TECH BRIEF: HOW SONICWALL HOSTED EMAIL SECURITY …€¦ · SonicWall Hosted Email Security...

4
TECH BRIEF: HOW SONICWALL HOSTED EMAIL SECURITY ENHANCES MICROSOFT OFFICE 365 Best pracces for implemenng comprehensive protecon Abstract This brief provides an overview of how Office 365 customers can enhance the security for their email by integrang with the SonicWall Hosted Email Security cloud-based product, to guard against today’s advanced threats landscape The industry challenge In efforts to manage costs and resources more effecvely, organizaons are realizing the benefits of leveraging Microsoſt Office 365 and Exchange Online. Consequently, the adopon of Office 365 connues to accelerate, primarily at the expense of on-prem soluons. Yet at the same me, many organizaons are also keenly aware that modern emerging threats ulize email as the primary mechanism for delivering their payload, and thus are contemplang more leading-edge security. According to the SonicWall 2017 Threat Report, ransomware incidents grew by 167 mes year-over-year, and was the payload of choice for malicious email campaigns and exploit kits. In this vulnerable environment, organizaons require a next-generaon email security soluon that seamlessly integrates with Office 365, to protect them against today’s advanced threats. Essenal soluon components A next-generaon email security soluon should include the following key components: Advanced threat protecon: Most an-virus soluons are signature-based, and therefore ineffecve against advanced threats such as ransomware. A sandbox environment is required to detect and prevent ransomware and zero-day aacks before they even reach your network. Known threat protecon: For effecve security against aacks leveraging known malware, we recommend using mulple virus detecon engines to scan email messages and aachments for viruses, Trojans, worms and other types of malicious content. Phishing protecon: Phishing campaigns have emerged as the method-of-choice for delivering ransomware aacks. This requires an email security soluon that incorporates advanced analysis of an email’s subject, body and aachment by leveraging a sandbox environment. Fraud protecon: Hackers ulize advanced taccs such as spear phishing, whaling and CEO fraud to solicit for PII, or to carry out frauds by impersonang emails from within the organizaon. Granular configuraons for email sengs including SPF (Sender Policy Framework), DKIM (Domain Keys Idenfied Mail) and DMARC (Domain-based Message Authencaon, Reporng and Conformance). These can help prevent illegimate messages from entering your organizaon.

Transcript of TECH BRIEF: HOW SONICWALL HOSTED EMAIL SECURITY …€¦ · SonicWall Hosted Email Security...

Page 1: TECH BRIEF: HOW SONICWALL HOSTED EMAIL SECURITY …€¦ · SonicWall Hosted Email Security cloud-based product, to guard against today’s advanced threats landscape The industry

TECH BRIEF: HOW SONICWALL HOSTED EMAIL SECURITY ENHANCES MICROSOFT OFFICE 365Best practices for implementing comprehensive protection

AbstractThis brief provides an overview of how Office 365 customers can enhance the security for their email by integrating with the SonicWall Hosted Email Security cloud-based product, to guard against today’s advanced threats landscape

The industry challenge

In efforts to manage costs and resources more effectively, organizations are realizing the benefits of leveraging Microsoft Office 365 and Exchange Online. Consequently, the adoption of Office 365 continues to accelerate, primarily at the expense of on-prem solutions.

Yet at the same time, many organizations are also keenly aware that modern emerging threats utilize email as the primary mechanism for delivering their payload, and thus are contemplating more leading-edge security. According to the SonicWall 2017 Threat Report, ransomware incidents grew by 167 times year-over-year, and was the payload of choice for malicious email campaigns and exploit kits.

In this vulnerable environment, organizations require a next-generation email security solution that seamlessly integrates with Office 365, to protect them against today’s advanced threats.

Essential solution components

A next-generation email security solution should include the following key components:

• Advanced threat protection: Most anti-virus solutions are signature-based, and therefore ineffective against advanced threats such as ransomware. A sandbox environment is required to detect and prevent ransomware and zero-day attacks before they even reach your network.

• Known threat protection: For effective security against attacks leveraging known malware, we recommend using multiple virus detection engines to scan email messages and attachments for viruses, Trojans, worms and other types of malicious content.

• Phishing protection: Phishing campaigns have emerged as the method-of-choice for delivering ransomware attacks. This requires an email security solution that incorporates advanced analysis of an email’s subject, body and attachment by leveraging a sandbox environment.

• Fraud protection: Hackers utilize advanced tactics such as spear phishing, whaling and CEO fraud to solicit for PII, or to carry out frauds by impersonating emails from within the organization. Granular configurations for email settings including SPF (Sender Policy Framework), DKIM (Domain Keys Identified Mail) and DMARC (Domain-based Message Authentication, Reporting and Conformance). These can help prevent illegitimate messages from entering your organization.

Page 2: TECH BRIEF: HOW SONICWALL HOSTED EMAIL SECURITY …€¦ · SonicWall Hosted Email Security cloud-based product, to guard against today’s advanced threats landscape The industry

2

• Spam protection: To ensure spam does not clog inboxes and network resources, your organization needs an email security solution that leverages multiple methods of detecting spam and other unwanted email, including using specific allowed and blocked lists of people, domains and mailing lists; and the ability to enable third-party blocked lists.

• Advanced Reputation Management (ARM): This leverages a collaboration of multiple cross-verified SonicWall Capture Threat Network sources, including SonicWall Advanced Content Management (ACM), to provide dynamic, up-to-date analysis of email component reputations.

• Data loss prevention: An organization’s most sensitive communications require the utmost protection. The best measure is to encrypt sensitive emails and email attachments using a service that works in tandem with email security to protect emails.

How it works

SonicWall Hosted Email Security (HES) is an enterprise-class service that integrates with Capture Advance Threat Protection (ATP), to deliver fine grained and user-transparent inspection of SMTP-based traffic. SonicWall HES also includes advanced compliance scanning, management and optional email encryption, to prevent confidential data leaks, regulatory violations and to ensure the secure exchange of sensitive data. With SonicWall HES, no additional client software is necessary. In addition, the service includes DMARC, a powerful email authentication method that helps identify spoofed mail, reducing advanced phishing attacks.

SonicWall HES enhances Office 365 using a multi-layer defense approach for industry-leading protection against advanced threats delivered via email. It also delivers superior anti-phishing, anti-spoofing, anti-spam, multi-engine AV and data loss prevention (DLP) for comprehensive protection.

How to integrate Microsoft Office 356 with SonicWall HES

Realizing that many organizations require robust security, Microsoft has made integration of Office 365 with third-party systems relatively easy. Complete details on how to create smart-host connectors to enable Exchange Online Protection route messages to email security services, are available at the Microsoft Exchange Library.

SonicWall Email Encryption Cloud

• Secure email exchange web portal• AES encryption of stored email• Encrypted email access limited to

authenticated sender and recipient

Secure HTTPS connection

SonicWall Email Security

SonicWall Capture Threat Network

Reputation and signature updates

Threat collection End user

IT administrator

Recipient’s serverSender’sserver

1

3

1 2 3 4

4

2

Inspect and protect• Multiple proven, patented* techniques - Anti-spam - Anti-phishing - Anti-virus• Multi-layer anti-virus protection

Access to encrypted email• Mobile and desktop access to

encrypted email• Read or download encrypted email• Send encrypted reply

Managed by end user• Junk mailbox• Allow/block list• Junk summary settings

Managed by IT administrator• Set up and configuration - LDAP integration -Spooling management - Threat protection management• Allow/deny user self-management• Configure and monitor secure exchange portal• Reports

Secure TLS connection

Office 365 Exchange Online

Mailboxes

Next-Generation Email Protection• Advanced threat

protection • Known threat

protection• Phishing/fraud/spam

protection• Advanced reputation

management• Data loss prevention

Page 3: TECH BRIEF: HOW SONICWALL HOSTED EMAIL SECURITY …€¦ · SonicWall Hosted Email Security cloud-based product, to guard against today’s advanced threats landscape The industry

3

Once an organization is ready to configure SonicWall HES for use with Microsoft Office, the Office 365 Exchange Admin Center provides a very straightforward interface from which to configure the required settings. Following are the main configuration steps required to effectively configure SonicWall HES for Office 365:

• Modify MX Records to point your inbound mail flow to Email Security.

• Configure Email Security to be able to accept mail flow on behalf of that domain.

• Specify the Connectors to be utilized to connect to SonicWall HES, for routing and security restrictions for email messages.

• Create a Transport Rule to enable the connector on all traffic, and indicate if Transport Layer Security (TLS) should be used to secure the connection (recommended).

ConclusionTraditional email security solutions rely on static IP reputations and signature-based detection mechanisms, which simply cannot protect against today’s evasive and sophisticated malware. Detection alone does not suffice. Often, notifications are useless to prevent an ongoing attack. There is a need for security solutions to move from detection to prevention, and stop the attack before it even reaches your network.

The SonicWall Email Security solution uses a multi-layer defense approach utilizing its award-winning Capture ATP. Moreover, once integrated into Microsoft Office 365, it provides unparalleled breach prevention capabilities that defend against advanced threats originating from emails.

To learn more about SonicWall Email Security products, visit www.sonicwall.com/en-mx/products/secure-email

Page 4: TECH BRIEF: HOW SONICWALL HOSTED EMAIL SECURITY …€¦ · SonicWall Hosted Email Security cloud-based product, to guard against today’s advanced threats landscape The industry

4

© 2017 SonicWall Inc. ALL RIGHTS RESERVED.

SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners.

The information in this document is provided in connection with SonicWall Inc. and/or its affiliates’ products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of SonicWall products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, SONICWALL AND/OR ITS AFFILIATES ASSUME NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING,

BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON- INFRINGEMENT. IN NO EVENT SHALL SONICWALL AND/OR ITS AFFILIATES BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF SONICWALL AND/OR ITS AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SonicWall and/or its affiliates make no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. SonicWall Inc. and/or its affiliates do not make any commitment to update the information contained in this document.

About Us

SonicWall has been fighting the cyber-criminal industry for over 25 years, defending small, medium size businesses and enterprises worldwide. Our combination of products and partners has enabled a real-time cyber defense solution tuned to the specific needs of the more than 500,000 global businesses in over 150 countries, so you can do more business with less fear.

If you have any questions regarding your potential use of this material, contact:

SonicWall Inc. 5455 Great America Parkway Santa Clara, CA 95054

Refer to our website for additional information. www.sonicwall.com

TechBrief-HowSonicWallHostedEmail-US-VG-MKTG533