Symantec Brightmail™ Gateway 9.0 Administration Guide

Article:DOC3004  |  Created: 2010-09-21  |  Updated: 2010-09-27  |  Article URL http://www.symantec.com/docs/DOC3004
Article Type
Documentation


Environment

Description



Contents

The Administration Guide explains how to configure Symantec Brightmail Gateway to filter messages, block and allow messages at connection, and block viruses and spam. The Administration Guide also describes how Symantec Brightmail Gateway controls message flow and message filtering and explains how you can configure email settings and group settings. The Administration Guide provides information about the mail transfer agent (MTA), configuring LDAP and content filtering, and how to monitor reports and the product status.

  • 1. Introducing Symantec Brightmail Gateway
    • About Symantec Brightmail Gateway
    • How Symantec Brightmail Gateway protects your network environment
    • What's new in Symantec Brightmail Gateway
    • Components of Symantec Brightmail Gateway
      • About the Symantec Brightmail Gateway software components
      • About the Symantec Brightmail Gateway hardware component
    • What you can do with Symantec Brightmail Gateway
    • How Symantec Brightmail Gateway works
    • Where to get more information
  • 2. Getting Started with Symantec Brightmail Gateway
    • Logging on and logging off
    • Feature dependencies
    • Preinstalled policies
      • About default policies and features
      • Default email spam policies
      • Default email virus policies
      • Default IM spim policies
      • Default IM virus policies
    • Performing initial configuration tasks
    • Performing optional configuration tasks
      • Setting up Scanners
      • Setting up system monitoring with alerts, logs, and report settings
      • Setting up certificates for authentication
      • Configuring Control Center settings
      • Configuring a directory data service
      • Setting up SNMP and UPS monitoring
      • Configuring email settings
      • Enabling reputation-based filtering features
      • Configuring spam, virus, and IM settings policies
      • Setting up email authentication
      • Creating policy groups and assigning policies
      • What you can do with content filtering
  • 3. Deploying Scanners
    • About Scanners
    • Adding Scanners
    • Verifying Scanner installation settings
      • Specifying DNS server addresses
      • Verifying Scanner time settings
      • Specifying proxy settings
      • Configuring Ethernet settings and routes
    • Configuring Scanner email settings
      • About Scanner email settings
      • Configuring mail flow direction
      • Changing Scanner inbound mail settings
      • Changing Scanner inbound mail acceptance settings
      • Configuring Scanner inbound email delivery settings
      • Changing Scanner outbound mail settings
      • Changing Scanner outbound mail acceptance settings
      • Configuring Scanner outbound mail delivery settings
      • Configuring bad message handling
    • Configuring SMTP advanced settings
      • SMTP advanced inbound settings
      • SMTP advanced outbound settings
      • SMTP advanced delivery settings
      • SMTP advanced settings for delivery bindings
      • SMTP advanced authentication settings
    • Specifying internal mail hosts for non-gateway deployments
      • Internal mail servers: non-gateway deployments
    • Modifying Scanner configurations
    • Enabling and disabling Scanners
    • Stopping and starting Scanners
    • Deleting Scanners
    • Managing services and MTA operations
      • Services and MTA operations
      • Scanner Services
      • MTA and message queue behavior
  • 4. Configuring email settings
    • Configuring email domains
      • About email domains
      • Adding or editing domains
      • Importing a domains list
      • Deleting domains
      • About email domain acceptance settings
    • Configuring email aliases and address masquerades
      • About aliases and address masquerades
      • Adding or editing aliases
      • Importing aliases
      • Alias addresses
      • Adding or editing address masquerades
      • Importing an address masquerade list
    • Configuring invalid recipient handling
      • About invalid recipients
      • Setting up invalid recipient handling
    • Configuring email message flow
      • About email message flow
      • Email message flow phases
    • Configuring email for SMTP authentication
      • About using SMTP authentication
      • How to set up SMTP authentication
      • Configuring SMTP authentication mail settings
      • Best practices for using SMTP authentication
  • 5. Setting up email authentication
    • Enabling SPF and Sender ID authentication
    • Configuring DKIM authentication
    • Adding a domain key
    • Importing a domain key
    • Managing domain keys
      • Viewing a domain key
      • Deleting a domain key
    • Enabling DKIM validation
    • Enabling DKIM signing for a domain
    • Creating a content filtering policy for DKIM validation
  • 6. Setting up sender groups
    • Enabling or disabling good and bad sender groups
    • Choosing actions for good and bad sender groups
    • Managing sender group members
      • Adding senders to administrator and third party sender groups
      • Editing good and bad sender group members
      • Deleting good and bad sender group members
      • Enabling or disabling good and bad sender group members
      • Importing good and bad sender group entries
    • Sender group import file formats
    • Exporting sender group information
    • Supported methods for identifying senders
  • 7. Enabling reputation filtering
    • Managing email traffic at the gateway
      • About blocking and allowing messages at connection time
      • About managing connection load at the gateway
      • Configuring Connection Classification
      • Connection class default settings
    • Configuring email virus attack recognition
    • Configuring directory harvest attack recognition
    • About blocking and allowing messages using sender groups
    • Using Fastpass
      • About conserving resources using Fastpass
      • Configuring Fastpass
    • Defending against bounce attacks
      • About defending against bounce attacks
      • Configuring the Control Center for bounce attack prevention
      • Configuring policy groups for bounce attack prevention
      • Creating an email spam policy for bounce attack prevention
    • Researching IP address reputation
  • 8. Setting up certificates
    • About certificates
    • Adding self-signed, certificate authority-signed, and CA certificates
      • Adding a self-signed certificate
      • Adding a certificate authority-signed certificate
      • Modifying a certificate authority-signed certificate import file
      • Adding a CA certificate
      • Viewing existing CA certificates
      • Requesting a certificate authority-signed certificate
      • Importing a certificate authority-signed certificate
      • Exporting a certificate authority-signed certificate
      • Replacing all existing CA certificates
      • Backing up CA certificates
      • Changing a certificate or domain key name
    • PEM format requirements for certificates and domain keys
    • Viewing an SMTP/TLS or HTTPS certificate
    • Deleting an SMTP/TLS or HTTPS certificate
    • Assigning certificates
      • Assigning an MTA TLS certificate to a Scanner
      • Assigning a user interface HTTPS certificate to the Control Center
  • 9. Detecting viruses and malicious attacks
    • About detecting viruses and malicious attacks
    • Product technologies that detect viruses and malicious attacks
    • What you can do with suspicious attachments
    • Spyware or adware verdict details
    • How to detect viruses and malicious threats
    • Creating email virus policies
    • Managing email virus policies
      • Modifying email virus policies
      • Enabling or disabling email virus policies
      • Deleting email virus policies
      • Copying email virus policies
    • Using lists to improve virus scanning performance
      • Excluding file types from virus scanning
      • Modifying the file types to exclude from scanning
      • Enabling or disabling the lists of file types to exclude from scanning
      • Deleting lists of file types to exclude from scanning
      • Exporting lists of the file types to exclude from scanning
    • Setting limits on nested files
    • Keeping virus definitions current
      • About updating virus definitions
      • Viewing the status of your virus definitions
      • Scheduling automatic virus definition updates
      • Disabling automatic virus definition updates
      • Initiating virus definition updates on demand
      • Specifying from where to obtain virus definitions
      • Obtaining definitions when a new, emerging threat is discovered
    • Modifying the heuristic level
  • 10. Quarantining suspected viruses
    • About quarantining suspected viruses
    • About navigating the Suspect Virus Quarantine
    • Configuring suspect virus message settings
      • Choosing the language encoding for suspect virus messages
      • Specifying the number of suspect virus message entries to view per page
      • Specifying how long suspect virus messages are retained in quarantine
      • Modifying the disk space allotted for Suspect Virus Quarantine
    • Working with suspect viruses messages
      • Viewing suspect virus messages in quarantine
      • Sorting suspect virus messages in quarantine
      • Deleting suspect virus messages in quarantine
      • Releasing suspect virus messages from quarantine
      • Searching quarantined virus messages
      • Suspect virus message search criteria and tips
  • 11. Filtering spam
    • About filtering spam
    • Configuring spam detection
    • Creating email spam policies
    • Enabling and disabling spam policies
    • Modifying spam policies
    • Copying spam policies
    • Deleting spam policies
    • Configuring the threshold for suspected spam identification
    • Enabling or disabling URI reporting to Symantec
  • 12. Participating in the Symantec Probe Network
    • About the Symantec Probe Network
    • About probe accounts
    • About creating probe accounts
    • Setting up probe accounts
    • Enabling probe participation
    • Creating probe accounts from invalid recipient email addresses
    • Creating probe accounts manually
    • Enabling probe accounts
    • Disabling a probe account
    • Deleting a probe account
  • 13. Quarantining spam
    • About quarantining spam
    • Before you use Spam Quarantine
    • Quarantining spam sent to unresolved email addresses
    • About navigating Spam Quarantine
    • Configuring Spam Quarantine settings
      • Configuring Spam Quarantine for administrator-only access
      • Choosing the language encoding for spam messages
      • Modifying Spam Quarantine thresholds
      • Spam Quarantine threshold considerations
      • Specifying how long spam messages are retained in quarantine
      • Specifying when and how often Spam Quarantine is expunged
      • Specifying who to notify of false positive messages
    • Viewing messages in the Spam Quarantine
      • How Spam Quarantine differs for administrators and users
      • Viewing spam and suspected spam messages in quarantine
      • Viewing spam and suspected spam messages sent to the postmaster mailbox
    • Working with messages in the Spam Quarantine
      • Specifying the number of entries to appear on the Spam Quarantine Message list page
      • Sorting spam and suspected messages in quarantine by date
      • Searching quarantined spam messages
      • Spam message search criteria and tips
      • Viewing spam message headers
      • Releasing false-positive messages from quarantine
      • Deleting spam messages in quarantine
    • Configuring spam handling for distribution lists
      • About configuring the user and distribution list notification digests
      • About how spam is handled when addressed to distribution lists
      • Specifying when to notify users of spam messages in their quarantine
      • Modifying the spam notification message digest templates
      • Spam notification message variables
      • Enabling notification digests for distribution lists
      • Selecting the notification digest format
    • Troubleshooting Spam Quarantine
  • 14. Filtering IM
    • Creating IM virus policies
    • Creating IM spim policies
    • About IM
    • Enabling IM filtering
    • About spim
    • About how spim works
    • About detecting spim
      • About detecting known spim
      • About detecting suspected spim
    • Enabling spim detection
    • Registering IM users
      • About registering IM users
      • About the IM user registration process
      • Enabling IM user registration
      • Editing IM user registration text
      • Registering an IM user as an administrator
      • Self-registering an IM user
      • Editing and deleting registered IM users
    • Blocking access to an IM network
  • 15. Creating policy groups
    • About policy groups
    • Creating a policy group
    • Adding members to a policy group
    • Managing policy group members
      • Importing and exporting policy group members
      • Researching policy group membership for a user
    • Editing, deleting, enabling, or disabling a policy group
    • Selecting filtering policies for policy groups
      • Selecting virus policies for a policy group
      • Virus categories and default actions
      • Selecting spam and spim policies for a policy group
      • Selecting Network Access Control policies for a policy group
      • Selecting content filtering policies for a policy group
    • Enabling and disabling end user settings for policy groups
    • Requirements for enabling end-user settings for policy groups
    • Allowing or blocking email based on language
    • Setting policy group precedence
  • 16. Creating content filtering policies
    • About content filtering
    • Creating a basic content filtering policy
    • Creating a content filtering policy
    • Content filtering policy components
    • Defining content filtering policy templates
      • About content filtering policy templates
      • Selecting a content filtering policy template
      • Naming your content filtering policy
      • Described Content policy templates
      • Structured Data policy templates
    • Setting content filtering policy conditions
      • Considerations for content filtering policy conditions
      • Configuring content filtering policy conditions
      • Content filtering policy conditions
      • Message parts used in conditions
      • Content filtering condition match criteria
      • Employing regular expressions in content filtering policy conditions
      • Regular expressions and associated templates
      • Regular expression types for content filtering policy conditions
    • Setting content filtering policy actions
      • Specifying content filtering policy actions
      • Content filtering policy actions
    • Applying content filtering policies to policy groups
    • Managing content filtering policies
      • Editing content filtering policies
      • Deleting content filtering policies
      • Copying content filtering policies
      • Enabling and disabling content filtering policies
      • Specifying the order that content filtering policies are evaluated
  • 17. Building advanced content filtering policies with resources
    • About content filtering policy resources
    • How to use structured data in a content filtering policy
    • Managing structured data sources
      • About your data source files
      • Creating a record for structured data
      • About mapping your data source file columns
      • System patterns
      • Mapping data source file columns to fields in Symantec Brightmail Gateway
      • Uploading data source files
      • Replicating records
      • Modifying records
      • Deleting records
      • About record views
      • Creating record views
      • Editing record views
      • Deleting record views
    • Adding and modifying violation notifications
      • About policy violation notifications
      • Creating policy violation notifications
      • Editing policy violation notifications
      • Deleting policy violation notifications
    • Working with dictionaries
      • About content filtering dictionaries
      • Considerations when you use dictionaries
      • Scanning non-plain text file attachments for content filtering violations
      • Exporting words or phrases from dictionaries
      • Disabling and enabling predefined words or phrases in dictionaries
      • Creating user-defined dictionaries
      • Importing words or phrases into dictionaries
      • Editing dictionaries
      • Deleting user-defined words or phrases from dictionaries
      • Finding words or phrases in dictionaries
      • Deleting dictionaries
      • Premium and custom content filtering dictionaries
    • Using patterns to detect policy violations
      • About patterns
      • Creating your own custom patterns
      • Editing patterns
      • Deleting patterns
    • Creating annotations to append to prohibited text
      • Annotating messages that contain violations
      • Editing annotations
      • Deleting annotations
    • Using lists to detect prohibited attachments
      • About attachment lists
      • Creating lists to detect file attachment types
      • Editing attachment lists
      • Deleting attachment lists
      • Predefined attachment lists
      • Perl-compatible regular expressions
      • Perl-compatible regular expression examples
    • Specifying where to save archived messages
  • 18. Working with content filtered incidents
    • About content filtered incidents
    • Configuring content incident folders
      • About content incident folders
      • About managing the size of content incident folders
      • Creating content incident folders
      • Editing content incident folders
      • Deleting content incident folders
      • Scheduling the content incident folder Expunger
    • Monitoring and acting on incidents
      • About monitoring and acting on incidents
      • Creating incident notifications
      • Viewing incidents in content incident folders
      • Acting on multiple incidents at a time
      • Content incident actions
      • Archiving incidents
      • Exporting an incident's history
      • Forwarding incidents
      • Deleting incidents
      • Approving, rejecting, or holding quarantined incidents
      • Updating an incident's status
      • Changing an incident's severity level
      • Viewing an incident's history
    • Encrypting data with Symantec Content Encryption
      • About encrypting messages with Symantec Content Encryption
      • Preparing your system for content encryption
      • Managing the host and port information for content encryption
      • Provisioning a content encryption account
  • 19. Leveraging Symantec Network Prevent
    • About Symantec Network Prevent
    • Required ports for Symantec Network Prevent integration
    • How Symantec Brightmail Gateway and Symantec Network Prevent interact
    • Common Symantec Network Prevent actions
    • Supported Symantec Network Prevent delivery modes
    • About failure behavior with Symantec Network Prevent
    • How to resolve a delivery queue back up to Symantec Network Prevent
    • Enabling or disabling bypass for Symantec Network Prevent
    • How to create a policy to detect unscanned email if Symantec Network Prevent bypass is enabled
    • About Symantec Network Prevent reports
    • About performance implications for Symantec Network Prevent integration
    • About Symantec Network Prevent preference order
    • Troubleshooting Symantec Network Prevent integration: messages bounce
    • Troubleshooting Symantec Network Prevent integration: deferred messages
    • How to configure Symantec Network Prevent to return email to Symantec Brightmail Gateway
    • Configuring email connections to and from Symantec Network Prevent
    • Creating an incident based on Symantec Network Prevent header markup
    • About taking Symantec Network Prevent servers offline for maintenance
  • 20. Configuring directory data integration
    • About using the directory data service
    • Creating a data source
    • Adding a data source
    • Enabling functions on a new data source
      • About data sources and functions
      • Creating a recipient validation data source
      • Creating an authentication data source
      • Creating a routing data source
      • Creating an address resolution data source
      • About using the authentication function with your data source
      • About using the routing function with your data source
      • About using the address resolution function with your data source
      • About using the recipient validation function with your data source
    • About data source queries
    • Creating and testing data source queries
      • Creating and testing a custom recipient validation query
      • Creating and testing a custom authentication and quarantine address resolution query
      • Creating and testing a custom routing query
      • Creating and testing a custom address resolution query
  • 21. Managing Directory Data Integration
    • Expanding distribution lists and preserving recipient addresses
      • About expanding distribution lists and preserving recipient addresses
      • Enabling distribution list expansion for your data sources
      • Preserving recipient addresses for your data sources
    • Modifying an existing data source
      • About modifying existing data sources
      • Disabling or enabling a data source
      • Deleting a data source
      • Editing a data source
      • Editing the LDAP server configuration for a data source
      • Enabling or editing the authentication function
      • Enabling or editing the address resolution function
      • Enabling or editing the routing function
      • Enabling or editing the recipient validation function
      • Editing advanced settings for a data source
    • Setting directory data cache
      • About the directory data cache
      • Enabling cache persistence
      • About preloading your directory data cache
      • Preloading your data cache
    • Configuring data source advanced settings
  • 22. Creating reports
    • About working with reports
    • Selecting the data to track for reports
    • Creating and configuring reports
    • Report types
    • Managing favorite reports
      • Saving favorite reports
      • Editing a favorite report's filter options
      • Editing a favorite report's schedule
      • Copying favorite reports
      • Deleting favorite reports
    • Generating reports
      • About generated reports layout and data
      • Running reports on demand
      • Generating reports automatically
      • Canceling scheduled reports
      • Emailing generated reports
      • Specifying the report email notification sender and subject line
      • Printing generated reports
      • Saving generated reports
    • Purging report data
      • Specifying how long report data is retained
      • Specifying when and how often report data is purged
      • Deleting all report data at one time
    • Troubleshooting report generation
  • 23. Monitoring system status
    • About monitoring system status
    • Monitoring system status from the Dashboard
      • About the Dashboard
      • Viewing the Dashboard
      • Threat category components
    • Monitoring host computers and service status
      • Viewing information about your hardware
      • Viewing the status of your hardware
      • Viewing the status of your software and services
      • Software and services status definitions
    • Monitoring log data
      • About logs
      • Log types
      • Viewing log files
      • Viewing the Control Center error log
      • Saving log files
      • Managing the log database size
      • Configuring log levels
      • Manually deleting log files
      • About log disk space alerts
      • Clear disk space checklist
    • Monitoring logs on a remote server
      • Configuring remote logging to syslog
      • Standard prefix for Scanner logs sent to remote syslog
      • Log format of boot.log, cron, message, and secure components for remote syslog
      • Log format of Conduit, Brightmail Client, Brightmail Engine, JLU Controller, and IM Relay for remote syslog
      • Log format of mail transfer agent for remote syslog
      • Log format of message audit logs for remote syslog
    • Monitoring SMTP status
      • About message audit logging
      • Format of audit logs
      • Audit log events
        • ACCEPT
        • ATTACH
        • DELIVER
        • IRCPTACTION
        • MSGID
        • ORCPTS
        • SENDER
        • SOURCE
        • SUBJECT
        • VERDICT
        • VIRUS
      • Enabling the Message Audit Log
      • Searching for a message in the Message Audit Log
      • Exporting Message Audit Log data
      • About message queues
      • Viewing queued messages
      • Rerouting messages in the delivery queue
      • Deleting queued messages
      • Stopping the mail flow
      • Flushing message queues
      • Monitoring message queue size and volume
      • Troubleshooting the message queue
    • Monitoring IM status
      • Viewing IM users that are signed on
      • Viewing the connection status of your IM networks
    • Monitoring scheduled tasks
      • About scheduled tasks
      • Scheduled task types
  • 24. Administering your product through the Control Center
    • Managing administrators
      • Setting up administrator accounts
      • Administrator rights
      • Editing an administrator
      • Deleting an administrator
    • Configuring the Control Center
      • About simultaneous Control Center access
      • About specifying host names for Control Center access
      • Specifying which hosts can access the Control Center
      • Configuring SNMP settings to monitor network devices
      • Configuring the Control Center listener port
      • Bypassing the security warning when you access the Control Center
      • Designating a Control Center certificate
      • Setting the locale encoding and fallback encoding
      • Converting 8-bit MIME messages to 7-bit MIME
      • Customizing the date format and time format
      • Date format and time format pattern syntax
    • Customizing user preferences in the Control Center
      • Specifying a custom user Login help page
      • Enabling users to bypass Control Center login credentials
      • Configuring the replication of end user preference data
      • Setting up your SMTP greetings and postmaster address
    • Setting up alerts
      • Types of alerts
      • Configuring alerts
      • Configuring low disk space alerts
      • Setting scheduled task failure alerts
      • Configuring Control Center SMTP settings for alerts and reports
    • Managing passwords
      • Resetting an administrator password
      • Enforcing strong passwords
      • Password best practices
      • Strong password criteria
    • Maintaining an appliance
      • About maintaining adequate disk space
      • Turning off an appliance
      • Restarting an appliance
      • Resetting an appliance to its factory default
      • Configuring UPS settings
    • Managing backups
      • Scheduling backups
      • Editing a scheduled backup
      • Deleting a scheduled backup
      • Performing an on-demand backup
      • Restoring an appliance from backups
      • About backing up log data
    • Keeping your system current
      • Licensing your product
      • Viewing license statuses
      • Updating your software
      • Determining which version of software is installed
      • Software update best practices
      • About software updates
      • Monitoring software update using the command line interface
    • Working with diagnostics
      • About troubleshooting issues with Symantec Brightmail Gateway with diagnostics
      • Running network utilities from the Control Center
      • Specifying what to include in diagnostic packages
      • Generating and downloading diagnostic packages
      • Generating diagnostic packages and transferring them to a remote location
      • Deleting diagnostic packages
  • 25. Administering Symantec Brightmail Gateway through the command line
    • Administering Symantec Brightmail Gateway through the command line
    • Command line interface access methods
  • A. Command reference
    • agent-config - configures the agent that connects hosts to the Control Center
    • cat - standard Linux command to view a filesynopsis omitted intentionally
    • cc-config - configures the logging and network access to the Control Center
    • clear - standard Linux command to clear the screen
    • db-backup - back up the Control Center database
    • db-restore - restores the Brightmail databases to an appliance from previously created backups on the appliance or from remote locations with FTP, SCP, and HTTP
    • delete - clear logs, configuration information, and data
    • diagnostics - generate diagnostics package
    • dns-control - control the local DNS cache
    • grep - a standard Linux command to search in files for text or a regular expression
    • help - Display help for individual commands or display all available commands.
    • ifconfig - a standard Linux command to configure network interfaces
    • iostat - a standard Linux command to display CPU and device load
    • ldapsearch - a standard Linux command to query an LDAP directory
    • list - display the file names of all files that certain commands can act on
    • mallog - list, backup, or restore Message Audit Logs
    • malquery - query Message Audit Logs
    • monitor - view and record information about Brightmail-specific processes
    • more - a standard Linux command to page through a text file
    • mta-control - control the MTA processes and backup and restore mail queues
    • netstat - a standard Linux command to view network connections
    • nslookup - a standard Linux command to query DNS servers
    • password - change your administrative password
    • ping - a standard Linux command to test for a response from a remote computer
    • reboot - reboot the appliance
    • route - a standard Linux command to show and manipulate the IP routing table
    • rpmdb - manage and repair the RPM database
    • service - a standard Linux command to start or stop services
    • show - display system information
    • shutdown - shut down the appliance without rebooting
    • sshd-config - configure which addresses can SSH to the appliance
    • tail - a standard Linux command to view the end of a file
    • telnet - a standard Linux command to connect to a remote computer
    • traceroute - a standard Linux command to view the path taken by network packets
    • update - update the appliance software
  • B. Message filtering options
    • About filtering
    • Verdicts and actions for email messages
    • Verdicts and actions for instant messages
    • Multiple actions per verdict
    • Verdict and action combinations
    • About multiple content filtering policies
    • Limits on combining actions
    • Action processing combinations
    • User interface action combinations
    • Verdicts by verdict category
    • Verdict combinations
  • C. Content filtering templates
    • U.S. regulatory policy templates
      • Export Administration Regulations (EAR) policy template
      • Gramm-Leach-Bliley policy template
      • HIPAA policy template
      • International Traffic in Arms Regulations (ITAR) policy template
      • NASD Rule 2711 and NYSE Rules 351 and 472 policy template
      • NASD Rule 3010 and NYSE Rule 342 policy template
      • NERC Security Guidelines for Electric Utilities policy template
      • Office of Foreign Assets Control (OFAC) policy template
      • Payment Card Industry Data Security Standard policy template
      • Sarbanes-Oxley policy template
      • SEC Fair Disclosure Regulation policy template
      • State Data Privacy policy template
    • Confidential data-protection policy templates
      • Confidential Documents policy template
      • Defense Message System (DMS) GENSER Classification policy template
      • Design Documents policy template
      • Encrypted Data policy template
      • Financial Information policy template
      • Mergers and Acquisition Data policy template
      • Price Information policy template
      • Project Data policy template
      • Publishing Documents policy template
      • Resumes policy template
      • Source Code policy template
      • US Intelligence Control Markings (CAPCO) and DCID 1/7 policy template
    • Acceptable use policy templates
      • Competitor Communications policy template
      • Gambling policy template
      • Illegal Drugs policy template
      • Media Files policy template
      • Offensive Language
      • Racist Language
      • Restricted Files
      • Restricted Recipients
      • Sexually Explicit Language policy template
      • Violence and Weapons policy template
    • Customer and employee data-protection templates
      • Canadian Social Insurance Number policy template
      • Credit Card Numbers policy template
      • Customer Data Protection policy template
      • Employee Data Protection policy template
      • Individual Taxpayer Identification Numbers (ITIN) policy template
      • SWIFT Codes policy template
      • UK Drivers License Numbers policy template
      • UK Electoral Roll Numbers policy template
      • UK National Insurance Number policy template
      • UK Passport Numbers policy template
      • UK Tax ID Numbers policy template
      • US Social Security Numbers policy template
    • Network security policy templates
      • Network Diagrams policy template
      • Network Security policy template
      • Password Files policy template
    • UK and international regulatory policy templates
      • Caldicott Report policy template
      • Data Protection Act 1998 policy template
      • EU Data Protection Directives policy template
      • Human Rights Act 1998 policy template
      • PIPEDA policy template
  • Glossary
  • Index

Attachments

sbg_administration_guide.pdf (8 MBytes)

Legacy ID



v35298200_v31642521


Article URL http://www.symantec.com/docs/DOC3004


Terms of use for this information are found in Legal Notices