McAfee Email Security Scanning Blade MCS-BLDE-E1XA ユーザーズマニュアル
製品コード
MCS-BLDE-E1XA
Data Sheet
Email Threat Protection
McAfee Content Security Blade Server uses McAfee’s award-winning anti-spam technologies to
detect and block spam, phishing, and zero-day attacks. Tests by independent test labs demonstrate
that McAfee consistently blocks over 98 percent of spam, including hard-to-detect image spam,
thanks to its powerful combination of detection technologies and streaming updates.
detect and block spam, phishing, and zero-day attacks. Tests by independent test labs demonstrate
that McAfee consistently blocks over 98 percent of spam, including hard-to-detect image spam,
thanks to its powerful combination of detection technologies and streaming updates.
• Detect and clean viruses and other malware threats—block both known and unknown
viruses and spyware before they can enter the network or can affect endpoints
• Use true file types to scan every attachment to keep your users safe
• Protect your entire messaging infrastructure against directory harvest and other forms of attacks
• Reduce the window of vulnerability for new malware from hours or days down to minutes
Security Policies that Fit
Configure Active Directory or Lightweight Directory Access Protocol (LDAP)-based security
policies to meet the needs of different groups in your organization.
policies to meet the needs of different groups in your organization.
Powerful Email Quarantine
McAfee Quarantine Manager provides easy, centralized management of spam and other forms
of quarantined email. Users receive daily summaries of quarantined messages, and users can
release messages as needed. With a Microsoft Outlook plug-in, users configure their own block
and allow lists.
of quarantined email. Users receive daily summaries of quarantined messages, and users can
release messages as needed. With a Microsoft Outlook plug-in, users configure their own block
and allow lists.
Advanced Content Filtering
Control sensitive data in order to comply with email privacy regulations and corporate
governance demands. Administrators can:
governance demands. Administrators can:
• Build custom content filtering policies or utilize the built-in lexicons for email privacy
regulations, objectionable content, and intellectual property
• Scan keywords and regular expressions inside messages and attachment
• Set up filters based on file type or message size
Easy to Manage
Management is simple and flexible. Regardless of how many scanning blades you have installed,
they are all managed as if you deployed only one device. A single web-based management
console allows you to:
they are all managed as if you deployed only one device. A single web-based management
console allows you to:
• Easily make changes to security policies and system configuration
• View consolidated summaries of events and system health
• Monitor system effectiveness and run ad-hoc or scheduled reports
• Effectively plan capacity based on comprehensive utilization metrics
• Update the system with virus definitions (DATs), engines, patches
Reliability
McAfee Content Security Blade Server delivers the high reliability and availability that you need:
• Redundant fans, power supplies, and management blades plus automatic failover with no
downtime
• The system automatically responds to fluctuating traffic demands and system status
• All parts are hot-swappable
• RAID-1 configuration of all hard disks protect configuration and message queue data
• Increase capacity in minutes by simply adding additional scanning blades with no downtime
KEY FEATURES
Proven anti-spam
technology
technology
• Detect and block more
than 98 percent of spam,
including the latest
image, PDF, and MP3
spam attacks, with no
critical false positives
(as measured by third-
party tests)
including the latest
image, PDF, and MP3
spam attacks, with no
critical false positives
(as measured by third-
party tests)
•
Streaming updates every
two to three minutes
quickly shut down new
forms of spam
two to three minutes
quickly shut down new
forms of spam
•
Anti-spam effectiveness
is achieved through
a combination of
technologies including:
is achieved through
a combination of
technologies including:
°
IP reputation filtering
°
Domain-name
reputation scoring
°
Heuristic detection
°
Content filtering
°
Sender authentication
based on the Sender
Policy Framework
(SPF) and DomainKeys
Identified Mail (DKIM)
standards
Policy Framework
(SPF) and DomainKeys
Identified Mail (DKIM)
standards
°
Greylisting, which
tracks and allows mail
from known legitimate
senders to pass while
temporarily rejecting
unknown senders
from known legitimate
senders to pass while
temporarily rejecting
unknown senders