Cisco Cisco Email Security Appliance C170 Guida Utente
Glossary
GL-2
Cisco AsyncOS 8.5.5 for Email Security User Guide
Content Matching
Classifier
Classifier
The detection component of the RSA data loss prevention scanning engine. A
classifier contains a number of rules for detecting sensitive data, along with
context rules that search for supporting data. For example, a credit card classifier
not only requires that the message contain a string that matches a credit card
number, but that it also contains supporting information such as an expiration
data, a credit card company name, or an address.
classifier contains a number of rules for detecting sensitive data, along with
context rules that search for supporting data. For example, a credit card classifier
not only requires that the message contain a string that matches a credit card
number, but that it also contains supporting information such as an expiration
data, a credit card company name, or an address.
Conversational
Bounce
Bounce
A bounce that occurs within the SMTP conversation. The two types of
conversational bounces are hard bounces and
conversational bounces are hard bounces and
soft bounces
.
D
Debounce Timeout
The amount of time, in seconds, the system will refrain from sending the
identical alert to the user.
identical alert to the user.
Delayed Bounce
A bounce that occurs within the SMTP conversation. The recipient host accepts
the message for delivery, only to bounce it at a later time.
the message for delivery, only to bounce it at a later time.
Delivery
The act of delivering email messages to recipient domains or internal mail hosts
from the Cisco appliance from a specific IP interface. The Cisco appliance can
deliver messages from multiple IP interfaces within same physical machine
using Virtual Gateway technology. Each Virtual Gateway contains a distinct IP
address, hostname and domain, and email queue, and you can configure different
mail flow policies and scanning strategies for each.
from the Cisco appliance from a specific IP interface. The Cisco appliance can
deliver messages from multiple IP interfaces within same physical machine
using Virtual Gateway technology. Each Virtual Gateway contains a distinct IP
address, hostname and domain, and email queue, and you can configure different
mail flow policies and scanning strategies for each.
You can tailor the configuration of the delivery that the Cisco appliance
performs, including the maximum simultaneous connections to remote hosts, the
per-Virtual Gateway limit of maximum simultaneous connections to the host,
and whether the conversations to remote hosts are encrypted.
performs, including the maximum simultaneous connections to remote hosts, the
per-Virtual Gateway limit of maximum simultaneous connections to the host,
and whether the conversations to remote hosts are encrypted.
DLP
Data loss prevention. RSA Security DLP scanning engine protects your
organization’s information and intellectual property and enforces regulatory and
organizational compliance by preventing users from unintentionally emailing
sensitive data.
organization’s information and intellectual property and enforces regulatory and
organizational compliance by preventing users from unintentionally emailing
sensitive data.
DLP Incident
A data loss prevention incident occurs when a DLP policy detects one or more
DLP violations that merit attention in an outgoing message.
DLP violations that merit attention in an outgoing message.
DLP Policy
A data loss prevention policy is a set of conditions used to determine whether an
outgoing message contains sensitive data and the actions that AsyncOS takes on
a message that contains such data.
outgoing message contains sensitive data and the actions that AsyncOS takes on
a message that contains such data.
DLP Risk Factor
A score of 0 to 100 that represents the security risk of the DLP violations
detected in an outgoing message. Based on the risk factor, the DLP policy
determines the actions to take on the message.
detected in an outgoing message. Based on the risk factor, the DLP policy
determines the actions to take on the message.
DLP Violation
An instance of data being found in a message that violates your organization’s
DLP rules.
DLP rules.
DNS
Domain Name System. See RFC 1045 and RFC 1035. DNS servers on a network
resolve IP addresses to hostnames, and vice versa.
resolve IP addresses to hostnames, and vice versa.