Sendmail Sentrion GP
January 01, 2006
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Flexible processing options through the policy system.
- Weaknesses: Limited reporting facilities.
- Verdict: Good for enterprises that need fine-grained control over email traffic.
With its 3.20 GHz Intel Xeon processor, 2Gb memory, two 73GB SCSI drives configured as RAID-1, redundant power supplies, hardened Linux kernel and four Gigabit Ethernet ports, the Sendmail Sentrion GP is aimed firmly at the enterprise market.
Set-up was uncomplicated, with the printed guide providing a simple ten-step configuration process that had the system up and running within minutes. The browser-based interface gave access to all the monitoring and configuration pages, and was easy to navigate. There are two sets of graphical status displays, one for the system and one for the mail processing software.
Administrators can be set up with different access levels so that functions can be split, perhaps separating those responsible for monitoring traffic from those responsible for configuration.
The Sentrion offers Cloudmark’s anti-spam technology as well as its own policy-based system, and has a Directory Harvest Attack protection feature, although it only operates when connected to an LDAP server. LDAP is also required for SMTP authentication, which may restrict the device’s use in some systems.
Many features are controlled by policies – flow control, directory harvest attack and content filtering are all controlled in this way – and some predefined policies can be enabled or disabled as desired.
New policies are created simply by selecting options from drop-down lists. Additional features, such as address lists, word lists and quarantine policies can be used to produce a detailed rule set to handle complex situations.
As well as the anti-spam software settings already operating, and any third party blacklist servers that might have been configured, mail can be blocked by domain, sender or mail host.
Setting up links to RBL servers such as Spamhaus is simple, while report options are limited, but cover the essentials. There are pre-configured reports for daily and weekly traffic details and user activity. The traffic reports are displayed on the screen in the same sort of graphical layout as that used for the current system activity display.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context