Cisco Cisco Email Security Appliance C650 Guía Del Usuario
C H A P T E R
16-1
User Guide for AsyncOS 9.8 for Cisco Email Security Appliances
16
Protecting Against Malicious or Undesirable
URLs
URLs
•
•
•
•
•
•
URL-Related Protections and Controls
Control and protection against malicious or undesirable links is incorporated into the anti-spam,
outbreak, content, and message filtering processes in the work queue. These controls:
outbreak, content, and message filtering processes in the work queue. These controls:
•
Increase the effectiveness of protection from malicious URLs in messages
URL filtering is incorporated into Outbreak Filtering. This strengthened protection is useful even if
your organization already has a Cisco Web Security Appliance or similar protection from web-based
threats, because it blocks threats at the point of entry.
your organization already has a Cisco Web Security Appliance or similar protection from web-based
threats, because it blocks threats at the point of entry.
You can also use content or message filters to take action based on the Web Based Reputation Score
(WBRS) of URLs in messages. For example, you can rewrite URLs with neutral or unknown
reputation to redirect them to the Cisco Web Security Proxy for click-time evaluation of their safety.
(WBRS) of URLs in messages. For example, you can rewrite URLs with neutral or unknown
reputation to redirect them to the Cisco Web Security Proxy for click-time evaluation of their safety.
•
Better identify spam
The appliance uses the reputation and category of links in messages, in conjunction with other
spam-identification algorithms, to help identify spam. For example, if a link in a message belongs
to a marketing web site, the message is more likely to be a marketing message.
spam-identification algorithms, to help identify spam. For example, if a link in a message belongs
to a marketing web site, the message is more likely to be a marketing message.
•
Support enforcement of corporate acceptable use policies
The category of URLs (for example, Adult Content or Illegal Activities) can be used in conjunction
with content and message filters to enforce corporate acceptable use policies.
with content and message filters to enforce corporate acceptable use policies.
•
Allow you to identify users in your organization who most frequently clicked a URL in a message
that has been rewritten for protection, as well as links that have most frequently been clicked.
that has been rewritten for protection, as well as links that have most frequently been clicked.
Related Topics
•