Cisco Cisco Email Security Appliance X1070 Mode D'Emploi
26-46
Cisco AsyncOS 9.5 for Email User Guide
Chapter 26 LDAP Queries
Identifying a Sender’s User Distinguished Name for RSA Enterprise Manager
Identifying a Sender’s User Distinguished Name for RSA
Enterprise Manager
Enterprise Manager
the Email Security appliance must include the complete distinguished names for the message senders
when it sends DLP incident data to Enterprise Manager. To acquire the sender name for Enterprise
Manager, create a user distinguished name query for your LDAP server and add the query to the listeners
that send outgoing messages on your Email Security appliance. The Email Security appliance only uses
this query when RSA Enterprise Manager is enabled for DLP. Otherwise, it does not appear as an option
for the server profile.
when it sends DLP incident data to Enterprise Manager. To acquire the sender name for Enterprise
Manager, create a user distinguished name query for your LDAP server and add the query to the listeners
that send outgoing messages on your Email Security appliance. The Email Security appliance only uses
this query when RSA Enterprise Manager is enabled for DLP. Otherwise, it does not appear as an option
for the server profile.
Related Topics
•
•
•
•
•
Sample User Distinguished Name Settings
This section shows sample settings for an Active Directory server and the user distinguished name query.
This example uses anonymous authentication for the Active Directory server and a query string for user
distinguished name retrieval for Active Directory servers.
This example uses anonymous authentication for the Active Directory server and a query string for user
distinguished name retrieval for Active Directory servers.
Note
This example is for representational purposes only. Queries and OU or tree settings may vary depending
on the environment and configuration.
on the environment and configuration.
Configuring AsyncOS To Work With Multiple LDAP Servers
When you configure an LDAP profile, you can configure the appliance to connect to a list of multiple
LDAP servers. To use multiple LDAP servers, you must configure LDAP servers to contain the same
information, use the same structure, and use the same authentication information. (third party products
exist that can consolidate the records).
LDAP servers. To use multiple LDAP servers, you must configure LDAP servers to contain the same
information, use the same structure, and use the same authentication information. (third party products
exist that can consolidate the records).
Table 26-15
Example LDAP Server and Spam Quarantine Alias Consolidation Settings: Active
Directory
Directory
Authentication Method
Anonymous
Server Type
Active Directory
Port
3268
Base DN
[Blank]
Connection Protocol
Use SSL
Query String
(proxyAddresses=smtp:{a})