Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1094
 
27-27
Cisco AsyncOS 8.0.1 for Email User Guide
 
Chapter 27      Quarantines
  Configuring the Spam Quarantine
Step 4
Enter the appropriate port numbers for the services.
Step 5
(Optional) Select whether to redirect HTTP requests to HTTPS for the Spam Quarantine.
Step 6
(Optional) Select whether this is the default interface for spam quarantine access (notifications and 
quarantine logins will originate on this interface). Select whether to use the interface’s hostname in the 
quarantine’s URL or specify a custom URL.
Step 7
Submit and commit your changes.
Configuring a Mail Policy to Quarantine Spam 
Once you have enabled the local spam quarantine (or added an external spam quarantine) you can 
configure a mail policy to send spam or suspected spam messages to that quarantine. Note that you must 
have Cisco IronPort Anti-Spam scanning enabled on the mail policy in order to be able to send mail to 
the spam quarantine.
To configure a mail policy to send spam or suspect spam to the spam Quarantine:
Procedure 
Step 1
On the Mail Policies > Incoming Mail Policies page, click the link in the Anti-Spam column for the 
corresponding mail policy.
Step 2
In the Positively-Identified Spam Settings section, select Spam Quarantine for the Apply This Action to 
Message option.
Step 3
Repeat this for Suspected spam and Marketing email if desired.
Step 4
Submit and commit your changes.
Considerations for Deployment
This section consists of various tips and information to keep in mind when deploying the spam 
quarantine.
Disk Space
 shows the amount of disk space available on each appliance for the Spam Quarantine.
Table 27-4
Disk Space Available for Spam Quarantine 
Model
Disk Space (in GB)
 
C300V/C600V
30
C160/C170
5
C360/C370/C380
 15
C660/C670
/C680  
 30