Forcepoint Mail Gateway Admin Guide
Forcepoint Mail Gateway Admin Guide
v8.5.x
©2021 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. All other trademarks used in this document are the
property of their respective owner.
Published 2021
Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to
this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint
shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or
use of this manual or the examples herein. The information in this documentation is subject to change without notice.
Log Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Message Log details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Connection Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Connection Log data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Connection Log search options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Connection Log export options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Connection Log details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Audit Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Audit Log data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Audit Log display options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Audit Log export options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Personal Email Manager Audit Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Personal Email Manager Audit Log data. . . . . . . . . . . . . . . . . . . . . . . . . . 45
Personal Email Manager Audit Log search options . . . . . . . . . . . . . . . . . 45
Personal Email Manager Audit Log export options . . . . . . . . . . . . . . . . . 46
System Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
System Log data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
System Log display options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
System Log export options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Console Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Console Log data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Console Log display options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Console Log export options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Email Hybrid Service Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Email Hybrid Service Log data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Email Hybrid Service Log search options . . . . . . . . . . . . . . . . . . . . . . . . . 51
Email Hybrid Service Log export options . . . . . . . . . . . . . . . . . . . . . . . . . 52
Real-time monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Security Information and Event Management (SIEM) integration . . . . . . . . . . . 54
Email hybrid service configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Registering the Email Security Hybrid Module . . . . . . . . . . . . . . . . . . . . . . . 56
Enter customer information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Define delivery routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Configure your DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Set up your firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Configure your MX records. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Modifying email hybrid service configuration . . . . . . . . . . . . . . . . . . . . . 61
Configuring the Email Hybrid Service Log . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Registering the DLP Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Email filtering database updates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Configuring system alerts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Enabling system alerts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Email alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
SNMP alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Alert events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Administrator Help v
Contents
Administrator Help 1
Overview
Embedded help
Access embedded Administrator Help from the Help icon at the top right area of the
screen, in the Security Manager banner.
Click Help > Explain This Page to open context-sensitive help for the active Email
module page.
Important
Default Microsoft Internet Explorer settings may block
operation of the Help system. If a security alert appears,
select Allow Blocked Content to display Help.
If your organization’s security standards permit, you can
permanently disable the warning message on the
Advanced tab of the Tools > Internet Options interface.
(Under Security options, check Allow active content to
run in files on My Computer.)
Administrator Help 3
Overview
Click the Previous page and Next page icons to page through the Help topics, or click
Show the navigation pane to display the complete embedded Administrator Help
contents. To find a Help topic in the Help viewer, select one of the following tabs:
● Contents
Click a book icon to expand that book’s topics.
Click a table of contents entry to display the corresponding topic.
● Search
Enter a word or phrase and click Go!
Click an entry of the results list to display the corresponding topic.
The right pane of the Security Manager Email module contains a Find Answers portal
that may include the following components:
● A Top Picks section containing external links to information related to the screen
content; and
● A Search field that you can use to find topics of interest in the Forcepoint
eSupport site.
● A Common Tasks section containing internal links to related pages in the
Forcepoint Security Manager.
Technical Support
Click Help > Support Portal in the Security Manager module tray to access the
Forcepoint online Support site. Technical information about Forcepoint software and
services is available 24 hours a day, including:
● the searchable knowledge base (Solution Center, product documentation, and
customer forums),
● webinars and show-me videos,
● product documents and in-depth technical papers, and
● answers to frequently asked questions.
For additional questions, click the Contact Support tab at the top of the page.
The contact page includes information for finding solutions, opening an online
support case, and calling Technical Support.
For faster phone response, please use your Account ID, which you can find in the
Profile section on the My Account page.
For telephone requests, please have ready:
● Product subscription key
● Access to the Security Manager for your solutions
● Access to the machine running reporting tools and the database server (Microsoft
SQL Server or SQL Server Express)
● Familiarity with the architecture of your network, or access to a specialist
Administrator Help 5
Overview
Topics:
● Using the First-time Configuration Wizard, page 7
● Entering and viewing subscription information, page 10
● Navigating the Forcepoint Security Manager, page 13
● The dashboard, page 18
● Viewing and searching logs, page 32
● Real-time monitor, page 53
● Security Information and Event Management (SIEM) integration,
page 54
● Email hybrid service configuration, page 55
● Registering the DLP Module, page 62
● Email filtering database updates, page 64
● Configuring system alerts, page 65
● URL analysis, page 69
● Selecting advanced file analysis platform, page 71
● Using a proxy server, page 72
● Using the Common Tasks pane, page 73
The Configuration Wizard is available the first time you open your email product after
installation. The wizard lets you quickly and easily enter some critical configuration
settings before you open the Forcepoint Email Security module user interface.
Click the Email Security module in the Forcepoint Security Manager to display a
pop-up box that allows you to enter your subscription key. You can enter your key
Administrator Help 7
Getting Started
here, or skip this step and enter your subscription key later on the page Settings >
General > Subscription (see Entering and viewing subscription information, page
10).
After you click OK in the subscription key pop-up box, a subsequent message box
offers a choice of opening the Configuration Wizard or the email dashboard.
Note
If you open the dashboard instead of the wizard, you are
presented with an option to open a document containing
some helpful configuration settings information.
If you decide to skip the Configuration Wizard, you cannot
access it later for this appliance.
You can enter the following information in the first-time Configuration Wizard:
● Fully qualified domain name (FQDN), page 8
● Domain-based route, page 9
● Trusted IP addresses for inbound mail, page 9
● Email Log Server information, page 10
● System notification email address, page 10
To save your settings, review them in the Confirmation page of the Configuration
Wizard and click Complete.
If you click Cancel at any time while you are in the Configuration Wizard, any
settings you entered up to that point are lost.
A Confirmation page at the end of the wizard lets you review all your settings and
modify any of them if desired.
■ Click Edit next to the item you want to change.
The appropriate wizard page displays.
■ Make required changes and click OK on the edited page to return to the
Confirmation page.
Click Complete when you are finished with your configuration settings to open the
email dashboard.
The FQDN page of the Configuration Wizard is used to specify the appliance fully
qualified domain name (FQDN), as configured in your public DNS. This setting is
used for the HELO/EHLO connection and is critical for proper email security
software operation. An incorrect fully qualified domain name may cause disruptions
in email traffic flow.
Enter the appliance FQDN in the field Fully Qualified Domain Name
■ FQDN format is mail.parentdomain.com.
This FQDN appears as the default entry on the page Settings > General > System
Settings.
Domain-based route
Administrator Help | Forcepoint Email Security | Version 8.5.x
On the page Trusted Inbound Mail, you can create a list of trusted IP addresses for
which some inbound email filtering is not performed. Trusted IP addresses may
include your internal mail servers or a trusted partner mail server.
See Managing domain and IP address groups, page 93, for detailed information about
how trusted IP addresses are handled in the email system.
Enter an IP address in the Trusted IP address field, and then click the right arrow
button to add it to the Trusted IP address list.
Delete an address from the Trusted IP addresses list by selecting the address and
clicking Remove.
Administrator Help 9
Getting Started
The Email Log Server receives records of system event and email analysis activity,
which the Log Database uses to generate reports. Enter the Log Server IP address and
port number on the page Log Server. Click Check Status to receive Log Server
availability information.
Identify an email address to which you want system notification messages sent on the
wizard page Notifications. Typically, this is an administrator address. Enter the
desired address in the field Notification email address.
You should receive a subscription key when you purchase Forcepoint Email Security.
If you did not enter the subscription key the first time you opened the Email Security
module, enter it on the page Settings > General > Subscription. This subscription
key can be entered in one appliance and is applied to all the appliances controlled by
the Email Security module.
Enter a new key any time you receive one to update your subscription. If your
subscription includes the Forcepoint Email Security Hybrid Module, you must register
with the email hybrid service every time you enter a new subscription key to establish
the connection and synchronize email protection system functions. After you enter a
valid subscription key, the expiration date and number of subscribed users are
displayed. Purchased subscription features appear in the Subscribed Features list.
There are two different license modes: Forcepoint Email Security and Forcepoint DLP
Email Gateway. Forcepoint DLP Email Gateway is an alternative to Forcepoint Email
Security and provides capability to analyze inbound or outbound mail for data loss or
theft. If you use Forcepoint DLP, you can add a subscription key to register
Forcepoint DLP Email Gateway. It is not possible to deploy Forcepoint DLP Email
Gateway concurrently with Forcepoint Email Security.
If you enter a new subscription key for a different license mode, the email protection
system automatically reloads the configuration to provide access to the functionality
available with the subscription. All menu options are available with a new installation
of Forcepoint Email Security. If you register a new Forcepoint DLP Email Gateway
license, the email protection system automatically updates to allow access to
Forcepoint DLP Email Gateway menu options. See Forcepoint Email Security versus
Forcepoint DLP Email Gateway, page 11, for a comparison table of the menu options
available in each product.
Administrator Help 11
Getting Started
The Email Security module user interface can be divided into four main areas:
● The Security Manager toolbar
● The left navigation pane
● The right shortcut pane
● The context pane
The content displayed in the Email Security module varies based on the privileges
granted to the logged-on user. A user who is a reporting administrator, for example,
does not see server configuration settings or policy administration tools.
This section describes the options available to users with Super Administrator
privileges.
Certain menu options were changed in versions 8.5.3 and 8.5.4. The following image
displays the user interface for Security Manager version 8.5:
Administrator Help 13
Getting Started
The following image displays the user interface for Security Manager version 8.5.3:
The following image displays the user interface for Security Manager version 8.5.4:
Manage appliances
The Manage Appliances page is used to register new appliances and access
all Forcepoint appliances in your network.
Access the Manage Appliances page
● From the Security Manager banner, click the icon Appliances.
The Manage Appliances page displays. See Forcepoint Security Manager Help.
Administrator Help 15
Getting Started
Global Settings
The Global Settings page is used to configure the following management
settings for all Forcepoint Security Manager modules:
Help options
The Help icon provides access to Explain This Page context-sensitive Help,
complete Help system contents, helpful initial configuration setting
information, and the Forcepoint Support Portal.
Access Explain This Page
1. From the Security Manager banner, click the icon Help.
The Help options display.
2. Click Explain This page.
A new tab displays, showing the Help topic for the current page of the Forcepoint
Security Manager.
3. (Optional) From the Help topic, click Open topic with navigation.
The complete Help system displays.
administration tasks. Individual configuration pages are accessed from the menu
items. The toolbar also includes a pull-down menu of system appliances.
Administrator Help 17
Getting Started
The dashboard
The dashboard displays on initial login to the Email Security module of the Forcepoint
Security Manager and provides access to charts detailing metrics for the Forcepoint
Email Security product.
The dashboard includes three default tabs.
The following image displays the dashboard in version 8.5.3:
● The Value dashboard tab (1) displays on first login and shows information about
the value of Forcepoint Email Security in the network, along with a summary of
system health alerts.
● The Inbound dashboard tab (2) shows graphical charts that display top domains
and message recipients for inbound email. Top domain and recipient information
is sorted by message size or volume.
● The Outbound dashboard tab (3) shows graphical charts that display top senders
for outbound email, sorted by message size or volume. Other default charts for
this tab show an overall outbound message summary and a summary of outbound
messages that contained embedded URLs.
Dashboard elements are visible to Super Administrators and those delegated
administrators with permission to view reports on the email dashboard (see Managing
administrator accounts, page 75). The type of information and level of detail shown
depends on your subscription level. For example, the Forcepoint Email Security
Hybrid Module is required to display information about the email hybrid service and
how it safeguards your system. Forcepoint Advanced Malware Detection for Email -
Cloud must be purchased to view metrics on advanced file analysis functions in the
cloud; Forcepoint Advanced Malware Detection for Email - On-Premises must be
purchased to view advanced file analysis appliance metrics. The following table
details the options available on the dashboard.
Administrator Help 19
Getting Started
All elements on a tab are also updated when any element on the tab is modified.
For example, if the time period for one chart is changed, data is refreshed in all of
the charts on the page.
● The available set of dashboard elements depends on your subscription type.
Charts related to the email hybrid service, for example, are available only for
deployments that include the Forcepoint Email Security Hybrid Module.
● Clicking a pie, bar, or line chart typically allows the display of drill-down data
with more details. For example, clicking a chart element that represents data for a
24-hour period can display the same data in one-hour increments. These
capabilities are available in the Edit, Enlarge, and Preview chart views.
Add a chart to a dashboard tab
● From the dashboard, click Add Charts.
The Add Charts window displays. See Adding elements to a dashboard tab, page
26.
Move a chart on a dashboard tab
1. Click the title bar of a chart.
2. Keeping the mouse button selected, drag the chart to a new location on the same
tab.
A check mark icon displays when the chart can be placed in a new location.
3. Release the mouse button.
The chart displays in its new location on the dashboard tab.
4. From the dashboard, click Save.
The dashboard configuration is saved.
Remove a chart from a dashboard tab
1. On the title bar of a chart, click the icon Options.
The chart options display.
2. Click Remove.
The Confirm Remove Chart dialog window displays.
3. Click Remove.
The chart is removed from the dashboard tab.
4. From the dashboard, click Save.
The dashboard configuration is saved.
Print a chart
1. On the title bar of a chart, click the icon Options.
The chart options display.
2. Click Print.
A new tab displays with a printer-friendly version of the chart.
3. Click Print.
The Value dashboard tab is a default tab that displays alert messages and graphical
charts that show the current state of your email protection system, focusing on email
traffic activity in your network.
The following image displays the default elements on the Value tab in version 8.5.3:
Administrator Help 21
Getting Started
The following image displays the default elements on the Value tab in version 8.5.4:
● The Health Alert Summary (1) shows the status of your Forcepoint software.
Selection of an error or warning alert message to open the Alerts page, where
more detailed alert information is available (see Viewing system alerts, page 30).
● The 24-Hour Business Value chart (2) displays statistics showing how your
email security software has protected your network during the past 24 hours by
blocking suspicious email traffic. Data includes total numbers of blocked
connections and messages listed by analysis result, the numbers of false positive
and missed spam results from email analysis, and the number totals for various
types of messages handled by the email system.
● The 30-Day Blocked Message Estimated Savings chart (3) provides an estimate
of savings afforded by your email protection system, which can stop unwanted
mail and threats (including at the connection level), protect network resources,
and save an organization time and money. With the addition of the Forcepoint
Email Security Hybrid Module, infected traffic is stopped before it enters the
network, increasing the savings.
Hover over the estimated savings item for the approximate cost savings from the
email hybrid service and on-premises email analysis. Default value of cost per
MB includes the estimated cost saving from preventing threats and unwanted
mail, and the resulting bandwidth saved. Use the Options icon in the element’s
title bar to set the cost savings per MB of blocked mail.
● The 30-Day Blocked Message Value chart (4) displays metrics similar to the
24-hour value chart demonstrating email system protection for the previous 30
days. This chart illustrates the total numbers and percentages of blocked
Administrator Help 23
Getting Started
connections and messages, including false positive and missed spam results from
email analysis.
Change the name of the Value dashboard tab
1. From the Value dashboard tab, click the icon Edit.
The Edit Tab dialog box displays.
2. In the field Tab name, enter the new name for the Value tab.
3. Click OK.
The new name of the tab is saved. Default tabs, such as the Value tab, can be
renamed but not removed.
Add a chart to the Value dashboard tab
● From the dashboard, click Add Charts.
The Add Charts window displays. See Adding elements to a dashboard tab, page
26.
Remove a chart from the Value dashboard tab
1. On the title bar of a chart, click the icon Options.
The chart options display.
2. Click Remove.
The Confirm Remove Chart dialog box displays.
3. Click Remove.
The chart is removed from the Value dashboard tab.
4. From the dashboard, click Save.
The dashboard configuration is saved.
The Inbound dashboard tab is a default tab that provides summary data on inbound
message traffic.
Default charts on the Inbound tab include the following:
● The Top Inbound Domains by Message Size chart displays the message
domains that are the source of the majority of inbound messages, plotted by
message size.
● The Top Inbound Domains by Message Volume chart shows the message
domains that account for the majority of all inbound messages.
● The Top Inbound Recipients by Message Size chart displays the recipient
addresses that receive the majority of inbound email, plotted by message size.
● The Top Inbound Recipients by Message Volume chart shows the recipient
addresses that receive the majority of all inbound email.
The Outbound dashboard tab is a default tab that provides summary data on outbound
message traffic.
Default charts on the Outbound tab include the following:
● The Top Outbound Senders by Message Size chart displays the sender
addresses that account for the majority of outbound email, plotted by message
size.
● The Top Outbound Senders by Message Volume chart shows the sender
addresses that represent the majority of all outbound messages.
● The Outbound Messages Summary chart displays the total number of outbound
messages processed by your email protection software, sorted by message
analysis result (clean, virus, spam, and so on).
● The Outbound Message Embedded URL Summary chart shows the percentage
of analyzed outbound messages that contain at least one embedded URL,
displayed by message analysis result. For example, if 50 outbound messages are
determined to be spam, and 40 of those messages contain an embedded URL, then
the percentage shown in this chart for the spam message type is 80% (40/50).
Administrator Help 25
Getting Started
The page Status > Dashboard > Add Charts is used to add elements to the Value,
Inbound, Outbound, or any custom dashboard tab. The following table details the
options on the Add Charts page.
Option Description
Available Tabs Enables selection of any available tab to add charts.
Selection of a tab updates the Preview pane. Functionality
is also available to restore defaults for default dashboard
tabs.
Dashboard Elements Enables selection of charts to be added to the selected tab.
See Available dashboard charts, page 27, for a complete
list of available elements.
Preview Displays a preview of the selected chart and enables
changes to be made to the chart name, chart type, time
period, and top value.
Dashboard tabs can be customized by adding up to 12 charts per tab. The page
Status > Dashboard > Add Charts is used to add charts to a tab. See Adding
Administrator Help 27
Getting Started
elements to a dashboard tab, page 26. The following table details the charts available
to be added to all dashboard tabs.
Note
Some charts show potentially sensitive information, such
as usernames or IP addresses. Ensure that the charts you
select are appropriate for all of the administrators who may
view them.
Chart Name
30-Day Blocked Message Value
30-Day Blocked Message Estimated Savings
24-Hour Business Value
Connections Summary
Inbound Messages Summary
Outbound Messages Summary
Average Message Volume in Work Queue
Data Loss Prevention Violations by Severity
Top Data Loss Prevention Violations
Top Outbound Senders by Message Size
Top Outbound Senders by Message Volume
Top Blocked Protected Domain Addresses
Top Inbound Domains by Message Size
Top Inbound Domains by Message Volume
Top Inbound Recipients by Message Size
Top Inbound Recipients by Message Volume
Inbound Message Embedded URL Summary
Outbound Message Embedded URL Summary
Inbound Message Embedded URL Categories
Outbound Message Embedded URL Categories
Top Inbound Targeted Phishing Attacks
Top Inbound Phishing Attack Victims
Inbound Message Throughput
Outbound Message Throughput
Outbound Encrypted Messages Summary
Message Volume by Direction
Chart Name
Top Inbound Senders
Inbound Spam Volume
Inbound Spam Percentage
Inbound Virus Volume
Inbound Virus Percentage
Inbound Commercial Bulk Volume
Inbound Commercial Bulk Percentage
Outbound Spam Volume
Outbound Spam Percentage
Outbound Virus Volume
Outbound Virus Percentage
Inbound Volume by Message Type
Outbound Volume by Message Type
Opportunistic TLS Usage Volume
Top Recipient Domains Via Mandatory TLS Channel
Top Mandatory TLS Usage Failures
Inbound Forcepoint Advanced Malware Detection for Email - Cloud Analysis
Volume
Top Inbound Attachments Detected by Forcepoint Advanced Malware Detection
for Email - Cloud
Top Attachments by File Type Detected by Forcepoint Advanced Malware
Detection for Email - Cloud
Top Recipients Protected by Forcepoint Advanced Malware Detection for Email
- Cloud
Inbound Analysis Volume for Forcepoint Advanced Malware Detection for
Email - On-Premises
Top Malicious Attachments Detected by Forcepoint Advanced Malware
Detection for Email - On-Premises
Top Recipients Protected by Forcepoint Advanced Malware Detection for Email
- On-Premises
Attachment File Types Detected by Forcepoint Advanced Malware Detection
for Email - On-Premises
Email Hybrid Service Message Size Summary (requires Forcepoint Email
Security Hybrid Module)
Email Hybrid Service Message Volume Summary (requires Forcepoint Email
Security Hybrid Module)
Administrator Help 29
Getting Started
The page Status > Alerts displays information about problems affecting the health of
the email software, provides links to troubleshooting help, and documents the details
of recent real-time analytic database updates.
The Alerts page can be accessed from the Status menu or from the Health Alert
Summary chart on the Value tab of the dashboard, which shows the status of your
email protection software.
Access Alerts from the left navigation pane
● From the left navigation pane, select Status > Alerts.
The Alerts page displays.
Access Alerts from the Health Alert Summary chart
● From the Health Alert Summary chart on the Value dashboard tab, select an error
or warning message.
The Alerts page displays.
Active Alerts
The Active Alerts list displays the status of monitored Forcepoint software
components with functionality to view detailed information about which components
are monitored.
View monitored components
● From Active Alerts, click What is monitored?
A new tab displays with the Help topic for System health alerts.
Troubleshoot a problem
● From an error or warning message in Active Alerts, click Solutions.
A new tab displays with the applicable Help topic for troubleshooting.
View details of an informational alert
● From an informational alert, click Learn More.
The Health Alert Summary lists any potential concerns encountered by monitored
components of your software. Alerts are generated for the following conditions:
● Subscription expiration issues or subscription key problems
● Email services unavailable or not running
● Email software configuration problems
Administrator Help 31
Getting Started
Selection of an alert message in the Health Alerts Summary displays the Alerts page,
which provides additional information about current alert conditions. See Viewing
system alerts, page 30.
The page Main > Status > Logs provides access to several logs for monitoring system
and email message status. Logs are searchable by predefined or customized time
periods. The Message Log additionally allows searches to be refined for messages,
using search conditions like email address, message analysis result, or message status.
The search results for any log can be exported to a comma-separated value (CSV) or
HTML file. The maximum number of log entries exported cannot be greater than
100,000. Starting in version 8.5.4, when logs are filtered and then exported, the
exported file contains only the filtered logs.
The following logs are accessed from the Logs page:
● Message Log, page 32
● Connection Log, page 39
● Audit Log, page 42
● Personal Email Manager Audit Log, page 44
● System Log, page 47
● Console Log, page 49
● Email Hybrid Service Log, page 50
Message Log
Administrator Help | Forcepoint Email Security | Version 8.5.x
The Message Log records information about each email message (inbound, outbound,
and internal) processed by the email system. Access the Message Log on the Message
tab of the page Main > Status > Logs.
Administrator Help 33
Getting Started
can be added, with a relationship of “and” to further refine the search. The following
table details the search filter options.
Option Description
Filter Pull-down menu functionality to select a message element on
which to search:
● Subject
● Sender Address
● Sender IP
● Recipient Address
● Analysis Result
● Message Status
● To: Header
● From: Header
● Spam Score
● Message Size (KB)
● Appliance
Condition Pull-down menu functionality to select a condition for the
selected filtering option. The available conditions depend on the
selected filter; not all conditions are available for all filters.
Conditions include:
● Contains
● Does not contain
● Equals
● Does not equal
● Starts with
● Does not start with
● Ends with
● Does not end with
● Is
● Is not
● Is in this range
Note: If you select the filter Spam Score and the condition “is”
or “is not,” the value of “null” can be input in the Value
field.
Note: If you select the filter Sender Address or Recipient
Address and the filter “is” or “is not,” multiple addresses
can be entered in the Value field, separated by a semicolon.
Value User-defined text field to enter a value for the filter and condition.
Option Description
Add/Remove Selection adds or removes a row of filtering options to further
narrow the search.
Advanced Options Selection displays additional sort conditions to refine the search:
● By Direction
■ Inbound
■ Outbound
■ Internal
■ Open Relay
● By Analysis Result
■ Clean
■ Virus
■ Spam
■ URL Analysis
■ Commercial Bulk
■ Data Loss Prevention
■ Custom Content
■ Exception
■ Block List
■ Advanced Malware Detection - Cloud
■ Phishing
■ Advanced Malware Detection - On-Premises
■ Spoofed Email
■ Email Attachment
■ SMTP Authentication Fail
■ RBL
■ Reputation
■ RDNS
■ SPF
■ DMARC
● By Message Status
■ Delivered
■ Delayed
■ Dropped
■ Exception
■ Failed
■ Expired
■ Rejected
Administrator Help 35
Getting Started
Log Details
The Log Details page displays information about a selected message. The following
table details the Message Log detail items that display on the Log Details page.
Administrator Help 37
Getting Started
Connection Log
Administrator Help | Forcepoint Email Security | Version 8.5.x
The Connection Log is a record of incoming connection requests and the results of
connection analysis. Access the Connection Log on the Connection tab of the page
Main > Status > Logs.
Administrator Help 39
Getting Started
Administrator Help 41
Getting Started
2. From the pull-down menu File type, select the desired output file type; CSV or
HTML.
■ Selection of CSV enables data to be opened or saved as a text file in
comma-separated value format.
■ Selection of HTML enables data to be opened or saved as an HTML file.
3. From Page range, indicate the pages to export; All, Current Page, or Pages.
4. Click OK.
The Export Log window closes and the selected data is exported.
Audit Log
Administrator Help | Forcepoint Email Security | Version 8.5.x
The email protection system provides an Audit Log, which is an audit trail showing
which administrators have accessed the Security Manager Email Security module and
any changes made to policies and settings. The Audit Log additionally shows message
actions taken by administrators, such as clearing a message queue or releasing,
forwarding, or deleting email messages (added in version 8.5.3). Other actions shown
in the audit log include changes made in the appliance CLI (added in version 8.5.3).
Monitoring administrator changes through the Audit Log enables you to ensure that
system and message control is handled responsibly and in accordance with your
organization’s acceptable use policies. This information is available only to Super
Administrators.
Access the Audit Log on the Audit tab of the page Main > Status > Logs to view the
Audit Log and to export selected portions of it to a CSV or an HTML file, if desired.
Column Description
Date Date and time of the change, adjusted for time zones.
To ensure consistent data in the Audit Log, ensure that all machines
running Forcepoint components have their date and time settings
synchronized.
User Username of the administrator who made the change.
Server IP address of the appliance affected by the change.
Column Description
Client IP address of the administrator machine that made the change.
Role Administrator role (Super Administrator, Auditor, Quarantine
Administrator, Reporting Administrator, Security Administrator,
Policy Administrator, CLI Administrator, or Group Reporting
Administrator).
Type The location of the change in the module interface (for example, if you
enter a new subscription key, this column displays General |
Subscription).
Element Identifier for the specific dynamic object changed, if any.
Action Type of change made (for example, add, delete, update, import, export,
move, auth, sync, reset, save, deliver, reprocess, or not spam).
Action Detail A link that opens a Details message box with information about the
change made.
Starting in version 8.5.4, Action Detail includes information about
specific changes between updates to the global Always Block and
Always Permit lists.
Administrator Help 43
Getting Started
The Personal Email Manager Audit Log records end-user email management
activities performed from either the Personal Email Manager notification message or
the Quarantined Messages List. Access the Personal Email Manager Audit Log from
the Personal Email Manager tab on the page Main > Status > Logs.
Administrator Help 45
Getting Started
Selection of Custom enables the View from and To fields to specify the desired
custom date and time range.
2. Use the icons < and > to specify the time range.
3. (If Custom was selected) Enter the desired date and time range in the fields, or use
the calendar functionality.
4. From the pull-down menu Keyword search, select a Personal Email Manager
Audit Log element in which to search; Message ID or User Name.
5. In the text field, enter a search term.
Alphanumeric characters are supported in the keyword search entry field.
6. From the pull-down menu Appliance, select the appliance on which to perform
the search.
The default is the active appliance.
7. Click Search.
The search results display.
8. (Optional) Restore all search settings to the default, click Set to Default.
Search settings are reset.
Configure display settings and navigate log entries
1. From the pull-down menu Per page, select the number of entries to display; 25,
50, 100, or 200.
2. Scroll through Personal Email Manager Audit Log pages; select the arrows to go
back and next, or to the first and last pages of Personal Email Manager Audit Log
entries.
3. Jump to a specific page; in the field Page, enter the page number and select Go.
3. Click OK.
The Export Log window closes and the selected data is exported.
System Log
Administrator Help | Forcepoint Email Security | Version 8.5.x
System Log records reflect the current state of the email system, along with any errors
or warnings produced. Access the System Log from the System tab on the page
Main > Status > Logs.
Column Description
Date Date and time of the system event, adjusted for time zones.
To ensure consistent data in the System Log, ensure that all machines
running Forcepoint components have their date and time settings
synchronized.
Server IP address of the machine affected by the system event.
Type The type of system event (update, config exception, email hybrid service,
cluster, log, quarantine, scan engine, data loss prevention, patch and hotfix,
watchdog, system maintenance, or alert).
Message A link that opens a Details message box with information about the system
event.
Administrator Help 47
Getting Started
1. From the pull-down menu View, select the range of log entries to display; All,
One Day, One Week, One Month, or Custom.
Selection of Custom enables the View from and To fields to specify the desired
custom date and time range.
2. Use the icons < and > to specify the time range.
3. (If Custom was selected) Enter the desired date and time range in the fields, or use
the calendar functionality.
4. From the pull-down menu View by type, select the type of system events to
display.
5. Select the icon >.
The System Log records for the selected time range display.
Configure display settings and navigate log entries
1. From the pull-down menu Per page, select the number of entries to display; 25,
50, 100, or 200.
The default is 25.
2. Scroll through System Log pages, select the arrows to go back and next, or to the
first and last pages of Audit Log entries.
3. Jump to a specific page; in the field Page, enter the page number and select Go.
Console Log
Administrator Help | Forcepoint Email Security | Version 8.5.x
The Console Log is a record of any administrator activities or changes made to the
Email Security module of the Forcepoint Security Manager. Access the Console Log
from the Console tab on the page Main > Status > Logs.
Column Description
Date Date and time of the change, adjusted for time zones.
To ensure consistent data in the Console Log, ensure that all machines
running Forcepoint components have their date and time settings
synchronized.
User Username of the administrator who made the change.
Client IP address of administrator machine that made the change.
Role Administrator role that made the change; in this case, Super
Administrator.
Action Type of change made (for example, entries indicating administrator
login or logoff, an administrator role change, or the addition of a new
user).
Action Detail A link that opens a Details message box with information about the
change made.
Administrator Help 49
Getting Started
1. From the pull-down menu View, select the range of log entries to display; All,
One Day, One Week, One Month, or Custom.
Selection of Custom enables the View from and To fields to specify the desired
custom date and time range.
2. Use the icons < and > to specify the time range.
3. (If Custom was selected) Enter the desired date and time range in the fields, or use
the calendar functionality.
4. Select the icon >.
The Console Log records for the selected time range display.
Configure display settings and navigate log entries
1. From the pull-down menu Per page, select the number of entries to display; 25,
50, 100, or 200.
The default is 25.
2. Scroll through Console Log pages, select the arrows to go back and next, or to the
first and last pages of Console Log entries.
3. Jump to a specific page; in the field Page, enter the page number and select Go.
The Email Hybrid Service Log contains records of email messages that are blocked by
the email hybrid service before they reach the network. Functionality requires a valid
subscription key for the Forcepoint Email Security Hybrid Module and successful
registration with the module for the Email Hybrid Service Log to be available (see
Registering the Email Security Hybrid Module, page 56).
Following successful registration with the email hybrid service, you can enable the
Email Hybrid Service Log and set data delivery options on the page Settings >
Hybrid Service > Hybrid Service Log Options. See Configuring the Email Hybrid
Service Log, page 61. Access the Email Hybrid Service Log from the Email Hybrid
Service tab of the page Main > Status > Logs.
Administrator Help 51
Getting Started
1. From the section Email Hybrid Service Log Search Options, set the date and time
to be searched in the fields View from and To.
(Optional) Use the calendar functionality to specify a date to search.
2. From the pull-down menu Keyword search, select a Email Hybrid Service Log
element in which to search; Email Hybrid Service Log ID, Subject, Sender
Address, Recipient Address, Sender IP, or Message Status.
3. In the field, enter a search term.
Alphanumeric characters are supported in the keyword search entry field.
4. Click Search.
The search results display.
5. (Optional) Restore all search settings to the default, click Set to Default.
Search settings are reset.
Configure display settings and navigate log entries
1. From the pull-down menu Per page, select the number of entries to display; 25,
50, 100, or 200.
2. Scroll through Email Hybrid Service Log pages, select the arrows to go back and
next, or to the first and last pages of Email Hybrid Service Log entries.
3. Jump to a specific page; in the field Page, enter the page number and select Go.
Real-time monitor
Administrator Help | Forcepoint Email Security | Version 8.5.x
Real-time log information for email traffic is available on the page Main > Status >
Real-Time Monitor for selected appliances. This information can be valuable for
troubleshooting purposes. The following table details the Real-Time Monitor
parameters.
Option Description
Selection temporarily halts the real-time log stream.
Display log entries for Check box functionality to select any or all of the
available types of log information for display:
● Message status
This is the default selection.
● Connection status
● Message delivery status
● Message analysis result
Search filter User-defined text field to enter a keyword search term on
which to search individual entries.
Advanced search Selection enables advanced search filter options.
Functionality enables searching of log entries and
display records by message subject, IP address (source,
destination, or both), or email address (sender, recipient,
or both).
Appliance Selection enables monitoring of appliances. The current
appliance is monitored by default.
Real-Time logs Displays the selected log entries or search results.
Administrator Help 53
Getting Started
Third-party security information and event management (SIEM) tools allow the
logging and analysis of internal alerts generated by network devices and software.
Integration with SIEM technology allows the transfer of message activity events to a
SIEM server for analysis and reporting.
Third-party SIEM providers may not support FIPS 140-2 Level 1 certified
cryptography. Contact your SIEM provider for more information about FIPS-certified
cryptography.
Access SIEM integration settings on the page Settings > General > SIEM
Integration.
Enable and configure SIEM integration
1. On the page SIEM Integration, mark the check box Enable SIEM integration for
all email appliances.
SIEM configuration settings are enabled for editing.
2. In the entry field IP address or hostname, enter the IP address or hostname for
the SIEM integration server.
3. In the entry field Port, enter the port number for the SIEM integration server.
The default is 514.
4. From the section Transport protocol, select the protocol used for data transport;
UDP or TCP.
User datagram protocol (UDP) is a transport layer protocol in the Internet protocol
suite. UDP is stateless and therefore faster than transmission control protocol
(TCP), but can be unreliable. Like UDP, TCP is a transport layer protocol, but
provides reliable, ordered data delivery at the expense of transport speed.
Tip
When using TCP, it is recommended to end all logs with
%<\n>.
5. From the pull-down menu SIEM format, select the format to be used in SIEM
logs.
The format determines the syntax of the string used to pass log data to the
integration.
■ The available formats are syslog/CEF (ArcSight), syslog/key-value pairs
(Splunk and others), syslog/LEEF (QRadar), and Custom.
■ The text boxes populate with CEF format when Custom is selected, and can
be edited as needed. The maximum size for each format is 2048 characters.
Logs are not saved to the SIEM server for any log fields left blank. Selection
of a new template returns any edited custom format to the default.
■ Sample formats display for non-custom options.
6. Confirm that the SIEM product is properly configured and can receive messages
from the email software; click Send Test Message.
Check the SIEM Server log entries to verify that the test message is delivered.
7. From the bottom of the page SIEM Integration, click OK.
The SIEM configuration settings are saved. See SIEM: Email Logs.
Forcepoint Email Security combined with the Forcepoint Email Security Hybrid
Module offers a flexible, comprehensive email security solution can combine
on-premises and hybrid (in-the-cloud) analysis as needed to manage inbound and
outbound email for your organization.
The email hybrid service provides an extra layer of email analysis, stopping spam,
virus, phishing, and other malware attacks before they reach the network and
considerably reducing email bandwidth and storage requirements. You can also use
the email hybrid service to encrypt outbound email before delivery to its recipient
Administrator Help 55
Getting Started
(your subscription must also include the Forcepoint Email Security - Encryption
Module for this feature).
You can create policies for on-premises and hybrid analysis in the same user
interface—the Email Security module—and configuration, reporting, and
management are centralized.
Before you can use the email hybrid service to examine email for your organization,
you must enter a valid subscription key that includes the Forcepoint Email Security
Hybrid Module and configure a number of settings in the Email Security module and
in your Domain Name System (DNS). This creates a connection between the
on-premises and cloud portions of your email protection system. See Registering the
Email Security Hybrid Module, page 56.
The Email Hybrid Service Log contains records of the email messages that are
blocked by the email hybrid service before they reach the network. See Email Hybrid
Service Log, page 50, for information about the contents of this log. See Configuring
the Email Hybrid Service Log, page 61, for details about enabling and scheduling
Email Hybrid Service Log updates.
The flow of email through the hybrid service can vary, depending on the filters or
rules you have configured. The following provides some general steps regarding the
flow of inbound email:
1. An email message is received by Forcepoint Email Security Cloud and initially
scanned for DKIM verification, spam, viruses, and malicious URLs.
2. An email message that triggers any of these options may be blocked, or may be
sent to on-premises Forcepoint Email Security with related information (such as
spam score, DKIM results, virus information, and URLs).
3. On-premises Forcepoint Email Security scans the message based on the rules and
filters configured in your system settings. Information provided by Forcepoint
Email Security Cloud is used when enforcing spam, virus, or anti-spoofing rules.
4. If not blocked by a filter or rule and Advanced File Analysis is enabled, the email
message is sent to Advanced Malware Detection - Cloud for analysis.
For more information about mail flow through different types of Forcepoint Email
Security deployments, see the Deployment & Installation Center.
The Forcepoint Email Security Hybrid Module account is activated on the page
Settings > Hybrid Service > Hybrid Configuration. Selection of Register initiates
a registration wizard. Registration proceeds on the following pages of the wizard:
1. Enter customer information, page 57
2. Define delivery routes, page 58
3. Configure your DNS, page 59
4. Set up your firewall, page 60
Important
Multiple appliances controlled by a single email
management server share the same email hybrid service
configuration settings, regardless of appliance mode
(cluster or standalone).
If you need to register more than one appliance with the
email hybrid service from the same email management
server, you should:
1. Add all your appliances to the module (Settings >
General > Email Appliances)
2. Create an appliance cluster, if desired (Settings >
General > Cluster Mode)
3. Enter your subscription key (Settings > General >
Subscription)
4. Register the (Settings > Hybrid Service > Hybrid
Configuration)
If your appliances are operating in standalone mode,
register from the appliance on which you entered the
subscription key.
You may need to add an appliance after you have
registered with the email hybrid service (for example, after
a new appliance purchase). In this situation, you should
add the new appliance to the module, then register your
existing appliance with the email hybrid service again
without changing any configuration settings. Hybrid
service configuration is synchronized across all appliances
after you re-register.
Use the Basic Information page under Settings > Hybrid Service > Hybrid
Configuration to provide the contact email address, phone number, and country for
your Forcepoint filtering administrators.
The email address is typically an alias monitored by the group responsible for
managing your email protection software. This very important email sent to your
account should be acted upon promptly when it is received.
● Technical Support uses this address to send notifications about urgent issues
affecting hybrid filtering.
Administrator Help 57
Getting Started
Use the Delivery Route page under Settings > Hybrid Service > Hybrid
Configuration to define the domains for which email traffic will be routed to and
from the email hybrid service, and the SMTP server addresses that receive mail from
and send mail to the hybrid service. Each group of one or more domains and one or
more SMTP server addresses comprises a delivery route.
Important
Email hybrid service checks the connection to your SMTP
server by sending commands to a “postmaster” address. If
your SMTP server does not have a postmaster or
administrator address (e.g., [email protected]),
you should add it manually before completing this step.
Note
Protected domains added here must already be entered in
the Protected Domain group on the page Settings >
Users > Domain Groups. See Managing domain and IP
address groups, page 93.
7. Add inbound SMTP servers to your delivery route; under SMTP Inbound Server
Addresses, click Add.
8. Enter the IP address or name of your email management server.
This must be the external IP address or name, visible from outside your network.
9. (If needed) Add more servers; click Add.
Each new server is given the next available ID number and added to the end of the
list. The lowest ID number has the highest preference. Mail will always be
received by the server with the highest preference; if that server fails, the server
with the next highest preference for that delivery route is used.
10. (Optional) Change the preference order; check the box next to a server name, then
click Move up or Move down.
11. Add outbound SMTP servers to your delivery route; under SMTP Outbound
Server Addresses, click Add.
The email system uses these IP addresses to send email to the hybrid service for
encryption. See Forcepoint email encryption, page 159, for information about this
encryption function.
12. Enter the IP address or name of your email management server.
This must be the external IP address or name, visible from outside your network.
13. (If needed) Add more servers; click Add.
Each new server is added to the end of the list. If an outbound server connection
fails, email in this delivery route that needs to be encrypted is sent to a delayed
messages queue for a later delivery attempt.
14. Click OK.
The delivery route appears in the Route List on the Delivery Route page.
Click Next to continue with hybrid configuration on the page Configure your DNS.
Use the information on the CNAME Records page under Settings > Hybrid
Service > Hybrid Configuration to configure your DNS.
Before a delivery route is accepted by the email hybrid service, it must be checked to
ensure that the service can deliver mail for each protected domain to your mail server
and that each domain belongs to your company.
CNAME records are used to assign an alias to an existing host name in DNS. Contact
your DNS manager (usually your Internet service provider) and ask them to set up a
CNAME record for each of your protected domains, using the alias and associated
domain information on the DNS page.
A CNAME record has the following format:
abcdefgh.mydomain.com CNAME autodomain.mailcontrol.com.
Where:
● abcdefgh is the Alias displayed on the DNS page
● mydomain.com is the Protected Domain
● CNAME indicates that you are specifying a CNAME record
Administrator Help 59
Getting Started
Note
The validation performed by clicking Check Status occurs
in your local system. Because the propagation of DNS
changes across all Internet servers can take between a few
minutes to several hours, the verification process for the
email hybrid service may take longer.
Click Next to continue with hybrid configuration on the page Set up your firewall.
Use the information on the Network Access page under Settings > Hybrid Service >
Hybrid Configuration to configure your firewall.
Because the email hybrid service is a managed service, Forcepoint is responsible for
managing system capacity. For this reason, the route of your email may occasionally
alter within the service. To enable this to happen seamlessly without requiring you to
make further changes, you must allow SMTP access requests from all the IP ranges
listed on the Network Access page to port 25.
Click Next to continue with hybrid configuration on the page Configure your MX
records.
Use the information on the MX Records page under Settings > Hybrid Service >
Hybrid Configuration to configure your Mail eXchange (MX) records.
An MX record is an entry in a DNS database that defines the host willing to accept
mail for a given machine. Your MX records must route inbound email through the
email hybrid service to your email protection system.
Your MX records, which end in in.mailcontrol.com, are listed on the MX Records
page. Contact your DNS manager (usually your Internet service provider) and ask
them to set up or replace your current MX records for each protected domain you have
specified with the customer-specific records provided by the email hybrid service on
the MX Records page. For example, they might change:
Change From To
MX mydomain.com. IN MX 50 mydomain.com. IN MX 5
Preference 1 mail.mydomain.com. cust0000-1.in.mailcontrol.com.
MX mydomain.com. IN MX 51 mydomain.com. IN MX 5
Preference 2 mail.mydomain.com. cust0000-2.in.mailcontrol.com.
Ensure that they include the trailing period, and ask them to set each of these records
to an equal preference value.
Check the entries on your Internet service provider’s DNS management site to ensure
they match the MX records provided by the email hybrid service. After you validate
your entries, click Check Status to verify that the update is successful.
It can take up to 24 hours to propagate changes to your MX records across the
Internet. During this time, you should keep your previous mail routing active to ensure
all your mail is delivered: while your MX records are changing over, some mail will
be delivered using your old MX information, and some mail will be delivered using
your new MX information.
Click Finish to complete your hybrid configuration.
After you complete the registration wizard, you can review and modify your email
hybrid service configuration settings on the page Settings > Hybrid Service >
Hybrid Configuration.
Note
The Check Status button may not appear in the CNAME
records area if the hybrid service has already verified
domain ownership.
Verify that email is properly routed through the hybrid service by sending email
through your mail system from outside your protected domains.
Administrator Help 61
Getting Started
These options are available only if you have entered a subscription key that includes
the Forcepoint Email Security Hybrid Module, and you have successfully registered
the module. See Registering the Email Security Hybrid Module, page 56.
Configure Email Hybrid Service Log options
1. Enable the Email Hybrid Service Log; mark the check box Enable the Email
Hybrid Service Log.
2. From the pull-down menu Retrieve Email Hybrid Service Log data every,
specify the time interval for retrieving the most recent Email Hybrid Service Log
information, from 15 minutes to 24 hours.
The default is 15 minutes.
3. From the pull-down menu Send the Email Hybrid Service Log data to the
database every, specify the time interval for sending Email Hybrid Service Log
information to the log database, from 15 minutes to 24 hours.
The default is 15 minutes.
4. Click OK.
The settings are saved.
With the DLP module, your email can be analyzed for regulatory compliance and
acceptable use and protect sensitive data loss via email by enabling DLP policies on
the page Main > Policy Management > Policies. Data loss prevention policies are
enabled by default.
See Enabling data loss prevention policies, page 198, for more information about
activating DLP policies.
Email DLP policy options are configured in the Security Manager Data Security
module (Main > Policy Management > DLP Policies > Manage Policies). A new
policy wizard provides the steps for creating a new email DLP policy. See Forcepoint
DLP Administrator Help.
If you plan to use email encryption functions, you must configure an email DLP
policy with an action plan that includes message encryption. See Forcepoint DLP
Administrator Help.
You can also create filter actions for use in a DLP policy action plan. See Creating and
configuring a filter action, page 191, for information.
You must register email appliances with the Forcepoint Email Security DLP Module
in order to take advantage of its acceptable use, data loss prevention, and message
encryption features. Registration is automatic when you enter a valid subscription key.
Subsequent appliances are registered when you add them to the Security Manager
from the Email Security module.
If the Status field in the Email Security module Settings > General > Data Loss
Prevention page displays Unregistered, you must manually register with the
Forcepoint Email Security DLP Module. The following steps detail how to manually
register a standalone appliance manually with the email DLP Module:
Manually register the DLP module
1. Navigate to the page Settings > General > Subscription.
2. In the field Subscription key, enter a valid subscription key.
3. Click OK.
The subscription is updated.
4. Navigate to the page Settings > General > Data Loss Prevention.
5. From the pull-down menu Communication IP address, specify the IP address used
for communication with the email protection system.
Note
The appliance C interface IP address is selected by default.
This setting is recommended for Forcepoint Email
Security DLP Module registration.
If you are running Forcepoint Email Security in Azure,
you must use the C interface IP address, as Forcepoint
Email Security in Azure only supports a single interface.
Important
Wait until DLP policies are completely deployed before
you register another standalone appliance.
Administrator Help 63
Getting Started
on the primary appliance while you are registering a secondary machine, the
registration process for the secondary machine may not complete.
● Ensure that all machines in a cluster use the same physical appliance interface (the
C, E1, or E2 IP address) to register with the email DLP Module.
Regular updates to the email analytics database offer maximum protection from
email-borne attacks. Manage database updates for antispam and antivirus filters on the
page Settings > General > Database Downloads.
The Antivirus and Antispam filters tables list the set of analytics databases included in
your product subscription. If the current appliance is a primary machine, these tables
also include update information for any secondary appliances associated with the
primary appliance. The update schedule for each database is shown in the Schedule
column.
Reschedule updates for a filter
1. In the Schedule column, click Edit.
The Reschedule Update dialog box displays.
2. Configure the following settings as needed:
■ Frequency
How often the update should occur, from every five minutes to once per week.
■ Day of week
The day on which the update should occur. This pull-down menu is enabled
when the frequency Every week is selected.
■ Time
The time of day at which the update should occur. These settings are enabled
when the frequency Every day or Every week is selected.
3. Select OK.
The dialog box closes and the Schedule column updates.
Update all databases
● From the table Antivirus filters or Antispam filters, select Update Now.
All Forcepoint databases are updated.
In addition to displaying system alerts in the dashboard Health Alert Summary, your
email protection system can use other methods to notify administrators that various
system events have occurred. For example, notifications can be sent for updates to
database download categories and subscription issues, as well as encryption and user
directory issues.
Use the page Settings > Alerts > Enable Alerts to enable and configure the desired
notification methods. Then, use the page Settings > Alerts > Alert Events to enable
the types of alerts for which notifications should be sent.
Pop-up alerts are no longer supported. Use Email alerts or SNMP alerts.
Determine how alerts are distributed by using one or more of the following delivery
methods:
● To a specified individual via an email message
● To a specified community via an SNMP Trap system
Use the page Settings > Alerts > Enable Alerts to configure alert delivery methods.
Email alerts
Email alerts are distributed to specific individuals via a notification message.
Enable email alerts
1. From the Security Manager, navigate to the page Settings > Alerts > Alert
Events.
2. From the section Email Alerts, mark the check box Enable email alerts.
Selection indicates to deliver alerts and notifications to administrators by email.
3. In the text fields, configure the following settings:
■ From email address
Email address to use as the sender for email alerts.
■ Administrator email address (To)
Email address of the primary recipient of email alerts. Each address must be
separated by a semicolon.
■ Email addresses for completed report notification
Email addresses for recipients of completed report notifications. Each address
must be separated by a semicolon.
4. Click OK.
Administrator Help 65
Getting Started
SNMP alerts
SNMP alert messages are delivered through an SNMP Trap system installed in your
network.
The SNMP protocol does not support the use of FIPS 140-2 Level 1 certified
cryptography. Use Email alerts if FIPS-certified cryptography is required.
Enable SNMP alerts
1. From the Security Manager, navigate to the page Settings > Alerts > Alert
Events.
2. In the section SNMP Alerts, mark the check box Enable SNMP alerts.
3. In the text fields, provide the following information about your SNMP Trap
system:
■ Community name
Name of the trap community on your SNMP Trap system.
■ Server IP or name
IP address or name of the SNMP Trap system.
■ Port
Port number used by SNMP messages.
4. Click Check Status.
A test message is sent to your SNMP server to verify that the specified port is
open.
5. Click OK.
SNMP alerts are enabled.
Alert events
Administrator Help | Forcepoint Email Security | Version 8.5.x
To ensure that administrators are notified of system events, like a database download
failure or a subscription that is about to expire, you can configure system alerts to be
distributed by email or through your SNMP Trap system.
Use the page Settings > Alerts > Enable Alerts to select the method used to send
these alerts to Forcepoint Email Security administrators. See Enabling system alerts,
page 65.
Use the page Settings > Alerts > Alert Events to select categories of alerts to be
delivered and to indicate how you want the alerts delivered (email or SNMP). Each
delivery method must be enabled on the Enable Alerts page in order to select the
method for an event type.
Alerts in the following event categories can be sent:
● Subscription expiration
Administrator Help 67
Getting Started
1. From Inbound undelivered email event notifications in the list Events, click the
link Configure alert thresholds.
A configuration dialog box displays.
2. In the text field, enter the number of connection errors at which to trigger an alert
notification.
The default is 1. The notification is sent at 30-minute intervals after the
connections threshold is exceeded.
3. Mark the check box Configure backup destination address to send alerts when
the mail server is down.
4. In the text field, enter up to three email addresses as backup alert email
destinations.
The email addresses must be different from the mail server address. Separate
multiple entries with semicolons.
5. Click OK.
The dialog box closes.
6. From the page Alert Events, click OK.
Event alerts are saved.
Work queue growth rate notifications
The work queue includes the following message types:
● Incoming messages waiting for analysis
● Messages waiting for delivery
● Deferred messages waiting for subsequent delivery attempts
Use the following steps to set thresholds for sending alerts when the work queue
growth rate threatens to exceed the queue size limit in a specified period of time:
1. From Work queue growth rate notifications in the list Events, click the link
Configure alert thresholds.
A configuration dialog box displays.
2. From the pull-down menu Alert sensitivity level, select the alert sensitivity level,
based on how much warning to provide regarding the queue growth rate and the
probability of reaching the work queue size limit:
■ High. Work queue capacity reached in less than four days (default).
■ Medium. Work queue capacity reached in less than two days.
■ Low. Work queue capacity reached in less than one day.
3. Click OK.
The dialog box closes.
4. From the page Alert Events, click OK.
Event alerts are saved.
Exception queue event notifications
The exception queue includes any message that currently cannot be delivered because
it encountered an exception during message analysis. Use the following steps to set
thresholds for sending alerts when exception queue capacity reaches a specified
percentage:
1. From Exception queue event notifications in the list Events, click the link
Configure alert thresholds.
A configuration dialog box displays.
2. From the pull-down menu, select the percentage of queue capacity at which to be
warned about exception queue size; 50% to 90%.
The default is 90%.
3. Click OK.
The dialog box closes.
4. From the page Alert Events, click OK.
Event alerts are saved.
URL analysis
Administrator Help 69
Getting Started
2. From the pull-down menu URL analysis service, select Threat Intelligence
Cloud Service.
3. Verify the connection to the URL analysis service; click Test Connection.
4. Click the refresh icon.
The URL categories list is immediately updated.
5. Click OK.
The settings are saved.
Filtering Service
The Filtering Service requires the installation of a Forcepoint web protection solution.
The Web management server maintains an updated URL master database from the
product download server. The email protection system queries the URL category
master database and determines the risk level of a URL found in an email message.
The Web Security module version must be supported by the Email Security module
for this function to be available.
Use the Filtering Service with a Forcepoint on-premises web security solution to
access the local copy of the Forcepoint Master Database maintained by your web
security product (Forcepoint Web Security or Forcepoint URL Filtering).
Filtering Service does not support the use of FIPS 140-2 Level 1 certified
cryptography. Use Threat Intelligence Cloud Service or Linking Service if
FIPS-certified cryptography is required.
Enable Filtering Service
1. 1. In the Security Manager, navigate to the page Settings > General > URL
Analysis.
2. From the pull-down menu URL analysis service, select Filtering Service.
3. In the field IP address or hostname, enter the location of the master database.
4. Verify the connection to the URL analysis service; click Test Connection.
5. Click OK.
The settings are saved.
Linking Service
The Linking Service requires the installation of a Forcepoint web protection solution.
The Web management server maintains an updated URL master database from the
product download server. The email protection system queries the URL category
master database and determines the risk level of a URL found in an email message.
The Web Security module version must be supported by the Email Security module
for this function to be available.
Use the Linking Service with a Forcepoint Web Security on-premises solution to
access both the local copy of the Master Database as well as any custom categories
you have created. This service also provides dynamic category mapping updates from
Administrator Help 71
Getting Started
Note
The email software does not support the use of a Secure
Sockets Layer (SSL) proxy for filtering database updates.
An SSL server may be used as an email hybrid service
proxy.
The right shortcut Common Tasks pane provides shortcuts to frequently performed
administrative tasks like running a report, creating a policy, or searching a log.
Use the Common Tasks pane
● Click an item in the list.
The page displays on which the task is performed.
Administrator Help 73
Getting Started
Topics:
● Managing administrator accounts, page 75
● Setting system preferences, page 79
● Managing appliances, page 81
● Configuring an appliance cluster, page 84
● Managing user directories, page 86
● Managing domain and IP address groups, page 93
● Managing user validation/authentication options, page 98
● Managing Transport Layer Security (TLS) certificates, page 101
● Backing up and restoring manager settings, page 103
● Importing a trusted CA certificate, page 103
Forcepoint Email Security module administrator accounts are created on the Global
Settings page of the Forcepoint Security Manager. Only a Super Administrator can
add, edit, or delete an administrator account.
A Super Administrator can create two types of accounts: local and network. A local
account is stored in the local Security Manager database and contains a single user. A
network account can contain a single user or a group of users and is stored on a
network server. See Forcepoint Security Manager Help for details about managing
Security Manager administrators on this page.
Administrator account settings and role assignments that are configured on one
appliance are applied to all the appliances in your network.
Access administrator accounts
Administrator Help 75
Configuring System Settings
Administrator accounts
Administrator Help | Forcepoint Email Security | Version 8.5.x
The page Settings > Administrators > Delegated Administrators lists all defined
Email Security module administrators, their email address, account type, roles, and
the administrator’s current status (online or offline).
A new administrator is created with the role of Auditor. An Email Security module
Super Administrator can assign a default role to a new administrator account or create
a new role for that administrator. See Administrator roles, page 77, for information
about adding a new role and defining permissions.
The following table details the default roles available for selection:
Administrator roles
Administrator Help | Forcepoint Email Security | Version 8.5.x
Note
Managed users and user groups settings are used only for
the following permissions:
● Policies
● Reports
● Queues and quarantined messages
A user’s view of the Email Security module interface is different, depending on that
user’s specific administrator role. For example, a user with an Auditor role can view
the entire Email Security module interface, but cannot modify any settings.
By default, a new Email Security module-specific administrator account is an Auditor
account. A Super Administrator can use the following steps to change an
administrator’s role:
Note
Only one Super Administrator may access an email
appliance at a time. Subsequent Super Administrators are
assigned an Auditor (or read-only) role when they access
the appliance.
Administrator Help 77
Configuring System Settings
2. In the text field Role Name, enter a name for the new role.
3. In the text field Description, enter a brief, clear description of the role.
4. From the Managed users and groups table, define the users or user groups to be
managed by this role:
a. Under the Managed users and groups table, click Add.
The Add Managed Users and Groups dialog box displays.
b. Enter the email addresses of managed users or groups in one of the following
ways:
○ From the field User email address file, click Browse.
The Open window displays.
○ Browse to an email address file, a text file that contains one email address
per line and is no larger than 10 MB, and click Open.
The email address file is added.
○ In the field User email addresses, enter the desired email addresses,
separated by semicolons.
c. Click OK.
The user and group settings are saved and the Add Role page displays.
In the section Permissions, define the permissions for this role by selecting the
appropriate buttons in the Permissions table.
The following options are available:
The page Settings > General > System Settings is used to configure the following
email system preferences:
● Entering the fully qualified domain name
● Setting the SMTP greeting message
● Setting system notification email addresses
● Configuring administrator console preferences
The Fully Qualified Domain Name (FQDN) section of the System Settings page is
used to define the FQDN. SMTP protocol requires the use of FQDNs for message
Administrator Help 79
Configuring System Settings
transfer. If you completed the First-Time Configuration Wizard, the FQDN you
entered there appears on this page as the default entry.
If you did not complete the wizard, enter the appliance fully qualified domain name in
the field Fully Qualified Domain Name (format is
appliancehostname.parentdomain.com).
Important
This setting is important for proper email security system
operation. You must replace the default fully qualified
domain name entry with the correct appliance name.
An incorrect fully qualified domain name may cause
disruptions in email traffic flow.
The SMTP Greeting section of the System Settings page is used to define an SMTP
greeting. The SMTP greeting message is the response to a connection attempt by a
remote server. It can also be used to indicate that the system is working properly. For
example, an SMTP greeting could be:
The email security service is ready.
The System Notification Email Addresses section of the System Settings page is used
to define default notification addresses. The email system can automatically send
notifications of system events like a stopped service to a predefined address, often an
administrator address. When this address is defined, notification messages can also be
sent to or from an administrator email address for other events. For example,
configuring a notification to be sent to or from an administrator address when a
message triggers a filter (on the page Main > Policy Management > Actions)
requires the administrator address to be defined on the page System Settings.
Define system notification email addresses
1. In the text field Administrator email address, enter the desired recipient address
for notifications of system events.
2. In the text field Default sender email address, enter the desired sender address
from which user notification messages should be sent.
3. Click OK.
The settings are saved.
The Administrator Console Preferences section of the System Settings page is used to
configure your desired character set encoding and console language.
Set console preferences
1. From the pull-down menu Preferred character encoding, select a character set
for encoding messages.
The selected character encoding setting is used to decode email attachments,
including those for which no character encoding information is available.
2. From the pull-down menu Administrator console language, select the language
that the appliance should use.
3. Click OK.
The settings are saved.
Managing appliances
Before adding an appliance to the Email Security module, it is necessary to install and
configure a Forcepoint appliance. Interface information includes IP address, subnet
mask, default gateway, and up to three DNS server IP addresses. See the Forcepoint
Appliances Getting Started Guide.
Forcepoint Email Security may be deployed as a virtual appliance. See the Forcepoint
Appliances Getting Started Guide for complete information about deploying and
configuring a virtual appliance.
Administrator Help 81
Configuring System Settings
Beginning with version 8.5, Forcepoint Email Security may be deployed on a virtual
appliance in Microsoft Azure. See Installing Forcepoint Email Security in Microsoft
Azure for more information.
Note
You can configure a primary, secondary, and tertiary DNS
server, with the secondary and tertiary servers being
optional entries.
When it starts, the email appliance polls each DNS server
to determine which has the lowest latency level. That
server is selected as the “primary” server for DNS queries,
regardless of its designation. The other servers may be
used for subsequent queries based on the network
connection status of the primary server.
Appliances overview
Administrator Help | Forcepoint Email Security | Version 8.5.x
You can manage multiple email appliances from the page Settings >
General > Email Appliances without having to log on to each machine separately.
Managed appliances share a single Log Database, from which email log entries,
presentation reports, and the dashboard statistics and charts are generated. The Email
Security module and all appliances must share supported versions and subscription
key for successful communication among the appliances.
An appliance may operate in standalone mode, which is the default mode when an
appliance is added to the Email Security module. You can also create appliance
clusters by designating an appliance as a primary machine or as a secondary machine
associated with a primary machine. See Designating a primary appliance in a cluster,
page 85.
The Email Appliances page lists all current system appliances in a table that displays
information about the appliance and its status, with functionality to switch to a
different appliance that is in standalone mode or to remove an unconnected primary
appliance from a cluster. The following table details the functionality on the Email
Appliances page:
Option Description
Hostname Displays the hostname of the appliance. Selection
displays the Edit Appliance page for editing the IP
address.
Platform Displays the appliance platform.
C/E1 interface IP address Displays the appliance C/E1 interface IP address.
System Connection Status Displays the appliance connection status.
Mode Displays the appliance mode.
Action Displays the actions available for the appliance; N/A,
Launch, or Remove.
Launch is used to switch to a different appliance;
Remove is used to remove an unconnected primary
appliance from a cluster. When a primary appliance is
removed, all its secondary appliances change to
standalone mode.
The current and all secondary appliances display “N/A”.
Delete Selection of the appliance and Delete removes the
appliance from the Email Appliances page.
An appliance that is being accessed by another user
cannot be deleted. Once an appliance is removed from
the list, you cannot manage it from the Email Appliances
page.
Add an appliance
1. From the page Settings > General > Email Appliances, click Add.
The Add Appliance dialog box displays.
2. In the text field C/E1 interface IP address, enter the IP address used for
communication with the Email Security module.
3. Click OK.
Administrator Help 83
Configuring System Settings
The dialog box closes and the appliance is added to the Email Appliances page.
Important
Changing the C interface IP address of an appliance
terminates the appliance connection with the Email
Security module. In order to re-establish the connection,
the IP address must also be changed on the Email Security
module page Settings > General > Email Appliances.
You should also change the address for the Personal Email
Manager notification message (Settings > Personal
Email > Notification Message).
For subscriptions that include the Forcepoint Email
Security Hybrid Module, the email hybrid service must be
re-registered after you change the IP address.
When you add an appliance, it is automatically registered with the Data Security
module for data loss prevention (DLP). To complete the registration process and
deploy DLP policies, click the Data Security module on the Security Manager toolbar
and then click Deploy.
The page Edit Appliance is used to edit the appliance C interface IP address. The
system connection status and mode cannot be changed on this page.
Edit appliance settings
1. From the page Settings > General > Email Appliances, click the hostname of an
appliance.
The Edit Appliance page displays.
2. In the text field C/E1 interface IP address, enter the new IP address.
3. Click OK.
The settings are saved.
Important
If you are deploying email protection in an appliance
cluster and want to use DLP policies, be sure to register all
the primary and secondary cluster machines with the Data
Security module before you deploy DLP policies.
If you deploy DLP policies on the primary appliance while
you are registering a secondary machine with the Data
Security module, the registration process for the secondary
machine may not complete.
Note
Use of the C appliance interface IP address for
communication requires you to define a route in the
appliance CLI.
You need to stop and restart email services on the
appliance each time you add or delete a route on the
appliance.
2. Click Add.
The page Add Secondary Appliance displays, where you can designate the
secondary appliances in this cluster.
Administrator Help 85
Configuring System Settings
3. From the list of standalone appliances on the left, select the secondary appliances
to add to this cluster (up to seven appliances).
(Optional) Add a new appliance that is not already on the list; click Add New
Appliance.
The Add Appliance page displays.
4. Click the arrow button to add the appliances to the Secondary Appliances list.
5. Click OK.
The appliance is added to the Secondary Appliances list along with its status.
6. On the page Cluster Mode, click OK.
The appliance is added to the cluster.
View appliance details
● From the Secondary Appliances list, click the appliance name.
The Appliance Properties dialog box displays with details about the appliance.
Remove a secondary appliance from a cluster
● From the Secondary Appliances list, select the appliance and click Remove.
The appliance is removed from the cluster.
Option Description
User Directory Name Displays the name of the user directory.
Selection displays the page Edit User
Directory, with functionality to configure
the user directory settings.
User Directory Type Displays the user directory type; for
example, Recipient List.
Cache Settings Displays the user directory cache settings.
Option Description
Cache Size Displays the user directory cache size,
with functionality to search entries listed
in the user directory.
Status Displays the user directory status.
Action Displays available actions; for example,
Delete.
The Add User Directory page is used to add a new user directory. A newly added user
directory displays a status of Not referenced, because it is not yet being used by an
email function. User directory creation entries are different depending on the type of
user directory being added.
Add a new user directory
1. On the page Settings > Users > User Directories, click Add.
The Add User Directory page displays.
2. In the text field User directory name, enter a name for the user directory.
3. From the pull-down menu User directory type, select a type; Microsoft Active
Directory, IBM LDAP Server, Generic LDAP, Recipient List, or ESMTP.
The User Directory Properties section displays with configuration options for the
selected user directory:
■ Microsoft Active Directory
Administrator Help 87
Configuring System Settings
■ The Mirror setting means that valid addresses are cached all at once by
synchronizing the cache with all the addresses stored on the LDAP server.
You can manually synchronize the cache with the LDAP server any time after
that by clicking Synchronize for this directory on the User Directories page.
■ The Cache address setting means the cache is updated dynamically. A new,
valid address is cached after it is verified with the LDAP server. Remove all
addresses from the cache by clicking Clear cache.
12. In the text field Cache timeout, enter a value in minutes.
The timeout is the amount of time that a valid address remains in the memory
cache. If an email message is sent from a previously validated address during this
timeout period, the email is delivered without contacting the validation server.
However, if another message is sent from this address after the timeout has
expired, the server will be contacted to validate the address. Default value is 60
minutes.
13. Click OK.
The settings are saved.
Administrator Help 89
Configuring System Settings
■ The Mirror setting means that valid addresses are cached all at once by
synchronizing the cache with all the addresses stored on the LDAP server.
You can manually synchronize the cache with the LDAP server any time after
that by clicking Synchronize for this directory on the User Directories page.
■ The Cache address setting means the cache is updated dynamically. A new,
valid address is cached after it is verified with the LDAP server. Remove all
addresses from the cache by clicking Clear cache.
10. In the text field Cache timeout, enter a value in minutes.
The timeout is the amount of time that a valid address remains in the memory
cache. If an email message is sent from a previously validated address during this
timeout period, the email is delivered without contacting the validation server.
However, if another message is sent from this address after the timeout has
expired, the server will be contacted to validate the address. Default value is 60
minutes.
11. Click OK.
The settings are saved.
10. Verify that the field Search filter contains a standard LDAP query that can use
validation variables; for example:
(mail=%email%)
(|(mail=%email%)(uid=%email%))
11. In the text field Mail field, enter any optional email addresses to import.
12. From Cache setting, select either Mirror or Cache address.
■ The Mirror setting means that valid addresses are cached all at once by
synchronizing the cache with all the addresses stored on the LDAP server.
You can manually synchronize the cache with the LDAP server any time after
that by clicking Synchronize for this directory on the User Directories page.
■ The Cache address setting means the cache is updated dynamically. A new,
valid address is cached after it is verified with the LDAP server. Remove all
addresses from the cache by clicking Clear cache.
13. In the text field Cache timeout, enter a value in minutes.
The timeout is the amount of time that a valid address remains in the memory
cache. If an email message is sent from a previously validated address during this
timeout period, the email is delivered without contacting the validation server.
However, if another message is sent from this address after the timeout has
expired, the server will be contacted to validate the address. Default value is 60
minutes.
14. Click OK.
The settings are saved.
Recipient List
A recipient list is a text file that contains a list of email addresses and their associated
passwords, one set per line. This file can be used for user recipient validation.
Configure a recipient list in the User Directory Properties section
1. On the page Settings > Users > User Directories, click Add.
The Add User Directory page displays.
2. In the text field User directory name, enter a name for the user directory.
3. From the pull-down menu User directory type, select Recipient List.
4. The User Directory Properties section displays with options for Recipient List.
5. Enable a strong password policy; mark the check box Enforce strong password
policy.
With this policy in force, a password must meet the following requirements:
■ Between 8 and 15 characters
■ At least one uppercase letter
■ At least one lowercase letter
■ At least one number
■ At least one special character; supported characters include:
!“#$&‘()*+,-./:;<=>?@[\]^_`{|}~
Administrator Help 91
Configuring System Settings
If you have an existing recipient list and enable the strong password policy, the
email protection system evaluates current passwords in the list against the policy.
When this evaluation is complete, a Strength column appears in the Recipient List
box, indicating any weak passwords that should be changed. A recipient list that
contains weak passwords cannot be saved if the check box Enforce strong
password policy is marked.
6. Add a predefined recipient list file; from the field Recipient information file, click
Browse and navigate to the desired text file.
The file format should be one email address and password per line, up to a
maximum of 1,000 entries.
Note
If you add a new recipient list file when you already have
an active recipient list, the new file will overwrite the
current file.
7. Manually create a recipient list; from the box Enter Recipient Information,
enter an individual email address and associated password and click >.
The information is added to the Recipient List box on the right. Continue until all
necessary recipients are added.
8. Click OK.
The settings are saved.
Search the recipient list
1. From the section Recipient List, enter a keyword in the text box and click Search.
Search results display in the Recipient List box.
2. View the entire recipient list; click View All.
The entire recipient list displays.
Export the recipient list
● From the section Recipient List, click Export.
The recipient list is exported to your local drive as a text file.
Remove an entry from the recipient list
● From the section Recipient List, select an individual entry and click Delete.
The entry is removed.
A collection of domain names or IP addresses can be defined in a single group for use
in email functions. For example, you can define a domain name group to establish
domain-based delivery options, or you can define an IP address group for which
Reputation Service, Real-time Blacklist (RBL), or directory attack prevention analysis
is not performed. IP address groups can also be used for the email encryption
functions. Domain groups are added and configured on the page Settings > Users >
Domain Groups; IP groups are added and configured on the page Settings >
Inbound/Outbound > IP Groups.
You can perform the following operations on domain or IP address groups:
● Adding a domain group
● Editing a domain group
● Adding an IP address group
● Editing an IP address group
Administrator Help 93
Configuring System Settings
Important
Ensure that the Protected Domain group contains all the
domains you want your email system to protect.
An open relay is created when mail from an unprotected
domain is sent to an unprotected domain within your
organization. As a result, all mail from any domain that is
not protected may be rejected. Mail from an external
trusted IP address to an unprotected domain within your
organization bypasses analysis and is delivered.
The email hybrid service uses the Protected Domain group during Forcepoint Email
Security Hybrid Module registration to verify that the domains specified in its
delivery routes are all from this group. The Protected Domain group should not be
used to configure email delivery routes (on the page Settings >
Inbound/Outbound > Mail Routing) if you need to define domain-based delivery
routes via multiple SMTP servers. See User directory-based routes, page 131.
Note
Mail from trusted IP addresses does not bypass policy and
rule application, and is always subject to antispam and
antivirus analysis.
The page Add Domain Group is used to add a new domain group.
Add new domain group
1. On the page Settings > Users > Domain Groups, click Add.
The Add Domain Group page displays.
2. In the field Domain Group Name, enter a name for the new domain group.
This field is required.
3. In the field Description, enter a brief description of the domain group.
Administrator Help 95
Configuring System Settings
4. In the section Domain Group Details, add a predefined domain group; from the
field Domain address file, click Browse and navigate to the desired text file.
The file format should be one domain address per line, and its maximum size is 10
MB. If a file contains any invalid entries, only valid entries are accepted. Invalid
entries are rejected.
5. Manually add domain entries; in the field Domain address, enter an individual
domain address and click >.
The information is added to the Added Domains box on the right. Use wildcards
to include subdomain entries (e.g., *.domain.com).
6. Click OK.
The settings are saved.
Export a domain group
● From the section Added Domains, click Export.
The list of domain address entries in the group is exported to your local drive as a
text file.
Remove an entry from the domain group
● From the section Added Domains, select an individual entry and click Delete.
The entry is removed.
The page Settings > Users > Domain Groups is used to edit existing domain groups,
including adding or removing individual domains or editing the domain group
description.
If a domain is in use, you will be asked to confirm any changes that involve the
domain.
Edit a domain group
1. From the page Settings > Users > Domain Groups, click the domain group
name.
The page Edit Domain Group displays.
2. Configure the settings.
3. Click OK.
The settings are saved.
The page Settings > Inbound/Outbound > IP Groups is used to view and add an IP
address group.
Note
The default Encryption Gateway IP address group supports
only the entry of individual IP addresses. Subnet address
entries are considered invalid and are not accepted for this
IP address group.
Subnet addresses may be entered for other default and
custom IP address groups.
The page Edit IP Group is used to edit existing IP address groups, including adding or
removing individual IP addresses and editing the IP address group description.
If an IP address is in use, you will be asked to confirm any changes that involve that
address.
Administrator Help 97
Configuring System Settings
After defining your domain groups, you can determine recipient validation and user
authentication settings for users in the user directories you create. See Managing
domain and IP address groups, page 93. User validation and authentication settings
are configured on the page Settings > Users > User Authentication.
The following types of user validation/authentication are available:
● Recipient validation, in which a message recipient is validated before a message
is received.
● SMTP authentication, in which a message sender is authenticated before a
message is received.
● Personal Email authentication, in which a user is authenticated before accessing
the Personal Email Manager facility for managing blocked email. See
Configuring Personal Email Manager End User Options, page 233.
● Distribution list validation, in which individual members of an email
distribution list are validated. If an individual recipient in the group is invalid, the
message is rejected just for that individual. All valid recipients in the distribution
list receive the message.
Include group email addresses in your user directories to use the distribution list
validation option. A message to an invalid group alias is rejected for the entire
group of recipients.
Users in a domain group are verified against the corresponding user directory, and
specified authentication settings are applied.
Important
You may create multiple Personal Email Manager user
authentication groups. However, any protected domain
group (as defined in Settings > Users > Domain Groups)
may be included in only one Personal Email Manager user
authentication group.
Including a protected domain group in more than one
Personal Email Manager user authentication group may
result in the users of that domain group being denied
access to the Personal Email Manager facility.
Add all the user directories that contain the users in this
protected domain group to the associated Personal Email
Manager authentication group.
The User Authentication List displays the configured user authentication settings. The
Add and Delete buttons are used to add or remove recipient validation and
authentication settings.
The page Settings > Users > User Authentication is used to add new user
validation/authentication settings for domain/user directory groups.
Add new user authentication and validation settings
1. From the page Settings > Users > User Authentication, click Add.
The Add User Authentication page displays.
2. In the text field Name, enter a name for this set of authentication settings.
3. From Authentication options, mark the check box for the type of user
validation/authentication settings to apply: Recipient Validation, SMTP
Authentication, Personal Email Authentication, or Distribution List
Validation.
Multiple check boxes can be selected.
■ (Optional) If you specify recipient validation, you can mark the associated
check box If User Directory is not reachable for Recipient validation,
continue to next user directory.
Selection allows the system to continue a recipient search in the next user
directory listed in the User Directories section Recipients box if the current
user directory cannot be accessed (e.g., server is down or not connected).
Administrator Help 99
Configuring System Settings
■ If you specify SMTP authentication, you must ensure that the option Allow
relays only for senders from trusted IP addresses option is selected for
both outbound and internal relays on the page Settings >
Inbound/Outbound > Relay Control.
4. From the pull-down menu Domain group, select the domain group to target with
your authentication settings.
5. (Optional) Add or remove domain names from your domain group; from
Domains, click Edit.
The Edit Domain Group page displays. Changes you make here are also reflected
on the page Settings > Users > Domain Groups. See Editing a domain group,
page 96.
6. From the box Current User Directories, select the corresponding user directories
to which these authentication settings should apply; mark the check box next to
the directory name and click >.
The user directory is added to the Recipients box.
7. (Optional) Create a new user directory for these authentication settings; click Add
user directory.
The Add User Directory page displays to create a new directory. See Adding and
configuring a user directory, page 87.
8. In the Recipients box, move selected user directories up or down; select the
buttons Move up and Move down.
9. (Optional) Delete a user directory reference from the Recipients box; select it and
click Delete.
This action removes the user directory from the Recipients list, but does not delete
it from the page Settings > Users > User Directories.
10. Click OK.
The settings are saved.
The Edit User Authentication page is used to edit existing user authentication settings.
Functionality is used to configure existing settings as well as add or remove user
directories from user validation/authentication settings. User directory entries are
modified on the page Settings > Users > User Directories. See Adding user
authentication settings, page 99.
Edit authentication settings
1. From the page Settings > Users > User Authentication, click the name of the
settings.
The Edit User Authentication Settings page displays.
2. Configure the settings.
3. Click OK.
Transport Layer Security (TLS) is a protocol that provides an extra layer of security
for email communications. Use of this protocol helps prevent devices such as
non-trusted routers from allowing a third party to monitor or alter the communications
between a server and client. The email security system can receive messages
transferred over TLS and can also send messages via this protocol to particular
domains.
A default TLS certificate is supplied with Forcepoint Email Security for incoming
connections. The email system presents this certificate during TLS communications.
After email product installation, default TLS certificate information appears on the
page Settings > Inbound/Outbound > TLS Certificate, in the section TLS
Certificate for Incoming Connection. Details include the certificate version, serial
number, issuer, and expiration date.
Functionality on this page allows you to generate a new certificate when the default
certificate expires. Generating a new certificate overwrites any certificate that
currently exists. Additionally, certificates can be imported and exported on the TLS
Certificate page.
The TLS Certificate page is additionally used to manage trusted Certificate Authority
(CA) certificates for outgoing connections. Forcepoint Email Security uses CA-issued
root and intermediate certificates (along with the default CA certificate bundle) to
verify a server certificate presented by a third-party mail server during TLS
communications.
The Trusted CA Certificate for Outgoing Connection table on the TLS Certificate
page displays information about the certificate, including common name, issuer, and
expiration date. Import functionality is used to browse to the location of a trusted
certificate and add it to the Trusted CA Certificate for Outgoing Connection table. A
search function is used to perform a keyword search of all your trusted CA
certificates.
Generate a new TLS certificate
1. From the section TLS Certificate for Incoming Connection, click Generate.
A prompt displays to indicate that the existing certificate will be overwritten.
2. Click Yes.
TLS certificate generation continues.
Search trusted CA certificates by keyword
1. From the section Trusted CA Certificate for Outgoing Connection, enter a
keyword in the text field Search filter.
2. Click Search.
Search results display below the search bar.
3. Clear search results; click Clear search filter.
All trusted CA certificates display below the search bar.
See the following sections for details on importing and exporting TLS and CA
certificates:
● Importing a TLS certificate, page 102
● Exporting a TLS certificate, page 102
● Importing a trusted CA certificate, page 103
The email management server maintains several important configuration setting files,
including
● Database configuration
● Appliances list
● Administrator settings
● Presentation report templates and data
You may want to retain a backup copy of these settings to use if a system recovery
operation is necessary. A backup and restore utility is included with the Email
Security module. Backup and restore functions are available on the page Settings >
General > Backup/Restore.
The Backup/Restore function includes a Backup and Restore Log, which displays
time-stamped backup and restore activities for the manager.
Note
Because the Backup/Restore utility stops the Email
Security module service, backup and restore activities are
recorded only in the Backup and Restore log.
Backup and restore functions for an appliance cluster work properly only when cluster
settings have not changed between the backup and restore operations. Unexpected
results may occur if any of the following settings have been changed between the
backup and restore:
● Appliance mode (cluster or standalone)
● IP address or hostname
You may need to rebuild a cluster if a restore operation encounters problems.
Note
If you specify your backup file location for a remote
server, ensure that your restore operation is configured to
restore configuration files from that remote server
location.
Backing up settings
● Backup functionality is available on the page Settings > General >
Backup/Restore. Backup and restore settings on one appliance are applied to all
the appliances in your network.
Note
● The version of the backed up settings must match the
version of the currently installed product.
● Backup and restore settings must both use either local
or remote file storage. You cannot restore a local file
using remote settings.
● The backup settings file size may not exceed 10 MB.
● The following special characters are not supported in
backup server entries: |, <, >, and &.
Back up settings
1. On the page Settings > General > Backup/Restore, from the section Backup
Settings, click Backup.
The utility activates and conducts a backup if settings have been defined.
2. Save your backup settings on the Log Database server, mark the check box Save
backup configuration settings files on a remote server.
The text fields in the section Remote Server Access are enabled; enter the
following server information:
■ Domain/Hostname
Enter the domain if a domain account is used; otherwise, enter the hostname
of the SQL Server machine.
■ User name
Enter a user with SQL Server log-in permission.
■ Password
The password may not contain more than one double quotation mark.
■ Backup/Restore file path
Enter the shared folder path on the remote SQL Server machine (for example,
\\10.1.1.2\shared\).
3. Ensure that the remote log database server is accessible; click Check Status.
The backup initiates when all configuration is complete. The Backup and Restore
Log displays the time-stamped backup logs.
Topics
● Configuring message properties, page 108
● Managing connection options, page 111
● DomainKeys Identified Mail (DKIM) integration, page 117
● Domain-based Message Authentication, Reporting and
Conformance (DMARC) validation integration, page 124
● True source IP detection, page 125
● Enforced TLS connections, page 126
● Controlling directory harvest attacks, page 128
● Configuring relay control options, page 129
● Configuring delivery routes, page 130
● Rewriting email and domain addresses, page 134
● URL Sandbox, page 136
● Phishing detection and education, page 138,
● Managing message queues, page 141
● Managing the blocked message queue, page 147
● Managing the delayed message queue, page 150
● Configuring message exception settings, page 154
● Traffic shaping options, page 156
● Handling encrypted messages, page 157
Email message control properties allow you to set message size and volume limits,
and to determine how invalid recipients are handled. The following settings are
configured on the page Settings > Inbound/Outbound > Message Control:
● Setting size properties, page 108
● Setting volume properties, page 108
● Configuring invalid recipient settings, page 109
● Enabling archive message options, page 110
● Enabling message sender verification, page 110
● Enabling bounce address tag validation (BATV), page 110
2. From the section Bounce Address Tag Validation, mark the check box Enable
Bounce Address Tag Validation.
Selection enables the corresponding pull-down menus.
3. Define user and IP address groups to bypass the BATV function; select the groups
from among the following pull-down menus:
■ Inbound IP address group
■ Inbound domain group
■ Outbound domain group
A domain group selected for outbound bypass must also be selected for
inbound bypass. The default setting for each group is None.
Only user-defined domain and IP address groups are available in the
pull-down menus. See Managing domain and IP address groups, page 93, for
information about creating domain and IP address groups.
4. Click OK.
The settings are saved.
The page Settings > Inbound/Outbound > Connection Control is used to configure
connection settings, such as limiting the number of simultaneous connections per IP
address and enabling real-time blacklist checking or reverse DNS verification.
The following settings can be configured on the page Connection Control:
● Configuring simultaneous connections, page 112
● Using a real-time blacklist, page 112
● Using reverse DNS verification, page 113
● Using the reputation service, page 114
● Delaying the SMTP greeting, page 114
● Enabling the SMTP VRFY command, page 115
● Enabling SMTP authentication for email hybrid service, page 115
● Changing the SMTP port, page 116
● Using access lists, page 116
To collect and view detailed information about some connections, allow connection
control functions to save these details in the mail processing log, accessed via an
appliance. When the function is activated, the log collects detailed data regardless of
whether the connection control itself is enabled. This function is available for the
following connection control options:
● Real-time blacklist (RBL)
● Reverse DNS lookup
● Reputation service
● SMTP greeting delay
■ Domain address
Enter up to three domain addresses of the RBL services to use. Separate
multiple addresses with a semicolon (;).
5. Click OK.
The settings are saved.
2. From the section SMTP Greeting Delay Options, mark the check box Enable
SMTP greeting delay.
Selection enables the corresponding field.
3. In the text field Delay time, specify the delay time, in seconds, from 1–60.
The default is 3 seconds.
4. Save detailed connection information in the appliance mail processing log; mark
the check box Save connection details in the mail processing log.
5. Click OK.
The settings are saved.
Important
Use this command with care. Although helpful in
validating a user, this command can also create a network
security issue if the user information is retrieved by
someone with malicious intent.
This option is available only when your subscription includes Forcepoint Email
Security Hybrid Module and the hybrid service is registered and enabled.
3. Click OK.
The settings are saved.
Note
Changing this port setting causes module services to
restart.
Note
Any changes made here to an IP address group are
reflected on the page Settings > Inbound/Outbound > IP
Groups.
Adding a key
Use the following steps to create a DKIM signing key on the page Settings >
Inbound/Outbound > DKIM Settings:
Deleting a key
● From the section DKIM Signing Keys, mark the check box for a key and select
Delete.
The key is deleted. A key cannot be deleted if it is currently in use by a signing
rule.
Editing a key
1. From the section DKIM Signing Keys, click the name of a key.
The Edit Signing Key page displays. The current private key displays in the text
field.
2. Generate a new key; click the button Generate Key.
A new key is generated and displays in the text field. The only option for key length
is 1024 bits. See this Knowledge Base article to increase key length to 2048.
3. Click OK.
The key is saved and displays in the section DKIM Signing Keys.
The search field clears and all DKIM signing rules display.
The following header and body changes are made, based on the selection of
Simple or Relaxed:
■ From the list of standard headers, indicate the message headers to sign.
■ In the field Additional headers, include other headers as a comma-separated
list.
■ Specify whether to sign the entire message body or only a portion.
For the latter selection, enter the maximum number of Kbytes to be signed.
The default is 1024.
■ Select any optional signature tags for the signing rule:
○ t lets you add a signature creation timestamp.
○ x lets you specify a signature expiration time in seconds.
The default is 3600 seconds.
○ z adds the list of signed header fields to the signature.
9. From the pull-down menu Signing rule options, select either Sign email
messages or Do not sign email messages.
Next, create a list of email addresses to which this option applies.
■ For example, if you select Sign email messages, then email from the
addresses in the list is signed. Email from other addresses is not signed.
■ If you select Do not sign email messages, then email from the addresses in
the list is not signed, and email from all other users is signed.
Remove an email address from the list by selecting it and clicking Remove.
10. Click OK.
The settings are saved.
Testing a rule
Ensure that you have created a valid rule by clicking the Test link in the Test Rule
column of the DKIM Signing Rules table for the desired signing rule. The test
performs a DNS lookup query. You receive confirmation of success or failure when
the test is complete.
You must have performed a successful rule test before a rule can be enabled.
True Source IP detection uses message header information and the number of network
hops to an email appliance to determine the IP address of the first sender outside the
network perimeter. This feature allows Connection Control techniques (such as
reverse DNS lookup and reputation checks) to be applied effectively to sender
information, even when the appliance is downstream from a firewall or an internal
mail relay.
Define direct relays and network edge locations to determine whether True Source IP
detection is performed. A direct relay is the network device that connects directly to
the email appliance. All mail from a direct relay device is subject to True Source IP
Detection. A network edge is the network device that connects directly to the Internet
(e.g., a firewall).
If your subscription includes Forcepoint Email Security Hybrid Module, you can use
True Source IP detection with email hybrid service analysis. An Email Hybrid Service
IP Group is created based on information entered during a successful email Hybrid
Module registration. The IP group appears in the direct relay IP address list on the
page Settings > Inbound/Outbound > True Source IP. Although this IP group
cannot be edited directly, its content is modified whenever you change an email hybrid
service IP address (Settings > Hybrid Service > Hybrid Configuration).
Note
If registration is not successful, the Email Hybrid Service
IP Group is empty.
Mark the check box Use True Source IP Detection with email hybrid service
analysis to enable True Source IP detection with hybrid service and display the Email
Hybrid Service IP Group in the direct relay IP address list. The Email Hybrid Service
IP Group does not appear if the check box is not marked.
Configure your direct relay and all network edge devices on the page Settings >
Inbound/Outbound > True Source IP as follows:
1. Click Add.
The Add Direct Relay IP Address/IP Group page displays.
2. Enter the IP address for the direct relay device to the email appliance, or specify
the existing IP group to use for your direct relay.
By default, the direct relay hop number is 1, because it is the closest network device to
the email appliance.
Important
The IP address or group that you enter here must not
already be defined in the Trusted IP Addresses group
(Settings > Inbound/Outbound > IP Groups) or appear
in the connection control Allow Access List (Settings >
Inbound/Outbound > Connection Control).
1. In the field Check for header, enter header text to match for true source IP
detection.
If this field is empty, the message Received field is analyzed for the true source IP.
2. Add the network edge device IP address and hop number to the email appliance;
click Add Network Edge.
3. Click OK.
The settings are saved.
The page Settings > Inbound/Outbound > Enforced TLS Connections is used to
specify that connections to or from a specific IP or domain group use mandatory
Transport Layer Security (TLS) and determine the security level used by that
connection.
Functionality is used to define connection directions relative to the email SMTP
server. Incoming connections are those from a protected or external domain or IP
address group to the email protection system. Outgoing connections are those from the
email system to a protected or external domain or IP address group.
After you define a group, you can change its order in the incoming or outgoing
direction list. Select the group by marking its associated check box and use the Move
Up or Move Down button to modify list order.
Delete a group by marking the check box and clicking Delete.
You may configure up to 32 incoming or outgoing connections.
Add an incoming or outgoing connection for which to use TLS
1. Navigate to the page Settings > Inbound/Outbound > Enforced TLS
Connections.
2. Click Add.
The Add Incoming Connection page displays.
3. In the text field Name, enter a name for your enforced TLS connection.
4. From the pull-down menu Priority order, select a priority order for the
connection.
5. Specify the security level for the connection.
Security level options include the following:
■ Encrypt, the minimum enforcement level, used in all security levels
This security level is the only option available for incoming connections.
■ Encrypt and check CN, validation of a certificate’s common name
■ Verify, validation that the certificate is from a trusted CA
■ Verify and check CN, validation of the certificate’s common name and that
the certificate is from a trusted CA
Important
To use the two “verify” options, you must have imported a
trusted CA certificate. See Managing Transport Layer
Security (TLS) certificates, page 101.
■ IP address group
Select an existing IP address group in the pull-down menu or create a new
group using Add New IP Group.
■ Domain address group
Select an existing domain address group in the pull-down menu or create a
new group using Add New Domain Group.
8. Click OK.
The settings are saved.
Functionality on the page Settings > Inbound/Outbound > Relay Control is used to
prevent the unauthorized use of your mail system as an open relay by limiting the
domains and IP address groups for which your server is allowed to relay mail.
Protected domains are defined on the page Settings > Users > Domain Groups.
Trusted IP address groups are defined on the page Settings > Inbound/Outbound >
IP Groups.
Configure relay control settings on the page Settings > Inbound/Outbound > Relay
Control as follows:
1. In the section Inbound Relay Options, enable Sender Policy Framework (SPF)
checking by marking the check box Enable SPF.
This option is enabled by default.
2. Mark the relevant check boxes to configure the SPF check function to reject mail
for the following results:
■ Fail. The domain owner’s SPF record does not authorize the sender host
machine to send email for the domain.
■ SoftFail. The domain owner’s SPF record allows the sender host machine to
send email for this domain, even though the host is not explicitly authorized to
do so.
■ Neutral. The domain owner’s SPF record makes no statement as to whether
the sender host machine is authorized to send email for the domain.
■ None. The lack of definitive SPF information prevents an SPF check (e.g., an
SPF record does not exist).
■ PermError. A permanent error occurs (e.g., the SPF record has an invalid
format).
■ TempError. A transient error occurs (e.g., a DNS timeout).
These options are not marked by default.
3. In the Bypass SPF Option box, specify a sender domain group for which SPF
settings are bypassed.
a. Mark the check box Bypass SPF validation for senders in the following
domain group
Configure delivery routes on the page Settings > Inbound/Outbound > Mail
Routing. You can create the following types of message routes:
● User directory-based routes, page 131
● Domain-based routes, page 133
Change the order of a user directory- or domain-based route by marking its associated
check box and using the Move Up or Move Down buttons.
Copying a route
Use the following steps to copy a route on the page Settings > Inbound/Outbound >
Mail Routing:
1. Select a route in the route list by marking the check box next to its name.
2. Click Copy.
A new route appears in the route list, using the original route name followed by a
number in parentheses. The number added indicates the order that copies of the
original route are created (1, 2, 3, etc.).
3. Click the new route name to edit route properties as desired.
Removing a route
To remove a route, select the route by marking the check box next to its name and
click Delete.
The default domain-based route cannot be deleted.
Delivery routes based on user directory entries are examined first for a match with an
email message recipient. Domain group entries are validated against the selected user
directory to determine whether email will be delivered via a specified route.
Note
ESMTP user directories are not included in the directory
list. ESMTP user directories cannot be used for user
directory-based routes.
Important
If you entered an IP address in the previous step, the MX
lookup option is not available.
If you entered a hostname in the previous step, this option
is available.
● Mark the Enable MX lookup check box for message
delivery based on the hostname MX record.
● If you do not mark this check box, message delivery is
based on the hostname A record.
Domain-based routes
Administrator Help | Forcepoint Email Security | Version 8.5.x
Delivery routes based on domain groups are examined after defined user
directory-based routes for a match with an email message recipient. If a match is made
with a user directory-based route, domain-based routes are not examined for matches.
Important
The Protected Domain group defined on the page
Settings > Users > Domain Groups should not be used to
configure delivery routes if you need to define
domain-based delivery routes via multiple SMTP servers.
Create domain groups that contain subsets of the Protected
Domain group for mail routing purposes.
Important
If you entered an IP address in the previous step, the MX
lookup option is not available.
If you entered a hostname in the previous step, this option
is available.
● Mark the check box Enable MX lookup for message
delivery based on the hostname MX record.
● If you do not mark this check box, message delivery is
based on the hostname A record.
d. Enter a preference number for this server (from 1–65535; default value is
5).
If a single route has multiple defined server addresses, mail is delivered in
order of server preference. When multiple routes have the same
preference, round robin delivery is used.
You may enter no more than 16 addresses in the SMTP Server List.
6. Select any desired security delivery options:
a. Enable email traffic to use opportunistic TLS protocol; select Use
opportunistic Transport Layer Security (TLS).
b. Ensure that users supply credentials; select Require authentication.
Enter the appropriate user name and password in the Authentication
Information box. You must use the SMTP server IP address delivery method
for users to authenticate.
The email envelope recipient address is rewritten based on the entries in the Envelope
Recipient Address Rewrite List.
Add recipient rewrite entries
1. On the page Settings > Inbound/Outbound > Address Rewriting, click the
Inbound Messages tab or the Outbound and Internal Messages tab to display
the settings.
2. From the Envelope Recipient Address Rewrite List, click Add.
The Add Recipient Email or Domain Address page displays.
3. Enter your addresses in one of two ways:
■ Mark the check box Individual email address or domain rewrite entry and
enter the original recipient address and the rewrite address in the appropriate
entry fields.
An email address entry may have multiple rewrite entries, with each entry
separated by a space. A domain address may have only one rewrite entry.
■ If you have an existing email or domain address rewrite entry file, mark the
check box Email address or domain rewrite entry file and browse to the file
File size may not exceed 10 MB.
4. Click OK.
Your entries appear in the Envelope Recipient Address Rewrite List.
4. Click OK.
Your entries appear in the Envelope Sender and Message Header Rewrite List.
URL Sandbox
The URL sandbox function provides real-time analysis of uncategorized URLs that
are embedded in inbound email. When a user clicks an uncategorized URL, a
notification message prompts the user to initiate URL analysis, because the link may
not be safe. If the user chooses not to analyze the URL, the requested web page is not
accessible.
If analysis determines that the link is not malicious, the user receives a notification
that lists the URL and category or categories of the page, and clicks Continue to site.
If the link is deemed malicious or if applicable policy does not allow a user to access
uncategorized web pages, the user is notified that the site is blocked:
Your subscription must include the Forcepoint Email Security Hybrid Module. URL
sandbox capability is available only after the email hybrid service is successfully
registered and enabled. See Email hybrid service configuration, page 55.
The URL sandbox configuration settings include three components:
● Default settings that apply to any recipient not covered by specific settings
● Recipient-specific settings that apply to an individual domain or email address
● List of domains to which sandbox settings do not apply
Use the page Settings > Inbound/Outbound > URL Sandbox to configure the URL
sandbox feature:
1. In the section Default Settings, specify the settings that apply to any recipient not
covered by recipient-specific settings:
a. Activate the URL sandbox function; mark the check box Analyze suspicious
URLs.
By default, the check box is not marked.
b. If the URL sandbox is enabled, allow users to click unclassified URL links;
mark the check box Allow the recipient to follow links to unclassified
URLs.
By default, the check box is not marked.
c. Allow users to click a link that may redirect to a site with an unsupported
protocol; mark the check box Allow the recipient to follow links with an
unsupported protocol.
d. Replace the original URL with other text; enter the string in the entry field
below the check box.
Leave this field blank to keep the original URL.
2. Use the section Recipient-specific Settings to add custom sandbox settings for
individual domain or email addresses:
a. Create sandbox settings for a particular group of addresses; click Add.
b. In the Recipient Email/Domain Address List, enter comma-separated email or
domain addresses to which the settings should apply.
Wildcards are not permitted.
c. Activate the URL sandbox function for these addresses; mark the check box
Analyze suspicious URLs.
By default, the check box is not marked.
d. If the URL sandbox is enabled, allow the specified users to click unclassified
URL links; mark the check box Allow the recipient to follow links to
unclassified URLs.
By default, the check box is not marked.
e. Allow users to click a link that may redirect to a site with an unsupported
protocol; mark the check box Allow the recipient to follow links with an
unsupported protocol.
f. Replace the original URL with other text; enter the string in the entry field
below the check box.
Leave this field blank to keep the original URL.
3. Enable the sandbox to examine URLs even if they appear in a message that
contains the digital signature of a trusted sender; at the bottom of the section URL
Sandbox, mark the check box Analyze suspicious URLs that appear in digitally
signed email.
By default, the check box is not marked.
4. In the entry field above the check box, enter the URL domains that should bypass
the URL sandbox.
Do not use wildcards, and separate multiple entries with a comma.
5. Click OK.
The settings are saved.
To delete a set of recipient-specific settings, mark the check box next to the address
list and click Delete.
message that purports to be from a known financial institution or popular web site
may actually be an attempt to steal personal information.
The phishing detection and education function provides cloud-based analysis of an
inbound message for phishing email characteristics. To use the phishing detection and
education feature, your subscription must include the Forcepoint Email Security
Hybrid Module. It is necessary to successfully register with the email hybrid service
before you configure phishing detection and education capabilities. See Email hybrid
service configuration, page 55.
Functionality requires rules to be defined that determine which sender domains are
analyzed and how a suspected phishing email is handled. Suspect email may be
treated the same as spam (blocked and saved to a spam queue) or be replaced by a
message that educates the recipient about phishing attack email.
Dashboard charts and presentation reports can be configured to display suspected
phishing attack data.
The page Settings > Inbound/Outbound > Phishing Detection includes the
following tabs for configuring phishing detection:
● Phishing Rules, which contains a list of all your phishing rules. A default rule
applies to domains that are not included in any other defined rule. See Adding a
phishing detection rule, page 139.
The default rule cannot be deleted. Delete any other phishing rule from the list by
marking its associated check box and clicking Delete, then clicking Save to
Cloud Service.
● Phishing Education Pages, which contains a list of all the education pages you
have defined. A default page applies when a custom page is not specified for a
phishing rule. See Creating a phishing education page, page 140.
Delete any phishing education page (except the default page) from the list by
marking its associated check box and clicking Delete. You may not delete a page
that is being used by a phishing rule.
Click Save to Cloud Service only if you receive an error message regarding a
synchronization issue with the cloud service.
Create a new phishing education page by copying an existing page and renaming it.
You can also customize the default message template to suit your needs. A default
page is used when a custom page is not specified for a phishing rule.
Copy an existing phishing education page
1. On the Phishing Education Pages tab, click Copy Page.
2. In the text field Page name, enter a name for the phishing education page copy.
3. Click OK.
Create a custom phishing education page
1. On the Phishing Education Pages tab, click Add Page.
The Add Phishing Education Page screen displays.
2. Enter a name and description for the phishing education page.
3. In the text field Page title, specify a title for the page.
This title appears as the browser window name.
4. In the Phishing Education Page Editor, specify the desired text and images.
5. Click OK.
Note
If you receive an error message regarding a
synchronization problem with the cloud service, click
Save to Cloud Service on the tab Phishing Education
Pages to send your phishing education page settings to the
email hybrid service.
The page Main > Message Management > Message Queues is used to view, create,
and configure message queues. You can also modify the following default queues:
● virus
● spam
● exception
● encryption-fail
● decryption-fail
● archive
● secure-encryption
● data-security
● url-analysis
● attachment
All blocked messages across all queues are accessed on the page Main > Message
Management > Blocked Messages (see Managing the blocked message queue).
Temporarily delayed messages can be viewed on the page Main > Message
Management > Delayed Messages (see Managing the delayed message queue).
The following table details the information available in the Queue List on the Message
Queues page.
Parameter Description
Queue Name Displays the name of the queue.
Click a queue name in the Queue List to view and
manage the messages in the queue. See Viewing a
message queue, page 143.
Status Indicates whether the queue is in use or not.
From the Status column, click Referenced to display a
list of the email functions that use the queue. During a
queue move operation, an icon in this column indicates
whether the move is in progress or has failed.
Message Volume Indicates the total number of messages in the queue.
The number of messages a delegated administrator
sees may be less than the total displayed in this
column, depending on the permissions granted to that
administrator.
Size/Total Indicates the queue’s current size as a portion of its
maximum configured size.
Storage Location Displays the location of queue storage (Local, via
Network File System [NFS], or via Samba).
Icons in this column indicate storage status, such as
low disk space or a lost connection.
Properties Contains a link to a page displaying the queue’s current
settings. Click this Edit link to change any queue
settings.
Remove a user-created queue by marking the check box next to the queue name in the
Queue List and clicking Delete. You cannot delete a default queue.
Use the following steps to create a new message queue on the page Main > Message
Management > Message Queues:
1. Below the Queue List, click Add.
The Add Queue page displays.
2. In the text field Queue name, enter a name for the new queue.
3. Select the storage location for this queue:
■ Store the queue locally; click Local.
■ Use the NFS protocol for file storage; click Via Network File System (NFS).
Enter the IP address or hostname of the storage location, along with its shared
path.
Note
NFS version 3 or later is supported.
The View Messages in a Queue page displays the messages in a message queue, with
functionality to view by a specific time or date range, search messages, or perform
actions such as Deliver, Delete, and Reprocess.
● From the Queue List, click a queue name.
The View Messages in a Queue page displays.
The following table details the information displayed in the list of messages.
Parameter Description
Sender Sender email address.
Recipient Recipient email address.
Subject Message subject.
Click the link to display the View Message page for
viewing message information and contents. See
Viewing a message in a queue, page 153.
Size Message size.
Date/Time Date and time of message receipt.
Policy/Rule Policy and rule applied to the message. If a data loss
prevention (DLP) policy is applied to a message, this
information displays as a clickable link.
Click View Incident to open the DLP incident
information in the Data module, where the message was
processed.
This column does not display in the archive queue.
Message Type Type of message (for example, spam, virus, exception,
commercial bulk, advanced malware detection - cloud,
advanced malware detection - on-premises, spoofed
email, URL analysis, encryption error, or decryption
error).
Processed By Name of the appliance that processed the message.
Quarantined Reason Indicates why a message was sent to a quarantine
queue:
● Antivirus filter
● Email hybrid service
● URL analysis filter
● Bounce address tag validation
● Digital fingerprinting antispam tool
● LexiRules antispam tool
● Heuristics antispam tool
● Commercial bulk email filter
● Custom content filter
● Block List (Personal Email Manager Always Block
List entry)
● Archive feature (a setting on the page Settings >
Inbound/Outbound > Message Control)
● Data loss prevention
● Exception (message exception)
● For a message attachment analyzed by Forcepoint
Advanced Malware Detection for Email - Cloud,
click View report(s) to open a pop-up box with
links to an Advanced Malware Detection - Cloud
report on each file examined.
Note
In high-traffic situations, a large number of virus filter and
URL filter exceptions may occur, incorrectly sending
many messages to the exception queue. After the situation
is resolved, select the affected email and use the Reprocess
action to restart email processing.
Action Description
Deliver Deliver the message to its recipient(s).
Delete Delete the message from the queue.
Reprocess Delete the message from the queue and restart the email processing
function as if the email system were receiving it for the first time. For
the archive queue, this action is called Process.
Not Spam Report that the message should not be classified as spam and release
the message for delivery. This option is available only when spam
messages are selected.
More Actions Pull-down menu functionality to select additional actions to perform.
See the following table for more information.
Refresh Refresh the queue contents list to view up-to-date queue contents.
Action Description
Resume Processing A message that has both spam and virus characteristics may
be isolated by one type of filter before it has been processed
by the other type. If the original quarantine is a false positive,
use this action to make sure the message is processed by all
relevant filters rather than delivered after only the first
analysis.
Add to Always Block List Add the message sender to the Always Block List.
Add to Always Permit List Add the message sender to the Always Permit List.
Forward Forward the message to one or more recipients. The
forwarded message is added as an attachment to the
forwarding message.
Download Download the message in .eml format. Downloaded email is
saved in a zip file.
Clear message queue Delete all the messages in the queue.
Action Description
Reprocess all messages Reprocess messages in your search result. Only the first 5000
entries in your search result are reprocessed.
Delete all messages Delete messages in your search result. Only the first 5000
entries in your search result are deleted.
The page Main > Message Management > Blocked Messages lists all blocked
messages from most queues across all appliances together in a single table, with a
column entry that indicates the name of the queue in which a message is stored.
Messages in the archive and Delayed Messages queues are not included on this page.
View messages by date/time range
Use the View from/to fields to specify the desired date/time range for viewing entries.
The calendar includes the following options:
● Change the month and year by using the back and next arrows around the month
and year at the top of the calendar.
● Set the calendar to the current date by clicking the date in the lower left corner of
the calendar.
● Click Clean to clear the current date/time calendar selection.
● Click Today to set the calendar date to today’s date.
Set the time range in hours and minutes in the entry fields to the right of the calendar.
● Click the arrow to the right of the View date/time range to display the desired
queue items.
Search messages by keyword
Use the Search functionality to perform a keyword search of blocked messages, and to
refine a search by message IDs, senders, recipients, subjects, or policies applied. You
can also search on an individual queue or on the name of the appliance that processed
the messages (Processed By category). The Search functionality includes the
following options:
1. In the text field, enter a keyword.
2. From the pull-down menu, click a category on which to search; ID, Subject,
Sender, Recipient, Policy/Rule, Processed By, or All.
3. Click Search.
The messages matching the search parameters display.
Configure the number of messages to display
Use the Per Page menu to configure how many messages to view on each page of the
queue.
● From the pull-down menu per page, select the number of messages to display on
each page; 25, 50, or 100.
The default is 25.
The following table details the information displayed in the list of blocked messages.
Parameter Description
Sender Sender email address.
Recipient Recipient email address.
Subject Message subject.
Click the link to display the View Message page for
viewing message information and contents. See
Viewing a message in a queue, page 153.
Size Message size.
Date/Time Date and time of message receipt.
Policy/Rule Policy and rule applied to the message. If a data loss
prevention (DLP) policy is applied to a message, this
information displays as a clickable link.
Click View Incident to open the DLP incident
information in the Data module, where the message was
processed.
This column does not display in the archive queue.
Queue Queue in which the message is stored (for example,
spam, virus, exception, encryption-fail, or
decryption-fail).
Message Type Type of message (for example, spam, virus, exception,
commercial bulk, advanced malware detection - cloud,
advanced malware detection - on-premises, spoofed
email, URL analysis, encryption error, or decryption
error).
Parameter Description
Processed By Name of the appliance that processed the message.
Quarantined Reason Indicates why a message was sent to a quarantine
queue:
● Antivirus filter
● Email hybrid service
● URL analysis filter
● Bounce address tag validation
● Digital fingerprinting antispam tool
● LexiRules antispam tool
● Heuristics antispam tool
● Commercial bulk email filter
● Custom content filter
● Block List (Personal Email Manager Always Block
List entry)
● Archive feature (a setting on the page Settings >
Inbound/Outbound > Message Control)
● Data loss prevention
● Exception (message exception)
● For a message attachment analyzed by Forcepoint
Advanced Malware Detection for Email - Cloud,
click View report(s) to open a pop-up box with
links to an Advanced Malware Detection - Cloud
report on each file examined.
Select a message in the blocked messages queue and perform the following actions:
Action Description
Deliver Deliver the message to its recipient(s).
Delete Delete the message from the queue.
Reprocess Delete the message from the queue and restart the email processing
function as if the email system were receiving it for the first time.
Not Spam Report that the message should not be classified as spam and
release the message for delivery. This option is available only
when spam messages are selected.
Refresh Refresh the queue contents list to view up-to-date queue contents.
Action Description
Resume Processing A message that has both spam and virus characteristics may
be isolated by one type of filter before it has been processed
by the other type. If the original quarantine is a false positive,
use this action to make sure the message is processed by all
relevant filters rather than delivered after only the first
analysis.
Add to Always Block List Add the message sender to the Always Block List.
Add to Always Permit List Add the message sender to the Always Permit List.
Forward Forward the message to one or more recipients. The
forwarded message is added as an attachment to the
forwarding message.
Download Download the message in .eml format. Downloaded email is
saved in a zip file.
Reprocess all messages Reprocess the messages in your search result. Only the first
5000 entries in your search result are reprocessed.
Delete all messages Delete the messages in your search result. Only the first 5000
entries in your search result are deleted.
● Set the calendar to the current date by clicking the date in the lower left corner of
the calendar.
● Click Clean to clear the current date/time calendar selection.
● Click Today to set the calendar date to today’s date.
Set the time range in hours and minutes in the entry fields to the right of the calendar.
● Click the arrow to the right of the View date/time range to display the desired
queue items.
Search messages by keyword
Use the Search functionality to perform a keyword search of delayed messages, and to
refine a search by message IDs, senders, recipients, subjects, or reasons for delay. If
appliances are configured in a cluster, you can also search on the name of the
appliance that processed the messages (Processed By category). The Search
functionality includes the following options:
1. In the text field, enter a keyword.
2. From the pull-down menu, click a category on which to search; ID, Subject,
Sender, Recipient, Processed By, Reason for Delay, or All.
3. Click Search.
The messages matching the search parameters display.
Configure the number of messages to display
Use the Per Page menu to configure how many messages to view on each page of the
queue.
● From the pull-down menu per page, select the number of messages to display on
each page; 25, 50, or 100.
The default is 25.
The following table details the information displayed in the list of delayed messages.
Parameter Description
Sender Sender email address.
Recipient Recipient email address.
Subject Message subject.
Click the link to display the View Message page for
viewing message information and contents. See
Viewing a message in a queue, page 153.
Size Message size.
Date/Time Date and time of message receipt.
Parameter Description
Policy/Rule Policy and rule applied to the message. If a data loss
prevention (DLP) policy is applied to a message, this
information displays as a clickable link.
Click View Incident to open the DLP incident
information in the Data module, where the message was
processed.
This column does not display in the archive queue.
Next Scheduled Delivery Date of the next scheduled message delivery attempt.
Attempt
Reason for Delay Reason a message is delayed. Entries in this column
may be one of the following:
● Temporary connection issue delay n. A temporary
delay due to connection issues; n is the number of
retry attempts remaining for the message.
● Scheduled delay. An intentional delay that is
scheduled via a custom content filter action (see
Creating and configuring a filter action, page 191,
for information).
● Advanced Malware Detection - Cloud or Advanced
Malware Detection - On-Premises delay. A
temporary delay due to in-progress advanced file
analysis.
Processed By Name of the appliance that processed the message.
Action Description
Release Attempt the message delivery immediately.
Delete Delete the message from the queue.
Refresh Refresh the queue contents list to view up-to-date queue
contents.
Action Description
Forward Forward the message to one or more recipients. The
forwarded message is added as an attachment to the
forwarding message.
Download Download the message in .eml format. Downloaded email is
saved in a zip file.
Release all messages Attempt to deliver all the messages in the queue.
Delete all messages Delete the messages in your search result. Only the first 5000
entries in your search result are deleted.
Use the View Message page to view details about a message or the message contents
from any message queue, including Blocked Messages, Delayed Messages, or any
default or custom queue on the page Message Queues. Click the link for a message in
the Subject column of a queue to open the View Message page.
The Back link at the top of the page returns you to the View Queue page. The
Previous and Next links let you navigate to the previous or next message in the queue
messages list.
The following information about a selected message is displayed on the View
Message page:
All message actions available ton any View Queue page are also available on the View
Message page, except Clear All Messages or Release All Messages. See Viewing a
message queue, page 143. You can also choose to view message contents in either text
or HTML format or to Clear message queue from the pull-down menu More Actions.
The page Settings > Inbound/Outbound > Exceptions specifies how to handle
messages that cannot be processed for some reason. Configure message exception
settings as follows:
1. Mark one or more check boxes to specify the action(s) to perform on a message
that cannot be processed:
■ Deliver the message when an exception is caused by an antivirus filter.
■ Deliver the message when an exception is caused by an antispam filter
(default setting).
■ Deliver the message when an exception is caused by the advanced file
analysis filter.
■ Deliver the message when an exception is caused by the commercial bulk
email filter.
■ Deliver the message when an exception is caused by a data loss prevention
policy.
■ Deliver the message when an exception is caused by the URL analysis filter.
■ Deliver messages when an exception is caused by any other system operation.
■ Save exception messages to a queue (default setting).
Select the desired folder from the pull-down menu (default is exception). The
list includes all the default queue names and any administrator-created
queues. To add a new queue, select Add Folder from the pull-down menu to
open the Add Queue screen.
Warning
You must have the save option selected to save
undelivered messages to a queue. If this option is not
selected, messages may be dropped.
Messages are saved to the queue regardless of whether the
delivery option is selected for a specific filter.
2. Send a notification regarding the unprocessed message; mark the check box Send
notification to enable the Notification Properties section.
3. Select the notification message sender from the following choices:
■ Original email sender
This is the default.
■ Administrator
If you use this option, you must configure a valid administrator email address
on the page Settings > General > System Settings (see Setting system
notification email addresses, page 80).
■ Custom
Specify a single email address in this field.
4. Mark one or more check boxes to specify notification message recipients from
among the following choices:
■ Original email sender
■ Original email recipient
■ Administrator
This is the default. If you use this option, you must configure a valid
administrator email address on the page Settings > General > Settings (see
Setting system notification email addresses, page 80).
■ User specified; enter one or more email addresses, separated by semicolons,
in this field
5. In the text field Subject, specify the subject line of your notification message.
6. In the text field Content, enter the body of your notification message.
7. Attach the original message to the notification message; mark the check box
Attach original message.
8. Click OK.
The settings are saved.
Message delivery options help you control how undeliverable mail is handled.
Options for these operations are configured on the page Settings >
Inbound/Outbound > Message Non-Delivery Options.
Use the following steps to determine how to handle messages that are temporarily
undeliverable due to error situations:
1. In the field Retry interval, enter the time for the message retry interval, in
minutes.
Important
Message delivery retry intervals are calculated
exponentially. For example, using the default entry of 15,
retry attempts are made in 15, 30, 60, 120, 240, etc.,
minutes.
2. In the field Maximum retry period, enter the time for the maximum period for
retrying message delivery, in minutes.
The default is 1440.
3. In the field Notification email address, enter an email address to which to send
notifications that a non-delivery report (NDR) cannot be delivered to the original
sender at the end of the retry period.
Mark the check box Use Administrator email address to send these messages to
the administrator.
You must configure the administrator address on the page Settings > General >
System Settings (see Setting system notification email addresses, page 80).
4. Click OK.
The settings are saved.
The page Settings > Inbound/Outbound > Traffic Shaping is used to determine the
rate of traffic delivery for a specified source or destination group based on domain
group or user directory settings. For example, these settings allow you to send large
volumes of email at a rate that prevents possible blacklisting of the domain.
Change the order of a traffic shaping group by marking its associated check box and
using the Move Up and Move Down buttons. Copy an existing traffic shaping group
by marking its associated check box and clicking Copy. Delete a traffic shaping group
by marking its associated check box and clicking Delete.
In addition to specifying source and destination user groups, the following message
delivery settings may be modified as part of traffic shaping:
● Maximum number of concurrent connections
● Maximum number of messages per connection within a designated time period
● Maximum number of recipients per message
● Use of the SMTP session cache, for which the maximum number of messages per
session and the session duration are specified
The default traffic shaping group contains no traffic source or destination user groups.
Add message traffic shaping controls in your system
1. On the page Traffic Shaping, click Add.
The Add Traffic Shaping Group page displays.
2. In the text field Traffic shaping group name, enter a name.
3. From the pull-down menu Order, specify the location in which this group should
appear in the traffic shaping group list.
4. Select the status of your traffic shaping group: Active or Disabled.
5. Configure an email source for the traffic shaping group, if desired.
From Source type, designate one of the following source types:
■ All sources
■ Domain group
This is the default. Select the domain group from the pull-down menu.
Modify the selected domain group by clicking Edit.
■ User directory
Select a user directory from the list, or create a new user directory by clicking
Add user directory.
6. Configure an email destination traffic shaping group, if desired.
From Destination type, designate one of the following destination types:
■ All destinations
■ Domain group
This is the default. Select the domain group from the pull-down menu.
Modify the selected domain group by clicking Edit.
■ User directory
Select a user directory from the list, or create a new user directory by clicking
Add user directory.
7. In the field Maximum number of concurrent connections, enter the maximum
number of simultaneous message deliveries to an individual routing address.
The range of values is 5–50; default value is 20.
8. In the field Maximum number of messages per connection, enter the maximum
number of messages per connection within a defined time period.
The range of values for number of messages is 1–10000; default value is 10000.
The time range is 60 seconds to 30 minutes; default value is 60 seconds.
9. In the field Maximum number of recipients, enter the maximum number of
message recipients per message delivery.
The range of values is 5–100; default value is 50.
10. Use an SMTP session cache; mark the check box Enable SMTP session cache.
This is the default.
a. Enter the maximum number of messages allowed per SMTP session.
Range of values is 5–100; default is 10. Enter zero (0) to specify an unlimited
number of messages per session.
b. Enter the duration of the SMTP session, in seconds.
Range of values is 60–600 seconds; default value is 300 seconds.
11. Click OK.
The settings are saved. The new group displays on the page Traffic Shaping.
An email content policy configured in the Data Security module may specify that a
message should be encrypted for delivery. To encrypt specific outbound messages,
you must create an email DLP policy that includes an encryption action plan in the
Data Security module (Main > Policy Management > DLP Policies).
The following types of message encryption are supported:
● Mandatory Transport Layer Security encryption
● Forcepoint email encryption
● Third-party encryption application
● Secure Message Delivery
Specify the type of encryption to use on the page Settings > Inbound/Outbound >
Encryption.
■ Forward a message that has failed decryption to a specific queue; mark the
check box On decryption failure and select a queue for these messages from
the pull-down menu.
The default is the virus queue.
12. Click OK.
The settings are saved.
Note
When advanced file analysis is enabled (see Selecting
advanced file analysis platform, page 71), and the
advanced file analysis filter is configured in Enforce mode
with the option to send an enforcement notification (see
Advanced file analysis, page 184), replies to messages
from the Secure Message Delivery portal will include a
plain text file, or only the filename, until analysis is
complete.
3. Enter the IP address or hostname for the appliance that hosts the secure message
delivery portal.
The maximum length for the hostname is 64 characters.
Entering a hostname rather than an IP address is recommended, to avoid potential
Microsoft Outlook warning messages generated in an end user’s inbox by the
notification message.
Important
The entry in this field should be mapped to the E1
interface (for a V10000 appliance) or the P1 interface (for
a V5000 appliance). Ensure that the interface you use is
visible from outside your internal network.
If you have an appliance cluster, enter the IP address or hostname for one cluster
appliance (primary or secondary). The cluster load balancing function directs
traffic appropriately.
Note
Secure messaging uses the same port configured for the
Personal Email Manager portal (Settings > Personal
Email > Notification Message).
4. Specify the actions that your users are allowed to perform in the secure portal,
along with the types of recipients to whom these users can send secure messages:
■ Enforce strong password policy
With this policy in force, an end-user password must meet the following
requirements:
○ Between eight and 15 characters
○ At least one uppercase letter
○ At least one lowercase letter
○ At least one number
○ At least one special character; supported characters include:
!"#$&'()*+,- ./:;<=>?@[\]^_`{|}~
End users are prompted to create strong passwords in the Secure Message
portal.
■ Display images within messages viewed in the Secure Message Portal
Warning
Enabling this feature is not recommended, because a
malicious script hosted remotely could be disguised in the
email as an image, allowing the attacker to compromise
your system.
The $URL$ field must be included in your notification because it creates the
link the end user clicks to access the secure email portal.
■ In the field Sender, enter one sender address for the notification.
The sender address must belong to your internal protected domain. Because
you do not want responses to the notification, ensure that the sender address is
configured to drop any direct replies to the notification.
■ In the field Subject, enter an email subject.
Any customizations you make to the notification email template are lost when
upgrading to a new version of Forcepoint Email Security. After upgrade, you will
need to reconfigure your customized templates.
6. After you have configured your notification message, click Preview Message to
view it.
7. Click OK.
The settings are saved.
Topics:
● Managing filters, page 167
● Managing filter actions, page 189
● Managing policies, page 197
● Managing global Always Block and Always Permit lists, page 204
Managing filters
Create and configure filters on the page Main > Policy Management > Filters. A
filter in use by a policy can be copied; a filter not in use by a policy can be copied or
deleted. Default filters cannot be copied or deleted. See Creating and configuring a
filter, page 169.
The following predefined default filter types can be used in email analysis:
● The virus filter analyzes an email message and its attachments for the presence of
viruses and other threats. See Antivirus, page 169.
● The spoofed email filter can help reduce instances of email sender impersonation.
See Spoofed email, page 171.
● The email attachment filter examines email attachment content to determine the
attachment’s true file type. The filter can also detect individual file attachment
extensions configured by an administrator. See Email attachment, page 174.
● The URL analysis filter examines email content for embedded URLs and
classifies them according to a database of known spam URLs. URLs classified by
the filter can be removed or modified. See URL analysis, page 175.
● The spam filter analyzes email content and compares it against a database of
known spam characteristics. A variety of antispam tools are available, including
digital fingerprinting, LexiRules, and heuristics analysis tools. See Antispam,
page 182.
● The commercial bulk email filter analyzes a message to determine whether it was
sent from a business for advertising purposes. See Commercial bulk email, page
183.
● The advanced file analysis filter inspects email attachment file types that
commonly contain security threats. See Advanced file analysis, page 184.
● The disclaimer filter is used to add text at the beginning or end of a message. See
Disclaimer, page 189.
● A custom content filter can be added to examine a message based on configured
message component conditions. The Forcepoint Email Security module does not
provide a default custom content filter. See Custom content, page 187.
Copying a filter
Copy an existing filter to modify and use the existing filter settings. A filter can be
copied whether or not it is in use by a policy; however, default filters cannot be
copied.
Copy a filter
1. On the page Main > Policy Management > Filters, mark the check box to the
left of the filter name.
2. Click Copy.
The Copy Filter dialog box displays.
3. In the field Filter Name, enter a new name for the filter.
4. Click OK.
The new filter displays in the Filters list. See Creating and configuring a filter,
page 169.
Deleting a filter
A filter can be deleted as long as it is not in use by a policy. Default filters cannot be
deleted.
Delete a filter
1. On the page Main > Policy Management > Filters, mark the check box to the
left of the filter name.
2. Click Delete.
The Confirm Filter Delete dialog box displays.
3. Click Yes.
The filter is deleted.
Create new filters on the page Main > Policy Management > Filters. The selected
filter type determines the filter settings you can configure. Select from the following
types:
● Antivirus, page 169
● Spoofed email, page 171
● Email attachment, page 174
● URL analysis, page 175
● Antispam, page 182
● Commercial bulk email, page 183
● Advanced file analysis, page 184
● Custom content, page 187
● Disclaimer, page 189
Create a new filter
1. On the page Main > Policy Management > Filters, select Add.
The Add Filter page displays.
2. In the text field Filter Name, enter a name for the filter.
3. In the text field Description, enter a description of the filter.
4. From the pull-down menu Filter Type, select a filter type.
The section Filter Properties displays with the available options for the selected
filter.
5. Configure the filter properties and select OK.
The filter is saved.
Antivirus
Administrator Help | Forcepoint Email Security | Version 8.5.x
Antivirus analysis checks email and any attachments for the presence of email-borne
viruses and threats. Configure the antivirus filter on the page Main > Policy
Management > Filters > Add (or Edit) Filter.
If your subscription includes the Forcepoint Email Security Hybrid Module, the email
hybrid service analysis score can be used in addition to the on-premises email security
system antivirus analysis.
The antivirus filter can be configured to specify the type and sensitivity of analysis, as
well as the response of the filter.
Configure antivirus filter analysis
1. From the section Filter Properties, mark the check box for one or both options
under Filter analysis:
■ Treat errors as infected
If antivirus analysis encounters errors, the email is handled as if is infected.
This setting is enabled by default.
■ Analyze message body for viruses
The message content is analyzed for embedded malicious scripts or
attachments that cannot be examined properly. If message format problems
cause attachments to be viewed as part of the message body, the attachments
are analyzed and viruses are detected. This setting is disabled by default.
2. From the section Filter Properties, select one or both of the options under Tools:
■ Standard analysis
Performs standard email content and attachment analysis for virus threats.
■ Advanced analysis
Performs email attachment analysis for Microsoft Office documents and
macros.
Either one or both types of analysis can be selected, along with the sensitivity
level of each analysis type. If you select both types of analysis, standard
analysis is performed first, then advanced analysis. The higher the sensitivity
level, the larger the volume of email that is designated as virus. Enabling the
advanced antivirus engine may affect system performance.
3. From the section Sensitivity Level, select Low, Medium, or High.
4. From the section Filter Properties, select one option under Filter response:
■ Remove infected attachments
Deletes the attachment that triggers the antivirus filter.
■ Take no action
This is the default action. The attachment and virus are stored in a predefined
location (see Creating and configuring a filter action, page 191). If required, a
message may be sent to the administrator stating that a virus has been found.
5. From the bottom of the section Filter Properties, click Advanced.
The Advanced settings display. These settings are used to add a notification to a
suspected virus email, to alert the recipient that the message may be infected.
6. Mark the check box Notify recipient that the delivered email message may
contain a virus.
7. In the text box, enter the desired notification text.
The maximum length is 8192 characters total, up to 990 characters per line; a line
break is two characters.
8. Select where the notification should appear; Insert notification at top of
message or Insert notification at bottom of message.
The default location is at the top of the message.
9. Configure additional filter settings and click OK.
The antivirus filter settings are saved.
Spoofed email
Administrator Help | Forcepoint Email Security | Version 8.5.x
The spoofed email filter can help determine the validity of message senders and
reduce instances of sender impersonation via a set of header sender comparisons and
SPF, DKIM, and Sender ID analysis results.
Spoofed email filter message header comparisons involve the From:, envelope
Sender:, and Reply-To: fields.
● The From: field indicates the entity (e.g., person or mailbox) that is responsible
for authoring the message.
● The envelope Sender: field contains information about the entity responsible for
the actual transmission of the message (e.g., someone who sends a message on
behalf of another person).
● If present, the Reply-To: field specifies the address to which a message reply
should be sent. If Reply-To: is not present, a reply is sent to the From: address.
Note
The spoofed email filter provides SPF analysis in addition
to the inbound relay SPF email rejection options on the
page Settings > Inbound/Outbound > Relay Controls.
The following should be considered regarding the use of
these two SPF-based analyses:
● When a message triggers a mail routing SPF
connection rejection option and is dropped, it will not
be processed by the spoofed email filter and email
content is not analyzed.
● When a message triggers a mail routing SPF
connection rejection option but is not dropped, the
SPF score from this analysis is stored for use by the
spoofed email filter.
The spoofed email filter can be configured to use one or more header comparisons and
to enable authentication analysis. Configure the spoofed email filter on the page
Main > Policy Management > Filters > Add (or Edit) Filter.
Configure spoofed email filter analysis
The spoofed email filter is triggered if any selected address comparison fails, and the
message sender is presumed to be forged.
1. From the section Filter Properties, mark the check box Sender address
comparison.
Selection is enabled by default.
2. Mark the check box for one or more sender address conditions:
■ Verify that the From: address matches the envelope sender address
Note
When an envelope sender has been changed as a result of
an address rewriting rule (Settings > Inbound/
Outbound > Address Rewriting), the spoofed email filter
uses the original envelope sender address rather than the
rewritten address for SPF analysis.
For other checks like header comparison and bypass
conditions, the rewritten envelope sender is used.
○ Fail. The domain owner’s SPF record does not authorize the sender host
machine to send email for the domain.
○ SoftFail. The domain owner’s SPF record allows the sender host machine
to send email for this domain, even though the host is not explicitly
authorized to do so.
○ Neutral. The domain owner’s SPF record makes no statement as to
whether the sender host machine is authorized to send email for the
domain.
○ None. The lack of definitive SPF information prevents an SPF check (e.g.,
an SPF record does not exist).
○ PermError. A permanent error occurs (e.g., the SPF record has an invalid
format).
○ TempError. A transient error occurs (e.g., a DNS timeout).
The following graphic summarizes the relationships among the spoofed email
filter options:
If both sender address comparison and sender authentication condition tools are
enabled, then at least one address comparison must fail and one authentication
condition must be met to trigger the filter.
6. (Optional) Select a condition name to edit an existing condition, or select Add to
create a new set of conditions.
7. Configure additional filter settings and click OK.
The spoofed email filter settings are saved.
Add or edit a spoofed email condition
1. From the section Advanced, select a condition name to edit an existing condition,
or select Add to create a new set of conditions.
The dialog box Add (or Edit) Condition displays.
2. If adding a new condition, enter a name in the field Condition Name.
For an edit operation, this field is prefilled with the existing condition name.
3. From the section SPF Result, mark the check boxes next to the SPF results, if
any, that the filter should detect.
The operator between multiple SPF result selections is “or.”
4. From the section DKIM Result, mark the check boxes next to the DKIM results,
if any, that the filter should detect.
The operator between multiple DKIM result selections is “or.”
Important
The operator that joins selected SPF and DKIM results in a
condition rule is “and.”
5. Enable additional sender authentication; mark the check box Validate Sender ID.
Selected SPF results are also used if the Sender ID option is selected.
At least one SPF result must be selected in order to use the sender ID validation
function.
The operator between these two options is “or.”
For example, when both SPF and sender ID options are selected, if a message
passes the SPF check but fails sender ID validation, the condition is considered
failed. If only SPF options are selected, that same message passes the SPF check,
and the condition is considered passed.
6. Select OK.
The spoofed email condition is saved.
Email attachment
An email attachment policy filter allows Forcepoint Email Security to examine email
attachment content and determine an attachment’s true file type. The filter is triggered
when a specified true file type is detected. Configure the email attachment filter on the
page Main > Policy Management > Filters > Add (or Edit) Filter.
An additional option is available to designate an individual file attachment extension
or filename allows the filter to detect the specified extension or filename. However,
attachment content is not inspected for true file type when this option is enabled.
Configure email attachment filter analysis
1. From the section Filter Properties, mark the check boxes for the true file types
that the filter should detect.
Expand top-level categories; click the plus sign.
Select all file types in a category; mark the check box for the top-level file type.
Select all categories; at the top of the URL Categories list, mark the check box All
file types.
2. (Optional) In the field Find file type, enter a file type category or extension to
search the list of file types.
3. Allow the filter to examine the contents of archive files; mark the check box
Analyze archive files.
This option is enabled by default.
4. In the field Custom filenames and extensions, enter a comma-separated list of
any custom filenames or file extensions that the filter should detect.
Wildcard entries (*) are not supported.
5. From Filter response, select the desired filter response:
■ Remove specified file attachments
■ Take no action
This is the default.
6. From the bottom of the section Filter Properties, click Advanced.
The Advanced settings display.
7. Send a notification email when an email message triggers the filter; mark the
check box Notify recipient that the delivered email message contained a file
attachment that triggered a filter.
8. In the text box, keep the default notification text or enter a custom message.
9. Select the location for the notification text:
■ Insert notification at top of message
■ Insert notification at bottom of message
10. Configure additional filter settings and click OK.
The email attachment filter is saved.
URL analysis
Administrator Help | Forcepoint Email Security | Version 8.5.x
URL analysis examines email content for embedded URLs and classifies them
according to a Forcepoint database of known spam URLs. When the filter detects a
URL in a message from a selected category, it applies any configured filter response,
such as removing the URL or modifying the URL to neutralize it. Configure the URL
analysis filter on the page Main > Policy Management > Filters > Add (or Edit)
Filter.
This filter uses one of the following services to perform URL analysis:
● Threat Intelligence Cloud Service, the cloud-hosted Forcepoint Master Database
of classified URLs.
● Filtering Service, used to access the local copy of the Forcepoint Master Database
maintained by your web security product (Forcepoint Web Security or Forcepoint
URL Filtering).
● Linking Service, used with a Forcepoint Web Security on-premises solution to
access the local copy of the Master Database as well as any custom categories you
have created. This service also provides dynamic category mapping updates from
the master database.
The Filtering Service URL analysis performance can be more efficient than the
Linking Service because the Filtering Service can perform bulk URL queries, whereas
the Linking Service cannot. See URL analysis, page 69, for more information about
selecting a URL analysis service and integrating with Forcepoint Web Security
solutions.
Dashboard charts summarize the instances of embedded URLs detected by the filter.
A URL Analysis message type appears in the message type or message analysis result
fields in presentation reports and dashboard charts. See Available dashboard charts,
page 27.
When the URL analysis filter triggers, the default action is to drop the message and
save it to the spam queue, where it may be released and delivered by a Personal Email
Manager user. As a result, a message that contains a malicious link may be delivered
to an inbox in your network.
Multiple URL analysis policy rules can be configured to detect and contain malicious
URLs so that they cannot be released by a Personal Email Manager end user. When
you configure a URL Analysis filter for this case, ensure that all Security URL
categories are selected in the URL Categories list. See Managing filter actions, page
189, to create a URL analysis filter action for handling email that may contain a
malicious URL.
Note
A filter action option of “Resume message analysis” is
also available so that message analysis can continue after a
URL match is detected. See Creating and configuring a
filter action, page 191.
Note
You can configure URL analysis policy rules to detect and
contain malicious URLs so that they cannot be released by
a Personal Email Manager end user. Configuration
requires all URL categories under Security to be selected.
See Managing filter actions, page 189, for information
about creating a URL analysis filter action for handling
email that may contain a malicious URL.
1. From Filter response, mark the check box for one or both of the following filter
responses; Modify matching URLs and Bypass URL analysis if message size
exceeds.
■ Modify matching URLs
Selection displays options for modifying and neutralizing URLs. Select the
desired response and notification options when a malicious URL is detected:
○ Remove matching URLs from message subject and body.
Neutralize URLs by rewriting the scheme and bracketing the last dot of
the URL domain.
Selection changes a malicious URL as follows:
Before neutralization: http://www.malicious.com.ca/index.html
After neutralization :hXXp://www.malicious.com[.]ca/index.html
○ Rewrite URLs and link text labels with custom settings.
Enter the rewritten URL in the text field Rewritten URL or leave the field
blank to remove URLs.
Enter the rewritten link text label in the text field Rewritten link text
label or leave the field blank to remove link text labels.
○ (Optional) From the section Options, mark the check box Notify recipient
when an email contains a modified URL.
In the text box, enter the desired notification text.
Maximum length of 8192 characters total, up to 990 characters per
line; a line break is two characters. The %CATEGORY% variable
can be used in the notification message to inform the recipient about
the specific categories triggered by the filter.
Select where the notification should appear; Insert notification at
top of message or Insert notification at bottom of message.
The default location is at the top of the message.
■ Bypass URL analysis if message size exceeds.
In the text field, enter a message size in KB (default is 3072).
Selection indicates to use message size to determine whether URL analysis is
bypassed.
2. Configure additional filter settings and click OK.
The URL analysis filter is saved.
● .docm
● .docx
● .pdf
● .ppt
● .pptx
● .rtf
● .txt
● .xls
● .xlsm
● .xlsx
Antispam
Administrator Help | Forcepoint Email Security | Version 8.5.x
The antispam analysis function checks email for various characteristics of spam. If the
email hybrid service is enabled and configured, it performs antispam analysis as well
(Email Security Hybrid module is required). If email hybrid service is not configured
or available, a combination of other on-premises tools is used for effective antispam
analysis. Configure the antispam filter on the page Main > Policy Management >
Filters > Add (or Edit) Filter.
The email hybrid service analyzes incoming email and blocks any message that it
recognizes as spam. Mail that the hybrid service allows into the system for processing
includes a header that contains an analysis result score. The email system uses this
score to determine how to handle the message. If that score exceeds a specified spam
threshold, the email system treats the message as spam and handles it according to
applicable policy. In this case, the on-premises email security software does not
perform its own, separate antispam analysis.
Configure antispam filter analysis
1. (If applicable) Enable hybrid service spam scoring; in the box Email Hybrid
Service analysis, mark the check box Use email hybrid service analysis with a
threshold score for spam of.
Select a spam score from the pull-down menu (floating point number between 0
and 20; default is 6).
This option only displays when the Email Security Hybrid module is configured
and running.
2. From the section Tools, mark the check boxes for one or all of the following tools:
■ Digital Fingerprinting analysis
When enabled, digital fingerprint analysis checks message content for any
digital fingerprint of known spam.
■ LexiRules analysis
When enabled, the LexiRules tool analyzes message content for word patterns
commonly found in spam.
■ Heuristics analysis
When enabled, heuristics analysis checks the message header or content for
spam characteristics.
The on-premises software performs a complete antispam examination using the
selected tools when the Email Security Hybrid module is not enabled.
3. From the section Heuristics Analysis, set the heuristics analysis sensitivity level,
from Lowest to Highest.
The default is Medium.
4. (Optional) Mark the check box Bypass antispam analysis if message size
exceeds.
In the text field, enter a message size in KB (default is 3072).
Selection indicates to use message size to determine whether antispam analysis is
bypassed.
5. Configure additional filter settings and click OK.
The antispam filter settings are saved.
Unlike spam email, commercial bulk email is often solicited by its recipients,
sometimes inadvertently. For example, a user might neglect to clear a check box to
“Share my personal information with selected partners” on a typical “opt out” privacy
rights form. The commercial bulk email filter can analyze a message to determine
whether it was sent from a third-party bulk email management company or directly
from a business. Configure the commercial bulk email filter on the page Main >
Policy Management > Filters > Add (or Edit) Filter.
If your subscription includes the Email Security Hybrid module, you can activate
commercial bulk email analysis as part of the email hybrid service pre-filtering
process. The results of pre-filtering are added to the message header passed to on-
premises email protection software, which uses the hybrid service score to determine
how the message is processed.
Configure commercial bulk email filter analysis
1. (If applicable) Mark the check box Use the results of the email hybrid service
analysis for on-premises commercial bulk email analysis.
This option only displays when the Email Security Hybrid module is configured
and running.
2. From the section Filter Properties, select the sensitivity level for the filter:
■ Normal: Analyze email source
Use this option to set the filter to detect email only from indirect (third-party)
sources of bulk email.
■ High: Analyze email source and content
Use this option to set the filter to detect both direct and indirect sources of
bulk email. This is the default.
3. (Optional) Mark the check box Bypass antispam analysis if message size
exceeds.
In the text field, enter a message size in KB (default is 3072). Selection indicates
to use message size to determine whether antispam analysis is bypassed.
4. Configure additional filter settings and click OK.
The commercial bulk email filter settings are saved.
A commercial bulk default filter action can be used along with this filter. See
Managing filter actions, page 189.
Configure the corresponding filter action to ensure that the email message that
triggered the filter is delivered to its recipient along with the attachment
(Main > Policy Management > Actions). The default queue is the virus
queue. See Managing filter actions, page 189.
■ Enforce
Message is held in a queue until advanced file analysis is performed. If
analysis determines that the attachment is clean, message processing is
resumed. If analysis determines that the attachment is malicious, the email is
quarantined. A notification email can be sent regarding the analysis result.
Configure the corresponding filter action to ensure that the email message that
triggered the filter is dropped and saved to a specified queue (Main > Policy
Management > Actions). The default queue is the virus queue. See
Managing filter actions, page 189.
a. (Only applicable if Enforce is selected in step 1) Notify the recipient when
analysis is underway, mark the check box Send enforcement notification.
Selection displays the Notification Properties section with functionality to
configure the notification email, which contains the original message as an
attachment. The message attachment is handled as follows:
○ Some file types are converted to plain text (for example, .pdf, .doc/.docx,
.xls/.xlsx, and .ppt/.pptx).
○ Files of other types are removed and only the filename appears in the
message (for example, .exe and archive files).
b. From the section Notification Properties, configure the email notification:
○ From Sender, click the radio button for identifying the notification
message sender; Administrator or Custom.
The default is Administrator. If you select this option, you must configure
a valid administrator email address on the page Settings > General >
System Settings (see Setting system notification email addresses, page
80).
Selection of Custom enables a text field to enter the sender address. If you
choose this option, you can designate only one sender address.
c. From Recipient, mark the check box for one or more message recipients;
Original email recipient, Administrator, or Custom.
The default is Administrator. If you select this option, you must configure
a valid administrator email address on the page Settings > General >
System Settings (see Setting system notification email addresses, page
80).
○ Selection of Custom enables a text field to enter the recipient addresses. If
you choose this option, you can designate one or more recipient addresses,
separated by semicolons.
○ In the text field Subject, enter the subject to be displayed when the
notification is received.
○ In the text field Content, enter the text to be displayed in the notification
message body.
Custom content
Administrator Help | Forcepoint Email Security | Version 8.5.x
Use a custom content filter to allow message analysis based on conditions you
configure. The Email module does not provide a default custom content filter.
Note
You can use the Add (or Edit) Rule page to add a rule for a
custom content filter. You must have already defined a
custom content filter before you attempt to add a custom
content rule. See Adding a rule, page 201.
Custom content filter options are configured on the page Main > Policy
Management > Filters > Add (or Edit) Filter.
Configure custom content filter
1. Configure whether to trigger the filter on the match of a single condition or on all
defined conditions; from the section Filter Properties, click the radio button
Match all conditions or Match any condition.
2. Specify the conditions; from the section Filter Conditions, click Add.
The Add Condition dialog box displays.
3. In the Add Condition dialog box, select the message attributes and operators to
configure the custom filter.
The following table displays all available message attributes and operators. All
message attributes except DKIM verification include the user-configurable entry
field Filtering criteria.
4. Click OK.
The Add Condition dialog box closes and the conditions are added to the Filter
Conditions list.
5. Change the order of filter conditions; mark the check box next to the filter in the
Filter Conditions list and click Move Up or Move Down.
6. Delete a set of filter conditions; mark the check box next to the filter in the Filter
Conditions list and click Remove.
7. Configure additional filter settings and click OK.
The custom content filter settings are saved.
Disclaimer
Administrator Help | Forcepoint Email Security | Version 8.5.x
The disclaimer filter automatically adds defined text to the beginning or end of a
message. Disclaimer filter options are configured on the page Main > Policy
Management > Filters > Add (or Edit) Filter.
Configure a disclaimer filter
1. From the section Filter Properties, in the text field Primary disclaimer, enter the
text for the primary disclaimer.
A primary disclaimer may be written in any language, as long as the email
message supports the same character set. The disclaimer text may be between four
and 8192 characters in length. A line break uses two characters.
2. In the text field Secondary disclaimer, enter the text for the secondary disclaimer.
The secondary disclaimer must be written in English, to be used when the email
does not support the primary disclaimer character set.
3. From Disclaimer position, click the radio button to specify where the disclaimer
should appear in the email, Beginning of message or End of message.
4. Allow message recipients to report a message as spam; mark the check box
Enable Report Spam feature.
Text boxes are enabled to configure either a rich text or plain text version of the
Report Spam disclaimer. The link in the rich text disclaimer sends the recipient to
the Personal Email Manager, where the message is automatically reported to
Forcepoint as spam. The plain text disclaimer provides a default message with
instructions for reporting spam to Forcepoint.
5. Configure additional disclaimer filter settings and click OK.
The disclaimer filter settings are saved.
A filter action determines the final disposition of a message. The email security
software analyzes messages and their attachments, then performs an action based on
applicable policy settings. Actions are created on the page Main > Policy
Management > Actions. You can add a defined action to a policy rule when you
configure your email policies.
In addition to defining an action used in an email policy, you can create an action for
use in an email DLP action plan in the Data Security module. See Forcepoint DLP
Administrator Help for information about DLP action plans.
For most network configurations (i.e., single standalone appliance or single appliance
cluster), the property settings available for creating an action for an email DLP policy
are the same as those for a policy action configured for the email security software.
Edit an existing filter action by clicking the action name on the page Main > Policy
Management > Actions. The Edit Action page opens, displaying the current action
properties. Modify any of the options listed in Creating and configuring a filter
action, page 191.
You can also use this operation to change any default property configured when you
created a data action. See Deliver message, page 192, for default setting details.
Add a filter action and configure its properties on the page Main > Policy
Management > Actions.
Add a new filter action
1. Click Add.
The Add Action page displays.
2. In the text field Action Name, enter a name for the action.
3. From the pull-down menu Used by, select the policy type for which this action
can be used: Email or Data.
Your selection determines which action properties are available when you create
the action.
Email policy action options include:
○ Deliver message
This is the default.
○ Resume processing
○ Drop message
DLP policy action options include:
○ Deliver message
This is the default.
○ Drop message
Deliver message
The Deliver Message option includes the same action properties for both email and
DLP policy actions. However, in some cases, the behavior for an email policy action
and a DLP policy action in a single appliance/single cluster network is different from
that for a DLP policy action that is created in a multiple appliance/multiple cluster
environment.
Configure message delivery options
1. Click Add.
The Add Action page displays.
2. In the text field Action Name, enter a name for the action.
3. From the pull-down menu Used by, select the policy type for which this action
can be used: Email or Data.
4. From the pull-down menu Action taken when a message triggers a filter, select
Deliver Message.
Selection indicates to deliver an email message to its intended recipient. This
option is the default selection for both an email policy action and a DLP policy
action.
5. Define the following message delivery options:
■ Enable header modification. Mark this check box to open a set of header
modification condition entry fields. Options include the following:
Condition Parameters
Add or rewrite header value Header name, To value
Remove header Header name
Remove header if condition matches Header name, If header contains the value
Find and replace header value Header name, Find, Replace with
Add or append to header value Header name, Add/append value
Add or prepend to header value Header name, Add/prepend value
Click the icons at the end of each condition line to delete the current header
modification condition or to add a new condition below the current condition.
■ Bcc the original unanalyzed message to. Enter at least one email address to
which to send a blind copy of the unanalyzed message; for example, the email
system administrator. Separate multiple email addresses with a semicolon.
■ Delay message delivery until. Specify a day and time for a delayed message
delivery. You may select this option to delay the delivery of a message for
some reason, for example, to send a large volume of marketing email at a time
of low corporate email activity. This action option is recommended for use
with a Custom Content filter in a policy rule. See Custom content, page 187.
Note
This option is available for a DLP action being created in a
multiple standalone appliance environment. The default
setting is the appliance E1 or P1 interface.
This setting may be customized for each standalone
appliance.
The IP addresses in the list are configured in the Forcepoint appliance. (See
the Forcepoint Appliances Getting Started Guide or Forcepoint Appliances
Command Line Interface (CLI) Guide for information.)
This feature is useful for routing a large volume of outbound email. This
action option is recommended for use with a Custom Content filter in a policy
rule. See Custom content, page 187.
■ Deliver email messages based on domain-based route. Specify message
delivery via a defined domain-based route. Select the desired route from the
pull-down menu. You can also modify the selected route by clicking Edit
Route.
Note
This option is available for a DLP action being created in a
multiple appliance/multiple cluster environment. The
default setting is the domain-based route (Settings >
Inbound/Outbound > Mail Routing). Change the default
setting by selecting Add Domain Based Route in the pull-
down menu.
This setting may be customized for each appliance.
Note
This option is available for a DLP action being created in a
multiple appliance/multiple cluster environment. The
default setting is data-security. Change the default setting
by selecting Add Queue.
This setting may be customized for each appliance.
■ Personal Email Manager portal options. This option is enabled only when
the option Save the original message to a queue is marked. Specify how the
queued message is handled in the Personal Email Manager end-user portal by
selecting one of the following:
○ View and manage messages. Allow the end user to view the message and
perform any action available in the Personal Email Manager end-user tool.
○ Do not display. Ensure the message does not appear in the Personal Email
Manager end-user portal.
○ Message log only. Pertinent information about the message appears in the
Personal Email Manager end-user portal, but the end user has only limited
access. The user cannot view message content; deliver, download, or
forward the message; or add the address to the personal Always Block or
Always Permit lists.
6. (DLP only) Mark the check box Drop attachment.
Select this option to remove an attachment from an email message as part of the
policy action. Only available for DLP policy actions.
7. (Optional) Mark the check box Send notification.
Use this option to configure a notification message to be sent regarding the
delivered email.
8. Configure the following notification message settings:
■ Sender. Identify the notification message sender, from among the following
options:
○ Original email sender.
○ Administrator (default). If you use this option, you must configure a valid
administrator email address on the page Settings > General > System
Settings (see Setting system notification email addresses, page 80).
○ Custom. If you choose this option, you can designate only one sender
address.
■ Recipient. Identify the notification message recipient from among the
following options:
○ Original email sender.
○ Original email recipient.
○ Administrator. If you use this option, you must configure a valid
administrator email address on the page Settings > General > System
Settings (see Setting system notification email addresses, page 80).
○ Custom. If you choose this option, you can designate one or more recipient
addresses, separated by semicolons.
■ Subject. Enter the subject to be displayed when the notification is received.
■ Content. Enter the text to be displayed in the notification message body.
■ Attachment. Specify whether to include the original message as an
attachment to the notification message. Select from among the following:
○ Do not attach message (default)
○ Attach original unanalyzed message
○ Attach analyzed message
9. Click OK.
The settings are saved.
Resume processing
Use the Resume Processing option when you want to continue message analysis using
the next filter in sequence if the current filter is triggered (for example, after a URL
match is detected in a message). If this option is the final triggered filter’s action, the
message is delivered.
Additional message action options are the same as for message delivery.
Configure message processing options
1. Click Add.
The Add Action page displays.
2. In the text field Action Name, enter a name for the action.
3. From the pull-down menu Used by, select the policy type for which this action
can be used: Email or Data.
4. From the pull-down menu Action taken when a message triggers a filter, select
Resume Processing.
Selection indicates to deliver an email message to its intended recipient. This
option is the default selection for both an email policy action and a DLP policy
action.
5. Additional message action options are the same as for Deliver message; configure
the options as needed.
6. Click OK.
The settings are saved.
Drop message
Use the Drop Message option to delete a message without delivering it to its intended
recipient. This option is available for both email and DLP policy actions.
Configure dropped message actions
1. Click Add.
The Add Action page displays.
2. In the text field Action Name, enter a name for the action.
3. From the pull-down menu Used by, select the policy type for which this action
can be used: Email or Data.
4. From the pull-down menu Action taken when a message triggers a filter, select
Drop Message.
Selection indicates to delete a message without delivering it to the intended
recipient.
5. Forward the dropped message; mark the check box Forward to and enter at least
one email address in the text field.
6. Send the dropped message to a queue for further processing; mark the check box
Save the original, unanalyzed message to a queue and select the desired queue
from the pull-down menu.
Marking this check box enables the Personal Email Manager portal options.
Specify how the dropped message is handled in the Personal Email Manager end-
user portal by selecting one of the following:
○ View and manage messages. Allow the end user to view the message and
perform any action available in the Personal Email Manager end-user tool.
○ Do not display. Ensure the message does not appear in the Personal Email
Manager end-user portal.
○ Message log only. Pertinent information about the message appears in the
Personal Email Manager end-user portal, but the end user has only limited
access. The user cannot view message content; deliver, download, or
forward the message; or add the address to the personal Always Block or
Always Permit lists.
Note
This option is available for a DLP action being created in a
multiple appliance/multiple cluster environment. The
default setting is data-security. Change the default setting
by selecting Add Queue.
This setting may be customized for each appliance.
Managing policies
198.
Changing policy order
After you add a policy, select it and use the Move Up and Move Down buttons to
move it up or down in the policy list in order to specify when the policy is applied.
When message conditions match a policy, subsequent policies in the list are not
applied.
You cannot change the order of default policies. They are applied last when a message
matches no other policy.
Deleting a policy
Remove a policy by marking the check box next to the policy name on the Policies
page and clicking Delete. A default policy cannot be deleted.
In addition to creating and enabling policies that protect your email system from email
threats, you can enable DLP policies that can detect the presence of sensitive data in
your organization’s email and execute appropriate actions to prevent data loss. You
can use DLP policies for inbound, outbound, and internal email.
Configure email DLP policies in the Data Security module of the Forcepoint Security
Manager (Main > Policy Management > DLP Policies > Manage Policies). A new
policy wizard provides the steps for creating a new email DLP policy. See Forcepoint
DLP Administrator Help for detailed information.
It is recommended to create a DLP policy in the Data Security module to use message
encryption. Ensure that the policy has an action plan of “encrypt.” See Handling
encrypted messages, page 157, for information about email encryption options.
You can also create filter actions for use in a DLP action plan. See Creating and
configuring a filter action, page 191, for information about configuring a DLP filter
action.
Data loss prevention policies are enabled by default in the Email Security module.
However, the Email Security module must be registered with the Data Security
module before the policies are applied to email. See Registering the DLP Module,
page 62, for instructions on how to register with the Data Security module.
Enable DLP policies
1. From the section Inbound, Outbound, or Internal on the page Main > Policy
Management > Policies, click Data Loss Protection.
The Edit Policy page displays.
2. On the page Edit Policy, set the following options:
■ Status: Enabled or Disabled. Enable or disable the DLP policy. Data loss
prevention policies are enabled by default.
■ Mode: Monitor or Enforce. Select Monitor to enable the data loss prevention
function to simply monitor your email, and select Enforce to apply DLP
policies to your email.
■ Notification. Add a notification to a message when an email attachment to
that message has been dropped as a result of a DLP policy.
a. Enable notifications; mark the check box Send notification when a
message attachment is dropped.
b. In the text field, enter the notification message text.
c. Select whether the notification text appears above or below the message
body of the mail whose attachment was dropped.
Note
A message that triggers a DLP policy whose action is
Quarantine is isolated in the Data Security module
quarantine queue, not in an Email Security module queue.
The message can be released for delivery by the Data
Security module.
3. Click OK.
The settings are saved.
Use the page Main > Policy Management > Policies to create a new inbound,
outbound, or internal policy.
1. From the section Inbound, Outbound, or Internal on the page Main > Policy
Management > Policies, click Add.
The Add Policy page displays.
2. In the text field Policy name, enter a unique policy name.
The policy name must be between 4 and 50 characters long. Use of the following
special characters in the policy name is not recommended:
*<>{}~!$%&@#."|\&+=?/;:,
Policy names can include spaces, dashes, and apostrophes.
3. In the text field Description, enter a clear and concise description of the policy.
The special character recommendations that apply to policy names also apply to
descriptions.
4. From Status, select a status of Enabled or Disabled for your policy.
5. From the pull-down menu Order, define the order in which this policy is applied.
By default, the new policy is placed at the top of the list. You cannot have multiple
policies with the same order number. If you select a number that is already in use,
the policy that currently has that number and all those below it move down one
place in the list.
6. From the section Sender/Recipient Conditions, define the sender/recipient
conditions.
By default, each new policy contains a sender/recipient condition that applies the
policy to all email senders and recipients. To add more conditions, click Add, and
then see Adding Sender/Recipient Conditions, page 200.
Note
You must define at least one sender/recipient condition. A
policy that does not contain a sender/recipient condition
will not be applied.
7. From the section Rules, edit the available rules to tailor the filters and actions to
this policy.
Click a rule name, and then see Editing rules, page 203.
8. Click OK.
The policy settings are saved.
While creating a policy on the page Main > Policy Management > Policies > Add
Policy, use the page Add Policy > Add Sender/Recipient Condition to specify the
senders and recipients to which a policy applies. You can make the policy as wide-
ranging as required; for example, applying it to all users, or all users receiving mail in
a particular domain, or specific email addresses only.
1. From the section Sender/Recipient Conditions on the page Add Policy, click
Add.
The Add Sender/Recipient Condition page displays.
2. For each sender/recipient condition, select a Sender Source and Recipient
Source:
■ Local Address. If you select Local Address, enter the sender or recipient
email addresses to use with the policy. You can use the asterisk wildcard to
specify combinations, for example:
○ *.mycompany.com applies the policy to all users with a mycompany.com
email address.
○ *[email protected] applies the policy to a subset of all email
addresses in mycompany.com, such as [email protected] and
[email protected].
○ [email protected] applies the policy to a specific user.
To apply the policy to all email addresses, enter an asterisk (*).
■ User directory. If you select User directory, select the directory source from
the pull-down menu. You must set up a user directory to connect to before
selecting this option. From the pull-down menu, select Add User Directory
to create a new directory source.
■ Domain group. If you select Domain group, select the domain source from
the pull-down menu of existing domain groups or add a new domain group by
selecting Add Domain Group.
3. Click OK.
The Add or Edit Policy page displays to finish editing or creating a policy. See
Adding or editing a policy, page 199.
Adding a rule
Administrator Help | Forcepoint Email Security | Version 8.5.x
A policy rule comprises the filter applied to a message that matches a policy’s sender/
recipient conditions and the action taken when that message triggers the filter. The
following default rules are available:
● Antivirus rule uses the default virus filter and virus default filter action.
● Email Attachment rule uses the default email attachment filter and email
attachment default filter action.
● Antispoof rule uses the default spoofed email filter and spoof default filter action.
● URL Analysis rule uses the default URL analysis filter and URL analysis default
filter action.
You can configure multiple URL Analysis rules to use settings other than the
defaults. See URL analysis, page 175, and Managing filter actions, page 189.
● Antispam rule uses the default spam filter and spam default filter action.
● Commercial Bulk rule uses the default commercial bulk email filter and
commercial bulk default filter action.
● Advanced File Analysis rule uses the default advanced file analysis filter and
advanced file analysis default filter action.
● Disclaimer rule uses the default disclaimer filter.
You may create a new rule in combination with the following filter types:
● URL analysis
● Spoofed email
● Email attachment
● Custom content
Add a policy rule
1. From the section Rules on the page Add or Edit Policy, click Add.
The Add Rule page displays.
2. In the field Rule Name, enter a name for the rule.
3. From Status, select the desired policy status, Enabled or Disabled.
The default is Enabled.
4. From the pull-down menu Order, select the order in which the rule should apply.
By default, a new rule is created in the first position. The Disclaimer rule is
always applied last.
5. In the section Filter, from the pull-down menu Filter name, select a predefined
filter type or click Add filter.
If you select Add filter, the Add Filter page displays to define a new filter. See
Creating and configuring a filter, page 169.
6. In the section Action, from the pull-down menu Action name, select a default
filter action or click Add action.
If you select Add action, the Add Action page displays to define a new action. See
Creating and configuring a filter action, page 191.
7. (Optional) From the section Action, click Edit.
The Edit Action page displays.
8. (Optional) In the section Filter Bypass Condition, click Add.
The Add Filter Bypass Conditions page displays. Create filter bypass entries in
the Sender Email Addresses, Recipient Email Addresses, and IP Address Groups
sections in one of the following ways:
■ Add a predefined email address list; click Browse next to the Email Address
File field and navigate to the desired text file. The file format should be one
email address per line, up to a maximum of eight addresses.
■ Enter an individual email address in the Email address field. Click the right
arrow button to add the individual entry to the Email Address List on the
right.
■ Select the IP address groups you want to bypass analysis, and click the arrow
button to add them to the Added IP Address Groups box. You can also define
a new IP address group on this page if desired.
Use an asterisk (*) in an address as a wildcard.
■ Delete an entry in an Email Address List; select it and click Remove.
■ Export and save an address list as a text file; click Export All.
■ Click OK to save your bypass entries.
You cannot use these settings to bypass a custom content filter.
9. Click OK.
The rule is saved and displays in the Rules section of the Edit Inbound Policy
page.
Use the buttons Move Up and Move Down to adjust rule order.
Editing rules
Use the page Add (or Edit) Policy > Edit Rule to define what happens to an email
message that matches the sender/recipient conditions and triggers the policy. This
page contains the filter and filter action that currently define the rule that you clicked.
You can also define message sender/recipient conditions that, when met, allow a
message to bypass the filter.
1. From the section Rules on the page Add or Edit Policy, click a rule name.
The Edit Rule page displays.
2. On the Edit Rule page, configure the following options:
■ Status: Enabled or disabled.
■ Filter properties. Click Edit to open the Edit Filter page.
See Creating and configuring a filter, page 169.
■ Action options. Click Edit to open the Edit Action page.
See Creating and configuring a filter action, page 191.
Note
Any change you make to existing rule components will be
reflected in the filter and action definitions you configured
on the pages Main > Policy Management > Filters and
Main > Policy Management > Actions. The changes are
not unique to the individual policy.
Edit an existing policy by clicking its name on the Policies page to open the Edit
Policy page. Edit the Description, Status, Sender/Recipient Conditions, and Rules as
described in Adding or editing a policy, page 199. You cannot edit the policy name.
You can edit policy order only for a policy you have created. You cannot edit policy
order for a default policy.
Maintaining lists of IP and email addresses that are either always blocked or always
permitted can contribute to the efficiency of your email security system. Bandwidth
and time can be saved when trusted mail can bypass some analysis features (including
antispam, commercial bulk, and URL analysis).
.
Note
Mail from addresses in the global Always Permit list is
subject to other email analysis, including antivirus
analysis, message control, connection control, directory
harvest attack, and relay control.
1. From the page Main > Policy Management > Always Block/Permit, click the
Always Block tab.
2. In the section IP Address Block List, add a predefined IP address list; click
Browse and navigate to the desired text file.
The file format should be one IP address per line, and its maximum size is 10 MB.
3. You can also enter an individual IP/subnet address in the field IP/Subnet address
field. Click the right arrow button to add the individual entry to the IP Address
List on the right.
4. Click OK.
Search a list
● From the section IP Address List or Email Address List, enter a keyword in the
text field and click Search.
Search results display in the list.
1. From the section Dynamic Always Permit List on the Always Permit tab, mark
the check box Enable Dynamic Always Permit List.
Functionality is enabled by default.
2. In the field Occurrence, enter the number of spam-free email exchanges (from 1
to 5) required before a sender/recipient pair is added to the list.
The default is 1.
3. In the field Timeout, enter a value for the timeout interval in hours (from 1 to
720).
The default is 720.
4. (Optional) Clear the list manually; click the button Clear Dynamic Always
Permit List.
If you disable this function, the list is automatically cleared.
Order of precedence
A specific order of precedence is applied for cases in which IP addresses or email
addresses appear in multiple Always Block and Always Permit lists.
Duplicate email addresses or IP addresses are allowed on both the global Always
Block and Always Permit lists, including mixtures of IP and email addresses. A
warning displays when a duplicate entry is added.
Duplicate email addresses are not allowed on the Personal Email Manager Always
Block or Always Permit lists. A warning displays when a duplicate entry is added. If
you continue to add the email address, only the current list to which the email address
is added will contain the email address. For any duplicates that existed in previous
versions of Personal Email Manager prior to this behavior being changed, an
automatic mechanism cleans up duplicates, leaving the particular entry only in the
Block List.
In the case of email addresses or IP addresses included in multiple Always Block and
Always Permit lists, the order of precedence is below:
1. Global Always Block IP List
2. Global Always Permit Email Address
3. Global Always Block Email Address
4. Global Always Permit Email IP List
5. Personal Email Manager Block/Permit Email Address Lists
6. Dynamic Permit List
Topics:
● Configuring Log Database options, page 209
● Changing the Log Database, page 215
● Configuring reporting preferences, page 217
● Working with presentation reports, page 217
The Log Database stores the records of email traffic activity and the associated email
analysis on that traffic. These data records are used to generate presentation reports of
email activity, including size and volume of email messages and identification of
senders and recipients. They are also used to generate the status charts on the
dashboard.
Administering the Log Database involves controlling many aspects of database
operations, including the timing of maintenance tasks, the conditions for creating new
database partitions, and which partitions are available for reporting. Manage Log
Database operations on the page Settings > Reporting > Log Database.
Making changes to Log Database settings on one appliance applies those changes to
all the appliances in your network.
The Log Database page is divided into six sections, as detailed in the following table.
After making changes in any of these sections of the Log Database page, click the OK
button within the section to save and implement the changes in that section.
Parameter Description
Log Database Location Provides options to configure the IP
address/instance or hostname/instance of
your Log Database server. By default, the
Log Database created at installation is
entered. See Configuring the Log
Database location, page 210.
Database Rollover Options Provides options to specify when you
want the Log Database to create a new
database partition, a process called a
rollover.
Maintenance Configuration Provides options to configure aspects of
database processing, such as the time for
running the database maintenance job,
some of the maintenance tasks performed,
and deletion of database partitions and
error logs. See Configuring maintenance
options, page 212.
Database Partition Creation Provides options to define characteristics
for new database partitions, such as
location and size options. This area also
lets you create a new partition right away,
rather than waiting for a planned rollover.
See Creating database partitions, page
213.
Available Partitions Lists all database partitions available for
reporting. The list shows the dates covered
by the partition, as well as the size and
name of each partition.
Use this list to control what database
partitions are included in reports, and to
select individual partitions to be deleted.
Log Activity Displays log activity to review database
maintenance status and event and error
messages recorded during the jobs run on
the Log Database. See Viewing log
activity, page 215.
check box is marked. If you did not select the encryption option during installation,
you can encrypt the database connection by marking the check box here.
Important
You must have imported a trusted SSL certificate to the
Log Server machine in order to use SSL for the encryption
option. See your database documentation for information
about importing a trusted certificate.
Other settings created at installation and displayed here include the designated
authentication method (Windows or SQL Server), user name, and password.
Determine the availability of the server
● From the section Log Database Location, click Check Status.
● For date-based rollovers, select either weeks or months as the unit of measure, and
specify how many full calendar weeks (from 1–52) or months (from 1–12) to keep
in a database partition before a new one is created.
Note
If the rollover begins during a busy part of the day,
performance may slow during the rollover process.
To avoid this possibility, some environments choose to set
the automatic rollover to a long time period or large
maximum size. Then, they perform regular manual
rollovers to prevent the automatic rollover from occurring.
See Creating database partitions, page 213, for
information on manual rollovers.
Extremely large individual partitions are not
recommended. Reporting performance can slow if data is
not divided into multiple, smaller partitions.
When a new database partition is created, reporting is automatically enabled for the
partition (see Enabling database partitions, page 214).
Click OK to activate changes to the database rollover options.
3. Mark the check box Enable automatic reindexing of partitions on, and then
select a day of the week to have this processing performed automatically (default
is Saturday).
4. Mark the check box Delete failed batches after and then enter a number of days
(from 1 to 365) after which to delete any failed batches. Default value is 20.
If this option is not checked, failed batches are retained indefinitely for future
processing.
If there is insufficient disk space or inadequate database permissions to insert log
records into the database, the records are marked as a failed batch. Typically, these
batches are successfully reprocessed and inserted into the database during the
nightly database maintenance job.
However, this reprocessing cannot be successful if the disk space or permission
problem is not resolved. Additionally, if the Process any unprocessed batches
option is not selected, failed batches are never reprocessed. They are deleted after
the time specified here.
5. Mark the check box Process any unprocessed batches to have the nightly
database maintenance job reprocess any failed batches.
If this option is not checked, failed batches are never reprocessed. They are
deleted after the time specified in step 4, if any.
6. Mark the check box Delete the log after, and then enter a number of days (1 to
120) after which to delete database error records. Default value is 45.
If this option is not checked, error logs are retained indefinitely.
7. Click OK to activate changes to the maintenance configuration options.
Database partitions provide flexibility and performance advantages. For example, you
can generate reports from a single partition to limit the scope of data that must be
analyzed to locate the requested information.
Use the Database Partition Creation section of the page Settings > Reporting > Log
Database to define characteristics for new database partitions, such as location and
size options. This area also lets you create a new partition right away, rather than
waiting for a planned rollover.
1. Enter the file path for creating both the data and log files for new database
partitions.
2. Under Initial Size (MB), set the initial file size (from 100 to 2048 MB) for both
the Data and Log files for new database partitions.
Note
Best practice recommends calculating the average partition
size over a period of time. Then, update the initial size to
that value. This approach minimizes the number of times
the partition must be expanded, and frees resources to
process data into the partitions.
3. Under Growth (MB), set the increment by which to increase the size (from
8 - 512 MB) of a partition’s data and log files when additional space is required.
4. Click OK to implement the path, size, and growth changes entered.
Database partitions created after these changes use the new settings.
5. Click Create to create a new partition immediately, regardless of the automatic
rollover settings.
To have the new partition use the changes made in this section, be sure to click
OK before you click Create.
Click the Refresh link in the content pane periodically. The Available Partitions
area will show the new partition when the creation process is complete.
If you later change the partition file path, you should be sure that the new database
folder exists with write privileges.
You must enable at least one partition for reporting. Use the Select none option to
disable all partitions at one time so that you can enable just a few.
Use these options to manage how much data must be analyzed when generating
reports and speed report processing. For example, if you plan to generate a series
of reports for June, select only partitions with dates in June.
Important
This selection affects scheduled reports as well as reports
that are run interactively. To avoid generating reports with
no data, make sure the relevant partitions are enabled when
reports are scheduled to run.
2. Click the Delete option beside a partition name if that partition is no longer
needed. The partition is actually deleted the next time the nightly database
maintenance job runs.
Warning
Use this option with care. You cannot recover data from
deleted partitions.
The Log Database may need to be changed when one of the following situations
occurs:
● The database IP address changes.
● The database username and password change.
● The user wants to change authentication settings.
● The user wants to use a named instance.
This type of change must be made in two locations: on the page Settings > Reporting
> Log Database and in the Email Log Server Configuration wizard.
Use the page Settings > Reporting > Log Server to view the Log Server IP address
or hostname and port number. Click Check Status to determine the availability of the
server.
4. Use the Give administrators this much warning before a scheduled report is
deleted pull-down menu to indicate how much warning (from 1–5 days) an
administrator should have before a report is deleted (default is three days).
The warning is intended to give administrators time to archive important reports
in an appropriate location before they are deleted from the email management
server.
5. Click OK to implement your changes.
Presentation reports include a set of predefined charts and tabular report templates
with which you can generate graphical reports of email message traffic activities. You
can run a report, customize a report template, or mark a frequently used report as a
Favorite. You can run any presentation report immediately, or schedule it to run at a
particular time or on a repeating cycle.
Not all report templates can be customized. Report templates that can be customized
display a different icon from reports that cannot be customized. If the Save As button
is enabled when you select a report name, then you can save and edit that report to suit
your needs. The Save As button is not enabled if you select a report that cannot be
customized.
Use the page Main > Status > Presentation Reports to generate charts and tabular
reports based on templates in the Report Catalog.
The Report Catalog organizes a list of predefined report templates and custom reports
into groups. Expand a group to see its corresponding templates and custom reports.
Click on a template or report title to see a brief description of what it includes.
To run a presentation report, select the desired report template in the Report Catalog,
click Run, and then follow the instructions given in Running a presentation report,
page 224.
To use an existing report as a starting point for creating a report variation, select a
custom report, and then click Save As, if this button is enabled. If the Save As button
is not enabled when you select the report, you cannot edit the template. See Copying a
custom presentation report, page 219.
To make changes to the report filter applied to any custom report you have created,
select the report title in the Report Catalog, and then click Edit. You cannot modify or
delete predefined report templates.
Reports that are used frequently can be marked as Favorites to help you find them
more quickly. Just click the report title in the Report Catalog, and then click Favorite
(see Working with Favorites, page 223). Mark Show Only Favorites to display only
templates that you have marked as Favorites in the Report Catalog.
To delete a custom report you have created, click Delete. If a deleted report appears in
any scheduled jobs, it will continue to be generated with that job. See Viewing the
scheduled jobs list, page 229, for information on editing and deleting scheduled jobs.
Note
Changes to report settings made on one appliance are
applied to all network appliances.
Use the buttons at the top of the page to schedule reports to run later, view scheduled
report jobs, and view and manage reports created by the scheduler.
● Click Job Queue to see and manage a list of existing scheduled jobs, along with
the status of each job. See Viewing the scheduled jobs list, page 229.
● Click Scheduler to define a job containing one or more reports to be run at a
specific time or on a repeating schedule. See Scheduling a presentation report,
page 225.
● Click Review Reports to see and manage a list of reports that were successfully
scheduled and run. See Reviewing scheduled presentation reports, page 231.
Use the Save As New Report page to create an editable copy of a custom report
template. Not all templates can be used to create a new custom report. Use the
following steps to copy a custom presentation report:
1. Select the custom report in the Report Catalog and, if it is enabled, click Save As.
If the Save As button is not enabled, you cannot copy and customize the selected
report.
2. In the Presentation Reports > Save As New Report page, replace the report
catalog name with a name that will make it easy to identify the new report. (The
default name is the name of the original report template, with a number appended
to indicate that it is a copy.) The name must be unique and can have up to 85
characters.
3. Click either Save or Save and Edit.
■ If you click Save, you are returned to the Presentation Reports page, where
the new report appears in the Report Catalog. To customize the report at any
time, select its name, and then click Edit.
■ If you click Save and Edit, you are taken directly to the Edit Report Filter
page. The new report is also added to the Report Catalog.
4. Edit the report filter to modify the report. The report filter controls elements such
as which email senders or recipients are included in your custom report.
For instructions, see Defining the report filter, page 219.
Report filters let you control what information is included in a report. For example,
you might choose to limit a report to selected email senders, email recipients, or
message analysis results (for example, clean, virus, spam, commercial bulk, or data
loss prevention). You can also give a new name and description for the entry in the
Report Catalog, change the report title, specify a custom logo to appear, and designate
the new report as a Favorite.
Note
Using a custom logo requires some preparation before you
define the report filter. You must create the desired graphic
in a supported graphic format and place the file in the
appropriate location. See Customizing the report logo,
page 220.
The filter for predefined report templates cannot be changed. You can edit the filter for
a custom report when you create it by choosing Save and Edit on the Save As New
Report page, or select the report in the Report Catalog at any time and click Edit.
The Edit Report Filter page has separate tabs for managing different elements of the
report. Select the items you want on each tab, then click Next to move to the next tab.
For detailed instructions on completing each tab, see:
● Setting general report options, page 220
● Selecting email senders for the report, page 221
● Selecting email recipients for the report, page 221
● Selecting message analysis results for the report, page 222
On the Save tab, choose whether to run or schedule the report, and save the report
filter. See Saving the report filter definition, page 222.
■ Select Save and schedule to save the report filter and open the Scheduler
page. See Scheduling a presentation report, page 225.
3. Click Finish to save the report name and description and implement the selection
made in step 2.
You can mark any presentation report, either template or custom, as a Favorite. Use
this option to identify the reports you generate most frequently and want to be able to
locate quickly in the Report Catalog.
To mark a report as a Favorite:
1. On the Presentation Reports page, select a report in the Report Catalog that you
generate frequently, or want to be able to locate quickly.
2. Click Favorite.
A star symbol appears beside any Favorite report name in the list, letting you
quickly identify it when the Report Catalog is displayed.
3. Mark the Show Only Favorites check box above the Report Catalog to limit the
list to those marked as Favorites. Clear this check box to restore the full list of
reports.
If your needs change and a favorite report is no longer being used as frequently, you
can remove the Favorite designation as follows:
1. Select a report that shows the Favorite star symbol.
2. Click Favorite.
The star symbol is removed from that report name in the Report Catalog. The
report is now omitted from the list if you choose Show Only Favorites.
Use the page Presentation Reports > Run Report to generate a single report
immediately. You can also create jobs with one or more reports and schedule them to
run once or on a repeating cycle (see Scheduling a presentation report, page 225).
Note
Before generating a report in PDF format, make sure that
Adobe Reader v7.0 or later is installed on the machine
from which you are accessing the email management
server.
Before generating a report in XLS format, make sure that
Microsoft Excel 2003 or later is installed on the machine
from which you are accessing the email management
server.
If the appropriate software is not installed, you have the
option to save the file.
To run a report:
1. Select the report you want to run in the Report Catalog and click Run to open the
Run Report page.
2. Select the Report date range to define the time period covered in the report.
If you select Custom, specify the Report start date and Report end date for the
report.
3. Select a Report output format for the report.
XLS Excel spreadsheet. XLS files are formatted for reuse, and can be
opened in Microsoft Excel.
PDF Portable Document Format. PDF files are formatted for viewing, and
can be opened in Adobe Reader.
HTML HyperText Markup Language. HTML files are formatted for viewing,
and can be opened in a Web browser.
4. If you selected a Top N report type, choose the number of items to be reported.
5. Specify how you want the report to be generated:
■ Select Run the report in the background (default) to have the report run
immediately as a scheduled job. Optionally, you can provide an email address
to receive a notification message when the report is complete or cannot be
generated. (You can also monitor the job queue for report status.)
If you run the report in the background, a copy of the completed report is
automatically saved, and a link to the report appears on the Review Reports
page.
■ Deselect Run the report in the background to have the report run in the
foreground. In this case, the report is not scheduled, and does not appear on
the Review Reports page.
If you run the report in the foreground, the report is not automatically saved
when you close the application used to view the report (Microsoft Excel,
Adobe Reader, or a Web browser, for example). You must save the report
manually.
Note
If you plan to run multiple reports in the foreground, make
sure that you use the embedded Close button to close the
pop-up window used to display the “generating report” and
“report complete” messages. If you use the browser’s
close (X) button, subsequent attempts to run reports in the
foreground may fail until you navigate away from the
Presentation Reports page, come back, and run the report
again.
6. Click Run.
■ If you scheduled the report to run immediately, the completed report is added
to the Review Reports list. To view, save, or delete the report, click Review
Reports at the top of the Presentation Reports page.
■ If you ran the report in the foreground, a new browser window appears,
displaying report progress. HTML reports appear in the browser window
when complete; with PDF or XLS formats, you have a choice of whether to
open the report or save it.
7. To print a report, use the print option offered by the application used to display the
report.
For best results, generate PDF output for printing. Then, use the print options in
Adobe Reader.
You can run presentation reports as they are needed, or you can use the page
Presentation Reports > Scheduler to create jobs that define a schedule for running
one or more reports. In an appliance cluster, only the primary machine can schedule a
report.
Reports generated by scheduled jobs are distributed to one or more recipients via
email. As you create scheduled jobs, consider whether your email server will be able
to handle the size and quantity of the attached report files.
The completed reports are also added to the page Presentation Reports > Review
Reports (see Reviewing scheduled presentation reports, page 231).
You can access the Scheduler in one of the following ways:
● Click Scheduler at the top of the Presentation Reports page (above the Report
Catalog).
● When editing a report filter, choose Save and schedule in the Save tab, and then
click Finish (see Defining the report filter, page 219).
● Click the job name link on the Job Queue page to edit a job.
● Click Add Job on the Job Queue page to create a new job.
The Scheduler page contains several tabs for selecting the reports to run and the
schedule for running them. For detailed instructions on completing each tab, see:
● Setting the schedule, page 227
● Selecting reports to schedule, page 228
● Setting the date range, page 228
● Selecting output options, page 228
After creating jobs, use the Job Queue to review job status and find other helpful
information (see Viewing the scheduled jobs list, page 229).
When a scheduled presentation report has run, the report file is sent to recipients as an
email attachment. The name of the attachment is the report name. For example, for a
report with an output format of PDF, an attachment file may be named Email Hybrid
Service Messages.pdf.
Scheduled reports are also automatically saved to a report output directory on the
email management server (C:\Program Files (x86)\Websense\Email Security\ESG
Manager\tomcat\temp\report\output, by default). The name of the attachment sent
via email does not match the name of the file stored in the output directory. The best
way to find a specific report is to use the Review Reports page, which can be searched
by date or job name, as well as report name.
Reports are automatically deleted from the Review Reports page and the report output
directory after the period specified on the page Settings > Reporting > Preferences
(5 days, by default). to retain the reports for a longer time, include them in your
backup routine or save them in a location that permits long-term storage.
An alert is displayed on the Review Reports page for a period of time before the report
is deleted (3 days, by default). Use the page Settings > Reporting > Preferences to
change this warning period.
Depending on the number of reports you generate daily, report files can occupy
considerable amounts of disk space. Be sure adequate disk space is available on the
email management server. If the report output directory grows too large before the
files are automatically deleted, you can delete the files manually.
Forcepoint software generates the report in the format you choose: XLS (Microsoft
Excel), PDF (Adobe Reader), or HTML. If you choose HTML format, the report may
display in the Email module content pane. Reports displayed in the content pane
cannot be printed or saved to a file. To print or save a report to file, choose the PDF or
XLS output format.
Important
To display presentation reports in PDF format, Adobe
Reader v7.0 or later must be installed on the machine from
which you are accessing the email management server.
To display presentation reports in XLS format, Microsoft
Excel 2003 or later must be installed on the machine from
which you are accessing the email management server.
Note
It is advisable to schedule report jobs on different days or
at different times, to avoid overloading the Log Database
and slowing performance for logging and interactive
reporting.
1. Enter a name that uniquely identifies this scheduled job in the Job name field.
2. Select Recurrence Options for the job based on the Recurrence Pattern you want,
as follows:
3. In the Schedule Time box, set the start time for running the job.
The job begins according to the time on the email appliance.
Note
To start generating the scheduled reports today, select a
time late enough that you can complete the job definition
before the start time.
4. In the Schedule Period box, select a date for starting the job. Options for ending
the job are as follows:
XLS Excel Spreadsheet. Recipients must have Microsoft Excel 2003 or later
to view the XLS reports.
PDF Portable Document Format. Recipients must have Adobe Reader v7.0 or
later to view the PDF reports.
HTML HyperText Markup Language. Recipients must have a Web browser.
2. Select the number of items you want to appear in a Top format report from the
Top N pull-down menu. The value range is from 1 to 200; default value is 10.
3. Enter recipient email addresses for report distribution.
Each address should be separated by a semicolon.
4. Optionally, you can also enter email addresses to notify recipients that report
generation failed.
5. Mark the Customize subject and message body of notification email check
box, if desired. Then, enter the custom subject and body text for this job’s
distribution email.
6. Click Save Job to save and implement the job definition, and display the Job
Queue page.
7. Review this job and any other scheduled jobs. See Viewing the scheduled jobs list,
page 229.
The page Presentation Reports > Job Queue lists the scheduled jobs created for
presentation reports. The list gives the status for each job, as well as basic information
about the job, such as how frequently it runs. From this page, you can add and delete
scheduled jobs, temporarily suspend a job, and more.
You can search for a particular job by entering a search term in the Job name entry
field at the top of the page. Click Go to begin the search.
Click Clear to remove the current search term, and then either perform a different
search or click Refresh at the bottom of the page to display the complete list of
reports.
Use the options on the Job Queue page to manage the jobs. Some of the buttons
require that you first mark the check box beside the name of each job to be included.
Action Description
Job name link Opens the Scheduler page, where you can edit the job definition. See
Scheduling a presentation report, page 225.
Run Now Starts running any job that has been selected in the list immediately. This
is in addition to regularly scheduled job runs.
Add Job Opens the Scheduler page where you can define a new job. See Scheduling
a presentation report, page 225.
Delete Deletes from the Job Queue any job that has been selected in the list. After
a job has been deleted, it cannot be restored.
To temporarily stop running a particular job, use the Disable button.
Enable Reactivates a disabled job that has been selected in the list. The job begins
running according to the established schedule.
Disable Discontinues running an enabled job that is selected in the list. Use this
option to temporarily suspend a job that you may want to restore in the
future.
Refresh Updates the page with the latest data
Click the Details link in the History column and use the page Presentation Reports >
Job Queue > Job History to view information about recent attempts to run the
selected job. The page lists each report separately, providing the following
information:
Use the page Presentation Reports > Review Reports to find, access, and delete
scheduled reports. By default, reports are listed from newest to oldest.
To view any report in the list, click the report name.
● If the report is a single PDF or XLS file, you may be given the option to save or
open the report. This depends on your browser security settings and the plug-ins
installed on your machine.
● If the report is very large, it may have been saved as multiple PDF or XLS files
and stored in a ZIP file. The file is compressed using ZIP format. Save the ZIP
file, then extract the PDF or XLS files it contains to view the report content.
● Hover the mouse pointer over the report icon next to the report name to see if the
report is one or multiple files.
To limit the list to reports that will be deleted soon, mark the Show only reports due
to be purged check box. When this option is selected, the report search functions are
not available. The length of time that reports are stored is configured on the Settings >
Reporting > Preferences page (see Configuring reporting preferences, page 217).
To search the report list, first select an entry from the Filter by pull-down menu, and
then enter all or part of a job name or date. The search is case-sensitive. You can
search by:
● The report or job name
● The date the report was created (Creation Date)
● The name of the administrator that scheduled the report (Requester)
● The date the report is due to be deleted (Purge Date)
Topics:
● Managing a Secure Sockets Layer (SSL) certificate, page 233
● Creating the quarantine mail notification message, page 234
● Authorizing use of block and permit lists, page 238
● Enabling user account management, page 238
● Personal Email Manager General Settings, page 239
● Customizing the Personal Email Manager end-user portal, page
240
Use the page Settings > Personal Email > SSL Certificate to manage the Personal
Email Manager SSL certificate, which enables secure email transmission for Personal
Email Manager appliances. You can use the default certificate provided with Personal
Email Manager, or you can import a new enterprise certificate from a certificate
authority (CA).
After email product installation, default certificate information appears on the page
Settings > Personal Email > SSL Certificate, in the Certificate Details section.
Details include the certificate version, serial number, issuer, and expiration date.
Importing a certificate
Importing an SSL certificate to Personal Email Manager from a CA replaces the
current certificate. Personal Email Manager certificate information is automatically
copied to a new appliance when it is added to the Forcepoint Security Manager Email
Security module.
Use the following procedure to import a certificate:
1. Click Import on the page Settings > Personal Email > SSL Certificate, below
the Certificate Details area.
2. Click Yes in the confirmation dialog box.
An Import Certificate area appears below the Import button.
3. Enter the certificate filename in the Import Certificate field or navigate to it
using Browse.
File format must be .jks, .p12, or .pfx.
4. An SSL certificate file should be password protected. Enter a password in the
Certificate password field.
Maximum length is 100 characters; do not use special characters.
5. Mark the Private key alias check box and enter an optional alias (or identifier) for
the private key in the entry field.
6. Mark the Private key password field and enter an optional password for the
private key in the entry field.
Maximum length is 100 characters.
7. Click OK.
8. Restart the Personal Email Manager service in the appliance manager to activate
the new certificate.
The Personal Email Manager notification message alerts users that email addressed to
them has been blocked. The notification message list includes mail sent to all a user’s
email addresses, including alias addresses. The notification is sent to a user’s primary
email address.
The page Settings > Personal Email > Notification Message is composed of four
sections:
● Notification Message Links, in which you specify the IP address and port for
Personal Email Manager facility end-user access (see Specifying Personal Email
Manager access, page 235).
● Notification Message Schedule, where you set the frequency with which a
message is sent informing a user of blocked messages (see Scheduling the
notification message, page 236).
● Notification Message Template, in which you format the content and appearance
of the notification message. Users see this message in their inbox when they have
blocked email (see Using the notification message template, page 236).
● Recipients List, in which you designate the user directories whose members will
receive notification messages (see Creating the notification message recipient list,
page 237).
After you complete all four sections, click OK to enable the delivery of notification
messages.
Note
If you use the C appliance interface for Personal Email
Manager access, you must use the default port of 9449.
Use the Custom URL field to enter a URL path for Personal Email Manager user
access that is different from the one automatically generated using the IP address and
port entered above. This URL is also used for the notification message hyperlinks.
The path can have a maximum length of 250 alphanumeric characters, hyphens, and
underscores; a hyphen cannot be the first character. The custom URL supports only
one subdirectory (for example, www.mycompany.com/pemserver) and should use the
port designated in the Port field.
Deploy a group of email appliances to handle Personal Email Manager end-user
activities. Configuring an appliance cluster for Personal Email Manager access can
enhance performance by activating an appliance load-balancing feature. If the
appliance you access is configured in a cluster, the appliance forwards Personal Email
Manager access requests to other cluster machines using a round robin mechanism.
Add and remove appliances from a cluster using the page Settings > General >
Cluster Mode (see Configuring an appliance cluster, page 84).
■ Not Spam, to allow the user to report a blocked message that should not be
classified as spam
■ Delete (default selection), to remove a blocked message from the user’s
blocked message list
■ Add to Always Block list, to allow an authorized user to add an address to a
personal Always Block List
■ Add to Always Permit list, to allow an authorized user to add an address to a
personal Always Permit List
3. Enter your company name and other relevant information in the Company entry
field.
4. Enter a brief description of the email filtering product in the Description entry
field (default is “Forcepoint Email Protection Solutions”).
5. Enter the sender username in the Sender username field.
6. Enter the sender email address for the notification message in the Sender email
address field.
7. Configure the subject line that you want the notification message to display in the
Subject field. This subject will appear in the user’s inbox when the notification
message is received.
8. Designate some appropriate header text for the notification message in the
Header field.
9. Enter some appropriate footer text for the notification message in the Footer field.
Configure some Personal Email Manager user account options on the page
Settings > Personal Email > User Accounts. Allow users to manage personal
Always Block and Always Permit lists, delegate blocked message management to
another individual, and manage multiple user accounts in a single Personal Email
Manager session.
User account management configuration settings made on one appliance are applied
to all the appliances in your network.
Use the options on the Personal Email Manager General Settings page to configure
both the end-user portal and Personal Email Manager notification messages.
Note
Both Envelope Sender and From: address are used to
enforce Always Block and Always Permit policies.
Use the page Settings > Personal Email > End-user Portal to customize the
end-user facility’s appearance and to designate the quarantined message queues whose
messages are displayed in Personal Email Manager end-user notification email.
You can also customize the end-user portal by having your company name and logo
appear there. Use the following procedures to customize your Personal Email
Manager end-user portal in the End-user Portal Options section:
1. Enter your company name in the field Company name.
2. In the Logo field pull-down menu, select Custom.
3. The Upload logo field appears. Browse to your logo file and select it for upload.
The logo file must be:
■ A .gif, .png, .jpeg, or .jpg file format
■ Up to 1 MB and 120 x 34 pixels in size
You can change the logo file you use by clicking Browse next to your logo filename
and browsing to a new logo file.
Warning
Enabling this feature is not recommended because a
malicious script hosted remotely may be disguised in the
email as an image, allowing the attacker to compromise
your system.