2. IT Directors
Small to medium businesses from
25+ supported by Exchange
Exchange Server Managers
Policy Patrol – Mail Security
Security features not offered by
Microsoft exchange server
3. In addition to Disclaimers -
Use with any client or mobile device
Advanced email management, rules
and spam filtering
Integration with Metascan 1, 4, 8 or
16 +
Checks file extension rename to get
around rules
Strips malware
Quarantine, un-quarantine features
Detect previous disclaimers
Over time saves server back up
space and the annoyance of
repetitive email disclaimers
Policy Patrol – Mail Security
System Requirements
• Windows Server 2003, 2008/2008 R2 or
2012/2012 R2.
• Microsoft Exchange Server 2003, 2007,
2010, 2013, Windows Small Business
Server 2003, 2008, 2011, Lotus Domino
• Microsoft .NET Framework 2.0.
Notes de l'éditeur
Policy Patrol - Mail Security
A on premises Software as a subscription solution that includes Policy Patrol Disclaimers + Anti-spam, content filter and email management tools that can operate on top of your existing spam filter including Multi-Antivirus scanning using Metascan technology.
Works on top of Exchange to provide:
- Multi-scanning malware
- Attachment sanitization
- User Based quarantine
- Grey listing
- Quarantine notifications
Who uses the product by job function and industry?
IT Directors of Companies and Organizations
Small to medium businesses from 25+ supported by Exchange
Server Managers Looking for additional security features not offered by Microsoft exchange server
Why should they choose/use this product?
Offers additional security features.
More advanced email management, rules and spam filtering.
Integration with Metascan 1, 4, 8 or 16 +.
Checks if a file extension has been renamed to get around rules.
File extension conversion from text to pdf to jpeg, etc to strip out the malware.
Allows user and administrators to quarantine, un-quarantine or leave and delete email which can be configured by the admin.
Where does exchange leave off and mail security pick up?
Multi-scanning malware
Attachment sanitization
User Based quarantine
Grey listing
Quarantine notifications
Key Features and Limitations?
All the benefits of Policy Patrol Disclosures +
Can be used with any client or mobile device.
Can include social media and personalized links and images.
DNS Uses block lists.
Gray lists.
Includes support for anti-fishing protection.
Basic email back up function and data loss prevention.
Multi-scanning, attachment sanitization and spoofing protection.
Eliminates far more spam and has better content filtering that exchange alone.
Pricing.
Up to 25 FREE: Please contact us directly via email at sales@opswat.com to add Metascan 1, 4, 8 or 16+.
Annual subscription: 26 – 100 mail boxes = $16 with Metascan 1, $18 with Metascan 4, $58 with Metascan 8.
Annual subscription: 101 – 250 mail boxes = $12 with Metascan 1, $14 with Metascan 4, $22 with Metascan 8.
Additional pricing is available for a greater number of mail boxes and / or utilizing Metascan 4, 8 or 16 +.
Vocabulary.
DNS – Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the internet or private network. A DNS server is like a phone book that helps your computer find the address of a website you are trying to visit.
DNSBL – DNS Black Listing
Blacklist – A DNS-based Black List (DNSBL) or Real-time Black List (RBL) list of IP addresses which are often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
Gray-list – Grey-listing relies on the fact that most spam and viruses only try to deliver the message once. Grey-listing temporarily denies the first attempt, telling the spammer to try again (450 Please try again later.) On the next attempt the message is accepted. If a mail server passes this test enough times it is added to a whitelist so it does not have to pass the grey-listing test again.
Whitelist - A DNS-based White List or Real-time White List list of IP addresses which are known to be trusted mail servers and domains. If a spam filter keeps a whitelist, mail from the listed email addresses, domains, and or IP addresses will always be allowed.
often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
Phishing - The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
Spoofing -