Cisco Cisco Email Security Appliance X1050 Guía Del Usuario
7-32
AsyncOS 9.1.2 for Cisco Email Security Appliances User Guide
Chapter 7 Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
Verifying Senders
Related Topics
•
•
•
•
•
Throttling Messages from Unverified Senders Using the SUSPECTLIST Sender Group
Procedure
Step 1
Select Mail Policies > HAT Overview.
Step 2
Click SUSPECTLIST in the list of sender groups.
Figure 7-5
HAT Overview Page
Step 3
Click Edit Settings.
Figure 7-6
Sender Group: SUSPECTLIST: Edit Settings
Step 4
Select the THROTTLED policy from the list.