Trustwave SpiderLabs Exposes Unique Cybersecurity Threats in the Public Sector. Learn More

Trustwave SpiderLabs Exposes Unique Cybersecurity Threats in the Public Sector. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
Loading...
Loading...

HOWTO: How to manually create an Allow List and use it in a rule

Expand / Collapse


This article applies to:

  • Trustwave MailMarshal (SEG)

Question:

  • How do I manually create a list of allowed addresses and use it within a rule?

An "allow list" is a list of known "friendly" email senders. The allow list can be included within MailMarshal rules and results in less false positives for recipients. It also allows the filtering rules to be stricter which provides more efficient email processing as friendly senders are not tested against Spam and Junk mail rules.

New installations of current versions create two groups called Global Whitelist and Harvested Whitelist, which can be used as Allow Lists. Some much earlier versions of MailMarshal SMTP did not automatically create these lists. If you have upgraded from an earlier version, you can create one as described.

This article includes two parts: How to manually create an Allow List user group, if one is not present, and how to use that group within a rule.

Note: Allow Lists can be useful but can cause other issues if not constructed and used carefully. See the notes on excessive allowlisting, and other best practices, in Trustwave Knowledge Base article Q10810.

Procedure:

To manually create a User Group use the following steps.

  1. In the Configurator or MailMarshal (SEG) 10 Management Console, expand Policy Elements | User Groups and click Add or New User Group.  
  2. Create a MailMarshal user group.
  3. Type a Name for the user group and optional description. Complete the user group creation.
  4. Navigate to the new User Group and click Add or Insert Users.
  5. Enter an email address or domain name for the user(s) you wish to include in the User Group. Click Add or Save.
    • Note: Ensure the entry does not include any spaces or other excess characters, particularly if pasting.
  6. Continue the process until all the domain names or email addresses you want to include have been entered.
  7. The Allow List has now been created. New users or domain names can be added to the user group in the future, by editing the group and repeating the steps.

To create a new rule using the manually created Allow List created above, use the following steps.

  1. In Email Policy, navigate to the Policy Group where you wish to place the new rule, and select Add or New Rule.
  2. On the User Matching Conditions window, ensure the rule applies to Incoming messages.
  3. To use the Allow List within the rule, select Where addressed from people or Addressed From.
  4. Then click on the hyperlink 'people' or 'group'.
  5. The User Matching Condition window is now available. Select the group from the User Groups pane and click the double arrow or drag it to add it to the Matching email addresses and user groups pane. Click Save or OK.
  6. Now the Rule description will show Where addressed from (your allow list group name.
  7. Complete the required actions (such as passing the message to the next Policy Group) and save the rule.



  8. The rule that has just been created will allow any email addresses contained in the allow list to bypass the other rules contained within the Policy group, and be passed to the next Policy Group.

Notes:

  • To better understand what addresses from the email are matched and should be included in an allow list, see Knowledge Base article Q12238.
  • You can quickly import addresses using the Group File Import tool. See Knowledge Base article Q11305.

To contact Trustwave about this article or to request support:


Rate this Article:
     

Add Your Comments


Comment submission is disabled for anonymous users.
Please send feedback to Trustwave Technical Support or the Webmaster
.