Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1094
 
27-22
Cisco AsyncOS 8.0.1 for Email User Guide
 
Chapter 27      Quarantines
  Configuring the Spam Quarantine
Configuring the Local Spam Quarantine
Once the local spam quarantine is enabled (see 
), you can edit the quarantine’s settings to configure the spam quarantine and how users will 
interact with it.
To configure the local spam quarantine, click Edit in the Settings column for the Spam Quarantine on 
the Monitor > Spam Quarantine page. 
Configuring Spam Quarantine Settings for the Local Spam Quarantine
Procedure 
Step 1
Choose Monitor > Spam Quarantine
Step 2
Click Edit in the Settings column for the Spam Quarantine. 
Step 3
In the Spam Quarantine Settings section, specify a maximum quarantine size.
Step 4
You can configure the quarantine to delete the oldest messages when the quarantine is full. If unchecked, 
newer messages will not be added to a full quarantine. Cisco recommends that you enable this feature 
so that a full quarantine will not cause messages to queue (back up) on your appliance.
Step 5
Specify the number of days to hold messages before deleting them, or you can elect to not schedule 
automatic deletion. Cisco recommends that you configure the quarantine to delete older messages to 
prevent the quarantine from filling to capacity.
Step 6
Specify a default language.
Step 7
You can configure the quarantine to send a copy of released messages to Cisco for analysis. Cisco 
recommends that you do configure the quarantine to do so.
Step 8
Customize the page end users see when they view the quarantine. Upload a custom logo (optional). The 
logo is displayed at the top of the spam quarantine page when the user logs in to view quarantined 
messages.
The logo should be a .jpg, .gif, or .png file that is at most 550 x 50 pixels.
If a logo file is not supplied, the default Spam Quarantine logo is used.
Note
If you specify a custom logo the default logo is deleted.
Step 9
Specify a login page message. This message is shown to end users when they are asked to log in prior to 
viewing the quarantine.
Step 10
Submit and commit your changes.
Note
If you are configuring a Security Management appliance, see the Cisco Content Security Management 
Appliance User Guide
 for more information.
Configuring Administrative Users for Spam Quarantines
You can specify administrative users for the spam quarantine. In this case, “administrative” refers to the 
user’s access to the spam quarantine. Operators, help desk users, read-only operators, and delegated 
administrators belonging to custom user roles with quarantine privileges may be added to the list of