Cisco Cisco Email Security Appliance C680 릴리즈 노트

다운로드
페이지 16
 
4
Release Notes for AsyncOS 9.6 for Cisco Email Security Appliances
 
  What’s New
System health 
monitoring 
enhancements
The Email Security appliance includes the following system health monitoring 
enhancements:
Configurable threshold for system health parameters. Depending on 
your organization's requirements, you can configure the threshold for 
various health parameters of your appliance such as overall CPU usage, 
number of messages in the work queue, and so on. You can also configure 
the appliance to send alerts when the specified threshold values are 
crossed.
See the “System Administration” chapter in the user guide. 
Enhanced System Capacity page. The following reports on the System 
Capacity page now shows the configured threshold levels for system health 
parameters:
Workqueue
Overall CPU Usage
Memory Page Swapping
See the “Using Email Security Monitor” chapter in the user guide. 
Upgrade Guidance. While performing an upgrade using web interface or 
CLI, the system analyzes the Status Logs to determine whether the 
appliance is ready for an upgrade. Depending on the result of the analysis, 
you will get guidance on whether to upgrade or perform additional tasks 
before upgrading.
See the “System Administration” chapter in the user guide. 
On-demand Health Check. You can now check the health of your 
appliance using the Health Check feature whenever required. The system 
analyzes historical data in the Status Logs to determine the health of the 
appliance. Based on the analysis, you can take remediation actions.
See the “System Administration” chapter in the user guide. 
Resource Conservation Activity graph. This graph shows the number of 
times the appliance entered resource conservation mode. You can access 
this graph from Monitor > System Capacity > System Load.
See the “Using Email Security Monitor” chapter in the user guide. 
Support for 
On-Premises File 
Analysis 
If you have deployed a Cisco AMP Threat Grid appliance on your network, you 
can analyze message attachments for malware without sending them to the 
cloud. 
To configure an on-premises file analysis server, see the “File Reputation 
Filtering and File Analysis” chapter in the user guide PDF. 
Feature Description