Cisco Cisco Email Security Appliance C170 사용자 가이드

다운로드
페이지 1212
 
C-9
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
 
Appendix C      Example of Mail Policies and Content Filters
  Overview of Incoming Mail Policies
Enabling message modification allows the appliance to scan for targeted threats, such as phishing 
and scams, and URLs to suspicious or malicious websites. The appliance can rewrite links in 
messages to redirect the user through the Cisco Security proxy if they attempt to access the website.
Note
Anti-spamming scanning must be enabled on the mail policy in order for Outbreak Filters to scan 
for targeted, non-viral threats.
Step 6
Select for Enable for Unsigned Messages.
This allows the appliance to rewrite URLs in signed messages. You must enable URL rewriting to 
be able to configure other Message Modification settings and the length of time that messages found 
to be non-viral threats stay in the quarantine before being released. This example uses the default 
retention time of 4 hours.
Step 7
Enter example.com in the Bypass Domain Scanning field.
The appliance will not modify links to example.com.
Step 8
Select System Generated for the Threat Disclaimer.
The appliance can insert a disclaimer above the message body to warn the user about the message’s 
contents. The following example uses the system generated threat disclaimer.
Figure C-8
Outbreak Filters Settings
Step 9
Submit and commit your changes. 
Note that the shading shows that the policy is using different settings than the default policy.