Cisco Cisco Email Security Appliance C190 Guía Del Usuario
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
6-125
Cisco IronPort AsyncOS 7.5 for Email Advanced Configuration Guide
OL-25137-01
Chapter 6 Using Message Filters to Enforce Email Policies
Choose one:
[2]> 2
Enter the maximum depth of attachment recursion to scan:
[5]> 10
Enter the maximum size of attachment to scan:
[5242880]> 10m
Do you want to scan attachment metadata? [Y]> Y
Enter the attachment scanning timeout (in seconds):
[30]> 60
If a message has attachments that were not scanned for any reason
(e.g. because of size, depth limits, or scanning timeout), assume the
attachment matches the search pattern? [N]>
If a message could not be deconstructed into its component parts in
order to remove specified attachments, the system should:
1. Deliver
2. Bounce
3. Drop