antispamJunkBoxView
Anti-Spam > Junk Box View
On the Anti-Spam > Junk Box View page, you can view, search, and manage all email messages that are currently in the Junk Store on the Exchange or SMTP server. This functionality is only available if the Junk Store is installed.
Searching the Junk Store
Search the Junk Store for a text string in any of the following email fields:
• To
• Subject
• From
• Date Or, select one or more email threat categories to search.
To search the Junk Store, perform the following steps:
Step 1 On the Inbound tab of the Anti-Spam > Junk Box View page, type the text for which to search into the Search text box.
Step 2 Select the desired email field in which to search from the in drop-down list.
Step 3 Select one or more checkboxes for the email threat categories to search. Categories that are not selected will not be searched.
Only messages belonging to one of the Email Threat Categories that are set to Store in Junk Box on the Anti-Spam > Settings page are included in the Junk Store. However, all categories are listed on this page, whether or not any messages of that type are stored in the Junk Store.Click the Go button to perform the search.
The results are displayed in the bottom section of the page.Managing the Junk Store in the Junk Box View
Use the buttons at the top and bottom of the search results list to perform the following Junk Store management tasks on the Anti-Spam > Junk Box View page:
Select the checkbox for all lines on the page. If there are more lines in the search results than are displayed on the current page, only the results on the current page are selected. Clear the checkbox for all lines on the page. If there are more lines in the search results than are displayed on the current page, only the results on the current page are cleared. Remove the selected message(s) from the Junk Store and deliver them to the user(s) to whom they are addressed. The delivery time and date will be set by the Exchange server when each message is delivered to the user mailbox. Set the number of lines of the search results to display on the page. The choices are 10, 25, and 50 lines per page. Pagination controls are provided to navigate to the first page, previous page, next page, and last page of the results.
Step 2 To permanently delete the selected messages from the Junk Store, click the Delete button at the top or bottom of the list.
The selected messages are deleted immediately – there is no confirmation dialog box before the deletion. If the deletion is successful, a green notification is displayed at the top of the page. If the deletion fails, the notification is red.
Step 3 To remove the selected messages from the Junk Store and deliver them to the users, click the Unjunk button.
The selected messages are unjunked and sent immediately – there is no confirmation dialog box before the action. If the action is successful, a green notification is displayed at the top of the page. If the action fails, the notification is red.
Step 4 To send a copy of the selected messages to a user, click the Send Copy To button. Type the email address into the Send Copy To dialog box and then click Send . Anti-Spam > Junk Box Settings
The Junk Box Settings page allows the Administrator to set the length of time that messages are stored in the Junk Box before being deleted and the number of Junk Box messages to be displayed per page.
Anti-Spam > User View Setup
The User View Setup page allows the Administrator to select and configure which settings will be visible for Users.
Address Book
To allow users to see their own Address Book in the navigation toolbar, select the Address Books toolbar from the User View Setup section.
Select the corresponding checkbox to Allow users to download the SonicWALL Junk Button for Outlook or Allow users to download SonicWALL Anti-Spam Desktop for Outlook and Outlook Express from the User View.
Quarantined Junk Mail Preview Settings
To allow users to preview their quarantined junk mail, select the Users can preview their own quarantined junk mail checkbox.
Note that users determined as Administrators have access to preview all quarantined junk mail for the entire organization by default. To change this option, unselect the Administrators checkbox.
After all necessary changes have been made, click the Apply Changes button. To clear the changes made and revert back to the default settings, click the Revert button.
Anti-Spam > Address Books
The Address Books page allows the Administrator to determine the Allowed and Blocked lists for their organization. The list is a combination of allowed and blocked senders from the organization’s lists and lists provided by SonicWALL.
To add a sender to the Corporate Allowed List, navigate to the Allowed tab, then click the Add button. A dialog box will display where you will need to select the list type between People , Companies , or Lists . After selecting one of these, you can then enter the email address(es) in the space provided. Click Add to finish. The email address(es) will be added to the list on the Allowed Address Books page.
To delete a sender from the Corporate Allowed List, navigate to the Allowed tab, then select the checkbox next to the email address(es) you wish to delete. A success message appears confirming the delete.
To add a sender to the Corporate Blocked List, navigate to the Blocked tab, then click the Add button. A dialog box will display where you will need to select the list type between People and Companies . After selecting one of these, you can then enter the email address(es) in the space provided. Click Add to finish. The email address(es) will be added to the list on the Blocked Address Books page.
Note Senders added on the Corporate Blocked List by the Administrator will automatically be blocked for all users and can only be deleted by the Administrator. To delete a sender from the Corporate Blocked List, navigate to the Blocked tab, then select the checkbox next to the email address(es) you wish to delete. A success message appears confirming the delete.
A search field is available to quickly find Allowed and Blocked email addresses. You are able to access this field by navigating to either the Allowed tab or the Blocked tab. Also, you can filter the search between the Type of addresses (People, Companies, or Lists) by selecting the checkboxes below the search bar. Enter in the address you wish to search for, and then click the Go button to begin the search.
Note The Blocked tab only filters addresses by People and Companies, while the Allowed tab filters addresses by People, Companies, and Lists. Anti-Spam > Manage Users
The Users page allows the Administrator to add, remove, and manage all users, both on the Global and LDAP servers. For more information regarding LDAP Configuration, refer to “Anti-Spam > LDAP Configuration” section .
The Using Source field allows the administrator to select which server, or source, to view. A Global server will always be visible; if an LDAP server is added, this will also be available from the dropdown list. Select the server you wish to view, and then click the Go button.
The Find all users in column field allows the administrator to quickly search for users by specifying the User Name or Primary Email . You can also filter the search by the values equal to , starting with , or containing .
To add a user to the Global or LDAP Server, click the Add button. Enter the Primary Address of the user, select which server the user belongs to from the Using Source dropdown menu, then enter any Aliases . Click Add to finish adding a user.
Anti-Spam > LDAP Configuration
The LDAP Configuration screen allows the Administrator to configure various settings specific to the LDAP server.
This section will display any LDAP Servers that have been configured on the SonicWALL appliance.
In the Available LDAP Servers section, click the Add Server button. The Server Configuration section will expand and allow the Administrator to begin providing the following configurations for a new LDAP Server:
• Friendly Name —A friendly name for the LDAP Server.
• Primary Server name or IP address —The server name or the IP address of the LDAP Server.
• Port Number —The port number of the LDAP Server. The default port number is 389.
• LDAP Server Type —Choose from the dropdown list of servers: Active Directory, Lotus Domino, Exchange 5.5, Sun ONE iPlanet, or Other.
• LDAP Page Size —The maximum page size on the LDAP Server to be queried.
• Requires SSL —Selecting this enables the LDAP Server to require SSL.
• Allow LDAP Referrals —Selecting this allows LDAP referrals. From the Authentication Method section, you will need to configure the LDAP login method for users. Select either Anonymous bind or Login for the LDAP login method, and then specify the Login name and Password . You can also enable the Auto-fill LDAP Query fields when saving configuration option by selecting the checkbox. Click Save Changes to finish adding an LDAP Server.
Note You can test the settings you just configured by clicking the Test LDAP Login button on the bottom right corner of the Authentication Method section. From the list of available LDAP servers, click the Edit icon
. The Server Configuration, LDAP Query Panel, and Add LDAP Mappings sections expand for you to edit. The Server Configuration section that expands upon clicking the Edit icon is the same section you configured when adding a new LDAP server.
If you selected the Auto-fill LDAP Query fields option in the Server Configuration section, the LDAP Query Panel will automatically fill with default values.
If you did not select the aforementioned option, the following values will need to be specified in order to successfully allow users to login to their Junk Box:
• Directory Node to Begin Search —Specify a full LDAP directory path that points towards a node containing the information for all groups in the directory.
• Filter —Specify an LDAP filter to easily find and identify users and mailing lists on the server. In this example, (&(|(objectClass=group)(objectClass=person)(objectClass=publicFolder))(mail=*))
• User Login Name Attribute —Specify the text attribute the user will use as their ‘login name.’ The generally accepted attribute for this field is sAMAccountName. Note that this field works in sync with the Filter field, and needs to agree in both fields if changed.
• Email Alias Attribute —Specify the email address, EmployeeID, PhoneNumber, or other alias attributes that link a single user to his or her junk box. The single generally accepted attribute for this field is proxyAddresses . Note that any other attributes must be separated by a comma. In this example, proxyAddresses,legacyExchangeDN . If you are using a Microsoft Windows environment, you will need to specify the NetBIOS domain name. To locate the NetBIOS domain:
2. Navigate to Start > All Programs > Administrative Tools > Active Directory Domains and Trusts .
4. Click Action . Then, click Properties . The domain name appears on the domain’s Properties dialog box on the General tab.
5. Add the NetBIOS domain name(s) to the Domains section, separating multiple domains with a comma.
6. Click Save Changes to finish. On certain LDAP servers, such as Lotus Domino, some valid email addresses do not appear in the LDAP. The Conversion Rules section changes the way the SonicWALL Email Security appliance interprets certain email addresses, providing a way to map the email address to the LDAP Server. Click the View Rules button to bring up the LDAP Mappings dialog box.
Select the LDAP Server you are using from the dropdown list, then click Go . You can filter the search also by the following:
– domain is —Adds additional mappings from one domain to another
• replace with —Replaces the domain with the one specified
• also add —Adds the second domain to the list of valid domains
– left side character is —Adds character substitution mappings
• replace with —Replaces the character specified in all characters to the left of the “@” sign in the email address
• also add — Adds a second email address to the list of valid email addresses Click the Add Mapping button to finish adding the Conversion Rules.
Anti-Spam > Advanced
The Advanced page allows the Administrator to download system or log files, as well as configure the log level.
You can download log files or system configuration files from your SonicWALL Email Security server. Select from the Type of file dropdown list to select the type of file to download. Then under the Choose specific files category, you can select one or more specific items.
After you have finished selecting the files, click Download to download the file(s) to your local hard drive. To email the file(s), click the Email To... button, and enter the recipient email address in the dialog box that appears.
You can select the amount of system report information to be stored in your logs. Log level 1 provides the maximum quantity of logging information, while level 6 results in the least quantity. Click Apply Changes to save any changes made.
Anti-Spam > Downloads
The Downloads page allows the Administrator to download and install one of SonicWALL’s latest spam-blocking buttons on your desktop.