UTM Flashcards
What hostname is required to join the UTN to Active Directory?
A hostname with a DNS A record in the internal Active Directory DNS domain
How can a user configure Google Authenticator to generate one-time passwords for the UTM?
Scan the QR code in the User Portal
What are the requirements for Active Directory in SSO transparent mode?
- AD authentication service configured and working
- UTM joined to the domain
- Clients able to resolve the UTM’s internal address by hostname and FQDN
- All clients joined to Active Directory
What are the AD SSO in transparent mode limitations?
uses last cached successful authentication
- https
- any url with a parameter
- AJAX requests
- Any non-browser application not using ‘Mozilla’ in the agent string
Describe how to configure AD SSO transparent mode
- Enable AD SSO in web proxy profile:
- Add the UTM FQDN to the local intranet zone on the client(Windows)
- add both hostname and FQDN
- chrome uses the same settings as internet explorer
- Firefox must be configured separately
- To use Mac OS X, Kerberos authentication must be enabled on the AD Server.
See KBA 120791 for further info.
Describe how the rules are managed in Application Control.
- Create rules with one or more applications or dynamic filters
- Block or allow traffic
- Rules apply to one or more network definitions
- Traffic NOT matching a rule is allowed.
What is the difference between web filtering profile and web filtering policy?
A web filtering profile determines where the user id connecting from and how they will authenticate. The web filtering policy matches a user to a filter action.
What can be used in an Application Control rule to selct what applications to block?
Application categories and productivity and risk ratings.
What are the 2 independent virus scanners?
Sophos and IlVira for SMTP an POP3.
Blocks malware before it reaches e-mail servers or desktops
Can specify file formats ( file extensions) and content (MIME type) to block
Emails and attachments can be dropped rejected with messages to sender, passed with a warning or quarantined.
What does the Anti- SPAM offer feature wise.
Reject at SMTP time, RBL’s real time blackhole lists, heuristic checksum-based spam filter, Sender blacklist, Invalid HELO / missing RDNS, Greylisting, BATV, SPF check, recipient check and expression filter.
What 3 methods of encryption does the UTM use for e-mail?
open pgp, smime and sophos secure pdf exchange. SPX
what features does the utm provide?
encryption, decryption and digital signatures for SMTP e-mails, completely transparent, Easy setup, Central Management of all keys and certificates
allows content scanning for encrypte emails
Simple encryption using Sophos SPX, escure pdf exchange.
what does Routing do with regard to mail?
Method of routing
- define the email domains to accept mail for
- specify static host names
- specify DNS hostname and MX records
What is required to e-mail out of the UTM?
Relaying is required for the UTM to process outbound e-mails. Becareful not to allow your UTM become blacklisted as an open relay. Do NOT select ANY as a relay!!!
what 2 modes does anti-virus configuration offer?
dual or single engine scanning.
*optionally reject malware during transmission
*quarantine or blackhole (delete) malware
* filter content based on MIME types ,File extensions
whitelist content by MIME type.
*optional footnote
What does CCL stand for?
Content Control List