Cisco Cisco Email Security Appliance X1070 Guia Do Utilizador
27-27
Cisco AsyncOS 8.0.2 for Email User Guide
Chapter 27 Quarantines
Configuring the Spam Quarantine
Step 4
Enter the appropriate port numbers for the services.
Step 5
(Optional) Select whether to redirect HTTP requests to HTTPS for the Spam Quarantine.
Step 6
(Optional) Select whether this is the default interface for spam quarantine access (notifications and
quarantine logins will originate on this interface). Select whether to use the interface’s hostname in the
quarantine’s URL or specify a custom URL.
quarantine logins will originate on this interface). Select whether to use the interface’s hostname in the
quarantine’s URL or specify a custom URL.
Step 7
Submit and commit your changes.
Configuring a Mail Policy to Quarantine Spam
Once you have enabled the local spam quarantine (or added an external spam quarantine) you can
configure a mail policy to send spam or suspected spam messages to that quarantine. Note that you must
have Cisco IronPort Anti-Spam scanning enabled on the mail policy in order to be able to send mail to
the spam quarantine.
configure a mail policy to send spam or suspected spam messages to that quarantine. Note that you must
have Cisco IronPort Anti-Spam scanning enabled on the mail policy in order to be able to send mail to
the spam quarantine.
To configure a mail policy to send spam or suspect spam to the spam Quarantine:
Procedure
Step 1
On the Mail Policies > Incoming Mail Policies page, click the link in the Anti-Spam column for the
corresponding mail policy.
corresponding mail policy.
Step 2
In the Positively-Identified Spam Settings section, select Spam Quarantine for the Apply This Action to
Message option.
Message option.
Step 3
Repeat this for Suspected spam and Marketing email if desired.
Step 4
Submit and commit your changes.
Considerations for Deployment
This section consists of various tips and information to keep in mind when deploying the spam
quarantine.
quarantine.
Disk Space
shows the amount of disk space available on each appliance for the Spam Quarantine.
Table 27-4
Disk Space Available for Spam Quarantine
Model
Disk Space (in GB)
C000V/C100V
5
C300V/C600V
30
C160/C170
5
C360/C370
15
C660/C670
30