SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
E-mail Server Security Products




Bogdan Klekot
Microsoft Solutions Architect – Management & Security
bogdank@microsoft.com
Agenda


   Introduction to Antigen E-mail Security Products
   Advanced Protection Features
    n   Multiple Antivirus (AV) Engine Management
    n   Distributed Protection
    n   Layered Anti-spam
   Availability and Control Features
    n   Performance Bias Setting
    n   Scanning Innovations
    n   Worm Removal
    n   Cluster Support
    n   Management
   Secure Content Features
    n   Content Filtering
   Summary
Service
   s
          Edge

                       Server
                     Applications

                                                 Information
                                                  Protection
                                    Client and
                                    Server OS
                                                          Identity
                                                        Management



                                                         Systems
                Active Directory                        Management
             Federation Services
                         (ADFS)


                                                           Guidance

                                            Developer
                                              Tools
Antigen E-mail and Collaboration Server
   Security
                           Live
                           Communications   SharePoint
                           Server



               ISA
               Server
                                 Collaboration
                        SMTP
                        Server                  Exchange
                                                Server
    Internet

                                                                  Users
                 Edge
Viruses                              E-mail
                                                                 Viruses
Worms                                                            Worms
Spam                                                             Inapp. Content

                                                 Microsoft Operations
                                                 Manager Antigen MP



                                 Management
E-mail Security
Antigen e-mail security solutions help businesses protect their messaging servers
against viruses, worms, spam, and inappropriate content.


    Advanced             Multiple scan engines at multiple layers throughout the e-mail
                         infrastructure provide improved protection against e-mail
    Protection           threats.




  Availability &         Tight integration with Microsoft Exchange and Windows-based
                         SMTP servers maximizes availability and management control.
    Control


                         Helps organizations eliminate inappropriate language and
      Secure             dangerous attachments from internal and external
      Content            communications
New Microsoft Antigen Products

                      Antivirus and content filtering for
                       Exchange 2003 and 2000
                      Helps stop threats that get past perimeter
                       defenses and helps contain internal incidents

                      Antivirus and content filtering for Windows
                       Server 2003 and 2000 SMTP Gateways
                      Helps stop threats before they reach internal
                       messaging resources and users

                      Anti-spam and content filtering for
                       Windows-based SMTP and Exchange-based
                       servers
                      Helps stop spam before it can impact user
                       and network productivity
                      Centralized management for Antigen-
                       protected servers
                      Improves IT visibility and control into e-mail
                       server security
Advanced Protection
E-mail Antivirus Approaches


                        Internet

                        Viruses                              Single Vendor/Single Engine
                        Worms                                • Same     scan engine, heuristics
                        Spam                                   technology and signature files on
                                                               all server and client platforms
                                                                   • Dependent on one AV lab
                            A                      A                 for scan engine updates
                                                                     during virus or worm
           ISA Server               SMTP Server
                                                                     outbreaks
                                                                   • Queuing and delay during
           A                          A                      A       engine updates on mission
                         Exchange                 Exchange
                                                                     critical servers (like
Exchange
                                                                     Exchange)
                                          A
                                                             Problem:
               A                              A
                                                             Single Point of Failure
E-mail Antivirus Approaches


                        Internet

                        Viruses                            Multi-vendor/Multi-Engine
                        Worms
                        Spam
                                                           • Different scan engines, heuristics
                                                             technologies and signature files on
                                                             server and client platforms
                            A                    B
                                                                • High acquisition and
           ISA Server           SMTP Servers                      maintenance cost
                                                                • Added filtering complexity
           C                        D                      E

Exchange                 Exchange               Exchange



                                        C
                                                               Problem:
               A                            E                  Management/Cost
Antigen Multiple Engine Management




              One solution, multiple technologies

                                        A
                                        B

                                        C
Internet
                                        D
                                        E

                     Exchange Server/
                Windows-based SMTP Server
Antigen Antivirus Scan Engines

    Antigen Stand-alone               Messaging
         Products                    Security Suite

   New!   Microsoft Antivirus      Standard engines plus:

          Sophos                    Kaspersky Lab

          CA VET                    AhnLab
                                    Authentium
          CA InoculateIT
                                    VirusBuster
          Norman



   Total engines: 5             Total engines: 9
Signature Updates
               Sober.P Virus Detection Time
                   May 2, 2005 (GMT)                                 January 2005 Updates
                                                                                          No. Updates/Day
                     Time                              Kaspersky                                18.5
                                        Time of Day
                                       Hour : Minute   Dr. Web                                  10.7
  Kaspersky                  0,69375
      F-Prot                 0,7041667                 Sophos                                   2.7
        AVK                  0,7055556
BitDefender                   0,7215278                BitDefender                              1.7

    Sophos                    0,7270833
                                                       ClamAV                                   1.5
  Command                     0,735
      Ikarus
   F-Secure
                    Antigen Engines
                               0,7597222
                               0,7625
                                                       AntiVir                                  1.4

    Fortinet                   0,7625                  F-Secure                                 1.4
VirusBuster                    0,7805556
                                                       Panda                                    1.3
     Panda                     0,7840278
eTrust- INO                      0,8291667
                                                       Ikarus                                   1.1
     AntiVir                      0,85
    Norman                        0,8652778            Symantec                                 1.1
Trend Micro                           0,8875
        AVG                           0,89375          Trend Micro                              1.0
       Avast                          0,8979167
                                                                                          AV-Test.org Feb. 2005
    McAfee                            0,9013889
 eTrust-VET                              0,96875
  Symantec                                1,0263889
                                                                 Note: the chart (left) represents a single virus
                                AV-Test.org May 2005
                                                                 outbreak only. It does not represent average
                                                                 response times for the listed antivirus labs.
Distributed Protection

                            SMTP Server                Exchange Server

 Internet



                                          A

                                          B                     D

                                          C                     E



                                              Exchange Server


Internet



                                          A
                                                           D
            Internet Scan Job         B                             Real-time Scan Job
            (SMTP)                                         E        (Exchange Store)
                                      C
Anti-spam Protection


   Antigen Spam Manager (ASM) supports Windows-based
    SMTP gateways and Exchange Server
    n   Integrated with Antigen for SMTP Gateways and Antigen for
        Exchange
    n   Also deploys stand-alone on Windows SMTP gateway servers
   Signature-based, frequently updated anti-spam engine
    n   Highly accurate protection against the latest spammer tactics
    n   Works with and complements Exchange Intelligent Message
        F ite r’ h e u ri cs sp a m d e te cti n a p p ro a ch
           l s           sti                  o
   Additional spam filtering options
    n   Real-time block list (RBL) support
    n   Mail-host block and allow lists by sender, domain and IP address
Layered Spam Detection


   On the same server, Exchange Intelligent Message Filter
    (IMF) scans before ASM
   Each applies an Spam Confidence Level (SCL) rating
    n   The higher rating always wins (has more confidence)
    n   Mail that is rejected, deleted or archived by IMF will not make it to
        ASM
          Example: IMF archives SCL 7,8 and 9


                                           IMF SCL
                                           of 0-6
                      IMF       ASM                    Mail          Inbox
                      Scan      Scan       ASM SCL     Store
                                           set to 9


            If SCL
           is 7,8,9
                      Archive                          Junk
                      Folder                           E-mail
Availability & Control
Performance Bias Settings




                                                 * Engines used are not
                                                   always the same. They are
                                                   dynamically allocated from
    A        C                                     the available pool.



   B
   D         D




         Max Certainty: uses all engines (100%)
         Favor Certainty: uses 75% of available engines*
         Neutral: uses approximately 50% of available engines*
         Favor Performance: uses 25% of available engines*
         Max Performance: uses one engine for every scan*
Performance Bias Settings




                                                 * Engines used are not
                                                   always the same. They are
                                    A              dynamically allocated from
                                                   the available pool.


                                    B




         Max Certainty: uses all engines (100%)
         Favor Certainty: uses 75% of available engines*
         Neutral: uses approx. 50% of available engines*
         Favor Performance: uses 25% of available engines*
         Max Performance: uses one engine for every scan*
Scanning Innovations


    In-memory scanning
    Multi-threaded scanning




    EXE                 EXE

    432kb             Scanning Memory
                      Process Return to Pool
                                 Allocation Available Memory
                                                  Pool
Worm Removal

   Designed to purge all messages containing worms
     n   Use Sybari Worm List (wormprge.dat) to purge messages that match a known
         Worm virus
     n   Create a custom Worm List with a single wildcard ( * ) to help match all
         malicious code detected
     n   Help provide pre-emptive protection against unknown worms with file filter
         purge (size, type, extension, etc.)
     n   The user receives nothing, not even a notification
   Purged messages containing worms should not be quarantined
     n   There is no value in the message
     n   Reduces network bandwidth by removing un-needed messages.
Enhanced Cluster Support

        Active Node                  Passive Node

        Passive Node                 Active Node




                   Settings
                   Updates




           Exchange Virtual Server
Central Management

   Software Deployment
   Configuration Template
    Deployment
   Distributed Quarantine
    Management
   Distributed Log File
    Retrieval




          SMTP               Exchange
          Servers            Servers
Automated Signature Updating


                                      www.microsoft.com




                 Internet                                 Internet




Engine Partner
   Updates




                            Antigen
                            Engine
                            Adaptor
Notifications & Reporting
Microsoft Operations Manager Integration
Antigen Management Pack for MOM 2005



   Over 100 Events, Performance Counters, and Services Monitored
    n   Monitors the state of Antigen
    n   Collects statistical data on scanning, detection, and removal of
        messages and attachments
    n   Polls 5 Antigen Services - Provides timed events to poll systems
        for critical process health
   Key Tasks:
    n   Triggers scan engine updates
    n   Centralizes storage and deployment of license files
    n   Imports, exports and deploys setting changes
    n   Initiates and/or schedules manual scan jobs
    n   Starts/Stops control of Antigen services
Secure Content Features
Content Policy Enforcement


  Filters body content for inappropriate
Filters documents based on name match,
           keywords or phrases
    wild card, file type or file extension




              Body Content   File name, type
Summary

   Microsoft provides comprehensive security products
    for e-mail servers
    n   Multiple Engines
    n   Integrated AV/AS
    n   Availability and performance support
    n   Central Management
    n   Keyword and file filtering

   Antigen e-mail security products are key elements of
    any Windows-based SMTP or Exchange server
    deployment
Next Steps


   Read whitepapers on Antigen and Advanced Spam Manager
    n   http://www.microsoft.com/antigen
    n   Paste link for launch PressPass article
   Download evaluation copy of Antigen e-mail security products
    http://www.microsoft.com/antigen
   Read about Microsoft Secure Messaging solutions
    n   http://www.microsoft.com/securemessaging

Weitere ähnliche Inhalte

Was ist angesagt?

SOA Summer School: Best of SOA Summer School – Encore Session
SOA Summer School: Best of SOA Summer School – Encore Session SOA Summer School: Best of SOA Summer School – Encore Session
SOA Summer School: Best of SOA Summer School – Encore Session WSO2
 
Mc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidMc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidrackAID Support
 
Bay threat2011
Bay threat2011Bay threat2011
Bay threat2011Ed Bellis
 
Building reliable systems from unreliable components
Building reliable systems from unreliable componentsBuilding reliable systems from unreliable components
Building reliable systems from unreliable componentsArnon Rotem-Gal-Oz
 
Notifysync datasheet voor office365
Notifysync datasheet voor  office365Notifysync datasheet voor  office365
Notifysync datasheet voor office365tmi3
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deckinfolive
 
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET Journal
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
Notifysync datasheet
Notifysync datasheetNotifysync datasheet
Notifysync datasheettmi3
 
55502459 swe631 atsadang
55502459 swe631 atsadang55502459 swe631 atsadang
55502459 swe631 atsadangDea Kaiser
 
Validation of Service Oriented Computing DEVS Simulation Models
Validation of Service Oriented Computing DEVS Simulation ModelsValidation of Service Oriented Computing DEVS Simulation Models
Validation of Service Oriented Computing DEVS Simulation ModelsDaniele Gianni
 
Thinkfree Office Live Introduction Material En
Thinkfree Office Live   Introduction Material EnThinkfree Office Live   Introduction Material En
Thinkfree Office Live Introduction Material EnBenedict Ji
 
Track 2, session 5, aligning security with business kartik shahani
Track 2, session 5, aligning security with business kartik shahaniTrack 2, session 5, aligning security with business kartik shahani
Track 2, session 5, aligning security with business kartik shahaniEMC Forum India
 
Cybercom Enhanced Security Platform, CESP-ID
Cybercom Enhanced Security Platform, CESP-IDCybercom Enhanced Security Platform, CESP-ID
Cybercom Enhanced Security Platform, CESP-IDabelsonp
 

Was ist angesagt? (17)

SOA Summer School: Best of SOA Summer School – Encore Session
SOA Summer School: Best of SOA Summer School – Encore Session SOA Summer School: Best of SOA Summer School – Encore Session
SOA Summer School: Best of SOA Summer School – Encore Session
 
Mc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidMc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaid
 
Bay threat2011
Bay threat2011Bay threat2011
Bay threat2011
 
Building reliable systems from unreliable components
Building reliable systems from unreliable componentsBuilding reliable systems from unreliable components
Building reliable systems from unreliable components
 
Notifysync datasheet voor office365
Notifysync datasheet voor  office365Notifysync datasheet voor  office365
Notifysync datasheet voor office365
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deck
 
Servicedesk Plus 8
Servicedesk Plus 8Servicedesk Plus 8
Servicedesk Plus 8
 
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
Microsoft Forefront - Protection Suite
Microsoft Forefront - Protection SuiteMicrosoft Forefront - Protection Suite
Microsoft Forefront - Protection Suite
 
Notifysync datasheet
Notifysync datasheetNotifysync datasheet
Notifysync datasheet
 
Technical Cyber Defense Strategies Explained!
Technical Cyber Defense Strategies Explained!Technical Cyber Defense Strategies Explained!
Technical Cyber Defense Strategies Explained!
 
55502459 swe631 atsadang
55502459 swe631 atsadang55502459 swe631 atsadang
55502459 swe631 atsadang
 
Validation of Service Oriented Computing DEVS Simulation Models
Validation of Service Oriented Computing DEVS Simulation ModelsValidation of Service Oriented Computing DEVS Simulation Models
Validation of Service Oriented Computing DEVS Simulation Models
 
Thinkfree Office Live Introduction Material En
Thinkfree Office Live   Introduction Material EnThinkfree Office Live   Introduction Material En
Thinkfree Office Live Introduction Material En
 
Track 2, session 5, aligning security with business kartik shahani
Track 2, session 5, aligning security with business kartik shahaniTrack 2, session 5, aligning security with business kartik shahani
Track 2, session 5, aligning security with business kartik shahani
 
Cybercom Enhanced Security Platform, CESP-ID
Cybercom Enhanced Security Platform, CESP-IDCybercom Enhanced Security Platform, CESP-ID
Cybercom Enhanced Security Platform, CESP-ID
 

Andere mochten auch

Enabling usersandinstallingofficecommunicator2007
Enabling usersandinstallingofficecommunicator2007Enabling usersandinstallingofficecommunicator2007
Enabling usersandinstallingofficecommunicator2007Ziemek Borowski
 
Exchange2010 architektura
Exchange2010 architekturaExchange2010 architektura
Exchange2010 architekturaZiemek Borowski
 
Deployingand configuringofficecommunicationsserver2007
Deployingand configuringofficecommunicationsserver2007Deployingand configuringofficecommunicationsserver2007
Deployingand configuringofficecommunicationsserver2007Ziemek Borowski
 
2008 06-16 pepug-hcl_poznan_-_etykieta_postmastera_czyli_o_uwarunkowaniach_pr...
2008 06-16 pepug-hcl_poznan_-_etykieta_postmastera_czyli_o_uwarunkowaniach_pr...2008 06-16 pepug-hcl_poznan_-_etykieta_postmastera_czyli_o_uwarunkowaniach_pr...
2008 06-16 pepug-hcl_poznan_-_etykieta_postmastera_czyli_o_uwarunkowaniach_pr...Ziemek Borowski
 

Andere mochten auch (7)

Enabling usersandinstallingofficecommunicator2007
Enabling usersandinstallingofficecommunicator2007Enabling usersandinstallingofficecommunicator2007
Enabling usersandinstallingofficecommunicator2007
 
Exchange2010 architektura
Exchange2010 architekturaExchange2010 architektura
Exchange2010 architektura
 
Exch2007 sp1 win2008
Exch2007 sp1 win2008Exch2007 sp1 win2008
Exch2007 sp1 win2008
 
Deployingand configuringofficecommunicationsserver2007
Deployingand configuringofficecommunicationsserver2007Deployingand configuringofficecommunicationsserver2007
Deployingand configuringofficecommunicationsserver2007
 
Be12short
Be12shortBe12short
Be12short
 
Exch2007 certyfikaty
Exch2007 certyfikatyExch2007 certyfikaty
Exch2007 certyfikaty
 
2008 06-16 pepug-hcl_poznan_-_etykieta_postmastera_czyli_o_uwarunkowaniach_pr...
2008 06-16 pepug-hcl_poznan_-_etykieta_postmastera_czyli_o_uwarunkowaniach_pr...2008 06-16 pepug-hcl_poznan_-_etykieta_postmastera_czyli_o_uwarunkowaniach_pr...
2008 06-16 pepug-hcl_poznan_-_etykieta_postmastera_czyli_o_uwarunkowaniach_pr...
 

Ähnlich wie Antigen tdm

Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on CloudSATYAVEER PAL
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01Bố Su
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityHarold Wong
 
50357 a enu-module04
50357 a enu-module0450357 a enu-module04
50357 a enu-module04Bố Su
 
Choosing Your Windows Azure Platform Strategy
Choosing Your Windows Azure Platform StrategyChoosing Your Windows Azure Platform Strategy
Choosing Your Windows Azure Platform Strategydrmarcustillett
 
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)Harold Wong
 
Virtualization for Development
Virtualization for DevelopmentVirtualization for Development
Virtualization for Developmentelliando dias
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentationsaddepalli
 
MS TechDays 2011 - Cloud Computing with the Windows Azure Platform
MS TechDays 2011 - Cloud Computing with the Windows Azure PlatformMS TechDays 2011 - Cloud Computing with the Windows Azure Platform
MS TechDays 2011 - Cloud Computing with the Windows Azure PlatformSpiffy
 
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023VMware Tanzu
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure PlatformAsmTrash
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
Complex End-to-End Testing
Complex End-to-End TestingComplex End-to-End Testing
Complex End-to-End TestingErika Barron
 
Systems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerSystems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerAdvanced Logic Industries
 

Ähnlich wie Antigen tdm (20)

Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on Cloud
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 Security
 
50357 a enu-module04
50357 a enu-module0450357 a enu-module04
50357 a enu-module04
 
Choosing Your Windows Azure Platform Strategy
Choosing Your Windows Azure Platform StrategyChoosing Your Windows Azure Platform Strategy
Choosing Your Windows Azure Platform Strategy
 
1. introduzione a TMG
1. introduzione a TMG1. introduzione a TMG
1. introduzione a TMG
 
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
 
Virtualization for Development
Virtualization for DevelopmentVirtualization for Development
Virtualization for Development
 
Deja vu.idc.solutions
Deja vu.idc.solutionsDeja vu.idc.solutions
Deja vu.idc.solutions
 
Exchange 2013 ABC's: Architecture, Best Practices and Client Access
Exchange 2013 ABC's: Architecture, Best Practices and Client AccessExchange 2013 ABC's: Architecture, Best Practices and Client Access
Exchange 2013 ABC's: Architecture, Best Practices and Client Access
 
Implementing Application Security
Implementing Application SecurityImplementing Application Security
Implementing Application Security
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
 
MS TechDays 2011 - Cloud Computing with the Windows Azure Platform
MS TechDays 2011 - Cloud Computing with the Windows Azure PlatformMS TechDays 2011 - Cloud Computing with the Windows Azure Platform
MS TechDays 2011 - Cloud Computing with the Windows Azure Platform
 
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
 
Verve Nms
Verve NmsVerve Nms
Verve Nms
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure Platform
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
Nos Windows
Nos WindowsNos Windows
Nos Windows
 
Complex End-to-End Testing
Complex End-to-End TestingComplex End-to-End Testing
Complex End-to-End Testing
 
Systems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerSystems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManager
 

Kürzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Antigen tdm

  • 1. E-mail Server Security Products Bogdan Klekot Microsoft Solutions Architect – Management & Security bogdank@microsoft.com
  • 2. Agenda  Introduction to Antigen E-mail Security Products  Advanced Protection Features n Multiple Antivirus (AV) Engine Management n Distributed Protection n Layered Anti-spam  Availability and Control Features n Performance Bias Setting n Scanning Innovations n Worm Removal n Cluster Support n Management  Secure Content Features n Content Filtering  Summary
  • 3. Service s Edge Server Applications Information Protection Client and Server OS Identity Management Systems Active Directory Management Federation Services (ADFS) Guidance Developer Tools
  • 4. Antigen E-mail and Collaboration Server Security Live Communications SharePoint Server ISA Server Collaboration SMTP Server Exchange Server Internet Users Edge Viruses E-mail Viruses Worms Worms Spam Inapp. Content Microsoft Operations Manager Antigen MP Management
  • 5. E-mail Security Antigen e-mail security solutions help businesses protect their messaging servers against viruses, worms, spam, and inappropriate content. Advanced Multiple scan engines at multiple layers throughout the e-mail infrastructure provide improved protection against e-mail Protection threats. Availability & Tight integration with Microsoft Exchange and Windows-based SMTP servers maximizes availability and management control. Control Helps organizations eliminate inappropriate language and Secure dangerous attachments from internal and external Content communications
  • 6. New Microsoft Antigen Products  Antivirus and content filtering for Exchange 2003 and 2000  Helps stop threats that get past perimeter defenses and helps contain internal incidents  Antivirus and content filtering for Windows Server 2003 and 2000 SMTP Gateways  Helps stop threats before they reach internal messaging resources and users  Anti-spam and content filtering for Windows-based SMTP and Exchange-based servers  Helps stop spam before it can impact user and network productivity  Centralized management for Antigen- protected servers  Improves IT visibility and control into e-mail server security
  • 8. E-mail Antivirus Approaches Internet Viruses Single Vendor/Single Engine Worms • Same scan engine, heuristics Spam technology and signature files on all server and client platforms • Dependent on one AV lab A A for scan engine updates during virus or worm ISA Server SMTP Server outbreaks • Queuing and delay during A A A engine updates on mission Exchange Exchange critical servers (like Exchange Exchange) A Problem: A A Single Point of Failure
  • 9. E-mail Antivirus Approaches Internet Viruses Multi-vendor/Multi-Engine Worms Spam • Different scan engines, heuristics technologies and signature files on server and client platforms A B • High acquisition and ISA Server SMTP Servers maintenance cost • Added filtering complexity C D E Exchange Exchange Exchange C Problem: A E Management/Cost
  • 10. Antigen Multiple Engine Management One solution, multiple technologies A B C Internet D E Exchange Server/ Windows-based SMTP Server
  • 11. Antigen Antivirus Scan Engines Antigen Stand-alone Messaging Products Security Suite New! Microsoft Antivirus Standard engines plus: Sophos Kaspersky Lab CA VET AhnLab Authentium CA InoculateIT VirusBuster Norman Total engines: 5 Total engines: 9
  • 12. Signature Updates Sober.P Virus Detection Time May 2, 2005 (GMT) January 2005 Updates No. Updates/Day Time Kaspersky 18.5 Time of Day Hour : Minute Dr. Web 10.7 Kaspersky 0,69375 F-Prot 0,7041667 Sophos 2.7 AVK 0,7055556 BitDefender 0,7215278 BitDefender 1.7 Sophos 0,7270833 ClamAV 1.5 Command 0,735 Ikarus F-Secure Antigen Engines 0,7597222 0,7625 AntiVir 1.4 Fortinet 0,7625 F-Secure 1.4 VirusBuster 0,7805556 Panda 1.3 Panda 0,7840278 eTrust- INO 0,8291667 Ikarus 1.1 AntiVir 0,85 Norman 0,8652778 Symantec 1.1 Trend Micro 0,8875 AVG 0,89375 Trend Micro 1.0 Avast 0,8979167 AV-Test.org Feb. 2005 McAfee 0,9013889 eTrust-VET 0,96875 Symantec 1,0263889 Note: the chart (left) represents a single virus AV-Test.org May 2005 outbreak only. It does not represent average response times for the listed antivirus labs.
  • 13. Distributed Protection SMTP Server Exchange Server Internet A B D C E Exchange Server Internet A D Internet Scan Job B Real-time Scan Job (SMTP) E (Exchange Store) C
  • 14. Anti-spam Protection  Antigen Spam Manager (ASM) supports Windows-based SMTP gateways and Exchange Server n Integrated with Antigen for SMTP Gateways and Antigen for Exchange n Also deploys stand-alone on Windows SMTP gateway servers  Signature-based, frequently updated anti-spam engine n Highly accurate protection against the latest spammer tactics n Works with and complements Exchange Intelligent Message F ite r’ h e u ri cs sp a m d e te cti n a p p ro a ch l s sti o  Additional spam filtering options n Real-time block list (RBL) support n Mail-host block and allow lists by sender, domain and IP address
  • 15. Layered Spam Detection  On the same server, Exchange Intelligent Message Filter (IMF) scans before ASM  Each applies an Spam Confidence Level (SCL) rating n The higher rating always wins (has more confidence) n Mail that is rejected, deleted or archived by IMF will not make it to ASM  Example: IMF archives SCL 7,8 and 9 IMF SCL of 0-6 IMF ASM Mail Inbox Scan Scan ASM SCL Store set to 9 If SCL is 7,8,9 Archive Junk Folder E-mail
  • 17. Performance Bias Settings * Engines used are not always the same. They are dynamically allocated from A C the available pool. B D D Max Certainty: uses all engines (100%) Favor Certainty: uses 75% of available engines* Neutral: uses approximately 50% of available engines* Favor Performance: uses 25% of available engines* Max Performance: uses one engine for every scan*
  • 18. Performance Bias Settings * Engines used are not always the same. They are A dynamically allocated from the available pool. B Max Certainty: uses all engines (100%) Favor Certainty: uses 75% of available engines* Neutral: uses approx. 50% of available engines* Favor Performance: uses 25% of available engines* Max Performance: uses one engine for every scan*
  • 19. Scanning Innovations  In-memory scanning  Multi-threaded scanning EXE EXE 432kb Scanning Memory Process Return to Pool Allocation Available Memory Pool
  • 20. Worm Removal  Designed to purge all messages containing worms n Use Sybari Worm List (wormprge.dat) to purge messages that match a known Worm virus n Create a custom Worm List with a single wildcard ( * ) to help match all malicious code detected n Help provide pre-emptive protection against unknown worms with file filter purge (size, type, extension, etc.) n The user receives nothing, not even a notification  Purged messages containing worms should not be quarantined n There is no value in the message n Reduces network bandwidth by removing un-needed messages.
  • 21. Enhanced Cluster Support Active Node Passive Node Passive Node Active Node Settings Updates Exchange Virtual Server
  • 22. Central Management  Software Deployment  Configuration Template Deployment  Distributed Quarantine Management  Distributed Log File Retrieval SMTP Exchange Servers Servers
  • 23. Automated Signature Updating www.microsoft.com Internet Internet Engine Partner Updates Antigen Engine Adaptor
  • 25. Microsoft Operations Manager Integration Antigen Management Pack for MOM 2005  Over 100 Events, Performance Counters, and Services Monitored n Monitors the state of Antigen n Collects statistical data on scanning, detection, and removal of messages and attachments n Polls 5 Antigen Services - Provides timed events to poll systems for critical process health  Key Tasks: n Triggers scan engine updates n Centralizes storage and deployment of license files n Imports, exports and deploys setting changes n Initiates and/or schedules manual scan jobs n Starts/Stops control of Antigen services
  • 27. Content Policy Enforcement Filters body content for inappropriate Filters documents based on name match, keywords or phrases wild card, file type or file extension Body Content File name, type
  • 28. Summary  Microsoft provides comprehensive security products for e-mail servers n Multiple Engines n Integrated AV/AS n Availability and performance support n Central Management n Keyword and file filtering  Antigen e-mail security products are key elements of any Windows-based SMTP or Exchange server deployment
  • 29. Next Steps  Read whitepapers on Antigen and Advanced Spam Manager n http://www.microsoft.com/antigen n Paste link for launch PressPass article  Download evaluation copy of Antigen e-mail security products http://www.microsoft.com/antigen  Read about Microsoft Secure Messaging solutions n http://www.microsoft.com/securemessaging