May 22, eWin Presented by Ben Serebin Combating Spam Server-side Purpose : to provide insight into the steps an organization.

Slides:



Advertisements
Similar presentations
Presented by Ben Serebin Tue, June 15, Every 2 nd Tuesday of the Month. Same Time and Place Visit for Presentation.
Advertisements

Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
TERMINAL SERVER DEPLOYMENT PLAN. STEP 1: PREPARATION  UTILIZE THE CURRENT SERVER FOR: ACTIVE DIRECTORY (AD) ACTIVE DIRECTORY (AD) NEEDED FOR STORAGE.
The Case for Tripwire® Nick Chodorow Sarah Kronk Jim Moriarty Chris Tartaglia.
What’s New at NCS Fall, 2003 Gary Bernstein & the rest of the NCS gang.
Embedded Web Servers Dave Piscitello, Core Competence, Inc. Lisa Phifer, Core Competence, Inc. David Strom, David Strom, Inc.
INTERNET INFORMATION ACCESS How to avoid and eliminate common problems confronting usage of modern resources to access the Internet.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
IMF Mihály Andó IT-IS 6 November Mihály Andó 2 / 11 6 November 2006 What is IMF? ­ Intelligent Message Filter ­ provides server-side message filtering,
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Work Better Together Work Better Together Bring Ideas to Life Bring Ideas to Life Use Office Anywhere Use Office Anywhere Collaboration Without Compromise.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
IT:Network:Apps.  Security Options  Group Policy  AppLocker  ACL.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Jeff McKinney Exchange to Mirapoint Migration January 11, 2006 Securing Exchange to Mirapoint Jeff McKinney University of Maryland Dept of Electrical.
August 8, 2006 for NYExUG Presented by Ben Serebin Welcome to the 1.5 years anniversary meeting. Tue, August 8, Every 2 nd.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
No. 1 anti-spam solution for Exchange/SMTP/Lotus.
Exchange deployment at CERN and new ideas for SPAM fighting Michel Christaller, Emmanuel Ormancey, Alberto Pace.
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
IT:Network:Applications Fall  Running one “machine” inside another “machine”  OS in Virtual machines sees ◦ CPU(s) ◦ Memory ◦ Disk ◦ USB ◦ etc.
Task Scheduler Pro Managing scheduled tasks across the enterprise Joe Vachon Sales Engineer.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security and Messaging Matthew Smith Systems Consultant Raven Computers Ltd Security and Messaging Matthew Smith Systems Consultant Raven Computers Ltd.
Alabama Supercomputer Authority A partnership of … and.
Securing Microsoft® Exchange Server 2010
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Microsoft Exchange in the College of Engineering Jerry Ciolkosz Senior Systems Analyst Electronic and Computing Services October 16, 2003.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
PC Maintenance How to keep your computer healthy.
Networking Functions of windows NT Sever
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
A Web Based Workorder Management System for California Schools.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Networks.
EEPOS – Complete Enterprise Archive Solution Trillian Infosüsteemid Ltd Kahro Raie June
Spam Solutions Group 7 Leo Leung Peter Gorzkowski Seema Yadav Tobby Mathew You’ve Got Mail!
Update on  Mail Gateways  Servers  Spam Tagging  Anti-Virus  IMAP  Web Mail  LISTSERV  POP.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Implementing Microsoft Exchange Online with Microsoft Office 365
Internet safety By Suman Nazir
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Random Logic l Forum.NET l ASP.NET performance Forum.NET 5 th Meeting ● March 2006 By Yaniv Sharon.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Outlook / Exchange Training. Outlook / Exchange: Agenda What Can Microsoft Exchange Do / How works at UST? and Inbox Mailbox Quota Archiving.
INTRODUCING HYBRID APP KAU with MICT PARK IT COMPANIES Supported by KOICA
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
FNAL Central Systems Jack Schmidt, Al Lilianstrom, Ray Pasetes, and Kevin Hill (Fermi National Accelerator Laboratory) Introduction The FNAL .
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Welcome to DCISD Technology
Communication and Information Resource Centre Administrator
Intrusion Prevention Systems
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Presentation transcript:

May 22, eWin Presented by Ben Serebin Combating Spam Server-side Purpose : to provide insight into the steps an organization can take to close the Spam Floodgates.

May 22, eWin Presented by Ben Serebin Introduction Working in the IT sector since 1996 Specialty is Network Solutions and Wireless (NYCwireless) My Address (source on my website) : <!-- document.write(' ' + 'ben@reefsol&#117 ;tions.com' + ' '); // -->

May 22, eWin Presented by Ben Serebin Spam Definition and Types Definition of spam – unsolicited commercial sent by an organization/person that the recipient has had no prior contact with. Types of Spam: Adult, Business Opportunities, Nigerian Scam, Viruses, etc.

May 22, eWin Presented by Ben Serebin Steps to Close the Spam Floodgates Content Filtering, Hashes/Signatures, Bayesian Filtering, Use of RBLs, Change mailto links (to JavaScript ), Cleanse Archives, Switch to Forums Client Side -> change default view in Outlook, user training to stop “unsubscribing”

May 22, eWin Presented by Ben Serebin Content Filtering RegExFlt ( for Exchange 2000, Communigate Pro (Win only), and Merak Mail (icewarp.com, I use this for my gateway deployments). Pros: Tuned already, free, highly customizable, fast, low memory & cpu requirements. Cons: Requires configuration and learning. No phone support, supported by peer to peer web forum (& author).

May 22, eWin Presented by Ben Serebin Other Popular Methods Hashes/Signatures –low false positive rate, requires monthly service cost Bayesian Filtering – excellent (very accurate), Unix backend, requires client configuration. Highly cpu intensive. Free.

May 22, eWin Presented by Ben Serebin Deployment Options Server, Client, or Gateway Server -> requires modifying production environment. Client -> requires more training and support than centralized solution. Gateway -> deploy at your own speed, reduce workload for main mail server, more “gateway” feature rich than Exchange, anti-virus solution cheaper, use of non-server licenses, removes main mail server from internet contact (e.g. MS KB , a major vulnerability without a patch for NT 4.0).

May 22, eWin Presented by Ben Serebin Introducing your Mail Gateway Deploy Mail Gateway on NT, 2000 Pro/Server, or XP. Put it behind a firewall or use OS built-in filtering (Win2K IPSEC filters). Add Records for DNS (dual MX). Remove MX Record (or modify firewall) when ready.

May 22, eWin Presented by Ben Serebin Monitor, Tune, Monitor After Deployment, watch carefully for False Positives, and tune where needed. Allocate a few hours each week to monitor it for the 1 st month, then a hour a week and to bi-weekly (train others as well). Make Users feel part of the solution - setup an abuse address

May 22, eWin Presented by Ben Serebin ROI – Return on Investment Provide Week 1 and 2 Reports, then continue with Monthly Reports to insure value is understood. Explain False Positives, and Make Extra Effort to Insure this is minimal for Management

May 22, eWin Presented by Ben Serebin Conclusion Deploy Mail Gateway and enjoy all the benefits (reduction in spam & costs) from it. ROI Feedback is important. IT tends to undervalue it.

May 22, eWin Presented by Ben Serebin Bonus Stopping Browser Pop-ups - Mozilla, Netscape, and Opera. Default to these for clients, then use IE as backup. I prefer Opera and then Mozilla. Spyware is also a major threat, utilize the free detection software from Lavasoft. It’s called Ad-Aware