Proofpoint messaging security gateway virtual edition installation guide
Messages that are unwanted include spam, phishing attacks, malware or fraudulent content. Outgoing messages can be analyzed to prevent sensitive data from leaving the organization or to automatically encrypt emails that contain sensitive information. SEG functionality can be deployed as a cloud service, or as an on-premises appliance, depending on requirements. While it may seem cost-effective to use secure email gateways that are free or to use publicly available software, there are downsides.
This practice will likely result in unwanted or malicious emails making their way to user inboxes. Free security software and services are often not updated fast enough to stop new threats. Attackers and spammers change their tactics quickly, so email security software that cannot keep up will be ineffective. Also, using software that is easy to obtain often means that attackers who want to get malicious emails to their victims will test their emails to make sure that they are not detected.
Saving money by implementing free email security could be costly if an attack against an organization is successful. Organizations may choose to deploy an SEG on premises—using either an appliance or a virtual appliance—or in the cloud. The choice will depend on whether the company is using a cloud-based email service, such as Microsoft Office or an on-premises email server, such as Exchange. It also depends on whether an organization wants to migrate services to the cloud and its comfort level with services and data existing outside the boundary of its own network.
Organizations that deploy on-premises appliances or software to protect email are responsible for purchasing and maintaining their hardware. They are also responsible for updating the software and for connectivity to the email servers. Companies that deploy a secure email gateway as a cloud service do not have to be responsible for any of those.
Instead, the security vendor has to maintain service availability. Another benefit of utilizing a cloud service to deploy a secure email gateway is scalability.
If there are spikes in email traffic or an increase in the number of users, a cloud service can quickly scale to maintain performance.
There is no need to log in. Note: If the links in the Digest have expired, you will be prompted to log in to the Web Application to release a message.
The Safe Senders list is simply a list of approved senders of email. When a sender address is included in the Safe Senders list, the Proofpoint Protection Server does not filter the message for spam. Messages will still be filtered for a virus or inappropriate content.
To mark an email address as safe, simply click the Safelist link next to the appropriate email message in the Digest. A web browser opens, allowing you to add or edit your lists. When you add a domain name e. There are two ways to launch the Web Application: Enter the URL provided to you by your email administrator in a browser. Click the Manage My Account link in the email Digest. Shown on the other side of this page. After you log in to the Web Application, you can: Release your email messages from the Quarantine.
Select the message check box and click Release. Add senders to your Safe Senders and Blocked Senders lists.
0コメント