Cisco Cisco Content Security Management Appliance M390

Pagina di 10
 
3
Release Notes for AsyncOS 8.3.7 for Cisco Content Security Management
 
  What’s New in This Release
What’s New in Release 8.3.5 
 
What’s New in Release 8.3.0 
Feature
Description 
Reporting and 
tracking support 
for Advanced 
Malware 
Protection 
features 
This release supports centralized reporting and tracking for file reputation and 
filtering features on managed Email and Web Security appliances. 
In order to view File Analysis report details, your appliance must be able to 
communicate with the File Analysis server. See essential configuration instructions 
in the Advanced Malware Protection reporting sections in the online help or user 
guide. 
Configuration 
Master support 
on Web Security 
appliances
This release includes configuration master changes to support file reputation and 
file analysis features. 
Feature
Description
New Features: 
Upgrade 
notification
A notification now appears at the top of the web interface when a new AsyncOS 
upgrade is available. See "Upgrade Notifications" in the user guide or online help. 
Spam quarantine 
improvements
You can now choose whether to require end users to log in when they access 
the end user quarantine via a link in a notification. 
For more information, see "Notifying End Users About Quarantined Messages" in 
the user guide or online help. 
You have more flexibility in scheduling the frequency and timing of 
notifications sent to end users about possible spam they receive. For example, 
you can now send notifications any day or days of the week and any hour or 
hours of the day. 
Administrators can now view, search, add, edit, and delete safelist and blocklist 
entries. 
For more information, see "Adding Senders and Domains to Safelists and 
Blocklists (Administrators)" in the user guide or online help. 
Enhancements: 
Reporting and 
Tracking 
enhancement 
Click links in reports to view the Message Tracking data for messages that are 
included in the report. This enhancement will simplify identification of problems, 
investigation of patterns, and testing of system and configurations.