This article explains how to configure email spam scanning definitions and policies, which will filter for key phrases and identifiers commonly used by spammers. It is intended for Administrators.
Overview
Our defense layer aims to reject unwanted spam and malware in the protocol. Mimecast's multiple scanning engines examine the content of inbound mail by searching for key phrases and identifiers commonly used by spammers. These scanning checks can use:
- Content matching rules.
- DNS-based filtering.
- Checksum-based filtering.
- Statistical filtering.
However, there are occasions when we cannot determine if a message is wanted by an end user or not. You can configure spam scanning to examine the content of all inbound mail and apply different sensitivity and actions.
How Mimecast Spam Scanning Works
Mimecast employs a layered spam scanning approach that combines proprietary technology with third-party partners. The spam scanning engine evaluates multiple email characteristics, including:
- Body content.
- Formatting.
- Source.
- Headers.
- URIs.
Each email is assigned a spam score based on various patterns and characteristics. This score determines how the email is handled by the system.
Considerations
Consider the following before configuring a definition or policy:
-
Spam Scoring System: Mimecast uses a Spam Score to evaluate emails, with different scanning levels determining how emails are categorized:
- Messages with a Spam Scores of 28 or higher are automatically rejected in protocol and logged in the Rejection Viewer. This happens regardless of whether a spam scanning policy is configured.
- Messages with Spam Scores 7-27, emails are held (in relaxed settings).
- Messages with Spam Scores 5-27, emails are held (in moderate settings).
- Messages with Spam Scores 3-27, emails are held (in aggressive settings).
The scanning considers various factors beyond just SPF records and sender authentication.
- If an email address, domain name, or IP address is added as a permitted sender, the inbound message still undergoes spam scanning, but the spam scanning definition action is not applied.
- If a DNS Authentication policy applies to a message, but the permitted sender fails the DNS checks (e.g., SPF), the message is still subjected to spam scanning.
- The default setting for this field will be set to Relaxed.
- Email IDs that are part of a Permitted Senders Policy/List will not be added to the auto-allow list, and will therefore take precedence over the Auto-Allow configuration.
- Auto Allow Creation Policies will be unaffected by this change.
Spam scanning of Auto Allow emails can be enabled in your Spam Scanning Definitions. Please see the configurations below on how to do this
Configuring a Spam Scanning Definition
You can configure a Spam Scanning definition by using the following steps:
- Log in to the Mimecast Administration Console.
- Navigate to Policies | Gateway Policies | Spam Scanning.
- Click on Definitions.
- Click on the Scan Definitions definition type from the list.
-
Click on a Folder in the navigator.
A definition cannot be created in the Root folder.
- Either click on the:
- Definition to be changed.
- New Message Scan Definition button to create a definition.
- Complete the Spam Scanner Settings section as follows:
| Field / Option | Description |
|---|---|
| Description | Enter a description for the definition. |
| Spam Detection Level |
Specify the level of spam detection to be used by selecting one of the following: We recommend starting with a Relaxed level and adjusting it according to the results and feedback from end users. Moderate and Aggressive Spam Detection levels should be applied to selected groups of users that still receive spam, as opposed to applying Aggressive checks to all internal users. This will help to reduce false positives generated in the held queue. |
| Spam Detection Action |
Specify the action to be taken if spam is detected: See Spam / Phishing - Spam to the Microsoft Outlook Junk Folder for more info. |
| Auto Allow Spam Detection Level |
Specify the level of spam detection on emails received by senders on the Auto Allow list by selecting one of the following: • None: No spam scanning will be performed. While there is shared terminology for the Relaxed, Moderate, and Aggressive levels between this and the Spam Detection Level option, the spam score threshold differs substantially between the two. |
| Enable Graymail Control | Enable this option to treat bulk mail differently from regular mail. Graymail is typically defined as "mail you want, but not in your Inbox right now." Examples are subscribed newsletters and marketing emails, which are not person-to-person communication. Actions for graymail control are defined using the graymail detection action setting. |
| Graymail Detection Action |
Enables you to select a different action for graymail control: With this header enabled, users can define a rule in their email client to take action on graymail. • Hold for Review: Graymail will be placed in a hold queue. The digest email informs the user of messages on hold and allows the graymail to be released or blocked. |
| Auto Allow Spam Detection Action | Senders on the Auto Allow list can bypass the usual IP reputation and spam checks applied to inbound mail. Auto Allow sender entries are created automatically when the user sends a message to an external recipient. If an email from a sender on the Auto Allow breaches the threshold set by the Auto Allow Spam Detection Level, one of the following actions can be taken: Do Nothing, Hold For Review (based on the Hold Type selected in the Hold Notification Options below), or Reject. |
- Complete the Hold Notification section as follows:
| Field / Option | Description |
|---|---|
| Hold Type | Select the applicable audience that held messages should be visible to via a Mimecast end-user application: • User: Messages held by the policy are available in the user's Personal On Hold view (default setting). • Moderator: Moderators can see the held messages in the Moderated On Hold view. • Administrator: Only Administrators can view messages triggered by the policy. |
| Moderator Group | This field is displayed if the Hold Type field is "Moderator" or "User." The field selects an appropriate group by selecting the Lookup button. |
| Notification Options |
Select if any additional notifications should be sent. For any message where the attachment is stripped, the recipient will receive the notification discussed previously: • A group of users. |
- Click on Save and Exit.
Configuring a Spam Scanning Policy
You can configure a Spam Scanning policy, by using the following steps:
- Log in to the Mimecast Administration Console.
- Navigate to Policies | Gateway Policies
- Click on Spam Scanning.
- Either click on the:
- Policy to be changed.
- New Policy button to create a policy.
- Complete the Options section as required:
| Field / Option | Description |
|---|---|
| Policy Narrative | Describe the policy to allow you to identify it in the future easily. |
| Select Message Scan Definition | Use the Lookup button to select the required Message Scanning definition for the policy. |
| Field / Option | Description |
|---|---|
| Addresses Based On |
Specify the email address characteristics the policy is based
on. This option is only available in the "Emails From" section: • The Return Address: This default setting applies the policy to the SMTP address match based on the message's envelope or true address (i.e., the address used during SMTP transmission). |
| Applies From /To |
Specify the Sender characteristics the policy is based on.
You
should apply multiple policies from the most to least specific.
The options are: • Everyone: Includes all email users (i.e., internal and external). This option is only available in the "Emails From" section. • Internal Address: Includes only internal organization addresses. • External Address: Includes only external organization addresses. This option is only available in the "Emails From" section. • Email Domain: This enables you to specify a domain name to which this policy is applied. The domain name is entered in the Specifically field. • Address Groups: This enables you to specify a directory or local group. If this option is selected, click the Lookup button to select a group from the Profile Group field. Once a group has been selected, click the Show Location field to display the group's path. • Address Attributes: This enables you to specify a predefined Attribute. The attribute is selected from the Where Attribute drop-down list. Once the Attribute is specified, an attribute value must be entered in the Is Equal To field. This can only be used if attributes have been configured for user accounts. • Individual Email Address: This enables you to specify an SMTP address. The email address is entered in the Specifically field. Complete the Email From and Emails To sections as required. |
- Complete the Validity section as required:
| Field / Option | Description |
|---|---|
| Source IP Ranges (n.n.n.n/x) | Enter any required Source IP Ranges for the policy. These only apply if the source IP address used to transmit the message data falls inside or matches the range(s) configured. IP ranges should be entered in CIDR notation. |
| Bi-Directional | If selected, the policy also applies when the policy's recipient is the sender and the sender is the recipient. |
| Policy Override | Select this to override the default order in that policies are applied. If there are multiple applicable policies, this policy is applied first unless more specific policies of the same type have also been configured with an override. |
| Set Policy as Perpetual | Specifies that the policy's start and end dates are set to "Eternal", meaning the policy never expires. |
| Date Range | Specify a start and end date for the policy. This automatically deselects the "Eternal" option. |
| Enable / Disable | Use this to enable (default) or disable a policy. Disabling the policy allows you to prevent it from being applied without having to delete or backdate it. Should the policy's configured date range be reached, it is automatically disabled. |
- Click on Save and Exit.
Comments
Please sign in to leave a comment.