TrendMicro Hosted Email Security
TrendMicro Hosted Email Security
	
	                                   	
Table	of	Contents	
1	     Best	Practice	Configurations	.................................................................................................................................	8	
     1.1	     Activating	a	domain	.......................................................................................................................................	8	
     1.2	     Adding	Approved/Blocked	Sender	................................................................................................................	8	
     1.3	     HES	order	of	evaluating	emails	......................................................................................................................	8	
     1.4	     Inbound	Emails	..............................................................................................................................................	9	
       1.4.1	           Enable	Valid	Recipient	check	..............................................................................................................	9	
       1.4.2	           Make	sure	default	virus	policy	is	set	to	delete	....................................................................................	9	
       1.4.3	           Add	filters	to	default	spam	and	phish	policy	.......................................................................................	9	
       1.4.4	           Avoid	long	and	complex	regular	expression	in	Keyword	Expression	................................................	10	
     1.5	     Outbound	Email...........................................................................................................................................	11	
       1.5.1	           Add	additional	outbound	spam	and	phish	policy	..............................................................................	11	
     1.6	     Securing	your	Environment	.........................................................................................................................	12	
       1.6.1	           Securing	your	Mail	Server	.................................................................................................................	12	
       1.6.2	           Securing	your	Users/Clients	..............................................................................................................	12	
     1.7	     Common	Threat	preventions	......................................................................................................................	12	
       1.7.1	           Spoof	Emails	......................................................................................................................................	12	
       1.7.2	           Backscatter	(or	"outscatter")	spam	and	Directory	Harvest	Attacks	(DHA)	Emails	............................	18	
       1.7.3	           Zero	day	unknown	Threats	...............................................................................................................	19	
       1.7.4	           Ransomware/Macro	Virus	Emails	.....................................................................................................	19	
2	     Product	Description	.............................................................................................................................................	20	
     2.1	     Mail	Flow	.....................................................................................................................................................	21	
       2.1.1	           Inbound	Scanning	..............................................................................................................................	21	
            2.1.1.1	        IP	Reputation-Based	Filtering	at	the	MTA	Connection	Level	........................................................	22	
              2.1.1.1.1	        Content-Based	Filtering	at	the	Message	Level	.........................................................................	22	
            2.1.1.2	        General	Order	of	Evaluation	.........................................................................................................	23	
            2.1.1.3	        Sender	Filter	Order	of	Evaluation	.................................................................................................	24	
            2.1.1.4	        IP	Reputation	Order	of	Evaluation	................................................................................................	24	
            2.1.1.5	        Policy	Order	of	Evaluation	............................................................................................................	25	
       2.1.2	           Outbound	Scanning	...........................................................................................................................	26	
     2.2	     Message	Retention	......................................................................................................................................	27	
3	     Preparation	..........................................................................................................................................................	28	
     3.1	     Service	Requirements	..................................................................................................................................	28	
     3.2	     Default	Hosted	Email	Security	Settings	.......................................................................................................	28	
4	     Getting	Started	....................................................................................................................................................	29	
     4.1	     Registration	.................................................................................................................................................	29	
     4.2	     Starting	the	Activation	Process	...................................................................................................................	31	
       4.2.1	           Adding	Office	365	Inbound	Connectors	............................................................................................	33	
       4.2.2	           Adding	Office	365	Outbound	Connectors	.........................................................................................	34	
     4.3	     Finalizing	Activation	.....................................................................................................................................	35	
       4.3.1	           Repointing	MX	Records	(Best	Practice)	.............................................................................................	36	
       4.3.2	           About	MX	Records	and	Hosted	Email	Security	.................................................................................	38	
     4.4	     Accessing	the	Administrator	Console	..........................................................................................................	39	
       4.4.1	           Using	CLP	to	Access	the	Administrator	Console	................................................................................	39	
5	     Management	Console	.........................................................................................................................................	42	
     5.1	     Working	with	the	Dashboard	......................................................................................................................	42	
       5.1.1	           Summary	Chart	.................................................................................................................................	44	
       5.1.2	           Volume	Chart	....................................................................................................................................	45	
       5.1.3	           Bandwidth	Chart	...............................................................................................................................	46	
       5.1.4	           Threats	Chart	.....................................................................................................................................	47	
       5.1.5	           Threats	Details	Chart	.........................................................................................................................	49	
       5.1.6	           Advanced	Analysis	Details	Chart	.......................................................................................................	51	
       5.1.7	           Top	Spam	Chart	.................................................................................................................................	52	
       5.1.8	           Top	Virus	Chart	.................................................................................................................................	53	
       5.1.9	           Top	Analyzed	Advanced	Threats	.......................................................................................................	54	
     5.2	     Configuring	a	Policy	.....................................................................................................................................	56	
       5.2.1	           Managing	Policy	Rules	......................................................................................................................	56	
       5.2.2	           Selecting	User	Accounts	for	Rules	.....................................................................................................	57	
       5.2.3	           About	Rule	Target	Criteria	................................................................................................................	57	
            5.2.3.1	        Configuring	Virus	or	Malicious	Code	Criteria	................................................................................	58	
              5.2.3.1.1	        About	Advanced	Threat	Scan	Engine	.......................................................................................	60	
            5.2.3.2	        Configuring	Spam	Criteria	.............................................................................................................	60	
            5.2.3.3	        Configuring	Phish	Criteria	.............................................................................................................	61	
            5.2.3.4	        Configuring	Marketing	Message	Criteria	......................................................................................	61	
            5.2.3.5	        Configuring	Social	Engineering	Attack	Criteria	.............................................................................	61	
            5.2.3.6	        Configuring	Advanced	Criteria	......................................................................................................	63	
              5.2.3.6.1	        About	Keyword	Expressions	.....................................................................................................	66	
                  5.2.3.6.1.1	 Using	Keyword	Expressions	................................................................................................	67	
         5.2.3.6.1.2	 Adding	Keyword	Expressions	.............................................................................................	67	
         5.2.3.6.1.3	 Editing	Keyword	Expressions	.............................................................................................	67	
     5.2.3.6.2	       Using	Attachment	Name	or	Extension	Criteria	........................................................................	68	
     5.2.3.6.3	       Using	Attachment	MIME	Content-type	Criteria	.......................................................................	69	
     5.2.3.6.4	       Using	Attachment	True	File	Type	Criteria	................................................................................	69	
     5.2.3.6.5	       Using	Message	Size	Criteria	......................................................................................................	70	
     5.2.3.6.6	       Using	Subject	Matches	Criteria	................................................................................................	70	
     5.2.3.6.7	       Using	Subject	is	Blank	Criteria	..................................................................................................	71	
     5.2.3.6.8	       Using	Body	Matches	Criteria	....................................................................................................	71	
     5.2.3.6.9	       Using	Specified	Header	Matches	Criteria	.................................................................................	71	
     5.2.3.6.10	 Using	Attachment	Content	Matches	Keyword	Criteria	...........................................................	71	
     5.2.3.6.11	 Using	Attachment	Size	Criteria	...............................................................................................	71	
     5.2.3.6.12	 Using	Attachment	Number	Criteria	........................................................................................	72	
     5.2.3.6.13	 Using	Attachment	is	Password	Protected	Criteria	..................................................................	72	
     5.2.3.6.14	 Using	the	Number	of	Recipients	Criteria	................................................................................	73	
5.2.4	        About	Rule	Actions	............................................................................................................................	73	
  5.2.4.1	        Specifying	Rule	Actions	.................................................................................................................	74	
  5.2.4.2	        "Intercept"	Actions	.......................................................................................................................	74	
     5.2.4.2.1	       Using	the	Delete	Action	............................................................................................................	75	
     5.2.4.2.2	       Using	the	Deliver	Now	Action	...................................................................................................	75	
     5.2.4.2.3	       Using	the	Change	Recipient	Action	..........................................................................................	75	
     5.2.4.2.4	       Using	the	Quarantine	Action	....................................................................................................	76	
  5.2.4.3	        "Modify"	Actions	...........................................................................................................................	76	
     5.2.4.3.1	       Cleaning	Cleanable	Viruses	.......................................................................................................	76	
     5.2.4.3.2	       Deleting	Matching	Attachments	..............................................................................................	76	
     5.2.4.3.3	       Tagging	the	Subject	Line	...........................................................................................................	77	
     5.2.4.3.4	       Inserting	a	Stamp	.....................................................................................................................	77	
         5.2.4.3.4.4	 Configuring	Stamps	............................................................................................................	78	
     5.2.4.3.5	       Rule	Tokens/Variables	..............................................................................................................	78	
  5.2.4.4	        "Monitor"	Actions	.........................................................................................................................	79	
     5.2.4.4.1	       About	the	Send	Notification	Action	..........................................................................................	79	
         5.2.4.4.1.5	 Configuring	Send	Notification	Actions	...............................................................................	80	
         5.2.4.4.1.6	 Deleting	Notifications	from	Rule	Actions	...........................................................................	80	
         5.2.4.4.1.7	 Deleting	Notifications	from	Lists	of	Messages	...................................................................	80	
         5.2.4.4.2	       Using	the	Bcc	Action	.................................................................................................................	80	
       5.2.4.5	       "Scan	Limitations"	Actions	............................................................................................................	80	
         5.2.4.5.1	       Rejecting	Messages	..................................................................................................................	81	
         5.2.4.5.2	       Bypassing	Messages	.................................................................................................................	81	
       5.2.4.6	       Encrypting	Outbound	Messages	...................................................................................................	81	
  5.2.5	          Naming	and	Enabling	a	Rule	.............................................................................................................	81	
5.3	     Configuring	Sender	Filter	.............................................................................................................................	82	
  5.3.1	          Adding	Senders	.................................................................................................................................	83	
  5.3.2	          Editing	Senders	.................................................................................................................................	84	
5.4	     Understanding	IP	Reputation	......................................................................................................................	85	
  5.4.1	          About	Dynamic	IP	Reputation	Settings	.............................................................................................	85	
  5.4.2	          About	Standard	IP	Reputation	Settings	.............................................................................................	86	
  5.4.3	          About	Approved	and	Blocked	IP	Addresses	......................................................................................	87	
  5.4.4	          Troubleshooting	Issues	.....................................................................................................................	88	
5.5	     Understanding	Advanced	Protection	..........................................................................................................	88	
  5.5.1	          About	Transport	Layer	Security	(TLS)	................................................................................................	88	
       5.5.1.1	       Testing	TLS	....................................................................................................................................	89	
       5.5.1.2	       Adding	TLS	Peers	...........................................................................................................................	90	
       5.5.1.3	       Editing	TLS	Peers	...........................................................................................................................	91	
  5.5.2	          About	Sender	Policy	Framework	(SPF)	..............................................................................................	91	
       5.5.2.1	       Enabling	or	Disabling	Sender	Policy	Framework	(SPF)	..................................................................	92	
       5.5.2.2	       Adding	an	SPF	Peer	to	the	Ignored	List	.........................................................................................	93	
       5.5.2.3	       Editing	an	SPF	Peer	in	the	Ignored	List	.........................................................................................	93	
       5.5.2.4	       Deleting	SPF	Peers	from	Ignored	List	............................................................................................	93	
5.6	     Understanding	Quarantine	..........................................................................................................................	94	
  5.6.1	          Querying	the	Quarantine	..................................................................................................................	94	
  5.6.2	          About	the	Quarantine	Digest	............................................................................................................	96	
       5.6.2.1	       Configuring	the	Quarantine	Digest	...............................................................................................	97	
5.7	     Understanding	Mail	Tracking	......................................................................................................................	99	
  5.7.1	          About	the	Blocked	Traffic	Tab	.........................................................................................................	100	
  5.7.2	          About	the	Accepted	Traffic	Tab	......................................................................................................	101	
  5.7.3	          About	the	Unresolved	Traffic	Tab	...................................................................................................	102	
  5.7.4	          Social	Engineering	Attack	Log	Details	.............................................................................................	103	
5.8	     Understanding	Policy	Events	.....................................................................................................................	105	
    5.9	     Configuring	Administration	Settings	.........................................................................................................	107	
      5.9.1	          Managing	Administrator	Accounts	.................................................................................................	107	
           5.9.1.1	      About	Account	Management	.....................................................................................................	107	
           5.9.1.2	      Adding	and	Configuring	an	Administrator	Account	....................................................................	108	
           5.9.1.3	      Editing	Administrator	Account	Configuration	.............................................................................	108	
           5.9.1.4	      Deleting	Administrator	Accounts	................................................................................................	109	
           5.9.1.5	      Changing	Administrator	Passwords	............................................................................................	109	
           5.9.1.6	      Enabling	or	Disabling	an	Administrator	Account	........................................................................	109	
      5.9.2	          Changing	End-User	Passwords	........................................................................................................	109	
      5.9.3	          About	End-User	Managed	Accounts	...............................................................................................	110	
           5.9.3.1	      Removing	End-User	Managed	Accounts	.....................................................................................	111	
      5.9.4	          About	Directory	Management	........................................................................................................	111	
           5.9.4.1	      Importing	User	Directories	.........................................................................................................	112	
           5.9.4.2	      Synchronizing	User	Directory	.....................................................................................................	114	
           5.9.4.3	      Verifying	User	Directories	...........................................................................................................	114	
      5.9.5	          About	Domain	Management	..........................................................................................................	115	
           5.9.5.1	      Adding	a	Domain	........................................................................................................................	116	
           5.9.5.2	      Managing	Domains	.....................................................................................................................	118	
             5.9.5.2.1	      Enabling	Outbound	Filtering	for	a	Domain	.............................................................................	118	
      5.9.6	          About	Co-Branding	..........................................................................................................................	119	
           5.9.6.1	      Accessing	the	Co-Branded	Administrator	Console	and	End	User	Quarantine	Website	..............	120	
      5.9.7	          Installing	Web	Services	...................................................................................................................	121	
      5.9.8	          Viewing	Your	Service	Level	Agreement	...........................................................................................	122	
	
	
                                                                                Chapter	1	
1 Best	Practice	Configurations	
    1.1           Activating	a	domain	
When	activating	a	domain	in	Hosted	Email	Security,	Trend	Micro	recommends	making	these	changes	to	your	MX	
record	to	reduce	the	chance	of	security	vulnerability	or	an	interruption	of	service	while	repointing	your	MX	record.	
•   Approved	Senders	
	
    Email	 messages	 from	 senders	 added	 to	 this	 list	 are	 not	 subject	 to	 IP	 reputation-based,	 spam,	 phish,	 or	
    marketing	 message	 filtering.	 Hosted	 Email	 Security	 still	 performs	 malware	 and	 attachment	 scanning	 on	 all	
    messages	 received	 and	 takes	 the	 action	 configured	 in	 policy	 rules	 after	 detecting	 a	 malware	 threat	 or	 an	
    attachment	policy	violation.	
    	
    Go	to	Sender	Filter	>	Approved	Senders	to	display	this	screen.	
	
•   Blocked	Senders	
	
    Hosted	 Email	 Security	 automatically	 blocks	 messages	 sent	 from	 addresses	 or	 domains	 added	 to	 the	 blocked	
    list	without	subjecting	the	messages	to	any	scanning.	
    	
    Go	to	Sender	Filter	>	Blocked	Senders	to	display	this	screen.	
Hosted Email Security follow a certain order on how it evaluate each email that pass through it servers.
Hosted	Email	Security	uses	user	directories	to	help	prevent	backscatter	(or	outscatter)	spam	and	Directory	Harvest	
Attacks	(DHA).	Importing	user	directories	lets	Hosted	Email	Security	know	legitimate	email	addresses	and	domains	
in	your	organization.	
	
See	Using	Directory	Management	
	
By	 default	 the	 virus	 policy	 is	 already	 set	 to	 delete	 but	 if	 it	 was	 modified	 to	 other	 action	 set	 it	 back	 to	 delete	 to	
avoid	any	virus	entering	your	system.	
                                                                                                                         	
     3.   Make	sure	action	is	set	to	delete.	
Increase spam detection level and enable Social Engineer attack including advance analysis to identify threats.
	                                         	
    3.   Click	“And	message	attribute	match”	
    4.   Check	all	boxes	and	set	Spam	check	to	a	higher	level.	Note	that	setting	spam	check	higher	might	lead	to	
         more	false	positive	but	it	can	also	reduce	false	negative	emails	and	avoid	malicious	emails	in.	
                                                                                                                                      	
	
     	     Note:	
           If	 advanced	 analysis	 is	 enabled,	 Hosted	 Email	 Security	 performs	 observation	 and	 analysis	 on	 samples	 in	 a	
           closed	environment.	Advanced	analysis	can	delay	the	delivery	of	messages	by	5	to	30	minutes.	
Regular	expressions,	often	called	regexes,	are	sets	of	symbols	and	syntactic	elements	used	to	match	patterns	of	
text.	HES	can	use	regular	expression	(regex)	to	filter	out	keywords	in	the	email.	
Using	long	and	complex	regular	expression	are	more	prone	to	errors	and	false	detection	so	its	recommended	to	
split	long	and	complex	keyword	expression	to	several	entries.	
	                                    	
    1.5            Outbound	Email	
         1.5.1     Add	additional	outbound	spam	and	phish	policy	
HES	Global	Outbound	Policy	is	a	default	rule	in	HES	to	avoid	outbound	spam	and	prevent	HES	outbound	servers	
from	 being	 blacklisted	 by	 third-party	 Real-time	 Blackhole	 Lists	 (RBLs).	 The	 policy	 cannot	 be	 edited	 and	 they	 are	
activated	by	default	for	all	domains.	Default	action	for	this	policy	is	“do	not	intercept”	and	emails	filtered	by	this	
policy	will	be	sent	to	a	special	server	to	deliver	the	emails.		
To	 control	 your	 outbound	 spam	 and	 phish	 emails	 it’s	 recommended	 to	 create	 new	 outbound	 spam	 and	 phish	
policy.	
                                                                                                                       	
    3.   Change	policy	to	“outgoing	message”	
                                                                               	
    4.   Click	Sender	and	add	your	domain	the	save.	Click	Next.	
    5.   Select	“Message	detected	as”	and	tick	all	boxes.	Click	Next	once	done.	
                                                                                                        	
    6.   Select	your	action	and	click	Next.	
    7.   Input	policy	name	and	click	Save.	
	
    1.6            Securing	your	Environment	
Trend	 Micro	 Hosted	 Email	 Security	 prevents	 spam	 from	 entering	 your	 mail	 servers.	 However,	 there	 might	 be	
instances	when	you	will	still	receive	spam	even	after	subscribing	to	HES.	This	occurs	when	the	mail	server	is	set	to	
accept	mails	from	another	host.	As	a	result,	spam	goes	directly	to	the	mail	server	without	passing	through	the	HES	
/	HES	-	Inbound	Filtering	servers.	To	avoid	this,	here	are	the	best	practices	in	preventing	spam.	
	
Email	 spoofing	 is	 often	 an	 attempt	 to	 trick	 the	 user	 into	 making	 a	 damaging	 statement	 or	 releasing	 sensitive	
information	(such	as	passwords).	
	
Email	spoofing	may	occur	in	different	forms,	but	all	have	a	similar	result:	a	user	receives	email	that	appears	to	have	
originated	from	a	legitimate	source	when	it	actually	was	sent	from	a	malicious	one.	
	
To	stop	receiving	emails	from	spoofed	senders,	aside	from	Securing	your	Mail	Server	and	Securing	your	
Users/Clients	follow	instructions	below:	
	
     1. Avoid	 putting	 managed	 email	 address	 and	 domain	 in	 the	 Sender	 Filter	 Approved	 Sender	 	 or	 EUQ	
         Approved	Sender	as	it	will	bypass	IP	reputation	checking	and	Spam/Phish	Rule	scanning	
         	
         Check	if	the	spoofed	sender	is	listed	on	the	Approved	Senders	List	on	the	HES	/	HES	-	Inbound	Filtering	
         console.	
         	
         If	the	spoofed	sender	is	listed,	remove	the	spoofed	sender	from	the	Approved	Senders	List.	
         	
                                                                                                                    	
	
         If	not,	check	if	the	end-user	is	registered	to	the	HES/HES	-	Inbound	Filtering	Web	EUQ.	If	the	owner	of	the	
         spoofed	address	is	registered	to	HES	Web	EUQ,	make	sure	that	the	address	is	also	not	listed	in	the	Web-
         EUQ	Approved	Senders	list.	To	do	this,	you	can:	
         	
              • Ask	the	owner	of	the	spoofed	email	address.	
         	
              • On	the	HES	/	HES	-	Inbound	Filtering	console,	go	to	Administration	>	End-User	password	and	then	
                   query	the	email	address.	
    2.   Make	sure	that	Incoming	Spam/Phish	Rule	is	enabled	and	properly	configure	
         See	Configuring	Spam	Criteria	
                                                                                                                          	
         	
         See	Understanding	IP	Reputation.	
         	
    4.   Create	a	policy	for	filtering	spoofed	emails	from	same	domain	as	recipient.		
	
	   	   Note:	
        Normal	spoof	emails	spoof	the	recipient	domain	and	best	practice	is	emails	from	same	domain	
	       should	 not	 be	 routed	 out	 the	 internet.	 Create	 a	 policy	 to	 filter	 emails	 coming	 from	 your	 own	
        domain.	
	
                      Warning:	
    	               	 Make	sure	inter-domain	emails	are	not	routed	to	the	internet.	
               h.    Click	Next	
                     	
               k.    Click	Save	
                       l.   Click	Next	
o. Select Enable
p. Click Save
         SPF	is	an	open	standard	to	prevent	sender	address	forgery.	The	SPF	protects	the	envelope	sender	address	
         that	 is	 used	 for	 the	 delivery	 of	 messages.	 HES	 enables	 you	 to	 configure	 SPF	 to	 ensure	 the	 sender's	
         authenticity.	
         	
         The	SPF	requires	the	owner	of	a	domain	to	specify	and	publish	their	email	sending	policy	in	an	SPF	record	
         in	the	domain's	DNS	zone.	For	example,	which	email	servers	they	use	to	send	email	from	their	domain.	
         	
         When	an	email	server	receives	a	message	claiming	to	come	from	that	domain,	the	receiving	server	verifies	
         whether	the	message	complies	with	the	domain's	stated	policy	or	not.	If,	for	example,	the	message	comes	
         from	an	unknown	server,	it	can	be	considered	as	fake.	
         	
         For	more	information	about	SPF,	refer	to	About	Sender	Policy	Framework	(SPF).	
                                                                                	
         	
    8.   Click	Keyword	expressions	beside	header	match.	
                                                                            	
	                 	
    10. Type	List	name	“ex.	SPF	match”	and	under	Match	select	Any	specified.	Click	Add.	
                                                                       	
	                	
                      13. Select	created	Keyword	and	click	add	then	save.	
1.7.2 Backscatter (or "outscatter") spam and Directory Harvest Attacks (DHA) Emails
Hosted	Email	Security	uses	user	directories	to	help	prevent	backscatter	(or	outscatter)	spam	and	Directory	Harvest	
Attacks	(DHA).	Importing	user	directories	lets	Hosted	Email	Security	know	legitimate	email	addresses	and	domains	
in	your	organization.	
• Enable Advance Threat Scan Engine and Perform advanced analysis to identify high risk objects.
         Hosted	 Email	 Security	 (HES)	 now	 supports	 Deep	 Discovery	 Analyzer	 as	 a	 Service	 (DDAaas).	 It	 is	 a	 cloud-
         based	web	service	that	acts	as	an	external	analyzer.	
         	
         Enabling	 this	 feature	 will	 help	 to	 detect	 macro	 embedded	 files.	 It	 identifies	 suspicious	 files,	 sends	 to	
         sandbox	and	then	takes	an	action.	
         	
         To	integrate	HES	with	Deep	Discovery	Analyzer	as	a	Service	(DDAaas):	
         	
                       1. Log	in	to	HES	management	console.	
	
                       2.   Go	to	Policy	and	select	Viruses	or	Malicious	Code.	
	
                       3.   Under	 Specify	 advanced	 settings,	 tick	 the	 Enable	 Advance	 Threat	 Scan	 Engine	 and	
                            Perform	advanced	analysis	to	identify	high	risk	objects	options.		
                        4. Click	Save.	
         	
         HES	can	perform	advanced	analysis	on	samples	in	a	closed	environment	to	identify	suspicious	objects	that	
         traditional	 scanning	 may	 not	 detect.	 When	 enabled,	 HES	 delays	 the	 delivery	 of	 the	 messages	 until	 the	
         advanced	analysis	completes,	which	may	take	up	to	30	minutes.	
    	                                                                         Chapter	2	
2 Product	Description	
	
Trend	Micro™	Hosted	Email	Security	is	a	no-maintenance	solution	that	delivers	continuously	updated	protection	to	
stop	spam,	phishing,	and	malware	before	they	reach	your	network.	
                                                                                                    	
	
	
Using	Trend	Micro	Hosted	Email	Security,	mail	administrators	can	set	up	rules	to	remove	detected	viruses	and	
other	malware	from	incoming	messages	before	they	reach	the	corporate	network.	Administrators	can	quarantine	
detected	spam	and	other	inappropriate	messages.	Then,	intended	message	recipients	or	mail	administrators	can	
choose	to	release	or	delete	the	quarantined	messages.	                                   	
     2.1           Mail	Flow	
         2.1.1     Inbound	Scanning	
1.   The	originating	MTA	performs	a	DNS	lookup	of	the	MX	record	for	example.com	to	determine	the	location	of	
     the	example.com	domain.	
	
     The	 MX	 record	 for	 example.com	 points	 to	 the	 IP	 address	 of	 the	 Hosted	 Email	 Security	 MTA	 instead	 of	 the	
     original	example.com	Inbound	Server.	
	
2.   The	originating	MTA	routes	messages	to	Hosted	Email	Security.	
	
3.   The	Hosted	Email	Security	MTA	accepts	the	connection	from	the	originating	mail	server.	
	
4.   Hosted	 Email	 Security	 performs	 IP	 reputation-based	 filtering	 at	 the	 MTA	 connection	 level	 to	 decide	 on	 an	
     action	to	take.	Actions	include	the	following:	
	
     §   Hosted	Email	Security	terminates	the	connection,	rejecting	the	messages.	
         	
     §   Hosted	Email	Security	accepts	the	messages	and	filters	them	using	content-based	policy	filtering.	
	
     See	IP	Reputation-Based	Filtering	at	the	MTA	Connection	Level.	
	
5.   Hosted	Email	Security	examines	the	message	contents	to	determine	whether	the	message	contains	malware	
     such	as	a	virus,	or	if	it	is	spam,	and	so	on.		
	
     See	Content-Based	Filtering	at	the	Message	Level.	
	
6.   Assuming	that	a	message	is	slated	for	delivery	according	to	the	domain	policy	rules,	the	Hosted	Email	Security	
     MTA	routes	the	message	to	the	original	example.com	Inbound	Server.	
	
	                                     	
                2.1.1.1        IP	Reputation-Based	Filtering	at	the	MTA	Connection	Level	
	
When	 an	 originating	 or	 upstream	 MTA	 attempts	 to	 connect	 to	 a	 Hosted	 Email	 Security	 MTA,	 the	 Hosted	 Email	
Security	 MTA	 queries	 Trend	 Micro	 Email	 Reputation	 Services	 (ERS)	 to	 determine	 whether	 the	 IP	 address	 of	 the	
upstream	MTA	has	a	"trustworthy"	reputation	in	the	database.	
	
Based	on	the	upstream	MTA's	reputation	and	the	selections	on	the	Hosted	Email	Security	IP	Reputation	Settings	
screen,	Hosted	Email	Security	may	terminate	the	connection,	rejecting	the	messages.	This	is	IP	reputation-based	
filtering	at	the	MTA	connection	level.	
	
Hosted	Email	Security	terminates	upstream	MTA	connections	in	the	following	ways:	
	
§ If	 the	 sending	 IP	 address	 is	 a	 known	 source	 of	 spam,	 the	 IP	 address	 of	 the	 sending	 server	 is	 marked	
      "untrustworthy"	according	to	the	reputation	database.	Hosted	Email	Security	permanently	rejects	connection	
      attempts	from	such	IP	addresses	by	responding	with	a	550	error	(a	rejection	of	the	requested	connection).	
	
§ If	 the	 sender’s	 computer	 is	 part	 of	 a	 botnet	 or	 is	 a	 zombie	 PC,	 the	 IP	 address	 can	 be	 found	 in	 the	 Email	
      Reputation	Services	(ERS)	dynamic	reputation	database	that	identifies	spam	sources	as	they	emerge	and	for	as	
      long	 as	 they	 are	 active.	 Hosted	 Email	 Security	 informs	 the	 sending	 server	 that	 Hosted	 Email	 Security	 is	
      temporarily	unavailable	by	responding	with	a	450	error	(a	temporary	failure	of	the	requested	connection).	If	
      the	sending	server	is	legitimate,	it	will	try	again	later.	
	
Hosted	 Email	 Security	 performs	 this	 filtering	 prior	 to	 receiving	 the	 actual	 message;	 therefore	 the	 content	 of	 the	
message	is	not	yet	scanned.	
	
To	manually	override	IP	reputation-based	filtering	at	the	MTA	connection	level,	add	IP	addresses	to	the	lists	on	the	
Approved	and	Blocked	IP	Addresses	screen.	
	
When	 an	 originating	 or	 upstream	 MTA	 attempts	 to	 connect	 to	 a	 Hosted	 Email	 Security	 MTA,	 the	 Hosted	 Email	
Security	 MTA	 queries	 Trend	 Micro	 Email	 Reputation	 Services	 (ERS)	 to	 determine	 whether	 the	 IP	 address	 of	 the	
upstream	MTA	has	a	"trustworthy"	reputation	in	the	database.	
	
Based	on	the	upstream	MTA's	reputation	and	the	selections	on	the	Hosted	Email	Security	IP	Reputation	Settings	
screen,	Hosted	Email	Security	may	terminate	the	connection,	rejecting	the	messages.	This	is	IP	reputation-based	
filtering	at	the	MTA	connection	level.	
	
Hosted	Email	Security	terminates	upstream	MTA	connections	in	the	following	ways:	
	
• If	 the	 sending	 IP	 address	 is	 a	 known	 source	 of	 spam,	 the	 IP	 address	 of	 the	 sending	 server	 is	 marked	
      “untrustworthy"	according	to	the	reputation	database.	Hosted	Email	Security	permanently	rejects	connection	
      attempts	from	such	IP	addresses	by	responding	with	a	550	error	(a	rejection	of	the	requested	connection).	
	
• If	 the	 sender’s	 computer	 is	 part	 of	 a	 botnet	 or	 is	 a	 zombie	 PC,	 the	 IP	 address	 can	 be	 found	 in	 the	 Email	
      Reputation	Services	(ERS)	dynamic	reputation	database	that	identifies	spam	sources	as	they	emerge	and	for	as	
      long	 as	 they	 are	 active.	 Hosted	 Email	 Security	 informs	 the	 sending	 server	 that	 Hosted	 Email	 Security	 is	
      temporarily	unavailable	by	responding	with	a	450	error	(a	temporary	failure	of	the	requested	connection).	If	
      the	sending	server	is	legitimate,	it	will	try	again	later.	
	
Hosted	 Email	 Security	 performs	 this	 filtering	 prior	 to	 receiving	 the	 actual	 message;	 therefore	 the	 content	 of	 the	
message	is	not	yet	scanned.	
	
To	manually	override	IP	reputation-based	filtering	at	the	MTA	connection	level,	add	IP	addresses	to	the	lists	on	the	
Approved	and	Blocked	IP	Addresses	screen.	
	    Tip:	
     Hosted	Email	Security	default	rules	delete	all	detected	viruses,	malicious	content,	phish,	and	spam.	
	
Message	 sender	 IP	 addresses	 go	 through	 IP	 reputation-based	 filtering.	 IP	 addresses	 are	 evaluated	 until	 the	 first	
match	is	found.	
	
Messages	from	allowed	sender	IP	addresses	bypass	IP	reputation-based	filtering	at	the	MTA	connection	level	and	
proceed	to	spam	detection.	Messages	from	blocked	sender	IP	addresses	are	blocked.	
	
The	order	of	evaluation	for	IP	addresses	in	the	lists	on	the	Approved	and	Blocked	IP	Addresses	screen	is	based	on	
which	list	contains	the	IP	address	or	Classless	Inter-Domain	Routing	(CIDR)	block.	
	
Evaluation	is	done	in	the	following	order:	
	
    1. The	IP	Addresses	list	
	
         a) On	the	Approved	screen	
         	
         b) On	the	Blocked	screen	
	
    2. The	Country/Region	list	
	
         a) On	the	Approved	screen	
    	
         b) On	the	Blocked	screen	
	
    3. The	selected	standard	IP	reputation	database	lists	on	the	IP	Reputation	Settings	screen	
	
    4. The	adjusted	dynamic	IP	reputation	database	lists	on	the	IP	Reputation	Settings	screen	
	
An	IP	address	added	to	the	IP	Addresses	list	on	the	Approved	screen	will	not	be	blocked	even	if	that	IP	address	is	
also	in	a	CIDR	block	listed	on	the	Blocked	screen.	Furthermore,	that	IP	address	will	not	be	blocked	even	if	it	is	also	
in	the	Known	Spam	Source	standard	IP	reputation	database	list.	
	
	      Important:	
       IP	 reputation-based	 filters	 use	 only	 IP	 address	 data	 to	 filter	 messages.	 You	 can	 also	 use	 sender	 email	
       address	and	domain	to	filter	incoming	messages.	Approved	senders	bypass	IP	reputation-based	filtering	at	
       the	MTA	connection	level.	
	
    1. Mail	server	of	example.com	will	forward	the	outbound	email	to	Hosted	Email	Security.	
       	
    2. Hosted	 Email	 Security	 servers	 accept	 the	 message	 and	 perform	 message	 filtering	 and	 policy	
       matching	on	your	behalf.	
       	
    3. Assuming	that	the	message	is	slated	for	delivery	according	to	its	security	policy	or	validity	status,	
       the	email	will	be	forwarded	to	outbound	MTAs.	
       	
    4. Outbound	MTAs	will	then	route	this	email	to	the	mail	server	of	the	recipient.	
    	
	                              	
    2.2          Message	Retention	
	
	    Note:	
     Incoming	Message	queue	is	up	to	10	days	but	outgoing	queue	will	only	be	kept	for	1	day.	
                                                        	
	                                 	
	
    	                                                                            Chapter	3	
3 Preparation	
Hosted	Email	Security	does	not	require	hardware	on	your	premises.	All	scanning	is	hosted	off-site	at	secure	Trend	
Micro	 network	 operations	 centers.	 To	 access	 your	 web-based	 Hosted	 Email	 Security	 administrator	 console,	 you	
need	a	computer	with	access	to	the	Internet.	
	
The	following	are	required	before	Hosted	Email	Security	can	be	activated:	
	
• An	existing	mail	gateway	or	workgroup	SMTP	connection	
    For	example:	
    o A	local	MTA	or	mail	server	
    o A	cloud-based	MTA	solution	
• Access	 to	 domain	 MX	 records	 (DNS	 mail	 exchanger	 host	 records)	 for	 repointing	 MX	 records	 to	 the	 Hosted	
    Email	Security	MTA	
    (Contact	your	service	provider,	if	necessary,	for	more	information	or	configuration	help.)	
    	
To	ensure	high-quality	continuous	service	and	to	protect	your	network	from	common	SMTP	attacks	such	as	mail	
floods	and	Zip	of	Death,	Hosted	Email	Security	has	default	settings.		
	
You	can	find	service	system	limitations	by	default	on	the	link	below:	
http://esupport.trendmicro.com/solution/en-US/1056545.aspx	
	                                   	
	
	
	
                                                                         Chapter	4	
4 Getting	Started	
	
    4.1          Registration	
	
    1.   Contact	your	Trend	Micro	sales	representative	for	an	Activation	Code.	
         An	Activation	Code	uses	37	characters,	including	hyphens,	in	the	following	format:	
         XX-XXXX-XXXXX-XXXXX-XXXXX-XXXXX-XXXXX	
         	
    2.   Go	to	https://clp.trendmicro.com/FullRegistration?T=TM	
         The	Create	Account	or	Sign	In	screen	for	the	Trend	Micro	Customer	License	Portal	appears.	
         	
                                                                                                      	
         You	are	asked,	"Do	you	already	have	an	account?"	
	                                  	
    3.   Select	the	appropriate	option	from	the	following:	
             • If	you	do	not	already	have	a	Trend	Micro	Business	account,	select	No,	I	am	a	first	time	user.	
             • If	you	already	have	a	Trend	Micro	Business	account,	do	the	following:	
                       a. Select	Yes,	I	already	have	a	Trend	Micro	Business	account.	
                       b. Click	Continue.	
                          The	Customer	License	Portal	Sign	In	appears.	
                          	
                                                                           	
                         	
                      c. Sign	in	to	your	Trend	Micro	Business	account.	
                         The	Enter	Your	Key	screen	appears.	
                                                                                                     	
                           	
    4.   Type	your	Hosted	Email	Security	Activation	Code.	
         Trend	Micro	sends	you	an	email	message	with	your	Customer	License	Portal	sign	in	information,	including	
         your	account	user	name,	the	console	web	address,	and	your	Activation	Code.	
         	
    5.   Start	the	Hosted	Email	Security	activation	process.	
	                                  	
    4.2            Starting	the	Activation	Process	
	
                       	    Note:	
                            You	can	specify	up	to	30	inbound	servers	and	30	outbound	servers.	
                            Use	the	add		 	and	the	remove		 	buttons	to	manage	additional	entries.	
                   	
                           a. IP	 address	 or	 FQDN:	 Fully	 qualified	 domain	 name	 (FQDN)	 is	 a	 unique	 name,	 which	
                              includes	both	host	name	and	domain	name,	and	resolves	to	a	single	IP	address.	
                              	
                                   i. For	example:	hostmaster1.example.com	or	mailhost.example.com	
                                   ii. Not	valid:	example.com	
                                       	
                           b. Port:	Port	is	a	number	from	0-65535	that	an	inbound	server	listens	on.	These	ports	vary	
                              based	on	server	configuration.	Well-known	ports	for	email	servers	include	SMTP	at	25,	
                              SMTPS	at	465,	and	MSA	at	587.	
                              	
                           c. Preference:	Preference,	sometimes	referred	to	as	distance,	is	a	value	from	1	to	100.	
                                	    Note:	
                                     If	more	than	one	mail	server	is	available,	delivery	is	prioritized	to	servers	with	lower	
                                     values.	Using	the	same	value	will	balance	delivery	to	each	server.	
                           	
              •    Optionally,	select	Enable	outbound	filtering	and	refer	to	the	following	table:	
                               Warning:	
                             	 Enabling	outbound	filtering	without	specifying	outbound	servers	will	prevent	the	 delivery	
                               of	any	outbound	traffic	routed	through	the	service.	
                   	
	                                       	
         Steps	to	Configure	Outbound	Filtering	
                     Warning:	
                   	 Do	not	repoint	your	MX	record	until	you	receive	the	message	confirming	that	your	domain	
                     has	been	added.	The	administrative	email	address	on	record	should	receive	the	welcome	
                     message,	 which	 is	 that	 confirmation.	 If	 you	 repoint	 your	 MX	 record	 before	 your	 domain	
                     has	been	successfully	added,	your	email	messages	may	be	lost.	
         	
    5.   If	you	currently	use	Office	365,	you	can	configure	Office	365	connectors	to	allow	email	traffic	to	or	from	
         Hosted	Email	Security	MTAs.	
         	
         See	Adding	Office	365	Inbound	Connectors.	
         	
         See	Adding	Office	365	Outbound	Connectors.	
         	
    6.   Finalize	your	activation.	
	                                      	
         4.2.1    Adding	Office	365	Inbound	Connectors	
	
Before	integrating	your	Microsoft	Office	365	managed	domain	name	with	Hosted	Email	Security,	perform	all	steps	
recommended	by	Microsoft	to	complete	configuration	of	Office	365	email	management	for	your	domain.	
	
To	configure	inbound	connectors,	ensure	that	you	have	the	following:	
	
     • Office	365	administrator	account	
     • Hosted	Email	Security	administrator	account	
     • Office	365	designation	server	address	
     • Hosted	Email	Security	welcome	email	message	for	created	domain	
     • Mail	domain	administrator	account	privileges	
	
Some	 organizations	 use	 Microsoft	 Office	 365	 to	 remotely	 host	 their	 email	 architecture,	 allowing	 Microsoft	 to	
manage	the	day-to-day	aspects	of	maintaining	their	email	servers.	Hosted	Email	Security	integrates	with	Office	365	
to	provide	additional	security	and	benefits.	
	
Configure	Office	365	connectors	to	allow	email	traffic	to	and	from	Hosted	Email	Security	MTAs.	
	
  	    Important:	
       Consult	the	Microsoft	Office	365	help	for	information	about	adding	connectors.	Some	Office	365	plans	do	not	
       offer	connectors.	
       http://technet.microsoft.com/en-us/library/exchange-online-mail-flow.aspx	
	
    1.   Log	on	your	Microsoft	Office	365	admin	center	account.	
         	
    2.   In	the	navigation	on	the	left,	go	to	Service	Settings.	
	
    3.   Under	mail	flow,	click	Custom	mail	rules.	
	
    4.   In	the	navigation	at	the	top,	go	to	connectors.	
	
    5.   Add	an	Inbound	Connector	to	Office	365.	
         	
         Configure	Office	365	to	accept	mail	filtered	by	Hosted	Email	Security	for	delivery	to	email	accounts	in	your	
         Office	365	managed	domain.	
         	
              a. Under	Inbound	Connectors,	click	the	plus	icon.	
                  A	new	connector	configuration	screen	appears,	displaying	the	general	tab.	
                  	
              b. In	the	Name	field,	type	a	descriptive	name	for	the	connector.	
                  For	example,	type	Trend	Micro	Hosted	Email	Security.	
                  	
              c. Select	Enable	inbound	connector.	
                  	
              d. Under	Connector	Type,	select	Partner.	
	
             e.   Click	save.	
	
             f.   In	the	navigation	on	the	left,	go	to	security.	
             g.   Under	Connection	Security,	select	Opportunistic	TLS.	
                   	
              h.   Under	Domain	Restrictions,	select	None.	
	
              i.   In	the	navigation	on	the	left,	go	to	scope.	
	
              j.   In	the	Domains	field,	add	your	Office	365	managed	domain	name.	
	
                        •    For	example:	example.com	
                        •    Not	valid:	hostmaster1.example.com	or	mailhost.example.com	
                             	
              k.   In	the	IP	addresses	field,	add	the	following	Hosted	Email	Security	IP	addresses:	
                   HES	IP	addresses	
	
              l. Click	save.	
                 	
              m. Confirm	that	Enabled	is	selected	for	the	newly	added	connector.	
e. Click save.
j. Under Send domains, add the outbound domains that should be applied to this connector.
         	        Tip:	
                  Use	an	asterisk	(*)	to	include	all	outbound	domains.	
k. Click save.
To finalize your activation, point your MX record to the Hosted Email Security MTA for your region.
Trend	Micro	will	not	activate	your	domain	until	the	MX	record	for	your	domain	points	to	a	Hosted	Email	Security	
MTA.	
                   Warning:	
             	     Do	 not	 repoint	 your	 MX	 record	 until	 you	 receive	 the	 message	 confirming	 that	 your	 domain	 has	 been	
                   added.	The	administrative	email	address	on	record	should	receive	the	welcome	message,	which	is	that	
                   confirmation.	 If	 you	 repoint	 your	 MX	 record	 before	 your	 domain	 has	 been	 successfully	 added,	 your	
                   email	messages	may	be	lost.	
	
    1.           Point	your	managed	domain	MX	records	to	the	Hosted	Email	Security	MTA	for	your	region.	
                 	
                     • For	Europe,	the	Middle	East,	Africa:	in.hes.trendmicro.eu	
                     • For	all	other	regions:	in.hes.trendmicro.com	
             	               Tip:	
                             If	your	company	does	not	have	standardized	procedures	for	pointing	MX	records,	or	you	would	
                             like	additional	guidance,	Trend	Micro	recommends	using	the	following	procedure,	which	also	
                             includes	all	other	steps	on	this	page:	See	Repointing	MX	Records	(Best	Practice).	
    2.           If	 you	 added	 Outbound	 Servers	 when	 you	 added	 your	 domain,	 configure	 those	 servers	 to	 relay	 mail	
                 through	the	following	Hosted	Email	Security	MTA	for	your	region:	
                 	
                       • For	Europe,	the	Middle	East,	Africa:	relay.hes.trendmicro.eu	
                       • For	all	other	regions:	relay.hes.trendmicro.com	
                           	
    3.           To	 ensure	 messages	 can	 be	 received	 from	 the	 Hosted	 Email	 Security	 MTA,	 configure	 your	 firewall	 to	
                 accept	email	messages	only	from	the	following	Hosted	Email	Security	IP	address	/	CIDR	blocks:	
                 HES	IP	addresses	
             4.3.1        Repointing	MX	Records	(Best	Practice)	
	
When	activating	a	domain	in	Hosted	Email	Security,	Trend	Micro	recommends	making	three	step-wise	changes	to	
your	MX	record	to	reduce	the	chance	of	security	vulnerability	or	an	interruption	of	service	while	repointing	your	
MX	record.	
        1.   Modify	the	MX	record	for	your	domain.	Add	a	pointer	to	the	Hosted	Email	Security	MTA	for	your	region.	
             Set	the	preference	number	to	the	lowest	priority/highest	distance	of	all	your	MTAs.	
	
                 	        Tip:	
                          Preference,	sometimes	referred	to	as	distance,	is	a	value	from	1	to	100.	If	more	than	one	mail	
                          server	 is	 available,	 delivery	 is	 prioritized	 to	 servers	 with	 lower	 values.	 Using	 the	 same	 value	
                          will	balance	delivery	to	each	server.	
                          	
                          The	higher	the	preference	number,	the	lower	the	priority	of	the	MX	record.	
	
                     •    For	Europe,	the	Middle	East,	Africa:	in.hes.trendmicro.eu	
	
                          <your_domain>		MX	preference	=	20,	mail	exchanger	=	<your_domain_mta>	
                          <your_domain>		MX	preference	=	100,	mail	exchanger	=	in.hes.trendmicro.eu	
	
                     •    For	all	other	regions:	in.hes.trendmicro.com	
	
                          <your_domain>		MX	preference	=	20,	mail	exchanger	=	<your_domain_mta>	
                          <your_domain>		MX	preference	=	100,	mail	exchanger	=	in.hes.trendmicro.com	
	
        2.   Verify	that	the	status	of	your	domain	displays	as	"Activated"	in	the	administrator	console.	
    	
                 	         Tip:	
                           DNS	propagation	can	take	up	to	48	hours.	The	status	of	the	domain	you	are	adding	does	not	
                           change	 until	 DNS	 propagation	 is	 complete.	 During	 this	 time,	 do	 not	 turn	 off	 any	 on-premises	
                           security.	 You	 may	 receive	 some	 email	 messages	 directly	 for	 a	 short	 time	 until	 the	 transition	
                           completes.	
                           	
                           While	 waiting	 for	 DNS	 propagation,	 you	 can	 use	 the	 administrator	 console	 to	 customize	 the	
                           domain	settings	for	Policy,	Approved	Senders,	IP	Reputation,	and	Directory	Management	in	the	
                           administrator	console.	See	the	Administrator's	Guide	for	more	information	and	procedures.	
    	
                     a.   Log	on	the	administrator	console.	
                          See	Accessing	the	Administrator	Console.	
                          	
                     b.   Go	to	Administration	>	Domain	Management.	
                          	
                     c.   In	the	Domains	list,	verify	that	the	Status	for	the	domain	displays	as	"Activated".	
             	
                           	    Tip:	
                                If	the	status	of	a	domain	displays	as	"Adding"	for	more	than	48	hours,	confirm	the	MX	
                                record	for	that	domain	is	pointed	to	a	Hosted	Email	Security	MTA.	Open	a	command	
                                prompt	and	type	one	of	the	following:	
                                	
                                				For	Linux:	
                                				dig	mx	<domain_name>	
                                	
                                				For	Windows:	
                                				nslookup	-q=mx	<domain_name>	
                       	
When domain status displays as "Activated", the service will begin relaying email to your MTA.
        3.   Modify	the	MX	record	for	your	domain.	Set	the	preference	number	for	the	pointer	to	the	Hosted	Email	
             Security	MTA	for	your	region	to	the	highest	priority/lowest	distance	of	all	your	MTAs.	
    	
              	        Tip:	
                       The	lower	the	preference	number,	the	higher	the	priority	of	the	MX	record.	
    	
                  •    For	Europe,	the	Middle	East,	Africa:	in.hes.trendmicro.eu	
                       <your_domain>		MX	preference	=	20,	mail	exchanger	=	<your_domain_mta>	
                       <your_domain>		MX	preference	=	10,	mail	exchanger	=	in.hes.trendmicro.eu	
	
                  •    For	all	other	regions:	in.hes.trendmicro.com	
                       <your_domain>		MX	preference	=	20,	mail	exchanger	=	<your_domain_mta>	
                       <your_domain>		MX	preference	=	10,	mail	exchanger	=	in.hes.trendmicro.com	
	
        4.   To	 ensure	 messages	 can	 be	 received	 from	 the	 Hosted	 Email	 Security	 MTA,	 configure	 your	 firewall	 to	
             accept	email	messages	from	all	the	following	Hosted	Email	Security	IP	address	/	CIDR	blocks:	
             HES	IP	addresses	
             	
        5.   Verify	 that	 messages	 are	 being	 delivered	 from	 Hosted	 Email	 Security.	 To	 send	 a	 test	 message	 using	 the	
             service,	do	the	following:	
             	
                  a. Log	on	the	administrator	console.	
                       	
                  b. Go	to	Administration	>	Domain	Management.	
	
                  c.   In	the	Domains	list,	click	the	newly-added	domain	name.	
                       The	Domain	Information	screen	appears.	
                       	
                  d.   In	 the	 Send	 test	 message	 to	 field,	 type	 an	 email	 address	 to	 send	 a	 test	 message	 to	 using	 the	
                       service.	
                       	
                  e.   Click	Send.	
	
        6.   Optionally,	 customize	 the	 domain	 settings	 for	 Policy,	 Approved	 Senders,	 IP	 Reputation,	 and	 Directory	
             Management	 in	 the	 administrator	 console.	 See	 the	 Administrator's	 Guide	 for	 more	 information	 and	
             procedures.	
             	
    7.   If	 you	 added	 Outbound	 Servers	 when	 you	 added	 your	 domain,	 configure	 those	 servers	 to	 relay	 mail	
         through	the	following	Hosted	Email	Security	MTA	for	your	region:	
	
              •     For	Europe,	the	Middle	East,	Africa:	relay.hes.trendmicro.eu	
                    	
             •      For	all	other	regions:	relay.hes.trendmicro.com	
         	
    8.   Modify	the	MX	record	for	your	domain.	Delete	all	entries	in	the	MX	record	not	related	to	Hosted	Email	
         Security.	This	reduces	the	chance	of	spam	being	sent	directly	to	your	mail	server.	
	
         For	Europe,	the	Middle	East,	Africa:	in.hes.trendmicro.eu	
         <your_domain>		MX	preference	=	10,	mail	exchanger	=	in.hes.trendmicro.eu	
	
         For	all	other	regions:	in.hes.trendmicro.com	
         <your_domain>		MX	preference	=	10,	mail	exchanger	=	in.hes.trendmicro.com	
          	       Tip:	
                  To	 reduce	 the	 chance	 of	 a	 security	 vulnerability	 or	 an	 interruption	 of	 service	 while	 repointing	
                  your	 MX	 record,	 Trend	 Micro	 recommends	 using	 the	 following	 procedure:	 Repointing	 MX	
                  Records	(Best	Practice)	
                  	
                  Make	sure	the	MX	record	is	entered	exactly	as	provided	in	the	Hosted	Email	Security	welcome	
                  email.	
                  	
                  DNS	propagation	can	take	up	to	48	hours.	The	status	of	the	domain	you	are	adding	does	not	
                  change	 until	 DNS	 propagation	 is	 complete.	 During	 this	 time,	 do	 not	 turn	 off	 any	 on-premise	
                  security.	 You	 may	 receive	 some	 email	 messages	 directly	 for	 a	 short	 time	 until	 the	 transition	
                  completes.	
	
An	 MX	 record	 (DNS	 mail	 exchanger	 host	 record)	 determines	 the	 message	 routing	 for	 all	 messages	 sent	 to	 a	
domain.	To	route	messages	destined	for	your	domain	through	the	Hosted	Email	Security	MTA,	you	must	repoint	
your	MX	record	to	the	fully	qualified	domain	name	(FQDN)	provided	in	the	welcome	email	that	Trend	Micro	sent	
you	after	you	registered.	
	
To	disable	Hosted	Email	Security,	point	your	MX	record	to	route	all	inbound	SMTP	traffic	to	your	own	mail	server.	
	
If	you	are	unsure	how	to	configure	the	MX	records	for	your	domain,	contact	your	Internet	Service	Provider	or	your	
DNS	technician.	
	
The	following	external	links	to	MX	record	configuration	help	pages	are	provided	for	your	convenience:	
	
     • GoDaddy	
         http://support.godaddy.com/help/article/680/managing-dns-for-your-domain-names	
	
     • Network	Solutions	
         http://www.networksolutions.com/support/mx-records-mail-servers-2/	
	
     • Enom	
         http://www.enom.com/help/hostinghelp.asp?displaymenu=ok&hosthelp=9	
	
        •    DreamHost	
             http://wiki.dreamhost.com/MX_record	
	
        •    Yahoo!	SmallBusiness	
             http://help.yahoo.com/kb/index?page=content&y=PROD_YSB_DOMAIN&locale=en_US&id=SLN17921	
Access	the	Hosted	Email	Security	administrator	console	based	on	your	licensing	agreement	with	Trend	Micro.	Use	
one	of	the	following	methods:	
	
    • Sign	 in	 to	 your	 Trend	 Micro	 Business	 account	 using	 the	 Customer	 License	 Portal	 (CLP),	 then	 access	 the	
         Hosted	Email	Security	administrator	console	using	the	link	provided	there.	
	
         See	Using	CLP	to	Access	the	Administrator	Console.	
	
    • Log	on	directly	to	your	administrator	console	at	the	following	web	address	for	your	region:	
         	
              § For	Europe,	the	Middle	East,	Africa:	https://tm.hes.trendmicro.eu	
                  	
              § For	all	other	regions:	https://tm.hes.trendmicro.com	
	
    • Use	one	of	the	following	authorized	Trend	Micro	reseller	credentials	to	access	the	administrator	console	
         for	your	managed	accounts:	
         	
              • For	xSP	resellers,	go	to	the	following	web	address	for	your	region:	
    	
                  § For	Europe,	the	Middle	East,	Africa:	https://ui.hes.trendmicro.eu	
    	
                  § For	all	other	regions:	https://ui.hes.trendmicro.com	
	
              • For	LMP	resellers,	substitute	your	Tenant	ID	for	<tenant-id>	in	the	following	web	address	for	your	
                  region:	
    	
                  § For	Europe,	the	Middle	East,	Africa:	https://<tenant-id>.hes.trendmicro.eu	
         	
                  § For	all	other	regions:	https://<tenant-id>.hes.trendmicro.com	
                      	
    	        Tip:	
    	        When	 you	 register,	 Trend	 Micro	 sends	 you	 an	 email	 message	 with	 your	 Customer	 License	
             Portal	 sign	 in	 information,	 including	 your	 account	 user	 name,	 the	 console	 web	 address,	 and	
             your	Activation	Code.	
             	
	
        1.   Go	to	https://clp.trendmicro.com/FullRegistration?T=TM.	
             The	Create	Account	or	Sign	In	screen	for	the	Trend	Micro	Customer	License	Portal	appears.	
                                                                           	
	
    2.   Select	Yes,	I	already	have	a	Trend	Micro	Business	account.	
         	
    3.   Click	Continue.	
         The	Customer	License	Portal	Sign	In	appears.	
	
                                           	
	
    4.   Sign	in	to	your	Trend	Micro	Business	account.	
         The	Enter	Your	Key	screen	appears.	
	
                                                                       	
	                                  	
        5.   Click	Cancel.	
             The	My	Products/Services	screen	appears.	
             	
                                                                                                           	
        6.   Click	Open	Console	in	the	box	for	Hosted	Email	Security.	
	
        7.   The	Hosted	Email	Security	administrator	console	appears	in	a	new	tab	or	window.	
             	
    	        Tip:	
    	        Bookmark	the	address	of	the	administrator	console.	Use	the	bookmark	to	be	taken	directly	to	
             the	Hosted	Email	Security	administrator	console	after	signing	in	to	your	Trend	Micro	Business	
             account.	
             	
             End	 users	 can	 access	 the	 Hosted	 Email	 Security	 End-User	 Quarantine	 website	 for	 self-
             management.	Share	the	End	User	Quarantine	User's	Guide	and	the	following	web	address	for	
             your	region	with	end	users:	
             	
             				For	Europe,	the	Middle	East,	Africa:	https://euq.hes.trendmicro.eu	
             	
             				For	all	other	regions:	https://euq.hes.trendmicro.com	
             	
	
	                                       	
                                                                                       Chapter	5	
                                                                                                           	
5 Management Console
The Dashboard displays charts for email traffic relayed through Hosted Email Security.
    	    Note:	
         Data	collected	within	the	last	2	hours	may	not	be	displayed.	
         The	time	zone	of	the	browser	accessing	Hosted	Email	Security	is	used.	
	
Select	the	data	shown	in	charts	and	their	corresponding	thumbnail	charts	on	the	Summary	tab	of	the	Dashboard	
using	the	following	controls	and	settings:	
                                                   Table 1. All Charts
Control	                  Settings	
Domain	 and	 direction	 Select	a	domain	and	mail	traffic	direction	using	the	following	controls:	
of	traffic	                                                                                                                       	
                        Tip:		
                        To	select	all	domains,	select	all	my	domains	from	the	Managed	domain	drop-down	list.	
Time	periods	             Select	 a	 time	 period	 at	 the	 top	 of	 each	 chart.	 The	 following	 are	 the	 definitions	 of	 time	
                          periods:	
                          Date:	The	most	recent	eight	(8)	days.	Days	are	split	into	hours	from	0:00	to	23:59.	Because	
                          days	start	at	midnight,	charts	with	a	time	period	of	the	current	day	will	never	show	a	full	
                          24	hours	of	data.	
                          Week:	 The	 most	 recent	 eight	 (8)	 weeks.	 Weeks	 are	 the	 days	 from	 Sunday	 to	 Saturday.	
                          Because	weeks	start	on	Sunday,	charts	with	a	time	period	of	the	current	week	will	never	
                          show	a	full	seven	(7)	days	of	data.	
                          Month:	The	most	recent	two	(2)	months.	Months	are	days	from	the	first	to	the	last	day	of	
                          the	 calendar	 month.	 Because	 months	 start	 on	 the	 first,	 charts	 with	 a	 time	 period	 of	 the	
                          current	month	will	never	show	the	full	month	of	data.		
                          Last	 12	 months:	 The	 data	 for	 the	 last	 twelve	 months	 plus	 all	 days	 of	 the	 current	 month.	
                                                   Table 1. All Charts
Control	                    Settings	
                            Always	shows	more	than	one	year	of	data.	
                              	     Note:	
                                    The	specified	time	period	only	affects	the	data	shown	on	the	current	chart	
                                    and	its	corresponding	thumbnail	chart	on	the	Summary	tab.	Changing	the	
                                    selection	on	a	chart	does	not	affect	other	charts.	
                            	
    	   Important:	
        Click	 Refresh	 after	 selecting	 a	 new	 domain	 under	 Managed	 domain,	 selecting	 a	 new	 direction	 in	 the	
        Direction	drop-down	list,	or	making	any	changes	to	other	selections,	such	as	the	time	period.	
Volume		                         Select	a	time	period	by	Date,	Week,	Month,	or	Last	12	months	to	show	hourly	or	daily	
Bandwidth		                      data	for	the	selected	time	period.	
Threats	Details		
Advanced	Analysis	Details	
Threats		                        Select	 a	 time	 period	 by	 Date,	 Week,	 Month,	 or	 Last	 12	 months	 to	 show	 the	 total	
                                 percentage	of	messages	by	value	for	the	selected	time	period.	
Top	Spam		               Select	 a	 time	 period	 by	 Date,	 Week,	 or	 Month	 to	 show	 hourly	 or	 daily	 data	 for	 the	
Top	Virus		              selected	time	period.	
Top	 Analyzed	 Advanced	
Threats	                 Use	 the	 Top	 violators’	 drop-down	 list	 to	 select	 the	 number	 of	 email	 addresses	 that	
                         display	on	the	chart.	
	                                       	
        5.1.1    Summary	Chart	
	
The	Summary	tab	of	the	Dashboard	provides	an	overview	of	data	displayed	on	all	other	charts	in	one	location.	Click	
on	a	thumbnail	to	go	to	that	chart's	corresponding	tab	
                                                                                                           	
         5.1.2     Volume	Chart	
	
The	 Volume	 tab	 of	 the	 Dashboard	 displays	 the	 total	 number	 of	 accepted	 and	 blocked	 messages	 and	 the	 total	
percentage	of	blocked	messages.	
Select	a	time	period	by	Date,	Week,	Month,	or	Last	12	months	to	show	hourly	or	daily	data	for	the	selected	time	
period.	
The	specified	time	period	only	affects	the	data	shown	on	this	chart	and	its	corresponding	thumbnail	chart	on	the	
Summary	tab.	Changing	these	selections	does	not	affect	other	charts.	
The	traffic	direction	slightly	changes	the	data	displayed	on	charts.	The	following	is	the	specific	data	displayed:	
                                          Table	1.	Detected	Values	on	Charts	
Detected	Values	        For	Incoming	Mail	                               For	Outgoing	Mail	
Blocked		               The	number	of	email	messages	blocked	by	IP	      The	 number	 of	 messages	 blocked	 using	
                        reputation-based	 filtering	 at	 the	 MTA	       Hosted	 Email	 Security	 relay	 mail	 service	
                        connection	level	or	by	Hosted	Email	Security	    filtering	
                        incoming	security	filtering	                     Possible	reasons	for	blocking	include:	
                        Note:		                                          Recipient	 address	 is	 not	 resolvable	 (such	 as	
                        This	 value	 does	 not	 include	 messages	       someone@???.com).	
                        blocked	by	content-based	filtering.	             Spammers	 forged	 the	 mail	 sender	 address	
                                                                         so	 the	 message	 appears	 to	 be	 coming	 from	
                                                                         the	customer	domain.	
                                                                         The	 customer's	 MTA	 is	 compromised	 and	 is	
                                                                         sending	spam	messages	(for	example,	it	is	an	
                                                                         open	relay).	
Accepted		              The	number	of	email	messages	passed	by	IP	 The	 number	 of	 messages	 passed	 by	 Hosted	
                        reputation-based	 filtering	 at	 the	 MTA	 Email	Security	relay	mail	service	filtering	
                        connection	level	or	by	Hosted	Email	Security	
                        incoming	security	filtering	
                                        Table	1.	Detected	Values	on	Charts	
Detected	Values	       For	Incoming	Mail	                               For	Outgoing	Mail	
Blocked	%		            The	 percentage	 of	 email	 messages	 blocked	 The	 percentage	 of	 messages	 blocked	 by	
                       by	 IP	 reputation-based	 filtering	 at	 the	 MTA	 Hosted	 Email	 Security	 relay	 mail	 service	
                       connection	level	or	by	Hosted	Email	Security	 filtering	
                       incoming	security	filtering	
The Bandwidth tab of the Dashboard displays the total size of email messages accepted in KB.
Select	a	time	period	by	Date,	Week,	Month,	or	Last	12	months	to	show	hourly	or	daily	data	for	the	selected	time	
period.	
	
The	specified	time	period	only	affects	the	data	shown	on	this	chart	and	its	corresponding	thumbnail	chart	on	the	
Summary	tab.	Changing	these	selections	does	not	affect	other	charts.	
	
The	traffic	direction	does	not	change	the	data	displayed	on	charts.	The	following	is	the	specific	data	displayed:	
	                                   	
                                        Table	1.	Detected	Values	on	Charts	
    Detected	Values	                 For	Incoming	Mail	                             For	Outgoing	Mail	
Not	Quarantined		      The	total	size	of	email	messages	that	Hosted	Email	Security	did	not	quarantine	
Quarantined		          The	total	size	of	email	messages	that	Hosted	Email	Security	quarantined	
                       Note:		
                       By	 default,	 no	 messages	 are	 quarantined.	 To	 begin	 using	 the	 quarantine,	 select	 a	
                       quarantine	action	for	one	or	more	policy	rules.	
Total	Size		           The	total	size	of	email	messages	scanned	by	Hosted	Email	Security	
	
The	Threats	tab	of	the	Dashboard	displays	the	total	percentage	of	messages	detected	as	threats.	
	
                                                                                                                    	
                                                            	
Select	a	time	period	by	Date,	Week,	Month,	or	Last	12	months	to	show	the	total	percentage	of	messages	by	value	
for	the	selected	time	period.	
	
The	specified	time	period	only	affects	the	data	shown	on	this	chart	and	its	corresponding	thumbnail	chart	on	the	
Summary	tab.	Changing	these	selections	does	not	affect	other	charts.	
	
The	traffic	direction	slightly	changes	the	data	displayed	on	charts.	The	following	is	the	specific	data	displayed:	
	                                    	
                                       Table	1.	Detected	Values	on	Charts	
  Detected	Values	                 For	Incoming	Mail	                               For	Outgoing	Mail	
Blocked		             The	number	of	email	messages	blocked	by	IP	     The	 number	 of	 messages	 blocked	 using	
                      reputation-based	 filtering	 at	 the	 MTA	      Hosted	 Email	 Security	 relay	 mail	 service	
                      connection	level	or	by	Hosted	Email	Security	   filtering	
                      incoming	security	filtering	                    Possible	reasons	for	blocking	include:	
                         	     Note:	                                 Recipient	 address	 is	 not	 resolvable	 (such	 as	
                         	     This	 value	 does	 not	 include	       someone@???.com).	
                               messages	 blocked	 by	 content-        Spammers	 forged	 the	 mail	 sender	 address	
                      	
                               based	filtering.	                      so	 the	 message	 appears	 to	 be	 coming	 from	
                                                                      the	customer	domain.	
                                                                      The	 customer's	 MTA	 is	 compromised	 and	 is	
                                                                      sending	spam	messages	(for	example,	it	is	an	
                                                                      open	relay).	
Virus		               The	 number	 of	 email	 messages	 that	 Hosted	 The	 number	 of	 email	 messages	 that	 Hosted	
                      Email	 Security	 content-based	 filtering	 Email	 Security	 content-based	 filtering	
                      detected	as	containing	a	malware	threat	        detected	as	containing	a	malware	threat	
Ransomware		          The	 number	 of	 email	 messages	 containing	 The	 number	 of	 email	 messages	 containing	
                      URL	 of	 sites	 that	 directly	 or	 indirectly	 URL	 of	 sites	 that	 directly	 or	 indirectly	
                      facilitate	the	distribution	of	ransomware	      facilitate	the	distribution	of	ransomware	
Phish		               The	 number	 of	 email	 messages	 that	 Hosted	 The	 number	 of	 email	 messages	 that	 Hosted	
                      Email	 Security	 content-based	 filtering	 Email	 Security	 content-based	 filtering	
                      detected	as	phishing	threats	                   detected	as	phishing	threats	
Spam		                The	 number	 of	 email	 messages	 that	 Hosted	 The	 number	 of	 email	 messages	 that	 Hosted	
                      Email	 Security	 content-based	 filtering	 Email	 Security	 content-based	 filtering	
                      detected	as	spam	                               detected	as	spam	
                        	      Note:	
                        	      Hosted	 Email	 Security	 includes	
                               messages	 detected	 as	 marketing	
                               messages	 in	 the	 "Spam"	
                      	
                               category.	
Other		               The	 number	 of	 email	 messages	 detected	 by	 The	 number	 of	 email	 messages	 detected	 by	
                      content-based	 policy	 rules	 (for	 example,	 content-based	 policy	 rules	 (for	 example,	
                      attachment	true	file	type)	                     attachment	true	file	type)	
Clean		               The	 number	 of	 email	 messages	 that	 passed	 The	 number	 of	 mail	 messages	 that	 passed	
                      IP	 reputation-based	 and	 content-based	 Hosted	 Email	 Security	 relay	 mail	 service	
                                             Table	1.	Detected	Values	on	Charts	
    Detected	Values	                      For	Incoming	Mail	                               For	Outgoing	Mail	
                         filtering	                                         filtering	
Total		                  The	total	number	of	email	messages	processed	
	
	                                     	
Select	a	time	period	by	Date,	Week,	Month,	or	Last	12	months	to	show	hourly	or	daily	data	for	the	selected	time	
period.	
	
The	specified	time	period	only	affects	the	data	shown	on	this	chart	and	its	corresponding	thumbnail	chart	on	the	
Summary	tab.	Changing	these	selections	does	not	affect	other	charts.	
	
The	traffic	direction	slightly	changes	the	data	displayed	on	charts.	The	following	is	the	specific	data	displayed:	
	
                                        Table	1.	Detected	Values	on	Charts	
  Detected	Values	                  For	Incoming	Mail	                               For	Outgoing	Mail	
Blocked		              The	number	of	email	messages	blocked	by	IP	     The	 number	 of	 messages	 blocked	 using	
                       reputation-based	 filtering	 at	 the	 MTA	      Hosted	 Email	 Security	 relay	 mail	 service	
                       connection	level	or	by	Hosted	Email	Security	   filtering	
                       incoming	security	filtering	                    Possible	reasons	for	blocking	include:	
                         	      Note:	                                 Recipient	 address	 is	 not	 resolvable	 (such	 as	
                         	      This	 value	 does	 not	 include	       someone@???.com).	
                                messages	 blocked	 by	 content-        Spammers	 forged	 the	 mail	 sender	 address	
                       	
                                based	filtering.	                      so	 the	 message	 appears	 to	 be	 coming	 from	
                                                                       the	customer	domain.	
                                                                       The	 customer's	 MTA	 is	 compromised	 and	 is	
                                                                       sending	spam	messages	(for	example,	it	is	an	
                                                                       open	relay).	
Virus		                The	 number	 of	 email	 messages	 that	 Hosted	 The	 number	 of	 email	 messages	 that	 Hosted	
                       Email	 Security	 content-based	 filtering	 Email	 Security	 content-based	 filtering	
                       detected	as	containing	a	malware	threat	        detected	as	containing	a	malware	threat	
Phish		                The	 number	 of	 email	 messages	 that	 Hosted	 The	 number	 of	 email	 messages	 that	 Hosted	
                       Email	 Security	 content-based	 filtering	 Email	 Security	 content-based	 filtering	
                       detected	as	phishing	threats	                   detected	as	phishing	threats	
Spam		                 The	 number	 of	 email	 messages	 that	 Hosted	 The	 number	 of	 email	 messages	 that	 Hosted	
                       Email	 Security	 content-based	 filtering	 Email	 Security	 content-based	 filtering	
                       detected	as	spam	                               detected	as	spam	
                                               Table	1.	Detected	Values	on	Charts	
        Detected	Values	                   For	Incoming	Mail	                              For	Outgoing	Mail	
                                 	     Note:	
                                 	     Hosted	 Email	 Security	 includes	
                                       messages	 detected	 as	 marketing	
                                       messages	 in	 the	 "Spam"	
                             	
                                       category.	
Other		                      The	 number	 of	 email	 messages	 detected	 by	 The	 number	 of	 email	 messages	 detected	 by	
                             content-based	 policy	 rules	 (for	 example,	 content-based	 policy	 rules	 (for	 example,	
                             attachment	true	file	type)	                     attachment	true	file	type)	
Clean		                      The	 number	 of	 email	 messages	 that	 passed	 The	 number	 of	 mail	 messages	 that	 passed	
                             IP	 reputation-based	 and	 content-based	 Hosted	 Email	 Security	 relay	 mail	 service	
                             filtering	                                      filtering	
    	       Note:	
            The	data	on	this	tab	is	displayed	for	incoming	mail	traffic	only.	
	
For	 a	 summary	 of	 the	 total	 number	 of	 email	 messages	 scanned	 by	 detected	 category,	 refer	 to	 the	 table	 at	 the	
bottom	of	the	Threat	Details	tab.	This	table	is	not	shown	in	the	thumbnail	view	on	the	Summary	screen.	
	
                                                                                                         	
The	Top	Spam	tab	of	the	Dashboard	displays	the	email	addresses	that	sent	or	received	the	most	spam	messages	
based	on	the	selected	mail	traffic	direction.	
	
Hover	over	a	bar	to	see	details.	
	
                                                                                                                            	
Select	a	time	period	by	Date,	Week,	or	Month	to	show	hourly	or	daily	data	for	the	selected	time	period.	
	
The	specified	time	period	only	affects	the	data	shown	on	this	chart	and	its	corresponding	thumbnail	chart	on	the	
Summary	tab.	Changing	these	selections	does	not	affect	other	charts.	
	
Use	the	Top	violators	drop-down	list	to	select	the	number	of	email	addresses	that	display	on	the	chart.	
	
The	 Top	 Virus	 tab	 of	 the	 Dashboard	 displays	 the	 email	 addresses	 that	 sent	 or	 received	 the	 most	 messages	
containing	malware	threats	based	on	the	selected	mail	traffic	direction.	
	
Hover	over	a	bar	to	see	details.	
	                                    	
                                                                                                                	
	
Select	a	time	period	by	Date,	Week,	or	Month	to	show	hourly	or	daily	data	for	the	selected	time	period.	
	
The	specified	time	period	only	affects	the	data	shown	on	this	chart	and	its	corresponding	thumbnail	chart	on	the	
Summary	tab.	Changing	these	selections	does	not	affect	other	charts.	
	
Use	the	Top	violators	drop-down	list	to	select	the	number	of	email	addresses	that	display	on	the	chart.	
	
The	 Top	 Analyzed	 Advanced	 Threats	 tab	 of	 the	 Dashboard	 displays	 the	 email	 addresses	 that	 received	 the	 most	
messages	containing	advanced	threats	based	on	the	selected	mail	traffic	direction.	
 	     Note:	
       The	data	on	this	tab	is	displayed	for	incoming	mail	traffic	only.	
	
Hover	over	a	bar	to	see	details.	
                                                                                                                	
	
Select	a	time	period	by	Date,	Week,	or	Month	to	show	hourly	or	daily	data	for	the	selected	time	period.	
	
The	specified	time	period	only	affects	the	data	shown	on	this	chart	and	its	corresponding	thumbnail	chart	on	the	
Summary	tab.	Changing	these	selections	does	not	affect	other	charts.	
	
Use	the	Top	violators	drop-down	list	to	select	the	number	of	email	addresses	that	display	on	the	chart.	
	
	                                  	
         5.2            Configuring	a	Policy	
    	
    The	Policy	screen	shows	a	list	of	the	currently	defined	rules	and	their	status.	From	this	screen	you	can	add	a	new	
    rule	and	edit,	copy,	or	delete	existing	rules.	
    	
    The	 rules	 are	 displayed	 in	 a	 table,	 sorted	 by	 the	 order	 in	 which	 the	 rules	 are	 applied	 during	 scanning	 by	 Hosted	
    Email	Security.	You	can	filter	the	information	by	using	the	drop-down	lists	at	the	top.	
    	
                                                      Table	1.	Policy	Terminology	
                               Column	                                                           Description	
Last	Used	                                                             Timestamp	 of	 when	 the	 rule	 was	 last	 used.	 If	 the	 rule	
                                                                       has	not	yet	been	triggered,	the	value	in	this	column	will	
                                                                       be	"Never".	
    Hosted	Email	Security	offers	content-based	filtering	at	the	message	level.	Rules	are	the	means	by	which	messaging	
    policies	are	applied	to	message	traffic	in	Hosted	Email	Security.	At	any	time,	an	administrator	can	see	the	rules	that	
    apply	to	their	organization,	and	can	make	changes	to	the	rules	that	comprise	their	policy,	rename	those	rules,	and	
    create	new	rules.	Each	rule	can	be	disabled	if	desired	without	losing	its	definition,	and	re-enabled	at	a	later	time.	
Rule	 criteria	 allow	 you	 to	 specify	 the	 conditions	 that	 the	 rule	 applies	 to	 messages	 scanned	 by	 Hosted	 Email	
Security.	
The	available	criteria	are	shown	in	a	list	in	the	center	of	the	screen.	Some	of	these	criteria	have	links	to	screens	
where	you	specify	the	associated	details.	
	
                                                     Table	1.	Basic	Criteria	
                               Criteria	                                                      Filter	Based	On	
No	criteria		                                                             All	messages	
Message	contains		                     "	viruses	or	malicious	code	"		 Detected	viruses,	worms,	and	other	threats.	
Message	detected	as		                  "	Spam	"		                         Detected	spam.	
                                                        Table	1.	Basic	Criteria	
                                  Criteria	                                                    Filter	Based	On	
                                          "	Phish	"		                       Detected	phish.	
                                          "	Marketing	message	"		           Detected	marketing	message.	
        	
    	                                     	
     •       "Analyzed	Advanced	Threats":	Suspected	threats	detected	by	the	Advanced	Threat	Scan	Engine	or	Social	
             Engineering	Attack	Protection	using	advanced	analysis	
	
         	     Note:	
               The	 Advanced	 Threat	 Scan	 Engine	 or	 Social	 Engineering	 Attack	 Protection	 consider	 messages	 as	 suspected	
               threats	according	to	the	security	level	configured	for	advanced	analysis.	That	is:	
               	
                    • if	 the	 High	 security	 level	 is	 configured	 for	 advanced	 analysis,	 then	 the	 action	 will	 be	 applied	 on	 all	
                        messages	that	exhibit	any	suspicious	behavior.	
               	
                    • if	 the	 Medium	 security	 level	 is	 configured	 for	 advanced	 analysis,	 then	 the	 action	 will	 be	 applied	 on	
                        messages	that	have	moderate	to	high	probability	of	being	malicious.	
               	
                    • if	the	Low	security	level	is	configured	for	advanced	analysis,	then	the	action	will	be	applied	only	on	
                        messages	that	have	high	probability	of	being	malicious.	
     	
4.   Specify	at	least	one	of	the	following	detection	types.	
     	
                Option	                                                          Description	
                               Apply	 the	 rule	 to	 messages	 or	 attachments	 that	 contain	 cleanable	 viruses.	 Cleanable	 viruses	
                               are	 those	 that	 can	 be	 safely	 removed	 from	 the	 contents	 of	 the	 infected	 file,	 resulting	 in	 an	
                               uninfected	copy	of	the	original	message	or	attachment.	
                                         Warning:	
         Cleanable	viruses	or	
                                       	 Selecting	Cleanable	viruses	or	malicious	code	as	rule	criteria,	and	then	selecting	a	
         malicious	code	
                                         rule	 action	 other	 than	 Delete	 or	 Clean,	 can	 result	 in	 infected	 messages	 or	
                                         attachments	 entering	 your	 messaging	 environment.	 By	 default,	 Hosted	 Email	
                                         Security	 is	 configured	 with	 virus	 rules	 to	 appropriately	 handle	 threats	 when	 it	 is	
                                 	
                                         installed.	
         Uncleanables	with	      Apply	the	rule	to	messages	that	contain	uncleanable	viruses,	worms,	or	other	threats	that	
         mass-mailing	           cannot	be	removed	from	messages	or	attachments,	and	that	propagate	by	mass-mailing	
         behavior	               copies	of	themselves.	
The	Advanced	Threat	Scan	Engine	(ATSE)	uses	a	combination	of	pattern-based	scanning	and	heuristic	scanning	to	
detect	document	exploits	and	other	threats	used	in	targeted	attacks.	
	
Major	features	include:	
	
    • Detection	of	zero-day	threats	
	
    • Detection	of	embedded	exploit	code	
	
    • Detection	rules	for	known	vulnerabilities	
	
    • Enhanced	parsers	for	handling	file	deformities	
         	
  	    Important:	
      Because	 ATSE	 identifies	 both	 known	 and	 unknown	 advanced	 threats,	 enabling	 ATSE	 may	 increase	 the	
      possibility	of	legitimate	files	being	flagged	as	malicious.	
The	 Spam,	 Phish,	 Marketing	 message,	 or	 Social	 engineering	 attack	 criteria	 allow	 you	 to	 create	 rules	 that	 take	
actions	on	these	types	of	potentially	unwanted	messages.	
	
  	    Note:	
       Hosted	 Email	 Security	 does	 not	 apply	 content-based	 heuristic	 spam,	 phish,	 marketing	 message,	 or	 social	
       engineering	attack	rules	to	email	messages	received	from	email	addresses	and	domains	listed	on	the	Approved	
       Senders	screen.	
     	
1. Select	Message	detected	as.	
     	
2. Select	"Spam".	
	
3. Choose	a	baseline	spam	catch	rate.	
	
     • Lowest	(most	conservative)	
     • Low	
     • Moderately	low	
     • Moderately	high	
     • High	
     • Highest	(most	aggressive)	
	                                    	
              5.2.3.3       Configuring	Phish	Criteria	
The	 Spam,	 Phish,	 Marketing	 message,	 or	 Social	 engineering	 attack	 criteria	 allow	 you	 to	 create	 rules	 that	 take	
actions	on	these	types	of	potentially	unwanted	messages.	
 	     Note:	
       Hosted	 Email	 Security	 does	 not	 apply	 content-based	 heuristic	 spam,	 phish,	 marketing	 message,	 or	 social	
       engineering	attack	rules	to	email	messages	received	from	email	addresses	and	domains	listed	on	the	Approved	
       Senders	screen.	
Marketing	 messages	 are	 email	 messages	 that	 have	 commercial	 or	 fund-raising	 content	 that	 the	 user	 may	 have	
requested,	but	that	often	do	not	include	an	opt-out	option.	
	
The	 Spam,	 Phish,	 Marketing	 message,	 or	 Social	 engineering	 attack	 criteria	 allow	 you	 to	 create	 rules	 that	 take	
actions	on	these	types	of	potentially	unwanted	messages.	
 	     Note:	
       Hosted	 Email	 Security	 does	 not	 apply	 content-based	 heuristic	 spam,	 phish,	 marketing	 message,	 or	 social	
       engineering	attack	rules	to	email	messages	received	from	email	addresses	and	domains	listed	on	the	Approved	
       Senders	screen.	
Social	 Engineering	 Attack	 Protection	 detects	 suspicious	 behavior	 related	 to	 social	 engineering	 attacks	 in	 email	
messages.	
	
For	more	information	about	social	engineering	attack	detections,	see	Social	Engineering	Attack	Log	Details	
	
The	 Spam,	 Phish,	 Marketing	 message,	 or	 Social	 engineering	 attack	 criteria	 allow	 you	 to	 create	 rules	 that	 take	
actions	on	these	types	of	potentially	unwanted	messages.	
	                                    	
    	           Note:	
                Hosted	 Email	 Security	 does	 not	 apply	 content-based	 heuristic	 spam,	 phish,	 marketing	 message,	 or	 social	
                engineering	attack	rules	to	email	messages	received	from	email	addresses	and	domains	listed	on	the	Approved	
                Senders	screen.	
	
1.      Select	Message	detected	as.	
        	
2.      Select	Social	engineering	attack.	
	
        •         Select	Perform	advanced	analysis	to	identify	threats,	and	then	select	the	threat	level	from	the	drop-down	
                  list,	 to	 perform	 further	 observation	 and	 analysis	 for	 threats	 detected	 by	 Social	 Engineering	 Attack	
                  Protection.	
            	       Note:	
                    Hosted	 Email	 Security	 does	 not	 apply	 content-based	 heuristic	 spam,	 phish,	 marketing	 message,	 or	 social	
                    engineering	attack	rules	to	email	messages	received	from	email	addresses	and	domains	listed	on	the	Approved	
                    Senders	screen.	
        	
Hosted	Email	Security	logs	advanced	threats	as	follows:	
	
    • "Probable	Advanced	Threats":	Suspected	threats	detected	by	the	Advanced	Threat	Scan	Engine	or	Social	
        Engineering	Attack	Protection	but	not	analyzed	using	advanced	analysis	
            	       Tip:	
            	       Some	 detected	 files	 may	 be	 safe.	 Trend	 Micro	 recommends	 selecting	 the	 Quarantine	 action	 for	
                    suspected	threats	detected	by	Social	Engineering	Attack	Protection.	
        •         "Analyzed	Advanced	Threats":	Suspected	threats	detected	by	the	Advanced	Threat	Scan	Engine	or	Social	
                  Engineering	Attack	Protection	using	advanced	analysis	
            	       Note:	
                    The	 Advanced	 Threat	 Scan	 Engine	 or	 Social	 Engineering	 Attack	 Protection	 considers	 messages	 as	 suspected	
                    threats	according	to	the	security	level	configured	for	advanced	analysis.	That	is:	
                    	
                         • if	 the	 High	 security	 level	 is	 configured	 for	 advanced	 analysis,	 then	 the	 action	 will	 be	 applied	 on	 all	
                             messages	that	exhibit	any	suspicious	behavior.	
                    	
                         • if	 the	 Medium	 security	 level	 is	 configured	 for	 advanced	 analysis,	 then	 the	 action	 will	 be	 applied	 on	
                             messages	that	have	moderate	to	high	probability	of	being	malicious.	
                    	
                         • if	the	Low	security	level	is	configured	for	advanced	analysis,	then	the	action	will	 be	applied	only	on	
                             messages	that	have	high	probability	of	being	malicious.	
	
	                                              	
              5.2.3.6        Configuring	Advanced	Criteria	
The	 following	 tables	 all	 contain	 the	 same	 information	 sorted	 differently.	 Use	 the	 following	 sorted	 tables	 to	 find	
appropriate	"Advanced"	criteria	to	filter	messages	by	your	desired	rule	targets:	
	
                                    Table	1.	Advanced	Criteria	Sorted	by	Display	Order	
    Rule	Targets	                                 Criteria	                                        Filter	Based	On	
                                                              >,	<=		
                        Message	size	is		                     <number>	                Size	
                                                              KB,	MB	
Sorted	by	display	
order	                                                        "	keyword	
                        Subject	matches		
                                                              expressions	"		
                        Subject	is		                          "	blank	"		
                                                              "	keyword	
                        Body	matches		                                                 Keywords	in	headers	and	content	
                                                              expressions	"		
                                                              "	keyword	
                        Specified	header	matches		
                                                              expressions	"		
                        Attachment	content	matches		          "	keyword	
                                Table	1.	Advanced	Criteria	Sorted	by	Display	Order	
    Rule	Targets	                            Criteria	                                    Filter	Based	On	
                                                         expressions	"		
                                                         >,	<=		
                    Attachment	size	is		                 <number>	              Attachment	size	
                                                         B,	KB,	MB	
                                                         >,	<=		
                    Attachment	number	is		                                      Number	of	attachments	
                                                         <number>	
                    Attachment	is		
                    	
                      	   Note:	                         "	password	            Zipped,	signed,	or	password-
                          Select	"Any	Match"	to	         protected	"		          protected	attachment	
                          the	right	of	Advanced	to	
                    	
                          display	these	criteria.	
                    Recipient	number		
                    	
                      	   Note:	                         >,	<=		
                                                                                Number	of	recipients	
                          Select	"Any	Match"	to	         <number>	
                          the	right	of	Advanced	to	
                    	
                          display	these	criteria.	
	
                        Table	2.	Advanced	Criteria	Sorted	by	Attribute	and	Content	Targets	
    Rule	Targets	                            Criteria	                                    Filter	Based	On	
                                                         >,	<=		
                    Message	size	is		                    <number>	              Size	
                                                         KB,	MB	
Size	attributes	
                                                         >,	<=		
                    Attachment	size	is		                 <number>	              Attachment	size	
                                                         B,	KB,	MB	
                                                         "	keyword	
                    Subject	matches		
                                                         expressions	"		
                                                         "	keyword	
                    Specified	header	matches		
                                                         expressions	"		
                            Table	2.	Advanced	Criteria	Sorted	by	Attribute	and	Content	Targets	
    Rule	Targets	                                Criteria	                                    Filter	Based	On	
                                                             "	keyword	
                        Attachment	content	matches		
                                                             expressions	"		
                                                             >,	<=		
                        Attachment	number	is		                                      Number	of	attachments	
                                                             <number>	
                        Recipient	number		
Quantity	attributes	    	
                          	   Note:	                         >,	<=		
                                                                                    Number	of	recipients	
                              Select	"Any	Match"	to	         <number>	
                              the	right	of	Advanced	to	
                        	
                              display	these	criteria.	
                        Attachment	is		
Compressed,	            	
signed,	or	               	   Note:	                         "	password	            Zipped,	signed,	or	password-
encrypted	                    Select	"Any	Match"	to	         protected	"		          protected	attachment	
attributes	                   the	right	of	Advanced	to	
                        	
                              display	these	criteria.	
	
                    Table	3.	Advanced	Criteria	Sorted	by	Message-Only	or	Attachment-Only	Targets	
    Rule	Targets	                                Criteria	                                    Filter	Based	On	
                                                             >,	<=		
                        Message	size	is		                    <number>	              Size	
                                                             KB,	MB	
                                                             "	keyword	
                        Subject	matches		
                                                             expressions	"		
                                                             "	keyword	
                        Specified	header	matches		
                                                             expressions	"		
                        Recipient	number		
                        	
                          	   Note:	                         >,	<=		
                                                                                    Number	of	recipients	
                              Select	"Any	Match"	to	         <number>	
                              the	right	of	Advanced	to	
                        	
                              display	these	criteria.	
                                                             "	name	or	extension	
                                                                                  Attachment	name	or	extension	
                                                             "		
                                                               >,	<=		
                         Attachment	number	is		                                         Number	of	attachments	
                                                               <number>	
                         Attachment	is		
                         	
                           	   Note:	                          "	password	              Zipped,	signed,	or	password-
                               Select	"Any	Match"	to	          protected	"		            protected	attachment	
                               the	right	of	Advanced	to	
                         	
                               display	these	criteria.	
	
You	 can	 select	 existing	 keyword	 expressions	 from	 the	 list	 of	 those	 available.	 New	 keyword	 expressions	 can	 be	
defined	and	saved,	either	from	scratch	or	by	copying	and	editing	an	existing	expression.	
 	     Note:	
       You	can	also	add,	edit,	copy,	or	delete	keyword	expressions.	
3. Repeat until you have moved all the keyword expressions you want to apply.
      	     Note:	
            The	 "recommended"	 category	 contains	 those	 whose	 file	 types	 commonly	 act	 as	 containers	 for	 malware	 and	
            are	not	types	that	are	normally	exchanged	via	email	in	an	organization.	This	list	includes	extensions	such	as	
            COM,	 DLL,	 and	 EXE.	 The	 commonly	 exchanged	 category	 includes	 file	 types	 that	 are	 commonly	 sent	 between	
            members	of	an	organization.	
            	
            The	 latter	 list	 includes	 the	 DOC	 extension	 used	 by	 Microsoft	 Word	 documents.	 These	 files	 are	 often	 used	 to	
            propagate	VB	macro	viruses,	but	they	are	also	often	commonly	exchanged	within	organizations.	
          	
     b.   Click	the	open	arrow	buttons	to	drop-down	the	lists	of	standard	file	extensions.	
          	
     c.   Select	the	file	extensions	for	Hosted	Email	Security	to	trigger	on	for	this	rule.	
	
     d.   Click	the	close	arrow	button	to	collapse	the	list.	
6.   If	you	want	to	block	attachments	with	your	own	specified	names	or	extensions:	
     	
     a. Select	Attachments	named.	
          	
     b. Type	an	extension	to	block	or	use	an	asterisk	(*)	as	a	substitute	for	any	part	of	a	filename.	
	
      	     Tip:	
      	     The	following	examples	are	valid:	
            	
            • doc	or	*.doc	
            • docx	or	*.docx	
            • doc*	or	*.doc*	
            • LOVE-LETTER-FOR-YOU.TXT.vbs	
            • LOVE-LETTER*.vbs	
     c.   Click	Add.	
          The	file	name	is	added	to	the	list	just	below.	
      	       Tip:	
      	       If	there	are	any	names	in	the	list	that	you	want	to	delete,	select	them	and	click	Delete.	
          	
      	       Tip:	
      	       The	following	examples	are	valid:	
              	
              • 3dm	or	*.3dm	
              • 3dmf	or	*.3dmf	
          	
      	       Tip:	
      	       If	there	are	any	names	in	the	list	that	you	want	to	delete,	select	them	and	click	Delete.	
         	     Note:	
               The	Compressed	file	type	of	other	includes	only	the	following	file	types:	ar,	arc,	amg,	lzw,	cab,	lha,	 pklite,	
               diet,	lzh,	and	lz.	
     	
         	     Note:	
               The	 Message	 size	 is	 a	 criteria	 applied	 to	 the	 total	 size	 of	 a	 message,	 including	 any	 attachments	 it	 might	
               contain.	
	
For	example,	if	a	message	contained	two	attachments,	one	a	3	MB	attachment	and	the	other	a	1	MB	attachment,	a	
rule	that	deletes	messages	over	2	MB	would	delete	the	entire	message,	including	both	attachments.	
		
Hosted	Email	Security	can	scan	the	message	subject	for	keyword	expressions.	
	
    1. On	the	Criteria	screen,	select	Advanced	to	display	the	advanced	criteria.	
        	
    2. Select	Subject	matches	“keyword	expressions".	
	
    3. Click	the	"keyword	expressions"	link.	
	
    4. Configure	keywords.	
                   5.2.3.6.7     Using	Subject	is	Blank	Criteria	
Hosted	Email	Security	can	scan	the	message	for	a	blank	subject	line.	
	
    1. On	the	Criteria	screen,	select	Advanced	to	display	the	advanced	criteria.	
        	
    2. Select	Subject	is	"blank".	
Hosted	Email	Security	can	scan	the	message	body	for	keyword	expressions.	
	
    1. On	the	Criteria	screen,	select	Advanced	to	display	the	advanced	criteria.	
        	
    2. Select	Body	matches.	
        	
    3. Click	the	"keyword	expressions"	link.	
        	
    4. Configure	keywords.	
Hosted	Email	Security	can	scan	the	message	headers	for	keyword	expressions.	
	
    1. On	the	Criteria	screen,	select	Advanced	to	display	the	advanced	criteria.	
	
    2. Select	Specified	header	matches.	
	
    3. Click	the	"keyword	expressions"	link.	
	
    4. Configure	keywords.	
The	 Attachment	 content	 matches	 "keyword	 expressions"	 criteria	 allows	 you	 to	 create	 rules	 that	 take	 actions	 on	
messages	based	on	keyword	expressions	contained	in	a	message.	
	
     1. On	the	Criteria	screen,	select	Advanced	to	display	the	advanced	criteria.	
	
     2. Select	the	Attachment	content	matches	"keyword	expressions"	criteria.	
	
     3. Click	the	"keyword	expressions"	link.	
         The	Attachment	Content	Keyword	Expressions	screen	appears.	
	
     4. Configure	the	keywords.	
The	Attachment	size	is	criteria	allows	you	to	create	rules	that	take	actions	on	messages	based	on	the	size	of	any	
attachments	to	the	message.	
	
    1. On	the	Criteria	screen,	select	Advanced	to	display	the	advanced	criteria.	
	
    2.   Select	the	Attachment	size	is	criteria.	
	
    3.   Select	>	or	<=	from	the	comparison	drop-down	list.	
	
              •      Select	>	to	apply	the	rule	to	attachments	that	are	larger	than	the	specified	size.	
              •      Select	<=	to	apply	the	rule	to	attachments	that	are	smaller	than	or	equal	to	the	specified	size.	
	
         For	example,	<=	10	MB	applies	the	rule	to	all	messages	that	are	equal	to	or	smaller	than	10	megabytes.	
	
    4.   Type	a	value	for	the	size.	
	
    5.   Select	a	unit	of	measurement	from	the	following	choices:	
	
              •      B:	Bytes	
              •      KB:	Kilobytes	
              •      MB:	Megabytes	
                  Note:	
                  The	Attachment	size	is	criteria	is	applied	to	the	total	size	of	each	attachment.
	
For	example,	if	a	message	contained	two	attachments,	one	a	3	MB	attachment	and	the	other	a	1	MB	attachment,	a	
rule	that	deletes	attachments	over	2	MB	would	delete	only	the	3	MB	attachment.	The	other	attachment	would	not	
be	deleted.	
Hosted	Email	Security	can	scan	the	message	for	a	zipped,	signed,	or	password-protected	attachment.	
	
    1. On	the	Criteria	screen,	select	Advanced	to	display	the	advanced	criteria.	
	
    2.   Select	"Any	Match".	
         The	Attachment	is	"password	protected"	and	Recipient	number	criteria	become	available.	
	
    3.   Select	Attachment	is	"password	protected".	
The	Recipient	Number	criteria	allows	you	to	create	rules	that	take	actions	on	messages	based	on	the	number	of	
recipients	the	message	is	addressed	to.	
	
     1. On	the	Criteria	screen,	select	Advanced	to	display	the	advanced	criteria.	
	
     2. Select	"Any	Match".	
         The	Attachment	is	"password	protected"	and	Recipient	number	criteria	become	available.	
	
     3. Select	Recipient	number.	
	
     4. Select	>	or	<=	from	the	comparison	drop-down	list.	
	
              • Select	 >	 to	 apply	 the	 rule	 to	 messages	 that	 are	 sent	 to	 more	 than	 the	 specified	 number	 of	
                 recipients.	
              • Select	<=	to	apply	the	rule	to	messages	that	have	the	same	number	or	fewer	than	the	specified	
                 number	of	recipients.	
                 	
         For	example:	
	
         >10	apply	the	rule	to	all	messages	that	have	more	than	10	recipients.	
         <=	10	apply	the	rule	to	all	messages	that	have	10	or	fewer	recipients.	
	
     5. Type	a	value	for	the	number	of	recipients.	
Rule	actions	allow	you	to	specify	what	happens	to	messages	that	satisfy	the	conditions	of	the	rule's	criteria.	
	
Actions	fall	into	these	classes:	
	
• "Intercept"	 actions:	 Actions	 in	 this	 class	 intercept	 the	 message,	 preventing	 it	 from	 reaching	 the	 original	
    recipient.	Intercept	actions	include	deleting	the	entire	message	and	re-addressing	the	message.	
	
• "Modify"	actions:	Actions	in	this	class	change	the	message	or	its	attachments.	Modify	actions	include	cleaning	
    cleanable	 viruses,	 deleting	 message	 attachments,	 inserting	 a	 stamp	 in	 the	 message	 body,	 or	 tagging	 the	
    subject	line.	
	
• "Monitor"	 actions:	 Actions	 in	 this	 class	 allow	 administrators	 to	 monitor	 messaging.	 Monitor	 actions	 include	
    sending	a	notification	message	to	others	or	sending	a	BCC	(blind	carbon	copy)	of	the	message	to	others.	
	
• "Scan	Limitation"	actions:	Actions	in	this	class	allow	administrators	to	reject	or	bypass	scanning	messages	that	
    exceed	Hosted	Email	Security	capabilities.	
	
•   "Encrypt	Email	Message"	actions:	Actions	in	this	class	encrypt	the	message	and	then	queue	it	for	delivery.	This	
    is	a	non-intercept	action,	but	no	other	actions	can	be	taken	on	the	target	message	after	this	rule	is	triggered.	
    This	action	has	the	lowest	priority	of	all	actions,	but	when	triggered	it	is	always	the	final	rule	run	before	the	
    message	is	queued	for	delivery.	If	more	than	one	rule	in	the	rule	set	is	triggered,	the	rule	that	uses	the	encrypt	
    email	action	will	always	be	triggered	last.	
	
        Note:	
        This	action	only	applies	to	outbound	rules.
	
Each	rule	can	contain:	
	
• One	and	only	one	intercept	action,	and	
	
• Any	combination	of	modify	or	monitor	actions	
"Intercept"	actions	prevent	a	message	from	being	delivered	to	the	mailbox	of	the	original	recipient.	Instead,	the	
message	is	deleted,	quarantined,	or	sent	to	a	different	recipient.	
	
"Intercept"	actions	are	"terminal"	actions.	Once	a	terminal	action	executes,	processing	of	that	rule	stops	and	no	
further	action	takes	place	for	that	rule.	
	
Terminal	actions	execute	following	a	strict	priority	order:	
	
     1. Delete	the	entire	message.	
	
     2. Deliver	the	message	now.	
               Warning:	
            	 The	 Deliver	 now	 action	 is	 not	 recommended	 for	 use	 as	 the	 only	 action.	 If	 you	 choose	
               Deliver	now	as	the	only	action	for	Spam	mail,	for	example,	all	of	that	mail	will	simply	be	
               delivered	to	your	recipients,	as	if	there	were	no	spam	filter	in	place.	
               	
               If	you	use	Deliver	now	with	a	virus	rule,	ensure	that	you	also	have	a	Delete	action	for	the	
               virus	rule.	Only	the	Delete	action	takes	higher	priority	than	Deliver	now	and	so	would	be	
               processed	before	it	(and	then	terminates	the	processing	of	that	rule).	
               	
               If	you	chose	Deliver	now	as	the	only	action	for	a	virus	rule,	mail	containing	viruses	would	
               leak	through	unblocked.	
         	
     3. Quarantine	the	message.	
	
        4.     Re-address	to	another	email	recipient.	
	
This	 action	 deletes	 the	 message	 and	 all	 attachments.	 The	 message	 is	 recorded	 as	 deleted	 in	 the	 Hosted	 Email	
Security	logs,	but	once	deleted,	the	message	cannot	be	recovered.	It	is	one	of	the	"intercept"	category	of	actions.		
To	configure	a	rule	action	to	delete	a	message:	
	
Select	the	Delete	entire	message	action	from	the	"Intercept"	section.	
Use	 the	 Deliver	 Now	 action	 to	 deliver	 email	 immediately.	 When	 this	 action	 takes	 effect,	 Hosted	 Email	 Security	
delivers	the	email	without	executing	any	more	rules	for	the	affected	email.	
	
All	 rules	 are	 auto-ordered	 for	 security	 and	 execution	 efficiency.	 Administrators	 are	 relieved	 of	 determining	 the	
order	of	rule	execution.	The	Deliver	Now	action	bypasses	the	automatic	order	of	execution	so	that	Hosted	Email	
Security	can	deliver	the	email	immediately.	
	
              Warning:	
         	 The	Deliver	now	action	is	not	recommended	for	use	as	the	only	action.	If	you	choose	Deliver	now	as	the	
              only	action	for	Spam	mail,	for	example,	all	of	that	mail	will	simply	be	delivered	to	your	recipients,	as	if	
              there	were	no	spam	filter	in	place.	
              	
              If	you	use	Deliver	now	with	a	virus	rule,	ensure	that	you	also	have	a	Delete	action	for	the	virus	rule.	Only	
              the	Delete	action	takes	higher	priority	than	Deliver	now	and	so	would	be	processed	before	it	(and	then	
              terminates	the	processing	of	that	rule).	
              	
              If	you	chose	Deliver	now	as	the	only	action	for	a	virus	rule,	mail	containing	viruses	would	leak	through	
              unblocked.	
	
      1. Select	the	Deliver	Now	action	from	the	"Intercept"	section.	
	
      2. Click	Next	if	you	are	creating	a	new	rule,	or	Save	if	you	are	editing	an	existing	rule.	
	
      3. Click	OK	on	the	Deliver	now	warning	message	that	appears.	The	message	closes.	
	
      4. If	creating	a	new	rule,	type	a	name	for	the	rule	in	the	Rule	Name	field.	
The	Change	Recipient	action	intercepts	messages	and	sends	them	to	a	new	recipient.	This	means	that	the	original	
message	recipient	will	not	receive	a	copy	of	the	message.	It	is	one	of	the	"intercept"	class	of	actions.	You	can	only	
select	a	recipient	address	that	is	in	your	domain.	
    	        Note:	
             The	Change	Recipient	action	changes	the	recipient	address	in	the	message	header.	The	message	will	be	routed	
             to	the	new	address	and	the	original	recipient	will	not	receive	the	message.	The	new	recipient,	however,	will	see	
             the	 original	 recipient's	 address	 in	 the	 message	 header.	 To	 have	 a	 copy	 of	 the	 message	 sent	 to	 a	 different	
             address	while	allowing	the	original	message	to	go	to	the	original	recipient,	select	the	BCC	action.	
	
                   Warning:	
             	     Redirected	messages	may	contain	viruses	or	malicious	code.	Trend	Micro	recommends	against	redirecting	
                   messages	to	external	addresses	unless	you	have	configured	an	outbound	virus	policy.	
	
        1.       From	the	"Intercept"	section	of	the	Action	page,	select	the	Change	Recipient	action.	
	
        2.       Type	the	email	address	of	the	recipient	in	the	field.	If	you	have	more	than	one	email	address,	enter	them	
                 in	the	field	separated	by	commas	or	semicolons.	
Quarantined	items	are	now	stored	in	a	directory	structure	created	by	Hosted	Email	Security.	This	structure	allows	
for	increased	performance	when	the	service	is	saving	items	into	quarantines	or	when	users	view	them	through	the	
End	User	Quarantine	website.	Quarantined	messages	are	indexed	in	the	Hosted	Email	Security	database	to	provide	
you	with	queries	and	improved	search	tools.	
	
     1. In	the	"Intercept"	section	of	the	Rule	Action	screen,	select	the	Quarantine	action.	
	
     2. Select	a	quarantine	area	from	the	drop-down	list,	or	click	Edit	to	create	a	new	quarantine	area.	
	
"Modify"	 actions	 change	 the	 message	 or	 its	 attachments.	 The	 original	 sender	 will	 still	 receive	 the	 modified	
message,	assuming	that	the	message	does	not	trigger	other	rules	with	"Intercept"	actions.	
    	        Important:	
             The	 Clean	 cleanable	 viruses,	 delete	 those	 that	 cannot	 be	 cleaned	 action	 is	 only	 available	 in	 policies	 with	 the	
             target	criteria	of	Message	contains	"viruses	or	malicious	code".	If	the	Clean	cleanable	viruses,	delete	those	that	
             cannot	be	cleaned	action	is	used	in	the	rule,	and	a	message	contains	an	uncleanable	virus,	the	attachment	will	
             be	deleted.	
             	
             The	 Delete	 matching	 attachments	 and	 Clean	 cleanable	 viruses,	 delete	 those	 that	 cannot	 be	 cleaned	 actions	
             cannot	be	used	in	the	same	rule.	
	
To	configure	a	rule	action	to	clean	virus-infected	attachments:	
	
From	 the	 "Modify"	 section	 of	 the	 Action	 page,	 select	 the	 Clean	 cleanable	 viruses,	 delete	 those	 that	 cannot	 be	
cleaned	action.	
This action deletes any attachments that match the rule criteria. It is one of the "Modify" category of actions.
    	        Important:	
             The	 Delete	 matching	 attachments	 and	 Clean	 cleanable	 viruses,	 delete	 those	 that	 cannot	 be	 cleaned	 actions	
             cannot	be	used	in	the	same	rule.	
	
	
The	Delete	matching	attachments	action	is	invoked	only	when	one	or	more	of	the	following	criteria	trigger	a	rule:	
	
    • Message	contains	"	viruses	or	malicious	code	"	
	
    • Attachment	is	"	name	or	extension	"	
	
    • Attachment	is	"	MIME	content-type	"	
	
    • Attachment	is	"	true	file	type	"	
	
    • Attachment	is	"	password	protected	"	
	
    • Attachment	size	is	
	
    • Attachment	content	matches	"	keyword	expressions	"	
	
For	example,	a	"spam"	rule	with	an	action	of	Delete	matching	attachments	does	not	delete	any	attachments	if	the	
only	 target	 criteria	 is	 Message	 contains	 "Spam".	 Add	 criteria	 from	 the	 list	 above	 to	 use	 the	 Delete	 matching	
attachments	action.	
	
To	configure	a	rule	action	to	delete	attachments	that	match	a	criteria:	
	
Select	Delete	matching	attachments	from	the	"Modify"	section.	
 	     Note:	
       Hosted	Email	Security	recognizes	messages	signed	using	the	S/MIME	standard.	
Use	the	following	tokens	to	include	variables	in	message	tags	and	stamps:	
	
                                     Table	1.	Tokens	and	Variables	
          Token	                                                Variable	
%SENDER%		                     Message	sender	
%RCPTS%		                      Message	recipients	
                                     Table	1.	Tokens	and	Variables	
          Token	                                                Variable	
%SUBJECT%		                    Message	subject	
%DATE&TIME%		                  Date	and	time	of	incident	
%MAILID%		                     Mail	ID	
%RULENAME%		                   Name	of	the	rule	that	contained	the	triggered	filter	
%RULETYPE%		                   The	type	of	rule:	Content	Filter,	Message	Size	Filter,	and	others	
%DETECTED%		                   Current	filter	scan	result	in	other	task	
%FILENAME%		                   Name(s)	of	file(s)	that	were	affected	by	the	rule	
%DEF_CHARSET%		                Default	character	set	of	the	notification	message	
%MSG_SIZE%		                   Total	size	of	the	message	and	all	attachments	
%ATTACH_SIZE%		                Total	size	of	the	attachment(s)	that	triggered	the	rule	
%ATTACH_COUNT%		               Number	of	attachments	that	triggered	the	rule	
%TACTION%		                    Terminal	action	taken	by	Hosted	Email	Security	
%ACTION%		                     All	other	(non-terminal)	actions	taken	by	Hosted	Email	Security	
%VIRUSNAME%		                  Name	of	any	virus	detected	
                               This	token	will	be	empty	if	the	message	did	not	trigger	a	virus	action.	
%VIRUSACTION%		                Action	taken	on	any	viruses	detected	in	the	message	
                               This	token	will	be	empty	if	the	message	did	not	trigger	a	virus	action.	
	
    1.   Select	a	message	from	the	list	of	those	available	on	the	left	side	of	the	screen.	
	
    2.   Click	the	right	arrow	button	(Add>).	
         The	selected	message	appears	in	the	Selected	list	on	the	right	side.	
    1.   Select	the	message	you	want	to	delete	from	the	Selected	list	on	the	right	side.	
         	
    2.   Click	Delete.	
The	BCC	action	sends	a	Bcc	(blind	carbon	copy)	to	a	recipient	or	recipients	configured	in	the	rule.	It	is	one	of	the	
"monitor"	class	of	actions.	You	can	only	configure	a	notification	to	be	sent	to	an	address	in	your	own	domain.	
	
    1. From	the	Monitor	section	of	the	Action	page,	select	BCC.	
        	
    2. Type	the	email	address	of	the	recipient	in	the	field.	If	you	have	more	than	one	email	address,	enter	them	
        in	the	field	separated	by	commas	or	semicolons.	
Bypass	this	rule	skips	taking	any	action	on	the	specified	message	but	continues	to	check	the	message	against	the	
remaining	rules	in	the	policy.	
	
  	    Note:	
       The	Bypass	this	rule	action	is	only	available	in	policies	with	the	target	criteria	of	Message	contains	"viruses	or	
       malicious	code".	
	
Select	the	Bypass	this	rule	action	from	the	"Scan	Limitations"	section.	
	
            Warning:	
        	   The	delivered	message	may	contain	a	security	risk.	
	
The purpose of this rule action is to protect sensitive data in email messages sent by users in your organization.
 	       Note:	
         This	action	only	applies	to	outbound	rules.	
	
Actions	in	this	class	encrypt	the	message	and	then	queue	it	for	delivery.	This	is	a	non-intercept	action,	but	no	other	
actions	 can	 be	 taken	 on	 the	 target	 message	 after	 this	 rule	 is	 triggered.	 This	 action	 has	 the	 lowest	 priority	 of	 all	
actions,	but	when	triggered	it	is	always	the	final	rule	run	before	the	message	is	queued	for	delivery.	If	more	than	
one	rule	in	the	rule	set	is	triggered,	the	rule	that	uses	the	encrypt	email	action	will	always	be	triggered	last.	
In most cases, a rule to encrypt email will be based on one of the following:
     •     Specific	senders	or	recipients	of	the	message	(for	example,	a	rule	that	encrypts	all	email	sent	from	Human	
           Resources	or	the	Legal	department)	
     •     Specific	content	in	the	message	body	
           	
               1. From	the	"Intercept"	section	of	the	Action	page,	select	Do	not	intercept	messages	
               2. From	the	"Modify"	section	of	the	page,	select	the	Encrypt	email	action.	
Configure	the	Approved	Senders	and	Blocked	Senders	lists	to	control	which	email	messages	Hosted	Email	Security	
scans.	Specify	the	senders	to	allow	or	block	using	specific	email	addresses	or	entire	domains.	
	
For	example,	*@example.com	specifies	all	senders	from	the	example.com	domain.	
	
Evaluation	is	done	in	the	following	order:	
	
1. End	User	Quarantine	website	Approved	Senders	lists	
	
2. Administrator	console	Approved	Senders	lists	
	
3. End	User	Quarantine	website	Blocked	Senders	lists	
	
4. Administrator	console	Blocked	Senders	lists	
	
See	Sender	Filter	Order	of	Evaluation.	
    	        Tip:	
    	        IP	reputation-based	filters	use	only	IP	address	data	to	filter	messages.	You	can	also	use	sender	email	
             address	 and	 domain	 to	 filter	 incoming	 messages.	 Approved	 senders	 bypass	 IP	 reputation-based	
             filtering	at	the	MTA	connection	level.	
             See	General	Order	of	Evaluation.	
	
Lists	of	approved	or	blocked	senders	are	managed	using	the	following	screens:	
	
• Approved	Senders	
	
     Email	 messages	 from	 senders	 added	 to	 this	 list	 are	 not	 subject	 to	 IP	 reputation-based,	 spam,	 phish,	 or	
     marketing	 message	 filtering.	 Hosted	 Email	 Security	 still	 performs	 malware	 and	 attachment	 scanning	 on	 all	
     messages	 received	 and	 takes	 the	 action	 configured	 in	 policy	 rules	 after	 detecting	 a	 malware	 threat	 or	 an	
     attachment	policy	violation.	
     	
     Go	to	Sender	Filter	>	Approved	Senders	to	display	this	screen.	
	
•    Blocked	Senders	
	
     Hosted	 Email	 Security	 automatically	 blocks	 messages	 sent	 from	 addresses	 or	 domains	 added	 to	 the	 blocked	
     list	without	subjecting	the	messages	to	any	scanning.	
     	
     Go	to	Sender	Filter	>	Blocked	Senders	to	display	this	screen.	
	
The	Approved	Senders	and	Blocked	Senders	tables	display	the	following	information:	
	
• Sender:	The	email	address	or	domain	that	you	approved	or	blocked	for	the	specified	Recipient	Domain	
	
• Recipient	Domain:	The	managed	domain	for	which	you	approved	or	blocked	the	specified	sender	
	
• Date	Added:	The	date	that	you	added	the	sender	to	the	list	
	
Hosted	Email	Security	only	approves	or	blocks	email	messages	from	the	specified	sender	for	the	specified	domain.	
	
For	example,	after	adding	spammerbob@examplespamdomain.com	to	the	blocked	list	for	your	managed	domain	
mydomain.com,	 Hosted	 Email	 Security	 only	 blocks	 the	 email	 messages	 sent	 from	
spammerbob@examplespamdomain.com	 to	 addresses	 in	 the	 mydomain.com	 domain.	 Hosted	 Email	 Security	 still	
scans	 and	 possibly	 passes	 email	 messages	 sent	 from	 spammerbob@examplespamdomain.com	 to	 your	 other	
managed	domains.	
	
To	block	or	allow	email	messages	from	a	specific	sender	to	all	domains,	select	all	my	domains	from	the	Managed	
domain	drop-down	list.	
	
1. Select	 a	 specific	 domain	 from	 the	 Managed	 domain	 drop-down	 list.	 To	 select	 all	 domains,	 select	 all	 my	
    domains	from	the	list.	
    a)                                                                                                 	
	
2. In	the	Email	address	or	domain	field,	type	a	sender.	A	sender	can	be	a	specific	email	address	or	all	addresses	
    from	a	specific	domain	or	subdomain.	
	
    • Filter	a	specific	email	address	by	typing	that	email	address.	
	
    • Filter	 all	 addresses	 from	 a	 domain	 by	 using	 an	 asterisk	 (*)	 to	 the	 left	 of	 the	 at	 sign	 (@)	 in	 the	 email	
         address.	For	example,	*@example.com	will	filter	all	email	addresses	in	the	example.com	domain.	
	
    • Filter	all	addresses	from	a	subdomain	by	using	an	asterisk	(*)	to	the	left	of	the	at	sign	(@)	and	also	using	
         an	asterisk	(*)	in	place	of	the	subdomain	in	the	email	address.	For	example,	*@*.example.com	will	filter	
         all	email	addresses	in	all	subdomains	of	the	example.com	domain.	
	
The	following	table	displays	format	examples	that	are	valid	or	not	valid:	
      	     Tip:	
      	     Hosted	Email	Security	validates	the	format	of	the	sender	address	before	adding	the	sender	to	the	list.	
            If	you	receive	multiple	formatting	errors	messages	and	are	sure	that	the	address	provided	is	accurate,	
            your	administrator	console	may	have	timed	out.	Reload	the	page	and	try	again.	
	
1.   Select	 a	 specific	 domain	 from	 the	 Managed	 domain	 drop-down	 list.	 To	 select	 all	 domains,	 select	 all	 my	
     domains	from	the	list.	
                                                                                                   	
     	
2.   Click	the	email	address	or	domain	of	a	sender.	The	email	address	or	domain	becomes	editable,	and	buttons	
     labeled	OK	or	Cancel	appear.	
     	
3.   Make	and	confirm	your	changes	or	corrections.	
     • Filter	a	specific	email	address	by	typing	that	email	address.	
     • Filter	 all	 addresses	 from	 a	 domain	 by	 using	 an	 asterisk	 (*)	 to	 the	 left	 of	 the	 at	 sign	 (@)	 in	 the	 email	
          address.	For	example,	*@example.com	will	filter	all	email	addresses	in	the	example.com	domain.	
     • Filter	all	addresses	from	a	subdomain	by	using	an	asterisk	(*)	to	the	left	of	the	at	sign	(@)	and	also	using	
          an	asterisk	(*)	in	place	of	the	subdomain	in	the	email	address.	For	example,	*@*.example.com	will	filter	
          all	email	addresses	in	all	subdomains	of	the	example.com	domain.	
The following table displays format examples that are valid or not valid:
Hosted	 Email	 Security	 offers	 two	 tiers	 of	 protection.	 IP	 reputation-based	 filtering	 at	 the	 MTA	 connection	 level,	
provided	by	Trend	Micro	Email	Reputation	Services	(ERS),	is	the	first	tier.	The	second	is	content-based	filtering	at	
the	message	level.	
    	     Tip:	
    	     IP	reputation-based	filters	use	only	IP	address	data	to	filter	messages.	You	can	also	use	sender	email	
          address	 and	 domain	 to	 filter	 incoming	 messages.	 Approved	 senders	 bypass	 IP	 reputation-based	
          filtering	at	the	MTA	connection	level.	
          See	IP	Reputation-Based	Filtering	at	the	MTA	Connection	Level.	
          See	General	Order	of	Evaluation.	
          See	IP	Reputation	Order	of	Evaluation.	
Hosted	Email	Security	makes	use	of	Trend	Micro	Email	Reputation	Services	(ERS)	Standard	Service	and	Advanced	
Service.	Email	Reputation	Services	uses	a	standard	IP	reputation	database	and	an	advanced,	dynamic	IP	reputation	
database	 (a	 database	 updated	 in	 real	 time).	 These	 databases	 have	 distinct	 entries,	 allowing	 Trend	 Micro	 to	
maintain	a	very	efficient	and	effective	system	that	can	quickly	respond	to	new	sources	of	spam.	
•       Dynamic	Reputation	Settings	control	how	Hosted	Email	Security	uses	the	dynamic	IP	reputation	database	from	
        Email	Reputation	Services	Advanced	Service.	
•       Standard	IP	Reputation	Settings	control	how	Hosted	Email	Security	uses	the	standard	IP	reputation	database	
        from	Email	Reputation	Services	Standard	Service.	
The	Approved	and	Blocked	IP	Addresses	screen	shows	approved	and	blocked	countries,	Internet	service	providers,	
IP	addresses,	and	CIDR	blocks.	
Hosted	Email	Security	makes	use	of	Trend	Micro	Email	Reputation	Services	(ERS)	Standard	Service	and	Advanced	
Service.	
	
Dynamic	 IP	 Reputation	 Settings	 use	 Trend	 Micro	 Email	 Reputation	 Services	 Advanced	 Service,	 a	 real-time	 anti-
spam	 solution.	 The	 Trend	 Micro	 network	 of	 automated	 expert	 systems,	 along	 with	 Trend	 Micro	 spam	 experts,	
continuously	monitor	network	and	traffic	patterns	and	immediately	update	the	dynamic	IP	reputation	database	as	
new	spam	sources	emerge,	often	within	minutes.	As	evidence	of	spam	activity	increases	or	decreases,	the	dynamic	
IP	reputation	database	is	updated	accordingly.	
	
The	dynamic	IP	reputation	database	includes	the	following	blocking	levels:	
	
     • Level	0:	Off	
	
          Queries	the	dynamic	reputation	database	but	does	not	block	any	IP	addresses.	
	
     • Level	1:	Least	aggressive	
	
          Hosted	Email	Security	allows	the	same	amount	of	spam	from	a	sender	with	a	good	rating	as	in	Level	2.	The	
          length	 of	 time	 that	 the	 IP	 address	 stays	 in	 the	 database	 is	 generally	 shorter	 than	 for	 more	 aggressive	
          settings.	
	
        •     Level	2:	(the	default	setting)	
	
              Hosted	 Email	 Security	 allows	 a	 larger	 volume	 of	 spam	 from	 a	 sender	 with	 a	 good	 rating	 than	 more	
              aggressive	settings.	However,	if	an	increase	in	spam	above	the	allowable	threshold	is	detected,	it	adds	the	
              sender	to	the	dynamic	reputation	database.	The	length	of	time	that	the	IP	address	stays	in	the	database	is	
              generally	shorter	than	for	more	aggressive	settings.	
	
        •     Level	3:	
	
              Hosted	 Email	 Security	 allows	 a	 small	 volume	 of	 spam	 from	 senders	 with	 a	 good	 rating.	 However,	 if	 an	
              increase	 in	 spam	 beyond	 the	 allowable	 threshold	 is	 detected,	 it	 adds	 the	 sender	 to	 the	 dynamic	
              reputation	 database.	 The	 length	 of	 time	 that	 the	 IP	 address	 stays	 in	 the	 database	 depends	 on	 whether	
              additional	spam	from	the	sender	is	detected.	
	
        •     Level	4:	Most	aggressive	
	
           If	even	a	single	spam	message	from	a	sender	IP	address	is	detected,	Email	Reputation	Services	adds	the	
           sender	 to	 the	 dynamic	 reputation	 database	 and	 Hosted	 Email	 Security	 blocks	 all	 messages	 from	 the	
           sender.	The	length	of	time	that	the	IP	address	stays	in	the	database	depends	on	whether	additional	spam	
           from	the	sender	is	detected.	
If	 legitimate	 email	 is	 being	 blocked,	 select	 a	 less	 aggressive	 setting.	 If	 too	 much	 spam	 is	 reaching	 your	 network,	
select	a	more	aggressive	setting.	However,	this	setting	might	increase	false	positives	by	blocking	connections	from	
legitimate	email	senders.	
    	       Note:	
            To	avoid	false	positives	from	a	trusted	partner	company,	go	to	IP	Reputation	>	Approved/Blocked	and	add	
            the	IP	address	for	their	MTA	to	the	Approved	list.	
            The	 IP	 addresses	 in	 the	 Approved	 lists	 bypass	 other	 IP	 reputation-based	 filtering.	 This	 list	 is	 useful	 for	
            ensuring	all	messages	from	a	partner	company	or	other	MTA	are	allowed,	no	matter	their	status	with	the	
            standard	 IP	 reputation	 databases	 or	 with	 the	 Trend	 Micro	 Email	 Reputation	 Services	 (ERS)	 dynamic	 IP	
            reputation	database.	When	using	the	IP	reputation	approved	lists,	you	may	experience	lower	overall	spam	
            catch	rates.	
	
Hosted	Email	Security	makes	use	of	Trend	Micro	Email	Reputation	Services	(ERS)	Standard	Service	and	Advanced	
Service.	
	
See	IP	Reputation-Based	Filtering	at	the	MTA	Connection	Level.	
	
Standard	 IP	 Reputation	 Settings	 use	 Trend	 Micro	 Email	 Reputation	 Services	 Standard	 Service,	 which	 helps	 block	
spam	by	validating	requested	IP	addresses	against	the	Trend	Micro	standard	IP	reputation	database,	powered	by	
the	 Trend	 Micro	 Threat	 Prevention	 Network.	 This	 ever-expanding	 database	 currently	 contains	 over	 a	 billion	 IP	
addresses	 with	 reputation	 ratings	 based	 on	 spamming	 activity.	 Trend	 Micro	 spam	 investigators	 continuously	
review	and	update	these	ratings	to	ensure	accuracy.	
	
Hosted	Email	Security	makes	a	query	to	the	standard	IP	reputation	database	server	whenever	it	receives	an	email	
message	 from	 an	 unknown	 host.	 If	 the	 host	 is	 listed	 in	 the	 standard	 IP	 reputation	 database,	 that	 message	 is	
reported	as	spam.	
	
You	can	choose	which	lists	to	enable	from	the	standard	IP	reputation	database.	By	default,	all	lists	are	enabled.	The	
default	setting	is	the	most	effective	for	reducing	spam	levels,	and	it	meets	the	needs	of	most	customers.	
    	   Note:	
        If	you	disable	some	portions	of	the	standard	IP	reputation	database,	you	may	see	an	increase	in	the	amount	
        of	spam	messages	that	reach	your	internal	mail	server	for	additional	content	filtering.	
	
The	standard	IP	reputation	database	includes	the	following	lists:	
	
    • Known	 Spam	 Source:	 The	 Real-time	 Blackhole	 List	 (RBL)	 is	 a	 list	 of	 IP	 addresses	 of	 mail	 servers	 that	 are	
        known	to	be	sources	of	spam.	
	
    • Dynamically	 Assigned	 IP:	 The	 Dynamic	 User	 List	 (DUL)	 is	 a	 list	 of	 dynamically	 assigned	 IP	 addresses,	 or	
        those	 with	 an	 acceptable	 use	 policy	 that	 prohibits	 public	 mail	 servers.	 Most	 entries	 are	 maintained	 in	
        cooperation	with	the	ISP	owning	the	network	space.	IP	addresses	in	this	list	should	not	be	sending	email	
        directly	but	should	be	using	the	mail	servers	of	their	ISP.	
    	   Note:	
        To	avoid	false	positives	from	a	trusted	partner	company,	go	to	IP	Reputation	>	Approved/Blocked	and	add	
        the	IP	address	for	their	MTA	to	the	Approved	list.	
        	
        The	 IP	 addresses	 in	 the	 Approved	 lists	 bypass	 other	 IP	 reputation-based	 filtering.	 This	 list	 is	 useful	 for	
        ensuring	all	messages	from	a	partner	company	or	other	MTA	are	allowed,	no	matter	their	status	with	the	
        standard	 IP	 reputation	 databases	 or	 with	 the	 Trend	 Micro	 Email	 Reputation	 Services	 (ERS)	 dynamic	 IP	
        reputation	database.	When	using	the	IP	reputation	approved	lists,	you	may	experience	lower	overall	spam	
        catch	rates.	
	
    	   Tip:	
    	   To	 add	 a	 CIDR	 block	 to	 the	 list,	 type	 the	 IPv4	 address	 /	 CIDR	 block.	 The	 following	 is	 the	 only	 valid	
        format:	x.x.x.x/z	
	
The	IP	addresses	in	the	Approved	lists	bypass	other	IP	reputation-based	filtering.	This	list	is	useful	for	ensuring	all	
messages	 from	 a	 partner	 company	 or	 other	 MTA	 are	 allowed,	 no	 matter	 their	 status	 with	 the	 standard	 IP	
reputation	 databases	 or	 with	 the	 Trend	 Micro	 Email	 Reputation	 Services	 (ERS)	 dynamic	 IP	 reputation	 database.	
When	using	the	IP	reputation	approved	lists,	you	may	experience	lower	overall	spam	catch	rates.	
	
The	IP	addresses	in	the	Blocked	lists	are	not	subject	to	other	IP	reputation-based	filtering.	Hosted	Email	Security	
permanently	rejects	connection	attempts	from	such	IP	addresses	by	responding	with	a	550	error	(a	rejection	of	the	
requested	connection).	
    	    Tip:	
    	    IP	reputation-based	filters	use	only	IP	address	data	to	filter	messages.	You	can	also	use	sender	email	
         address	 and	 domain	 to	 filter	 incoming	 messages.	 Approved	 senders	 bypass	 IP	 reputation-based	
         filtering	at	the	MTA	connection	level.	
         	
         See	Configuring	Sender	Filter.	
	
If	 you	 encounter	 unexpected	 errors	 while	 trying	 to	 save	 your	 settings	 on	 the	 IP	 Reputation	 Settings	 screen,	 you	
may	be	able	to	resolve	the	issue	on	your	own.	Consult	the	following	table	for	guidance	on	resolving	the	problem	
before	contacting	technical	support.	
Hosted	Email	Security	advanced	protection	allows	you	to	better	secure	data	and	ensure	communication	privacy	for	
email	traffic	in	your	Managed	Domains.	
Transport	Layer	Security	(TLS)	is	a	protocol	that	helps	to	secure	data	and	ensure	communication	privacy	between	
endpoints.	Hosted	Email	Security	allows	you	to	configure	TLS	encryption	policies	between	Hosted	Email	Security	
and	specified	TLS	peers.	Hosted	Email	Security	supports	the	following	TLS	protocols	in	descending	order	of	priority:	
TLS	1.2,	TLS	1.1,	TLS	1.0,	and	SSL	3.0.	
	
The	Transport	Layer	Security	(TLS)	screen	uses	the	following	important	terms:	
            Term	                                                       Details	
TLS	peer	                     Hosted	 Email	 Security	 can	 apply	 your	 specified	 TLS	 configuration	 with	 this	 domain	
                              during	network	communications.	
Security	level	               Opportunistic:		
                                   • Communicates	using	encryption	if	the	peer	supports	and	elects	to	use	TLS	
                                   • Communicates	without	encryption	if	the	peer	does	not	support	TLS	
                                   • Communicates	without	encryption	if	the	peer	supports	TLS	but	elects	not	to	
                                       use	TLS	
                              Mandatory:	
                                   • Communicates	using	encryption	if	the	peer	supports	and	elects	to	use	TLS	
                                   • Does	not	communicate	if	the	peer	does	not	support	TLS	
                                   • Does	not	communicate	if	the	peer	supports	TLS	but	elects	not	to	use	TLS	
                              		
                                 	   Important:	
                                     Because	 of	 the	 risk	 of	 losing	 data,	 Trend	 Micro	 recommends	 confirming	 TLS	
                                     encrypted	message	delivery	between	a	Managed	Domain	and	a	peer	before	
                                     using	the	Mandatory	security	level.	
                                     	
                                     See	Testing	TLS.	
                                     	
                                     To	 ensure	 messages	 can	 be	 received	 from	 the	 Hosted	 Email	 Security	 MTA,	
                                     configure	your	firewall	to	accept	email	messages	from	the	following	Hosted	
                                     Email	Security	IP	address	/	CIDR	blocks:	
                                     	
                                     •	      216.104.0.0/24	
                                     •	      216.99.128.0/24	
                                     •	      150.70.0.0/24	–	All	Regions	
                                     •	      54.219.191.0/25	–	North	and	South	America,	Asia,	and	Japan	Regions	
                                     •	      54.86.63.64/26	–	North	and	South	America,	Asia,	and	Japan	Regions	
                                     •	      52.58.63.0/25	–	Europe,	Middle-east	and	Africa	(EMEA)	Regions	
                                     •	      52.58.62.192/26	–	Europe,	Middle-east	and	Africa	(EMEA)	Regions	
                              	
                                     •	      52.48.127.192/26	–	Europe,	Middle-east	and	Africa	(EMEA)	Regions	
Status	                           •    Enabled:	Hosted	Email	Security	applies	your	specified	TLS	configuration	to	the	
                                       peer	
                                  •    Disabled:	 Hosted	 Email	 Security	 does	 not	 apply	 your	 specified	 TLS	
                                       configuration	to	the	peer	
                                       	
                                       Instead,	the	"Default"	TLS	configuration	applies.	
Default	(TLS	Peer)	           This	configuration	applies	to	all	domains	that	meet	any	of	the	following	criteria:	
                                   • Domain	is	not	in	the	peer	list	
                                   • Domain	is	in	the	peer	list,	but	is	not	enabled	
Use	 the	 following	 procedure	 to	 test	 TLS	 between	 Hosted	 Email	 Security	 and	 the	 email	 server	 for	 your	 Managed	
Domain.	
	
    1. Go	to	Advanced	Protection	>	Transport	Layer	Security	(TLS).		
	
    2. Select	a	Managed	Domain.		
	
    3. Select	the	Direction	of	Incoming.		
          Test	TLS	appears	at	the	top-right	of	the	screen.	
	
    4. Click	Test	TLS.		
	
    5. Specify	the	Send	test	message	to	email	address.		
	
    6. Click	Send	Test.		
          Hosted	 Email	 Security	 sends	 a	 message	 to	 the	 specified	 email	 address	 confirming	 TLS	 works	 for	 the	
          Managed	Domain.	
          	
  	    Tip:	
  	    If	 the	 message	 does	 not	 arrive	 within	 a	 short	 period	 of	 time,	 confirm	 that	 the	 email	 server	 for	 the	
       Managed	Domain	is	correctly	configured	to	use	TLS.	After	verifying	the	server	configuration,	send	the	
       test	again.	
	
Sender	 Policy	 Framework	 (SPF)	 is	 an	 open	 standard	 to	 prevent	 sender	 address	 forgery.	 The	 SPF	 protects	 the	
envelope	 sender	 address,	 which	 is	 used	 for	 the	 delivery	 of	 messages.	 Hosted	 Email	 Security	 enables	 you	 to	
configure	SPF	to	ensure	sender's	authenticity.	
The	SPF	requires	the	owner	of	a	domain	to	specify	and	publish	their	email	sending	policy	in	an	SPF	record	in	the	
domain's	DNS	zone.	For	example,	which	email	servers	they	use	to	send	email	from	their	domain.	
When	 an	 email	 server	 receives	 a	 message	 claiming	 to	 come	 from	 that	 domain,	 the	 receiving	 server	 verifies	
whether	the	message	complies	with	the	domain's	stated	policy	or	not.	If,	for	example,	the	message	comes	from	an	
unknown	server,	it	can	be	considered	as	fake.	
Pass	                The	SPF	record	designates	the	host	to	be	allowed	to	send.	                                Accept	
Fail	                The	SPF	record	has	designated	the	host	as	NOT	being	allowed	to	send.		                    Reject	
        Result	                                          Explanation	                                         Intended	Action	
SoftFail	            The	SPF	record	has	designated	the	host	as	NOT	being	allowed	to	send	but	is	in	 Accept	
                     transition.		
Neutral	             The	SPF	record	specifies	explicitly	that	nothing	can	be	said	about	validity.		          Accept	
None	                The	domain	does	not	have	an	SPF	record	or	the	SPF	record	does	not	evaluate	 Accept	
                     to	a	result.		
PermError	           A	permanent	error	has	occurred	(for	example,	badly	formatted	SPF	record).	              Accept	
TempError	           A	transient	error	has	occurred.	                                                        Accept	
	
You	 can	 enable	 Sender	 Policy	 Framework	 (SPF)	 to	 allow	 Hosted	 Email	 Security	 to	 evaluate	 the	 legitimacy	 of	
sender's	email	address,	before	delivering	the	email	to	the	recipient.	
         	    Note:	
              The	confirmation	dialog	box	only	appears	if	the	domain	selected	in	Managed	Domain	is	all	my	domains.	
             	
        4.   If	you	also	want	to	add	the	SPF	check	result	into	the	email	message's	xheader,	select	Add	SPF	DNS	check	
             result	into	message's	xheader,	and	then	click	OK	on	the	confirmation	dialog	box.	Clear	this	check-box	to	
             disable	 this	 setting.	 Hosted	 Email	 Security	 adds	 messages	 similar	 to	 the	 following	 in	 email	 message’s	
             xheader	named	X-TM-Received-SPF:	
Status xheader
Quarantined	messages	are	blocked	as	detected	spam	or	other	inappropriate	content	before	delivery	to	an	email	
account.	Messages	held	in	quarantine	can	be	reviewed	and	manually	deleted	or	delivered.	
               Warning:	
             	 Hosted	Email	Security	automatically	deletes	messages	from	the	quarantine	after	30	days.	
	
To	 manage	 messages	 for	 other	 members	 of	 a	 managed	 domain,	 the	 Query	 screen	 of	 the	 administrator	 console	
must	be	used.	
	
Quarantine	management	in	the	administrator	console	is	divided	into	the	following	parts:	
	
     • Use	 the	 Quarantine	 >	 Query	 screen	 to	 view	 a	 list	 of	 quarantined	 messages	 for	 your	 managed	 domains.	
        You	can	review	messages,	delete	them,	or	release	them	for	further	filtering.	
	
        Queries	include	data	for	up	to	seven	continuous	days	in	one	calendar	month.	Use	more	than	one	query	to	
        search	across	calendar	months.	
	
     • Use	 the	 Digest	 Settings	 screen	 to	 configure	 the	 schedule	 and	 format	 for	 the	 Quarantine	 Digest.	 If	 the	
        digest	 is	 enabled,	 all	 domain	 recipients	 receive	 their	 own	 customized	 copy	 of	 the	 digest.	 Intended	
        message	 recipients	 can	 use	 the	 End	 User	 Quarantine	 website	 to	 manage	 messages	 in	 quarantine	
        themselves.	
    	        Note:	
             To	 allow	 intended	 recipients	 use	 the	 End	 User	 Quarantine	 website	 to	 manage	 messages	 in	 quarantine	
             themselves,	do	the	following:	
               	
                  • Configure	policy	rules	to	quarantine	messages:	
                      See	Managing	Policy	Rules.	
               	
                  • Share	the	End	User	Quarantine	User's	Guide	and	the	following	web	address	for	your	region	with	end	
                      users:	
               	
                           § For	Europe,	the	Middle	East,	Africa:	https://euq.hes.trendmicro.eu	
               	
                           § For	all	other	regions:	https://euq.hes.trendmicro.com	
               	
Use	 the	 Quarantine	 >	 Query	 screen	 to	 view	 a	 list	 of	 quarantined	 messages	 for	 your	 managed	 domains.	 You	 can	
review	messages,	delete	them,	or	release	them	for	further	filtering.	
	
     1. In	the	Dates	fields,	select	a	range	of	dates.	
          	
            	  Note:	
               Queries	 include	 data	 for	 up	 to	 seven	 continuous	 days	 in	 one	 calendar	 month.	 Use	 more	 than	 one	
               query	to	search	across	calendar	months.	
	
    2.   In	the	Direction	field,	select	a	mail	traffic	direction.	
         	
    3.   Type	your	search	criteria	into	one	or	more	of	the	following	fields:	
	
              •     Recipient	
	
              •     Sender	
	
              •     Subject	
	
         A	recipient	or	sender	can	be	a	specific	email	address	or	all	addresses	from	a	specific	domain.	
	
              •     Query	a	specific	email	address	by	typing	that	email	address.	
	
              •     Query	all	addresses	from	a	domain	by	using	an	asterisk	(*)	to	the	left	of	the	at	sign	(@)	in	the	
                    email	 address.	 For	 example,	 *@example.com	 will	 search	 for	 all	 email	 addresses	 in	 the	
                    example.com	domain.	
	
         The	following	table	displays	format	examples	that	are	valid	or	not	valid:	
         	
                              Table	1.	Format	Examples	for	Mail	Tracking	and	Quarantine	Query	
                                         Valid	                           Not	Valid	
                          name@info.example.com		             name@*.example.com		
                          *@example.com		                     *@*.com		
                          *@server.example.com		              *@*		
                          	                                   *@*.example.com		
	
    4.   Click	Search.	
	
    5.   Select	the	messages	to	manage.	
	
    6.   Click	one	of	the	following	buttons	to	manage	selected	messages:	
	
              •        	Delete:	Cancel	delivery	and	permanently	delete	the	message	
	
              •        	Deliver	(Not	Spam):	Release	from	quarantine	
          	       Note:	
                  Released	messages	are	no	longer	marked	as	spam,	but	they	will	continue	to	be	processed	by	Hosted	
                  Email	Security.	The	following	conditions	apply	to	delivery:	
                  	
                      • If	a	message	triggers	a	content-based	policy	rule	with	an	Intercept	action	of	Quarantine,	it	
                          will	once	again	appear	in	the	quarantined	message	list.	
                  	
                      • If	a	message	triggers	a	content-based	policy	rule	with	an	Intercept	action	of	Delete	entire	
                          message	or	Change	recipient,	it	will	not	arrive	at	its	intended	destination.	
         5.6.2     About	the	Quarantine	Digest	
The	Quarantine	Digest	lists	up	to	100	of	each	end	user's	quarantined	email	messages,	and	provides	a	link	for	that	
account	 holder	 to	 access	 quarantined	 messages	 through	 the	 End	 User	 Quarantine	 website	 at	 the	 following	 web	
address	for	your	region:	
	
     • For	Europe,	the	Middle	East,	Africa:	https://euq.hes.trendmicro.eu	
	
     • For	all	other	regions:	https://euq.hes.trendmicro.com	
	
Use	 the	 Digest	 Settings	 screen	 to	 configure	 the	 schedule	 and	 format	 for	 the	 Quarantine	 Digest.	 If	 the	 digest	 is	
enabled,	all	domain	recipients	receive	their	own	customized	copy	of	the	digest.	Intended	message	recipients	can	
use	the	End	User	Quarantine	website	to	manage	messages	in	quarantine	themselves.	
	
The	Quarantine	Digest	email	message	features	a	template	with	customizable	plain-text	and	HTML	versions.	Each	
version	of	the	template	can	incorporate	"tokens"	to	customize	output	for	digest	recipients.	
	
If	the	Quarantine	Digest	Inline	Action	check	box	on	the	Digest	Settings	screen	is	selected,	recipients	can	directly	
manage	 their	 quarantine	 from	 the	 digest	 email	 message.	 By	 enabling	 this	 function,	 you	 can	 relieve	 users	 of	 the	
necessity	 of	 logging	 on	 to	 the	 End	 User	 Quarantine	 website	 and	 manually	 approving	 quarantined	 messages	 or	
senders.	
	
            Warning:	
        	 Anyone	receiving	this	Quarantine	Digest	email	message	will	be	able	to	add	any	of	these	senders	to	the	
            account	 holder's	 approved	 senders	 list.	 Therefore,	 administrators	 must	 warn	 digest	 recipients	 not	 to	
            forward	the	Quarantine	Digest	email	message.	The	Quarantine	Digest	for	managed	accounts	is	sent	to	
            the	 primary	 account.	 For	 more	 information	 about	 managed	 accounts,	 see	 About	 End-User	 Managed	
            Accounts.	
            	
            The	 Quarantine	 Digest	 Inline	 Action	 feature	 supports	 only	 client	 computers	 running	 Microsoft	
            Windows	XP	Service	Pack	3	or	later	and	using	only	one	of	the	following	email	clients:	
            	
                 • Microsoft	Outlook	2003	Service	Pack	3	or	later	
            	
                 • Microsoft	Outlook	Express	6.0	or	later	
	
	                                       	
                   5.6.2.1           Configuring	the	Quarantine	Digest	
    	        Tip:	
    	        The	 toggle	 button	 shows	 the	 current	 enabled	         	or	 disabled	     	state	 of	 the	 setting.	 Click	 the	
             button	to	switch	the	state	of	the	setting.	
	
        3.     Select	a	specific	domain	from	the	Managed	domain	drop-down	list.		
        4.     In	the	Frequency	drop-down	list,	select	the	frequency	with	which	to	send	the	digest:	
	
                   •        Daily:	Specify	to	send	the	digest	a	maximum	of	three	times	daily.	
                       	     Tip:	
                       	     The	 Quarantine	 Digest	 email	 message	 features	 a	 template	 with	 customizable	 plain-text	
                             and	HTML	versions.	Each	version	of	the	template	can	incorporate	"tokens"	to	customize	
                             output	for	digest	recipients.	
                             Right-click	any	of	the	following	fields	to	display	a	list	of	available	and	selectable	tokens	for	
                             the	field.	
                            	
                   •        Weekly:	Specify	the	days	of	the	week	and	time	of	day	to	send	the	digest.	
                                Warning:	
                              	 Hosted	Email	Security	automatically	deletes	messages	from	the	quarantine	after	30	days.	
                       	
        5.     Under	Digest	Mail	Template	for	<managed_domain>,	configure	the	following	settings:	
    	        Tip:	
    	        Use	the	add	 	and	the	remove	 	buttons	to	manage	additional	entries.	
               	
	
                   •        From:	Specify	the	email	address	that	the	digest	displays	in	the	From	field.	
%DIGEST_RCPT%                                       Digest	recipient's	email	address	appears	in	the	From	field	of	the	received	
                                                    digest	email	message	
	
	                                             	
          •      Subject:	Specify	the	subject	line	for	the	digest.	
%DIGEST_BODY_HTML%	                         Digest	summary	in	HTML	table	format	appears	in	HTML	body	of	message	
%DIGEST_PAGE_COUNT%	                        Total	 number	 of	 quarantined	 messages	 in	 listed	 digest	 summary	 (up	 to	
                                            100	maximum)	appears	in	HTML	body	of	digest	email	message	
%EUQ_HOST_SERVER%	                          Address	of	Hosted	Email	Security	End	User	Quarantine	website	appears	in	
                                            HTML	body	of	digest	email	message	
	
	
                        § Plain	 text	 content:	 Specify	 the	 plain	 text	 content	 of	 the	 digest	 if	 the	 email	 client	 only	
                          accepts	plain	text	messages.	
%DIGEST_PAGE_COUNT%	                        Total	number	of	quarantined	messages	listed	in	the	digest	summary	(up	
                                            to	100	maximum)	appears	in	plain	text	body	of	digest	email	message	
%EUQ_HOST_SERVER%	                          Address	of	Hosted	Email	Security	End	User	Quarantine	website	appears	in	
                                            HTML	body	of	digest	email	message	
	
	                                   	
     5.7              Understanding	Mail	Tracking	
         	     Note:	
               Content-based	filtering	is	not	included	in	this	category.	
               	
               The	 display	 of	 Blocked	 Traffic	 has	 different	 meanings	 for	 incoming	 and	 outgoing	 traffic.	 Incoming	
               traffic	 is	 filtered	 by	 Trend	 Micro	 Email	 Reputation	 Services	 and	 by	 Hosted	 Email	 Security	 incoming	
               security	filtering;	outgoing	traffic	is	not.	If	messages	are	blocked	in	outgoing	traffic,	the	reason	for	
               blocking	 is	 unrelated	 to	 email	 reputation	 but	 may	 be	 related	 to	 Hosted	 Email	 Security	 relay	 mail	
               service	filtering.	
             	
     •       Accepted	Traffic:	Messages	that	were	allowed	in	by	Hosted	Email	Security	for	further	processing.	
	
     •       Unresolved	Traffic:	Messages	that	cannot	be	uniquely	identified	by	their	Sender	Message	ID	because	the	
             ID	is	null.	
	
The	 most	 efficient	 way	 to	 track	 messages	 is	 to	 provide	 both	 sender	 and	 recipient	 email	 addresses	 within	 a	 time	
range	that	you	want	to	search.	
	
For	an	email	message	that	has	multiple	recipients,	the	result	will	be	organized	as	one	recipient	per	entry.	
	
If	the	message	you	are	tracking	cannot	be	located	using	this	strategy,	consider	the	following:	
	
     • Expand	the	result	set	by	omitting	the	recipient.	
	
     • If	 the	 sender	 is	 actually	 blocked	 by	 IP	 reputation-based	 filtering,	 the	 Blocked	 Traffic	 results	 that	 do	 not	
         match	 the	 intended	 recipient	 might	 indicate	 this.	 Provide	 only	 the	 sender	 and	 time	 range	 for	 a	 larger	
         result	set.	
     • Look	for	other	intended	recipients	of	the	same	message.	
	
     • If	 the	 sender	 IP	 address	 has	 a	 "bad"	 reputation,	 mail	 tracking	 information	 will	 only	 be	 kept	 for	 the	 first	
         recipient	 in	 a	 list	 of	 recipients.	 Therefore,	 the	 remaining	 message	 recipient	 addresses	 will	 not	 be	 listed	
         when	querying	this	sender.	
	
     • Expand	the	result	set	by	omitting	the	sender.	
	
     If	 the	 sender	 IP	 address	 has	 a	 "bad"	 reputation,	 omit	 the	 sender	 and	 provide	 only	 the	 recipient.	 If	 only	 the	
     recipient	email	address	is	provided,	all	the	messages	that	pertain	to	the	recipient	will	be	listed.	
This	tab	displays	a	summary	of	matched	sender	MTA	IPs	that	were	either	permanently	or	temporarily	blocked	by	
Trend	 Micro	 Email	 Reputation	 Services	 and	 Hosted	 Email	 Security	 incoming	 security	 filtering	 (for	 incoming	
messages)	or	by	Hosted	Email	Security	relay	mail	service	filtering	(for	outgoing	messages).	
	
When	data	is	available	in	the	Blocked	Traffic	tab,	it	will	be	displayed	by	default.	Also,	an	email	message	may	be	
permanently	 rejected	 by	 Hosted	 Email	 Security	 due	 to	 its	 exceedingly	 large	 size,	 for	 example,	 if	 the	 size	 of	 a	
message	exceeds	50	MB.	
	
The	following	Blocked	Traffic	information	is	displayed:	
	
     • Timestamp:	 The	 time	 the	 message	 attempt	 was	 blocked.	 Click	 on	 the	 Timestamp	 value	 to	 view	 Mail	
         Tracking	Details	for	a	given	message.	
	
     • Sender:	 The	 sender	 email	 address	 on	 the	 message	 envelope,	 in	 other	 words,	 the	 sender	 address	 in	 the	
         SMTP	MAIL	command.	
	
     • Recipient:	The	first	recipient	email	address	on	the	message	envelope,	in	other	words,	the	recipient	in	the	
         first	SMTP	RCPT	command.	
	
     • Blocked:	
	
               § For	 incoming	 messages:	 The	 sender	 IP	 address	 was	 blocked	 by	 Email	 Reputation	 Services	 or	
                  Hosted	Email	Security	content-based	filtering	at	the	message	level.	
	
                  Blocked	status	is	either	Temporary	or	Permanent.	
	
                  If	 the	 message	 has	 an	 exceedingly	 large	 size,	 the	 status	 will	 display	 Size	 limit.	 In	 this	 case,	 the	
                  message	 is	 rejected	 and	 blocked	 permanently	 by	 Hosted	 Email	 Security	 content-based	 filtering	
                  due	to	its	size.	Hosted	Email	Security	will	respond	to	the	sending	MTA	with	a	552	error	(a	failure	
                  of	the	requested	connection	because	the	message	exceeded	storage	allocation).	
	
               § For	 outgoing	 messages:	 The	 message	 was	 blocked	 by	 Hosted	 Email	 Security	 relay	 mail	 service	
                  filtering.	 Outgoing	 messages	 are	 not	 filtered	 by	 Email	 Reputation	 Services	 (ERS).	 Outgoing	
                  messages	can	be	blocked	for	the	following	reasons:	
	
                           o The	recipient	address	is	not	resolvable,	for	example	someone@???.com.	
	
                           o Spammers	forged	the	message	sender	to	be	in	the	customer	domain.	
	
                           o Your	 MTA	 is	 compromised,	 for	 example	 it	 is	 an	 open	 relay,	 and	 it	 is	 sending	 spam	
                             messages.	
	
     • Sender	IP:	The	IP	address	of	the	upstream	MTA	that	delivered	this	message	to	Hosted	Email	Security.	
	                                     	
         5.7.2     About	the	Accepted	Traffic	Tab	
This	tab	displays	a	summary	of	matching	messages	that	were	accepted	by	Trend	Micro	Hosted	Email	Security.	
	
When	you	click	on	the	Accepted	Traffic	tab,	you	will	see	a	summary	of	the	matching	email	message	traffic	that	was	
accepted	 by	 Trend	 Micro	 Hosted	 Email	 Security.	 Once	 a	 message	 is	 accepted,	 it	 goes	 through	 various	 stages	 of	
processing	by	Hosted	Email	Security.	
	
See	Content-Based	Filtering	at	the	Message	Level.	
	
This	result	summary	is	organized	with	recipient	in	mind,	since	mail	tracking	is	mostly	initiated	by	an	end	user.	For	a	
message	that	has	multiple	recipients,	the	result	will	be	organized	as	one	recipient	per	entry.	
	
The	following	information	is	displayed	for	Accepted	Traffic:	
	
     • Timestamp:	The	time	the	message	was	accepted	by	Hosted	Email	Security.	Click	on	the	Timestamp	value	
         to	open	the	Mail	Tracking	Details	window	for	a	given	message.	
	
     • Sender:	 The	 sender	 email	 address	 on	 the	 message	 envelope,	 in	 other	 words,	 the	 sender	 address	 in	 the	
         SMTP	MAIL	command.	
	
     • Recipient:	The	first	recipient	email	address	on	the	message	envelope,	in	other	words,	the	recipient	in	the	
         first	SMTP	RCPT	command.	
	
     • Action:	The	last	action	taken	on	the	message.	For	all	the	actions,	see	Actions	below.	
	
               § Delivered:	 The	 message	 has	 been	 delivered	 to	 the	 downstream	 MTA	 that	 is	 responsible	 for	
                   transporting	the	message	to	its	destination.	
	
               § Bounced:	 The	 message	 has	 been	 rejected	 by	 the	 downstream	 MTA.	 Hosted	 Email	 Security	 will	
                   attempt	to	notify	the	sender	about	the	event.	
	
               § Deleted:	 The	 message	 has	 been	 deleted	 by	 Hosted	 Email	 Security	 according	 to	 the	 policy	
                   established	by	the	authorized	mail	administrator	of	this	mail	domain.	
	
               § Redirected:	 The	 message	 has	 been	 redirected	 to	 a	 different	 recipient	 according	 to	 the	 Hosted	
                   Email	Security	policy	established	by	the	authorized	mail	administrator	of	this	mail	domain.	
	
               § Expired:	Hosted	Email	Security	attempted	delivery	repeatedly	over	several	days	without	success	
                   and	decided	that	the	message	is	undeliverable.	Hosted	Email	Security	will	attempt	to	notify	the	
                   sender	about	the	event.	
	
               § Queued	 for	 delivery:	 The	 message	 is	 ready	 to	 be	 delivered	 to	 the	 downstream	 MTA	 that	 is	
                   responsible	 for	 transporting	 the	 message	 to	 its	 destination.	 This	 is	 a	 transient	 state	 of	 this	
                   message;	it	should	not	remain	in	this	state	for	an	extended	period	of	time.	
	
               § Temporary	delivery	error:	The	message	should	be	ready	to	be	delivered	to	the	downstream	MTA	
                   that	 is	 responsible	 for	 transporting	 the	 message	 to	 its	 destination.	 However,	 something	 is	
                   preventing	 the	 message	 from	 posting.	 This	 is	 a	 transient	 state	 of	 this	 message;	 it	 should	 not	
                   remain	in	this	state	for	an	extended	period	of	time.	
	
            §    Quarantined:	 Quarantined	 messages	 are	 blocked	 as	 detected	 spam	 or	 other	 inappropriate	
                 content	before	delivery	to	an	email	account.	Messages	held	in	quarantine	can	be	reviewed	and	
                 manually	deleted	or	delivered.	
	
            §    Encryption	 in	 progress:	 The	 message	 is	 being	 encrypted	 by	 Hosted	 Email	 Security.	 After	
                 encryption	is	complete,	Hosted	Email	Security	will	queue	the	message	for	delivery.	
	
            §    Others:	All	not	listed	above.	
	
    •   Subject:	The	subject	line	(if	available)	of	the	message.	
	
    •   Sender	IP:	The	IP	address	of	the	upstream	MTA	that	delivered	this	message	to	Hosted	Email	Security.	
	
    •   Delivered	to:	The	IP	address	of	the	downstream	MTA	that	accepted	delivery	of	this	message.	This	is	only	
        available	when	the	action	is	"Delivered".	
	
    •   Size(KB):	The	size	of	the	message.	This	information	is	not	always	available.	
Hosted	 Email	 Security	 provides	 detailed	 information	 for	 email	 messages	 detected	 as	 possible	 social	 engineering	
attacks.	To	view	social	engineering	attack	details,	click	the	Details	link	beside	Social	engineering	attack	on	the	Mail	
Tracking	Details	screen.	
The following table lists the possible reasons for social engineering attack detections.
Mail	routing	path	contains	mail	         The	mail	routing	path	contains	mail	server	with	bad	reputation	
server	with	bad	reputation	              (<IP_address>).	
                                         Significant	time	gap	(<duration>)	detected	during	email	message	transit	
Significant	time	gap	during	email	
                                         between	hops	(<source>	&	<destination>)	from	time	(<date_time>)	to	time	
message	transit	
                                         (<date_time>).	
                                      relay/forward.	
Email	message	travels	across	
                                      The	email	message	travels	across	time	zones	(<time_zone_list>).	
multiple	time	zones	
Possible	social	engineering	attack	   Suspicious	charsets	(<character_set_list>)	are	identified	in	a	single	email	
characterized	by	suspicious	charsets	 message,	implying	the	email	message	originated	from	a	foreign	region.	This	
in	email	entities	                    behavior	is	an	indicator	of	a	social	engineering	attack.	
                                      Multiple	time	headers	(<date_time>,	<date_time>)	exist	in	one	message,	
Violation	of	time	headers	
                                      which	violates	RFC5322	section	3.6.	
                                      The	email	message	claimed	from	Yahoo	(<email_address>)	lost	required	
Possibly	forged	sender	(Yahoo)	
                                      headers.	
Executable	files	with	tampered	       Executable	files	in	compressed	attachment	(<file_name>)	intend	to	disguise	
extension	names	in	the	attachment	    as	ordinary	files	with	tampered	extension	names.	
Anomalous	relationship	between	
                                      Anomalous	relationship	between	sender/recipient(s)	related	email	headers	
sender/recipient(s)	related	email	
                                      (<email_address>).	
headers	
Encrypted	attachment	intends	to	      Encrypted	attachment	(<file_name>)	with	password	(<password>)	provided	
bypass	antivirus	scan	engines	        in	email	content	possibly	intends	to	bypass	antivirus	scan	engines.	
Few	meaningful	words	in	the	email	    The	email	message	is	less	meaningful	with	only	few	characters	in	its	
message	                              text/HTML	body	(<character_count>).	
                                      The	email	message	was	claimed	as	a	forwarded	or	replied	message	with	
Possible	email	spoofing	              subject-tagging	(<email_subject>),	but	the	email	message	does	not	contain	
                                      corresponding	email	headers	(RFC	5322).	
Email	message	travels	across	
                                      The	email	message	travels	across	multiple	ASNs	(<ASN_list>).	
multiple	ASNs	
Email	message	travels	across	
                                      The	email	message	travels	across	multiple	countries	(<country_code_list>).	
multiple	countries	
This	screen	enables	you	to	track	the	email	messages	that	trigger	the	advanced	threat	policy.	
	
Trend	Micro	Hosted	Email	Security	maintains	up	to	30	days'	logs	for	policy	events.	
	
Queries	include	data	for	one	day	only.	Use	more	than	one	query	to	search	across	calendar	months.	
The	Policy	Event	Query	screen	provides	the	following	search	criteria:	
	
     • Type	
	
     • Advanced	persistent	threat:	Query	the	messages	that	triggered	the	advance	threat	policy	
	
                § All:	query	all	messages	
	
                § Analyzed	 Advanced	 Threats:	 Query	 the	 messages	 that	 are	 identified	 as	 threats	 according	 to	
                     advanced	analysis	and	the	policy	configuration	
	
                § Probable	 Advanced	 Threats:	 Query	 the	 messages	 that	 are	 treated	 as	 suspicious	 according	 to	
                     policy	configuration	or	the	messages	that	are	not	sent	for	advanced	analysis	due	to	exceptions	
                     that	occurred	during	the	analysis.	
	
     • Dates:	The	time	range	for	your	query.	
	
     • Direction:	The	direction	of	messages.	
	
     • Recipient:	The	recipient	email	address.	
	
     • Sender:	The	sender	email	address.	
	
     • Subject:	The	message	subject.	
	
     • Message	ID:	The	sender	message	ID.	
	
When	 you	 query	 the	 email	 policy	 event,	 Hosted	 Email	 Security	 provides	 a	 list	 of	 all	 messages	 that	 satisfy	 the	
criteria.	
	
You	can	click	Search	at	any	time	to	execute	the	query	again.	Use	the	various	criteria	fields	to	restrict	your	searches.	
	
The	 most	 efficient	 way	 to	 track	 policy	 events	 is	 to	 provide	 both	 sender	 and	 recipient	 email	 addresses,	 message	
subject	and	message	ID	within	a	time	range	that	you	want	to	search.	Recipient	and	Sender	cannot	use	the	wild-
card	character	at	the	same	time.	
	
The	following	policy	event	information	is	displayed:	
	
     • Timestamp:	The	time	the	policy	event	occurred.	Click	on	the	Timestamp	value	to	view	the	event	details	
           for	a	given	message.	
	
     • Sender:	The	sender	of	the	message.	
	
     • Recipient:	The	recipient	of	the	message.	
	
    •       Message	Size:	The	size	of	the	message.	This	information	is	not	always	available.	
	
    •       Rule	Name:	The	name	of	the	triggered	policy	rule	that	is	used	to	analyze	the	message.	
	
    •       Trigger	Reason:	The	reason	for	the	policy	rule	to	trigger.	
	
    •       Risk	Rating:	The	risk	rating	of	the	message	identified	after	advanced	analysis.	
	
    •       Action:	The	action	taken	on	the	message.	For	all	the	actions,	see	Actions	below.	
	
                 §    BCC:	 A	 blind	 carbon	 copy	 (BCC)	 was	 sent	 to	 the	 authorized	 recipients	 according	 to	 the	 Hosted	
                      Email	Security	policy.	
	
                 §    Bypass:	The	message	has	been	ignored	and	was	not	intercepted	by	Hosted	Email	Security.	
	
                 §    Changed	 recipient:	 The	 recipient	 has	 been	 changed	 and	 the	 message	 has	 been	 redirected	 to	 a	
                      different	 recipient	 according	 to	 the	 Hosted	 Email	 Security	 policy	 established	 by	 the	 authorized	
                      mail	administrator	of	this	mail	domain.	
	
                 §    Clean:	The	message	was	cleaned	for	viruses	by	Hosted	Email	Security.	
	
                 §    DeleteAttachment:	 The	 attachment	 in	 the	 email	 message	 has	 been	 deleted	 by	 Hosted	 Email	
                      Security.	
	
                 §    Deliver:	 The	 message	 has	 been	 delivered	 to	 the	 downstream	 MTA	 that	 is	 responsible	 for	
                      transporting	the	message	to	its	destination.	
	
                 §    InsertStamp:	A	block	of	text	was	inserted	into	the	email	message	body.	
	
                 §    Message	 deleted:	 The	 message	 has	 been	 deleted	 by	 Hosted	 Email	 Security	 according	 to	 the	
                      policy	established	by	the	authorized	mail	administrator	of	this	mail	domain.	
	
                 §    Notification:	A	notification	was	sent	to	the	recipient	when	the	policy	rule	was	triggered.	
	
                 §    Quarantined:	 Quarantined	 messages	 are	 blocked	 as	 detected	 spam	 or	 other	 inappropriate	
                      content	before	delivery	to	an	email	account.	Messages	held	in	quarantine	can	be	reviewed	and	
                      manually	deleted	or	delivered.	
	
                 §    TagSubject:	Inserted	a	text	defined	in	policy	rules	into	the	message	subject	line.	
	
                 §    Encryption	 in	 progress:	 The	 message	 is	 being	 encrypted	 by	 Hosted	 Email	 Security.	 After	
                      encryption	is	complete,	Hosted	Email	Security	will	queue	the	message	for	delivery.	
	
    •       Scanned	 File	 Report	 (s):	 The	 report	 for	 the	 attached	 files	 in	 the	 message.	 If	 the	 file	 is	 analyzed	 for	
            advanced	threats,	the	risk	level	for	the	file	is	displayed	here.	If	the	report	exists,	click	View	report	to	see	
            the	detailed	report.	
        	     Note:	
              If	 a	 file	 is	 detected	 as	 high-risk,	 Hosted	 Email	 Security	 will	 not	 send	 the	 file	 for	 advanced	 analysis,	
              and	therefore,	a	detailed	report	will	not	be	available	for	such	file.	Reports	could	also	be	unavailable	
              if	an	error	occurs	in	generating	the	report.	
              	
             If	 an	 email	 message	 contains	 multiple	 recipients,	 the	 result	 will	 be	 organized	 for	 each	 recipient	
             separately.	
After	clicking	Assume	Control	beside	an	account	in	the	list,	you	will	assume	control	of	that	account.	For	example,	
you	will	see	and	be	able	to	change	their	Approved	Senders	and	Blocked	Senders	lists,	their	Mail	Tracking	logs,	and	
their	managed	domains	on	the	Domain	Management	screens.	You	will	also	see	the	accounts	they	can	control	from	
their	Account	Management	screen.	
To stop acting on behalf of an account, click Release in the title bar area.
	                                       	
             5.9.1.2       Adding	and	Configuring	an	Administrator	Account	
     	     Note:	
           If	the	account	owner	does	not	receive	the	notification	message	or	deletes	the	notification	message	
           by	mistake,	you	can	resent	the	notification	by	clicking	Send	under	the	Send	Email	column	on	Account	
           Management	screen.	
           	
           The	Send	button	will	be	disabled	after	the	account	owner	logs	in	successfully.	
                   	    Note:	
                        The	user	Account	Name	cannot	be	modified.	
             •    Select	 Permission	 Types:	 select	 predefined	 permissions	 from	 the	 Predefined	 Permission	 Types	
                  list,	or	configure	permissions	for	each	of	the	feature	manually.	
              • Select	Domains:	select	domains	that	the	account	can	manage.	
                  	
    4.   Click	OK.	
	                                   	
                    5.9.1.4       Deleting	Administrator	Accounts	
         	       Note:	
                 If	 you	 have	 a	 Business	 account	 on	 the	 Customer	 License	 Portal	 (CLP),	 sign	 in	 to	 your	 Customer	
                 License	Portal	account	and	follow	the	instructions	provided	there.	
                 	
                 Trend	Micro	recommends	changing	your	password	regularly.	
                 	
                 You	cannot	change	the	password	for	a	disabled	account.	
    	        Important:	
             Passwords	 must	 contain	 8	 to	 32	 alphanumeric	 characters.	 Trend	 Micro	 recommends	 using	 a	 long	
             password.	Strong	passwords	contain	a	mix	of	letters,	numbers,	and	special	characters.	
	
         5.9.3     About	End-User	Managed	Accounts	
End-users	 can	 manage	 multiple	 Hosted	 Email	 Security	 End	 User	 Quarantine	 website	 accounts	 by	 using	 a	 single	
account	to	log	on.	After	an	end-user	begins	managing	an	account,	they	can	view	the	quarantined	messages	and	set	
the	Approved	Senders	associated	with	that	account.	
	
End-users	 log	 on	 with	 their	 primary	 account,	 and	 then	 specify	 one	 of	 their	 managed	 accounts	 or	 All	 managed	
accounts	 at	 the	 top	 of	 the	 screen	 to	 view	 Quarantined	 messages	 and	 set	 Approved	 Senders	 for	 the	 specified	
account	or	accounts.	
	
Figure1.	Example	of	the	End-User	Managed	Account	Selection	Control	
                                                                                                                              	
After	 an	 end-user	 begins	 managing	 an	 account,	 that	 managed	 account	 will	 be	 unable	 to	 log	 on	 to	 the	 End	 User	
Quarantine	 website.	 The	 managed	 account	 will	 be	 able	 to	 log	 on	 again	 only	 if	 the	 account	 management	
relationship	 is	 removed.	 To	 allow	 the	 account	 to	 log	 on	 again,	 the	 primary	 account	 can	 remove	 the	 managed	
account	from	the	Managed	Accounts	screen	of	the	End	User	Quarantine	website.	
	
Adding	a	managed	account	does	not	change	the	credentials	for	that	account.	
	
The	Hosted	Email	Security	administrator	console	allows	you	to	enable	or	disable	(enabled	by	default)	the	ability	of	
users	to	add	managed	accounts.	Disabling	the	feature	does	not	change	the	account	management	relationship	of	
accounts	that	end-users	have	already	added.	
	
  	     Tip:	
  	     The	 toggle	 button	 shows	 the	 current	 enabled	         or	 disabled	     state	 of	 the	 setting.	 Click	 the	
        button	to	switch	the	state	of	the	setting.	
	
End-users	 can	 always	 remove	 accounts	 from	 their	 list	 of	 managed	 accounts.	 However,	 end-users	 can	 only	 add	
management	of	accounts	under	the	following	conditions:	
	
     • The	Hosted	Email	Security	administrator	has	enabled	the	feature.	
	
     • The	account	is	a	registered	End	User	Quarantine	website	account.	
	
     • The	account	is	not	currently	a	managed	account	of	another	End	User	Quarantine	website	account.	
	
     • The	end-user	is	able	to	open	the	confirmation	email	message	sent	to	the	account	address.	
	
     • The	end-user	has	the	End	User	Quarantine	website	password	for	the	account.	
	                                     	
             5.9.3.1       Removing	End-User	Managed	Accounts	
	
The	 primary	 account	 can	 remove	 the	 managed	 account	 from	 the	 Managed	 Accounts	 screen	 of	 the	 End	 User	
Quarantine	website.	
	
To	 remove	 an	 account	 management	 relationship	 using	 the	 Hosted	 Email	 Security	 administrator	 console,	 use	 the	
following	procedure.	
	
     1. Go	to	the	End-User	Managed	Accounts	screen.	
	
     2. Select	the	primary	account	and	managed	account	pair	or	pairs	in	the	list.	
	
     3. Click	Remove.	
You	 can	 import	 LDAP	 Data	 Interchange	 Format	 (LDIF)	 or	 comma-separated	 values	 (CSV)	 files	 into	 Hosted	 Email	
Security.	 This	 helps	 Hosted	 Email	 Security	 to	 better	 filter	 and	 process	 messages	 for	 valid	 email	 addresses.	
Messages	to	invalid	email	addresses	will	be	rejected.	
	
Hosted	Email	Security	uses	user	directories	to	help	prevent	backscatter	(or	outscatter)	spam	and	Directory	Harvest	
Attacks	(DHA).	Importing	user	directories	lets	Hosted	Email	Security	know	legitimate	email	addresses	and	domains	
in	your	organization.	
	
Hosted	 Email	 Security	 also	 provides	 a	 Synchronization	 Tool	 that	 enables	 you	 to	 synchronize	 your	 current	 groups	
and	email	accounts	on	the	ActiveDirectory	server	with	the	Hosted	Email	Security	server.	
	
The	Directory	Management	screen	includes	the	following	tabs:	
	
     • Directory	Import	
	
              § Import	User	Directory:	Selections	for	importing	a	new	user	directory	file	
	
              § Imported	User	Directories:	The	current	user	directory	file(s)	that	Hosted	Email	Security	is	using	
	
     • Directory	Synchronize	
	
              § Synchronization	Summary:	Displays	the	number	of	valid	recipients	and	groups	synchronized	using	
                   the	synchronization	tool.	
	
              § Synchronization	History:	Displays	the	last	seven	(7)	days'	synchronization	history.	
	                                     	
                    5.9.4.1        				Importing	User	Directories	
You	 can	 import	 LDAP	 Data	 Interchange	 Format	 (LDIF)	 or	 comma-separated	 values	 (CSV)	 files	 into	 Hosted	 Email	
Security.	 This	 helps	 Hosted	 Email	 Security	 to	 better	 filter	 and	 process	 messages	 for	 valid	 email	 addresses.	
Messages	to	invalid	email	addresses	will	be	rejected.	
    	        Important:	
             Before	you	import	an	LDIF	or	CSV	directory	file,	note	the	following:	
             	
                 • Hosted	Email	Security	only	recognizes	ANSI-encoded	LDIF	(with	the	extension	.ldf)	and	ANSI	
                      or	 UTF-8-encoded	 CSV	 (with	 the	 extension	 .csv)	 files.	 Do	 not	 include	 blank	 lines	 or	 other	
                      irrelevant	data	in	the	file	that	you	import.	Use	caution	when	creating	a	file.	
             	
                 • When	 importing	 user	 directory	 files,	 Hosted	 Email	 Security	 replaces	 all	 records	 for	 a	
                      managed	domain	at	once.	If	any	email	addresses	for	a	managed	domain	are	imported,	all	
                      other	 email	 addresses	 for	 that	 domain	 are	 removed.	 Newly	 imported	 email	 addresses	 for	
                      that	 domain,	 and	 records	 for	 other	 managed	 domains,	 will	 be	 kept.	 If	 you	 import	 an	
                      updated	user	directory	file	that	does	not	have	any	information	for	one	of	your	domains,	the	
                      entries	for	those	domains	remain	the	same	and	are	not	overwritten.	
             	
                 • Every	 time	 you	 import	 a	 directory	 file,	 it	 overwrites	 the	 old	 version.	 If	 you	 import	 an	
                      updated	 directory	 file	 that	 has	 information	 for	 one	 of	 your	 domains,	 all	 entries	 for	 those	
                      domains	are	overwritten.	Use	caution	when	importing	a	directory.	
             	
                 • You	can	only	see	the	directories	that	are	associated	with	your	administrator	account.	If	you	
                      are	sharing	your	Hosted	Email	Security	service	with	another	administrator	(for	example,	a	
                      value-added	reseller)	who	logs	on	with	his/her	specific	account	information,	Hosted	Email	
                      Security	will	not	show	the	directories	for	that	account.	
             	
                 • Every	 time	 you	 add	 more	 users	 to	 your	 network,	 you	 must	 import	 your	 updated	 user	
                      directories;	otherwise,	Hosted	Email	Security	will	reject	email	from	newly	added	users.	
	
               Warning:	
             	 Trend	Micro	strongly	suggests	that	you	do	not	import	more	than	24	directories	in	a	day.	Doing	so	
               could	overwhelm	system	resources.	
	
        1.     Next	to	Format,	select	the	format	type:	
	
                    •    LDIF	
	
                    •    CSV	
	                                            	
         	    Important:	
              If	 you	 create	 a	 CSV	 file,	 divide	 the	 records	 into	 fields	 for	 email_address	 and	 Firstname	
              Lastname	and	separate	them	using	a	comma	and	optional	quotation	marks.	Use	of	spaces	
              or	other	delimiters	is	not	supported.	Use	one	record	per	line.	
              	
              For	example:	
              	
                                                                Valid	
                bob@example.com,Bob	Smith	
                sally@example.com,Sally	Jones	
                "bob@example.com","Bob	Smith"	
                "sally@example.com","Sally	Jones"	
              	
                                                              Not	Valid	
                bob@example.com,Bob	Smith,sally@example.com,Sally	Jones	
              	
              Microsoft	Excel	will	save	a	two	column	chart	as	a	CSV	using	valid	formatting.	
             	
    2.   Next	to	Name,	type	a	descriptive	name	for	the	file.	
	
    3.   Next	to	File	location,	type	the	file	directory	path	and	filename	or	click	Choose	File	and	select	the	.ldf	or	
         .csv	file	on	your	computer.	
	
    4.   Click	Verify	File	to	read	the	file	and	show	a	summary	of	how	many	email	addresses	were	found.	
         After	the	progress	bar	completes,	a	summary	screen	appears	showing	the	following:	
	
               •    Summary:	A	summary	of	the	information	above	
	
               •    Domains	and	Number	of	Current	Users	to	Replace	Current	Users:	The	domains	that	you	specified	
                    when	you	subscribed	to	the	Hosted	Email	Security	service	
	
               •    Invalid	 domains:	 Any	 domains	 that	 are	 included	 in	 your	 directory	 file,	 but	 are	 not	 officially	
                    registered	with	your	Hosted	Email	Security	service	
	
    5.   Click	Import.	
         This	will	import	and	then	enable	the	email	address	list.	
     	       Note:	
             You	 can	 verify	 which	 email	 addresses	 were	 found	 by	 selecting	 your	 domain	 name	 and	 clicking	 the	
             Export	to	CSV	button.	
             	
             If	you	need	to	disable	the	feature,	you	can	click	the	toggle.	
             	
             The	 toggle	 button	 shows	 the	 current	 enabled	       or	 disabled	       state	 of	 the	 setting.	 Click	 the	
             button	to	switch	the	state	of	the	setting.	
         	
	                                       	
                       5.9.4.2       				Synchronizing	User	Directory	
        •        The	 Directory	 Synchronize	 tab	 displays	 synchronization	 summary	 and	 history.	 The	 screen	 is	 divided	 into	
                 two	sections:	
	
        •        Synchronization	Summary:	This	section	displays	the	number	of	valid	recipients	and	groups	synchronized	
                 using	the	synchronization	tool.	
	
        •        Synchronization	History:	This	section	displays	the	last	seven	(7)	days'	synchronization	history.	It	includes	
                 the	following	information:	
	
                       §   Synchronization	time	
	
                       §   Type:	whether	the	synchronized	data	includes	valid	recipients,	groups	or	both	
	
                       §   the	synchronization	tool	information	including	the	machine's	IP	address	or	hostname	where	the	
                           tool	is	installed	
	
                       §   synchronization	result:	whether	the	synchronization	is	successful	or	unsuccessful,	or	whether	any	
                           groups	or	policies	were	added	or	removed.	
If	 you	 are	 uncertain	 which	 domains	 in	 the	 user	 directories	 are	 going	 to	 be	 active	 for	 your	 service,	 you	 can	
temporarily	disable	the	directories,	import	the	file,	export	the	directories	to	a	CSV	file,	and	view	them	without	the	
directory	being	enabled.	When	you	are	confident	that	the	user	directory	is	correct,	you	can	re-enable	it.	
    	        Note:	
             Hosted	Email	Security	takes	up	to	five	minutes	to	enable	or	disable	the	directories.	
	
Verifying	User	Directories	for	Valid	Recipients	
	
    1. Disable	the	Valid	recipient	check.	
             	       Note:	
                     The	 toggle	 button	 shows	 the	 current	 enabled	    	or	 disabled	     	state	 of	 the	 setting.	 Click	
                     the	button	to	switch	the	state	of	the	setting.	
                 	
    	
        2.       Import	directories	or	synchronize	valid	recipients.	
	
        3.       Select	the	domains	from	the	Valid	recipient	drop-down	list	that	you	want	to	verify.	
	
        4.       Click	Export	to	CSV	for	Valid	recipient.	
	
        5.       Save	the	directory	file.	
	
        6.       Open	the	directory	file	in	an	application	that	reads	CSV	files.	
	
        7.       Verify	that	the	recipient	information	is	correct.	
	
        8.       Re-enable	the	Valid	recipient	check.	
                 	
             	       Note:	
                     The	 toggle	 button	 shows	 the	 current	 enabled	   	or	 disabled	    	state	 of	 the	 setting.	 Click	
                     the	button	to	switch	the	state	of	the	setting.	
			
	
Verifying	User	Directories	for	Directory	Groups	
    	        Note:	
             Perform	this	procedure	after	you	have	synchronized	user	groups	using	Synchronization	Tool.	
	
        1.       Select	the	groups	from	the	Directory	groups	drop-down	list	that	you	want	to	verify.	
	
        2.       Click	Export	to	CSV	for	Directory	groups.	
	
        3.       Save	the	group	file.	
	
        4.       Open	the	group	files	in	an	application	that	reads	CSV	files.	
	
        5.       Verify	that	the	group	information	is	correct.	
Use	the	Administration	>	Domain	Management	screen	to	add,	modify,	or	deactivate	domains.	
	
                                              Table	1.	Activate	a	Domain	Field	Descriptions	
                 Field	                                                    Description	
                                   IP	address	or	FQDN:	Fully	qualified	domain	name	(FQDN)	is	a	unique	name,	which	includes	
                                   both	host	name	and	domain	name,	and	resolves	to	a	single	IP	address.	
                                   	
                                        • For	example:	hostmaster1.example.com	or	mailhost.example.com	
                                   	
                                        • Not	valid:	example.com	
                                   	
                                   Port:	Port	is	a	number	from	0-65535	that	an	inbound	server	listens	on.	These	ports	vary	
Inbound	Server(s)		                based	on	server	configuration.	Well-known	ports	for	email	servers	include	SMTP	at	25,	
                                   SMTPS	at	465,	and	MSA	at	587.	
                                   	
                                   Preference:	Preference,	sometimes	referred	to	as	distance,	is	a	value	from	1	to	100.	
                                   	
                                     	    Note:	
                                          If	more	than	one	mail	server	is	available,	delivery	is	prioritized	to	servers	with	
                                          lower	values.	Using	the	same	value	will	balance	delivery	to	each	server.	
                                   	
                                   If	outbound	filtering	is	enabled,	this	is	the	information	for	the	MTA(s)	that	Hosted	Email	
                                   Security	relays	your	outbound	messages	from.	The	following	choices	are	available:	
Outbound	Server(s)		               	
                                   Use	Office	365:	Relays	your	outbound	messages	from	your	Office	365	solution	
                                   	
                                         Table	1.	Activate	a	Domain	Field	Descriptions	
              Field	                                                     Description	
                              Use	Google	Apps:	Relays	your	outbound	messages	from	your	Google	Apps	solution	
                              	
                              Specify	IP	address(es):	Relays	your	outbound	messages	from	the	specified	IPv4	
                              address(es)	for	your	current	MTA(s)	
                              This	is	the	licensed	seat	count	used	by	this	domain.	Seats	correspond	to	the	number	of	
Seat	count		
                              actual	email	users	in	the	domain.	
                              Optional	email	address	used	to	confirm	email	delivery	from	Hosted	Email	Security.	
Send	test	message	to		
                              Manually	send	test	messages	to	this	address	from	the	Domain	Management	screen.	
Domain	 status	 is	 shown	 in	 the	 Domains	 table	 at	 the	 bottom	 of	 the	 screen.	 Domain	 status	 can	 be	 one	 of	 the	
following:	
                                              Table	2.	Domain	Status	Descriptions	
    Domain	Status	                                                       Description	
Adding	                       Hosted	 Email	 Security	 is	 waiting	 for	 you	 to	 point	 your	 MX	 record	 to	 the	 Hosted	 Email	
                              Security	MTA	for	your	region	
1. Type the information for your current MTAs or mail servers in the following fields:
          	       Note:	
                  You	can	specify	up	to	30	inbound	servers	and	30	outbound	servers.	
                  Use	the	add		 	and	the	remove		 	buttons	to	manage	additional	entries.	
              	
                  •    Domain	name:	Includes	everything	to	the	right	of	the	at	sign	(@)	in	email	addresses	managed	by	
                       the	server(s)	being	activated	
                  •    Seat	count:	Seats	correspond	to	the	number	of	actual	email	users	in	the	domain	
                  •    Inbound	server(s)	
                       	
                              § IP	 address	 or	 FQDN:	 Fully	 qualified	 domain	 name	 (FQDN)	 is	 a	 unique	 name,	 which	
                                includes	both	host	name	and	domain	name,	and	resolves	to	a	single	IP	address.	
                                	
                              § Port:	Port	is	a	number	from	0-65535	that	an	inbound	server	listens	on.	These	ports	vary	
                                based	on	server	configuration.	Well-known	ports	for	email	servers	include	SMTP	at	25,	
                                SMTPS	at	465,	and	MSA	at	587.	
                                	
                              § Preference:	Preference,	sometimes	referred	to	as	distance,	is	a	value	from	1	to	100.	
                                 	     Note:	
                                       If	more	than	one	mail	server	is	available,	delivery	is	prioritized	to	servers	with	lower	
                                       values.	Using	the	same	value	will	balance	delivery	to	each	server.	
                            	
               •    Optionally,	select	Enable	outbound	filtering	and	refer	to	the	following	table:	
                              Warning:	
                            	 Enabling	outbound	filtering	without	specifying	outbound	servers	will	prevent	the	delivery	
                              of	any	outbound	traffic	routed	through	the	service.	
                    	
                     Warning:	
                   	 Do	not	repoint	your	MX	record	until	you	receive	the	message	confirming	that	your	domain	
                     has	been	added.	The	administrative	email	address	on	record	should	receive	the	welcome	
                     message,	 which	 is	 that	 confirmation.	 If	 you	 repoint	 your	 MX	 record	 before	 your	 domain	
                     has	been	successfully	added,	your	email	messages	may	be	lost.	
         	
    3.   If	you	currently	use	Office	365,	you	can	configure	Office	365	connectors	to	allow	email	traffic	to	or	from	
         Hosted	Email	Security	MTAs.	
         	
         See	Adding	Office	365	Inbound	Connectors.	
         	
         See	Adding	Office	365	Outbound	Connectors.	
    1.   Follow	the	steps	to	open	the	Domain	Management	Details	screen	for	your	managed	domain.	
         To	 display	 the	 Domain	 Management	 Details	 screen,	 follow	 the	 step	 to	 edit	 information	 for	 a	 domain	 at	
         Managing	Domains.	
	
    2.   Enable	Outbound	Filtering	for	your	managed	domain.	
         Select	Enable	outbound	filtering	and	refer	to	the	following	table:	
         	
                   Warning:	
                 	 Enabling	outbound	filtering	without	specifying	outbound	servers	will	prevent	the	delivery	
                   of	any	outbound	traffic	routed	through	the	service.	
         	
                                    Table	1.	Steps	to	Configure	Outbound	Filtering	
              Email	Solution	                                                        Steps	
                                                        a. Select	Use	Office	365.	
                                                    	     Tip:	
You	currently	use	Office	365	                       	     If	you	use	Office	365,	configure	Office	365	connectors	to	allow	
                                                          email	traffic	from	Hosted	Email	Security	MTAs.	
                                                          See	Adding	Office	365	Outbound	Connectors.	
                                                	
Hosted	Email	Security	enables	you	to	display	a	service	banner,	such	as	your	company	logo,	on	the	top	banner	of	
the	 Hosted	 Email	 Security	 logon	 screen,	 administrator	 console,	 and	 End	 User	 Quarantine	 website.	 You	 can	 set	
different	domains	with	the	same	or	different	service	banners	or	can	allow	domain	administrators	to	set	the	service	
banner	to	be	displayed	for	their	domain.	You	can	also	leave	the	feature	disabled.	
	
The	following	is	an	example	of	a	customized	service	banner:	
	
                                                                                                                       	
	
The	service	banner	selected	for	a	domain	will	display	in	the	top	banner	of	the	Hosted	Email	Security	logon	screen,	
the	 Hosted	 Email	 Security	 End	 User	 Quarantine	 website,	 and	 the	 administrator	 console	 associated	 with	 that	
domain.	 The	 service	 banner	 selected	 for	 an	 account	 name	 will	 display	 only	 in	 the	 Hosted	 Email	 Security	
administrator	console.	
    	   Note:	
        Co-branding	is	disabled	by	default.	
        	
        The	toggle	button	shows	the	current	enabled	        	or	disabled	       	state	of	the	setting.	Click	the	button	
        to	switch	the	state	of	the	setting.	
	
Resellers	can	set	different	service	banners	for	different	domains	or	allow	system	administrators	of	the	domain	to	
set	the	service	banner	for	that	domain.	
	
Before	 attempting	 to	 establish	 co-branding,	 verify	 that	 your	 service	 banner	 image	 meets	 the	 following	
requirements:	
	
                                         Table	1.	Service	Banner	Specifications	
                               Image	Attributes	                            Specifications	
As	a	reseller,	you	can	supply	your	customers	with	a	web	address	they	can	use	to	access	their	co-branded	Hosted	
Email	Security	administrator	console	and	End	User	Quarantine	website.	
	
  	    Note:	
       If	 an	 end	 user	 accesses	 a	 co-branded	 website	 without	 appending	 the	 account	 name	 or	 domain	 name,	 the	
       website	will	still	use	co-branding	for	all	screens	except	the	logon	screen	
Refer	to	the	access	locations	for	your	region	in	the	table	below:	
	
                                                Table	1.	Access	Locations	
  Console	or	Website	       Steps	for	Europe,	the	Middle	East,	Africa	               Steps	for	All	Other	Regions	
Administrator	 console	     Append	 /co-brand/	 and	 the	 Hosted	            Append	 /co-brand/	 and	 the	 Hosted	
for	 Customer	 Licensing	   Email	 Security	 account	 name	 to	 the	 base	   Email	 Security	 account	 name	 to	 the	 base	
Portal	 (CLP)	 Business	    URL.	                                            URL.	
accounts	                   	                                                	
                            For	example:	                                    For	example:	
                            	                                                	
                                • Hosted	          Email	        Security	       • Hosted	          Email	        Security	
                                     administrator	console:	                          administrator	console:	
                                     https://tm.hes.trendmicro.eu		                   https://tm.hes.trendmicro.com	
                                     	                                       	
                                • Co-branded	administrator	console	              • Co-branded	 administrator	 console	
                                     for	the	account	named	"adminA":	                 for	the	account	named	"adminA":	
                                     https://tm.hes.trendmicro.eu/co-                 https://tm.hes.trendmicro.com/co-
                                     brand/adminA	                                    brand/adminA	
Administrator	 console	 Append	 /co-brand/	 and	 the	 Hosted	                Append	 /co-brand/	 and	 the	 Hosted	
for	 xSP	 and	 local	 Email	 Security	 account	 name	 to	 the	 base	         Email	 Security	 account	 name	 to	 the	 base	
accounts	               URL.	                                                URL.	
                        	                                                    	
                        For	example:	                                        For	example:	
                        	                                                    	
                            • Hosted	         Email	       Security	         Hosted	 Email	 Security	 administrator	
                                administrator	console:	                      console:	
                                https://ui.hes.trendmicro.eu		               https://ui.hes.trendmicro.com		
                        	                                                    	
                            • Co-branded	administrator	console	              Co-branded	 administrator	 console	 for	 the	
                                for	the	account	named	"adminB":	             account	named	"adminB":	
                                https://ui.hes.trendmicro.eu/co-             https://ui.hes.trendmicro.com/co-
                                brand/adminB	                                brand/adminB		
                                                                             	
End	 User	 Quarantine	 Append	 /euq-co-brand/	 and	 the	                     Append	 /euq-co-brand/	 and	 the	
website	               Hosted	Email	Security	managed	domain	to	              Hosted	 Email	 Security	 managed	 domain	 to	
                       the	base	URL.	                                        the	base	URL.	
                       	                                                     	
                       For	example:	                                         For	example:	
                                                          Table	1.	Access	Locations	
            Console	or	Website	        Steps	for	Europe,	the	Middle	East,	Africa	              Steps	for	All	Other	Regions	
	
                                      	                                                	
        	          Note:	             Hosted	 Email	 Security	 End	 User	              Hosted	Email	Security	End	User	Quarantine	
                   This	applies	to	   Quarantine	website:	                             website:	
                   Customer	          https://euq.hes.trendmicro.eu		                  https://euq.hes.trendmicro.com		
                   Licensing	Portal,	 	                                                	
                   xSP,	and	local	    Co-branded	 administrator	 console	 for	 the	    Co-branded	 administrator	 console	 for	 the	
                   accounts.	         managed	domain	"example.com":	                   managed	domain	"example.com":	
                                      https://euq.hes.trendmicro.eu/euq-co-            https://euq.hes.trendmicro.com/euq-co-
                                      brand/example.com		                              brand/example.com	
    	
    Hosted	Email	Security	Web	Services	automate	some	repetitive	tasks.	The	Web	Services	Client	and	Active	Directory	
    Synchronization	Tool	automate	the	import	of	directory	files	of	valid	recipient	email	addresses.	The	Active	Directory	
    Synchronization	 Tool	 also	 enables	 you	 to	 import	 user	 groups.	 The	 Web	 Services	 Client	 and	 Active	 Directory	
    Synchronization	 Tool	 functionally	 is	 similar	 to	 the	 Import	 User	 Directory	 feature	 on	 the	 Directory	 Management	
    screen.	
    	
        1. Go	to	Administration	>	Web	Services.	
    	
        2. If	Current	Key	under	Service	Authentication	Key	is	blank,	click	Generate	New	Key	to	generate	a	key.	
             The	Service	Authentication	Key	is	the	global	unique	identifier	for	your	Web	Service	Client	to	authenticate	
             its	access	to	Hosted	Email	Security	Web	Services.	
    	
      	   Important:	
          Current	Key	displays	the	Service	Authentication	Key	that	the	Web	Services	Client	should	use.	If	you	generate	
          a	new	key,	you	must	update	Web	Services	Client	to	use	the	new	key.	The	Service	Authentication	Key	allows	
          your	 Web	 Services	 Client	 to	 communicate	 with	 Hosted	 Email	 Security	 Web	 Services.	 Keep	 the	 Service	
          Authentication	Key	private.	
             	
        3. Enable	Applications	using	the	button	at	the	right	of	the	screen	(disabled	by	default).	
        	          Tip:	
        	          The	 toggle	 button	 shows	 the	 current	 enabled	     or	 disabled	      state	 of	 the	 setting.	 Click	 the	
                   button	to	switch	the	state	of	the	setting.	
        	
              4.     In	 the	 Downloads	 list,	 click	 download	 	to	 download	 the	 desired	 items.	 Download	 the	 Web	 Services	
                     Guide	for	additional	instructions	on	the	use	and	configuration	of	Hosted	Email	Security	Web	Services.	
    	
                         •    Active	 Directory	 Synchronization	 Tool:	 For	 synchronizing	 accounts	 and	 groups	 between	 local	
                              Active	Directory	and	Hosted	Email	Security	server	
    	
                         •    Active	 Directory	 Synchronization	 Tool	 User	 Guide:	 For	 more	 information	 on	 using	 the	
                              synchronization	tool	
    	
                         •    Web	Services	Client:	For	most	environments	
    	
                    •    Web	Services	Guide:	For	more	information	on	using	the	clients	
	
        5.     Save	the	client	on	a	local	drive.	
	
        6.     Follow	the	client	installation	steps	to	install	the	client.	
Trend	 Micro	 provides	 a	 Service	 Level	 Agreement	 (SLA)	 for	 Hosted	 Email	 Security	 that	 is	 intended	 to	 help	 your	
organization	receive	secure,	uninterrupted	email	service.	
The	 Service	 Level	 Agreement	 covers	 availability,	 latency,	 spam	 blocking,	 false	 positives,	 antivirus,	 and	 support.	
Specific	 service-level	 guarantees	 are	 included	 in	 the	 most	 current	 version	 of	 the	 Hosted	 Email	 Security	 Service	
Level	Agreement,	which	you	can	view	or	download	from	this	screen.	
    	        Important:	
             Provisions	 of	 the	 Service	 Level	 Agreement	 may	 vary	 among	 regions,	 so	 be	 sure	 to	 select	 your	 region	 and	
             language	when	using	this	screen.	Trend	Micro	reserves	the	right	to	modify	the	service	at	any	time	without	
             prior	notice.	The	current	version	of	the	Hosted	Email	Security	service	level	agreement	is	available	for	review	
             by	paid	customers	and	by	customers	conducting	a	trial.	
        1.     Go	 to	 Administration	 >	 Service	 Level	 Agreement.	 The	 Hosted	 Email	 Security	 Service	 Level	 Agreement	
               screen	appears.	
         	        Tip:	
         	        Disable	any	pop-up	blockers	for	your	browser	in	order	to	download	the	Service	Level	Agreement.	
               Hosted	Email	Security	displays	an	Adobe	Reader	(PDF)	document	of	the	Service	Level	Agreement	for	the	
               language	and	region	that	you	selected.