Go to page of
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of SonicWALL 7.2, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of SonicWALL 7.2 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of SonicWALL 7.2. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of SonicWALL 7.2 should contain:
- informations concerning technical data of SonicWALL 7.2
- name of the manufacturer and a year of construction of the SonicWALL 7.2 item
- rules of operation, control and maintenance of the SonicWALL 7.2 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of SonicWALL 7.2 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of SonicWALL 7.2, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the SonicWALL service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of SonicWALL 7.2.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the SonicWALL 7.2 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
i SonicWALL Email Security User Guide SonicWALL ® Email Security User Guide Version 7. 2 SonicWALL, Inc. 2001 Logic Drive S an Jose , CA 9 5124-3452 Phone: +1.408.745 .9600 Fax: +1.408.7 45.9300 E-mail: info@sonicwall.com Part Number: 232-00 170 1 -00 Rev A[...]
-
Page 2
SonicWALL ® Email Security User’s Guide Version 7.2 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.7 45.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com[...]
-
Page 3
Copyright Notice © 2009 SonicWALL, I nc. All rights rese rv ed . Under the copy right laws, this manual or the software des cribed within, can not be copi ed, in whole or part, without the writte n consent o f the manufactur er, except in the normal use of the software to make a backup cop y. The same propr ietary and cop yright noti ces must b e [...]
-
Page 4
Table of Contents Preface ............................................................. ........................................... .............. ii i Documentation Overview ................. ................ ................ ................ ............. .............. iii Documentation Conventions ........................ ................. ....[...]
-
Page 5
Reports & Monitoring .......................................................... ................................... 21 Inbound Good vs. Junk Email ................. ................... ................ ................ ................ ...... 22 Outbound Good vs. Junk Email .......... ................ ................. ................ ........[...]
-
Page 6
SonicWALL Email Security 7.1 User Guide | i Preface SonicWALL Email Security guards the perimeter of the organization against the costly , dangerous, and growing threats to corporate em ail. Threats are stopped before they infiltrate co rporate mail servers and em ployee in boxes. SonicW ALL Email Security secures emai l connections and bl ocks unw[...]
-
Page 7
ii | - Preface[...]
-
Page 8
SonicWALL Email Security 7.1 User Guide | 1 CHAPTER 1 About SonicW ALL Email Security This chapter describes vi ewing and ha ndling ite ms in yo ur SonicW ALL Email Security Junk Box. When a Message is Flagged as Junk When SonicWALL Email Secu rity determines a messag e is junk, it stores it in a Junk Bo x. Y our network administrator determi nes w[...]
-
Page 9
2 | Chapter 1 - About SonicWALL Email Security Y ou can scan these messages to se e if there are any messages you want to receive and should not be categorized as Junk. If y ou see a me ssage you want to receive, c lick the Unjunk link next to it and the message is se nt t o your Inbox. The send er of any messages that you unjunk is added to your l[...]
-
Page 10
SonicWALL Email S ecurity 7.2 User’s Guide | 3 CHAPTER 2 Managing the Junk Box This chapter describes vi ewing and ha ndling ite ms in yo ur SonicW ALL Email Security Junk Box. When a Message is Flagged as Junk When SonicWALL Email Secu rity determines a messag e is junk, it stores it in a Junk Bo x. Y our network administrator determi nes whethe[...]
-
Page 11
4 | Chapter 2 - Managing the Junk Box Scan these mess ages to see if there are any m essages you want to receive and should no t be categorized as Junk. If you see a mess age you want to receive, click the Unjunk l i nk ne xt t o i t a n d the message is sent t o your Inbox. The sender of any messages that you unjunk is added to y our list of allow[...]
-
Page 12
SonicWALL Email S ecurity 7.2 User’s Guide | 5 X To log in to yo u r Ju nk Box 1. Log in wit h your user name and password. 2. Choose the appropriate domain from the list, if necessary. Your personal Junk Box appears, with any messag es that have been flagged as spam or oth er unwanted email. Y ou can display all junk mail, li kely junk mail, or [...]
-
Page 13
6 | Chapter 2 - Managing the Junk Box As an example, suppose you w anted to see only messages that were Spam or Likely Spam. Clear all the checkboxes except the Show Spam and Show Likely Spam check boxes. Leave all the locations se lected and cli ck Search . To select all th e messages visible, check th e box at the t op of the left colum n. Otherw[...]
-
Page 14
SonicWALL Email S ecurity 7.2 User’s Guide | 7 Proximity Se ar ch This searches for words closer to each other . The syntax is “word 1 word2”~distance Deleting M e s sages Once you have d etermi ned that a message was correctly placed in your Junk B ox, you can delet e one or more messages at a time , or all the messages. Select one or more m[...]
-
Page 15
8 | Chapter 2 - Managing the Junk Box Viewing Message Content Depending on your organizat ion’ s configuration , you can view the contents of a m essage by clicking the View link nex t t o it in the Ju nk S um ma ry M es sag e s ent to y ou b y e mai l. Fo r se cu rity re as ons , SonicWALL Email Security dis p lays only the tex t portions of the[...]
-
Page 16
SonicWALL Email Security 7.2 User Guide | 9 CHAPTER 3 Anti-S p am T echniques This chapter describes how you can use Soni cWALL Email Security to block senders, or ensure that senders y ou approve ca n send y ou email. Managing Allowed and Blocked Lists Managing your Allowed and Blocke d lists can help prevent email you want from ending up in your [...]
-
Page 17
10 | Chapter 3 - Anti-Spam Techniques Adding People to Allowed or Bl ocked Lists X To add people to Allowed or Blocked lists 1. Navigate to Anti-Spam, Anti-Phi shing > People . 2. C lick Allowed to see a list of senders who may be added to the Allowed list. 3. C lick Add to add a person. t 4. Enter the emai l address of the sen ders you want to [...]
-
Page 18
SonicWALL Email Security 7.2 User Guide | 11 Adding Companies or Domains to All o wed or Bloc k ed Lists X To add companies or domains to Allowed or Blocke d lis ts 1. Cli ck the Anti-Spam, Anti-Phishing button. 2. C lick Companies from the left hand navigation menu. A list of companies is displayed. Note: z Some company addresses are adjacent to a[...]
-
Page 19
12 | Chapter 3 - Anti-Spam Techniques Adding Lists to the Allowed List Email messages from mail ing-list servers do not al ways co me from the same emai l address or FROM: field in the address. This makes it diffic ult to add list messages to the Allowed list. The email messages are from the person who poste d th e message to the li st-server and t[...]
-
Page 20
SonicWALL Email Security 7.2 User Guide | 13 Note: T o use y our compa nies defaul t settings, us e the Adhere to Corp orate/Group Defaults checkbox. If your IT department e nforces these s ettings, the checkbox is dimmed; you cannot change blocking levels. Configuring SMART Networ k Aggressiveness Settings Y ou can adjust the le vel of influe nce [...]
-
Page 21
14 | Chapter 3 - Anti-Spam Techniques Screening Messages in Other Languages Many spam messages are in a language ot her than the one you do business i n. T o filter out messages based on language th ey were written in, use th e Languages window. For each language, you can choose allow , block, or have no opinio n. F or example, you might w ant to r[...]
-
Page 22
SonicWALL Email Security 7.2 User Guide | 15 Configuring Language Preference s for SonicWALL Email Security Y ou can chan ge the language in which the user inte rface for SonicWALL E mail Security is displ ayed. X To change the language: 1. C li ck the Language link that appears in the lower-righ t frame of the user interface window. 2. Select your[...]
-
Page 23
16 | Chapter 3 - Anti-Spam Techniques[...]
-
Page 24
SonicWALL Email Security 7.2 User Guide | 17 CHAPTER 4 Settings Y ou can change your spam-filtering settings by using the SonicWALL Email Security Settings page. Choose what to do with messages that are spam, likely spam, phishing, viruses, or have conten t not allowed by your organization’ s policy . Navigate to Ant i-Spam, Anti-Phishin g > D[...]
-
Page 25
18 | Chapter 4 - Settings Assigning Users fo r the Junk Box The Users window allows you to authorize one or more users to monitor your Junk Box. Navigate to Users & Groups > Users . X To add a user 1. Cli ck the Add button. The Add User screen appears. 2. Enter the email addres s of the user i n the Primary Address box. 3. C lick Add . T ag [...]
-
Page 26
SonicWALL Email Security 7.2 User Guide | 19 Removing a User X To remove a user 1. Click the user that you want to remove. 2. Cli ck the Remove button. Junk Box Summary When SonicWALL Email Secu rity moves junk and lik ely junk me ssages to your Junk Box, you can choose to be notified periodically by email . X To manage your j unk summary settings [...]
-
Page 27
20 | Chapter 4 - Settings { Chinese Simplifi ed { Korean { Dutch { French { German { Spanish { Brazilian Portuguese { Russian { Hindi { Norwegian { Swedish { Italian Note: z T o correctly display the Ju nk Summary in a lang uage other t han English, you must install the appropriate language packs on your computer . 5. If you prefer, ch eck the Plai[...]
-
Page 28
SonicWALL Email Security 7.2 User Guide | 21 Send Simple Summary or Graphical Summary Y ou can rece ive the Junk Box Summ ary as a simple list or in a more graphical format. The fi rst illustration shows a simple list ; t he second illustration shows a more graphical presentation.[...]
-
Page 29
22 | Chapter 4 - Settings[...]
-
Page 30
SonicWALL Email Security 7.1 User Guide | 23 CHAPTER 5 Report s & Monitoring The reports in this module sh ow statistics for your organizatio n—not just your ow n spam. Click th e Reports & Monitoring butt on to view them. The Reports Dashbo ard pro vides a lo t of informat ion about SonicW ALL Email Security at a glance. These charts dis[...]
-
Page 31
24 | Chapter 5 - Reports & Monitoring Inbound Good vs. Junk Email The Inbound Good vs. Junk page illustrates the n umb er of incom ing email that is goo d versus junk email. V alues are shown in number of messages per day and also accordin g to the percentage of good versus junk. Outbound Good vs. Junk Email The Outbound Good vs. Ju nk page ill[...]
-
Page 32
SonicWALL Email Security 7.1 User Guide | 25 Junk Email Breakdown The Junk Email Bre akdown page illustr ates the types of messages rece ived, and sho ws the comparative amounts of messages that were identified as spam, likely spam, contained viru ses, likely con tained viruses, ph ishing, lik ely phishi ng, were identi fied by policy rules, and we[...]
-
Page 33
26 | Chapter 5 - Reports & Monitoring[...]
-
Page 34
SonicWALL Email Security 7.1 User Guide | 27 CHAPTER 6 Junk Button for Microsof t Outlook This chapter describe s the SonicW ALL Junk Button for Outlook, a small a pplication that can be added to Microsoft Outlook. The Junk Button allo ws end-users to report spam messages to the S o n i c W A L L G R I D N e t w o r k . T h e G R I D N e t w o r k [...]
-
Page 35
28 | Chapter 6 - Junk Button for Microso ft Outlook Using the Junk Button The Junk Button is used to remove an y junk e-ma il messages that arrive in your inbox and place them in your Deleted Item s fol der . X To use the Junk Button: 1. A junk e-mail arrives in your inbox. 2. Highlight th e e-ma il me ssage by sele cti ng it. 3. Click the SonicWAL[...]
-
Page 36
29 SonicWALL Email Security User’s Guide Index A adding a delegate 16 companies or domains allowed, blocked lists 8 lists allowed list 9 people allowed, blocked lists 7 address conflicts 7 Adversarial Bayesian Aggressiveness 11 allowed list adding 9 allowed, blocked lists 7 adding companies or domains 8 adding people 7 deleting 9 deleting people [...]
-
Page 37
30 SonicWALL Email Security User’ s Guide M messages junk 1 processed 22 unjunking 5 viewing content 5 R reports 21 downloading 21 Inbound Good vs. Junk 22 Junk Email Breakdown 24 Outbound Good vs. Junk 23 time frame 21 S searching corporate junk box 4 Self-Monitoring Active Response Team, see SMART 11 settings Adversarial Bayesian Aggressiveness[...]
-
Page 38
© 200 9 So ni cWA LL , I nc . is a re g is te re d t ra d em ar k o f S o ni cWAL L , I nc . O t he r p ro d uc t na me s m en ti on ed h ere in ma y b e tr ad e ma rk s an d /o r re g is te re d t ra d ema r k s o f t he ir re sp e c ti ve co mp an ie s . Sp e ci c at io ns an d d es cr i pt io ns su bj ec t to ch an ge w it ho u t n ot ice . [...]