Mirapoint’s powerful spam-blocking appliance is easy to set up and includes excellent support
Joining the ranks of NetIQ and the contenders in my spam products roundup is Mirapoint’s Message Director MD450. Mirapoint gave InfoWorld an exclusive look at this product (the first appliance I’ve looked at in this space) and it exemplifies what administrators should expect in an appliance: a drop-in approach to installation, great ease of use, and performance comparable to the best in the field. Most organizations should find installing the MD450 completely painless, as it comes with installation support.
Running on a customized, hardened version of BSD, the MD450 provides anti-spam filtering based on the open source SpamAssassin engine, with additional extensions and added filtering capabilities. Further, it provides incoming and outgoing policy enforcement; spam filtering and virus protection; an HTTP proxy; directory-harvest protection; password-attack protection; integrated LDAP routing; POP and IMAP (Internet Mail Access Protocol) servers; Web and SSL access to e-mail; and intrusion detection.
Mirapoint provides on-site installation support as part of the price, so I allowed the company to send a support engineer to assist with installation. The engineer wasn’t really necessary, though, as I had the appliance running in about five minutes with no help that couldn’t have come from the manual. Many companies may find the on-site support useful, however, when it comes to configuring the optional features and customizing the filtering settings for their needs.
The appliance itself is a custom dual-Xeon 2.8GHz system with 2GB of RAM, mirrored SCSI 10k drives with a hot spare, Gigabit Ethernet and 10/100 interfaces, and a 320U SCSI interface for backups. The hardware includes redundant hot-swap fans and power supplies. The MD450 performed excellently, and according to Mirapoint, it can handle more than 10,000 users.
The IP address and other network information can be set from the front panel; no serial terminal connection is required. Once the IP network information is set, the rest of the usual configuration can be done via a browser. Configuration of anti-spam filtering was generally straightforward, although there were some subtleties that made me glad there was an engineer on hand. For example, a configuration option necessary to support different spam settings for each user proved complex.
Creating new filters, adding to the whitelist or blacklist, scheduling updates to the anti-spam filtering rules and anti-virus rules, adding content checking and anti-virus checking are all easily accomplished. The MD450 can also reject all mail from specific domains or IP address ranges, and can use RBLs (Realtime Blackhole Lists) that are maintained by volunteers who identify domains that either send spam or allow unidentified senders to relay mail through their systems.
Administrators can define anti-spam settings for a single domain or multiple domains, or allow users to modify their own settings. Multiple domains or subdomains can be configured, though this is a separately priced feature. Each domain or subdomain can have different administrators with different rights.
Mail can be quarantined, forwarded with text added to the subject line, discarded, or stripped of dangerous attachments. Users can access quarantined mail via a browser, where they can view, delete, open, reply to, or forward it. They also can confirm whether a message is junk mail, which will add it to the blacklist or whitelist.
Content checking includes some powerful features. “Wire taps” can monitor all mail coming to or from a specified address, and messages containing specific words can be blocked or quarantined, as can messages with specified attachments.
Two word lists, an objectionable words list and a corporate words list, should simplify the process of collecting and maintaining words to be checked for possible sharing of corporate secrets or other business issues as well as sanitizing porn and offensive language.
The MD450 provides denial of service protection by monitoring how quickly SMTP requests are issued from a single IP address, and it blocks requests or imposes a limit on the bandwidth allowed to that address. It also detects large numbers of outgoing mail to identify possible virus infections, worms, or open relays.
Reporting through the GUI is limited to a few days’ worth of daily reports, but the information available is all anyone could want and is presented in a variety of formats. For a weekly report, you use the command line interface to create a batch script to e-mail the administrator a comma-delimited file that can be opened in Excel or similar applications.
Performance monitoring is also available for a wide variety of functions, although again, gathering historical data over a period greater than a day requires command line programming.
The documentation is complete, including explanations of all the options that can only be used on the command line. Admins considering the Mirapoint appliance should have a good idea of what kinds of reports or other features beyond the basic they’ll want before the installation so they can take advantage of the installation engineer’s expertise.
The Mirapoint MD450 is a good example of what can be achieved using the SpamAssassin engine with additional software. As with SpamAssassin, however, it has a number of features that the less-sophisticated user may have trouble accessing without help.
If you have all your ducks in a row and are sure of what you want when the system is installed, you should get an easy-to-use, high-performance, drop-in solution that comes at a very low price compared to most of the other products I’ve tested.
Ease of use (20.0%)
Overall Score (100%)
|Mirapoint Message Director MD450||8.0||8.0||8.0||9.0||9.0|
You may be better off sticking with Win7 or Win8.1, given a wide range of Win10 trade-offs and...
An obscure case involving dental aligners could have huge implications for the free flow of data across...
With Windows 10 out and betas careening off the edges, here’s what you can get and what you should...
There's no 5G technology, no 5G standard, no agreement on what 5G means, and thus, nothing to plan for ...
Credentials are the main battlefront in our ongoing computer security war. Deploy everything you have...
Amazon’s SDKs and back-end services provide everything you need to build cloud applications for...
According to Foote Partners, IT job growth in January 2016 was the worst in nearly a year and a half,...