Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1181
 
32-5
User Guide for AsyncOS 9.8 for Cisco Email Security Appliances
 
Chapter 32      Spam Quarantine
  Setting Up the Local Spam Quarantine
Procedure 
Step 1
If you are not already editing the spam quarantine settings page: 
a.
Select Monitor > Spam Quarantine
b.
Click the Spam Quarantine link in the Quarantine Name column of the Spam Quarantine section. 
Step 2
Click the link for the type of user to add: local, externally authenticated, or custom role. 
If you have already added users or roles, click a username or role to view all eligible users or roles. 
Step 3
Select the users or roles that you want to add. 
Users with Administrator privileges are not listed because they automatically have full access to the 
spam quarantine. 
Step 4
Click OK.
Step 5
Submit and commit your changes.
Related Topics
Configuring a Mail Policy to Quarantine Spam 
Once you have enabled the spam quarantine, you can configure a mail policy to send spam or suspected 
spam to that quarantine. Anti-spam scanning must be enabled on the mail policy in order to send mail to 
the spam quarantine. 
For complete information about configuring mail policies to quarantine spam, see 
Procedure 
Step 1
On the Mail Policies > Incoming Mail Policies page, click the link in the Anti-Spam column for the 
corresponding mail policy.
Step 2
In the Anti-Spam Settings section, select Use IronPort Anti-Spam service
Step 3
In the Positively-Identified Spam Settings section, select Spam Quarantine for the Apply This Action 
to Message
 option. 
Step 4
Configure settings for suspected spam and marketing email. 
Step 5
Submit and commit your changes.
Limiting Which Recipients Have Mail Quarantined 
You can use multiple mail policies (Mail Policies > Incoming Mail Policy) to specify a list of recipient 
addresses for which mail will not be quarantined. Select ‘Deliver’ or ‘Drop’ instead of quarantine when 
configuring the anti-spam settings for the mail policy.