally. • Virus Cleaning: DLL based virus scanners can now be used to clean infected attachments. • Additional Virus Scanners: Symantec AntiVirus Scan Engine and Panda Antivirus join the list of high speed, cleaning-capable scanners. Chapter 1 • Introducing MailMarshal 5 • More Document Types Scanned: TextCensor now checks within Microsoft Excel, Microsoft PowerPoint, and Adobe PDF files. Embedded objects within Excel and PowerPoint files are extracted. • Rule-Based DNS Blacklist support: Use DNS Blacklists (such as ORBS or MAPS) within Receiver Rules. • New Reports:Now report easily on virus related activity and Rules triggered. • Array Replication: An array of MailMarshal servers can be managed from a master Configurator. Configuration changes can be automatically replicated to other members of the array. • Join Array on Install: Bypass the Configuration Wizard by choosing to import a complete configuration from an Array master. • Mail Recycle Bin: Helps guard against accidental deletion of messages from the Console. Online Help MailMarshal provides online help for assistance during installation and use of the software. Help is accessed through the Help menu or by pressing the [F1] key. Extended up-to-the-minute support is available on the Marshal website. The website at http://www.marshal.com features news, a support Knowledge Base, User Forum, and maintenance upgrades. 6 User Guide Chapter 2 Pre-Installation MailMarshal consists of several components, which may be located on different machines within an organization’s network. The components are: • MailMarshal Server • MailMarshal Configurator • MailMarshal Console • MailMarshal Reports All components can be installed under Windows 2000, Windows XP Professional, or Windows Server 2003. Hardware Required for MailMarshal Server MailMarshal will run on almost any Pentium-class machine. Hardware requirements naturally vary depending on the number of email users and the amount of email traffic. The following minimum specifications are suggested as a guideline: • 1000 users: Pentium III 600, 5GB HD, 128MB RAM • 10000 users: Dual Pentium III 1000, 20 GB HD, 512MB RAM Chapter 2 • Pre-Installation 7 Sites with more than 10000 users may require enhanced hardware. MailMarshal supports multi-processor computers and arrays of servers for very high traffic sites. Please contact Marshal for a recommended configuration. Note MailMarshal will not accept new messages if there is less than 100MB of free disk space available in the disk partitions where its working directories reside. Software Required for MailMarshal Server All prerequisite software (with the exception of the Windows operating system) is available on the installation CD-Rom, or by download from the Marshal web site. The prerequisites may be installed, if necessary, during the MailMarshal installation from CDRom. It is recommended that you install the pre-requisites before installing MailMarshal so as to isolate any installation issues to the specific package. MailMarshal requires: • Windows 2000, Windows XP Professional, or Windows Server 2003. • Microsoft Data Access Components (MDAC) 2.7 or above. • SQL Server 2000 or SQL Server 7.0 to log data for reporting–if not available, Microsoft Data Engine (MSDE) can be installed. MSDE is a free runtime version of SQL Server. The latest Service Pack is recommended for installation on either SQL Server or MSDE. Notes 8 • Due to Microsoft licensing restrictions, MailMarshal cannot be installed on Windows Server 2003, Web Edition. • Installation of prerequisites may require system restart. • MailMarshal must be installed on a NTFS partition. Due to the limitations on database size in MSDE, SQL Server is recommended for sites over 500 users in size. • Some items previously listed as minimum prerequisites are included in the above operating systems. These include Microsoft Management Console (MMC) 1.2, and Microsoft Internet Explorer (IE) 5.01. User Guide Software Required for Other Components MailMarshal Configurator, Console, and Reports may be run under Windows 2000, Windows XP Professional, or Windows Server 2003. Note Windows 95, Windows 98, Windows ME, and Windows NT 4.0 are no longer supported. For MailMarshal Secure, we recommend a 128 Bit Encryption version of the Windows operating system. (Some early international releases of Windows 2000 were only 40 bit.) To check the encryption level of a machine, within Internet Explorer click on Help > About. The ‘Cipher Strength’ value shows the encryption level installed on the machine. To upgrade to 128 Bit Encryption, install the High Encryption Pack, or Windows 2000 SP2 or above. SQL Server 2000, SQL Server 7.0, or MSDE is required for the MailMarshal Secure Certificate Database. It is strongly recommended that this be present on the local system. Email Routing Internet email travels from server to server using SMTP (Simple Mail Transfer Protocol). MailMarshal functions as a SMTP relay. Logically, MailMarshal is situated on the local network so that email entering or leaving the organization is routed through it. Physically, MailMarshal Server can be installed in several scenarios. It may share a computer with other software or be run on a dedicated computer. Before installing MailMarshal it is necessary to determine which functions MailMarshal will serve and how it will handle incoming and outgoing email. In general, SMTP email servers may route email in four ways: 1. By delivering a message to a “local user” (another user on the same server). 2. By sending email for a specific domain (e.g. wellknown.com) to a fixed address entered by the administrator. Chapter 2 • Pre-Installation 9 3. By sending all outbound email to a specific server (email relay). 4. By performing a Domain Name Service (DNS) lookup to determine the appropriate email server for a domain, and attempting to contact that host directly. How MailMarshal Routes Email MailMarshal can use any of the four methods described above. • If MailMarshal has been configured as a POP3 server, the POP3 mailboxes are “local” to it. • MailMarshal uses the term “Local Domains” to name the specific domains for which MailMarshal functions as the Internet email gateway. The local domains should include all of the domains hosted by other email servers within the organization (such as Exchange or Groupwise servers). Messages for these domains will be delivered to fixed addresses. • Where the address does not match any local domain, MailMarshal can be configured to deliver it either using DNS or by relaying to a specific downstream host for delivery. Setting up Outbound Routing Take note of how the existing email server sends email to the Internet. In general MailMarshal should be configured to use the same process. For instance, email may be delivered to a firewall or ISP (email relay), or directly using DNS. The existing email server must be reconfigured to forward all outbound Internet email to MailMarshal. Setting up Inbound Routing Determine how inbound email is currently delivered to your server. If the MailMarshal server retains the IP address and server name of the previous email server (e.g. if MailMarshal is installed on the same physical server as the other email server software), then no change to inbound settings will be required. 10 User Guide If the MailMarshal server will have a different IP address and server name, in most cases the route must be changed to ensure that inbound email messages are sent to the MailMarshal server. Before sending email messages to your organization, an email server on the Internet performs a DNS lookup to see which server (IP address) accepts email for your domain. The address returned may be that of your email server, firewall, proxy server or a downstream email relay (e.g. an ISP). If email messages were formerly sent directly to your organization’s email server (i.e. the DNS MX lookup returned the email server’s IP address), then the DNS MX record should be changed to the IP address of the new MailMarshal machine. Firewall permissions may also require modification to permit SMTP delivery to MailMarshal. If the DNS lookup returns the address of the firewall, and the firewall employs address translation, the translated address for incoming email must be changed to the address of the MailMarshal machine. If the firewall acts as an email relay, then the address to which it forwards inbound email must be changed to that of the MailMarshal machine. If the DNS lookup returns the address of an upstream email relay, then the forwarding address setting used by that email relay should be changed to that of the new MailMarshal machine. When Installing MailMarshal on the Existing Email Server When MailMarshal is installed on the same machine as the existing email server software, normally no changes to the inbound routing are required. However, as MailMarshal will take over the role of listening for SMTP traffic on port 25, the existing email server must be configured to listen for SMTP traffic on another port (port 97 is usually available, but any free TCP port will do). MailMarshal should be configured, via its Local Domains information, to forward all inbound email messages to the local machine on the new port. It is recommended that you use the localhost IP address 127.0.0.1. The existing email server should be configured to forward all outbound email messages to the local machine (127.0.0.1) on port 25. Installation Scenarios Chapter 2 • Pre-Installation 11 MailMarshal can be installed in a variety of scenarios. More detailed instructions and some examples are given in Chapter 3, “Installation.” 1. On its own physical server, as an email relay within an organization. Workstation SMTP Port 25 Firewall Internet SMTP Port 25 Workstation MailMarshal Server Email Server Workstation Email Admin In this example, all email sent from within the organization should be delivered to the email server. The email server forwards all external messages to the MailMarshal server for processing and delivery. The DNS MX record (or the firewall’s relay setting) is also set to deliver all inbound email to the MailMarshal server. 12 User Guide 2. As a standalone POP3/SMTP server for a small organization. Workstation Internet connection SMTP Port 25 POP3 Port 110 Internet Workstation MailMarshal Server ISP Workstation Email Admin In this example, all email sent from within the organization should be sent to the MailMarshal server on port 25 for processing. Email for internal addresses will be delivered to MailMarshal’s POP3 boxes for collection by email clients using port 110. Email to and from external addresses is delivered over a dial-up or other link to an ISP. Chapter 2 • Pre-Installation 13 3. On the same physical server as the organization’s email server software. MailMarshal Workstation Port 25 Firewall Internet Localhost Port 25 Localhost Port 97 Other Email Software Workstation Email Server Computer Workstation Email Admin All email sent from outside the organization should be delivered to the email server computer on port 25. MailMarshal forwards processed inbound email to the other server software using the “localhost” IP address and port 97. The other server sends email for outside delivery to MailMarshal at “localhost” port 25. 14 User Guide 4. On a separate computer in a DMZ. Workstation Internet Firewall Port 25 TCP Port 19001 Workstation Email Server Workstation MailMarshal Server Email Admin The advantage of DMZ installation is that all messages must pass through the firewall twice–there is no direct access through the firewall. This is a variation on scenario #1. If the administrator Console is required to communicate with the MailMarshal server from the internal network, TCP port 19001 must be opened in the firewall. Use of the logging/reporting function from the internal network will require TCP port 1433 to be opened. Note Direct Configurator access through a firewall is not recommended since this would require opening additional NetBios ports. If access through a firewall is required, use of a remote access tool such as Microsoft Terminal Services is recommended Chapter 2 • Pre-Installation 15 Gathering Information Before Installation Before beginning installation of MailMarshal, information about the environment should be gathered. A basic list of required information is given below. • The organization’s Internet domain name (e.g. ourcompany.com). • Names of any other local domains for which MailMarshal will process email (e.g. oursubsidiaries.com). • The IP address of the existing local email server. • The administrator’s email address. • The virus scanning software (with an appropriate license) to be used with MailMarshal. • The IP addresses of DNS servers. • Who provides DNS? What is the lead time to alter settings, if necessary? • Are all prerequisites present? (If not, system restart may be required to install them.) • Is a Firewall in use? If so, who administers it and what is the lead time to change settings, if necessary? • What is the outbound email delivery method now in use? • What is the inbound email delivery method–will any changes be required? 16 User Guide Chapter 3 Installation The MailMarshal Installation process consists of two parts: installation of the software and any prerequisites onto the server, and configuration of the software to send and receive email. Installation optionally includes setting up the MailMarshal Reports database, which stores usage information. After installation and configuration, Rules must be customized to implement the desired policies. The MailMarshal Server, Configurator, Console, and Reports may be installed on different computers. The Configurator and Console will always be installed on the MailMarshal server computer, but may also be installed elsewhere. MailMarshal Reports installation is covered later in this Manual. This chapter assumes that decisions have been made as to where in the network MailMarshal will be installed, and how email will be forwarded. Several typical installation scenarios are presented in Chapter 2, “Pre-Installation.”. Chapter 3 • Installation 17 Procedures to Install MailMarshal Server Preliminary Steps: 1. Log on to the server as a user with administrative privilege. Insert the MailMarshal disk into the server CD-Rom drive and select Install MailMarshal 5.5. Or, run the downloaded MailMarshal Installer file. 2. Carefully read the information given on the License Agreement page. By selecting I accept the terms of the license agreement, you agree to the terms of the License. 3. On the Select Setup Type page, select the components to be installed. 4. On the Choose Destination Location page, the default installation location is shown. To change the location, click Change then browse to the desired location. Note MailMarshal must be installed on a NTFS partition. For MailMarshal Secure it is strongly recommended that SQL Server 7.0/2000 or MSDE be available on the local system. 5. Click Next, then Install to start installation. The selected components (and any required prerequisites, if installing from CD-ROM) will be installed. 6. When the Setup Wizard Completed page appears, choose whether or not to launch the Configurator. You must run the Configurator to complete the installation. Configuration Wizard When the MailMarshal Configurator is first run, MailMarshal launches a wizard which requests the configuration information needed to complete installation. For more information on configuration options, please refer to Chapter 17, “Server Properties.” The Wizard process includes the following steps: 18 User Guide 1. Welcome The first page of the Configuration Wizard gives basic welcome information. Click Next to continue. 2. Configuration Source This page allows you to create a new MailMarshal configuration or use an existing one. To create a new configuration on this server, accept the default choice This is a new single computer installation (See below). To import a configuration (to restore a backup or use a prepared custom configuration), select I have an existing MailMarshal Configuration to import. Enter or browse to the location of the import file. When you click Next, the Wizard will attempt to import this file. If import is successful, the Wizard will report the key details imported and continue with step 9 (An Array of MailMarshal Servers). Chapter 3 • Installation 19 To import a configuration from an existing array of MailMarshal servers, select I wish to join an existing MailMarshal array. Enter or browse to the name of a MailMarshal server in the array. When you click Next, the Wizard will attempt to export the array configuration and import it to your computer. A dialog shows the progress of this process. If import is successful, the Wizard will display the next page (License Key), skip any pages not required, and continue with step 9 (An Array of MailMarshal Servers). For additional information on the MailMarshal Array facility, see Chapter 19, “Arrays.” 20 User Guide 3. License Key Enter your Company Name. Enter your License Key, provided by Marshal or your local Marshal reseller. If you do not have a License Key, contact Marshal to obtain one. Note By default, when a license key becomes invalid or expires MailMarshal continues to accept messages, subject to available disk space. The email will be held in the Incoming directory and will not be processed or delivered. To change this behavior see the License Info tab of Server Properties. Click Next. An information box will report the validity details of the key you entered. Chapter 3 • Installation 21 4. Local Domains This page specifies the names of local domains for which MailMarshal will accept inbound email (See below). The list should include all (and only) the domains of email addresses your organization actually uses through this gateway. (The Local Domains list should exactly match the DNS MX records pointing at this server.) Local domains may be of two types: Relay and POP3. Email for a relay domain is sent on to another email server. Email for a POP3 domain is delivered to a mailbox hosted by the MailMarshal server. Most often there will be a single entry in this section for the local email server. However, if the email server handles more than one domain, multiple entries may be needed. Note that all relay servers defined here will also be allowed to relay outbound email through MailMarshal. Note If POP3 service for a domain is already provided by other software (such as Microsoft Exchange), that domain should be configured as a Relay domain in MailMarshal. 22 User Guide Click New to start the New Local Domain Wizard (See below). Choose whether MailMarshal will host any POP3 mailboxes for the domain. On the final page, enter the domain name. Enter the IP address of the server to which email should be relayed. Optionally enter a second email server address (used only as a fail-over if the first server does not respond). If this is a POP3 domain, choose the action to be taken for undeliverable messages. Click Finish to return to the Local Domains page. Multiple Relay local domains may be entered using wildcards (e.g. *.ourbusiness.com may be entered to direct email for all subdomains of ourbusiness.com to a single address). For a description of MailMarshal’s wildcard syntax, see “Wildcards” on page 170 Note MailMarshal’s permanent License Keys are bound to the list of local domains specified in this list. Each time the list of domain names changes, a new key is required. Changes in IP addresses or ports, or between relay and POP3 domains, do not require a new key. For information on requesting a new key, see“License Info” on page 190. Chapter 3 • Installation 23 Repeat the New Local Domain Wizard for each local domain required. When all domains have been entered, adjust the order of matching by highlighting a domain from the list and using the up and down arrows. Note Ensure that local domains are matched in the correct order; otherwise email may be misdirected. E.g. use the following sequence to direct email to POP3 mailboxes within MailMarshal: pop.example.com POP3 10.2.5.4:25 *.example.com Relay 10.1.2.1:25 If this sequence is reversed, POP3 mailboxes will be ignored and all email will be delivered to the relay address, i.e. 10.1.2.1 port 25, because *.example.com will match for messages addressed to pop.example.com. 24 User Guide 5. Administrative Notifications Administrative notifications (such as DeadLetter reports) will be sent to the address specified in the Recipient Address field. This should be a valid and appropriate mailbox or group alias. Administrative and user notifications and other automated email from MailMarshal will be sent “from” the address entered in the From Address field (See below). This should also be a valid address to allow for replies to notifications. 6. DNS Servers MailMarshal performs DNS lookups independently of the Windows DNS settings. Chapter 3 • Installation 25 The primary DNS (Domain Name Server) address used by the organization must be entered, and a secondary address is recommended (See below). These servers should be located no further away than the ISP. Note If MailMarshal must perform DNS lookups through a firewall, the firewall must permit both TCP and UDP based lookups. 26 User Guide 7. Delivery Select how you want MailMarshal to deliver external messages. Two options are available (See below): MailMarshal will deliver external email itself: This is the default option. MailMarshal will use DNS resolution to determine the appropriate destination for outbound email and attempt to deliver messages directly. If this option is selected, you may optionally enter the name or IP address of a fallback host. The fallback host will be used as a forwarding host for messages which MailMarshal is unable to deliver immediately (for instance, if MailMarshal encounters a DNS or greeting failure while attempting to connect to the original destination server). Chapter 3 • Installation 27 MailMarshal will forward email to another SMTP server: Select this option to immediately send all outbound email (not for local domains) to a firewall or a fixed relay server (such as an ISP). The other server will be responsible for final delivery. Enter the host name or IP address of the relay or firewall in the Forwarding Host box. Optionally enter an alternate host (used only if MailMarshal encounters a DNS or greeting failure while attempting to connect to the main forwarding host). 8. Logging MailMarshal can log details of the processing and delivery status of messages to a database. When logging has been enabled, the Mail History can be viewed in the Console and a wide variety of reports run from MailMarshal Reports. 28 User Guide To enable logging, check the I want to log message details checkbox. Check the I want to report on email attachment details checkbox to enable reporting on attachments within email messages. To continue processing email if the log records cannot be written to the database, check the box I want MailMarshal to continue if the database becomes unavailable. To stop processing email when the database is unavailable, clear this box. (This option should be chosen if logging of traffic is essential. Email will still be accepted and held in the Incoming directory.) The MailMarshal Console can log operator actions to the MailMarshal logging database. Logged actions include deleting messages, moving messages into or out of the mail recycle bin, emptying the mail recycle bin, passing through messages, forwarding messages and moving messages from one folder to another. Check the box I want to log file actions to the database to enable logging of these actions. Uncheck the box to disable logging of these actions. Note Logging console actions can make a difference to perceived console speed, especially when large numbers of messages are affected by a single action. It is also possible to log selected types of console actions by adjusting a registry value. See the Marshal Knowledge Base for details. Select the period for log retention (the default is 100 days). Most installations will want to retain logs for several months to allow flexibility in reporting periods. Chapter 3 • Installation 29 Click Select Database to choose the location of the SQL database where the information will be stored. In the Create/Select Database dialog, enter the name of the SQL Server (or MSDE) computer in the first box. You can browse the network if necessary. Enter the name of the database you wish to use, and the SQL user name and password. If you believe that a MailMarshal database has previously been installed in the given location and you wish to overwrite it, check the box to recreate the database. Note The database password may be changed using SQL administration tools or commandline SQL entry. However this procedure must be used with caution if other applications may be using the database. For further information please see Marshal Knowledge Base article Q10251. If more than one MailMarshal server will be logging to the same database, check the box I have more than one MailMarshal server on my site. 30 User Guide 9. An Array of MailMarshal Servers If you have joined an array, or the box I have more than one MailMarshal server on my site is checked on the Logging page, this page is displayed. Select a letter from the drop-down box to uniquely identify logging records from this MailMarshal Server. If you have joined an array, letters already in use will not be shown. If a configuration has been imported, the box I have more than one MailMarshal server on my site appears on this page. If more than one MailMarshal server will be logging to the same database, check the box then select a letter. 10. Finished Basic configuration of the MailMarshal Server is now complete. The MailMarshal Configurator starts automatically on completion of the Wizard. Changes to the configuration may be made through the Tools > Server Properties menu in the Configurator. Several additional and advanced selections, including dial-up configuration, are also available in that menu. For complete information see Chapter 17, “Server Properties.” To configure S/MIME (MailMarshal Secure) settings, check the box and the appropriate tab of Server Properties will be presented when the Wizard exits. Before MailMarshal can be put into production, the following steps should be taken within the MailMarshal Configurator: 1. Configure virus scanners within MailMarshal, if desired. Most installations use a virus scanner. See Chapter 8, “Virus Scanners.” 2. Customize Rulesets and enable Rule processing. See Chapter 5, “Rulesets and Rules.” 3. Start MailMarshal Services. The following additional steps may be required: 1. Configure an existing email server to pass email through MailMarshal. 2. Install and configure third party virus scanning software. Chapter 3 • Installation 31 Configuring an Existing Email Server Typically MailMarshal receives inbound email, processes it, then relays it to the organization’s internal email server as specified in the Local Domains list. Outbound email is passed from the internal email server to MailMarshal for processing and external delivery. For a variety of installation scenarios, see Chapter 2, “Pre-Installation.” The internal email server software must be configured to send outgoing email to MailMarshal for processing and delivery. Where MailMarshal is installed on the same computer as the existing email server software, the two applications must use different “ports” to receive email In this case, the following steps are typically necessary: • As the MailMarshal receiver is now accepting SMTP traffic on port 25, change the SMTP port that the other email server uses for SMTP (port 97 is usually available, although any free TCP port will do). • Configure the other email server software to forward all Internet email to the local machine (use the “localhost” IP address 127.0.0.1, port 25). • Check that MailMarshal is configured, via its Local Domains information, to forward all inbound email to the local machine on the alternative port (again, use the localhost IP address and port, e.g. 127.0.0.1:97). Specific details for configuring Microsoft Exchange 5.5 and Lotus Notes 4 and 5 are given in Appendix A, “Other Email Servers.” For more detailed information, and to configure other email server software, please refer to the product documentation for the other software. The Marshal Knowledge Base also contains some additional setup information. 32 User Guide MailMarshal and Proxy Servers MailMarshal can be installed in the same network as a proxy server, such as Microsoft ISA Server or Microsoft Proxy Server 2.0. There are two possible scenarios: • MailMarshal can be installed on a machine “inside” the proxy server (on the trusted network) when the proxy server has two network cards. This scenario will require the proxy server to be configured to route incoming connection requests through to the MailMarshal receiver. • MailMarshal can be installed as an email gateway separate to the proxy server. In this case, MailMarshal could be installed on the same machine as the proxy server and could replace an existing email relay. MailMarshal could also be installed on a separate machine with two network cards and be used to route email from the Internet to an internal email server. Information on configuring MailMarshal with Microsoft Proxy 2.0 is available in Marshal Knowledge Base article Q10279. Information on configuring MailMarshal with Microsoft ISA Server is available in Marshal Knowledge Base article Q10380. To obtain information on configuring other proxy server software, contact the proxy software manufacturer. Note Microsoft Proxy can be configured to implement security at user level. Where this has been done, MailMarshal should initially be configured to run under the same user account as your existing email server, email relay or gateway. Chapter 3 • Installation 33 MailMarshal Console Installation The MailMarshal Console provides day-to-day administrative access to the MailMarshal server and email stream, including a real-time view of email processing and management of rejected and quarantined messages. The console is installed automatically on the MailMarshal Server when a server install is performed. If the MailMarshal Console software is to be used on any other machine it must also be installed on that machine. It may be installed directly from the MailMarshal CD-ROM or from an install folder copied from the CD-ROM. For a list of software prerequisites for the Console, see Chapter 2, “Pre-Installation.” To install the MailMarshal Console: 1. Log in with sufficient access rights to install software onto the local machine and to access the install folder for MailMarshal. 2. Run the MailMarshal installation program or setup.exe to install the MailMarshal Console software. 3. Under Setup, select Custom Setup and choose only the MailMarshal Console component. 4. Run the newly installed software. 5. If the MailMarshal Server is not running on the same machine, a Change Server dialog will prompt for the IP Address or name of the MailMarshal Server machine. This dialog can be reached at any time by right-clicking on the MailMarshal Console folder in the Console menu tree. Configuration information for MailMarshal Console is stored in the client machine registry. Note Whenever you update or upgrade the MailMarshal Server you must also upgrade the Console on remote machines. 34 User Guide Console Security Issues MailMarshal Console uses the Windows secure RPC mechanism to communicate (via TCP port 19001) with the MailMarshal Server. A console user must have an account and password that can be validated by the MailMarshal Server. If the MailMarshal machine is in a different domain you can either set up a trust relationship or create local accounts on the MailMarshal Server computer. If the Console and the Server are separated by a firewall (e.g. if the Server is located in a DMZ), port 19001 must be opened in the firewall to allow remote Console access. To view the messages in the quarantine folders the account in use must have read access to the folders. If you wish to make changes to items (e.g. forward email, kill messages) the account will also need write access. Access to the folders should be limited by using Windows security. To implement access control for other features, edit the access permissions on the MailMarshal.key file (in the MailMarshal folder on the server). Read access to this file allows the user to view the service status, queued domains and mail history. Write access to this file gives the ability to kill messages, dial now, retry domains and reload services. Note To change the Console communication to another port, see the Advanced Properties dialog found on the Advanced tab of Server Properties. Chapter 3 • Installation 35 MailMarshal Configurator Remote Installation The MailMarshal Configurator software provides access to all setup functions for MailMarshal, including server configuration and setup of Rules and Rule elements. The Configurator is installed automatically on the MailMarshal Server when a server install is performed. If the MailMarshal Configurator software is to be used on any other machine it must also be installed on that machine. It may be installed directly from the MailMarshal CD-ROM or from an install folder copied from the CD-ROM. For a list of software prerequisites for the Configurator, see Chapter 2, “Pre-Installation.” Note It is not recommended to connect the Configurator to the MailMarshal Server through a firewall, as additional NetBios ports must be opened to make this possible. If access through a firewall is required, use of a remote access tool such as Microsoft Terminal Server is recommended. To install the MailMarshal Configurator: • Log in with sufficient access rights to install software onto the local machine and to access the install folder for MailMarshal. • Run the MailMarshal installation program to install the MailMarshal Configurator software. • Under Custom Setup, select only the MailMarshal Configurator component. • Run the newly installed software. • If the MailMarshal Server is not running on the same machine, a Change Server dialog will prompt for the IP Address or name of the MailMarshal Server machine. This dialog can be reached at any time by right-clicking on the MailMarshal Configurator element in the left pane of the Configurator. Note Whenever you update or upgrade the MailMarshal Server you must also upgrade the Configurator on remote machines. 36 User Guide Uninstalling MailMarshal Use the following steps to uninstall MailMarshal. 1. Before uninstalling, ensure that any settings changes made to the email system (e.g. the DNS MX records and email server settings) are revised to exclude MailMarshal from email processing. 2. If you are uninstalling one member of an array, use the MailMarshal Configurator to remove the server from the array. For more information, see Chapter 19, “Arrays.” 3. Uninstall MailMarshal using the Control Panel Add/Remove Programs applet. System restart may be suggested to remove some files. 4. Uninstall the MailMarshal Configurator, Console and Reports software on workstations. 5. If appropriate, drop the MailMarshal and MailMarshalCertStore databases using SQL administration tools. Chapter 3 • Installation 37 38 User Guide Chapter 4 Monitoring and Control Operation of MailMarshal is monitored and controlled through three applications: the Configurator, the Console and the Reports. Additional monitoring and control functions are available through the Windows Event Log, Windows Performance Counters, and the Message Release external command. Detailed information on the Console, Reports, and External Commands (including Message Release) is provided in other chapters of this manual. The Configurator The MailMarshal Configurator is used to set up and modify the Rules and rule elements that control how email is processed by the MailMarshal Server. The Configurator also allows advanced setup and modification of the Server Properties, which determine how MailMarshal sends and receives email. The Configurator is always installed on the MailMarshal Server computer during initial setup. It may also be installed on any workstation. The MailMarshal Configurator is implemented as a snap-in to the Microsoft Management Console (MMC). For general information and tips about the MMC, see Chapter 22, “MailMarshal and the MMC.” This manual assumes that the MMC is displaying both the left (menu tree) and right (details) panes Chapter 4 • Monitoring and Control 39 Start the Configurator from the Start menu. Ensure that the MailMarshal Configurator folder is expanded. The left menu pane presents the top level functions of MailMarshal. Detailed information is presented in the right pane. Note The Configurator should be closed when it is not actively in use. Automatic processes such as Category Script updates and array replication will be affected if unused Configurators are running. Only one instance of the MailMarshal Configurator can be active per MailMarshal Server. Attempting to start a second Configurator results in the notice “MailMarshal settings are locked.” The following elements are available in the Configurator. Many of these elements are covered in more detail in following chapters of this manual. 40 User Guide Server Properties Click Tools > Server Properties in the menu to view the MailMarshal Server Properties dialog. The various tabs of this dialog allow setup of MailMarshal’s email delivery and receipt options, report logging database, and receiver Header Rewrite function, as well as several minor options. Backup and restore of the MailMarshal configuration is also available. Detailed information on this dialog is available in Chapter 17, “Server Properties.” Configurator Root When the Configurator is connected to a running MailMarshal Server, the server icon (captioned MailMarshal Configurator) shows a green arrow. If the Configurator is connected to another server (not the local computer), the name of the server is shown in the caption. When changes to the Rules or rule elements have been made in the Configurator but not yet reloaded on the Server, the caption will be followed by -*- . If the changes require the services to be restarted, the caption will be followed by -!- To reload the Server or restart the services, click the Reload icon on the toolbar. Changes will take effect immediately. Restarting the services takes only a few seconds and does not seriously affect email flow. Services and Arrays When this item is selected in the left pane, the status of the MailMarshal services is shown in the right pane. These will include the Engine, Receiver, and Sender. They may also include the POP3 service if this option has been configured, and the Encrypt and Decrypt services if MailMarshal Secure is installed and enabled. If this MailMarshal server is a member of an array, summarized information about all members of the array is shown. To start or restart the MailMarshal services, click the Restart icon in the toolbar. To stop the services, click the Stop icon in the toolbar. To reload the Server, click the Reload icon on the toolbar. If this server is a member of an array, these actions can optionally be applied to the entire array or the local server. Chapter 4 • Monitoring and Control 41 An individual service may also be started or stopped by right clicking it then selecting the appropriate menu item. The start/stop status of these services persists through server restarts. More information about arrays is available in Chapter 19, “Arrays.” User Preferences By default, MailMarshal prompts the user when the configuration must be reloaded or services restarted. These prompts may be disabled through a selection on the prompting message boxes. The prompts and default behavior may be set from the Tools > Preferences menu. Rulesets Select this item to view a list of MailMarshal’s Rulesets in the right pane. Rulesets contain the Rules which determine how email messages are processed. Rules may depend on recipient, message size, and other factors. Available actions include content scanning, third-party virus scanning, message stamping, and others. For detailed information on Rules and Rulesets, see Chapter 5, “Rulesets and Rules.” Note When this item is selected, click the Print icon in the toolbar to view and optionally print a list of all currently configured Rulesets and Rules. User Groups Select this item to view a list of MailMarshal’s User Groups. These Groups may be used to apply different Rules to various email users–for instance, to apply different message stamps to outbound email from various departments. User Groups may be created within MailMarshal or imported via LDAP from any available directory server. For detailed information see Chapter 6, “User Groups.” 42 User Guide POP3 Accounts Select this item to view a list of POP3 accounts which have been set up on the MailMarshal server. MailMarshal is effective as a POP3 server for up to 300 users. POP3 accounts may also be used to provide relay access to MailMarshal’s rule processing and SMTP sending abilities for remote users, even if inbound email is not delivered to POP3 mailboxes. For detailed information please see Chapter 7, “POP3 Accounts.” Virus Scanners Select this item to view a list of third-party virus scanners which have been configured for use by MailMarshal. Scanners in the list may be used to check message content and attachments. For more information on configuring virus scanners, please see Chapter 8, “Virus Scanners.” External Commands Select this item to view a list of external commands which MailMarshal can invoke. Most command-line executable programs can be used in this way. DLLs can also be invoked. External commands can be used either to test the content of a message, or to perform an action as a result of a condition being triggered by a message. For more information, please see Chapter 9, “External Commands.” Folders Select this item to view a list of folders into which MailMarshal can place email items. Folders may be used to quarantine items based on content, to take copies of selected items, and to park messages for later delivery. Folder names, subfolders, and physical locations may be changed. For more information please see Chapter 10, “Folders.” Email Templates Select this item to view a list of templates which may be used when MailMarshal sends an automated message. Templates may contain variables and may have attachments. They can be created and modified to suit any need. For more information please see Chapter 11, “Email Templates.” Chapter 4 • Monitoring and Control 43 TextCensor Scripts Select this item to view a list of MailMarshal’s TextCensor Scripts. These Scripts are used within Rules to review the content of email messages and attachments. A number of scripts are installed by default. They may be edited and new scripts added. For more information, please see Chapter 12, “TextCensor Scripts.” Logging Classifications Select this item to view a list of classifications available when message traffic is logged by MailMarshal. Classifications may be added and modified to suit local need. For more information, please see Chapter 13, “Logging Classifications.” Message Stamps Select this item to view a list of message stamps which may be appended by MailMarshal. Stamps may be used for disclaimers, or to notify a recipient of action taken by MailMarshal. Message stamps may be in HTML and plain text format, and may be inserted at the top or bottom of an email message. For more information please see Chapter 14, “Message Stamps.” LDAP Connections Select this item to view a list of LDAP (Lightweight Directory Access Protocol) server connections which have been configured in MailMarshal. LDAP allows MailMarshal to populate User Groups from remote directory servers. LDAP is also used by MailMarshal Secure to retrieve user Certificates from a remote store. For more information on configuring LDAP connections, please see Chapter 16, “LDAP Connections.” Information on LDAP User Groups may be found in Chapter 6, “User Groups”; information on using LDAP certificate stores is found in the chapter “Secure Email Rules” of the MailMarshal Secure User Guide. 44 User Guide Secure Email Select this item to work with items related to email signing and encryption. These features are only available if MailMarshal Secure has been installed and enabled. For more information please see the MailMarshal Secure Manual. News and Support Select this item to view the Marshal website in the right pane. This site features the latest support information, including a Knowledge Base and a User Forum. To access the full range of resources, customers should log in to the site. Obtain login details, if necessary, by contacting Marshal. Windows Event Log MailMarshal logs a number of events and alerts to the Windows Event Log. Each event type is given a unique Event ID number. These events may be reviewed in the Event Viewer. They may also be used to trigger automatic actions (e.g. pages, service restarts, or popup notifications) via third-party products. The Event Log may be opened from the Configurator by selecting Tools > Open Event Viewer. Windows Performance Counters Each core service of MailMarshal (the Engine, Receiver, and Sender) makes several counters available to the Windows Performance Monitor. The Performance Monitor may be opened from the Configurator by selecting Tools > Open Performance Monitor. Chapter 4 • Monitoring and Control 45 Please see the Performance Monitor documentation for full information on its capabilities including remote monitoring. Note After installation of MailMarshal, system restart may be required before the MailMarshal Performance Counters are visible in the Performance Monitor. 46 User Guide Chapter 5 Rulesets and Rules Rules define how MailMarshal treats email messages. For convenience, all Rules are defined within Rulesets (groups of Rules that share base User Matching conditions). Conditions defined for a Ruleset must be satisfied before any Rule in that Ruleset is evaluated. An organization may have just a few Rulesets, or many. For example, one Ruleset might apply to all messages outbound from the organization, and another Ruleset apply to all inbound messages. Alternatively or in addition, an organization may be divided into departments, with Rules governing email to and from each department grouped into a separate Ruleset. While some default Rulesets and Rules are provided with MailMarshal, changes and additions should be made to meet local needs. A minimum of two Rulesets is recommended: one for incoming email and one for outgoing email. Each Rule has three parts: User Matching, Conditions, and Actions. The User Matching and Conditions sections are used to evaluate each message. Messages which meet the specified criteria are subjected to the specified Actions. Chapter 5 • Rulesets and Rules 47 Best Practices A wide variety of Rules may be created within MailMarshal. Marshal recommends the following basic practices to ensure security and ease of administration: • Keep rules simple. Simple rules are easier to debug and often faster to run. • Archive messages. Archiving gives an extra layer of backup in case of email server or delivery problems, as well as being useful for rule testing. • Block most attached files by default (both by file extension and by file type). MailMarshal is shipped with example Rules to accomplish this. • Block password protected attachments. • Block encrypted attachments (e.g. files of type ‘Encrypted Word Document’). • Block encrypted messages which MailMarshal cannot decrypt (e.g. PGP messages, and S/MIME messages if MailMarshal Secure is not installed). • Subscribe to email notification lists for virus outbreaks (such lists are offered by many anti-virus software companies). When an outbreak occurs, block the offending messages by subject line or other identifying features. 48 User Guide Viewing and Printing Rulesets To view and optionally print a list of all currently configured Rulesets and Rules first select Rulesets in the left pane of the Configurator. Click the Print icon in the toolbar to view the Ruleset and Rule definitions in a new window (see example below). To view an individual ruleset, select that ruleset in either pane and click the Print icon. Chapter 5 • Rulesets and Rules 49 Creating a Ruleset To create a Ruleset, in the MailMarshal Configurator, select Rulesets in the left pane. Then click the New Ruleset icon in the toolbar to start the New Ruleset Wizard. Select the conditions under which the Ruleset should be used by checking boxes in the upper pane. Scroll down to see the full list of conditions. The conditions selected will be presented in the lower pane. Where the matching condition requires specific information to be completed, the incomplete information appears in the rule description as a red hyperlink. Click on the hyperlink to bring up a dialog allowing this information to be entered. Where specific information has been entered the rule description displays the specifics as a blue hyperlink; click on this link to edit them. 50 User Guide Clicking on the hyperlink People opens the Enter Users dialog. This dialog presents a list of MailMarshal User Groups. Expand any group in the right pane of this dialog to see its members. Double-click on any user group or individual address to add it to the list. A new user may be added to the list by clicking New User. A new User Group may be created by clicking New User Group. Once the ruleset has been created the group should be populated using the functions available in the User Groups item of the Configurator tree. Delete a group or address from the list by clicking Delete. Close this dialog and return to the New Ruleset Wizard by clicking OK. Chapter 5 • Rulesets and Rules 51 On the final page of the New Ruleset Wizard, give the Ruleset a name. Choose whether to enable the Ruleset. Optionally choose a starting and/or ending date for the Ruleset to be enabled. Check the boxes for “from” and “to” then enter dates, or click the arrow to view a calendar. 52 User Guide Optionally choose a daily or weekly schedule for the Ruleset. Check the box then click Schedule to open the Ruleset Schedule dialog. Alter the schedule block if desired: • Drag using the left mouse button to add to the blue “enabled” area. • Drag using the right mouse button to erase from the blue “enabled” area. • To reset the schedule to the default time block, click on Set Default Schedule. • Choose to “snap” the schedule times to the nearest full, half or quarter hour using the Snap to menu. Click OK to save the schedule, or Cancel to lose any changes. Finally, choose whether to launch the New Rule Wizard. A Ruleset must contain at least one Rule to have any effect. Chapter 5 • Rulesets and Rules 53 Editing a Ruleset To edit a Ruleset, in the MailMarshal Configurator, select Rulesets in the left pane. Right click the Ruleset to be edited in the right pane and select Properties from the context menu. The Ruleset is presented in a dialog with two tabs, “General” and “Filtering”, which allow all information in the Ruleset to be modified. To Copy or Move Rules Between Rulesets To move a Rule between Rulesets, select the Rule’s parent Ruleset in the left pane of the Configurator. Drag the desired rule from the list in the right pane to a different Ruleset in the left pane. To copy a Rule, hold down the <CTRL> key while dragging the Rule. To Enable or Disable a Ruleset To enable or disable a Ruleset, edit it then check or uncheck the box Enable ruleset after next reload. Alternatively, right click the Ruleset in the right pane and select All Tasks > Enable or All Tasks > Disable from the popup menu. Order of Evaluation The order in which Rulesets and Rules are evaluated is significant. Certain Rule actions are terminal (they stop further Rule processing). This is indicated in the Rule description. For instance, a virus scanning rule will normally be evaluated first, and if a virus is found the message will be quarantined immediately–no further rules will be evaluated. Rulesets are evaluated in “top down” order as shown in the Configurator. 54 User Guide Adjusting the Order of Evaluation of Rulesets To adjust the order of evaluation of Rulesets, select Rulesets in the menu pane. Select a Ruleset in the right pane, and move it up or down using the arrows in the toolbar. Click the Reload Server Rules icon to effect the change in order. Adjusting the Order of Evaluation of Rules To adjust the order of evaluation of Rules, expand a Ruleset. Select a Rule in the right pane, and move it up or down using the arrows in the toolbar. Click the Reload Server Rules icon to effect the change in order. Note A rule containing a “Goto” action (Pass the message to rule) cannot be moved below the rule it is set to go to. Attempting such a move raises a warning notice. See “Rule Conditions– Standard Rules” on page 61 for more information. Creating a New Rule To create a new Rule, in the left pane of the Configurator, expand the Ruleset that should contain the new Rule. Click the New Rule icon in the toolbar to start the Rule Wizard. On the first page of the Rule Wizard, select the appropriate rule type. Standard Rules These rules are processed by the MailMarshal Engine and offer the full range of Conditions and Actions. Most rules will be of this type. Receiver Rules These rules are processed by the MailMarshal Receiver before the receipt of the message body. A limited number of conditions is available for Receiver Rules. The advantage of Receiver Rules is that they may reduce traffic volume by refusing delivery of messages before the body is received. Chapter 5 • Rulesets and Rules 55 Secure Email Rules (available only when MailMarshal Secure is enabled) These rules control the encryption, decryption and signing of S/MIME messages. For information on Secure Email Rules, please see the chapter “Secure Email Rules” in the MailMarshal Secure User Guide. The next page of the Rule Wizard, User Matching, specifies to whom the rule will apply. Check the appropriate boxes in the upper pane to add matching conditions to the rule description. Scroll down to see the full list of conditions. Note If no User Matching boxes are checked, the Rule will apply to all messages (subject to the limitations imposed by the parent Ruleset). Matching conditions determined by the parent Ruleset are displayed in grey text and cannot be edited here. If these conditions must be changed, edit the properties of the parent Ruleset. 56 User Guide Where the matching condition requires specific information to be completed, the incomplete information appears in the rule description as a red hyperlink. Click on the hyperlink to bring up a dialog allowing this information to be entered. Where specific information has been entered the rule description displays the specifics as a blue hyperlink; click on this link to edit them. The third page of the Rule Wizard, Conditions, specifies other tests to be performed on the message and its attachments. Choices are made as on the previous page. Detailed lists of Conditions are presented later in this chapter. The fourth page of the Rule Wizard, Actions, sets the actions to be taken if a message meets the specified conditions. Choices are made as on the previous pages. Detailed lists of Actions are presented later in this chapter. Chapter 5 • Rulesets and Rules 57 The fifth and final page of the Rule Wizard, Finish, presents the complete Rule in the description pane where it may be edited. The rule must be named. By default the rule is “turned on” (used to process messages). Note New Rules and changes do not take effect until the Rules are reloaded (using either the Reload Server Rules icon in the toolbar or the menu item Tools > Reload Rules on Server). 58 User Guide Copying a Rule To copy a Rule, right-click it in the Configurator. To make a copy in the current Ruleset, choose Duplicate from the context menu. To make a copy in another Ruleset, choose Copy from the context menu; then right-click the target Ruleset and choose Paste. Editing a Rule To edit a Rule, double click it in the right pane of the Configurator. The rule will be presented in the Finish page of the Rule Wizard. Hyperlinked details may be edited from this pane. If more basic changes to conditions or actions are required, use the Back button to view the User Matching, Conditions, and Actions pages. User Matching Criteria When creating Rulesets and Standard and Receiver Rules, the following User Matching criteria are available: Where message is incoming Action will be taken if the message is addressed to a domain within MailMarshal’s Local Domains list. Where message is outgoing Action will be taken if the message is addressed to a domain outside MailMarshal’s Local Domains list. Chapter 5 • Rulesets and Rules 59 Where addressed to people Action will be taken if a recipient of the message is found in the list of addresses specified. See “Creating a Ruleset” on page 50 for details on choosing which “people” are included in these conditions. Note Whenever a list of “people” is required in a condition, the list may contain individual email addresses, domains, and MailMarshal user groups. Where addressed from people Action will be taken if the sender of the message is found in the list specified. Where addressed either to or from people Action will be taken if a recipient or sender of the message is found in the list specified. Where addressed both to and from people Action will be taken if the sender of the message is found in the first list specified, and the recipient of the message is found in the second list specified. Except where addressed to people Action will not be taken if a recipient of the message is found in the list specified. Except where addressed from people Action will not be taken if the sender of the message is found in the list specified. Except where addressed either to or from people Action will not be taken if a recipient or sender of the message is found in the list specified. Except where addressed both to and from people Action will not be taken if the sender of the message is found in the first list specified, and the recipient of the message is found in the second list specified. Note “Except” matching criteria are the key to creating exception based policies. Rules which apply to all recipients with the exception of small specific groups help to ensure that security policies are uniformly applied. For instance, a rule may apply Where the message is incoming except where addressed to Managers. 60 User Guide Rule Conditions–Standard Rules The following conditions are available for use in Standard Rules. They are further explained below: • Where message attachment is of type • Where attachment fingerprint is/is not known • Where message size is • Where the estimated bandwidth required to deliver this message is • Where message contains attachment(s) named (file names) • Where message triggers text censor script(s) • Where the result of a virus scan is • Where the external command is triggered • Where attachment parent is of type • Where message attachment size is • Where number of recipients is count • Where message contains one or more headers (header match) • Where number of attachments is count • Where message is categorized as category • Where message spoofing analysis is based on criteria Note If many conditions are specified in a single rule they must all be satisfied for the Rule action to be taken. To match any of several single conditions, place each one in its own Rule. It pays to keep rules simple and ensure they are logical–it is possible to create nonsensical rules in MailMarshal! Chapter 5 • Rulesets and Rules 61 Where message attachment is of type MailMarshal checks the structure of all attached files to determine their type. Over 175 types are recognized as of this writing. Selecting the hyperlink file types opens a selection dialog including several categories of files. Select an entire category by checking the associated box. Expand any category to see the list of types included, and check the required boxes. When satisfied click OK to return to the Rule Wizard. Note Additional types can be added locally by entering the signature information in a file. Information on the required procedures and structure of the file can be found in Marshal Knowledge Base article Q10199. 62 User Guide Where attachment fingerprint is/is not known The “fingerprint” identifies a specific file (such as a particular image). Click the hyperlink and choose to base the condition on fingerprints which are known or unknown. To add a file to the list of “known” files, use the “add to valid fingerprints” rule action, or select Add Fingerprints while processing messages in the Console (see Chapter 5, “Rulesets and Rules” for further information). To delete a file from the list of “known” files, delete the file from the ValidFingerprints subfolder of the MailMarshal install folder then reload the MailMarshal configuration. Note This condition may be useful to exclude certain images, such as corporate logos or signatures, from triggering quarantine rules. E.g. to take action only on unrecognized images, use the following conditions: When a message arrives Where message attachment is of type IMAGE And where attachment fingerprint is not known Files may also be made known by placing them in the ValidFingerprints sub-folder and restarting the Engine; however this must be done with care. See Marshal Knowledge Base article Q10543 for further information. Where message size is The size of the entire message, before unpacking, will be considered. Choose a size and matching method using the Message Size dialog. Note MailMarshal checks the size of the received message in its encoded format. This is typically 33% larger than the size reported by an email client. Chapter 5 • Rulesets and Rules 63 Where the estimated bandwidth required to deliver this message is The bandwidth required to deliver a message is calculated by multiplying the message size by the number of unique domains to which it is addressed. The intended use of this criterion is to move high-bandwidth messages to a “parking” folder for delivery outside peak hours. They could also be blocked entirely. Where message contains attachments named Enter a list of file names, separated by semi-colons. The * and ? wildcards are supported (e.g. *.SHS;*.VBS;*.DO?). This condition is particularly useful for quickly blocking dangerous file types such as VBS, or known virus attachments such as “creative.exe”. However, it checks only the file name and not the internal type; use “Where message attachment is of type” to check files by structure. Where message triggers text censor script(s) Choose a TextCensor script to be used in evaluating the message. Depending on the settings of the individual script, various parts of the message and its attachments may be scanned. 64 User Guide Within the Select TextCensor Script dialog, select a script and click Edit Script to view or change it; click New Script to create a new script which will be automatically selected when you return to the dialog. See Chapter 12, “TextCensor Scripts” for detailed information on creating Scripts. Note More than one TextCensor script may be included in a rule. However, for the rule to be triggered all included scripts must trigger. Chapter 5 • Rulesets and Rules 65 Where the result of a virus scan is Choose the desired virus scanning action and the results to be checked for, using the Select Virus Scanner Results dialog. Note With the exception of Contains Virus and Unexpected scanner error, these options can only be used with DLL based scanners. If you attempt to select the other options when no DLL based scanner is selected, a warning notice will be given. Scan message with: This option allows you to choose the virus scanners used by this condition. • All Scanners: All configured virus scanners will be used to scan all parts of the message and attachments. This option is the equivalent of earlier MailMarshal virus scanning rules. • Specific scanners: To limit the virus scan to specific installed scanners, 66 User Guide choose this option then select the desired scanners from the list. This setting may be useful for instance if only some installed scanners support virus cleaning. Where the result is: This option allows you to choose the scanner results that will cause this condition to trigger. Check the appropriate boxes. • Contains Virus: The condition will trigger if any part of the message contains a virus. This is the basic condition. • ...and is Cleaned: When this box is checked, the condition will only trigger if the code returned indicates that the virus was cleaned. This condition can be used in a Clean Viruses rule. You cannot choose this option if any nonDLL scanners are selected. See below for further information on setting up virus cleaning rules. • ...and Name Matches: When this box is checked, the condition will only trigger if the name of the virus as returned matches the text in the field. This condition can be used in a rule to modify MailMarshal's response based on certain virus behaviors (for instance to not send sender notifications for viruses known to spoof the “from” address). • Password Protected: When this box is checked, the condition will trigger if the scanner reports the file as password protected. • File is corrupt: When this box is checked, the condition will trigger if the scanner reports the file as corrupt. • Virus scanner signatures out of date: When this box is checked, the condition will trigger if the scanner reports its signature files are out of date. Chapter 5 • Rulesets and Rules 67 • Could not fully unpack or analyze file: When this box is checked, the condition will trigger if the scanner reports that it could not unpack the file. • Unexpected scanner error: When this box is checked, the condition will trigger if the scanner reports an unknown error or the code returned is unknown. Note These detailed failure results depend on the availability of return codes provided by the individual scanner vendors. The option “Unexpected scanner error” can be used to specify an action to take when the code returned by the scanner is not configured in MailMarshal. If this option is not selected in a rule condition, an unexpected return code will result in the message being deadlettered. For command line scanners, the list of return codes can be configured in the virus scanner properties. Setting Up Virus Cleaning To “clean” viruses from email messages, at least one DLL based virus scanner must be installed. Two rules are required (and provided in the default configuration for new installations of MailMarshal). The first rule must have these options selected: • Contains Virus • and is Cleaned The second rule must be a standard virus blocking rule (using the option Contains Virus and invoking a move to folder or other blocking action). If a virus cannot be cleaned, all remaining rules will be applied. If no quarantine (move to folder) or other blocking rule is triggered after all rules have been applied, MailMarshal will deadletter the affected message. The message log and MailMarshal Engine log will indicate that the message still contains a virus. In the MailMarshal Console view, a message that has not been cleaned will be shown with an exclamation mark icon. If you choose to forward or process the affected message, a popup warning will be raised indicating that the message contains a virus. 68 User Guide Where the external command is triggered Select one or more external commands to be used to test the message. If more than one command is specified, all commands must be triggered for this condition to be triggered. External commands can be executable programs or batch files. See Chapter 9, “External Commands” for more information. Where attachment parent is of type This condition is intended to be used with the condition Where message attachment is of type, and causes MailMarshal to consider the file type of the parent container as well as that of the attachment (for instance, Microsoft Word documents containing images). Clicking the hyperlink “parent types” opens a selection dialog offering all valid parent types. The dialog also allows the condition to be applied to types in or out of the selected list. . Note This condition may be useful to exclude images and other inclusions within MS Word documents from quarantine rules. E.g. When a message arrives Where message attachment is of type IMAGE And where attachment parent is not of type: DOC See also the condition Where attachment fingerprint is/is not known. Chapter 5 • Rulesets and Rules 69 Where message attachment size is The size of each attachment is evaluated after all unpacking, unzipping, etc. is complete. An attachment size may be larger than the size of the original message, due to decompression of archive files. Where number of recipients is count This condition is typically used to block messages with large recipient lists as suspected Spam. Where message contains one or more headers This condition may be used to check for the presence, absence, or content of any message header, including custom headers. It would typically be used to check for blank or missing headers, or to reroute email. Within the Header Match dialog (See below), click New to create a new header match using the Header Matching Wizard. See Chapter 15, “Header Matching and Rewriting” for more information on this Wizard. More than one header match may be used in a single condition; however all matches must be true for the condition to be true (logical ‘and’). To match any of several header conditions (logical ‘or’), include more than one Rule with one condition per Rule. 70 User Guide To edit any Header Match condition (or view its details), highlight it then click Edit to restart the Header Matching Wizard. To delete a Header Match condition, highlight it then click Delete. Note Header Match conditions are only available within the Rule where they are created. To use the same condition in more than one Rule, create it in each Rule. Where number of attachments is count This condition is typically used to block messages with large numbers of attachments. The number of attachments may be counted using top level attachments only, or top level attachments to email messages including any attached messages, or all attachments at all levels. Note “Top level attachments” are the files explicitly attached by name to an email message. Other files, such as the contents of a zip archive or images within a Microsoft Word document, may be contained within the top-level attachments. Chapter 5 • Rulesets and Rules 71 Where message is categorized as Category This Rule condition allows action to be taken on messages that trigger a category script. Select a category script file using the Select Category Script dialog. Updates to the category scripts (currently including the Spam category script) can be downloaded automatically. Automatic download is enabled by default. To disable the automatic download or update immediately, see the Internet Access tab of Server Properties. Category scripts can also be created and customized locally. See the example category scripts provided with MailMarshal, and the Marshal Knowledge Base, for syntax and suggested usage. Note The automatic category download depends on HTTPS connection to the Internet. Connection settings can be configured on the Internet access tab. Where message spoofing analysis is based on criteria This Rule condition allows action to be taken on messages that may be “spoofed” (they may not have originated within the domain of the claimed sender email address). This condition will only be evaluated when the sender address (“From:” header or SMTP “Mail From:” address) of a message is within a Local Domain (as specified on the Local Domains tab of Server Properties). 72 User Guide In the Spoofing Criteria dialog, select any of the detailed criteria to determine how this condition is triggered. The originating IP address: Select this condition to check for spoofing based on the IP address of the computer which originated the message. Choose one of the following options to determine how the IP address is checked: • Is not considered local as defined by the anti-relaying settings: When this option is selected, email with a local sender address will be considered “spoofed” if it does not originate from a computer allowed to relay. The list of computers allowed to relay is determined by the IP address ranges entered on the Anti-Relaying tab of Server Properties. This option can be selected if multiple servers and workstations in the local network are allowed to route email directly through MailMarshal. • Does not match the IP address for that specific local domain: When this option is selected, email with a local sender address will be considered “spoofed” if it is not delivered to MailMarshal from the correct Local Domain email server. The Local Domain server is the computer to which MailMarshal delivers messages for the specific SMTP domain of the “From:” address. Note This is the more restrictive option as it requires all email originating within the organization to have been routed to MailMarshal from a trusted internal email server. (Messages accepted by the internal email server will be accepted by MailMarshal.) This option can stop local users from “spoofing” addresses within the local domains. Chapter 5 • Rulesets and Rules 73 The originating system did not use ESMTP authentication: Select this condition to check for spoofing based on the login given by the system routing the message to MailMarshal. Use this condition (and not an IP address based condition) if roving users are allowed to send email through MailMarshal using the POP3 Relaying Authentication feature. Note Before implementing the requirement for ESMTP authentication, check which servers are required to authenticate. See Server Properties > Advanced > Additional Options > Receiver. Be sure that all affected systems, possibly including internal email servers such as Microsoft Exchange, are configured to authenticate when connecting to MailMarshal. Rule Actions–Standard Rules The following actions are available for selection in Standard Rules. Details of each action are given below. • Copy the message to folder • BCC a copy of the message • Run the external command • Send a notification message • Strip attachment • Write log message(s) with classifications • Stamp message with message stamp • Rewrite message headers • Add attachments to valid fingerprints list • Route the message to host • Move the message (terminal action) • Park the message (terminal action) 74 User Guide • Delete the message (terminal action) • Pass the message to rule If a terminal action is performed, no further rules will be processed for the affected message. By default the following options are checked: send notification message, write log message, move the message (to a folder). Copy the message Copy the email message file to the specified folder. To make the message processing log available in the same folder, check the box at the bottom of the dialog. The message log showing how the message was processed will then be available in the Console. If a new folder is required, click New Folder to start the New Folder Wizard (see Chapter 10, “Folders” for more information). BCC a copy of the message Send a blind copy of the message to one or more email addresses. These should be entered as complete SMTP addresses (e.g. user@domain.topdomain), separated by semi-colons. The original message will not be modified in any way by this action, so the original recipient would not know a copy had been taken. Note You can use this action in combination with Delete the message to effectively forward messages to a different recipient. Run the external command Choose one or more commands to be run from the list of pre-defined external commands. See Chapter 9, “External Commands” for information on defining external commands. To run the same application with different parameters under different conditions, use more than one external command definition. Chapter 5 • Rulesets and Rules 75 Send a notification message Send one or more email messages based on the templates checked in the selection dialog. To view or edit the details of a particular template, select it then click Edit Template. To create a new template, click New Template; the new template will automatically be selected for use when you return to the template selection dialog. For further information on templates, see Chapter 11, “Email Templates.” Strip attachment Where the rule conditions are triggered by a specific attachment, remove this attachment from the message. This action would typically be used to remove attachments of specific file types or file names. Note When an attachment is stripped, normally the original message should be copied for later retrieval if necessary, and stamped to inform the recipient that an attachment has been stripped. Write log message(s) with classifications Select one or more logging classifications from the list. Check the box to write a logging classification for every component of the message (e.g. a separate record for each image file in a message). To view or edit the detailed information in the classification, click Edit in the selection dialog. To create a new classification, click New in the selection dialog. For details on classifications, see Chapter 13, “Logging Classifications.” Stamp message with text Choose one or more message stamps to be added to the message body. Stamps will be at the top or bottom of the message as selected when they were created. To view or edit the details of a particular message stamp, select it then click Edit Stamp. To create a new stamp, click New Stamp; the new message stamp will automatically be selected when you return to the stamp selection dialog. See Chapter 14, “Message Stamps” for details. 76 User Guide Rewrite message headers This action may be used to modify, add, or delete any message header, including custom headers. It would typically be used to repair blank or missing headers, to insert a notification into the subject, or to reroute email. Within the Header Rewrite dialog, click New to create a new header rewrite rule using the Header Rewrite Wizard. See Chapter 15, “Header Matching and Rewriting” for more information on this Wizard. More than one Rewrite rule may be included in the same action. The order of application of the rules may be significant. Adjust the order by selecting a rule and using the up and down arrows in the Header Rewrite dialog. Note Header Rewrite rules are only available within the Rule where they are created. To perform the same action in more than one Rule (or within a Rule and the Header Rewrite function of the MailMarshal Receiver), create it in each place. Add attachments to valid fingerprints list Add the attachments to MailMarshal’s list of “valid fingerprints” (normally used for images or other files which require special treatment, such as company logos). Choose whether to add all attachments, or only images, to the list. See the rule condition Where attachment fingerprint is/is not known for more information. Chapter 5 • Rulesets and Rules 77 Route the message to host This action allows the message to be delivered to a selected server. This action might be used to implement dynamic routing based on the recipient or other message headers. Enter a host name or IP address to which the message should be delivered. This address will be used when delivery is attempted, even if the message is “parked” first. If several Rules invoke this action, the last selected address will be used. Note This action is not a terminal action. It sets the destination for the message, but it does not send the message immediately or stop rule evaluation. All remaining applicable rules will be evaluated. Do not use the action Delete the message with Route to Host: the message will be deleted and not delivered! Move the message Move the email message file to the specified folder. To make the message processing log available in the same folder, check the box at the bottom of the dialog. The message log explaining how the message was processed will then be available in the Console. If a new folder is required, click New Folder to start the New Folder Wizard (see Chapter 10, “Folders” for more information). This is a terminal action–no further rules will be processed for a message if this action is performed. Park the message Move the email message file to the specified parking folder for release according to the schedule associated with that Folder. If a new folder with a different schedule is required, click New Folder to bring up the New Folder Wizard (see Chapter 10, “Folders” for more information). This is a terminal action–no further rules will be processed for a message if this action is performed. Delete the message Delete the email message file. Do not send the message to its original destination. This is a terminal action–no further rules will be processed for a message if this action is performed. 78 User Guide Pass the message to rule If no “terminal” rule action has been taken, this action allows a choice of which further rules to apply. Several choices are available (See below), including • Skip the next rule (do not apply it). • Skip to the next ruleset (do not apply further rules in this ruleset). • Skip all further rules (pass the message through to the intended recipients). • Skip to a particular ruleset or rule. Note It is only possible to skip to a rule which is evaluated after the current rule. (The order of evaluation may be changed; see “Order of Evaluation” on page 54.) When skipping to a rule in a different ruleset, remember that the parent ruleset conditions may prevent its having any effect. For instance, skipping from MailMarshal’s default Inbound ruleset to the Outbound ruleset is allowed, but rules in the Outbound ruleset will have no effect on inbound messages. Chapter 5 • Rulesets and Rules 79 Rule Conditions–Receiver Rules The following conditions are available for use in Receiver Rules. • Where message is of a particular size • Where sender’s IP address matches address • Where sender has authenticated • Where sender’s IP address is listed in DNS Blacklist Where message is of a particular size: This condition is normally used with a “refuse message” action to refuse large messages. Choose the size criteria in the Message Size dialog. Note Receiver processing of this condition depends on an ESMTP connection from the outside server. This condition should be repeated in a Standard Rule to include messages received from non-ESMTP sources. 80 User Guide Where sender’s IP address matches address: This condition can be used to permit relaying, or to refuse messages, from one or more ranges of IP addresses. The configured ranges are shown in the Sender IP Address dialog. To add a range to the list, click New to open the Enter Match IP Address dialog. To modify an existing address, highlight it then click Edit. To delete an existing address from the list, highlight it then click Delete. In the Match IP Address dialog, add or modify an address or range. Chapter 5 • Rulesets and Rules 81 Select one of the three choices using the option buttons: • An IP Address: Enter a single IP address in dotted quad format. • A range of IP addresses: Enter the starting and ending IP addresses (two dotted quads). • An entire network range: Enter an IP address and a netmask in dotted quad format. For instance, enter “10.2.0.4” and “255.255.255.0” to match the entire 10.2.0.0 subnet. The checkbox at the bottom of the dialog controls whether this address or range will be included or excluded from the condition match. • To include the address or range, check the box. • To exclude the address or range, clear the box. Note A typical use of included and excluded ranges would be to match all IP addresses in a given range, with one or two exceptions. For instance, all computers in the 10.2.0.0 subnet might be excluded from relaying, except for a specific email server 10.2.0.55. Where sender has authenticated This condition will trigger if the remote system has authenticated using a POP3 account and password. See Chapter 7, “POP3 Accounts” for information on setting up accounts for authentication. This condition is normally used with the Accept message action to allow relaying by specific users. 82 User Guide Where sender’s IP address is listed in DNS Blacklist This condition allows the DNS Blacklist (MAPS RBL and compatibles) tests to be applied selectively. Choose the Blacklists to be used from the list in the DNS Blacklists dialog. The dialog shows a list of all enabled Blacklists. Check the box for each Blacklist you wish to use. Clear the box for any Blacklist you do not wish to use in this Condition. Note Before selecting this Condition, enable at least one blacklist using the Host Validation tab of Server Properties. Each DNS Blacklist you want to use in this Condition should have the “Enable this DNS Blacklist” checkbox checked. For details of how MailMarshal reacts when a Blacklist cannot be reached, see Chapter 21, “Troubleshooting.” Click OK to return to the Receiver Rule Wizard. Rule Actions–Receiver Rules The following actions are available for use in Receiver Rules. Chapter 5 • Rulesets and Rules 83 Accept message If selected, this condition permits receipt of the message by MailMarshal for delivery subject to Standard Rules. Furthermore the message may be relayed to an address outside MailMarshal’s local domains. This condition is intended to be used in conjunction with the condition Where sender has authenticated or an IP address match, to allow relaying by specific email users. Refuse message and reply with message MailMarshal will refuse the message. A SMTP response refusing delivery will be transmitted to the sending server. This action is intended to be used in conjunction with a size-limiting condition to conserve bandwidth, or to refuse messages sent from specific problem addresses as detected by User Match, IP Address, or DNS Blacklist Conditions. Select the message to be returned using the Reply Message dialog. In this dialog, enter the SMTP response code and message to be returned as the message refusal. • Message Number: Enter a SMTP message number (between 400 and 599) to return. The default number 550 is a standard SMTP “message refused” response. • Message Description: Enter a short message giving details of the reason for refusal. Within this message, the following variables are available: {Recipient} will be replaced by the “To:” SMTP address of the original message. {Sender} will be replaced by the SMTP address of the sender. Uses the address in the “From” field unless it is empty, in which case the “Reply to” address is used. {SenderIP} will be replaced by the IP address of the sender. 84 User Guide Chapter 6 User Groups MailMarshal User Groups are used within Rulesets and Rules to specify to whom the Rules apply. MailMarshal uses SMTP email addresses to perform user matching. User Groups may be created and populated within MailMarshal by entering email addresses manually (wildcards may be used). User Groups may also be imported from an LDAP server (such as Microsoft Exchange or Lotus Notes), in which case their membership is updated automatically on a defined schedule. To create and maintain User Groups, in the Configurator, expand the element User Groups. To Create a New Standard User Group Click the New User Group icon in the toolbar to open the New User Group dialog. Enter a name for the User Group. To Add Members to a Standard User Group Select the appropriate User Group from the right pane of the Configurator. Click the New Member icon in the toolbar to open the Insert into User Group dialog. Chapter 6 • User Groups 85 In this dialog, enter an individual SMTP address, a wildcarded address, or a domain name in the field. (The available wildcards are the same as those used for local domain names– see “Wildcards” on page 170 for details.) Click Add (or use the <Enter> key) to add the value. The dialog remains open and additional values may be added. If an individual address was entered, the domain name portion of the address is retained and only the new user name need be entered. To Add an LDAP User Group LDAP user groups are used in the same way as standard MailMarshal user groups. However, MailMarshal populates an LDAP group by retrieving a list of members from an LDAP server, such as Lotus Notes. The membership of LDAP groups is automatically updated on the schedule specified in the LDAP connection dialog. To work with LDAP User Groups, you must configure at least one LDAP User Group Connection (see Chapter 16, “LDAP Connections”). Click on the Add LDAP User Group icon, or right-click on User Groups in the tree then click on New, then on LDAP user group... to open the New LDAP User Group dialog. Select the LDAP connection to be worked with from the drop down menu and click OK. If no entries appear in the menu, no LDAP user group connections have been configured. 86 User Guide MailMarshal will then query the server for a list of available user groups, and display the results in a list. (If MailMarshal is unable to connect to the server no groups will be shown.) Select an LDAP group from the list. This group will appear in the list of User Groups. The group name will consist of the LDAP Connection name and the group name as retrieved from the server. Repeat this action to add other user groups. When done, click OK. Initially, an LDAP group will be empty of users; it will be populated at the next scheduled update. A group can also be populated by right clicking it in the list of groups, and selecting All Tasks > Reload from LDAP Server. An LDAP user group can immediately be specified in any MailMarshal rules; however, such rules should not be made effective (i.e. the server should not be reloaded) until the group has been populated. Note Although MailMarshal does not prohibit adding and deleting members from LDAP groups, such changes will not be sent to the LDAP server, and they will be lost during the next scheduled update from the LDAP server. Any changes to membership of these groups must be made at the LDAP server. Chapter 6 • User Groups 87 To Move and Copy User Groups To copy a User Group, right-click it in the Configurator. To make a copy, choose Duplicate from the context menu. To move a User Group so that it is included within another User Group, drag it over the target Group. To copy a User Group so that it is included within another User Group, hold down the <CTRL> key while dragging. 88 User Guide Chapter 7 POP3 Accounts MailMarshal can function as a POP3 server for local domains (as specified during setup or in Server Properties). A POP3 login must be created for each mailbox that will be hosted by MailMarshal. If MailMarshal receives an email message addressed to the POP3 domain but no matching account has been created, the message will be dealt with (forwarded or refused) according to the options set up for the domain. See“Local Domains” on page 167 for more information on POP3 domains. If a POP3 domain exists, MailMarshal automatically starts an additional service to respond to POP3 requests. This POP3 service appears in the list of services in the Configurator and Console. POP3 accounts also permit email relaying. Since the MailMarshal server functions as an email gateway, it is likely to be available from anywhere on the Internet. Traveling email users who wish to send email from their business address, using the scanning and stamping features of MailMarshal, can do so if they have MailMarshal POP3 accounts. See “POP3 Accounts for Relaying Authentication” on page 91. Note The relaying authentication feature may be used regardless of where MailMarshal delivers messages for an address, and without any POP3 local domains being configured. See “POP3 Accounts for Relaying Authentication” on page 91. Chapter 7 • POP3 Accounts 89 To Set Up POP3 Accounts In the left pane of the Configurator, select POP3 Accounts. Click the New POP3 Account icon in the toolbar. Enter the details for the account holder and authentication information in the New POP3 Account dialog. If the account will be used for email delivery (if MailMarshal is operating one or more POP3 local domains), MailMarshal will automatically enter an appropriate SMTP alias for email delivery to this account’s mailbox. Make any desired changes to this alias, and enter any additional SMTP addresses for which email should also be delivered to this account’s mailbox. (The domain name of each alias address must be one for which MailMarshal is functioning as a POP3 local domain server.) If more than one POP3 account has the same SMTP alias, messages directed to that alias will be delivered to all of the mailboxes. If the password fields are left blank, MailMarshal will use Windows NT authentication to determine access for this account. In this case, ensure that the account name matches the name of a valid Windows NT user account permitting access to files on the MailMarshal server computer. Click Add to add the account. When all accounts have been added, click Close. 90 User Guide POP3 Accounts for Relaying Authentication A “POP3 account” may be used for relaying authentication only, and not for message delivery. This feature may be useful, for instance, to traveling email users who wish to send email from their business address, using the scanning and stamping features of MailMarshal. In this case, enter an arbitrary value (such as “none”) in the SMTP Address field. Delete any valid SMTP addresses that MailMarshal may have inserted automatically. Before you can enable relaying authentication, MailMarshal must be configured to request ESMTP authentication. See the Receiver tab of the Advanced Properties dialog (found on the Advanced tab of Server Properties). The users’ email client software must be configured to use authentication when sending outbound messages. Consult the client software documentation for further information on how to do this. To enable authentication on the MailMarshal server, create a rule using the Condition Where sender has authenticated and the Action Accept Message. To Edit POP3 Accounts To edit an existing POP3 account, select POP3 Accounts in the left pane of the Configurator. Double-click the account to be edited. Change the password and aliases as required, then click OK. To Delete POP3 Accounts To delete a POP3 account, select POP3 Accounts in the left pane of the Configurator. Select the account to be deleted then click the Delete icon in the toolbar. Chapter 7 • POP3 Accounts 91 92 User Guide Chapter 8 Virus Scanners MailMarshal is not a traditional virus scanner; however MailMarshal does provide substantial proactive protection against viruses through file name and file type checking, as well as TextCensor scanning for virus-related text and harmful commands. MailMarshal can also invoke third-party virus scanners to check email messages and attachments for viruses. Nearly all MailMarshal installations use third-party virus scanning. MailMarshal allows one or more virus scanners to be used to check email for viruses. Because virus scanners have differing architecture, some organizations choose to use multiple scanners. MailMarshal invokes the virus scanner after unpacking all elements of an email message. MailMarshal then passes the elements to the scanner software for analysis, and takes action based on the code returned from the scanner. Selected virus scanners can be used to attempt to clean infected files. Sample virus scanning and cleaning Rules are included in the MailMarshal default Rules. These Rules may be modified to suit local conditions. For details on configuring virus scanning Rules, see Chapter 5, “Rulesets and Rules.” Chapter 8 • Virus Scanners 93 To work with MailMarshal, a virus scanner must have a command-line interface or a special MailMarshal DLL. The scanner must return a documented response indicating whether or not a virus is detected. Most commercially available virus scanners meet these specifications. Note DLL based scanners are significantly faster than command line scanners, because the scanner is always memory resident. Marshal recommends the use of DLL scanners for sites with high message traffic. The virus scanners listed below have been tested and validated for use with MailMarshal as of this writing. Appropriate parameters for these scanners are pre-coded in the Configurator, ready for selection. (Please see Marshal Knowledge Base article Q10923 for the latest list.) • Marshal Integrated McAfee Antivirus (DLL, Supports cleaning) • Norman Virus Control (DLL, Supports cleaning) • Panda Antivirus (DLL, Supports cleaning) • Sophos Anti-Virus (DLL, Supports cleaning) • Symantec AntiVirus Engine (DLL, Supports remote installation and cleaning) • InnoculateIT 6.x • Network Associates Netshield and McAfee Command Line Scanner • NOD • Vet Anti-Virus for NT Server • PestPatrol (Requires additional software, available in USA only) 94 User Guide Each virus scanner to be used should be installed on the MailMarshal Server computer (or remotely, if remote access is available) according to the manufacturer’s instructions. Note Marshal Integrated McAfee Antivirus requires installation of the Marshal Integrated McAfee Antivirus Console, available in a separate download from Marshal. This interface is enabled through a special MailMarshal product key. MailMarshal trial keys have this feature enabled. Permanent keys for Marshal Integrated McAfee Antivirus are available from Marshal suppliers. Best Practices Marshal recommends the following basic practices to ensure security with respect to viruses and virus scanning: • Block messages and attachments which MailMarshal cannot scan, such as password protected attachments and encrypted attachments (e.g. files of type ‘Encrypted Word Document’). • Block encrypted messages which MailMarshal cannot decrypt, such as PGP and S/ MIME messages. • Block executable and script files by type and name. This helps to ensure that unknown viruses will not be passed through. • Subscribe to email notification lists for virus outbreaks (such lists are offered by many anti-virus software companies). When an outbreak occurs, block the offending messages by subject line or other identifying features. Note If resident or “on access” virus scanning is enabled, MailMarshal’s working folders must be excluded from scanning. See “MailMarshal Directories and Resident Scanning” on page 101. Chapter 8 • Virus Scanners 95 Configuring a New Virus Scanner To configure a new virus scanner within MailMarshal, in the left pane of the Configurator select Virus Scanners. Click the New Virus Scanner icon in the toolbar to start the New Virus Scanner Wizard. Select a pre-configured scanner from the list, or select “Custom Scanner” to enter full information about a scanner not on the list of supported scanners. On the next wizard page, enter (or browse to) the location where the main executable scanner file is located (e.g. c:\McAfee\Scan.exe). DLL based scanners do not require this information to be entered. If this is a custom scanner, enter the other required information–see “Viewing Virus Scanner Properties” for information on the fields. Note If further information about a pre-configured scanner is required, click Vendors Web Site to open the manufacturer’s web site in a web browser window. If this scanner is installed remotely, enter the server name or IP address and port where the scanner can be accessed. On the final page, click Finish to add the virus scanner; it will appear in the right pane of the Configurator. When at least one scanner is configured, virus scanning rules may be enabled. 96 User Guide Viewing Virus Scanner Properties Double click the name of any virus scanner in the right pane to review and change MailMarshal’s configuration information for that scanner. The fields shown will vary depending on whether the scanner is a command line or DLL based scanner. Command Line Scanner Properties The Name is MailMarshal’s friendly name for this scanner. The Command Line refers to the location of the executable file. The Parameters field allows entry of any necessary additional command line parameters to ensure operation compatible with MailMarshal. The Timeout values indicate how long MailMarshal will wait for the scanner to complete its task. The default values are generous. If review of the MailMarshal logs indicates that the virus scanner is timing out, these values may be adjusted; however repeated timeouts probably indicate a need for greater system resources. Chapter 8 • Virus Scanners 97 The checkbox Single Thread indicates whether the scanner must operate on one message at a time, or may be invoked multiple times. Command line scanners will generally have this box checked. The two remaining fields are used to enter trigger values which specify the meaning of the code returned from the virus scanner. The field Command is triggered if return code is should include values used by the virus scanner to indicate the presence of a virus or errors encountered scanning the file. When one of these values is returned, the MailMarshal Rule condition Where message contains a virus is triggered. The field Command is not triggered if return code is should include values used by the virus scanner to indicate the absence of a virus. When one of these values is returned, the MailMarshal Rule condition Where message contains a virus is not triggered. If the code returned matches neither field, the associated email message is moved to the “Undetermined” deadletter folder and an email notification is sent to the MailMarshal administrator. Entries in both fields may be exact numeric values, ranges of values (e.g. 2-4), greater than or less than values (e.g. <5, >10). More than one expression may be entered in each field, separated by commas (e.g. 1-6,8,>10). Consult the virus scanner documentation for details on return codes. Note Before entering new values for scanner parameters in MailMarshal, test the scanner from the command line using the new parameters. If MailMarshal invokes a scanner with invalid parameters, the result may cause all messages to be treated as infected. 98 User Guide DLL Scanner Properties This dialog is used to view and modify the parameters for communication between MailMarshal and DLL based virus scanners. Most parameters cannot be changed. The Name is MailMarshal’s friendly name for this scanner. The Manufacturer is the name of the scanner manufacturer. Version indicates the engine version of the installed scanner. Virus Signatures lists the currently installed virus signature update. Status indicates whether the scanner is installed and functioning correctly. If the scanner supports virus cleaning this will also be noted. Click Visit Web Site to open a web browser window to the scanner manufacturer's web site. Chapter 8 • Virus Scanners 99 Scanner Install Location: If the scanner can be installed remotely, this section of the dialog will be enabled. A choice of install location will have been made when the scanner was first configured in MailMarshal. If you make a change here, MailMarshal will verify the presence of the scanner in the location you specify before accepting the change. • The scanner is installed on the local server: Select this option if the scanner is installed locally. • The scanner is installed on a remote server: Select this option if the scanner is installed on a remote server. Enter the following information: Server Name: The name or IP address of the server where the scanner is installed. Server Port: The port on which scanning requests are accepted. Using Other Virus Scanners Most commercial virus scanners can be used as command line scanners with MailMarshal. Generally, the following considerations apply when using an alternative virus scanner. Verify that a Windows 2000 (or XP) compatible version is available. The product must have a command line interface and must be capable of running silently in the background. When entering the virus scanner information in the New Virus Scanner Wizard, choose Custom Scanner. Enter the path to the executable file and the parameters for silent operation. In the Parameters field, use the string “{CmdFileName}” (including the quotation marks) to indicate to the scanner software which folders it is to scan. Review the parameter syntax for a pre-configured scanner to understand the use of this entry. 100 User Guide Testing Virus Scanners Virus scanner setup may be tested by clicking the Test Virus Scanners icon in the toolbar (visible when the Virus Scanners node is selected in the left pane of the Configurator). You will be prompted to choose a file. All configured scanners will be used to scan the selected file. The results will be displayed in a dialog. If MailMarshal virus scanning rules are enabled, scanning can be checked by sending a test virus in an email message. To create a test virus, open a new text file and paste in the following string: X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TESTFILE!$H+H* Save the file as “eicar.com”. (A copy of this file may be found in the MailMarshal install directory). Attach the file to an email message and send it through MailMarshal to an external test email account. If the virus scanner and scanning Rule are correctly configured to stop outbound viruses, your MailMarshal installation should take action on the message. Alternatively, send an email message to test@marshal.com to receive information on how to receive a message containing the file eicar.com (this is an automated service). MailMarshal Directories and Resident Scanning Network servers are usually protected by virus scanning packages to search disk directories for contaminated files, particularly newly-created or imported files. However, you must ensure that certain directories, which are used by MailMarshal to process and quarantine infected email messages, are excluded from any existing resident or “on-access” anti-virus scanning. These include the Incoming, Explode (MMExp), and Rulesets directories. Chapter 8 • Virus Scanners 101 By default new MailMarshal installations create all of these directories within the MailMarshal install directory. If the locations are changed then virus scanning exclusions must be changed to reflect the new locations. The locations of these directories may be verified from the Advanced tab of Server Properties. Note Prior to version 5.0, MailMarshal placed the default Explode directory in the root of the system drive (e.g. C:\MMExp). This location will not be changed during product upgrade, but may be changed from the Advanced tab of Server Properties if desired. MailMarshal checks for resident file scanning by attempting to write the standard test virus file eicar.com (not a real virus) in each of the directories which must be excluded from scanning. If any of these files are removed or cleaned by a resident scanner, or MailMarshal is denied access to the files, the MailMarshal engine may not start and the email administrator will be notified. If the check succeeds, MailMarshal deletes the eicar.com files (except for one copy left in MMExp\avcheck.) Please refer to the virus scanner manufacturer’s documentation for information on excluding directories from on-access scanning (e.g. in Networks Associates NetShield, exclusions are set via the Exclusions tab in Scan Properties). If the virus scanner does not have the facility to exclude the appropriate directories, on-access scanning must be disabled completely. Details of Excluded Directories Incoming MailMarshal places received email in this directory before processing it. Explode (MMExp) MailMarshal copies files to the Explode directory and invokes virus scanners explicitly to check for viruses. If a resident virus scanner found and cleaned a file here, MailMarshal's virus scanning might then determine the file to be clean. MailMarshal would then pass the original message through with the virus still present. 102 User Guide Rulesets Folders within the Rulesets directory are used to store messages, including those “quarantined” by virus scanning rule actions. Chapter 8 • Virus Scanners 103 104 User Guide Chapter 9 External Commands An external command is a custom executable or batch file that can be run by MailMarshal. The command can be used to check email messages for a condition, or to perform an action when a message meets some other condition. MailMarshal is provided with an external command for message release (see below), and some other suggested uses are given later in this chapter. In order for an external command to be used to check for a condition, the command must return a standard return code. Chapter 9 • External Commands 105 External commands must be defined within MailMarshal before they can be used in Rules. To create a new external command, in the left pane of the Configurator select External Commands. Click the New External Command icon in the toolbar to see the New External Command dialog. Enter a name for the external command. Type the path for the executable file (or browse to it using the button provided). In the Parameters field, enter any command line parameters necessary. The Timeout and Timeout per MB values control how long MailMarshal will wait for a response before ignoring the external command. The default values are very generous. The Single Thread setting indicates whether the scanner must operate on one message at a time, or may be invoked multiple times. In most cases this checkbox should be left checked. Certain executables and DLL applications may be run multi-threaded. The Only execute once for each message setting determines whether an external rule condition command will be run for each component of a message, or only once. E.g. if an external command definition is being used for policy-based virus scanning, this box should be unchecked to ensure that each component of each message is scanned. 106 User Guide Where the external command will be used as a Rule condition, set the trigger return code information. This information should be specified in the documentation of the executable. Two fields are used to enter trigger values which further specify the meaning of the code returned from the virus scanner. • If the code returned matches any value entered in the field Command is triggered if return code is, MailMarshal will consider the condition to be satisfied. • If the code returned matches any value entered in the field Command is not triggered if return code is, MailMarshal will consider the condition not to be satisfied. • If the code returned matches neither field, the file is moved to the Undetermined deadletter folder and an email notification is sent to the MailMarshal administrator. Entries in both fields may be exact numeric values, ranges of values (e.g. 2-4), greater than or less than values (e.g. <5, >10). More than one expression may be entered in each field, separated by commas (e.g. 1,4,5,>10). Uses of External Commands Custom executables or batch files may be used with the Rule condition Where message triggers an external command. For instance, fgrep.exe can be used for advanced expression matching. Custom executables may also be used with the Rule action Run the external command. For instance, a particular email subject line might invoke a batch file to start or stop a system service, or to send a page or network notification to an administrator. Message Release MailMarshal is provided with a pre-configured external command, MMReleaseMessage.exe This command allows email users to release selected messages from MailMarshal folders. (Messages can also be released using the MailMarshal Console.) Chapter 9 • External Commands 107 To Use Message Release 1. Create or modify a Mail Marshal Rule which moves certain messages to a Folder. 2. In this Rule, include a Rule Action which sends a Notification message. The body of this message must contain the variable {ReleaseProcessRemaining} or {ReleasePassThrough}. These variables allow a choice of release actions; see “Processing a Message” on page 237 for details. MailMarshal includes a preconfigured template, Automatic Message Release Outbound, which includes the {ReleaseProcessRemaining} variable. Note The From address must be one which guarantees that replies will pass through MailMarshal. Do not use a local domain address to process requests from internal users. The address need not be valid but it must be well-formed. For instance, the template Automatic Message Release Outbound uses a From address of MessageRelease@Release.it 3. To process message release requests, create a MailMarshal Rule similar to the following: When a message arrives Where addressed to MessageRelease@Release.it Run the external command Message Release And write log message(s) with Release Requests And delete the message (The logging classification “Release Requests” is pre-configured.) Automatic Message Release should be used sparingly as it tends to defeat MailMarshal's purpose. The {ReleaseProcessRemaining} variable is preferred because it forces all messages to be evaluated against all Rules. 108 User Guide Advanced Usage of Message Release • If MailMarshal is used in an array, more complex Rules are required to route the release requests to the correct MailMarshal server. Please contact Marshal support for more information. • If you want to be notified of failed message release attempts, run the external command as a rule condition rather than an action. The Message Release executable returns 0 on success and 1 on failure. • By default the Message Release executable deletes the message after releasing it. To leave a copy of the message on the server after releasing it, edit the external command definition. In the properties, change the parameters field to read {MessageName} -l (the last character is a lower case letter L). Note This option can result in a message being sent more than once. Chapter 9 • External Commands 109 110 User Guide Chapter 10 Folders MailMarshal uses folders for several purposes related to rule processing. An email message which triggers a rule may be copied or moved to a folder. This action is commonly taken for messages which are suspected of containing viruses, but may also be used for archival or other purposes. An outgoing email message may be “parked” to a folder for scheduled later delivery. An email message which cannot be processed (due to addressing or structure problems) will be placed in a subfolder of the DeadLetter folder. MailMarshal also maintains a “Mail Recycle Bin” folder. By default, messages deleted by user action within the Console are moved to this folder and retained for the period specified in the folder properties. To work with folders, select Folders in the left pane of the Configurator. Chapter 10 • Folders 111 Creating a New Folder To create a new folder, click the New Folder icon in the toolbar to start the New Folder Wizard. On the first page of the Wizard, choose whether the folder is to be a Standard or a Parking folder. On the next page of the Wizard, give the folder a name. Further options depend on whether the folder is a Standard or a Parking folder. Standard Folders A time limit may be set for message retention in the folder. This option is typically used for “quarantine” folders where the message may be released on request from the user to an administrator. Messages will be deleted automatically after the set time. 112 User Guide Subdirectories may be created periodically within the folder This option is typically used where a substantial volume of email is expected, so that messages are easier to find. Check the box Folder is used for message archiving to create an Archive folder (See below). Within the MailMarshal Console, messages in Archive folders are assumed to be “stored”: they may be viewed and forwarded but not deleted. Messages in other Standard folders are assumed to be “in process” and they may be reprocessed or deleted, among other actions. See Chapter 20, “The Console” for further information. Click OK to create the folder, or Cancel to lose any changes. Parking Folders When a Rule moves a message to this type of folder, it will be “parked” if the time is within the blue schedule block and released (or sent immediately) when the time is outside the blue schedule block. Chapter 10 • Folders 113 Use the checkbox Continue processing rules on release to determine what happens to parked messages when they are released from this Folder for delivery. If the box is checked, the message will be evaluated against all rules after the Rule which placed the message in this Folder). Alter the schedule block if desired: • Drag using the left mouse button to add to the blue “parking” area. • Drag using the right mouse button to erase from the blue “parking” area. • To reset the schedule to the default time block, click Set Default Schedule. • Choose to “snap” the schedule times to the nearest full, half or quarter hour using the drop down box. Click OK to create the folder, or Cancel to lose any changes. The Mail Recycle Bin This folder exists by default and cannot be deleted. A time limit may be set for message retention in the folder. Messages moved to the Recycle Bin (using the MailMarshal Console) will be permanently deleted after the set time. The default retention time is 7 days. Editing an Existing Folder To edit the properties of an existing Folder, double-click its name in the right hand pane of the configurator. Make any required changes, then click OK. 114 User Guide Changing the Default Folder Location The default location for message folders is the Rulesets subfolder of the MailMarshal install directory. The base physical path for all folders can be changed to any location on a local drive. Please see “Advanced” on page 192 for details. Note If the folder physical path is changed, any messages in the old location must be moved manually to the new location. Folder Security Permission to use the MailMarshal Console (to view and take action on messages in folders) is controlled by setting user permissions on the MailMarshal.key file. See “Console Security Issues” on page 231. In some cases it may be desirable to set different access permissions for different folders (for instance, if archived messages are to be available to the users who sent them). Such permissions may be set using standard Windows security procedures for the physical folder. Chapter 10 • Folders 115 116 User Guide Chapter 11 Email Templates Email Templates allow notification email messages to be sent based on the outcome of Rule processing. This facility is most often used to notify appropriate parties when a message is blocked. Notifications are a very powerful tool to inform and modify user behavior. When well thought out and constructed, they can save the administrator a lot of time. Notifications may also be used as a general autoresponder based on message headers or content. For instance, a message to robot@ourcompany.com with the subject “Send Catalog” might trigger a rule returning the product catalog to the sender as an email attachment. The same Rule outcome may send several notification messages. For instance, if a virus is detected the email administrator, external sender, and intended internal recipient of the message might each receive a different message. Attachments to a notification may be made. Attachments may include the original message, the MailMarshal processing log for the message, and any other file (such as a virus scanner log file). To work with Templates, select Email Templates in the left pane of the Configurator. Chapter 11 • Email Templates 117 MailMarshal is provided with numerous templates by default. These are a good source of ideas for the creation of new templates. Note In addition to Rule notification templates, MailMarshal uses a number of pre-configured templates for administrative notifications (such as delivery failure notifications). To modify these templates, see the Advanced tab of MailMarshal Server Properties. Creating an Email Template Click the New Template icon in the toolbar to see the New Email Template dialog. 118 User Guide Give the Template a name. MailMarshal allows variable information to be inserted into the message headers and body from the original email (which triggered a Rule, invoking this Template). Variables are enclosed within braces { }. To see a list of variables available in any field, type { to bring up a context menu. Additional information on the variables is available in the online help for this dialog. Enter appropriate information in the Header Details section. For instance, enter the email address to which replies should be sent in the Return Path field. To attach the original message, the MailMarshal message processing log, or another file to the notification, check the appropriate box and enter the file name if necessary. Enter an appropriate message in the Message Body field. Variables marked with braces { } may be used. Variables may be nested and Windows environment variables may be included using the variable {env=} A file may be included in the body of a notification message using the variable {file=filepath} Note When sending a notification to the original sender of an email message, use the {ReturnPath} variable in the To: field to reduce the chance of looped messages. Duplicating an Email Template To copy a Template, right-click it in the Configurator. Choose Duplicate from the context menu. After duplicating the Template, make any required changes to the copy. Editing an Email Template To edit a Template, double-click on its name in the right hand pane of the Configurator. Make the required changes then click OK. Chapter 11 • Email Templates 119 Deleting an Email Template To delete a Template, select it in the right hand pane of the Configurator then click the Delete icon in the toolbar. 120 User Guide Chapter 12 TextCensor Scripts TextCensor scripts are used to check for the presence of particular lexical content in an email message. The check may include all parts of the message, including the message headers, message body, and any attachments that can be lexically scanned. It may also be limited to one or more of these areas. A script may include many conditions based on text combined with Boolean and proximity operators. Triggering of the script is based on the weighted result of all conditions. TextCensor scripts are invoked by Standard Rules. To work with TextCensor Scripts, select TextCensor Scripts in the left pane of the Configurator. Chapter 12 • TextCensor Scripts 121 TextCensor Syntax TextCensor scripts contain one or more lines, each consisting of a word or phrase. • The wildcard character * may be used at the end of a word only (e.g. “be*” matches “being” and “behave”). • Parentheses should be used to set the order of evaluation and for grouping. • Each line may include Boolean and proximity operators. The operators must be entered in capital letters. The six supported operators are: Operator Function Example AND Matches when all terms are present Dog AND cat OR Matches when any term is present dog OR cat dog OR (cat AND rat) NOT Logical negation of terms; use after other operators; means “anything else but.” Dog AND NOT cat NEAR Matches when two terms are found within the specified number of words of each other. The default is 5. Dog NEAR=2 bone FOLLOWEDBY Matches when one term follows another within the specified number of words. The default is 5. Dog FOLLOWEDBY=2 house INSTANCES Matches when a term is found the specified number of times. You must specify a value. Dog INSTANCES=3 Dog FOLLOWEDBY (NOT house) When you use NEAR and FOLLOWEDBY, a “word” is defined as any group of one or more contiguous alphanumeric characters, bounded at each end by non-alphanumeric characters. If any non-alphanumeric characters have been included as “special characters”, each single special character is also counted as a “word”. 122 User Guide For instance, by default “S-P-A-M” counts as four words. If the “-” character is entered as a “special character,” then the same text counts as 7 words. Note The INSTANCES operator is provided for compatibility with earlier TextCensor scripts, but its use is discouraged. The use of appropriate weighting (see below) will produce the same result with improved performance. Weighting the Script Each script is given a trigger level, expressed as a number. If the total score of the content being checked reaches or exceeds this level, the script is triggered. The total score is determined by summing the scores resulting from evaluation of the individual lines of the script. Note The script will be applied separately to each part of a message. E.g. if both Headers and Message Body are selected for evaluation, the script will be evaluated once for the headers, then again for the body. Script triggering is not cumulative over the parts. Chapter 12 • TextCensor Scripts 123 Each line in a script must be given a positive or negative weighting level and a weighting type. The type determines how the weighting level of the line is figured into the total score of the script. There are four weighting types: Weighting Type Description Details Standard Each match of the words or phrases will add the weighting value to the total. If the weighting level of this item is 5, every match will add 5 to the total. Decreasing Each match of the words or phrases will add a decreasing (logarithmic) weighting value to the total. Each additional match is less significant than the one before. If the weighting level of this item is 5, the first five matches will add 5, 4, 4, 3, and 3 to the total. Increasing Each match of the words or phrases will add an increasing (exponential) weighting value to the total. Each additional match is more significant than the one before. If the weighting level of this item is 5, the first five matches will add 5, 5, 6, 6, and 7 to the total. Once Only Only the first match of the words or phrases will add the weighting value to the total. If the weighting level of this item is 5, this item will contribute at most 5 to the total, no matter how many times it matches. Negative weighting levels and trigger levels can be used to allow for the number of times a word may appear in an inoffensive message. For instance: if “breast” is given a positive weighting in an “offensive words” script, “cancer” could be assigned a negative weighting (since the presence of this word suggests the use of “breast” is medical/descriptive). Note Because script evaluation stops when the trigger level is reached, items with negative weighting should be evaluated first. Use the Sort List button to set the order of evaluation correctly. 124 User Guide Adding a TextCensor Script Click the New TextCensor Script icon in the toolbar to see the New TextCensor Script dialog. Give the script a name. Check the various boxes to select which portions of an email message will be scanned by this script. Note The script will be applied separately to each part. E.g. if both Headers and Message Body are selected, the script will be evaluated once for the headers, then again for the body. Script triggering is not cumulative over the parts. Chapter 12 • TextCensor Scripts 125 By default only alphanumeric characters may be entered in TextCensor items. If any nonalphanumeric characters are required, click on the checkbox to enable matching for special characters and enter any special characters to be matched. For instance, to match the HTML tag fragment “<script” you must enter the < in this field. To match parentheses () you must enter them in this field. Click on New to obtain the New TextCensor Item dialog. Select a weighting level and type for this item (see “Weighting the Script” on page 123 for more information) Enter the item, optionally using the operators described earlier in this section, e.g. (Dog FOLLOWEDBY hous*) AND NOT cat In this example the item weighting will be added to the script total if the scanned text contains the words “dog house” (or “dog houses”, etc.) in order, and does not contain the word “cat”. Note TextCensor items are case insensitive by default. However, quoted content is case sensitive. For instance, “textcensor” would not trigger on the title of this chapter. Click Add (or press <Enter>) to add the item to this script. The dialog box remains open and additional items may be created. When all items have been entered, click Close to return to the New TextCensor Script dialog. 126 User Guide Select a Weighting Trigger Level. If the total score of the script reaches or exceeds this level, the script will be triggered. The total score is determined by evaluation of the individual lines of the script. Click Sort List to set the order of evaluation. Items with negative weighting levels will be set to evaluate first. Note Because evaluation of a Script stops when the trigger level is first reached, setting evaluation order is important. Editing a TextCensor Script Double-click the script to be edited in the right pane to bring up the Edit TextCensor Script dialog. A line may be edited by double-clicking on it or deleted by selecting it then clicking Delete. The script name, parts of the message tested, special characters, and weighting trigger level may be changed. Use the Sort List button if necessary to adjust the order of items. Click OK to accept changes or Cancel to revert to the stored script. Duplicating a TextCensor Script To copy a TextCensor Script, right-click it in the Configurator. Choose Duplicate from the context menu. After duplicating the Script, make any required changes to the copy. Chapter 12 • TextCensor Scripts 127 Importing a TextCensor Script TextCensor Scripts may be imported from XML or CSV (comma separated) files. Click the New TextCensor Script icon in the toolbar. Click Import. Choose the file to be imported, and click Open. In the Edit TextCensor Script dialog, click OK. Note TextCensor Scripts exported from MailMarshal 4.2.5 and earlier versions do not include the Weighting Trigger Level, Special Characters, and Apply to following parts settings. When importing such a script, this information must be added manually. Exporting a TextCensor Script TextCensor Scripts may be exported to XML or CSV (comma separated) files. Double-click the script to be exported in the right pane to bring up the Edit TextCensor Script dialog. Click Export. Enter the name of the file to which the script should be exported, and click Save. In the Edit TextCensor Script dialog, click OK. 128 User Guide Testing TextCensor Scripts A TextCensor script may be tested against a file or pasted text. In the New or Edit TextCensor Script dialog, click Test to use the Text TextCensor dialog. • Select Test script against file. Enter the name of a file containing the test text (or browse using the button provided). • Select Test script against text. Type or paste the text to be tested in the field. Click Test. The result of the test (including details of the items which triggered and their weightings) will be shown in the Test Results pane. Chapter 12 • TextCensor Scripts 129 Using TextCensor Effectively The effective use of TextCensor scripts depends on understanding how the Text Censor facility works and what it does. Text censor rules are evaluated against text portions of messages (including headers, message bodies, and attachment content). Constructing TextCensor Scripts The key to creating good TextCensor scripts is to enter exact words and phrases that are not ambiguous. They must match the content to be blocked. Also, if certain words and phrases are considered to be more undesirable than others, those words and phrases should be given a higher weighting to reflect the level of undesirability. In creating TextCensor scripts, a balance must be struck between over-generality and over-specificity. For instance, suppose a script is required to check for sports-related messages. To enter the words “score” and “college” alone would be ineffective in that those words could appear in many messages. Hence the script would trigger too often, potentially blocking general email content. The same script (to find sports-related messages) would be better constructed using the phrases “extreme sports”, “college sports” and “sports scores” as these phrases are sport specific. However, using only a few very specific terms may mean that the script does not trigger often enough. Again using the sports example used above, the initials NBA and NFL, which are very sports specific, should be given a suitably higher weighting (i.e. promoting earlier triggering) than, e.g. “college sports”. 130 User Guide Decreasing Unwanted Triggering TextCensor scripts may trigger on message content which is not obviously related to the content types they are intended to match. The recommended procedure to troubleshoot this problem is: 1. Use the problem script in a Rule which copies messages and their processing logs to a folder (e.g. “suspected sports messages”). 2. After using this rule for some time, check on the messages that have triggered the script. Review the message logs to determine exactly which words caused the script to trigger (see “Interpreting Message Logs” on page 238). 3. Revise the script by changing the weighting, weighting type, or key words, so as to trigger only on the intended messages. 4. When satisfied, modify the Rule so as to block messages that trigger the script, and to notify the sender and/or the intended recipient. Chapter 12 • TextCensor Scripts 131 132 User Guide Chapter 13 Logging Classifications Log records are further categorized by Logging Classifications. Messages may be classified within Standard Rule Actions. Both MailMarshal Reports and the Console Message History/Search can show the classification of a message. Each Rule should include a logging action. MailMarshal’s default Rules include such actions. Logging Classifications may be added and customized. To work with Logging Classifications in the Configurator, select Logging Classifications from the left hand menu tree. For general information on logging and reporting see Chapter 18, “Reports.” Chapter 13 • Logging Classifications 133 Creating a Logging Classification Click the New Logging Classification icon in the toolbar to see the New Logging Classifications dialog. In the dialog, enter a meaningful name for the classification. Enter a number as the classification code for this classification. Reports can be generated using these codes. By default the next available number in sequence is used for a new classification; however, any unused number may be entered. Give a brief description of the classification and its purpose. This description will be used in the Console and Reports, and may contain {} variables as in the Email Templates. Click OK to add the classification. Editing a Logging Classification To edit an existing logging classification, double-click it in the right pane of the configurator to view its properties. Make any required changes then click OK. 134 User Guide Duplicating a Logging Classification To copy an existing logging classification, right-click it in the Configurator. Choose Duplicate from the context menu. After duplicating the classification, make any required changes to the copy. Deleting a Logging Classification To delete a logging classification, select it in the right pane of the configurator, then click the Delete icon in the toolbar. Logging Classification Usage Logging classifications are most commonly used to report on broad categories, such as viruses or executable files quarantined. However they may also be used to record very specific occurrences such as a specific file or size of file being sent. E.g. the question “How many PDF files over 500K in size were sent by Sales” could be answered by creating a Rule to log sending of such files. Chapter 13 • Logging Classifications 135 136 User Guide Chapter 14 Message Stamps Message stamps are short blocks of text which may be applied to the top or bottom of an email message body. MailMarshal message stamps may include a plain text and an HTML version. The appropriate stamp format will be applied to the body text of the same type in the message. Message stamps are typically used for corporate disclaimers or advertising on outgoing email. Message stamps can also be used by MailMarshal to notify the recipient that a message has been processed (e.g. by having an offending attachment stripped). To work with message stamps in the Configurator, select Message Stamps in the left pane. Message stamps may also be created and edited from the stamp selection dialog during Rule creation. Chapter 14 • Message Stamps 137 Creating a New Message Stamp In the Configurator, click the New Message Stamp icon to bring up the New Message Stamp dialog. Give the stamp a name and select whether it is to appear at the top or the bottom of messages. Enter a plain text version of the message stamp in the Plain Text tab. Then enter an HTML version of the stamp, if desired, in the HTML tab. Various formatting, including hyperlinks, may be applied to the HTML text using the buttons provided. To view the raw HTML, right-click in the HTML pane and select Edit Raw HTML. Edit the HTML, or paste HTML source from another editor, then click OK to return to the message stamp dialog. 138 User Guide Click OK to add the new stamp to the list of available message stamps. Note If RTF message stamping is enabled, the plain text message stamp will be used with RTF messages. To enable RTF stamping, see the Advanced tab of Server Properties. Both plain text and HTML message stamps may include the same variables available within email notification templates. You will find more information on variables in the example stamps provided with MailMarshal, the online help for this dialog, and Chapter 11, “Email Templates.” Duplicating a Message Stamp To copy a Message Stamp, right-click it in the Configurator. Choose Duplicate from the context menu. After duplicating the Message Stamp, make any required changes to the copy. Remember to make changes to both the Plain Text stamp and the HTML stamp. Editing a Message Stamp To edit a Message Stamp, double-click on its name in the right hand pane of the Configurator. Make the required changes then click OK. Remember to make changes to both the Plain Text stamp and the HTML stamp. Deleting a Message Stamp To delete a Message Stamp, select it in the right hand pane of the Configurator then click the Delete icon in the toolbar. Chapter 14 • Message Stamps 139 140 User Guide Chapter 15 Header Matching and Rewriting MailMarshal can apply Regular Expression matching to find and/or modify email header and envelope detail. Header matching is available as a Standard Rule condition. Header rewriting can be performed as a global action by the MailMarshal Receiver during email message receipt, or by a Standard Rule action. Regular expressions are extremely powerful but somewhat difficult to construct. Especially in the case of rewriting, great care should be taken to ensure that the rules perform as expected. Basics of Regular Expression syntax are given later in this chapter. Some examples of actions that can be performed are • Address modification - for example, changing user@host.domain.com to user@domain.com. • Field removal - for example, stripping out the received: lines from outbound messages. • Alias substitution - for example, replacing addresses via a lookup table, as in user1@olddomain.com being replaced by user2@newdomain.com. • Domain masquerading - for example, replacing all addresses in thisdomain.com with identical addresses in thatdomain.com. Chapter 15 • Header Matching and Rewriting 141 • Subject line modification - for example, notifying a user that attachments have been stripped from a message. • Adding header lines - for example, to mark a message as having been processed. Note Test any rewriting rules thoroughly, as errors may cause all affected messages to be undeliverable. Header Wizard Header matching and rewriting rules are created using a wizard. To start the wizard, click New within the parent dialog (Rule condition, Rule action, or Header Rewrite tab). The pages in the wizard are as follows: • An introduction page that gives warning information (for Rewriting only). • A field matching page to select the header or envelope fields to be matched, and the portion of the field to be modified. • A substitution options page where matching and substitution expressions are entered. • A naming and test page for naming the rule and testing the matching and substitution. In addition, the order of evaluation of header rewriting rules may be adjusted using the arrows at the bottom of the parent dialog. See “Order of Evaluation” on page 149. 142 User Guide Field Matching On this page of the Wizard, select the fields to be matched or rewritten from the list. If the field you want is not in the list, click Add custom field then enter the field name (e.g. x-Custom-Field). Choose the appropriate parsing method using the drop-down list. Note If inserting a custom field, use the parsing method Entire Line. As an example of different parsing methods, consider the following To: header. To: (A User) auser@domain.com, “Another user at domain2.com” buser@domain2.com Chapter 15 • Header Matching and Rewriting 143 The following table shows the field data that is passed to the substitution engine for the various parsing methods. Parsing method Data passed to the substitution engine Entire line (A User) auser@domain.com , “Another user at domain2.com” buser@domain2.com Email address auser@domain.com buser@domain2.com Domain domain.com domain2.com When matching or modifying address fields in the email header you would usually select the field parsing method Email Address. Each email address in the field is then passed to the substitution engine, while no other characters will be changed. If the box Match Case is checked, field matching will be case sensitive. If this box is cleared, matching will not be case sensitive. Note When matching email addresses be sure to clear this box. Email addresses are not case sensitive. 144 User Guide Matching/Substitution Options On this page of the Wizard, set up the rules which match the selected fields. Shortcuts to some common Regular Expression features are available from the arrow to the right of each field. See “Regular Expression Syntax” on page 149 for details of the available options. Optional Exclusion Filter This field allows you to ensure the Header Match or Rewrite does not occur, regardless of whether the Field Search Expression is matched. The exclusion filter is provided since it can be difficult to express exclusions in regular expressions. To use the exclusion filter, check the box. In the field, enter a Regular Expression. If the selected header(s) match this expression, they will not be matched or rewritten by the rule. Chapter 15 • Header Matching and Rewriting 145 Field Search Expression In this field, enter a Regular Expression that is used to select the data for matching or rewriting. If the selected header(s) match this expression, they will be matched or rewritten by the Rule (subject to the exclusion filter, above). Substitution Actions When rewriting, three actions are available to be taken on the data matched. Substitute into field using expression This action allows the matched data to be replaced using a sed or Perl-like syntax. Sub-expressions which were generated from the field search can be used here as $1 through $9. Note When replacing the entire contents of a field, be sure to terminate the text with a CRLF (\r\n). This value is available for insertion through the arrow to the right of the field. If $0 (the tagged expression containing the entire input line) is entered at the end of the substitution expression, a CRLF will already be included. Map using file This action provides for substitutions from a file, to allow a level of indirection in resolving what to substitute into the field. A map file must be plain text. Each line of the file must contain a key and value pair separated by a comma–for example john@domain.co.uk, john@domain2.co.uk peter@domain.co.uk, peter@host1.domain.co.uk The first entry in the line is a lookup key. The second value is the result to be substituted in place of the original field when the key is matched. If the key value is not found in the map file then it is returned unchanged as the result. 146 User Guide Delete the field When Entire line is selected in the parsing options, selecting Delete the field removes the entire header line from the email. A possible use may be to remove Received: lines from outbound email to hide internal routing information from external recipients. To achieve this effect, select the Received: field and a parsing method of Entire line, then provide a search expression that will match the hosts you wish to hide and select Delete field. For instance, your search expression might look like from (secret.host | private.host).my.domain.com Note While such deletions give a higher level of security, they are not generally recommended as they make tracing any email problems difficult. Insert if missing If any selected header does not exist, the text of this field will be used to create it. E.g. if you have added the custom header x-My-new-field then you might enter the value Created by Header Rewrite. Note When you insert a new field, MailMarshal automatically appends a CRLF (\r\n) to the text. Chapter 15 • Header Matching and Rewriting 147 Naming and Testing On the final page of the Header Wizard, enter a name for the new Rule. Optionally enter a comment which should explain the purpose of the rule. Rule Test Enter an input string in the Source field and click Test. The result will appear in the Result field. For rewriting actions, the result will be the rewritten string. For matching, the result will be “matched” or “not matched”. If this is a rewriting rule, it is possible to select whether the changes will be actually applied and/or logged. Check the box Enable field changes to apply this rule to messages. Check the box Log changes to write a log of changes to the MailMarshal logs for the message. If only Log changes is checked, the logs will show the changes that would have occurred but no changes will actually be made. 148 User Guide Order of Evaluation When satisfied with the new Rule, click Finish to return to the parent dialog (Rule condition, action, or Header Rewrite tab). If several header matching rules are used within a single Standard Rule condition, all must evaluate true for the condition to be true. If several rewriting rules are in use for global Header Rewrite or used within a single Standard Rule action, the order of evaluation will be significant. Rewriting actions will be applied in top-down order as shown in the dialog. Adjust the order of evaluation using the arrows provided below the list of rewriting actions. Regular Expression Syntax MailMarshal implements a full-featured regular expression syntax. Full documentation of this syntax is beyond the scope of this manual. Additional documentation and links to further information may be found in Marshal Knowledge Base article Q10520. A few basics are given below. Shortcuts The arrow to the right of each field on the matching/substitution page of the header rule wizard provides access to some commonly used Regular Expression features. Selection Inserts Usage Any Character . Matches any single character. Character in range [] Enter a range or set of characters to be matched within the brackets. For instance, to match lower case characters you could enter a-z between the brackets. Character not in range [^] Enter a range or set of characters after the ^. Matches any character not in the set. Chapter 15 • Header Matching and Rewriting 149 Selection Inserts Usage Beginning of line ^ Text to the right of the ^ will only match if found at the beginning of the line. End of line $ Text to the left of the $ will only match if found at the end of the line. Tagged expression () The content within the parentheses will be considered as a single expression for repeat purposes. This expression will be saved for use within the substitution field. Or | The field will be matched if it matches either the expression before the | or the expression after the |. 0 or more matches * The expression before the * will be matched if it is repeated any number of times, including zero. 1 or more matches + The expression before the + will be matched if it is repeated at least once. Repeat {} Enter a number or two numbers separated by a comma within the braces. The expression before the braces will be matched if it is repeated the number of times specified. See “Repeat Operators * + ? {}” on page 151. Whitespace [[:space:]] Matches a single whitespace character (space, tab, and so on.). Alphanumeric character [[:alnum:]] Matches a single letter or number character. Alphabetic character [[:alpha:]] Matches a single letter character. Decimal digit [[:digit:]] Matches a single number character 0-9. Reserved Characters Some characters have special meanings within regular expressions. 150 User Guide Operators The following characters are reserved as regular expression operators: * . ? + ( ) { } [ ] $ \ | ^ To match any of these characters literally, precede it with \ For example, to match marshal.com enter marshal\.com Wildcard Character . The dot character (.) matches any single character. Repeat Operators * + ? {} A repeat is an expression that occurs an arbitrary number of times. An expression followed by * can be present any number of times, including zero. An expression followed by + can be present any number of times, but must occur at least once. An expression followed by ? may occur zero times or once only. You can specify a precise range of repeated occurrences as a comma-separated pair of numbers within {}. For instance, ba* will match b, ba, baaa, etc. ba+ will match ba or baaaa for example but not b. ba? will match b or ba. ba{2,4} will match baa, baaa and baaaa. Parentheses ( ) Parentheses serve two purposes: • To group items together into a sub-expression. You can apply repeat operators to sub-expressions in order to search for repeated text. • To mark a sub-expression that generated a match, so it can be used later for substitution. Chapter 15 • Header Matching and Rewriting 151 For example, the expression (ab)* would match all of the string ababab The expression “ab” would be available in a variable (tagged expression) with a name in the range $1...$9 (see the matching and substitution examples in following sections). Alternatives Alternatives occur when the expression can match either one sub-expression or another. In this case, each alternative is separated by a |. Each alternative is the largest possible previous sub-expression (this is the opposite to repetition operator behavior). a(b|c) could match ab or ac abc|def could match abc or def Examples The following sections show examples of matching and substitution strings. Matching The expression (.+)@(.+)\.ourcompany\.com$ will match a sequence of 1 or more characters followed by an @ followed by another sequence of 1 or more characters, followed by .ourcompany.com at the end of the field. That is, it will match john@host.ourcompany.com and john.smith@host.subdomain.ourcompany.com but not peter@host.ourcompany.com.au Substitution Using the example given in the preceding section, the substitution expression $1@$2.co.uk.eu 152 User Guide would yield john@host.co.uk.eu, john.smith@host.subdomain.co.uk.eu and peter@host.ourcompany.com.au respectively. The last result may be somewhat surprising, but data that does not match part of the regular expression is simply copied across. Map Files MailMarshal SMTP allows substitution using regular expressions to search for an entry in text file known as a map file. Each line in the map file contains two values separated by a comma. If the search expression matches the first value in a line, MailMarshal SMTP substitutes the second value. If the search expression does not match the first value in any line, MailMarshal SMTP substitutes the search expression. A typical use of map files is to redirect incoming email to arbitrary addresses. The following simple example modifies email addresses using a map file. Map file john@domain.co.uk, john@domain2.co.uk peter@domain.co.uk, peter@host1.domain.co.uk Search expression (.+)@domain\.co\.uk$ Lookup key $1@domain.co.uk Chapter 15 • Header Matching and Rewriting 153 Sample results The following table shows the matching addresses when the sample mapping file above is used. 154 Input Email Address Result john@domain.co.uk john@domain2.co.uk peter@domain.co.uk peter@host1.domain.co.uk alice@domain.co.uk alice@domain.co.uk User Guide Chapter 16 LDAP Connections What is LDAP? LDAP (Lightweight Directory Access Protocol) is a system for retrieving directory information, such as lists of users, from a remote source. The source may be public (available for anonymous use) or private. Servers providing LDAP support include: • Lotus Notes • Microsoft Exchange • Microsoft Active Directory • Novell GroupWise • Many Sendmail systems Within MailMarshal, LDAP connections are used to import user and group information for User Groups. MailMarshal Secure can use LDAP to retrieve Security Certificates for use in S/MIME encryption. See Chapter 6, “User Groups” in this manual, and the MailMarshal Secure Manual, for further information. Before LDAP can be used to retrieve information, a connection to the remote LDAP server must be established. Chapter 16 • LDAP Connections 155 Adding a New LDAP Server Connection Highlight LDAP Connections in the menu tree, then click the New LDAP Connection icon in the toolbar to start the New LDAP Connection wizard. In the first page of the wizard, choose whether this connection will be used to retrieve User Groups or Certificates. Note To retrieve both User Groups and Certificates from the same server, create two connections. On the LDAP Connection Wizard–Server page, enter the name of the server to be queried into the LDAP Server field. This may be a fully qualified Internet server name or simply the name of a server on the local LAN. Examples of LDAP server names are: ldap.netscape.com directory.baycorpid.co.nz IBMMAIL01 156 User Guide If desired use the browse button provided to select a server on the LAN. The Port number field is used to enter the port on which the remote LDAP server accepts queries. The default value is port 389. However this may be changed where more than one LDAP server is hosted at the same IP address. For example, when running Microsoft Exchange 5.5 on a Windows 2000 Active Directory server, both Exchange and Active Directory provide LDAP services. The network administrator will configure the servers to use different port numbers. Note Server name, port, and login information should be obtained from the LDAP server administrator. Enter the logon name and password, if required, in the appropriate fields. If using Windows integrated security, enter the logon domain as well. Select an LDAP Search Root, if necessary, in the next page. The Search Root is used to limit the amount of information returned in LDAP queries, and specifies the root container of the LDAP server to be searched. This field is usually left blank; however, if the search does not work, ask the LDAP server administrator for an entry. Typically the entry would be the base LDAP Distinguished Name for the organization (e.g. dc=ourcompany.com or o=OurCompany Corporation). Alternatively, check the box to populate the list of available search roots from the remote server (this may take some time). Then select a root from the list. Chapter 16 • LDAP Connections 157 In the final page of the Wizard, enter a name that will be used to identify the LDAP connection (within MailMarshal only.) If this is a User Groups connection, select an Update Interval. The default period between updates is 240 minutes (4 hours). All groups derived from this connection will be updated at the time specified. A shorter time may be desirable if, for example, this option is used to synchronize user information between MailMarshal and Microsoft Exchange Server, and many new users are being added. Conversely, if few users are ever added, setting a longer interval will reduce overhead. 158 User Guide The field Next Update shows the time when the next update is due. Note If the Next Update time is reset, updates will occur at the time set and at each Update Interval thereafter. E.g. if the Next Update field is changed to 14:30 today and the Update Interval field shows 240 minutes, the updates will occur at 14:30, 18:30, and each 4 hours thereafter. The Controller checks every 5 minutes to see if any LDAP user groups need updating. If the Next Update field is used to schedule an immediate update, this may not occur for up to 5 minutes. A User Group may also be updated by right clicking it in the Configurator User Groups list and selecting All Tasks > Reload from LDAP Server. If this is a Certificates connection, it may be used to renew Certificates automatically for any designated MailMarshal User Group. Click Add to select a User Group which will be added to the field Automatically renew certs... Highlight a group and click Remove to remove it from the list. To set the schedule for automatic renewal, see the Processing tab of the Security Policies dialog (reached from the Secure Email tab of Server Properties). Check the box Test the connection on finish then click Finish to test that the server details are correct. • If the connection type is User Groups, MailMarshal should state that the connection has been made and some groups and members found. • If the type is Certificates, MailMarshal will request an email address for which to seek a certificate, and state whether one was found. Chapter 16 • LDAP Connections 159 Note If you enter an email address for which the LDAP server holds no certificate, MailMarshal will report that no certificate was found. However, this result means that the server name, logon, password and port number are correct. Other messages are less specific. The information given (e.g. “no groups found”) may not necessarily pinpoint the problem entry, so all information entered must be checked. If necessary contact the LDAP server administrator. A local network or LDAP server may be configured to allow access only from certain machines or users. The Test button only tests the connection from the Configurator. Because the MailMarshal Controller service may have different security permissions, be sure to check that the Controller is updating LDAP groups correctly. The Controller log file may show messages from the LDAP action. The membership of the groups should change appropriately. When all details are correct, click Finish in the New LDAP Connection wizard. The LDAP connection is ready to be used. See Chapter 6, “User Groups,” and the MailMarshal Secure Manual, for further information about using the connection. Editing an LDAP Server Connection To edit an existing LDAP connection, double-click it in the right pane of the Configurator to restart the LDAP Connection Wizard. 160 User Guide Deleting an LDAP Server Connection To delete an existing LDAP connection, select it in the right pane of the Configurator then click the Delete icon in the toolbar. Chapter 16 • LDAP Connections 161 162 User Guide Chapter 17 Server Properties MailMarshal’s Server Properties include a variety of server setup information and advanced options. During installation a wizard gathers enough of this information to enable the product to function. To access the full range of Server Properties for maintenance and reconfiguration purposes, choose Tools > Server Properties from the Configurator menu to view the Server Properties dialog. This dialog includes the following tabs, which are covered in detail in the sections of this chapter: General: Alter server email address information; import and export configurations. Local Domains: Select how MailMarshal should deliver inbound email. Logging: Choose whether, where, and how much information should be logged for reporting. Secure Email: Enable and configure S/MIME features. Internet Access: Configure proxy settings for Updates and S/MIME CRL retrieval. Delivery: Select how MailMarshal should deliver outbound email. Chapter 17 • Server Properties 163 Batching & Dial-Up: Configure settings for batched email sending and Dial-Up connectivity. Blocked Hosts: Select which hosts may not send email to local domains. Host Validation: Enable DNS record checking; configure DNS Blacklists. Header Rewrite: Set up rules to modify message headers at the Receiver. Anti-Relaying: Choose which hosts if any may relay email through MailMarshal. Updates: Configure automatic Category Script updates. License Info: Make a Permanent Key request; see details of the current license key; enter a new key. Advanced: Control folder location and special settings including ports, timeouts, server threads and greeting strings. (The tabs General, Delivery, Local Domains, and Logging are presented in the Installation Wizard when MailMarshal is installed.) 164 User Guide General Administrative notifications (such as DeadLetter reports) will be sent to the address specified in the Recipient address field. This should be a valid and appropriate mailbox or group alias, which is regularly monitored by the email administrator. Administrative notifications and other automated email from MailMarshal will be sent “from” the address entered in the From address field. (Template generated messages may have a different “from” address). This address should also be a valid SMTP address to allow for replies to notifications. Chapter 17 • Server Properties 165 Export Configuration The MailMarshal configuration data, including server properties, Rulesets, and Rule elements, is stored in the Windows Registry (with the exception of user group information, which is found in the file UserGroups.txt in the MailMarshal install folder, and files with known fingerprints, which are stored in the subfolder ValidFingerprints of the MailMarshal install folder). To export configuration data, click Export Configuration. Enter an appropriate file name and location. To save User Group information, copy UserGroups.txt. To save userdefined file type signatures, copy filetype.cfg. To save fingerprint information, copy the folder ValidFingerprints and its contents. Import Configuration MailMarshal Registry information can be imported, either to restore a previously created configuration or to merge a partial configuration (See below). Warning Export configuration data safely before performing an import. The Merge function requires a specially created file, and should be used only on advice from Marshal Support. To import configuration data, click Import Configuration. Enter or browse to the appropriate file name. Choose to overwrite or merge configurations using the radio buttons. Click OK to perform the import. If User Group information is needed, copy UserGroups.txt to the MailMarshal install folder. If user-defined file type signatures are needed, copy filetype.cfg. If attachment fingerprint information is needed, copy the required files to the folder ValidFingerprints in the MailMarshal install folder. Note If MailMarshal is being moved to a new server, you must also copy the Sequence file. See “Moving MailMarshal to a New Server” on page 249. 166 User Guide Local Domains This tab specifies the names of local domains for which MailMarshal will accept inbound email. The list should include all (and only) the domains of email addresses your organization actually uses through this gateway. Each entry in this list should be matched by DNS MX records (and firewall relay settings, if necessary) so that email for these domains is passed to MailMarshal for delivery. Chapter 17 • Server Properties 167 Local domains may be of two types: Relay or POP3. Email for a relay domain is sent on to another email server. Email for a POP3 domain is typically delivered to a mailbox hosted by the MailMarshal server. Often there will be a single entry in this section for the local email server. However, if the email server handles more than one domain, multiple entries may be needed. Note that by default all relay servers defined here will also be allowed to relay outbound email through MailMarshal. To Create a New Local Domain Click New to start the New Local Domain Wizard. Choose the type of local domain (relay to another server, or POP3). On the final page, enter the domain name. Enter the IP address of the server to which email should be relayed. Optionally enter a second email server address (used only if the first server is unavailable). Multiple Relay local domains may be entered using wildcards (e.g. *.ourbusiness.com may be entered to direct email for all subdomains of ourbusiness.com to a single address). See “Wildcards” on page 170 for a description of MailMarshal’s wildcard syntax. If this is a POP3 domain, choose the action to be taken for messages addressed to nonexistent mailboxes: • Forward the message to the administrator account - The administrator email address is entered in the installation wizard and may be changed on the General tab of Server Properties. • Reject the message - A non-delivery message will be returned to the sender with a “Mailbox/User is unknown” reason code. • Forward the message to the following Mail Server IP Address/Port - this allows for messages not destined for POP3 accounts in MailMarshal to be passed on to another email server for final delivery. 168 User Guide Click Finish to return to the Local Domains tab. Note MailMarshal’s permanent License Keys are bound to the list of local domains specified here. Each time the list of domain names changes, a new key is required. Changes in IP addresses or ports, or between relay and POP3 domains, do not require a new key. See “License Info” on page 190 for information on requesting a new key. When invalidated because of a domain change, the key reverts to a fully functional 14 day trial. This allows ample time to contact Marshal for a new permanent key. There is no charge for the new key. Repeat the New Local Domain Wizard for each local domain required. When all domains have been entered, adjust the order of matching by highlighting a domain from the list and using the up and down arrows. Note Ensure that local domains are matched in the correct order; otherwise email may be misdirected. E.g. to enable a POP3 subdomain use the following sequence: pop.example.com POP3 10.2.5.4:25 *.example.com Relay 10.1.2.1:25 If the sequence is reversed, POP3 mailboxes will be ignored and all email will be delivered to the first address, i.e. 10.1.2.1 port 25, because all subdomains match *.example.com. To Edit a Local Domain Select the domain to be edited from the list and click Edit to start the Local Domain Wizard. Make any changes required, then click Finish. Note To change a domain from POP3 to Relay or vice versa, the entry must be deleted and recreated. Chapter 17 • Server Properties 169 Wildcards Local domains may be entered using several wildcard characters. The same characters are used in User and Group matching for standard and receiver rules. The following syntax is supported: Character Function * Matches any number of characters ? Matches any single character [abc] Matches a single character from a b c [!abc] or [^abc] Matches a single character except a b or c [a!b^c] Matches a single character from a b c ! ^ [a-d] Matches a single character in the range from a to d inclusive [^a-z] Matches a single character not in the range a to z inclusive Examples *.ourcompany.com matches pop.ourcompany.com,hq.ourcompany.com, etc. mail[0-9].ourcompany.com matches mail5.ourcompany.com but not maila.ourcompany.com mail[!0-9].ourcompany.com matches mails.ourcompany.com but not mail3.ourcompany.com Note The !, -, and ^ are special characters only if they are inside [ ] brackets. To be a negation operator, ! or ^ must be the first character within [ ]. 170 User Guide Logging To enable logging of MailMarshal’s message processing, check the box Enable Logging. When logging has been enabled, the Mail History can be viewed in the Console and a wide variety of reports run from MailMarshal Reports. Click Create/Select Database to choose the location of the SQL database where the information will be stored. In the Create/Select Database dialog, enter the name of the SQL Server (or MSDE) computer in the first box. Browse the network if necessary using the button provided. Enter the name of the database to use, and the SQL user name and password. The option Connect using TCP may be chosen where the database is behind a firewall. TCP port 1433 must be opened through the firewall in this case. Chapter 17 • Server Properties 171 If you believe that a MailMarshal database has previously been installed in the given location and you do not wish to use it, check the box to recreate the database. Note The database password may be changed using SQL administration tools or commandline SQL entry. However this procedure must be used with caution if other applications may be using the database. For further information please see Marshal Knowledge Base article Q10251. For maximum detail, check the Log Attachment Details checkbox. To continue processing email if the log records cannot be written to the database, check the box Continue Processing even if database becomes unavailable. To stop processing email when the database is unavailable, clear this box. (This option should be chosen if logging of traffic is essential. Email will still be accepted and held in the Incoming directory.) The MailMarshal Console can log operator actions to the MailMarshal logging database. Logged actions include: • deleting messages • moving messages into or out of the mail recycle bin • emptying the mail recycle bin • passing through messages • forwarding messages • moving messages from one folder to another To enable logging of these actions, check the box Enable console auditing. Uncheck this box to disable logging of these actions. Note Logging console actions can make a difference to perceived console speed, especially when large numbers of messages are affected by a single action. You can choose to log only certain types of actions, by setting a value in the Registry. See the Marshal Knowledge Base for details. 172 User Guide Choose the period for retention of data (the default is 100 days). If more than one MailMarshal server will log to this database, check the box MailMarshal is used in an Array and select a unique letter for each server. Secure Email This tab allows configuration of the S/MIME email features of MailMarshal Secure. See the MailMarshal Secure User Guide for further information. Internet Access This tab is used to configure the path for HTTP and FTP connection to the Internet. This connection is used by the MailMarshal Category Update. It is also used by the MailMarshal Secure (S/MIME) module to retrieve certificate revocation and renewal information. Select the method by which MailMarshal’s Internet connection should be configured using the radio buttons: • Preset Configuration: MailMarshal uses the Windows (Internet Explorer) configuration settings for the account under which the MailMarshal Controller service is running. Note By default the Controller service runs under the Local System account. For this selection to be useful the Controller should be run using another account with administrator privilege. • Direct access: No special configuration is required; the Internet is available from this computer without a proxy. • Proxy: MailMarshal connects to the Internet using the proxy server details provided. Chapter 17 • Server Properties 173 Name may be a local computer name, fully qualified domain name, or IP address. Port is the port number on which the proxy server accepts requests (typically port 80). User name may include Windows domain information in “backslash” format (e.g. ourcompany\username). Password is the associated password (entered twice for confirmation). Updates Check the box Automatically update to enable MailMarshal to check or updates to Category Scripts daily. The update will occur at a random time. Clear this box to turn off automatic updating. Warning If an update is downloaded, the configuration must be reloaded (or in some cases services must be restarted) before the change takes effect. If the MailMarshal Configurator is open on any workstation when an automatic update occurs, the reload cannot be completed. In this case a notification dialog will be raised. It is strongly recommended that the Configurator be closed when it is not in use. Click Update Now to initiate an immediate check for Category Script updates. Note If an update is downloaded, the configuration must be reloaded (or in some cases services must be restarted) before the change takes effect. When you “Update Now” you will be asked to reload or restart as appropriate. 174 User Guide Delivery The primary DNS (Domain Name Server) address used by the organization must be entered in the first field of this tab, and a secondary address is recommended. These servers should be in the local network if possible, but in any case no further away than the ISP. They must be able to resolve domain names outside your organization. Note If MailMarshal must perform DNS lookups through a firewall, the firewall must permit both TCP and UDP based lookups. Chapter 17 • Server Properties 175 Two delivery options are available: • MailMarshal will deliver external email itself: This is the default option. MailMarshal will use DNS resolution to determine the appropriate destination for outbound email and attempt to deliver messages directly. If this option is selected, you may optionally enter the name or IP address of a fallback host. The fallback host will be used as a forwarding host for messages which MailMarshal is unable to deliver immediately (for instance, if MailMarshal encounters a DNS or greeting failure while attempting to connect to the original destination server). • MailMarshal will forward email to another SMTP server: Select this option to immediately send all outbound email (not for local domains) to a firewall or a fixed relay server (such as an ISP). The other server will be responsible for final delivery. Enter the host name or IP address of the relay or firewall in the Forwarding Host box. Optionally enter an alternate host (used only if MailMarshal encounters a DNS or greeting failure while attempting to connect to the main forwarding host). 176 User Guide Batching & Dial-Up MailMarshal supports batch receipt and sending of email messages where on-demand connection to the downstream email server is not desired. Normally this option will be used with a dial-up connection. It may also be used with ADSL connections where the MailMarshal server does not have a fixed IP address, or in situations where frequent connections incur high cost. Check the box Enable Mail Batching to enable the fields on this tab. Note Mail Batching must be enabled whenever Dial-Up Networking is used. Chapter 17 • Server Properties 177 Click Configure Schedule to see the Delivery/Polling Schedule dialog. Alter the schedule block if desired: • Drag using the left mouse button to add to the blue “business hours” area. • Drag using the right mouse button to erase from the blue “business hours” area. • To reset the schedule to the default time block, click on Set Default Schedule. • Choose to “snap” the schedule times to the nearest whole, half or quarter hour using the drop down box. 178 User Guide • Select the frequency of connection for inbound and outbound email for business and out-of-business hours. Note When MailMarshal delivers outgoing email it will always poll the server for inbound email unless the “Never” option is selected in the Check for incoming mail every drop-down list. • Click OK to return to the Batching & Dial-Up tab. Note The selected Mail Batching schedule can be overridden from the MailMarshal Console using the Send/Receive Now button at the bottom of the Console window. Next choose how email retrieval will be requested. If the downstream server controls delivery select No Action. To send an ETRN command to a server, select Via ETRN to domain and enter the host name or IP address of the downstream email server. To collect email from a POP3 account, select Via POP3 account then click Modify... to use the POP3 Email Collection dialog. Chapter 17 • Server Properties 179 Complete the fields in this dialog and click OK. (POP3 can be used for multiple addresses within a single account. The downstream server will have a POP3 account containing an email alias for each user.) The list of POP3 recipient fields is used by MailMarshal to determine the recipients for messages addressed to multiple users. Additions and deletions should be made only if problems with delivery occur. Consult the ISP for information on custom address headers which may be added. To collect email using a custom executable command, select Execute the following command, then enter (or browse to) the full path of the executable application. For instance, some ISPs use the finger command, e.g. c:\winnt\system32\finger example.com@mailhost.com. If a command is required, the ISP or downstream server operator will provide instructions. If outbound email is to be delivered over a dial-up connection, check the box Use DialUp Networking and fill in the appropriate information. Select a RAS entry from the drop-down list, or click on New Phonebook Entry to add the appropriate information. Fill in other information as appropriate. The correct settings should be obtainable from existing email server settings or from the ISP. Note Test Dial-Up connections using the standard Windows Dial-Up Networking capabilities. 180 User Guide Blocked Hosts This tab is used to enter the names or IP addresses of SMTP servers which are not allowed to deliver email to MailMarshal. MailMarshal will refuse SMTP connections from these servers. To activate host blocking, click the checkbox then click New. Enter a host name or IP address in the field provided. Host names must be entered in full. Wildcards are not supported for names. You can also enter a single IP address, or a network block range. Chapter 17 • Server Properties 181 For example, enter 10.2.0.1 to block connections from the single IP address. Enter 10.2.0.0/24 to block all connections from the 10.2.0.n subnet. • To add an additional entry, click New again. • To edit an entry in the list, double-click it to enable editing. • To delete an entry, select it then click Delete. Note Because a variety of formats is possible, limited syntax checking is done on Blocked Host entries. Make entries carefully. 182 User Guide Host Validation This tab is used to configure email blocking based on domain name information. Messages may be blocked outright, or logged, if they come from a host listed in a DNS Blacklist (MAPS compatible) database. These databases list open email relays and other Spam related hosts. Chapter 17 • Server Properties 183 Messages may also be blocked based on reverse DNS lookups to confirm the identity of the sending host. Note These features may intentionally refuse email messages from sites that fail the validation criteria. DNS Blacklist databases, in particular, are subject to change without warning. Enable and use these features only after careful consideration and monitor the results periodically. DNS Blacklist This section allows configuration of DNS Blacklist databases, used in the Receiver Rule condition Where sender's IP address is listed in DNS Blacklist. To add a new DNS Blacklist database to the list, click New to use the New DNS Blacklist dialog. The checkbox Enable this DNS Blacklist specifies whether the service will be available for selection in Receiver Rules. To enhance processing speed, only the DNS blacklists that are actually used in rules should be enabled here. In the first text box, enter a name by which the service will be known within MailMarshal. In the second text box, enter the domain name of the service (e.g. blackholes.mail- abuse.org). Click OK to return to the Host Validation tab. To edit a DNS Blacklist database listing, select it and click Edit. 184 User Guide To delete a listing entirely, select it and click Delete. Note If MailMarshal is attempting to query a blacklist server that is not responding, you may experience some delays in processing. (The same issue can arise with a subscription database if you are not a subscriber.) See “DNS Blacklists” on page 249 for more information. DNS Validation To validate hosts sending incoming email against DNS information, click on the appropriate checkbox. MailMarshal will perform a reverse DNS lookup on the IP address from which email is being sent. Select an option using the radio buttons. • Choose to Accept unknown hosts if hosts without appropriate DNS information are to be allowed to send email, but logged to the Windows event log. This option annotates the message header as “not validated”. It is usually used for testing or debugging purposes. • Choose Host must have a PTR record to block messages from any host that does not have a valid DNS PTR record. • Choose PTR Record must match the HELO connection string to block messages from hosts whose PTR domain does not match the HELO identification sent by the server. This is the most restrictive option. Note Valid email traffic may be blocked by DNS checking if the sending site does not have PTR records or they are faulty. Chapter 17 • Server Properties 185 Header Rewrite MailMarshal can modify email header and envelope detail (e.g. to allow email aliasing). In addition to rewriting by Standard Rule actions, global modifications can be performed by the MailMarshal Receiver during email message receipt. Global rewriting is controlled through the Header Rewrite tab. Note Please note that this is an advanced option and most sites will not need to use this facility. Test any rules thoroughly, as errors may cause all affected messages to be undeliverable. 186 User Guide To create a new global Header Rewrite rule, click New. To edit an existing rule, highlight it and click Edit. To delete a rule, highlight it and click Delete. Information on the syntax and options for Header Rewrite rules is found in Chapter 15, “Header Matching and Rewriting.” The order of evaluation of header rewrite actions may be significant. To adjust the order, select a rule and use the arrows to move it up or down in the list. Anti-Relaying This tab is used to control SMTP Relaying through MailMarshal. Chapter 17 • Server Properties 187 Relaying is the passing of messages to another server for delivery. If an email server allows open relaying, anyone (including bulk and spam senders) can use the name and resources of that server. Best practices require relaying to be tightly controlled (See below). MailMarshal relaying control may be configured in three locations and by three different methods: POP3 accounts (see Chapter 7, “POP3 Accounts”), Receiver rules (see Chapter 5, “Rulesets and Rules”), and this Server Properties tab. By default MailMarshal is configured to stop all external domains relaying email through it. Note The local domain email servers, entered in the Installation Wizard or the Local Domains tab of Server Properties, are always allowed to relay through MailMarshal. The list of “local network” addresses determines which additional computers are allowed to relay email through MailMarshal. For instance, if email clients such as Eudora send email directly to MailMarshal, their addresses (or the entire internal network) should be added. To disable anti-relaying completely (not recommended), click to uncheck the checkbox Prohibit Relaying. To add the addresses of local servers or networks to the list permitted to relay, click New to use the New Local Network dialog. • Enter the IP address of a computer or network in the dotted box. • Enter the network mask. A 32 bit mask defines a single address (255.255.255.255); a 24 bit mask includes a class C network (255.255.255.0) 188 User Guide • Select the appropriate radio button to choose whether this range of addresses is to be included in the local network (permitted to relay) or excluded (forbidden to relay). Note Since addresses not specifically permitted to relay will be forbidden, exclusions here are only used for exceptions within a permitted group. For instance, a university using POP3 email clients might include its entire private net block as permitted to relay, but exclude the portion of the block assigned to public access computers. • Click OK to add the address range to the list. To edit an existing range, select it then click Edit. To delete a range, select it then click Delete. Block suspicious local-part relay attempt A specially formatted Recipient field may be interpreted by some email systems as a relay instruction. This may appear as an embedded standard email address within quotes ("user@domain"@domain), or an embedded % or ! character in the “user name”. If this function is correctly handled by other servers in your environment, uncheck the box to allow these messages. Chapter 17 • Server Properties 189 License Info This tab displays the details of the current Product License Key. A new key must be requested if the local domain names are changed. A key may also be requested to increase the licensed user count, or to purchase the product (if it is running as a free trial). 190 User Guide To request a new key click Request Key. Enter the appropriate contact information in the form. MailMarshal automatically appends the current local domain list and key details. Enter any additional comments (such as the number of new user licenses desired) in the Additional Information field. Click Send Request to email the data to Marshal. Note Changing or adding a local domain name will invalidate the license key. When invalidated for this reason, the key reverts to a 14 day trial. This allows ample time to contact Marshal for a new permanent key. There is no charge for this service. Chapter 17 • Server Properties 191 Use the check box to select how MailMarshal behaves if a license key becomes invalid or expires. In all cases, MailMarshal continues to accept messages, subject to available disk space. • Select Pass through to allow email delivery to continue, but without any evaluation of content or virus scanning. Typically this option would be chosen for trial sites. • Select Halt all processing to hold messages in the Incoming directory. Messages will be held until a valid key is entered or this choice is changed. This is the more secure option. To enter a key click Enter Key, type or paste the key provided by Marshal, then click OK. An information box will report the validity details of the key you entered. Advanced This tab collects several rarely changed but useful features. Change Folders Locations of the folders used by MailMarshal may be altered. Stop all MailMarshal services using the Configurator before changing locations. The physical location of folders should be on the local computer. Before changing folder locations here, the new locations should be planned. MailMarshal will create the folders, if necessary, during the change process. Any data (such as message files) must be manually moved to the new folders. Warning Changing the directory paths may damage the MailMarshal installation if performed incorrectly. Current settings and data should be backed up before performing this procedure. Folder locations are discussed in Marshal Knowledge Base article Q10423. 192 User Guide Click Change Folders to see the MailMarshal Folders dialog. Enter or browse for the appropriate location for each folder. When done, click OK to close the dialog and return to Server Properties, or Cancel to discard any folder location changes. Additional Options Clicking this button opens the Advanced Options dialog. The various tabs of this dialog give access to a variety of rarely changed settings. To restore the default settings (for any individual tab or all tabs within this dialog), click Default. General Engine: • Enable RTF Stamping: Check this box to enable message stamping of messages generated in RTF format by Microsoft software. • Maximum Attachment Unpacking Depth: The number of levels of archive recursion (e.g. zip file within a zip file) that MailMarshal will attempt to unpack before deadlettering the email as “suspicious.” • Maximum MIME Nesting Depth: The number of levels of MIME (email encoding) recursion (e.g. message within a message) that MailMarshal will attempt to unpack before deadlettering the email as “suspicious.” Sender: • Send HELO instead of EHLO: Check to use the SMTP (rather than ESMTP) protocol when sending. • Specify host name: MailMarshal requires a default domain name to be specified, so it can identify the domain of origin for email it sends. The preferred method of entering a host name is to insert a domain suffix within Windows networking properties (see “Host Name or Unable to Determine the Domain” on page 248 for more information). Chapter 17 • Server Properties 193 To override the value set in Windows, check the Specify Host Name box and enter a host name in the field (for example mailfilter.netgate.example.com). Templates This tab allows alternatives to the “built-in” administrative email messages used by MailMarshal. To alter any of these messages, first create a suitable email template. Then select your newly created template using the appropriate drop-down menu on this tab. Please see Chapter 11, “Email Templates” for more details. The following functions are covered by these templates: • Dead Letter (Engine): Sent to the Administrator when the MailMarshal Engine places an email in the DeadLetter folder. • Undetermined: Sent to the Administrator when the MailMarshal Engine places an email in the DeadLetter - Undetermined folder. • Bad Domain: Sent to the “return path” address when MailMarshal is unable to deliver a message to a remote domain (because the domain could not be found in the DNS). • Dead Letter (Sender): Sent to the Administrator when the MailMarshal Sender places an email in the DeadLetter - Routing folder. • Expired: Sent to the “return path” address when MailMarshal cannot deliver a message to a remote domain within the specified retry time. • Failure: Sent to the “return path” address when MailMarshal cannot deliver a message to a remote domain (for other reasons). • Overdue: Sent to the “return path” address when MailMarshal encounters delay in delivering a message to a remote domain. • Forward Unknown: Sent to the Administrator when MailMarshal is configured to deliver email for a domain to a local POP3 box, but no box has been configured for the specific recipient. • Undeliverable: Sent to the Administrator when MailMarshal cannot deliver a message and cannot return it (usually because the failed message was auto-generated). 194 User Guide • Certificate Expired: Sent to the Administrator when a S/MIME security Certificate that is about to expire is used by the MailMarshal Secure module. • CRL Update Failed: Sent to the Administrator when a configured automatic update of a Certificate Revocation List fails. Ports • Controller RPC Port: The port used by the MailMarshal Configurator and Console to communicate with the MailMarshal Server. Note The MailMarshal Controller service must be restarted (from the Service Control Manager) in order for a change in this port assignment to take effect. Remember to restart all dependent services. The port setting must then be changed in the Configurator and Console. • Receiver SMTP Port: The port on which the MailMarshal Server accepts incoming email. • Bind Receiver to: By default MailMarshal accepts email on every IP address available. To limit MailMarshal to accept email on a single IP address, select the appropriate radio button and enter the desired IP address. • Sender SMTP Port: The port on which the MailMarshal Server sends outgoing email. Receiver • Maximum number of recipients: If a remote host attempts to deliver a message for more than this number of recipients, the Receiver will refuse delivery. • ESMTP Authentication: MailMarshal can require authentication (using a Receiver Rule) before allowing an external system to send email. Authentication is by MailMarshal POP3 account and password. Choose the desired behavior using the drop-down box: Disabled: Do not advertise ESMTP authentication. Authenticated connections from external systems will not be available. Chapter 17 • Server Properties 195 Enabled: Advertise ESMTP authentication for all connections. The Receiver Rule condition Where sender has authenticated can be used to control connections. External only: Advertise ESMTP authentication only for connections from clients outside the local “allowed to relay” network. The Receiver Rule condition Where sender has authenticated can be used to control external connections. This is the default value. • Block bare line feeds: The LF (linefeed) character without a preceding CR character is not allowed in email messages according to Internet standards, but some legitimate email systems generate email with this character. Check this box to strictly enforce blocking of email with bare LF characters. Clear the box to allow such email (this is the default value). • Greeting String: The text of the message sent to a remote system with the initial 220 “ready” response. • Received Header: The text of the “received” header appended to each incoming message. Server Threads Settings for small and large sites are preconfigured. Click on a radio button to select the appropriate size site. The thread settings selected will be displayed, grayed out, in the spin boxes. If a custom setup is required, click the Custom Thread Settings radio button to enable the spinner windows. The choices available for configuration are: • Total Receiver Threads: the maximum number of simultaneous connections that will be accepted by the MailMarshal Receiver. • Total Engine Threads: the maximum number of simultaneous threads which will be used by MailMarshal Engine to process messages. • Total Sender Threads: the maximum number of simultaneous threads which will be used by MailMarshal Sender to deliver messages. 196 User Guide • Local Domain Threads: the maximum number of sender threads used to deliver messages to local domains. • External Domain Threads: the maximum number of sender threads used to deliver messages to any one non-local domain. Times These settings control the time before timeout for various functions. SMTP Transmission Timeouts: • Initial Host Greeting: number of seconds MailMarshal will wait for a HELO response when connecting to a remote server. • Protocol/Data Send: number of seconds MailMarshal will wait for a response after sending data (e.g. a RCPT or message body). • Protocol/Data Receive: number of seconds MailMarshal will wait to receive data after connecting or acknowledging previous data. Message Transmission: • Retry Periods: comma separated list of periods (in minutes) between attempts to send messages to a remote domain. After each period has been used once, the final value in this list will be used until the “expiration” time is reached. • Expiration: Number of minutes for which MailMarshal will attempt to send a message. The default is 4320 minutes (72 hours). • Notification: Number of minutes before MailMarshal will send the first “delay” notification to the sender. Optionally a comma separated list of three values (used for high, normal, and low priority messages). • Renotification: Number of minutes before MailMarshal will send an additional “delay” notification to the sender. Optionally a comma separated list of three values (used for high, normal, and low priority messages). Chapter 17 • Server Properties 197 198 User Guide Chapter 18 Reports MailMarshal Reports allows generation of reports based on the information logged by the MailMarshal Server. A wide range of reports is available including overall summaries and per-user information. In order for reports to be generated, logging must first be enabled, either in the MailMarshal installation wizard or from the Reports tab of Server Properties. Chapter 18 • Reports 199 MailMarshal Reports may be installed on any Windows 2000, Windows XP, or Windows Server 2003 workstation which can connect to the logging database. MailMarshal Reports is implemented as a MMC snap-in using a licensed runtime version of Crystal Reports. For general information and tips on the MMC, please see Chapter 22, “MailMarshal and the MMC.” This manual assumes that the MMC is displaying the left (menu tree) pane as well as the right (details) pane. 200 User Guide To Install MailMarshal Reports The Reports application is included on the MailMarshal distribution CD-Rom, or as a separate download from the Marshal website. Insert the MailMarshal CD-Rom and choose Install Reports from the autorun or Setup Wizard application. Alternatively, run the downloaded MailMarshal Reports installation file. Carefully read and accept the license information. Choose a destination location and program folder. The location of the MailMarshal database from which to produce reports is made when the Reports application is run (see below). Note If the MailMarshal Reports application will be run by users who do not have administrative rights (e.g. username “sa”), the administrator should run MailMarshal Reports immediately after setup, connect to the database and select Tools > Load SQL Scripts. The result should be “SQL scripts successfully loaded.” This need only be done once and should prevent subsequent access rights failures. For further information, see “Reports Issues” on page 250. Chapter 18 • Reports 201 Starting MailMarshal Reports Run the MailMarshal Reports application from the Start menu. Enter appropriate information in the Database tab of the Report Group dialog, if it appears. • SQL Server Name: the name of the computer where the MailMarshal Reports database resides. Type in the name of the SQL Server (or MSDE) computer where the MailMarshal database resides, or browse the local network using the browse button provided. • Windows NT or SQL Authentication: Choose whether to connect using the NT logon of the active user, or a SQL username and password. • User Name: If using SQL authentication, enter the SQL user name associated with the MailMarshal database. By default the user name is “sa” • Password: If using SQL authentication, enter the SQL password for the database. By default the password for the “sa” account is blank. • Database Name: Enter the name of the MailMarshal database. Choose a name from the drop-down list, or type in a new name. 202 User Guide • Always request database details: If this box is checked, this database connection dialog will appear each time MailMarshal Reports is started. • Connect to database using TCP/IP: If this box is checked, the database connection will be attempted using TCP/IP. This setting may be useful where the database server and the Reports workstation are separated by a firewall or not within the same local network. To view the list of available reports, expand the various branches of the left pane menu tree. Basic information about each folder and report is given in the Description column. Report Properties To view the full definition of a particular report, highlight it then click the Properties icon in the toolbar. The Report Properties dialog has four tabs. • General: the report name (as shown in the MMC) and a more complete description are shown. • Parameters: the report title (as seen when the report is generated) is shown. Click Edit to view and change the parameters using the parameters detail dialog. If the box Request parameters before running report is checked, the parameters detail will be presented (for confirmation or change) each time the report is generated. If this box is not checked, the parameters will not be requested when the report is generated. • Report: Information on the report definition file and DLL is shown. • Select: A new report definition file may be selected from the list. This should only be done when creating a new custom report. Chapter 18 • Reports 203 Generating Reports Begin generating a report by double-clicking on it in the right pane. Choose detailed parameters in the parameter detail dialog. When all options are chosen, click OK to view the report in a new window. Note Not all options are available for all reports. The title of the dialog shows the title of the report as it will be generated. To change the title use the Parameters tab of the Report Properties dialog. 204 User Guide Report Parameters Reporting Period The period may be selected in any of 5 ways, each represented by a tab. When entering a date, use the drop-down arrow at right of the date field to view a calendar. • Common: Select a standard period from the list by clicking a radio button. • Special: Select a reporting period by period type (e.g. month, day), number, and starting day. • Period: Select a reporting period by period type (e.g. month, day), number, and starting date (dd/mm/yyyy). • Date: Select a reporting period by starting and ending dates. If Inclusive is checked, the ending date will be included in the report. • Time: Select a reporting period by starting and ending dates and times. Sort By Many sorting options are provided. Not all options are available for all report types. Domain, User, Subject, Message Name, Classification, Description Optionally enter text to search for in any or all of these fields. Wildcard syntax is available as supported in the Configurator for local domains. For a full description of the syntax, see “Wildcards” on page 170. A menu of available wildcards is available through the button at right of each field. The following functions are available: • Any Character: Match any single character (inserts “?” into query). • Any String: Match any number of characters (inserts “*” into query). • Character in Range: Match any character in the given range (inserts [ ] into query; add a range of characters e.g. a-z). Chapter 18 • Reports 205 • Character not in range: Match any character not in the given range (inserts [^] into query; add a range of characters e.g. a-z after the ^). • All: show all items without limits. • Starting With: show items starting with the characters entered. • Ending With: show items ending with the characters entered. • Containing: show items containing the characters entered. For the Classification field, click the button to the right of the field and choose Select... to view a list of available items. To include one or more items in a report, check the appropriate boxes. Note Either the Select option or wildcards may be used. Size Enter a minimum (and optionally a maximum) message size to search for. Select a size unit from K (Kilobytes) or M (Megabytes). Sent Messages Counted If present this option provides a choice of the way in which sent messages are counted: • Once (count of messages sent to MailMarshal by the sender.) • Per Session (count of resulting messages sent outbound, normally one per recipient domain.) • Per Recipient (count of all recipients for all messages.) Note The “per session” method most closely reflects Internet bandwidth usage. 206 User Guide Local Domains Only When this box is checked only information on Local Domains will be reported. Include Internal Traffic When this box is checked messages sent through MailMarshal between Local Domains will be included in the totals. Costing Enter values for the cost to send and to receive one megabyte of data. Do not include a currency symbol; it will be supplied from the system settings. Message Only When this box is checked, only a list of messages will be shown. When the box is not checked (default), actions taken on the messages will also be shown on the main page of the report. Chapter 18 • Reports 207 Report Window Within the Report window, several options may be available to customize the view and see additional details. The Help menu includes two choices: general help and help about the specific report. Toolbar Options • Close Current View: close the drill-down tab currently showing. • Print: print a copy of the report, or selected pages. (Printer setup is available from the File menu) • Toggle group tree: show a list of available detail items in a separate pane. Doubleclick on any of these items to jump to it in the main report. If the item is a group, click the + icon to view the members of the group. 208 User Guide • Magnification: choose the magnification of the report on screen. • Page selector: shows the number of pages in the report. Choose the page to view. Note The scroll bar in the report window is limited to the current page. Use the page selector to move between pages. • Stop button (available while report is being generated): Stop generating the report. Optionally show the partial report. • Find: search the report for text. Drill-down Some fields in a report are linked to detailed information or limited views. The mouse pointer shows a magnifying glass when moved over these fields. In addition, a tool tip will indicate that drill-down is possible. Double-click to see the drill-down report. Drill-down items which have been viewed within the current report window are saved as tabs at the top of the window. Click any tab to view the associated report. Use the Close current view icon to delete a drill-down view and its tab. Note If the text in a field is truncated, hold the mouse over the field to see the complete information. Customizing Reports Existing MailMarshal Reports can be customized with local parameters. These reports can then be run simply by double-clicking. Customized reports may be based on existing reports, or on the default report types. Note It is not currently possible for users to create new report types. Chapter 18 • Reports 209 Reports Based on Existing Reports Choose an existing report type to use as a template. Make a copy of this report by dragging it to the desired location while holding down the <CTRL> key. Note If the <CTRL> key is not held down the existing report will be moved. Edit the copy of the report by double-clicking it (or right-click and select Properties). Within the Report Properties dialog, make any desired customizations and changes. To allow the report to be run without confirmation, uncheck the box Request parameters before running report. When satisfied, click OK in the Report Properties dialog. The custom report is now available. Reports Based on Default Types Select the group (folder icon) where the custom report is to be placed. Choose New > Report... from the Action menu to use the New Report wizard. Complete the pages of the wizard to place the newly customized report in the group. Details of the information required are given in “Report Properties” on page 203. Exporting Reports MailMarshal Reports can be exported (saved) in a variety of formats (as provided by the Crystal Reports engine). The presentation quality varies depending on the format selected. In general the best formats to use are: Crystal Report, DHTML, text, Excel, and RTF. 210 User Guide Export may be started by right-clicking on the report name and choosing Export, or by clicking the Export icon from the report window toolbar. Note Drill-down pages are only available in the Crystal Report 8.0 export format. All other export formats show only the main report view. Export Options The Export Options dialog is presented when Export is selected (from the report window or by right-clicking on a report name). This dialog can also be accessed by right-clicking on a report name and choosing Export Options. The options selected are retained as the defaults for the report instance. Chapter 18 • Reports 211 On the first page of the Export Options dialog, choose how to create the export. • File: saves the export as a file. A name will be entered by default. To select a specific name, use the browse button or type a file name in the field. • Application: opens the export directly in the required application (such as Internet Explorer or Lotus 123). Uncheck the box Use Temporary File to save the data in a permanent named file as well. • Email: attaches the exported data to an email message using the default email application. Depending on the type of export chosen, additional options may be available. Email Options The report will be attached to the email as a file of the type chosen in the export options page. • Send to: Enter the email address to which the message should be sent. • Copy to: Optionally enter an email address to which the message should be CC'd. • Subject: Optionally enter a subject for the email message. • Message: Optionally enter a message body describing the attachment. HTML Options • Generate navigation buttons: add links at the bottom of each page to jump to the first, next, previous, or last page of the report. • Create all output on one page: Use one HTML document for all output. Page divisions will be indicated graphically. Pagination Options • Lines per page: set the number of output lines between page break characters, using the spin box. This option is used for export of a report to paginated text. 212 User Guide Separator Options These options are used when creating a values text file (character separated values, comma separated values, data interchange format, and tab separated values). • Format numbers as in report: Numbers are output with text formatting (such as comma separation of thousands). Unchecking this option causes numbers to be output in a basic format. • Format dates as in report: Dates are output with text formatting. Unchecking this option causes numbers to be output in a basic format. The following additional options are available for character separated values only: • Field separator: the character (or characters) marking the boundary between two fields. In addition to printable characters, special separators include: Field Entry Separator used \t Tab character \n New Line character \r Carriage Return \0 NUL character (Hexadecimal 00) \\ \ (backslash) \xHH Any character (two hexadecimal digits) • String delimiter: the character (or characters) marking the beginning and end of field text. The same choices are available as for field separators. This field may also be blank, in which case no delimiter is inserted Chapter 18 • Reports 213 214 User Guide Chapter 19 Arrays MailMarshal provides support for arrays of servers. Configuration information can be replicated from a master server to other servers in the array. Most often, all servers in the array will service a single gateway. Multiple servers can log to the same SQL database. The log records show which server processed a specific message. Reports will cover activity on all servers. Chapter 19 • Arrays 215 Each server in the array could be running Microsoft Windows Network Load Balancing (NLB) Clustering to share an IP address. Email will flow through this array in the same way as through a single MailMarshal server. Configurator: Master IP Port 19001 Email Admin MailMarshal Master Server Firewall Internet Email Server Replication MailMarshal Slave Server Microsoft NLB Cluster SMTP Traffic: Cluster External IP Port 25 SMTP Traffic: Cluster Internal IP Port 25 It is also possible to configure arrays with separate servers for inbound and outbound traffic, or separate servers for different local domains. Arrays can also be used to replicate content security rules between geographically separate gateways. In this case the logging databases and delivery information would typically be different for each gateway. Note Replication requires several RPC related NetBios ports to be open on all servers. The master server must have access to the Windows Registry on all other servers. For these reasons, replication across the public Internet is not recommended. 216 User Guide What Information Is Replicated? The following configuration elements are replicated by default. (You can also exclude certain items from replication; see “Replication Exclusions” on page 224 for more details). • Rulesets and Rules. • Rule Elements, such as User Groups, Folder names and settings, TextCensor Scripts, and Schedules. • Database configuration for logging and Certificate storage (MailMarshal Secure). • LDAP import configuration (used for User Group synchronization with other email systems). • Server Properties configuration. • User account and connection details. • POP3 Accounts (see “Replication Exclusions” on page 224 for cautions). • Product License Keys. • Custom filetype signatures. What Are the Limitations of Replication? Prerequisites The following prerequisites must be loaded manually on each server before the associated rule changes are made: • Virus scanning software used in Rules. • External Command executables. • Cryptographic Providers (used by MailMarshal Secure only). The defaults provided with the Windows operating system will be sufficient in most cases. Chapter 19 • Arrays 217 Manual Settings The following configuration elements must be copied or added manually on each member of the array: • Private Keys for S/MIME encryption and decryption (MailMarshal Secure). • The Host Name entry (not required in most installations; see “Host Name or Unable to Determine the Domain” on page 248). Items Not Replicated The following configuration elements cannot be replicated: • The ValidFingerprints directory. (The list of Valid Fingerprints will be maintained for each server.) • Updated SpamCensor files. (Each server must retrieve the updates individually from the Internet.) • The contents of the MailMarshal Folders. Note Replicating the contents of these items using Microsoft replication tools may be possible; however this solution is not recommended or supported by Marshal. When an array is configured, all configuration changes should be completed through the array master server. Changes made directly on other servers will be overwritten by the next replication. When MailMarshal is updated to a new version, all servers in the array must be updated at the same time. After updating all servers, reload the array configuration. Configuring Arrays and Replication A new array can be created, or a MailMarshal server can be joined to an array, from the Services and Arrays node of the Configurator. 218 User Guide When this node is selected in the left pane of the MMC, the status of the MailMarshal services and array members (if any) is shown in the right pane. For each server configured in an array, the server name and array logging ID are shown. The status column indicates whether the server is running or some services are stopped, and any other problems. The master server in the array is indicated. To create a new array using the current server as master, click the Create/Join Array icon in the toolbar to start the Array Wizard. To add a server to an existing array, click the Add A New Member icon in the toolbar to start the Array Wizard. It is also possible to join a server to an array during initial server configuration. For details of this process, see “Configuration Wizard” on page 18. Note Before you add or delete servers from an array, make sure that the MailMarshal Configurator you are using is the only one running. If another Configurator is running, you will be notified. Close the other Configurator and try again. Array Wizard This Wizard is used to create a new array of MailMarshal servers or add servers to an existing array. The initial page of the wizard indicates whether you have chosen to create or join an existing array, or to add another server to an array. Click Next to continue. Chapter 19 • Arrays 219 Create or Join Array: If you have chosen to create or join an array, this page is shown. Choose whether to create a new array or join an existing array. If you create a new array, the server you are connected to will be the master of the new array. If you choose to join an existing array, enter the name of a server in the array. You can browse the network neighborhood by clicking Browse [...]. Click Next to continue to the Array Member Logging ID page. 220 User Guide Add Array Member: If this server is already part of an array and you have chosen to add a member, this page is shown. Enter the name of the new server to be added. You can browse the network neighborhood by clicking Browse [...]. Click Next to continue to the Array Member Logging ID page. Chapter 19 • Arrays 221 Array Member Logging ID: On this page of the wizard, select a letter which will uniquely identify the server you have just added. This letter will be used to identify the server in log records and message names. You can choose any letter that is not already in use in this array. Click Next to continue. 222 User Guide Array Replication Values: If you are creating a new array, this page will be shown. This page also appears when you view the properties of an existing array. Select the items to be replicated. The following choices are available: • Tightly coupled array: Select this choice to replicate all settings that can be replicated, including the database location and connection information. (See earlier sections of this chapter for a discussion of the settings that can be replicated.) This selection is appropriate where an array of MailMarshal servers is used at the same gateway location. • Geographically separated array: Select this choice to replicate content security settings only. The following items will not be replicated (see “Replication Exclusions” on page 224 for more information): - Logging and S/MIME database location and connection accounts - Internet connection details - LDAP connection details Chapter 19 • Arrays 223 - DNS settings - Forwarding host setting • Custom: Select this choice to activate the list of individual items. Select items to be replicated by checking the boxes in the list. See “Replication Exclusions” on page 224 for more information on each item. Click Next to continue to the final page of the Wizard. Information about the changes that will be made is shown. Click Finish to commit the changes. If a new server has been added to an existing array, the configuration will be replicated to the new server. The Replicate Configuration dialog allows you to monitor the replication. Note Before putting any additional servers into production, make sure that all elements not included in replication are installed on all servers. Replication Exclusions When you are replicating configuration to an array, you may wish to exclude some configuration items. You can choose which items to exclude within the Array Wizard when you create an array. All servers within the array will have the same exclusions. Typically all items will be replicated where the array services a single gateway. Some items may be excluded where replication is used to maintain common content security rules between multiple gateways, or in other special cases. The following items can be excluded: • License Key: Typically the MailMarshal license key will be identical for all servers within an organization. However, if different members of the array accept email for different local domains, they will have different license keys. • Logging Database information: Having all members of an array log to the same database allows reporting to cover the entire array. If the array covers multiple geographically separated gateways, a separate logging database should be configured close to each MailMarshal server. The database name/location and login details (Logging tab of Server Properties) are affected by this setting. 224 User Guide • Internet Connection details: If the array covers multiple geographically separated gateways, Internet access from each may be through a different proxy server. The server name, port, and login details (Internet Access tab of Server Properties) are affected by this setting. • Local Domains: The servers in an array can process messages for different local domains. This could be true either for a single gateway or separate gateways. The information on the Local Domains tab of Server Properties is affected by this setting. Note Remember that servers configured with different Local Domains require different license keys. • User Groups: If the array covers multiple geographically separated gateways, each will have a different internal email server and different users. User Group membership can be different. Note Remember that all User Groups named in the rules must exist on all servers. • LDAP connection details: If LDAP is used to retrieve user group information from separate internal email servers at geographically distinct gateways, different LDAP connections may be required to populate the user groups. See the LDAP Connections node of the Configurator. • POP3 Accounts: When ESMTP authentication by POP3 account is in use, account information should be replicated. See the POP3 Accounts node of the Configurator. Note POP3 accounts should generally not be used for email delivery on an array, since there would be no single location from which clients could collect email. POP3 accounts could be used for email delivery if each array member processes messages for different local domains. • DNS settings: MailMarshal servers in an array could require access to different DNS servers, particularly when they are geographically separate. See the Delivery tab of Server Properties. Chapter 19 • Arrays 225 • Forwarding host: If MailMarshal is configured to send all outgoing email to a specific host, geographically separate gateways will probably send through different hosts. See the Delivery tab of Server Properties. • Certificate database location: When MailMarshal Secure is in use, the Certificate database is used to store information relative to S/MIME certificates. If the array covers multiple geographically separated gateways, a separate certificate database should be configured close to each MailMarshal server. Even where only one gateway is involved, for speed and availability a separate database could be configured using MSDE on each MailMarshal server. See the Secure Email tab of Server Properties. Note If more than one Certificate Database is used, you must have a system to guarantee that the information in the databases is replicated appropriately. Private keys associated with certificates cannot be replicated automatically and must be copied to each server. Managing an Array All changes to replicated information should be completed through the array master server. Changes made directly on other servers will be overwritten by the next replication (subject to the Replication Exclusion settings). If you open the MailMarshal Configurator to a server which is not the master of the array it belongs to, you will be given the chance to connect to the array master instead. To make configuration changes, use the MailMarshal Configurator as usual. Make sure that any external items, such as virus scanner software and external commands, are present on all members of the array. 226 User Guide If changes require rules to be reloaded or services to be restarted, you will be notified as usual. Click the Reload icon on the toolbar. A dialog allows you to apply your action to all servers in the array, or the local server only. The Reload progress dialog details the actions MailMarshal is performing to update the array. Note If you have chosen to reload and/or restart automatically, this process will be applied to all servers. Information on using the Console to manage email flowing through an array of servers is given in Chapter 20, “The Console” and Chapter 22, “MailMarshal and the MMC.” Making Changes to an Array To add servers to an array, see the discussion earlier in this chapter. To promote a server to be the master server of an array, expand the Services and Arrays node, highlight the desired server, and click the Promote icon in the toolbar. To delete a server from an array, select it in the right pane then click the Delete icon in the toolbar. Chapter 19 • Arrays 227 When a server is deleted from an array, it will continue to process email using its current configuration settings. After deleting a server from an array, you can change its configuration by connecting to it directly with the Configurator. If this server is no longer part of the same gateway, you should change the logging database location so that Mail History and Reports can be viewed separately. Note You cannot delete the master server from an array. If the current master server must be deleted, promote another server to master first. To adjust array replication properties and exclusions, select the Services and Arrays node then click the Properties icon in the toolbar. The Array Member Replication Exclusions page will be shown. For details of this page, please see the section on the Array Member Replication Exclusions page of the Array Wizard, earlier in this chapter. Any changes will affect all servers in the array and will take effect when you click OK or Apply. Updating MailMarshal Arrays When MailMarshal is updated to a new version, all servers in the array must be updated at the same time. Any remotely installed Configurator or Console must be updated before it can be used. After updating the software on all servers, reload the array configuration. 228 User Guide Chapter 20 The Console The MailMarshal Console is used for day-to-day administration of the MailMarshal Server. Actions available from the Console include: • Viewing the status of the MailMarshal services. • Viewing information on queued outbound email messages. • Reviewing messages that MailMarshal has moved or copied to folders. • Releasing or reprocessing messages from folders if appropriate. • Viewing a list of messages processed and their disposition. • Searching for messages by header information (address, subject, etc.). • Viewing service alerts. • Viewing the status of Mail Batching, if configured. • Viewing news and support information from the Marshal web site. The Console is installed on the MailMarshal Server computer and may also be installed on any Windows 2000, Windows XP, or Windows Server 2003 workstation in the local network. For prerequisites and detailed instructions, see Chapter 3, “Installation.” The Console is implemented as a snap-in to the Microsoft Management Console (MMC). For general information and tips on the MMC, see Chapter 22, “MailMarshal and the MMC.”. This manual assumes that the MMC is displaying the left (menu tree) pane as well as the right (details) pane. Chapter 20 • The Console 229 Connecting to the MailMarshal Server When the Console is first run, or if one console is used to connect to more than one Server, it is necessary to make a connection. Select Action > Connect to Server from the menu. Note To include connections to more than one Server in a single Console, see Chapter 22, “MailMarshal and the MMC.” Choose the name of the server from the drop-down list, or browse the network using the button provided. If the Server expects connections on a port other than the default 19001, enter the correct value. (To change this value at the Server, in the Configurator see Server Properties > Advanced.) To connect as a user other than the current Windows user, select the appropriate radio button then enter the user information. Click OK to attempt to connect. 230 User Guide Console Security Issues MailMarshal Console uses the Windows secure RPC mechanism to communicate with the MailMarshal Server. A console user must have an account and password that can be validated by the MailMarshal Server. If the MailMarshal machine is in a different domain you can either set up a trust relationship or create local accounts on the MailMarshal Server computer. If the Console and the Server are separated by a firewall (e.g. if the Server is located in a DMZ), port 19001 must be opened in the firewall to allow remote Console access. To view the email in the quarantine folders the account in use must have read access to the folders. If you wish to make changes to items (e.g. forward email, kill messages) the account will also need write access. Access to the folders should be limited by using Windows security. To implement access control for other features, edit the access permissions on the MailMarshal.key file (in the MailMarshal folder on the server). Read access to this file allows the user to view the service status, queued domains and mail history. Write access to this file gives the ability to kill messages, dial now, retry domains and reload services. The Main Console Screen In the left pane, expand the element MailMarshal Console to see the console menu tree. Select MailMarshal Console to view the main Console screen in the right pane. This screen provides summary information on MailMarshal operation. The top section displays the status, version number, and number of messages processed for each MailMarshal Service. Click View Detailed Status to see details in the MailMarshal Services screen. The middle section displays recent Service Alerts. Click View Alert History to see a complete list in the Alert History screen. Chapter 20 • The Console 231 The bottom section displays information on Remote Access (dial-up connectivity) and Mail Batching, including the next scheduled send and polling times. Click Send/Receive Now to initiate an immediate check and dispatch of queued messages. Note Messages processed today for each service will not generally be equal. Not all messages received are delivered (e.g. due to quarantine Rules), and MailMarshal’s notification messages are delivered but not received. 232 User Guide The Services Screen Select the item Services in the menu tree to view the Services screen in the right pane. The upper pane of this screen gives information about the MailMarshal Receiver; the lower pane gives information about the MailMarshal Sender. Receiver State The following information about the Receiver is available: Internal Msgs: the number of messages, addressed to recipients in MailMarshal’s local domains, which have been processed today. External Msgs: the number of messages, addressed to recipients outside MailMarshal’s local domains, which have been processed today. Chapter 20 • The Console 233 Message details: a pane shows details of each message being processed by the Receiver, and its status. Active Threads: the number of messages currently being processed by the Receiver service. Licensed Users: the number of users recorded in the MailMarshal License Key. Current Users: the number of local email addresses from which email has been received in the last 28 days. Note The Current Users value will be displayed in red if the value exceeds the licensed number. Rule processing and sending will continue as normal. If this condition persists, please contact Marshal or your reseller to obtain additional licenses. Sender State The following information about the Sender is available: Internal Msgs: the number of messages, addressed to recipients in MailMarshal’s local domains, which have been processed today. External Msgs: the number of messages, addressed to recipients outside MailMarshal’s local domains, which have been processed today. Message details: a pane shows details of each message being processed by the Sender, and its status. Active Threads: the number of messages currently being processed by the Sender service. Msgs Queued: the number of messages waiting to be sent. Domains Queued: the number of unique Internet domains to which messages are waiting to be sent. 234 User Guide Sender Actions A message visible in the detailed Sender list can be killed (deleted) by selecting it and clicking the Kill Message button. A detailed list of information about domains for which email is queued (waiting to be sent) can be viewed by clicking the button View Domains (or the menu tree item Queued Domains). The listing also shows the number of messages queued, number of sender threads dedicated to this domain, number of times delivery has been attempted, and the next retry time. To delete all messages queued for delivery to a domain, select the domain from the list and click the Delete icon in the toolbar. Note Be sure that you really want to delete all messages for this domain. This action may be useful to quickly stop spam or virus generated email. Domain Detail Double-click on a domain record in the Queued Domains screen to view details in the Domain dialog. The upper pane of this dialog shows a list of MX records found for the domain. The lower pane shows details of each message awaiting delivery to this domain. Highlight one or more messages in the lower pane then click Kill Message to delete the messages. Click the Retry Domain Now icon in the toolbar to force an immediate attempt to deliver messages to this domain. Note These actions will be grayed out if the user does not have sufficient permissions. Message Folders To view a list of MailMarshal’s message folders, expand the menu item Mail Folders. These Folders include the Archive, Parking and regular folders into which messages are placed through Rule action, as well as the Dead Letter folders used for messages which cannot be processed, and the Mail Recycle Bin used to hold deleted items for a period. Chapter 20 • The Console 235 To view the contents of a folder, select it in the left pane. The contents will be displayed in the right pane. Folders may have subfolders created periodically if this option has been set up in the Configurator. By default no more than 1000 items will be retrieved for each folder. This number may be adjusted by choosing Tools > Options from the menu. Note Within the folders, the icon denotes a message that contains a virus, which was not successfully cleaned. Forwarding or passing through such a message is not recommended. Message Folder Actions To search for a message by its MailMarshal message name, use the search icon in the toolbar. (If Mail History is enabled, a more powerful search is available; see “History Search” on page 240.) Messages in folders may be forwarded, deleted, processed, and viewed. Notes • Message folder actions can be logged to the MailMarshal logging database for auditing purposes. Logging may have an effect on the speed of response, particularly where a large number of items are affected. You can enable and disable logging of message folder actions from the Logging tab of Server Properties (in the MailMarshal Configurator). • Users who have read-only access to a folder cannot delete messages. • Messages in Archive folders cannot be deleted. Forwarding a Message To forward a message, select it then click the Forward icon on the toolbar (or open it then click the Forward icon on the message window toolbar). To forward to multiple addresses, enter them separated by semi-colons (e.g. GWB@example.com; GHWB@example.com). 236 User Guide Deleting a Message To delete one or more messages, select them then click the Delete icon. The message(s) will be sent to the Mail Recycle Bin folder. To delete the message(s) permanently, hold down <SHIFT> while clicking the Delete icon. Messages will be purged from the Mail Recycle Bin on the schedule associated with that folder. Restoring a Message To restore one or more messages from the Mail Recycle Bin to their original location, select them then click the Restore icon. Processing a Message One or more messages may be selected for processing. Clicking the Process Message(s) icon raises the Process Message dialog. The following actions are available: Continue processing the message: this option continues processing the message after the Rule which placed it in the current folder. This action may be used to release a message from quarantine while testing it for any further violations of policy. Reprocess the message: this option resubmits the message for processing by the current set of MailMarshal Rules. This option may be useful when rules have been adjusted. Pass the message through: this option allows the message to be queued for delivery with no further evaluation. If the checkbox Only apply this action to the following users is checked, the selected option will be effective for one or more recipients of the message as selected using the detail checkboxes. Note The “Continue Processing” and “Pass Through” options can also be requested using a specially formatted email message. See “Message Release” on page 107. Chapter 20 • The Console 237 The following additional options are available: • Delete the message after processing (selected by default): Once the selected actions have been performed, the message is deleted from the folder. • Add attachment fingerprints: Attachments (including images embedded in MS Word documents) will be saved in the folder ValidFingerprints (located in the MailMarshal install folder). The unique “fingerprint” of each attachment will be loaded by the MailMarshal Engine. These attachments can be the subject of a Rule condition if they are found in the future. See the Standard Rule condition “where attachment fingerprint is/is not known” for more details. All attachments, or only images, may be “fingerprinted.” Note A file can be removed from the list of recognized fingerprints by deleting it from the ValidFingerprints folder and reloading the configuration. MailMarshal automatically deletes a fingerprint (and the associated file) if it does not trigger a condition for six months. Viewing a Message and Message Log To view a message and its associated processing log (which indicates the reason for its placement in the folder), double-click on it in a Message folder or History view. The message headers may be examined by clicking the View Message Header icon in the message window toolbar. Note Processing logs are only available if copied by the Rule which placed the item in the folder. The message and log text may be truncated. See “User Options” on page 243 to adjust the amount shown. Interpreting Message Logs A message log includes information on the structure of the message, and records any Rules which it triggered and the reasons for triggering. 238 User Guide The below figure shows a message which MailMarshal has identified as BA0000000c.0000000c.mml. The message contains a message header (MHDR), two message bodies (Text and HTML) (MBODY), an attached ZIP archive (ZIP), and an executable file (EXE) included within the archive (inclusion is indicated by the indentation of the line in the log). The message log also indicates which Rules were applied to the message, which if any were triggered, and what action was taken. The log line for a triggered Rule includes the notation “TRUE” and actions taken follow this line. In the example below, the executable triggered the rule “Block EXECUTABLE Files” in the ruleset “Inbound Messages”. ... 1452 1452 1452 1452 1452 1452 1452 15:44:57.576 15:44:57.576 15:44:57.576 15:44:57.576 15:44:57.576 15:44:57.576 15:44:57.576 1452 15:44:57.746 1452 15:44:57.746 1452 15:44:57.746 1452 15:44:57.756 ... 1 user(s) match rule - Block EXECUTABLE Files Name=U1\B000000001.00000001.mml (MAIL,55320) False Name=U2\MsgHeader.txt (MHDR,602) False Name=U2\Plain (MBODY,14) False Name=U2\Fgrep.zip (ZIP,39657) False Name=U3\fgrep.exe (EXEW32,82944) TRUE Terminal Requesting Action <Inbound Messages:Block EXECUTABLE Files:MailTemplate> be run Requesting Action <Inbound Messages:Block EXECUTABLE Files:LogMessage> be run Requesting Action <Inbound Messages:Block EXECUTABLE Files:MoveMessage> be run Action LogMessage for Component U3\fgrep.exe Action MoveMessage for Component U3\fgrep.exe If a TextCensor script is triggered, the details of the script evaluation are included in the log. In the following excerpt, two expressions in the Generic Chain Letters script were triggered: ... 1452 16:02:24.551 1452 16:02:24.551 1 user(s) match rule - Block Chain Letters TextCensor triggered: Script Generic Chain Letters Triggered Expression: chain letter* Triggered 1 times weighting 5 Expression: send this FOLLOWEDBY=6 (many OR all OR friends OR anyone OR others OR people OR every*) Triggered 1 times weighting 5 1452 16:02:24.551 Name=U1\B000000002.00000001.mml (MAIL,2998) TRUE Terminal ... Chapter 20 • The Console 239 Mail History Mail History is a record of recent messages processed by MailMarshal. By default no more than 1000 items will be retrieved. This number may be adjusted by choosing Tools > Options from the menu. Note If an array of MailMarshal servers is configured to log to the same database, the Mail History will include items processed by all servers. However, the Mail Folders include only a single server’s items. To include connections to more than one Server in a single Console, see Chapter 22, “MailMarshal and the MMC.” This information is derived from the report logging database, so logging must be enabled to view the history. To view the history, select Mail History in the console tree. Messages which were successfully sent display a yellow envelope icon and Sent To: information in the Status column. Messages which passed the Rule processing but could not be sent display an icon with a red “x” and the failure reason in the Status column. If a message triggers a rule which generates a logging classification, the icon will be blue and the Status column will display the text associated with the classification. In addition, the Class Code column shows the numerical logging classification code. Double-click any message to view it. Only messages held in the MailMarshal Folders may be viewed. History Search Messages in the MailMarshal Message History may be searched by size, header information, or delivery time. To start a search, select Mail History or History Search Results, then choose Action > Search from the menu. 240 User Guide The following search criteria may be used in the Search Details dialog. The results are available by double-clicking the History Search Results node in the menu tree. All fields are optional. • Period: Enter “from” and “to” dates and times (or select them using the date controls and spin boxes). The button provides the pre-configured settings for “yesterday”, “today”, “last hour”, and “last 24 hours”, as well as “Now” which resets the “to” time to the current time. • Size: Enter a minimum message size (and optionally a maximum size). Choose whether these sizes are expressed in Kilobytes or Megabytes. The default is to search for all messages regardless of size (minimum size of 0). • Sender: Enter values for the user and domain. To search for all messages from a domain, leave the user field blank. To search for messages from or to an address, check the “or receiver” checkbox. • Recipient: Enter values for the user and domain as for the sender. • Subject: Enter a value. Chapter 20 • The Console 241 • Delivery time: Enter a minimum value in seconds. • Classification: Enter a numerical classification code (as defined in the Configurator under Logging Classifications). Enter zero to ignore classification codes. Note It is always possible to search for messages by their MailMarshal Message Name, regardless of the Logging setting. See “Message Folder Actions” on page 236. Wildcard Functions The Sender, Recipient and subject fields may be searched using the same wildcard syntax supported in the Configurator for local domains. For a full description of the syntax, see “Wildcards” on page 170. A menu of available wildcards is available through the button at right of each field. The following functions are available: Any Character: Match any single character (inserts “?” into query). Any String: Match any number of characters (inserts “*” into query). Character in Range: Match any character in the given range (inserts [ ] into query; add a range of characters e.g. a-z). Character not in range: Match any character not in the given range (inserts [^] into query; add a range of characters e.g. a-z after the ^). All: show all items without limits. Starting With: show items starting with the characters entered. Ending With: show items ending with the characters entered. 242 User Guide Containing: show items containing the characters entered. Alert History To view a historical list of service alerts, select Alert History in the menu tree. User Options You can adjust several options for convenience in using the Console. To open the Console Options dialog, select Tools > Options from the menu. Chapter 20 • The Console 243 The following options can be adjusted: • Maximum history items to retrieve: This setting affects the number of items shown in the message history and history search screens. • Maximum folder items to retrieve: This setting affects the number of items shown when viewing any folder. Note For history and folder items, the number of items actually retrieved is shown in the Console window status bar. You may wish to increase the values if the maximum number of items is being retrieved. Increasing the values may slow the console performance. • Maximum message and log text to retrieve: This setting affects the amount of message text and log text shown when viewing a message in the message window. The message text will be truncated after the number of bytes selected. The log text will be truncated in the middle so that the beginning and end of the log are always shown. The truncation of the log text is indicated by an ellipsis (...) in the text. • Services screen refresh interval: This setting controls the frequency with which the Console polls the MailMarshal services to update the queued domains and messages sent/received information. News and Support Select this item to view the Marshal website in the right pane. This site features the latest support information, including a Knowledge Base and a User Forum. To access the full range of resources, customers should log in to the site. Obtain login details, if necessary, by contacting Marshal. 244 User Guide Chapter 21 Troubleshooting A number of problems may arise when using email systems that can interfere with MailMarshal operation. Therefore, if a problem occurs it may be that MailMarshal is reflecting an external or internal email or network problem. When analyzing problems, the following resources may be useful. MailMarshal Console Check to see that the MailMarshal services are running. The Alert History shows stop and start information for each service. If necessary, restart the services using the Configurator. Note If the MailMarshal Controller service is stopped, the other services cannot continue and the Console and Configurator will indicate “Failed to Connect”. Restart the MailMarshal Controller using the Windows Control Panel Services applet. Check the Console Services screen to see whether email is being processed. Check the Mail History screen to see whether email has being sent, and any errors that the Sender may have encountered. If there are many “Failed to connect” or “Unable to resolve domain” messages this usually indicates a downstream network, SMTP, or DNS problem. Chapter 21 • Troubleshooting 245 Windows Event Viewer If there are difficulties when starting any of the MailMarshal services, or there are any pop-up error messages, start the Windows Event Viewer and check the application log. MailMarshal Working Directories Check the MailMarshal sub-directories to see where email messages are trapped. The normal flow of email is as follows: The MailMarshal Receiver accepts SMTP connections for all email (both inbound and outbound). Receiver Rules control the rejection of messages at this point. The Receiver places each accepted message in a file in the Incoming directory. The Engine then retrieves each message file from the Incoming directory, unpacks it and processes it according to the Standard Rules. A message which is not blocked or moved by a Rule is placed into the ProcessedOK directory. The Sender then takes the message file from that directory and places it in the Sending directory for delivery. Note If MailMarshal Secure is installed and Secure Email Rules are in use, files from the Incoming folder are processed by the MMDecrypt service which places the files in the Decryption folder for the Engine. Messages to be sent are placed in the Encryption folder for processing by MMEncrypt. Email queued in the Incoming directory indicates a problem with the Engine service– either the engine has stopped or the rules are incorrectly configured. Email queued in the Sending directory points to a problem with the sender service. 246 User Guide MailMarshal Message Names MailMarshal assigns a name to each message it processes or generates. These names are used as the file names for message files and the associated log files; they are also used to identify the messages in log files. Message names beginning with “B” are SMTP messages which MailMarshal receives and processes. Notifications generated by the MailMarshal Sender have names beginning with “C”. Notifications generated by the MailMarshal Engine have names beginning with “D”. Notifications generated by the MailMarshal Controller have names beginning with “E”. When an array of MailMarshal servers is configured to log to the same database, the second letter of the message name is the array ID of the server that processed the message. In addition to MailMarshal’s message names, the SMTP Message ID of each message is retained throughout processing and recorded in the processing logs. MailMarshal Log Files Each MailMarshal service creates its own daily log file. Routine processing and problems encountered are all recorded in these log files. The most recent information is at the end of the log file. The files are found in the MailMarshal Logging Directory. By default the last 5 days of log files are kept. Running MailMarshal in Debug Mode MailMarshal services can also be run in debug mode from a command prompt. Using this facility, the user can see the results of the system logging in real time–which is particularly useful for resolving problems, testing new rules, or determining why a service fails to start. To use this facility, ensure that the service(s) to be debugged are stopped. Then go to the MailMarshal directory and enter one or more of the following: Chapter 21 • Troubleshooting 247 mmengine -debug mmreceiver -debug mmsender -debug For example, to test the passage of a particular email message, run the Receiver and Engine services in debug mode. Use an email client (such as Outlook Express) to send email and monitor its progress through the Receiver and Engine. Some Common Issues Error 2140 This message is a generic Windows error message meaning that one or more of the services were unable to start. The error may be related to invalid TextCensor scripts or other setting problems. To determine the specific cause of the error, first check the Windows event viewer (application log), or the MailMarshal logs. If necessary start the MailMarshal services in debug mode. Host Name or Unable to Determine the Domain The following message may appear in the Event Log: “Unable to determine the domain this machine belongs to. Check the TCP/IP protocol properties for a valid domain name.” Alternatively, a Host Name page may appear in the Configuration Wizard requesting that a Host Name be set. MailMarshal requires a domain to be specified. This information is used when sending and receiving SMTP email. The Primary DNS suffix of the computer should be set to the email domain name of the MailMarshal Server (e.g. ourcompany.com) In Windows 2000, this information should be entered as a Primary DNS setting (in the Control Panel under System > Network Identification > Properties > More). In Windows XP this information is entered in the Control Panel under System Properties > Computer Name > Change > More. 248 User Guide If the Host Name is entered in the Configuration Wizard, it can be edited from the General tab of the Advanced Properties dialog. Moving MailMarshal to a New Server When moving the MailMarshal Server to a new computer, the following steps are required: 1. Export the MailMarshal configuration from the old server (using the Advanced tab of Server Properties 2. Import the configuration to the new server. 3. Copy the file UserGroups.txt, the file filetype.cfg (if present), and the contents of the subdirectory ValidFingerprints from the old MailMarshal install directory to the new one. 4. To continue logging to the existing MailMarshal database, copy the file SequenceFile from the old MailMarshal install directory to the new one. Failure to do this will corrupt the database. 5. Ensure that email routing is adjusted to use the new server (both inbound and outbound). For additional information on MailMarshal Server and database migration please see Marshal Knowledge Base article Q10409. DNS Blacklists MailMarshal can use DNS blacklist based validation in Receiver rules and in Category Scripts (including the user defined portion of the SpamCensor facility). Chapter 21 • Troubleshooting 249 If MailMarshal is attempting to query a blacklist server that is not responding, processing of the specific message will be delayed until the request times out repeatedly (about 75 seconds). MailMarshal will then place the affected server on a watch list. MailMarshal will not attempt to contact this server again for at least 60 seconds. MailMarshal will continue to process messages without checking against the specific blacklist. Note A remote server may fail to respond due to transient network conditions, because it is out of service, or in some cases because you do not have a subscription. DNS blacklist activity is recorded in two MailMarshal log files: the Receiver log (for Receiver rules) and the Engine log (for Category Scripts). Examples of messages you may see in these logs are: • DNS Blacklist look up failed. blacklist.example.com could not be contacted • DNS server is now reachable. • 192.168.1.2 listed in <Example Blacklist> Reports Issues These errors are most likely to occur where the default “sa” SQL authentication is not being used. Unable to determine if [Name] is a valid MailMarshal database This error indicates that the “GetVersion” stored procedure could not be run or returned an unexpected result. Generally this means that the database is not a MailMarshal database. This error may also occur if the user has no execution rights for GetVersion. To resolve this issue, connect to the database (from MailMarshal Reports) as a user with administrative rights. Once an administrator has used the reports database, all users are automatically granted the right to execute GetVersion 250 User Guide SQL script could not be loaded This error indicates that the user does not have sufficient rights to initialize the stored procedures in the database. If this occurs, connect to the database (from MailMarshal Reports) as a user with administrative rights. Select Tools > Load SQL Scripts. The result should be “SQL scripts successfully loaded.” SQL scripts failed to load. View errors? Click Yes to see the Load Errors dialog (also available by right-clicking on the MailMarshal Reports root in the left pane of the MMC). This dialog provides the detailed error message. Most errors will be related to database permissions. Further Help For any problems not listed here, please see the Knowledge Base and Forum on the Marshal website. If these resources do not resolve the issue please contact your Marshal Distributor or Marshal’s support desk. Web: http://www.marshal.com/support Email: support@marshal.com Chapter 21 • Troubleshooting 251 252 User Guide Chapter 22 MailMarshal and the MMC The MailMarshal Configurator and Console are implemented as snap-ins to the Microsoft Management Console (MMC). Users of other MMC applications (such as WebMarshal Console and Microsoft SQL Server) will be familiar with this interface. By default, the MMC features a tool bar, a menu, and two main panes. The left pane contains a menu tree, while detailed information appears in the right pane. • To expand an element (branch) of the menu tree, click on the associated + symbol. This will show the elements contained within this branch. • To select an item in either pane, click on it to highlight it. • Selecting an item in the left pane will display the associated detail information in the right pane. • To collapse an expanded menu element click on the associated -symbol. • If the left pane is not visible, click the Show/Hide Console Tree icon in the toolbar. It should appear “pushed in.” Note The tool bar and menu bar of MMC are context dependent. The available icons and choices depend on which item is selected in the main panes. If an icon referred to is not visible, ensure that the appropriate item is selected. For instance, the arrow icons, which allow rules to be moved up or down in order of evaluation, are only visible when a rule is selected in the right pane. Chapter 22 • MailMarshal and the MMC 253 While this Guide usually refers to choices from the tool bar, in many cases the MMC also provides equivalent choices from pop-up context menus, which are made available by right-clicking on the selected item. Configurator and Console in the Same MMC Where more than one MMC snap-in (such as the MailMarshal Configurator, MailMarshal Console, and WebMarshal Console) is to be used from the same machine, a new MMC Console can be created which contains all the required snap-ins. To create a custom MMC Console, run mmc.exe from a command prompt. Choose File > Add/Remove Snap-in from the main menu. In the Add/Remove Snap-in dialog, click Add to see a list of available snap-ins. Double-click each desired snap-in to add it to the list. When done, click Close, then OK. To save the custom Console, choose File > Save from the main menu. Select a location for the .msc file. Double-click this file to run the custom console. Note Only one instance of the MailMarshal Configurator may be active per MailMarshal Server. Attempting to start a second Configurator results in the notice “MailMarshal settings are locked.” Multiple Console Snap-ins in the Same MMC If an array of MailMarshal servers is in use, it may be useful to include multiple Console snap-ins in the same MMC. A new MMC Console can be created which contains more than one instance of the MailMarshal Console snap-in. This will allow access to the Mail Folders, queued domains, and service information for each server. 254 User Guide Create a custom MMC Console as above. Add as many instances of the MailMarshal Console as there are MailMarshal servers. For each MailMarshal Console, a Connect to Server dialog will be presented. Enter the appropriate details for the various servers. Note Enter the server names explicitly (rather than “localhost”) to make this custom file usable from any server which has the MailMarshal Console installed. Chapter 22 • MailMarshal and the MMC 255 256 User Guide Appendix A Other Email Servers Typically MailMarshal receives inbound email, processes it, then relays it to the organization’s internal email server as specified in the Local Domains list. Outbound email is passed from the internal email server to MailMarshal for processing and external delivery. See Chapter 2, “Pre-Installation” and Chapter 3, “Installation.” Once MailMarshal has been installed, the internal email server software must be configured to send outgoing email to MailMarshal for processing and delivery. Appendix A • Other Email Servers 257 Where MailMarshal is installed on the same computer as the existing email server software, the two applications must use different “ports” to receive email In this case, the following steps are typically necessary: • As the MailMarshal receiver is now accepting SMTP traffic on port 25, change the SMTP port that the other email server uses for SMTP (port 97 is usually available, although any free TCP port will do). • Configure the other email server software to forward all Internet email to the local machine (use the “localhost” IP address 127.0.0.1, port 25). • Check that MailMarshal is configured, via its Local Domains information, to forward all inbound email to the local machine on the alternative port (again, use the localhost IP address and port, e.g. 127.0.0.1:97). Specific details for configuring Microsoft Exchange 5.5, Lotus Notes 4, and Lotus Domino R5 are given below. For more detailed information, and to configure other email server software, please refer to the product documentation for the other software. The Marshal Knowledge Base also contains some additional setup information. Note The following integration examples assume SMTP connectivity has been set up and is running properly–all that is required here is the introduction of MailMarshal to an already operating environment. Configuring Microsoft Exchange 5.5 Exchange 5.5 and MailMarshal on Separate Machines On the Microsoft Exchange Server, run Microsoft Exchange Administrator. Under the Configuration container, select Connections, then select Internet Mail Service. 258 User Guide Under the Connections tab, change the Message Delivery option from DNS to Forward all messages to host, and enter the MailMarshal server IP address, e.g. “10.1.1.1”. This will ensure that outgoing messages are passed to the MailMarshal machine. Click OK. Stop and start the Microsoft Exchange Internet Mail Service from the Services Control Panel applet. Exchange 5.5 and MailMarshal on the Same Machine On the Microsoft Exchange Server, run the Microsoft Exchange Administrator. Under Configuration, select Connections, then select Internet Mail Service. Appendix A • Other Email Servers 259 Under the Connections tab, change the Message Delivery option from DNS to Forward all messages to host, and enter “127.0.0.1” to identify the local machine. This will ensure that out-going messages are passed to MailMarshal on the same machine as Microsoft Exchange Server. Because MailMarshal is installed on the same machine, Microsoft Exchange must be configured to listen for SMTP traffic on a different port to the SMTP default of 25. Microsoft Exchange uses the Windows NT services file to determine which port to listen on for inbound SMTP messages. It is necessary to edit the services file to change the default SMTP port for Microsoft Exchange to a new value, for example 97. The Windows NT services file is located in the folder %systemroot%\system32\drivers\etc C:\WINNT) (where %systemroot% is usually In this folder, edit the file named Services using Notepad. Add an explanation and the new port details. Locate the text smtp 25/tcp mail Comment out the line by prefixing it with the “#” character, and add the new material: # smtp 25/tcp mail # Change default smtp port to 97 to allow both Microsoft # Exchange and MailMarshal to exist on same machine smtp 97/tcp mail Save the Services file and close Notepad. Stop and start the Microsoft Exchange Internet Mail Service from the Services Control Panel applet. Note This example uses port 97, but any available port number may be chosen as long as it does not conflict with any other service on the same machine. 260 User Guide Configuring Lotus Notes 4 Lotus Notes 4 and MailMarshal on Separate Machines On the Lotus Notes Server, shut down SMTPMTA from the Notes console. Open the Public Address Book. Expand the Server section, and select the Connections view. Open the Internet Hosts Document. Change the Relay host field to the IP address of the MailMarshal machine, e.g. “192.168.2.218”. This will ensure that out-going messages are passed to the MailMarshal machine. Restart the SMTPMTA. Lotus Notes 4 and MailMarshal on the Same Machine On the Lotus Notes Server, shutdown SMTPMTA from the Notes console. Open the Public Address Book, expand the Server section, and select the Connections view. Open the Internet Hosts Document. Change the Relay Host field to “127.0.0.1” to identify the local machine. This will ensure that out-going messages are passed to MailMarshal on the same machine as Lotus Notes. Appendix A • Other Email Servers 261 Because MailMarshal is installed on the same machine as Lotus Notes, the SMTP component must be configured to listen to a different port to the SMTP default of 25. Lotus Notes uses the Notes.INI file to determine which port to listen to for inbound SMTP messages. The file must be edited to change the default SMTP port for Lotus Notes, e.g. “97”. The Notes.INI file is located in the WINNT folder (e.g. C:\Winnt). Using Notepad, edit the Notes.INI file and add the following item at the end of the file. 262 User Guide SMTPMTA_IPPORT= Then specify the port number on which MailMarshal was configured and to which internal email is to be forwarded, e.g. ; Changed default smtp port to 97 to allow both ; Lotus Notes and MailMarshal to exist on same ; machine SMTPMTA_IPPORT=97 Restart the SMTPMTA. Configuring Lotus Domino R5 All changes must be made through Domino Server Administrator, and not by editing files or using the Notes Client. Lotus Domino R5 and MailMarshal on Separate Machines Configure Domino to forward outgoing SMTP traffic to MailMarshal 1. Select the Domino Server for which the mail relay setting must be changed. 2. Click on the Configuration Tab. 3. Select Messaging, Messaging Settings. 4. On the Basics Tab find the entry for Relay hosts leaving the local Internet Domain; enter the IP address of the MailMarshal server, e.g. 10.2.1.7. From the server console or a remote session from the Domino Administrator type the following >Tell SMTP quit Once the message that the SMTP service has stopped has appeared on screen type the following Appendix A • Other Email Servers 263 >load SMTP The new settings should now be active. The SMTP listening ports can be checked by typing >sh tasks Lotus Domino R5 and MailMarshal on the Same Machine Change the SMTP Inbound port from port 25 to port 97 As MailMarshal will take over the role of listening for SMTP traffic on port 25, the port that Domino listens on must be changed. You can use any unused port (Port 97 is usually free). 1. Select the Domino Server for which the SMTP listening port must be changed. 2. Click on the Configuration Tab. 3. Select Server, Current Server Document. 4. Click on the Ports Tab, then Internet Ports Tab, then Mail Tab. 5. Change the Mail SMTP Inbound setting from 25 to 97. Configure Domino to forward outgoing SMTP traffic to MailMarshal 1. Select the Domino Server for which the mail relay setting must be changed. 2. Click on the Configuration Tab. 3. Select Messaging, Messaging Settings. 4. On the Basics Tab find the entry for Relay hosts leaving the local Internet Domain; enter 127.0.0.1. From the server console or a remote session from the Domino Administrator type the following >Tell SMTP quit 264 User Guide Once the message that the SMTP service has stopped has appeared on screen type the following >load SMTP The new settings should now be active. The SMTP listening ports can be checked by typing >sh tasks Appendix A • Other Email Servers 265 266 User Guide Index A B Acceptable Use Policy 1 Accounts (POP3) 89, 179 Actions. See Rule Actions Active Directory 155 Administrator email addresses 25, 165 Advanced Options 192 Alert History 243 Alert history 229 Aliases, email 141 Anti-Relaying 187 Archiving 48, 113, 235, 236 Array of servers 2, 6, 173, 215, 240 Arrays 215 Attachment details, logging 29, 76 Attachment fingerprints 63, 77, 166, 238 Attachment parent 69 Attachments 62–72, 76, 77, 121, 125 Stripping 76 Unpacking Depth 193 Automatic Message Release 107 Backing up Configuration 166, 192 Batching (Email Delivery) 177 Best practices 48, 95, 188 Block Receipt 84 Blocked Hosts 181 C Category Scripts 72, 174 Certificates (S/MIME) 156 Classifications. See Logging Classifications Conditions. See Rule Conditions Configuration, import and export 19, 128, 166 Configurator 36, 39, 254 Console 34, 229, 245, 254 Contact Information xvii Controller, MailMarshal 160, 195, 245 Crystal Reports 200 Index 267 D F Database Logging 28, 199 Unavailable 29 Database, Logging 171 Dead Letter 98, 107, 111, 235 Debug Mode 247 Delivery, Email 9, 27, 167, 175, 177 See also Routing Dial-Up 177 DMZ 15, 231 DNS 10, 11, 12, 16, 22, 25, 37, 184, 185 DNS Blacklist 83, 84, 183, 184 DNS Validation 185 Domains 10, 16, 28 Queued 35 See also Local Domains Drill-down 209 Filtering 3, 54 Header Matching 145 Fingerprints. See Valid Fingerprints Firewall 10, 11, 16, 26, 28, 35, 36, 167, 171, 175, 176, 231 Folder actions, Console 172, 236 Folders 111, 192, 235 Archive 235 Dead Letter 98, 107 Mail Recycle Bin 6 Parking 111 Security 231 Standard 112 E H Email Headers. See Header Rewriting Email servers 11, 22, 32, 257 Email Templates. See Templates Encrypted email 4, 48 Engine, MailMarshal 3, 55, 193, 246, 247 Error 2140 248 ESMTP 74, 80, 91, 193, 195 ETRN 179 Event Log 45, 185, 248 Exchange. See Microsoft Exchange Exporting configuration 128, 166 Exporting reports 210 External Commands 69, 75, 105 Hardware Requirements 7 Header 141 Header Matching 70, 142, 145 Map Files 153 Header Rewriting 141 Help xv History. See Alert History, Mail History Host Validation 183 268 User Guide G Goto action 55, 79 I Importing Configuration 19, 128, 166 Installation 17, 201 Internet Explorer 9 ISP 10, 11, 26, 175, 180 K Keys, MailMarshal License 21 Knowledge Base 6 L LDAP 86, 155, 160 License Key. See Keys Licensing 190, 224, 225 Local Domains 10, 11, 22, 32, 59, 168 Local Part Relay Attempt 188 Localhost 14, 32, 258 Logging 28, 44, 133, 171, 199, 215, 216, 217, 222, 224, 247 Logging Classifications 133 Logs, Message 238 Lotus Notes 261 M Mail Batching 177 History 35, 240, 245 Recycle Bin 114, 235, 237 See also Email MailMarshal Secure 2 MAPS. See DNS Blacklist Message Folders. See Folders Message Log 131, 238 Message Names 222, 247 Message Parking 64, 112, 113 Message Release 107 Message Stamp 76, 138, 139, 193 Microsoft Active Directory Server 157 Microsoft Exchange 2, 257 Microsoft ISA Server 33 Microsoft Management Console (MMC) 8, 253 Microsoft Proxy Server 2.0 33 Microsoft SQL Server 8, 201 Microsoft Windows Network Load Balancing 216 Monitoring 39 Moving MailMarshal 249 MSDE 8, 18, 171, 202 MX Record 11, 22, 37 O Online Help 6 Order of Evaluation 54, 79, 122, 124, 127, 149, 187 P Pass Message to Rule 55, 75 Performance Monitor 45 Periodic Site Notifications 233 Permanent Key 191, 192 PGP 48 POP3 10, 22, 23, 43, 74, 82, 89, 168, 169, 179 Ports. See TCP Ports Prerequisites 8, 217, 229 Process message 237 Proxy Servers 33 Q Quarantine Folders. See Folders Quarantined messages 112, 231, 237 Queued Domains 231, 234, 235 Queues, message 231, 232, 234, 246 Index 269 R RAS 180 Receiver, MailMarshal 3, 33, 55, 77–80, 195, 233, 246, 247 Recycle Bin. See Mail Recycle Bin Regular Expressions 149–154 Relay Domains 22, 167 Relaying 10, 81, 82, 91 POP3 Authentication 91 See Also Anti-Relaying Release message 238 Reload Rules 41 Replication 217, 218 Exclusions 224, 225 Reports 8, 28, 171, 199, 200, 213 Exporting 210 Restoring Configuration 18, 128, 166 Routing, email 9, 10, 248 Rule based 76 RTF message stamping 139, 193 Rule Actions Reciever 80, 83 Standard 74–79 Rule Conditions Standard 61–74 Rule User Matching 59–60 Rules 54–84 Global Header Rewrite 186 Rulesets 47, 47–54 Enabling 54 Printing 49 S S/MIME 4, 173 Scanners. See Virus Scanners 270 User Guide Schedule 217 Folder 75, 113, 238 LDAP reload 86, 159 Mail Batching 177, 232 Ruleset 50–51 Security Issues 115, 160, 192, 231 Sender, MailMarshal 3, 193, 194, 195, 235, 245, 247 Server Properties 163–192 Server Threads 196 Service Alerts 231, 244 Services MailMarshal 32, 41, 233, 245 SMTP 3, 5 Software Requirements 9, 200, 229 Spam 59, 70, 183, 188, 234 Spoofing 72, 74 SQL Scripts 201, 251 SQL Server, see Microsoft SQL Server Subject Line 48, 77, 95, 124, 125 Support 251 T TCP Ports 195 1433 15, 171 19001 35 25 11, 13, 32, 258 389 157 97 11, 32, 258 Templates 117 Templates (email notification) 76, 117–119, 194 Testing Header Matching and Rewrite 148 LDAP Connections 159, 160 TextCensor Scripts 127–129 Virus Scanners 99 TextCensor Scripts 121–130 Troubleshooting 245 Reports 250 U UDP 175 Uninstalling MailMarshal 37 Updates 174 User Groups 51, 85–88, 155, 158, 159, 166 User Matching, see Rule User Matching User Options (Console) 243 User Preferences (Configurator) 41 V Valid Fingerprints 61, 63, 74, 77, 164, 218, 238 Variables 84, 108, 119, 134, 139 Virus Cleaning 67–69, 226 Virus Scanners 31, 66, 93–102, 107 W Website, Marshal 4 Whats New? 5 Wildcards 64, 168, 170, 242 Working Directories 246 Index 271 272 User Guide