Cisco Cisco Email Security Appliance C650 Guía Del Usuario
30-15
Cisco AsyncOS 8.5.5 for Email Security User Guide
Chapter 30 Spam Quarantine
Configuring Spam Management Features for End Users
Related Topics
•
IMAP/POP Authentication Process
1.
Depending on your mail server configuration, a user enters their username (
joe
) or email address
(
joe@example.com
) and password into the web UI login page. You can modify the Login Page
Message to tell your users whether they should enter a full email address or just their username (see
2.
The spam quarantine connects to the IMAP or POP server and uses the entered login (either
username or email address) and password to try to log into the IMAP/POP server. If the password
is accepted then the user is considered authenticated and the spam quarantine immediately logs out
of the IMAP/POP server.
username or email address) and password to try to log into the IMAP/POP server. If the password
is accepted then the user is considered authenticated and the spam quarantine immediately logs out
of the IMAP/POP server.
3.
Once the user is authenticated, the spam quarantine lists email for the user, based on the email
address:
address:
–
If you have configured the spam quarantine to specify a domain to append to bare usernames
(like
(like
joe
), then this domain is appended and that fully qualified email address is used to search
for matching envelopes in the quarantine.
–
Otherwise, the spam quarantine uses the entered email address to search for matching
envelopes.
envelopes.
For more information about IMAP, see the University of Washington web site:
http://www.washington.edu/imap/
Setting Up End-User Access to the Spam Quarantine via Web Browser
Configuring End-User Access to the Spam Quarantine
Administrative users can access the spam quarantine whether or not end-user access is enabled.
Do This
More Information
Step 1
Understand the benefits and limitations
of the different authentication methods
for end-user access to spam
management features.
of the different authentication methods
for end-user access to spam
management features.
Step 2
If you will authenticate end users using
LDAP, configure an LDAP server
profile, including the Spam
Quarantine End-User
Authentication Query settings on the
System Administration > LDAP >
LDAP Server Profile page.
LDAP, configure an LDAP server
profile, including the Spam
Quarantine End-User
Authentication Query settings on the
System Administration > LDAP >
LDAP Server Profile page.
and subsections
Step 3
Configure end-user access to the spam
quarantine.
quarantine.
Step 4
Determine the URL for end-user
access to the spam quarantine.
access to the spam quarantine.