Cisco Cisco Email Security Appliance C190 Guia Do Utilizador
Chapter 6 Email Security Manager
6-232
Cisco IronPort AsyncOS 7.1 for Email Configuration Guide
OL-22158-02
For example, typing
joe@example.com
and clicking the Find Policies button will
display results showing which policies contain defined users that will match the
policy.
policy.
Figure 6-16
Finding Users in Policies
Click the name of the policy to jump to the Edit Policy page to edit the users for
that policy.
that policy.
Note that the default policy will always be shown when you search for any user,
because, by definition, if a sender or recipient does not match any other
configured policies, it will always match the default policy.
because, by definition, if a sender or recipient does not match any other
configured policies, it will always match the default policy.
Email Security Manager: Managed Exceptions
Using the steps shown in the two examples above, you can begin to create and
configure policies on a managed exception basis. In other words, after evaluating
your organization’s needs you can configure policies so that the majority of
messages will be handled by the default policy. You can then create additional
“exception” policies for specific users or user groups, managing the differing
policies as needed. In this manner, message splintering will be minimized and you
are less likely to impact system performance from the processing of each splinter
message in the work queue.
configure policies on a managed exception basis. In other words, after evaluating
your organization’s needs you can configure policies so that the majority of
messages will be handled by the default policy. You can then create additional
“exception” policies for specific users or user groups, managing the differing
policies as needed. In this manner, message splintering will be minimized and you
are less likely to impact system performance from the processing of each splinter
message in the work queue.
You can define policies based on your organizations’ or users’ tolerance for spam,
viruses, and policy enforcement.
viruses, and policy enforcement.
outlines several
example policies. “Aggressive” policies are designed to minimize the amount of