What hostname is required to join the UTN to Active Directory?
A hostname with a DNS A record in the internal Active Directory DNS domain
How can a user configure Google Authenticator to generate one-time passwords for the UTM?
Scan the QR code in the User Portal
What are the requirements for Active Directory in SSO transparent mode?
What are the AD SSO in transparent mode limitations?
uses last cached successful authentication
Describe how to configure AD SSO transparent mode
See KBA 120791 for further info.
Describe how the rules are managed in Application Control.
What is the difference between web filtering profile and web filtering policy?
A web filtering profile determines where the user id connecting from and how they will authenticate. The web filtering policy matches a user to a filter action.
What can be used in an Application Control rule to selct what applications to block?
Application categories and productivity and risk ratings.
What are the 2 independent virus scanners?
Sophos and IlVira for SMTP an POP3.
Blocks malware before it reaches e-mail servers or desktops
Can specify file formats ( file extensions) and content (MIME type) to block
Emails and attachments can be dropped rejected with messages to sender, passed with a warning or quarantined.
What does the Anti- SPAM offer feature wise.
Reject at SMTP time, RBL’s real time blackhole lists, heuristic checksum-based spam filter, Sender blacklist, Invalid HELO / missing RDNS, Greylisting, BATV, SPF check, recipient check and expression filter.
What 3 methods of encryption does the UTM use for e-mail?
open pgp, smime and sophos secure pdf exchange. SPX
what features does the utm provide?
encryption, decryption and digital signatures for SMTP e-mails, completely transparent, Easy setup, Central Management of all keys and certificates
allows content scanning for encrypte emails
Simple encryption using Sophos SPX, escure pdf exchange.
what does Routing do with regard to mail?
Method of routing
What is required to e-mail out of the UTM?
Relaying is required for the UTM to process outbound e-mails. Becareful not to allow your UTM become blacklisted as an open relay. Do NOT select ANY as a relay!!!
what 2 modes does anti-virus configuration offer?
dual or single engine scanning.
*optionally reject malware during transmission
*quarantine or blackhole (delete) malware
* filter content based on MIME types ,File extensions
whitelist content by MIME type.
*optional footnote
What does CCL stand for?
Content Control List
Describe SPX
Secure PDF Exchange (SPX)
What is a RED Management device?
Its a branch office device that connects back securely to the main office. Device need router running dhcp and gateway to the internet. The network just appears in in UTM management as any other interface.
How does an admin setup the UTM?
The admin configures the red on the UTM by setting up publically resolvable ip address and hostname. ( ip and netmask of remote network) and RED ID which is a 15 character string on a sticker underneath of device. The UTM sends the config to a cloud based provisioning service on the internet. The red connects via internet connected router to the provisioning server for its config.
What connection does RED use to connect to the Main Office UTM?
The RED establishes a layer 2 tunnel to the UTM using tcp/udp3400, RED udp 3410
Name the 3 Operating modes for a RED to connect.
Standard/Unified, Standard/Split and Transparent/Split
What is Standard/Unified?
remote network is managed by the UTM, which serves as dhcp server and default gateway. All traffic is sent through the network to the UTM from the RED.
What is standard/split mode?
UTM still manages network by providing dhcp and default gw. Only defined network traffic is sent from the RED to the UTM. All other traffic is sent directly to the internet.
Name 2 versions of RED
RED10 and RED 50