Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1224
 
7-32
Cisco AsyncOS 9.5 for Email User Guide
 
Chapter 7      Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
  Verifying Senders
Related Topics
Throttling Messages from Unverified Senders Using the SUSPECTLIST Sender Group
Procedure 
Step 1
Select Mail Policies > HAT Overview.
Step 2
Click SUSPECTLIST in the list of sender groups.
Figure 7-5
HAT Overview Page
Step 3
Click Edit Settings. 
Figure 7-6
Sender Group: SUSPECTLIST: Edit Settings
Step 4
Select the THROTTLED policy from the list.