Cisco Cisco Email Security Appliance X1050 Guía Del Usuario
C-10
User Guide for AsyncOS 9.7 for Cisco Email Security Appliances
Appendix C Example of Mail Policies and Content Filters
Overview of Incoming Mail Policies
Figure C-11
Outbreak Filters Settings
Step 9
Submit and commit your changes.
Note that the shading shows that the policy is using different settings than the default policy.
Figure C-12
Virus Filters Settings for the Engineering Policy Changed
At this point, any message that contains an attachment whose file extension is
dwg
— and whose recipient
matches the recipients defined for the engineering team policy — will bypass the Outbreak Filter
scanning and continue processing. Messages that contain links to the example.com domain will not have
their links modified to redirect through the Cisco Security proxy and will not be considered suspicious.
scanning and continue processing. Messages that contain links to the example.com domain will not have
their links modified to redirect through the Cisco Security proxy and will not be considered suspicious.
Finding Senders or Recipients in Mail Policies
Use the “Find Policies” button to search for users already defined in policies defined in the Incoming or
Outgoing Mail Policies pages.
Outgoing Mail Policies pages.
For example, typing
joe@example.com
and clicking the Find Policies button will display results showing
which policies contain defined users that will match the policy.