eScan Web and Mail Filter — Complete Guide to Features and Setup
What it is
eScan Web and Mail Filter is a network-level security appliance/software that filters web traffic and email to block malware, phishing, spam, and inappropriate content before it reaches endpoints. It works as a gateway (on-premises or virtual) and inspects HTTP/HTTPS, SMTP/POP3/IMAP, and related protocols to enforce policies and scan for threats.
Key features
- Web filtering: URL categorization, allow/block lists, custom policies, time-based access controls.
- HTTPS inspection: SSL/TLS interception and scanning to detect threats in encrypted traffic (requires installing CA on clients).
- Email filtering: Spam detection, attachment scanning, MIME inspection, virus/URL scanning in email bodies and attachments.
- Antivirus/antimalware engine: Signature and heuristic-based detection, plus cloud reputation lookups.
- Anti-phishing and URL protection: Real-time URL reputation checks and sandboxing for suspicious links.
- Content filtering & DLP basics: Block by file type, keywords, or patterns to prevent data leakage (configurable rules).
- Application control: Allow/block or throttle web applications and categories (social media, streaming, etc.).
- Reporting & logs: Dashboards, detailed logs, scheduled reports, and real-time alerts.
- High availability & scalability: Options for clustering, virtual appliance support, and load balancing for larger deployments.
- Integration & authentication: LDAP/Active Directory integration, single sign-on support, and API access for management/automation.
- Management options: Centralized management console for policy deployment across multiple gateways/sites.
Typical deployment options
- Hardware appliance deployed at network edge.
- Virtual appliance (VMware, Hyper-V, KVM, cloud images).
- Hybrid: central appliance with distributed enforcement points for branch offices.
- Inline (transparent/proxy) modes depending on network topology.
Prerequisites & planning
- Network diagram and placement: identify gateway point for inbound/outbound web and mail traffic.
- Certificate plan: generate and distribute a trusted CA to client devices for HTTPS inspection.
- Capacity planning: estimate concurrent connections, mail volume, and throughput to choose appropriate appliance/specs.
- Authentication design: decide how users will be identified (AD integration, transparent vs. auth-proxy).
- Backup & HA needs: determine clustering, failover, and configuration backup schedules.
Step-by-step setup (concise)
- Obtain appliance image or hardware and required licenses.
- Connect appliance to network edge (between firewall and LAN or as designated proxy).
- Assign management IP, set admin credentials, and secure console access.
- Update firmware/signature databases to latest versions.
- Configure time/NTP, DNS, and SMTP/relay settings.
- Integrate with directory service (LDAP/AD) for user-based policies.
- Import or create SSL/TLS certificate (install appliance CA on client devices).
- Create baseline policies:
- Default web filtering policy (categorization, allow/block lists).
- Email filtering rules (spam thresholds, attachment handling).
- Antivirus/heuristic scanning enabled for web and mail.
- Enable logging and schedule daily/weekly reports; configure alert thresholds.
- Test with a pilot group: verify web access, mail flow, and HTTPS inspection behavior.
- Tune policies based on false positives/negatives, adjust thresholds and exemptions.
- Roll out to full environment and monitor performance, logging,
Leave a Reply