Cisco Cisco Email Security Appliance C650 Guía Del Usuario
27-23
Cisco AsyncOS 8.0 for Email User Guide
Chapter 27 Quarantines
Configuring the Spam Quarantine
administrative users. All administrator level users (including the default admin user) are automatically
considered administrative users for the spam quarantine, and so they are not listed in the Available or
Authorized Users columns.
considered administrative users for the spam quarantine, and so they are not listed in the Available or
Authorized Users columns.
Procedure
Step 1
Click on the link for the appropriate type of user: local, externally authenticated, or custom role
(delegated administrators).
(delegated administrators).
Step 2
Select the users you want to add.
Step 3
Click Add.
Note that Operator level users and delegated administrators may view messages in the spam
quarantine, but may not edit the settings of the quarantine. Administrative users can view messages
and change the settings.
quarantine, but may not edit the settings of the quarantine. Administrative users can view messages
and change the settings.
Step 4
Submit and commit your changes.
Configuring End User Access to the Spam Quarantine
To allow end users to access the spam quarantine directly (without requiring a notification):
Procedure
Step 1
Choose Monitor > Spam Quarantine.
Step 2
Click Edit in the Settings column for the Spam Quarantine.
Step 3
Scroll down to the End-User Quarantine Access section.
Step 4
Check the checkbox labeled Enable End-User Quarantine Access. Administrator users can still access
the quarantine, regardless of whether the box is checked.
the quarantine, regardless of whether the box is checked.
Step 5
Specify whether or not to display message bodies before messages are released. If this box is checked,
users may not view the message body via the spam quarantine page. Instead, to view a quarantined
message’s body users must release the message and view it in their mail application (Outlook, etc.). This
is especially relevant to compliance issues where all viewed email must be archived.
users may not view the message body via the spam quarantine page. Instead, to view a quarantined
message’s body users must release the message and view it in their mail application (Outlook, etc.). This
is especially relevant to compliance issues where all viewed email must be archived.
Step 6
Specify the method you would like to use to authenticate end-users when they attempt to view their
quarantine directly via web browser (not via the email notification). You may use either Mailbox or
LDAP authentication.
quarantine directly via web browser (not via the email notification). You may use either Mailbox or
LDAP authentication.
Note that you can allow end user access to the spam quarantine without enabling authentication. In
this case, users can access the quarantine via the link included in the notification message and the
system does not attempt to authenticate the user. If you want to enable end user access without
authentication, select None in the End-User Authentication dropdown menu.
this case, users can access the quarantine via the link included in the notification message and the
system does not attempt to authenticate the user. If you want to enable end user access without
authentication, select None in the End-User Authentication dropdown menu.
LDAP Authentication: If you do not have an LDAP server or an active end user authentication
query set up, click the System Administration > LDAP link to configure your LDAP server
settings and end user authentication query string. For information about configuring LDAP
authentication, see “LDAP Queries” in the Cisco IronPort AsyncOS for Email Advanced
Configuration Guide.
query set up, click the System Administration > LDAP link to configure your LDAP server
settings and end user authentication query string. For information about configuring LDAP
authentication, see “LDAP Queries” in the Cisco IronPort AsyncOS for Email Advanced
Configuration Guide.
Mailbox Authentication: For sites without an LDAP directory to use for authentication, the
quarantine can also validate user’s email addresses and passwords against and standards-based
IMAP or POP server that holds their mailbox. When logging in to the web UI, the users enter their
quarantine can also validate user’s email addresses and passwords against and standards-based
IMAP or POP server that holds their mailbox. When logging in to the web UI, the users enter their