Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1094
 
37-2
Cisco AsyncOS 8.0.1 for Email User Guide
 
Chapter 37      Optimizing the Appliance for Outbound Mail Delivery Using D-Mode
  Feature Summary: D-Mode for Optimized Outbound Delivery
Standard Features Disabled in D-Mode-Enabled Appliances 
IronPort anti-spam scanning and on or off box spam quarantining — Because anti-spam scanning 
pertains mostly to incoming mail, the IronPort Anti-Spam scanning engine is disabled. The 
Anti-Spam chapter is, therefore, not applicable.
Outbreak Filters — Because the Outbreak Filters feature is used to quarantine incoming mail, this 
feature is disabled on D-Mode-enabled appliances. Information in the Outbreak Filters chapter is, 
therefore, not applicable.
SenderBase Network Participation capabilities — Because SenderBase Network Participation 
reports information about incoming mail, this feature is disabled on D-Mode-enabled appliances. 
Information about SenderBase Network Participation is,  therefore, not applicable.
Reporting — Reporting is limited. Some reports are not available, and the reporting that does occur 
is set to run at a very limited level for performance reasons.
Note
The totals shown in the Email Security Monitor Overview report for D-Mode-enabled 
appliances may erroneously include spam and suspect spam counts, even though these 
features are disabled on D-Mode-enabled appliances. 
RSA Data Loss Prevention — RSA DLP scanning for outgoing messages is disabled on 
D-Mode-enabled appliances.
Standard Features Applicable to D-Mode-Enabled Appliances 
Table 37-1
AsyncOS Features Included in D-Mode Enabled Appliances 
Feature
More Information
Anti-virus scanning
See 
Domain Key signing
DKIM/Domain Keys is a method for verifying authenticity of email 
based on a signing key used by the sender. See 
Centralized management
See 
Delivery throttling
For each domain, you can assign a maximum number of connections 
and recipients that will never be exceeded by the system in a given 
time period. This “good neighbor” table is defined through the 
destconfig 
command.
For more information, see 
Bounce Verification
Verify the authenticity of bounce messages. See 
Delegated administration
See 
Trace (debug)
See