McAfee HARDWARE 1.4 Installationsanleitung Seite 12

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 61
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 11
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 12 of 61
TSP TOE Security Policy
WMC Web Mail Client
Table 2 - Acronyms
1.5 TOE Description Overview
The TOE is a security appliance that utilizes hardware and software in an integrated appliance to scan
traffic between the WAN (Internet) and an internal (protected) network. Traffic flowing to and from the
Wide Area Network (WAN) to the internal network is first routed through the MEG Appliance. Through the
intercept, scanning and reporting functions, the MEG appliance can detect potentially malicious files of
various types, filter traffic for restricted content, and email containing spam messages or Phish attempts.
Protocols covered by scanning include: POP3 and SMTP. Following detection of a potentially malicious
file, the TOE can clean the affected file, delete the file, drop the associated traffic or quarantine the item
pending review. The TOE provides comprehensive alerts and reports of suspicious activity to advise
Administrators of traffic characteristics routed through the appliance. Scanning behaviour and
subsequent actions are highly configurable through a comprehensive graphic user interface (GUI)
allowing Administrators to tailor the appliance to the deployed environment.
The TOE supports options for mail to be accessed in a secure manner using a browser, using SWD. This
is useful for situations where a user’s mailbox is not trusted to maintain the confidentiality of stored mail.
The TOE provides mechanisms to support Data Loss Prevention (DLP), monitoring critical data in use
and in transit, enforcing policies based upon the context of its use. It also employs image analysis
techniques to filter mages in email that do not conform to policy guidelines.
Three modes of operation are available for configuration of the appliance within the network: Explicit
Proxy, Transparent Bridge or Transparent Router mode.
Configuration in either Transparent Bridge or Transparent Router mode makes operation of the appliance
transparent to devices communicating through the TOE.
1.6 Architecture Description
1.6.1 Context
The software of the MEG appliance is identical among all shown configurations of the appliance. The
following diagram shows placement of a MEG appliance within the network
Seitenansicht 11
1 2 ... 7 8 9 10 11 12 13 14 15 16 17 ... 60 61

Kommentare zu diesen Handbüchern

Keine Kommentare