Importing a certificate whose CN corresponds to the host name of the UTM is optional. If such a certificate is not imported, the mail relay uses a self-signed certificate for the purpose of transport encryption.
TLS encryption as a client:
encrypt
Ensures that emails are sent over an encrypted connection in all instances.
SMTP routes
The mail server should reject emails to addresses without a mailbox during the SMTP dialog.
section
Settings
Validation of recipients for valid e-mail addresses must be activated. This means that only emails that go to a recipient that is also registered on the mail server are accepted.
Verify email address: The following values are available:
SMTP
The Securepoint appliance inquires the internal mail server in the background.
The validation must also be active on the mail server! (Recipient Verification e.g. for an exchange server)
LDAP
The Securepoint appliance inquires the active directory server, for example. For authentication via LDAP, the corresponding server must be configured under → Authentication →AD/LDAP Authentication. The user does not have to be an administrator, a user with viewing rights is sufficient.
Local Email Adress List
The known addresses are managed locally on the UTM
Edit local email address list
All known addresses are here.
Add email address email addresses can be added email addresses can be removed
Greylisting
Greylisting causes the delivery attempt of an unknown mail server to be rejected at first.
Spambots usually do not make any further delivery attempts, so the delivery of spam has already been successfully stopped before the mail had to go through the spam filter engine.
A regular mail server, on the other hand, will make another, this time successful, delivery attempt after a certain period of time.
In addition to fending off simple spambots through greylisting, valuable time is also gained to load new definitions to detect any new spam waves.
Settings
Labeling
Recommendation
Description
Greylisting:
On
Enables greylisting.
SPF:
On
If the Sender Policy Framework of the sender domain is correctly entered in the DNS, the mail is delivered without delay.
In the SPF record, all mail server IP addresses of the sender are entered that are authorized to send emails.
The recipient then checks the mail header field "Mail From" or the "HELO" command to see which domain is entered or named there and whether it matches one of the IP addresses in the SPF record. If the IP address of the sender does not match those of the SPF record, the mail goes into greylisting.
Add header:
On
By default, an additional greylisting entry is added for each recipient listed in the mail header.
This can cause issues if there are many recipients in the header.
When disabled No no greylisting headers will be inserted.
Automatic allow list for:
60 days
The value can be increased up to 60 days.
Delay:
2 minutes
Time frame given to the sending mail server to make another delivery attempt.
Depending on the configuration of the sending mail server, redelivery may be delayed by much more than the configured time frame (default settings 2 minutes) - in extreme cases by several hours.
If a larger value is set for Delay for instance:
30 minutes selected, the scan engine may have a higher probability of detecting new outbreaks with redelivered emails, because the virus signatures may have been updated in the meantime.
Extended
Greeting Pause
Labeling
Recommendation
Description
Status
On
Ähnlich wie das Greylisting macht sich die Greeting Pause zu Nutze, dass in Spam-Bots das SMTP-Protokoll nicht zur Gänze implementiert ist. Damit lassen sich diese von regulären Mailservern unterscheiden.
Das Greeting ist eine Begrüßung, die vom Mailrelay an den sendenden Mailserver übermittelt wird.
Diese könnte z. B. so aussehen:
220 firewall.foo.local ESMTP Ready
When the SMTP protocol is fully implemented, a mail server will wait for and evaluate this greeting line before sending further SMTP commands to initiate mail delivery. A spam bot will start sending commands immediately after the TCP handshake is completed. In this case, the mail relay will not accept any further commands and will terminate the connection.
Recipient limitations
Status
On
The option blocks mails that have more than a defined number of recipient addresses.
Limit25 recipient
(Leave default value.)
Limitations per client
Limit connections
On
Here you can define how many connections the mail relay accepts at the same time.
Exceptions can be defined for known mail servers as a host list. Allowed connections:1 (Leave default value.) The connection limit counteracts possible DDOS attacks.
Enable access control
On
Possible DOS attacks are counteracted by the access control.
Time slot:
60 seconds
Connections per time slot:
5
Exceptions
Host
If outbound mails are also to be sent via the mail relay of the UTM, the corresponding mail servers should be added.
Other
HELO required
On
If HELO is enabled, the SMTP client is requested to give its name. Must absolutely remain activated (default) This option exists to ensure backward compatibility.
Mail filter
Under → Applications →Mail filter many different Filter rules should be adjusted and/or newly created:
Filter rules
Filter rule
Description
Filter rule »is classified as SPAM / SMTP«
Spam_SMTP
When an email is received
and protocol
is SMTP
and is classified as SPAM
Run action:
Edit filter rule: Reject email
Default: Quarantine email
Mail servers or senders whose emails are classified as SPAM have attracted attention as SPAM sources in the past. Emails from these systems should not be accepted under any circumstances.
Accepting such emails (even if they are quarantined afterwards) only makes the email domain more interesting for potential SPAM and virus senders.
Securepoint recommends that these mails be rejected.
Filter rule »is classified as SPAM / POP3«.
Spam_POP3-Proxy
When an email is received
and protocol
is POP3
and is classified as SPAM
Run action:
Edit filter rule: Filter applicable content
Default: Tag email in subject with [Marked as spam]
Securepoint recommends that applicable content in these mails be removed.
When using the POP3 proxy, mails must not be rejected!
Filter rule »is classified as suspicious«.
Possibly_Spam
When an email is received
and is classified as suspicious.
Run action:
Edit filter rule: Quarantine email
Default: Tag email in subject with [Marked as possibly spam]
Emails that are classified as suspicious contain suspicious patterns and content and should not be delivered to the user's mailbox.
Securepoint recommends that these mails be quarantined.
When using the POP3 proxy, this option must not be used!
Here we recommend do action:
filter email content
When using POP3, Securepoint recommends only accepting emails from known senders.
In addition, create an Allowlist rule (see below) that is directly in front of this rule so that known senders are forwarded, but spam etc. is still filtered:
Create a new rule:Rule Name:WL-Rule Name If an email is received:
The same criteria as in this section above. Button +
and sender
is in
Input in the click box: » known_sender.com
do action:
Edit filter rule:mark email in subject withWarning not to open the attachment unless it has been announced
Default: accept email
Filter rule »contains a virus«
Virus
If an email is received:
and contains a virus.
do action:
Edit filter rule:Reject email
Default: filter email content
Accepting such emails (even if they are quarantined afterwards) only makes the email domain more interesting for potential SPAM and virus senders.
Securepoint recommends that these mails be rejected.
When using the POP3 proxy, this option must not be used!
Here we recommend do action:
filter email content
When using POP3, Securepoint recommends only accepting emails from known senders.
In addition, create an Allowlist rule (see below) that is directly in front of this rule so that known senders are forwarded, but spam etc. is still filtered:
Create a new rule:Rule Name:WL-Rule Name If an email is received:
The same criteria as in this section above. Button +
and sender
is in
Input in the click box: » known_sender.com
do action:
Edit filter rule:mark email in subject withWarning not to open the attachment unless it has been announced
Executable files should not be delivered. They are filtered based on the file extension. Can be added to as needed.
Securepoint recommends that these mails be quarantined.
When using the POP3 proxy, this option must not be used!
Here we recommend do action:
filter email content
When using POP3, Securepoint recommends only accepting emails from known senders.
In addition, create an Allowlist rule (see below) that is directly in front of this rule so that known senders are forwarded, but spam etc. is still filtered:
Create a new rule:Rule Name:WL-Rule Name If an email is received:
The same criteria as in this section above. Button +
and sender
is in
Input in the click box: » known_sender.com
do action:
Edit filter rule:mark email in subject withWarning not to open the attachment unless it has been announced
Default: accept email
Filter rule »is a bulk email«
Add rule Bulk_Mail
Rule Name:Bulk_Mail If an email is received:
and is a bulk email
do action:
Edit filter rule: Quarantine email
Default: accept email
Emails classified as BULK are currently being sent out in masses and should not be delivered to the user's mailbox. These could be, for example, the first emails of a new SPAM wave.
Securepoint recommends that these mails be quarantined.
When using the POP3 proxy, this option must not be used!
Here we recommend do action:
filter email content
When using POP3, Securepoint recommends only accepting emails from known senders.
In addition, create an Allowlist rule (see below) that is directly in front of this rule so that known senders are forwarded, but spam etc. is still filtered:
Create a new rule:Rule Name:WL-Rule Name If an email is received:
The same criteria as in this section above. Button +
and sender
is in
Input in the click box: » known_sender.com
do action:
Edit filter rule:mark email in subject withWarning not to open the attachment unless it has been announced
Default: accept email
Filter rule »was caught by the URL filter«
Add rule URL_Filter
Create a new rule:Rule Name:URL_Filter If an email is received:
and was caught by the URL filter
do action:
Edit filter rule:
Default: accept email
Emails containing a dangerous URL should not be accepted and delivered to the user's mailbox.
Please note the settings of the URL filter.
Securepoint recommends that these emails have any applicable content removed.
The current threat situation makes it clear that standard procedures can no longer keep up in the fight against malware.
Potentially dangerous documents should not be delivered to the user's mailbox. Documents are identified by MIME types and file extensions.
Filter rule »Word documents based on MIME types«
+Add rule Word_MIME
Create a new rule:Rule Name:Word_Mime If an email is received:
and with content of
MIME type is
MIME types can now be selected in the click box. This list can be entered as content. application/msword, application/vnd.openxmlformats-officedocument.wordprocessingml.document, application/vnd.openxmlformats-officedocument.wordprocessingml.template, application/vnd.ms-word.document.macroEnabled.12, application/vnd.ms-word.template.macroEnabled.12
do action:
Edit filter rule: Quarantine email and filter again for 30 minutes
Default: accept email
In order for Word documents to be filtered based on MIME types, a new rule is needed.
Securepoint recommends mails with Office documents attached are temporarily quarantined and filtered again after 30 minutes!
When using the POP3 proxy, this option must not be used!
Here we recommend do action:
filter email content
When using POP3, Securepoint recommends only accepting emails from known senders.
In addition, create an Allowlist rule (see below) that is directly in front of this rule so that known senders are forwarded, but spam etc. is still filtered:
Create a new rule:Rule Name: WL_Word_Mime If an email is received:
The same criteria as in this section above. Button +
and sender
is in
Input in the click box: » known_sender.com
do action:
Edit filter rule:mark email in subject withWarning not to open the attachment unless it has been announced
Default: accept email
Save
Filter rule »Excel documents based on MIME types«
+Add fitler rule Excel_MIME
Create a new rule:Rule Name:Excel_Mime If an email is received:
Edit filter rule: Quarantine email and filter again for 30 minutes
Default: accept email
In order for Excel documents to be filtered based on MIME types, a new rule is needed.
Securepoint recommends that mails with Office documents attached are temporarily quarantined and filtered again after 30 minutes!
When using the POP3 proxy, this option must not be used!
Here we recommend do action:
filter email content
When using POP3, Securepoint recommends only accepting emails from known senders.
In addition, create an Allowlist rule (see below) that is directly in front of this rule so that known senders are forwarded, but spam etc. is still filtered:
Create a new rule:Rule Name:WL_Excel_Mime If an email is received:
The same criteria as in this section above. Button +
and sender
is in
Input in the click box: » known_sender.com
do action:
Edit filter rule:mark email in subject withWarning not to open the attachment unless it has been announced
Default: accept email
Save
Filter rule »Open Office / Libre Office documents based on MIME types«
+Add fitler rule OOffice_MIME
Create a new rule:Rule Name:OOffice_MIME (Open-Office) If an email is received:
Edit filter rule: Quarantine email and filter again for 30 minutes
Default: accept email
Securepoint recommends mails with Office documents attached are temporarily quarantined and filtered again after 30 minutes!
When using the POP3 proxy, this option must not be used!
Here we recommend do action:
filter email content
When using POP3, Securepoint recommends only accepting emails from known senders.
In addition, create an Allowlist rule (see below) that is directly in front of this rule so that known senders are forwarded, but spam etc. is still filtered:
Create a new rule:Rule Name: WL_OOffice_Mime If an email is received:
The same criteria as in this section above. Button +
and sender
is in
Input in the click box: » known_sender.com
do action:
Edit filter rule:mark email in subject withWarning not to open the attachment unless it has been announced
Default: accept email
Filter rule »Office documents based on file extension«
+Add fitler rule Office_Extension
Create a new rule:Rule Name:Office_Extension If an email is received:
and with content of
File name ends with
File extensions can now be selected in the click box. This list can be entered as content. doc, dot, docx, docm, dotx, dotm, docb, xls, xlsx, xlt, xlm, xlsm, xltm, xlsb, xla, xlam, xll, xlw, ppt, pot, pps, ppa, pptx, pptm, potx, potm, ppam, ppsx, ppsm, sldx, sldm, pub, odt, ott, oth, odm, otg, odp, otp, ods, ots, odc, odf, odb, odi, oxt, rtf
Neu 06.2022:rtf ergänzt
do action:
Edit filter rule: Quarantine email and filter again for 30 minutes
Default: accept email
In order for Office documents to be filtered by file extension, a new rule is needed.
Securepoint recommends that mails with Office documents attached are temporarily quarantined and filtered again after 30 minutes!
When using the POP3 proxy, this option must not be used!
Here we recommend do action:
filter email content
When using POP3, Securepoint recommends only accepting emails from known senders.
In addition, create an Allowlist rule (see below) that is directly in front of this rule so that known senders are forwarded, but spam etc. is still filtered:
Create a new rule:Rule Name:WL_Office_Extension If an email is received:
The same criteria as in this section above. Button +
and sender
is in
Input in the click box: » known_sender.com
do action:
Edit filter rule:mark email in subject withWarning not to open the attachment unless it has been announced
Default: accept email
Save
Filter rule »Compressed files based on MIME types«
+Add fitler rule Compressed_MIME
Create a new rule:Rule Name:Compressed_MIME If an email is received:
and with content of
MIME type is
MIME types can now be selected in the click box. This list can be entered as content. application/x-zip-compressed,application/zip
do action:
Edit filter rule: Quarantine email and filter again for 30 minutes
Default: accept email
In order for compressed files to be filtered based on MIME types, a new rule is needed.
Securepoint recommends that mails with compressed files attached are temporarily quarantined and filtered again after 30 minutes!
When using the POP3 proxy, this option must not be used!
Here we recommend do action:
filter email content
When using POP3, Securepoint recommends only accepting emails from known senders.
In addition, create an Allowlist rule (see below) that is directly in front of this rule so that known senders are forwarded, but spam etc. is still filtered:
Create a new rule:Rule Name: WL_Compressed_MIME If an email is received:
The same criteria as in this section above. Button +
and sender
is in
Input in the click box: » known_sender.com
do action:
Edit filter rule:mark email in subject withWarning not to open the attachment unless it has been announced
Default: accept email
Save
Filter rule »Compressed files based on extension«
+Add fitler rule Compressed_Extension
Create a new rule:Rule Name:Compressed_Extension If an email is received:
and with content of
File name ends with
File extensions can now be selected in the click box. This list can be entered as content. zip,7z,ace,arj,cab,zz,zipx
do action:
Edit filter rule: Quarantine email and filter again for 30 minutes
Default: accept email
In order for compressed files to be filtered based on the file extension, a new rule is needed.
Securepoint recommends that mails with compressed files attached are temporarily quarantined and filtered again after 30 minutes!
When using the POP3 proxy, this option must not be used!
Here we recommend do action:
filter email content
When using POP3, Securepoint recommends only accepting emails from known senders.
In addition, create an Allowlist rule (see below) that is directly in front of this rule so that known senders are forwarded, but spam etc. is still filtered:
Create a new rule:Rule Name: WL_Compressed_Extension If an email is received:
The same criteria as in this section above. Button +
and sender
is in
Input in the click box: » known_sender.com
do action:
Edit filter rule:mark email in subject withWarning not to open the attachment unless it has been announced
Default: accept email
Save
Filter rule »ISO files based on MIME type or extension«
+Add fitler rule images
Create a new rule:Rule Name:Images
Rules with or -Connect operators If an email is received:
and with content of
File name ends with File extensions can now be selected in the click box. This list can be entered as content. iso,img
or with content of
MIME type is
MIME types can now be entered in the click box. This list can be entered as content. application/x-cd-image, application/x-iso-image, application/x-iso9660-image
do action:
Edit filter rule: Quarantine email and filter again for 30 minutes
Default: accept email
In order for .iso and .img files to be filtered, a new rule is needed.
Securepoint recommends that mails with images attached are temporarily quarantined and filtered again after 30 minutes!
When using the POP3 proxy, this option must not be used!
Here we recommend do action:
filter email content
When using POP3, Securepoint recommends only accepting emails from known senders.
In addition, create an Allowlist rule (see below) that is directly in front of this rule so that known senders are forwarded, but spam etc. is still filtered:
Create a new rule:Rule Name: WL_images If an email is received:
The same criteria as in this section above. Button +
and sender
is in
Input in the click box: » known_sender.com
do action:
Edit filter rule:mark email in subject withWarning not to open the attachment unless it has been announced
Scenario: Attachments from specific senders are to be tagged and delivered. All other attachments should be filtered.
1st rule: Tag emails with attachments from specific senders.
2nd rule: Deliver emails with attachments from specific senders.
3rd rule: Filter emails with attachments that do not come from specific senders.
Create a new rule:Rule Name:WL_mark attachments If an email is received:
and with content of
File nameis in »*
Add criterion
and sender
is in »partnerdomain.de
do action:
Edit filter rule:mark email in subject withSender verified
Add fitler rule
Create a new rule:Rule Name:WL_accept attachements If an email is received:
and with content of
File name is in »*
Add criterion
and sender
is in »partnerdomain.de
do action:
Edit filter rule:accept email
Add fitler rule
Create a new rule:Rule Name:Filter attachments If an email is received:
and with content of
File name is in »*
and sender
does not contain »partnerdomain.de
do action:
Edit filter rule:Quarantine email and filter again for30 minutes
The check for the set of rules is not canceled for the actions Filter applicable content and Tag email in subject with, but continues. Further filter rules can be applied to such emails.
In all other action cases, the verification on the set of rules is terminated if the criteria apply.
Create whitelist exception rules
+Add fitler rule Whitelist
updated
If emails from a certain sender (here from securepoint.de) are to be delivered in any case, a whiltelist exception must be created in the mail filter rule set.
Create a new rule:Rule Name:Whitelist If an email is received:
and protocol
is SMTP
Add criterion
and is classified as SPAM
Add criterion
and sender
from ends with »securepoint.de
do action:
Edit filter rule:accept email
Save
Move filter rule
For a rule to work as a whitelist rule, the order must be defined so that this rule takes effect before the general spam quarantine rule.
By clicking and holding with the left mouse button on the whitelist rule (pos. 7) in the "Pos." column, this rule is moved up above the general Spam_SMTP filter rule.
When the rule has reached the desired position, release the mouse button.
The whitelist rule is now assigned a new position number according to its ranking.
Fake sender
+Add fitler rule '
Fake sender
In order to avoid accepting emails with fake internal senders (which usually enjoy a high level of trust), we recommend creating three filter rules according to the following example:
In this example, mails of the mail domain @securepoint.de are to be accepted. The IP address of the mail server is assumed to be 192.168.175.100.
These are only sample addresses that need to be customized locally.
Create a new rule:Rule Name:fake_sender_internal1 If an email is received:
and sender
is in »@securepoint.de
Add criterion
and source host
is not »192.168.175.100
do action:
Edit filter rule:Reject email
Save
Add rule
Create a new rule:Rule Name:fake_sender_internal2 If an email is received:
and header field
From is in »@securepoint.de
Add criterion
and source host
is not »192.168.175.100
do action:
Edit filter rule:Reject email
Save
Add fitler rule
Create a new rule:Rule Name:fake_sender_internal3 If an email is received:
and header field
Fromis »securepoint.de
Add criterion
and source host
is not »192.168.175.100
do action:
Edit filter rule:Reject email
Save
URL filter
→ Applications →Mail filterTab URL filter
The URL filter verifies
the URL itself. Add rule Further notes in the wiki about the Mailfilter. This can be used in combination with the allow action to create mainly whitelists
in which content category the visited page falls. Add category This categorization is constantly updated by our content filter team. Allowlist entries (e.g. Education (schools and training institutes, universities) can also be created here with the allow action, or blocklist entries with the action.
The following categories are preconfigured in installations since 11.8 and should not be missed in older installations:
Add category
Type
Name
Description
Action
Category
Threat Intelligence Feed
This category contains URLs currently classified as malicious which spread malware and contain phishing pages (phishing, malware, botnets, crime ware, etc.)
block
Category
Porn and erotic
This category contains URLs that provide pornographic or predominantly sexual content.
block
Category
Hacking
This category contains URLs that provide advice on hacking, warez, building malware, tricking systems or subscription traps.
block
Category
Update Server
Server and services for important software updates This category is intended for whitelist environments.
allow
Other categories are to be adapted to the requirements of the company
By clicking on Save the filter rule will be added.
Spam Report
→ Applications →Mail filterTab Settings section
Spam Report
The spam report can inform email users at certain intervals about emails filtered, blocked or quarantined by the UTM. This report can be sent either on a specific day of the week or daily, at a specific time.
Reports are sent to the users and an overview is sent to the administrator.
Delivery Condition:
Deliver always (Default)
In any case, a spam report will be sent.
Not accepted
A spam report will only be delivered if at least one email has been filtered, quarantined or rejected.
Quarantined or filtered
A spam report will only be delivered if at least one email has been quarantined or filtered.
Alternative Hostname / IP:
If the web interface with the mail server is to be accessed via an external IP or another host name.
Day:
Monday
This report can be sent either on a specific weekday or Every day .
1. Report
notempty
updated
20 : 00 Uhr
Specifies the time for sending the report.
2. Report 3.Report 4. Report
Off
With every day reports, a total of four reports can be sent at specified times.
In order for the report to reach the e-mail user, it is necessary for the e-mail user to be in a group with the 'Spamreport permission.
If several mail addresses for a user are stored in an AD, the entry configured there as Primary SMTP address is used as the default address.
Gruppe hinzufügen UTMuser@firewall.name.fqdnAuthentifizierungBenutzer Add a group under Authentication Users
The setting for this is made in the menu Authentication Users Groups+ Add Group or Edit under Permissions:
The following sections must be activated here:
Email digest
On activates the creation of the spam report
Userinterface
On The email address can be taken from a directory server such as ActiveDirectory or LDAP if the UTM is connected to it. Otherwise, the user must be created with his email address on the UTM.
The email address can be taken from a directory server such as ActiveDirectory or LDAP if the UTM is connected to it. Otherwise, the user must be created with his email address on the UTM.
In the Mailfilter section, further settings must be made, including the e-mail address to which reports are sent:
<This function may allow the downloading of viruses and should therefore only be allowed for experienced users!/li> }}
Caption
Default
Description
Allow downloads of following attachments:
None (Default)
Members of this group can download attachments from mails in the user interface that meet certain criteria.
Filtered but not quarantined
Quarantined but not filtered
This function may allow the downloading of viruses and should therefore only be allowed for experienced users!
Quarantined and/or filtered
This function may allow the downloading of viruses and should therefore only be allowed for experienced users!
Allow forwarding of following emails:
Die Berechtigung Mailfilter Administrator überschreibt diese Konfiguration mit dem Default Wert. notempty
updated
None
Members of this group can forward emails in the user interface that meet certain criteria
Filtered but not quarantined
Quarantined but not filtered (Default)
This function may allow the forwarding of viruses and should therefore only be allowed for experienced users!
Quarantined and/or filtered
This function may allow the forwarding of viruses and should therefore only be allowed for experienced users!
Report email address:
Email address to which a spam report is sent. If no entry is made here, the spam report is sent to the first email address in the list. If several mail addresses for a user are stored in an AD, the entry configured there as Primary SMTP address is used as the default address..
Report language:
Default
Default under Network Server settings →
Firewall
→ language of reports It can be specifically selected: German or English
Email address
Email address
Adding a mail address to the list
support@ttt-point.de
Email accounts that can be viewed by members of this group to control the mail filter. Delete with
Spam report to the user.
Disclaimer and hints
Liability
This website was compiled with the greatest possible care. Nevertheless, no guarantee can be given for the correctness and accuracy of the information provided. Any liability for damages arising directly or indirectly from the use of this website is excluded. If this website refers to websites operated by third parties, Securepoint GmbH is not responsible for any content linked or referred from this site.
The following wiki articles may be helpful for setup.