Cisco Cisco Email Security Appliance C160 ユーザーガイド
6-47
Cisco IronPort AsyncOS 7.5 for Email Configuration Guide
OL-25136-01
Chapter 6 Email Security Manager
Creating New Content Filters
In this part of the example, you will create three new content filters to be used in
the Incoming Mail Policy table. All of these content filters will be editable by
delegated administrators belonging to the Policy Administration custom user role.
You will create the following:
the Incoming Mail Policy table. All of these content filters will be editable by
delegated administrators belonging to the Policy Administration custom user role.
You will create the following:
Step 1
“scan_for_confidential”
This filter will scan messages for the string “confidential.” If the string is
found, a copy of the message will be sent to email alias
found, a copy of the message will be sent to email alias
hr@example.com
, and
the message will be sent to the Policy quarantine area.
Step 2
“no_mp3s”
This filter will strip MP3 attachments and notify the recipients that an MP3
file was stripped.
file was stripped.
Step 3
“ex_employee”
This content filter will scan for messages sent to a specific envelope recipient
address (an ex-employee). If the message matches, a specific notification
message will be sent to the sender of the message and then the message will
be bounced.
address (an ex-employee). If the message matches, a specific notification
message will be sent to the sender of the message and then the message will
be bounced.
Anti-Virus
Repaired messages: Deliver
Encrypted messages: Drop
Unscannable messages:
Drop
Drop
Infectious messages: Drop
Repaired messages: Deliver
Encrypted messages: Quarantine
Unscannable messages: Quarantine
Infectious messages: Drop
Virus
Filters
Filters
Enabled, no specific
filename extensions or
domains allowed to bypass
filename extensions or
domains allowed to bypass
Enable message
modification for all
messages
modification for all
messages
Enabled with specific filename
extensions or domains allowed to
bypass
extensions or domains allowed to
bypass
Enable message modification for
unsigned messages
unsigned messages
Table 6-6
Aggressive and Conservative Email Security Manager Settings (Continued)