Cisco Cisco Email Security Appliance C370D User Guide
1-5
User Guide for AsyncOS 9.8 for Cisco Email Security Appliances
Chapter 1 Getting Started with the Cisco Email Security Appliance
Where to Find More Information
Where to Find More Information
Cisco offers the following resources to learn more about your appliance:
•
•
•
•
•
•
•
•
•
Documentation
You can access the online help version of this user guide directly from the appliance GUI by clicking
Help and Support in the upper-right corner.
Help and Support in the upper-right corner.
Documentation for all Cisco Content Security products is available from:
Using From Header for
DKIM Signing
DKIM Signing
You can now use the DKIM Global Settings (Mail Policies > Signing
Profiles) to choose whether to use From header for DKIM signing. For
DMARC verification of DKIM signed messages, you must use the From
header during DKIM signing.
Profiles) to choose whether to use From header for DKIM signing. For
DMARC verification of DKIM signed messages, you must use the From
header during DKIM signing.
Duplicate Boundaries
Verification
Verification
Cisco Email Security appliance can now detect messages with duplicate
MIME boundaries and perform actions on them.
MIME boundaries and perform actions on them.
Use the Duplicate Boundaries Verification content filter condition or the
duplicate_boundaries
message filter rule to detect messages with
duplicate MIME boundaries.
See
Message Filter Rule to
Detect Malformed MIME
Headers
Detect Malformed MIME
Headers
You can now take actions on messages with malformed MIME headers
using the new message filter rule: “
using the new message filter rule: “
malformed-header
.”
See
CA Flag Check
You can now check whether the CA flag is set to TRUE on all the
certificate authorities in the custom list. To be Common
Criteria-compliant, all the trusted certificate authorities installed (System
and Custom Lists) in your appliance must have the CA flag set to TRUE.
certificate authorities in the custom list. To be Common
Criteria-compliant, all the trusted certificate authorities installed (System
and Custom Lists) in your appliance must have the CA flag set to TRUE.
Use the
certconfig
>
certauthority
>
custom
>
CHECK_CA_FLAG
command in the CLI.