Cisco Cisco Content Security Management Appliance M1070 Mode D'Emploi

Page de 428
 
6-3
AsyncOS 9.5.x for Cisco Content Security Management Appliances User Guide
 
Chapter 6      Tracking Email Messages
  Setting Up Centralized Message Tracking
Step 2
Go to Security Services > Message Tracking.
Step 3
Click Edit Settings
Step 4
Select Centralized Tracking.
Step 5
Click Submit
Step 6
If you want to be able to search for and log the names of email attachments:
Make sure you have at least one incoming content filter or other body scanning feature configured and 
enabled on the Email Security appliance.  For information about content filters and body scanning, see 
the documentation or online help for your Email Security appliance. 
Step 7
Commit your changes. 
Step 8
Repeat for each Email Security appliance to manage. 
Adding the Centralized Message Tracking Service to Each Managed Email 
Security Appliance 
The steps you follow depend on whether or not you have already added the appliance while configuring 
another centralized management feature. 
Procedure 
Step 1
On the Security Management appliance, choose Management Appliance > Centralized Services > 
Security Appliances
.
Step 2
If you have already added the Email Security appliance to the list on this page: 
a.
Click the name of an Email Security appliance. 
b.
Select the Centralized Message Tracking service. 
Step 3
If you have not yet added the Email Security appliance: 
a.
Click Add Email Appliance. 
b.
In the Appliance Name and IP Address text fields, type the appliance name and the IP address for 
the Management interface of the Email Security appliance.
Note
If you enter a DNS name in the IP Address text field, it will be immediately resolved to an IP 
address when you click Submit
c.
The Centralized Message Tracking service is pre-selected. 
d.
Click Establish Connection. 
e.
Enter the user name and password for an administrator account on the appliance to be managed, then 
click Establish Connection
Note
You enter the login credentials to pass a public SSH key for file transfers from the Security 
Management appliance to the remote appliance. The login credentials are not stored on the 
Security Management appliance.