Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 630
Chapter 10      Virus Outbreak Filters
10-346
Cisco IronPort AsyncOS 7.1 for Email Configuration Guide
OL-22158-02
Outbreak Filters feature enabled, all other mail policies using the default will also 
have the Virus Outbreak Filters feature enabled. Once you have made changes, 
commit your changes.
Bypassing File Extension Types
You can modify a policy to bypass specific file types. Bypassed file extensions are 
not included when the CASE engine calculates the score for the message; 
however, the attachments are still processed by the rest of the email security 
workflow.
To bypass a file extension: 
On the Incoming Mail Policies, Virus Outbreak Filter Settings page, select or type 
in a file extension, and click Add Extension. For more information, see 
.
To remove an extension from the list of bypassed extensions, click the trash can 
icon next to the extension.
Bypassing File Extensions: Container File Types
When bypassing file extensions, files within container files (a .doc file within a 
.zip, for example) are bypassed if the extension is in the list of extensions to 
bypass. For example, if you add .doc to the list of extensions to bypass, all .doc 
files, even those within container files are bypassed.
The Virus Outbreak Filters Feature and the Outbreak Quarantine
Messages that are quarantined by the Virus Outbreak Filters feature are sent to the 
Outbreak quarantine. This quarantine functions like any other quarantine (for 
more information about working with quarantines, see the “Quarantines” chapter 
in the Cisco IronPort AsyncOS for Email Daily Management Guide) except that it 
has a “summary” view, useful for deleting or releasing all messages from the 
quarantine, based on the rule (for Outbreak Rules, the Outbreak ID is shown, and 
for Adaptive Rules, a generic term is shown) used to place the message in the 
quarantine. For more information about the summary view, see