Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1210
 
31-16
Cisco AsyncOS 9.0 for Email User Guide
 
Chapter 31      Spam Quarantine
  Configuring Spam Management Features for End Users
4.
Messages are stored in the spam quarantine using the recipient's envelope address. After a user's 
password is validated against LDAP, the spam quarantine then retrieves the “Primary Email 
Attribute” from the LDAP record to determine which envelope address they should show 
quarantined messages for. The “Primary Email Attribute” can contain multiple email addresses 
which are then used to determine what envelope addresses should be displayed from the quarantine 
for the authenticated user.
Related Topics
 
IMAP/POP Authentication Process 
1.
Depending on your mail server configuration, a user enters their username (
joe
) or email address 
(
joe@example.com
) and password into the web UI login page. You can modify the Login Page 
Message to tell your users whether they should enter a full email address or just their username (see 
).
2.
The spam quarantine connects to the IMAP or POP server and uses the entered login (either 
username or email address) and password to try to log into the IMAP/POP server. If the password 
is accepted then the user is considered authenticated and the spam quarantine immediately logs out 
of the IMAP/POP server.
3.
Once the user is authenticated, the spam quarantine lists email for the user, based on the email 
address:
If you have configured the spam quarantine to specify a domain to append to bare usernames 
(like 
joe
), then this domain is appended and that fully qualified email address is used to search 
for matching envelopes in the quarantine.
Otherwise, the spam quarantine uses the entered email address to search for matching 
envelopes.
For more information about IMAP, see the University of Washington web site:
http://www.washington.edu/imap/
Setting Up End-User Access to the Spam Quarantine via Web Browser 
Do This 
More Information 
Step 1
Understand the benefits and limitations 
of the different authentication methods 
for end-user access to spam 
management features. 
Step 2
If you will authenticate end users using 
LDAP, configure an LDAP server 
profile, including the Spam 
Quarantine End-User 
Authentication Query
 settings on the 
System Administration > LDAP > 
LDAP Server Profile
 page. 
 and subsections