Cisco Cisco Email Security Appliance X1050 Guía Del Usuario
32-16
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
Chapter 32 Spam Quarantine
Configuring Spam Management Features for End Users
4.
Messages are stored in the spam quarantine using the recipient's envelope address. After a user's
passphrase is validated against LDAP, the spam quarantine then retrieves the “Primary Email
Attribute” from the LDAP record to determine which envelope address they should show
quarantined messages for. The “Primary Email Attribute” can contain multiple email addresses
which are then used to determine what envelope addresses should be displayed from the quarantine
for the authenticated user.
passphrase is validated against LDAP, the spam quarantine then retrieves the “Primary Email
Attribute” from the LDAP record to determine which envelope address they should show
quarantined messages for. The “Primary Email Attribute” can contain multiple email addresses
which are then used to determine what envelope addresses should be displayed from the quarantine
for the authenticated user.
Related Topics
•
IMAP/POP Authentication Process
1.
Depending on your mail server configuration, a user enters their username (
joe
) or email address
(
joe@example.com
) and passphrase into the web UI login page. You can modify the Login Page
Message to tell your users whether they should enter a full email address or just their username (see
).
2.
The spam quarantine connects to the IMAP or POP server and uses the entered login (either
username or email address) and passphrase to try to log into the IMAP/POP server. If the passphrase
is accepted then the user is considered authenticated and the spam quarantine immediately logs out
of the IMAP/POP server.
username or email address) and passphrase to try to log into the IMAP/POP server. If the passphrase
is accepted then the user is considered authenticated and the spam quarantine immediately logs out
of the IMAP/POP server.
3.
Once the user is authenticated, the spam quarantine lists email for the user, based on the email
address:
address:
–
If you have configured the spam quarantine to specify a domain to append to bare usernames
(like
(like
joe
), then this domain is appended and that fully qualified email address is used to search
for matching envelopes in the quarantine.
–
Otherwise, the spam quarantine uses the entered email address to search for matching
envelopes.
envelopes.
For more information about IMAP, see the University of Washington web site:
http://www.washington.edu/imap/
Setting Up End-User Access to the Spam Quarantine via Web Browser
Do This
More Information
Step 1
Understand the benefits and limitations
of the different authentication methods
for end-user access to spam
management features.
of the different authentication methods
for end-user access to spam
management features.
Step 2
If you will authenticate end users using
LDAP, configure an LDAP server
profile, including the Spam
Quarantine End-User
Authentication Query settings on the
System Administration > LDAP >
LDAP Server Profile page.
LDAP, configure an LDAP server
profile, including the Spam
Quarantine End-User
Authentication Query settings on the
System Administration > LDAP >
LDAP Server Profile page.
and subsections