antispamJunkBoxView

Anti-Spam > Junk Box View

On the Anti-Spam > Junk Box View page, you can view, search, and manage all email messages that are currently in the Junk Store on the Exchange or SMTP server. This functionality is only available if the Junk Store is installed.

Searching the Junk Store

Search the Junk Store for a text string in any of the following email fields:

 
To
 
Subject
 
From
 
Date

Or, select one or more email threat categories to search.

To search the Junk Store, perform the following steps:

Step 1
On the Inbound tab of the Anti-Spam > Junk Box View page, type the text for which to search into the Search text box.
Step 2
Select the desired email field in which to search from the in drop-down list.
Step 3
Select one or more checkboxes for the email threat categories to search. Categories that are not selected will not be searched.
Only messages belonging to one of the Email Threat Categories that are set to Store in Junk Box on the Anti-Spam > Settings page are included in the Junk Store. However, all categories are listed on this page, whether or not any messages of that type are stored in the Junk Store.

Click the Go button to perform the search.
The results are displayed in the bottom section of the page.

Managing the Junk Store in the Junk Box View

Use the buttons at the top and bottom of the search results list to perform the following Junk Store management tasks on the Anti-Spam > Junk Box View page:

 

Select the checkbox for all lines on the page. If there are more lines in the search results than are displayed on the current page, only the results on the current page are selected.
Clear the checkbox for all lines on the page. If there are more lines in the search results than are displayed on the current page, only the results on the current page are cleared.
Remove the selected message(s) from the Junk Store and deliver them to the user(s) to whom they are addressed. The delivery time and date will be set by the Exchange server when each message is delivered to the user mailbox.
Set the number of lines of the search results to display on the page. The choices are 10, 25, and 50 lines per page. Pagination controls are provided to navigate to the first page, previous page, next page, and last page of the results.

To manage the Junk Store:

Step 1
In the results list, select the checkbox for the messages that you want to manage.
Step 2
To permanently delete the selected messages from the Junk Store, click the Delete button at the top or bottom of the list.
The selected messages are deleted immediately – there is no confirmation dialog box before the deletion. If the deletion is successful, a green notification is displayed at the top of the page. If the deletion fails, the notification is red.

 

Step 3
To remove the selected messages from the Junk Store and deliver them to the users, click the Unjunk button.
The selected messages are unjunked and sent immediately – there is no confirmation dialog box before the action. If the action is successful, a green notification is displayed at the top of the page. If the action fails, the notification is red.
Step 4
To send a copy of the selected messages to a user, click the Send Copy To button. Type the email address into the Send Copy To dialog box and then click Send .

Anti-Spam > Junk Box Settings

The Junk Box Settings page allows the Administrator to set the length of time that messages are stored in the Junk Box before being deleted and the number of Junk Box messages to be displayed per page.

 

Anti-Spam > User View Setup

The User View Setup page allows the Administrator to select and configure which settings will be visible for Users.

 

Address Book

To allow users to see their own Address Book in the navigation toolbar, select the Address Books toolbar from the User View Setup section.

User Download Settings

Select the corresponding checkbox to Allow users to download the SonicWALL Junk Button for Outlook or Allow users to download SonicWALL Anti-Spam Desktop for Outlook and Outlook Express from the User View.

Quarantined Junk Mail Preview Settings

To allow users to preview their quarantined junk mail, select the Users can preview their own quarantined junk mail checkbox.

Note that users determined as Administrators have access to preview all quarantined junk mail for the entire organization by default. To change this option, unselect the Administrators checkbox.

After all necessary changes have been made, click the Apply Changes button. To clear the changes made and revert back to the default settings, click the Revert button.

Anti-Spam > Address Books

The Address Books page allows the Administrator to determine the Allowed and Blocked lists for their organization. The list is a combination of allowed and blocked senders from the organization’s lists and lists provided by SonicWALL.

 

Allowed Lists

To add a sender to the Corporate Allowed List, navigate to the Allowed tab, then click the Add button. A dialog box will display where you will need to select the list type between People , Companies , or Lists . After selecting one of these, you can then enter the email address(es) in the space provided. Click Add to finish. The email address(es) will be added to the list on the Allowed Address Books page.

To delete a sender from the Corporate Allowed List, navigate to the Allowed tab, then select the checkbox next to the email address(es) you wish to delete. A success message appears confirming the delete.

Blocked Lists

To add a sender to the Corporate Blocked List, navigate to the Blocked tab, then click the Add button. A dialog box will display where you will need to select the list type between People and Companies . After selecting one of these, you can then enter the email address(es) in the space provided. Click Add to finish. The email address(es) will be added to the list on the Blocked Address Books page.

 
Note
Senders added on the Corporate Blocked List by the Administrator will automatically be blocked for all users and can only be deleted by the Administrator.

To delete a sender from the Corporate Blocked List, navigate to the Blocked tab, then select the checkbox next to the email address(es) you wish to delete. A success message appears confirming the delete.

Search Field

A search field is available to quickly find Allowed and Blocked email addresses. You are able to access this field by navigating to either the Allowed tab or the Blocked tab. Also, you can filter the search between the Type of addresses (People, Companies, or Lists) by selecting the checkboxes below the search bar. Enter in the address you wish to search for, and then click the Go button to begin the search.

 
Note
The Blocked tab only filters addresses by People and Companies, while the Allowed tab filters addresses by People, Companies, and Lists.

Anti-Spam > Manage Users

The Users page allows the Administrator to add, remove, and manage all users, both on the Global and LDAP servers. For more information regarding LDAP Configuration, refer to “Anti-Spam > LDAP Configuration” section .

 

User View Setup

Using Source

The Using Source field allows the administrator to select which server, or source, to view. A Global server will always be visible; if an LDAP server is added, this will also be available from the dropdown list. Select the server you wish to view, and then click the Go button.

 

Find All Users in Column

The Find all users in column field allows the administrator to quickly search for users by specifying the User Name or Primary Email . You can also filter the search by the values equal to , starting with , or containing .

 

Adding Users

To add a user to the Global or LDAP Server, click the Add button. Enter the Primary Address of the user, select which server the user belongs to from the Using Source dropdown menu, then enter any Aliases . Click Add to finish adding a user.

Anti-Spam > LDAP Configuration

The LDAP Configuration screen allows the Administrator to configure various settings specific to the LDAP server.

Available LDAP Servers

This section will display any LDAP Servers that have been configured on the SonicWALL appliance.

Adding an LDAP Server

In the Available LDAP Servers section, click the Add Server button. The Server Configuration section will expand and allow the Administrator to begin providing the following configurations for a new LDAP Server:

 
Friendly Name —A friendly name for the LDAP Server.
 
Primary Server name or IP address —The server name or the IP address of the LDAP Server.
 
Port Number —The port number of the LDAP Server. The default port number is 389.
 
LDAP Server Type —Choose from the dropdown list of servers: Active Directory, Lotus Domino, Exchange 5.5, Sun ONE iPlanet, or Other.
 
LDAP Page Size —The maximum page size on the LDAP Server to be queried.
 
Requires SSL —Selecting this enables the LDAP Server to require SSL.
 
Allow LDAP Referrals —Selecting this allows LDAP referrals.

From the Authentication Method section, you will need to configure the LDAP login method for users. Select either Anonymous bind or Login for the LDAP login method, and then specify the Login name and Password . You can also enable the Auto-fill LDAP Query fields when saving configuration option by selecting the checkbox. Click Save Changes to finish adding an LDAP Server.

 
Note
You can test the settings you just configured by clicking the Test LDAP Login button on the bottom right corner of the Authentication Method section.

Configuring an LDAP Server

From the list of available LDAP servers, click the Edit icon . The Server Configuration, LDAP Query Panel, and Add LDAP Mappings sections expand for you to edit. The Server Configuration section that expands upon clicking the Edit icon is the same section you configured when adding a new LDAP server.

 

LDAP Query Panel

If you selected the Auto-fill LDAP Query fields option in the Server Configuration section, the LDAP Query Panel will automatically fill with default values.

If you did not select the aforementioned option, the following values will need to be specified in order to successfully allow users to login to their Junk Box:

 
Directory Node to Begin Search —Specify a full LDAP directory path that points towards a node containing the information for all groups in the directory.
 
Filter —Specify an LDAP filter to easily find and identify users and mailing lists on the server. In this example, (&(|(objectClass=group)(objectClass=person)(objectClass=publicFolder))(mail=*))
 
User Login Name Attribute —Specify the text attribute the user will use as their ‘login name.’ The generally accepted attribute for this field is sAMAccountName. Note that this field works in sync with the Filter field, and needs to agree in both fields if changed.
 
Email Alias Attribute —Specify the email address, EmployeeID, PhoneNumber, or other alias attributes that link a single user to his or her junk box. The single generally accepted attribute for this field is proxyAddresses . Note that any other attributes must be separated by a comma. In this example, proxyAddresses,legacyExchangeDN .

 

Add LDAP Mappings

If you are using a Microsoft Windows environment, you will need to specify the NetBIOS domain name. To locate the NetBIOS domain:

1.
Login to your domain controller.
2.
Navigate to Start > All Programs > Administrative Tools > Active Directory Domains and Trusts .
3.
Highlight your domain from the Active Directory Domains and Trusts dialog box.
4.
Click Action . Then, click Properties . The domain name appears on the domain’s Properties dialog box on the General tab.
5.
Add the NetBIOS domain name(s) to the Domains section, separating multiple domains with a comma.
6.
Click Save Changes to finish.

 

Conversion Rules

On certain LDAP servers, such as Lotus Domino, some valid email addresses do not appear in the LDAP. The Conversion Rules section changes the way the SonicWALL Email Security appliance interprets certain email addresses, providing a way to map the email address to the LDAP Server. Click the View Rules button to bring up the LDAP Mappings dialog box.

 

Select the LDAP Server you are using from the dropdown list, then click Go . You can filter the search also by the following:

Domain Mappings

 
domain is —Adds additional mappings from one domain to another
 
replace with —Replaces the domain with the one specified
 
also add —Adds the second domain to the list of valid domains
 
left side character is —Adds character substitution mappings
 
replace with —Replaces the character specified in all characters to the left of the “@” sign in the email address
 
also add Adds a second email address to the list of valid email addresses

Click the Add Mapping button to finish adding the Conversion Rules.

Anti-Spam > Advanced

The Advanced page allows the Administrator to download system or log files, as well as configure the log level.

 

Download System/Log Files

You can download log files or system configuration files from your SonicWALL Email Security server. Select from the Type of file dropdown list to select the type of file to download. Then under the Choose specific files category, you can select one or more specific items.

After you have finished selecting the files, click Download to download the file(s) to your local hard drive. To email the file(s), click the Email To... button, and enter the recipient email address in the dialog box that appears.

Log Level

You can select the amount of system report information to be stored in your logs. Log level 1 provides the maximum quantity of logging information, while level 6 results in the least quantity. Click Apply Changes to save any changes made.

Anti-Spam > Downloads

The Downloads page allows the Administrator to download and install one of SonicWALL’s latest spam-blocking buttons on your desktop.