Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1140
 
3-19
Cisco AsyncOS 8.5.5 for Email Security User Guide
 
Chapter 3      Setup and Installation
  Using the System Setup Wizard
Figure 3-5
Network Interfaces: 1 IP Address for Incoming and Outgoing (Nonsegregated) Traffic
Click Next to continue.
Step 4: Security
In step 4, you configure anti-spam and anti-virus settings. The anti-spam options include SenderBase 
Reputation Filtering and selecting an anti-spam scanning engine. For anti-virus, you can enable 
Outbreak Filters and Sophos or McAfee anti-virus scanning.
Enabling SenderBase Reputation Filtering
The SenderBase Reputation Service can be used as a stand-alone anti-spam solution, but it is primarily 
designed to improve the effectiveness of a content-based anti-spam system such as Anti-Spam. 
The SenderBase Reputation Service (http://www.senderbase.org) provides an accurate, flexible way for 
users to reject or throttle suspected spam based on the connecting IP address of the remote host. The 
SenderBase Reputation Service returns a score based on the probability that a message from a given 
source is spam. The SenderBase Reputation Service is unique in that it provides a global view of email 
message volume and organizes the data in a way that makes it easy to identify and group related sources 
of email. Cisco strongly suggests that you enable SenderBase Reputation Filtering.
Once enabled, SenderBase Reputation Filtering is applied on the incoming (accepting) listener.
Enabling Anti-Spam Scanning
Your appliance may ship with a 30-day evaluation key for Anti-Spam software. During this portion of 
the System Setup Wizard, you can choose to enable Anti-Spam globally on the appliance. You can also 
elect to not enable the service.
If you choose to enable the anti-spam service, you can configure AsyncOS to send spam and suspected 
spam messages to the local Spam Quarantine. The Spam Quarantine serves as the end-user quarantine 
for the appliance. Only administrators can access the quarantine until end-user access is configured.